Who designed the Apple I computer in 1976?

Answers

Answer 1

Answer:

Steve Wozniak

Answer 2

Answer:

Steve Wozniak

Explanation:


Related Questions

Which of the following will increase the level of security for personal information on a mobile device if the device is lost or stolen

Answers

Answer:

this is a very cool day for me yeah know

I would simply just say it is what it ez

(Python)Write an expression using Boolean operators that prints "Eligible" if user_age is greater than 17 and not equal to 25.


Sample output with input: 17

Ineligible

Answers

user_age = input("Input Age: ")

if int(user_age) <= 17:

   print("Ineligible")

elif int(user_age) == 25:

   print("Ineligible")

else:

   print("Eligible")

:Here is some basic code.  It takes an input, turns it into an int type value, and checks the parameters that you gave me.  It errors out when you put in anything but a number.

Answer:

user_age = int(input())

if (user_age > 17) and (user_age != 25):

   print('Eligible')

else:

   print('Ineligible')

Explanation:

the code is very easy to do because it asks for it in Boolean operators.  So user_age = int(input()) ## asks for user input

then it checks the status by seeing if the number is greater than 17 and not equal to 25.  we know that > is greater and we know that != means not equal.  Therefore, this will rule out both and then give the eligible or ineligible statement.

Which of the following tasks could be implemented as a filter using only a constant amount of memory (e.g., a couple of int or double variables and no arrays)? Mark all that apply.
For each, the input comes from standard input and consists of n real numbers between 0.0 and 1.0.

Print the sum of the squares of the n numbers
Print the maximum and minimum values of the n numbers
Print the percentage of numbers greater than the average of the n numbers
Print the median of the n numbers
Print the average of the n numbers
Print the n numbers in uniformly random order
Print the n numbers in increasing order

Answers

Answer:

Print the sum of the squares of the n numbers

Print the percentage of numbers greater than the average of the n numbers

Print the median f n numbers

Explanation:

The computer programs have different configurations based on the assigned tasks. The constant amount of memory is used by the cache. This is the new technology in the computer software which consumes only small amount of memory and activates once the task is assigned to it.

Which career qualification is unique to the Energy Transmission career pathway and not to the Energy Distribution pathway? color vision for identifying differences in colored wires critical thinking and reasoning skills for analyzing information stress management for handling urgent tasks mechanical knowledge and ability to drive and operate machinery working well with customers and being friendly

Answers

Answer:

a, c, d

Explanation:

Answer:

it is just A

Explanation:

on edge. unit test review

Will, there be any presents this year

Answers

Answer:

no why

Explanation:

Best of Luck
for your work and
d
Best wishes for you
.​

Answers

oh, why thank you same to you

Awwwww thank you
( please mark brainliest)

Write a Python program segment, using a loop, to calculate and print the sum of the odd integers from 20 to 120. (Hint: 21 23 25 . . . 117 119)

Answers

Answer:

for x in range(20,120):

   if x % 2 == 0:

       continue

   print(x)

Explanation:

in a range of 20 to 120 it does the following, if x is divisible by two as an int, then try again with a new number. If not, print that number.

Find the max and min of a set of values using recursion Find the max and min of a set of values using recursion. First input the values. The first value inputted is the number of additional data items to input. For instance, if the input is: 3 1 2 3

Answers

Answer:

This question is answered using Python programming language

def MaxSet(mylist, count):  

     if (count == 1):  

           return mylist[0]  

     return max(mylist[count - 1], MaxSet(mylist, count - 1))  

def MinSet(mylist, count):  

     if (count == 1):  

           return mylist[0]  

     return min(mylist[count - 1], MinSet(mylist, count - 1))  

count = int(input("Length of set: "))

mylist = []  

for i in range(count):

     inp= int(input("Input: "))

     mylist.append(inp)

   

print("Minimum: "+str(MinSet(mylist, count)) )

print("Maximum: "+str(MaxSet(mylist, count)) )

Explanation:

This defines the recursion that returns the maximum

def MaxSet(mylist, count):  

This following checks for the maximum using recursion

     if (count == 1):  

           return mylist[0]  

     return max(mylist[count - 1], MaxSet(mylist, count - 1))  

This defines the recursion that returns the minimum

def MinSet(mylist, count):  

