1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
In-s [12.5K]
3 years ago
14

Who invented napier bone and when​

Computers and Technology
2 answers:
Alinara [238K]3 years ago
7 0

Answer:

<u>Inventor :</u>   John Napier in Year 1617

Explanation:

He was also the inventor of logarithms (which was  invented to aid calculation known as 'Napier's Bones' in 1617.

kirill115 [55]3 years ago
5 0

Answer:

John Napier in 1617

Explanation:

Napier bones is a calculating device consisting of a set of graduated rods, that is used for multiplication and division, and is based on logarithms.

You might be interested in
What is the correct method to use Dreamweaver to find broken links and orphaned files?
Sindrei [870]

Answer: C

Explanation:

5 0
3 years ago
Describe the difference between the circumscribed and inscribed options when using the AutoCAD Polygon command
marysya [2.9K]

Answer: Describe the difference between circumscribed and inscribed options when using the autocad polygon tool. Circumscribed draws the object around the circle while inscribed draws the object inside the circle. The Length is equal to 5.3151 and the Angle is equal to 41 degrees.

Explanation:

3 0
3 years ago
There are many opportunities for unscrupulous people to break information system security. Of the five components in an informat
7nadin3 [17]

The answer is letter e.

People is the component poses the very large ongoing security risk. It also can be a threat to the safety. People play an essential part in most operational systems and methods. Information, ability and mental outlook often determine the feature and quantity of system output. Just as a stereo requires the right component, high-performance business systems require the right fit of people to work.


8 0
3 years ago
Read 2 more answers
A minor with prior convictions of Minor in Possession (MIP) who is charged with a subsequent MIP may be penalized with a jail se
GarryVolchara [31]
The minor may be penalized with a jail sentence of up to thirty days for his second offence.  A jail sentence of up to sixty days is possible for third offence. Under MCL 436, a minor is someone who is under twenty one years old. Such minors may not purchase, consume or be in possession of any alcoholic liquor. Possession of alcoholic drinks can be actual or constructive. It is actual when you have direct physical control over it and it is constructive when you know where it is and you have reasonable access to it.
3 0
3 years ago
Read 2 more answers
True/False: Software engineering is a field that encompasses designing, writing, testing, debugging, documenting, modifying, and
Natali [406]

Answer:

The answer is "True".

Explanation:

The software engineering is the mechanism by which end-user programs are evaluated and planned, to built and reviewed, and fulfill these needs by using language software programming.

  • The fundamental goal of software engineering is to design software, that uses the techniques and processes, that are applied to make large systems and frequently used to produce quality applications.
  • It is also used in modifying and maintaining software.

7 0
3 years ago
Other questions:
  • Like Tess, Brina has a fascinating job! She works as a software engineer with Instagram. She says that Computer Science is a way
    10·2 answers
  • Choose the appropriate of an image that supports the text. You should also make sure that the image is
    12·2 answers
  • When records are in ____ order, they are arranged one after another on the basis of the value in a particular field.?
    9·1 answer
  • A ______ workstation is a network terminal that supports a full-featured user interface, but limits the printing or copying of d
    5·1 answer
  • Can someone buy me eddie van der tabs???
    13·1 answer
  • You use a 1200 watt hair dryer for 10 mintues a day.
    7·1 answer
  • Give two advantages of representing integers in pure binary.
    5·1 answer
  • What is the worst case time complexity of insertion sort where position of the data to be inserted is calculated using binary se
    13·1 answer
  • what stage is the most inner part of the web architecture where data such as, customer names, address, account numbers, and cred
    11·1 answer
  • Technology that transfers page images composed inside a computer directly to printing plates is called:
    10·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!