Explain how computational manipulations of information require consideration of (1) representation, (2) storage, (3) security, and (4) transmission

Answers

Answer 1

Information manipulations carried out computationally entail a number of factors that should be carefully taken into account.

The significance of representation, storage, security, and transmission is explained as follows:

Information must be represented in a way that makes it possible to manipulate it computationally.Storage: To keep and access data during computational manipulations, proper storage techniques are needed. Information must be safeguarded against unauthorised access, modification, and disclosure. Transmission: It's critical that data can be accurately and securely transferred across various systems or gadgets.

Thus, these considerations i.e., representation, storage, security, and transmission ensure the efficiency of computational manipulations.

For more details regarding computational manipulations, visit:

https://brainly.com/question/14466178

#SPJ4


Related Questions

Write a paragraph suggesting at least five pieces of hardware that Maisy should consider purchasing. Make sure to justify why she needs each piece of equipment by describing what tasks they will perform. Also, explain how those different pieces of hardware will be installed.

Answers

Answer:

One piece of hardware Maisy should consider buying is the monitor for the visual display of the computer. She should also buy a mouse so she can select files so make her games.  Another important piece of hardware she definitely should buy is a keyboard so she can type certain codes if needed. Maisy should get a disk drive so she can store her progress of the games she's making and not loose any important data. Conclusively, she very well should buy a sound card so she can create and hear the audio of her games.

Explanation:

It worked for me, so hopefully it worked for u too.

A company that makes blue jeans uses attractive models and celebrity endorsements in its marketing campaign. The use of attractive models and celebrity endorsements most closely resembles which route to persuasion

Answers

Celebrity endorsements in the marketing campaign of a company that makes blue jeans is an example of the peripheral route to persuasion.

The peripheral route to persuasion involves the use of peripheral cues or peripheral factors to influence a person's attitudes or behaviors towards a product or service. These peripheral factors may include the use of attractive models, celebrity endorsements, or any other superficial or non-central aspects of a product or service.
In the case of the blue jeans company, the use of attractive models and celebrity endorsements may not be directly related to the quality or functionality of the jeans. Instead, these factors are being used to create an emotional appeal or association with the brand. The idea is to create a positive image or association in the minds of potential customers, which can influence their attitudes towards the product and ultimately lead to a purchase decision.
The peripheral route to persuasion can be effective in certain situations, such as when a person is not highly motivated to process or evaluate information about a product or service. However, it is important to note that relying solely on peripheral factors may not be enough to sustain long-term customer loyalty or satisfaction. Ultimately, the quality and value of the product or service should be the central focus of any marketing campaign.

Learn more about customer :

https://brainly.com/question/13472502

#SPJ11

Which Azure service delivers a comprehensive solution for collecting, analyzing, and acting on telemetry from your cloud and on-premises environments

Answers

The Azure service that delivers a comprehensive solution for collecting, analyzing, and acting on telemetry from your cloud and on-premises environments is Azure Monitor.

It provides a full stack monitoring solution for applications, infrastructure, and networking in the cloud and on-premises. It collects telemetry data from various sources, including Azure resources, third-party applications, and custom data sources, and allows you to analyze and visualize the data in near real-time.

With Azure Monitor, you can set up alerts and notifications based on custom metrics and logs, and integrate with other Azure services like Azure DevOps and Azure Logic Apps to automate remediation actions. It also supports integration with third-party tools like Grafana and Splunk for advanced analytics and visualization.

Learn more about Azure service here:

https://brainly.com/question/13144160

#SPJ11

When build errors occur, Visual Studio will display the errors in the ____ window. a. Task b. Output c. Error List d. Command

Answers

Answer:

C. Error List

Explanation:

This is a list that lists the issues in the software

What do Cc and Bcc stand for?
O Clear Copy and Binary Clear Copy
O Counter Claim and Best Counter Claim
O Crystal Clear and Binary Crystal Clear
O Carbon Copy and Blind Carbon Copy

Answers

Carbon copy and Blind carbon copy
Its Carbon Copy and Blind Carbon Copy.
Thank You!

