1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
TiliK225 [7]
4 years ago
10

How many generations of computer languages have there been since the middle of the 20th century

Computers and Technology
1 answer:
frozen [14]4 years ago
5 0
Four computer languages i think
You might be interested in
While working on a presentation, Jack lost all the data because he switched off his computer unknowingly. On which of these comp
Lelechka [254]

Random Access memory(RAM) stores data temporary until the computer is switched off

3 0
3 years ago
Read 2 more answers
The japanese call the practice of stopping production when a defect occurs
lana66690 [7]

Answer:

Jidoka

Explanation:

hope this helps:)

4 0
3 years ago
Can anyone answer this picture?
sasho [114]

This program multiplies integer inputs A and B, by repeatedly adding B to RESULT while decrementing A.


It will work fine when either A or B is zero. If A is zero, it will branch to QUIT immediately. If B is zero, zero will be added repeatedly to the result (which also is initialized with zero).


LOOP, RESULT etc. are called labels. They translate into a memory address location of a variable or machine instruction. But it is much more readable to have them as english words while creating your program. Also, they make your program relocatable, in the sense that while writing, you don't have to decide on which physical address your program will run.

7 0
3 years ago
A. Carly’s Catering provides meals for parties and special events. In Chapter 3, you created an Event class for the company. The
Tpy6a [65]

Answer:

import java.util.Scanner;

public class Event {

  public final static double LOWER = 32.00;

  public final static double HIGHER = 35.00;

  public final static int CUTOFF_VALUE = 50;

  public boolean largeEvent;

  private String eventNum;

  private int totalGuests;

  private double price;

  private double pricePerGuest;

  public Event(String event, int guests) {

      eventNum = event;

      totalGuests = guests;

  }

  public Event() {

      this("A000", 0);

  }

  private Scanner input = new Scanner(System.in);

  public void setEventNumber() {

      System.out.print("Enter the event number? ");

      eventNum = input.nextLine();

  }

  public void settotalGuests() {

      System.out.print("Enter total guests that are attending the event? ");

      totalGuests = input.nextInt();

      if (isLargeEvent())

          pricePerGuest = LOWER;

      else

          pricePerGuest = HIGHER;

      price = totalGuests * pricePerGuest;

      largeEvent = (totalGuests >= CUTOFF_VALUE);

      System.out.println("");

  }

  public boolean isLargeEvent() {

      if (this.gettotalGuests() > 50)

          return true;

      else

          return false;

  }

  public String getEventNumber() {

      return eventNum;

  }

  public int gettotalGuests() {

      return totalGuests;

  }

  public double getPrice() {

      return price;

  }

}

public class EventDemo {

  public static void main(String[] args) {

      Event event1 = new Event();

      Event event2 = new Event();

      Event event3 = new Event();

      System.out.println("Enter Details of event1:");

      event1.setEventNumber();

      event1.settotalGuests();

      System.out.println("Enter Details of event2:");

      event2.setEventNumber();

      event2.settotalGuests();

      System.out.println("Enter Details of event3:");

      event3.setEventNumber();

      event3.settotalGuests();

      display(event1);

      display(event2);

      display(event3);

      System.out.println("Get largest event from event1 and event2 is :");

      display(getLargestEvent(event1, event2));

      System.out.println("Get largest event from event2 and event3 is :");

      display(getLargestEvent(event2, event3));

      System.out.println("Get largest event from event1 and event3 is :");

      display(getLargestEvent(event1, event3));

  }

  public static void display(Event e) {

      System.out.println("Event number: " + e.getEventNumber());

      System.out.println("Total guests: " + e.gettotalGuests());

      System.out.println("Total price: $"

              + String.format("%.2f", e.getPrice()));

      System.out.println("Is Large event: " + e.isLargeEvent());

      System.out.println("");

  }

  public static Event getLargestEvent(Event e1, Event e2) {

      if (e1.gettotalGuests() > e2.gettotalGuests())

          return e1;

      else

          return e2;

  }

}

Explanation:

  • Call isLargeEvent() method to check whether to set pricePerGuest as Lower or Higher.
  • Calculate the price by multiplying the total guests with price per guest.
  • Call gettotalGuests() method to check if the event is large or small.
5 0
3 years ago
Which would be a responsible use of technology used by victims of cyberbullying?
IrinaVladis [17]

Answer:

Changing password and screen names regularly.

Explanation:

The cyber attacks have been common in this age. The technological advancements have eased our lives but also create hundreds of risks. These risks can include cyber bullying. The best way to keep your self away from being victim of such threat is by changing passwords regularly. This reduces the chance of hacking passwords and cyber bullying.

5 0
3 years ago
Read 2 more answers
Other questions:
  • Write a program that takes as input an arithmetic expression followed by a semicolon ";". The program outputs whether the expres
    11·1 answer
  • 50 POINTS PLEASE HELP MEEEEEEEEE!!!!!!
    6·2 answers
  • Write a program named SortWords that includes a method named SortAndDisplayWords that accepts any number of words, sorts them in
    10·1 answer
  • Examine the efficiency the various recovery algorithms used in deadlock handling
    10·1 answer
  • In many DBMSs where no strict separation of levels is maintained, this one language is used by the DBA and database designers to
    13·1 answer
  • A bot can use a _______to capture keystrokes on the infected machine to retrieve sensitive information.
    10·1 answer
  • In 5-10 sentences, describe the procedure for responding to an e-mail message.
    5·1 answer
  • Sally notices that she has the same set of 10 blocks in her code in multiple places. She decides to create a new block (procedur
    15·1 answer
  • In what way can a costume be deleted ?
    13·1 answer
  • Which statement best describes a computer program?
    15·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!