who develop computer first?​

Answers

Answer 1

sorry bro...,......................................


Related Questions

To gain access to the functions and variables of a library module, use a(n) _________ statement. A. import B. export C. global D. library

Answers

Answer: import

Explanation:

what is the term for delivering an application over the internet called?

Answers

Answer:

Cloud computing

Explanation:

The termnology which is used to describe the delivering of an application over the internet is called SaaS.

What is SaaS?

SaaS is an acronym for Software as a Service and it can be defined as a type of cloud computing delivery model that typicaly involves developing and making licensed software applications available to end users on a subscription basis and over the Internet, especially by centrally hosting these software applications within the cloud or through a third-party (vendor).

This ultimately implies that, Software as a Service (SaaS) is a termnology which is used to describe the delivering of an application over the internet.

Read more on SaaS here: https://brainly.com/question/24852211

You are creating a program that can add up the amount of money the user spent that day. Right down to the penny! What kind of variables should you create? a default variable a user variable an integer variable a float variable

Answers

Answer:A. A default Variable

Explanation:

Answer:

A

Explanation:

Did it on a Test

Pls help me pls I’m struggling

Answers

Answer:Turn Right () Degrees (block)

The turn right () degrees block is a Motion block and a stack block. The block turns its sprite's direction the specified amount of degrees clockwise.

what information about a cisco router can be verified using the show version command?

Answers

- the routing protocol version that is enabled.
- the value of the configuration register.
- the operational status of serial interfaces.
- the administrative distance used to reach networks.

What do software engineers use as tools to provide automated support for the development of the system

Answers

Answer: CASE

Explanation:

Write a 20 charecter poem! for points! :)

Answers

you are wonderful as you are blue you are as blue as the sky the sky is beautiful as u are too you are red as Rose's and Rose's are full of you winter time is the mood full of winter and snow

Brianna is taking a backpacking trip in the wilderness and wants to back up the photos from her camera. Which type of storage device would be best for this purpose?
A. Optical disc
B. Cell phone
C. Flash drive
D. HDD

Answers

Answer:

C

Explanation:

Flash drives usually have an input (E.G. one of those android charger connectors), so just plug that into your camera, and load the flash drive with the photos. Then go home and plug the USB on the flash drive into your PC. If there isn't already, a folder will be made in your "Pictures" folder on your PC, to which you can open the folder, and then your photos should be there. From there you can open them, print them, etc.

Hope this helped, and sorry if I didn't answer in time.

A(n) ________ address is the address that external entities use when communicating with your network.

Answers

Answer:

IP adress

Explanation:

the IP adress is like your home address but for your computer. it tells the whatever is connecting where it's located so it can find where to send the data

List three (3) features of first generation computer
PLEASE HELP!!!!!

Answers


Features of first generation computers:

Technology used: vacuum tube.

Machines languages were used to instruct the computer.

Magnetic core memory was used as primary memory.

Electrostatic tubes, Parer tape, punch card, magnetic tape.

3.) The primary storage device that holds the data currently being processed by the computer is​

Answers

Computer memory I hope it works

Answer:

I personally think its a hard drive or something like that,im not a computer expert to be honest

What is the main difference between structured and unstructured data?

Answers

Answer:

answer is 4.

Explanation:

for an instance let's say you've got to make list of students who would stay after school for sports.then you have to collect data such as Student name _gender _the sport he or she will attend to. Then you get three columns of table to do that when you write those you can get a clear information seeing those data..

Brake fluid is made up of a chemical that:​

Answers

hi there!

Brake fluid is a type of hydraulic fluid used in hydraulic brake and hydraulic clutch applications in automobiles, motorcycles, light trucks, and some bicycles. It is used to transfer force into pressure, and to amplify braking force. It works because liquids are not appreciably compressible.

hope this helps.

Who is your favorite Funtime Anamatronic?

Answers

Answer:

ur mom

Explanation:

jk it's prb something like foxy

Which of the following would be the most appropriate way to define a method that calculates and returns the final price, after tax and tip, for a passed in price, assuming tip is always 15% and tax is always 8%?

a. public double getFinalPricel double tips, double tax).
b. public double getFinal Price double tax)
c. public double getFinalPrice/double basePrice, double tips)
d. public double getFinalPrice double basePrice, double tips, double tax)

Answers


D. I hope it helped

This is an image of the ...........................Topology.

if answer Correct i will mark the first person brainly.​

Answers

Answer:

Mesh

Explanation:

difference between boot disk and booting in 5 points​

Answers

[tex]Answer \: -[/tex]

In computing, booting is the process of starting a computer. It can be initiated by hardware such as a button press, or by a software command. After it is switched on, a computer's central processing unit (CPU) has no software in its main memory, so some process must load software into memory before it can be executed. This may be done by hardware or firmware in the CPU, or by a separate processor in the computer system.

