1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
garik1379 [7]
3 years ago
13

What devise did george stbitz contribute?

Computers and Technology
1 answer:
Gala2k [10]3 years ago
8 0
He did not devise anything but he contributed good work to the scientific community

You might be interested in
(TCO B) The symbol shown as a three-sided box that is connected to the step it references by a dashed line is what?
belka [17]

Answer: annotation symbol

Explanation:

The symbol shown as a three-sided box that is connected to the step it references by a dashed line is referred to as the annotation symbol.

The annotation symbol is referred to as a flowchart symbol that is used to hold comments. It is a tag that's applied to a family so that the family can be identified in a project.

4 0
3 years ago
Select the correct answer from each drop-down menu.
Troyanec [42]

Answer:

... where drop down menu? from what i got, back up ur data daily

Explanation:

5 0
3 years ago
Blank uses computer resources from multiple locations to solve a common problem.
DedPeter [7]

Answer:

Grid computing

Explanation:

3 0
3 years ago
OSHA standards appear in the ___________ and are then broken down into ____________.
Alisiya [41]
OSHA standards appear in the Code of Federal Regulations (CFR) <span>and was then broken down into two parts. It contains standards to ensure a </span>
4 0
3 years ago
You open a folder Properties box to encrypt the folder, click Advanced, and discover that Encrypt contents to secure data is dim
yaroslaw [1]

Most likely a virus has attacked the system and is disabling encryption is the most likely problem.

c. Most likely a virus has attacked the system and is disabling encryption.

<u>Explanation:</u>

The end users can protect the folder by enabling encrypt the folder or files. But in windows encrypting the file or folder is not available. The computer management console is used to open all other services such as risk management, performance management extra.

In some other operating encryption of folder or files is allowed.  Third-party software is available to protect folder or files once the third party used any files possible to share outside the world.

As far as my knowledge there is encrypting technology is available in the windows operating system.

5 0
3 years ago
Other questions:
  • Respond to the following in three to five sentences. Select the workplace skill, habit, or attitude described in this chapter (a
    12·1 answer
  • True or false: although the first personal computers were available as early as the 1970's, the creation of the world wide web (
    11·1 answer
  • What technological changes at the turn of the twentieth century affected american life?
    6·1 answer
  • ​In addition to joint application development, another popular user-oriented method is _____, which resembles a condensed versio
    14·1 answer
  • The program has a compilation error because s is not initialized, but it is referenced in the println statement. The program has
    8·1 answer
  • List the names of 3 computer scientists
    6·2 answers
  • Write the definition of a function named rotate4ints that is passed four int variables. The function returns nothing but rotates
    9·1 answer
  • Many Web browsers allow users to open anonymous windows. During a browsing session in an anonymous window, the browser does not
    14·1 answer
  • Public-key encryption schemes are secure only if the authenticity of the ___________ is assured.
    12·1 answer
  • Within a master slide template, you can create a custom slide layout. Place the steps to complete this task in the correct order
    14·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!