________ is any data or instructions that are used by a computer.

A. Digital
B. Information
C. Output
D. Input


Answer: D

Computer Science & Information Technology

You might also like to view...

Microsoft Office 365 subscription plans offer all the same applications that are available in the Microsoft Office Professional 2013 suite in addition to multiple communication and collaboration tools.           

Answer the following statement true (T) or false (F)

Computer Science & Information Technology

Why was CSMA/CD not used for wireless systems?

What will be an ideal response?

Computer Science & Information Technology

What will become the source of information for many different systems?

A) Asset tracking software B) Tier 1 systems C) Disaster recovery document D) All of the above

Computer Science & Information Technology

The first line of defense against illicit use of, or threats to, computer resources and sensitive information is a strong authentication and __________ process.

A. authorization B. encryption C. access D. interference

Computer Science & Information Technology