1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
lukranit [14]
3 years ago
13

Vannevar Bush imagined a desktop computing machine that would allow people to access data stored in various information centers

throughout the world. This device was called
Computers and Technology
1 answer:
Westkost [7]3 years ago
3 0
That device was call Memex.

Memex is taken from the word combination of memory and index. In 1945, an American engineer, inventor and a scientist, Vannevar Bush envisioned a device in which people can store and access their data information centers around the world.
You might be interested in
What is the first step you should take if unable to make bill payments on time?
Sphinxa [80]

Answer:

"talk to your landlord, creditors or bank about your financial situation to see if they can offer any leniency or a payment plan". just ask for extra time

Explanation:

7 0
2 years ago
The process of converting information, such as text, numbers, photos, or music, into digital data that can be manipulated by ele
SCORPION-xisa [38]

Answer:

The process of converting information, such as text, numbers, photos, or music, into digital data that can be manipulated by electronic devices is called Digitization

Explanation:

It is the process of converting “information in to a digital form”. Here the information are organized into bits. Mostly these data will be converted into the form of image. But these can be edited by converting once again into necessary format and even back to image too. There are specific tools which the user needs to install for editing the digital documents.

The reason why we need digitization is that

a) We want to convert hard copy into soft copy and store it in system.  

b) We would like to edit the data in the hard copy and preserve as a fresh copy.

4 0
3 years ago
IT professionals recognize that successful systems must be user-oriented, and users need to be involved, formally or informally,
bogdanovich [222]

Answer:

True is the correct answer for the above question.

Explanation:

  • The software is a collection of instruction which states the computer to how to do a specific work. The software developer only develops the software, but it is used by many users of the software who wants to do some specific task.
  • The developer creates a graphical event for users through which the user can use the software of the computer system for his personal use.
  • So the above line concludes that the software is for the user only. So the user interaction in software development is necessary which is also said by the question-statement. Hence the question statement is the true statement.
5 0
3 years ago
________ is an encryption standard used for secure transactions such as credit card processing and online banking. TLS DMZ White
Fynjy0 [20]

Answer:

TLS

Explanation:

In the field of computer security, TLS refers to Transport Layer Security it is closely related to the Secure Sockets Layer (SSL) although TLS is more commonly used these days. They are both techniques in cryptography that provides for the safe transfer of information between two parties (servers, systems and user applications)

TLS particularly provides a balance between transmission speed and data security through the use of symetric and asymmetric cryptography and the encryption and decryption key is the session key at both ends (sender and reciever), as such TLS has found usage in most advanced data exchange systems like credit card processing and online banking.

8 0
4 years ago
A mobile device user is having problems launching apps and texting. The user touches an app to launch it, but the app icon next
dalvyx [7]

Answer:

The screen protector may be interfering with the touch response

Explanation:

Screen protectors or commonly called screen guards are used to protect phone screens. In case they fall to the ground, these protectors act as shields to keep the phone screen from getting damaged. However screen protectors if not positioned or fixed properly may also cause hindrance to effective touch response as they become barriers to the touch screen.

8 0
3 years ago
Other questions:
  • Search engines that search other search engines are called
    12·2 answers
  • How would you display all your photographic work in your résumé, if you have a large volume of work?
    10·1 answer
  • Your computer has a single hard disk w/ a single volume used by the C:\ drive. You have previously upgraded the disk to a dynami
    6·1 answer
  • Which of the following is not given to a client computer when it is first installed on a TCP/IP network so that it has the appro
    9·1 answer
  • Which precaution should be taken when working inside computer systems??
    9·1 answer
  • (Help please I don't know what to choose because it's both text and email but I can only pick one. HELP!!!!!!!!!!)
    6·2 answers
  • In working on the conceptual design of the new database, Ken determines that the "office" field in one of the tables must includ
    8·1 answer
  • FREE 100 POINTS + FIRTS AWNSER = BRAINIST
    8·2 answers
  • Drag each label to the correct location on the image.
    7·1 answer
  • . Define the process of Technological relationship
    12·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!