1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
Yuliya22 [10]
3 years ago
13

​_____ was the first commercially successful computer. ​z3 ​eniac ​univac ​colossus

Computers and Technology
1 answer:
Lera25 [3.4K]3 years ago
7 0
 <span>​ENIAC was the first commercially successful computer, released in 1946.
</span>The name ENIAC Electronic Numerical Integrator And Computer<span>).</span><span>
 It was </span>used to calculate artillery firing tables for the United States Army's Research Laboratory.
It was invented by J. Presper Eckert and John Mauchly at the University of Pennsylvania.
You might be interested in
What can Strings store
horsena [70]
A string is generally considered as a data type and is often implemented as an array data structure of bytes (or words) that stores a sequence of elements, typically characters, using some character encoding. String may also denote more general arrays or other sequence (or list) data types and structures.
5 0
4 years ago
Read 2 more answers
A (n) _______________ is a dot or other symbol positioned at the beginning of a paragraph
larisa86 [58]

Answer:

Bullet

Explanation:

I've written a paragraph before. I should know!

3 0
3 years ago
Read 2 more answers
List and briefly describe passive and active security attacks.
Rama09 [41]

Answer:

Passive security attack are the unauthorized disclosure in the network attack. In this type of security attack a system are use for monitoring and sometimes scanning the open port. It basically include the monitoring the unprotected data and traffic analysis.

On the other hand, active security system modify the transmitted data and gain the unauthorized access from the computer system.

This type of security attack basically monitor the file transfer and electronic mail from the attacks which can be pass in the form of viruses in the computer system.

4 0
3 years ago
Which were important characteristics of Sparta's government? Select the two correct answers. A. Oligarchs were able to hold a lo
Cerrena [4.2K]

Answer:

Sparta's government was a combination of a monarchy, a democracy, and an oligarchy. and oligarchs were able to hold a lot of power in government.

Explanation:

Spartans government loved to have power more than anyone in their century.

4 0
3 years ago
Read 2 more answers
Price of Tether coin right now?<br> Don't answer if u don't know.
Vaselesa [24]

Answer:

Honestly I believe its $1

Explanation:

It just stays on $1 don't know how tho

7 0
3 years ago
Other questions:
  • Electronic ledger that tracks mathematical data
    15·1 answer
  • Which of the following is an example of a good listening skill? A. Replying to the caller as "you" rather than using his or her
    9·2 answers
  • What is constructive criticism?
    5·1 answer
  • _____ is a school-to-work program that provides the student with paid employment, school credit, and grades while participating.
    14·2 answers
  • Provide a few examples of how cryptography actually secures data.
    8·1 answer
  • How to convert 23.125 to binary (Hex) using the double - precision representation
    6·1 answer
  • Percentage-wise, which renewable energy source is used most?
    13·1 answer
  • A-1 grdening supply is preparing a reprt to hand out to the customerez in pointes form only.why should the reprts writers avoid
    9·2 answers
  • When is mail merge an effective productivity tool<br>​
    5·2 answers
  • Please help with this:
    10·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!