Which statement best illustrates how Herman Hollerith's counting machine
was a precursor to today's modern programming?
A. Today's programming languages are all used to count objects the
way Hollerith's machine did.
B. The size of the machine determined how many instructions it
could understand.
C. Today's programming languages are much more advanced than
Hollerith's machine.
D. The location of the holes on the punch cards represented different
numbers and details.
SUBMIT

Answers

Answer 1

Herman Hollerith is considered to be a forerunner of modern programming technology because today's programming includes aspects developed by Herman Hollerith (option A).

Who was Herman Hollerith?

Herman Hollerith (1860-1929) was an American inventor who was noted for having developed an electromagnetic punched card tabulator to aid in data collection and analysis.

His tabulating machine is one of the most important inventions in data processing because it uses electromagnetic programming that has influenced the development of the most modern machines.

Learn more about Herman Hollerith in: https://brainly.com/question/24417344


Related Questions

Purchase a PC
This exercise can be done in class and allows the Instructor to walk through the process of deciding on which equipment to purchase from an online vendor for personal use or professional use.
You can visit the site here: Configurator
Create a Word Document and Answer the following:
1. Why choose the accessories?
2. What is RAM and explain in general terms what the different types are (DDR3, DDR4)?
3. Why does some RAM have DDR4-3200? What does the 3200 mean?
4. What is the difference between Storage devices like SSD and HDD?
5. Why choose an expensive Video card (GPU)?
6. What are the general differences between i3, i5, i7, i9 processors?
7. What is the difference in Audio formats like 2.1, 5.1, 7.1, Atmos, and so on? What is the .1?

Answers

1. Choosing accessories depends on the specific needs and requirements of the individual or the purpose of use. Accessories enhance functionality, improve performance, and provide additional features that complement the main equipment.

They can optimize user experience, improve productivity, or cater to specific tasks or preferences.

2. RAM stands for Random Access Memory, a type of computer memory used for temporary data storage and quick access by the processor. DDR3 and DDR4 are different generations or versions of RAM. DDR (Double Data Rate) indicates the type of synchronous dynamic random-access memory (SDRAM). DDR4 is a newer and faster version compared to DDR3, offering improved performance and efficiency.

3. DDR4-3200 refers to the speed or frequency of the RAM. In this case, 3200 represents the data transfer rate of the RAM module in mega transfers per second (MT/s). Higher numbers, such as DDR4-3200, indicate faster RAM with higher bandwidth and improved performance than lower-frequency RAM modules.

4. SSD (Solid-State Drive) and HDD (Hard Disk Drive) are both storage devices but differ in technology and performance. HDDs use spinning magnetic disks to store data, while SSDs use flash memory chips. SSDs are generally faster, more durable, and consume less power than HDDs. However, SSDs are typically more expensive per unit of storage compared to HDDs.

5. Expensive video cards, also known as graphics processing units (GPUs), offer higher performance, better graphics rendering capabilities, and improved gaming experiences. They can handle demanding tasks such as high-resolution gaming, video editing, 3D modeling, and other graphically intensive applications. Expensive GPUs often have more advanced features, higher memory capacities, and faster processing speeds, allowing for smoother gameplay and better visual quality.

6. i3, i5, i7, and i9 are processor models from Intel. Generally, i3 processors are entry-level and offer basic performance for everyday tasks. i5 processors provide a good balance between performance and affordability and are suitable for most users. i7 processors offer higher performance and are better suited for demanding tasks such as gaming and multimedia editing. i9 processors are the most powerful and feature-rich, designed for professional users and enthusiasts who require top-tier performance for resource-intensive applications.

7. Audio formats like 2.1, 5.1, 7.1, and Atmos refer to the configuration of speakers and audio channels in a surround sound system. The number before the dot represents the number of prominent speakers (left, right, center, surround) in the system, while the number after the dot represents the number of subwoofers for low-frequency sounds. For example, 2.1 indicates two main speakers and one subwoofer, 5.1 refers to five main speakers and one subwoofer, and so on. Atmos is an immersive audio format that adds height or overhead channels to create a more

To know more about RAM:

https://brainly.com/question/31089400

#SPJ1

Which one of these stores more data than a DVD ?
Floppy
CD Rom
Blue Ray Disk
Red Ray Disk
Submit

Answers

Answer:

Blue Ray Disk

Explanation:

