highlight various stages in evolution of computer?​

Answers

Answer 1

Answer:

Computing began at the mechanical level, added an information level (software), then a human level and finally a community level; it is an example of general system evolution.

Information: Reduce information overload, clas...

Level: Requirements

Mechanical: Reduce physical heat or force ov...

Community: Reduce community overload, clas...

Explanation:


Related Questions

Select the correct answer.
Which relationship is possible when two tables share the same primary key?
А.
one-to-one
B.
one-to-many
C.
many-to-one
D.
many-to-many

Answers

Answer:

Many-to-one

Explanation:

Many-to-one relationships is possible when two tables share the same primary key it is because one entity contains values that refer to another entity that has unique values. It often enforced by primary key relationships, and the relationships typically are between fact and dimension tables and between levels in a hierarchy.

Richard wants to share his handwritten class notes with Nick via email. In this scenario, which of the following can help Richard convert the notes into digital images so that he can share them via email? a. Bar coding device b. Digital printing software c. Document scanner d. Radio frequency identification tag

Answers

Answer: Document Scanner

Explanation: Cos then he can easily add the paper notes to his computer and email the client.

Why are the READ and DATA statements used
together?​

Answers

Explanation:

DATA statements are used in conjunction with READ statements. Together they assign numbers or strings to variable names.

Computer programs typically perform three steps: input is received, some process is performed on the input, and output is produced.

a. true

b. false

Answers

The statement is true. Computer programs typically involve receiving input, performing a process on the input, and producing output as a result.

The statement "Computer programs typically perform three steps: input is received, some process is performed on the input, and output is produced" is true. It accurately describes the fundamental operations of most computer programs. Input refers to the data received by the program, which can be user input or data from another program.

The process involves manipulating the input data to achieve a desired outcome, such as performing calculations or transforming the data. Finally, the output is the result of the process, which can take various forms like on-screen display, saved files, or data sent to other programs. Therefore, the correct option is a. True.

Learn more about Computer programs here:

https://brainly.com/question/23275071

#SPJ11

Write a program that inputs the length of two pieces of fabric in feet and inches(as whole numbers) and prints the total

Write a program that inputs the length of two pieces of fabric in feet and inches(as whole numbers) and

Answers

Converting from inches to feet requires a modulo operator.

The modulo operator returns the remainder of a division.

The program in Python, where comments are used to explain each line is as follows:

#This gets the input for feet

feet1 = int(input("Enter the Feet: "))

#This gets the input for inches

inch1 = int(input("Enter the Inches: "))

#This gets another input for feet

feet2 = int(input("Enter the Feet: "))

#This gets another input for inches

inch2 = int(input("Enter the Inches: "))

#This calculates the total inches, using the modulo operator

totalInches = (inch1 + inch2)%12

#This calculates the total feet

totalFeet = feet1 + feet2 + (inch1 + inch2)//12

#This prints the required output

print("Feet: {} Inches: {}".format(totalFeet,totalInches))

At the end of the program, the total feet and total inches are printed.

Read more about similar programs at:

https://brainly.com/question/13570855

describe what is involved in the first four stages of a research project

Answers

Answer:

Step 1: Identify the Problem. ...

Step 2: Review the Literature. ...

Step 3: Clarify the Problem. ...

Step 4: Clearly Define Terms and Concepts. ...

Step 5: Define the Population. ...

Step 6: Develop the Instrumentation Plan. ...

Step 7: Collect Data. ...

Step 8: Analyze the Data.

What happens if a sequence is out of order?

Answers

Answer:

If you are trying to put the events in order and they are out of order you will probaly get the question wrong so make sure the events are in order.

Explanation:

Answer: a, The program may not work correctly.

Explanation: Because I do coding, and learned this already.

As window is the global object of JavaScript, it is not necessary to code the object name before the method name you cannot use the confirm() method with the window object it is not necessary to convert numbers returned by the prompt() method using parseint() or parseFloat)
None of the options

Answers

Since an confirm() function cannot be used since window is a global object in JavaScript, it is not essential to write the object name before the method name.

An item that constantly exists in the global scope is known as a global object. A global object is always defined in JavaScript. When scripts create global variables in a web , they do so as members of the global object and declare them with the var keyword. (This is not the case in Node. js.)In JavaScript, a var, const, or let variable must be declared outside of any blocks or functions and in the global scope if we want to declare a global variable. MyVal is a global variable that we declared above and gave the value of 10. Additionally, the myFun function makes myVal available, confirming that myVal is a global variable.

To learn more about JavaScript click on the link below:

brainly.com/question/14558968

#SPJ11

T/F:when writing a report, style means the tone of language you use to address the reader.

