Write two Get statements to get input values into firstMonth and firstYear. Then write three Put statements to output the month, an underscore, and the year. Ex: If the input is 1 2000, the output is:

Answers

Answer 1

Get statements to get input values into first Month and firstYearThe Get statement in the COBOL programming language is used to receive data from the input devices such as a keyboard.

The Get statement is followed by the file name from which the data is to be read. The two Get statements that can be used to get input values into first

Month and firstYear are as follows:GET INPUT-FILE1 FIRSTMONTH.GET INPUT-FILE1 FIRSTYEAR.Put statements to output the month, an underscore, and the year

The Put statement in the COBOL programming language is used to display data to the output devices such as a monitor or a printer. The Put statement is followed by the file name to which the data is to be written.

The three Put statements that can be used to output the month, an underscore, and the year are as follows:

PUT OUTPUT-FILE FIRSTMONTHPUT OUTPUT-FILE "_"PUT OUTPUT-FILE FIRSTYEAR.

Example:If the input is 1 2000, the output will be:GET INPUT-FILE1 FIRSTMONTH.GET INPUT-FILE1 FIRSTYEAR.PUT OUTPUT-FILE FIRSTMONTH.PUT OUTPUT-FILE "_".PUT OUTPUT-FILE FIRSTYEAR. The output will be 1_2000.

To know more about COBOL click on below link:

https://brainly.com/question/12978380#

#SPJ11


Related Questions

____________________ is the measure of how quickly a font can be read

Answers

Readability is the measure of how quickly a font can be read. Readability is an important consideration when selecting a font for use in printed materials, such as books, magazines, and newspapers, as well as digital media, such as websites and mobile apps.

Several factors can impact readability, including font size, line spacing, and character spacing. Fonts that are too small or too tightly spaced can be difficult to read, while fonts that are too large or too widely spaced can be distracting. Additionally, fonts that use unusual or complex letter shapes can be more difficult to read than more traditional fonts.

Another important consideration for readability is the contrast between the font and the background. A font that is too light or too similar in color to the background can be difficult to read, while a font that is too dark or too contrasting can be harsh on the eyes.

Overall, readability is an important consideration for designers and publishers who want to ensure that their content is accessible and easy to read. By selecting fonts that are clear, legible, and appropriately sized and spaced, designers can help to improve the readability of their materials and make them more engaging and accessible to a wider audience.

To learn more about Readability formulas, visit:

https://brainly.com/question/28199721

#SPJ11

Kyle returns to work the next day and he would like to continue working on the document from yesterday. What should Kyle do?


Double-click on the Start menu.

Look for his open document in the system tray.

Locate his file and click twice on it.

Locate his file, right click, and select Print.

Answers

Answer:

Locate his file and click twice on it.

You have recently joined in an academic programme to learn more about

programming. You have learnt a few programmes. Your teacher has now given you a

number of tasks to complete.


a) Explain the concept of an algorithm and describe common algorithmic

techniques and solutions.

b)Create a flowchart from the following algorithm.

Step 1: Input VALUE1, VALUE2

Step 2: if (VALUE1 > VALUE2) then

MAX VALUE1

else

MAX VALUE2

endif

Step 3: Print “The largest value is”, MAX

Answers

The concept of an algorithm simply refers to the procedure that is used in problem-solving.

The description of the common algorithmic techniques and solutions are:

Brute-force or exhaustive search.Divide and Conquer.Greedy Algorithms.Dynamic Programming.Branch and Bound Algorithm.Randomized Algorithm.Backtracking.

The sample flowchart:

START

Input

VALUE1,VALUE2

is

VALUE1>VALUE2

If yes

MAX  VALUE1

If no

MAX  VALUE2

Print

“The largest value is”, MAX

STOP

Read more about flowcharts here:

https://brainly.com/question/6532130

#SPJ1

which one of the following should you not do when you run out of ip addresses on a subnet? group of answer choices make the existing subnet larger add a second subnet in the same location, using secondary addressing migrate to a new and larger subnet create a new subnet on a different ip range

Answers

Answer:

You should not "add a second subnet in the same location, using secondary addressing" when you run out of IP addresses on a subnet. Secondary addressing is typically not recommended as it can lead to complex configurations and may cause routing issues.

