What two former soviet republics, now free, independent nation states, suffered cyber attacks from russia in 2007 and 2008

Answers

Answer 1

Estonia and Georgia are the two former Soviet republics that suffered cyber-attacks from Russia in 2007 and 2008, respectively.

In 2007, Estonia experienced a series of cyber-attacks targeting government, financial, and media websites, which were widely attributed to Russia. These attacks followed political tensions between the two countries over the relocation of a Soviet-era war memorial in Estonia's capital, Tallinn. The cyber-attacks, which involved Distributed Denial of Service (DDoS) and defacement of websites, disrupted essential services and had a significant impact on the country's digital infrastructure.

Similarly, in 2008, Georgia was targeted by cyber-attacks during its military conflict with Russia over the separatist regions of South Ossetia and Abkhazia. The attacks primarily targeted Georgian government websites, making it difficult for the government to communicate with citizens and the international community. The methods used in these attacks also included DDoS and website defacement. Some experts linked the cyber attacks to Russian hackers and government agencies, though concrete evidence was never officially presented.

Both incidents highlighted the vulnerabilities of national digital infrastructures and the potential for cyber warfare to be used as a tactic in international disputes. As a result, Estonia and Georgia have since invested in strengthening their cyber defense capabilities and have played an active role in promoting international cooperation on cyber security issues.

Know more about the cyber-attacks click here:

https://brainly.com/question/22255103

#SPJ11


Related Questions

5. describe the differences between symmetric and asymmetric multiprocessing. what are three advantages and one disadvantage of multiprocessor systems?

Answers

Symmetric multiprocessing (SMP) is a type of multiprocessing where all processors are treated equally and have equal access to memory and I/O devices. In contrast, asymmetric multiprocessing (AMP) is a type of multiprocessing where one or more processors are designated as "master" processors and the others are "slave" processors. The master processors control the system and delegate tasks to the slave processors.

Three advantages of multiprocessor systems are:
1. Increased performance: With multiple processors, tasks can be completed faster and more efficiently.
2. Increased reliability: If one processor fails, the system can still function with the remaining processors.
3. Increased scalability: Additional processors can be added to the system as needed to increase performance.

One disadvantage of multiprocessor systems is the increased complexity of the system. Managing multiple processors and coordinating tasks between them can be challenging and requires specialized software and hardware.

Learn more about processors here: https://brainly.com/question/18219085

#SPJ11

In project 802, the data link layer consists of the....................... and the.................sublayer Note: May have more than 1 answer None of the above CSMA, LLC MAC, LLC LAN, MAC LLC, PDU MAC, CSMA

Answers

In project 802, the data link layer consists of the MAC and the LLC sublayer. The data link layer plays a significant role in the transfer of data from one network device to another. It is responsible for delivering frames to the intended recipient and detecting any errors that may occur during transmission.

The 802 project is a series of networking standards that define the functions of each layer in the OSI model. The MAC sublayer is responsible for controlling access to the transmission medium and ensuring that only one device transmits at a time. Carrier Sense Multiple Access with Collision Detection (CSMA/CD) is a protocol used by the MAC sublayer to prevent collisions.

The LLC sublayer is responsible for managing logical links between devices. It handles the establishment, maintenance, and termination of connections between devices and ensures that data is delivered reliably. It provides flow control and error detection services and is responsible for framing and de-framing the data. In conclusion, the data link layer in project 802 consists of the MAC and the LLC sublayer.

To know more about consists visit:

https://brainly.com/question/30613605

#SPJ11

bubble 1 1. how does the app work? 2. what are the variables? a. what is being stored? b. what is being changed?

Answers

A specific task-enabling software program is known as an app. Applications for mobile devices are sometimes referred to as mobile apps, whereas those for desktop or laptop computers are occasionally referred to as desktop applications. When you launch an application, the operating system lets it run until you close it.

What is the application's primary goal?

Mobile devices, such as smartphones and tablets, are where apps are primarily designed for use. For users to access the functionality of their software on mobile devices, many software companies create app versions of their products.

How do iOS apps function?

IOS has a layered architectural design. In its most complex form, iOS serves as a bridge between the underlying hardware and the apps you create.

To know more about software visit:-

brainly.com/question/985406

#SPJ4

An app is a piece of software that performs a certain task. While programs for desktop or laptop computers are commonly referred to as personal computers application, programs for handheld phones are frequently referred to as digital apps.

