list the mechanical calculating device electo mechanical computer and electronic computer

Answers

Answer 1

Mechanical calculating devices were early machines designed to perform mathematical calculations mechanically. They were primarily developed before the advent of electronic computers and relied on gears, levers, and other mechanical components to perform calculations. Some notable examples of mechanical calculating devices include:

1. Abacus: The abacus is one of the earliest known mechanical calculating devices, dating back thousands of years. It consists of a series of rods or wires with beads that can be manipulated to perform basic arithmetic calculations.

2. Pascaline: Invented by Blaise Pascal in the 17th century, the Pascaline was one of the first mechanical calculators. It used a series of gears and wheels to perform addition and subtraction.

3. Difference Engine: Designed by Charles Babbage in the early 19th century, the Difference Engine was an early mechanical computer. It was designed to calculate polynomial functions and was operated using crank handles.

Electromechanical Computer:

Electromechanical computers represent a transitional phase between mechanical and electronic computers. These machines used both electrical and mechanical components to perform calculations. One significant example of an electromechanical computer is:

1. Harvard Mark I: Developed during the late 1930s and early 1940s, the Harvard Mark I was an electromechanical computer. It used mechanical switches, relays, and rotating shafts to perform calculations. It was primarily used for scientific and military purposes, such as computing artillery firing tables.

Electronic Computer:

Electronic computers revolutionized the field of computing by using electronic components to process and store information. They marked a shift from mechanical and electromechanical systems to electronic circuits. Some notable examples of electronic computers include:

1. ENIAC: Built during World War II, the Electronic Numerical Integrator and Computer (ENIAC) was one of the first electronic general-purpose computers. It used vacuum tubes for computation and was primarily used for scientific and military applications.

2. IBM 650: Introduced in 1954, the IBM 650 was one of the earliest mass-produced electronic computers. It used vacuum tubes and punched cards for input and output.

3. UNIVAC I: Developed in the early 1950s, the UNIVAC I was the first commercial electronic computer. It used vacuum tubes for computation and magnetic tape for storage.

These are just a few examples of mechanical calculating devices, electromechanical computers, and electronic computers that have played significant roles in the history of computing. The progression from mechanical to electromechanical to electronic computers represents the evolution of technology and paved the way for modern computing systems.

for more questions on  electronic computers

https://brainly.com/question/24540334

#SPJ11


Related Questions

Assembler Language
CSCI 360-1 Assignment 4 Name_____________________
Spring 2019 ABENDs and Dump Reading
25 points
This programming assignment does not require any further coding or documentation than what is provided. The program will ABEND and your task is to learn how to investigate what happened so that you can debug your own Assembler programs in the future. To begin, run the following program on the Marist mainframe using the ASSIST JCL used previously. Be sure you type it or copy it EXACTLY as shown below:
DUMP1 CSECT
USING DUMP1,15 ESTABLISH REG 15 AS BASE REG
*
SR 2,2 CLEAR REG 2
*
LA 3,NUM1 LOAD ADDRESS OF NUM1 INTO REG 3
LA 4,NUM2 LOAD ADDRESS OF NUM2 INTO REG 4
*
A 2,0(,3) ADD NUM1 TO REG 2
A 2,0(,4) ADD NUM2 TO REG 2
*
LA 5,SUM LOAD ADDRESS OF SUM INTO REG 5
ST 2,0(,5) STORE THE SUM OF NUM1 & NUM2 AT SUM
*
XDUMP , SET REG 2 TO 35
*
LTORG
*
SUM DC F'0' FULLWORD OF ZERO TO LATER HOLD SUM
*
NUM1 DC F'1206000000' VARIOUS FULLWORD INTEGER VALUES
NUM2 DC F'972460'
NUM3 DC F'1344335922'
*
END DUMP1
Use the resulting ABEND dump output to answer the questions below. Each is worth 2 points except question 11 which is worth 5 points.
Did this error occur (a) while the program was being assembled or (b) when it was being run?
________________________________________________________________________________
What is the address of the next instruction which would have been executed?________________________________________________________________________________
What is the value of the condition code at the time of the ABEND?
________________________________________________________________________________
What is the length of the instruction that caused the ABEND (number of bytes)?
_______________________________________________________________________________
What is the address of the instruction that caused the abend?
_________________________________________________________________________________
What type of error occurred (number and name)?
_________________________________________________________________________________
What usually causes this error?
_________________________________________________________________________________
What does the value in register 2 represent at the time of the ABEND dump?
__________________________________________________________________________________
What instruction needs to be added to fix this ABEND?
_________________________________________________________________________________
What does the value stored at location counter value 00002C represent?
_________________________________________________________________________________
What exactly happened here to cause the ABEND? Be detailed but succinct in your description.
_________________________________________________________________________________