Which if the following broad categories is not a type of analytic technique?a. manipulative analyticsb. descriptive analyticsc. predictive analyticsd. prescriptive analytics

Answers

Descriptive, Diagnostic, Predictive, and Prescriptive analytics are the four different categories.

Businesses rely on three different forms of analytics to help them make decisions: descriptive analytics, which explain what has actually occurred; predictive analytics, which show us what might happen; and prescriptive analytics, which explain what ought to occur going forward. Students use the mean, mode, median, and range to analyze the data and draw conclusions. Using both recent and old data, descriptive analytics seeks out patterns and connections. Because it only describes trends and associations without going any further, it is frequently referred to as the most basic type of data analysis.

Learn more about data here-

https://brainly.com/question/11941925

#SPJ4

What is phishing? Answer

Answers

Answer:

Phishing is a type of online scam where an attacker sends a fraudulent email purporting to be from reputable companies, designed to deceive a person into revealing sensitive and personal information (card numbers, passwords etc).

Hope this helps.

web design, pls help me i need this in 40 minutes ​

web design, pls help me i need this in 40 minutes

Answers

<input type="color">: This input type allows the user to select a colour using a colour picker. , This input type, "date," enables users to choose a date from a calendar.

Which seven different text structures are there?

A few examples of text structures are sequence/process, description, time order/chronology, proposition/support, compare/contrast, problem/solution, cause/effect, inductive/deductive, and research.

How should a date be formatted?

Here is a general rule to remember when writing dates with commas: in the month-day-year format (used in the United States), use commas after the day and year. Do not use any commas when using the day-month-year format, which is used in the UK and other nations. In 2007, on May 13, Daniel was born.

To know more about input type visit:-

https://brainly.com/question/14543408

#SPJ1

Check the peripherals that are needed to see images on your computer.

Check the peripherals that are needed to see images on your computer.

Answers

The answer is monitor.
Monitor and graphics card

your load balancer is configured with a tls certificate and contacts backend web application servers listening on tcp port 8081. users must be able to access the web application using standard tcp port numbers in their web browsers. which listening port should you configure on the load balancer?

Answers

To allow users to access the web application using standard TCP port numbers in their web browsers, you should configure the load balancer to listen on the standard HTTP port, which is port 80.

What dfoed this do?

This allows users to access the web application by simply entering the regular URL without specifying a port number (e.g., http://example.com). The load balancer will then forward the incoming requests to the backend web application servers listening on TCP port 8081.

By configuring the load balancer to listen on port 80, it enables users to access the web application seamlessly without explicitly specifying a port number in their browser's address bar. The load balancer acts as an intermediary, forwarding the requests to the backend servers on the appropriate port.

Read mroe on load balancer here https://brainly.com/question/27961988

#SPJ4

Katlyn needs to remove all tab characters from a document. She should locate the tab characters by doing which of the following?
a. Use Go To to locate the desired text.
b. Manually locate tab characters by scrolling through the document.
c. Use the Find and Replace dialogue box to locate the tab characters.

Answers

To remove all tab characters from a document, Katlyn needs to Use the Find and Replace dialogue box to locate the tab characters.

What is Find and Replace?

Find and replace is a function that help you to find a target text whether it's a particular words or formats in a document and can let you replace with any other words or formats.

How to use find and replace?

When the find and replace dialogue box is open, type any word you want to find in the find what field, and type any word you want as the replacement in the replace with field. Then, you can click on the replace or replace all button.

Learn more about find and replace here:

https://brainly.com/question/9646036

#SPJ4

Katlyn needs to remove all tab characters from a document. She should locate the tab characters by doing

Analysis is the built-in tool which automatically builds a recommended pivot table based on your dataset.
True or False

Answers

False. Analysis is not a built-in tool that automatically builds a recommended pivot table based on your dataset. While many spreadsheet software and data analysis tools provide features for creating pivot tables, the process typically involves manual steps and user input.

Pivot tables are powerful data analysis tools that allow users to summarize and analyze large datasets. They enable users to transform raw data into meaningful insights by aggregating, grouping, and summarizing data based on various criteria.