What is the main objective of the application?

Apps are typically made for usage on handheld phones, including smartphones and tablets. Numerous software companies are developing app versions of their applications so that users can access the functionalities of their technology on mobile devices.

How are iOS apps used?

IOS's organizational layout is layered. iOS acts as a link in between underlying infrastructure and the apps you develop in its most complicated form.

To know more about software visit:-

brainly.com/question/985406

#SPJ4

There are four key steps in the Automated Machine Learning (AutoML) process: data preparation, model building, creating ensemble models, and model recommendation. When examining or reporting on a model, there are many questions that can arise that are related to each of these steps. This activity is important because it will demonstrate your understanding of what questions might arise when looking at or reporting on the AutoML model's decision or recommendation. The goal of this activity is to anticipate and understand that questions should be considered or might be asked upon examining or reporting results of an Automated Machine Learning model. For each question, determine the correct step in the AutoML process where the question might arise. 1. How was the data collected for the analysis? 2. What are the reasons behind why the recommended model produced the most accurate decision? 3. What features should be used to build the model? 4. What problems might have existed before combining favorable elements from all models into a single model? । 5. How was the data prepared for the analysis? 6. How did the model arrive at a particular conclusion? 7. Could a more accurate model be developed from combining different algorithms from more than one model? 8. What is the dependent variable of interest? 9. What variables had the greatest impact on the predicted outcome?

Answers

The questions listed pertain to different steps in the Automated Machine Learning (AutoML) process.

These steps include data collection, model recommendation, feature selection, problems before model combination, data preparation, model decision-making, combining algorithms, dependent variable identification, and impact of variables on predicted outcomes.

1. How was the data collected for the analysis?
Step: Data preparation
This question relates to the data collection process, which falls under the data preparation step in AutoML.
2. What are the reasons behind why the recommended model produced the most accurate decision?
Step: Model recommendation
This question is relevant to the model recommendation step in AutoML. I
3. What features should be used to build the model?
Step: Feature selection
This question pertains to the feature selection step in AutoML. It seeks to identify the relevant variables or features that should be included in the model construction process, ensuring they contribute to accurate predictions.
4. What problems might have existed before combining favorable elements from all models into a single model?
Step: Creating ensemble models
This question relates to the step of creating ensemble models. It focuses on identifying potential issues or challenges that may have existed before combining the favorable elements from multiple models into a single, more robust model.
5. How was the data prepared for the analysis?
Step: Data preparation
This question addresses the data preparation step in AutoML. It seeks to understand the steps and techniques employed to clean, preprocess, and transform the data to make it suitable for analysis.
6. How did the model arrive at a particular conclusion?
Step: Model decision-making
This question pertains to the model decision-making step in AutoML. It seeks to uncover the rationale and processes by which the model arrived at a specific conclusion or prediction.
7. Could a more accurate model be developed from combining different algorithms from more than one model?
Step: Creating ensemble models
This question is relevant to the step of creating ensemble models. It aims to explore the potential for improving model accuracy by combining different algorithms and approaches from multiple models.
8. What is the dependent variable of interest?
Step: Model building
It focuses on identifying the specific dependent variable that the model aims to predict or analyze.
9. What variables had the greatest impact on the predicted outcome?
Step: Model building
It seeks to determine which variables or features had the most significant influence on the predicted outcome, contributing to the understanding of the model's decision-making process.

learn more about Automated Machine Learning here

https://brainly.com/question/32731275



#SPJ11

Which three events occur when a DNS request is processed?
A. A local DNS server sends the IP address back to the requesting
device for access.
B. A local DNS server checks to see if it knows the IP address for the
site requested.
C. A subdomain DNS server defines how data will be transferred
over the internet.
D. Top-level domain DNS servers look up the site and return the IP
address.

Answers

The three events occur when a DNS request is processed is that

A local DNS server sends the IP address back to the requesting device for access. A local DNS server checks to see if it knows the IP address for the site requested.Top-level domain DNS servers look up the site and return the IP address.What are the types of DNS queries?

There are known to be 3 types of DNS queries which are:

Recursive iterativenon-recursive.

Therefore, The three events occur when a DNS request is processed is that

A local DNS server sends the IP address back to the requesting device for access. A local DNS server checks to see if it knows the IP address for the site requested.Top-level domain DNS servers look up the site and return the IP address.

