1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
Hatshy [7]
3 years ago
8

Who used the term" software" first?

Computers and Technology
2 answers:
saul85 [17]3 years ago
5 0

The answer is John W. Tukey

hope this helps ^ ^

Mazyrski [523]3 years ago
4 0
John W. Tukey
The first published use of the term "software" in a computing context is often credited to American statistician John W. Tukey, who published the term in "The Teaching of Concrete Mathematics," American Mathematical Monthly, January 9, 1958.
You might be interested in
3. An open source software operating system<br> TYPE THE ANSWER
kkurt [141]

Answer:

allows users to adapt it for any purpose often open to the public

3 0
3 years ago
Create a class in JobApplicant.java that holds data about a job applicant. Include a name, a phone number, and four Boolean fiel
Amanda [17]

Answer:

// Here is JobApplicant.java

public class JobApplicant {   // class name

private String name;   // String type private data member/field to hold name of the applicant

private String phoneNum;  // String type private data member to hold phone number of the applicant

private boolean word;  // boolean private data member to check the word processing skill of applicant

private boolean spreadsheet;  // boolean private data member to check the spreadsheets skill of applicant

private boolean database;  // boolean private data member to check the database skill of applicant

private boolean graphics;  // boolean private data member to check the graphics skill of applicant

public JobApplicant(String name, String phNum, boolean wrd, boolean sprdsht, boolean db, boolean graph){  //parameterized constructor that accepts values for each of the fields

this.name = name;  

this.phoneNum = phNum;  

this.word = wrd;  

this.spreadsheet = sprdsht;

this.database = db;  

this.graphics = graph;  }  

public String getName() {  //accessor get method for name field

return name;  }  

public String getPhoneNum() {   //accessor get method for phoneNum field

return phoneNum;  }  

public boolean getWord() {   //accessor get method for word skill

return word;  }

public boolean getSpreadsheet() {   //accessor method for spreadsheet skill

return spreadsheet;  }

public boolean getDatabase() {   //accessor get method for database skill

return database;  }

public boolean getGraphics() {   //accessor get method for graphics skill

return graphics;   }  }

                     

Explanation:

// Here is the TestJobApplicants.java

public class TestJobApplicants {   // class name

public static void main(String[] args) {  //start of main() function

JobApplicant applicant1 = new JobApplicant("applicant1", "123", true, true, true, false);  //creates object of JobApplicant class named applicant1 and instantiate it by using constructor of JobApplicant. Here the name field is set to applicant1, phoneNum is 123, the skills word, spreadsheet and database is set to true while skill graphics is set to false

JobApplicant applicant2 = new JobApplicant("applicant2", "456", true, true, true, true);  //creates another object i.e. applicant2 of JobApplicant class and passes values of each field of the class to the constructor of class

JobApplicant applicant3 = new JobApplicant("applicant3", "789", true, false, false, true);  //creates another object for other applicant i.e. applicant23 of JobApplicant class and passes values for each field of the class using constructor of class

isQualified(applicant1);  //calls isQualified boolean method by passing object applicant1 to it in order to determine whether applicant is qualified for an interview

isQualified(applicant2);  //calls isQualified method to determine whether applicant2 is qualified for an interview

isQualified(applicant3); }   //calls isQualified method to determine whether applicant3 is qualified for an interview

public static boolean isQualified(JobApplicant applicant) {  //boolean method to determine if applicant is qualified for interview

 int skills = 0;  //initializes the skills count to 0

 boolean isQualified;  //boolean variable whose value determines if applicant is qualified for interview

 final int requireSkills = 3;  //at least 3 skills are required so the maximum value of skills is 3 and this is assigned to requireSkills variable

 if(applicant.getWord())  /*The applicant object is used to call method getWord() which returns the current value of word field (true/false) for the current applicant and if condition checks if applicant has word processing skills. */

  skills++;  //add 1 to the count of skills when above if condition evaluates to true

 if(applicant.getSpreadsheet())  //if applicant has spreadsheet skills

  skills++;  //add 1 to the count of skills

 if(applicant.getDatabase())  //if applicant has database skills

  skills++;  //add 1 to the count of skills

 if(applicant.getGraphics())  //if applicant has graphics skills

  skills++; //add 1 to the count of skills

 if(skills >= requireSkills){  //if the skills count is at least 3 or more

  isQualified = true;  //value of isQualified is set to true when above if condition evaluates to true which means the user is qualified for interview

System.out.println(applicant.getName()+ " is qualified for interview!");}  //displays this message if isQualified is true

 else  //if the value of skills is less than 3

 { isQualified = false;  // isQualified is set to false which means the user is not qualified for interview

System.out.println(applicant.getName()+" is not qualified for interview!");}  //displays this message if isQualified is false

  return isQualified;   }  } //returns the value of isQualified (true/false)

6 0
4 years ago
What is the difference in adware and spyware
Katarina [22]

Generally speaking, adware is a program that installs an additional component that feeds advertising to your computer, often by delivering pop-up ads or by installing a toolbar in your browser.

