1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
Savatey [412]
3 years ago
5

How are modern computers different from eniac?

Computers and Technology
1 answer:
Natalka [10]3 years ago
8 0
Modern computers use in side a memory board to store info but back then you would use flappy disks   
You might be interested in
_________ products/services are more quickly consumed,usually in a single use or a few usage occasions.
stiks02 [169]

Answer: Non durable

Explanation:

Non durable products/services are more quickly consumed,usually in a single use or a few usage occasions. Examples of these product include daily eatables which has to be consumed within a few days or it will perish and other services such as medical and etc.

4 0
2 years ago
Ximena noticed that Sofia had created a network bridge on her new laptop between the unsecured wireless network and the organiza
ratelena [41]

Answer:

A bridge could permit access to the secure wired network from the unsecured wireless network

Explanation:

A bridge is connecting device in networking that connects two different network devices. This device is suitable to connect a secure network with an unsecured network.

8 0
3 years ago
Please!! I need help, this is due by tonight!!!
lyudmila [28]

Answer:

sorry if it is too late but I think it is d

Explanation:

4 0
2 years ago
A section at The top of the page that makes it easy for a recipient to respond to a letter is called an
Vesna [10]

its a  return address

8 0
3 years ago
Read 2 more answers
Identify the term that refers to the right to control access to ourselves and to our personal information.
g100num [7]

Answer:

Privacy

Explanation:

In the privacy control access mechanism it control the data of the personal information.The model P-RBAC that is the framework of key component that extended the RBAC model that gives the complex  policy of privacy such as obligations.In the P-RBAC we defined the privacy awareness permission.

The privacy control access mechanism giving the right to control the personal information.

7 0
2 years ago
Other questions:
  • What can a folder on a computer contain?
    13·2 answers
  • Mark is learning to make logos. Once he finishes learning, he plans to freelance. Which software is most preferred to create art
    16·1 answer
  • Can run mobile-style apps in the area known as the start screen, while running traditional software in the more familiar desktop
    6·1 answer
  • A network monitor records the following information while recording a network connection.
    9·1 answer
  • Which of the following is NOT true of constructors? Question 6 options
    14·1 answer
  • What is the Matlab command to create a column vector with 11 equally spaced elements, whose first element is 2 and whose last is
    8·1 answer
  • Which of the following is a characteristic of the college savings plan
    9·2 answers
  • Write a program that asks the user how many numbers will be entered and then has the user enter those numbers. When this is done
    7·1 answer
  • What are some best practices for file management
    8·1 answer
  • Which of the following cannot be used in MS Office.<br> Joystick<br> Scanner<br> Light Pen<br> Mouse
    6·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!