Do some research and find out whether Babbage’s Analytical Engine is a computer according to the von Neumann model.

Answers

Answer 1

Answer: The Analytical Engine incorporated an arithmetic logic unit, control flow in the form of conditional branching and loops, and integrated memory, making it the first design for a general-purpose computer that could be described in modern terms as Turing-complete.


Related Questions

What device that will have the most network ports.

Answers

Answer:

switch device

Explanation:

because its purpose is to connect many devices.

Answer: SWITCH DEVICE

Explanation:

to group worksheets together press and hold the _____ key​

Answers

Answer : to group worksheets together press and hold Ctrl key.

You do not need to cite anything used from creative commons.
True or False?

Answers

True. It is not necessary to cite information that is common knowledge. One of the ways to judge if something is common knowledge is to ask yourself if anyone in the field would know this information or if no one would argue against it.

Answer: False

Explanation: Creative commons is when a person uploads their own copyrighted content and gets license for it, so it other people online may add to it or alter it and re-share it. They get to decide how you get to use and what you are allowed to do with but no matter the situation you always have to give credit to the original content creator. Thus, false, you NEED to cite anything used from Creative Commons.

Assume that your company provides IT systems integration consultancy for mid-size
manufacturing, distribution and logistics companies in the country. Having recommended and
implemented a Management Information Systems (MIS) for one on your leading clients, and
taken part in the training session of the MIS conducted by the vendor, develop a process model
with the appropriate tool set for the activities that must be performed by the sales ordering
module of the MIS to capture customer’s sales order for a named client. (Note: Your solution
must include (but not limited to) an explanation of the sales module of the MIS and the steps
involved in the sales order activities).
Discuss how information systems are useful for organizations?

Answers

Every company needs records of its actions in order to identify the root of issues and implement appropriate fixes. Storage of operational data, communication logs, documents, and modification histories can be done with the help of information systems.

Why is information system important?

By supplying organizations with information they can use to make informed decisions, information systems may help them make better judgments. An organization might, for instance, employ an information system to gather sales data, which will show which products are selling well and which are not. The things to promote or delete can then be decided using this data.

By processing data from company inputs to produce information that is valuable for managing your operations, information systems become important. You can either add more data to make the information more accurate or use the information in innovative ways to boost the usefulness of the information system.

By enabling managers and other organization leaders to store data in folders and documents that can be seamlessly shared with the right personnel, information systems help disseminate information.

Learn more about information systems on:

https://brainly.com/question/14688347

#SPJ1

Which of the following information
is required by application programs
to access the content ofa file.
a. File name
b. File location
c. File extension
d. File size

Answers

An information which is required by application programs to access the content of a file is: c. File extension.

What is a file?

A file can be defined as a computer resource or type of document that avails an end user the ability to save or record data as a single unit on a computer storage device.

In Computer technology, a sequence which best reflects the size of various files and their extension on a computer system, from smallest to largest include the following:

Text (.txt)Compressed files (.zip)Picture (.jpeg)Audio (.mp3)Video (.mp4)

In conclusion, we can reasonably infer and logically deduce that an information which is required by application programs to access the content of a file is file extension because an error would occur if there's an incompatibility issue between the two resource.

Read more on file extensions here: brainly.com/question/1982059

#SPJ1

The miniaturization of which of the following inventions allowed integrated circuits to get smaller, leading to the creation of the microprocessor?.

Answers

The miniaturization of microchip inventions allowed integrated circuits to get smaller and leads to the creation of the microprocessor.

What is Microprocessor?

A Microprocessor may be defined as a kind of miniature electronic device that significantly stores the arithmetic, logic, and control circuitry mandatory to carry out the functions of a digital computer's central processing unit.

Microchips are silicon devices that remarkably function as the central processing unit in the computer. These chips possess numerous electronic components which are utilized to carry out specific mathematical operations.

Along with this, these chips also migrate data from one memory location to another with the support of microprocessors.

Therefore, the miniaturization of microchip inventions allowed integrated circuits to get smaller and leads to the creation of the microprocessor.

