1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
Delicious77 [7]
3 years ago
6

Who is typically considered to be the father of computing

Computers and Technology
1 answer:
Tanzania [10]3 years ago
7 0
Charles Babbage is most often considered to be the father of computing after his invention of the  Analytical Engine in 1837 which contained <span>Arithmetic Logic Unit (ALU), basic flow control, and integrated memory which served as a general-purpose computer concept (and also very ahead of time in 1837).</span>
You might be interested in
What is the main role of LDAP?
NISA [10]

Answer:

Run directory services

Explanation:

LDAP (Lightweight Directory Access Protocol) is an open protocol used to access some information, information that is stored in a network, the information is organized hierarchical structure, we could find some data like names, directories, and telephone numbers.

With other options, we can find DHCP to assign IP addresses and to resolve IP addresses to host names, we have the DNS.

7 0
3 years ago
Since the 1960s, there have been five major generations, or cycles, of computing. Which represents those generations in order?
sergiy2304 [10]

Answer:a) Mainframes, miniframes, PCs, desktop Internet computing, mobile computing

Explanation: The hierarchy of the computers or computing are in the generation is:-

  • Mainframe:-designed for the execution of huge data processing , storage and execution.
  • Miniframe:-has similar functioning as the mainframe but on smaller scale and version.
  • Personal computer(PC):-It is designed for the individual purpose and according the need of the user.
  • Mobile computing:-computing that can be done on the mobile phone similar to the computing on the personal computer
  • Internet computing:-the computing of the mobile and computer system with the facility of the internet connectivity.

7 0
3 years ago
A penetration tester is experimenting with Network Mapper (Nmap) on a test network as a privileged user. The tester would like t
kondor19780726 [428]

The Network Mapper (Nmap) commands that would be useful on this test network are:

  1. nmap xxx.xxx.x.x -p
  2. nmap xxx.xxx.x.x -A

<h3>What is a penetration test?</h3>

A penetration test can be defined as a cybersecurity technique that simulates a cyber attack against an end user's computer system, so as to scan, identify, test and check for exploitable vulnerabilities in the following:

  • Operating system
  • Web software
  • Host device
  • Network

This ultimately implies that, a penetration test avails an tester the ability to exploit a weakness and potential security threats on a test network as a privileged user, during vulnerability assessments of the system.

<h3>The Network Mapper (Nmap) commands.</h3>

In this scenario, the Network Mapper (Nmap) commands that would be useful on this test network are:

  1. nmap xxx.xxx.x.x -p
  2. nmap xxx.xxx.x.x -A

Read more on penetration test here: brainly.com/question/25813524

6 0
2 years ago
List of bad websites and why
r-ruslan [8.4K]

Penny Juice – bad design examples.

Blinkee website – bad design example.

Great Dreams I — bad designed website.
8 0
2 years ago
Which of the given original work is protected by the copyright law?
Mila [183]

Answer:i would love to help but are there any answer choices?

Explanation: please provide answer choices for an accurate answer

6 0
3 years ago
Other questions:
  • What is the software called that allows the user to create, access, and manage a database? question 8 options:
    10·1 answer
  • Pointsyour company environment includes windows server versions 2003, 2008, and 2012. desktops range from windows xp and vista.
    13·1 answer
  • Need help with this file and due today!!
    6·1 answer
  • "Consideration of being digitally" literate Means to produce digital technology Participate in digital activities none of the ch
    11·1 answer
  • When a Python program is reading a file, the data is input as plain ASCII characters in a string. What is the following code doi
    15·1 answer
  • Presses the Schedulr app icon Selects the list item for CSCI 448 Presses the "View Classroom on Map" button While only performin
    11·1 answer
  • Blank determines the overall brightness or darkness of an entire image
    5·1 answer
  • Assume that an array named salarySteps whose elements are of type int and that has exactly five elements has already been declar
    12·1 answer
  • Justice wrote a program and forgot to put the steps in the correct order. Which step does she need to review?
    5·2 answers
  • Help plz,l didn’t pay attention in class
    7·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!