Learn more about DNS from

https://brainly.com/question/12465146

#SPJ1

Outline the dangers arising as a result of using computers​

Answers

Answer:

Visual impairment

Physical Health problem

Explanation:

The benefits of computers are so numerous a d has been an essential business and educational tool every organization must possess for one purpose or the other. Such is how immense its importance is. However, the computer also comes with it's own risk, which may include :

Visual impairment is a major problem most computer users face or will likely encounter in the future due to prolonged exposure of the eyes to the light emanating from the screen. This visual challenge is populary called the. Computer Vision Syndrome.

Similarly, related health related issues affecting the physical body such as the back, hip, neck pains which result from postural position when using the computer.

Write a program that takes a date as input and outputs the date's season in the northern hemisphere. The input is a string to represent the month and an int to represent the day. Note: End with a newline.

Answers

A program that takes a date as input and outputs the date's season in the northern hemisphere will bear this order

cout << "Winter"

cout << "Spring"

cout << "Summer"

cout << "Autumn"

Complete Code below.

A program that takes a date as input and outputs the date's season in the northern hemisphere

Generally, The dates for each season in the northern hemisphere are:

Spring: March 20 - June 20Summer: June 21 - September 21Autumn: September 22 - December 20Winter: December 21 - March 19

And are to be taken into consideration whilst writing the code

Hence

int main() {

string mth;

int dy;

cin >> mth >> dy;

if ((mth == "January" && dy >= 1 && dy <= 31) || (mth == "February" && dy >= 1 && dy <= 29) || (mth == "March" && dy >= 1 && dy <= 19) || (mth == "December" && dy >= 21 && dy <= 30))

cout << "Winter" ;

else if ((mth == "April" && dy >= 1 && dy <= 30) || (mth == "May" && dy >= 1 && dy <= 30) || (mth == "March" && dy >= 20 && dy <= 31) || (mth == "June" && dy >= 1 && dy <= 20))

cout << "Spring" ;

else if ((mth == "July" && dy >= 1 && dy <= 31) || (mth == "August" && dy >= 1 && dy <= 31) || (mth == "June" && dy >= 21 && dy <= 30) || (mth == "September" && dy >= 1 && dy <= 21))

cout << "Summer" ;

else if ((mth == "October" && dy >= 1 && dy <= 31) || (mth == "November" && dy >= 1 && dy <= 30) || (mth == "September" && dy >= 22 && dy <= 30) || (mth == "December" && dy >= 0 && dy <= 20))

cout << "Autumn" ;

else

cout << "Invalid" ;

return 0;

}

For more information on Programming

https://brainly.com/question/13940523

who invented the computer?
when was it made?
can u tell me the name of the oldest computer?
when did the first laptop come out?

Answers

The computer was invented by Charles Babbage 15 February 1946Antikythera Mechanism it came out in 1981

Hope it helps you

pls mark my answer as brainliest

Answer:

1 and 2: Charles Babbage invented the computer (he was an English mechanical engineer and polymath) Charles Babbage was deemed the "father of the computer", he thought up and created the very first mechanical computer at the beginning of the 19th century.

3: the first computer was named the ubiquitous x86-powered workhorse of desktop and portable computing. All latest PCs are descendants of the earliest from IBM, the original model 5150 which made its first appearence in August 1981.

4: The first laptop computer available to the public was the Osborne. the Osborne Computer Corporation issued this exact model to the public in the year 1981. It ran at a large price of $1795. At the time of discharge, the screen was about five inches long and the keyboard was on the cover of the computer.

i did a lot of research for this, lol. hope it helps.

(i promise i did not plagerise)

In which of the following phases of filmmaking would a production team be focused on the process of casting?
(Select all that apply).
pre-production

post-production

development

distribution

Answers

Explanation:

There are five phases of film production and they include development, pre-production, production, post-production and distribution.

Answer:

pre-production

Explanation:

edg2021

Once the film concept has been developed, the film company transitions to the production phases: pre-production, production, and post-production. In pre-production, the technical details are worked out, a schedule is set, and the resources to produce the film are assembled. This includes casting the film, filling the technical positions, and scheduling the production. The actual filming takes place during the production phase, followed by a post-production phase in which the footage is edited and the final film emerges.

