What contribution did ada byron make to computing?

Answers

Answer 1

Answer:

Around 1843, she described the first computer principles, later built by Charles Babbage in the form of a mechanical calculator.

Answer 2
Ada Byron was a writer and mathematician known for her work on Babbage's early mechanical general-purpose computer. She helped to write the first algorithm intended to be processed by a machine.

Related Questions

The service known as ___ contains original content in the form of live or recorded streams showing individuals playing video games.

Answers

Twitch is an online service that comprises original content in the form of live or recorded streams and it is typically focused on showing various individuals that are playing video games.

Twitch is an online (web) service that was launched in June 2011 and it derived its name from twitch gaming such as video games that are mainly about fast action and the use of reflexes by the game players.

The main purpose of Twitch is to avail game players the opportunity to stream or show live or recorded videos of themselves playing video games.

Read more: https://brainly.com/question/21694571

Write a function that will receive 5 numbers from a user (inputted one at a time-- use reassignment!) and will count then print how many of the numbers are odd.

Answers

The program is an illustration of loops.

Loops are used to perform repetitive operations

The function in Python where comments are used to explain each line is as follows:

#This defines the function

def count_odd(mylist):

   #This initializes the count variable to 0

   count = 0

   #This iterates through the list

   for i in mylist:

       #This checks if the current list element is not even

       if not i%2 == 0:

           #If yes, this increments the count variable by 1

           count+=1

   #This returns the count of odd numbers

   return(count)

Read more about similar programs at:

https://brainly.com/question/18269390

how do viruses spread from one computer to another computer?​

Answers

Answer:Computer viruses usually spread in one of three ways: from removable media; from downloads off the Internet; and from e-mail attachments. Although the Internet gets a bad rap as a source of viruses, you're no more likely to contract a virus from the Web than you are from packaged software.Computer viruses usually spread in one of three ways: from removable media; from downloads off the Internet; and from e-mail attachments. Although the Internet gets a bad rap as a source of viruses, you're no more likely to contract a virus from the Web than you are from packaged software.

to determine the highest number in a range of numbers, click insert function box in the formula bar to display the insert function dialog box, then select ____.

Answers

Functions in Excel are used to perform several arithmetic and logical operations.

The text that completes the statement is MAX

From the question, we understand that you want to determine the highest number in a given range of numbers.

This is done using the MAX function.

i.e. after the insert function box has been selected, the formula to use is the MAX function.

Hence, the complete statement is:

Click insert function box in the formula bar to display the insert function dialog box, then select MAX.

Read more about Excel functions and formulas at:

https://brainly.com/question/20497277

I am a device which is used to scan characters printed in magnetic ink​

Answers

Answer:

scanner is right answer or

What is the smallest unit of data in a computer? *
a) byte
b) terabyte
c) bit
d) bistable device

Answers

the smallest unit of data in a computer is bit

Please fill in I give 50 points!!

# Heading (name, date, and short description) feel free to use multiple lines

def main():

# Initialize variables
numGuesses = 0
userGuess = -1
secretNum = 5

name = input("Hello! What is your name?")

# Fill in the missing LOOP here.
# This loop will need run until the player has guessed the secret number.

userGuess = int(input("Guess a number between 1 and 20: "))

numGuesses = numGuesses + 1

if (userGuess < secretNum):
print("You guessed " + str(userGuess) + ". Too low.")

if (userGuess > secretNum):
print("You guessed " + str(userGuess) + ". Too high.")

# Fill in missing PRINT statement here.
# Print a single message telling the player:
# That he/she guessed the secret number
# What the secret number was
# How many guesses it took

main()

Answers

Answer:

* explains the whole paragraph what ever that is * there

Helppppppp pleaseeeewweeweee

Answers

Answer:

D

Explanation:

Applications software (also called end-user programs) include such things as database programs, word processors, Web browsers and spreadsheets

What is an FPS? Describe the acronym as it applies to video games and explain two games popular in the 2000s that flourished in this game category.

Answers

1. Short for frames per second, fps is a measure of how many full screen, still images are captured or displayed in one second of video recording/playback or video game play.

who plays pokemon shield or sword

Answers

Answer: I haven’t played but i wanna

Explanation:

Answer:

no

Explanation:

i don't

what was your first pokemon game


if you have not played one just comment don't answer

Answers

Answer:

FireRed & LeafGreen

Explanation:

so if it's mobile games then Pokémon go
but if it's Nintendo games then probably sword and shield cos you can catch pretty much every Pokémon.

What is the purpose of formatting charts?
changes the data set used for creating the chart
changes the look and feel of the display
changes the values in the data set
changes the type of chart used
Intro
Don

Answers

Answer:

Changes the look and feel of the display

Explanation:

Because you don't change the data nor the values in the char

And it does not change the type of chart.

