Answer:
all of the above
Explanation:
Several key people were involved in programming-language development in the 1970s and 1980s.
Choose all that apply.
Bjarne Stroustrup released C++ programming language in the1980s.
John McCarthy developed LISP for artificial intelligence.
Bill Gates and Paul Allen released the first programming language for a personal computer.
Niklaus Wirth developed Pascal to teach programming.
Answer: 1,3,4
Explanation: These are correct answers
Several key people were involved in programming-language development in the 1970s and 1980s:
Bjarne Stroustrup released C++ programming language in the 1980s.
John McCarthy developed LISP for artificial intelligence.
Niklaus Wirth developed Pascal to teach programming.
Thus, options A, B and D are the correct options.
In the realm of programming-language development during the 1970s and 1980s, several notable figures left a lasting impact. Bjarne Stroustrup ushered in the 1980s by introducing the C++ programming language, an extension of C that brought object-oriented principles to the forefront. John McCarthy's contributions were marked by his creation of LISP, a language pivotal for artificial intelligence research and symbolic processing.
Meanwhile, Niklaus Wirth's innovation lay in Pascal, a language designed with pedagogy in mind, facilitating programming education. However, the claim of Bill Gates and Paul Allen released the first programming language for personal computers is inaccurate, as their pivotal role was in software and operating systems, not language development.
Thus, options A, B and D are the correct options.
Learn more about programming-language here:
https://brainly.com/question/32901513
#SPJ3
special keys that allow you to use the computer to perform specific functions
Answer:
Examples are Ctrl, Alt, Fn, Alt Gr, Shift, Caps Lock, Tab, Scroll Lock, Num lock, Esc, Windows Key, Backspace, Enter...
I NEED TO FIND OUT THE ANSWER!
Answer:
the first action that should be taken is to back up the all important document that and by finishing doing that format the entire system...and i advise you should be choosing the best antivirus to protecting your computer
Can i have the answer of that fill in the blanks
Answer:
c) {n/a}
d)Binary codes
e)NLP
f)Application software
What refers to the way that a user gets data from a computer, such as
reading a text message printing a report, or viewing photos on a monitor?
Answer:
Possibly IOT or internet of things. Not 100% sure if I am understanding question fully
Explanation:
What is yalls favorite childhood toy>
Answer:
Barbies were very popular
Explanation:
6 decades of Barbies ago because of innovative marketing and product extension and continues improvement techniques
Match the careers with the career clusters.
curriculum developer
tax auditor
paralegal
attorney
federal aid coordinator
speech-language
pathologist
Education and
Training
Government and Law, Public Safety,
Public Administration Corrections, and
Security
Answer:
Answer:education and training- speech Language pathologist And curriculum developer
Government and public administration- tax auditor and federal aid coordinator
Law, public safety corrections and security- attorney and paralegal
Explanation:
how computer network is useful
Answer:
Access to remote information.
Person-to-person communication.
Interactive entertainment.
Electronic commerce.
Pls i need help asap
Answer:
sorry for that I don't know it's answer sorry
write features of Fifth Generation of computer?
ULSI technology.
Development of true artificial intelligence.
Development of Natural language processing.
Advancement in Parallel Processing.
Advancement in Superconductor technology.
More user-friendly interfaces with multimedia features.
Availability of very powerful and compact computers at cheaper rates.
Answer:
Here's your answer . hope it helps you!!!!
A program virus infect
Explanation:
Once a virus has successfully attached to a program, file, or document, the virus will lie dormant until circumstances cause the computer or device to execute its code. In order for a virus to infect your computer, you have to run the infected program, which in turn causes the virus code to be executed.
MARK AS BRAINLIST IF IT IS USEFUL
2. Say whether these sentences are True or False. a. Input is the set of instructions given to a computer to change data into information. the form of words numbers, pictures, sounds .it is true or false
Answer:
I think it is false bcz the set of instruction given to computer is program.
Tamera was responding to a complaint that one of the employees is having problems with the wired network connection on their laptop. She investigated the issue to see why it will not connect to the network. Tamera looked at the indicator lights, but she doesn't see the blinking she expected to view. Instead, the light is steady. What is MOST likely the issue?
Answer:
tamera like from sister sister hehe
Explanation:
sorry i dont know the awnser
A bank wants to reject erroneous account numbers to avoid invalid input. Management of the bank was told that there is a method that involves adding another number at the end of the account numbers and subjecting the other numbers to an algorithm to compare with the extra numbers. What technique is this
Answer:
validity check
Explanation:
validity check
write an alogrithm to display the first ten even numbers
Answer:
Step1:start
step2: enter the ten number
s3: if the number is divided by 2 then print even number
s4: otherwise print odd number
s5:stop
Explain ONE negative outcomes of not matching an ICT product to the correct audience:
PLEASE HELP
. Many Shakespeare plays deal with the idea of fate andior free will. Is fate something that
can be altered or is it predetermined? Is there such a thing as free will?