Binary is represented by two digits, write out each and describe what each means:

Answers

Answer:

binary is represented by 1 and 0

Explanation:

the binary of 1 means it has value, and the binary of 0 means it has no value. with a combination of 1s and 0s, you can get a complex program to run, like this platform :) what it basicly does is a true or false kinda think. just think of it that way: true or false, value or no value, and yes or no. the 1 is a positive value and the 0 is a negative value that has no value.

I hope this helps you :D

In binary, the 0s and 1s signify OFF and ON, respectively.

What do the binary numbers 1 and 0 represent?

In binary, the 0s and 1s signify OFF and ON, respectively. A "0" in a transistor indicates that no electricity is flowing, while a "1" indicates that electricity is flowing.

Numbers are physically represented inside the computing equipment in this fashion, allowing calculations.

Learn more about binary numbers here:

https://brainly.com/question/13371877

#SPJ4

When operating your vessel with a vhf radio, what channel must you monitor?.

Answers

Answer: Channel 16. If you hear a MAYDAY call, remain silent, listen, and write down information about the boat in distress.

Hope this helps!

In the context of networks, the term "topology" refers to the order and arrangement of the elements of a communications network.

a. True
b. False

Answers

The statement is true. Network topology describes the physical and logical relationships between nodes in a network, as well as the schematic arrangement of links and nodes, or some hybrid of the two.

Network topology is used to define the layout, structure, and shape of a network, both physically and logically. A network can have a single physical topology and multiple logical topologies at the same time. The physical connections of devices such as wires, cables, and others are referred to as network layout. The geometric arrangement of links and nodes in a computing network is referred to as network topology. Network topology, on the other hand, may describe how data is transferred between these nodes. Network topologies are classified into two types: physical and logical.

Learn more about topology here-

https://brainly.com/question/13186238

#SPJ4

Write a program which takes a string input, converts it to lowercase, then prints
the same string without the five most common letters in the English alphabet (e, t, a, i o).

Answers

Answer:

Seeing as i don't know what language you want this made in, so I'll do it in two languages, Py and C++.

Here is a solution in C++:

#include <iostream>

#include <string>

#include <map>

int main() {

 // prompt the user for a string

 std::cout << "Enter a string: ";

 std::string input;

 std::getline(std::cin, input);

 // convert the input string to lowercase

 std::transform(input.begin(), input.end(), input.begin(), ::tolower);

 // create a map to keep track of the frequency of each letter in the string

 std::map<char, int> letter_counts;

 for (const char& c : input) {

   letter_counts[c]++;

 }

 // create a string of the five most common letters in the English alphabet

 // (e, t, a, i, o)

 std::string most_common_letters = "etai";

 // remove the five most common letters from the input string

 for (const char& c : most_common_letters) {

   input.erase(std::remove(input.begin(), input.end(), c), input.end());

 }

 // print the resulting string

 std::cout << "Resulting string: " << input << std::endl;

 return 0;

}


Here is a solution in Python:

import string

# prompt the user for a string

input_str = input("Enter a string: ")

# convert the input string to lowercase

input_str = input_str.lower()

# create a string of the five most common letters in the English alphabet

# (e, t, a, i, o)

most_common_letters = "etai"

# remove the five most common letters from the input string

for c in most_common_letters:

 input_str = input_str.replace(c, "")

# print the resulting string

print("Resulting string: ", input_str)

Explanation: Hope this helped

after writing pseudocode what step is next

Answers

The next step would be to implement the pseudocode. This means taking the instructions written in the pseudocode and translating it into a programming language, such as C++, Java, or Python.

What is programming language?

A programming language is a special language used to communicate instructions to a computer or other electronic device. It consists of a set of rules and symbols which tell the device what to do . Programming languages are used to create software, websites, mobile applications and more.  

This involves taking each step written in the pseudocode and writing code that will perform the same function. Depending on the complexity of the pseudocode, this could involve writing multiple lines of code for each step. After the code is written, it can then be tested and debugged to ensure that it works properly.

To learn more about programming language

https://brainly.com/question/23959041

#SPJ1

Ann has recently transferred from the payroll department to engineering. While browsing file shares, Ann notices she can access the payroll status and pay rates of her new coworkers. Which of the following could prevent this scenario from occurring?


