1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
dimaraw [331]
4 years ago
13

What is the main difference between EDBAC and EDNIAC......​

Computers and Technology
2 answers:
lawyer [7]4 years ago
6 0

Answer:

EDVAC (Electronic Discrete Variable Automatic Computer) was the successor to ENIAC, was binary based, and used stored programs, and was also designed by Eckert and Mauchly, UNIVAC I (UNIVersal Automatic Computer I) was the first commercial computer. It was designed by the same two men who designed ENIAC and EDVAC.

Explanation:

Anuta_ua [19.1K]4 years ago
5 0

Answer:

answer is correct

electronic discrete numeric integrated automatic computer

You might be interested in
Howard is leading a project to commission a new information system that will be used by a federal government agency. He is worki
Ann [662]

Answer:

The correct answer is A.

Explanation:

Given the example in the question, Howard is at the step of implementing security controls.

There are five official steps for the risk management framework.

  1. Categorizing The Information System: In this step, the IT system's objectives are assigned based on the current mission or project.
  2. Selecting Security Controls: After the risk assesment is done, the security controls for technical, hardware and software problems are decided according to the outcome.
  3. Implementing Security Controls: In this step, the points that were decided in the step before are put into action.
  4. Authorizing The Information System: Authorization for the risk management is approved and monitored.
  5. Monitoring Security Controls: The authorities keep monitoring the process and makes any necessary changes and updates.

The process that is explained in the question is step 3, which is given in option A.

I hope this answer helps.

5 0
3 years ago
PLEASE HELP ANSWER THIS only if you know BOTH ANSWERS!
Leya [2.2K]

Answer:

For the first question I think it is chains

The second question.

The woman is suspicious at hotel doors have numbers so how could he have been confused

Explanation:

8 0
4 years ago
Read 2 more answers
Can you redact this image
spin [16.1K]

Answer:what???

Explanation:so

What

6 0
3 years ago
Write the logical Expression and Draw the Truth table for the <br> following questions
Alja [10]

The logical expressions are

  • (X NOR Y ) OR Z ⇒ (\bar X  \bar + \bar Y) + Z
  • (A NAND B) AND NOT C ⇒ (\bar A \bar \cdot\bar B) \cdot \bar C

<h3>How to determine the logical expressions?</h3>

<u>Logical expression 1</u>

X and Y are linked by the NOR gate.

So, we have:

X NOR Y

The X NOR Y is linked to Z by the OR gate.

So, we have:

(X NOR Y) OR Z

Hence, the logical expression is (X NOR Y ) OR Z ⇒ (\bar X  \bar + \bar Y) + Z

<u>Logical expression 2</u>

A and B are linked by the NAND gate.

So, we have:

A NAND B

The A NAND B is linked to C by the AND gate.

So, we have:

(A NAND B) AND C

Hence, the logical expression is (A NAND B) AND NOT C ⇒ (\bar A \bar \cdot\bar B) \cdot \bar C

See attachment for the truth tables

Read more about truth tables at:

brainly.com/question/27989881

#SPJ1

6 0
2 years ago
Briefly define each components of information systems (hardware, software, data, networking, people and procedure). While you ar
WARRIOR [948]

Answer:

1. Hardware is the physical components that compose a system and provide physical quantity and quality to software applications and accomplish information processing tasks

2. Software is a program that carries out a set of instructions written in a programming language. It instructs a computer on how to carry out specific tasks. Programs can be saved permanently or temporarily.

3. Data may be mostly the raw resources used by information systems experts to give business intelligence to users. Traditional alphanumeric data, which is made up of numbers and alphabetical and other characters, is one type of data.

4. Networking is a resource of any computer system connected to other systems via a communications. It refers to the physical connections between all of the network's nodes. Communication networks are a critical resource component of all information systems, according to networking.

5. People are those who are directly or indirectly involved in the system. Direct users include developers, programmers, designers, and system administrators. Direct users can also be the stakeholder or end user who receives an output from the system. Indirect can be a manager who takes a brief check at the system to check that all criteria are satisfied.

6. Procedure is made up of stages or phases that result in an output. A method of continually receiving feedback on each part while analyzing the overall system by observing various inputs being processed or altered to create outputs.

7 0
2 years ago
Other questions:
  • • Write a program to find the maximum, minimum, and average score of players. The input to the program is a file containing play
    9·1 answer
  • What internet service provider first dominated the internet in the 1990s?
    15·1 answer
  • Data hiding, which means that critical data stored inside the object is protected from code outside the object, is accomplished
    14·2 answers
  • a paragraph is a segment of text with the same format that begins when you press the enter key and ends when you press enter key
    6·2 answers
  • A student is curious about how a Web site appears on his computer screen. On a piece of paper,
    9·1 answer
  • Develop a list of privacy protection features that should be present if a website is serious about protecting privacy. Then, vis
    8·1 answer
  • Who ever likes Pokemon an wants to help me please comment and I will Give the room for My Assignment
    9·1 answer
  • What is a Hard Drive
    13·1 answer
  • Please what do you guys think about this ?
    10·2 answers
  • imagine that you wanted to write a program that asks the user to enter in 5 grade values. the user may or may not enter valid gr
    12·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!