Explanation:

What is a problem that social media was used to solve?

Answers

One problem that social media has been used to solve is the dissemination of information and promoting awareness on various social and humanitarian issues.

Social media platforms have provided a powerful tool for individuals and organizations to raise awareness about important causes, share news, and mobilize support.

For example, social media campaigns have played a crucial role in raising awareness about important issues such as climate change, gender equality, mental health, and human rights violations.

Hashtags and viral challenges have spread across platforms, engaging millions of users and bringing attention to these causes. The widespread use of social media has enabled individuals from diverse backgrounds to unite and amplify their voices, leading to increased awareness, public discourse, and even policy changes.

Moreover, social media has also facilitated the sharing of critical information during times of crisis or emergencies. During natural disasters, social media platforms have been used to coordinate relief efforts, locate missing persons, and provide real-time updates on the situation.

Overall, social media has served as a catalyst for positive change by providing a platform for information dissemination, raising awareness, and mobilizing support for important social and humanitarian issues.

For more such questions on Social media,click on

https://brainly.com/question/32333874

#SPJ8

What feature is essential for managing code iterations within the provisioning and deprovisioning processes

Answers

Answer:

Version control is an ID system for each iteration of a software product

The feature that is essential for managing code iterations within the provisioning and de-provisioning processes is known as version control.

What is Code iteration?

Code iteration may be defined as a set of instructions or codes that are significantly repeated until a specific end outcome is achieved. Iterative development is sometimes called circular or evolutionary development.

According to the context of this question, version control represents an ID system for each code iteration with respect to its software products. This governs all the processes of code iteration as per the user's instruction and executes the entire process before revealing the outcome or output of that code.

Therefore, the feature that is essential for managing code iterations within the provisioning and de-provisioning processes is known as version control.

To learn more about Code iteration, refer to the link:

https://brainly.com/question/26995556

#SPJ6

Your question seems incomplete. The most probable complete questin is as follows:

What feature is essential for managing code iterations within the provisioning and de-provisioning processes?

Version control.Secure tagging.Software diversity.Continuous monitoring.

which of the following would be considered a career in communication? Select all that apply. A actor B author C editor D journalist​

Answers

Answer:

1. The answers are B and D

2. The answer is A

3. The answer is A

4. The answers are C and D

authoreditor journalist

Are the answers to this question.

A career in communication involves the use of professionals in mass media to to pass messages across to an audience.

Professionals in media work with different companies, organizations and businesses to do the jobs of  influencing and educating people or the intended audience about happenings, products and services and practices.

read more at https://brainly.com/question/13391998?referrer=searchResults

Write down the difference between Sub... end sub and function... end function statement.
any 3 points, please ​

Answers

A sub does something but doesn't give something back. A function provides a value representing the tasks completed. Subs come in many different types and can be recalled from anywhere in the program.

What is sub and end sub in VBA?

A Sub procedure is a collection of Visual Basic statements that are delimited by the Sub and End Sub statements and that carry out tasks without producing a result. A calling procedure may give constants, variables, or expressions as inputs to a sub process.

Various processes are used in Visual Basic, including: Sub Procedures carry out tasks but do not provide the calling code with a value in return. Sub procedures known as "event-handling procedures" run in response to an event triggered by a user action or by a program occurrence.

Thus, A sub does something but doesn't give something back.

For more information about sub and end sub in VBA, click here:

https://brainly.com/question/26960891

#SPJ1

1)Which tool can you use to find duplicates in Excel?
Select an answer:
a. Flash Fill
b. VLOOKUP
c. Conditional Formatting
d. Concatenation
2)What does Power Query use to change to what it determines is the appropriate data type?
Select an answer:
a.the headers
b. the first real row of data
c. data in the formula bar
3)Combining the definitions of three words describes a data analyst. What are the three words?
Select an answer:
a. analysis, analyze, and technology
b. data, programs, and analysis
c. analyze, data, and programs
d. data, analysis, and analyze

Answers

The tool that you can use to find duplicates in Excel is c. Conditional Formatting

b. the first real row of datac. analyze, data, and programs

What is Conditional Formatting?

