1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
alina1380 [7]
3 years ago
8

कम्प्युटर को पहिलो पुस्ता भनेको के हो?​

Computers and Technology
2 answers:
Ann [662]3 years ago
5 0
I don’t understand the question
Oksi-84 [34.3K]3 years ago
3 0

Answer:

Look up Charles Babbage. He built a machine that is viewed as the predecessor of the modern computer.

You might be interested in
1) It is possible to email a document<br> directly from the Word application.<br> O FALSE<br> O TRUE
QveST [7]

Answer:

True

Explanation:

8 0
3 years ago
How can i setup a mesage room and also want to hangout ??????
bixtya [17]

Answer:

no

Explanation:

4 0
2 years ago
A ____ network (or workgroup) consists of multiple windows computers that share information, but no computer on the network serv
ra1l [238]
<span>A peer-to-peer network (or workgroup) consists of multiple windows computers that share information, but no computer on the network serves as an authoritative source of user information. domain-based peer-to-peer server-based centralized</span>
5 0
3 years ago
What type of account should you use fro signing in to your windows 8 computer if you want to synchronize your settings on other
nikklg [1K]
You should use your Microsoft account because this will sync to all your windows devices.
8 0
3 years ago
List and briefly defined categories of security services.
Fynjy0 [20]
There are six categories of security services: authenticiation, access control, data confidentiality, data integrity, nonrepudiation, and availability service. First, is authentication service, which defines as the assurance that the communicator is legitimate and is the one that it claims to be. It can either be peer entity or data origin authentication. Second, access control which is to prevent any unauthorized uses of resources. After one is being authenticiated, then this service limit/controls who access? what accessing rights to the resources are allowed depending on the identified individuals. Data confifentiality: the protection of data from unauthorized disclosure. Data integrity: the assurance that data received are exactly as sent by an authorized entity (e.t.c, contain no modificafion, insertion, deletion, or replay).
7 0
4 years ago
Other questions:
  • True or false: when considering data backups, it is most important to verify that the integrity of the backup file or data is va
    9·1 answer
  • What is the most consistent item regardless of the software used in BI?
    5·1 answer
  • The Coins class was created to hold all your loose change, kind of like a piggy bank! For this exercise, you are going to simula
    15·1 answer
  • For large and complex amounts of information, storing the information is best achieved by using what?
    5·1 answer
  • Which of the following allows the transmission of voice and often video communication over the internet?
    12·1 answer
  • When individuals not involved in the development process are asked to test the game, this is called ________ group testing.
    11·1 answer
  • Which of the following best describes a feedback loop?
    11·1 answer
  • Brody is concerned that he is going to exceed the quota set for his mailbox. Where should he go to access the Mailbe
    10·1 answer
  • Write a deffrentiate between inkjet peinter and laser printer​
    8·1 answer
  • (Reverse number) Write a program that prompts the user to enter a four-digit inte- ger and displays the number in reverse order.
    9·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!