the contribution of Charles Babbage in the history of computer​

Answers

Answer 1
Charles Babbage also known as the “father of computers” have made an incredible contribution in the evolution and history of computers. His most well-known invention, the analytical engine was a proposed mechanical general-purpose computer with complex machinal working features. Today, most computers follow Charles Babbage’s analytical engine’s process of working (IPO). Charles Babbage was the one to originate the concept of a digital programmable computer. Other mentionable invention of Charles Babbage is difference engine.


Plz give me the brainliest :)

Related Questions

Define Fiber optic cable​

Answers

an assembly similar to an electrical cable, but containing one or more optical fibers that are used to carry light

Explanation:

An optical fiber is a flexible, transparent fiber made by drawing glass or plastic to a diameter slightly thicker than that of a human hair.

who is the father of computer



Answers

Answer:

Charles Babbage is the father of computer

Explanation:

Charles Babbage is know as father of computer.

hope this help!

Greg has a list of payments for goods brought every month for the years 2009,2010,2011, and 2012. He needs information from only the last three years. He can filter this by clicking on

Answers

Answer:

"2009" and clicking "does not equal 2009"

Explanation:

The operator, 'does not equal', is a filtering operator used to exclude a specified attribute. The 'does not equal' operator is also used to provide the definition of the condition of the filter given that there are different values of two attributes

Therefore, given that there are only four years, and Greg needs the information of the last three years, which are, 2010, 2011, and 2012, the information for the year 2009 is to be excluded

Therefore, the correct option is; "2009" and clicking "does not equal 2009"

What is the correct name for the words Home, Insert, Design, Layout, References, etc. in the ribbon in Word 2016?

groups
tabs
sections
properties

Answers

Answer:

tabs

Explanation:

Microsoft Word refers to a word processing software application or program developed by Microsoft Inc. to enable its users to type, format and save text-based documents.

The commands which are used in Microsoft Word 2016 are displayed using series of icons that are stored on different tabs.

A ribbon is a combination of icons and tabs. In Microsoft Word 2016, the correct name for the words Home, Insert, Design, Layout, References, View, Mailings, and Review in the ribbon is tabs.

Tabs are a section of the Microsoft Word application that avails end users the opportunity to perform certain tasks such as formatting a text, changing the layout, clipboard, paragraph, styles, tables, page setup, inserting a theme, applying color, editing and inputting footnotes, header, citation and bibliography, etc.

Answer:

B, tabs

Explanation:

edge 2021

The costs incurred when a firm buys on the marketplace what it cannot make itself are referred to as

Answers

Answer: transaction cost

Explanation:

Transaction costs refers to the expenses that are incurred when a good or service is bought or sold. Transaction cost is the labor that's required in bringing a product to the market.

Transaction cost is the costs that are incurred when a firm buys on the marketplace what it cannot make itself.

Transaction costs are the costs that are incurred which don’t accrue to the participant of the transaction.

It is used to select specific menu options, drag and drop options and to draw something on screen.

Answers

Answer:

A mouse.

Explanation:

An input device can be defined as any device that is typically used for sending data to a computer system.

Generally, all of the output and input device of a computer are known as peripheral (external) devices and they provide data (informations) to the end users in various formats such as video, audio, texts, images etc.

Since input devices are peripheral (external) devices, they can be connected to the computer system wirelessly or through a wired-connection (cable).

Some examples of peripheral (external) devices are monitor, speakers, keyboard, printer, scanner, projector, mouse, etc.

A mouse is an input device that is designed and used to select specific menu options, drag and drop options and to draw something on screen.

What an algorithm to calculate area of squre.​

Answers

algorithm to calculate area of the square

input x.

sq=x*x.

print sq.

The formula for calculating the surface area of a square is A = L x W
Area = Length x Width

The formula for Perimeter is P = 2L + 2W
Which simply means add all the sides
(Perimeter = 2 Length + 2 Width

These formulas only work for 2d shapes not 3d.