A ____________ protocol is software that provides or facilitates a connection in which no information is retained by either sender or receiver. The sender transmits a packet to the receiver and does not expect an acknowledgement of receipt. The recipient receives the packet without any prior connection setup.

Answers

Answer:

An internet protocol is software that provides or facilitates a connection in which no information is retained by either sender or receiver. The sender transmits a packet to the receiver and does not expect an acknowledgement of receipt. The recipient receives the packet without any prior connection setup.

What is one of four key principles of Responsible Artificial Intelligence (AI)?

Answers

Answer:

Their principles underscore fairness, transparency and explainability, human-centeredness, and privacy and security.

One of the four key principles of Responsible Artificial Intelligence (AI) is the decision-making process should be transparent and understandable. The correct option is A.

What is Artificial Intelligence (AI)?

Artificial intelligence is the process of giving a machine the capacity to reason and make decisions. The most sophisticated branch of computer science is artificial intelligence, which involves creating a mind in which a computer can think—a computer brain that can reason similarly to humans.

The creation of intelligent machines, particularly intelligent computer programs, is the science and engineering of artificial intelligence, according to John McCarthy, the founder of machine intelligence.

This results in the creation of a computer system or robotic system that attempts to function using the same logic as the human brain.

Therefore, the correct option is A. Decision-making process should be transparent and understandable.

To learn more about Artificial Intelligence (AI), refer to the link:

https://brainly.com/question/23824028

#SPJ2

The question is incomplete. Your most probably complete question is given below:

A. Decision-making process should be transparent and understandable.

B. Accountability for decisions ultimately lies with the computer algorithms

C. Companies are not reliable for violations of the law that result from the actions of AI

D. Any biases that may arise from AI processing are justifiable if they are backed by data

explain about cyber terrorism​

Answers

Explanation:

cyber terrorism is type of hacking group with give the country that are to illegal group

your iphone is not configured to allow calls using this mac

Answers

Answer:

Make sure you have an iCloud account and that your computer is logged into that account.

Explanation:

Apple computers ship their computer parts to India to be made, and station their tech support in India. This is an example of a:

Answers

Companies are known to set up different branches. This is an example of a Global assembly line.  

An assembly line is known to be a production process that breaks down the manufacture of goods into different steps that are completed in a known sequence.

These lines are often used method in the mass production of products as they reduce labor costs.

Global Assembly Line  is simply known as distributed manufacturing method that entails the product research and development in wealthy countries and assemblage in poorer countries.

Learn more from

https://brainly.com/question/2954967

Answer:

Shipping?

Explanation:

No options sooo

what is cyber crime? is hacking is cyber crime ​

Answers

Answer:

Crime committed using computer networks.

Explanation:

well I don't think sooo..........

HOPE IT HELPS.......

Answer:

Cyber crime means the crime done through the means of internet.Using others account without permission,Leaking others personal information,etc.are example of it.

Yes,hacking is a cyber crime.

_______ is a medium-range wireless network. ________ is a medium-range wireless network. Cellular radio LTE UWB Wi-Fi

Answers

Wireless fidelity (Wi-Fi) is known simply as a wired LAN that does not have cables. Wifi is a medium-range wireless network.

WiFi configuration is made of of transmitter with an antenna. It is the wireless access point because it connects to a wired LAN or to satellite dishes that gives an Internet connection.

Wi-Fi is the mostly used type of medium-range wireless communication system.

Medium-range Wi-Fi signal can take about 100 meters and they also not take as far as cellular signals.

Learn more from

https://brainly.com/question/20812811

It is most commonly used for self-running presentations.
A. Slide Transition
B. Hyperlink
C. Action Buttons
D. Animation​

Answers

Answer:slides

Explanation: because in the slide you can make a presentation

Does anyone know who this man issss?

Answers

Kaeya Should be the correct answer

more Or less?

Pick one and be rewarded!!!!!!!

Answers

Answer:

More

Explanation:

hope this is helpful

A(n) _______________ is a network organization that centralizes user accounts, passwords, and access to resources.

Answers

Answer:

A router

Sentence:

A(n) router is a network organization that centralizes user accounts, passwords, and access to resources.

The USGS and National Weather Service have many sensors collecting data about natural events.

That data can be used to create a weather map.

Identify the parts of the Input-Process-Output model for each step.


(output, input, process): weather map displayed on a web page


(output, input, process): determination of color to be used on the map


(output, input, process): sensors collect temperature and precipitation data

Answers

Answer:

Explanation:

Throughout many regions on the chart, a standard plotting code demonstrates air currents speed and direction, average temperature and relative humidity, barometric pressure and its change over the previous hours, the number and variety of clouds, the weather type, including visibility restrictions, and the amount and type of precipitation.

