1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
Nikolay [14]
2 years ago
13

Who made computer ? Which year?

Computers and Technology
2 answers:
myrzilka [38]2 years ago
8 0

Answer:

The first computer that resembled the modern machines we see today was invented by Charles Babbage between 1833 and 1871.

Natalka [10]2 years ago
7 0

Answer:

Charles Babbage in 1991

You might be interested in
listen to exam instructions a small business called widgets, inc. has hired you to evaluate their wireless network security prac
Alex

Following actions could you most likely advise the client taking to strengthen the security of their wireless network-

  • Change the default SSID to anything different.
  • Turn off SSID broadcasting.
<h3>Explain the term wireless network security?</h3>
  • Designing, putting into practice, and ensuring security on such a wireless computer network are all parts of wireless network security.
  • A wireless computer network is further protected by this subset of network security.
  • Wireless security is another name for wireless network security.

For the stated question-

  • Disabling SSID broadcast and changing the network name are advised.
  • By disabling SSID, the network name won't be displayed on devices looking for a network can connect to, and so by changing the name, it will be impossible for anyone who already knows the old name to connect.
  • Both of which significantly boost security.

To know more about the wireless network security, here

brainly.com/question/28257213

#SPJ4

3 0
1 year ago
The list below represents the contents of a computer's main memory. I've left every other byte blank. Assume that the letters at
inysia [295]

Answer:

3) A Single linked list is a sequence of elements in which every element has link to its next element in the sequence.

DATA LINK

DATA stores actual value , LINK stores address of next node

As per information given in question, letters at the even addresses are items in linked list and the odd addresses will be used as links.

Even Address Odd Address

12 (Stores 't') 13 (Used as link)

14 (Stores 'm') 15 (Used as link)

16 (Stores 'a') 17 (Used as link)

18 (Stores 'r') 19 (Used as link)

20 (Stores 's') 21 (Used as link)

Numbers represented by circle are addresses of respective nodes. Here Front or Head has address 16. Which represents the Head Node.

Following image represents the word "smart" with respective nodes and their addressing.

​

Numbers represented by circle are addresses of respective nodes.

The head pointer is: 20

7 0
2 years ago
What is the fullform of BIT​
Natalija [7]

▬▬▬▬▬▬▬▬▬▬▬▬▬▬▬▬

The full Form of BIT is "Binary digit" which is the basic unit of information in computing . A Binary digit can be 0 or 1 . 0 represents off state & 1 represents on state .

▬▬▬▬▬▬▬▬▬▬▬▬▬▬▬▬

8 0
2 years ago
Is apple better than android
KatRina [158]

In a sense yes as it has a more user friendly interface but in terms of usability android is a far better os

3 0
3 years ago
Read 2 more answers
Prompt the user to input an integer, a double, a character, and a string, storing each into separate variables. Then, output tho
cupoosta [38]

Answer:

Following are the program in java language:

import java.util.*; // import package

public class Main

{

public static void main(String[] args) // main method

{

 int num; // integer variable declaration

 double r; //double varaible declaration

 char ch; // char variable declaration

Scanner scnr=new Scanner(System.in); // creating the instance of scanner

 System.out.println("Enter the string:");

 String str=scnr.nextLine(); // reda string by user

System.out.println("Enter the integer value:");

 num=scnr.nextInt(); // Read integer value by the user

 System.out.println("Enter the Double value:");

 r=scnr.nextDouble(); // read double value by user

 System.out.println("Enter the character value:");

 ch= scnr.next().charAt(0); // read character by user

 System.out.print(num + " ,"); // display them in a single line

 System.out.print( " " +r +" ,");//dislpay in a single line  

  System.out.print( " " +ch +",");//dislpay in a single line

 System.out.print(" " +str);//dislpay in a single line

}

}

Output:

Enter the string:

ram

Enter the integer value:

34

Enter the Double value:

45.789

Enter the character value:

r

34 , 45.789 , r, ram

Explanation:

Following are the description of program

  • Read the integer ,string,char,double value by the user by using scanner class in "num","str","ch" and "r" variable respectively
  • Print that value in a single line separated by comma by System.out.println statement.

7 0
3 years ago
Other questions:
  • In order to be accredited by the Better Business Bureau, a business is required to publish a privacy notice on its website that
    9·1 answer
  • The implementation stage of the SDLC _____.
    7·1 answer
  • Write a program that will add up the series of numbers: 99,98, 97...3.2.1. The program should print the running total as well as
    9·1 answer
  • Question 4 (Multiple Choice Worth 5 points)
    6·1 answer
  • Most airlines use very modern hardware and software.<br><br><br> True<br><br> False
    9·1 answer
  • What is processing requirement in computer?
    11·1 answer
  • CAN SOMEONE PLEASE HELP ME OUT I REALLY NEED THE ANSWER!
    14·1 answer
  • In one to two sentences, describe how you would add a new slide to your presentation.
    11·2 answers
  • . What process skill would a scientist use to find the length of a line
    5·1 answer
  • Is the trust necessary to use an emerging technology platform? why?​
    10·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!