1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
taurus [48]
3 years ago
10

Why computer process faster than humans?​

Computers and Technology
2 answers:
Molodets [167]3 years ago
7 0

Answer

Explanation:

Because the ability of the human brain is so limited. The ability of a computer processor is crazy good and fast.

Pavlova-9 [17]3 years ago
5 0
Because the human brain can only do so much and work so fast. But a computer has all that information in a database or system and can access way faster
You might be interested in
What's the answer to this​
yarga [219]

Answer:

S

Explanation:

The index operator will address individual characters in the string.

5 0
3 years ago
An important principle in information security is the concept of layers of security, which is often referred to as layered secur
Eva8 [605]

Answer:

Available options in question are

  1. a firewall :  
  2. a server
  3. an application
  4. control standard

Answer is : Control Standard. It is not an example of layer of security.

Explanation:

Defense in depth consists of three major domains like physical, technical and administrative. Layered Security will consists of best practices by combining multiple  security methods to mitigate vulnerabilities and attack vectors. It is used to protect resources at different levels.  

  • A firewall is used as layered security measure to secure networks and systems.It is most commonly used security measure for enterprise products.
  • A server is typical example of physical control. In this  it protects actual IT servers, high-end servers, cloud servers and any physical hardware and assets.  
  • An Application can be used an example of Layer security. Applications like Antiviruses, Vulnerability Scanners, Anti Malware software and Web Application firewall gateways are typical examples

Control Standard is not an example of Layered Security.

5 0
3 years ago
Given the following table of students, assignments, and grades for a single class:
PilotLPTM [1.2K]

Answer:

i need more

Explanation:

i need more

7 0
3 years ago
Which type of chart is most useful when a user is trying to visually represent sets of data as parts of a whole, such as product
nataly862011 [7]

Pie chart, I’m fairly sure the rest aren’t real

5 0
3 years ago
Read 2 more answers
What would you enter at the command prompt to start a new bourne again shell session?
butalik [34]

The answer is bash . The bash command opens a Bourne-again sheel (bash) session. It is the standard shell used in most Linux computers and it uses commands similar to a UNIX shell. Bash includes features such as:

1) Command completion when pressing the tab key.

2) Command history.

3) Improved arithmetic functions.

6 0
3 years ago
Other questions:
  • Part 3a. Largest power of two less than (10 pts) Implement the method public static int largestPow2LessThan(int n) which calcula
    5·1 answer
  • _______ data would be useful for creating a report containing last year's revenue, which won't be changing.      A. Integrated B
    12·1 answer
  • Which of the following works on the pay-per-click (PPC) and cost-per-click (CPC) concept? ~ Plato
    9·1 answer
  • YOU WANT TO DISCARD YOUR OLD COMPUTER AND WANT TO SECURELY ERASE THE DATA FROM YOUR HARD DRIVE. WHAT SOFTWARE CAN YOU USE AND WH
    9·2 answers
  • Which of the following is an example of joint problem solving?
    12·1 answer
  • Describe two types of storage devices?​
    15·1 answer
  • This is Very very Important to me[BRAINLIEST)✅​
    5·1 answer
  • 54 points!!! Cyber security
    14·1 answer
  • Help plz, u just gotta select all that apply :)
    15·1 answer
  • Sam’s password is known to be formed of 3 decimal digits (0-9) in a given order. Karren and Larry are attempting to determine Sa
    9·2 answers
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!