_________________________________________________________________________________

_________________________________________________________________________________

_________________________________________________________________________________

_________________________________________________________________________________

Answers

hello thnks

Explanation:

What is the 3 common keys used to access the BIOS.​

Answers

Answer:

To access your BIOS, you'll need to press a key during the boot-up process. This key is often displayed during the boot process with a message “Press F2 to access BIOS”, “Press <DEL> to enter setup”, or something similar. Common keys you may need to press include Delete, F1, F2, and Escape.

What does this mean

Answers

Answer:

"Y YUR Y YUB I CUR YY 4 ME"

Explanation:

thats what i read lol, i dont know the meaning though

press _________ to toggle the selected range as bold​

Answers

Answer:

press the b that i in a dark shade that is bold

PLEASE HELP ME! Sam was researching rocks and minerals. He thought the Web site looked unprofessional, so he looked for the author's information or credentials. He couldn't find any. Is this site reliable? A. Probably B. Probably not.

Answers

Answer:

B

Explanation:

If a site looks unprofessional and doesn't have any credentials, those are two signs that it's probably not very reliable.

When using spanning tree protocol. What is the first step in selecting paths through a network?

Answers

The first step in selecting paths through a network is STP must first select the root bridge, or master bridge.

Which one is the first step in STP operation?

The STP network convergence consists in three steps: elect a root bridge, elect root ports and elect designated and non-designated ports. When you enable STP, the first step in its convergence process is to elect a switch to act as a root bridge using the Spanning Tree Algorithm.

See more about STP at brainly.com/question/20039073

#SPJ1

If you connect to a network through your phone or cable company, then you probably connect through a________.

Answers

If you connect to a network through your phone or cable company, then you probably connect through an Ethernet crossover cable.

What is meant by the ethernet cable?

This is the type of cable that is known to be used for the wired types of connections. These types of cables are unlike the other types of connections such as the broadband which may be an internet type of connection that people use.

The ethernet cables are cables to connect using those devices that are in the the  local area networks. The popular example is the router. Hence we can say that If you connect to a network through your phone or cable company, then you probably connect through an Ethernet crossover cable.

Read more on ethernet here: https://brainly.com/question/1637942

#SPJ1

Gui screen usually contain elements that are called?

Answers

Answer: Widgets

Components

Controls

Explanation:

A person who creates a computer virus is a (1)system analyst (2) techician(3) programmer​

Answers

Answer:

a person who creates a computer virus is a programmer

Answer: hacker

Explanation:

Question #6
Multiple Choice
What tag is used to contain information about a web page, such as the title and related pages?

O
O

Answers

Answer:   b; head

Explanation:

Answer: <head>

Explanation: EDGE '23

Create a program that will calculate and print to the screen a sales receipt

Answers

Answer:

The Code:

print('Invoice Bill')

table = Table(['Item Name', 'Item Price'])

total = 0

while(1):

   name = input('Enter Item name:')

# "x" to exit and print the table

   if(name != 'x'):

       price = int(input('Enter the Price:'))

       # store all the prices in "total"

       total += price

       table.add_row([name, price])

       continue

   elif(name == 'x'):

       break    

table.add_row(['TOTAL', total])

print(table)

print('Your total bill amount is ', total, '/-')

Explanation:

This program is written in the PYTHON language.

The user needs to enter the item name and price as much as they want; this will print the item name, item price and total in tabular form.

#SPJ2

Write a written report about the possible input devices of the future?

Answers

Answer:

Its inevitable, people will make errors while using your input device. It is crucial that you measure how many of each of these types of errors are made, so you are able to use techniques to effectively counter them: 1. Mistakes —User uses the wrong method to achieve the tasks 2. Slips — The method used carried out incorrectly.

Explanation:

Which of the following allows you to copy
formatting of text from one part of your presentation
and apply it to text in another part of your
presentation?
Animation Painter
Animation
Format Painter
slide master
DONE

Answers

Answer:

format painter

Explanation:

Accenture began its own Cloud journey in 2015, after our internal IT organization recognized the significant advantages to be gained in leveraging Cloud capabilities at scale. Today, which percentage of Accenture's infrastructure and processes are in the Cloud?

