In Linux, users are internally represented using a unique number called user ID or uid.

a. True
b. False

Answers

Answer 1

Answer:

a. True

Explanation:

An operating system is a system software pre-installed on a computing device to manage or control software application, computer hardware and user processes.

This ultimately implies that, an operating system acts as an interface or intermediary between the computer end user and the hardware portion of the computer system (computer hardware) in the processing and execution of instructions.

Some examples of an operating system on computers are QNX, Linux, OpenVMS, MacOS, Microsoft windows, IBM, Solaris, VM etc.

In Linux, users are internally represented using a unique number called user ID or UID. Thus, this unique number serves as an internal identifier in the Linux Kernel and as such determines what system resources may be accessible to each user. Oftentimes, these unique numbers are not put into use but rather a name is linked with the number and are used instead.

Also, users can be organized logically into a group and are represented uniquely with a group ID or GID, which serves as a global identifier for the users.


Related Questions

I have a question about this programming assignment. The outcome when the user puts in Taylor for guest one and Fernando for guest 2 should be, "Your party is ruined and another bad pop song will be written." However, it does not. What do I add to get this outcome? Do I need more brackets?

Answers

Yes u need more brackets

Use guestNumber1.equals(Fernando) instead of the double equal signs. You cant compare strings with ==

h. What is recycle bin?
->​

Answers

Answer:

Trash application, the Recycle Bin

What is one way to use proper netiquette when communicating online? Ask permission before posting private information. Post a message when you are angry Use CAPS when sending a message. Use unreliable sources.

Answers

Answer: A

Explanation:

Being a responsible netizen you must respect anyone using internet. Be mindful of what you share which include fake news, photos and video of others. Watch you're saying, if you wouldn't say something in real life dont say it online. You must think before you click not to hurt others.

Answer:

Ask permission before posting private information.

Explanation:

Just the most logical answer

A data science experiment you are conducting has retrieved two historical observations for the price of Bitcoin(BTC) on December 2, 2017 of 11234 and 12475. Create a Python script that stores these two historicalobservations in a list variable namedbtcdec1.Your data science experiment requires four additional data tasks. The first task is to use the listappend()method to add the BTC price of 14560 to the listbtcdec1. The second task is to create a new empty listnamedbtcdec2and append the BTC prices of 15630, 12475, and 14972. The third task required you to usethe listextend()method to add the contents ofbtcdec2into the listbtcdec1. The fourth and final taskrequires you to use the listsort()method of the listbtcdec1to sort the items in the newly extended list,then use theprintstatement to output the content of listbtcdec1to the Python console.Starter code:_______.

Answers

Answer:

Following are the code to this question:

btcdec1=[11234, 12475] #defining a list btcdec1 that holds two integer values  

btcdec1.append(14560)#using append method to add value in btcdec1 list

btcdec2=[]#defining an empty list btcdec2

btcdec2.append(15630)#using append method to add value in btcdec2 list

btcdec2.append(12475)#using append method to add value in btcdec2 list

btcdec2.append(14972)#using append method to add value in btcdec2 list

btcdec1.extend(btcdec2)#using the extend method to add value list into btcdec1

btcdec1.sort()#using sort method to arrange value in ascending order

print(btcdec1)#print list btcdec1

Output:

[11234, 12475, 12475, 14560, 14972, 15630]

Explanation:

In this code a list "btcdec1" is declared, which holds two integer variables, in the next step, it uses the append method to add another element into the list.

In the next step, another empty list "btcdec2" is declared, which uses the append method to hold the integer element, and uses the extend and sort method to add the second list into the first one and then sort the whole list and print its values.  


When you
you can use the diverse knowledge sets of a team and share a workload.
O strategize
O quantify
discriminate
I
O collaborate

Answers

Answer:

Collaborate.

Explanation:

It was correct for me!