Answers

The given statement is True.

Is the tone of language used to address the reader considered as the style in report writing?

When writing a report, style refers to the tone of language used to address the reader. It encompasses the overall manner in which information is presented and communicated. The style of a report includes the choice of words, sentence structure, and level of formality employed throughout the document.

By adopting an appropriate tone, the writer can effectively convey their message and engage the reader. In report writing, a formal and professional tone is generally preferred, as it conveys authority and credibility.

However, the specific style may vary depending on the purpose, audience, and subject matter of the report.

Learn more about report

brainly.com/question/14969693

#SPJ11

(Malicious Code) A coworker has asked if you want to download a programmer's game to play at work. What should be your response?

Answers

Response: "No, downloading software from unknown sources poses a significant security risk to our company's network and data."

It's important to be cautious when it comes to downloading software, especially from unknown sources. Malicious code can be disguised as harmless programs, and once downloaded, it can harm the computer and the network it's connected to. It's important to follow company policies and only download software that has been approved by IT or other relevant authorities. Additionally, playing games at work can be a distraction from job duties and may not be allowed by company policy. It's best to prioritize security and productivity at work and avoid downloading unknown software.

learn more about software here:

https://brainly.com/question/985406

#SPJ11

Can someone please give me the 3.6 code practice answer I will mark you brainlyist

Answers

3.6 Code Practice Question:

Write a program to input 6 numbers. After each number is input, print the biggest of the number entered so far:

Answer:

nums = []

biggest = 0

for i in range(6):

    num = int(input("Number: "))

    nums.append(num)

    if(i == 0):

         print("Largest: "+str(nums[0]))

         biggest = nums[0]

    else:

         if nums[i]>biggest:

              print("Largest: "+str(nums[i]))

              biggest = nums[i]

         else:

              print("Largest: "+str(biggest))

                       

Explanation:

This question is answered using python

This line declares an empty list

nums = []

This line initalizes the biggest input to 0

biggest = 0

This iteration is perfoemed for 6 inputs

for i in range(6):

This prompts user for input

    num = int(input("Number: "))

This appends user input to the list created

    nums.append(num)

For the first input, the program prints the first input as the largest. This is implemented in the following if condition

    if(i == 0):

         print("Largest: "+str(nums[0]))

         biggest = nums[0]

For subsequent inputs

    else:

This checks for the largest input and prints the largest input so far

         if nums[i]>biggest:

              print("Largest: "+str(nums[i]))

              biggest = nums[i]

         else:

              print("Largest: "+str(biggest))

An atomicCAS can be used to atomically increment a variable by 128.true/false

Answers

The answer is False.

An atomicCAS (compare and swap) function is used to atomically update a variable's value. It compares the variable's current value to an expected value, and if they match, updates the value to a new value. If they do not match, it does not update the value. It is commonly used in parallel programming to prevent race conditions when multiple threads are accessing the same variable.

However, an atomicCAS function does not increment a variable by a specific value like 128. Instead, it can be used to increment the variable by 1 atomically by setting the expected value to the current value plus 1. To increment by 128, one could use a loop that performs multiple atomicCAS operations, each time incrementing the value by 1 until it reaches 128.

In summary, the statement that an atomicCAS can be used to atomically increment a variable by 128 is false.

Learn more on Atomically here :  brainly.in/question/40829559

#SPJ11

An array of int named a that contains exactly five elements has already been declared and initialized. In addition, an int variable j has also been declared and initialized to a value somewhere between 0 and 3. Write a single statement that assigns a new

Answers

Answer:

a[j] = 2 * a[j+1];

Explanation:

The complete statement is to Write a single statement that assigns a new value to the element of the array indexed by j. This new value should be equal to twice the value stored in the next element of the array.

So lets say a is an array of type int which is already declared and initialized.

int a[] = {};

declare an int variable j as int j;

The element of array a indexed by j can be represented as a[j] This means the j-th index of array a

The value to be assigned to a[j] is 2 * a[j+1]; with an assignment operator "= " between a[j] and 2 * a[j+1]; in order to assign 2 * a[j+1]; to a[j]

According to the requirement this new value should be twice the value stored in next element of array. The next element of array is represented by a[j+1] which means j+1 index of array a. This means the element at j+1 index that comes after the element at j-th index a[j].

Value should be twice the value stored in next element of array means multiply the 2 with the next element of array i.e. a[j+1]

Now assign this new value  2 * a[j+1];  to a[j].

