1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
amid [387]
3 years ago
14

HURRY 50 POINTS A human is needed to create the algorithms that computers use. True False

Computers and Technology
2 answers:
uranmaximum [27]3 years ago
8 0

Answer:False

Explanation:Took the test before

maxonik [38]3 years ago
6 0
It’s false a human is not needed to create the algorithms that computers use
You might be interested in
Help on What i should say to my IT school lady? Read all three pages
avanturin [10]

Answer:

if you were to rest my would I still be able to have all my stuff that I have done if so I think you could reset it for me

hope this helps

have a good day :)

Explanation:

4 0
3 years ago
Why would we need to consider implementing our business blockchain application not on Bitcoin but Ethereum?
Cloud [144]
True or False
1. Phishing is the act of sending multiple emails to multiple users in hope of having
2. Spoofing is the act of obtaining unauthorized access to data from a computer
network.
3. Extortion is the act of using the internet to threaten or damage someone's
reputation to extort money or anything else of value.
4. In late 2014, LimeWire was raided for the second time due to years of pirating
movies, music, games, books and other software.
5. Electronic harassment is also referred to as cyberbullying.
6. Non-delivery of service is the act of devising a scheme wherein a culprit posts an
item or service for sale over the internet, and once the transactions have been done, does not
give the item or service.
7. Encryption is the process of converting raw to data code.
8. In piracy, trackers are used to identify IP addresses currently sharing a pirated
file.
9. Wager Gambling is the act of betting on any sports event over the internet.
10. Most email services today have spam or bulk folder that automatically puts
these suspicious emails to that folder.
3 0
3 years ago
Question # 7 Dropdown Select the correct word to complete the sentence. The original ARPANET had four nodes and connected groups
attashe74 [19]

Answer:

Facility

Explanation:

This is the answer because you can spell it out with Horizon.

4 0
3 years ago
Read 2 more answers
Question # 6
ziro4ka [17]

Answer:

Scope.

Explanation:

In programming, the scope could be static, private or public and in those, defines the scope of a specific variable.

Ex.

public int x = 0; // Can be seen when called within a whole class and outside of a class/ function.

private int y = 0; // Can be seen only within the class its defined in.

static pub/priv int z = 0; // Uncangeable variable that can be defined in both class and external class, depending on the two prior scopes defined after.

int aa = 0; // Defaults to private.

5 0
3 years ago
Read 2 more answers
What type of memory speeds up the action performed by the computer and anticipates instructions?
kherson [118]
A cache memory is a small piece of memory that can be accessed very fast. It keeps copies of data that is used often. For example, by keeping data read from a database in memory, the second time the data is needed, it can be taken from the cache in stead of a lengthy query in the database.

Caches can be found in hardware (ie., on the cpu itself), but also as a programming concept in software.
4 0
3 years ago
Other questions:
  • Which of the following types of copyright license is most appropriate if you write a novel and would like to post it online for
    11·1 answer
  • The tools that cyber criminals often use, including computer viruses, worms, trojan horses and spyware, are called __________. q
    5·1 answer
  • Jill uses Word to create an order form. She starts out by creating a table that has three columns and ten rows. She would like h
    11·1 answer
  • Which step is common to both creating a new document and saving a document?
    11·2 answers
  • Which broad area of data mining applications analyzes data, forming rules to distinguish between defined classes?
    13·1 answer
  • To insure QoS of a network, an alternative to “prioritizing traffic” is to __________, which means holding back traffic from non
    8·1 answer
  • What is the inflation rate if the price of a soda was $10 last year, but only $5 this year?
    5·1 answer
  • Problem # 1 [End of chapter problem] The following character encoding is used in a data link protocol: A: 01100111 B: 11110011 F
    14·1 answer
  • Mk chưa hiểu nên các bạn giúp mk vs
    14·1 answer
  • 3. When code tracing, why is it important to iteratively test parts of the program?
    8·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!