Using do while loop,write a program that will input numbers and display the count of odd numbers.(c++ programming)
Output:
Enter a number:30,17,22,9,14
Odd numbers found:2
Even numbers found:3

Answers

Answer:

#include <iostream>

using namespace std;

int main()

{

   // Declare variables to store the number input by the user and the count of odd and even numbers

   int number, oddCount = 0, evenCount = 0;

   // Use a do-while loop to input numbers until the user enters a negative number

   do

   {

       cout << "Enter a number: ";

       cin >> number;

       // Increment the count of odd numbers if the input number is odd

       if (number % 2 == 1)

       {

           oddCount++;

       }

       // Increment the count of even numbers if the input number is even

       else if (number % 2 == 0)

       {

           evenCount++;

       }

   }

   while (number >= 0);

   // Print the count of odd and even numbers

   cout << "Odd numbers found: " << oddCount << endl;

   cout << "Even numbers found: " << evenCount << endl;

   return 0;

}

Explanation:

This program will prompt the user to enter a number, and it will continue to input numbers until the user enters a negative number. For each number that is input, the program will increment the count of odd numbers if the number is odd, or the count of even numbers if the number is even. Finally, the program will print the count of odd and even numbers.

Here is an example of the output you would see if you ran this program:

Enter a number: 30

Enter a number: 17

Enter a number: 22

Enter a number: 9

Enter a number: 14

Enter a number: -5

Odd numbers found: 2

Even numbers found: 3

Which of the following represents an input on a smartphone?
A pressing the volume key
B an appointment displayed by your calendar
C your phone ringing
D your screensaver turning on

Answers

Answer:

Pressing the volume key.

Explanation:

The appointment is and output. It is being shown to you from the smartphone.

The volume key is an input. Your telling the smartphone to raise its volume.

The phone ringing is also an output, and so is the screensaver turning on.

Answer:

A. Pressing the Volume Key

Hope this helped (~0>0)~


The difference between Return key and word Wrap

Answers

the enter key is used when we want to go directly to the next line while writing whereas through word wrap the cursor automatically shifts to the next line when the word limit for a particular line is exceeded


You are reorganizing the drive on your computer. You move several files to a new folder located on the same partition. When you move the files to the new folder,
what happens to their permissions?

Answers

Businesses frequently use a VPN to provide remote workers with access to internal software and data or to establish a single shared network among numerous office locations.

What is a VPN, and why do businesses use them?An encrypted connection between user devices and one or more servers is established by a virtual private network (VPN), a service that provides Internet security. A VPN can safely link a user to the internal network of a business or to the Internet at large. Businesses frequently use a VPN to provide remote workers with access to internal software and data or to establish a single shared network among numerous office locations.  The ultimate objective in both situations is to keep web traffic, especially traffic with proprietary data, off the public Internet.

To Learn more about VPN refer to:

https://brainly.com/question/16632709

#SPJ9

Businesses frequently use a VPN to provide remote workers with access to internal software and data or to establish a single shared network among numerous office locations.

What is a VPN, and why do businesses use them?An encrypted connection between user devices and one or more servers is established by a virtual private network (VPN), a service that provides Internet security.A VPN can safely link a user to the internal network of a business or to the Internet at large.Businesses frequently use a VPN to provide remote workers with access to internal software and data or to establish a single shared network among numerous office locations.  The ultimate objective in both situations is to keep web traffic, especially traffic with proprietary data, off the public Internet.

To Learn more about VPN refer to:

brainly.com/question/16632709

#SPJ9

Gap analysis is _____.


identifying the requirements to reach your desired outcome
identifying the requirements to reach your desired outcome

analyzing the speed of the current network
analyzing the speed of the current network

determining the difference between what is happening now and what you want to happen
determining the difference between what is happening now and what you want to happen

analyzing the problems with employee productivity

Answers

Answer:

Gap analysis is the process of analyzing the difference between actual performance and desired or target performance in order to identify opportunities or gaps for improvement. It involves assessing organizational systems, processes, goals and objectives, products/services offered by an organization, customer needs, etc., so as to make sure that they are reaching their potential. Gap analysis can also be used to analyze employee productivity levels and determine what areas need improvement in order for employees to reach optimum efficiency.

TESLA developers have created a customer portal that’s being hosted on the application server. The IT assistant’s task is to ensure the portal is accessible from outside the company network, while also segregating the portal from the internal LAN. Explain how you would achieve this.