A. Credential management

B. Continuous monitoring

C. Separation of duties

D. User access reviews

Answers

Ann was part of the payroll department, she had permission to access the payroll status and pay rates of her coworkers. So the correct option is C. Separation of duties.

However, now that she is working in engineering, she shouldn't have access to that information anymore. To prevent this scenario from occurring, the company could implement credential management, continuous monitoring, separation of duties, or user access reviews. Out of these options, the one that would be most effective in preventing Ann from accessing the payroll information of her coworkers is separation of duties.

Separation of duties is a principle of internal control that requires that no one person is responsible for all aspects of a single transaction. It ensures that no one person has too much control over a process, which helps prevent fraud and errors.

To know more about payroll status  visit:-

https://brainly.com/question/32099022

#SPJ11

What is the main device used on fourth generation computer​

Answers

Answer: Microprocessors were used to create the fourth generation of computers. In 1971, Intel built the first microprocessor, the 4004 chip.

Explanation: The microprocessor is a silicon chip with millions of transistors built using LSI and VLSI technologies.

hope this helps best of luck mate! :)

Are DVD players, USBs, printers/scanners, guitar amps, satellite dishes, headphones, dishwashers, radios, and modern cars considered computers?

Answers

Answer:

yes

Explanation:

um ik for sure that a printer/scanner is a computer in a way^^

Answer:

yes they are considered!

Explanation:

they are conisdered computers due to having an interioir machine, which has been engineered to perfrom certain tasks, just like a computer.

You learned that you can use the tags to insert a link to another webpage. One problem that webpage developers face is that, after a time, links may no longer work. Can you think of ways that you can avoid broken links?

Answers

Answer:

Create hyperlinks instead

Explanation:

what has a bit and spins and can make holes

Answers

Answer:

A drill

Explanation:

A drill uses a bit to hold the screw that holds the screw, which makes a hole

What are some of the general components of an IDE?

Answers

Answer:

An IDE normally consists of a source e editor, build automation tools. Most modern IDEs have intelligent code completion. Some IDEs contain a compiler, interpreter, or both.

He can borrow a CD RW from school but he has a 128 Mb memory stick of his own.
(a) Give two advantages of using the CD RW.
1
2
(b) Give two advantages of using the memory stick.
1

Answers

Answer:

Larger storage capacity: CD RWs generally have larger storage capacity compared to memory sticks. Depending on the type of CD RW used, it can store up to several GBs of data.

Durability: CD RWs are relatively more durable compared to memory sticks, which are prone to damage and data loss due to physical wear and tear.

(b) Two advantages of using the memory stick could be:

Portability: Memory sticks are small and compact, making them easy to carry around. They can fit in a pocket or on a keychain, which makes them a convenient option for transferring data between different devices.

Speed: Memory sticks can transfer data at high speeds compared to CD RWs, which can be important if you need to transfer large amounts of data quickly. This can be particularly useful if you need to transfer data frequently, such as in a work or academic setting.

The time value of the option should Multiple Choice increase the longer the time to expiration. approach infinity at expiration. decrease the longer the time to expiration. not change with time to expiration.

Answers

The time value of the option should decrease the longer the time to expiration.

The time value of an option is influenced by various factors, one of which is the time remaining until the option's expiration date. As time passes, the uncertainty and risk associated with the option decrease, leading to a decrease in its time value.

This is because, as the expiration date approaches, there is less time for the underlying asset's price to move favorably for the option holder.

When an option has a longer time to expiration, it offers more opportunities for the underlying asset's price to fluctuate, increasing the likelihood of favorable price movements. As a result, the option holder pays a higher premium for the potential benefits of holding the option for a longer period.

However, as the expiration date nears, the potential for significant price movements diminishes, reducing the option's time value. This is because there is less time for the market conditions to change in a favorable manner. Consequently, the option's time value decreases, reflecting the reduced probability of realizing a profitable outcome.

Learn more about Time to expiration.

brainly.com/question/29629503

#SPJ11

although not all programming environments support documentation in the form of comments, when programmers use one that does support it, they should be adding comments throughout the programming process. although the comments are ignored by the compiler when executing, they are still useful. which of the following are true about documentation / comments? group of answer choices

Answers

Answer:

The answer to the question is "all of the above."

