Bitlocker is used by Microsoft Windows to encrypt (hard disk) drives.
Drive encryption with Bitlocker is to be distinguished from the standard logon (login screen) in Windows. As a rule, a device encrypted with Bitlocker first decrypts the drive and then the user logs in via the login screen.
Pre-boot authentication takes place before the encryption keys are accessed and therefore represents a further security measure. Various authentication factors (e.g. PIN, start key or both) can be used for this.
The recovery password is a 48-digit number that can be used as a recovery option. This is not requested in the normal authentication process and is to be distinguished from the authentication factors in the context of pre-start authentication.
The TPM (Trusted Platform Module) is used "to securely create and store cryptographic keys and confirm that the operating system and firmware on your device are what they are supposed to be and have not been tampered with." [Q2] TPMs are either in the form of a separate chip on the motherboard (external TPM) or as an integrated part of the CPU chipset (internal TPM).
The TPM has anti-hammering protection. This provides protection against brute force attacks. After 32 failed attempts to enter the pin/password, the anti-hammering protection locks the password entry for 10 minutes. This theoretically allows a maximum of 144 attempts per day (plus the initial 32 attempts).
For example, there are 100000000 (10^8) possible combinations for a randomly generated 8-digit pin. The probability of this pin being brute-forced after 7 days is therefore: 0.00104% ((32 initial attempts + 144 additional attempts per day * 7 days) / 100000000 possible combinations = 0.0000104) or after 1 year 0.053% ((32+144*365) / 100000000 = 0.00052592).