1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
WINSTONCH [101]
3 years ago
12

What is the first computer was brought in nepal and for what purpose​

Computers and Technology
2 answers:
german3 years ago
7 0

Answer:

The first computer bought in Nepal was IBM 1401 which was brought by the goverment in lease for the populations census of 1972.

Helen [10]3 years ago
7 0

Answer:

There is not a long history of computers in Nepal.Nepal hired some types of calculators and computers for it's census calculation.Following list shows it's history in Nepal.· In 2018 BS an electronic calculator called "Facit" was used for census.· In 2028 BS census IBM 1401 a second generation mainframe computer was used.· In 2031 BS a center for Electronic Data Processing ,Later renamed to National Computer Center(NCC),was established for national data processing and computer training.· In 2038 BS ICL 2950/10 a second generation mainframe computer was used for census.· Now-a-days probably each and every institutions,business organizations,communication centers,ticket counters etc are using computers.

Explanation:

You might be interested in
Which type of front usually brings thunderclouds and storms
IrinaVladis [17]
Your anwser will be d
5 0
3 years ago
Read 2 more answers
Barry discovers that an attacker is running an access point in a building adjacent to his company. The access point is broadcast
qwelly [4]

Answer: Option (A) is correct

Explanation:

Evil twin is known as a fraudulent point of access in a Wi-Fi which tends to  appear to be honest and legitimate but is known as a set up to oversee on the wireless communications. Evil twin is referred to as the WLAN equal of a phishing scam.  This kind of attack is mostly used in order to steal passwords of an unsuspecting users, that is done either by by phishing or by monitoring the connection, this mostly involves developing a fake web site and thus luring people.

8 0
3 years ago
What is a computer memory <br>​
Alex_Xolod [135]

Answer:

In computing, memory is a device or system that is used to store information for immediate use in a computer or related computer hardware and digital electronic devices. The term memory is often synonymous with the term primary storage or main memory. An archaic synonym for memory is store.

5 0
3 years ago
Read 2 more answers
You have a network that uses a logical ring topology. how do messages travel through the network"
RSB [31]
Messages travel from one computer to another until they will find a proper computer to whom that message is addressed.
7 0
3 years ago
What is the area on a machine where work is actually being performed and
zhenek [66]

Answer:

Point of operation guarding

Explanation:

Point of operation guarding. Point of operation is the area on a machine where work is actually performed upon the material being processed. The point of operation of machines whose operation exposes an employee to injury, shall be guarded.

5 0
3 years ago
Other questions:
  • The fourth generation of computers was marked by the introduction of ____.
    11·1 answer
  • A ____________ is a set of commands which can be run by calling it by name. (Phyton)
    7·2 answers
  • What is a binary digit
    7·1 answer
  • You will be given a string, containing both uppercase and lowercase alphabets(numbers are not allowed).
    14·1 answer
  • Why don't I have friends?
    11·2 answers
  • Select three areas that should be included in a contract consultant’s business expense model.
    11·1 answer
  • What is a major benefit of working with a ready-to-use-cloud-based artifical intelligence (AI) vendor service?
    15·1 answer
  • Is e commerce a challenge or opportunity to the freight forwarder
    8·1 answer
  • If one of the resistors is turned off (I.e. , a light bulb goes out), what happens to the other resistors (light bulbs) in the c
    15·1 answer
  • Explain how information in an access log could be used to identify the true identity of an impostor who has acquired unauthorize
    13·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!