Excel makes use of Conditional Formatting as a means to identify duplicate records. Users can utilize this feature to identify cells or ranges that satisfy specific criteria, like possessing repetitive values, by highlighting them.

Using conditional formatting rules makes it effortless to spot repeated values and set them apart visually from the other information. This function enables users to swiftly identify and handle identical records within their Excel worksheets, useful for activities like data examination and sanitation.

Read more about Conditional Formatting here:

https://brainly.com/question/30652094

#SPJ4

If a computer with a 2.2GHz processor is rendering a 15GB video file , how long would it take to process that file?

Unit Equal to:
Kilohertz (KHz) 1000 Hz
Megahertz (MHz) 1000 kHz
Gigahertz (GHz) 1000 MHz
Terahertz (THz) 1000 GHz
Petahertz (PHz) 1000 THz
Exahertz (EHz) 1000 PHz
Zettahertz (ZHz) 1000 EHz
Yottahertz (YHz) 1000 ZHz




If a computer with a 2.2GHz processor is rendering a 15GB video file, how long would it take to process that file?

Answers

Answer:

um 3 minutes im in 6th grade so dont listen to me plz

Explanation:

Answer:

maybe 3-10 mins

Explanation:

When searching for your word processing file to finish writing your report, you should look for a file with which extension? (6 points)

Answers

Answer:

doc

Explanation:

What is the easiest computer programming language​

Answers

Answer:

Ther are 8 easiest computer programming language :

• HTML

• CSS

• Javascript

• Python

• Ruby

• Java

• PHP

• C/C++

When a single network server can't handle all the data processing requests, more servers can be added and joined together to create a ______.

Answers

When a single network server can't handle all the data processing requests, more servers can be joined together and create a: Cluster and Server farm.

What is a server?

A server can be defined as a dedicated computer system that is designed and developed to provide specific services to other computer devices or programs, which are commonly referred to as the clients.

Types of server.

Generally, there are different types of server and these include the following:

Centralized ServerDistributed application serverProxy serverDistributed communication serverWeb serverBlockchain serverEmail serverFile serverDatabase server

In Computer technology, a Cluster and Server farm is usually created by combining two or more servers together when a single network server cannot handle all the data processing requests.

Read more on Servers here: https://brainly.com/question/17054032

#SPJ1

Which of the following is NOT a responsibility of an IT project manager?

A.
writing code

B.
managing the budget

C.
managing the schedule of the project

D.
assigning work to team members

Answers

Answer:

I think that The answer is A.

Explanation:

A project manager needs to be a leader which is assigning work, managing the schedule, and manage the budget.

In the name, it says Manager.
This is how I know that.

The one that is not a responsibility of an IT project manager is writing code. The correct option is A.

What is IT project manager?

The unique IT objectives of enterprises must be planned, organized, resourced, budgeted, and successfully carried out by IT project managers. Examples of such initiatives include the creation of apps and software.

One of the most difficult occupations is project management since no day is ever the same and you must use all of your project management abilities to address every issue.

Additionally, when an issue arises, your team will turn to you first. They might assume you have all the solutions to their questions. A project manager must be a leader who manages the budget, schedule, and job assignments.

Therefore, the correct option is A. writing code.

To learn more about IT project managers, refer to the link:

https://brainly.com/question/15404120

#SPJ2

if a friend asked you to help her decide what internal sabling system to install in her new house, what kinds of questions wouls you ask her to do? why would you ask those questions?​

Answers

Answer:

Assuming you mean *cabling system*

you could ask:

- The architectural structure of the building, which houses for the cabling installation.

- The function of the cabling installation.

- The configuration of an already installed system (upgrades and retrofits).

others

- The cable and connection products.

- The types of equipment the cabling installation will support -- present and future.

- Customer requirement.