Answers

Because of bugs, anyone was able to remotely unlock doors, use the horn, and start the vehicle.

Why is it called a bug?In engineering, the term has been in use since the nineteenth century. In actuality, "bug" is short for "Bugbear" (sometimes found as Bugaboo).Its meaning is much more akin to that of the movie "Gremlin," where those who worked on engineering prototypes frequently began to suspect that the issues were caused by nefarious spooks.Because of security flaws discovered in a popular open source logging tool used by Tesla owners, a security researcher claimed he was able to remotely access dozens of Teslas all over the world.Colombo acknowledged that the bug has been repaired. Until the vulnerability could no longer be exploited, TechCrunch held onto this story.

To learn more about Bug refer to:

https://brainly.com/question/28235451

#SPJ1

Assign total_owls with the sum of num_owls_A and num_owls_B.

Sample output with inputs: 3 4
Number of owls: 7

This is what is given to me
total_owls = 0

num_owls_A = input()
num_owls_B = input()


print('Number of owls:', total_owls)

my code
total_owls = num_owls_A + num_owls_B

That gets me 34 for some reason instead of 7. What am I doing wrong?

Answers

To debug a code, means that we locate and fix the errors in a code.

The issue with your code is that:

You did not convert num_owls_A and num_owls_B to integers, when adding them together.

The fix to this is that:

You need to convert num_owls_A and num_owls_B to integers, when adding them together.

The fix is as follows:

total_owls = int(num_owls_A) + int(num_owls_B)

The updated code is as follows:

total_owls = 0

num_owls_A = input()

num_owls_B = input()

total_owls = int(num_owls_A) + int(num_owls_B)

print('Number of owls:', total_owls)

The above code will perform addition operations for all inputs

Read more about Python programs at:

https://brainly.com/question/13246781

Pleased answer all questions

Pleased answer all questions

Answers

The programming paradigm  is a term that is said to be called object-oriented programming (OOP)  and it is one that tends to places a lot of details emphasis on the depiction of data as well as behavior via the use of objects,

What is the object oriented programming?

There are found to be four main kinds of oriented programming OOP and they are as follows: polymorphism, encapsulation, inheritance, as well as abstraction

Therefore, Encapsulation is seen as is the process of showing forth only the needed information to the user and then covering the object's implementation details.

Learn more about object oriented programming from

https://brainly.com/question/14078098

#SPJ1

See text below



1.Explain the principles of object oriented programming with suitable examples.

2. Write a program in java to find the greatest of three numbers.

3.Predict the output of the following program snippets. char ch 'F',chl-'a',ch2='A';

int m-ch;

int n-chl;

int p-ch2;

int q=m+n+p;

System.out.println(m+" "+ch); System.out.println(n+" "+ch 1); System.out.println(p+" "+ch2); System.out.println(q);

4.Distinguish between

(i) Syntax error and logical error (ii) testing and debugging

(iii) if and switch statement

5) What do you understand by token. Name different type of tokens in java.

6. The telephone department charges from the subscribers for the number of calls as follows

Up to 50 calls free

Next 100 calls-1 cedi Next 200 calls -1.5 cedi Beyond 350 calls 2 cedi

Input the number of calls and print the amount to be paid.

Pleased answer all questions
Pleased answer all questions
Pleased answer all questions

Highlight three (3) typical User Requirements and three (3) typical System
Requirements of the ATM system. Use both Natural Language and Form-Based
Specifications to illustrate the typical requirements

Answers

As part of each transaction, an user will be obligated to insert an ATM card and enter a personal identification number (PIN), both of which will be sent to the bank for validation.

What is ATM?

ATMs are convenient because they allow consumers to perform quick self-service transactions such as deposits, cash withdrawals, bill payments, and account transfers.

Fees for cash withdrawals are frequently charged by the bank where the account is held, the operator of the ATM, or both.

A user will be required to insert an ATM card and enter a personal identification number (PIN) as part of each transaction, both of which will be sent to the bank for validation.

The customer's unique ID must be accepted by the ATM system. The ATM system must accept the customer's choice for a variety of banking transactions.

The ATM system must accept the customer's account type for deposits, balance inquiries, and payments on account.

Thus, these are some of the requirements for ATM.

