1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
lozanna [386]
3 years ago
5

Who is the father of modern computer?​

Computers and Technology
2 answers:
arsen [322]3 years ago
8 0
Alan Turing is considered by many to be the father of modern computer science as the world knows it. He formed the concept of the algorithms and computations with one of his inventions, the Turing machine.
nydimaria [60]3 years ago
7 0

Answer:

I would say Alan Turing is the father of the modern computer

You might be interested in
Write a recursive function that returns true if the digits of a positive integer are in increasing order; otherwise, the functio
deff fn [24]

Answer:

C code implementing the function:

#include<stdio.h>

int isIncreasing(int m);

void main()

{

int y, t;

 

printf("Enter any positive integer: ");  

scanf("%d", &y);

 

t= isIncreasing(y); //call the functoion isIncreasing(int m)  

 

if(t==1) //if isIncreasing(int m) returns 1, then the digits are in //increasing order

 printf("True:  The digits are in increasing order");

else

 printf("False:  The digits are not in increasing order");

}

int isIncreasing(int m)

{

int d1,d2;

if(m/10==0) //if we reach till the left of left most digit, then all before  //digits were in order. else it won't go upto that.

{

 return 1;

}

d1 = m%10; //d1 holds the right most digit of current m.

if(m%10 !=0)

{

 m = m/10; //m is updated to find the rest digits and compare //them.

 d2 = m%10;//d2 holds the digit just left of the right most digit of //m.

 if(d2 <= d1) // if the right most and it's left digits are in order then //we proceed to left.

 {

  isIncreasing(m);

 }

 else   //else we stop there itself, no need to move further.

  return 0;

}

}

output is given as image.

4 0
2 years ago
For example, consider a file with protection mode 644 (octal) contained in a directory with protection mode 730. How might the f
jeka94

Answer:

Archivo: 110100100 (propietario, grupo, otro: rw- r-- r--)

Directorio: 111 011 000 (propietario, grupo, otro: rwx -wx ---)

Explanation:

Directory permissions are critical. Since group members can access directory ('x') and can modify directory ('w'), even though they can't list directory (not 'r'), it means that if a group member knows the name of the file, that person can also delete it because deleting a file requires permission to write to the directory: file permissions are irrelevant (although commands like 'rm' warn you when you don't have write permission to the file directory , that's a courtesy, because it doesn't matter to the system call 'unlink ()').

Therefore, a member of your group (or, more precisely, a member of the group to which the directory belongs) can delete the file if you know its name. They can also read the file if they know its name, and can create a file with the same name if the original is already missing. Based on the file permissions, being able to read the file is not a compromise - you would have denied group read access (and public read access) if that mattered.

8 0
2 years ago
Write any two merits and demerits of computer​
White raven [17]
I have no idea, i just need points. Good luck
3 0
2 years ago
How do you resolve conflicts in your life??
amm1812

Answer:

What problems?

Explanation:

6 0
2 years ago
When you include a word cover page in a multi page document, the cover page is not considered the first page. True or false?
____ [38]
It ture on the cover page include
4 0
3 years ago
Other questions:
  • Please use Python 3 to solve the following problem. Please also show all outputs and share code.The variable sentence stores a s
    6·1 answer
  • "The pkill command terminates _________."
    14·1 answer
  • You created a vm and installed windows server 2008 r2 over the network, using pxe boot. when you start the vm, it doesn't attemp
    7·1 answer
  • The ___________________ Act makes it illegal to deactivate or otherwise disable any antipiracy technologies including DRM techno
    7·1 answer
  • You have just finished writing a lengthy research paper and you are ready for formatting. You insert your paragraph headings and
    15·1 answer
  • An indicator is a comprehensive analysis of critical information
    8·1 answer
  • The methods in a subclass can use all of the data fields and methods that belong to its parent, with one exception: ____ members
    11·1 answer
  • What are the four types of technical drawing?​
    9·1 answer
  • Write a SELECT statement that returns three columns: EmailAddress, OrderID, and the order total for each customer. To do this, y
    14·1 answer
  • Password ____ traverse the network searching for passwords from remote authentication systems.
    6·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!