One of the earliest uses of an electronic digital computer involved ________.

Answers

Answer 1
The uses of earliest electronic digital computer involved many things such as computing or even learning informations but the earliest of use as to why it is also built is to be able to determine and note the weather forecast in a specific place.

Related Questions

What is the difference between a syntax error and a logical error?

Answers

A syntax error can be a simple mistake as a typo or an extra space. A logical error has to do with the code structure, and if it makes sense.

Hope this helps!

Which osi reference model layer is associated with common networks (e.g., ethernet lans)?

Answers

OSI stands for Open Systems Interconnection. It is a reference model that enables interconnection between different applications in networks. The model has 7 layers: physical layer, data link layer, network layer, transport layer, session layer, presentation layer and application layer.
The first - the physical layer and the second data link layer, the network layer is associated with common networks (e.g. Ethernet LANs). The IEEE standard 802.2 describes the physical layer, while the standard 802.3 the second layer.

List three considerations when you choose memory.

Answers

1)How many memory cards (how many can you computer hold)
2)Company (some companies run better than others)
3)Amount of memory (xGb)

To connect multiple usb devices to a single usb port, a ____ can be used.

Answers

USB hubs can be used in this situation. These hubs typically have four to six USB ports, and can thereby allow the connection of more devices than the typical one-to-one connection that a standard USB port will give. This allows the user to expand the number of devices that the computer can read at any one time.

Which zone of the ocean is deepest ?

Answers

The zone of the ocean that is known to be the deepest is said to be called the Challenger Deep.

What is the ocean depth about?

The southern end of the Mariana Trench, which extends several hundred kilometers southwest of the U.S.-owned island of Guam, contains the deepest portion of the ocean, known as the Challenger Deep, which lies beneath the western Pacific Ocean. The depth of Challenger Deep is roughly 10,935 meters (35,876 ft).

Note also that the deepest area of the ocean is called the hadal zone, often referred to as the hado pelagic zone, and it is located within oceanic flour. The hadal zone is found in long, narrow, topographic  length that are between 6 and 11 kilometres (3.7 to 6.8 mi; 20,000 to 36,000 ft) below sea level.

Learn more about ocean from

https://brainly.com/question/13904384
#SPJ1

Final answer:

The deepest part of the ocean is the abyssal zone, located at depths of more than 4000 meters, characterized by high pressure, cold temperatures, and a unique chemosynthetic ecosystem.

Explanation:Deepest Ocean Zone

The deepest part of the ocean is the abyssal zone, which extends at depths of 4000 m or greater. Despite its inhospitable conditions, including extremely cold temperatures, very high pressure, and a lack of light that precludes photosynthesis, this zone supports a variety of life forms. This unique ecosystem is home to many invertebrates and fish that rely on chemosynthetic bacteria around hydrothermal vents. These bacteria utilize hydrogen sulfide and other minerals as an energy source, forming the base of the food chain in the abyssal zone.

To research scholarly information for her history project, Lucy should most likely visit a

a .com website.
b .edu website.
c .gov website.
d .org website.

Answers

Answer: The correct answer is choice b, a .edu website.

Explanation: In order to research scholarly information for her history project, Lucy should most likely visit a .edu website. Websites that end in .edu are normally educational institutions, which which be the most likely to contain scholarly articles.

To research scholarly information for her history project, Lucy should most likely visit a .edu website. The correct option is b.

What is a website?

A web page (or webpage) is a World Wide Web hypertext document. A web server serves up web pages to the user, which are then displayed in a web browser.

A website is made up of several web pages that are linked together by a common domain name.

The world wide web is made up of all of the websites put together. The website can be of various types, such as an e-commerce website, a social media website, or a blog website, and each website serves a different purpose, but they all have several linked web pages in common.

When choosing a domain name, one of the top-level domain names that can be used is "edu." It generally refers to the domain name's owner as a four-year college or similar educational institution.

Thus, the correct option is b.