Discuss the evolution of file system data processing and how it is helpful to understanding of the data access limitations that databases attempt to over come

Answers

Answer:

in times before the use of computers, technologist invented computers to function on disk operating systems, each computer was built to run a single, proprietary application, which had complete and exclusive control of the entire machine. the  introduction and use of computer systems that can simply run more than one application required a mechanism to ensure that applications did not write over each other's data. developers of Application addressed this problem by adopting a single standard for distinguishing disk sectors in use from those that were free by marking them accordingly.With the introduction of a file system, applications do not have any business with the physical storage medium

The evolution of the file system gave  a single level of indirection between applications and the disk the file systems originated out of the need for multiple applications to share the same storage medium. the evolution has lead to the ckean removal of data redundancy, Ease of maintenance of database,Reduced storage costs,increase in Data integrity and privacy.

Explanation:

Which of the following adds digital elements to a live view, often by using the camera on a smartphone? O Augmented reality O Forecasting O Problem-solving O Virtual reality​

Answers

Answer:

augmented reality

Explanation:

think "pokemon go" when youre relaxing with your buddy and you feed it berries

please write the code for this:

Enter a word: Good
Enter a word: morning
Good morning

Answers

w1 = input("Enter a word: ")

w2 = input("Enter a word: ")

print(w1,w2)

I wrote my code in python 3.8. I hope this helps.

Answer:

G_0o*4 Mrn --ing

Explanation:

G = G

_ = space

o = O

* = space

4 = D (the fourth letter in the alphabet)

Mrn = Abbrev. of Morn (ing)

-- = space

ing = ing (last 3 letters of "morning")

Hope this helps <3

beta-carotene is a plant chemical that also __________.

Answers

Beta-carotene is a plant chemical that also functions as a provitamin A, meaning it can be converted into vitamin A (retinol) within the body. This essential nutrient plays a vital role in supporting healthy vision, immune function, and overall growth and development. Beta-carotene is also an antioxidant, which helps protect cells from damage caused by free radicals.

β-Carotene (beta-carotene) is a natural, emphatically hued red-orange shade bountiful in organisms, plants, and natural products. It has 40 carbons and is one of the carotenes, which are terpenoids (isoprenoids). It is made biochemically from eight isoprene units. Beta-rings on both ends of the molecule make -carotene stand out among the carotenes. - Geranylgeranyl pyrophosphate is used in the biosynthesis of carotene.

In some Mucoralean organisms, β-carotene is a forerunner to the union of trisporic corrosive.

The most prevalent form of carotene found in plants is -carotene. The E number for it when used as a food coloring is E160a. 119 Karrer et al. deduced the structure. in 1930. Through the action of beta-carotene 15,15'-monooxygenase, -carotene is a precursor (inactive form) to vitamin A in nature.

Column chromatography is typically used to isolate beta-carotene from carotenoids-rich fruits. It can likewise be removed from the beta-carotene rich green growth, Dunaliella salina. The polarity of a compound is what distinguishes -carotene from the mixture of other carotenoids. Since carotene is a non-polar compound, a non-polar solvent like hexane is used to separate it. Being exceptionally formed, it is profoundly shaded, and as a hydrocarbon lacking utilitarian gatherings, it is extremely lipophilic.

Know more about beta-carotene here:

https://brainly.com/question/4339695

#SPJ11

Need the answer ASAP!!! I’ll mark brainliest if correct

Select the correct answer.
Project team member Kevin needs to define the use of change bars to show deleted and modified paragraphs. Under which standards does
this fall?
O A.
interchange standards
OB.
identification standards
O C.
update standards
OD.
process standards
O E.
presentation standards

Answers

Answer:

I think it's c because it's change and with change most the time change comes with updates

Answer:

update standards

Explanation:

Monica is teaching herself to paint. What web resource would be the most helpful

Answers

Answer:

Video Tutorial

Explanation:

The others don’t make sense.

Answer: video tutorial

Abe is creating a presentation and wants to grab the audience's attention with a visual effect when he moves from one slide to another. What should he add to the presentation?

Answers

Answer:

Transition effect

Explanation:

When creating a presentation using PowerPoint, to add a visual effect when moving from one slide to another, you'll need to add Transition effects.

A transition effect is an animation that determines how a presentation slide will move to the next slide. This effect could either be Fade, Warp, etc.

Describes two calls to the procedure identified in written response 3c. Each call must pass a different argument(s) that causes a different segment of code in the algorithm to execute.

Answers

In both of these calls, the procedure is being called with a different argument value for "x", resulting in a different segment of code in the algorithm being executed. This demonstrates how the behavior of the algorithm can be altered by passing different argument values to the procedure.