For more details regarding ATM, visit:

https://brainly.com/question/3450346

#SPJ1

Which three statements are true about lossless compression?
A. It reduces the file size temporarily.
B. It is used to reduce the size of text documents.
C. It sends data to all the devices on a network.
D. It allows all of a file's original data to be restored from the
compressed data.

Answers

The following three statements concerning lossless compression are true: Text documents can be made smaller using it. It temporarily reduces the file size and enables the restoration of a file's original data.

What three types of lossless compression are there?

The lossless compression algorithms GZIP, Brotli, WebP, and PNG are examples. On the other hand, lossy compression employs approximate methods by deleting some data from the source file, making it an irreversible compression technique.

What about lossless compression techniques is accurate?

When a file is decompressed, lossless compression reconstructs and restores the data in the original format. For instance, a picture's quality doesn't suffer when its file size is reduced. You can uncompress the file to view its original size.

To know more about documents visit:-

https://brainly.com/question/13406067

#SPJ1

Consider the three subnets in the diagram belo subnet 223.1.2/24 subnet 223.1.3/29 subnet 223.1.1/24 Which of the following addresses can not be used by an interface in 223.1.3/29 network? Check all that apply. Select one or more:
a. 223.1.3.28
b. 223.1.3.2
c.223.1.2.6
d. 223.1.3.16
e. 223.1.3.6

Consider the three subnets in the diagram belo subnet 223.1.2/24 subnet 223.1.3/29 subnet 223.1.1/24

Answers

The addresses can not be used by an interface in 223.1.3/29 network is (e): 223.1.3.6.

What is interface?

1. When referring to software, a user interface is a program that allows a user to interact with computers in person or over a network. User interface can also refer to program controls  that allow the user to interact with the program. One of the best examples of a user interface is a GUI (Graphical User Interface). This is the type of interface  you are currently using  to navigate your computer and reach this page.

2. When referring to hardware, an interface is a physical device, port, or connection that communicates with a computer or other hardware. For example, IDE and SATA are disk drive interfaces for computer hard drives, and ATAPI is an early interface for CD-ROM drives.

To learn more about interface, refer;

https://brainly.com/question/14235253

#SPJ4

Explain the role of an operating system with respect to
following functions:
(i) Process management
(ii) Memory management
(iii) File management
(iv) Device management

Answers

The function of an operating system with respect to Memory management

The memory management error connects to the computer's memory, which can be a physical situation with the installed RAM. The Windows Memory Diagnostic Tool can help uncover if this is the root of the problem. When Windows restarts, it will tell you if something is awry with your memory.

What are the three kinds of memory management?Memory management techniquesSingle adjacent allocation.Partitioned budget.Paged memory management.Segmented recollection management.

What is memory control and its types?

Memory management is the functionality of an operational system which handles or manages primary memory and moves processes back and forth between main recollection and disk during execution. Memory management keeps track of each and every memory location, however of either it is allocated to some process or it is free.

To learn more about memory management, refer

https://brainly.com/question/27807893

#SPJ9

I need help
I am thinking about coming out to my mom because we are going to the store today and I will be in the car, I dont know if I should or not

Answers

Answer:

do it! you will have to one day so why not now? hopefully she will understand and say nice things as well and be like mom ive

been thinking a lot and i really want to tell you something. Explanation:

Answer:most likely she is your parent that you live with so she might already know but has not said anything it also depends her personality but if your ready and know or think she would not hate you forever go for it

Explanation:

fish Aquarium System of functional and Non-Functional requirement of the system.

Answers

hoping that it was helpful to you

plz mark me as brainlist answer

fish Aquarium System of functional and Non-Functional requirement of the system.

c = 1 sum = 0 while (c < 10): c = c + 2 sum = sum + c print (sum)

Answers

Answer:

35

Explanation:

The loop runs 5 times with the following values of c: 1,3,5,7,9 at the start of the iteration, and 2 higher at the end. So the values that get added to sum are: 3,5,7,9,11, hence sum = 3+5+7+9+11 = 35.

Always look carefully at the last iteration of a loop. At the last iteration, when c equals 9, it is still valid to make another iteration. However, 11 gets added to the sum.