Pls help
Answer:
Love cools, friendship falls off, brothers divide: in cities, mutinies; in countries, discord; in palaces, treason; and the bond cracked between son and father" (1.2.58). Later, after Gloucester's enemies blind him and cast him into the wilds, Gloucester says to the loyal old servant attending him, “As flies to wanton boys, are we to the gods.
Explanation:
Answer:
it depends
Explanation:
if you think about it it free will and fate are connected, like gears, if you turn the first cog that is free will, you can set of a chain reaction of other cogs and wheels that ultimately determine the outcome which is fate, but fate can be altered by the choices you make and all that matters is the first cog
Which Dangonronpa character did not deserve to die
Answer: Leon kuwata.
MLB The Show 17, which simulates professional baseball games, and Madden Football, which simulates professional football games, are both examples of which type of game genre?
Answer:
Sports game
Explanation:
Why do you think design is so important to humans?
The multiprocessor system which consists of a set of processors that share a common main memory and are under the integrated control of an operating system is a _________ . Select one: a. cluster b. functionally specialized processor c. loosely coupled or distributed multiprocessor d. tightly coupled multiprocessor
Answer:
D
Explanation:
Tightly coupled multiprocessor
Which science fiction author was born in the 1800s?
Frank Herbert, Robert Heinlein, Edgar Rice Burroughs, Isaac Asimov
Answer:
Edgar Rice Burroughs, known for his work in Science Fiction and Fantasy, was born in the 1800s.
Explanation:
Other Choices:
Frank Herbert was also a known Science Fiction writer, but he wasn't born until 1920.
Robert Heinlein was born in 1907 and also a well-published Science Fiction author and military officer.
Isaac Asimov, much like Frank Herbert, wasn't born until 1920 and contributed to the same field of literature.
what is computers
[tex]what is computere[/tex]
A computer is an electronic machine, that accepts the input data,processes the given data according to the predefined set of instructions,gives the result and stores the result for future use
Please someone helppppppp
Answer : communicate is the answer.
write the contributions of dr herman hollerith
He invented the tabulating machine. In 1890 U.S
Question 3 of 10
A business letter is not written:
Answer:
yes. business letter better use statistic. or audit.
Servicio de computación que consiste en que la computadora del usuario ya no debe tener todos los programas de software y datos instalados o guardados porque la red de computadoras que formaba parte de la nube se encarga de ello
hola no se espanõl peri intentaré ayudar, la nube de una computadora es donde se guarda todo, como fotos, así que si su computadora se rompe, puede hacer una copia de seguridad
1. (1001010)2 – (10100)2 perform.
Given:
[tex]\to \bold{(1001010)_2 - (10100)_2}[/tex]
To find:
value=?
Solution:
[tex]\to \bold{(1001010)_2 - (10100)_2}[/tex]
In this first, we convert the given binary number to the decimal number:
Converting [tex]\bold{(1001010)_2}:[/tex]
[tex]\to \bold{1 \times 2^6+0\times 2^5+0\times 2^4+1\times 2^3+0\times 2^2+1 \times 2^1+0\times 2^0}\\\\\to \bold{1 \times 64+0\times 32+0\times 16+1\times 8+0\times 4+1 \times 2+0\times 1}\\\\\to \bold{64+0+0+ 8+0+ 2+0}\\\\\to \bold{64+ 8+ 2}\\\\\to \bold{74}\\\\[/tex]
Converting [tex]\bold{(10100)_2}:[/tex]
[tex]\to \bold{1\times 2^4+0\times 2^3+1\times 2^2+0 \times 2^1+0\times 2^0}\\\\\to \bold{1\times 16+0\times 8+1\times 4+0 \times 2+0\times 1}\\\\\to \bold{16+0+ 4+0 +0}\\\\\to \bold{16+ 4}\\\\\to \bold{20}\\\\[/tex]
Subtracting the value:
[tex]\to \bold{74-20=54}[/tex]
After converting the 54 into a binary number we get: [tex]\bold{(110110)_2}[/tex]
So, the final answer is "[tex]\bold{(1001010)_2 - (10100)_2}= \bold{(110110)_2}[/tex]"
Learn more:
brainly.com/question/23729089
A) what is cyber law?
Answer:
Cyber law is a term that deals with the Internet's relationship to technological and electronic elements, including computers, software, hardware and information system.
Hope it helps you.Answer:
Cyber law is a term that deals with the Internet's relationship to technological and electronic elements, including computers, software, hardware and information system. Simply, the cyber law is the law which is used for stopping computer crime and abuse.
computer network reduces the cost. explain the statement with example.
Answer:
Justify this statement with an example. Ans: Computer Network reduces expenses of an office because computer on a network share different hardware devices like printers, scanners, hard disk etc. And sharing those hardware devicAes will reduces the expense of an office.
Explanation:
Justify this statement with an example. Ans: Computer Network reduces expenses of an office because computer on a network share different hardware devices like printers, scanners, hard disk etc. And sharing those hardware devicAes will reduces the expense of an office.