The first step in the information processing cycle ____.

A. outputs information
B. stores data and information
C. inputs data
D. processes data


Answer: C

Computer Science & Information Technology

You might also like to view...

Describe the methods used in each of the following protocols to prevent a replay attack:

a. Kerberos authentication b. SET c. Electronic cash

Computer Science & Information Technology

In a form, you can move to the next field by pressing the Enter or ________ keys

A) Ctrl + Tab B) Ctrl + Enter C) Tab D) PgDn

Computer Science & Information Technology

How can redundancy be provided in a switched network?

a. By deploying one central switch with a high port density b. By using high-speed fiber-optic media c. By providing multiple interconnections between a number of switches d. By delpoying gigabit switches only

Computer Science & Information Technology

Internet addresses are controlled by which one of the following protocols?

A. TCP B. IP C. UDP D. HTTP (Hypertext Transfer Protocol)

Computer Science & Information Technology