1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
maxonik [38]
3 years ago
5

Review Questions

Computers and Technology
1 answer:
Verdich [7]3 years ago
7 0

Answer:

BASIC is high-level programming. John G. Kemeny and Thomas E. Kurtz  developed BASIC

Explanation:

You might be interested in
Which of the following is a definition of a conventions
laiz [17]
Need more information
6 0
4 years ago
Read 2 more answers
True or False <br><br> Rootkits are only made by black-hat hackers.
Kipish [7]
True rookies are only made by black hat hackers I am not sure I hope this will help
4 0
3 years ago
Write a Java code statement for each of following:
Naddik [55]

Answer:

double decimal1, decimal2;

int whole;

Explanation:

Required

Declare 2 decimals and 1 int.

The syntax to declare a variable is:

<em>data-type variable-name;</em>

To declare decimal, we simply make use of double or float data types.

So, we have:

double decimal1, decimal2; ----> for the decimal variables

And

int whole; ---- for the whole number

6 0
3 years ago
Because log-on procedures may be cumbersome and tedious, users often store log-on sequences in their personal computers and invo
diamong [38]

Answer:(C) Anyone with access to the personal computers could log on to the mainframe.

Explanation:

It is no doubt that log on procedures are cumbersome so what most users do is that they store log on sequences in their computer so that they could use the main frame facilities whenever they access it the second time.

Here we have to identify the associated risk with this approach.

This process could lead to access of the computer system to users and thereby making all the data available in the system vulnerable. So option C is correct.

option (A) is incorrect as the back up option who also be affected when the system is accessible to anyone.

option (B) is incorrect because it has nothing to do anything with training of the personnel.

option (D) is incorrect because it one has nothing to do with the physical system what vulnerable reside is inside the system.

7 0
3 years ago
2. When was the Antikythera mechanism discovered? What year? <br>​
Vlad [161]

Answer: 1901

Explanation:

7 0
3 years ago
Read 2 more answers
Other questions:
  • A news website uses 32-bit integers to count the number of times an article has been viewed. The website is becoming more popula
    10·1 answer
  • Why is it more important now than ever before to know how to evaluate websites and other online sources of information?
    7·1 answer
  • What does CMOS stand for?
    15·2 answers
  • geoffrey is on location for a long shoot. he is worried that the battery power in his camera will not last. which source can he
    5·1 answer
  • Which statement best expresses the use of Internet sources in a research project versus other types of sources?
    14·1 answer
  • А.<br> is the highest education degree available at a community college.
    6·1 answer
  • What tool is used to edit pre-existing range names? (check all that apply)?
    10·1 answer
  • In what type of attack does the attacker have the ciphertext of several messages that were encrypted with the same encryption al
    14·1 answer
  • The Internet:
    12·1 answer
  • What is the general term for programs used to operate a computer
    15·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!