PLEASE HELP!!!
I was trying to create a superhero class code, but i ran into this error

File "main.py", line 3
def_init(self, name = "", strengthpts = 0, alterego = "", villain "", powers = "", motto = ""):
IndentationError: expected an indented block

Here is my actual code:
class superhero:

def_init(self, name = "", strengthpts = 0, alterego = "", villain "", powers = "", motto = ""):

# Create a new Superhero with a name and other attributes

self.name = name

self.strengthPts = strengthPts
self.alterego = alterego
self.powers = powers
self.motto = motto
self.villain = villain

def addStrengthPts(self, points):

# Adds points to the superhero's strength.

self.strengthPts = self.strengthPts + points



def addname(self):

if(self.name == "Dr.Cyber"):
print("My hero's name is Dr.cyber!")
elif(self.name == "Mr.cyber"):
print("My hero's name is Mr.cyber!")
elif(self.name == "Cyber Guy"):
print("My hero's name is Cyber Guy!")
else:
print("My hero doesn't have a name")



def addalterego(self):

if(self.alterego == "John Evergreen"):
print("Dr.Cyber's alter ego is John Evergreen")
elif(self.alterego == "John Silversmith"):
print("Dr.Cyber's alter ego is John Silversmith.")
elif(self.alterego == "Johnathen Grey"):
print("Dr.Cyber's alter ego is Johnathen Grey.")
else:
print("Dr.Cyber Does not have an alter ego")



def addpowers(self):

if(self.powers == "flight, super strength, code rewrighting, electronics control, psychic powers"):
print(fly. He is super strong. He can rewrite the genetic code of any object around him to whatever he wants.He can control surrounding electronics to do what he wants. He can move objects with his mind.")
else:
print(Fly. He can rewrite the genetic code of any object around him. he can move objects with his mind.")



def addmotto(self):

if(self.motto == "error terminated!"):
print("rewritting the code!")
else:
print("error eliminated!")



def addvillain(self):

if(self.villain == "The Glitch"):
print("Dr.Cyber's Arch nemisis is The Glitch.")
elif(self.villain == "The Bug"):
print("Dr.Cyber's Arch nemisis is The Bug.")
else:
print("Dr.Cyber has no enemies!")

def main():

newhero = superhero("Dr.Cyber", "John Evergreen", "fly. He is super strong. He can rewrite the genetic code of any object around him to whatever he wants.He can control surrounding electronics to do what he wants. He can move objects with his mind.", "The Glitch", "error terminated!", "0")

print("My Superhero's name is " + newhero.name + ".")

print(newhero.name + "'s alter ego is " + newhero.alterego + ".")

print(newhero.name + " can " + newhero.powers + ".")

print(newhero.name + "'s arch nemisis is " + newhero.villain + ".")

print("when " + newhero.name + " fights " + newhero.villain + ", he lets out his famous motto " + newhero.motto + ".")

print(newhero.name + " defeated " + newhero.villain + ". Hooray!!!")

print(newhero.name + " gains 100 strengthpts.")

main()

PLEASE ONLY SUBMIT THE CORRECT VERSION OF THIS CODE!!! NOTHING ELSE!!!

Answers

Answer:

you need to properly indent it

Explanation:

align your codes

Mark the other guy as brainliest, I'm just showing you what he meant.

I'm not sure if that's all that's wrong with your code, I'm just explaining what he meant.

Answer:

def_init(self, name = "", strengthpts = 0, alterego = "", villain "", powers = "", motto = ""):

# Create a new Superhero with a name and other attributes

self.name = name

self.strengthPts = strengthPts

self.alterego = alterego

self.powers = powers

self.motto = motto

self.villain = villain

def addStrengthPts(self, points):

 

   # Adds points to the superhero's strength.

   self.strengthPts = self.strengthPts + points

def addname(self):

   if(self.name == "Dr.Cyber"):

       print("My hero's name is Dr.cyber!")

   elif(self.name == "Mr.cyber"):

       print("My hero's name is Mr.cyber!")

   elif(self.name == "Cyber Guy"):

       print("My hero's name is Cyber Guy!")

   else:

       print("My hero doesn't have a name")

def addalterego(self):

   if(self.alterego == "John Evergreen"):

       print("Dr.Cyber's alter ego is John Evergreen")

   elif(self.alterego == "John Silversmith"):

       print("Dr.Cyber's alter ego is John Silversmith.")

   elif(self.alterego == "Johnathen Grey"):

       print("Dr.Cyber's alter ego is Johnathen Grey.")

