1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
Oliga [24]
2 years ago
8

Who is the king of computers?

Computers and Technology
2 answers:
pshichka [43]2 years ago
6 0

Answer:

Professor Eric Roberts

Explanation:

Computer scientist

anygoal [31]2 years ago
4 0

Answer: <u>Bill Gate</u>, who is known as the king of computer programs

Hope this helps!

You might be interested in
Name two purposes of creating a microsoft account for use in visual studio 2015
Kazeer [188]
Creating a Microsoft account for use in Visual Studio 2015 means that you will get a better and optimized user experience, with several benefits.
Some of the purposes why you should create an account are:
1. free software, training and support from Visual Studio and broad range of benefits
2. synchronized Visual Studio Settings, which means that you will have for example the same layout, window and color theme, or whatever you select in the settings, every time you log in with your account


4 0
3 years ago
How serious are the risks to your computer security?
ASHA 777 [7]

The seriousness of  the risks to your computer security is not to be a severe one. This is because Computer security risks  are due to the handwork of  malware such as, bad software, that can infect a  computer, and make the hacker to destroy your files, steal your data, or even  have access to your system without one's knowledge or authorization.

<h3>What are the risk results for information and computer security?</h3>

The term “information security risk” is known to be those  damage that occurs due to  an attacks against IT systems. IT risk is made up of a wide range of potential events, such as data breaches, regulatory enforcement actions, financial costs, and a lot more.

Some Examples of malware are viruses, worms, ransomware, spyware, and a lot others.

Hence, The seriousness of  the risks to your computer security is not to be a severe one. This is because Computer security risks  are due to the handwork of  malware such as, bad software, that can infect a  computer, and make the hacker to destroy your files, steal your data, or even  have access to your system without one's knowledge or authorization.

Learn more about computer security from

brainly.com/question/12010892

#SPJ1

6 0
2 years ago
In which of the following situations may you pass on the right
Natasha2012 [34]
In driving your vehicle, it is best to pass on the right after you slow your vehicle down and check for the road whether there is an upcoming vehicle or not. When the road is clear, it is best and safe to pass on the right after making sure that the coast is clear.
3 0
3 years ago
Read 2 more answers
Which technique/concept can be use toimplement multiple inheritances<br> in java?
LiRa [457]

Answer:

Interface

Explanation:

Java does not supports multiple inheritance by class, but we can implement multiple inharitacnce in  java using interface, with interface we uses implements keyword.

Example-

Declare interface like below code -

interface parent{

}

and use in child class like below code -

class Child1 implements interface{

}

class Child2 implements interface{

}

8 0
3 years ago
What difference between plagiarism and fair use?
Alekssandra [29.7K]
Plagiarism is quite a bad thing because if you plagiarize, you are copying and pasting other people's work and using the work as yours (even though you change the sentence structure/ some words, it is still plagiarizing.) Fair use means un-biasness.
7 0
3 years ago
Other questions:
  • Write a programme to find the sum of first three cube number?
    7·1 answer
  • Who are the founders of Microsoft?
    5·1 answer
  • What problem with internal hardware components is similar to unplugged
    6·2 answers
  • 2) [13 points] You’ve been hired by Banker Bisons to write a C++ console application that determines the number of months to rep
    8·1 answer
  • Draw the hierarchy chart and then plan the logic for a program that calculates a person’s body mass index (BMI).
    11·1 answer
  • What is the name of the unique identifier assigned to any personal computer that is connected to the internet?
    11·1 answer
  • Which of the following is a valid c++ identifier a. mouse b. _int c. 2_stop d. float​
    10·1 answer
  • how do i turn off itallics on a school chromebook i accidentally turned them on in another tab and i dont know how to undo them
    7·1 answer
  • Why would an end-user not generally buy a server? Explain your answer by referring to the typical role that servers perform. ​
    12·1 answer
  • Why is computer called information processing machine ?????​
    6·2 answers
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!