In 1956, the unit byte was coined by American statistician and computer scientist John Tukey
True or False (Give Explanation)​

Answers

Answer 1

Answer:

False

Explanation:

John Wilder Tukey was an American mathematician and statistician, best known for the development of the Fast Fourier Transform (FFT) algorithm and box plot. The Tukey range test, the Tukey lambda distribution, the Tukey test of additivity, and the Teichmüller–Tukey lemma all bear his name. He is also credited with coining the term 'bit' and the first published use of the word software.


Related Questions

what computer is designed for particular application​

Answers

Answer: Applications for desktop or laptop computers are sometimes called desktop applications, while those for mobile devices are called mobile apps. When you open an application, it runs inside the operating system until you close it

Explanation:

predict what the world would be like if no one tried to think critically. explain your predictions

Answers

The world would be in chaos and we would all be dead duh.

Get ready to be the Quizmaster! You are going to design your own Python game show in the style of a quiz.

Think of a genre (science, music, math, sports, video games, etc.) and create at least 10 questions. You can decide whether you want to make the questions multiple choice or not. Then go to OnlineGDB to get programming.

Your quiz program must have the following items:

It must start by asking the user what their name is and welcoming them to your quiz. It pays to be polite!
Set up a variable to keep score. It is up to you how to design the points system. Will you give them 10 points for a correct answer and 0 for an incorrect answer? Or perhaps you will be tough and take away points for an incorrect answer!
Ask your 10 quiz questions. If they get a question wrong, be sure to tell the user what the correct answer was. Then adjust the score appropriately, depending on whether their answer was right or wrong.
At the end of the program, tell the user their score.
Need an extra challenge? Try the following. These are not required.

Research how to use the lower() or upper() functions to allow the user to capitalize their answer (or not) and still receive credit as a correct answer.
Tell the user what percentage of the questions they got correct!
Make sure to click the save button. Then click Share and copy the link to your program. Paste it in a word processing document and submit it using this unit’s dropbox.

Answers

Answer:

"Are apples Magenta?"\n(a) yes\n(b) sometimes\n (c) no\n\n",

"Are apples Teal?"\n(a) yes\n(b) sometimes\n (c) no\n\n",

"Are apples Gray?"\n(a) yes\n(b) sometimes\n (c) no\n\n",

"Are apples Green?"\n(a) yes\n(b) sometimes\n (c) no\n\n",

"Are apples Cyan?"\n(a) yes\n(b) sometimes\n (c) no\n\n",

]

Questions(Question prompts[0], "a")

Questions(Question prompts[1], "c")

Questions(Question prompts[2], "c")

Questions(Question prompts[3], "c")

Questions(Question prompts[4], "c")

Questions(Question prompts[5], "b")

Questions(Question prompts[6], "c")

Questions(Question prompts[7], "c")

Questions(Question prompts[8], "a")

Questions(Question prompts[9], "c")

Explanation:

Answer:"Are apples Magenta?"\n(a) yes\n(b) sometimes\n (c) no\n\n",

"Are apples Teal?"\n(a) yes\n(b) sometimes\n (c) no\n\n",

"Are apples Gray?"\n(a) yes\n(b) sometimes\n (c) no\n\n",

"Are apples Green?"\n(a) yes\n(b) sometimes\n (c) no\n\n",

"Are apples Cyan?"\n(a) yes\n(b) sometimes\n (c) no\n\n",

Explanation:

Which of these problems is correct if the numbers are binary numbers?Group of answer choices1 + 1 = 21 + 1 = 100 + 0 = 11 + 0 = 10

Answers

Answer:

The last one is correct.  

Explanation:

One of the best ways to code effective programs is to write so-called _______ programs, using the sequential, selection, or repetition logic structures.

Answers

One of the best ways to code effective programs is to write so-called structured programs, using the sequential, selection, or repetition logic structures.

Structured programs are program types that aim to improve the clarity of program codes to make them readable and reusable.

Structural codes such as the if/then/else for selection and while/for repetition are used to achieve these goals.

So, structured programs are used to write programs that follow the sequential, selection, and repetition logic structures.