   else:

       print("Dr.Cyber Does not have an alter ego")

def addpowers(self):

   if(self.powers == "flight, super strength, code rewrighting, electronics control, psychic powers"):

       print(fly. He is super strong. He can rewrite the genetic code of any object around him to whatever he wants.He can control surrounding electronics to do what he wants. He can move objects with his mind.")

   else:

       print(Fly. He can rewrite the genetic code of any object around him. he can move objects with his mind.")

def addmotto(self):

   if(self.motto == "error terminated!"):

       print("rewritting the code!")

   else:

       print("error eliminated!")

def addvillain(self):

   if(self.villain == "The Glitch"):

       print("Dr.Cyber's Arch nemisis is The Glitch.")

   elif(self.villain == "The Bug"):

       print("Dr.Cyber's Arch nemisis is The Bug.")

   else:

       print("Dr.Cyber has no enemies!")

def main():

   newhero = superhero("Dr.Cyber", "John Evergreen", "fly. He is super strong. He can rewrite the genetic code of any object around him to whatever he wants. He can control surrounding electronics to do what he wants. He can move objects with his mind.", "The Glitch", "error terminated!", "0")

   

   print("My Superhero's name is " + newhero.name + ".")

   print(newhero.name + "'s alter ego is " + newhero.alterego + ".")

   print(newhero.name + " can " + newhero.powers + ".")

   print(newhero.name + "'s arch nemisis is " + newhero.villain + ".")

   print("when " + newhero.name + " fights " + newhero.villain + ", he lets out his famous motto " + newhero.motto + ".")

   print(newhero.name + " defeated " + newhero.villain + ". Hooray!!!")

   print(newhero.name + " gains 100 strengthpts.")

main()

Using the flowchart below, what value when entered for Y will generate a mathematical error and prevent our flowchart from being completely executed? 3 0 1 None of these values will produce a mathematical error

Using the flowchart below, what value when entered for Y will generate a mathematical error and prevent

Answers

Answer:

The answer is the last choice that is "None of these values will produce a mathematical error".

Explanation:

In this question, the above given choice correct because neither of the flowchart procedures could trigger a mathematical error. This error could not be induced by multiplication, addition and subtraction, and the only division by 15. It is the only divide by 0, that's why the above flowchart will produce a mathematical error.

you are having a hard day at work, but you have to make several phone calls. what can you do to make sure your voice projects a friendly tone? leave a short, curt voice mail message.

Answers

Since you are having a hard day at work, but you have to make several phone calls. The thing that you could do to make sure your voice projects a friendly tone is option C: Avoid talking on the phone.

What can you do to ensure that your voice carries a welcoming tone?

The listener's ability to comprehend your message is the most crucial component of a voicemail. Don't mumble, and make sure to talk properly and aloud. Speaking softly will make it difficult for the listener to comprehend you and may prevent them from calling you back. Hence, this is not advisable in the above situation.

Note that End statements with a lower tone and queries with a higher pitch. It will appear like you don't believe what you just stated if you end sentences with a high pitch. Changing your voice pitch while you speak is the greatest approach to maintain a welcoming tone and since you are tired, you better wait and not make calls because it may tell in your voice.

Learn more about friendly tone from

https://brainly.com/question/25627023
#SPJ1

See full question below

What can you do to make sure your voice projects a friendly tone?

Leave a short, curt voice mail message.

Smile when speaking on the phone.

Avoid talking on the phone.

describe a tsunami when it is far from the coast

Answers

I hope it is helpful for you ......

Mark me as Brainliest ......
describe a tsunami when it is far from the coast

Tsunamis are marine phenomena, created by the abrupt displacement of large amounts of water into an aquatic formation. Tsunamis manifest as waves, which travel in the deep waters of the oceans at an average speed of 756 kilometers per hour.

While in deep water the tsunami, due to its characteristics there, is not considered a serious danger to the floating structures, reaching the shores has particularly devastating consequences.

Learn more in https://brainly.com/question/15964056

describe a tsunami when it is far from the coast

Harry is the cloud administrator for a company that stores object-based data in a public cloud. Because of regulatory restrictions on user access to sensitive security data, what type of access control would you suggest he implement to meet his company's security policies?

Answers

Answer:

The correct answer will be "Mandatory access control".

