1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
KengaRu [80]
3 years ago
9

What is the full form of ABC?

Computers and Technology
2 answers:
Lerok [7]3 years ago
4 0

Atanasoff Berry Computer

nlexa [21]3 years ago
3 0

Atanasoff  Berry Computer

Hope it help you very much

You might be interested in
You have several marketing documents that are published through AD RMS. However, you have three new marketing employees that req
snow_lady [41]

Answer:

Document unauthorized

Explanation:

this way new employees will not try to open

5 0
3 years ago
Create a program with a script that calls the following functions: getinput, calculateGPA, createBor, and printResults. The prog
Licemer1 [7]

Answer:

The script is given below

Explanation:

%%driver

[grades , num_semester ] = getInput( ) ;

gpa = calculateGPA(grades , num_semester) ;

printResult( gpa) ;

createBar( num_semester , grades ) ;

%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%

function [grades , no_semester] = getInput()

no_semester = input("How many semesters in college " );

for i = 1: no_semester

grades(i) = input( " Enter semester GPA ") ;

if( grades(i) > 4 && grades(i) < 0 )

disp( " Entered Grades are out Of Bounds ") ;

end

 

end

end

%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%

function GPGA = calculateGPA(grades , no_semester )

sum = 0 ;

for i = 1 : no_semester

 

sum = sum + grades(i) ;

 

end

 

GPGA = sum/( no_semester);

 

 

end

%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%

function bargraph = createBar( semester_num , grades )

 

bargraph = bar( grades, semester_num) ;

end

%%%%%%%%%%%%%%%%%%%%%%%%%%%%%

function f = printResult( gpga )

 

fprintf( " Your GPGA is : %d \n " , gpga);

 

if( gpga >= 3 && gpga <=4 )

fprintf( " exception good work ") ;

 

end

if( gpga >= 2 && gpga <= 3)

fprintf( " You are average " ) ;

end

if( gpga >= 1 && gpga <= 2 )

fprintf( " you FAIL" ) ;

end

end

8 0
3 years ago
A network administrator was told by the Chief Information Officer (CIO) to set up a new office with a network that has redundanc
balandron [24]

Answer:

"Mesh topology" is the correct answer.

Explanation:

  • A mesh topology seems to be a network configuration where there has been an interconnection between each hardware and communications system. This topology configuration allows the distribution of many of these signals, although one of the connexons starts going down.
  • This topology needs to connect each destination to any other end destination, thus creating a completely pointless channel.
3 0
3 years ago
Which devices are managed through device management?
Ratling [72]
Answer:
computers and Mobile phones ( including game consoles and tablets) are managed through device management
Explanation:
Device management includes a type of security software used to monitor,secure and manage systems such as mobile phones computer laptops and desktops, Tablets and smart televisions as well as Game consoles. It as well involves the management,operation and maintenance of the physical aspect of the systems from external threats/intruders
Anti virus software is an example of a device management software used to protect systems from malware, by detecting and removing them and also by preventing them.
Firewall is a complete device management tool because it detects and prevents intruders and virus from penetrating the system software
7 0
2 years ago
Linux is a kind of software whose code is provided for use, modification, and redistribution, at no cost. What kind of software
Scilla [17]

Answer:

Linux is a type of open-source software. The entire premise of open-source code is to make it as easy for people to develop and share as possible, instead of use as a vehicle to make money. This way, the collective knowledge of the community can make the program as secure and user-friendly as possible.

Explanation:

6 0
3 years ago
Other questions:
  • Programmers use _____ languages in the Rapid Application Development (RAD) methodology to facilitate code reuse?
    5·1 answer
  • A block style business letter is:
    5·1 answer
  • How do i fix this to make it run ???
    9·1 answer
  • What reforms were made by the British government in India after the war of independence? write any three
    5·1 answer
  • Question 1 (1 point)
    5·2 answers
  • Which of the following class definition defines a legal abstract class Group of answer choices public class Rectangle abstract {
    15·1 answer
  • I'm having trouble with an assignment of mine. I'm making a text based adventure game for extra credit in my class and I'm stuck
    12·1 answer
  • Insertion point shows where the typed text will appear.
    5·1 answer
  • Paragraph on uses of computer 100 words plss​
    11·1 answer
  • The scope of a temporary table is limited to what?
    10·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!