1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
ale4655 [162]
3 years ago
6

Who is known as the father of computer? ​

Computers and Technology
2 answers:
juin [17]3 years ago
8 0

Answer:

Charles babbage ok my boy

JulijaS [17]3 years ago
5 0
Its Charles Babbage.
Thank you!
You might be interested in
A company is deploying a file-sharing protocol across a network and needs to select a protocol for authenticating clients. Manag
VARVARA [1.3K]

Answer:

The answer is "Option C".

Explanation:

Among all four of the above, the application of Kerberos is securer. The consumer not just to validates the provider but also verifies the product to the clients with secure authentication.  

  • It offers a common interface between windows as well as other operating systems.  
  • The user login Smart Card gives much higher protection as it allows security with two factors, that's why except Option C other choices were wrong.
6 0
3 years ago
True False The explicit location always tells you where users are located when they type the query.
gregori [183]
It's true for only some users
7 0
3 years ago
Read 2 more answers
When using Microsoft word, what would happen to the text of a paragraph if the "Justify" option is used?
Bond [772]
Hello, and thank you for asking your question!

When you click on the 'Justify' option on any type of word pad, it'll make all lines of words perfectly aligned. Here is a quick few-sentence example I made. 
(Photo)

Hope this helps! ☺♥

3 0
3 years ago
After a Hacker has selects her target, performed reconnaissance on the potential target's network, and probed active Internet Ad
Gnoma [55]

After a Hacker has selects her target,  the thing she scan next on the target's network to see if any are open System Ports.

<h3>How do hackers scan ports?</h3>

In port scan, hackers often send a message to all the port, once at a time. The response they tend to receive from each port will help them to known if it's being used and reveals the various weaknesses.

Security techs often conduct port scanning for a lot of network inventory and to show any possible security vulnerabilities.

Learn more about Hacker from

brainly.com/question/23294592

7 0
3 years ago
What is the difference between hardware and software?
DIA [1.3K]

Answer:

Computer hardware is any physical device used in or with your machine, whereas software is a collection of code installed onto your computer's hard drive. For example, the computer monitor you are using to read this text and the mouse you are using to navigate this web page are computer hardware.

Explanation:

4 0
4 years ago
Other questions:
  • A device that modulates digital data onto an analog signal and then demodulates the analog signal back to digital data is a ____
    8·1 answer
  • Write a recursive function, len, that accepts a parameter that holds a string value, and returns the number of characters in the
    7·1 answer
  • The most significant factor in choosing a transmission method is its ____.
    10·1 answer
  • Which one of the following oscilloscope controls is used to move the trace up and down the screen vertically
    14·1 answer
  • What is an advantage of using a meta-search engine?
    14·1 answer
  • Write a number guessing game. The game should have a default 1-100 picking system. Have the user guess the number the computer p
    12·1 answer
  • A class can inherit behavior from a parent but also define its own and override parent behavior. This is called:
    8·1 answer
  • Задание: Построить иерархию классов в соответствии с вариантом задания. Построить диаграммы классов.
    8·1 answer
  • - Discuss the input-process-output model as it relates to program development.
    12·1 answer
  • how would you deploy network connectivity in the 25 classrooms, 12 faculty offices, and the common areas of the building?
    12·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!