1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
Alik [6]
3 years ago
8

Who is considered as the father of computer science​

Computers and Technology
2 answers:
solniwko [45]3 years ago
7 0

Answer:

Charles Babbage of course. this Ans should be in Ur book

Andru [333]3 years ago
4 0

Answer:

Turing is considered as the father of computer science

You might be interested in
PLEASE HURRY!!<br> Look at the image below!
never [62]
The answer would be 2&5 because this is correct
5 0
3 years ago
Read 2 more answers
You often travel away from the office. While traveling, you would like to use a modem on your laptop computer to connect directl
34kurt

Answer:

The answer is "Remote access "

Explanation:

The capacity to access another computer or network that you do not have. Remote computer access provides an employee with remote access to the desktop and file. This assists an employee, for example, who works at home efficiently.

Remote users access documents or other resources on any network-connected device or server, enhancing organizational efficiency and increase there are to cooperate more interact with peers nation.

6 0
3 years ago
Which options are available when a user modifies a recurring appointment? Check all that apply. Open this occurrence Open the fi
Rus_ich [418]

Open this occurence and open the series is the two options to choose from, from the dialog box that shows when attempting to modify the appointments

4 0
3 years ago
Read 2 more answers
Which of the following solutions should an administrator use to reduce the risk from an unknown vulnerability in a third-party s
ser-zykov [4K]

Answer:

A. Sandboxing

Explanation:

The best solution to apply for this task would be Sandboxing. This is a software management strategy that isolates applications from critical system resources and other programs. In doing so you effectively add a secondary security layer on top of the application in order to prevent any and all malware from entering and damaging your overall system. Thus effectively reducing the risk.

4 0
3 years ago
What field would you use to store a value from another table?
Levart [38]

Answer:

A. Lookup

Explanation:

You would use the Lookup field to store a value from another table.

7 0
3 years ago
Other questions:
  • Using a pin or password in addition to tpm is an example of what type of authentication?
    13·1 answer
  • Write a program that will open the file random.txt and calculate and display the following: A. The number of numbers in the file
    12·1 answer
  • NEED HELP PLEASEE!!!
    9·1 answer
  • All of the following are examples of being computer literate, EXCEPT ________. Group of answer choices knowing how to build and
    7·1 answer
  • PLZ ANSWER IT..<br>IT IS VERY URGENT....​
    7·1 answer
  • I'm having trouble changing my google account password
    12·1 answer
  • Select all the sets that are countably infinite. Question 3 options: the set of real numbers between 0.1 and 0.2 the set of all
    12·1 answer
  • Which of the following technologies is an example of social media
    12·1 answer
  • List of rules for expert systems​
    6·1 answer
  • Role of User Defined Iprms for creation of paten
    8·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!