To learn more about Microprocessors, refer to the link:

https://brainly.com/question/13164100

#SPJ1

Your question seems incomplete. The most probable complete question is as follows:

The miniaturization of which of the following inventions allowed integrated circuits to get smaller, leading to the creation of the microprocessor?

microchipelectronic circuitvacuum tubetransistor

list any three specification technology​

Answers

Answer:

descriptive, performance and detailed.

How is the Agile way of working different?

Answers

Answer:

It is working within guidelines (of the task) but without boundaries (of how you achieve it).

Which of the following commands will visualise the running processes?

Select one:
a. Get-Process
b. Get-RunningProcesses
c. Show-Process

Answers

Answer:

A

Explanation:

The PS command displays your currently running processes in real-time. This will display the process for the current shell with four columns: PID returns the unique process ID.

A

It shows your current running instant in real-time

How does the CPU interface with the device to coordinate the transfer?

Answers

Explanation:

The CPU can initiate a DMA (Direct Memory Access) operation by writing values into special registers that can be independently accessed by the device, The device initiates the corresponding operation once it receives a command from the CPU.

The Internet is the largest example of a _____?

Answers

Answer:

the answer is wide area network

your University wants to create a new department for university alumni. Every
employee has their own system credentials and they can use these credentials on any system inside the
building. how can you ensure the system authorization, availability and monitoring.

Answers

The way to ensure the system authorization, availability and monitoring is that an efficient and effective online examination system be made or a system where all can clock in daily can be used.

What is system credentials?

The system credentials is seen as a kind of Credentials that is known to be used for the verification of peoples identity as well as been used as a tools for authentication.

Note that they can be part of a certificate or other authentication act that helps to know the identity of a user's and as such, The way to ensure the system authorization, availability and monitoring is that an efficient and effective online examination system be made or a system where all can clock in daily can be used.

Learn more about system credentials from

https://brainly.com/question/4670419

#SPJ1

Rank the following storage systems from slowest to fastest:
a. Hard-disk drives
b. Registers
c. Optical disk
d. Main memory
e. Nonvolatile memory
f. Magnetic tapes
g. Cache

Answers

Answer:

Slower = Larger capacity (and vice versa)

Ranked from Slowest to Fastest:

1. magnetic tapes

2. optical disk

3. hard-disk drives

4. nonvolatile memory

5. main memory

6. cache

7. registers

What does the office background allow you to do?

Answers

Answer: Any changes that you make to the Office Background in PowerPoint 365 will be reflected in all other Microsoft Office 365 products on your computer, such as Word, Excel, Outlook, and others. These patterned strips are not activated by default.

Bad Directions You are driving to your friend’s house and are using your smartphone for directions. While approaching your destination, you realize that your smartphone app instructed you to turn the wrong way on your friend’s street. How could this have happened?

Answers

This could have happened when:

Lack of Internet service or failureWrong application.What do you mean by Internet?

The Internet is seen as a form of a network that helps people to  connects their computers all over the nation.

In this age,  Through the help of the Internet, people are able to  share information and navigate through places.

Note that the problem of bad direction could have happened when:

Lack of Internet service or failureWrong application.

Learn more about Internet from

https://brainly.com/question/2780939

#SPJ1

Write code to print values of integers x, y, and z in a single line such that each value is left-justified in 6 columns

Answers

The code to print given value can be x = int(input ("enter first number: ")) y = int(input ("enter second number: ")) z = int(input ("enter third number: ")) print('%6d %6d %6d' %(x,y,z)).

What is a code?

Print is a function in many programming languages that sends text, variables, or another object to the screen. If you're more familiar with the Scratch programming language, print is equivalent to say.

The print command is used to print a file without using a printing-capable Windows application.

We receive three integer variables (x,y,z) using the Python programming language, and the values are printed out using string formatting (%6), which specifies that the output should be right justified with a width of 6.

x = int(input ("enter first number: "))

y = int(input ("enter second number: "))

z = int(input ("enter third number: "))

print('%6d%6d%6d'%(x,y,z)).

