1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
Angelina_Jolie [31]
3 years ago
7

How do computers solve complex problems?

Computers and Technology
1 answer:
Lilit [14]3 years ago
8 0

Answer:

Computers solve complex problems by coding

Explanation:

I hope this helps

You might be interested in
What is the Load in a flashlight? Give two other examples of “Loads”. plz help me
Arlecino [84]

Answer:

Like a load of batteries

Explanation:

" I have a load of crayons", "I found a load of tires". Hope this helps

4 0
3 years ago
Which of the following describes the ways organisms are interconnected through their feeding patterns?
quester [9]
The answer is food web.
4 0
3 years ago
Read 2 more answers
A formula =A1+B2 is in cell D8. If you copy that formula to cell D9, what is the new formula in cell D9? A. '=A1+B2 B. '=A2+B3 C
Georgia [21]
It has to be B. Im sure of it.
6 0
3 years ago
Read 2 more answers
Redundancy can be implemented at a number of points throughout the security architecture, such as in ________. Group of answer c
vovikov84 [41]

Group of answer choices.

a. firewalls

b. access controls

c. proxy servers

d. All of the above

Answer:

d. All of the above

Explanation:

Cyber security can be defined as a preventive practice of protecting computers, software programs, electronic devices, networks, servers and data from potential theft, attack, damage, or unauthorized access by using a body of technology, frameworks, processes and network engineers.

Generally, redundancy to prevent unauthorized access can be implemented at a number of points throughout the security architecture, such as in firewalls, proxy servers and access controls.

A firewall is a network security protocol that monitors and controls inbound and outbound traffic based on set aside security rules.

Generally, a firewall is used to control access to a computer or network, as it creates a barrier between a computer or a network and the internet in order to protect against unauthorized access. It is a security system pre-installed on most computers to essentially inspect data being transmitted to or from a computer.

An access control can be defined as a security technique use for determining whether an individual has the minimum requirements or credentials to access or view resources on a computer by ensuring that they are who they claim to be.

Simply stated, access control is the process of verifying the identity of an individual or electronic device.

5 0
3 years ago
Users on your network report that they have received an email stating that the company has just launched a new website. The emai
e-lub [12.9K]

Answer:

Phishing

Explanation:

A phishing attack may be defined as a attack made on social platform that is used to steal the data, which includes the credit card details or credentials of individuals, etc. It is a fraudulent attempt to collect important information.

In the context, the employees receives an email asking them to click on the link and login using their credentials. It is a fraud email which no one in the company has sent. So this is a phishing attack.

7 0
3 years ago
Other questions:
  • based on the transcript, what did broadcasting the story through the medium of radio allow welles to do?
    8·1 answer
  • Rubbing two sticks together to make a fire is an example what
    11·2 answers
  • Peter has recently bought a media player and a digital camera he wants to buy a memory card and then use devices which memory do
    11·2 answers
  • You would like to know how many cells contain data. Which function should you use?
    11·1 answer
  • Assume that strikeCounter has already been declared to be a "pointer to int". Assume further that strikeCounter has been initial
    5·1 answer
  • What will you better be prepared for by learning about the animals you photograph
    11·1 answer
  • Users at UC need to be able to quickly create a Resource record from the Project record's Chatter feed How should the App Builde
    10·1 answer
  • A tech class question any help will be greatly apprieciated
    10·1 answer
  • How much would it cost to get the screen replaced on a Moto G7?
    10·1 answer
  • Northern Trail Outfitters uses a custom object Invoice to collect customer payment information from an external billing system.
    7·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!