1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
ale4655 [162]
3 years ago
6

Who is known as the father of computer? ​

Computers and Technology
2 answers:
juin [17]3 years ago
8 0

Answer:

Charles babbage ok my boy

JulijaS [17]3 years ago
5 0
Its Charles Babbage.
Thank you!
You might be interested in
Refer to the exhibit. A network security analyst is using the Follow TCP Stream feature in Wireshark to rebuild the TCP transact
Mnenie [13.5K]

Answer:

Binary file.

Explanation:

                           In this case, the network security analyst is using the Follow TCP Stream feature in Wireshark to rebuild the TCP transaction. However, the transaction data seems indecipherable. The explanation for this is that the TCP transaction file is a Binary File and because of this the network secuirty analyst is unable to decipher the transaction file.

                           The solution for this is to convert the binary file into text file which is human readable.

3 0
3 years ago
Which of the following is LEAST needed when programming a computer?
PtichkaEL [24]
Computer language is essential
6 0
3 years ago
Because we allow everyone full control, how do you make sure that the shared files are secure?
alina1380 [7]
Make private accounts on defiant servers
4 0
4 years ago
What is responsible for recording an image of an object with camera <br> Pls I neeed it right know
zavuch27 [327]
Wouldn’t you be the one responsible since your the one taking the image?
3 0
3 years ago
Hurry plz
Elanso [62]

Answer: It allows you to locate materials, be aware of your assignments and plan time to get things done.

Hope it helped.

3 0
4 years ago
Other questions:
  • Why has unicode become the standard way of converting binary to text??
    8·1 answer
  • What is the difference between a denial-of-service attack and a distributed denial-of-service attacks? which is potentially more
    10·1 answer
  • Abram was asked to explain to one of his coworkers the XOR cipher. He showed his coworker an example of adding two bits, 1 and 1
    7·1 answer
  • I just started game development using unity, I’m trying to control my sphere moving on a flat surface using the W,A,S,D keys, if
    5·1 answer
  • When a defendant pleads guilty to one offense just to have another offense dropped, this is what type of plea bargain
    12·2 answers
  • Can someone tell me a user to an admin on brainly I got a person sending "inappropriate pictures" all over brainly
    13·1 answer
  • What is the Documenter?
    10·1 answer
  • An integrated file is one that includes information created in _____ Office application(s).
    15·1 answer
  • Need help on Assignment 4: Evens and Odds
    5·1 answer
  • If a machine cycle is 2 nanoseconds , how many machine cycles occur each second?
    7·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!