Computer simulations were first developed during __________
as a part of the _____________

Answers

Answer 1

Answer:

WWII; Manhattan Project.

Explanation:

Computer simulation refers to a mathematical model designed and developed to predict the outcome or behavior of a hypothetical or real-life scenario on a computer system, so as to illustrate and understand how the system functions.

Historically, computer simulations were first developed during World War II (WWII) as a part of the Manhattan Project.

For example, SimpleScalar refers to a computer architectural simulating software application or program which was designed and developed by Todd Austin at the University of Wisconsin, Madison, United States of America. It is an open source simulator written with "C" programming language and it's used typically for modelling virtual computer systems having a central processing unit (CPU), memory system parameters (hierarchy), and cache.

Answer 2

In the Computer, simulations were first developed during the Manhattan Project

as a part of World War II to model the process of a nuclear detonation.

Thus Computer was a simulation of 12 hard spheres which were using a Monte Carlo algorithm. Also, When Computer simulation is often used as an adjunct to, or which substitute is for a modeling system for which is simple and closed-form analytic solutions are not possible. There are many types of computer simulations are The common feature is the attempt are to generate a sample of the representative scenarios for a model in which a complete enumeration of all are possible states of the model would be prohibitive or that are impossible.

Learn more about:  

https://brainly.com/question/15182181


Related Questions

A computer database uses a binary sequence of 10 bits to represent unique user IDs. To increase the number of unique IDs that the database is able to represent, the database administrator increases the number of bits in a user ID to 11 bits. How many times more unique user IDs can be represented with the new system?

Answers

Answer:

2 times more unique IDs

Explanation:

The number of bits used to represent unique IDs in the computer system = 10 bits

The number of bits to which the database is upgraded to = 11 bits

The number of unique IDs represented by a 10 bits binary sequence, n = 10¹⁰ = 1024

The number of unique IDs represented by a 10 bits binary sequence, n = 10¹¹ = 2048

Therefore, the number of times more unique IDs that can be represented with the new system of 11 bits = 2048/1024 = 2 times more unique IDs

If the cell to the right of the cell you are typing in is ________, the data can "bleed" over that cell.
A. Full
B. Numerical
C. Empty
D. Formatted
**ATTENTION** If you send me a file, or a link for something to download your answer will be reported. Please answer through text. Thank you!

Answers

The answer to the question is c

Select the correct answer.
What does a touch ring allow an artist to do on a digital tablet?
O A draw shapes using it like a pen
OB. right-click and double-click like a mouse
O c. draw and modify strokes
OD. select an activity from the menu list

Answers

I think that it's OD

Anyone wanna co-op with me on genshin?
I'm on America/NA server and I main as Hu Tao and Venti!
I would prefer if you had discord but it's fine if not!

Answers

Answer:

I would love to

Explanation:

I do have discord if thats what you want, I main Xiao and Kaeya, I'm on NA server as well as I'm AR 48 almost 49 My UID is 615013165

Hi! Love the question! Hope you have a wonderful day! ♡

Which character is used to create an absolute reference to a cell?

Answers

Sadness refer to it as a mitochondria since it’s blue and it can represent as something

Answer:

$ - The dollar sign

Explanation:

The dollar sign creates an absolute reference in a cell. Absolute reference refers to an actual fixed location on a worksheet in Excel.

4
Select the correct answer.
Jason is working on a video image. He wants to add a small blur effect in a part of the video, but does not want to damage the video content

Which image-editing tool should he use?
ОА.
Dodge Tool
OB.
Pen Tool
OC.
Shape Layer
OD.
Smart Object
Reset
Next

Answers

Answer:

the answer is D Smart Object

Answer:

I think he should use a pen tool

Edhesive 8.3 lesson practice pls help

Answers

Answer:

String data type

Explanation:

See attachment for complete question

Required

Data type in stuff

On line 1 of the program, stuff is initialized as an empty list.

Line 2 to line 4; some elements are appended into stuff list

These elements are written in quotes

In programming, when an expression is written in quotes, such expressions are referred to as strings.

