Several key people were involved in programming-language development in the 1970s and 1980s.

Choose all that apply.

Bjarne Stroustrup released C++ programming language in the1980s.

John McCarthy developed LISP for artificial intelligence.

Bill Gates and Paul Allen released the first programming language for a personal computer.

Niklaus Wirth developed Pascal to teach programming.

Answers

Answer 1

Answer: 1,3,4

Explanation: These are correct answers

Answer 2

Several key people were involved in programming-language development in the 1970s and 1980s:

Bjarne Stroustrup released C++ programming language in the 1980s.

John McCarthy developed LISP for artificial intelligence.

Niklaus Wirth developed Pascal to teach programming.

Thus, options A, B and D are the correct options.

In the realm of programming-language development during the 1970s and 1980s, several notable figures left a lasting impact. Bjarne Stroustrup ushered in the 1980s by introducing the C++ programming language, an extension of C that brought object-oriented principles to the forefront. John McCarthy's contributions were marked by his creation of LISP, a language pivotal for artificial intelligence research and symbolic processing.

Meanwhile, Niklaus Wirth's innovation lay in Pascal, a language designed with pedagogy in mind, facilitating programming education. However, the claim of Bill Gates and Paul Allen released the first programming language for personal computers is inaccurate, as their pivotal role was in software and operating systems, not language development.

Thus, options A, B and D are the correct options.

Learn more about programming-language here:

https://brainly.com/question/32901513

#SPJ3


Related Questions

what is meant by artificial intellgence?​

Answers

the theory and development of computer systems able to perform tasks normally requiring human intelligence, such as visual perception, speech recognition, decision-making, and translation between languages.

I NEED TO FIND OUT THE ANSWER!

Answers

Answer:

the first action that should be taken is to back up the all important document that and by finishing doing that format the entire system...and i advise you should be choosing the best antivirus to protecting your computer

How can the Playback feature adjust your audio recording?

Answers

Answer:

If said playback was recorder on editing software then there is a good chance that it could be changed for editing porpuses.

Explanation:

pls help with this two.

Answers

Answer:

I love my *country ** so i am going visit it

Answer:

I also like my country very much

____ is a technology that exists inside another device

Answers

Answer:

Embedded technology is a technology that exists inside another device.

Answer:

Embedded

Explanation:

An embedded system is a combination of computer hardware and software designed for a specific function.

What is a good computer i should get

Answers

I would reccomend Chromebook for school, home computers like dell and apple computer

1. Separate valid and invalid variables:
1. CSL
1. Age
2. Mark-sheet
3. Tel $
4. CLS
5. Simple Interest
6. SEE
1.545Newton
2. Stop5for
1. Give
2 $shopping
3. United

Answers

Firstly we explain the variable and the declaration rule for the variable and further separating the valid and invalid variables.

Whenever a user is given a question, variables are data values that can vary. for example  age, CSL, etc.It may alter and during the execution of the program.It's a storage space for memories.It has a name that corresponds to the location.Data is stored in the memory location.

The rule for variable declaration:

The names of your variables should be based on the phrases used in the subject area, and they should reflect the variable's function.By removing spaces between the words, you can make variable names. Each word in the name should be capitalized, including prepositions and pronouns that are one letter long.An underscore should never be used to start a variable name.Single-character variable names should be avoided. For loop counters, only short variable names are permitted.After the state that equals the "true" value, name variables that describe binary states ("true" or "false").

The valid variable is:

CSL, Age,CLS,SEE,Stop5for,Give, $shopping, and United.

The invalid variable is:

Mark-sheet, Tel $, Simple Interest, and 545Newton.

Learn more:

brainly.com/question/2684763

How many units are considered a full time student at a community college in California?

Answers

Answer:

12

Explanation:

According to Saddleback college located in California;

12 units are considered full-time student status.

You may take as little as 0.5 units or as many as 19.0 units during a single semester. To take more than 19 units you are required to obtain special permission from the Counseling Department.

What ethical concerns might arise from applying new IT to law enforcement?

Answers

Answer:

One ethical concern that might occur is the rise of bias in the police department. It would be possible for a disgruntled or frustrated cop to lean into new IT and be able to take advantage of a past suspect or an "enemy" of theirs such as a neighbor or even a coworker.

Pls i need help asap

Answers

Answer:

sorry for that I don't know it's answer sorry

what is memory?
How many type of memory in computer system?​

Answers

What is memory?

