1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
Andrew [12]
3 years ago
6

Which computing component is similar to the human brain

Computers and Technology
2 answers:
oee [108]3 years ago
5 0
THE CPU ,THERE IS WERE ALL THE INFORMATION IS.
Sidana [21]3 years ago
3 0

Answer:

i dont understand, more context please

Explanation:

You might be interested in
Cryptanalysis is made more difficult by having shorter keywords.a) trueb) false
ruslelena [56]

Answer:

B. False.

Explanation:

Cryptanalysis can be defined as the study, art or process of evaluating and analyzing information systems such as ciphertext, cryptographic systems and ciphers. The main purpose of Cryptanalysis is for a better understanding of how the cryptographic system works, in order to find techniques for deciphering, defeating or weakening them without an access to any privileged or secret data (information) required to do so.

Hence, cryptanalysis is made more difficult by having longer keywords as opposed to having shorter keywords which typically would make it easier for an attacker to decipher.

In a nutshell, it is false and incorrect to say that cryptanalysis is made more difficult by having shorter keywords.

5 0
3 years ago
people illegally download music over the internet although it's free it it is still illegal what do you choose to do? why
kodGreya [7K]

Answer:

its A i just did that

Explanation:

4 0
3 years ago
An integer is said to be a perfect number if the sum of its divisors, including 1 (but not the number itself), is equal to the n
kirill115 [55]
True

explanation: bc it is
8 0
3 years ago
What is the decimal form of the following binary ip address? 11001101.00111001.10101001.01000010
jasenka [17]

The decimal form of the 11001101.00111001.10101001.01000010 binary ip address is 205.57.169.66.

An IP address is a binary number with 32 bits. The 32 bits are divided into four octets, which are groupings of 8 bits each. An IP address, however, is shown as a dotted decimal number (for example: 205.57. 32.9).

Memory regions are given binary addresses by the computer system. But in order to access a memory location, the system utilises a certain number of bits. We can address two memory regions with 1 bit. We can address 4 memory locations with 2 bits and 8 memory locations with 3 bits.

The 4 sets of 8 bits in each of the 4 directions are simply written down to create the 32-bit binary IP address.

Learn more about binary ip address:

brainly.com/question/14541891

#SPJ4

3 0
2 years ago
Which device stores data only temporarily, and only when the computer is running?
Artist 52 [7]
1. C) RAM

2. C) CPU

3. B) Accounts Payable

I believe these are the correct answers you are looking for.

8 0
4 years ago
Other questions:
  • What is the first stage of perception
    6·2 answers
  • Stacey wants to change her document to landscape view instead of portrait. Jesse wants to change the scale of his document. Whic
    5·1 answer
  • Using Word, Maureen is writing an outline of a presentation she plans to give to her company. She will be showing a video during
    12·2 answers
  • What specific database stores local user accounts on local computers, and allows users to sign in to and access resources only o
    9·1 answer
  • The fraction 460/7 is closest to which of the following whole numbers?
    11·1 answer
  • A common method of grouping security risks and security safeguards (controls) is to organize them into logical _________________
    12·1 answer
  • What is the purpose of exploring data?
    6·2 answers
  • MR. Tom asked her students could they plant a flower and bring it to class. Sarah brought his flower and said it was a rose. Jam
    6·1 answer
  • Which function in Ecels tells how many numeric entries are there​
    7·2 answers
  • Which shortcut keys can be used to duplicate a slide?
    15·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!