Answer:collaborate

Explanation:

cs edgen 100%

Companies sometimes pay search engine companies to have their websites located at the top of the search results. Do you think this is fair/ethical?

Answers

Answer:

I really don't think that it is fair or ethical.

Explanation:

When companies pay to put their websites at the top it is known as an ad. They are in top search engines like the ones we use every day. I believe this is unethical because it often results in confusion and sometimes misleads the user as the titles often use clickbait.

Write a print statement that uses an f-string to output $5,242.83

Answers

Answer:

print("${:,.2f}".format(5242.83))

Explanation:

Given

$5,242.83

Required

Use an f string to output the above

The syntax of an f-string to format a number in that regard is: "${:,.2f}".format(number)

$ means that a dollar sign be printed before the required number

., means that the number be separated with commas

2f means that the number be presented in 2 decimal places

So:

"${:,.2f}".format(number) becomes

"${:,.2f}".format(5242.83)

In a print statement, the full instruction is:

print("${:,.2f}".format(5242.83))

Online, it is easy to think of communication as “computer to ____________” rather than “_________ to ___________”.
a.
person, computer, person
b.
computer, person, computer
c.
person, person, person
d.
computer, person, person

Answers

I would say D but if not I’m terribly sorry

Hope this helps

Have a great day/night

Online, it is easy to think of communication as “computer to computer” rather than “person to person”. Thus, option D is correct.

What is communication?

It is possible to describe communication as the act of passing the information between one person or group of people to the next. Communicating facilitates easy understanding of what a different person is trying to say or convey. There are two forms of communication: both verbal and nonverbal.

With the help of communication the person can tell and feature tthe data between the person and an group. In this, that data is given to the people and the data is not given to the person but it is rather given to the person. As this data is been transferred from one computer to another and then it reaches the people.

Therefore, option D is the correct option.

Learn more about communication, here:

https://brainly.com/question/22558440

#SPJ2

List and fully describe at least 3 examples of input devices and how they are applied in the real world. (In separate paragraphs.)

Answers

Answer:

1. Mouse

2.Graphic Tablet

3.Keyboard

Explanation:

1. A computer mouse (plural mice, rarely mouses) is a hand-held pointing device that detects two-dimensional motion relative to a surface. This motion is typically translated into the motion of a pointer on a display, which allows a smooth control of the graphical user interface of a computer.

2.Graphic tablets, because of their stylus-based interface and ability to detect some or all of pressure, tilt, and other attributes of the stylus and its interaction with the tablet, are widely considered to offer a very natural way to create computer graphics, especially two-dimensional computer graphics

3.A keyboard is for putting information including letters, words and numbers into your computer. You press the individual buttons on the keyboard when you type. The number keys across the top of the keyboard are also found on the right of the keyboard. The letter keys are in the centre of the keyboard.

Which term describes the surrounding area of this image?

The surrounding area of this image is called
Surroundings
Foreground
Background

This area is also called a
Negative
Positive
Neutral

Answers

Answer: background/negative

Explanation: the background, is negative space. A solid piece of sculpture occupies space, and makes the space around it come to life.

Write a SELECT statement that returns one row for each customer that has orders with these columns: The email_address from the Customers table

A count of the number of orders

The total amount for each order

(Hint: First, subtract the discount amount from the price. Then, multiply by the quantity.) Return only those rows where the customer has more than 1 order. Sort the result set in descending sequence by the total amount . Hint: You will join three tables together. Returns 3rows of data.

Questions done up until #4: https://pastebin.com/LwSKknPi

all questions before and after:

Write a SELECT statement that returns these columns:

The count of the number of orders in the Orders table

The sum of the tax_amount columns in the Orders table

Returns 1 row of data.

Write a SELECT statement that returns one row for each category that has products with these columns:

The category_name column from the Categories table

The count of the products in the Products table

The list price of the most expensive product in the Products table

Sort the result set so the category with the most products appears first.

Hint: You will join two tables together. Returns 3 rows of data.

