1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
PilotLPTM [1.2K]
3 years ago
12

Between 1890 and 1929

Computers and Technology
2 answers:
shepuryov [24]3 years ago
5 0
I don't even know bro

MrRissso [65]3 years ago
4 0
Https://en.wikipedia.org/wiki/Herman_Hollerith
 That's all I could find that far back.
You might be interested in
____ allows someone browsing the internet to click on words or phrases, enter his or her phone number, and continue browsing
Sphinxa [80]
It is the internet callback technology that allows someone browsing the internet to click on words or phrases, enter his or her phone number, and continue browsing. It is a technology that enable one to browse the Internet to cue on a certain website to have a representative call a certain number.<span />
6 0
3 years ago
Read 2 more answers
Translate each of the following binary representations into its equivalent base ten representation.
Semenov [28]

Answer:

12, 2.375, 0.25, 17

Explanation:

A. 2^3 + 2^2 = 12

B. 2^1 + 2^-2 + 2^-3 = 2.375

C. 2^-2 = 0.25

D. 2^4 + 2^0 = 17

3 0
4 years ago
You need to put cabling for connecting two new computers in a room, which did not have any network infrastructure. Because of th
vredina [299]

Answer: Twisted pair cabling in the shielded form can be used for the mentioned situation in the question

Explanation: Twisted pair cables in shielded form are easy to make a connection .It does not create lot of noise and has reduced cross talk .It is a low weighted cable and so it can be easily attached with the ceiling tile.

The maintenance of the complete cabling is not a issue and interference is also low that fulfills the requirement of disruption-less network signal.The overall costing of the cable is also less .Thus shielded twisted pair cable are the most appropriate cable for the mentioned situation.

3 0
3 years ago
Read 2 more answers
Which of the following are considerations in e-commerce and e-government Internet sites? Check all of the boxes that apply.
vovangra [49]

Answer:

protection of sensitive information

Explanation:

6 0
3 years ago
Alice's public key, and sends back the number R encrypted with his private key. Alice decrypts the message and verifies that the
Agata [3.3K]

There are different kinds of keys. The identities of Alice and Bob are verified in this protocol.

<h3>What is public and private key in SSL?</h3>

These keys are known to be a kind of related pair of text files and they are often made together as a pair if one makes their Certificate Signing Request (CSR).

Note that the private key is different file that is often used in the encryption/decryption of data so as to sent a file between one's server and the connecting clients.

Learn more about  public/private key from

brainly.com/question/8782374

3 0
2 years ago
Other questions:
  • Binary search requires that data to search be in order. true or false
    5·1 answer
  • Gathering information with your eyes is called
    13·2 answers
  • In graphical linear programming to maximize profit, the objective function is: I. a family of parallel lines. II. a family of is
    11·1 answer
  • Use the drop-down menus to select the type of goal described in each statement. I want to finish all of my social studies homewo
    14·1 answer
  • Write a script that will calculate a person’s weight on each planet of the solar system, the sun, and the moon. You should creat
    11·1 answer
  • A computer scientist creates an app that tells you a funny joke each time you touch the Joke button.
    15·1 answer
  • Do you all like IXL?
    8·1 answer
  • Three materials needed to stream video video content
    10·2 answers
  • Topic: Video Games
    15·1 answer
  • you're building a new network for a small financial services startup company. security is paramount, so each organization within
    6·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!