1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
Angelina_Jolie [31]
2 years ago
7

How do computers solve complex problems?

Computers and Technology
1 answer:
Lilit [14]2 years ago
8 0

Answer:

Computers solve complex problems by coding

Explanation:

I hope this helps

You might be interested in
TRUE/FALSE QUESTIONS: T F 1. An intruder can also be referred to as a hacker or cracker. T F 2. Activists are either individuals
Law Incorporation [45]

Answer:

1. True 2. False 3. True 4. True 5. True 6. False 7. True

Explanation:

1.  A hacker/cracker finds and exploits weakness in order to gain access with a criminal intent, just as an intruder.

2. Activists are people who campaign to bring about a positive political or social change.

3. It is illegal to use a device as a packet sniffer to steal people's usernames and passwords.

4. This quite true, as there is a huge community of hackers where people are highly recognized for hacking.

5. Yes, intruders have a common attack methodology.

6. IDS monitors networks or systems to identify suspicious activities while a user interface is the means the computer and the user interacts. So it's false.

7. instrusion detection involves monitoring networks or systems to identify suspicious activities, so an intruder is detected if their behavior is suspicious when compared to a legitimate user.

5 0
3 years ago
Which are examples of databases? Check all that apply.
Licemer1 [7]

Answer:

a set of stored information related to banking clients' transactions

Explanation:

7 0
2 years ago
Read 2 more answers
Mary needs to choose the menu in order to place the text in a desired fashion around the image.
mixas84 [53]
Full features



Option C


hope this one help
6 0
3 years ago
In the digital signature technique when the whole message is signed using an asymmetric key, the sender of the message uses ____
rodikova [14]

In the digital signature technique when the whole message is signed using an asymmetric key, the sender of the message uses his or her own private key to sign the message.

8 0
1 year ago
Computer programmer who invented the first compiler of a computer language
Dimas [21]

Grace Murray Hopper Invents the Computer Compiler, 1943. Computer technology took a huge leap forward when American and pioneer computer scientist Grace Murray Hopper invented the first compiler, which laid the ground work for automatic programming. The compiler translated written language into computer code.

8 0
3 years ago
Other questions:
  • Build three classes that conform to the following interfaces. Use arrays in creating your classes (e.g., do not use the built-in
    8·1 answer
  • I need someone who knows HTML to finish the code.
    12·2 answers
  • What doe the & operator do in python programming software
    9·1 answer
  • A __________ acts as separate network that rests outside the secure network perimeter so untrusted users can access web servers
    10·1 answer
  • How many of the colonists of Jamestown died before they made it to shore, due to the difficult voyage?
    15·1 answer
  • im past 1000 pts and it still hasnt up my rank from VIRTUOSO to EXPERT can someone explain and yes i have brainly plus
    7·2 answers
  • Write a function NumberOfPennies() that returns the total number of pennies given a number of dollars and (optionally) a number
    7·1 answer
  • List 10 examples of computer ethics<br>(please give even 1 if you can, I need it urgently) ​
    10·1 answer
  • NO SPAMMERS, ONLY FULL ANSWER
    8·2 answers
  • Which of the following data types can hold a fractional (decimal) number?
    7·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!