This following checks for the minimum using recursion

     if (count == 1):  

           return mylist[0]  

     return min(mylist[count - 1], MinSet(mylist, count - 1))  

The main begins here

This prompts user for length of set

count = int(input("Length of set: "))

This defines an empty list

mylist = []  

The following iteration gets user input

for i in range(count):

     inp= int(input("Input: "))

     mylist.append(inp)

This calls the minimum function    

print("Minimum: "+str(MinSet(mylist, count)) )

This calls the maximum function

print("Maximum: "+str(MaxSet(mylist, count)) )

The ________ feature introduced by instant messaging shows whether a person is logged in and available to answer a question, pick up the phone, or stop by for a brief meeting.

Answers

Answer:

The correct approach is "Presence awareness".

Explanation:

The willingness, at designated occasions, to see which one is available on the internet. When using the IM framework, that very many IM systems show a list of user groups attached to the system. A current model of the IGI Social website is being used by oneself. With either the growing prevalence of Internet chat apps, a Presence Awareness model has been proposed by German IT professionals.

Is the willingness to put a customer’s needs above ones own needs and to go beyond a job description to achieve customer satisfaction

Answers

Answer:

customer-serious orientation

Explanation:

Customer-serious orientation can be defined as the willingness to put a customer’s needs above ones own needs and to go beyond a job description to achieve customer satisfaction.

This ultimately implies that, a customer-serious oriented business firm or company puts the needs, wants and requirements of its customers first without considering their own needs in a bid to satisfy and retain them.

Hence, customer-serious orientation requires the employees working in an organization to show and demonstrate positive attitudes and behaviors at all times.

If a system's instruction set consists of an 8-bit opcode, what is the maximum number of output signal lines required for the control unit?
A) 8 B) 64C) 128 D) 256

Answers

Answer:

D. 256

Explanation:

Given

[tex]Instructions = 8\ bit[/tex]

Required

Determine the maximum number of output

To get the required value, we make use of the following:

[tex]Maximum = 2^n[/tex]

Where n is the bits of the opcode.

i.e.

[tex]n = 8[/tex]

Substitute 8 for n in [tex]Maximum = 2^n[/tex]

[tex]Maximum = 2^8[/tex]

[tex]Maximum = 256[/tex]

Hence, option D answers the question

Lola wants to install an add-in in Excel.She has to unblock the add-in to allow Excel to open the add-in file automatically.To do this,she right clicks on the add-in file and selects an option from the menu. What could the option be?
A) Copy
B) Delete
C) Rename
D) Properties

Answers

Answer:

The correct answer is:

Properties (D)

Explanation:

First of all, option D (Properties) is the option that makes the most sense in this scenario, because the other options: Copy, Delete, and Rename are unrelated commands to what is to be achieved.

Secondly and more practically, an add-in file may not load in excel, and most of the time it is blocked by default and has to be unblocked. The following steps are used:

1. close Excel if it is open

2. open the folder where the add-in file is located, right-click on the add-in file, and select "properties"

3. a display tray will appear, having the attributes: Read-only, Hidden, Advanced, and unblock. Click the checkbox against "unblock" and make sure it is checked.

4. click Apply and Click Ok

Voila, your add-in file is unblocked.

N:B The Images are for steps 2 and 3

What study skill is being used when taking a large project and breaking it down into smaller manageable tasks?

Answers

Not sure but I think it’s called prioritizing

Answer:

prioritization

Explanation:

this is the answer

select all the apply. Effective presentations

Answers

Answer:are influenced by their setting, are consistent in their message, and are tailored to their audience.

Explanation:

Correct on Edge 2020

Which program will have the output shown below?
15
16
17
>>> for count in range(17):
print(count)
>>> for count in range(15, 17):
print(count)
>>> for count in range(15, 18):
print(count)
>>> for count in range(18):
print(count)

Answers

Answer:

>>> for count in range(15, 18):

   print(count)

is the correct answer

Explanation:

According to a survey of hikers on a trail, 50% of the hikers like Gatorade (G) and 40% like energy bars (E). 20% like both. Assume random selection:____________ a. Find the probability that a hiker likes Gatorade or energy bars b. If a hiker likes Gatorade, find the probability that he likes energy bars c. If a hiker likes energy bars, find the probability that he likes Gatorade.