To create a pivot table, the user needs to define the fields from the dataset that will be used as rows, columns, and values in the table. The user also specifies the type of aggregation or calculation to be performed on the data, such as sum, average, count, or percentage.

While some software may offer automatic suggestions or recommendations for creating pivot tables based on the dataset, the process still requires user involvement and decision-making. The user needs to have an understanding of the data and the desired analysis objectives to effectively create a pivot table that provides meaningful insights.

In summary, analysis tools do not automatically build recommended pivot tables. The creation of pivot tables involves user input, selection of relevant fields, and defining the desired data aggregations and calculations.

Learn more about pivot tables here:

brainly.com/question/29786913

#SPJ11

Who are The Boys? EddieVR, YourNarrator, JoshDub, Mully, and last but most certainly not least, Juicy(FruitSnacks). Green gang or purple gang? who is your favourite? who is the funniest? who is a bottom? who is your least favourite? rank their individual channels. whos channel is dying?

Answers

Answer:

yes or no

Explanation:

Answer:

I love to watch Eddievr his videos are funny and he swears in spanish and speaks in spanish

Explanation:

Write a program in Java to input a letter. If it is an uppercase letter then

encode it by next 5th letter, otherwise encode it with 3rd previous letter in the

ASCII table.​

Answers

Answer:

The program is as follows:

import java.util.*;

public class Main{

public static void main(String[] args) {

 Scanner input = new Scanner(System.in);

 char chr;

 System.out.print("Input Character: ");

 chr = input.next().charAt(0);

 if(Character.isUpperCase(chr) == true){      chr+=5;  }

 else{      chr-=3;  }

 System.out.println("Encode Character: "+chr);

}

}

Explanation:

This declares the character

 char chr;

This prompts for input

 System.out.print("Input Character: ");

This gets the input from the user

 chr = input.next().charAt(0);

This checks for uppercase; if true, it is encoded by the next 5th

 if(Character.isUpperCase(chr) == true){      chr+=5;  }

If lowercase, it is encoded by the previous 3rd

 else{      chr-=3;  }

This prints the encoded character

 System.out.println("Encode Character: "+chr);

SOMEONE PLEASE HELP ME OUT !!!!!!

SOMEONE PLEASE HELP ME OUT !!!!!!

Answers

Answer:

not completly sure but i believe its the one that says inform the coach of where the goalies weak area...

Explanation:

As A NETWORK ADMINISTRATOR WHEN WOULD YOU ADVISE THE USE OF ANY OF THE THREE TYPE OF NATS AND WHY​

Answers

Answer:

Network Address Translation (NAT) is a process in which one or more local IP address is translated into one or more Global IP address and vice versa in order to provide Internet access to the local hosts. NAT generally operates on router or firewall.

Network address translation (NAT) working –

Generally, the border router is configured for NAT i.e the router which have one interface in local (inside) network and one interface in global (outside) network. When a packet traverse outside the local (inside) network, then NAT converts that local (private) IP address to a global (public) IP address. When a packet enters the local network, the global (public) IP address is converted to local (private) IP address.

If NAT run out of addresses, i.e., no address is left in the pool configured then the packets will be dropped and an Internet Control Message Protocol (ICMP) host unreachable packet to the destination is send.

you have an existing computer running windows 10. you want to configure a raid 1 array in the computer. you install two new sata drives, then use the raid controller integrated in the motherboard to define a raid 1 array using them. when you boot the computer, windows does not show the logical raid drive. what should you do?

Answers

Edit a Ttl data to say that SATA disks are used with an asic RAID controller, that the disc type is RAID. It instructs a computer to launch to board BIOS in order to see the attached drives. In case you wish to RAID-install the software.

When ought I to employ RAID?

RAID 0 is a good option if performance is crucial but information is unimportant and prone to loss (such as with cache). RAID 1 is a good option if you want to add more redundant information and/or read speeds on a budget. (This is a good starting point for those aiming for high uptime and improved backup performance.)

Why do you use the term RAID?

Totally useless Arrangement of Redundant Array of independent disks, or RAID, is an abbreviation. If used literally, it refers to storing data on a number of relatively inexpensive hard drive drives (HDDs).

