Why might a computer calculate a long list of numbers better than a human?

A. Computers can replicate human tasks.
B. Computers can think creatively.
C. Computers must rest every few hours.
D. Computers calculate numbers very quickly.

Answers

Answer 1

Answer: Computers calculate numbers very quickly.

Explanation:

While most of the possible options are accurate, D appears to be your best option. Computers can calculate long, sophisticated numbers in a few seconds while it will (usually) take humans longer.


Related Questions

________ is a location service that allows applications to know when a user has crossed a specific location and then triggers an automated action.

Answers

The location service that allows applications to know when a user has crossed a specific location to trigger an automated action is; Geofencing

What is geofencing?

Geofencing is a location-based service whereby an app or software uses GPS, RFID, Wi-Fi or even cellular data to trigger an already programmed action when a mobile device enters or exits a virtual boundary that is set up around a geographical location called a geofence.

Thus, the answer to the question would be geofencing as it tallies with the definition given above,

Read more about programs at; https://brainly.com/question/16397886

If a new car was priced at $23,000 and the m1 in the economy fell, which of the following would occur?

A. More new cars would be produced for the demand.
B. The price of a new car in the economy would fall.
C. The car market woulld collapse.
D. The price would not be impacted by less M1.​

Answers

Answer:

B. The price of a new car in the economy would fall.

Explanation:

One way to check if a website is secure is to look for a/an
in the address bar.

Answers

Answer:

One such sign to look for is in the URL of the website. A secure website's URL should begin with “https” rather than “http”. The “s” at the end of “http” stands for secure and is using an SSL (Secure Sockets Layer) connection. Your information will be encrypted before being sent to a server.

T - True. One way to check if a website is secure is to look for a padlock icon in the address bar.

How does this work?

This padlock indicates that the website is using a secure HTTPS connection. HTTPS encrypts the data transmitted between the user's browser and the website, ensuring that sensitive information such as login credentials or financial details remains private and protected from unauthorized access.

Additionally, a secure website's address will start with "https://" instead of "http://". Users should always verify these security indicators before entering any personal or sensitive information on a website to safeguard their online privacy and security.

Read more about websites here:

https://brainly.com/question/28431103

#SPJ2

The unit has you writing a script that ends each level when a sprite gets to the right edge of the screen. Propose another “level completed” solution where the levels ends when the player hits a certain part of the screen WITHOUT relying on coordinates. Describe your solution, including the code blocks you would use instead of coordinates.

Answers

Answer:

I  would make a system to go to the next level of the game without using coordinates by creating a finish line for each level that is a color like green or red. When the player’s sprite hits the finish line, it will activate a part of the code which will make the next level appear. To do this I will use an if statement. If the sprite is touching green, it will move to the next backdrop. This will create a way to go to the next level without using coordinates.

Explanation:

This is what i put as the answer, hope it helps! Dont forget to change it a little bit so you dont get flagged and stuff.

O B. the bulk of a person's income.
a
C. a person's excess income.
Those taking illegal drugs, or using a prescription drug without a medical need, are likely ...
A. to be making a calci

Answers

im confused by the formatting of this- maybe type it again ;-;

Consider the following code segment. What is the value of result after the code segment is executed? (WILL GIVE BRAINLIEST IF CORRECT)

A) 6
B) 10
C) 15
D) 21

Answers

Answer:

I think its B or C

Explanation:

After the code segment is executed, the value 6 is returned. As a result, option A is correct.

What is a code segment?

A text segment is one of the sections of a programme in an object file or memory that contains executable instructions. It is also known as text or a section of code.

It stores static constants rather than variables, in contrast to the code segment, also known as the text segment, which is read-only on many architectures.

Exons are coding segments, while introns are non-coding segments. The BSS section, on the other hand, contains uninitialized constants and variables.

Demographic, psychographic, geographic, and behavioural segmentation are examples of the four types of segmentation.

These are typical examples of how businesses can segment their markets based on factors such as gender, age, and lifestyle.

Thus, the correct option is A.

For more details regarding code segment, visit:

https://brainly.com/question/20063766

#SPJ3

User inserts 10 numbers. Write a program that will show if there are more positive or negative numbers among the entered numbers.

Answers

Here is a basic program that I wrote.  This will check how many positive/negative numbers are in the table and then prints the amount..

