1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
iVinArrow [24]
3 years ago
9

A computer essentially takes input, processes it, and produces output. Which person developed a machine in the mid-1880s that ac

complished this?
John William Mauchly
Charles Babbage
Sir John Ambrose Fleming
Herman Hollerith
Computers and Technology
1 answer:
MakcuM [25]3 years ago
7 0

Answer:

The answer to this question is given below in the explanation section. the correct answer is Herman Hollerith.

Explanation:

Charles Babbage (incorrect)

Charles Babbage considers the father of the digital computer. He was a mathematician, philosopher, inventor, and mechanical engineer, Babbage originated the concept of a digital programmable computer. But he died on 18 1, 1871. so, this option is not correct.

John William Mauchly (Incorrect)

John William Mauchly was an American physicist who, along with J. Presper Eckert, designed ENIAC, the first general purpose electronic digital computer, as well as EDVAC, BINAC and UNIVAC I, the first commercial computer made in the United States. But John William Mauchy born on August 30, 1907 and died on January 8, 1980. So, this option is not correct.

Sir John Ambrose Fleming (Incorrect)

Sir John Ambrose Fleming was an English electrical engineer and physicist who invented the first thermionic valve or vacuum tube, designed the radio transmitter with which the first transatlantic radio transmission was made, and also established the right-hand rule used in physics.

Herman Hollerith (correct)      

Herman Hollerith was an American businessman, inventor, and statistician who developed an electromechanical tabulating machine for punched cards to assist in summarizing information and, later, in accounting. This machine is patented in 1884.

You might be interested in
when a picture is downloaded off the internet and then posted to social media, can the social media platform tell it was downloa
Nataly_w [17]
Short answer yes. kinda long answer people can scan the photo and easily see or they can just look up the same image
4 0
3 years ago
The instructions in a program, when expressed in Python, ...
sergejj [24]

Answer:

can only be carried out by computers, as long as an interpreter is available which one is it?

Explanation:

The interperetor needed is called CPython, this is the standard C implementation of the language.

7 0
3 years ago
Hubs connect network hosts in which configuration?
nataly862011 [7]

Answer:

A high availability hub is not required to enable or use the self-describing agent. You can optionally configure a high availability hub for improved availability and recovery if the hub fails. Network Layer – The network layer is responsible for creating a routing table, and based on the routing table, forwarding the input request. Some of the Devices used in the Network Layer are, Routers: A router is a switch-like device that routes/forwards data packets based on their IP addresses.

Explanation:

(hope this helps can i plz have brainlist :D hehe)

8 0
3 years ago
The 16 broad career options developed by the US department of education are called
In-s [12.5K]
The answer is career clusters. 
6 0
3 years ago
Explain how any simple substitution cipher that involves a permutation of the alphabet can be thought of as a special case of th
Kaylis [27]

A simple substitution cipher takes each vector (e_i) and assigns it to the vectors [e_{\pi (i)}] in a one-to-one function so as to make them equivalent.

<h3>What is the Hill cipher?</h3>

In 1929, the Hill cipher was invented by Lester S. Hill and it can be described as a poly-graphic substitution cipher that is typically based on linear algebra and it avails a cryptographer an ability to simultaneously operate on more than three (3) symbols.

In Cryptography, the simple substitution cipher is usually viewed as a function which takes each plaintext letter (alphabet) and assigns it to a ciphertext letter. Thus, it takes each vector (e_i) and assigns it to the vectors [e_{\pi (i)}] in a one-to-one function so as to make them equivalent.

Read more on Hill cipher here: brainly.com/question/13155546

#SPJ1

6 0
2 years ago
Other questions:
  • How to write a self-analysis essay
    5·1 answer
  • Why are ethics important in PR?
    8·1 answer
  • A bluetooth network consists of _____ primary device(s) and up to ____ secondary devices.
    8·1 answer
  • Which network component blocks status?
    9·1 answer
  • What is an avenue in a Karel world?
    6·2 answers
  • Which command would you use to swap the words hither and yon on any line with any number of words between them? (You need not wo
    5·1 answer
  • Var1 = 1<br> var2 = 2<br> var3 = "3"<br> print(var1 + var2 + var3)
    5·1 answer
  • takes the perspective that a program describes what the solution to a problem is, not how that problem is solved. Select one: a.
    5·1 answer
  • Tasks you can perform online include which of the following?
    13·1 answer
  • write a program which prompts the user for a celsius temperature, convert the temperature to fahrenheit, and print out the conve
    6·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!