Hence, the elements stored in stuff are string datatypes

The data types in the elements "stuff" are string datatypes

What is strings data type?

String data type are data types in programming which is used when an expression is written in quotes(" ").

What is programming?

Programming can be defined as process of building or designing a computer program. It involves building computer instructions or algorithm and the use of the instructions to perform a particular task.

There are different types of programming language:

JavaJavaScriptPHPSQLpythonRubySwift

Learn more about programming:

https://brainly.com/question/16397886

time sensitive

When applying for a college or university, never state something that you can illustrate with a(n) __________

Answers

Answer:

Example.

Explanation:

A university can be defined as an accredited school which comprises of various faculties of learning (departments) for providing high quality education, knowledge, and skills to students for a specific period of time.

On an annual basis, all universities or colleges accept applications for admission from qualified students, based on certain criteria or requirements. Thus, students are required to write and submit a statement of purpose, stating their abilities, educational background, skills and why they should be considered for admission into the school.

Generally, when applying for a college or university, a student should never state something that he or she can illustrate with an example.

Consider the following code segment.
int a = 3 + 2*3;
int b = 4 + 372;
int c = 7 % 4 + 3;
double d = a + b + c;
I
What is the value of d after the code segment is executed?

Answers

Answer:

20.0

Explanation:

3+2*6 = 9

4 + 3/2 = 5.5 but, since b is an int value, it will round down to a 5

7%4+3 = 3 +3 = 6. the % symbol will give the remainder of the quotient

9 + 5 + 6 = 20. It becomes 20.0 because d is a double value.

The value of d after the code segment is executed is 391.0

How to determine the value of d?

To do this, we evaluate the code statements one after the other.

So, we have:

int a = 3 + 2*3;

This gives a = 9

int b = 4 + 372;

This gives b = 376

int c = 7 % 4 + 3;

This gives c = 6

For double d = a + b + c;

Substitute a = 9, b = 376 and c = 6 in d = a + b + c;

So, we have:

d = 9 + 376 + 6

Evaluate the sum

d = 391.0

Hence, the value of d after the code segment is executed is 391.0

Read more about computer programs at:

https://brainly.com/question/23275071

A software development company has created an application called FileCleanUp. When the application is run on a user device, it searches for all files (including pictures, videos, and documents) that have not been accessed in the past month, stores them on the company’s Web server, and deletes them from the user device. The application runs once each day. Users have the ability to manually retrieve files from the server if they are needed.
Which of the following is most likely to be a harmful effect of using FileCleanUp?
A. It prevents users from accessing frequently used files when there is no Internet connectivity.
B. It prevents users from accessing infrequently used files when there is no Internet connectivity.
C. It prevents users from accessing frequently used files when there is reliable Internet connectivity.
D. It prevents users from accessing infrequently used files when there is reliable Internet connectivity.

Answers

Answer:

B

Explanation:

The app will delete files that have not been accessed in the past month and store them on a web server. This means that the user cannot access those files unless they have an internet connection

The app will delete files that have not been accessed in the past month and store them on a web server. This means that the user cannot access those files unless they have an internet connection.

What is Software development?

Supercomputing and other computing methods are sometimes used interchangeably. Yet, there are times when the synonyms aren't clear. To assist clarify some similarities and differences between various computer types, here are some common analogies.

While supercomputing typically refers to the process of complex and massive calculations used by supercomputers, high-performance computing (HPC) is the utilization of several supercomputers to execute difficult and huge computations.

Supercomputers are often known as parallel computers since they can perform parallel processing. Parallel processing is the simultaneous use of many Processors to solve a single calculation.

Therefore, The app will delete files that have not been accessed in the past month and store them on a web server. This means that the user cannot access those files unless they have an internet connection.

To learn more about Software, refer to the link:

https://brainly.com/question/985406

#SPJ6

give me at least five main characteristic of irrigation equipment​

Answers

Answer:

flow control devices

filters

fertigation equipment

water emitters

automation equipment

operation equipment

water-lifting devices.

Why do we use compliment method?

Answers

Answer:

uh to be respectful and help give people some positive feelings ?

