1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
natima [27]
3 years ago
7

Write the features of Mark-I.​

Computers and Technology
1 answer:
kotegsom [21]3 years ago
4 0

Answer:

mark- I was enormous in size,measuring 8 feet high,51 feet long and 3 feet deep it weighs tons used , 530 miles of wire and 730,000 separated plant.

You might be interested in
(e) The vending machine stores the quantity of items available in a database table called ITEMS
zimovet [89]

Answer:

a1,a2,62,

please mark brainliest

Explanation:

8 0
2 years ago
What materials where used to make the first gps
8090 [49]
You need a radio transmitter that transmits some kind of radio wave signal, and an array of satelites to compare the postion to other parts of the world.
Hope this helps!
8 0
3 years ago
Having a low credit score can make it more difficult to: Obtain a car loan Open a new credit card Secure an apartment lease All
-Dominant- [34]

Answer:

all of the above

Explanation:

3 0
3 years ago
Determine the type of plagiarism by clicking the appropriate radio button.
AleksAgata [21]

Answer:

a)

Explanation:

From the writing of the student, it shows that he plagiarized the work word for word, in that

1. There was the page number of the article in his writing

2. In addition, the reference shouldn't have been added at this stage of writing but the student did added it.

5 0
3 years ago
If you were the manager at a firm which deals with sensitive information of its customers, employees and other stake holders, ho
Rzqust [24]

Answer:

explanation below

Explanation:

Management controls are some of the techniques and mechanisms that can be put in place to implement security policies – which ensure information and information systems are protected.  These controls are not only used by managers but can be exercised by selected users.  

These controls must be put in place to cover all forms of information security, physical security and classification of those information.  

5 0
3 years ago
Other questions:
  • Why is television reactive, requiring no skills or thinking
    11·1 answer
  • Which ipv6 header field is known as the priority field?
    10·2 answers
  • What was the importance of the turing machine to today’s computers?
    6·1 answer
  • Rachelle's computer has frequent system crashes and it takes a long time to access files and folders. What hardware component is
    8·1 answer
  • Describe how you would define the relation Brother-in-Law whose tuples have the form (x, y) with x being the brother-in-law of y
    9·1 answer
  • Jim has just purchased two new SCSI hard disk drives and a controller card for them. He properly installs the hardware in his ma
    7·1 answer
  • Define<br>output<br>devices<br>.<br>Give<br>any<br>three<br>examples<br>.<br>3.​
    8·2 answers
  • Who invented Computer? Answer Differently​
    13·2 answers
  • What are some innovations that television has undergone since its original invention ?
    11·1 answer
  • Does technology always follow the science, yes or no and explain the reason your choice
    8·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!