1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
jolli1 [7]
3 years ago
10

Why did Herman Hollerith invent the Tabulating Machine?

Computers and Technology
1 answer:
Anvisha [2.4K]3 years ago
8 0

Answer:

the machine was developed to help process data for the 1890 U.S. Census.

Explanation:

U.U

You might be interested in
File "f2" has a size of 2. Why? A. It contains the string "f1". B. It contains two blank lines.
Aneli [31]

Answer:

A. It contains the string "f1"

7 0
3 years ago
List the invoice number and invoice date for each invoice that was created for James Gonzalez but that does not contain an invoi
Ludmilka [50]

Answer:

Derive FROM invoice_transaction, invoice_details, item_details

and JOIN customer_details  ON (invoice_transaction.CUST_ID = customer_details.CUST_ID  AND customer_details.FIRST_NAME = 'James'   AND customer_details.LAST_NAME  = 'Gonzalez')

Explanation:

The following details will be there in the invoice

  1. item_details
  2. rep_details
  3. invoice_details
  4. customer_details
  5. invoice_transaction

 Derive FROM invoice_transaction, invoice_details, item_details

and JOIN customer_details  ON (invoice_transaction.CUST_ID = customer_details.CUST_ID  AND customer_details.FIRST_NAME = 'James'   AND customer_details.LAST_NAME  = 'Gonzalez')

6 0
3 years ago
How does Virus transfer from one computer to<br>another computer?​
Daniel [21]

Answer:

Viruses can enter your computer in any number of ways, such as via an email attachment, during file downloads from the Internet or even upon a visit to a contaminated Web site.Jun 2, 2010

Explanation:

Viruses spread when the software or documents they get attached to are transferred from one computer to another using a network, a disk, file sharing methods, or through infected e-mail attachments. Some viruses use different stealth strategies to avoid their detection from anti-virus software.

5 0
3 years ago
How to select multiple layers in photoshop
Ksju [112]

Answer: Click a layer in the Layers panel. To select multiple contiguous layers, click the first layer and then Shift-click the last layer. To select multiple noncontiguous layers, Ctrl-click (Windows) or Command-click (Mac OS) them in the Layers panel.

Explanation:

3 0
2 years ago
Question #1
Evgen [1.6K]

Answer:

Pseudocode and flowchart.

Explanation:

I just got it correct.

8 0
3 years ago
Other questions:
  • Jim wants to buy a car, he’ll probably only need it for a couple of years he has a short commute to work so he won’t put many mi
    12·1 answer
  • Write an application that allows a user to enter the names and birth dates of up to 10 friends. Continue to prompt the user for
    6·1 answer
  • Insurance can help you:
    12·1 answer
  • Which software application offers a variety of templates for creating reports, flyers, and newsletters that you can access withi
    7·1 answer
  • Write a program that has a conversation with the user. The program must ask for both strings and numbers as input. The program m
    12·1 answer
  • Assignment 1: silly sentences edhesive
    7·1 answer
  • New trends, tools, and languages emerge in the field of web technology every day. Discuss the advantages of these trends, tools,
    15·1 answer
  • Your network has been having problems lately when users are participating in video conferences - the video and audio stutters ve
    13·1 answer
  • How do we Rewrite the following Python code to avoid error. mark=inpt("enter your mark ")
    6·1 answer
  • Group of programs are software ​
    6·2 answers
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!