\(\huge \boxed{\sf 35}\)

       c = 1, sum = 0

(The loop runs)

1 < 10, c = 1 + 2, sum = 0 + 3

       c = 3, sum = 3

3 > 10, c = 3 + 2, sum = 3 + 5

       c = 5, sum = 8

5 > 10, c = 5 + 2, sum = 8 + 7

       c = 7, sum = 15

7 > 10, c = 7 + 2, sum = 15 + 9

       c = 9, sum = 24

9 > 10, c = 9 + 2, sum = 24 + 11

       c = 11, sum = 35

(The condition is false and the loop ends)

11 > 10, print sum

Plzzzz help!!!!!!!!!!!!

a sensor that stop a machine if a door is opened is an example of a

a.barrier interlock

b.guard interlock

c.electrical interlock

d.mechanical interlock

Answers

B . Guard interlock is the answer

Answer:

B. Guard interlock

Explanation:

I took a quiz on this earlier

brainiest please

Briefly explain how Riboflavin deficiency lead to disease state.​

Answers

Answer:

Severe riboflavin deficiency can impair the metabolism of other nutrients, especially other B vitamins, through diminished levels of flavin coenzymes [3]. Anemia and cataracts can develop if riboflavin deficiency is severe and prolonged [1]. The earlier changes associated with riboflavin deficiency are easily reversed.

The OSI is reference/conceptual model and accordingly multiple practical models (such as TCP/IP, AppleTALK, etc) exits. Which fundamental functionalities necessarily needs to considered while implementing any network model?

Answers

Answer:

The fundamental functionalities necessarily needs to considered while implementing any network model are (1) Scalability, (2)The quality of service (3) Fault tolerance (4) Security.

Explanation:

Solution:

Network must help a wide area of applications and administrations, just just as work over various sorts of links and devices that make up the physical infrastructure. The term network refers to the innovations that help the infrastructure and the customized administrations and rules, or protocols, that move messages over the network.

The following are some  fundamental functionalities necessarily needs to considered while implementing any network model which is stated below:

(1) Scalability :

A huge number of users and service providers connect with the Internet every week. All together for the Internet to help this fast measure of development, it must be scalable.

A scalable network can extend rapidly to help new clients and applications without influencing the performance of the administration being conveyed to existing clients.  

(2)Quality of Service :

Networks must provide predictable, quantifiable, and, now and again, ensured administrations.  

Networks also need mechanisms to carry on congested network traffic. Network bandwidth is the estimate of the data-transfer size of the network. As such, what amount of data can be transmitted inside a particular measure of time? Network data transfer capacity is estimated in the quantity of bits that can be transmitted in a solitary second, or bits every second (bps).  

(3) Fault Tolerance :

The Internet is consistently accessible to the a huge number of users who depend on it. This requires a network design that is worked to be fault tolerant.

A fault-tolerant network is one that constrains the impact of a failure, with the goal that the least number of devices are influenced by it. It is likewise worked in a manner that empowers fast recuperation when such a failure happens.

Faults-tolerant networks rely upon various ways between the source and destination of a message. On the off chance that one way comes up short, the messages can be immediately sent over an alternate connection.

(4) Security:  

The Internet has advanced from a firmly controlled inter network of instructive and government associations to a generally open methods for transmission of business and individual interchanges.

Subsequently, the security necessities of the network have changed. The network infrastructure, the system administrations, and the information contained on arrange appended gadgets are vital individual and business resources. Bargaining the respectability of these benefits could have genuine outcomes.

Do you think it's easier to be mean online than offline? why?

Answers

Answer:

Yes because on online we can talk all we want and they don't know us irl so it's funny lol

Explanation:

Select 3 true statements about Python primitive types.

32-bit integer type (a.k.a. int32) can represent integer value from -2^31 (-2,147,483,648) to 2^31-1 (2,147,483,647)

The int type in Python3 cannot represent a number greater than 2^31-1.

A binary floating-point method is used to represent fractions in binary numbers.

The decimal number 0.1 cannot be expressed without error in binary floating-point format.

The float type in Python3 can represent decimal 0.1 without error.

Answers

The  true statements about Python primitive types are:

32.bit integer type (a.k.a. int32) can represent integer value from -2 31 (-2.147,483,648) to 2"31-1 (2,147,483,647) A binary floating point method is used to represent fractions in binary numbers. The decimal number 0.1 cannot be expressed without error in binary floating-point format.

What are the Python primitive types?

The Python is known to be made up of four primitive data types which are said to be:

Integer.Float.String.Boolean.

