1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
Bas_tet [7]
3 years ago
14

Who made the first electronic device?

Computers and Technology
1 answer:
emmasim [6.3K]3 years ago
6 0
Joseph Henry in about 1835. He is American and he made something called a relay.
You might be interested in
Saving a file as a new filename can be accomplished through the Save As dialog box.
Arisa [49]

Answer:

True.

Explanation:

A dialog box is a small window that serves as a controlling element in computers. The name dialog box is suggestive that it is a window that helps the user to communicate and response with an answer.

There are several types of common dialog box such as open dialog box, save as dialog box, print dialog box, etc.

Save as dialog box is a window that enables the user to save a file with a new name and new location. Save as dialog box can be opened by going to the File menu and click Save as. After the Save as dialog box appears, the user is able to change file name, location, etc.

Thus the statement is true.

4 0
4 years ago
Which term describes a Cloud provider allowing more than one company to share or rent the same server?
azamat

The term that describes a cloud provider allowing more than one company to share or rent the same server is known as Multitenancy.

<h3>What is a cloud?</h3>

A third-party business offering a cloud-based platform, infrastructure, application, or storage services is known as a cloud service provider.

Companies often only pay for the cloud services they use, as business demands dictate, similar to how a homeowner would pay for a utility like electricity or gas.

Data for each renter is separated and inaccessible to other tenants. Users have their own space in a multi-tenant cloud system to store their projects and data. Multi-tenant cloud system helps in the clouding of private and public sectors.

Thus, Multitenancy is the term used to describe a cloud service that permits many businesses to share or rent the same server.

To learn more about cloud, refer to the link:

brainly.com/question/27960113

#SPJ2

3 0
1 year ago
Read 2 more answers
Which of the following is a form of intrapersonal communication?
Citrus2011 [14]
Intrapersonal communication is you are also a sender and receiver within yourself. For example your inner thought, daydream, and private diaries.
7 0
3 years ago
Read 2 more answers
When an interrupt transfers control to an operating system, a Kernel stack area separate from the stack of the interrupted proce
Roman55 [17]

Answer:

Control is transmitted to the operating system when an interrupt happens, which determines what action is to be done to be taken or usually what interrupt services.

  • If the kernel leaves data in the memory space of a user program when returning from a system call, it may be possible for a malicious user to use this data to find out about other processes.
  • In these systems, the kernel synchronizes by preventing interrupts in critical sections with interrupt handlers on a processor.
  • Operating system may crash if it controls the interrupts because a poorly written user program does not provide sufficient stacking room.
5 0
3 years ago
Which of the following domains do NOT need software vulnerability assessments to mitigate risk from software vulnerabilities?A.
aliya0001 [1]

Answer:

I dont think that these four do not need because When we are discussing risk management, you can examine domains separately. Each domain represents a specific target. Some attackers have the skill they focus on the User Domain. Other attackers may be experts in particular applications, so they focus on the System/Application Domain. Similarly LAN and Workstation Domain.

Explanation:                                                        

When a threat exploits a vulnerability it is a loss. The impact determine the severity of the loss. A threat is  potential to cause a loss.  Threat as any activity  represents a possible danger. Threats  cannot be destroyed, but they  controlled. Threats have independent probabilities.For example, an attacker  attacking Web servers hosted on Apache. There is a company that can stop this attacker from trying to attack. A company can reduce or eliminate vulnerabilities . Threats are  exploit vulnerabilities that result in the loss of confidentiality, integrity, or availability of a business asset. In other words, risks to confidentiality, integrity, or availability represent potential loss to an organization. Because of this, a significant amount of risk management is focused on protecting these resources.            

           

5 0
4 years ago
Other questions:
  • Given a 13 bit address bus, how many unique addressed could be accessed? g
    7·1 answer
  • What are paragraphs separated by
    9·1 answer
  • What is the outside of an iPhone called?
    9·2 answers
  • The GNU/Linux operating system comes with many built-in utilities for getting real work done. For example, imagine you had to an
    10·1 answer
  • Which option identifies the two natural wind patterns that move air masses in the United States?
    5·2 answers
  • If you are interested in working for a specific company, what type of job site should you look at for opening?
    12·1 answer
  • When are bar charts most commonly used
    10·1 answer
  • Which of the following groups is NOT located on the Home tab?
    14·2 answers
  • What does the poster exemplify?
    15·2 answers
  • What are the characteristics of the Outlook Rules Wizard? Check all that apply.
    6·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!