1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
KiRa [710]
3 years ago
10

Write the contributions of dr herman hollerith​

Computers and Technology
1 answer:
Ad libitum [116K]3 years ago
5 0

He invented the tabulating machine. In 1890 U.S

You might be interested in
WILL GIVE BRAINLIEST TO HELPFUL ANSWERS!
sashaice [31]

Algorithm is part of computer science. You an learn it on Khan academy. (you probably werent looking for this but no one was answering)

7 0
3 years ago
What types of storage can be used to access your data on a another computer
vladimir1956 [14]
1. Cloud Storage, such as dropbox or Google drive,
2. Network attached storage, where all your data is stored on a central NAS, and you can access it in Windows explorer or Mac Finder
3 Data on flash drive or on an external hard drive.
3 0
3 years ago
The groups within a tab are collectively<br> known as?
vagabundo [1.1K]

Answer:

the ribbon

Explanation:

Commands are organized in logical groups, which are collected together under tabs. Each tab relates to a type of activity, such as formatting or laying out a page. To reduce clutter, some tabs are shown only when needed.

6 0
2 years ago
TCPDump is used by Wireshark to capture packets while Wireshark own function is:
galben [10]

Answer:

a. to provide a graphical user interface (GUI) and several capture filters

Explanation:

TcPDump is a command line tool used to capture packets. TcPDump is used to filter packets after a capture has been done. To control network interfaces, TcPDump need to be assigned root privileges. Data is represented in form of text

Wireshark provide a graphical user interface (GUI) and several capture filters. It is a graphical tool used in packet capture analysis. Data is represented in wireshark as text in boxes.

5 0
3 years ago
I WILL GIVE BRAINLIEST!<br> PLEASE HELP ME DUE!!!
Mandarinka [93]

Answer:

AX=B

Explanation:

6 0
3 years ago
Other questions:
  • Please help me please and thank you!
    14·1 answer
  • Identify and explain the three tiers of web-based applications.
    15·1 answer
  • What can u access various sites on
    12·1 answer
  • Write a program to generate personalized junk mail. The program takes input both from an input file and from the keyboard.The in
    14·1 answer
  • Many people keep time using a 24 hour clock (11 is 11am and 23 is 11pm, 0 is midnight). If it is currently 13 and you set your a
    10·1 answer
  • A customer wants to purchase a new home computer. The machine will mainly be used for internal browsing and streaming video, exc
    7·1 answer
  • A ________ is a self-contained program that spreads through a computer network by exploiting security holes in the computers con
    9·1 answer
  • What is the code for forgot password on messenger​
    9·1 answer
  • Your agile team only has one database developer. So the other developers finish their tasks and then wait for their work to be I
    6·1 answer
  • Should spreadsheets be used to keep an address list for holiday cards?<br> YES<br> ONO<br> Hurry pls
    13·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!