1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
Vitek1552 [10]
3 years ago
14

Who develop computer first?​

Computers and Technology
2 answers:
Serga [27]3 years ago
8 0

sorry bro...,......................................

docker41 [41]3 years ago
4 0
I think the answer is Ada Lovelace.
You might be interested in
Write a program C statement to declare and initialize an array named afTest1 type float to store
Valentin [98]

Answer:

#include <stdio.h>

int main()

{

   float afTest1[5] = {90, 30, 25, 45, 55};

   for (int i = 0; i < 5; i++) {

       printf("%f ", afTest1[i]);

   }

   return 0;

}

Explanation:

Initialize the elements of the array as 90, 30, 25, 45, 55

Create a for loop that iterates through the array

Inside the loop, print each element using printf function

6 0
3 years ago
Modify your main.c file so that it allocates a two dimensional array of integers so that the array has 20 rows of 30 integers in
Alexandra [31]

Answer:

Explanation:

b

7 0
3 years ago
The point at coordinates (2, -18) is in what direction from the origin?
laila [671]
On a graph, move 2 spaces to the right and from there move 18 spaces down. Now, where you've ended, make a dot. The distance fro the origin is -2/18 (as a fraction).
4 0
4 years ago
Buying an existing business
HACTEHA [7]
Goin to make great profit
8 0
3 years ago
If your computer has a ________, someone else can gain access to it undetected.
irinina [24]
<span>If your computer has a rootkit, someone else can gain access to it undetected.
</span>The term rootkit denotes a set of software tools <span>typically malicious.
 The purpose of this software is to enable access to a computer or areas of its software that is not otherwise allowed.
</span><span>It is one of the most difficult types of malware to find and remove.</span>
3 0
3 years ago
Other questions:
  • During the processing stage what does the computer do
    12·1 answer
  • What is the type of account and normal balance of allowance for uncollectible accounts?
    13·2 answers
  • A friend complains that she is always running out of money even though she “never buys anything expensive.” What advice would yo
    10·1 answer
  • How do you take a screenshot on an iPhone?
    8·2 answers
  • Which of the following is a beneficial reason to extract mineral resources from the earth?
    13·2 answers
  • A distortion of information about the demand for a product as it passes from one entity to the next across the supply chain is c
    10·1 answer
  • Genres are useful for many reaseons. What are some explanations you can think of for how genres can be useful to players, game d
    5·1 answer
  • mary needs to rename her report.txt file to final_report.txt. which command will allow her to do this?
    10·2 answers
  • What color pixels are used in a camera?
    10·2 answers
  • 1. Sunday Times wants an analysis of the demographic characteristics of its readers. The
    8·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!