Answers

Answer: 95%

Explanation:

Accenture began its own Cloud journey in 2015, and invested in about $3 billion to move to cloud. This has helped the company in timely delivery and achieving organizational goals.

Today, the percentage of Accenture's infrastructure and processes that are in the Cloud is about 95%. Its HR, sales, finance, legal system etc are all in cloud.

The percentage of Accenture's infrastructure and processes that are stored or located in the Cloud is: 95%.

A Cloud can be defined as the elastic leasing of pooled computer resources (physical hardware) over the Internet and through the use of virtualization.

Accenture is one of the world's largest management and technological consulting company that provide services such as:

Database managementConsultingStrategy planningOutsourcing

Basically, Accenture help business organizations in the implementation of data governance and management policies, in order to ensure the organization's data is trustworthy and reliable.

In 2015, Accenture started its own Cloud journey after recognizing the significant advantages it stand to gain or benefit in leveraging Cloud capabilities at a larger scale.

Consequently, the percentage of Accenture's infrastructure and processes that are stored or located in the Cloud is 95 percent.

Read more: https://brainly.com/question/23844088

Write a definition in your own words for Raster Graphic. Do not copy and paste please.

Answers

Answer:

Raster Graphic is a bitmap. They are basically a grid of small pixels that make an image.

If you would like to give another user permissions on your mailbox or to particular folders within your mailbox, which role should you configure?

Assignee
Client
Delegate
Manager

Answers

Answer:

I think it's B, Delegate

Explanation:

Cause the other options didn't seem to fit as the answer.

I really don't know though.

A delegate is someone who has been granted permission by another user to access. The correct answer would be an option (C).

What is a mailbox?

A computer-simulated mailbox that stores email messages. Mailboxes are saved on a disc as a message file or a message database.

A delegate is someone who has been granted permission by another user to access and manage their mailbox, including sending and responding to email messages on their behalf.

When you grant delegate access to another person, you are giving them the ability to access specific folders within your mailbox and perform specific actions, such as reading, sending, and deleting email messages.

Assignee, client, and manager are not terms typically used in the context of delegate access in email systems.

Thus, the correct answer would be option (C).

Learn more about the mailbox here:

https://brainly.com/question/28430685

#SPJ6

Multiple Select
Which of the following statements about localization are true? Select 2 options.
The goal of localization is to create an application or site that looks and feels like it was created for a specific market.
Really the only issue in localization is translating the text into another language.
You should avoid slang and idioms, since they will not be understandable to many audiences.
It is a good idea to use lots of images, since they are easily understood by all cultures.
For consistency, it is a good idea to use dollars as a currency in all versions of an application

Answers

Answer:

A. The goal of localization is to create an application or site that looks and feels like it was created for a specific market.

B. Really the only issue in localization is translating the text into another language.

Explanation:

In Computer science, localization can be defined as the process of designing, developing and adaptation of computer software applications or websites for different languages and geographical regions with peculiar differences.

This ultimately implies that, the main purpose for localization of a product such as a website or software application is to ensure they are specialized and specifically suited for a linguistic or geographical region.

The following statements about localization are true;

I. The goal of localization is to create an application or site that looks and feels like it was created for a specific market.

II. Really the only issue in localization is translating the text into another language.

Answer:

C. You should avoid slang and idioms since they will not be understandable to many audiences.

A. The goal of localization is to create an application or site that looks and feels like it was created for a specific market.

are the answers

Explanation:

Write a loop that will take in 5 numbers from the user and output the average. Round your answer to two decimal places.
Sample Run:

Enter a number: 2
Enter a number: 7
Enter a number: 11
Enter a number: 4
Enter a number: 5
The average is 5.8

Hurry please!! will mark brainliest!!

Answers

I’m gonna do it in the form of a pseudocode.

Pseudocode 1: Number_Average
Declare sum, num, num_count, average
START
sum = 0
num_count = 0
average = 0
Display “Enter a number”
Read num
Display “Enter a number”
Read num
Display “Enter a number”
Read num
Display “Enter a number”
Read num
Display “Enter a number”
Read num
While(count = 5)
DO
num_count = 0+1
sum = 0+1
average = sum/5
ENDWHILE
STOP

How can identity theft be prevented?

