1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
jok3333 [9.3K]
3 years ago
10

How was the first programming language created?

Computers and Technology
1 answer:
Readme [11.4K]3 years ago
4 0
The first program was "typed" by turning large gears, flipping levers, and pushing buttons, sometimes programs took days or weeks to process and finish. The first ever recorded "program" was in 1883 when a person wrote algorithms on a large sheet of paper and used this as to know what to do next. I got this from a government website, FLVS is Florida Virtual School and I am taking a computer programming course.
You might be interested in
Anybody play apex legends? I need somebody to climb with in comp (I main octane)
Verdich [7]

Answer:

yes

Explanation:

my profile pic tho add me jujubi1988

6 0
4 years ago
Using a combination of symmetric and asymmetric key encryption, Sofia sent a report to her home office in Indiana. She received
photoshop1234 [79]

Group of answer choices.

A) the public key had been compromised.

B) the private key had been compromised.

C) the symmetric encryption key had been compromised.

D) the asymmetric encryption key had been compromised.

Answer:

C) the symmetric encryption key had been compromised.

Explanation:

Cyber security can be defined as preventive practice of protecting computers, software programs, electronic devices, networks, servers and data from potential theft, attack, damage, or unauthorized access by using a body of technology, frameworks, processes and network engineers.

In Cyber security, encryption is a form of cryptography and typically involves the process of converting or encoding informations in plaintext into a code, known as a ciphertext.

Typically, an information or data that has been encrypted can only be accessed and deciphered by an authorized user.

Some examples of encryption algorithms are 3DES, AES, RC4, RC5, and RSA.

Email encryption is the encryption and authentication of an email to protect the message therein from being read by any person other than the intended recipients. Thus, it protects the email from hacking or invasion by a third party.

Basically, when the message is signed with the sender's private key, the receiver can verify its authenticity using the sender's public key.

Also, encrypting the email message with the receiver's public key provides confidentiality.

In this scenario, the most likely explanation for this result is that the symmetric encryption key had been compromised.

3 0
3 years ago
If I gain a rank and go under the points that the rank coust do I lose the rank
padilas [110]
This is a good question, and I've wondered about that myself. I'm going to 'report' the question, not because there's anything wrong with it, but to bring it to the attention of the Moderators, so they can tell both of us.
4 0
3 years ago
Read 2 more answers
How Do you get Splatoon two for free
IRISSAK [1]

Answer:

Well the real question would be how comfortable are you with computer software if not good or none at all I feel the answer would simply be buy the game in the Nintendo store or you could buy the key for the Nintendo store for much cheaper on 3rd party websites give that a try hope this helped you. :)

5 0
3 years ago
Read 2 more answers
How do you view the edited document without the track changes markup?
daser333 [38]

To check a document:

Open the document you want to inspect for tracked changes and comments.

Click the Microsoft Office Button , point to Prepare, and then click Inspect Document.

In the Document Inspector dialog box, click Inspect.

Review the inspection results. ...

Click Reinspect or Close.


3 0
4 years ago
Other questions:
  • What is intergrated circuit ic​
    10·1 answer
  • which internet technology allows businesses to make presentation and share visual aids such as charts and graphs
    14·2 answers
  • Which of the following is not one of the Generally Accepted Recordkeeping Principles ("The Principles®")? a. Accountability b. S
    11·1 answer
  • IPv6 is being developed in order to:
    15·1 answer
  • A ____ is an electronic device, operating under the control of instructions stored in its own memory, that can accept data, proc
    11·1 answer
  • Write the method addItemToStock to add an item into the grocery stock array. The method will: • Insert the item with itemName ad
    12·1 answer
  • You just settled in for some study time at the local coffee shop, and you pause long enough to connect your smartphone to the Wi
    7·1 answer
  • 3.2 code practice question 2. Not in a rush.​
    15·1 answer
  • Which term describes the surrounding area of this image?
    10·1 answer
  • Which type of work would be a good candidate for improvement through automation?
    8·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!