1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
Zina [86]
3 years ago
7

Why will computers always fail to represent real-world information exactly?

Computers and Technology
2 answers:
raketka [301]3 years ago
8 0
The real world contains both discrete and continuous features. Computers are only able to handle discrete data which means any continuous data needs to be approximated and will not be exact.
maks197457 [2]3 years ago
7 0
They aren't creative and don't respond like a human
You might be interested in
Marco travels often and does not have consistent wireless Internet service. He frequently uses his mobile phone service to provi
bulgar [2K]

Answer:

PAN

Explanation:

6 0
3 years ago
Read 2 more answers
Give examples of applications that access files by each of the following methods:
KengaRu [80]

Answer:

Explanation:

Usually, applications would have the capability of using either one of these options. But for the sake of the question here are some that usually prefer one method over the other.

Any program that targets an API usually uses Sequential access. This is because API's contain all of the data as objects. Therefore, you need to access that object and sequentially navigate that object to the desired information in order to access the data required.

A music application would have access to an entire folder of music. If the user chooses to set the application to randomly play music from that folder, then the application will use a Random Access method to randomly choose the music file to load every time that a song finishes.

4 0
3 years ago
Analyze each of the situations below. Which of the following BEST Illustrates someone who shows appropriate information literacy
maw [93]

The best illustration of information literacy is A. Felix completes an Internet search for a topic for his science class. He takes nearly 30 minutes reading through the different results until he locates a reliable website.

<h3>What is information literacy?</h3>
  • Refers to being able to find and sort through information.
  • Allows for problem solving.

Felix has the problem of looking for information for his topic. He therefore goes online to find, sort through, and then use the information he finds to solve his problem.

In conclusion, the best answer in option A.

Find out more on information literacy at brainly.com/question/25039489.

4 0
2 years ago
Read 2 more answers
In the ____________________ technique, the virus is divided into several parts and the parts are placed at random positions thro
shusha [124]

Answer:

Split Infection

Explanation:

In the split infection technique, each time the file is opened either by the user or the system operating system, the virus copy itself into another file on the same system and unload malicious payloads to perform some actions. While this is ongoing, the virus erase file from the user hard drive and might even go as formatting the hard disk drive.

It should be noted that the virus cannot transfer itself from one computer to another

5 0
4 years ago
Your manager has tasked you with implementing security controls to mitigate IP spoofing attacks against your network. IP spoofin
Ipatiy [6.2K]

Answer:

You can setup firewall rules with for example iptables on Linux. The rules should block source addresses of private IP ranges such as 192.168.*.* and 10.*. *. * etc. Check private IP ranges for full list.

It will however not guarantee prevention of IP spoofing in general as its not possible to prevent such attacks. Its the responsibility of ISPs. But the question asked for private IP spoofing and then the above works.

4 0
3 years ago
Other questions:
  • Search engines enable you to
    11·2 answers
  • Find the maximum value and minimum value in below mention code. Assign the maximum value to maxMiles, and the minimum value to m
    11·1 answer
  • What is Moore’s law
    11·1 answer
  • Pop3 allows users to fetch and download e-mails from a remote mailbox. does this mean that the internal format of the mailboxes
    14·1 answer
  • What should be included in research for a problem statement? Select all that apply
    13·2 answers
  • WILL GIVE BRAINLIEST
    5·2 answers
  • Choose the answer that best completes the statement.
    7·2 answers
  • The ______ view connects perceptual capabilities to information available in the world of the perceiver. Multiple choice questio
    12·1 answer
  • When network traffic is encrypted, it is invisible and its content and purpose are masked.
    12·1 answer
  • Verizon's implementation of a web-based digital dashboard to provide managers with real-time information such as customer compla
    6·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!