explain at least three important events during the first generation of programming language?

Answers

Answer 1

Answer:

Python, Ruby, Java, JavaScript, C, C++, and C#.

Explanation:

A programming language is a type of written language that tells computers what to do. Examples are: Python, Ruby, Java, JavaScript, C, C++, and C#. Programming languages are used to write all computer programs and computer software.


Related Questions

PLS HELP ASAP ILL GIVE THANKS AND BRAINLIEST IF YOU GET THEM ALL RIGHT:

1. Software used to search a database using keywords or phrases entered by the user.
A) Navigation Tracking
B) Network
C) Search Engine
D) Ethernet Cable

2. This is used to mark a web pages structure using tags so that the web browser displays the content correctly.

A) Antivirus application
B) Ethernet cable
C) Computer virus
D) HTML

3. this is used to connect devices like printers, keyboards, external storage, and digital cameras to computers.

A) Modem
B) USB
C) Intranet
D) Desktop Interface

4. software that the owner maintains exclusive control over how it is modified and distributed

A) proprietary
B) navigation tracking
C) Spyware
D) operating system

5. set of principles that help users determine what is right or wrong in regards to computers.

A) modem
B) HTML
C) navigation tracking
D) Computer ethics

6. spyware that manages all of the installed applications and hardware on a computer or device.

A) Computer virus
B) operating system
C) citation
D) HTML

7. physical components of a computer system such as computer, mouse, or modem.

A) software
B) Network
C) browser
D) hardware

8. A malicious software program that spies on the user and share the information with a third-party.

A) antivirus application
B) malware
C) spyware
D) Desktop interface

9. icons and menus on the computer that allow the user to interact with the operating system.

A) Desktop interface
B) intranet
C) navigation tracking
D) Computer ethics

10. A tool that provides directions using satellites

A) asynchronous communication
B) navigation tracking
C) Ethernet cable
D) HTML

11. A restricted private network used by organizations to communicate.

A) asynchronous communication
B) navigation tracking
C) intranet
D) browser

12. content that is not owned by any individual or company that is free to use.

A) network
B) proprietary
C) Desktop interface
D) public domain

13. A software program that is loaded onto a computer and then duplicates itself spreading and impacting programs and files on the computer

A) Cable Internet
B) Computer virus
C) public domain
D) operating system

12. content that is not owned by any individual or company that is free to use.

A) network
B) proprietary
C) Desktop interface
D) public domain

13. A software program that is loaded onto a computer and then duplicates itself spreading and impacting programs and files on the computer

A) Cable Internet
B) Computer virus
C) public domain
D) operating system

Answers

This is a lot, but here goes!

1. C

2. D

3. B

4. A

5. D

6. B

7. D (these are technically peripherals or input devices.)

8. C

9. A

10. B

11. A

12. D

13. B

Just as a note, spyware is malware.

a falsh movies consist of how many frame? ​

Answers

TV displays at almost 30 frames per second (fps), while motion pictures display at 24fps (the default frame rate in Flash is 24fps). Animation is controlled with the Timeline, which appears above the stage (WINDOW > Timeline): Flash movies begin as a single frame. To add movement, you must create additional frames.
TV displays at almost 30 frames per second (fps), while motion pictures display at 24fps (the default frame rate in Flash is 24fps). Animation is controlled with the Timeline, which appears above the stage (WINDOW > Timeline): Flash movies begin as a single frame. To add movement, you must create additional frames.

PLEASE HELP PLEAAASSSSSEEEE!


When search engines republish content, it refers to _____.


a leaking data exhaust

an active data exhaust


an active digital footprint


a passive digital footprint

Answers

Answer:

a passive digital footprint

Explanation:

When search engines republish content, it was not information that was intentionally re-released by the owner. This makes it a passive digital footprint.

Answer:

D. a passive digital footprint.

Explanation: got it right

what is the term for software that is exclusively controlled by a company, and cannot be used or modified without permission?

