Answer:
a. True
Explanation:
An operating system is a system software pre-installed on a computing device to manage or control software application, computer hardware and user processes.
This ultimately implies that, an operating system acts as an interface or intermediary between the computer end user and the hardware portion of the computer system (computer hardware) in the processing and execution of instructions.
Some examples of an operating system on computers are QNX, Linux, OpenVMS, MacOS, Microsoft windows, IBM, Solaris, VM etc.
In Linux, users are internally represented using a unique number called user ID or UID. Thus, this unique number serves as an internal identifier in the Linux Kernel and as such determines what system resources may be accessible to each user. Oftentimes, these unique numbers are not put into use but rather a name is linked with the number and are used instead.
Also, users can be organized logically into a group and are represented uniquely with a group ID or GID, which serves as a global identifier for the users.
I have a question about this programming assignment. The outcome when the user puts in Taylor for guest one and Fernando for guest 2 should be, "Your party is ruined and another bad pop song will be written." However, it does not. What do I add to get this outcome? Do I need more brackets?
Use guestNumber1.equals(Fernando) instead of the double equal signs. You cant compare strings with ==
h. What is recycle bin?
->
Answer:
Trash application, the Recycle Bin
What is one way to use proper netiquette when communicating online? Ask permission before posting private information. Post a message when you are angry Use CAPS when sending a message. Use unreliable sources.
Answer: A
Explanation:
Being a responsible netizen you must respect anyone using internet. Be mindful of what you share which include fake news, photos and video of others. Watch you're saying, if you wouldn't say something in real life dont say it online. You must think before you click not to hurt others.
Answer:
Ask permission before posting private information.
Explanation:
Just the most logical answer
A data science experiment you are conducting has retrieved two historical observations for the price of Bitcoin(BTC) on December 2, 2017 of 11234 and 12475. Create a Python script that stores these two historicalobservations in a list variable namedbtcdec1.Your data science experiment requires four additional data tasks. The first task is to use the listappend()method to add the BTC price of 14560 to the listbtcdec1. The second task is to create a new empty listnamedbtcdec2and append the BTC prices of 15630, 12475, and 14972. The third task required you to usethe listextend()method to add the contents ofbtcdec2into the listbtcdec1. The fourth and final taskrequires you to use the listsort()method of the listbtcdec1to sort the items in the newly extended list,then use theprintstatement to output the content of listbtcdec1to the Python console.Starter code:_______.
Answer:
Following are the code to this question:
btcdec1=[11234, 12475] #defining a list btcdec1 that holds two integer values
btcdec1.append(14560)#using append method to add value in btcdec1 list
btcdec2=[]#defining an empty list btcdec2
btcdec2.append(15630)#using append method to add value in btcdec2 list
btcdec2.append(12475)#using append method to add value in btcdec2 list
btcdec2.append(14972)#using append method to add value in btcdec2 list
btcdec1.extend(btcdec2)#using the extend method to add value list into btcdec1
btcdec1.sort()#using sort method to arrange value in ascending order
print(btcdec1)#print list btcdec1
Output:
[11234, 12475, 12475, 14560, 14972, 15630]
Explanation:
In this code a list "btcdec1" is declared, which holds two integer variables, in the next step, it uses the append method to add another element into the list.
In the next step, another empty list "btcdec2" is declared, which uses the append method to hold the integer element, and uses the extend and sort method to add the second list into the first one and then sort the whole list and print its values.
When you
you can use the diverse knowledge sets of a team and share a workload.
O strategize
O quantify
discriminate
I
O collaborate
Answer:
Collaborate.
Explanation:
It was correct for me!
Answer:collaborate
Explanation:
cs edgen 100%
Companies sometimes pay search engine companies to have their websites located at the top of the search results. Do you think this is fair/ethical?
Answer:
I really don't think that it is fair or ethical.
Explanation:
When companies pay to put their websites at the top it is known as an ad. They are in top search engines like the ones we use every day. I believe this is unethical because it often results in confusion and sometimes misleads the user as the titles often use clickbait.
Write a print statement that uses an f-string to output $5,242.83
Answer:
print("${:,.2f}".format(5242.83))
Explanation:
Given
$5,242.83
Required
Use an f string to output the above
The syntax of an f-string to format a number in that regard is: "${:,.2f}".format(number)
$ means that a dollar sign be printed before the required number
., means that the number be separated with commas
2f means that the number be presented in 2 decimal places
So:
"${:,.2f}".format(number) becomes
"${:,.2f}".format(5242.83)
In a print statement, the full instruction is:
print("${:,.2f}".format(5242.83))
Online, it is easy to think of communication as “computer to ____________” rather than “_________ to ___________”.
a.
person, computer, person
b.
computer, person, computer
c.
person, person, person
d.
computer, person, person
Online, it is easy to think of communication as “computer to computer” rather than “person to person”. Thus, option D is correct.
