1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
Yuliya22 [10]
3 years ago
13

​_____ was the first commercially successful computer. ​z3 ​eniac ​univac ​colossus

Computers and Technology
1 answer:
Lera25 [3.4K]3 years ago
7 0
 <span>​ENIAC was the first commercially successful computer, released in 1946.
</span>The name ENIAC Electronic Numerical Integrator And Computer<span>).</span><span>
 It was </span>used to calculate artillery firing tables for the United States Army's Research Laboratory.
It was invented by J. Presper Eckert and John Mauchly at the University of Pennsylvania.
You might be interested in
How can i find these services
Tresset [83]

To find the services of wood floor repairing, refinishing contractor, you could always search on maps on internet the service nearby, or you can ask the neighbors or the shops, they have contacts with these people.

<h3>What are wood floors?</h3>

Wooden floors are the floors that are made by wood. The wooden floors started very back in America's homes. Wooden planks are installed over mud or cement, then laminate them.

Thus, to find the services of wood floor repairing, refinishing contractor, you could always search on maps on internet the service nearby, or you can ask the neighbors or the shops, they have contacts with these people.

Learn more about wood floors

brainly.com/question/2288600

#SPJ1

7 0
1 year ago
How many bits are used to direct traffic to specific services running on a networked computer?
Mars2501 [29]

Answer:

The correct answer is 16 bit.

Explanation:  

The main role of the transport layer provided the communication channel of the process which are running in a different host. When the information flows there is always traffic that is arisen but the transport layer aimed is that process will go at the correct node and received at the proper destination. The 16-bit number specifies that the process or node is running in the networked traffic.

3 0
3 years ago
Hiiiiiiiiihwdawdfgthnythgrfergthyjuhgfd
Lilit [14]

Answer:

Your answer would be gas.

Explanation:

Steam is just water just evaporated.

3 0
2 years ago
Read 2 more answers
Effective presentations vary the color scheme on each slide.<br><br> True<br> False
KengaRu [80]

Answer:

TRUE

Explanation:

7 0
3 years ago
Read 2 more answers
An internet ________ is a collection of utility programs designed to maintain your security and privacy while you are on the web
Kazeer [188]

An<u> internet security suites </u>is a collection of utility programs designed to maintain your security and privacy while you are on the web.

<h3>What is Internet Security Suite?</h3>

As the name is called, an Internet Security Suite is known to be a kind of a protection services where all your security requirement are known to be in one package.

Note that they are called an all in one computer security packages that a person can have and it come with an anti-virus scanner, as well as an anti-spyware scanner, email protection, and others.

Therefore, An<u> internet security suites </u>is a collection of utility programs designed to maintain your security and privacy while you are on the web.

Learn more about internet security suites from

brainly.com/question/16341928
#SPJ1

4 0
11 months ago
Other questions:
  • In Java Write a program that prompts the user for a name (any String value would work for testing), and print a hello message to
    15·1 answer
  • If the list above is named list1 and is implemented as a list, whatstatement would you use to find the number ofelements?list1.s
    9·1 answer
  • Edhesive 3.2 Lesson Practice question 1
    5·1 answer
  • A(n) _____________ is a system that prevents a specific type of information from moving between untrusted networks and private n
    9·1 answer
  • What is the simplest way to permanently get rid of an unwanted file?
    9·1 answer
  • A network technician is designing a network for a small company. The network technician needs to implement an email server and w
    7·1 answer
  • The merge sort algorithm____________.A. Can be used only on vectors of even length.B. Works by reducing vectors down to the base
    9·1 answer
  • A10:A20 Refer to values in
    8·1 answer
  • Can you explain the difference between software and hardware? Tell me 3 examples of each one.
    10·1 answer
  • A) Calculate the checksum of following 2 bytes: 00110101 and 10101100, and fill in the blank:
    14·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!