Thus, this is the code to print given value.

For more details regarding a code, visit:

https://brainly.com/question/1603398

#SPJ1

Which of the following makes the varied types of digital communication possible?


an agreed-upon set of rules and standards governing the way technology shares and manages data


properly linking all of the workstations on a closed loop-like configuration


refraining from relying too heavily on one central hub that connects all nodes on a system


only using a high-quality server computer with lots of memory

Answers

Answer:

An agreed-upon set of rules and standards governing the way technology shares and manages data

A computer science degree does not typically give students the necessary skills to easily learn a new computer language. True or False.

Answers

Answer:

False

Explanation:

Which menu option allows you to change the display to close-up, single, or multiple pages?

Answers

What is the question asking for?……

Your team has been assigned responsibility to identify an appropriate MSSP provider for a small, rural hospital. What criteria will you use to select an appropriate provider? Do research online to identify three MSSP providers. Use the criteria you established to rate each of the three, and choose the one that would be best for the hospital.

Answers

The Criteria for Choosing the Right MSSP for for a small, rural hospital are:

Customized solution. UX – User experience. Responsiveness. Cost-effective.

What are the three MSSP providers?

They are:

1) Cipher.

2) SecurityHQ.

3) SecureWorks.

The option that is chosen among the three is Cipher. It is known to be chosen because they provide the services listed above which is needed by the hospital as well as:

Cybersecurity MonitoringIncident Management and Cyber Defense Security Asset Management, etc.

Therefore, based on the above. The Criteria for Choosing the Right MSSP for for a small, rural hospital are:

Customized solution. UX – User experience. Responsiveness. Cost-effective.

Learn more about Cipher from

https://brainly.com/question/14754515
#SPJ1

You join Mountain Water Co – an expanding bottled water company as an information security officer. The company wants to do a lot of advertising of its bottled water products through its website. The CEO asks you to review the company website and report if it is secure. After talking to the webmaster you find out the following:


The Web server accepts all connections


No authentication is required

Self-registration is allowed

The web server is connected to the Internet

Is the situation secure? Select all that apply.


a.

Yes. There is no threat to a bottled water company so it is secure.


b.

There is insufficient information available to answer this question.


c.

No. Anything that is connected to the Internet is insecure.


d.

No. The system is allowing everyone to register. Only individuals who are associated with the company should be able to register.


e.

No. If there is no authentication, then anyone with access to the website online can access it. For good security only individuals with certain authorized roles should access a website.

Answers

In regards to the above case, My response is c. No. Anything that is connected to the Internet is insecure.

What is meant by computer security?

Computer security is known to be a term that can be called cybersecurity. This is seen as a form of  protection of computer systems as well as information from any kind of harm, theft, as well as any form of unauthorized use.

Note that Computer hardware is seen to be protected by the same ways or methods that one uses to protect other valuable things.

In the above, there is no method of authentication and as such, In regards to the above case, My response is c. No. Anything that is connected to the Internet is insecure.

Learn more about Computer security from

https://brainly.com/question/25720881

#SPJ1

How many input configurations does the Boolean expression (x AND Y) OR (NOT x
AND NOT y) have?
4
6
8
10
CAN SOMEONE PLSEASEEE HELP ME

Answers

Answer:

4

Explanation:

There are only 2 inputs, X and Y, and the number of different input configurations will be 2-to-the-power-of the number of inputs.

2² = 4

In other words, XY can be 00,01,10 or 11 and that's it. Four combinations.

BTW, (x AND Y) OR (NOT x AND NOT y) is allso called XNOR. See picture.

write a complete main that will input a decimal number, double it and display the results

Answers

Answer:

No sure what language you want but since I am best with Java.

class Main {

 public static void main(String[] args) {

   Scanner input = new Scanner(System.in);  // Create a Scanner object

   System.out.println("Enter Number");

double number01 = input.nextLine();  // Read user input

double multi = number01 * 2;

   System.out.println("Number is " + multi);  // Output user input

}

}

Explanation:

Answer the following questions in your own words.
[tex] \\ \\ [/tex]
1. What is the difference between tools and equipment?