To calculate Volume of a cube its
V= L x W x H
Volume= Length x Width x Height

Hope this helps

what is a common translator?​

Answers

Answer:

Conventional interpretation is the process of converting (simultaneously or sequentially) a word/sentence/paragraph/text from one language to another in spoken form without changing the meaning, helping people who do not share the same language. one language can understand each other.

Explanation:

Answer:

A translator is a programming language processor that converts a computer program from one language to another . It takes a program written in source code and converts it into machine code. It discovers and identifies the error during translation.

how do you underline the selected text?

Answers

Select the text that you want to underline. Tip: You can also use the keyboard shortcut Ctrl+D. Use the Underline style drop-down list to select an underline style. Use the Underline color drop-down list to change the color of the line.

what is computer graphics uses of computer graphics​

Answers

Answer:

The technology that deals with the design and pictures on computer is called computer graphics.

It is displaying art and image data effectively and meaningfully to the consumer.

It is also used for processing image data received from the physical world, such as photo and video content.

why the internet is not policed​

Answers

Answer:

The Internet allows people to circumvent law by committing criminal acts from areas where their activities are not illegal. Those areas will always exist, and thus new regulations will be just as ineffective as the old ones are ["Net Needs Law Enforcement, Author Says,"]. But Internet traffic is marked with IP addresses, and those addresses can be tied to specific networks with specific locations. Shouldn't it be possible to separate traffic based on the originating network and treat data coming from relatively insecure locations differently than data coming from relatively secure locations? It would be much harder for someone in a rogue nation to hack a network if he had to hack an intermediary network first. And unlike government regulation, which has zero impact in areas where these threats are likely to originate, separating traffic by location might actually work

write an algorithm and draw a flowchart for switching off a machine after it has made 500 glass bottles. use an appropriate conditional statement for this

Answers

Answer:

The algorithm is as follows:

1. Start

2. bottles = 0

3. While bottles != 500

  3.1 Create bottle

  3.2 bottle = bottle + 1

4. Switch off machine

5. Stop

See attachment for flowchart

Explanation:

This begins the algorithm

1. Start

This initializes bottles to 0

2. bottles = 0

The loop is repeated until 500 bottles is created

3. While bottles != 500

This creates a new bottle

  3.1 Create bottle

This increments the number of bottles by 1

  3.2 bottle = bottle + 1

This switches of the machine after all bottles are created

4. Switch off machine

End algorithm

5. Stop

write the name of the technologies used in all five generation​

Answers

Answer:

First Generation (1940-1956)

First Generation (1940-1956)Second Generation (1956-1963)

First Generation (1940-1956)Second Generation (1956-1963)Third Generation (1964-1971)

First Generation (1940-1956)Second Generation (1956-1963)Third Generation (1964-1971)Fourth Generation (1971-2010)

First Generation (1940-1956)Second Generation (1956-1963)Third Generation (1964-1971)Fourth Generation (1971-2010)Fifth Generation (Present Day)

Answer:

Five generation :Artificial intelligence _ Each one of the five generation computer is characterized by a major technological development .

Explanation:

The place on the computer where information is stored temporarily so the processor can access it quickly is called what? Memory Kernel Mode Driver

Answers

Answer:

The answer is Memory

You have a website that accepts input from users for creating customer accounts. Input on the form is passed to a database server where the user account information is stored. An attacker is able to insert database commands in the input fields and have those commands execute on the server. Which type of attack has occurred

Answers

Answer:

SQL injection

Explanation:

SQL (Structured Query Language) Injection, are vulnerabilities associated security of SQL web interface through which an attacker can intrude into the backend of a database by modifying the queries a web program sends to the database to which it is connected

Examples of SQL injection include: Subverting application logic, which uses modified queries to alter the logic of an application. UNION attacks, which allow the retrieval of data from different tables within a database. Retrieving hidden data, which allows the attacker to have additional query results through modification of a SQL query.