What is communication?It is possible to describe communication as the act of passing the information between one person or group of people to the next. Communicating facilitates easy understanding of what a different person is trying to say or convey. There are two forms of communication: both verbal and nonverbal.
With the help of communication the person can tell and feature tthe data between the person and an group. In this, that data is given to the people and the data is not given to the person but it is rather given to the person. As this data is been transferred from one computer to another and then it reaches the people.
Therefore, option D is the correct option.
Learn more about communication, here:
https://brainly.com/question/22558440
#SPJ2
List and fully describe at least 3 examples of input devices and how they are applied in the real world. (In separate paragraphs.)
Answer:
1. Mouse
2.Graphic Tablet
3.Keyboard
Explanation:
1. A computer mouse (plural mice, rarely mouses) is a hand-held pointing device that detects two-dimensional motion relative to a surface. This motion is typically translated into the motion of a pointer on a display, which allows a smooth control of the graphical user interface of a computer.
2.Graphic tablets, because of their stylus-based interface and ability to detect some or all of pressure, tilt, and other attributes of the stylus and its interaction with the tablet, are widely considered to offer a very natural way to create computer graphics, especially two-dimensional computer graphics
3.A keyboard is for putting information including letters, words and numbers into your computer. You press the individual buttons on the keyboard when you type. The number keys across the top of the keyboard are also found on the right of the keyboard. The letter keys are in the centre of the keyboard.
Which term describes the surrounding area of this image?
The surrounding area of this image is called
Surroundings
Foreground
Background
This area is also called a
Negative
Positive
Neutral
Answer: background/negative
Explanation: the background, is negative space. A solid piece of sculpture occupies space, and makes the space around it come to life.
Write a SELECT statement that returns one row for each customer that has orders with these columns: The email_address from the Customers table
A count of the number of orders
The total amount for each order
(Hint: First, subtract the discount amount from the price. Then, multiply by the quantity.) Return only those rows where the customer has more than 1 order. Sort the result set in descending sequence by the total amount . Hint: You will join three tables together. Returns 3rows of data.
Questions done up until #4: https://pastebin.com/LwSKknPi
all questions before and after:
Write a SELECT statement that returns these columns:
The count of the number of orders in the Orders table
The sum of the tax_amount columns in the Orders table
Returns 1 row of data.
Write a SELECT statement that returns one row for each category that has products with these columns:
The category_name column from the Categories table
The count of the products in the Products table
The list price of the most expensive product in the Products table
Sort the result set so the category with the most products appears first.
Hint: You will join two tables together. Returns 3 rows of data.
Write a SELECT statement that returns one row for each customer that has orders with these columns:
The email_address column from the Customers table
The sum of the item price in the Order_Items table multiplied by the quantity in the Order_Items table
The sum of the discount amount column in the Order_Items table multiplied by the quantity in the Order_Items table
Sort the result set in descending sequence by the item price total for each customer.
Hint: You will join three tables together. Returns 7 rows of data.
Modify the solution to exercise 4 so it only counts and totals line items that have an item_price value that’s greater than 400. Returns 2 rows of data.
Write a SELECT statement that answers this question: What is the total amount ordered for each product? Return these columns:
The product name from the Products table
The total amount for each product in the Order_Items (Hint: You can calculate the total amount by subtracting the discount amount from the item price and then multiplying it by the quantity)
Use the WITH ROLLUP operator to include a row that gives the grand total.
Hint: You will join two tables together. Returns 10 rows of data.
Write a SELECT statement that answers this question: Which customers have ordered more than one product? Return these columns:
The email address from the Customers table
The count of distinct products from the customer’s orders
Hint: You will join three tables together. . Returns 3 rows of
Answer:
Please find the attachment files of the queries:
Explanation:
In the all queries the select statement is used that selects the defined columns and use the function like sum, join, orderby, and groupby to perform the various operations, in which the sum is used to add columns or rows values, join is used for joining two or more tables, and orderby is used for return the table into ascending or descending order, and groupby is used for the count the value, calculate average and perform other operation and gives its return value.