Write a SELECT statement that returns one row for each customer that has orders with these columns:

The email_address column from the Customers table

The sum of the item price in the Order_Items table multiplied by the quantity in the Order_Items table

The sum of the discount amount column in the Order_Items table multiplied by the quantity in the Order_Items table

Sort the result set in descending sequence by the item price total for each customer.

Hint: You will join three tables together. Returns 7 rows of data.

Modify the solution to exercise 4 so it only counts and totals line items that have an item_price value that’s greater than 400. Returns 2 rows of data.

Write a SELECT statement that answers this question: What is the total amount ordered for each product? Return these columns:

The product name from the Products table

The total amount for each product in the Order_Items (Hint: You can calculate the total amount by subtracting the discount amount from the item price and then multiplying it by the quantity)

Use the WITH ROLLUP operator to include a row that gives the grand total.

Hint: You will join two tables together. Returns 10 rows of data.

Write a SELECT statement that answers this question: Which customers have ordered more than one product? Return these columns:

The email address from the Customers table

The count of distinct products from the customer’s orders

Hint: You will join three tables together. . Returns 3 rows of

Answers

Answer:

Please find the attachment files of the queries:

Explanation:

In the all queries the select statement is used that selects the defined columns and use the function like sum, join, orderby, and groupby to perform the various operations, in which the sum is used to add columns or rows values, join is used for joining two or more tables, and orderby is used for return the table into ascending or descending order, and groupby is used for the count the value, calculate average and perform other operation and gives its return value.

Write the definition of the function inputArray that prompts the user to input 20 numbers and stores the numbers into alpha. Write the definition of the function double Array that initializes the elements of beta to two times the corresponding elements in alpha. Make sure that you prevent the function from modifying the elements of alpha. Write the definition of the function copy AlphaBeta that stores alpha into the first five rows of matrix and beta into the last five rows of matrix. Make sure that you prevent the function from modifying the elements of alpha and beta. Write the definition of the function printArray that prints any one-dimensional array of type int. Print 15 elements per line.

Answers

Answer:

In Java:

public static  int[] inputArray(){

   Scanner input = new Scanner(System.in);

   int[] alpha = new int[20];

   for(int i = 0;i<20;i++){

       alpha[i] = input.nextInt();

   }

   return alpha;}

public static  int[] doubleArray(int [] alpha){

   int[] beta = new int[20];

   for(int i = 0;i<20;i++){

       beta[i] = 2 * alpha[i];

   }

   return beta;

}

public static int[] copyAlphaBeta(int [] alpha, int [] beta){

   int [] AlphaBeta = new  int[10];

   for(int i = 0;i<5;i++){

       AlphaBeta[i] = alpha[i];

   }

   int count = 5;

   for(int i = 15;i<20;i++){

       AlphaBeta[count] = beta[i];

       count++;

   }

   return AlphaBeta;

}

public static void printArray(int [] alpha){

   for(int i = 0;i<20;i++){

       System.out.print(alpha[i]+" ");

       if((i+1)%15 == 0){

           System.out.println(" ");

       }

   }

}

Explanation:

The inputArray is defined here

public static  int[] inputArray(){

   Scanner input = new Scanner(System.in);

This declares alpha array of 20 elements

   int[] alpha = new int[20];

The following iteration gets input from the user into the array

   for(int i = 0;i<20;i++){

       alpha[i] = input.nextInt();

   }

This returns the alpha array

   return alpha;}

The doubleArray is defined here. It takes the alpha array as its input parameter

public static  int[] doubleArray(int [] alpha){

This declares beta of 20 integers

   int[] beta = new int[20];

This populates beta by 2 * alpha[i]

   for(int i = 0;i<20;i++){

       beta[i] = 2 * alpha[i];

