What was the fisrt computer?

Answers

Answer 1

Answer:

AtanasoffBerry Computer.  It was built by physics Professor John Vincent Atanasoff and his graduate student, Clifford Berry, in 1942 at Iowa State College, now known as Iowa State University.

Explanation:

Answer 2

The First computer is called The Babbage Difference Engine.

I hope this is what you needed


Related Questions

What are the different types database of end users? Discuss the main activi-ties of each

Answers

Answer:

following types of databases available in the market −

Centralised database.

Distributed database.

Personal database.

End-user database.

Commercial database.

NoSQL database.

Operational database.

Relational database.

Cloud database.

Object-oriented database.

Graph database

Answer:

1. Casual End Users

These are the users who occasionally access the database but they require different information each time. They use a sophisticated database query language basically to specify their request and are typically middle or level managers or other occasional browsers. These users learn very few facilities that they may use repeatedly from the multiple facilities provided by DBMS to access it.

2. Naive or parametric end users

These are the users who basically make up a sizeable portion of database end users. The main job function revolves basically around constantly querying and updating the database for this we basically use a standard type of query known as canned transaction that have been programmed and tested. These users need to learn very little about the facilities provided by the DBMS they basically have to understand the users’ interfaces of the standard transaction designed and implemented for their use. The following tasks are basically performed by Naive end users:

The person who is working in the bank will basically tell us the account balance and post-withdrawal and deposits.

Reservation clerks for airlines, railway, hotels, and car rental companies basically check availability for a given request and make the reservation.

Clerks who are working at receiving end for shipping companies enter the package identifies via barcodes and descriptive information through buttons to update a central database of received and in transit packages.

3. Sophisticated end users

These users basically include engineers, scientist, business analytics and others who thoroughly familiarize themselves with the facilities of the DBMS in order to implement their application to meet their complex requirement. These users try to learn most of the DBMS facilities in order to achieve their complex requirements.

4. Standalone users

These are those users whose job is basically to maintain personal databases by using a ready-made program package that provides easy to use menu-based or graphics-based interfaces, An example is the user of a tax package that basically stores a variety of personal financial data of tax purposes. These users become very proficient in using a specific software package.

WHAT ACTIONS CAUSE SPAM ON LINKEDIN?

Answers

Answer:

LinkedIn has a very smart algorithm, and it has a very strict policy against spammers. Back in 2014, it deleted millions of accounts that were causing spam on LinkedIn.  

Spam occurs:  

1. When you send bulk of connect requests in a short time  

2. When you send irrelevant messages to prospects  

3. When you Perform overactivity  

4. When you use LinkedIn automation tools  

5. When you send spammy and sales-y messages  

All these actions cause spam on LinkedIn, and it immediately takes action against you by restricting your account temporarily or permanently.

Attackers have taken over a site commonly used by an enterprise's leadership team to order new raw materials. The site is also visited by leadership at several other enterprises, so taking this site will allow for attacks on many organizations. Which type of malicious activity is this?

Answers

A rootkit is a malware-style terminology designed to infect an attacker's target PC and allow them to install many tools that use him for persistent wireless connectivity to the system.

It is an illegal computer program to enable continuous privileged access to a computer and hide its presence actively. In today's life, it often conceals their existence and actions from uses and other functionality of the system, especially spyware - for instance, trojans, worms, viruses.

That's why the rootkit is employed since it is developed in this case to access Victin's system at an administrator level.

Learn more:

brainly.com/question/3624293

Shift all elements by one to the right and move the last element into the first position. For example, 1 4 9 16 25 would become 25 1 4 9 16.

Answers

Answer:

i see you but i dobt see it

Explanation:

This number is written in binary (base 2). Convert it to decimal (base 10).



10110110

Answers

Answer:

Binary 10110110

Decimal 182

Hexadecimal B6

Bits 8

Equation 128 + 32 + 16 + 4 + 2

Explanation:

https://www.binary-code.org/binary/8bit/10110110/

Have a bless day and send positive all over the world :D

What are the three benefits of incremental development, compared to the waterfall
model?

