1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
Ede4ka [16]
3 years ago
12

British mathematician Alan M. Turing wrote a number of papers on theoretical computer science. In one paper, written in 1936 bef

ore any programmable computer had ever been built, he described the logical structure any such machine would have to possess. His description of an idealized computer specified in mathematical terms the relations between the input, output, actions, and states of what is called a Turing machine.
What can the reader infer from the passage?

A. Turing invented the first computer.
B. Turing physically developed the structure of a programmable computer.
C. Turing analyzed the first computer.
D. Turing conceived the structure of a programmable computer.
Computers and Technology
1 answer:
9966 [12]3 years ago
4 0

Answer: D. Turing conceived the structure of a programmable computer.

Explanation: The passage describes how Alan M. Turing described the theoretical aspect of a programmable computer. There is no reference to a physical machine or Turing working on an actual (physical) computer.

The Turing machine, although it does sound like a physical computer was an abstract idea, conceived in mathematical form of what a programmable machine would be like. Alan Turing is considered one of the founding fathers of theoretical computer science.

You might be interested in
What is the best kernel synchronization solution on multicore systems when a lock is held for brief periods ?
Delvig [45]

Answer: C) spin-lock with test and set

Explanation:

In spinlock, when a thread locks a spinlock then it continuously retrying locking until it succeeds. Spinlock is the lock that cause thread and continuously check that whether the lock are available or not for synchronization.

So that is why spinlock is best synchronization solution as it is not allowing any another thread.

On the other hand, in mutex thread try to lock a mutex and then, it automatically go to sleep mode before locking and immediate allow another thread to run.

8 0
2 years ago
Write a function that will sum all of the numbers in a list, ignoring the non-numbers. The function should takes one parameter:
olasank [31]

In python 3.8:

def func(value_list):

   lst = [x for x in value_list if type(x) == int or type(x) == float]

   return sum(lst)

print(func(["h", "w", 32, 342.23, 'j']))

This is one solution using list comprehensions. I prefer this route because the code is concise.

def func(value_list):

   total = 0

   for x in value_list:

       if type(x) == int or type(x) == float:

           total += x

   return total

print(func(["h", "w", 32, 342.23, 'j']))

This is the way as described in your problem.

3 0
3 years ago
A hacker using information gathered from sniffing network traffic uses your banking credentials from a recent transaction to cre
adell [148]

Answer: a replay attack, a replay attack is used so that the attacker can go sniff out the hash, and get whatever they are trying to get, then once it goes to the attacker it will go back to the original connection after replaying the hash

3 0
2 years ago
How many binary digits does a single hexadecimal digit represent?
Anna35 [415]
Four binary digits.  So letter D.


8 0
3 years ago
Which network protocol is used to route IP addresses?<br>A. TCP<br>B. UDP<br>C. IP<br>D. ICMP
ladessa [460]

Answer:

C. IPIP

Explanation:

This protocol is known as an IP that stands for Internet Protocol. This protocol handles the simple task of making sure that the information is routed correctly to and from the corresponding computer machines through the internet. The sending and receiving machines are identified through their Internet Protocol Addresses which lets the protocol know exactly where the information is going and being sent from.

8 0
3 years ago
Other questions:
  • Help asap. 10 points.
    8·2 answers
  • Which term describes a protocol to manage a network, able to configure a network, monitor activity, and control devices?
    10·2 answers
  • Which one of the following is NOT true about energy conversion devices? Group of answer choices Total Energy Input = Energy Diss
    8·1 answer
  • Given the code segment below, complete the assignments as stated in the comments. struct aaa { int m; int nn; } struct bbb{ stru
    13·1 answer
  • Stealing passwords by using software code to run through various password schemes with numbers, symbols, capital letters, and ch
    6·1 answer
  • The text defines ________________ as the obsessive use of computers, or the unauthorized access and use of networked computer sy
    14·1 answer
  • The set of rules for how computers talk to one another
    6·1 answer
  • Which code will print a random number between 1 and 100?
    15·2 answers
  • In two to three sentences, define "home row" and explain why it is important.
    6·2 answers
  • Your motherboard has sockets for 184-pin dimm ram. which type of ram should you install?
    15·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!