The three basic functions of a computer are input, ____________, and output.

Fill in the blank(s) with the appropriate word(s).


processing

Computer Science & Information Technology

You might also like to view...

Which of the following are correct? Why are the others incorrect?

When a function having an array formal parameter is called, the formal array parameter … a) names a copy of the array argument. b) refers to exactly the same array as the calling program c) is passed the address of the argument, and the function needs further information about the array size to safely use an array parameter d) refers to the array using a name that is always different from the calling program's argument.

Computer Science & Information Technology

Embedded macros can be used to validate the data in a field or a record

Indicate whether the statement is true or false

Computer Science & Information Technology

Your data center features a retina scanner for added security. What type of area is this?

A) OSHA B) Biometric C) SLA D) HVAC

Computer Science & Information Technology

The ________is the high-level information security policy that sets the strategic direction, scope, and tone for all of an organization's security efforts.

A. SysSP B. EISP C. GSP D. ISSP

Computer Science & Information Technology