Question and answer
What is the very first video game?
In January of 1947 a patent was filed in the United States by Thomas T. Goldsmith Jr. and Estle Ray Mann for an interactive electronic game called the Cathode Ray Tube Amusement Device. [ It used analog circuitry to display a missile game on a cathode ray tube (basically an early television screen). Basically this was a simple missile simulation game in which a player could move a dot on a screen. The Cathode Ray Tube Amusement Device was a gigantic, bulky early computer hooked up to a cathode ray tube. The patent was eventually approved in December of 1948 Read more: ]
Expert answered|debnjerry|Points 23584|
Question
Asked 12/2/2011 9:26:56 PM
0 Answers/Comments
This answer has been confirmed as correct and helpful.
f
Get an answer
New answers
Rating

There are no new answers.

Comments

There are no comments.

Add an answer or comment
Log in or sign up first.
Questions asked by the same visitor
What is the most dangerous computer virus?
Weegy: 1. Sadmind worm (2001) ALIAS: Sadmind/IIS, Unix/Sadmind, Solaris/Sadmind.worm The Sadmind worm was a self-propagating piece of malware, It was first discovered on May 8, 2001 in china. [ Sadmind is designed to provide remote system administration operations and is installed by default with many versions of the Sun Microsystems operating system. It affected some big operating systems like Sun Microsystems Solaris(OS) and Microsoft's Internet Information Services (IIS) which is the world's second most popular web server in terms of overall websites behind the industry leader Apache HTTP Server. 2. Beast Trojan (2002) Beast is a Windows-based backdoor trojan horse more commonly known in the underground cracker community as a RAT (Remote Administration Tool). It was created in Delphi and released first by its author Tataye in 2002. Beast was one of the first trojans to feature a 'reverse connection' to its victims and once established, it gave the attacker complete control over the infected computer. Once connected to the victim computer, via Beast hacker can access victim's all computer file and directories along with the power to upload, download, delete or execute any file or folder. 3. SQL Slammer (2003) ALIAS: Sapphire, Worm.SQL.Helkern, SQLSlammer Appeared first in 27th January 2003 and soon got a high rank in the list of most dangerous worms of the year because it is the first fileless worm. Slammer was able to spread by taking advantage of the vulnerability found in the SQL Server. ] (More)
Question
Expert Answered
Asked 11/25/2011 3:35:26 PM
0 Answers/Comments
How far is Nigeria to London UK?
Weegy: The distance between Nigeria and London, UK is 5,950km or 3,697miles. The travel time is approximately 3 days and 19 hours. (More)
Question
Expert Answered
Asked 11/25/2011 3:57:42 PM
0 Answers/Comments
Can I ride on a car to go to London from Northern Ireland?
Weegy: Unfortunately, the route includes a ferry to go to London from Northern Ireland. The distance between Northern Ireland and London is 490miles and the travel time is approximately 10 hours and 3 minutes. (More)
Question
Expert Answered
Asked 11/25/2011 4:11:07 PM
0 Answers/Comments
Can you ever change the processor without changing the motherboard?
Weegy: Yes you can change the processor even without changing the motherboard. I highly suggest that you use new motherboards and processor today. Go for Intel Core i7 2nd generation 2600k. (More)
Question
Expert Answered
Asked 11/25/2011 3:54:16 PM
0 Answers/Comments
In this equation: y = 5x + 3. What is the y intercept?
Question
Not Answered
Updated 6/30/2014 4:56:21 PM
2 Answers/Comments
In this equation: y = 5x + 3. "3" is the y intercept.
Added 11/25/2011 4:27:13 PM
In the equation, y = 5x + 3, the y intercept is: 3
Added 6/30/2014 4:56:21 PM
This answer has been confirmed as correct and helpful.
Confirmed by andrewpallarca [6/30/2014 11:21:14 PM]
39,940,677
questions answered
Popular Conversations
Solve for x in the equation x - 4 =7.
Weegy: 2x-8User: Solve this 4y + 228 = 352 Weegy: 4y+228=352; subtract 228 from both sides, 4y = 124. Divide both ...
5/16/2025 1:34:16 AM| 10 Answers
How does FEMA incorporate climate change considerations into ...
Weegy: FEMA (Federal Emergency Management Agency) is an agency of the United States Department of Homeland Security, ...
5/19/2025 6:11:03 AM| 5 Answers
What is the role of the Community Rating System (CRS)?
Weegy: CRS: Common Reporting Standard is an information standard for the automatic exchange of information regarding ...
5/19/2025 5:57:49 AM| 5 Answers
What is the importance of continuity of operations (COOP)?
Weegy: A Continuity of Operations Plan (COOP) is a strategic framework that ensures essential functions and services of ...
5/19/2025 6:05:52 AM| 4 Answers
What is the medical term for a blood clot?
5/12/2025 7:26:03 AM| 4 Answers
What was the significance of the Battle of Hastings?
Weegy: The significance of the Battle of Marathon was the Athenians defeated the Persians and halted an invasion by ...
5/13/2025 7:33:35 AM| 4 Answers
What was the significance of the Treaty of Tordesillas?
Weegy: Treaty of Tordesillas divided the world between Spain and Portugal. User: Which event marked the end of the ...
5/13/2025 8:35:02 AM| 4 Answers
GET
Answers.
GET THE APP.
weegy*
*
Get answers from Weegy and a team of really smart live experts.
S
Points 15 [Total 15] Ratings 0 Comments 5 Invitations 1 Offline
S
Points 12 [Total 12] Ratings 0 Comments 12 Invitations 0 Offline
S
Points 12 [Total 12] Ratings 0 Comments 12 Invitations 0 Offline
S
Points 10 [Total 10] Ratings 1 Comments 0 Invitations 0 Offline
S
L
Points 3 [Total 186] Ratings 0 Comments 3 Invitations 0 Offline
S
L
Points 3 [Total 402] Ratings 0 Comments 3 Invitations 0 Offline
S
Points 3 [Total 11] Ratings 0 Comments 3 Invitations 0 Offline
S
L
P
Points 2 [Total 2645] Ratings 0 Comments 2 Invitations 0 Offline
S
L
P
P
Points 1 [Total 726] Ratings 0 Comments 1 Invitations 0 Offline
S
Points 1 [Total 3] Ratings 0 Comments 1 Invitations 0 Offline
* Excludes moderators and previous
winners (Include)
Home | Contact | Blog | About | Terms | Privacy | © Purple Inc.