Write the definition of the function inputArray that prompts the user to input 20 numbers and stores the numbers into alpha. Write the definition of the function double Array that initializes the elements of beta to two times the corresponding elements in alpha. Make sure that you prevent the function from modifying the elements of alpha. Write the definition of the function copy AlphaBeta that stores alpha into the first five rows of matrix and beta into the last five rows of matrix. Make sure that you prevent the function from modifying the elements of alpha and beta. Write the definition of the function printArray that prints any one-dimensional array of type int. Print 15 elements per line.
Answer:
In Java:
public static int[] inputArray(){
Scanner input = new Scanner(System.in);
int[] alpha = new int[20];
for(int i = 0;i<20;i++){
alpha[i] = input.nextInt();
}
return alpha;}
public static int[] doubleArray(int [] alpha){
int[] beta = new int[20];
for(int i = 0;i<20;i++){
beta[i] = 2 * alpha[i];
}
return beta;
}
public static int[] copyAlphaBeta(int [] alpha, int [] beta){
int [] AlphaBeta = new int[10];
for(int i = 0;i<5;i++){
AlphaBeta[i] = alpha[i];
}
int count = 5;
for(int i = 15;i<20;i++){
AlphaBeta[count] = beta[i];
count++;
}
return AlphaBeta;
}
public static void printArray(int [] alpha){
for(int i = 0;i<20;i++){
System.out.print(alpha[i]+" ");
if((i+1)%15 == 0){
System.out.println(" ");
}
}
}
Explanation:
The inputArray is defined here
public static int[] inputArray(){
Scanner input = new Scanner(System.in);
This declares alpha array of 20 elements
int[] alpha = new int[20];
The following iteration gets input from the user into the array
for(int i = 0;i<20;i++){
alpha[i] = input.nextInt();
}
This returns the alpha array
return alpha;}
The doubleArray is defined here. It takes the alpha array as its input parameter
public static int[] doubleArray(int [] alpha){
This declares beta of 20 integers
int[] beta = new int[20];
This populates beta by 2 * alpha[i]
for(int i = 0;i<20;i++){
beta[i] = 2 * alpha[i];
}
This returns the alpha array
return beta;}
The copyAlphaBeta array is defines here
public static int[] copyAlphaBeta(int [] alpha, int [] beta){
This declares AlphaBeta as 10 elements
int [] AlphaBeta = new int[10];
This populates the first 5 elements of AlphaBeta with the first 5 of alpha
for(int i = 0;i<5;i++){
AlphaBeta[i] = alpha[i];
}
int count = 5;
This populates the last 5 elements of AlphaBeta with the last 5 of beta
for(int i = 15;i<20;i++){
AlphaBeta[count] = beta[i];
count++;
}
This returns the AlphaBeta array
return AlphaBeta;
}
The printArray is defined here. It takes the alpha array as its input parameter
public static void printArray(int [] alpha){
This iterates through alpha array
for(int i = 0;i<20;i++){
This prints each element of the array
System.out.print(alpha[i]+" ");
A new line is started after the 15th element
if((i+1)%15 == 0){
System.out.println(" ");
}
}
}
See attachment for complete program which includes the main
One of the following represent class B IP address? A.255.255.255.0 B. 125.123.132 C.24.67.11.8 D.191.23.21.54
Answer:
D.191.23.21.54
Explanation:
Class B networks use a default subnet mask of 255.255. 0.0 and have 128-191 as their first octet. The address 191.23.21.54 is a class B address
(Please heart the answer if you find it helpful, it's a motivation for me to help more people)
which internet service is the main reason the internet has expanded and what draws newcomers to the internet?
Answer:
It has spread throughout the world since it is a very useful tool since most things are facilitated, thus leading to a much more efficient daily life, which is why the internet is one of the main means for the functioning of the world today. day, as new technologies have revolutionized
Social media.
The term social media refers to those digital tools that facilitate the transmission of information, communication and social interaction between individuals. Thus, social media allows individuals to relate to each other, in a similar way as if they were physically interacting, but through computer means.
These social media can be from profiles on social networks to blogs, podcasts or even videos on digital platforms. In short, nowadays social media is an integral part of people's social life, and it is in many cases what ends up driving them to use the internet.
Learn more in https://brainly.com/question/21765376
1
When collection of various computers
look like a single coherent system to its
client, then it is called
Answer:
The appropriate answer is "Distributed system".