Answers

Answer:

The cost of accommodating changing customer requirements is reduced

How many bits would be needed to count all of the students in class today? There are 16 children in the class.

Answers

Answer:

There will be 23 beats per children

Any computer expert to help me answer this question.. am giving brainliest

Answers

Answer and explanation:

1. It asks for the total expenses for the month of March. So, let's add all of the March expenses up.

1,600 + 2,100 + 850 + 480 + 2,800 = $7,830 (which is the answer)

2. It asks what the highest expense for wages are. That would be $5,080. Out of all of the times that the wages have been paid, in April, it was the highest, at $5,080. So, $5,080 is the answer.

3. It asks how many items cost less than $1,000 in April. The only thing that cost less than $1,000 in April was the water because it only cost $370. So, the answer would be 1.

Hope this helps!

Fill in the blank with the correct response.
A _
is an unknown network.

Answers

Answer:

ip address

Explanation:

please mark brainliest

C++: Given three strings on separate lines, insert the contents of the second string in the first string right before the third string. Then,
output the result

Ex: If the input is:
FuzzyBear

Wuzzy

Be

the output is:
FuzzyWuzzyBear

Note: Using a pre-defined string function, the solution can be just one line of code.

(I tried using strVar.insert(partStr, str2) but was unsuccessful. I don’t know where I’m messing up. Thank you for your help. I’ve been trying to alter this code for a while now)

Answers

Answer:

Use the .find() function in your first string to give you an index.

Explanation:

Hi! I'm guessing you're taking COP2334 like me. A T.A. helped me figure out what I needed, so I'm passing it on.

Basically, you're given three strings and no integer to use as an index in order to insert the second line. Since you are required to have an index to use the .insert() function, this is "tear-out-my-hair" frustrating. What I failed to remember was that it is totally possible to use a function inside another function to get what you need!

You have been given is a hint as to where str2 goes, in the form of your 3rd string. If I'm right, all of the tests the system will run (mine is in Zybooks) will give a 3rd string that is inside the first string.

String 1: strVar: "FuzzyBear"

String 2: str2: "Wuzzy"

String 3: partStr "Be"

Open your statement with strVar and use the insert.() function. In the insert function, you are required to give a place to start, (your index), then what you want to insert. Your index will be the .find() function, searching in StrVar for partStr. The second part of the .insert() function is str2.

Hope that helps!

When we say that communication is relational, what does that mean?
a. Communication is key to greater satisfaction in relationships.
b. Communication involves a wide range of socially appropriate behaviors.
c. Communication is something that we do to others.
d. Communication arises out of our interactions with others.

Answers

Answer:

a

Explanation:

Without communication there's nothing we can do .

Relational interaction includes the processes of interaction in personal relationships like romantic relations, family ties, and friendships, and further discussion can be defined as follows:

It consists of negotiating processes by which the dyadic partners define who they are and they will collaborate. This relation perspective assumes that the pair is indeed the best unit for interpersonal communication observation.

Therefore, the final answer is "Option a".

Learn more:

brainly.com/question/12062755

Memory Uninstalling a program

A) Removes the program from memory

B) Removes the program from a disk

C) Removes the program from the monitor

D) Permanently removes a program that is no longer
wanted

Answers

Answer:

D

Explanation:

but you can re install it

For those of u who watch Lucifer- S6 is coming out on Sept 10th

Answers

Ight ty for the info

The output signal from an analogue sensor is sampled every 195 µs to convert it into a digital representation. What is the corresponding sampling rate expressed in kHz?
According to the Sampling Theorem, for this sampling rate value, what approximately could be the highest frequency present in the signal, in kHz, assuming the lowest frequency is very close to zero?

If each sample is now quantised into 512 levels, what will be the resulting bitrate in kbps?

Give your answer in scientific notation to 2 decimal places.

Hint: you need to determine the number of bits per sample that produces 512 quantisation levels.

Answers

Answer:

A sample rate is just reciprocal of the sample period. According to sampling theorem the highest frequency in single would be [tex]5.13/2=2.565 KHz.[/tex][tex]2^8=512[/tex] So you will need 8 bits to represent.[tex]8 bits \times5.128\times(10)^3[/tex]samples [tex]=41.026[/tex] bits per second.