A boot disk is a removable digital data storage medium from which a computer can load and run an operating system or utility program. The computer must have a built-in program which will load and execute a program from a boot disk meeting certain standards.

Question 11
Methods that return a decimal value must be declared using what type?


a. int

b. void

c. double

d. String

e. null


Question 12

Which of the following is true when x = 15?


a. (x >= 15) && (x < 13)

b. !(x > 13) || (x > 16)

c. (x > 13) && (x < 17)

d. (x < 15) || (x > 15)

e. (x <= 13) || (x >= 17)

Answers

Answer:

11. a, 12.c

Explanation:

bc numbers must be declared as ints and 15 is greater than 13 but lesser than 17

A PIN of four digits has 10,000 (or 104) combinations. This could theoretically be guessed by a computer in milliseconds. The most popular PIN numbers are 1111, 1234 and 0000 making up around 20% of PIN numbers. Anything beginning with 19XX is also very common, as is 2580. Why?

Answers

Answer:

19xx could be a birth year, easy to remember

2580 is easy to remember because on a keypad the numbers are aligned vertically.

Note that from the statement above, one can say that 19xx is common as it is linked with birth year and thus easy to recur and also 2580 is very easy to recur because on a keypad the numbers are soften matched vertically.

What is pin about?

Pin or digit code are often used in our debit cards, credit cards and in a lot of mobile phones for security purposes.

Note that Note that from the statement above, one can say that 19xx is common as it is linked with birth year and thus easy to recur and also 2580 is very easy to recur because on a keypad the numbers are said to be aligned vertically.

Learn more about digits code from

https://brainly.com/question/3118454

#SPJ9

which subunit of a heterodimeric cdk is the regulatory subunit?

Answers

The answer is cyclin subunit

Which type of wireless attack is designed to capture wireless transmissions coming from legitimate users

Answers

A type of wireless attack that is typically designed and developed to capture wireless transmissions coming from legitimate end users is referred to evil twin.

An evil twin can be defined as an illegitimate and fraudulent that is usually set up to capture wireless transmissions, especially by eavesdropping on the information transmitted by legitimate end users.

In Cybersecurity, an evil twin is an equivalent of phishing on a local area network (LAN).

Basically, an evil twin is a rogue wireless access point (AP) that is typically designed and developed to capture wireless transmissions and sensitive information coming from legitimate end users.

In conclusion, an evil twin is used by an attacker or hacker to gain an unauthorized access to sensitive information from legitimate end users.

Read more: https://brainly.com/question/5660386

why does my ps4 keep disconnecting from the internet

Answers

Answer:

It could be a variety of reasons depending on your form of connection. Wireless, it could be distance from router causing packet loss or disconnection. Wired, damaged or poor wire, or bad internet. What do you know about your connection?

Your grandmother tells you a dollar doesn't go as far as it used to. She says the "purchasing power" of a dollar is much less than it used to be. Explain what she means. Try to use and explain terms like inflation and deflation in your answer. ​

Answers

Answer:

The obtaining influence of a dollar is substantially less on the grounds that more cash is made and causes the value of the dollar greenback to diminish, making things increasingly costly. This is called swelling. In any case, when less cash is made, the value of a dollar greenback increments and things turn out to be more affordable. This is called flattening. As the years go on, the purchasing power of a dollar decreases and decreases.

Hope that helps. x

NO links!!! please, In this task, you will prepare the necessary documents required to apply for the job. Conduct research and find out what documents are necessary, such as a résumé, cover letter, and so on. Then, prepare these documents using your information and tailor the documents to the career you have chosen.
the job I chose was a software architect
It's from PLATO

Answers

To apply for a job, you must provide a resume, cover letter, reference list, letters of recommendation, portfolio, and employment certificate.

About these documents we can inform you that:

The Resume presents the most generalized information about the candidate's educational and professional background.The cover letter must be made to show more in-depth information, where the candidate reinforces their most positive points and relevant to the job vacancy.The reference list presents the opinion of other professionals about your professional abilities.The portfolio must be submitted by candidates related to artistic or visual areas and presents the works already created by that professional.The employment certificate must show your professional history in more detail.

Thus, we can state that the application for a job vacancy requires that many documents and information be provided.

More information on writing a resume at the link:

https://brainly.com/question/862477

According to popular science Web sites, the scientific process of digital forensics normally starts with a(n) ________.

Answers

Answer:

a hypothesis that forms into a question.

Explanation:

The software which manages environment for running programs handling error controlling devices configuring the computer system and managing the resources of a computer.
Write the technical term of the given question of the picture .
Correct Answer =⟩ Thanks
Best answer =⟩ Brainliest
Random answer =⟩ Reported and deleted ​

Answers

Answer:

D

Application

System software is the set of programs that enables your computers hardware devices and Application software to work together.