Explanation:
Whenever used by linking several autonomous computers as a single system, considered as distributed system. It could be consist of several kinds of mainframes, processors as well as stationary machines, it can be programmed. A distributed machine has massive program modules, which operate as a single device on many machines.Under foreign corrupt practices act, under what conditions is a bribe not unlawful explain and provide an example
Answer:
ex. telling your children if you clean up you get new toys
Use EBNF notation to describe the syntax of the following language constructs.
A. A Java return statement, which could be either a return keyword followed by a semicolon, or a return keyword followed an expression then followed by a semicolon. Assume the grammar for expression has been defined as expr-> e
B. A Python return statement, either a return keyword, or return one or more expressions separated by comma.
C. Based on your syntax definition in (b), is return x+y; a valid Python return statement?
Answer:
Following are the description to the given points:
Explanation:
To resolve basic design restrictions, EBNF has also been developed.This principle was its lack of support can identify repeatings easily. It implies that popular BNF models, like the description of a sequence of replicable elements, are complicated and rely on contra intuitive logical math.
To set a list of words divided by commas (e.g. john, coffee, logic) for instance, we would like to say something like "a list is a word accompanied by a few commas or terms." Through EBNF, they may say so. However, there have been no "many" alternatives in the standard BNF format. So, to describe something such as "a list is a term or a number accompanied by a pair with notation and script," you have to say the same thing. Which functions, although it is difficult, as it specifies a variety of lists instead of a specific list.
Essentially, "john, coffee, logic is John's list, accompanied by coffees or, and logic" would be the earlier link. That's why in Option (a):
The return statement in Java is:
return ('”‘ (~[“] | ” [”e‘])*);
In option (c), it is the valid statement.
5.18 LAB: Output numbers in reverse Write a program that reads a list of integers, and outputs those integers in reverse. The input begins with an integer indicating the number of integers that follow. For coding simplicity, follow each output integer by a comma, including the last one. Ex: If the input is: 5 2 4 6 8 10 the output is: 10,8,6,4,2, To achieve the above, first read the integers into a vector. Then output the vector in reverse.
Answer:
In C++:
#include<iostream>
#include<vector>
using namespace std;
int main(){
int len, num;
vector<int> vect;
cout<<"Length: ";
cin>>len;
for(int i = 0; i<len;i++){
cin>>num;
vect.push_back(num);}
vector<int>::iterator iter;
for (iter = vect.end() - 1; iter >= vect.begin(); iter--){
cout << *iter << ", ";}
}
Explanation:
This declares the length of vector and input number as integer
int len, num;
This declares an integer vector
vector<int> vect;
This prompts the user for length
cout<<"Length: ";
This gets the input for length
cin>>len;
The following iteration gets input into the vector
for(int i = 0; i<len;i++){
cin>>num;
vect.push_back(num);}
This declares an iterator for the vector
vector<int>::iterator iter;
The following iterates from the end to the beginning and prints the vector in reverse
for (iter = vect.end() - 1; iter >= vect.begin(); iter--){
cout << *iter << ", ";}
In MS Excel, a function is written as =FUNCTION_NAME(_____________________).
Explanation:
A function is a predefined formula that performs calculations using specific values in a particular order. All spreadsheet programs include common functions that can be used for quickly finding the sum, average, count, maximum value, and minimum value for a range of cells. In order to use functions correctly, you'll need to understand the different parts of a function and how to create arguments to calculate values and cell references.
Define a class named Money that stores a monetary amount. The class should have two private integer variables, one to store the number of dollars and another to store the number of cents. Add accessor and mutator functions to read and set both member variables. Add another function that returns the monetary amount as a double. Write a program that tests all of your functions with at least two different Money objects.
Answer:
#include<iostream>
using namespace std;
class Money{
private:
int dollars;
int cents;
public:
Money(int d=0, int c=0){
setDollar(d);
setCent(c);
}
void setDollar(int d){
dollars = d;
}
void setCent(int c){
cents = c
}
int getDollar() {
return dollars;
}
int getCent() {
return cents;
}
double getMoney(){
return (dollars + (cents/100));
}
};
// testing the program.
int main(){
Money Acc1(3,50);
cout << M.getMoney() << endl;
Money Acc2;
Acc2.setDollars(20);
Acc2.setCents(30);
cout <<"$" << Acc2.getDollars() << "." << Acc2.getCents() << endl;
return 0;
}
Explanation:
The C++ source code defines the Money class and its methods, the class is used in the main function as a test to create the instances of the money class Acc1 and Acc2.
The object Acc2 is mutated and displayed with the "setDollar and setCent" and "getDollar and getCent" methods respectively.