Explanation:

Sample period of 1 millisecond [tex]=1 kHz.[/tex]

Thus a sample period of [tex]0.195[/tex] milliseconds is

[tex]1/0.195=5.12820513 Hz[/tex]

To determine the sample after [tex]512[/tex] levels quantization, we need to find bits per sample that produces [tex]512[/tex] quantization levels.

Thus,

[tex]2^8=512[/tex]

So you will need 8 bits to represent.

8 bits [tex]\times5.128\times(10)^3[/tex] samples [tex]=41.026[/tex] bits per second.

Learn more about scientific notation, refer :

https://brainly.com/question/10401258

does The operating system assigns the file, name and location inside

Answers

Answer:

The operating system assigns the file its name, location, and size. When you add information to a word-processing document, one of the roles that your operating system plays is that is saves your unsaved work to temporary storage.

Explanation:

The operating system is designed and developed to assign the file, its name, size and location.

What is an operating system?

An operating system (OS) can be defined as a system software that is pre-installed on a computing device, so as to manage random access memory (RAM), software applications, computer hardware and all user processes.

In computer technology, the operating system is designed and developed to assign the file, its name, size and location.

Read more on software here: https://brainly.com/question/26324021

#SPJ2

which of the following is not related to text formatting?​

Answers

Explanation:

Searching, hope that helps. its 100% correct, goodluck.

general description of the problem

Answers

Explanation:

problem is the misunderstanding misbehaviour etc which harm us and others

A matter or situation regarded unwelcome or harmful is known as problem

give ways in which fire can be prevented in a computer lab​

Answers

Answer:

don't try to run a sketchy game that plays in 4k on a computer and monitor that can only generate 1280p.

Explanation:

yes. I made that mistake once.

Suppose now the file is broken up into 1000 packets with each packet
containing 4,000 bits. Suppose that each packet is acknowledged by the
receiver and the transmission time of an acknowledgement packet is
negligible. Finally, assume that the sender cannot send a packet until the
preceding one is acknowledged. How long does it take to send the file?

Answers

Answer:

The delay to send each packet will be ttrans + tprop. However there is an  additional tprop delay for the acknowledgement packet to arrive at the sender, prior  to which the next packet can be transmitted. Hence the total delay to transmit 10  packet is = 10 * (ttrans + 2 tprop) = 10*(40 msec + 80 msec) = 1.2 sec

Explanation:

What is an example of an Experience component within an enterprise platform?​

Answers

Answer:

A

Explanation:

A system used for processing customer payments. A tool used to coordinate recruitment of new employees. A mobile app used by customers to place orders.

7. In order to check your following distance, use a fixed object and count seconds.
True
False

Answers

Answer:

False

Explanation:

It is true that distance can be checked by counting seconds from a fixed object

How to determine the true statement?

The given highlights are:

Using a fixed objectCounting seconds

When seconds from a fixed object (such as a pole) are counted, the quantity that is being measured is time.

The time recorded can be used along the average speed to determine the distance traveled.

Hence, the given statement is true

Read more about distance and time at

https://brainly.com/question/4931057

#SPJ2

Any computer expert to help me answer this question plz am giving brainliest

Answers

Answer:

(Shown below)

Explanation:

The email is written as:

boby(at)qengineers.org

The first part of the email adress is the name, which is Boby. (boby(at)qengineers.org)

The second part will always be the (at) sign. (boby(at)qengineers.org)

The third and last part is the company, or where the email is coming from. (boby(at)qengineers.org)

Hope this helps!

(Also please note I put (at) for the at symbol because brainly doesn't let me type it in)

Which computer are used by mobile employees such as meter readers.​

Answers

Answer:

Handheld/Mobile Computers

jjhb ft fv tuning Denise l Debbie

Answers

What








What the debbie



Answer: is Debbi

Explanation: and what

Mouse is .....ware.

Answers

Mouse is hardware.

Explanation:

because we can touch it and in the hardware definition we say that it can be touched.