   }

This returns the alpha array

   return beta;}

The copyAlphaBeta array is defines here

public static int[] copyAlphaBeta(int [] alpha, int [] beta){

This declares AlphaBeta as 10 elements

   int [] AlphaBeta = new  int[10];

This populates the first 5 elements of AlphaBeta with the first 5 of alpha

   for(int i = 0;i<5;i++){

       AlphaBeta[i] = alpha[i];

   }

   int count = 5;

This populates the last 5 elements of AlphaBeta with the last 5 of beta

   for(int i = 15;i<20;i++){

       AlphaBeta[count] = beta[i];

       count++;

   }

This returns the AlphaBeta array

   return AlphaBeta;

}

The printArray is defined here. It takes the alpha array as its input parameter

public static void printArray(int [] alpha){

This iterates through alpha array

   for(int i = 0;i<20;i++){

This prints each element of the array

       System.out.print(alpha[i]+" ");

A new line is started after the 15th element

       if((i+1)%15 == 0){

           System.out.println(" ");

       }

   }

}

See attachment for complete program which includes the main

One of the following represent class B IP address? A.255.255.255.0 B. 125.123.132 C.24.67.11.8 D.191.23.21.54​

Answers

Answer:

D.191.23.21.54

Explanation:

Class B networks use a default subnet mask of 255.255. 0.0 and have 128-191 as their first octet. The address 191.23.21.54 is a class B address

(Please heart the answer if you find it helpful, it's a motivation for me to help more people)

which internet service is the main reason the internet has expanded and what draws newcomers to the internet?

Answers

Answer:

It has spread throughout the world since it is a very useful tool since most things are facilitated, thus leading to a much more efficient daily life, which is why the internet is one of the main means for the functioning of the world today. day, as new technologies have revolutionized

Social media.

The term social media refers to those digital tools that facilitate the transmission of information, communication and social interaction between individuals. Thus, social media allows individuals to relate to each other, in a similar way as if they were physically interacting, but through computer means.

These social media can be from profiles on social networks to blogs, podcasts or even videos on digital platforms. In short, nowadays social media is an integral part of people's social life, and it is in many cases what ends up driving them to use the internet.

Learn more in https://brainly.com/question/21765376

1
When collection of various computers
look like a single coherent system to its
client, then it is called​

Answers

Answer:

The appropriate answer is "Distributed system".

Explanation:

Whenever used by linking several autonomous computers as a single system, considered as distributed system. It could be consist of several kinds of  mainframes, processors as well as stationary machines, it can be programmed. A distributed machine has massive program modules, which operate as a single device on many machines.

Under foreign corrupt practices act, under what conditions is a bribe not unlawful explain and provide an example

Answers

Answer:

ex. telling your children if you clean up you get new toys

Use EBNF notation to describe the syntax of the following language constructs.
A. A Java return statement, which could be either a return keyword followed by a semicolon, or a return keyword followed an expression then followed by a semicolon. Assume the grammar for expression has been defined as expr-> e
B. A Python return statement, either a return keyword, or return one or more expressions separated by comma.
C. Based on your syntax definition in (b), is return x+y; a valid Python return statement?

Answers

Answer:

Following are the description to the given points:

Explanation:

To resolve basic design restrictions, EBNF has also been developed.This principle was its lack of support can identify repeatings easily. It implies that popular BNF models, like the description of a sequence of replicable elements, are complicated and rely on contra intuitive logical math.

To set a list of words divided by commas (e.g. john, coffee, logic) for instance, we would like to say something like "a list is a word accompanied by a few commas or terms." Through EBNF, they may say so. However, there have been no "many" alternatives in the standard BNF format. So, to describe something such as "a list is a term or a number accompanied by a pair with notation and script," you have to say the same thing. Which functions, although it is difficult, as it specifies a variety of lists instead of a specific list.

Essentially, "john, coffee, logic is John's list, accompanied by coffees or, and logic" would be the earlier link.  That's why in Option (a):

The return statement in Java is:

return ('”‘ (~[“] | ” [”e‘])*);

In option (c), it is the valid statement.