Using Python

# list of numbers

list1 = [10, -21, 4, -45, 66, -93, 1]

 

pos_count, neg_count = 0, 0

 

# iterating each number in list

for num in list1:

     

   # checking condition

   if num >= 0:

       pos_count += 1

 

   else:

       neg_count += 1

         

print("Positive numbers: ", pos_count)

print("Negative numbers: ", neg_count)

list 3 compounds of a computer.
list the 4 compounds of a computer system.
The central component system houses, the processer, memory and what else?
What are the 2 types of memory on a computer?
What does RAM stand for?
Name the other type of storage besides a floppy disk.
Name 3 output devices.
What are 2 examples of common software applications?
Name 2 symptoms of bugs in my computer
Name as many do's and don'ts of computer use. (more than 2)

Answers

Answer:

look up this question on here it comes up but do it one-by-one

Explanation:

Three compounds of a computer: Silicon chips, Printed circuit boards, and Plastics and metals.

What is central component system?

A computer's central component system typically refers to the central processing unit (CPU), motherboard, and memory (RAM).

A computer system is made up of four components:

Hardware Software Data User

The processor, memory, and motherboard are all housed in the central component system.

On a computer, there are two types of memory:

RAM stands for Random Access Memory (RAM)Memory That Can Only Be Read (ROM)

Other types of storage besides a floppy disk include hard disk drives, solid-state drives, and optical disks.

Three output devices are:

MonitorPrinterSpeakers

Two examples of common software applications are:

Microsoft Office Suite (Word, Excel, PowerPoint)Adobe Creative Suite (Photoshop, Illustrator, InDesign)

Two symptoms of bugs in a computer are:

Slow performanceUnexpected shutdowns or freezes

Do's of computer use:

Regularly back up important files.Install antivirus and security software.Keep software up to date.

Don'ts of computer use:

Don't download or open suspicious files or emails.Don't use weak passwords.Don't share personal information online.

Thus, this can be concluded regarding the given scenario.

For more details regarding CPU, visit:

https://brainly.com/question/16254036

#SPJ7

Which denial of service (DoS) attack generates a large number of ICMP echo requests from a single request, acting like an amplifier and causing a traffic jam in the target network

Answers

The denial of service (DoS) attack that generates a large number of ICMP echo requests from a single request, acting like an amplifier is a  fraggle attack.

What does a Fraggle attack function as?

A Fraggle Attack is known to be a type of a denial-of-service (DoS) attack that entails the sending of a huge amount of spoofed UDP traffic to a given  broadcast address of a router that is often seen in a given network.

Note that  It is said to work in a similar way like the smurf Attack, that often uses spoofed ICMP traffic and as such, the denial of service (DoS) attack that generates a large number of ICMP echo requests from a single request, acting like an amplifier is a  fraggle attack.

Learn more about DoS attack  from

https://brainly.com/question/13068595

#SPJ1

Can someone please help me? My Brainly isn't working correctly and I need help. I can't see the home page... all I can see is in the pic... Please help me!!!

Answers

Answer:

ok. If you refeshed then now click this

Explanation:

Which file in linux would i need to modify in order for a local user to connect to a new site i created by just entering the site name in the browser

Answers

I attached my answer because Brainly wouldn't let me post it. It is important  to be detailed since you are setting up a DNS server to do this.

1. Select and open an appropriate software program for searching the Internet. Write the name of the program.

Answers

An appropriate software program for searching the Internet is known as Web browser.

What is the software that lets you search?

A browser is known to be any system software that gives room for a person or computer user to look for and see information on the Internet.

Note that through the use of this browser, one can easily look up information and get result immediately for any kind of project work.