USGS and National Weather Service

As per the question, the USGS  and National weather services are mapping out the region to collect the data for the natural events. The data is collected in the form of maps and is used for the identification of the input and the output model steps.

The answer is precipitation data, visibility data.

The NWS is a federal agency of the united stated that is tasked to prove the forecasts and for the formation of hazardous weather events and warns the public of the related events.

Learn more about the National Weather Service

brainly.com/question/17774978.

A ________ manages security for all of the organization's assets: physical plant and equipment, employees, intellectual property, and digital. (1pts) Question 34 - A ________ manages security for all of the organization's assets: physical plant and equipment, employees, intellectual property, and digital. systems analyst chief information security officer chief security officer network administrator server administrator

Answers

Answer:

1. CSO (Chief Security Officer)

2. Network Admin

Explanation:

Hope this helps!!! :))

u What is the full form of DRAM? a) Dynamic Remote Access Memory b) Dynamic Random-Access Memory c) Dependent Remote Access Memory d) Dependent Random-Access Memory

Answers

Answer:

B

Explanation:

Dynamic Random-Access Memory

1.* Parents can now buy GPS tracking devices for their children. This allows them to monitor
their child's location at any time.
Discuss the impact of tracking children with GPS devices.
In your answer, you might consider the impact on:
Cultural issues
Ethical issues

Answers

Answer:

well...

Explanation:

it will help with any issues really, the parents just want to be able to find their children if they get hurt, lost, or kidnapped, so I don't see how it can be a cultural or an ethical issue

Match each tool or feature to the task it completes.

Answers

Answer:

the screenshot order is correct.

Explanation:

the gray one’s are right he just got them wrong before

True or False: At the Company level, users will only have access to view projects to which they have been specifically granted access to by a company/project administrator.

Answers

Answer:

True

Just look it up and put quizlet at the end of your question youll find it.

which type of information could reasonably be expected to cause serious damage to national security if disclosed without authorization

Answers

Answer:

Confidential Information

Explanation:

It is predicated on the idea that a person who receives information in confidence should not use or divulge that knowledge without permission. Unauthorized use or disclosure of confidential information may lead to a breach of trust suit.

Confidentiality clauses, often known as "NDA's", are intended to protect and consider important business information. Like as production processes, proprietary formulas, client lists, know-how, concepts, business strategies, and technical information.The unauthorized revelation of this type of material could reasonably be expected to harm our national security.

Therefore, the final answer is "Confidential Information".

Learn more about types of information:

brainly.com/question/13079191

Other Questions
How does the Army Corps of Engineers affect agriculture?A. They oversee safety standards.B. They develop new pesticides.C. They develop new machinery.D. They oversee some waterways. HELP MY DOODOO IS STUCK WHAT SHOULD I DO!!!!!!!!!! In a fruit basket there are 9 bananas, 4 apples, and 3 plums. The ratio of bananas to apples is Lable the parts of a tennis CourtA______B______C______D______E______F______G______H______I_______J_______ please help thank you How many colors are in the rainbow? General elections nationwide are typically scheduled on Explain what a graph for Jeds test scores {61%, 65%, 73%, and 79%} would look like if it was not misleading. Make sure it is different than Jeds graph that some may say is misleading. plsss anwer my questions in the picture Sarah mowed 3 lawns in 9 hours what is her rate of mowing in hours per lawn? What is the slope of this graph? m=[slope)1008060Number of cups402016208 12Sugar (pounds) solid waste with properties that make it dangerous or potentially harmful to human health or the environment is classified as municipal waste. HELPPPPPPPPPPPPPPPPPPP Which number should be multiplied by 45 so that it will have 3 nct prime factors? Type the correct answer in the box Spell all words correctlyWhich type of agreement have the defense and prosecution entered in the given scenario?Mervin has been accused of committing burglary. His defense attorney, Robert, has realized that his client has a weak case, Robert has thusadvised Mervin to state he has committed the crime in return, the prosecution has agreed to offer Mervin a lighter sentence. The defense andprosecution have thus entered aagreement Metaphors from the coraline book Think about the parts of an egg, and write down why you think it can act as a model of an animal cell. Also write down your predictions of what will happen when you leave an egg in vinegar for three days. White 3 6 9 12 15Yellow 5 10 15 20 25Which equation relates the number of yellow flowers, y, to the number of white flowers, w.y=w+2y= w-2y = 2wy= w/2 the sequoyah convention was held to? Find The nth Term of this number sequence18, 16, 14, 12