5.18 LAB: Output numbers in reverse Write a program that reads a list of integers, and outputs those integers in reverse. The input begins with an integer indicating the number of integers that follow. For coding simplicity, follow each output integer by a comma, including the last one. Ex: If the input is: 5 2 4 6 8 10 the output is: 10,8,6,4,2, To achieve the above, first read the integers into a vector. Then output the vector in reverse.

Answers

Answer:

In C++:

#include<iostream>

#include<vector>

using namespace std;

int main(){

   int len, num;

   vector<int> vect;

   cout<<"Length: ";

   cin>>len;  

   for(int i = 0; i<len;i++){

       cin>>num;

   vect.push_back(num);}

   vector<int>::iterator iter;

   for (iter = vect.end() - 1; iter >= vect.begin(); iter--){

       cout << *iter << ", ";}    

}

Explanation:

This declares the length of vector and input number as integer

   int len, num;

This declares an integer vector

   vector<int> vect;

This prompts the user for length  

cout<<"Length: ";

This gets the input for length  

   cin>>len;  

The following iteration gets input into the vector

   for(int i = 0; i<len;i++){

       cin>>num;

   vect.push_back(num);}

This declares an iterator for the vector

   vector<int>::iterator iter;

The following iterates from the end to the beginning and prints the vector in reverse

   for (iter = vect.end() - 1; iter >= vect.begin(); iter--){

       cout << *iter << ", ";}

In MS Excel, a function is written as =FUNCTION_NAME(_____________________).​

Answers

Explanation:

A function is a predefined formula that performs calculations using specific values in a particular order. All spreadsheet programs include common functions that can be used for quickly finding the sum, average, count, maximum value, and minimum value for a range of cells. In order to use functions correctly, you'll need to understand the different parts of a function and how to create arguments to calculate values and cell references.

Define a class named Money that stores a monetary amount. The class should have two private integer variables, one to store the number of dollars and another to store the number of cents. Add accessor and mutator functions to read and set both member variables. Add another function that returns the monetary amount as a double. Write a program that tests all of your functions with at least two different Money objects.

Answers

Answer:

#include<iostream>

using namespace std;

class Money{

    private:

        int dollars;  

       int cents;

   public:

       Money(int d=0, int c=0){

          setDollar(d);

          setCent(c);

       }

       void setDollar(int d){

           dollars = d;

       }

       void setCent(int c){

           cents = c

       }

       int getDollar() {

           return dollars;

       }

       int getCent() {

           return cents;

       }

       double getMoney(){

          return (dollars + (cents/100));

       }

};

// testing the program.

int main(){

  Money Acc1(3,50);

  cout << M.getMoney() << endl;

  Money Acc2;

  Acc2.setDollars(20);

  Acc2.setCents(30);

  cout <<"$" << Acc2.getDollars() << "." << Acc2.getCents() << endl;

  return 0;

}

Explanation:

The C++ source code defines the Money class and its methods, the class is used in the main function as a test to create the instances of the money class Acc1 and Acc2.

The object Acc2 is mutated and displayed with the "setDollar and setCent" and "getDollar and getCent" methods respectively.

Practice Question

What will be displayed after this

code segment is run?

count

0

REPEAT UNTIL (count = 3

count count + 1

DISPLAY

and"

DISPLAY count



"1 and 2 and 3"

"And 1 and 2 and 3"

"0 and 1 and 2"

"And 0 and 1 and 2"

Answers

Answer:

Follows are the code to the given question:

#include <stdio.h>//header file

int main()//main method

{

int count=0;//defining an integer variable

for(count=0;count<3;count++)//use for loop to count values

{

printf("%d\n",count);//print count values

}

return 0;

}

Output:

0

1

2

Explanation:

In this code, it declares the integer variable "count" which has a value of "0" and in the next step declares a loop, using the count variable to regulate count values, which is less than 3, and increases the count value, and prints its values. This variable is the count value.

