I disagree. With a discovered machine, the scavenger wants to use a bit of the found computer's CPU time to hack in the machine if it was an authentication device that needs to be bypassed to start a 'tractor' or 'combine harvester'. Not all computers are disconnected from the supply chain.
The tools, skills, and knowledge required to literally hack open the tractor and physically bypass its authentication will be drastically more transferrable and overall useful.