Learn more about structured programs here:

https://brainly.com/question/25770844

Pomelo and Calamansi Trees are type of plants that suitable in this method.A. Cleft-Grafting B. Marcotting C. Layering D. T-Budding

Answers

Pomelo and Calamansi Trees are type of plants that suitable in this method.A. Cleft-Grafting

This is an image of the ...........................Topology.

if answer Correct i will mark the first person brainly.​

Answers

Answer:

Mesh

Explanation:

Is this statement true or false? Title text boxes on every slide must be the same format. True false.

Answers

false as you can adjust the boxes to your liking even add more if needed

what method does a gsm network use to separate data on a channel?

Answers

It uses TDMA method

Aurelia is designing a user interface for a new game app. Which of the following should she taken into consideration for the user interface?

A.
how many variables will need to be used

B.
what inputs the game will need to take in from the user

C.
what type of loops will be used

D.
whether an array will need to be used

Answers

Answer:

C

Explanation:

what types of loop will be used.

how does digital and hybrid computers differ in storage​

Answers

Digital computers perform functions like mathematical, complex calculations, media streaming, etc. While hybrid computers work with the duo combination of analog (analog Quantities like the voltage, temperature) and digital (mathematical functions, complex calculations, media streaming) computers at the same time.

Wikis are designed for ________, which is allowing people to contribute more than just posting a response

Answers

Answer:

collabirations

Explanation

Wikis are designed for collabirations, which is allowing people to contribute more than just posting a response.

the service you are attempting to use is restricted

Answers

Services can be restricted due to different factors. If when an individual have received calls on their cell phone and the device's caller ID shows "Unavailable" or "Restricted," It can be due to a lot of factors.

Note that caller ID designations are brought about by the settings on the caller's end or network restrictions and not the phone's settings.

When a Cell phone calls designated shows "Unavailable" on a phone's caller ID, it means that the placed from an area or region is, is where the wireless service provider or phone company cannot be able to retrieve that phone number.

A "Restricted" phone call is said to be a call from a caller who has blocked one's phone so that you cannot identify their number.

Learn more about restricted from

https://brainly.com/question/15870692

Question 11
Methods that return a decimal value must be declared using what type?


a. int

b. void

c. double

d. String

e. null


Question 12

Which of the following is true when x = 15?


a. (x >= 15) && (x < 13)

b. !(x > 13) || (x > 16)

c. (x > 13) && (x < 17)

d. (x < 15) || (x > 15)

e. (x <= 13) || (x >= 17)

Answers

Answer:

11. a, 12.c

Explanation:

bc numbers must be declared as ints and 15 is greater than 13 but lesser than 17

Which of the following is true regarding computer science careers?
A. There are a limited number of jobs in this field.
B. There are not different job types in this field.
C. The number will increase over the next several years.
D. You must be a programmer to work in this field.
(WILL MARK BRANLIEST IF CORRECT)

Answers

Answer: There are several different job types in this field.

Explanation: did the test and got it right

Answer:

A or C!

Explanation:

Im pretty sure its one of those answers. I think its C though! If I'm wrong, please tell me! I just did the test and I forgot if I got it right or not. It wont let me go back in-

- A FLVS student with a 99.91 percent in computer science (Totally not bragging!)

hiiiiiiiiihwdawdfgthnythgrfergthyjuhgfd

Answers

Answer:

Your answer would be gas.

Explanation:

Steam is just water just evaporated.

no i will not marry u

python Better Password Prompt
Write a program that uses a loop and a half to prompt a user for a password. You should prompt the user for the password. If they get it correct, break out of the loop. If they don’t get it correct, you should give them an error message and ask again.

Sample Run:

Enter password: 123123
Sorry, that did not match. Please try again.
Enter password: password
Sorry, that did not match. Please try again.
Enter password: CODEHS
Sorry, that did not match. Please try again.
Enter password: abc123
You got it!
Note: You need to set SECRET to abc123 to run the tests

Answers

We use an indefinite while loop to keep the user entering the password. In the loop, we use if-else structure to check the password. If it is "abc123", the password is found and stop the loop using a break. Otherwise, the password is not correct. Note that since we do not use any break statement in the else part, the loop will continue asking for the input

Comments are used to explain each line of the code.

You may see the output in the attachment.

#set the SECRET

SECRET = "abc123"

#create a loop

while True:

   

   #ask the user to enter a password

   password = input("Enter password: ")

   

   #check if the password is equal to SECRET

   # if it is, state that password is correct and stop the loop using a break

   # otherwise, state that password is not correct

   if password == SECRET:

       print("You got it!")

       break

   else:

       print("Sorry, that did not match. Please try again.")

