1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
MrRa [10]
2 years ago
14

What type of thinking work does the computer need to do to solve the problem?

Computers and Technology
1 answer:
poizon [28]2 years ago
3 0

Answer:

<h3>Computational Thinking is the thought processes involved in formulating a problem and expressing its solution in a way that a computer—human or machine—can effectively carry out.</h3>

Pa brainliest po

You might be interested in
What special identity group is typically used when a user accesses an FTP server that doesn't require user account logon?
Rainbow [258]

Answer:

The correct answer to the following question will be "​Anonymous logon".

Explanation:

  • Windows would never let anyone sign in interactively with an anonymous logon to the device, a person who has linked to the device without a login and password being given.
  • So they won't have to verify to an account of the user just whether you are running any shares.r document, let everyone log into the machine collaboratively with such a logon.

Therefore, Anonymous logon is the right answer.

4 0
3 years ago
after a few weeks of using facial recognition login, your infrared camera fails, and you are asked to enter your pin. because it
riadik2000 [5.3K]

The reason that you have not been locked out after several failed PIN login attempts is that your laptop does not have a TPM chip, and you have not set up BitLocker for lockout.

Technology known as Trusted Platform Module (TPM) is made to offer hardware-based, security-related functionality. Designed to perform cryptographic operations, a TPM chip is a safe crypto-processor. Malicious software cannot interfere with the TPM's security capabilities, and the chip has numerous physical security features to prevent tampering. Utilizing TPM technology has a number of major benefits, including the following:

  • Cryptographic keys should be created, stored, and used sparingly.
  • Utilize the burnt-in RSA key of the TPM to authenticate platform devices using TPM technology.
  • By recording security metrics, you can assist in ensuring platform integrity.

To learn more about TPM click here:

brainly.com/question/10742732

#SPJ4

7 0
1 year ago
Question #5
Anestetic [448]

Answer:

d;  attribute

Explanation:

8 0
3 years ago
Read 2 more answers
Which code results in a ValueError?<br><br> int('seven')<br> float(2.5)<br> int(7)<br> 8 / 0
SOVA2 [1]

Answer:

Int(‘seven’)

Explanation:

Took one edg

6 0
3 years ago
Read 2 more answers
. What are the differences between a centralized and distributed database architecture
Digiron [165]

Answer:

The difference between the centralized and the distributed database architecture are as follows:

  • The centralized database is the type of database which works on the single file in the database. Whereas, the distributed database works with the multiple files in the database.  
  • The centralized database refers to the proper planning and the helps in the decision making in the management system. Whereas, in the distributed database system the data are mainly distributed in the multiple files and the user can easily access the near by file in the database system.
  • In the centralized database, if the database are get fail then the overall system come to halt. On the other hand in the distributed system, if the component get failed then the performance of the system are get reduced.

6 0
3 years ago
Other questions:
  • I have a problem with importing excel file into Access. I have some table in Excel and I want to import it into Access. When I d
    6·2 answers
  • The steps for creating a newsletter are to ____.
    10·1 answer
  • Jackson is teaching a class the concept of the binary number system. Which term will he use to refer to the leftmost bit of a bi
    7·1 answer
  • At the frequency of 2.4 GHz what is the free-space path loss in dB.
    9·1 answer
  • Which of the following changes would be LEAST LIKELY lead to economic growth in a country?
    12·1 answer
  • What is the unit used to describe the intensity of sound?
    5·1 answer
  • Being able to express your thoughts in an email is a primary technology skill. true or false.
    9·2 answers
  • Difference between switch and switch lite
    10·1 answer
  • Please help me with coding!
    7·2 answers
  • How bridges are built over water
    14·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!