1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
aksik [14]
3 years ago
6

Why ada lovelace is known as first computer programmer ?​

Computers and Technology
1 answer:
Murrr4er [49]3 years ago
3 0

Answer:

Ada Lovelace, is known as the fist computer programmer because she was the one who proposed / invented computer programming.

Basically the first person to realize that the analytical engine could "perform arbitrary tasks and wrote programs for those arbitrary task, beyond computational operations."

Hope this helps :)

You might be interested in
In cell I8, enter a nested logical function to display Need to Remodel if the apartment is unoccupied (No) AND was last remodele
galina1969 [7]

Answer:

The Function is given as

=IF(AND(E8="No",G8>10),"Need to remodel","No Change")

Explanation:

The syntax of the IF condition in excel is given as

IF(Test,If true,If false)

So here the test is an and component such that the house has to be unoccupied which is indicated as E8 because the E column contain the occupancy of the apartments, and the G8 is the last remodeling time, so the test statement is the AND operation of the conditions as

E8="No" indicating that house is unoccupied

G8>10 indicating that the last remodelling was more that 10 years ago

So the test is given as

AND(E8="No",G8>10)

Now the statement if the test true is the recommendation for to remodel, so

"Need to remodel"

Now the statement if the test is false is given as

"No Change"

So the overall function becomes

=IF(AND(E8="No",G8>10),"Need to remodel","No Change")

3 0
3 years ago
How does a firewall provide network security
ehidna [41]
Firewalls are connected with a network device which blocks untrusted network forming a barrier in between trusted and un-trusted network.
8 0
3 years ago
What acronym describes networked devices that contain microcomputers but are not thought of as computing devices, such as refrig
vivado [14]
The acronym RFID (Radio Frequency Identification) describes networked devices that contain microcomputers but are not thought of as computing devices, such as refrigerators, automobile components, light bulbs, and industrial control devices. RFIDs are  battery-powered sensors that gather and transmit data to a reading device. Some sensor based technologies are  scanning electron microscopes, LiDAR,radar, GPS, x-ray, sonar, infrared and seismic.



5 0
3 years ago
Which statement is true regarding bitmap images?
horrorfan [7]
<span>Which statement is true regarding bitmap images?</span>
I believe it is D

8 0
3 years ago
Read 2 more answers
Um i'm new here... and i don't know really how to use this... i was wondering if som 1 can help me
blagie [28]

Shining and warm

Collapse 3

JOJO

fate series

Bungou Stray Dog

EVA

Dao Master

Alien invasion

Future diary

Fate of Space

Story Series

Beyond the Boundary

Bayonetta

Onmyoji

Full-time master

How to develop a passerby heroine

Illusion Front

Psychometer

your name

Noragami

One Piece

Senran Kagura

Attacking Giant

Kabaneri of the Iron Fortress

Violet Evergarden

Demon Slayer

Under one person

Guilt crown

Black reef

Star Cowboy

Black Street Duo

Aria the Scarlet Ammo

Hatsune Miku

The last summoner

re creator

Detective Conan

Naruto

grim Reaper

Tokyo Ghoul

Song of Hell

At the beginning

Sword Art Online

Girl opera

Hakata pork bones pulled dough

Sunny

Black bullet

Trembling

On the broken projectile

Black Butler

Destiny's Gate

Persona

God Prison Tower

April is your lie

Ground-bound boy Hanako-kun

League of legends

Clever girl will not get hurt

Tomorrow's Ark

DARLING in the FRANKXX

RWBY

Little Busters

dating competition

Gintama

One Punch Man

The promised neverland

Taboo curse

God of college

Queen of Arms

Sword Net 3

Final fantasy

6 0
3 years ago
Read 2 more answers
Other questions:
  • What acts as a platform on which application software runs?
    8·1 answer
  • The negotiators past relationship will affect current behavior if the parties
    12·1 answer
  • What are the different components of the cloud architecture?
    5·2 answers
  • Which relationship is possible when two tables share the same primary key? one-to-one one-to-many many-to-one many-to-many
    15·2 answers
  • Texture fills are available to add as a slide background true or false
    7·2 answers
  • Create a style rule for the page body that sets the width to 95% of the browser window ranging from 640 pixels up to 960 pixels.
    11·1 answer
  • write a script that creates and calls a stored procedure named insert_category. first, code a statement that creates a procedure
    10·1 answer
  • Suppose a family has had a house fire in which
    7·2 answers
  • A customer is looking for a storage archival solution for 1,000 TB of data. The customer requires that the solution be durable a
    9·1 answer
  • Create a list of 5 potential jobs that students of computer science can obtain.
    9·2 answers
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!