1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
jok3333 [9.3K]
3 years ago
10

How was the first programming language created?

Computers and Technology
1 answer:
Readme [11.4K]3 years ago
4 0
The first program was "typed" by turning large gears, flipping levers, and pushing buttons, sometimes programs took days or weeks to process and finish. The first ever recorded "program" was in 1883 when a person wrote algorithms on a large sheet of paper and used this as to know what to do next. I got this from a government website, FLVS is Florida Virtual School and I am taking a computer programming course.
You might be interested in
What is the function of the operating system of a computer?
irina1246 [14]

Answer:

It allows the CPU to communicate with input and output devices.

Explanation:

Plzzzzzzzzzzzzz give me brainiest

6 0
3 years ago
In mathematics, the notation n! represents the factorial of the nonnegative integer n. The factorial of n is the product of all
hram777 [196]

Answer:

The program to this question can be given as:

Program:

factorial=1 #declare a variable.  

number=int(input("Enter a positive integer:")) #input a number.  

while (number>0): #loop  

   factorial= factorial*number # holding value in factorial variable  

   number=number-1  

print('=',factorial) #print value.

Output:

Enter a positive integer:6  

= 720  

Explanation:

The description of the above python program can be given as:

  • In the above program firstly we define a variable that is "factorial". In this variable, we assign a value that is 1 and it is used to calculate the factorial value.  
  • We define a variable "number". The number variable is used to take input from the user.  
  • Then we define a loop in the loop we calculate the factorial and hold the value in the factorial value in the last we print the value.  

4 0
3 years ago
User 2.0 is most likely to Multiple Choice passively read and search for content. depend on content creators and avoid expressin
Ahat [919]

User 2.0 is most likely to: use the Internet for social connection.

<h3>What is User 2.0?</h3>

User 2.0 which is an aspect of Web 2.0 defines the latest form of the internet that allows users to interact with each other. This form of the internet is easy to use and requires participation by users.

So, a possible feature of User 2.0 will be the ability to use the internet for socialization.

Learn more about User 2.0 here:

brainly.com/question/3913924

5 0
3 years ago
In which situation would Accenture apply principles of Responsible Artificial Intelligence (AI)?
kolezko [41]

The concept of responsible AI describes an aspect of automation and machine learning an artificial intelligence which encourages the consciousness in model building and deployment in other to avoid damages or losses.

Responsible Artificial Intelligence ensures the consciousness and carefulness in the collection of data, defining algorithm , model building and other AI architecture which might have adverse or telling effect ok output if not properly monitored.

Accounting and engineering models are some of the cases where principles of responsible AI must be adopted in other to avoid damages or losses.

Learn more :brainly.com/question/25404945

3 0
3 years ago
Someone hacked into an employee's computer and erased all of their data. All data for the past three weeks was lost as that was
hichkok12 [17]

WWW/ World Wide Web.

7 0
3 years ago
Other questions:
  • These systems consist of interlinked knowledge resources, databases, human experts, and artificial knowledge agents that collect
    9·1 answer
  • Assume that the population of Mexico is 128 million and that the population increases 1.01 percent annually. Assume that the pop
    7·1 answer
  • Given that k refers to an int that is non-negative and that plist1 has been defined to be a list with at least k 1 elements, wri
    14·1 answer
  • What range of leakage current must trip an IDCI?​
    15·1 answer
  • The ____ contains all data definitions for a database, including table structures, security information, relationships between t
    11·1 answer
  • The network architecture component that is a special LAN with a group of servers that enables electronic data exchange of betwee
    11·1 answer
  • Which types of files can be used to define Kubernetes manifest files? yaml, json, yaml and text files
    5·1 answer
  • Difference between customized and packaged software​
    10·1 answer
  • A trial-and-error method of problem solving used when an algorithmic or mathematical approach is called
    7·1 answer
  • Moses wants to update the interface of a router. He plans on having a check on the current running configuration file and then w
    14·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!