1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
max2010maxim [7]
4 years ago
14

How can we compare a computer with human beings?

Computers and Technology
1 answer:
LenaWriter [7]4 years ago
8 0

Answer:

Our brain as a central information processor vs. computer having a central processing unit

Our brain takes sensory input → processing/ sense making → in order to produce behavior as output. Computers work similarly: information input → processing → output task

Computers requires both hardware and software to function. Our body is essentially hardware, what we learn from formal education and informal life experiences are software.

Explanation:

You might be interested in
Sara is a college student studying accounting. She uses a laptop daily for personal and course work. What data might Sara have o
polet [3.4K]

Answer:

Sara: Personal data

Jorge : Personal data + official data.

Wanda: Personal data + students data

Carl: Personal data + official data

Explanation:

Personal data could contain pictures, social security numbers, banking transactions details, passwords, credit card information etc.

Jorge's official data could contain information about various sources that he gets his news from. It could contain password information about his official email. And he connects to the office network, he might pose a threat to the entire network if his PC is infected.

Wanda could leak the student's information. She could also leak her social security numbers, bank details, organization's details etc.

Carl could leak company's information. He can avoid it by staying away from public networks. Installing anti-virus. He should also take great care while accessing various sites and never download harmful files over the internet.

8 0
3 years ago
Which of the following refers to the bottom pane of the Wireshark window where all of the information in the packet is displayed
Lorico [155]

Answer:

D) Hex Pane.

Explanation:

Hex Pane  is the bottom pane where whole information in the packet is shown in hexadecimal format on the left and also in character when possible and decimal also.It is the bottom pane of Wireshark window.

So we can say that Hex pane is referred to the bottom pane of the Wireshark window which displays the information in hexadecimal on the left .

5 0
3 years ago
A(n) _____ causes a value to be sent from a called method back to the calling method.
Amanda [17]
<span>A return statement causes a value to be sent from a called method back to the calling method.
</span>When used in computer programming the return statement causes execution to leave the current subroutine and resume at the return address, where the term return address denotes the point <span>in the code immediately after where the subroutine was called.</span>
3 0
3 years ago
Universal containers regularly imports Accounts from an external order system that has its own ID field for each record.What sho
Vikki [24]

Answer:

B. Create a unique External ID field on Accounts in SFDC for matching.                                      

Explanation:

  • External ID is used to prevent duplicate records from being created as a consequence of the import operation, when importing custom objects or person accounts.
  • An external ID is a specific field that contains the External ID attribute.
  • External ID has unique record identifiers from a system that is outside the Salesforce.
  • When this option is selected Data Import Wizard identifies existing Salesforce records with external IDs that match the values in import file.
  • The External ID field enables to keep unique record IDs from an external system, usually for integration.
  • External ID field values should be unique and determine whether or not value are case sensitive can also be determined. For example XYZ and xyz will not be considered same if case sensitive option is not selected.

6 0
3 years ago
How many bits does it take to represent the values from 0 to 255?
valentina_108 [34]
2^8 = 256 hence use 8 bits
5 0
3 years ago
Other questions:
  • Which tasks can a user accomplish by using the Find and Replace feature of Word? Check all that apply.
    11·1 answer
  • HURRYYY A friend of yours has E-mailed their English paper to you so that you can proofread it. Explain the tools you would use
    15·1 answer
  • How do you transfer music from external hard drive to a laptop?
    13·1 answer
  • 1.) How do parks and other green spaces benefit a community?
    7·2 answers
  • Which of the following types of access controls do not describe a lock? (a)- Directive (b)- Physical (c)- Preventative (d)- Dete
    8·1 answer
  • What are scape codes and the effectes on out put
    6·1 answer
  • What is computer ? What is computer program? What is hard disk.
    12·2 answers
  • A communication medium that carries a large amount of data at a fast speed is called
    6·1 answer
  • On an XBOX 360, what does it mean if you get 4 red rings on your console?
    5·1 answer
  • Out put of Print (3**2*2)
    13·2 answers
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!