Note therefore that The  true statements about Python primitive types are:

32.bit integer type (a.k.a. int32) can represent integer value from -2 31 (-2.147,483,648) to 2"31-1 (2,147,483,647) A binary floating point method is used to represent fractions in binary numbers. The decimal number 0.1 cannot be expressed without error in binary floating-point format.

Learn more about Python from

https://brainly.com/question/26497128

#SPJ1

what is mouse spealing

Answers

Answer:

use a mouse to move or position a cursor on computer screen

Explanation:

mouse cursor

some context free languages are undecidable

Answers

yess they are and have been for awhile although they’re already

Write a program that prompts the user for the name of two files each containing a single line that represents a decimal integercall them m and n, keep in mind that theseintegerscould be very largein absolute value, so they might not be stored neither as along nor intvariables. You should:a)Handle erroneous input graciously.b)Include a class named BigIntegerwhere you define an integer as a linked list, along with integer operations such as addition and subtraction [multiplication and division will grant you extra points] c)Test your program for each operation and store the result of each operation as a single decimal number in a separate file containing only one line\

Answers

Answer:

The output is seen bellow

Explanation:

public class BigInteger {

  public class Node{

      private char data;

      private Node next;

      public Node(char d){

          this.setData(d);

          this.setNext(null);

      }

      public char getData() {

          return data;

      }

      public void setData(char data) {

          this.data = data;

      }

      public Node getNext() {

          return next;

      }

      public void setNext(Node next) {

          this.next = next;

      }      

  }

 

  private Node root;

 

  public BigInteger(String s){

      this.root=null;

     

      for(int i=s.length()-1;i>=0;i--){

          Node node=new Node(s.charAt(i));

          node.setNext(root);

          root=node;

      }

  }

 

  public String toString(){

      String str="";

      Node cur=this.root;

      int i=0;

     

      while(cur!=null){

          if(i==0 && cur.getData()=='0'){

             

          }

          else{

              i=1;

              str+=cur.getData();

          }

         

          cur=cur.getNext();

      }

     

      return str;

  }

 

  public String reverse(String s){

      String ret="";      

      for(int i=s.length()-1;i>=0;i--){

          ret+=s.charAt(i);

      }      

      return ret;

  }

 

  public BigInteger add(BigInteger s){

      String f=this.reverse(this.toString());

      String l=this.reverse(s.toString());

      int max=(f.length()>l.length())?f.length():l.length();

     

      String ret="";

     

      int carry=0;

     

      for(int i=0;i<max;i++){

          int sum=carry;

          if(i<f.length()){

              sum+=(f.charAt(i)-'0');

          }

          if(i<l.length()){

              sum+=(l.charAt(i)-'0');

          }

          ret+=(char)(sum%10+'0');

          carry=(sum/10);

      }

      if(carry!=0){

          ret+='1';

      }

     

      BigInteger bi=new BigInteger(this.reverse(ret));

      return bi;

  }

  public boolean bigNum(String s1,String s2){

             

      if(s1.length()>s2.length()){

          return true;

      }

      else{

          if(s1.length()<s2.length()){

              return false;

          }

          else{

              for(int i=0;i<s1.length();i++){

                  if(s1.charAt(i)!=s2.charAt(i)){

                      if(s1.charAt(i)>s2.charAt(i)){

                          return true;

                      }

                      else{

                          return false;

                      }

                  }

              }                  

          }

      }

      return false;

  }

 

  public BigInteger subtraction(BigInteger s){

      String f=this.toString();

      String l=s.toString();

     

      boolean b=this.bigNum(f, l);

   

      if(b==false){

          String tmp=f;

          f=l;

          l=tmp;

      }

     

      f=this.reverse(f);

      l=this.reverse(l);

     

      int max=(f.length()>l.length())?f.length():l.length();

     

      String ret="";

     

      int borrow=0;

     

      for(int i=0;i<max;i++){

          int sum=borrow;

          if(i<f.length()){

              sum+=(f.charAt(i)-'0');

          }

          if(i<l.length()){

              sum-=(l.charAt(i)-'0');

          }

          if(sum<0){borrow=-1;sum=10+sum;}

          else{borrow=0;}

         

          ret+=(char)(sum%10+'0');

      }

     

      if(b==false){

          ret+="-";

      }

     

      BigInteger bi=new BigInteger(this.reverse(ret));

      return bi;

  }

 

  public BigInteger multiplication(BigInteger s){

      String f=this.toString();

      String l=s.toString();

 

      int len=l.length();