Answer:

In mathematics and computing, the method of complements is a technique to encode a symmetric range of positive and negative integers in a way that they can use the same algorithm (hardware) for addition throughout the whole range. ... Thus subtraction of any number is implemented by adding its complement.

When should we not use Inheritance in programming?

Answers

Answer:

You shouldn't be using inheritance if your program doesn't reuse code a lot.

Explanation:

This is really the purpose of inheritance, to make it easier for us to call repeated method calls without having to copy and paste all the time and making our program long and redundant.  If you have simple programs that don't have repeated calls, then inheritance is unnecessary.

list and explain seven functions of operating system software​

Answers

Answer: Security – ...

Control over system performance – ...

Job accounting – ...

Error detecting aids – ...

Coordination between other software and users – ...

Memory Management – ...

Processor Management – ...

Device Management –

HOPE THIS HELPS

does anyone know the code to rating 5.2:4 on CodeHS?

Answers

Answer:no

Explanation:

no

Which of the following is true of how packets are sent through the Internet?

Packet metadata is only included on important packets to indicate they should get access to faster paths through the network

Packet metadata is used to route and reassemble information travelling through the Internet

Information sent through the internet is only encapsulated in packets if the message is too large to be sent as a datastream

Information sent through the internet is split into two packets, one which contains the message and another which contains the metadata

Answers

Packet metadata is used to route and reassemble information travelling through the Internet

-scav

What is the definition of a performance, such as a poetry reading? O A. A work of art installed in public OB. A presentation of creative works OC. A collection of printed works D. A community-sponsored potluck​

Answers

Answer:

(B) A presentation of creative works.

Explanation:

Because performing is similar to presenting and poetry is similar to free writing, or creative words.

Compare an electric circuit to a river flowing with water. Which of the following could appropriately be considered a source?


a spring

a place where two rivers join

an ocean

an island

Answers

Answer:

a spring.

Explanation:

An electric circuit can be defined as an interconnection of electrical components which creates a path for the flow of electric charge (electrons) due to a driving voltage.

Generally, an electric circuit consists of electrical components such as resistors, capacitors, battery, transistors, switches, inductors, etc.

This electrical network which is usually a closed loop comprises of a device that provides the energy (voltage) to drive electrons or electric current; the device is referred to as a source such as a generator or battery.

Springs are points from which water naturally seeps from the ground. A spring is the original point or most common type of source from which a river flows or begin its journey.

This ultimately implies that, a spring serves as a source to a river flowing with water while a battery or generator serves as a source to an electric circuit with current flowing through it.

Hence, if we compare an electric circuit to a river flowing with water, a spring is considered to be a most likely source to the river.

if and if else check for a condition, these are known as

Answers

Answer:

i think its conditional statements

but im not sure though

HELP PLEASE 100 POINTS

Use the drop-down menus to complete the steps to access the Compact & Repair tool.

1. Open the database.

2. Go to the
✔ Backstage
view.

3. Click Info and then_________
OR
1. Open the database.
2. Click the_____ tab.

3. In the Tools group, click ________
The program then reduces the size of the database.

Answers

Honestly I’m not too sure because I think different models have different steps to use, but I’d guess the second steps... sorry Im not too sure but that is what I think. If you were leaning towards that one then I’d probably go with it.

Answer:

Explanation:

This is for MS Access:

1. Open the database.

2. Go to the

✔ Backstage

view.

3. Click Info and then__Compact and Repair__

OR

1. Open the database.

2. Click the__Database Tools__ tab.

3. In the Tools group, click ___Compact and Repair Database___

The program then reduces the size of the database.

why there is a need to "think before you click"?

Answers

Answer:

what are you saying is this a question

"think before you click"

"think before you click"It's the saying for Social Media Users.

We don't know what's there behind a particular post,tweet, comment,message.

And when you react to some of it by Commenting on it you maybe right or maybe wrong because if you comment to one saying 'Yeah I think this person is truly sincere' but the reality behind him is he is an abuser or a rude person in the public's view.