Answers

Answer:

Explanation:

As per given data

Probability hikers like Gatorade (G) = P(G) = 50% = 0.5

Probability hikers like energy bars = P(E) = 40% = 0.4

Probability hikers like both = P(G and E) = 20% = 0.2

a)

To find the probability that a hiker likes Gatorade or energy bars use the following formula

P(G or E) = P(G) + P(E) - P(G and E )

P(G or E) = 0.5 + 0.4 - 0.2

P(G or E) = 0.7

b)

To find the probability that a hiker likes Gatorade or energy bars use the following formula

P(E|G) = P(E and G)/P(G)

P(E|G) = 0.2/0.5

P(E|G) = 0.4

c)

The probability that he likes Gatorade.

P(G|E) = P(G and E) / P(E)

P(G|E) = 0.2 / 0.4

P(G|E) = 0.5

Network Access Protection (NAP) analyses the ________ of a computer.

Answers

Answer:

virus in a virus

Explanation:

Write a method smallestPositive that takes an integer array argument and returns the smallest positive element in the array.

Answers

Answer:

public class Main

{

public static void main(String[] args) {

    int[] arr = {28, 7, -51, -2, 221};

 System.out.println(smallestPositive(arr));

}

public static int smallestPositive(int[] arr){

    int heighest = arr[0];

   

    for(int i=0; i<arr.length; i++){

        if(arr[i] > heighest)

            heighest = arr[i];

    }

   

    int lowest = heighest;

    for(int i=0; i<arr.length; i++){

        if(arr[i] < lowest && arr[i] > 0)

            lowest = arr[i];

    }

   

    return lowest;

}

}

Explanation:

The code is in Java.

Create a method named smallestPositive that takes one parameter, arr

Inside the method:

Find the largest value in the array using the first for loop

Set the this value as lowest to find the smallest positive value (I assumed there is at least on positive value in the array)

Create another for loop to iterate through the array. If a value is smaller than the lowest and if it is greater than 0, set it as lowest

When the loop is done, return the lowest

Inside the main method:

Initialize an array with some numbers

Call the smallestPositive() with this array and print the result

(In our example, the result would be 7)

Olivia wants to send a report to her boss concerning an upcoming project. Which communication format should she use to send a formal message to her boss? A. email B. chat C. forum D. blog

Answers

Answer:

A. Email. It is formal

Explanation:

Answer:

Email

Explanation:

Identify a security context of interest to you. Within this context, what constitutes a direct benefit of a risk management strategy? An indirect benefit? Provide examples.

Answers

Here,the Preparedness of the National(National Preparedness), that which gives a description of mission areas and also provide a framework for the consideration of management of risk.

It gives an illustration of the relationship of the National preparedness mission elements of risk.

Activities aimed at prevention are also associated with the efforts for the addressing of protection efforts generally address vulnerabilities recovery efforts.

However,we see that efforts of mitigation transcends vulnerability and also consequence spectrum.

Here,the PPD-8 mission areas are central,and this is to enhance national preparedness and also for infrastructure risk management activities.

When these are developed,they contribute to the achievement of resilient and secure critical infrastructure,and these critical infrastructure risks are however seen as part of setting capability targets.

THREAT AND HAZARD IDENTIFICATION AND RISK ASSESSMENT.

"THIRA" gives a provision of an approach for the identification and assessment of risks and also the associated impacts.

Determination that THIRA process has been completed by jurisdiction,then you consider the results when undergoing the assessment of risks to critical infrastructure.

Gus is developing new software in an environment in which incremental changes are released at regular intervals within a timebox. Shana is developing software for the minimum viable product stage in order to provide the development team with feedback on how to improve the application. Gus is employing the software methodology known as __________, while Shana is employing the software methodology known as __________.

Answers

Answer:

Answered below

Explanation:

Gus is employing a software methodology known as agile while Shana is employing the minimum viable product methodology.

In agile methodology, changes are built and released incrementally within a time frame.

Therefore the software product is continuously updated.

In the minimum viable product methodology, the basic aspect of the software is released for use and feedback is received from the users thereby informing what improvements to make.

Answer: Agile, Lean

Gus is employing the software methodology known as agile, while Shana is employing the software methodology known as lean.

Create a formula for sheet Inventory that highlights any rows where the Reorder level is below the On Hand level in yellow on excel 2016. Will mark brainliest if you can tell me how.

