1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
Anit [1.1K]
4 years ago
11

First generation computers used vacuum tube technology true or false

Computers and Technology
1 answer:
Murrr4er [49]4 years ago
7 0

I guees the correct option is True.

Vacuum Tubes technology was used in the first generation of computers.

You might be interested in
You acquire a network vulnerability-scanning tool and try it out on a network address segment belonging to people at your univer
inna [77]

Answer and Explanation:

  • The speculates on either the morality of transmitting vulnerabilities to an individual over all the internet. The node is a very possible target of a criminal charge, these are highly recommended in terms of the problem not just ethical.
  • The question argues the etiquette of telling a compromised network infrastructure to something like a domain admins or security guard. Throughout this case the primary admin issue is power. Informing individuals about both the potential problem is prudent or legal, which is also preferable to recommend the future course of action.
  • The speculates on either the moral values of leveraging the infrastructure for a mild vulnerability. This same proprietor including its node is truly likely to be victims of a prospective infringement, and therefore it is advantageous to notify him including its problem that the equitable access is considered to become an ethical manipulate susceptibility for possessor data as well as potential threats to understanding.
  • The theories a small flaw throughout the channel's ethics. The device's leader is the likely guilty party of even a future offense to notify him of both the actual problem. The law is ridiculous as well as comparable to trying to hack without permission vulnerability it's immoral vulnerability.
  • The content upon the ethical principles of manipulating the channel's small susceptibility. The device's owner seems to be the likely casualty of such a future offense to instruct him including its subject. As well as trying to sell him much farther documents socially responsible borders. It's the holder who has so far notified the weakness she perhaps she has just one option to obtain products and services. Having clear data on the sale still seems to be ethical.
  • The issue argues mostly on ethics with repairing security flaws without channel assent. Although the controlled variable of the modules has been the true likely target of such a future infringement, exploiting susceptibility without permission is appropriate as well as unethical, this same objective being honorable as well as noble.
8 0
3 years ago
A student wants an algorithm to find the hardest spelling word in a list of vocabulary. They define hardest by the longest word.
makkiz [27]

Answer:

Initialize the “longest word” by an empty string and update it when a longer word is found

Explanation:

import java.util.stream.Stream;

public static String findLongest(String[] spellingList) {

   return Stream.of(spellingList).reduce("", (longestWord, word) -> (

       longestWord.length() < word.length() ? word : longestWord

   ));

}

5 0
3 years ago
Need help on k12 homework
Natalija [7]
Trying you're best and show you're work
7 0
3 years ago
Read 2 more answers
When using SSH to remotely access a Cisco router, can you see the terminal password?
viva [34]

Answer:

No, you can't.

Explanation:

SSH is an acronym for Secure Socket Shell and is a networking protocol used for providing remote authentication through a public-key cryptography over an unsecured network such as the internet.

Hence, it is a network protocol that is commonly implemented by using a client-server model; where a computer acts as a SSH client while the other network device acts as the host or SSH server.

When using SSH to remotely access a Cisco router, you cannot see the terminal password because it is Linux based and encrypted through the use of symmetrical encryption, asymmetrical encryption or hashing

5 0
3 years ago
Plz ans this single technical question​
Alinara [238K]

Answer:

i dont know but i hope their is some one that can help you

Explanation:

7 0
3 years ago
Other questions:
  • An effective password can help prevent
    11·2 answers
  • System memory is on a computer motherboard?
    14·2 answers
  • 6. Data are given in comma delimited text file for a toy rocket. The rocket is powered by pressurized water that is discharged f
    14·1 answer
  • The ____ allows a core to communicate with other cpu components, such as the memory controller and other cores
    14·1 answer
  • Access-lists pose a logical problem which often has more than one solution. Can you think of a different set of rules or placeme
    8·1 answer
  • Which of the following Web sites would be MOST credible?
    6·1 answer
  • Why is the technology so effective in tracking contacts
    7·1 answer
  • Mha rp anyone? ima be baby shoto
    14·2 answers
  • Horizontal and vertical flips are often used to create ___.
    12·1 answer
  • What is another term used for next generation firewalls
    12·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!