Manipulating data is known as ________

Fill in the blank(s) with correct word


processing

Computer Science & Information Technology

You might also like to view...

How can you use NIS to mirror the functionality of a private DNS server for a small network? Why should NIS not be used this way on a large network?

What will be an ideal response?

Computer Science & Information Technology

Computers with low-bandwidth connections are more susceptible to hackers

Indicate whether the statement is true or false

Computer Science & Information Technology

The ____tool is used to draw complex shapes from a variety of choices.

a. Pen b. Deco c. PolyStar d. Pencil

Computer Science & Information Technology

Authorization is granting permission for admittance.

Answer the following statement true (T) or false (F)

Computer Science & Information Technology