1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
lozanna [386]
3 years ago
5

Who is the father of modern computer?​

Computers and Technology
2 answers:
arsen [322]3 years ago
8 0
Alan Turing is considered by many to be the father of modern computer science as the world knows it. He formed the concept of the algorithms and computations with one of his inventions, the Turing machine.
nydimaria [60]3 years ago
7 0

Answer:

I would say Alan Turing is the father of the modern computer

You might be interested in
How do I convert years to days on Python. For example, if I were to enter 3 years it should output "You are 1095 days old".
Scorpion4ik [409]

years = int(input("Enter the # of years: "))

print("You are "+str(years*365)+" days old")

I wrote the code in python 3.8. I hope this helps!

6 0
3 years ago
What is a quick way to determine if a site might contain reliable information?
xz_007 [3.2K]
<span>The best and most correct answer among the choices provided by the question is the fourth choice.

A way of determining that a site is realiable is examining comments about the <span>webpage.</span></span><span>
I hope my answer has come to your help. God bless and have a nice day ahead!</span>
5 0
3 years ago
Read 2 more answers
Which type of firewall policy calls for a firewall to deny all traffic by default?
charle [14.2K]
Restrictive policy is a kind of policy calls for a firewall to contradict all traffic by default. The first rule denies all traffic on any service and using any port. To permit a specific type of traffic, a new rule must be placed ahead of the deny all rule. A firewall should enforce the overall policy recognized by the network administrator. Enforcement is controlled mainly over setting up packet filtering rules which is a rule base comprises a set of these rules. 
3 0
3 years ago
What type of hardware enables users to interact with a computer? Check all that apply. the CPU the hard disk drive the keyboard
valentina_108 [34]

Answer:

the keyboard

the monitor

the mouse

Explanation:

just took test

6 0
4 years ago
Read 2 more answers
Which search strategy is most similar to greedy search?
lesya692 [45]

Answer:

I think the answer would be A.

Explanation:

If I'm wrong plz let me know (I think I may be wrong)

8 0
3 years ago
Other questions:
  • A(n) ____ is an attack that takes advantage of a system vulnerability.
    7·1 answer
  • A(n) _____ can be used to convert digitized documents into ascii (american standard code for information interchange) text that
    6·1 answer
  • What is an efficient way to ensure that the code is working as per the acceptance criteria/business requirements? (1 correct ans
    11·2 answers
  • Ontext clues can be used to determine the _____ of an unfamiliar word
    11·1 answer
  • Which of the following is not given to a client computer when it is first installed on a TCP/IP network so that it has the appro
    9·1 answer
  • What is the function of the kernel of an operating system? It is an application that allows the initial configuration of a Cisco
    7·1 answer
  • Write a program. Commence the change to be dispensed from a vending machine. An item machine can cost between $0.25 send a dolla
    9·1 answer
  • Here is something cool
    5·2 answers
  • What programming language supports relational databases?
    15·1 answer
  • If a while loop iterates forever,what is the most likely cause?
    12·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!