To know more about RAID visit:

https://brainly.com/question/14669307

#SPJ4

Edit a TTL data to indicate that RAID discs are utilized with SATA disks and an asic RAID controller. The computer is told to start the board BIOS in order to view the associated drives. In case you want to install the program using RAID.

When should I use RAID?

If performance is vital but information seems unimportant as well as prone to loss, RAID 0 is a decent alternative (such as with cache). If you need to add additional redundant data or increase read speeds on a tight budget, RAID 1 is a smart choice. (Those seeking high uptime and enhanced backup performance should start here.)

What does the term RAID mean to you?

RAID is an acronym for Totally Useless Array of Redundant Array with Independent Disks. If taken literally, it refers to data storage on numerous, reasonably priced hard drive drives (HDDs).

To know more about RAID visit:

brainly.com/question/14669307

#SPJ4

how many bits and bytes are occupied by six long variables​

Answers

Answer:

24 bytes = 192 bits

Explanation:

A long is typically 4 bytes or 4*8 = 32 bits

However, on some 64 bit systems, a long is defined as 64 bits so the answer is not universal.

The CEO of CorpNet.xyz has hired your firm to obtain some passwords for their company. A senior IT network administrator, Oliver Lennon, is suspected of wrongdoing and suspects he is going to be fired from the company. The problem is that he changed many of the standard passwords known to only the top executives, and now he is the only one that knows them. Your company has completed the legal documents needed to protect you and the company. With the help of a CorpNet.xyz executive, you were allowed into the IT Admin's office after hours. You unplugged the keyboard from the back of the ITAdmin computer and placed a USB keylogger into the USB, then plugged the USB keyboard into the keylogger. After a week, the company executive lets you back into the IT Admin's office after hours again. In this lab, your task is to use the keylogger to recover the changed passwords as follows: Move the keyboard USB connector to a different USB port on ITAdmin. Remove the keylogger from ITAdmin. Move the consultant laptop from the Shelf to the Workspace. Plug the keylogger into the consultant laptop's USB drive. Use the SBK key combination to toggle the USB keylogger from keylogger mode to USB flash drive mode. Open the LOG.txt file and inspect the contents. Find the olennon account's password. Find the Administrator account's password. Answer the questions.

Answers

Answer:

The olennon account's password: See the attached file for this.

The Administrator account's password: 4Lm87Qde

Explanation:

Note: See the attached excel file for the olennon account's password as I was unable to save it here because I was instead getting the following message:

"Oh no! It seems that your answer contains swearwords. You can't add it!"

The olennon account's password and the Administrator account's password can be found as follows:

To see the rear of the computer, click Back from the menu bar above the computer.

Drag the USB Type A connector for the keyboard from the rear of the computer to another USB port on the machine.

Make sure the keyboard is plugged back in.

Expand System Cases on the shelf.

Add the Laptop to the Workspace by dragging it there.

To see the rear of the laptop, click Back from the menu above the laptop.

Drag the keylogger from the computer to the laptop's USB port.

Select Front from the menu above the laptop to see the front of the laptop.

Select Click to display Windows 10 on the laptop.

Toggle between keylogger and flash drive mode by pressing S + B + K.

To control what occurs with detachable drives, select Tap.

To view files, choose Open folder.

To open the file, double-click LOG.txt.

Select Answer Questions in the top right corner.

Respond to the questions.

Choose Score Lab as the option.

Therefore, we have:

The olennon account's password:

The Administrator account's password: 4Lm87Qde

Which type of keyword is "capital"?

an event

a title

an abbreviation

a vocabulary term

Answers

Answer:

a vocabulary term

Explanation:

Answer:(d) a vocabulary term

Explanation:

Growing up with dyslexia, Stephanie always struggled in English and Reading. Math was a breeze for her, though. Along the way, there were a few teachers who really worked closely with Stephanie to help her absorb the information she needed, and they showed her how to make learning fun! Stephanie particularly loved studying trigonometry and even her high school teacher is having difficulty keeping up with her. Now that she has been able to figure out how to study, education no longer scares Stephanie. In fact, she finds it a great way to explore and understand the world around her

Answers

Explanation:

A lot of people with dyslexia can relate to Stephanie.