Explanation:

This is because it is used to describe the function of a code segment, procedure or program and how it was developed, it helps in developing and maintaining correct programs when working in an individual or collaborative setting, and it provides a way to acknowledge any code segments that were developed collaboratively or by another source (generally this acknowledgment is in the form of the author’s name and the origin of the code).

URGENT! REALLY URGENT! I NEED HELP CREATING A JAVASCRIPT GRAPHICS CODE THAT FULFILLS ALL THESE REQUIREMENTS!

URGENT! REALLY URGENT! I NEED HELP CREATING A JAVASCRIPT GRAPHICS CODE THAT FULFILLS ALL THESE REQUIREMENTS!

Answers

In the program for the game, we have a garden scene represented by a green background and a black rectangular border. The cartoon character is a yellow circle with two black eyes, a smiling face, and arcs for the body. The character is drawn in the center of the screen.

How to explain the information

The game uses Pygame library to handle the graphics and game loop. The garden is drawn using the draw_garden function, and the cartoon character is drawn using the draw_cartoon_character function.

The game loop continuously updates the scene by redrawing the garden and the cartoon character. It also handles user input events and ensures a smooth frame rate. The game exits when the user closes the window.

This example includes appropriate use of variables, a function definition (draw_garden and draw_cartoon_character), and a loop (the main game loop). Additionally, it meets the requirement of using the entire width and height of the canvas, uses a background based on the screen size, and includes shapes (circles, rectangles, arcs) that are used appropriately in the context of the game.

Learn more about program on

https://brainly.com/question/23275071

#SPJ1

Role playing games have an objective of trying to gain the most points in a certain period of time.
Group of answer choices

True

False

Answers

Answer: I think False.

100% pl…View the full answer
answer image blur
Transcribed image text: Convert the following Pseudo-code to actual coding in any of your preferred programming Language (C/C++/Java will be preferable from my side!) Declare variables named as i, j, r, c, VAL Print "Enter the value ofr: " Input a positive integer from the terminal and set it as the value of r Print "Enter the value of c: " Input a positive integer from the terminal and set it as the value of c Declare a 2D matrix named as CM using 2D array such that its dimension will be r x c Input an integer number (>0) for each cell of CM from terminal and store it into the 2D array Print the whole 2D matrix CM Set VAL to CM[0][0] Set both i and j to 0 While i doesn't get equal to r minus 1 OR j doesn't get equal to c minus 1 Print "(i, j) →" // i means the value of i and j means the value of j If i is less than r minus 1 and j is less than c minus 1 If CM[i][j+1] is less than or equal to CM[i+1][j], then increment j by 1 only Else increment i by 1 only Else if i equals to r minus 1, then increment j by 1 only Else increment i by 1 only Print "(i, j)" // i means the value of i and j means the value of j Increment VAL by CM[i][j] Print a newline Print the last updated value of VAL The above Pseudo-code gives solution to of one of the well-known problems we have discussed in this course. Can you guess which problem it is? Also, can you say to which approach the above Pseudo-code does indicate? Is it Dynamic Programming or Greedy? Justify your answer with proper short explanation.

Answers

The following is the solution to the provided Pseudo code in C++ programming language. As for which problem this Pseudo code gives a solution for, it is the problem of finding the path with minimum weight in a matrix from its top-left corner to its bottom-right corner, known as the Minimum Path Sum problem.The above Pseudo code shows the Greedy approach of solving the Minimum Path Sum problem. This is because at each cell of the matrix, it always picks the minimum of the right and down cell and moves there, instead of keeping track of all paths and comparing them, which would be the Dynamic Programming approach. Hence, it does not require to store all the sub-problem solutions in a table but instead makes a decision by selecting the locally optimal solution available at each stage. Therefore, we can conclude that the above Pseudo code does indicate the Greedy approach to the Minimum Path Sum problem in computer programming.Explanation:After receiving input of the dimensions of the matrix and the matrix itself, the Pseudo code declares a variable VAL and initializes it with the first cell value of the matrix. It then uses a while loop to iterate through the matrix till it reaches its bottom-right corner. At each cell, it checks if it can only move to the right or down, and then it moves in the direction of the minimum value. VAL is then updated by adding the value of the current cell to it.After the loop is exited, the last updated value of VAL is printed, which is the minimum path sum value.