Memory is the process of taking in information from the world around us, processing it, storing it and later recalling that information, sometimes many years later. Human memory is often likened to that of a computer memory.

How many type of memory in computer system?

two types

Memory is also used by a computer's operating system, hardware and software. There are technically two types of computer memory: primary and secondary. The term memory is used as a synonym for primary memory or as an abbreviation for a specific type of primary memory called random access memory (RAM).

Hope it helps you my friendHave a great day aheadGood morning friend

What an RRD in computer?

Answers

Answer: RRDtool (round-robin database tool) aims to handle time series data such as network bandwidth, temperatures or CPU load. The data is stored in a circular buffer based database, thus the system storage footprint remains constant over time.

Explanation:

question of computer sciences​

Answers

Answer:

a ans is cyber crime

b ans is hacking

c ans is cracker

d ans is computer ethics

e ans is phishing

What can be done to create new jobs in an economy where workers are increasingly being replaced by machines?

Answers

Answer:

Remove some machine by only giving the machines the works humans can not do and the ones humans can do should not be replaced by robots

How can get a cup stain off my Chromebook top? Like I tried everything. And I start school on the 1st of September. Plz help me

Answers

Answer:

Try using vinegar or baking soda and water. There's also products for your problem.

What are the function of PowerPoint?
10 points please ​

Answers

PowerPoint is a presentation program that allows you to create dynamic slide presentations. These presentations can include animation, narration, images, videos, and much more.

hope this helps <3

Answer:

Powerpoint is a software package designed to create electronic presentations consisting of a series of separate pages or slides.

It allows you to catch your audience's attention using visual effects. PowerPoint is also highly recommended for speakers that may find presentations stressful. One other way that PowerPoint can be important to the presenters is by using the slides as keynotes and control the flow of the presentation.

Explanation:

Hope this helps! Thanks.

Which of the following is a necessary step prior to replacing the removable battery pack in a laptop computer?
a. Remove the laptop keyboard bezel, and if needed, remove the keyboard.
b. Verify the computer system is configured in sleep mode.
c. Verify the laptop system is powered off and configured for Ship Mode.
d. Confirm the replacement battery is recommended by the laptop manufacturer.

Answers

Answer:

number c is the correct answer

State the Limitations of the first generation of computers​

Answers

Answer:

The limitations of the first generation of computer are:-

•The operating speed was very low.

•Power consumption was very high.

•They required large space for installation.

Hope it helps you.

Write a QBASIC program to calculate and display the simple interest.​

Answers

Answer:

see and write

Explanation:

cls

start

enter"principle"

enter"time"

enter"rate"

p×t×r/100

display result(output)or ans

stop

Manufacturing, transportation, communications, advanced very quickly.
Education improved


A. middle age
B. renaissance
C. industrial revolution
D. information

Answers

Answer:

renaissance

Explanation:

which type of software is created on user dimension​

Answers

Answer:

Application and system software is created on user dimension.

what is a compter crime?​

Answers

Answer:

Cy***rcrime, also called computer cr**me, the use of a computer as an instrument to further illegal ends, such as committing fr4ud, traf**icking in child por****graphy and intellectual property, stealing id

If your computer won't connect to the internet, which of these is most likely to be the problem?

Answers

Answer:

nic is the answer.... .....

An employee of a large corporation remotely logs into the company using the appropriate username and password. The employee is attending an important video conference with a customer concerning a large sale. It is important for the video quality to be excellent during the meeting. The employee is unaware that after a successful login, the connection to the company ISP failed. The secondary connection, however, activated within seconds. The disruption was not noticed by the employee or other employees. What three network characteristics are described in this scenario

Answers

Answer: I gave 6 you can choose from.

Integrity

Scalability

Quality of Service

Fault of Tolerance

Powerline Networking

Security

Question 3 of 10
A business letter is not written:

Answers

Answer:

yes. business letter better use statistic. or audit.

A computer system requires users to have an access code that consists of a three-digit number that is not allowed to start with zero and cannot repeat digits. How many such codes are possible

Answers

Answer:

648

Explanation:

---

Conditions: Not allowed to start with 0 // No repeating digits

---

9 possible ways for first digit (excluding 0, therefore 1-9)

e.g. 123, 234, 567

9 possible ways for second digit (excluding 0 and digit before 1-9)

e.g. 123, 124, 125

8 possible ways for third digit (excluding 0 and condition for second digit 1-9)

e.g. 789 is legit, but 788 is not

Multiply 9*9*8 to get an answer of 648

what is the full form of XML?​

Answers

Answer:

extensible markup language

XML is “extensible markup language”

What do earthquakes and tsunamis have in common?