For more details regarding a website, visit:

https://brainly.com/question/19459381

#SPJ6

import static java.lang.System.*;
import java.util.Scanner;

public class Sales{

//you haven't learned about "static" yet but take it on faith that it is needed
//we'll discuss in future classes what it actually means and why you need it
//create a private static variable for price
//create a private static variable for discountRate - it's an integer
//create a private static variable for tax


// the sale method takes in no parameters
// there are 3 print satements and the method returns the final sale price
public static double sale(){

//write your code here. Use the Word doc example as a guide to what the print statements
//should look like. Don't forget the "return" statement.

}

/*
*The main method is what is executed when the "run" button is clicked.
*It is necessary, in this case, for the program to be tested.
*Actually study this code and trace through it to see how the Scanner is used to assign
* values to the variables. Also pay attention to the use of print, println and \n to cause the
* output to be formatted the way it is in the example.
*/

public static void main(String[] args){
Scanner kb = new Scanner(System.in);
System.out.print("Please enter a price: ");
price = kb.nextDouble();
System.out.println(price + "\n");
System.out.print("What is the tax rate? ");
tax = kb.nextDouble();
System.out.println(tax);
discountRate = (int)(Math.random() * 40);
System.out.println("Result returned is " + sale());
}
}




Can anyone help with this

Answers

First you add the three static variables as instructed:

    private static double price;
    private static int discountRate;
    private static double tax;

Then you implement the sale() method:

public static double sale(){
    System.out.printf("Price before discount: %.2f\n", price);

    double sale = price * (1-(double)discountRate/100.0);
    System.out.printf("Price after discounting %d%% but before tax: %.2f\n", discountRate, sale);

    sale *= (1+tax/100.0);
    System.out.printf("Discounted price with %.1f%% tax added: %.2f\n", tax, sale);

    return sale;
}

I kind of took a stab at how to calculate the sale. Not sure if the tax has to be added before or after the discount. But I'm sure you can fix that if needed.

There are two activities on your schedule, which are: 1) install server in lab 2) move server into the data center. however, the second task can't start until the server has run in the lab for 5 days without failure. this is an example of what?

Answers

There are two activities on your schedule, which are  example of Lag.

What is computers lag?

A lag is known to be a kind of delay (latency) that exist between the work of the user (input) and the reaction of the server aiding the task, which needs to be sent back to the client.

Note that in the above, There are two activities on your schedule, which are  example of Lag.

Learn more about lag from

https://brainly.com/question/8887133

SPJ9

Final answer:

The scenario illustrates a finish-to-start dependency in project management, where one task must be completed before the next can begin, highlighting the importance of understanding task dependencies in planning.

Explanation:

The question describes a scenario where a server must operate in a laboratory setting for five days without any failures before it can be moved into a data center. This situation exemplifies a dependency in project scheduling, specifically a finish-to-start dependency. In project management, dependencies dictate the order in which tasks must be completed. A finish-to-start dependency means that one task (in this case, the server running successfully in the lab for five days) must be finished before the subsequent task (moving the server into the data center) can begin.

In constructing a project timeline, recognizing and planning for these dependencies is crucial. Whether managing a simple project or orchestrating complex operations in a data center, understanding task dependencies helps in allocating resources efficiently and avoiding project delays. Consequently, this enables a smoother workflow and better project outcomes.

What is jpeg? what considerations have to be kept in mind with jpeg?

Answers

Joint Photographic Experts Group

1. How should a cover letter begin?
A. With an informal greeting like "Hey, there!"
B. With the hiring manager's name
C. With the name of the position
D. With "To Whom it May Concern"

2. If an occupation is projected to neither grow nor decline over the next 10 years, how would you rate the job outlook?
A. Advancing
B. Steady
C. Strong
D. Weak

Answers

I am not sure about 1 but on number 2, the answer would be B because the occupation is staying the same, or steady
A cover letter began with the hiring manager's name. Thus, option (B) is correct. When the job  is projected to neither grow nor decline over the next 10 years, then it is inferred as Steady. Thus, option (B) is correct.

What is a Cover Letter?

A cover letter refers to the document attached with the resume  that provides additional information about skills and experiences related to the job which the applicant is applying for. It is also known as application letter.

It is written in the paragraph form which includes about candidate's skills  experience and achievements in relation to the position. Furthermore, it is begun with the hiring manager's name.

If over the next ten years, an occupation neither increase nor contract, is shows that it that stable situation.