Some adware may hijack your browser start or search pages, redirecting you to sites other than intended. Unless you're a fan of guerrilla marketing, such tactics can be annoying. Worse, the mechanism that feeds the advertising can introduce system anomalies or incompatibilities that cause problems with other programs and can even disrupt the functioning of the operating system.

Spyware surreptitiously monitors your computer and internet use. Some of the worst examples of spyware include keyloggers who record keystrokes or screenshots, sending them to remote attackers who hope to glean user IDs, passwords, credit card numbers, and other sensitive information.

Most often, though, spyware takes a more benign but still quite offensive form. The information gathered, often referred to as "traffic data," can consist of monitoring the websites visited, ads clicked, and time spent on certain sites. But even in its more benign form, the collected data can morph into something far more insidious.

Hope this helped.. ;D

3 0
3 years ago
Read 2 more answers
Write a C program (doublecopy) that allows a user to extract some part of an existing file (fileSource) and copy it twice to a n
Slav-nsk [51]

Answer:

Check the explanation

Explanation:

#include <stdio.h>

#include <sys/stat.h>

#include <stdlib.h>

#include <fcntl.h>

#include <errno.h>

#include <unistd.h>

extern int errno;

struct stat st;

int main(int argc, char **argv){

  int num1 = atoi(argv[1]); // Getting num1 from user

  int num2 = atoi(argv[2]); // Getting num2 from user

  char *fileSource = argv[3];

  char *fileTarget = argv[4];

 

  int source_fd = open(fileSource, O_RDONLY); // opening the file in read only mode

  int target_fd = open(fileTarget, O_WRONLY | O_CREAT); // opening the target file in Writeonly mode if file is not found it will create

   

  char *ch = (char *) calloc(num2+num1, sizeof(char));

 

  stat(fileSource, &st);

  if(st.st_size < (num1 + num2)){

      printf("File Size is smaller than the specified bytes\n");

      read(source_fd, ch, st.st_size); // reading the file upto the end

      write(target_fd, ch, st.st_size); // write to the file

      write(target_fd, ch, st.st_size); // two times writing to the file

  }else{

      if(lseek(source_fd, (off_t)num1, SEEK_SET) < 0 ) // moving the cursor to after the specified bytes from the start

      {

          printf("Some Error occured while seeking the file");

          return -1;

      }

      read(source_fd, ch, num2); // reading num2 bytes from the source

      write(target_fd, ch, num2); // writing two times to the target

      write(target_fd, ch, num2);

     

  }

 

  return 0;

 

}

1 2 #include <stdio.h> #include <sys/stat.h> #include <stdlib.h> #include <fcntl.h> #include <errno.h> #include <unistd.h> 4

The code screenshot and code output are attached below.

3 0
3 years ago
A material systems developer typically combines the skills of a programmer with the multitasking expectations of a
shusha [124]

Explanation:

Material systems developer typically combines the skills of a programmer with the multitasking expectations of developing 3 dimensional models of objects, enhancing the graphical effects.

don't delete my answer this time i try to help ppl

3 0
3 years ago
Other questions:
  • Which of the following are advantages of a local area network, as opposed to a wide area network? select three options
    15·1 answer
  • Assume you're using a 3 button mouse. to access shortcut menus, you would
    6·2 answers
  • Which resource do programmers sometimes have to refer to and use during planning the logical steps of the solution?
    10·2 answers
  • You are in the middle of a big project at work. All of your work files are on a server at the office. You want to be able to acc
    6·1 answer
  • Availability is an essential part of ________ security, and user behavior analysis and application analysis provide the data nee
    14·1 answer
  • If your organization hires a new employee, what would you do to create a user account in the Linux system and add the account to
    11·1 answer
  • In my mouth In my hair..........​
    15·2 answers
  • According to the video, which tasks do Police Patrol Officers perform? Select all that apply.
    15·2 answers
  • Who would benefit from using self-driving cars
    10·2 answers
  • Please tell fast plzzzzzzzzzzz.​
    9·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!