But you said he is sincere then People will asume you as them like a bad person supporting bad ones so thats The example of it "think before you click"

And

"Think before you leap"

is for think,say,react, before knowing the reason.

or

Take steps with precautions and carefully

may this helps you

bye

in remote areas,your gps device may lose reception. its good idea to have a

Answers

Answer:

map or compass or follow a trail so you don't get lost

Explanation:

Which physical force is most easily compared to voltage?


inertia

friction

heat

gravity

Answers

Answer: A

Explanation:

Voltage is the electrical force that causes free electrons to move from one atom to another. Just as water needs some pressure to force it through a pipe, electrical current needs some force to make it flow. ... Voltage is sometimes referred to as the measure of a potential difference between two points along a conductor.

A bank uses a computer program during the night to tell if the alarm should be rung. Sensors in the bank set the following Boolean variables:
vaultClosed: set to true if the bank vault is closed; otherwise false

heardNoise: set to true if a microphone heard noise; otherwise false

sawMovement: set to true if a camera saw movement in the bank; otherwise false

The automatic alarm should notify the police if there is noise and movement in the bank, or if the bank vault is open.
Which of the following boolean expressions can be used in a selection statement to ring the alarm?
A. NOT vaultClosed OR (heardNoise AND sawMovement)
B. heardNoise AND vaultClosed
C. NOT vaultClosed AND sawMovement
D. heardNoise AND sawMovement

Answers

Answer:

A. NOT vault Closed OR (heard Noise AND saw Movement)

Explanation:

Boolean expression is an expression which has logical or relational operator and they operate on boolean variables. In the given scenario the the expression used will be NOT vault closed or heard noise and saw movement. This will notify the police when the vault is opened or is tried to be opened. When there is any movement in the vault or when there is some noise the automatic alarm will ring and notify the relevant officials.

how to use a while loop in pascal for 36 students

Answers

To use a loop in pascal

The initial step is executed first and only.This step allows you to declare and initialize any loop control variables.

Next the conditions is evaluated.

After the body of the for-do loop executes the value of the variable is either increased or decreased.

The condition is now evaluated again.

Need answer ASAP

Complete the following sentences


____ objects are programmer defined objects with programmer developed properties and methods. Custom objects are ____
Objects.

Options for first box are:custom, built-in, user-defined

Option for the second box: user-defined, system-defined, undefined

Answers

Built in and user defined

Answer:

built-in objects are programmer-defined objects with programmer-developed properties and methods. Custom objects are user-defined objects.

Help!!!
I don't know how to do this problem....
Like
NOTHING
This is all I have right now
```
def findCharacteristic(choice, edges):
edges = edges.replace(" ","")
vertices = edges
max = 0
for char in vertices:
if int(char) >max:
max = int(char)
print (max)
x = [[0]*max]*max
print(x)

if __name__ == '__m
```

Answers

Answer:

ummmm try the inequality protragathron theorum

Explanation:

ok

In a word-processing program, what are the easily accessible icons that allow you to print, save and change fonts with a click of a button?

A- tool bar
B- keyboard shortcuts
C- preferences
D- printing options

Answers

The answer is A. tool bar

HELP PLEASE ⚠️⚠️⚠️⚠️⚠️⚠️⚠️❗❗❗❗❓❓❓
Why does it matter that we protect African Wild Dogs?

Answers

Explanation:

African wild dogs are among the most effective predators in the world. They use extraordinary cooperation and teamwork to pursue, overhaul and bring down their prey.African wild dogs are struggling to cope with the rapid increase in human settlements and infrastructure development that are encroaching on their traditional range. They are perfectly adapted to their natural environment, but require vast territories to survive – much larger than most other carnivore species. This increased exposure to human contact poses numerous threats to the wild dogs’ survival.

If you have any questions revolving around this topic,feel free to ask me and I will be glad to help,Good luck!


African Wild Dogs is like most predators, they play an important role in getting rid of sick and weak animals. This helps maintain the natural balance and improve prey species. Wild dogs are most effective hunter that targets prey rarely escapes.

por que se dice que las TIC´S son las integracion de las TI y las TC?

Answers

La respuesta correcta para esta pregunta abierta es la siguiente.