Answers

Answer:

Proprietary Software

Explanation:

Individuals may restructure their investment portfolios because

Answers

Answer:

the results are below expectations

2
2. When designing a kitchen to be handicapped acces-
sible, toe space of deep and 8" to 11" high is
needed under the cabinets for wheelchair footrests.

Answers

Answer:

ok.... ..............

Dữ liệu trong 1CSDL được lưu trong

Answers

Answer:

ha ano daww??

Explanation:

??? btw thanks for the points

Deleting messages keeps them in the mailbox and on the server. How can they be removed from the server to reduce the quota?

Answers

Answer:

Left-click each message, and move it to the Trash folder.

Right-click the Deleted Items folder, and click Empty Folder.

Click the Folder tab, and click the Empty Folder in Clean Up group.

Right-click the Deleted Items folder, and click Mark All as Read.

import pickle
def enter():
f1=open("c:\\xics\\data.dat","wb")
n=int(input("Enter ni of students."))
for i in range(n):
rno=int(input("Enter roll no."))
name=input("Enter name")
marks=int(input("enter marks"))
d={"rno":rno,"name":name,"marks":marks}
pickle.dump(d,f1)
f1.close()

Answers

Answer:

Export ariana grande fort nite skin

Answer:

I M P O R T P I C K L E

Explanation:

what is the answer ?????​

Answers

Answer:

1) Driver or option D

2) Kindle or option C

What is the maximum number of guesses it will take to find a number between 1 and 1000? Explain your answer.

Answers

Answer:

The maximum number of guesses without binary search is 999 since we would be going sequentially and guessing the numbers. When we reach number 999 and find that is not the answer, we know it has to be 1000, and don't have to guess, so the number of max guesses is 999.

The maximum number of guesses to find a number between 1 and 1000 is 10, using a binary search algorithm. Each guess divides the search range in half until the number is found.

Given that,

The number we are trying to find is between 1 and 1000.

We are trying to determine the maximum number of guesses it would take to find this number.

To find the maximum number of guesses it would take to find a number between 1 and 1000, we can use a binary search algorithm.

In a binary search, we start by guessing the middle number, which in this case would be 500.

If the number we are looking for is higher than 500, we then guess the middle number between 501 and 1000, and so on.

If it's lower, we guess the middle number is between 1 and 499, and so on.

Using this approach,

As dividing the problem in half with each guess. Since we have 1000 possible numbers and we divide by 2 with each guess,

It would take a maximum of log base 2 of 1000 (or approximately 9.97) guesses to find the number.

Therefore, we can conclude that the maximum number of guesses it would take to find a number between 1 and 1000 using this binary search algorithm is 10.

To learn more about number system visit:

https://brainly.com/question/33311228

#SPJ3

Use the drop-down menus to complete statements about safe and blocked senders lists.
*Safe *Blocked *repeatedly

Answers

Answer:

it already has an answer and it's right so i don't see the point to needing to answer this

explain on what you did and give on how problems as such can be avoid inthe future

Answers

More info please, it is very invalid

3.5.7: Rectangle, Part 2 its python coding

Answers

The program which calculates the area of a rectangle written in python 3 is given thus :

def calc_area_rectangle(length, width):

#initialize a function named calc_area_rectangle which takes in two arguments

area= length * width

#the products of the arguments which are the length and width of value of the rectangle is assigned to the variable named area

return round(area, 2)

#the function returns the value of area rounded to 2 decimal places.

print(calc_area_rectangle(10, 20))

#sample run of the program

Learn more :https://brainly.com/question/25162828

qbasic program to check whether the given number is odd or even​

Answers

Answer:

CLS

INPUT "Enter a Number: ", n

IF n MOD 2 = 0 THEN

PRINT "Input Number is Even"

END IF

IF n MOD 2 = 1 THEN

PRINT "Input Number is Odd"

END IF

END

Explanation:

CLS

INPUT "Enter a number:",N

IF N MOD 2=0 THEN

PRINT "given number is even"

ELSE

PRINT"given number is odd"

END IF

END

what are the unique ICT needs for casinos?

