1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
tatiyna
2 years ago
13

Who designed the apple i computer in 1976?

Computers and Technology
1 answer:
ivann1987 [24]2 years ago
5 0
Steve Wozniak

An Apple 1 at the Computer History Museum, Mountain View. demonstrated the first Apple Computer that he designed and hand-built at the Homebrew Computer Club in Menlo Park, California in July 1976
You might be interested in
How many types of string types does python support?​
Andru [333]

Answer:

47

Explanation:

they support all of them,more their babies and offspring

7 0
4 years ago
Write a grammar for the language consisting of strings that have n copies of the letter a followed by the same number of copies
Mazyrski [523]

Answer:

def language(mystring, n):

   if n > 0:

       string_list = [x for x in mystring]

       string_cont = ""

       for character in string_list:

           string_cont += character * n

       print(string_cont)

Explanation:

When n is equal to 0, that is, n=0, The python program multiplies the characters of the string "mystring" by the integer variable "n" to output a string with all characters with the same count.

7 0
3 years ago
Which component of the technological system is achieved when an automobiles airbag inflates
Aleonysh [2.5K]
Process is the component achieved.

8 0
3 years ago
An attacker attempting to break into a facility pulls the fire alarm to distract the security guard manning an entry point. Whic
OlgaM077 [116]

Answer:

'Urgency' is the name of this type of social engineering attack.

Explanation:

Social engineering attack describes a broad range of malicious activities accomplished through human interactions. It uses psychological manipulation to trick users into making security mistakes or giving away sensitive information.

In 'Urgency attacks', the attacker uses some sort of emergency or urgent situation to get someone/people to do what they want or divulge a piece of information.

Hope this Helps!

5 0
4 years ago
Suppose B = [1, 2 3; 4, 5,6; 7,8,9], write a program with “for” loops that
Sidana [21]

Answer:

You don't really need the for loop to calculate B square.

The element-wise multiplication operator can help you get the square of each element of B.

B = [1, 2 3; 4, 5,6; 7,8,9];

B = B.^2;

Hope this helps!

5 0
3 years ago
Other questions:
  • Linda has written a program that works well on various operating systems, but she needs to increase the readability of the progr
    14·1 answer
  • Consider the following program segment. ifstream inFile; //Line 1 int x, y; //Line 2 ... //Line 3 inFile >> x >> y;
    13·1 answer
  • Arrange the following units of storage in descending<br> order. B, TB,KB, GB,MB
    5·1 answer
  • Which is an internet service? <br> A.) antivirus <br> B.) chat <br> C.) firewall<br> D.) router
    6·2 answers
  • These factors influence the design of a network.
    15·2 answers
  • In some employment situations, not all personnel can immediately evacuate a work area per the eap. it may be that some equipment
    15·1 answer
  • What is an infodemic?
    10·1 answer
  • Modify the solution to PP 11.1 such that it catches and handles the exception if it is thrown. Handle the exception by printing
    5·1 answer
  • There are 10 girls and 8 boys at a party. A cartoonist want to sketch a picture of each boy with each girl. How many sketches ar
    12·1 answer
  • What is a megavirus in computing
    8·2 answers
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!