1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
Novay_Z [31]
2 years ago
13

What was Ada Lovelace's contribution to computer science?

Computers and Technology
2 answers:
Alika [10]2 years ago
8 0

Answer:

She made the first computer.

Explanation:

Augusta Ada King, Countess of Lovelace (née Byron; 10 December 1815 – 27 November 1852) was an English mathematician and writer, chiefly known for her work on Charles Babbage 's proposed mechanical general-purpose computer, the Analytical Engine.

Yanka [14]2 years ago
7 0

Answer:

She made the first ever computer.

Explanation:

The computer was called the Analytical Engine.

You might be interested in
Which of the following would help a photographer keep from dropping a camera? - - Rain hood
timama [110]
I say b because if you use a camera strap then you won't drop the camera on the hard ground.

6 0
4 years ago
Read 2 more answers
We are tall straight and upright who are we
mamaluj [8]
The answer to this puzzle can be anything but most commonly it is Trees. Pines, Redwood, Sequoias, any kind that is tall and straight. Or it can be something like poles, or even humans.

3 0
4 years ago
Read 2 more answers
Different types of names given to explicit convertion in java<br>​
melamori03 [73]

Answer:

Different types of name given to explicit conversation in java are

1. Automatic

2. Explicit

3 0
3 years ago
What is the size of the program counter for an avr that has a 1 kbyte rom capacity?
horsena [70]

Answer:

9 bits

Explanation:

 We all recognize 1 K bytes as =1024 bytes.  

And the storage medium used for program instructions are the non-volatile flash memories. The MCUs are always 8 bits, and a piece of the instructions revenues two or one 16-bit words. Besides we know program memory magnitude through the device name, and as an instance, the ATmega64x line emanates with 64KB of flash, and the ATmega32x line emanates with 32 KB. And there is nobody like off-chip program memory, and all of the codes that are being implemented by the AVR essentially be on the on-chip flash. However, this restraint is not ever applied to the AT94 FPSLIC AVR/FPGA chips. Also, you must know that AVR is a family of microcontrollers established by ATEL in 1996. It is a Harvard architecture type single-chip 8-bit RISC microcontroller. And it is supposed to be the first microcontroller which applied flash memory for storing the program They are heavily used in embedded systems.  

1k byte = 1024 bytes, However, if the program instruction takes 16 bits.  

And hence it only wishes 512.  

Here and now 512 = 10^9, and henceforth you necessitate 9 bits at minimum.  

excluding you can somehow paginate that (such as through one-bit pagination, you will be necessitating only 8 bits and so on.)  

Therefore the answer here = 9 bits.

5 0
4 years ago
What is the function of this logical comparator! =?
rewona [7]

Answer:

See explanation

Explanation:

!= means not equal

The given operator is not a logical operator but rather a comparison operator.

It compares two expressions, values or variables and returns true if the items being compared are not equal.

3 0
3 years ago
Other questions:
  • Preserving confidentiality, integrity, and availability of data is a restatement of the concern over interruption, modification,
    15·1 answer
  • Create a query that will list all technician names, employee numbers, and year hired in order by year hired (Newest to Oldest).
    5·1 answer
  • Consider the following method:
    8·2 answers
  • With Google Alerts you can Group of answer choices
    13·1 answer
  • After saving her presentation initially, Leah realizes she needs to add another content slide. She adds the slide and is ready t
    7·1 answer
  • Intrusion Detection System (IDS) is a security mechanism that detects unauthorized user activities, attacks, and network comprom
    5·1 answer
  • A(an)_______is built-in preset calculation. <br>formula <br> function <br>equation <br>AutoSum​
    12·1 answer
  • Examine the weather map.
    12·2 answers
  • Write common ICT tools​
    5·1 answer
  • What are the key constructs of a G&amp;T Value Delivery objective?
    6·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!