Answers

Answer:

This is one of those slot game developers that not only create games, but it also creates entire platforms for online casinos and they have to pay for the games.

Explanation:

what is the name of the fields in an x.509 digital certificate that are used when the parties negotiate a secure connection?

Answers

Certificate attributes are simply known as the name of the Fields in an x.509 digital certificate that are used when parties negotiate a secure connection.

Certificate authority (CA) is simply known as a firm (entity) that has the sole aim for digital certificates.

Certificates often uses centralized third parties called certificate authorities such as x.509 certificates. There are several fields in x.509 and these certificates consist of several characteristics that is perculiar to them.

From the above, we can say that Certificate attributes are simply known as the name of the Fields in an x.509 digital certificate that are used when parties negotiate a secure connection.

Learn more from

https://brainly.com/question/17956104

Questions: What memory modules are needed if the customer wants 3 GB of RAM? What capacities and how many modules of each capacity are required?​

Answers

Answer:

You could use three 1 GB modules.

Two structural members that cross each other when strengthening structures A. Triangulation B.cross bracing C.Lintel D.cantilever​

Answers

Cross bracing I think

what did the person using the windows command prompt do during round 1

Answers

The windows command prompt is a an interpreter found in Microsoft computers that executes lines of code or commands given by the user if they are valid.

As a result of this, there are different commands which can be given by the user administrator to the windows command prompt which enables them to:

List the hardware information in the computerShow/Check Networking informationScan for viruses or repair bad system files,  etc

Please note that your question is incomplete, so I gave a general overview which should help you get the right answer.

Read more here:

https://brainly.com/question/12787942

the fast speed of _______ available today enable computers to work very fast​

Answers

Answer:

main hardware components such as:

1. CPU

2. RAM

3. Motherboard (bus speed)

4. Hard drive

5. Video Card

6. Cache

7. Latest operating system (Windows XP, Windows 10, etc.)

which type of chart is preferable when you are dealing with a timeframe?

Answers

The type of chart that is preferable when you are dealing with a timeframe is a LINE CHART.

A line chart is a graphical representation that indicates how some variable changes over time.

A line chart can connect a data series of data with a continuous line of time.

This type of chart (line chart) can be very useful to visualize trends in data over intervals of time (i.e., time series).

In conclusion, the type of chart that is preferable when you are dealing with a timeframe is a LINE CHART.

Learn more in:

https://brainly.com/question/5866790

In conclusion, when dealing with a timeframe, a line chart is the most suitable chart type to use. It effectively displays trends and patterns in the data over time and can be used to compare the performance of multiple data sets over the same time period.

The preferable chart type when dealing with a timeframe would be a line chart. A line chart is a type of chart that displays data as a series of points connected by a line, which makes it an ideal chart type to display data over time.

Line charts are effective for showing trends and patterns in the data, as well as identifying outliers and anomalies. This is because the lines in a line chart are continuous, making it easy to see how the data is changing over time. Line charts are also useful for comparing the performance of multiple data sets over the same time period.

In summary, when dealing with a timeframe, a line chart is the most suitable chart type to use. This is because it can effectively display trends and patterns in the data over time. Clustered column charts or column charts are more suitable for comparing different categories of data, and pie charts are better suited for showing the proportion of data in different categories.

It's worth noting that there are different types of charts that can be used depending on the specific context and the type of data being displayed. It's important to consider the purpose of the chart and the message you want to convey when choosing the appropriate chart type. In addition, it's important to ensure that the chart is easy to read and understand by using appropriate labeling, colors, and scales.