The count variable holds a value of 0, and use a for loop that checks its value is less than 3, and print its value, that's why it will print the value that is 0,1, and 2.

Difference between a port and a connector

Answers

Explanation:

A connector is the unique end of a plug, jack, or the edge of a card that connects into a port. Port: The port has either holes or a slot that matches the plug or card being connected into the port. For example: cables are plugged into Ethernet ports, and cables and flash drives are plugged into USB ports.

Are items a through e in the following list algorithm? If not, what qualities required of algorithms do they lack?
a. Add the first row of the following matrix to another row whose first column contains a nonzero entry. (Reminder: Columns run vertically; rows run horizontally.)
[1 2 0 4 0 3 2 4 2 3 10 22 12 4 3 4]
b. In order to show that there are as many prime numbers as there are natural numbers, match each prime number with a natural number in matching the first prime number with 1 (which is the first natural number) and the second prime number with 2, the third with 3, and so forth. If, in the end, it turns out that each prime number can be paired with each natural number, then it is shown that there are as many prime numbers as natural numbers.
c. Suppose you're given two vectors each with 20 elements and asked to perform the following operation. Take the first element of the first vector and multiply it by the first clement of the second vector. Do the same to the second elements, and so forth. Add all the individual products together to derive the dot product.
d. Lynne and Calvin are trying to decided who will take the dog for a walk. Lynne suggests that they flip a coin and pulls a quarter out of her pocket. Calvin does not trust Lynne and suspects that the quarter may be weighted (meaning that it might favor a particular outcome when tossed) and suggests the following procedure to fairly determine who will walk the dog.
1. Flip the quarter twice.
2. If the outcome is heads on the first flip and tails on the second, then I will walk the dog.
3. If the outcome is tails on the first flip, and heads on the second, then you will walk the dog.

Answers

Answer:

Following are the responses to the given points:

Explanation:

The following features must contain a well-specified algorithm:

Description [tex]\to[/tex] Exact measures described

Effective computation   [tex]\to[/tex]  contains steps that a computer may perform

finitude  [tex]\to[/tex]  It must finish algorithm.

In choice "a", there is little algorithm Because it does not stop, finiteness has already been incomplete. There is also no algorithm.

In choice "b", it needs productivity and computational burden. because it's not Enter whatever the end would be.

In choice "c", the algorithm is given the procedure. It fulfills all 3 algorithmic properties.

In choice "d", each algorithm is a defined process. Since it needs finitude.

What is computer science​

Answers

Answer:

computer science is the study of computer and computing as well as theoretical and practical applications.

pls give me thanks ☺️☺️

Consider the security of a mobile device you use
(a) Explain how transitive trust applies to your use of an operating system on a
mobile device (e.g. smartphone). Then, explain how an attacker can exploit this
transitive trust to violate the CIA properties of the software and data on your
device

Answers

Answer:

keep it private

Explanation:

You are given the following segment of code:Line 1: PROCEDURE printScorePairs()Line 2: {Line 3: count <-- 0Line 4: sum <-- 0Line 5: i <-- 1Line 6: scores <-- [73, 85, 100, 90, 64, 55]Line 7: REPEAT UNTIL ( i > LENGTH (scores) )Line 8: {Line 9: sum <-- scores[i] scores[i 1]Line 10: DISPLAY ( sum )Line 11: i <-- i 2Line 12: }Line 13: }The ABC company is thrifty when it comes to purchasing memory (also known as RAM) for its computers. Therefore, memory is of the utmost importance and all programming code needs to be optimized to use the least amount of memory possible. What modifications could be made to reduce the memory requirements without changing the overall functionality of the code?

Answers

Answer:

Move Line 10 to after line 12

Explanation:

Required: Modify the program

From the procedure above, the procedure prints the sum at each loop. Unless it is really necessary, or it is needed to test  the program, it is not a good practice.