     

      BigInteger bi=new BigInteger("");

      for(int i=len-1;i>=0;i--){

          //System.out.println(l.charAt(i));

          BigInteger r=new BigInteger(f);

          for(int j=(l.charAt(i)-'0');j>1;j--){

              r=r.add(new BigInteger(f));

              //System.out.print(r+" " );

          }

          //System.out.println();

          bi=bi.add(r);

          f=f+"0";

      }

      return bi;

  }

 

  public BigInteger division(BigInteger s){

      BigInteger t=this;

      BigInteger bi=new BigInteger("");

      int i=0;

      t=t.subtraction(s);

      String str=t.toString();

     

      while(str.charAt(0)!='-' && i<40){

          //System.out.println(str+" "+(i+1));

          bi=bi.add(new BigInteger("1"));

          t=t.subtraction(s);

          str=t.toString();  

         

          i++;

      }

      return bi;    

  }  

}  

-------------------

import java.io.BufferedReader;

import java.io.FileNotFoundException;

import java.io.FileReader;

import java.io.FileWriter;

import java.io.IOException;

import java.io.PrintWriter;

import java.util.Scanner;

public class Driver {

  public static void main(String [] args){

      Scanner sc=new Scanner(System.in);

     

      String str1="";

      String str2="";

     

      System.out.print("Enter file name 1 :");

      String file1=sc.next();

      //String file1="datafile1.txt";

      BufferedReader reader1;

      try {

          reader1 = new BufferedReader(new FileReader(file1));

          while((str1=reader1.readLine())!=null){

              break;

          }

          reader1.close();

      } catch (FileNotFoundException e) {

          // TODO Auto-generated catch block

          e.printStackTrace();

      } catch (IOException e) {

          // TODO Auto-generated catch block

          e.printStackTrace();

      }

 

      System.out.print("Enter file name 2 :");

      String file2=sc.next();

      //String file2="datafile2.txt";

      BufferedReader reader2;

      try {

          reader2 = new BufferedReader(new FileReader(file2));

          while((str2=reader2.readLine())!=null){

              break;

          }

          reader2.close();

      } catch (FileNotFoundException e) {

          // TODO Auto-generated catch block

          e.printStackTrace();

      } catch (IOException e) {

          // TODO Auto-generated catch block

          e.printStackTrace();

      }

true or false. Two of the main differences between storage and memory is that storage is usually very expensive, but very fast to access.​

Answers

Answer:

False. in fact, the two main differences would have to be that memory is violate, meaning that data is lost when the power is turned off and also memory is faster to access than storage.

give an example of how loops are used in programming Kturtle​

Answers

Answer:

Explanation:

KTurtle is an educational programming environment for turtle graphics. It is released under the open-source GNU General Public License and is part of the KDE Project since KDE3. KTurtle includes an IDE and a programming language which is loosely based on Logo and is intended for teaching programming.

Modern technology is more advanced than local technology . Explain this statement with examples .​

Answers

Answer:

It might be best to give examples to explain. A traditional technology is technical advances upon which something else is added to expand it. For example, farmers have been using powered plows since the steam engine. However, modern technologies have built upon the basic structures, purposes, and functioning of the plow. They now have higher horse power engines, electronic controls, etc. to aid farmers--from the smallest family farm to corporate farming endeavors. As another example, analogue television came in about 1925. Just within the last couple years (2012-2014) are cable companies and Congress discussing eliminating analogue reception and going solely with broadband reception. As another example, we have evolved technology from the handheld or pedestal held telescope...to Hubble Telescope in outer space. All modern technologies build upon ideas of traditional technologies.

Ex:-

Local technology did not have an easy way to communicate but now we can say anything within 3,4 seconds using smartphones all around the world.Robots and artificial intelligence. The term “robot” was coined by Czechoslovakian playwright Karel Capek in 1920 — “robota” being a Czech word for tedious labor — but the first real industrial robot was built in 1954 by George Devol.  Five years later, the Massachusetts Institute of Technology founded its Artificial Intelligence Laboratory in a quest to mechanically mimic human minds as well as hands.  Today, robots assemble products better, faster and often cheaper than manual laborers, while more than 8 million U.S. airline flights a year are scheduled, guided and flown with the superhuman assistance of advanced software.  Still, some Americans eye such systems with the cynical view of novelist Kurt Vonnegut, whose 1952 story “Player Piano” warned that the machines might leave people without a purpose — or a job. Digital media. “The camera doesn’t lie” went a saying not heard much since the release of Photoshop 1.0 in 1990.  Digitized audio, pictures, movies, and text let even an amateur edit reality — or conjure it from scratch — with a keyboard and a mouse.  A singer’s bad notes, a model’s blemishes, or an overcast sky in a movie scene can be fixed as easily as a spelling error.  Just as important, digital media can be copied over and over nearly for free, stored permanently without fading, and sent around the world in seconds.  It rightly worries the movie and music industries, but how do you put the genie back in the bottle if there’s no bottle anymore?

