1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
polet [3.4K]
3 years ago
9

What was the ENIAC computer and how was it used/what for?

Computers and Technology
1 answer:
nataly862011 [7]3 years ago
3 0
It was a government computer used for calculating artillery firing tables.



I hope this helps you, and please don't forget to say thanks and give brainliest! It really helps out!
You might be interested in
A(n) _____ identifies how you feel about an activity or subject. computer calculator interest inventory both b and c
Alexeev081 [22]

Answer:

Interest

Explanation:

3 0
3 years ago
Read 2 more answers
What are the ethical implications of online social media after someone has died?
ZanzabumX [31]
<span>Think about the things people might have wanted private, but after death they have no control.</span>
8 0
3 years ago
____ is a philosophy and a software and system development methodology that focuses on the development, use, and reuse of small,
LiRa [457]

Answer:

d.) Service-Oriented Architecture

Explanation:

Because its definition matches

4 0
3 years ago
HELP ME PLEASE
MAXImum [283]

Explanation:

Threats

Computer Security Threats are possible dangers that can affect the smooth functioning of your PC. These may be a small piece of adware or a harmful Trojan malware. In the present age, computer security threats are constantly increasing as the world is going digital. computer security threats

Types of Computer Security Threats

There are several types of computer security threats such as Trojans, Virus, Adware, Malware, Rootkit, hackers and much more. Check some of the most harmful types of computer Security Threats.

COMPUTER VIRUS

A Computer Virus is a malicious program, which replicates itself and infects the files and programs of your PC and can make them non-functional.

COMPUTER WORMS

A self-replicating computer program that spreads malicious codes, computer worms make use of the network to send copies of the original codes to other PCS. It can also go to the extent of sending transferring documents utilizing the email of the user.

SCAREWARE

Scareware is a malware that tricks victims to buy software by displaying fake virus alerts. A scareware infected PC may get pop-ups of fake malware threats and to get rid of those, users are prompted to purchase a fake anti-malware software.

KEYLOGGER

Also known as a keystroke logger, Keyloggers can track the real-time activity of a user on his computer. Keylogger runs in the background and records all keystrokes made by a user and passes the information to the hacker with the motive to steal password and banking details.

ROOTKIT

A rootkit is considered extremely dangerous as they appear to be legitimate files and deceives the computer user. Rootkit masks viruses and worms and makes them appear as necessary files. These are very difficult to remove and only an antivirus with the anti-rootkit feature can remove a rootkit.

Tips for Best Computer Security

For best computer security, you must follow certain guidelines, which are also called computer best practices. 1. Use the best antivirus software, which not only provides protection to your PC but also internet protection and guards against cyber threats. 2. Do not download untrusted email attachments and these may carry harmful malware. 3. Never download software from unreliable sites as they may come with a virus that may infect your system as soon as you install the software.

4 0
2 years ago
Advantage of computer<br><br>​
slavikrds [6]

Explanation:

Computers help increase user productivity, and users become more productive at everything you do on the software running on the computer with a good understanding. For instance, when you have work on an Excel worksheet with a basic understanding, you can create, edit, delete, store, calculation, and print documents and letters. With all pre-existing technologies, all of these things were either impossible or much slower.One of the most useful advantages of computers is able to store and access vast amounts of data, which can be retrieved in the future. For example, a computer system and devices like eBook readers have enough storage capacity as they can store hundreds or thousands of books. Also, you can store movies, pictures, songs digitally, and documents on the computer, and can quickly find data accordingly and share information between devices. It reduces plastics and paper requirements that are used to make non-digital versions of the media.A computer has the ability to connect you to the network or the Internet. Once you connected, you can search for any type of information and can download audio, video, movies, documents, and more.Computers help you to connect with your friend, family, or other relatives with long-distance through e-mail and social networking.

4 0
3 years ago
Other questions:
  • when reading a recipe ingredients witch substance make the rice an unhealthy choice if it is present in a high amount
    13·1 answer
  • The ability of services to grow or shrink based on need is called __________.
    14·1 answer
  • Which cost of purchasing a franchise would you still have if you start your own business​
    12·1 answer
  • PHP is based on C rather than ______.
    5·1 answer
  • When planning your website, what is one of the key things you should consider
    12·2 answers
  • True or false
    10·1 answer
  • Encoding a video format and then decoding it during playback is one of the functions of MPEG-4 and H.264 file players. MPEG-4 an
    13·2 answers
  • How many constructors are there in the following class declaration?class CashRegister { public: CashRegister(); CashRegister(int
    8·1 answer
  • How many passes will it take to find the five in this list?
    14·2 answers
  • Choose the term that describes each step of the cycle.
    13·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!