Learn more about software program from

https://brainly.com/question/1538272

difference between local technology and model technology with example​

Answers

The differences? Speed, size, storage or load, or just plain work-load, between ‘modern,’ and trad. technology is probably easiest to compare. We tend to think of communication tech, and computation tech when we say ‘modern,’ but traditional? Lets define that just a bit. Are we talking machines and devices, or the uses themselves, like fire from rubbing two sticks together to fire from an ‘electronic,’ cigarette lighter?Some things are just novelties. There are times when cheap, non electronic devices provide practical and very necessary service in places where an electronic device is too high-maintenance to be equally practical. There is no need to put a computer on a well pump if you’re in a back-water where electronic replacement parts are hard to come by. You just hand pump the thing and it works fine and at your convenience. Certain ‘Green,’ tech, like solar ovens, are a far cry from a fire pit, or even a gas barbecue, and though it’s marketed as ‘new’ technology, depending of course on design and materials used, it is very low-tech. Useful technology seems really only cosmetically changed, with new clothes over old bones, so-to-speak. A different package, a different color, but it’s the job it does that matters. The best comparison between ‘modern,’ tech and ‘traditional,’ tech that springs to mind though, is that modern tech is very modular and if it breaks it’s often disposable, rather than fixable, for most of us.
The differences between modern and traditional technologies are: Traditional technology was based on simple laws and mechanics while modern technology is formed by the integration of many simple mechanics. Modern technology is built on the existing traditional technology. An example of local technology is plough, water mill and water pump. Example of model technology could be a statue or a painting.

A program that runs each line one at a time in order is called?

Answers

the answer is a one liner program

3. Which symbol shows one character in criteria for query:
(a) <
(b) >
(c)?

Answers

Answer:

The answer is A

Explanation:

A ( which is a less than sign) is used for all smaller values.

What is a menu?
another name for a window
a section that allows you to choose settings
a set of commands that provides quick access to a tool
a list of commands and options for working with a program

Answers

Answer:

a list of commands and options for working with a program

Explanation:

Someone help me!!

select the correct answer

what are the functions of system software?

system software enables a computer's hardware to perform tasks, and functions as a platform for database. quapplication. q

presentation software. it also acts an interface between the computer's hardware and o processor devices

o software

Answers

The first (1st) one. I

Explanation:

It's the definition

In Scratch, what term refers to a message that gets passed along and causes an action to happen?
broadcast
mechanical
trigger
variability

Answers

Answer:

Broadcast

In scratch, let's use a block and a message as our example, when I receive and broadcast.

So you would put your syntax like this,

When green flag clicked

broadcast message1

 When I receive message1

 say Hello World!

Answer:

your answer is A. Broad cast

Explanation:

Alejandro wants to post an animation on his social media page that shows a series of slightly different images displayed in sequence. What type of animation should he select

Answers

The type of animation that Alejandro should select show a series of images displayed in sequence is: Animated GIF.

What is graphic design?

Graphic design can be defined as an artistic process that is used for the creation of various art works and animations.

In the creation of various graphic files such as in 2-D or 3-D, graphic designers can use a variety of software applications or programs to create still images and animations.

In this scenario, Alejandro should select an animated graphics interchange format (GIF) to show a series of images displayed in sequence.

Read more on graphic design here: brainly.com/question/25299426

list four pointing devices and describe the four pointing devices ​

Answers

Answer:

Common pointing devices

Mouse.

Trackball.

Joystick.

Pointing stick.

Explanation:

Hope this helps

The area that we can see just after windows is started is subject​

Answers

Answer:

The area that we can see just after windows is started is desktop or working area.

Eric just signed up for his first college class after being out of school for nearly a
decade. He goes to the bookstore the week before class starts to get his book, and
he's surprised to learn that he only needs an access card. How will Eric be
accessing the course material for his college class?

Answers

The way Eric can access the course material for his college class is to use the LMS also known as course management system (CMS)

What are course material?

Course Materials are known to be the courses, documentation, educational materials needed for a specific course.

Conclusively, The LMS is the known to be the background into which instructors often input course content and when Eric access it, he can be able to get the course content.

Learn more about course material from

https://brainly.com/question/4371674

The format that you will use on your works cited page when the entry is longer than one line is__________.

Answers

The format that you will use on your works cited page when the entry is longer than one line is to second and all subsequent lines need to be indented half an inch.

What kind of formatting is used on a works cited page?

In the formatting of the Works on Cited page, the layout is that "Title the page Works Cited, do put it on the center and in plain text (no italics, bold, or underline). etc.

Note that the format to use when  your works cited page  entry is more than one line is to second and all subsequent lines need to be indented half an inch.

Learn more about cited page from

https://brainly.com/question/1382377

HELP PLEASEE!!
True or False. The POP is a bank of switches that allows many users to connect to the ISP at the same time.