Learn more about Pseudo code here:

https://brainly.com/question/21319366

#SPJ11

a. Why are the data known as raw facts? Explain.​

Answers

Answer:

The word raw means that the facts have not yet been processed to get their exact meaning. Data is collected from different sources. ... The result of data processing is Information.

Answer:

The Raw Facts and Figures are Called Data.

The word raw means that the facts have not yet been processed to get their exact meaning. Data is collected from different sources. It is collected for different purposes. ... The process of sorting or calculating data is called Data Processing

Hope you got it

If you have any question just ask me

If you think this is the best answer please mark me as branliest

Compared with a large-scale integrated multi-purpose computer, a quantum computer is a _____ computer. high-powered multi-purpose slower integrated high-speed parallel high-speed integrated

Answers

high powered multipurpose computer.

What is a computer?

A computer is a piece of electronic equipment used to manipulate data or information. Data can be stored, retrieved, and processed by it. You may already be aware of the fact that you can use a computer to browse the Internet, send emails, type documents, and play games. It can also be used to edit or make presentations, videos, and spreadsheets.

What is multipurpose computer?

These computers have an operating system that allows multiple applications to run simultaneously. Devices like servers, laptops, and smartphones are a few examples.

To know more about computer, check out:

https://brainly.com/question/21474169

#SPJ1

50 POINTSSS!!! Select the various storage management tools.

Disk Cleanup
Cleaning a desktop
Check Disk
Checking for errors
Disk Defragmenter
Cleaning a keyboard
Windows Update

THERE ARE MULTIPLE

Answers

Explanation:

cleaning a desktop

and cleaning a keyboard

Answer:

The answer above me is wrong and Cleaning a desktop and Cleaning a keyboard have nothing to do with storage management tools.

The correct answers are:

Disk Defragmenter

Check Disk

Checking for errors

Disk Cleanup

What does the revolver do?

sends the domain name and requests the IP address

sends the IP address and requests the content of the web page

sends the IP address and requests the domain name

sends the domain name and requests the content of the web page

Answers

Answer:

last one

Explanation:

Other Questions
if I were a boy, I __understand. a) can b) could c) could have In 1885, the Indian National Congress met for the first time. Who made up the membership of the INC? What does canvassing in sales mean? what extent has the development of the Green City reduced its carbonfootprint and how it influenced other development in thesurrounding area. She ___ her wallet in the internet caf, but I am not sure Unscramble the words Which two parallelograms have the same area Which of the variables collected for only three to five years old German Shepherds is most likely to be described by a Normal distribution?A. Breed B. Age C. Veterinary cost D. Weight E. Number of days housed Which of the following would BEST quickly show the differences between two detailed subjects?A clear heading and title?A Chronological organizer?A table listing key information?A long explanation of differences? PLEASE HELP ME! FAST 29) taste buds are clusters of individual a) vallate papillae. b) gustatory hairs. c) epithelial cells. d) olfactory receptor a 1.00 l flask is filled with 1.25 g of argon at 25 c. a sample of ethane vapor is added to the same flask at constant volume and temperature until the total pressure is 1.000 atm . Pls help, hurry! Why is it important to protect your privacy while conducting an online job search? List three ways you can protect your privacy. In the diagram, GDN - OHV. Find the value of x. What is the value of x? Enter your answer in the box. Select all of the ratios that are equivalent to 6:16. 2:8 3:8 1218 3080 18 to 48 Choose the item that best describes the following statement. When you want the very best, visit Charmed Jewelers. Our trained jewelry consultants will help you choose the finest precious gems for agift that will last a lifetime.OA) formal, exaggerationOB) informal, exaggerationOC) formal, bandwagonOD) informal, bandwagon your are planning a birthday Party at Chuck E Cheese for your little brother? your total budget for the party is $500There is a fee of $302 to hold your party there and a $15 fee for each guest How many guests,g ,can you invite to your little brother birthday party?(The answer come greater than or equal to) In the best case scenario, the Federal Reserve is most successful at counteracting a negative: a. AD shock b. SRAS shock Flag Question c. Real shock d. None of the answers is correct. PLEASE HELP 10 POINTS + BRAINLIEST!!!!!Which of the following is an example of an experimental procedure that can help you get accurate results in an experiment?I wonder if magnets attract all metal objects?I notice that the magnet attracted the paper clip and the nail but not the gold ring or the copper penny.I observe that magnets attract metal things.I must test all objects in the same way to get accurate results.