Explanation:

MAC seems to be a security standard protocols limited by the designation, initialization including verification of the systems. These policies and configurations are implemented through one centralized controller and therefore are accessible to the system admin.MAC establishes and maintains a centralized implementation of sensitive requirements in information security.

after declaring a streamreader variable, you can use the to open a sequential access file for input; doing this automatically creates a streamreader object.

Answers

File.OpenText. After declaring a streamreader variable, you can use the File.OpenText to open a sequential access file for input.

By doing this, it automatically creates a streamreader object.File.OpenText Method: This method is used to create a new StreamReader object and returns it after opening a file. It accepts a single string argument, which is the file name (including the path). This method automatically assigns the UTF8 encoding to the file.The following is the syntax for the File.OpenText method:StreamReader reader = File.OpenText(filename);Where:reader is the stream reader object to read text from the specified file.filename is a string that contains the file name or a path to the file to open.

Learn more about streamreader variable here:

https://brainly.com/question/29562492

#SPJ11

Assignment 4: Evens and Odds
Need help on this

Assignment 4: Evens and OddsNeed help on this

Answers

Answer:

any even number plus 1 is odd

________ is malware that hijacks a user's computer and demands payment in return for giving back access.

Answers

Ransom  malware that hijacks a user's computer and demands payment in return for giving back access.

What is Ransom malware?

This is known to be a kind of  malware that hinders users from gaining in or access to their system or personal files and it is one that often demands ransom payment so as to get access.

Therefore, Ransom  malware that hijacks a user's computer and demands payment in return for giving back access.

Learn more about Ransom  malware from

https://brainly.com/question/27312662

#SPJ12

Salim wants to add a device to a network that will send data from a computer to a printer. Which hardware component should he use?

A.
repeater
B.
modem
C.
switch
D.
bridge

Answers

It’s letter B good luck
I think person above is correct (sorry if I'm wrong I just need points)

If data takes up more than one line in a cell, ____.
a. you must manually reconfigure the cell height
b. some text will not appear
c. Word automatically wraps the text to the next line and increases the height of the row
d. Word moves the text into a new cell

Answers

c. Word automatically moves the text to the following line and makes the row taller.

Can you type while dragging the entry point to the a cell in a table to enter data?

Moving the entry point to a column and typing allow you to input data into a table.The easiest way to pick a specific area of a table is to drag the mouse pointer over the columns and rows.The insertion point changes to a new spot on the horizontal ruler when users press the Tab key, which is known as a tab stop.

How can I ignore several mistakes in Excel?

Launch your Excel workbook.Pick out the cell (and cells) that the error messages are displayed in.When the cells are chosen, click the caution icon which appears next to them.Choose Ignore Error from the drop-down menu.

To know more about Word visit:

https://brainly.com/question/28611

#SPJ4

Which of the following statements is true of sans serif fonts?
A. Sans serif fonts provide a more creative look.
O B. Sans serif fonts are more decorative with additional curls and
loops.
C. Sans serif fonts set a more inviting and comforting tone.
D. Sans serif fonts are easier to read on a computer screen.

Answers

Answer:

The answer is D

Explanation:

I got it right

The statement that is true of sans serif fonts is that Sans serif fonts are easier to read on a computer screen.

What is font?

The word font is known to be a kind of different  printable text characters. e.g. f sans serif fonts

Based on the above, The statement that is true of sans serif fonts is that Sans serif fonts are easier to read on a computer screen.

Learn more about fonts from

https://brainly.com/question/1991747

#SPJ 2

which type of file is commonly used by trusted websites to create installation software for mobile devices?

Answers

.apk -Application installer for Android is type of file is commonly used by trusted websites to create installation software for mobile devices.

What is installation?

Making a computer programme (including plugins and device drivers) ready for use involves installing (or setting up) the programme. Installation is the process of configuring software or hardware so that it can be used with a computer. Installing a piece of software (programme) requires a soft or digital copy of the software.

A software installation can be done in a variety of ways (program). Programs (including operating systems) frequently come with an installer, a specialised programme responsible for carrying out whatever is necessary (see below) for the installation, because the process differs for each programme and each computer. Installation might be a step in a larger software deployment process.