Therefore, It can be concluded that  option (B) is correct for first question and option (B) is correct for second question.

Learn more about cover letter here:

https://brainly.com/question/14204316

#SPJ2

If a computer is having trouble navigating to a website when you enter the url into the browserâs address box, but is able to access the site when you enter the web serverâs ip address, which server available to your network should you make sure is functioning correctly?

Answers

"DNS" domain name server. It's like a phone book. Say you typed in " Facebook.com" it goes to the DNS. The dns server looks up the up address for you. So you don't have to remember IP address.

Many common web page designs use columns that are about ____ of the width of the page to approximate traditional aesthetic proportions.

Answers

Many common web page designs use columns that are about a third of the width of the page to approximate traditional aesthetic proportions.

What type of software can you use to capture and examine the contents of network messages?

Answers

They're usually referred to as packet sniffers.

What is the proper course of action for the following scenario? You want to expand a computer’s capability to play and process video. Which of the following must you do?
Install a video card into a socket on the motherboard
Install a video card into a slot on the motherboard
Install a video card into a port on the motherboard
Install a video card into a chipset on the motherboard

Answers

Install a video card into a slot on the motherboard Since you're wanting to install a new video card in your computer, let's look at the provided options and see what makes sense. Install a video card into a socket on the motherboard * Most motherboards have sockets that you can use to replace the processor or increase the amount of RAM they have. So plugging a video card into a socket doesn't make sense in this context. Install a video card into a slot on the motherboard * Most motherboards have expansion slots that you can plug in new devices and cards such as video cards, audio cards, etc. This makes sense in the context of you adding a new video card to your computer and is the correct choice. Install a video card into a port on the motherboard * Ports are generally used to attach external devices for the computer to communicate with. Some examples would be serial ports, or USB ports. The video card you're adding will likely have some video ports such as HDMI, DVI, or other types to connect to the monitor, but as mentioned, ports are generally used to communicate with devices EXTERNAL to the computer. So this is a bad choice. Install a video card into a chipset on the motherboard * The chipset on a motherboard is the set of support chips to provide the processor with access to the bus controlling data traffic on the motherboard between expansion slots, I/O devices, RAM, etc. Motherboards are generally designed around a chipset and you can not replace the chipset to upgrade the motherboard. So this is the wrong answer.

Answer:

Install a video card into a slot on the motherboard

Explanation:

in order to reduce the file size of an image in word the user should use

Answers

To reduce the file size of an image in Word, the user should compress the image. This action can be done through the Picture Tools in Word by selecting the image, then choosing the Compress Pictures option, which allows the user to reduce the image resolution and delete cropped areas.

Reducing the file size of images can make documents easier to share and quicker to open, especially important when dealing with large files or limited storage capacity. In Word, this is typically achieved through the in-built Compress Pictures feature, found in the Picture Tools format tab. This feature helps the user adjust the image properties to minimize its file size while attempting to maintain an acceptable level of image quality. Another option includes saving the image with a lower resolution or using a more efficient image format before inserting it into the Word document.

Name two purposes of creating a microsoft account for use in visual studio 2015

Answers

Creating a Microsoft account for use in Visual Studio 2015 means that you will get a better and optimized user experience, with several benefits.
Some of the purposes why you should create an account are:
1. free software, training and support from Visual Studio and broad range of benefits
2. synchronized Visual Studio Settings, which means that you will have for example the same layout, window and color theme, or whatever you select in the settings, every time you log in with your account


what is an ad's target audience composed of

A. The few people who paid for the ad

B. The many people who created the ad

C. The people advertisers hope to reach

D. The people the ad features or pictures

Answers

C. An ad targets an audience the creators hope will but the product.

Final answer:

The correct answer is "The people advertisers hope to reach". The target audience of an ad is composed of the people that advertisers intend to reach and who are most likely to be receptive to their marketing message. This group is identified through analysis of demographic, psychographic, and behavioral characteristics. Ads are designed to appeal to the sensibilities of this audience, using visual and verbal cues strategically.

