1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
Blababa [14]
2 years ago
10

hello fellows i need a help.Ineed to know about computer evolutions and computer generations.please hurry.Its my rankover questi

ons.​
Computers and Technology
1 answer:
mestny [16]2 years ago
8 0

Answer: Computer generations: There was First Generation 50s,60s. 2nd  60s,70s, 3rd, 70s, Present, and 4th Future.

Computer evolutions: The first modern computer was created in the 1930s and was called the Z1, which was followed by large machinery that took up entire rooms. In the '60s, computers evolved from professional use to personal use, as the first personal computer was introduced to the public.

Explanation: This took me about 10 minutes. Enjoy.

You might be interested in
Which is the best description of a computer virus?
MatroZZZ [7]
The best description of a computer virus is. Someone first starts out making a malicious program, then can send it to a unexpected user. After that, when the user opens the malicious program, it can do negative things on the target. The virus first starts out in the system32, then infects a random file type for example, exe files, or dlls etc. Then random errors can pop up on the computer saying "YOUR COMPUTER IS UNDER RISK! CALL THIS NUMBER NOW! 555-555-5555" and the options of the error, can direct you to a website, that can give you another virus. To get rid of a virus, you have to ignore the popups that comes onto your computer, and get a strong antivirus like avast, or avg. Then let it scan the system. After when the scan is done, it will show up the virus, and it will give you options "to delete virus or ignore it" you would hit delete. I hope this answer helped you. Let me know if you have any more questions! Thanks!
6 0
3 years ago
Read 2 more answers
What role does Dan Carson play at Hornall Anderson Design Works?
ANEK [815]
<span>Head of Design 

Hope this helps ;)</span>
8 0
3 years ago
What quality do the president of the united states and members of congress share that prompted the framers to place thr nations
insens350 [35]
They were elected by the populace?
3 0
3 years ago
List four reasons of meaningful use that demonstrate the capabilities and processes required for the provider to show active use
Naily [24]

<span>1.       </span>Improve quality of care and reduce health disparities.

<span>2.       </span>Read the orders in the medical record and make sure to read it back again to verify accuracy.

<span>3.       </span>Maintain the security and privacy of patient health information.

<span>4.       </span>Talk to the patients and families in management of their health care.






7 0
4 years ago
Laura is the first person in her SDLC team to detect and predict security vulnerabilities in the software. In which phase is Lau
Eddi Din [679]

Answer:

answer is c

if my answer is wrong than sorry

7 0
3 years ago
Other questions:
  • Which sign or symbol will you use to lock cells for absolute cell reference?
    8·2 answers
  • "how has user access of the web changed over the past 10 years? how does this impact the design of a website?"
    6·1 answer
  • Explain Organizational approach to System Analysis and Design
    11·1 answer
  • What is the different between a computer and a phone?​
    15·1 answer
  • Whats the difference between firms that provide services and firms that sell products?
    7·2 answers
  • Having a low credit score can make it more difficult to: Obtain a car loan Open a new credit card Secure an apartment lease All
    5·1 answer
  • Your ad can show on the Google Search Network when someone searches for terms that are similar to your:
    6·1 answer
  • Which statement best justifies the use of a high-speed cache in a CPU?
    11·1 answer
  • each data mining technique has its advantages and limitations. which data mining technique mimics the neural structure of the br
    14·1 answer
  • if the input message is omitted when creating a data validation rule for a cell, no message will appear when the user selects th
    13·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!