1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
MrRa [10]
3 years ago
14

What type of thinking work does the computer need to do to solve the problem?

Computers and Technology
1 answer:
poizon [28]3 years ago
3 0

Answer:

<h3>Computational Thinking is the thought processes involved in formulating a problem and expressing its solution in a way that a computer—human or machine—can effectively carry out.</h3>

Pa brainliest po

You might be interested in
Care sunt avantajele fișierelor de tip ".pdf" ?
Alex787 [66]

Answer:

english i speak .

Explanation:

7 0
3 years ago
Read 2 more answers
In cybersecurity, a threat actor is an individual or an entity responsible for cyber incidents against the technical equipment o
Neporo4naja [7]

Script kiddie use automated attack software created by other hackers for access while gray hat hackers create their own attack software to show vulnerabilities.

<h3>The types of threat actors.</h3>

In cybersecurity, there are different types of threat actors and these include the following:

  • Script kiddie
  • Gray hat hacker
  • Hacktivists

One of the ways to differentiate an attack orchestrated by a script kiddie from that of a gray hat hacker is that script kiddie use automated attack software created by other hackers for access while gray hat hackers create their own attack software to show vulnerabilities.

Read more on cybersecurity here: brainly.com/question/14286078

#SPJ1

4 0
2 years ago
Sample answers of What assets were targeted Stuxnet and the team behind the worm?
Damm [24]
The assets were programmable logic controllers (PLCs).  Which controlled systems like prison doors and centrifuges for separating nuclear material. 

The "who" is still debated.  Credit (if you use that word) is given to the Equation Group.  But that is still hotly debated as there seems to be a political agenda with the attack and many still believe this was nation-state sponsored.  I can be easy to leave digital fingerprints behind to make it seem like a known hacking team.
8 0
4 years ago
In general, a presentation to kindergarteners should be less abstract than a presentation to corporate executives
Salsk061 [2.6K]
Make the presentation goofy so they will be more into it . your welcome
4 0
3 years ago
Read 2 more answers
On Windows 7 or 8 How are the windows help and support options different when you press F1 when the desktop is active as opposed
Dominik [7]
It opens a different article depending on what program you on, to accommodate that program.
6 0
3 years ago
Other questions:
  • Should i buy the Samsung s10+ or wait for s11 or any other phones you guys suggest?
    6·2 answers
  • SecOps focuses on integrating the need for the development team to provide iterative and rapid improvements to system functional
    11·1 answer
  • Pick the two statements about packets and routing on the Internet which are true. a. Packets travelling across the Internet take
    13·1 answer
  • 1. cybersquatting refers to the tampering of existing web sites and selling unrelated products (true or false)
    8·1 answer
  • What is the root of the tree?
    6·1 answer
  • (Solved—15 Lines) In many jurisdictions a small deposit is added to drink containers to encourage people to recycle them. In one
    5·1 answer
  • What is the output of the AWK program?
    11·1 answer
  • This type of connector is the most common for connecting peripherals (printers, monitors, storage devices, etc.) to a windows co
    10·1 answer
  • Need the answer for this code hs will give brainly
    7·1 answer
  • Code a program that gets all possible solutions of a string using 3 for loops. Actual question attached
    11·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!