What is the Sparklines group for in Excel? to place charts in individual cells working with hyperlinks selecting font styles or themes formatting the appearance of the cells or tables

Answers

Answer:

A sparkline is a tiny chart in an Excel worksheet cell that provides a visual representation of data.

In order for two queries to be UNION-compatible, they must: Select one: A. both have the same number of lines in their SQL statements. B. both output compatible data types for each column and return the same number of rows. C. both return at least one row. D. both return exactly one row.

Answers

Answer: B. both output compatible data types for each column and return the same number of rows.

Explanation:

In order for two queries to be UNION-compatible, they must be both output compatible data types for each column and return the same number of rows.

It should be noted that two relations are union compatible when both relations have the same attributes and also the domain regarding the identical attributes are thesame.

Plz help help help


What was the first electromechanical digital computer?

For your kind information I would like to tell you that don't search on internet because it will show ENIAC and that is not the answer the answeris may be ABC or MARK I. I am just confused, Please help me

Answers

Explanation:

For your kind information the answer of the question is MARK I.

Answer:

What was the first electromechanical digital computer?

=⟩ Mark I was the first electromechanical digital computer.

Hope it helpful to you

The router is physically located in a server room that requires an ID card to gain access. You've backed up the router configuration to a remote location in an encrypted file. You access the router configuration interface from your notebook computer by connecting it to the console port on the router. You've configured the management interface with a username of admin and a password of password. What should you do to increase the security of this device

Answers

Explanation:

the best thing to do is to create a personal password with a two time passcode for better security of the device

Similarities between in line css and internal css

Answers

Answer:

inline css is used to style a specific html element. for this css style, you'll only need to add the style attribute to each html tag, without using selectors. this css type is not really recommended, as each html tag needs to be styled individually. managing your website may become too hard if you only use inline css.

Explanation:

queens

An attacker gained remote access to a user's computer by exploiting a vulnerability in a piece of software on the device. The attacker sent data that was able to manipulate the return address that is reserved to store expected data. Which vulnerability exploit resulted from the attacker's actions

Answers

"A Buffer overflow" vulnerability exploit resulted from the attacker's actions.

Whenever a software or an application writes too much data into a buffer, causing neighboring storage regions to have been corrupted as a consequence, this could be determined as Buffer overflow.

⇒ There are two kinds of Buffer overflow attacks such as:

Stack-based - It will become more popular to use such memory, as well as that's only available during implementation of any code.Heap-based - Those attacks seem to be more difficult to execute because they entail overflowing overall storage capacity allotted for a program further than the space needed for something like the program's present activities.

Thus we can say that the correct answer is a Buffer overflow.

Learn more about Buffer overflow here:

https://brainly.com/question/4952591

Encryption is a process
i. To hide the massage
ii. To decipher the massage
iii. To delete the massage
iv. None of them​

Answers

Answer:

answer is i

Explanation:

jjgjnyjghjhkgukhi

Answer:

Encryption is a process by which we can conceal the original message (effectively hiding it)

Explanation:

We typically apply some kind of algorithm to encrypt a message. By doing this we are effectively hiding the original contents of the message so only the people with the appropriate secret key or knowledge of the algorithm can decipher it.

16. Which of the following is true about function return statements? A) A function can hold multiple return statements, but only one return statement executes in one function call. B) A function can hold only one return statement. C) A function can hold multiple return statements, and multiple return statements can execute in one function call. D) A function can have maximum of two return statements.

Answers

Answer:

A) A function can hold multiple return statements, but only one return statement executes in one function call

Explanation:

This is because each function can only return one value, whether it be an integer, String, or other object.

However, you can have a series of if-else statements, or case statements, to return a different value depending on information (within parameters, or variables.

Excellent. So, you can have multiple return statements, but the function will only end up executing one of these return statements and return a single value.

Hope this helps!

The statement "When there are multiple return statements but one return statement should execute the 1 function call" is true.