A pesar de que no se anexan opciones o incisos para responder, podemos comentar lo siguiente.

Se dice que las TIC´S son las integración de las TI y las TC porque ambas actividades se han integrado o fusionado en una solo concepto al momento de juntar las herramientas tecnológicas para almacenar, procesar y mandar información a través de los recursos tecnológicos utilizando los canales o recursos de los medios masivas de comunicación como lo son las redes satelitales o las comunicaciones vía microondas.

Al fusionarse las TI (Tecnologías de la Información) con las TC (Tecnologías de Comunicación), se maximiza la capacidad de enviar una mayor cantidad de información al momento a diferentes lugares del planeta.

Other Questions
Alicia es la hermana de mi padre. ________ hermana es _________ tia alicia.Pls help! Due by 11:59no links Exam InstructionsQuestion 9 of 20 :Select the best answer for the question9. Outlining and mapping are two ways of organizing your ideas during thestage of the writing process.O A. draftingB. planningO C. revisingO D. editingMark for review (Will be highlighted on the review page)Type here to searchOeED 9. Mr. Smith went skiing in Maine last weekend. He traveled 523 kilometers to Sugarloaf fromLeominster. His average speed was 109 km/hr. How long did it take Mr. Smith to hit the slopes? The Great Gatsby Chapter 59. He hadnt ceased looking at Daisy and I think he revalued everything in his house according to the measure of response it drew from her well-loved eyes. What does this mean? Which of the following problems are likely to be encountered in distribution?i) Spoilage of goodsii) Inadequate warehousingiii) Ineffective communication A b c d ?Help please Why might an author use an allusion in a poem or song?to make the song more interestingto show off everything he knowsto help the reader understand the messageto teach the reader or listener a lesson Find the sum of the zeros in the following equation:Y=(2x 1) (x + 4) (2x 3) (x 1) What is the simplified form of the following expression? 3sqrt 4x/5 Please help: What is the area of this shape? What is "stem" in Middle school? A winch is capable of hauling a ton of bricks vertically two stories (6.35 m ) in 24.5 s .If the winchs motor is rated at 5.80 hp , determine its efficiency during raising the load. Complte avec les expressions qui conviennent conjugues au prsent. a. J , je voudrais de leau. b. Si vous , mangez un fruit. c. Ouvre la fentre, nous . d. Ils ont trop couru, ils aux jambese. Je suis stress, j de rater mon examen. Complte les phrases et retrouve le mot mystre (les lettres du mot mystre sont dans les cases vertes). a. Jorganise une pour rcolter de largent. b. Des associations , il y en a beaucoup en France. c. Les personnes en difficult ont de nous ! d. Cest important de venir en aux autres ! e. Le collge a un pour aider les enfants malades. Mot mystre : Venir en aide aux autres, cest faire preuve de . Tu es un bon secouriste. Complte avec les mots donns. a. lui secours accident quelquun bouge Si un motocycliste a eu un de la route et ne pas, je ne enlve pas son casque, je demande de laide et je tlphone aux . b. peau sest brl rien brlure chaude sous Si quelquun avec de leau trs et que sa est trs rouge, je passe la main leau froide, je ne mets dautre sur la et jappelle linfirmerie. c. saigne coupure si doigt mouchoir Si un ami sest coup le et beaucoup, je mets un propre autour du doigt et, la continue saigner, jappelle linfirmerie.d. dois tombe mal rien lui Si une personne et a trs la jambe, je ne fais , je ne donne pas de mdicament, je ne pas toucher la jambe et jappelle les pompiers. Complte avec ne (x2), quelquun, personne, quelque chose, rien a. Je veux expliquer mon projet . b. Il faut pour protger la coupure. c. Il veut raconter. d. Elle peut le dire . solve with work please please help with question 5 HELP PLEASE!! Which option is correct?! Solve A. n = 12B. n = -12C. n = -3D. n = 3 does a duroca exist? Anyone know? Please help. I WILL GIVE YOU HALF EATEN CHEETO IF YOU CAN GIVE ME ANSWER Which word is being signed in this video?A.motherB.girlC.auntD.cousin (female)