Answers

Answer:

Highlight the actual inventory level column and click on condition formatting, click on the drop-down button and select "Formula is" to input the formula "=B4 <= C4", select the color pattern to format the row if the condition is met and click ok.

Explanation:

Assuming the reorder level (column C4 and the on-hand level or actual inventory (column B starting at row 4) are columns in the Excel worksheet. The reorder level is the minimum level of inventory before inventory is populated. So the formula compares the value of the actual level with the reorder level, if any row is less than or equal to the reorder level, the row is formatted with the selected color.

Answer:

Highlight the actual inventory level column and click on condition formatting, click on the drop-down button and select "Formula is" to input the formula "=B4 <= C4", select the color pattern to format the row if the condition is met and click ok.

Explanation:

how do i change my desktop theme on my chromebook?

Answers

Answer:

open Chrome.

At the top right, click More. Settings.

Under "Appearance," click Themes. You can also go to the gallery by visiting Chrome Web Store Themes.

Click the thumbnails to preview different themes.

When you find a theme you'd like to use, click Add to Chrome.

Explanation:

Aubrey is on a Windows machine. She wants to back up her Halloween pictures on an external hard drive. Which of the following tasks is she likely to perform as part of a sequence of actions do that? Right-click the file and choose the Copy option. Open the application and select the File menu. Right-click the file and select the Delete option. Go to the location where you want to save the file. Right-click an empty area and select the Paste option.​

Answers

Answer:

Right-click the file and choose the Copy option, Go to the location where you want to save the file, Open the application and select the File menu, and Right-click an empty area and select the Paste option.

Explanation:

You would not need to Right-click the file and delete it to back up her Halloween photos, but you would need to upload them to an external application. To do that, you would basically do every step besides right-clicking and deleting the file (Right-click the file and select the Delete option)

Answer: A, D, E

Explanation: correct on Plato, plus you wouldn’t select the file menu or delete the files.

Write a Python3 program to check if 3 user entered points on the coordinate plane creates a triangle or not. Your program needs to repeat until the user decides to quit, and needs to deal with invalid inputs.

Answers

Answer:

tryagain = "Y"

while tryagain.upper() == "Y":

    x1 = int(input("x1: "))

    y1 = int(input("y1: "))

    x2 = int(input("x2: "))

    y2 = int(input("y2: "))

    x3 = int(input("x3: "))

    y3 = int(input("y3: "))

    area = abs(x1 *(y2 - y3) + x2 * (y1 - y3) + x3 * (y1 - y2))

    if area > 0:

         print("Inputs form a triangle")

    else:

         print("Inputs do not form a triangle")

    tryagain = input("Press Y/y to try again: ")

Explanation:

To do this we simply calculate the area of the triangle given that inputs are on plane coordinates i.e. (x,y).

If the area is greater than 0, then it's a triangle

If otherwise, then it's not a triangle.

This line initializes iterating variable tryagain to Y

tryagain = "Y"

while tryagain.upper() == "Y":

The following lines get the coordinates of the triangle

    x1 = int(input("x1: "))

    y1 = int(input("y1: "))

    x2 = int(input("x2: "))

    y2 = int(input("y2: "))

    x3 = int(input("x3: "))

    y3 = int(input("y3: "))

This calculates the area

    area = abs(x1 *(y2 - y3) + x2 * (y1 - y3) + x3 * (y1 - y2))

This checks for the condition stated above.

    if area > 0:

         print("Inputs form a triangle") This is printed, if true

    else:

         print("Inputs do not form a triangle") This is printed, if otherwise

    tryagain = input("Press Y/y to try again: ") This prompts the user to try again with another set of inputs

which of the following players is on offence

Answers

Answer:

A baseball player trying to steal second base.

Explanation:

From a test I took, im hoping the answer choices were the same as yours tho.

Describe two circumstances where access services might get implemented by organizations please.​

Answers

Answer:

Answered below

Explanation:

Remote access enables access to an organisations network from remote places. Certain conditions require such access. An organisation might require their workforce to work from home especially in this coronavirus health pandemic situation. Therefore remote access is necessary.

Also attending to customers needs, virtual meetings and connections to workers and clients all over the world, can only be made possible by the implementation of secured remote access, by the organisation.