When using a line chart to display data over time, there are several best practices that can help make the chart more effective:

Use a clear and concise title that accurately reflects the data being displayed.Label the x-axis (horizontal axis) with the time period being displayed (e.g., months, years, etc.) and the y-axis (vertical axis) with the units of measurement being used.Choose a scale that allows for easy comparison between data points. Avoid using a scale that compresses or distorts the data.Use different colors or styles to differentiate between multiple data sets on the same chart.Include a legend that clearly identifies each data set.Consider adding annotations or callouts to highlight significant events or changes in the data.

By following these best practices, you can create a line chart that effectively displays data over time and helps communicate your message to your audience.

Another important consideration when using a line chart is the frequency of the data points. Depending on the timeframe being displayed, the data may be aggregated into daily, weekly, monthly, or yearly intervals. It's important to choose the appropriate interval based on the context and the level of detail needed. For example, if you're displaying data over a year, daily intervals may be too detailed, and weekly or monthly intervals may be more appropriate.

In addition, it's important to ensure that the data is presented accurately and honestly. The y-axis should start at zero to avoid distorting the data and to provide an accurate representation of the scale of the data. The labels on the x-axis should be evenly spaced and labeled appropriately to provide a clear understanding of the time period being displayed.

In conclusion, when dealing with a timeframe, a line chart is the most suitable chart type to use. It effectively displays trends and patterns in the data over time and can be used to compare the performance of multiple data sets over the same time period.

Learn more about the line chart here:

https://brainly.com/question/29359235.

#SPJ3

Easy Question I will make you brainless Just answer this 10 question!!​

Answers

Answer:

B

Sc

B

Sc

B

B

Sc

B

Sc

Sc

Explanation:

Not positive sorry if its not 100% correct

what are the parts of a file?​

Answers

Answer:

A computer file is made up of three elements: characters, fields and records.

Explanation:

Hope this helps! :D

Cual es de las siguientes pertenece al software de una computadora
A bocina
B teclado
C messenger
D monitor

Answers

Explanation:

a sjsjsjsijdjdnjjjjururueu

how to generate random numbers in excel without duplicates

Answers

Answer:

Generate Random Number List With No Duplicates in Excel:

1. Select cell B3 and click on it.

2. Insert the formula: =RANDBETWEEN(10,30)

3. Press enter.

4. Drag the formula down to the other cells in the column by clicking and dragging the little “+” icon at the bottom-right of the cell.

Explanation:

Hope it helps you..

Your welcome in advance..

(ㆁωㆁ)

the date of creation can be added to a slide using the

Answers

Answer:

On the Insert tab, in the Text group, click Date & Time. In the Header and Footer box, do one of the following: If you want to add the date and time to your slides, click the Slide tab. If you want to add the date and time to your notes pages, click the Notes and Handouts tab.

Explanation:

The date of creation can be added to a slide by making use of the: "Insert" tab, "Text" group.

What is a slide?

A slide can be defined as a single page of a presentation that contains text-based information or images, which can be used by a presenter to teach, instruct and educate the audience on a topic.

In Microsoft Powerpoint, an end user can add the date of creation to a slide by making use of the "Insert" tab and "Text" group.

Read more on slides here: brainly.com/question/11741377

#SPJ9

Help Digital photo class

Answers

Answer: i think the answer is c

Explanation:

Answer:

Here’s your answer!

Explanation:

I believe the answer to be D however if the camera still doesn’t work visit a camera shop for help.

Hope this helped

Brainliest please?

Dont forget to smash that heart at the bottom <3

Have a great day,you’re amazing!

a file extension of .xlsx means that the file contains what?

Answers

A .xlsx file tells you that the file is an Excel workbook that utilizes XML files to create the various spreadsheets as well as macros and other hidden codes used to perform certain functions (which is why there's an X at the end; older .xls files had no indication of this external code being present, which is why they're almost never recommended for modern use).

Answer:

Explanation:

A .xlsx file tells you that the file is an Excel workbook that utilizes XML files to create the various spreadsheets as well as macros and other hidden codes used to perform certain functions (which is why there's an X at the end; older .xls files had no indication of this external code being present, which is why they're almost never recommended for modern use).