Answers

Answer:

Identity theft can be prevented by using proper security measures

Explanation:

Identity theft can be prevented by using proper security measures such as stronger passwords and VPN. It can also be protected by making sure your system security is up to date.

a person who creates a computer virus is called

Answers

Answer:

A person who creates computer virus is known as hacker.

PLS HELP ASAP) Omar is using the web to do research on diabetes. he needs to ensure that all of the information he finds regarding medications, treatments, and diets are accurate. the first websites he finds has a lot of information about a diet plan to help diabetic live healthy lifestyle. Omar can't figure out who the author of the site is and he notices that matches the one described on the website. Which of these are red flags that he should continue doing more research elsewhere? choose the right answer

a. the content is biased towards a particular diet plan that the site is advertising

b. Omar cant find the author so there is no proof that the writer can be trusted to provide medical advice.

c. both A and B

d. none of the above. the website can be trusted.


Nikolas is doing research on U.S visas for a school project. he has found conflicting information on two sites. the first site is travel.state.gov and the other is traveldocs.com which site should Nikolas trust more? choose the answer

a. Travel.state.gov

b. Traveldocs.com

Answers

Not sure on the first question, but the second would be answer choice a: Travel.state.gov since a website with .gov at the end tend to be trustworthy sources

Answer: 1. C. both A and B.

2.  Travel.state.gov

Explanation: i took the test!

the manager of a xyz organisation is preparing the organizational chart which feature of MS Excel /he will use to do so? also write the steps for this​

Answers

Answer:

Smart Art

Explanation:

The smart art feature in Microsoft excel allows for the creation of organizational chart on Microsoft excel. It readily allows for an hierarchical arrangement of an organization's personnel including the various departments on the system. The smartart allows the implementation of a graphical output which allows the display of an organization's personnel in order of hierarchy. To get started with smart art on excel, Clicking on the insert tab, the same are appears under illustrations. For an organizational chart, the Hierarchy smart art graphic type is selected and filled accordingly.

Que ventajas podria traer el internet a la educacion artistica? Ayuda porfa telo pido porfavor

Answers

Answer:

"Informacion"

Explanation:

La internet puede traer las mismas ventajas para la educacion artistica que cualquier otra materia y eso es "Informacion". El arte tiene muchas tecnicas. Tambien hay muchos differentes estilos de arte. La internet tiene toda la informacion sobre los artistas mas famosos de las historia, incluyendo su arte, tecnicas, estilos, temas, historias, etc. Esta informacion es sumamente importante y util por que te enseña a utilizar todos los metodos ya creados y usarlos como herramientas para crear arte que representa el artista que sos.

Computer professionals known as software engineers, or Blank______, use the software development life cycle to create software required for information systems.

Answers

Answer:

Computer professionals known as software engineers, or programmers use the software development life cycle to create software required for information systems.

Explanation:

Computer professionals are called software engineers and programmers because they develop and program software. Some additional titles for computer professionals are hardware engineers and iOS/Android developers.

Evaluate each condition as to whether it is true or not.
You can join the Army if you are over 17 and healthy. Have you met those requirements if you are 16 and healthy?
You can earn a scholarship if you have an ACT over 30 or you are valedictorian of your high school. Have you eamed a scholarship if you have an ACT
of 34 but are not the valedictorian?

Answers

Answer:

For the first one you have not met those requirements because you are still 16, for the second one you have met those requirements because you can either have a score over 30 (which you have 34) or be a valedictorian

Explanation:

Above

What are the three advantages of using blockchain technology? multiple choice all of the answer choices are correct. digital trust internet of things integration immutability

Answers

The  three advantages of using blockchain technology are:

digital trust internet of thingsimmutability

What is blockchain technology?

A Blockchain is known to be a kind of a chain of blocks that is made up of information.

Note that the data that are said to be stored inside a block is one that is based on the type of blockchain. Blockchain  is seen as a kind of a shared, form of immutable ledger that quickens the process of putting down or recording transactions and helps in the tracking of assets in a business network.

Hence, The  three advantages of using blockchain technology are:

digital trust internet of thingsimmutability

Learn more about blockchain technology from

https://brainly.com/question/25700270

#SPJ1

Figure shows a multiplexer in a synchronous TD slot is only 10 bits long (3 bits taken from each input plus is the output stream? The bits arrive at the multiplexer arrows.

Answers

The solution to the bits arrive at the multiplexer arrows is shown in the image attached.

What is a multiplexer used for in computing?