Practice Question
What will be displayed after this
code segment is run?
count
0
REPEAT UNTIL (count = 3
count count + 1
DISPLAY
and"
DISPLAY count
"1 and 2 and 3"
"And 1 and 2 and 3"
"0 and 1 and 2"
"And 0 and 1 and 2"
Answer:
Follows are the code to the given question:
#include <stdio.h>//header file
int main()//main method
{
int count=0;//defining an integer variable
for(count=0;count<3;count++)//use for loop to count values
{
printf("%d\n",count);//print count values
}
return 0;
}
Output:
0
1
2
Explanation:
In this code, it declares the integer variable "count" which has a value of "0" and in the next step declares a loop, using the count variable to regulate count values, which is less than 3, and increases the count value, and prints its values. This variable is the count value.
The count variable holds a value of 0, and use a for loop that checks its value is less than 3, and print its value, that's why it will print the value that is 0,1, and 2.
Difference between a port and a connector
Explanation:
A connector is the unique end of a plug, jack, or the edge of a card that connects into a port. Port: The port has either holes or a slot that matches the plug or card being connected into the port. For example: cables are plugged into Ethernet ports, and cables and flash drives are plugged into USB ports.Are items a through e in the following list algorithm? If not, what qualities required of algorithms do they lack?
a. Add the first row of the following matrix to another row whose first column contains a nonzero entry. (Reminder: Columns run vertically; rows run horizontally.)
[1 2 0 4 0 3 2 4 2 3 10 22 12 4 3 4]
b. In order to show that there are as many prime numbers as there are natural numbers, match each prime number with a natural number in matching the first prime number with 1 (which is the first natural number) and the second prime number with 2, the third with 3, and so forth. If, in the end, it turns out that each prime number can be paired with each natural number, then it is shown that there are as many prime numbers as natural numbers.
c. Suppose you're given two vectors each with 20 elements and asked to perform the following operation. Take the first element of the first vector and multiply it by the first clement of the second vector. Do the same to the second elements, and so forth. Add all the individual products together to derive the dot product.
d. Lynne and Calvin are trying to decided who will take the dog for a walk. Lynne suggests that they flip a coin and pulls a quarter out of her pocket. Calvin does not trust Lynne and suspects that the quarter may be weighted (meaning that it might favor a particular outcome when tossed) and suggests the following procedure to fairly determine who will walk the dog.
1. Flip the quarter twice.
2. If the outcome is heads on the first flip and tails on the second, then I will walk the dog.
3. If the outcome is tails on the first flip, and heads on the second, then you will walk the dog.
Answer:
Following are the responses to the given points:
Explanation:
The following features must contain a well-specified algorithm:
Description [tex]\to[/tex] Exact measures described
Effective computation [tex]\to[/tex] contains steps that a computer may perform
finitude [tex]\to[/tex] It must finish algorithm.
In choice "a", there is little algorithm Because it does not stop, finiteness has already been incomplete. There is also no algorithm.
In choice "b", it needs productivity and computational burden. because it's not Enter whatever the end would be.
In choice "c", the algorithm is given the procedure. It fulfills all 3 algorithmic properties.
In choice "d", each algorithm is a defined process. Since it needs finitude.
What is computer science
Answer:
computer science is the study of computer and computing as well as theoretical and practical applications.
pls give me thanks ☺️☺️
Consider the security of a mobile device you use
(a) Explain how transitive trust applies to your use of an operating system on a
mobile device (e.g. smartphone). Then, explain how an attacker can exploit this
transitive trust to violate the CIA properties of the software and data on your
device
Answer:
keep it private
Explanation:
You are given the following segment of code:Line 1: PROCEDURE printScorePairs()Line 2: {Line 3: count <-- 0Line 4: sum <-- 0Line 5: i <-- 1Line 6: scores <-- [73, 85, 100, 90, 64, 55]Line 7: REPEAT UNTIL ( i > LENGTH (scores) )Line 8: {Line 9: sum <-- scores[i] scores[i 1]Line 10: DISPLAY ( sum )Line 11: i <-- i 2Line 12: }Line 13: }The ABC company is thrifty when it comes to purchasing memory (also known as RAM) for its computers. Therefore, memory is of the utmost importance and all programming code needs to be optimized to use the least amount of memory possible. What modifications could be made to reduce the memory requirements without changing the overall functionality of the code?
Answer:
Move Line 10 to after line 12
Explanation:
Required: Modify the program
From the procedure above, the procedure prints the sum at each loop. Unless it is really necessary, or it is needed to test the program, it is not a good practice.
