1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
marishachu [46]
3 years ago
11

20 points In what ways is the human brain like a computer? In what ways is it different?

Computers and Technology
2 answers:
mojhsa [17]3 years ago
8 0

Answer:

Alright imma explain below

Explanation:

It it’s similar because both give info. Also the reaction time on both are fast. They are different in some ways too. A computer runs on electricity but the brain doesn’t. A brain can actually think but a computer can not.

Hope this helps

FromTheMoon [43]3 years ago
7 0
Brain is like a computer for the reasons that it can run as fast as a computer but it may be slow at times but the difference is that a computer may know everything and when we know only simply things that we have been taught
You might be interested in
Which of the following terms best describes the security domain that relates to how data is classified and valued?
d1i1m1o1n [39]

Answer:

c) Access Control.

Explanation:

The term which describes the security domain best that relates to  how the data is valued and classified is Access Control.

Access Control :It is the restriction of access of a resource or a place that is selective.Permission to access a resource is called authorization.It is an important term in the field of information security and physical security.

7 0
3 years ago
Several coworkers in the sales department received an email claiming to be from you. Each message was personally addressed and c
LuckyWell [14K]

Answer:

The correct answer is A.

Explanation:

Vishing can be described as phishing but only using a mobile telephone, making the victim give up any personal information that could be used for identity theft etc.

Pharming is a process which redirects the traffic from a known and trusted website to another one where they perform the operation of stealing the personal information of the people.

The example given in the question falls into the category of "Spear Phishing" which is when the victim receive e-mails that look like they have been sent by a trusted and known individual. This way they are more likely to open the e-mail or click on the link in the e-mail and the phishing act has a higher chance of success.

I hope this answer helps.

6 0
3 years ago
What does the coding phase involve?
Harman [31]

Answer:

I do believe it is D im not sure

5 0
2 years ago
Read 2 more answers
The following code is intended to test whether the int variable num is less than 10, and if so print a warning and set it to 10.
hoa [83]

The only correction I see is you need to add curly braces to enclose the second and third lines.

6 0
3 years ago
You have decided to remove a recently installed feature which method can you use to remove this feature
Aliun [14]
If it is on the desktop screen you just right click on the icon and select delete. from there if you're on a windows computer it goes to your recycle bin then you right click the recycle bin and a little rectangle pops up an in that rectangle it says clear recycle bin and once you press that all of the stuff that was in there is deleted. now if your on a computer that has chrome os installed you just go to the files screen and right click what you want to delete and click delete and it's gone. 
6 0
3 years ago
Other questions:
  • How Java provides protection through stack inspection approach ?
    7·1 answer
  • This assignment is to read from an input file and process the data for a group of people. Your program calculates the interest a
    5·1 answer
  • How many valence electrons are present in the atom of the atomic number of 12?
    10·1 answer
  • You view a portion of a document on the screen through a ____.
    6·1 answer
  • What i have to care about transmitting data packet from one controller to other controller?
    8·1 answer
  • What was the ENIAC computer and how was it used/what for?
    9·1 answer
  • How can i become an expert in computer and technology?
    15·2 answers
  • Write any two rules for writing algorithm​
    10·1 answer
  • On the new iOS version, can you save photos from ‘review confirmed photos’? If so, how? Thanks!
    10·1 answer
  • An opening inside the system unit in which you can install additional equipment can be known as
    13·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!