In order to describe two calls to the procedure identified in written response 3c, we first need to know what the procedure is and what arguments it accepts. Assuming that the procedure accepts an argument for a specific input value, let's say "x", we can make two different calls to the procedure passing different argument values.

Call 1: Procedure(x=5)
This call passes the argument value of 5 for "x", causing the segment of code in the algorithm that handles inputs equal to 5 to execute.

Call 2: Procedure(x=8)
This call passes the argument value of 8 for "x", causing the segment of code in the algorithm that handles inputs equal to 8 to execute.

In both of these calls, the procedure is being called with a different argument value for "x", resulting in a different segment of code in the algorithm being executed. This demonstrates how the behavior of the algorithm can be altered by passing different argument values to the procedure.

learn more about algorithm

https://brainly.com/question/22984934

#SPJ11

In which of the following stages of the development process is a team MOST likely to interview a potential user of an app?
O A. investigating and reflecting
B. designing
C. prototyping
D. testing

Answers

B draining I’m pretty sure is the answer

tle electrical instulation maintance
1.what is inventory 2. what is job order 3. what is barrow form 4. what is purchase request

Answers

Inventory refers to the process of keeping track of all materials and equipment used in electrical insulation maintenance.  A job order is a document that contains all the information necessary to complete a specific maintenance task.

Definition of the aforementioned questions

1) Inventory refers to the process of keeping track of all materials and equipment used in electrical insulation maintenance. This includes maintaining a list of all the items in stock, monitoring their usage, and ensuring that there are enough supplies to meet the demands of the job.

2) A job order is a document that contains all the information necessary to complete a specific maintenance task. This includes details about the task, such as the materials and tools required, the location of the work, and any safety considerations.

3) A barrow form is a document used to request materials or equipment from the inventory. It contains details about the requested item, including the quantity, the purpose of the request, and the name of the person or team making the request. The form is usually signed by an authorized person and submitted to the inventory manager or other appropriate personnel.

4) A purchase request is a document used to initiate the process of purchasing new materials or equipment for the electrical insulation maintenance program. It contains details about the item to be purchased, including the quantity, the cost, and the vendor or supplier. The purchase request is typically reviewed and approved by a supervisor or manager before the purchase is made.

learn more about electrical insulation maintenance at https://brainly.com/question/28631676

#SPJ1

How do I give an answer brainliest?

Answers

I’m wondering this to!!!

Answer:

when two people answer there would be a white crown at the bottom right corner (of the answer) when you click on it it turns yellow/gold which means that you have marked that answer brainliest.

Pick the better answer (in your opinion) and then mark it brainliest.

Help don't know answer

Help don't know answer

Answers

Your answer is C, performance.

executive order on enhancing safeguards for united states signals intelligence activities

Answers

Making strides toward sufficiency with the Executive Order on Strengthening Protective measures for US Signal Intelligence Agencies. As mentioned in our earlier blog post, the US White House released an Executive Order on improving safeguards for American signals intelligence activities on October 7, 2022.

What is the function of signal intelligence?

Signal intelligence: what is it? Key civilian and military authorities are among the clients of SIGINT, which gathers intelligence information from communications and data systems and provides it to them.

What is a signals analyst responsible for?

As nothing more than a Signals Intelligence Agent, you will investigate and assess foreign communications and behaviour to gather intelligence, and you will communicate this vital knowledge to top management by creating strategic and strategic reports based on your investigation.

To know more about signals intelligence visit:

https://brainly.com/question/14824818

#SPJ4

__________ is more efficient than interrupt-driven or programmed I/O for a multiple-word I/O transfer.

Answers

Answer:

Direct memory access

Explanation:

DMA is Direct Memory Access, which is the way a peripheral transfers data in blocks, rather than characters. It's faster, and frees up the CPU to get on with other stuff while the data transfer happens independently.

g which principle form the security triad ensures that only authorized people can after data? validity integrity accuracy consistency

Answers

The security triad, also known as the CIA triad, is a model used to guide the design and implementation of computer and information security systems.

The three guiding principles are availability, integrity, and confidentiality.

Keeping information private guarantees that only those with permission can view it. It safeguards information privacy and avoids the unlawful disclosure of private or sensitive data.

Integrity guarantees that information is true and full and that it cannot be changed by unauthorized parties.

Access to data and systems is made available so that authorized people can use them when they're needed.

These ideas work together to provide a secure system by guarding against illegal access to, changes to, and disruptions of data and systems.

To know more about Security triad kindly visit
https://brainly.com/question/29328797

#SPJ4

system of knotted strings for record-keeping and communication

Answers

The system of knotted strings for record-keeping and communication is called Quipu.