Answers

Answer:

yes it is true. the pop is a bank of switches that allows many users to connect to the ISP at the same time.

How does the quantity of data affect the accuracy of an experiment?
A. The more data is collected, the more accurate predictions and
results can be.
B. The less data is collected, the more data scientists have to search
for.
C. The less data is collected, the less likely it is that the experiment
will have to be repeated.
D. The more data is collected, the more time scientists spend
analyzing the results and predictions.

Answers

The more data that is collected, the more accurate predictions and results can be.


2. Asterisk (*) symbol in criteria for query stands for:
(al Any number of characters
(b) One character
C zero characters

Answers

Answer:

The answer is A

Explanation:

The Asterisk symbol (*) is used in all fields.

You have a user who has difficulty typing. She is constantly pressing keys multiple times by accident. Which keyboard accessibility option should you enable? Mouse keys Bounce keys Sticky keys Repeat keys

Answers

The answer is option B, Bounce keys

Please help……Your friend is taking images from all over the internet without giving credit to the sources. He tells you that it’s no big deal, and no one will know or care anyway. Help your friend by explaining why it is important to follow copyright laws when photos are needed.

Answers

Answer:

For people who generate creative content, copyright regulations are crucial. It safeguards their works from being utilized without their permission or in ways that they do not approve of. If you successfully profited by utilizing someone else's copyrighted work, in this example their images, you may be required to pay monetary damages, and the court may order you to stop using his/her content without their agreement. A federal judge may potentially seize your work and compel you to delete them right away.

A _____ is a grid that displays fields as columns and records as rows.

Answers

Answer: it is a datasheet because data is like a a place to keep things in and you can organise that in many different way's

Which of the following objects is used to create a list of variables in flowcharts?

A. an array or list
B. string variable
C. simple variable
D. &

Answers

Answer:

A

Explanation:

ArrayList (Collection c): This constructor is used to build an array list initialized with the elements from the collection c. Suppose, we wish to create an ArrayList arr which

Other Questions
Help me answer this please:) There are 7070 days in ten weeks.Based on the mean from the sample, how many more guests will stay at the small hotel than at the bed and breakfast in a 1010-week period? What is the most effective way for individual citizens to participate in the law-making process?---Circulate a petition proposing or opposing a law.---Ask the local newspaper to suggest a law.---Talk to friends about the need for changing a law.---Complain about laws in posts on social media. what does the length equal? The microscopes used today are just like the ones used by Leeuwenhoek and Hooke. True or false What is the max amount of years a president can serve?. find the sum of the first 10 terms 125,50,20 Where was the path of the Chisholm Trall? Which statement is true about the discontinuities of the function f(x)?f(x)=x+1/6x^2-7x-3There are asymptotes at x=3/2 and x=-1/3There are holes at x = 3/2 and x = -1/3There are asymptotes at x = -3/2 and x = 1/3There are holes at x = -3/2 and x = 1/3 What did the massive influx of immigrants during the California Gold Rush of 1848-1845 mean for California? What is the sum (2 x 1016) + (7 1016) in scientific notation what digit is in the ten thousand place in 796,142 what is the answer Im not good at these I need help Which statements best explain how globalization offers an advantage to businesses? Choose four answers. Businesses can take advantage of favorable laws to make products cheaply. Businesses can take advantage of favorable taxes to make products cheaply. Businesses can take advantage of new forms of technology to make products cheaply. Businesses can take advantage of new forms of democracy to make products cheaply. Businesses can take advantage of faster technology to make products faster. Identify any three ways of conserving and managing forest in nepal. A fruit company delivers its fruit in two types of boxes: large and small. Delivery of 8 large boxes and 4 small boxes has a total weight of 173 kilograms. Delivery of 3 large boxes and 2 small boxes has a total weight of 68 kilograms. How much does each type of box weigh?Weight of each large Box: ?Weight of each Small Box: ? Use context to determine the meaning of the word entreat as it is used in Romeos first speech. Write your definition of entreat here and tell how you found it. Solve by factorisation2x+3x-20=0 What is the solution to this system of equations?Those equations in the corner are, y = x -4. y = -0.5x + 8 The box-and-whisker plot belowrepresents some data set. What is the value of the first quartile?