1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
Lilit [14]
2 years ago
8

P.W. Singer jokes about how many people are using Wang computers. What point is he making with this joke?

Computers and Technology
1 answer:
maw [93]2 years ago
6 0

P.W Singer stated:

"And think about it this way: We don't use Wang computers anymore, or Commodore 64s, kids don't play Atari videogames. Those companies may have been at the forefront of the digital revolution, they're not anymore. Same thing in war. You know the British invent the tank. The Germans figure out how to use the tank better,"

Enjoy

<em>Please have a great day <3</em>

You might be interested in
Which sentence best describes a lifestream?
Law Incorporation [45]
Hoi!

The correct answer is "A lifestream is a time ordered stream of documents that acts as a user's online diary."

Lifestreaming documents and shares daily moments of someone's online life. :)
6 0
3 years ago
Read 2 more answers
What is the main reason for assigning roles to members of a group?
ch4aika [34]

Answer: it creates leadership and direction for the team, making it easier to work together for a common purpose.

Explanation:

The reason for assigning roles to members of a group is that it creates leadership and direction for the team, making it easier to work together for a common purpose.

When roles are delegated to the members of a group, each person gets his or her own part of the job or project. This makes it easier to work together and as a team. It also ensures that the project is handled well and faster as it creates a direction.

3 0
3 years ago
Read 2 more answers
How are companies protecting their users from internet assault
cluponka [151]

Answer: Companies and organization are taking several steps to secure their user from internet abuse  .The methods are mentioned as follows:-

  • Offering security technologies in the form of package along with the service so that the protection resource is not required to be installed or bought from elsewhere such as antivirus technologies.
  • Using the web servers that are available with high security features
  • Using the websites that persist the built-in feature of giving virus or malicious interruption warnings so that user can become alert
  • Making users aware about internet abuse and provide information so that they can identify such happening in the service.

4 0
4 years ago
What would be the effect of an addition or a deletion of one of the bases in a codon?
Ray Of Light [21]

Answer: When a nucleotide is wrongly inserted or deleted from a codon, the affects can be drastic. Called a frameshift mutation, an insertion or deletion can affect every codon in a particular genetic sequence by throwing the entire three by three codon structure out of whack.

Explanation:

5 0
2 years ago
Write a function match that takes a valu * pattern and returns a (string * valu) list option, namely NONE if the pattern does no
yan [13]

Answer:

Check the explanation

Explanation:

fun match (v,p)   =

    case (v,p) of  

     (_,Wildcard) => SOME []

    |(Const v1,ConstP p1) =>if v1 = p1 then SOME [] else NONE

    |(Unit,UnitP) =>SOME []

    |(Constructor (s ,v1),ConstructorP (s1, p1) ) => if s = s1 then match(v1,p1) else NONE

    |(Tuple vs,TupleP ps) => if List.length vs = List.length ps  

                             then case all_answers match (ListPair.zip(vs,ps))  of

                                   SOME v2=>SOME v2

                                  |_ => NONE

                             else NONE

    |(_, Variable s ) => SOME [(s,v)]

    |(_,_) => NONE

5 0
4 years ago
Other questions:
  • What are some of the good effects of social media
    7·1 answer
  • Crystal detected a problem in a computer network, due to which she could not send or receive data within the network. She pings
    5·2 answers
  • 1. How do channels differ from layers?
    11·1 answer
  • What type of USB connector is always plugged into the computer to connect in external device
    14·1 answer
  • What is a pin? part of a connector a port part of a cable a NIC
    14·1 answer
  • Write a program to read 10 integers from an input file and output the average, minimum, and maximum of those numbers to an outpu
    14·1 answer
  • Your customer then asks you if it would be worth the investment for him to have Ethernet cabling installed to reach each of his
    7·2 answers
  • Write a recursive method that returns the number of 1’s in the binary representation of N. Use the fact that this is equal to th
    9·1 answer
  • . Aisha’s supervisor asks her to create an aspect of a program that will hold data and make it easy to access. What does Aisha n
    5·1 answer
  • on early ethernet networks, all computers were connected to a single wire, forcing them to take turns on a local area network (l
    6·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!