Learn more about software installation

https://brainly.com/question/28388040

#SPJ4

Explain the history of computing device of mechanical era

Answers

The history of computing devices in the mechanical era began with the invention of the abacus in ancient times, which was used for simple calculations. It was later followed by devices like the slide rule and mechanical calculators in the 17th and 18th centuries, which could perform more complex calculations using gears, levers, and other mechanical components. These early computing devices paved the way for the development of modern computers in the electronic era.

Explanation:

The mechanical era of computing devices refers to the time period between the mid-19th century and early 20th century when mechanical calculators and adding machines were developed.

During the mechanical era, computing devices were based on mechanical principles and were designed to perform specific tasks such as addition, subtraction, multiplication, and division. The first mechanical calculator was developed by French mathematician Blaise Pascal in 1642, but it was not until the mid-19th century that mechanical calculators and adding machines became more widespread and sophisticated.

One of the most significant developments during this era was the invention of the Analytical Engine by Charles Babbage in the mid-1800s. The Analytical Engine was an early form of computer that used punched cards to store information and was capable of performing complex mathematical calculations.

Other notable devices developed during this time included the Comptometer, invented by Dorr E. Felt in 1887, and the Millionaire calculator, developed by Otto Steiger in 1893. These machines were widely used in businesses and government offices, and helped to automate many repetitive tasks.

Overall, the mechanical era of computing devices laid the foundation for the development of more advanced and sophisticated computing technology in the 20th century.

To know more about the Analytical Engine click here:

https://brainly.com/question/31746586

#SPJ11

Consider the following statement which refers to the block

When you execute this block in Scratch, your computer is actually doing several things: retrieving values from memory representing the direction and position of the sprite, performing an algorithm to update these values, and changing the display in the window to match the updated state of the program. All of these actions are represented by just one single block.

Which of the following terms names the phenomenon which is best described by this statement?

Answers

Answer:

Abstraction

Explanation:

the quality of dealing with ideas rather than events

9.2.6 View Open Ports with netstat

Steps:

1. Open Zenmap

2. Type nmap -p 5900 192.168.0.0/24 and Scan

3. Find computer with port 5900 open

4. Select Support and open Terminal

5. Type netstat and press Enter to confirm port is open

6. Type dnf list vnc and press Enter to find package name

7. Type dnf erase libvncserver and press Enter

8. Press Y and press Enter

9. Type netstat and press Enter to confirm port is closed

Answers

Netstat provides statistics about all active connections so you can find out which computers or networks a PC is connected to. You can use the network tool for Windows, Linux, and macOS conveniently via the command line.

In 1983, netstat was first implemented into the Unix derivative BSD (Berkley Software Distribution), whose version 4.2 supported the first Internet protocol family TCP/IP. netstat has been integrated into Linux since its debut in 1991 and has been present in Windows since the release of version 3.11 (1993), which could also communicate via TCP/IP with the help of extensions.To view open ports with netstat, follow these steps: Open Zenmap, Type "nmap -p 5900 192.168.0.0/24" and click on Scan, Find a computer with port 5900 open, Select Support and open Terminal, Type "netstat" and press Enter to confirm the port is open, Type "dnf list vnc" and press Enter to find the package name, Type "dnf erase libvncserver" and press Enter, Press Y and press Enter, Type "netstat" and press Enter to confirm the port is closed.

