1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
Alex_Xolod [135]
2 years ago
11

Give two logics how a computer is better then man ​

Computers and Technology
1 answer:
Alex_Xolod [135]2 years ago
3 0

Answer:

Remember facts precisely without error or difficulty recalling.Perform repeated operations/actions without getting tired, bored, hungry or sleepy.Numeric calculations.Play certain games: AlphaGo Zero: Learning from scratch | DeepMindDo as they are told (though sometimes too precisely).

Explanation:

Hope it helps!!!

You might be interested in
PowerPoint displays many that are varied and appealing and give you an excellent start at designing a presentation. However, you
Jet001 [13]

Answer:

The answer is themes.

Power point displays many <u>themes</u>

Explanation:

A power point theme is a combination of effects,fonts and colors that can be applied to the presentation.It makes the presentation more attractive and beautiful if used properly and smartly.Power point has built in themes that gives excellent start to your presentation.

5 0
3 years ago
(BRAINLIEST QUESTION!!!)
docker41 [41]

Answer:

Possible if hackers are not so intelligent.

Explanation:

Actually, hackers are intelligent

where they will change location code in different places every second. So end-user who is trying to trace it he or she has to use their intelligence to find the exact location of hackers.

Normally hackers will generate different location places and by using decipher it is possible to find the location codes.

Since hackers used encrypted message we need to decrypts the message and find it out and understand the decrypt and encrypt technology used by hackers.

It is possible to by using decipher to get uncovered locations

4 0
3 years ago
8.5 question 2 edhesive
dangina [55]

Answer:

Please check the attachment.

Explanation:

Please check the attachment for the program in python.

Download txt
5 0
3 years ago
An interrupt priority scheme can be used to ____. allow the most urgent work to be finished first make it possible for high-prio
Nana76 [90]

Answer:

All of the above

Explanation:

An interrupt priority scheme is a system which decides the priority at which various work is done and it perform all of the above mention task so therefore all of the above is the right answer.

5 0
4 years ago
4.8 code practice question 2 edhesive
Vladimir [108]

Answer:

for y in range(88, 43, -4):

   print(y, end=" ")

Explanation:

yw

6 0
3 years ago
Other questions:
  • What would be some long- term goals.
    11·1 answer
  • I need an answer fast !!! (APEX)
    13·1 answer
  • A result of the Gibbons v. Ogden (1824) decision was that states​
    11·1 answer
  • Write a java program which uses methods for calculating the sum of any 5 non-zero integer digits that are input. The program mus
    8·1 answer
  • How can an administrator make only the files and folders to which a user has at least Read permissions visible?
    13·1 answer
  • Brake fluid should be checked __________.
    8·2 answers
  • Question 6 Which of the following statements about datasets used in Machine Learning is NOT true? 1 point Testing data is data t
    8·1 answer
  • What term is used to describe our connection with eachother through technology
    6·1 answer
  • What does it mean "Be Proactive"?
    10·2 answers
  • NAT addresses concerns over the dwindling IPv4 address space by ___________________. 1 point allowing networks to use fewer IP a
    15·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!