1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
Marina86 [1]
3 years ago
13

What is the use of jacquard loom

Computers and Technology
2 answers:
Umnica [9.8K]3 years ago
7 0

He constructed a loom in 1801 that used a series of punched cards to weave a pattern of threads. The invention came to be known as the Jacquard loom. The loom is controlled by a system of stiff punch cards and hooks. Each row of holes punched in the cards corresponds to one row of thread in the design.

Lady_Fox [76]3 years ago
6 0
The Jacquard loom was basically a computer of its time and was used to weave patterns and shapes by the use of punch cards with holes
You might be interested in
________ is the relative value, either in monetary terms or in overall impact, of the resource being protected by the access con
kherson [118]

Answer:

a. Asset value

Explanation:

Asset value is the value of a share in the company.

The asset value is calculated as

= [ Difference between the total of its assets and its liabilities ] ÷ [ The number of ordinary shares issued ]

The asset value may also be the equal as the book value or the it may be same as equity value of a business.

3 0
2 years ago
What is the purpose of OPPA? A. It regulates the strength of passwords chosen by the users. B. It prohibits the use of informati
Anna35 [415]

The purpose of OPPA is to make its mandatory for companies to disclose what kind of information they will acquire from their users.

D. It makes it mandatory for companies to disclose what kind of information they will acquire from their users.

<u>Explanation:</u>

OPPA is a Online Privacy Protection Act. It gathers data from individuals who use or visit your site and use it to execute business with them. A few organizations use client data for their very own inner showcasing purposes, for example, to figure out what sort of items or administrations to offer whenever the client utilizes the site or to create focused on arrangements of clients who have similar likes or aversions.

It makes it obligatory for organizations to reveal what sort of data they will secure from their clients. It likewise incorporates data, for example, name, road address, email address, phone number, date of birth, Social Security number, or different insights concerning an individual that could enable a customer to be reached physically or on the web.

6 0
3 years ago
An intruder can wreak havoc on a network by simply plugging in an infected USB flash drive.
Bas_tet [7]

Answer:

A. True

Explanation:

1. I took the test

2. Flash drive ports are connected to the rest of the computer, so putting in an infected flash drive into the port will cause the bug to spread throughout the whole device.

3 0
2 years ago
What are two great ways to find clues to locate commands on the ribbon?
Lapatulllka [165]

Solution:

Look at the tabs and hover over images. are two great ways to find clues to locate commands on the ribbon.

There are six main categories for command which are; one-click, toggle, split buttons, drop-down and tick box.  Categories can be mixed so it is useful to understand the basics to develop the Excel skills.

The ribbon is a user interface element created by Microsoft, which was introduced with Microsoft Office 2007. It is part of the "Microsoft Office Fluent" interface and combines the menu bar and toolbar into a single floating pane. By default, it is located at the top of the screen in Office applications, such as Access, Excel, PowerPoint, Word, and Outlook.

This is the required solution.


6 0
2 years ago
According to Ernest Hilgard, hypnosis is the result of __________.
goldfiish [28.3K]
The effects of a hidden observer
4 0
3 years ago
Read 2 more answers
Other questions:
  • Can someone please give me a good definition to audience expectations!<br> (in film)
    8·1 answer
  • A user states that when they power on their computer, they receive a "Non-bootable drive" error. The user works with external st
    8·1 answer
  • Why should characters be avoided in file names
    11·1 answer
  • Linda subscribes to a cloud service. The service provider hosts the cloud infrastructure and delivers computing resources over t
    10·1 answer
  • Pat is listing the parts of a computer. Which is the best option to use when formatting the list?
    12·1 answer
  • Use the drop-down tool to select the word or phrase that completes each sentence.
    7·1 answer
  • Which shot is not the best for a widescreen image
    11·2 answers
  • What does this function do in the code?
    5·2 answers
  • A Lost link is an interruption or loss of the control link between the control station and the unmanned aircraft, preventing con
    10·1 answer
  • Place the steps in order for creating a filter in Outlook 2016.
    9·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!