1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
Novay_Z [31]
3 years ago
13

Slide rule was the first mechanical calculator. true or false​

Computers and Technology
2 answers:
drek231 [11]3 years ago
7 0

Answer:

False. Pascal's calculator was the first mechanical calculator invented by Blaise Pascal in the mid 17th century.

Mashcka [7]3 years ago
3 0

Slide rule was the first mechanical calculator.

FALSE

You might be interested in
Who is primarily responsible for ensuring cybersecurity in society? Select 3 options.
svp [43]

Answer:

Explanation:

law enforcement organizations

cybersecurity specialists

individual users of technology

...bro if you thought it was jackers and fraudsters, i fear for you!!! lol.

7 0
3 years ago
Please help due today please help me!!!!!
irakobra [83]
A plotter is a special output device used to produce hard copies of large graphs and designs on paper, such as construction maps, engineering drawings, architectural plans and business charts.
~

Computer output devices receive information from the computer, and carry data that has been processed by the computer to the user. Output devices provide data in myriad different forms, some of which include audio, visual, and hard copy media.
~

They are electroacoustic transducers, which convert an electrical signal to a corresponding SOUND.
3 0
4 years ago
FOR ALL PLATO USERS:
aleksley [76]

You have to ask you teacher to show you which ones you got wrong and the answers to them.

6 0
4 years ago
Read 2 more answers
By default, tables are sorted in ascending order by this.<br><br><br> What’s the answer?
raketka [301]

Answer:

Record number

Explanation:

It simply can't be "data type" as there cant be more than one data type in a field. It won't be "primary key field" either as primary keys only set the field as unique. You can test this by changing the primary key to a different field. But for simplicity's sake, I did this experiment for you.

As you can see in the first and second attachments, ID is the primary key, set default by the program.

But when I set Field 8 as the primary key, shown in the third attachment, field 8 doesn't sort, shown in the fourth attachment.

5 0
3 years ago
Read 2 more answers
Which combination of options is the keyboard shortcut to access the Find dialog box and search a worksheet for particular values
I am Lyosha [343]
<h3>Answer:</h3>

\boxed{Ctrl}+\boxed{F}

<h3>Explanation:</h3>

To remember this, remember that the F in Ctrl+F stands for “Find”.

Ctrl+H is a similar function called Find and Replace, which allows you to search for a value then replace all instances of it with a new value.

Ctrl+R fills from the selected cell(s) and to the right.

Ctrl+E activates the Flash Fil feature, which recognizes a pattern and fills in remaining cells automatically.

8 0
4 years ago
Other questions:
  • Wi-Fi is all around us. Is there any downside to its pervasiveness?
    11·1 answer
  • What is the name for the percentage of people who don't have jobs in a country or area?
    11·2 answers
  • Two of the goals of community mobilization are getting the community interested and
    6·1 answer
  • What is the primary benefit of using solid state storage
    7·1 answer
  • Which scenario could be represented by the given graph?
    14·1 answer
  • Write a C function which takes three parameters which are the cost for an item in a grocery store, the quantity to buy, and the
    12·2 answers
  • Menus are attached to the windows by calling
    15·1 answer
  • Which of the following is an example of metadata about a webpage?
    7·2 answers
  • A co-worker is called away for a short errand and leave the clinical PC logged onto the Confidential Information System. You nee
    9·1 answer
  • A ____ attack is much more substantial than a dos attack because of the use of multiple systems to simultaneously attack a singl
    8·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!