Explanation:

The correct answer to the question 'what is an ad's target audience composed of' is C. The people advertisers hope to reach. An ad's target audience is a specific group of consumers that advertisers have determined are most likely to respond positively to their message. Determining who the ad is designed for involves looking at factors such as demographics, interests, and behaviors. It could be designed for people from a particular political party, economic class, age group, or even people with specific interests or needs.

To understand who is pictured in the advertisement and who is left out can offer insights into the target audience. For example, if an ad for a luxury car features well-dressed individuals in an affluent setting, the target audience is likely high-income earners who value prestige and luxury. The people presented in ads are usually depicted in a manner that appeals to this target audience, which can be inferred from their expressions, the direction of their gaze, and even the camera angle used.

A target audience consists not only of individuals who will directly respond to the ad, but sometimes includes a secondary audience. These are individuals who may influence the primary audience or take actions that the ad seeks to encourage, such as philanthropists supporting a cause advertised, or legislators who could enact change based on the ad's message.

Ultimately, a target audience includes anyone capable of being persuaded and capable of creating the change that the advertiser seeks.

Which type of network topology is the most common and easiest to use?

Answers

A network layout or topology that is the most common, the most simple and easiest to use out of the four network topologies is the Bus topology, one cable is used for installation so it is also the cheapest network type.

Most windows computers typically use _____, which supports much larger hard drives and files than the older fat32 and includes better security and error-recovery capabilities.

Answers

NTFS NTFS (NT File System) is the file system that the NT operating system introduced in Windows NT 3.1 in 1993. It is a "journaling file system" which means that intentions for changes to the file system are first written to a special journal, then the actual changes are performed to the file system. This allows for NTFS to better recover from errors caused by power loss. The maximum theoretical size of a NTFS volume is 2^64 - 1 clusters with a cluster being typically 4KB long, although it can be as long as 64KB. The maximum length of a file in NTFS is 2^64 - 1024 bytes long. In contrast, the volume size limit for a FAT32 system is 2 terabytes using 512 byte sectors, or 16 terabytes using 4096 sectors and a maximum file size of 2^32 - 1 bytes.

How many bits would you need if you wanted to have the ability to count up to 1000?

Answers

For every bit you can record two possible data and the amount will increase by rate 2^x where x is the number of bit. To answer this question, you need to know what is the least amount 2^x that will be enough to record 1000 possibilities.
To do this, it is easier to divide the number with 32 for 5 bits(2^5=32), then divide it with 2 for 1 bit until it less than 1. The calculation would be: 1000/32= 31.25 /32= 0.976.
The answer would be 5 bit+ 5bit= 10 bit. (2^10= 1024)

Answer:

10 bits

Explanation:

it would be ten bits in total

Ram can be thought of as the ____ for the computer’s processor.

Answers

memory






-----------------------------------

When you tell a computer what to do, you are providing input?

Answers

True: Input is the command which we give it to the computer to perform a certain task.

In other words, A computer is an electronic machine that processes information, it takes in raw information (or data) at one end, stores it until it's ready to work on it, chews and crunches it for a bit, then spits out the results at the other end. All these processes have a name. Taking in information is called input, storing information is better known as memory (or storage), chewing information is also known as processing, and spitting out results is called output

_____ does not allow changing service or bandwidth because a website allows illegal media sharing

Answers

Final answer:

Net Neutrality does not allow changing service or bandwidth because a website allows illegal media sharing.

Explanation:

Net Neutrality ensures that internet service providers treat all online data equally, prohibiting discrimination or favoritism. It doesn't permit altering service or bandwidth based on the content of websites, including those facilitating illegal media sharing. Upholding Net Neutrality principles means ISPs can't selectively throttle or block access to specific sites or services.

Instead, they must provide consistent and nondiscriminatory access to all online content. This ensures fair and open access to information and services for users, regardless of the nature of the content they access. Thus, Net Neutrality safeguards against arbitrary restrictions based on the legality or illegality of online activities.

