1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
Novay_Z [31]
2 years ago
13

What was Ada Lovelace's contribution to computer science?

Computers and Technology
2 answers:
Alika [10]2 years ago
8 0

Answer:

She made the first computer.

Explanation:

Augusta Ada King, Countess of Lovelace (née Byron; 10 December 1815 – 27 November 1852) was an English mathematician and writer, chiefly known for her work on Charles Babbage 's proposed mechanical general-purpose computer, the Analytical Engine.

Yanka [14]2 years ago
7 0

Answer:

She made the first ever computer.

Explanation:

The computer was called the Analytical Engine.

You might be interested in
NEED HELP PLEASEE!!!
hjlf
                                                   Start
                                                  Guess
     Incorrect                                                                   Correct
-------------------------              Computer                    ----------------------
- displays incorrect               ------------                    - Displays "Well done"
- displays try again            counts number              - Informs the number of
                                           of guesses                     guesses



hope this helps

make 3 lines down from the start bubble, and do "IF- Then"


6 0
3 years ago
The worlds two highest dams are both in tajikistan. the rogun dam is 35 meters taller than the nurek dam. together they are 635
Hitman42 [59]
The nurek dam is 300 meters tall.
300 + 335 = 635
5 0
3 years ago
The author of ""Cyber-psychopathy: What Goes On in a Hacker’s Head"" states that a crucial component of computer hacking lies in
slega [8]

Answer: The statement implies that the hackers psychologically manipulate the human to access the information they need.

Explanation: The author states that the hacker does not only exploits technology to get system access or to gather information. But there is another pivotal part of hacking. He refers to this part as "social engineering".

Social engineering from information security perspective means manipulate human emotions and convincing them to disclose some confidential information. Hacker often hacks or defrauds after gaining confidence and trust of a person.

Phishing is an example. It is a fraudulent technique for getting some secret information. Phisher sends an email pretending to be from some reputable organization to persuade people to divulge private information like passwords and credit card numbers, ATM card pin etc.

5 0
3 years ago
Which of the following components does a typical two stroke engine contain
Vlada [557]
It is B- An L-type cylinder head. 
4 0
3 years ago
Read 2 more answers
Join me to play mm2<br><br><br>in r0bl0x​
jenyasd209 [6]
Ok what's the code i will join
4 0
3 years ago
Read 2 more answers
Other questions:
  • How useful do you find the creation of folders in your computer?
    8·2 answers
  • Businesses have taken advantage of many of the smart phone features to promote their business. TRUE OR FALSE
    5·2 answers
  • How to reply to text from unknown number?
    11·1 answer
  • What does the binary odometer show about representing large numbers?
    8·1 answer
  • All 24-point fonts take up the same amount of space on a slide. True False
    7·2 answers
  • Describe two types of storage devices?​
    15·1 answer
  • QueSUUN TU
    15·1 answer
  • Red + blue =<br>Red + green =<br>Magenta - blue =<br>Yellow - green =<br>Cyan - blue =​
    9·1 answer
  • A ____ is someone who develops programs and apps or writes the instructions that direct the computer or mobile device to process
    8·1 answer
  • Aisha designed a web site for her school FBLA club and tested it to see how well it would resize on different systems and device
    5·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!