1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
tangare [24]
3 years ago
13

Who invented the system of logarithm in 1614 AD​

Computers and Technology
2 answers:
IgorC [24]3 years ago
8 0

Answer:

<em><u>JOHN </u></em><em><u>NAPIER</u></em>

Explanation:

The method of logarithms was publicly propounded by John Napier in 1614, in a book entitled Mirifici Logarithmorum Canonis Descriptio (Description of the Wonderful Rule of Logarithms). The book contained fifty-seven pages of explanatory matter and ninety pages of tables related to natural logarithms.

lesantik [10]3 years ago
4 0

Answer:

Joost Bürgi

Explanation:

He invented it but John Napier worked on it earlier than Bürgi.

You might be interested in
Which wireless communication technology is most likely used when synchronizing device information to an automobile?
seropon [69]
Bluetooth is the most reasonable answer
8 0
4 years ago
What is not critical when you are first designing a database?
Anvisha [2.4K]
The answer is : What the field names will be.   This <span>is not critical when you are first designing a database.  </span>
8 0
3 years ago
Importance of word processing application​
alina1380 [7]

Answer:

Some of the functions of word processing software include: Creating, editing, saving and printing documents. Copying, pasting, moving and deleting text within a document. Formatting text, such as font type, bolding, underlining or italicizing.

Explanation:

8 0
4 years ago
If a filesystem has a block size of 4096 bytes, this means that a file comprised of only one byte will still use 4096 bytes of s
mars1129 [50]

Answer:

def calculate_storage(filesize):

   block_size = 4096

   full_blocks = filesize // block_size

   partial_block = filesize % block_size

   if partial_block > 0:

       return (full_blocks + 1) * block_size

   return filesize

print(calculate_storage(1))

print(calculate_storage(4096))

print(calculate_storage(4097))

Explanation:

The python program defines the function 'calculate_storage' that calculates the block storage used. It gets the number of blocks used to store the data by making a floor division to get the integer value, then it checks for remaining spaces in the block. If there are spaces left, it adds one to the full_blocks variable and returns the result of the multiplication of the full_blocks and block_size variables.

8 0
3 years ago
A Turing machine with stay put instead of left is similar to an ordinary Turing machine, but the transition function has the for
sasho [114]

Answer:

The class of language the machines recognise is Regular Language (See Explanation Below)

Explanation:

Given

Form δ : Q × Γ → Q × Γ × {R, S}

From the above transition form, it can be seen that the machine cannot read square symbols passed to it.

Regarding the square the machine is currently reading, there are multiple movement of S and it shouldn't be so because any number of the multiple movement can be simulated by exactly one movement of S.

As stated earlier that sequence of moves can be simulated by just one movement.

Let R = the movement

This means the machine can only use right move efficiently.

With this, we can say that the machine only read input string.

This is a characteristic of DFA (Deterministic Finite Automata).

With this, we can conclude that some DFAs will simulate the Turing machine and that they only read regular language.

5 0
3 years ago
Other questions:
  • Nila has created a report, and now she would like to a create table of contents. Nila has reviewed her report and decides to add
    9·1 answer
  • To use hand and power tools safely, you should:
    9·2 answers
  • What is intellectual property?
    7·1 answer
  • The political spectrum spans from Communism on the extreme left to __________ on the extreme right. /8178757/1f6bdbf3?utm_source
    6·2 answers
  • A security manager has discovered that sensitive information stored on a server has been compromised. The organization is requir
    7·1 answer
  • What is virtual office?
    11·1 answer
  • The declaration of variables begins with a command a. dim b. rem c. const​
    8·1 answer
  • Wiliam would like to sort a list of items after the data is already entered
    7·2 answers
  • To calculate perimeter of a rectangle​
    9·2 answers
  • Pls help help me is good help me helping is very good
    10·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!