1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
Tcecarenko [31]
3 years ago
9

3 Points What was the first computer programming language?

Computers and Technology
2 answers:
nika2105 [10]3 years ago
8 0

Answer

Plankalkül, developed by Konrad Zuse for the Z3 between 1943 and 1945

Explantion:

TBH, the first programming language for a computer was Plankalkül, developed by Konrad Zuse for the Z3 between 1943 and 1945. However, it was not implemented until 1998. Short Code, which was proposed by John Mauchly in 1949, is considered to be the first high-level programming language.

maksim [4K]3 years ago
6 0

Explanation: Well the first one was Plankalkül, but it wasn't implemented untill 1998. But the first to be actually used was Short Code.  

You might be interested in
What are the challenges of photographing at night? Why did the photographer “paint” the waterfall with the flashlight?
lianna [129]
Because he needed ligh
7 0
4 years ago
Using computer software, compare the 2016 year-to-date sales through February to the 2017 year-to-date sales through February fo
JulijaS [17]

Incomplete question. Here's a similar question found in the attachments.

<u>Answer:</u>

<u>General Motors Corp, Chrysler, Ford Motor Company, Toyota Motors sales USA Inc, Nissan North America Inc.</u>

<u>Explanation</u>:

By, using the MS Excel computer software, you would be able to compare the 2016 year-to-date sales through February 2017 year-to-date sales for each manufacturer.

Simply copy the data into the data cells of MS Excel, next use the =sum formula (which should have a minus sign; For example, =SUM (B5 - E5) would give you the difference between the 2016 sales and 2017 sales, only if sales for 2016 is found in column B row 5 and sales for 2017 in column E row 5).

Thus, the results obtained can further be evaluated to determine the manufacturers in the top five with increased sales.

3 0
4 years ago
Randy is concerned about his company’s data security on the Internet. Because cellular signals are not encrypted, he is concerne
vovikov84 [41]

Answer:

Randy should deploy SSH to allow the sales department to connect to the company network securely over cellular data signal.

Explanation:

Option A is the correct answer because SSH means Secure Shell. And Secure Shell is a cryptographic network protocol for operating network services securely over an unsecured network. Any network service can be secured with SSH

Option B is not correct because VPN mean virtual private network. And what VPN does is to extends a private network across a public network, and enables users to send and receive data across shared or public networks as if their computing devices were directly connected to the private network.

Option C is not correct because IMEI means International Mobile Equipment Identity and is a number that is use to uniquel identify 3GPP and iDEN mobile phones, as well as some satellite phones.

Option D is not correct because POP3 is an example of email protocol. Post Office Protocol version 3 (POP3) is a standard mail protocol used to receive emails from a remote server to a local email client. POP3 allows you to download email messages on your local computer and read them even when you are offline.

4 0
3 years ago
A device that protects electronic equipment from an increase in power, but not a decrease or outage is a ___.
Basile [38]

Answer: A) Battery backup

Explanation:

 A battery backup are used to provide the source of power backup to various hardware components and desktop computers. In many cases, the devices are plugged into UPS ( uninterruptible power supply) for backup power and it is also depend upon the size of the UPS.

All the battery backups are located inside so that is why, the devices are heavy in weight. Usually, the battery backup front required additional button for performing various functions.

And the battery backup devices are manufacture by using the varying degree of backup abilities.

8 0
3 years ago
A Uniform Resource Locator (URL) consists of three separate parts: network protocol, host, and web browser.
FrozenT [24]
That is false. are you doing it on a computer course.                                             <span />
3 0
4 years ago
Read 2 more answers
Other questions:
  • David would like to send a letter to more than one hundred people. He would like the letter to have names and addresses inserted
    7·1 answer
  • An array name and index are separated using ____.
    13·1 answer
  • When transporting data from real-time applications, such as streaming audio and video, which field in the ipv6 header can be use
    12·1 answer
  • One is FPGA and other is ASIC. Budget, power consumption, and speed are the common parameters considered for the selection of th
    9·1 answer
  • What is the first step to creating a PivotTable?
    11·1 answer
  • Methods inherited from the base/super class can be overridden. This means changing their implementation; the original source cod
    5·1 answer
  • Cognitive psychology is the scientific study of what
    9·1 answer
  • A provides legal protection for something an individual has created
    12·1 answer
  • What to do if your monitor is not displaying a picture
    12·1 answer
  • Typically, hybrid drives use SSD to store the operating system and applications and hard disks to store videos, music, and docum
    5·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!