Hope you get how the modern tech is more advantage than the local techno.(sorry for been it too long)

If you have any question regarding this please ask me and clarify it

If you think this si the best answer please mark me as brainliest

please tell fast plzzzzzz​

please tell fast plzzzzzz

Answers

Hi!
I think it’s true

Complete the code to generate a pseudo-random integer between 1 and 44, including the possibility of both 1 and
44.
>>> import secrets
>>> secret

Answers

Answer:

Explanation:

.randbelow(44) + 1

The code above uses the secrets module, which is a part of the Python standard library and uses a cryptographically strong random number generator. The randbelow() function generates a random integer below the number given as an argument. In this case, the argument is 44, which means that the function will generate a random integer between 0 and 43. To get a random integer between 1 and 44, we add 1 to the result of the function.

Other Questions
Thomson's main contribution to the development of the Pacific Northwest was to _____. How would I answer this? Someone please help. help i will give a brainly please just help in 2 mins a tensile test for a certain metal provides flow curve parameters: strain-hardening exponent is 0.3 and strength coefficient is 600 mpa. determine the flow stress at a true strain Established in 1863, their mission is to respond quickly and efficiently to help people affected by armed conflicts and natural disasters.a. Trueb. False Fill in the missing term in the equation Which of the following statements best describes a similarity between dry climate zones and high latitude zones? A. Both have warm temperatures all year. B. Both occur only on one continent. C. Both experience low levels of precipitation. D. Both occur only in coastal areas. Can somebody help me please Why are landlocked countries disadvantaged in technologicaldevelopment-Economics include 3 points please 3x + 1 = 10 Show work Who do you think Zichermanns audience was In class, you have been discussing whether young children should have a mobile phoneWrite an article for your teacher, giving your views You measure 37 dogs' weights, and find they have a mean weight of 69 ounces. Assume the population standard deviation is 9.2 ounces. Based on this, construct a 90% confidence interval for the true population mean dog weight.Give your answers as decimals, to two places_______ ________ ounces (Enter your answer as an integer or decimal number. Examples: 3, -4, 5.5172 ; Enter DNE for Does Not Exist, oo for Infinity) Explain how the Vietnam War created divisions in American society. What was the main environmental factor that created the geographic division between beer and wine in Europe?a. The culture of Mediterranean Europe better matches that of wine, while northern Europeans' penchant for the sports and outdoors makes it more favorable for beer and spirit drinking.b. A period of warming in the 1400's created a more favorable environment for viticulture in Mediterranean Europe.c. The sharply reduced average temperature during the Little Ice Age meant that viticulture retreated to the Mediterranean Europe while northerners were left to satisfy their need for alcohol with beer and spirits.d. The soils in Mediterranean Europe are more favorable for wine bearing grape plants, while the north is more favorable towards hops plants for brewing beer. problem 4 (20 points) below is a plot which shows the transfer function (input-output relationship) of a logic gate. the voltages of the two inputs, a and b, are shown on the horizontal axes and the voltage of the output is shown on the z-axis. the units of all axes are volts. a. (15 points) what type of logic gate does the 3-d plot represent? b. (5 points) what are the logic high and logic low levels of the output? __________ are an efficient way of making consistent snapshots of volumes so that they can be backed up.A) Photo copiesB) Process copiesC) Transfer copiesD) Shadow copies quizzlet consider a component made of joined copper and iron pieces that will be exposed to salt water conditions as pictured here (top image labels what is what). which placement(s) of a plastic coating (a, b, c, or d below) could be used to prevent galvanic corrosion? 2(5^2) + 26(h) = ? If the distance traveled is (4s3 - 6s + 4s + 14) miles and the rate is (s + 1) mph, write an expression, in hours, for the time traveled.