Here is another question related to the loops:

https://brainly.com/question/25694810

what will the computer do in response to a line of code reading # name = input("What is your name?") print “What is your name?” print “name =” nothing return a syntax error

Answers

The computer will do nothing in response to the instruction # name = input("What is your name?")

The instruction is given as:

# name = input("What is your name?")

The above instruction is a Python instruction.

In Python, lines that begin with # are not executed, because they are treated as comments.

This means that, the computer will not do anything when it comes across the instruction

Read more about Python instructions at:

https://brainly.com/question/19344465

define management styles

Answers

Answer:

man·age·ment style

noun

plural noun: management styles

the methods used by a person in managing an organization or group of people.

"the players seemed to lose confidence in his management style"

Explanation:

lol is that good?

Answer:

A Management style is the particular way managers go about accomplishing these objectives.

c) Put these stages into the correct order.
(i) Script (ii) aim
(iii) Outline

Answers

Answer:

Aim

Script

Outline

Yan po answer, wag nang echoss mwa mwa

If you know that a file for which you are searching starts with the letters MSP, you can type ____ as the search term.

Answers

Map I think it is the answer

why is computer economics important?​

Answers

Answer:

Explanation:

Advances in computing power and artificial intelligence will allow economists to test and develop many economic theories which have previously been very difficult to empirically test. In macroeconomics, we often rely on historical data to estimate market responses to recessions and other shocks in the economy since conducting experiments is at best unwieldy, unethical, and often impossible. Building AI which acts kind of human in market conditions and which is capable of adaptive strategies may allow researchers to simulate markets on a macro scale. Attempts have already been made in online video games which have virtual economies.

1. Encrypt this binary string into cipher text: 110000. Include in your answer the formula the
decoder would use to decrypt your cipher text in the format (coded answer) x N mod (m)
= Y
2. Decrypt this cipher text into a binary string: 106

I am very stuck and still don’t know how these work.

Answers

Answer:

Encrypt this binary string into ciphertext: 110000. Include

in your answer the formula the decoder would use to decrypt your cipher text in the format (coded answer) x N mod (m) = Y

-Decrypt this ciphertext into a binary string: 106

Now that you can see how public and private keys work in a real-world scenario, please explains how it works for computers and internet communications in relation to cybersecurity.

Explanation: ……………..

On the following page, write a static method print Short Words that accepts two parameters:_____.
a. a String str containing a list of words (separated by spaces), and an integer maxLength .
b. This method should print out the words in str whose lengths are at most maxLength.
c. You can assume there will always be a space after the last word in the string.

Answers

Methods in Java are collections of program statements that are named, and executed when called/invoked

The printShortWords method in Java where comments are used to explain each line is as follows:

//This defines the static method

public static void printShortWords(String str, int maxLength){

    //This iterates through each word in the string

    for(String word: str.split(" ")){

        //The compares the length of each word to maxLength

        if(word.length()<=maxLength){

            //If the length of the current word is atleast maxLength, the word is printed

        System.out.print(word+" ");

        }

    }

}

Read more about static methods at:

https://brainly.com/question/19360941

If two nearby wireless devices (for example, a cordless phone or a wireless client) transmit using overlapping frequencies, those devices can interfere with one another. What is the term given to this type of interference

Answers

Answer:

wireless interference

Wireless interference is the term given to this type of interference.

What is wireless devices?

Any gadget that has the ability to communicate with an ICS net via microwave or infrared light, often to gather or maintain the data but occasionally to managing different set - point. Mobile nodes are any gadgets that communicate via RF signals. These gadgets include phone, baby monitors, and mechanical door openers, to name a few.

An intervention in communications occurs when a signal is altered in a disruptive way while it passes along one transmission medium in between the source and recipient. The phrase is frequently employed to refer to the addition of undesirable information to a signal that is otherwise good. Common illustrations include: electric sabotage (EMI).

Learn more about wireless devices, Here:

https://brainly.com/question/9979629

#SPJ5

Which is the best autoclicker for godbrigding

Answers

The best auto clicker for godbrigding is

software ............. the hardware what to display on the user's screen​

Answers

A monitor? This displays on the users screen but I’m not sure if that’s what your asking good luck on finding the right answer.

what is a copy of a theme with different color schemes called?

