1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
Oliga [24]
3 years ago
8

Who is the king of computers?

Computers and Technology
2 answers:
pshichka [43]3 years ago
6 0

Answer:

Professor Eric Roberts

Explanation:

Computer scientist

anygoal [31]3 years ago
4 0

Answer: <u>Bill Gate</u>, who is known as the king of computer programs

Hope this helps!

You might be interested in
The four general functions of any application program are: data storage, data access logic, application logic and presentation l
miv72 [106K]

Answer:

True is the correct answer to the above question.

Explanation:

  • An application program is used for specific tasks. It is a program with some specified lines of instruction which instruct the computer to process any task.
  • When a user wants to create an application program or project then he can do it with the help of four parts. which are as follows:-
  1. There needs some presentation which can be called as front-end, which is the graphics interface for the user of that program. It facilities the user to drag and drop options for the user of the project.
  2. The second thing is data storage, which is used to store the data of the project.
  3. The third thing is data access logic, which is used to create a logic to extract or add the data to the database.
  4. The fourth thing is application logic which is used to send the data or present the data to the user in front-end design.
  • The above question-statement also wants to states the same which is described above. Hence true is the correct answer to the above question.

5 0
3 years ago
Now the y0utube home screen is gone
erik [133]

Answer:

oh no thanks not good

Explanation:

did you try it on a different device mabye a phone

7 0
3 years ago
Read 2 more answers
Imagine that you are about to make a presentation during an online meeting, where people will need to be able to see you, and yo
djyliett [7]

Answer:

You would check your devices / features in your settings to see if your camera is enabled, connected, or working.

Run a diagnostics scan to see if anything is affecting your camera.

Clear cookies.

Call a technician.

5 0
3 years ago
As we have seen in this chapter, public-key cryptography can be used for encryption and key exchange. Furthermore, it has some p
Savatey [412]

Answer:

Disadvantages of public key cryptography is that : Assymetric cryptography is slower than the private key cryptography.

Explanation:

We are dealing with big data applications most of time. Almost all applications are data intensive. Private key cryptography which is also known as symmetric cryptography. Symmetric cryptography based systems are faster. Since there is no key transmitted with the data, encrypted data can be transferred over the channel or session even if the path is vulnerable or have chances of interception as the chances of decrypting the data is almost impossible.

Also, The identity of the receiver is guaranteed using the password based authentication used by symmetric crypto systems. Only the trusted receiver who has the access to the secret key can only decrypt the payload

Public Key Cryptography is slower than private key cryptography. Today’s application’s are data intensive. In case of data intensive applications , encrypting huge data will take a lot more time than that of symmetric key cryptography. Whenever Bulk data transmission is needed symmetric key cryptography is preferred. Secret key based crypto systems have proven to be more faster than any currently available assymetric key based crypto systems.

7 0
3 years ago
Escribe 10 ejemplos de lo que consideras un byte
stira [4]

<u>Respuesta:</u>

Espero y te pueda ayudar: ).

4 0
3 years ago
Other questions:
  • You are researching RAM for a computer you are building for a friend who will be using the system as a home office server for he
    6·1 answer
  • Se citește un număr natural nenul N. Se umple, pe linii, partea de sub diagonală, inclusiv aceasta, a unui tabel pătratic de dim
    9·1 answer
  • If your teacher is out of the office, what is the best way to reach them, or get help?
    10·1 answer
  • Where is your network strongest? Where is it weakest? How have you developed your network thus far? How has that influenced who
    5·1 answer
  • . Convert BAC4 from hexadecimal to decimal. Show your work.
    9·1 answer
  • In a penetration test, a ________ team consists of IT staff who defend against the penetration testers. They are generally aware
    14·1 answer
  • When light does not pass through or bounce off an object, it is said to be
    13·2 answers
  • Project: Baseline, Benchmark, Objective, and Goal
    14·2 answers
  • Which graphic file format is used for commercial purposes.
    10·1 answer
  • Page 1. I who invented computer?​
    9·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!