1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
icang [17]
3 years ago
12

1. Who is known as the father of a computer?​

Computers and Technology
2 answers:
Ilia_Sergeevich [38]3 years ago
7 0

Answer:

Charles Babbage: "The Father of Computing"

Ronch [10]3 years ago
6 0

Answer:

Charles Babbage (1791-1871) was known as father of computer

Explanation:

If you like my answer than please mark me brainliest thanks

You might be interested in
Here it is crews my profile pic
Murrr4er [49]
It looks niceee
Also can you mark me brainlyest for extra points
7 0
3 years ago
Read 2 more answers
1. Choose in each case that it affects which of the Information security requirements (confidentiality, integrity, availability)
just olya [345]

The  cases that it affects which of the Information security requirements is explained below.

<h3>What are the Information security violations of the above cases?</h3>

Someone has copied your credit card and CVV number has violated the confidentiality as this is to be known only by the owner for if the cvv is known by another person who is not the owner, it may lead to theft of the owners' funds/money.

If someone sends a message “Please come at 10 AM”, the receiver receives “Please come at 10.” and the person did miss the appointment due to the misinformation, it violates the availability. If one is not understanding a message, it is better to clarify so as to know if one will be available,

If the attacker has deleted the installed copy of the Microsoft Office application from your laptop is integrity/confidentiality. One who has integrity will not attack another's' system.

learn more about confidentiality from

brainly.com/question/863709

6 0
3 years ago
What is the comment marker in Python? ("character marker" means the sequence of characters that indicates the beginning of a com
olga2289 [7]

Answer:

The # marker is used to mark a line comment in python.

Explanation:

The line that starts with # is a comment.Python will ignore the lines that starts with #.These comments can be used to add extra information in the python code.

For example:-

Following is the python code with comments.

names=['sam','optimus','bumblebee'] #names is the list of transformers characters.

for i in names:

     print(i)  #printing the names.

There are 2 comments in the python code written above.These are ignored by python.

6 0
4 years ago
How to make a business plan​
Alborosie

Answer:

Traditional business plan format

Executive summary. Briefly tell your reader what your company is and why it will be successful. ...

Company description. ...

Market analysis. ...

Organization and management. ...

Service or product line. ...

Marketing and sales. ...

Funding request. ...

Financial projections.

Explanation:

Hope it helps

8 0
3 years ago
How can E-Commerce Portals ensure Security of online Transactions by Customers?
beks73 [17]
Ffkjlfdhaslkjfhlaksdfhlkajsdfh
6 0
3 years ago
Other questions:
  • Which company is credited with solving a problem by creating a program that could work on all computers?
    11·1 answer
  • What is output by the following?<br><br>print (type("95"))
    13·1 answer
  • Help pls Do you think the current video game industry is likely to experience another ""crash"" (similar to the one in the 1980s
    13·1 answer
  • Two advantages of Internet are ?​
    7·2 answers
  • Need some personal advice here.
    12·2 answers
  • In the Sender Message Channel Receiver (SMCR) model, the ______ is the large, bureaucratic organization that produces messages.
    5·1 answer
  • katniss dismisses effie's metaphor because, literally, she knows pearls cannot be created with pressurised coal,they come from w
    5·2 answers
  • The area between the main content page and the page edges
    9·2 answers
  • All operations used to construct algorithms belong to one of three categories: sequential, conditional, or iterative. Below is a
    15·1 answer
  • Being technologically literate requires being able to ______. a. use advanced graphics manipulation tools (adobe photoshop) b. u
    6·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!