1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
pochemuha
3 years ago
13

Who programmed the UNIVAC computer and literally "debugged" the first computer?

Computers and Technology
2 answers:
marysya [2.9K]3 years ago
7 0

Grace Hopper is the first
WINSTONCH [101]3 years ago
7 0
Grace hopper im pretty sure
You might be interested in
What job does a back-end developer perform?
Diano4ka-milaya [45]

Answer:

Handles what happens behind the scenes on websites

Explanation:

The website back end is made up of server, an application, and a database. The back-end developer builds and coordinate these components together. Back end developers manage the technical side of the websites (that is what the users do not see on the website).

The back end developer needs to know how to program using PHP, java, Python, Ruby, as well as use tools such as MySQL, Oracle, and SQL Server.

6 0
3 years ago
Give an example of a situation in which a compromise of Confidentiality leads to compromise in Integrity.Situation where confide
il63 [147K]

Answer: An example of such a scenario would be when the user name and password meant to allow access to a customers bank account statement is cracked by unauthorized people this causing alteration (in the form of data diddling attacks) in the data contained in the statement. This is a compromise in integrity.

Explanation:

Confidentiality entails securing things people want to remain secret. An account statement of a bank customer is a confidential document which is to be kept secret. A password allows access to it.

Integrity implies receiving a sent data/information as accurately as it came from a sender. A data diddling attack alter integrity because the original information is altered by an unauthorized person.

7 0
3 years ago
Sometimes a virus will disable a system’s antivirus protection or add exceptions which prevent its being detected. Running an an
nikklg [1K]

Answer:

A boot-up CD or a USB

Explanation:

6 0
4 years ago
Write the definition of a function named averager that receives a double parameter and return-- as a double -- the average value
lys-0071 [83]

Answer:

Following are the definition of function  

double averager (const double &x)  // function definition

{

static double z = 0.0;  // variable declaration

static size_t c = 0;

 c=c+1;  // increment of c by 1

z =z+ x;  // adding value  

return z /c ;   // return average  

}

Explanation:

Following are the description of statement  

  • Create a function averager of double type that holds a parameter "x" of the double type .
  • In this function we declared a variable "z" of a static double type that value is initialized by 0.
  • The static variable is used to retain value.
  • Declared a variable "c" of size_t type that holds a value 0 .
  • After that increment the value of c by 1 .
  • adding the value of "z" variable to the "x" and storing the result into the z variable.
  • Finally return the average value  
4 0
3 years ago
Complex layouts are often created in Java GUIs by using multiple _____ components
mixas84 [53]

Answer: JPanel

Explanation: JPanel is the kind of panel present in the Java that stores the collection of the elements . It has various function being a part of the Java Swing cluster such as the handling of the elements,organizing them ,making layout patterns,etc. As a drawback to these qualities , JPanel displays the property of not having the title bar for the title/heading.

4 0
3 years ago
Other questions:
  • _____ is the network protocol that deals with the routing of packets through interconnected networks to the final destination.
    9·1 answer
  • PLEASE FILL IN THE BLANK FOR THESE POINTS!!!!!
    15·2 answers
  • Which of the following subjects is considered technical education
    11·1 answer
  • Universal Containers has strict security model enforced through object, field, and row-based security mechanisms. The Architect
    9·1 answer
  • Write a program called DeliveryCharges for the package delivery service in Exercise 4. The program should again use an array tha
    9·1 answer
  • Features present in most GUIs include _____.
    11·2 answers
  • Analyze the map below and answer the question that follows. A topographic map of Northwestern Russia. Areas on the map are circl
    13·2 answers
  • Write a function endpoints that takes a list of numbers (eg. [5, 10, 15, 20, 25]) and returns a new list of only the first and l
    15·1 answer
  • Which sentence describes a biotechnology method of treating sulfur liquor in the paper industry?
    11·1 answer
  • Any task done by software can also be done using computer hardware, and any operation performed directly by hardware can be done
    8·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!