1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
maw [93]
3 years ago
6

Make a list of any four computer that were used in the history of computer.​

Computers and Technology
1 answer:
blondinia [14]3 years ago
7 0

Answer:

ENIAC, UNIVAC, EDVAC and IMB 1401 are the list of computers used in history of computer

Explanation:

hope it helps

plz make it brainliest ans

You might be interested in
A range in which a measuring instrument or controller does not respond is the
cricket20 [7]

Answer:

Dead band

Explanation:

In Instrumentation, dead band is defined as a range in which a measuring instrument or controller does not respond. It is also known as the neutral zone or dead zone and it is usually caused by packing friction or unbalanced forces.

4 0
3 years ago
F
Alex_Xolod [135]

Answer:

everything

A.

B.

C.

NOOO.

3 0
2 years ago
What term is used to describe the process of monitoring operating results and comparing actual results with the expected results
s344n2d4d5 [400]

Answer:

controlling

Explanation:

hope this helps

7 0
2 years ago
Today you turned on your computer after being on vacation for a week. You see spinning white dots on a black screen. You decide
Andre45 [30]

Answer:

<em>Use Safe Mode to boot</em>

Explanation:

Safe mode uses a <em>limited number of files and drivers to begin Windows in a simple form. If an issue does not arise in safe mode, this means that the problem is not caused by default settings and simple system drivers.</em>

Windows in safe mode helps users to track down the cause of a problem and therefore can enable users to solve problems on the computer.

The steps include:

  1. Reboot your computer.
  2. Click the F8 button before the logo appears on Windows 7 and above.
  3. Using the arrow keys to navigate and select which operating system you would like to boot into Safe Mode if you have more than one operating system installed on the same computer.
  4. Use the arrow keys to select Safe Mode and press Enter.

4 0
3 years ago
Most information security incidents will occur because of _________. Select one: a. Users who do not follow secure computing pra
nika2105 [10]

Answer:

Users who do not follow secure computing practices and procedures

Explanation:

Most data breaches that occur as a result of hacking and cyber-attacks get all the attention. However, the kind of mistakes that employees make in corporate situations can sometimes be very costly. Whether accidental or not, human error is the leading cause of most information security breaches. When you have proper policies, people working in big organizations, for instance, will know how they are to do with them. Organizations should put more effort on its employees. By ensuring that secure computing practices and procedures are followed, it will help guide the workforce more effectively.

4 0
3 years ago
Other questions:
  • How do i show all emails from same sender in outlook
    13·2 answers
  • Develop a list of privacy protection features that should be present if a website is serious about protecting privacy. Then, vis
    8·1 answer
  • An organization is assigned a Class-C network 200.120.80.0 and wants to form subnets for its threedepartments: D1 (60hosts), D2
    7·1 answer
  • Air circulation is caused by ... A Earth's rotation around the sun B winds that move vertically C moving air between hot and col
    11·1 answer
  • You are attempting to upgrade a Windows Server 2008 R2 server to Windows Server 2016 Standard. What must be done in order to acc
    5·1 answer
  • I will upvote....
    10·1 answer
  • Which of the following would an NSA professional most likely need?
    5·2 answers
  • Select the correct answer.
    6·1 answer
  • A customer wants to increase his storage capacity by 25gb
    7·1 answer
  • When you save a presentation with a .potx file extension, which type of powerpoint file is created?
    8·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!