To optimize the program, simply remove the line at displays the sum (i.e. line 10) and place it at the end of the loop.

So, the end of the procedure looks like:

Line 10: i <-- i 2

Line 11: }

Line 12: DISPLAY ( sum )

Line 13:

Your friend really likes talking about owls. Write a function owl_count that takes a block of text and counts how many words they say have word “owl” in them. Any word with “owl” in it should count, so “owls,” “owlette,” and “howl” should all count.

Here’s what an example run of your program might look like:

text = "I really like owls. Did you know that an owl's eyes are more than twice as big as the eyes of other birds of comparable weight? And that when an owl partially closes its eyes during the day, it is just blocking out light? Sometimes I wish I could be an owl."
owl_count(text)
# => 4
Hints

You will need to use the split method!


Here is what I have so far, it doesn not like count = 0 and i keep getting an error.
def owl_count(text):

count = 0

word = 'owl'

text = text.lower()

owlist = list(text.split())

count = text.count(word)


text = "I really like owls. Did you know that an owl's eyes are more than twice as big as the eyes of other birds of comparable weight? And that when an owl partially closes its eyes during the day, it is just blocking out light? Sometimes I wish I could be an owl."
print (count)

Answers

text = “ I really like owls. Did you know that an owls eyes are more than twice as big as the eyes of other birds of comparable weight? And that when an owl partially closes its eyes during the day, it is just blocking out light? Sometimes I wish I could be an owl.

word = ‘owl’
texts = text.lower()
owlist = list(texts.split())
count = text.count(word)
num = [owlist, count] #num has no meaning just random var
print(num)


Alter in anyway you want so that you can succeed. ✌

In this exercise we have to use the knowledge of computational language in python, so we find the code like:

The code can be found attached.

So let's write a code that will be a recognition function, like this:

def owl_count(text):"I really like owls. Did you know that an owls eyes are more than twice as big as the eyes of other birds of comparable weight?"

word = "owl"

texts = text.lower()

owlist = list(texts.split())

count = text.count(word)

num = [owlist, count] #num has no meaning just random var

print(num)

See more about python at brainly.com/question/26104476

1. In what ways a computer system is like a human being
la
2. In what ways is it not like a human being
3. What will happen if the computer is not invented​

Answers

a computer system can be considered similar to human beings in a way that it needed various parts in order to it to function it humans we need the or such as hurt brain veins exactra while computer need the CPU Ram etc

Explanation historical development of computer ​

Answers

Answer:

Brief History Of Computer. The computer as we know it today had its beginning with a 19th century English mathematics professor name Charles Babbage. ... Other developments continued until in 1946 the first general– purpose digital computer, the Electronic Numerical Integrator and Computer (ENIAC) was built.

Explanation:

Computers and electronics play an enormous role in today's society, impacting everything from communication and medicine to science.

Although computers are typically viewed as a modern invention involving electronics, computing predates the use of electrical devices. The ancient abacus was perhaps the first digital computing device. Analog computing dates back several millennia as primitive computing devices were used as early as the ancient Greeks and Romans, the most known complex of which being the Antikythera mechanism. Later devices such as the castle clock (1206), slide rule (c. 1624) and Babbage's Difference Engine (1822) are other examples of early mechanical analog computers.

The introduction of electric power in the 19th century led to the rise of electrical and hybrid electro-mechanical devices to carry out both digital (Hollerith punch-card machine) and analog (Bush’s differential analyzer) calculation. Telephone switching came to be based on this technology, which led to the development of machines that we would recognize as early computers.

The presentation of the Edison Effect in 1885 provided the theoretical background for electronic devices. Originally in the form of vacuum tubes, electronic components were rapidly integrated into electric devices, revolutionizing radio and later television. It was in computers however, where the full impact of electronics was felt. Analog computers used to calculate ballistics were crucial to the outcome of World War II, and the Colossus and the ENIAC, the two earliest electronic digital computers, were developed during the war.