What is the quipu

Quipu was used by several ancient civilizations, most notably the Inca civilization in pre-Columbian South America. It consists of a series of strings made from cotton or camelid fibers, such as llama or alpaca, with knots tied at different intervals and positions along the strings. The knots and their arrangement represented various types of information, including numerical data, accounting records, historical events, and even narratives.

The complexity of the quipu system allowed for the encoding and storage of a wide range of information. Different colors, types of fibers, and knot patterns were used to convey specific meanings.

Reda more on communication  here https://brainly.com/question/28153246

#SPJ4

there are two common network strategies: client/server network and peer-to-peer network. group of answer choices true

Answers

Peer-to-peer networks can be more expensive than client/server networks. The scaling of client/server networks may need the purchase of additional client licenses.

Network types include client-server and peer-to-peer. Multiple clients connect to a server in a client-server network. The server offers the necessary services as requested by the customers. In contrast, there are no specific clients or servers in a peer-to-peer network. The peer-to-peer network links computers so that they can all share all of the resources or a portion of them. One or more central computers or servers that administer the resources and store the data are required for the client-server networks to function.

Learn more about networks here:-

https://brainly.com/question/15088389

#SPJ4

Other Questions
The World Health Organization defines health as a balance of physical, mental, and _____ well-being.A. SocialB. consumerC. psychologicalD. environmental Fugitive slave act of 17931. PART A: Which of the following best summarizes acentral idea of the text?A. Slavery has always been a controversial anddivided issue in the United States.B. Southern states, which were the majority slave-holding states, held great influence in Congressand their legislation.C. Runaway slaves were considered fugitives andcould then be hunted down, arrested, andretrieved.D. America allowed slaveholders to run wild all overthe country and the free states in search of theirmissing slaves. Answer this and tell me why you believe its the answer PLZ HELP FAST looks easy 2. Which of the following best explains why muscle cells have more mitochondria than most other types of cells? a. Muscle cells need to be able to communicate with the nervous system to control their contraction and relaxation b. Muscle cells need to be able to capture energy from the sun to produce energy is a usable form c. Muscle cells need to be able to store large amounts of nutrients and waste because they are so active d. Muscle cells need to quickly convert energy from food molecules into a usable form The 20 august 2017, you receive a invoice of 10 000$ for school taxes covering the period from july 1st 2017 to june 30th 2018. The payment is made the 30 september 2018. Register all the journal entryaugust :September : Find the position vector R(t) and velocity V(t) given the acceleration A(t)=125e^(5t)i+75cos(5t)j+12tk and the initial velocity vector V(0)=2i2j3k and initial position vector R(0)=3i+3jk. V(t)=R(t)= what is the sum of -7/10+4/10 Suppose that the Mathematics marks of all the students in the class are normally distributed with mean mark 54 and standard deviation 16. What is the probability that a student's mark is more than 75? In a class of 50 students, how many students should have a mark of more than 75? Which sentence best represents the main idea of paragraph (2), the first body paragraph? (5points) Sara is making fruit baskets. She has 27 apple and 36 oranges. Sara wants to make all the fruit baskets identical without having any pieces of fruit left over. What is the greatest number of fruit baskets Sara can make? 10=b/4what does b equal? To jump at a local trampoline park, each attendee is charged $14.75 per hour. In addition, each attendee must spend $3.50 to purchase a pair of jumping socks. The trampoline park also offers food specials. Currently, attendees can purchase a super pizza deal, which includes a large pizza and a pitcher of soda, for only $15.50 . Five friends decide to visit the trampoline park. Each friend will buy a pair of socks and jump for two hours. The friends will also buy one super pizza deal to share. I need help with this so please help me with this! how does marian's appearance contrast with the seeting? what does this suggest about her presence there quizlet Putting the patient at the center of the decisions, resources, and desired outcomes and providing the necessary information that empowers patients to become involved in making decisions regarding their own treatment. Explain the role of glucagon in maintaining glucose levels when the organism is hungry. Aside from claiming land for Spain, what was the purpose of Ferdinand Magellan's voyage in 1519? A. to be the first explorer to successfully circumnavigate the globeB. to enhance commercial ties previously established by Vasco da GamaC. to explore the coast of Africa and sail around itD. to prove one could sail to Asia by way of South America instead of Africa Which of the following will be the ratio of the perimeter of the blue triangle to the red triangle. In AGHI, GI is extended through point I to point J, mZIGH (x + 16), m_HIJ = (4x 12), and mZGHI = (x + 10). Find mZGHI.