1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
polet [3.4K]
4 years ago
9

What was the ENIAC computer and how was it used/what for?

Computers and Technology
1 answer:
nataly862011 [7]4 years ago
3 0
It was a government computer used for calculating artillery firing tables.



I hope this helps you, and please don't forget to say thanks and give brainliest! It really helps out!
You might be interested in
Describe the concepts of Defense in Depth and Detection in Depth. Compare and contrast. What's different? What's similar?
olchik [2.2K]

Answer:

 The main concept of the defense in depth is that the various defensive mechanism series are used for protecting the data and the information in the system. This approach is basically used multiple layers to control the cyber security. It also mainly provide the redundancy for controlling the security failure in the system.

The detection in depth basically provide the redundant overlapping approach and it is used for detecting the security and also accomplish the response that are available in the security detection.  

5 0
4 years ago
The function ________ comprises one or more statements that are executed when the function is called.
spin [16.1K]

Answer:

Option B(Body) is the correct answer for the above question.

Explanation:

The function is a defined processor of some specific task, which is used to perform some action of the task. The function is of two types one is predefined, which is defined by the compiler and, the other is user-defined, which is defined by the programmer. Any user-defined function has three parts--

  • Function prototype: It states the type of function.
  • Function body: It holds the collection of instruction that needs to perform by the function.
  • Function call: From where the function is called.

The above question asked about the term, which holds the statement of the function and that term is function Body, which is defined above. So the answer body, which is stated from the option 'B'. Hence 'B', is the correct option while the other is not because--

  • Option 'A' states about the header, which is not the part of the function
  • Option 'C' states about data type, which defines the types of data.
  • Option 'D' states none of these, but the answer is option B.
  • Option 'E' states about the definition, which is not the correct answer.
5 0
3 years ago
True / False
blagie [28]

Answer: True

Explanation:

Variable length instructions generally implemented by CISC processors use memory more efficiently than fixed length instruction of RISC processors sets because CISC supports array whereas RISC does not. Also CISC uses more complex addressing modes which consumes less memory cycles and the the program is also reduces. In Fixed length instruction in RISC processor the simple instructions has to be used a number of time which leads to more memory cycles.

7 0
4 years ago
Your company collects and stores security camera footage. Within the first 30 days, footage is processed regularly for threat de
Sliva [168]

Answer:

<em>For the very first 30 days, use Google Cloud Regional Storage, then switch to Coldline Storage.</em>

Explanation:

Coldline Storage is a cost-effective, extremely durable information archiving, online backup, and disaster recovery web host.

Your information is available in seconds, not hours or days, unlike many other "cold" storage providers.

5 0
3 years ago
Table Setting in any occasion can add to the beauty and significance of the event. It may
Rudiy27

Answer:

HMMMM IM THINKING HMMMMM

Explanation:

7 0
3 years ago
Other questions:
  • which type of website would a business selling merchandise on the internet use? A person B information C commercial D social
    9·1 answer
  • Write a C++ function, lastLargestIndex that takes as parameters an int array and its size and returns the index of the last occu
    10·1 answer
  • If one department chair—a professor—can chair only one department, and one department can have only one department chair. The en
    13·1 answer
  • Who knows coding questions? Please help! Thanks.
    6·1 answer
  • Task 1 (25 points): In database [your Pitt username], create the following entity tables: movies actors locations Each tables lo
    7·1 answer
  • The spreadsheet below shows the age, grade level, major, and minor of four students in college. A purple background in the
    5·1 answer
  • Explain the simliparities or difference between a workbook , worksheet and spread sheet​
    5·1 answer
  • What does route print do?
    15·1 answer
  • How can you apply multimedia for study explain​
    11·1 answer
  • Assume a branch instruction bne $t1, $t2, Label is located in 0x00001840 in the instruction memory. The 16-bits branch address i
    6·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!