A multiplexer is known to be a kind of a device that is same to be one that is able to take a lot of analog signals and also helps to forwards the input that were taken into a single line.

Note that they are seen as devices that are often used to to boast the amount of data that are known to be passed over a network.

A good example of  a given non-electronic circuit of a multiplexer is known to be the single pole multi-position switch.

Therefore, The solution to the bits arrive at the multiplexer arrows is shown in the image attached. because it accurately tells the the arrangement of the 10 bits  in the arrow.

Learn more about multiplexer from

https://brainly.com/question/15052768

#SPJ1

The developers have used the results from the model to choose a computer controlled flood defense system. It will have a barrier which can open or close. describe the role of the microprocessor in such a system​
key word sensor , ADC , microprocessor, Preset , higher and lower barrier

Answers

The role of the microprocessor in a computer controlled flood defense system are:

The flood signal makes the microprocessor to start a flood control work or function that tends to interrupts the constant operating cycle that is known to be executed.

Note that  if any, and it start and keeps the operation of a drain cycle until the water is known to have returns to the constant level for a a given period of time.

What is the role of the microprocessor?

The Functions of Microprocessor are:

It helps to control or monitors all the parts of the machine and it often sends timing signals.It helps to move data between memory and I/O devices.It helps to bring back data and instructions from a given memory.

The microprocessor is known to be one that acts as the central unit of a computer system that carries out duties such as the arithmetic and logic operations.

Hence, The role of the microprocessor in a computer controlled flood defense system are:

The flood signal makes the microprocessor to start a flood control work or function that tends to interrupts the constant operating cycle that is known to be executed.

Note that  if any, and it start and keeps the operation of a drain cycle until the water is known to have returns to the constant level for a a given period of time.

Learn more  about microprocessor from

https://brainly.com/question/614196

#SPJ1

Create a file name that to ensure the that the file is easy to find

Answers

Answer:

I always name mine something like HI

or YEET i dont know

why but it works

Explanation:

The File name would be : ABC!

A writing guide in making a project correctly.

a.project proposal
b.project plan
c.project format
d.project template ​

Answers

Answer:

b

Explanation:

B Project plan hope this helps
Other Questions
You are working with an online tech service to fix a problem with installation of a program on your machine. You grant them remote access to your computer to enable them to act as you to fix situation. What type of must be installed on your machine to allow this type of action by another person How much heat is absorbed in the complete reaction of 3.00 grams of SiO2 with excess carbon in the reaction SiO2(g) + 3C(s) SiC(s) + 2CO(g) H = 624.7 kJ/mol? Price-club sells a 12-ounce box of crackers for $2.59 and Shop Mart sells 1- 1 2 pound box of crackers for $4.68.The unit price at Price-Club is $ per ounce, and the unit price at Shop Mart is $ per ounce. can someone please explain number 5? please help merely if you know how to do this question can somebody help me with this homework? Find the minimum value for the following quadratic equation.f(x) = 3x2 + 6x-1 In what ways does odyssey Reflect important qualities values and ideals of the Greek culture in the time in which it was set?ill give you brainliest. Ayako claims that there are centers of dilations through which a dilation of line n by a factor leaves n changed. Determine whether each point below represents a center of dilation that supports ayako's claim hii, could you help me with this english exercise please?I'm italian and i'm not rlly good at english. how would you revise the following sentence to make it clearer? After finishing our project in class, our teacher asked for our presentation. 1. after finishing our project in class, our presentation was asked for. 2. the teacher asked for our presentation after finishing our project in class.3. the sentence is correct as it is written.4. after we finished our project in class, our teacher asked for our presentation. which screensaver is better? A baseball team had 75 players show up for tryouts last year and this year had 90 players show up for tryouts. Find the percent increase in players from last year to this year. a triangle has side lengths of 16 cm and 19 cm which could be the value of the third side 29cm or 19cm. The value Blank cm is the value of the third side Jackie is installing a circular hot tub into her patio. The hot tub will have a diameter of 78 inches.How many square feet of the patio area will remain after the hot tub is completed? Express your answer to the nearest tenth. The result of the second english civil war was? Match the system to it's function. In the mind of the colonists essential rights they demand for the British life liberty and property derived principally from Which statement is true regarding mitosis?A. 2 cells are made from one cellB. daughter cells have 1/2 of the original DNAC. occurs only in sex cellsD. 4 cells are made from one cell. help me I keep getting it wrong How does theneighborhood play a role in Tariq's death?