Why will advertising continue to grow in social media?


It is highly cost-effective.

It reaches more people
than mass media.

It is extremely appealing to consumers.

It is more persuasive than other types of advertising.

Answers

Answer:

It is highly cost effective.

Explanation:

As the amount of people using social media grows by the minute, companies will start finding creative ways to advertise. There are a lot of young people on the internet. This group is especially interested in social media. This means that if companies invest in advertising on social media, they will gain in revenue.

convert the following decimal number to its equivalent binary ,octal,hexadecimal 1920​
pls in step by step
pls help me bro

Answers

Answer:

0b11110000000 is binary

0o3600 is in octal

0x780 in hexa dec.

Explanation:its a bit complitcated to explain sorry bro!

To format a picture to look like a sketch or a painting you can add a(an)
A. picture style
B. artistic effect
C. reflection effec
D. none of the above

Answers

Answer:

C(reflection effect)

Explanation:

reflection effect

Need help asapppppppppp

 Need help asapppppppppp

Answers

Answer:

artistic

Explanation:

because being it is considered a art

Answer:

daddy

Explanation:

n
Which of the following is not a goal of a persuasive speaking?
a. to motivate to action
b.
to change attitudes, beliefs, or values
to strengthen or weaken attitudes, beliefs, or values
d. to define, demonstrate, or instruct
C.

Answers

Answer: D. to define, demonstrate, or instruct.

Explanation:

Persuasive speaking is the form of speaking that we usually engage in. It is used to convince people. As individuals, we usually engage in persuasive speaking. We argue about different things and try to convince the other person to agree with us.

Th goals of persuasive speaking is to motivate to action, to change attitudes, beliefs, or values and to strengthen or weaken attitudes, beliefs, or values.

It should be noted that the goal of persuasive speaking isn't to to define, demonstrate, or instruct. Therefore, the correct option is D.

Answer:

Simple Answer: D

ow does this effect the ability of the forensic investigator to be able to collect the data for the case?

Answers

Forensic evidence is associated with higher confidence in guilty verdict

What are the most typical mistakes made when gathering evidence?

Not properly packing the evidence. Failure to keep a chain of custody. Not properly closing the box or marking the evidence. The place where the evidence was obtained was not documented. Failure to answer research questions, inability to validate results, skewed findings, lost resources, misleading recommendations and judgments, and injury to participants are all repercussions of improper data collection.

Making inadequate or indiscriminate analysis, as well as analysis to match the established legislation, are both unethical. Sometimes forensic experts publish the results without even opening the containers; a procedure known as ‘dry-labbing’. Forensic scientists’ findings and conclusions must be plain and unambiguous.

To learn more about evidence to refer;

https://brainly.com/question/14370298

#SPJ4

List and describe three possible alternative explanations for
the results in a pre-test/post-test design.

Answers

The pre-test/post-test design is a powerful and well-known experimental design, but it is not free from drawbacks. Let's list and describe three possible alternative explanations for the results in a pre-test/post-test design.1. History,2. Maturation,3. Regression. 

1. History: Events taking place outside of the research study could cause changes that mimic or overwhelm the impact of the independent variable. For instance, weather changes, unexpected events, a natural calamity, or significant political or social changes might occur that influence the dependent variable's results in ways that have nothing to do with the independent variable. 2. Maturation: Any natural growth, development, or ageing processes in participants during the study could produce changes in the dependent variable that have nothing to do with the independent variable. For instance, children's reading scores may naturally improve as they age, regardless of the study's reading interventions.3. Regression: The phenomenon that most researchers are concerned about, called regression to the mean, occurs when participants are selected because of their extreme scores and then retested after a time interval. Participants with unusually high or low scores will typically have less extreme scores on subsequent testing simply due to statistical regression. 

Three potential alternative explanations for the results in a pre-test/post-test design are history, maturation, and regression. As a result, a well-designed study should account for these variables in order to ensure that the independent variable is responsible for any observed changes in the dependent variable. Furthermore, researchers should ensure that their sample selection methods are sound and that the results they find are not the product of unusual selection criteria or sampling error. The fundamental goal of a pre-test/post-test design is to show that changes in the dependent variable are due to the independent variable and not to extraneous variables.