Practical computer systems divide software systems into two major classes: System software: Helps run the computer hardware and computer system itself. System software includes operating systems, device drivers, diagnostic tools and more. ... (Some application software is pre-installed on most computer systems.)

Explanation:

Can someone please help

Answers

Answer:

Explanation:

la reponse est le premier et le 3 eme pointcar en effet le premier point c est logiqye e le 2 e aussi  

about how many smart devices are active today coinbase

Answers

Considering the latest information released by Statisticà, the number of active smart devices in the world today is 21.5 billion.

What is Smart Device?

Smart Device are generally known as electronic devices, that have the capacity to connect with other device or networks through wireless servers like Bluetooth, Zigbée, NFC, Wi-Fi, LiFi, 5G, etc.

Examples of Smart Devices

Smart devices generally include the following:

SmartphonesSmart cars Smart doorbellsSmart refrigeratorsTabletsPCSmart watches, etc.

Hence, in this case, it is concluded that the correct answer is 21.5 billion.

Learn more about Smart Device here: https://brainly.com/question/24803254

A facility that is pre-wired for necessary telecommunications and computer equipment, but doesn't have equipment installed, is known as a

Answers

Answer:

hot site

Explanation:

Which of these problems is correct if the numbers are binary numbers?Group of answer choices1 + 1 = 21 + 1 = 100 + 0 = 11 + 0 = 10

Answers

Answer:

The last one is correct.  

Explanation:

Other Questions
How many ways are there to rearrange the letters of the word: COMBINATION? role of politics in national development = The topic= Direct and Inverse Proportions It is given that y is directly proportional to x and y=36 and when x=12(a)An equation connecting to x and y(b) That value of y when x=5(c)The value of x when y=12Please help me answer my hw, thank you! Me podran recomendar libros no tan largos, cualquier gnero por favor :)) Find an explicit rule for the nth term of the sequence.-1, -5, -25, -125, ... The number of perpendicular bisectors a segment can have is:1 pointa) 0b) 1c) 3d) 10 3 attempts left Be sure to answer all parts. Which indicators that would be suitable for each of the following titrations: (a) CH3NH2 with HBr thymol blue bromophenol blue methyl orange methyl red chlorophenol blue bromothymol blue cresol red phenolphthalein (b) HNO3 with NaOH thymol blue bromophenol blue methyl orange methyl red chlorophenol blue bromothymol blue cresol red phenolphthalein (c) HNO2 with KOH thymol blue bromophenol blue methyl orange methyl red chlorophenol blue bromothymol blue cresol red phenolphthalein How does the area below the mean compare to the area above the mean in a normal distribution?A. the areas are always equal regardless of the meanB. the areas are sometimes equal depending upon the standard deviation of the distributionC. the area above the mean is larger since the values are larger as you move above the meanD. the areas are sometimes equal depending upon the value of the mean Bacteria species live in the intestinal tracts of many types of mammals. These bacteria consume the partially digested food the mammal eats but also help to complete digestion of the food for mammals. This represents a ________________ relationship between species.A) PredationB) MutualisticC) CompetitiveD) Commensalism i need the answer to this help PLEASE Theodore recently hired a contractor to do some necessary work. On the final bill, Theodore was charged a total of $715. $315 was listed for parts and the rest for labor. If the hourly rate for labor was $50, how many hours of labor was needed to complete the job? Pls HELP SOMEONEWhat is a confederation?A. a system with two independent levels of governmentB. a government in which the main body makes all decisionsC. a group of governments that have joined togetherD. a government consisting only of a central body A poll of 400 people from Dobbs Ferry showed 250 preferred chocolate raspberry coffee while 170 out of 350 in Irvington preferred the same flavor. To test the hypothesis that there is no difference in preferences in the two villages, what is the alternate hypothesis The assertion that non-formal institutions have no role to play at the PROCESSING STAGE ofthe Systems Theory is an empty rhetoric. Comment Los hmsteres tienen 22 cromosomas y sus clulas haploides. Cuntos cromosomas hay en su clula diploide heredera? The Ka for acetic acid (HC2H3O2) is 1.80 x 10-5 . Determine the pH of a 0.0500mol/L acetic acid solution.I have no idea how to approach this, so If you have the answer for it, please respond as soon as you can what are the four characteristics of bussiness negotiation distinguish between sugar and non-sugar with examples. Plankton Company uses LIFO for all of its inventories. During its second quarter of 20X1, Plankton experienced a LIFO liquidation. Plankton fully expects to replace the liquidated inventory in the early part of the third quarter. How should Plankton report the inventory temporarily liquidated on its income statement for the second quarter "Student life is not the proper time to do things. It is the time to prepare for things to be done in future."How does it sound??