Answers

Answer: They modify the earth's surface

Explanation:

It was the correct answer on QC. Hope this helps

Energy is released as an earthquake whenever these tectonic plates glide over, under, or past each other at the fault lines where they meet. Tsunamis are ocean waves caused by undersea earthquakes.

What are tectonic plates?

Tectonic plates are fragments of the Earth's crust as well as topmost layer mantle, collectively known as the lithosphere.

The plates are approximately 100 km thick and are made up of two types of material: oceanic crust (also known as sima from silicon and magnesium) and continental crus.

Tsunamis are ocean waves caused by: large earthquakes near or beneath the ocean Eruptions of volcanoes Landslides beneath the sea.

Large amounts of debris fall into the water during onshore landslides. Because these waves are not caused by tides, scientists avoid using the term "tidal wave."

When these tectonic plates glide over, under, or past each other at the fault lines where they meet, energy is released as an earthquake. Tsunamis are ocean waves caused by earthquakes beneath the sea.

Thus, this is the similarity between earthquake and tsunami.

For more details regarding tectonic plates, visit:

https://brainly.com/question/16944828

#SPJ2

What do you mean by gigo?Explain in breif​

Answers

Answer:

garbage in garbage out

Explanation:

it means bad input gives you also a bad output.

could you mark me as brianlist.

I'm really weak at computers can someone please help me with these questions ​

Answers

Answer:

DIM count, number, previous, temp AS INTEGER

 count = 0

 number = 1

 previous = 1

again:

 count = count + 1

 temp = number

 number = number + previous

 previous = temp

 PRINT number

 IF count < 10 THEN

    GOTO again

 END IF

Explanation:

Here is the code for the first assignment. Can you think about the rest indicate where you get stuck?

Other Questions
Is the relation a function? ExplainSet-builder notation?Domain/range? 18. My grandfather ______________(grow) tomatoes in his garden this summer.19. He ______________(grow) them every summer . 20. The children ____________________(leave) for school right now. 21. The children ________________(leave) at 8:30 every morning of the week.22. Shu! The baby ____________________(take) her nap. 23. In the north the season __________________(change) four times a year .24. Up to now he ____________________ (give) us 5 tests. 25. The monsoon ___________________(come) once or twice a year.26. It's spring and the days ___________________(get) longer. 27. The weather ___________(get) very cold in Moscow in the winter.28. It _______________(rain) hard, and I don't have an umbrella.29. It's November and the birds _________________(fly) south. 30. Many birds of Europe ________________(fly) south to Africa every winter.Nhanh gip mnh c khng :(Cn 2 ting 10 pht Can someone help me with an idea please? I need something like this for math and science week but i think my idea is really lame. It has to be a photograph and it can be physics, chemistry or math! Pls lmk your ideas cuz im running out of them What are your thoughts about this? Do tattoos and jewellery and other objects of adornment influence the way people communicate with each other? 4. (k? - 4k+7)+(k? +9k 3)ON SA A share of stock is now worth 20% of its value from a year ago. If it is now worth $44,250, what was it worth a year ago? 1.) -12/6 is a natural, whole, integer, rational or irrational The question is "the numbers 4 and 9 both have the exactly three factors, Find two numbers more that have the exactly three factors" Why are conservation groups pushing for worldwide restrictions on whaling 38 is 95% is what number? Sam baked an equal number of sausage buns andcustard buns. During the day, 68 sausage buns weresold. Sam also baked another 27 custard buns to meet a last-minuteorder. At the end of the day, Sam had baked 6 times as many custardbuns as the number of sausage buns remaining. How many sausagebuns did Sam bake at first? Can you answer this? please? Brooke spent 3/4 hours playing her flute each day for 7 days. How many hours did she play her flute in all What makes an atom radioactive? Please help meWhat are 5 interesting facts of how Globes are made Please answer ASAP please and thank Which of the following people was the Supreme Commander during World War II?Woodrow WilsonHarry TrumanDwight D. EisenhowerGeorge W. Bush 6. Tortoise became the leader of the group because (Complete the sentence.) the artist who designed this architectural structure made choices that Rewrite as a simplified fraction.3.54141 is repeating