1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
erica [24]
3 years ago
14

Today's computer giant was earlier known by different name which was changed in 1924​

Computers and Technology
1 answer:
mamaluj [8]3 years ago
8 0

Answer: CTR

Explanation: after a quick research I found out that is what IBM’s name was I hope this got you your answer.

You might be interested in
I want to discard my old computer and securely erase the data from my hard drive.
FrozenT [24]
Wipe off the hard drive with a software eraser but it won't be quick and won't work on defective disks
3 0
3 years ago
I plugged my headphones into my computer, but the sound still came out of the speakers. help!
VARVARA [1.3K]

If you mean speakers. You should remove them or if you mean the speakers in the PC. Perhaps you put the headphones in the wrong one. Theres usually too one in the front and the other one in the back of the desktop.





Hope this helps.


Regards. Shaggy


Enjoy your music!

3 0
3 years ago
Read 2 more answers
A security utility program that scans the system for small programs that interfere with how a computer functions are _____ utili
Aneli [31]

Answer:

A security utility program that scans the system for small programs that interfere with how a computer functions are _____ utilities.

Explanation:

7 0
3 years ago
Select the correct answer from each drop-down menu.
evablogger [386]
Update and measure those are the only understand answers
6 0
3 years ago
Read 2 more answers
The procurement department of an organization helps to program software. <br> A)True<br> B)False
valina [46]
I think it is true absolutely
8 0
3 years ago
Read 2 more answers
Other questions:
  • How to use javascript libraries in javascript code?
    9·1 answer
  • Bit stream methods commonly use algorithm functions like the exclusive or operation (__________.
    11·1 answer
  • Explain the third <br> generation
    6·1 answer
  • Many 12-15 yrs hv access to the internet which cannot be supervised by an adult.i need 5 problems tht this might cause
    5·1 answer
  • Which of the following operations are considered to be crucial tasks that should be performed before installing server roles and
    14·1 answer
  • Which of the following statements are true of software engineers? Check all of the boxes that apply. They are responsible for wr
    11·2 answers
  • What is the forging of the return address on an email so that the email message appears to come from someone other than the actu
    11·1 answer
  • Random.choice will choose a number between 1 and 100. True False​
    6·1 answer
  • 6. kinukuha nito ang kabuuang bilang ng mga numerical na datos sa mga piniling cells
    12·1 answer
  • The terminology used to describe a possible path to resolution to a problem from one end to the other is called what?
    9·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!