The "persistent interrupt" is a bug in the code that exhibits a behavior that’s similar to an infinite loop. The ISR exits and gets called back immediately an infinite amount of times even though the interrupt event occurred once. The persistent interrupt occurs when three conditions are met. What are these conditions? How do we avoid a persistent interrupt from occurring?

Answers

Answer:

1. the 3 conditions have been listed below

2. to avoid persistent interrupt, we break any of the 3 conditions.

Explanation:

The persistent interrupt occurs when these three conditions below are met.

They are as follows:

1. GIE=1

2. xIE=1

3. xIFT=1

in avoidance of the persistent interrupt from occurring, we break any of these 3 conditions that I have listed above.

in order To break any one of the 3 conditions, we clear the flag that corresponds to the associated

we can also avoid the persistent interrupt occurrence by having the Interrupt Service Routine (ISR) clear maybe one or all of the three bits mentioned above before the ISR terminates, so it wouldn't get called back again. clearing any of the bits will not allow the ISR to be called again.

Write code that generates a random odd integer (not divisible by 2) between 50 and 99 inclusive.

Answers

import random

nums = [x for x in range(50,100) if x%2!=0]

print(random.choice(nums))

We use a list comprehension to create a list of the odd numbers between 50 and 99. Then we randomly choose one of those numbers using the random module.

A technology that can help a student to increase his or her understanding of the vocabulary used in a classroom is called:_______

a. assistive instruction.
b. UDL technology.
c. hypertext software.
d. adaptive instruction.

Answers

Answer:

c. hypertext software.

Explanation:

In Computer science, a hypertext can be defined as textual informations that are being displayed on a computer system and these texts usually links to other informations (texts) that the user can easily have access to in real-time.

Basically, some developers include encyclopedias and dictionaries in their software database, which makes other necessary informations or contents easier and immediately accessible to the users through the use of hypertexts that is activated by pointing and clicking on the link with a mouse, keypress set or soft touching the screen.

Hence, a technology that can help a student to increase his or her understanding of the vocabulary used in a classroom is called hypertext software.

Other Questions
The Choose... is the end of the alimentary canal. Tituba befriends a group of young, Puritan girls. Who has power in this text? Tituba? The girls? Someone else? Determine who has power in the text, and argue your position using evidence from the text. Question 5 : CONSUMER MATH Your science teacher tells you that the next test is worth $0 points and contains 19 problems. Multiple-choicequestions are worth 2 points each and short answer questions are worth 5 points. Find how many of each type ofquestion will show up on the test. 3 examples of civic readiness. Find the celcius equivalent of 133 degrees Kelvin Which of the following values of x make the following functions equal? y = 2x + 6 andy = 6x - 10A. X=2B. X=1C. X=4 D. X=3 1. an ancient study or art which attempted to combine science and philosophy to solve worldly problems alchemy 2. a homogeneous mixture of elements with metals to form metallic solids alloy 3. the simplest unit of an element that still retains the properties of that element compound 4. two or more elements joined together such that the elements have lost their individual identity element 5. a primary substance that cannot be divided into separate substances metal 6. the group of elements that are good conductors of electricity and heat atom 7. the group of elements that are poor conductors of electricity and heat Briefly (3-5 sentences) summarize cell division in prokaryotic cells. What point is a solution for the linear inequality below?A. (4, 3)B.(-2, 4)C.(-4,1)D.(1, -2) Simplify the expression.3x3 - 2x2 Which of these angles areadjacent angles? The Constitution of 1836 was approved by ______ and ________. a. thirty representatives; fourteen senators. b. Sam Houston; Santa Anna c. the government of Mexico; Republic of Texas d. the Supreme Court; district courts Please select the best answer from the choices provided In Mr.Elliots garden, 1/8 of the flowers are red, 1/4 of them are purple, and 1/4 of the remaining flowers are pink. If there are 128 flowers, how many flowers are pink? a submarine starts 800m below the surface of the ocean. It rises at a rate of 40m / min for 15 minutes. How much more does the submarine need to rise to reach 50m below the surface? Cherries are $2.00/ pound what is the constant of proportionality plzzzzzzzzzzzzzzzzzzzzzz hel What struggles do young girls often face that young boys do what What is unique about a dual-axis chart What was the government's Termination policy?