To optimize the program, simply remove the line at displays the sum (i.e. line 10) and place it at the end of the loop.
So, the end of the procedure looks like:
Line 10: i <-- i 2
Line 11: }
Line 12: DISPLAY ( sum )
Line 13:
Your friend really likes talking about owls. Write a function owl_count that takes a block of text and counts how many words they say have word “owl” in them. Any word with “owl” in it should count, so “owls,” “owlette,” and “howl” should all count.
Here’s what an example run of your program might look like:
text = "I really like owls. Did you know that an owl's eyes are more than twice as big as the eyes of other birds of comparable weight? And that when an owl partially closes its eyes during the day, it is just blocking out light? Sometimes I wish I could be an owl."
owl_count(text)
# => 4
Hints
You will need to use the split method!
Here is what I have so far, it doesn not like count = 0 and i keep getting an error.
def owl_count(text):
count = 0
word = 'owl'
text = text.lower()
owlist = list(text.split())
count = text.count(word)
text = "I really like owls. Did you know that an owl's eyes are more than twice as big as the eyes of other birds of comparable weight? And that when an owl partially closes its eyes during the day, it is just blocking out light? Sometimes I wish I could be an owl."
print (count)
In this exercise we have to use the knowledge of computational language in python, so we find the code like:
The code can be found attached.
So let's write a code that will be a recognition function, like this:
def owl_count(text):"I really like owls. Did you know that an owls eyes are more than twice as big as the eyes of other birds of comparable weight?"
word = "owl"
texts = text.lower()
owlist = list(texts.split())
count = text.count(word)
num = [owlist, count] #num has no meaning just random var
print(num)
See more about python at brainly.com/question/26104476
1. In what ways a computer system is like a human being
la
2. In what ways is it not like a human being
3. What will happen if the computer is not invented
a computer system can be considered similar to human beings in a way that it needed various parts in order to it to function it humans we need the or such as hurt brain veins exactra while computer need the CPU Ram etc
Explanation historical development of computer
Answer:
Brief History Of Computer. The computer as we know it today had its beginning with a 19th century English mathematics professor name Charles Babbage. ... Other developments continued until in 1946 the first general– purpose digital computer, the Electronic Numerical Integrator and Computer (ENIAC) was built.
Explanation:
Computers and electronics play an enormous role in today's society, impacting everything from communication and medicine to science.
Although computers are typically viewed as a modern invention involving electronics, computing predates the use of electrical devices. The ancient abacus was perhaps the first digital computing device. Analog computing dates back several millennia as primitive computing devices were used as early as the ancient Greeks and Romans, the most known complex of which being the Antikythera mechanism. Later devices such as the castle clock (1206), slide rule (c. 1624) and Babbage's Difference Engine (1822) are other examples of early mechanical analog computers.
The introduction of electric power in the 19th century led to the rise of electrical and hybrid electro-mechanical devices to carry out both digital (Hollerith punch-card machine) and analog (Bush’s differential analyzer) calculation. Telephone switching came to be based on this technology, which led to the development of machines that we would recognize as early computers.
The presentation of the Edison Effect in 1885 provided the theoretical background for electronic devices. Originally in the form of vacuum tubes, electronic components were rapidly integrated into electric devices, revolutionizing radio and later television. It was in computers however, where the full impact of electronics was felt. Analog computers used to calculate ballistics were crucial to the outcome of World War II, and the Colossus and the ENIAC, the two earliest electronic digital computers, were developed during the war.
With the invention of solid-state electronics, the transistor and ultimately the integrated circuit, computers would become much smaller and eventually affordable for the average consumer. Today “computers” are present in nearly every aspect of everyday life, from watches to automobiles.
The history of computers is one that began far back 2000 years ago in the city of Babylonia where there was the use of abacus and it has grown to now the use of digital computer as it start in 1642.
What is the history of computer?The history of computers is one that is more than 200 years but in the 19th century, there was the invention of mechanical calculating machines.
Note that the The 1st generation of computers was said to have existed from the year 1940 to 1955 and now it has grown to a whole new level.
Learn more about computer from
https://brainly.com/question/24540334
#SPJ9
What does the abbreviation JPEG stand for?
A. Japanese Photographic Examination Group
B. Joint Photo Examination Group
C. Joint Photographic Expert Group
D. Jefferson Photo Exclusive Group
E. Jacket Photo Extension Group
Answer:
c) giant photographic experts group
Answer:
C
Explanation:
(often seen with its file extension stands for
"Joint Photographic Experts Group",