Answers

Answer:

A copy of a theme with different color schemes is called a Variant

Explanation:

write the feature of ms-dos ?​

Answers

Answer:

Here you go

Explanation:

Features of MS Word :

Home

This has options like font colour, font size, font style, alignment, bullets, line spacing, etc. All the basic elements which one may need to edit their document is available under the Home option.

Insert

Tables, shapes, images, charts, graphs, header, footer, page number, etc. can all be entered in the document. They are included in the “Insert” category.

Design

The template or the design in which you want your document to be created can be selected under the Design tab. Choosing an appropriate tab will enhance the appearance of your document.

Page Layout

Under the Page Layout tab comes options like margins, orientation, columns, lines, indentation, spacing, etc.  

References

This tab is the most useful for those who are creating a thesis or writing books or lengthy documents. Options like citation, footnote, table of contents, caption, bibliography, etc. can be found under this tab.

Review

Spell check, grammar, Thesaurus, word count, language, translation, comments, etc. can all be tracked under the review tab. This acts as an advantage for those who get their documents reviewed on MS Word.

Source: https://byjus.com/govt-exams/microsoft-word/

Drag each label to the correct location on the image.
Identify the parts of the URL.
World Wide Web
server name
resource ID
protocol
domain name

Answers

Answer:

1) Resource ID

2) Server Name

3) Domain Name

4) World Wide Web

5) Protocol

The correct location is Resource ID, Server Name, Domain Name, World Wide Web, Protocol respectively.

What is a website?

The Online Etymology Dictionary states that in 1994, the word "website" first appeared in the English language.

It combines "Web," used in the meaning of the Internet, with "Site." The study of word origins and how their meanings changed over time is known as etymology. The web address of every website begins with "http://".

The website may be one of many various forms, such as an e-commerce website, a social media website, or a blog website. Each website serves a unique purpose, but they all have the feature of having numerous linked web pages.

Resource ID, Server Name, Domain Name, World Wide Web, and Protocol are the right locations, accordingly.

Thus, this is the correct answers for the given situation.

For more details regarding a website, visit:

https://brainly.com/question/29777063

#SPJ2

Other Questions
What is the process of solar nuclear fusion? Explain: Maintaining national security in the new republic Help me!!Why was the Albany Plan of Union geographically difficult?(Real answers only!!! Please and thank you) 2) Nitrogen gas will react with hydrogen gas to produce ammonia, NH3, How manymoles of hydrogen gas are required to produce 0,86 moles of NH3? 10 PTS. What is a more formal way of saying "not going anywhere"? ie. "This conversation is not going anywhere" When was Mark Twain born? A virus attacked 175,245 people in city A and 1,486,964 people in city B. How many people in all were affected? Thank you in advance:) What led to the significant growth in the study of DNA after 1977 and why? Which is the healthiest strategy for coping with strong emotions?A. Write down the reason you are upset and focus on the person who upset you.B. Engage in an activity you like, such as listening to music, to create calm as you identify your emotion.C. Express your emotions freely by yelling and stomping your feet in a free space. 3. Proteins are responsible for many of our traits.How can a substitution mutation affect aperson's traits?A. This mutation stops DNA from replicating.B. This mutation prevents ribosomes fromsynthesizing proteins.C. This mutation changes the number ofchromosomes a person has.D. This mutation causes a change in the proteinthat forms during translation. To gain access to the functions and variables of a library module, use a(n) _________ statement. A. import B. export C. global D. library Emma runs 12 miles in 5 hours. How many miles can Emma run per hour? the structures responsible for carrying information all over your body are Tom is stringing up Christmas lights on his house. The first 2 strings of light have the same number of light bulbs. The 3rd string of light has 12 more light bulbs;? 7 than the first 2 strings. There are a total of 88 light bulbs. How many light bulbs are on the first string? 10. In ordernumber the vocabulary from smallest to largest: Earth Moon Galaxy Sun Meteorite Que derivados del petrleo se utilizan en la fabricacin de materiales deportivos? Who is depicted in the image above? Q: What did God give to Abraham and his descendants? how do the prefixes of the saccharide words relate to the structure of the sugar? If total advertising expenditures on television advertising declined 4.1% to $141.7 billion in the current year, how much was spent on television advertising in the previous year? Round your answer to one decimal.