Data modeling may be the most important part of the systems development process because: Group of answer choices data are less stable than processes. data characteristics are important in the design of programs and other systems components. it is the easiest. the data in a system are generally less complex than processes and play a central role in development.

Answers

Answer:

please mark me brainlist

Explanation:

Question: 5
In 2014, what percentage of the world population has access to the Internet?
Less than 30%
Less than 50%
Over 50%
Over 80%
Please help

Answers

The answer would be less than 50

In 2014, less than 50% percentage of the world population has access to the Internet option (B) less than 50% is correct.

What is a computer?

A computer is a digital electronic appliance that may be programmed to automatically perform a series of logical or mathematical operations. Programs are generic sequences of operations that can be carried out by modern computers. These apps give computers the capacity to carry out a broad range of tasks.

As we know,

Internet, a system design that allows different computer networks all over the world to communicate, has transformed communications and methods of commerce.

Thus, in 2014, less than 50% percentage of the world population has access to the Internet option (B) less than 50% is correct.

Learn more about computers here:

https://brainly.com/question/21080395

#SPJ2

Www requires a tool called a

Answers

Answer:

The World Wide Web (WWW) requires a tool (software) called a HTTP. The full form of HTTP is Hypertext Transfer Protocol.0. It is a type of internet communication software that is needed for the publication of the website or www

Explanation:

What is your impression on the subject fundamentals of database systems?​

Answers

Answer:

The DBMS software enables users to share data. It provides a systematic method of creating, updating, retrieving and storing information in a database. DBMSs also are generally responsible for data integrity, data access control, and automated rollback, restart and recovery

   Database Fundamentals introduces database concepts, including relational databases, tables and data types, data selection and manipulation, views, stored procedures, functions, normalization, constraints, indexes, security, and backup and restore.

What was revolutionary about Web 2.0?

Answers

Answer:

social media and sites allow people to communicate with others

Explanation:

Hope this helps <3

Other Questions
Help please due today Impacts of the treaty: Explain the territory changes for Spain. FAST PLZZZ!!!WILL MARK THE BRAINLIEST-Which of the following describes the elements of art used in Yinka Shonibare's Nelson's Ship in a Bottle? A) The bottle has a smooth texture.B) The sculpture is a replica and is realistic.C) The subject is a ship inside a glass bottle. D)The work is a three-dimensional sculpture. Anyone else gonna sit alone at lunch today in school? :') Find the value of (2+root 3)(2-root 3) 1 1/11 rewrite each number as a single fraction greater then one 2) Juanita is due for a 5% raise. She is currently making $350 a week. What is her newweekly paycheck amount? (explain please) Solve for x.3(x-1)-8=4(1+x)+5Also could someone please explain how to do this?? Multiply 25 by the difference of 34.78 and 12.99. The answer for (-1-1)2+4. (0-1)2+4 given the equations: A. 7(x+2)+3(x+5)=14(x+3)-6(x+2) B. -5(x+3)+7(x+2)=4(x-3)-2(x+5) C. 3(x-5)+2x=4(x-4)+x+1 what is the order of the equatshons from to most solutions? Evaluate 6y + x9When x = -5, y = -4 Anyone able to answer this? Which number is a factor of 51?O 7O 11Ok 17O 26 In a physician's practice, which staff position is likely to be responsible for functions of information governance? You have been working with irregular figures. How is estimating area on a grid different from estimating perimeter on a grid? Explain. 2(x - 12)=16 what is x Show that a to the 6th an be written as a perfect square and as a perfect cube. PLS HELP WILL GIVE BRAINLIEST!!!!which of the following questions might be asked by an economist who is using critical thinking to a solve a problem?a. All of these choices are correct. b.Which principles of command economy have the most negative effects on competition? c.How could social security and Medicare better use their resources to expand benefits? d.How might a hurricane in Florida affect the prices of crops grown in the state? clara weighed six pieces of chicken on the scales.if each piece weighed 0.8kg, how much did all the chicken weigh together? adakah anda bersetuju dengan teknologu hijau? mengapa? soalan esau