1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
Kaylis [27]
2 years ago
9

Page 1. I who invented computer?​

Computers and Technology
1 answer:
svetoff [14.1K]2 years ago
4 0
Charles baggage (picture for more info)

You might be interested in
How would you "break" a firewall in a laptop computer if you were no longer a administrator? (Cyber Security Related, Computers
4vir4ik [10]
Okay so what you would is press ctrl+alt+delete and click log out i think but if you have a disk put it in and secure everything trust me i am a computer savage. i hack thing all the time.

6 0
2 years ago
To find the area, Andrea tiled a rectangle and sketched her answer. Sketch Andrea's rectangle, and find the area. Show your mult
seraphim [82]

Answer:

Area = 6.25

Explanation:

Given

Length = 2.5

Width = 2.5

See attachment for rectangle

Required

Determine the area of the rectangle

Area is calculated as:

Area = Length * Width

This gives:

Area = 2.5 * 2.5

Area = 6.25

<em>The area of Andrea's sketch is 6.25</em>

8 0
2 years ago
1.5 Code Practice: Question 1
Jobisdone [24]
What’s the question?
Always remember to add any reasonable information for someone to help or answer!!

Have a good rest of your day.
6 0
2 years ago
why might you want to use the send to compressed (zipped) folder command before sending four pictures to a friend via email
IceJOKER [234]

It's easier to send the files that way because you don't have to attach them individually, and then your friend won't have to download them individually - they can just download the zip package and have all four right at their disposal.

6 0
2 years ago
An intruder monitors an admin's unsecure connection to a server and finds some required data, like a cookie file, that legitimat
yKpoI14uk [10]
A cookie replay attack
7 0
2 years ago
Other questions:
  • What are threats to computer system
    5·2 answers
  • The rod and crankshaft convert the up-and-down motion of the piston into
    12·2 answers
  • Which of the following is not a true statement about Christopher Columbus it oko
    15·1 answer
  • What type of firewall works on the Session layer that creates a connection and allows packets to flow between the two hosts with
    8·1 answer
  • On the seventh day of the iteration, the team realizes that they will not complete 5 of the 13 stories. the product owner says s
    12·1 answer
  • Peter has recently bought a media player and a digital camera he wants to buy a memory card and then use devices which memory do
    11·2 answers
  • Explain why professional software that is developed for a customer is not simply the programs that have been developed and deliv
    13·1 answer
  • They will wash the car change into tag question​
    6·1 answer
  • Easy<br> What is your favorite Anime<br> Mine is Attack On Titan at the moment
    7·2 answers
  • 9.18 lab: even/odd values in a vector write a program that reads a list of integers, and outputs whether the list contains all e
    5·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!