To get a sense of your digital footprint, you should: Question 2 options: Google yourself regularly, and monitor what your friends post, in case they've posted something about you Google yourself once a year Google yourself every five years Delete all of your accounts and start fresh

Answers

Let us examine the given answers.

a) Google yourself regularly, and monitor what your friends post.
  Verdict: This answer is correct, but it is also necessary to look for yourself on other search engines.

b) Google yourself once a year
  Verdict: Once a year is better than doing nothing, but more than once a year is preferable.

c) Google yourself every five years.
  Verdict: The time interval is too long. Your reputation could easily be damaged, or your identity could be stolen in less than 5 years.

d) Delete all your accounts and start fresh.
   Verdict: This will not solve the problem of having your reputation damaged, or having your identity stolen. Information on the web is preserved ins storage vaults for long periods of time.

Answer: 
Google yourself regularly, and monitor what your friends post. Also, search for your name on other search engines.

Richard works in a café for six hours a day and is paid $6 per hour for any extra time worked. If Richard worked 6.5 hours on Monday, 6 and a half hours on Tuesday, 6 hours on Wednesday, 6 hours on Thursday, and 6 hours and 30 minutes on Friday, how much extra money will Richard earn that week?

Answers

assuming he works 6 hours a day,
Richard would be paid $6 extra that week

What information would be included in the data portion of an ethernet frame on an ip network?

Answers

I hope this is a trick question. The header portion of a packet has the networking stuff. The data portion has, the data.

Which ipv4 ip class provides for 126 unique networks, each having up to 16,777,214 hosts?

Answers

Class A.






----------------------------------------

Which device provides access to wireless/mobile devices within a local area network?

Answers

A wireless router is the main source of wireless network access (or WiFi), providing devices such as phones, tablets and laptops with connection to the network.

Users with visual or hearing impairments, or who lack the full use of their hands, need web pages that are ____.

Answers

Easily workable to them. With voice controls, a read the text button and seeing help, like bigger logos and bold colors.

Describe three ways to protect the computer and all peripheral devices from damage

Answers

Here are three ways:

Cleaning: as applied to most things in our lives, cleaning also applies to protecting peripheral devices. To ensure the smooth running of such devices one needs to clean the dust and dirt from these devices once in a while. Make sure you disconnect the device before you eject it from the system.

Follow instructions: Most devices come with a safety guide and instructions manual, always use the recommended settings for the smooth running of your system. These recommendations usually come from the manufacturer and are reliable.

Surge suppressor/protector: One of the major issues faced by the users is faults caused by power surges. One needs to make sure to use a Surge Suppressor/Protector connected with the system to make sure it will not damaged with power fluctuations. 

Other Questions
Find the value of 3.4 squared The inner dimensions of an in-ground swimming pool are: width = 13.0ft, length = 18.0 ft, and depth = 9.0ft. the pool walls and the bottom are uniformly 1.0 ft thick and made of concrete. what is the total concrete surface area of the pool in units of ft2? select two answers please!!!!! All of the Gathered in an investigation must be recorded. (Fill in the blank) What is the purpose of the rm step, develop controls and make risk decisions? The cost of two mopeds is the same as the cost of seven bicycles. The cost of one bicycle is $152. Therefore, the cost of one moped is What is the slope of line represented by 1/8x + 3y =3 The Holiday Rush gets really intense. You work from 7am to 11pm on the Friday and Saturday just before Xmas, selling clothes and then stocking shelves, and then from 9am to 9pm on Sunday. Your pay rate is $20 per hour. How much do you get in gross wages for that one weekend what is the result of converting 8 gallons to quarts ? remember , there are 4 quarts in a gallon The documentation format taught in the text is .owlmlachicagoapa What are some examples that illustrate the collective unconscious of Italian culture? An iceberg has a volume of 9470 ft3.What is the mass in kilograms of the iceberg? The density of ice in the iceberg is 0.92 g/cm3. Did the civil war end before or after the assassination of abraham lincoln What would be the simplest way for a sodium atom to achieve electron stability? (a)round 44.2862 to 3dp(b)round 4.0854 to 2dp(c)round 0.0196 to 3dp(d)round 0.7048 to 2dp If 3x - 1 = 11, what is the value of x2+ x? What is the correct symbol for lithium ion that lost two electrons? To gather information about the validity of a new standardized test for Match the following: Question 1 options:1-1-i1Answer optionsi2ii3i4 How do maps made using geographic information systems (GIS)make use of computer technology. Steam Workshop Downloader