1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
ICE Princess25 [194]
3 years ago
13

What computer did d takahashi and y kanada use to calculate pi?

Computers and Technology
1 answer:
Brut [27]3 years ago
8 0
<span>It depends on how much places they calculated to. As far as I remember D</span> Takahashi and Y<span> Kanada</span><span> used HITACHI SR2201 </span>to calculate pi to 5153960000 places and later they used<span> HITACHI SR8000 to calculate pi to</span> 206,158,430,000 places.
You might be interested in
During a network infrastructure upgrade, you have replaced two 10 Mbps hubs with switches and upgraded from Category 3 UTP cable
julia-pushkina [17]

Answer:

The answer is "Option c"

Explanation:

Its the infrastructure used to upgrade, for it's upgrading it begins with improving its internet services, that require new routers, adapters, and modulation schemes, that arrive with smart detectors and functionaries, if it accidentally  cut the cat 5e patch so, all the internet nodes shall be accessible except the server, and wrong choices can be described as follows:

  • In option a, It is wrong because all network is not authenticated by the same server.
  • In option b, Network nodes connection can be a switch, that's why is incorrect.  
  • Option d and Options e both were wrong because it is not divided on the same subnet and the printer is not available for all.
6 0
3 years ago
Given the three side lengths, how can you tell if a triangle<br>is a right triangle?​
Tatiana [17]
<h3>Sample Response from Edge 2020:</h3>

Square all side lengths. If the longest side length squared is equal to the sum of the squares of the other two side lengths, then it is a right triangle.

8 0
3 years ago
What are the two basic steps in communication
Andrei [34K]

The sender forms an idea.The sender encodes the idea in a message.

4 0
4 years ago
What is a zerø-day exploit? No go.ogle &gt;:(
Igoryamba

Answer:A zero-day vulnerability is a vulnerability in a system or device that has been disclosed but is not yet patched. An exploit that attacks a zero-day vulnerability is called a zero-day exploit.

Explanation:

6 0
2 years ago
In order to restrict editing to a document, a user will go to Review, , Restrict Editing, and will then select what kinds of edi
KiRa [710]

Answer: drafting

Explanation:

3 0
3 years ago
Other questions:
  • Identify the correct software or hardware applications in the passage below
    10·1 answer
  • 1. compression
    11·1 answer
  • An accompanying ____ gives audience members reference notes and review material for your presentation.
    6·1 answer
  • Can someone start me off with a short 2 or 3 paragraphs about the pros and cons of Microsoft Word, and if you can recommend a si
    12·1 answer
  • Technician A says that as volume decreases, pressure increases. Technician B says that as temperature increases, pressure decrea
    15·2 answers
  • Create a script that will determine how many of each currency type are needed to make change for a given amount of dollar and ce
    8·1 answer
  • Where can a client identify the instant deposit options for their QuickBooks Payments account?
    5·1 answer
  • Take two String inputs of the same length and merge these by taking one character from each String (starting with the first ente
    8·2 answers
  • What is modern? explain​
    11·1 answer
  • People’s personal information is collected _____. Select 4 options.
    7·2 answers
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!