ASAP PLS HELP: I’ll give brainliest if you u answer them all correctly!!


1. A means of giving credit to a source when their information is used.

A) Citation
B) Wi-Fi
C) Asynchronous Communication
D) Malware

2. A malicious attack that uses email, text messaging, and websites to gather sensitive information about people.
A) Spyware
B) Phishing
C) Malware
D) Wi-Fi

3. A device that translates analog carrier signals to encode and decode digital information.

A) USB
B) Computer Virus
C) Intranet
D) Modem

4. A virus or Trojan horse designed to cause harm to computer or device.

A) Hardware
B) Malware
C) Modem
D) Antivirus Application

5. Software that is used to detect and eliminate computer viruses.

A) Wi-Fi
B) Cable Internet
C) Antivirus Application
D) Browser

6. Transmits data through a cable television network as a means to connect a computer to the internet.

A) Desktop Interface
B) Cable Internet
C) Operating System
D) USB

7. An application used to access websites on the internet.

A) Malware
B) Internet
C) Proprietary
D) Browser

8. Communication that does not happen in real time.

A) Asynchronous Communication
B) Wi-Fi
C) Ethernet Cable
D) Malware

9. A network of computers that provides access to information on the web.

A) Phishing
B) Internet
C) Antivirus Application
D) Modem

10. The cable used to connect computers in a network.

A) Computer Virus
B) Ethernet Cable
C) Intranet
D) Hardware

Answers

Easy Peasy Lemon Squeezy

1. A means of giving credit to a source when their information is used.

A.) Citation

2. A malicious attack that uses email, text messaging, and websites to gather sensitive information about people.

B.) Phishing

3. A device that translates analog carrier signals to encode and decode digital information.

D.) Modem

4. A virus or Trojan horse designed to cause harm to computer or device

B.) Malware

5. Software that is used to detect and eliminate computer viruses.

C.) Antivirus Application

6. Transmits data through a cable television network as a means to connect a computer to the internet.

B.) Cable Internet

7. An application used to access websites on the internet.

D.) Browser

8. Communication that does not happen in real time.

A.) Asynchronous Communication

9. A network of computers that provides access to information on the web.

B.) Internet

10. The cable used to connect computers in a network.

B) Ethernet Cable

Answer:

your mom

Explanation:

Other Questions
Which of the following values of x would not be in the domain of the function defined by f(x) = x-2/x+3? which symbol warns that there is something wrong with your alternator? could someone name some games that are unblocked that I can play on a school computer?lol 50 pts to answer what is the answer of 42 x 598 estimate graph the equation y=-2x+1 1 pint=how many cups what was the most significant result of the seven years war? How do you get 7:46 100 POINTS AND BRAINLIEST TO THE CORRECT PERSON!!!Which of the following is MOST likely to be affected by the narrators point of view?the events of the plot and the outcome of the main conflictthe readers understanding of the meaning of eventsthe readers opinion of the authors literary abilitythe number of characters in the story Classify the following triangle. Check all that apply summarize ,,so where are you from by,, Naiomi SepisoBrainliest and 10 points!!!!!! Convert 56F to C.Round to one decimal place and do not include units in your answer. Select the vector along wich a translation of the plane would map point A to its image T (A) what is the standard form of of a line with a slope of -3/2 that passes through the point (4,-1) once osteoblasts have surrounded themselves with the extracellular matrix of bone tissue, they remain inside little chambers called __________ where they carry on the metabolic functions that maintain bone tissue. at this point, the cells are called osteocytes. Algebra 2 Piece-wise functions!! identify cause and effect what factors probably turned public opinion in favor of the bonus army after the Washington demonstration Which meaning defines the word subterranean? (1 point)O acting as a replacementO below groundo frighteningo having both land and water What is the sum of the of the infinite geometric series 0.7+0.07+0.007+...? how does dna control the traits of living organism?