1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
babunello [35]
3 years ago
12

Which 1947 Invention paved the way for the Digital Revolution?

Computers and Technology
2 answers:
sergij07 [2.7K]3 years ago
8 0

Answer: I would like to say <u>transistors</u> which is a circiut board component im almost 90% sure lad :)

Explanation:

I hope this helps

have a great day :)

Norma-Jean [14]3 years ago
6 0

Answer:

Transistor

Explanation:

1947-1979 - The transistor, which was introduced in 1947, paved the way for the development of advanced digital computers. The government, military and other organizations made use of computer systems during the 1950s and 1960s.

You might be interested in
A home user reports to a network technician that the Internet is slow. The network administrator discovers that multiple unknown
BabaBlast [244]

Answer:

Option (A) A successful WPS attack has occurred

Explanation:

  • WPS stands for Wi-Fi Protected Setup.
  • Its a network security protocol in the Wi-Fi which has a vulnerability.
  • The connection to the Wi-Fi can be established through the router in four ways. They are
  • (a) PIN method
  • (b) Push button method
  • (c) Near field communication method
  • (d) USB Method.
  • Out of all the modes to be connected to the network, the PIN method has a flaw in it.
  • In this PIN method, an attacker can brute force the PIN (guessing the PIN by some techniques) and gain unauthorized access to the network.
  • In the given case in the question, the network administrator finds that multiple unauthorized devices has gained access to the network.
  • Option (A) is correct.
  • Option (B) ARP Poisoning, (C) botnet and (D) Evil Twin attack are different and so are the wrong options.  
3 0
3 years ago
Read 2 more answers
What are the advantages of cloud computing over computing on premises?
Verdich [7]

Answer:

answer my question

Explanation:

<h3>open my account. i need help.</h3>
3 0
2 years ago
Send a document as a PDF when A. you want the recipient to make changes to the file. B. it needs to be printed. C. it contains m
Julli [10]
A PDF must be put into an external program after being exported to be edited, you can't make direct changes to it. This eliminates answer choice A.

You can print documents with other extensions besides .pdf, such as those of Word documents and such, it doesn't have to be a .pdf. This eliminates answer choice B.

Since you can't directly edit a PDF, C is a possible answer.

Files don't have to be saved as a .pdf, especially just for the first time. Whenever you save a file, first time or not, you can save it as anything, and there's no reason to have to save it as a .pdf. This eliminates answer choice D.

So the answer is C. it contains material you don't want changed.

Hope this helps!
3 0
4 years ago
How to unsubscribe from Brainly
solong [7]
Access the Settings app.
Tap your name.
Scroll down until you reach the Subscriptions feature.
Tap on Subscriptions.
Locate your Brainly Plus subscription.
Select Cancel Subscription.
Tap Confirm.
3 0
3 years ago
Read 2 more answers
Jimmy has been issued a citation for littering in a city park. When Jimmy
mixas84 [53]

Answer:

this violates with the

constitution

Explanation:

5 0
3 years ago
Other questions:
  • Susan bought a new sweater on sale for $28.93.she was charged HST of 13%.find the total amount of her bill including taxes.​
    9·1 answer
  • Design an algorithm for a bounded-buffer monitor in which the buffers (portions) are embedded within the monitor itself."
    10·1 answer
  • Describe the photograph that David begins discussing what is the contacts for the photograph
    7·1 answer
  • If a code word is defined to be a sequence of different letters chosen from the 10 letters A, B, C, D, E, F, G, H, I, and J, wha
    15·1 answer
  • ___________________ are aggregated collections of memory and cpu resources that can be shared among groups of virtual machines o
    11·1 answer
  • Janet received an email from a bank asking for the password for her Internet banking account. She emailed back her password. A f
    12·2 answers
  • Breaking code rules is only a problem once in a while. Group of answer choices True False
    12·1 answer
  • Choose all stages of the information processing cycle.
    12·2 answers
  • Please hurry!
    15·2 answers
  • How to add links in HTML? ​
    8·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!