With the invention of solid-state electronics, the transistor and ultimately the integrated circuit, computers would become much smaller and eventually affordable for the average consumer. Today “computers” are present in nearly every aspect of everyday life, from watches to automobiles.

The history of computers is one that began far back 2000 years ago in the city of Babylonia where there was the use of  abacus and it has grown to now the use of digital computer as it start in 1642. ​

What is  the history of computer?

The history of computers is one that is more than 200 years but in the 19th century, there was the invention of  mechanical calculating machines.

Note that the The 1st generation of computers was said to have existed from the year 1940 to 1955 and now it has grown to a whole new level.

Learn more about computer from

https://brainly.com/question/24540334

#SPJ9

What does the abbreviation JPEG stand for?
A. Japanese Photographic Examination Group
B. Joint Photo Examination Group
C. Joint Photographic Expert Group
D. Jefferson Photo Exclusive Group
E. Jacket Photo Extension Group

Answers

Answer:

c) giant photographic experts group

Answer:

C

Explanation:

(often seen with its file extension stands for

"Joint Photographic Experts Group",

Other Questions
Explica fundamentando porque los indigenas creian que los sucesos catastrficos eran productos de una maldicin. Refirase a cultura, religin y organizacin politica de los INCAS Look at the map below. All of the following climate regions are located in Central Asia except the __________ region.A. Marine west coastB. Humid continentalC. SemiaridD. Arid 2x-y+8z=133x+4y+52=185x-2y-72=20 A.] What *AREA OF COUNTRY* did Christopher Columbus had contact with?B.] What *AREA OF COUNTRY* did Vasco Nunez de Balbao had contact with?C.] What *AREA OF COUNTRY* did Leif Ericksson had contact with?D.] What *AREA OF COUNTRY* did Pedro Cabral had contact with?E.] What *AREA OF COUNTRY* did Bartolomeu Diaz had contact with? Consider the inequality.x + 3x < 24Which value of x makes the inequality true?A.5B.6 C.7D.8 Plz help! Christianity! PLZ PLZ PLZZZZZ PLSSS HELPPPPP Could someone write 5 or 6 sentences about how coronavirus affected families and the world? Question 3The system in place that prevents one branch of government from becoming more powerful than another is known as AfederalismBrule of lawpopular sovereigntyDchecks and balances most of the states in india have _____________ legislature.a, bicameral.b, unicameral.c, none of these How are cellular respiration and photosynthesis similar?A) Both processes break down glucose. B) Both processes create food for organisms.C) Both processes produce waste.D) Both processes take place in chloroplasts. On your paper, construct a rectangle on a coordinate plane that satisfies these criteria. The sides of the rectangle are either vertical or horizontal. The perimeter of the rectangle is 42 units. Each of the vertices lies in a different quadrant.What are the coordinates of the vertices of your rectangle? Explain how you know the perimeter of your rectangle is42 units Hydrogen bonding is primarily responsible for the high ______ of water. a. freezing pointb. boiling pointc. conductivity d. polarity The cereal box shown below is a rectangular prism. Find the surface area of the cereal box. If I invest $600 at an 11.5% interest rate, how much money will I earn over 5 years? A. $945 B. $345 C. $69 D. $34.50 PLEASE HELP ASAP, GIVING BRAINLIEST TO CORRECT ANSWERThe vertices of parallelogram ABCD are (2,4), B(0, 0), C(6,2), and D(8, 6). Find the coordinates of the intersection of the diagonals. Which best explains how the reservation system affected the Yakama people? Why does the United States have a long history of opposition to Communist ideals? a. What is the importance of Technology-based Art in creatinga modern art? Enter the number that belongs in the green box What are the coordinates of Point X? A. (3, 4) B. (3, 4) C. (4, 3) D. (4, 3)