More On Port: https://brainly.com/question/30503397

#SPJ11

Other Questions
A tourniquet is a band that is placed over a major artery to constrict the flow of blood. Would you expect a tourniquet over the radial artery (near the elbow) to increase the blood pressure on the proximal side of the band (closer to the center of the body) or the distal side of the band (closer to the fingers)? Why? . Consider the two properties that you would use to solve an equation like 3x + 5 = 26. Which of the following is true? The standard method for solving an equation like 3x + 5 = 26 is to use the Subtraction Property of Equality and then the Division Property of Equality. The standard method for solving an equation like 3x + 5 = 26 is to use the Subtraction Property of Equality and then the Addition Property of Equality. The standard method for solving an equation like 3x + 5 = 26 is to use the Multiplication Property of Equality and then the Division Property of Equality. The standard method for solving an equation like 3x + 5 = 26 is to use the Division Property of Equality and then the Subtraction Property of Equality. If siny=xsin(a+y), prove that dxdy=sinasin2(a+y) which method of conflict redolution involved both parties pretending the problem does not exist in the hopes that it will "fix itself" atherosclerosis causes elastic arteries to become less stretchy. how does this affect pulse pressure? group of answer choices pulse pressure is unaffected by atherosclerosis. pulse pressure is temporarily decreased. pulse pressure is temporarily increased. pulse pressure is chronically increased. pulse pressure is chronically decreased. Following emoluments are received by Ms Sangeeta during the previous year ended on 31.3.2021Basic salary 250000Dearness Allowance 10000Commission 2500Entertainment allowance 2000Medical expenses reimbursed 25000Professional taxes paid 2000(Rs1000 paid by employer)Ms. Sangeeta contributes Rs 2000 towards the Recognized Provident FundShe has no other income.Compute the income from salary for A.Y 2022-23, and give reasons and explanationswherever required, If Ms. Sangeeta is a Government employee.A) please first tell the formula and understanding of the questionB) second what are the steps to be followed to get the answerC) please write the answer in c option and what can we clarify from this Ellen has two pizzas left after a party. One is whole and one has been half-eaten. The whole pizza has a radius of 7 inches. The half eaten pizza has a diameter of 20 inches.Which pizza has a greater circumference? Find the total amount and total interest after six months if the interest is compounded every quarter. Principal =10 000 Rate of interest =20% per annum. Although consumers often avoid commercials and other marketing stimuli, sometimes they actively seek them out for various reasons including purchase goals, entertainment, and information is called ___ suppose you deposit $400 each month for the next 8 years into an account earning 2.1% interest. how much will you have at the end? round to the nearest dollar. CO (g) + H2(g) C(s) + H2O (g) H = -131 kJA rigid container holds a mixture of graphite pellets (C(s)), H2O(g), CO(g), and H2(g) at equilibrium. State whether the number of moles of CO (g) in the container will increase, decrease, or stay the same after each of the following disturbances is applied to the original mixture. For each case, assume that all other variables remain constant except for the given disturbance. Select the response which includes the best explanation.b. The temperature of the equilibrium mixture is increased at constant volume.c. The volume of the container is decreased at constant temperature.d. The graphite pellets are pulverized. Simplify 4 121+6. Explain how you got the answer. I will mark you brainliest! What are the responsibilities of a data architect? How might pausing be detected? Match the words in the left column to the appropriate blanks in the sentences on the right. Reset Help in vitro Pausing can be detected by hybridization in experiments involving transcription in vivo with radiolabeled nucleotides .After incubation, isolate labeled RNA products and subject to gel electrophoresis and autoradiography. Any paused species will accumulate and can be detected. the cell DNA t in situ separation in vivo hybridization gel electrophoresis and autoradiography radiolabeled nucleotides microscopy analysis fluorophore removedadd5e78cf1eb708cfb860586f731483c446fe1428903661f39d48d01afaa8a21removed if malthus were correct, the collapse of the apprenticeship system resulting from the the industrial revolution would cause people to have children at earlier age and workers to become less skillers. how would i demonstrate these effects on a graph of total product curves ? An insurance company surveys its customers to determine the number of children under age 22 living in each household. Complete parts a and b below. What is the random variable for this survey? a.The number of children under age 22 living in each household b.Whether or not a child is a customer c.The number of children under age 22 who are customers d.The age of the children living in each household how many moles of so2 contain 8.02 10^21 atoms of oxygen? yoda is 500km above the surface of the earth. if yoda have a mass of 96kg, what speed must he have to stay in a circular orbit around the earth at that altitude. if the payments were made at the beginning of each year, you would change the value of type in cell B6 to ____ which would result in the future of value of ___Your parents also tell you that they had considered investing a lumpsum amount of $22,000 for five years. Their financial advisors had given some predictive interest rates that might have likely applied to the investment during the investment period. The interest rate data is given below. What would have been the future value of the investment amount based on the data your parents had at that point? In this case you would use the ____ function in Excel to derive the future value. What is the due date of a 220-day loan made on Feb. 12?