The following information should be considered:

This can be done as every function has only a return i.e. one value. It can be an integer, string, or any other thing. The function can't hold only 1 return statement.The function can't hold many return statements that execute one function call. The function can't have the utmost 2 return statements.

Therefore, we can conclude that option A is correct.

Learn more about the function here: brainly.com/question/12431044

Tests of controls in an advanced computer system Can be performed using actual transactions or simulated transactions. Can be performed using only actual transactions because testing of simulated transactions is of no consequence. Is inadvisable because they may distort the evidence in master files. Is impracticable because many procedures within the computer processing activity leave no visible evidence of having been performed.

Answers

Answer:

Can be performed using actual transactions or simulated transactions.

Explanation:

Artificial intelligence (AI) also known as machine learning can be defined as a branch of computer science which typically involves the process of using algorithms to build a smart computer-controlled robot or machine that is capable of performing tasks that are exclusively designed to be performed by humans or with human intelligence.

Artificial intelligence (AI) provides smarter results and performs related tasks excellently when compared with applications that are built using conventional programming.

In an advanced computer system, test of controls can be performed using actual transactions or simulated transactions.

Software that tries to monitor and track the way you use your computer.​

Answers

Explanation:

that's called a virus, and it can do much harm to your softwares

From a dictionary, the literal meaning of virus is "a piece of code which is capable of copying itself and typically has a detrimental effect, such as corrupting the system or destroying data." Therfore, the answer is clearly virus.

Hope this helps! Have a great day!

With respect to using software to build a project network, the authors contention is that... Multiple choice question. Understanding the calculations used is vital to proper use. Software makes up for the need to understand the forward/backward pass calculations and is not necessary for a person to know the pass calculations.

Answers

Answer:

They should have a common start and end node, numbering activity aides clarity, and no "if-then" statements

When constructing a project network for a project with 25-100 tasks, a common industry practice is to

utilize the "yellow sticky" approach

why is computer virus called destructive program​

Answers

Answer:

A computer virus is a malicious software program loaded onto a user’s computer without the user’s knowledge and performs malicious actions.

Viruses which are the most commonly-known form of malware and potentially the most destructive. A virus can do anything from erasing the data on a computer to hijacking a computer to attack other systems, send spam, or host and share illegal content.

Explanation:

The term 'computer virus' was first formally defined by Fred Cohen in 1983. Computer viruses never occur naturally because they are always induced by people. Once created and released, however, their diffusion is not directly under human control. After entering a computer, a virus attaches itself to another program in such a way that execution of the host program triggers the action of the virus simultaneously. It can self-replicate, inserting itself onto other programs or files, infecting them in the process. Not all computer viruses are destructive though. However, most of them perform actions that are malicious in nature, such as destroying data. Some viruses wreak havoc as soon as their code is executed, while others lie dormant until a particular event (as programmed) gets initiated, that causes their code to run in the computer. Viruses spread when the software or documents they get attached to are transferred from one computer to another using a network, a disk, file sharing methods, or through infected email attachments. Some viruses use different stealth strategies to avoid their detection from anti-virus software. Some old viruses make sure that the "last modified" date of a host file stays the same when they infect the file.  

Which of the following characterizes pooled interdependence? Multiple Choice Each member has a great deal of discretion in terms of what they do and with whom they interact while collaborating to accomplish the team’s work. Interaction in the team only occurs between members who perform tasks that are next to each other in a sequence. Members interact with a subset of other members to complete the team’s work. Group members complete their work assignments independently, and then this work is simply "piled up" to represent the group’s output. Different tasks are done in a prescribed order, and the group is structured such that the members specialize in these tasks.

Answers

Answer:

Group members complete their work assignments independently, and then this work is simply "piled up" to represent the group’s output.

Explanation:

A pooled interdependence arise or occurs when the members of a group are able to function with relative independence and then their combined output or level of productivity is used to significantly augment the group's overall performance.