To know More about Regression visit:

brainly.com/question/32505018

#SPJ11

is it possible for two 4-bit numbers and a carry-in to result in a number too big to represent using 4 sum bits and a carry-out bit?

Answers

Yes, it it possible for two 4-bit numbers and a carry-in to result in a number too big to represent using 4 sum bits and a carry-out bit.

What is the binary adder about?

The Binary Adder is a popular and highly practical combinational logic circuit that can be built with just a few simple logic gates and has the ability to add up to four binary integers.

Two single bit binary values, A and B, can be "added" together using a simple binary adder circuit that can be created using common AND and Ex-OR gates. The maximum feasible number with 4 bits is binary 1111 or decimal 15. Although 4 bits in BCD can represent values up to 15, anything greater than 9 is illegitimate.

As a result, it is difficult to perform genuine decimal arithmetic, such as addition, as adding 1001 (9) to 0111 (7) results in an incorrect number. Managing that becomes challenging, etc.

Learn more about 4-bit numbers from

https://brainly.com/question/17643864
#SPJ1

A coworker is taking a computer overseas and asks you what concerns he should have. What do you tell him

Answers

Answer:

The components within the computer can get damage during travel, so he could improve the box protection with foam thingies

Explanation:

Other Questions
The Jamestown colony was able to profit from the production of which crop?A) WheatB) IndigoC) TobaccoD) Rice Find the inverse of the function f(x) = 5xThe inverse is g(x) = im confused plz help..? what did the books do to help montag in fahrenheit 451 good quote talking good about the books in fahrenheit Derek is designing a logo for a toy store. He wants to use a font that looks like handwritten letters. Which typeface should he use?.old styleOB.geometric sans-serifs.transitional and modernOD.humanist sansO E.slab serifs A hemispherical shell with an external diameter of 500 mm and a thickness of 20 mm is going to be made by casting, located entirely in the upper part of the corresponding mold, with the maximum circle on the partition surface. If the density of the molten metal is 7.2 g / cm3 and the height of the pouring cavity above the partition surface is 300 mm, determine the metallostatic thrust that will be exerted on the upper mold at the end of casting. Cual es la relacion entre part B complete the chart to compare and contrast the need for security with the sacrifice of individual rights. Underwriters have been taking indications of interest for shares of an upcoming new issue. Indications of interest are i grow 2 cupcakes every 8 hours for 24 hourshow many cupcakes grow? in deciding whether to study for an economics test or go to a movie, one is confronted by the idea(s) of question 5 data analysts use archiving to separate current from past work. what does this process involve? Find the distance between the pair of points given on the graph ninjago or bionacles which of the following is not involved in the replenishment of the petty cash fund? multiple choice management will withdraw cash from the bank and place it in the petty cash fund. weekly payroll checks will be recorded. transactions related to vouchers will be recorded. management will verify that the total of all vouchers equals the amount of cash missing from the petty cash fund. The area of a triangular church window is 90 square meters. The base of the window is 15 meters. What is the windows height? Faster communication and synchronization are two advantages of____a) chemical synapsesb) electrical synapsesc) ligand-gated channelsd) voltage-gated channelse) mechanically-gated channels Rats are endothermic (warm blooded) animals. Explain why the physiology of a perch (an exothermic or cold blooded animal) would not support the metabolic needs of a rat. What kind of tax system does the United States use? Graded AssignmentUnit Assessment: In Western Europe, Part 21. Write a short paragraph, no less than four sentences, about the problems faced by western Europe following the fall of the Roman Empire. Be sure to include at least two direct problems and how they negatively impacted Europe. (Unit 12 Lesson 1)Type your answer here. 2. Briefly answer the following questions about the Magna Carta.(a) Describe the main reasons the Magna Carta was written.Type your answer here.(b) What were the key arguments of the Magna Carta?Type your answer here.(c) What was the Magna Carta's effect on future political thought?Type your answer here.help plzzzzzz its due today plzzzz no guessing