1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
zalisa [80]
3 years ago
9

What is the first computer ever made?????

Computers and Technology
2 answers:
Leviafan [203]3 years ago
6 0
The manchester mark 1
lord [1]3 years ago
3 0
That really depends on your definition of "Computer"! 

The first time the word "computer" was used it was referring to a human who performed calculations!!

The first mechanical computer was, created by Charles Babbage<span> in </span>1822, although it's not a computer like we know it. It was known as the Difference Engine and <span>tabulated </span>polynomial functions<span>. 
</span>
The first programmable computer was the Z1, created between 1936 and 1938. <span>It was a binary electrically driven mechanical calculator with limited programmability.

The first electric programmable computer was the Collosus in 1943, created to help read encrypted German messages by British code breakers. 

The first digital computer used for digital computation such as binary math and boolean logic, was the </span><span>Atanasoff-Berry Computer in 1937.

The first stored program computer was the EDSAC which work started ib in 1946, but only ran it's first programs in 1949. ran the first graphical computer game as well! The Manchester Mark 1 which the other poster mentioned was created around the same time (work began </span><span>1948) </span>and could also run stored programs, but the EDSAC was the first. 

The first commercial computer was the Z4 in 1942. 
You might be interested in
Inserting diagrams into documents can help readers better understand document text. True or False?
Masja [62]
It's true because you can get a better understanding when looking at the evidence.
4 0
3 years ago
The document that is use in excel to store an work with data that's formatted in a pattern of a uniformly space horizontalal an
Neporo4naja [7]

Answer:

Spreadsheet.

Explanation:

Microsoft Excel is a software application or program designed and developed by Microsoft Inc., for analyzing and visualizing spreadsheet documents.

The document that is use in excel to store a work with data that's formatted in a pattern of uniformly spaced horizontalal and vertical lines is called a spreadsheet.

A spreadsheet can be defined as a file or document which comprises of cells in a tabulated format (rows and columns) typically used for formatting, arranging, analyzing, storing, calculating and sorting data on computer systems.

Additionally, workbooks are known as Microsoft Excel files. An Excel workbook can be defined as a collection of one or more charts and worksheets (spreadsheets) used for data entry and storage in an excel file. In order to create a project on Excel you will have to use a workbook.

5 0
3 years ago
A data dictionary is sometimes described as "the database designer's database" because it records the design decisions about tab
MrRa [10]

Answer:

True is the correct answer for the above questions.

Explanation:

  • A data dictionary is used to hold the structure and definition of the database. It is because it is used to hold information about the database or operational database.
  • It is a set of schema through which the user can understand the structure of the database. It can be used to define the metadata also. The metadata detailed the data of a database.
  • The above question-statement also wants to states about the same which is described above which is the definition of the data dictionary. Hence it is a true statement.
4 0
3 years ago
Suppose that you have just bought a new computer and you want to install soft- ware on that. Specifically, two companies, which
Gennadij [26K]

Answer:

#importing the time module

import time

#welcoming the user

name = raw_input("What is your name? ")

print "Hello, " + name, "Time to play hangman!"

print "

"

#wait for 1 second

time.sleep(1)

print "Start guessing..."

time.sleep(0.5)

#here we set the secret

word = "secret"

#creates an variable with an empty value

guesses = ''

#determine the number of turns

turns = 10

# Create a while loop

#check if the turns are more than zero

while turns > 0:          

   # make a counter that starts with zero

   failed = 0              

   # for every character in secret_word    

   for char in word:      

   # see if the character is in the players guess

       if char in guesses:    

   

       # print then out the character

           print char,    

       else:

   

       # if not found, print a dash

           print "_",      

       

       # and increase the failed counter with one

           failed += 1    

   # if failed is equal to zero

   # print You Won

   if failed == 0:        

       print "

You won"  

   # exit the script

       break              

   print

   # ask the user go guess a character

   guess = raw_input("guess a character:")  

   # set the players guess to guesses

   guesses += guess                    

   # if the guess is not found in the secret word

   if guess not in word:  

 

    # turns counter decreases with 1 (now 9)

       turns -= 1        

 

   # print wrong

       print "Wrong

"    

 

   # how many turns are left

       print "You have", + turns, 'more guesses'  

 

   # if the turns are equal to zero

       if turns == 0:            

   

       # print "You Lose"

           print "You Lose

"  

7 0
3 years ago
Which Internet security risk is associated with dumpster diving?
lora16 [44]

Which Internet security risk is associated with dumpster diving? Identity theft. Identity theft is associated with dumpster diving because it involves taking something from someone else. In this case, instead of looking through a dumpster to get items that were someone elses, they are taking their identity and using it for their own purposes. So identity theft and dumpster diving relate when used in this context.

3 0
4 years ago
Read 2 more answers
Other questions:
  • Which is the responsibility of a software architect?
    11·1 answer
  • __________ is an attempt to gain access to a network by posing as an authorized user in order to find sensitive information, suc
    5·1 answer
  • Can Anybody Answer This
    8·1 answer
  • Easy upgrade from windows xp to windows 7
    7·1 answer
  • In the context of wireless signal propagation, the phenomenon that occurs when an electromagnetic wave encounters an obstruction
    14·1 answer
  • Consider a disk with the following characteristics (these are not parameters of any particular disk unit): block size B 512 byte
    8·1 answer
  • What is the first step necessary to begin setting up a website once a host has been selected and paid?
    11·1 answer
  • Write a function square_evens(values) that takes a list of integers called values, and that modifies the list so that all of its
    9·1 answer
  • i give up on understanding and trying to pass science. ive now started clicking random letters as the choices. i actually got a
    5·1 answer
  • The design of a blog refers to:
    8·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!