A characteristic of pooled interdependence is that group members complete their work assignments independently, and then this work is simply "piled up" to represent the group’s output.

which computer is used in hospital for ultrasound?​

Answers

Answer:

Pentium Powered Computer

Explanation:

Pentium powered computer

The router is physically located in a server room that requires an ID card for access. You backed up the router configuration to a remote location in an encrypted file. You access the router configuration interface from your notebook computer using a Telnet client with the username admin and the password admin. You used the MD5 hashing algorithm to protect the password. What should you do to increase the security of this device

Answers

Answer: Use an SSH client to access the router configuration.

Change the default administrative username and password

Explanation:

Based on the information given, in order to increase the security of the device, it's vital to use an SSH client to access the router configuration. The SSH client refers to the program that helps in establishing an authenticated and secure SSH connections to the SSH servers. It's vital for operating network services securely over a network that's unsecured.

Also, the default administrative username and password should be changed to a more secure username and password which can't be easily known by a third party.

Other Questions
equivalent expression: 3 + 4(2z - 1) To assign overhead costs to each product, the company:_____.a. multiplies the activity-based overhead rates per cost driver by the number of cost drivers expected to be used per product. b. assigns the cost of each activity cost pool in total to one product line. c. multiplies the overhead rate by the number of direct labor hours used on each product. d. multiplies the rate of cost drivers per estimated cost for the cost pool by the estimated cost for each cost pool. With reference to temperature and rainfall identify and explain the differences in the climatic zones of Pakistan. pls quick!!! What type of model does the pattern show (linear or exponential)and explain please !!!!Please and thanks The idea that America was a specialnation, different from any other The following standards for variable manufacturing overhead have been established for a company that makes only one product: The following data pertain to operations for the last month: What was the variable overhead efficiency/quantity variance for the month? Group of answer choices What is the MOST IMPORTANT reason that the author wrote "TheNeglected Senses"?A. to show how blind people can learn to live more independentlyB. to help readers understand the life experience of two blind girls inTibetC. to demonstrate the challenges that face many blind people,regardless of where they livesD. to show readers how sighted people can miss out on things byignoring their other senses calculate the potential energy stored in a meta ball of mass of 80 kg kept at a height of 15m from the earth surface . What will be the potential energy when the metal ball is kept on the earth surface Take (g- 9.8 m/s] difference between stone age and Barbarian age. Outlook 365 can be described as a personal information manager.True or false Read the Declaration of the Rights of Man and the Citizen C. Use an online dictionary to look up any unfamiliar words,and then answer the following questions.Part AWhat does the Declaration of the Rights of Man and the Citizen say about rights? Which of the perspectives of science have you been exposed to the least? Jeremy is buying a new car. The total cost, including tax, is $18275. If the tax rate is 7.5% , what is the sticker price of the car? A horizontal merger between two firms occurs when: __________a. the products of the merging firms were not related in any manner before the merger.b. one firm is a producer of products, and the other firm is a producer of services.c. one firm is a domestic firm, and the other is a foreign companyd. the firms stood in a buyer-seller relationship before the merger.e. the merger partners were competitors. What is the Greatest Common Factor of thepolynomial 3x - 3y ? write a letter to the drinking water corporation requesting them to check the water supply line since there is no water supply in the taps Superior has provided the following information for its recent year of operation: The common stock account balance at the beginning of the year was $12,000 and the year-end balance was $16,000. The additional paid-in capital account balance increased $3,700 during the year. The retained earnings balance at the beginning of the year was $70,000 and the year-end balance was $91,000. Net income was $38,000. How much were Superior's dividend declarations during its recent year of operation How many solutions on the interval {0, 2020} sin 2x + 1 + sin x + cos x have? q es el texto literario y sus caractersticas 8. You are writing a formal business letter about the need to change a school rule.Which of the following is most likely your audience and purpose?friends; to entertainadministrators; to persuadechildren; to instructparents; to convince