2. Describe the word paraphernalia.​​

Answers

1. A tool is something more specific, used to do work. Tools are always equipment, but a pice of equipment is not always a tool. For instance a hammer and a saw are tools, and if you’re planning to build something they are part of your equipment for the job

2. The separate real or personal property of a married woman that she can dispose of by will and sometimes according to common law during her life

what is paragraph indentation

Answers

Answer:

a blank space between a margin and the beginning of a line of text

Explanation:

The space before start start of your paragraph. Ex:what I did with the first sentence

I want to know if C# can be used to solve questions here as well.

Answers

What exactly is the question that you’re asking what is C #?

HELP PLEASE
Which type of error occurred in the following lines of code?

>>> print(9 / 0)
Traceback (most recent call last):
File " ", line 1, in
9/0
ZeroDivisionError: division by zero

logical error
logical error

exception
exception

syntax error
syntax error

reserved word error
reserved word error

Answers

Answer:

Logical Error

Explanation:

The division by 0 is a logical error.

Advantages and Disadvantages of Modern Devices​

Answers

Answer:

Advantages of Technology:

Easy access to information

Improved Communication

The convenience of travelling

Convenience in Education

Improved entertainment

Disadvantages of technology

Excessive dependency

Inevitable Cheating

Laziness and forgetting the basic way of studying

A computer is experiencing network connectivity issues; what step would you NOT attempt to solve the problem?

Answers

Answer:

A step I wouldn't take is throwing the computer in the trash and lighting my house on fire.

Explanation:

Raw images can be processed again at a later date when new and improved software become available.
Group of answer choices

True

False

Answers

Answer:

True

Explanation:

Other Questions
Which type of figurative language do these quotations use out of these options: Metaphor, Alliteration, Personification, Oxymoron, Simile, and Onomatopoeia? Given the definitions of f(x) and g(x) below, find the value of (gof)(-2).f(x) = -2x + 7g(x) = x - 6x + 5 Another circular section of the island to be used to count marine iguanas hasa'radius of 1 kilometer. Researchers will sample this area to draw conclusionsabout the iguana population on the entire island. What is the area of thissection? Use an approximation of n to two decimal places. Place yourapproximation of the area in the orange chart below. a mutation in the dna that changes the sequence of a codon but does not change the amino acid sequence of the protein describes a . what is the job of the bacteria and fungi in the sediment Switch on your light source and make sure it's shining onto a wall.hold your largest cardboard square between the light source and the wall.wha do you observe? the briquette is better fuel than wood why give two reason Who manages Eskom ? the gauge pressure at the bottom of a cylinder of liquid is 0.40 atm . the liquid is poured into another cylinder with twice the radius of the first cylinder. part a what is the gauge pressure at the bottom of the second cylinder? entrepreneurial leaders use methods that help them pursue creative ideas even when they lack authority or necessary resources. those who might pursue creative ideas who do have authority and necessary resources would typically be characterized as What does amending mean The speedometer at right displays a car's speed in miles per hour. (65 mph)What is the car's speed in km/h? (1 km = 0.62 mile) Find the distance between -55 and 63. Find the total amount given the original price and tax rate. Round to the nearest hundredth if necessary. Original price: $123.28 Tax rate: 7.5% employee benefit planning involves selecting, coordinating, and managing employer-provided compensation that the form of cash payments, such as wages, salaries, and commissions. some psychiatric emergencies have causes other than mental illness. which clues likely indicate a medical or behavioral cause Reduce the fraction to its simplest form 35/54 what is this equations value for x? |5-2x|>5 How were religious traditions similar in Mesopotamia, ancient Egypt, and the ancient Indus River Valley? They were all monotheistic. They were all polytheistic. They all worshipped a mother goddess. They were all ruled by priests instead of kings. which feature of anglo-saxon culture is reflected in the passage the reliance on formal rules of hospoitality