1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
ICE Princess25 [194]
3 years ago
13

What computer did d takahashi and y kanada use to calculate pi?

Computers and Technology
1 answer:
Brut [27]3 years ago
8 0
<span>It depends on how much places they calculated to. As far as I remember D</span> Takahashi and Y<span> Kanada</span><span> used HITACHI SR2201 </span>to calculate pi to 5153960000 places and later they used<span> HITACHI SR8000 to calculate pi to</span> 206,158,430,000 places.
You might be interested in
What laptop is the best for programming and hacking​
Archy [21]

Answer:

I would suggest an outdated laptop that can't be updated anymore because it is old and outdated.

Explanation:

If you hack on an old laptop it can't be traced back to you because the servers are shutdown.

3 0
3 years ago
The chip that controls the radio frequency waves within a device
torisob [31]

Answer:

An RF module

Explanation:

I googled it lol

7 0
4 years ago
Choices.
Svet_ta [14]

Answer:

1. B

2. D

3. C

4. A

5. B

Explanation:

1. To check the integrity of your hard disk and fix various file system errors, the Windows utility which should be implemented is Check disk (Chkdsk). This utility is always used with the command line interface (CLI) with the command "chkdsk."

2. An event or action took place and it caused damage to data, hardware, software and processing capability of the computer. From the statement given, security risks are being described. Any event or action that is capable of causing a problem to a computer system is considered to be a security risk and should be prevented through the use of an appropriate utility software.

3. Virus is a software program that can infect, damage and disrupts the whole computer system.

4. To protect the whole computer system, the software utility which is needed is an Anti-virus.

5. To avoid losing valuable data to your computer, the most important thing to do is to regularly back-up your files.

7 0
3 years ago
Why crt and plasma are not used in laptop ?​
AlekseyPX

Answer:

Plasma monitors are power hungry devices 2 - 3 times more than a CRT monitor making this technology unfit for use in portable devices like laptop computers where batteries are used as the power source. Plasma monitors are extremely susceptible to screen burn.

Explanation: pls mark my answer as brainlist

6 0
3 years ago
You can select a noncontiguous range of cells by pressing and holding the ________ key when using it in combination with other n
leonid [27]
Hey there!

I believe your answer will be the "Shift" key. You can hold down Shift and select a cell from your current cell position to select everything between the original position and the cell you clicked on without having to drag your mouse across the cells. If you were to hold down the Ctrl or Command key, you would only have your original selection and your new selection highlighted. 

Your answer will be Shift. 

Hope this helped you out! :-)
3 0
3 years ago
Other questions:
  • How can you find Web pages that contain news published during the past week?
    8·1 answer
  • Rachel is on her way to an interview for the position of a project manager. She is trying to prepare for this interview by analy
    6·1 answer
  • Select the correct answer.
    15·1 answer
  • What is the sum of each pair of binary integers? (assuming 8-bit register is used)
    5·1 answer
  • Refer to the exhibit, a technician applies the configuration in the exhibit to an unconfigured router. To verify the configurati
    13·1 answer
  • Level of comfort that people feel
    10·1 answer
  • Power point presentation make use of pages known as
    9·2 answers
  • the computer that communicate with each other are called ______please ask the answer in 15 minutes after 1 p.m. ​
    9·1 answer
  • How to convert binary to decimal <br> Please it’s so hard and what is digital and analogue
    9·1 answer
  • you are investigating the use of website and url content filtering to prevent users from visiting certain websites. which benefi
    15·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!