1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
Dima020 [189]
2 years ago
10

"The actual use and implementation of computer started after third generations". Justify this statement in your own words.​

Computers and Technology
2 answers:
allochka39001 [22]2 years ago
7 0
After three generations from when technology started people realized the use of technology was helpful and started to implement it in their daily lives
Vika [28.1K]2 years ago
5 0

<em>Answer: The computers of third generation used IC which replaced transistors. Now' the computers were more faster ,smaller and reliable so people started to use them often for many purposes ..So the actual use and implementation of computer started after third generations</em>

You might be interested in
Three broad categories of cryptographic algorithms are commonly used to create PRNGs: symmetric block ciphers, asymmetric cipher
RideAnS [48]

Answer:

True.

Explanation:

In generating PRNGs, several specific types of crypto algorithms will be widely will use: linear cipher block, nonlinear ciphers, as well as hash methods and authorization instructions in messages. So, that's why the following scenario is true about the cryptographic algorithms because this is a collection of several excellently defined however complicated mathematics techniques for encoding or decoding information.

7 0
3 years ago
And, Or, Not are examples of:
yanalaym [24]
Boolean operators it is
all the best
5 0
3 years ago
Scenario: As you walk into an empty class, you see a bag on the floor under the desk what will you do next
Keith_Richards [23]
I'm not sure on what you mean by this however lets say that it may contain a device, when entering DO NOT TOUCH ANYTHING, there are different methods on how a device could be triggered either from light switches or by trip wire which its best to leave the facility over all however lets say you cannot then stop listen for any ticking if not then have a flash light, if the room lights are turned off leave them off use a flash light but be careful where you shine it there could be light sensors on the device that trigger when a light hits it hence why the lights are off. when having a flash light you could be able to see a glare of a wire which could be a trip wire. there are many possibilities in how the device was made from timers, trip wire, sound,light,pressure, switches, electronic waves from phones may effect the device and could activate it as well. But anyways this is all a factor and its best to be careful and if able evacuate if the device is in a weird location at a odd time you know its not suppose to be there, and or items moved that are never moved and if it is never moved then there is dust that could have a odd shape like a hand print. Anyways im not sure if your looking for this type of answer but its good to know!
5 0
3 years ago
The approach by ___ (with a few minor refinements) was implemented 2300 years later by Newell and Simon in their GPS program, ab
Vedmedyk [2.9K]

Answer:

The approach by <u> Aristotle </u> (with a few minor refinements) was implemented 2300 years later by Newell and Simon in their GPS program, about which they write (Newell and Simon, 1972). The main methods of GPS jointly embody the heuristic of means-ends analysis.

Explanation:

Aristotle’s approach (with a few minor refinements) was implemented 2300 years later by Newell  and Simon in their GPS program, about which they write (Newell and Simon, 1972):

The main methods of GPS jointly embody the heuristic of Means–ends ANALYSIS , typified by the following kind of common-sense argument, sorting between what one has and what one wants, needs, or the difficulty implied,  classifying things according to the functions they give solution to and oscillating  among ends, functions required, and means that perform them. This  analysis does not indicate what to do when the actions will achieve the  goal, though, or when no achievement will be reached by the action.

3 0
3 years ago
Create a new folder in python and make it read only
igor_vitrenko [27]
Making the file read-only will not allow the file to be rewritten again. For this, we need to modify the permissions of the file. To achieve this, we will make use of the os module in Python more specifically, the chmod() of the os module.

The coding part is extremely simple and will contain very few lines as we are not doing much but changing the permissions. Using the chmod(), we can change the mode of the path, setting it to any mode using the suitable flags from the stat module. Both these modules come inbuilt with Python and hence you need not install anything additionally.

The entire code to change the file to read-only is as follows;

import os
from stat import S_IREAD
# Replace the first parameter with your file name
os.chmod("sample.txt", S_IREAD)
.

You can verify if the code was executed correctly by checking the file’s permissions. To do that :

Right-click on the file and click properties.
Under the attributes section, you will find the read-only checkbox checked.
I hope you found this article useful and it helped you make a file read-only. You can do more than just making the file read-only by using the appropriate flag from the stat module.
8 0
3 years ago
Other questions:
  • Jesse is writing a physics quiz about the motion of a roller coaster cart. He has a clip art illustration of a cart rolling hori
    9·2 answers
  • Digital art is created by using
    6·1 answer
  • Which database is more secure: the java-based apache derby or mysql?
    6·1 answer
  • The version of Windows that first provided networking capabilities was _____.
    12·2 answers
  • ________is a Windows software program with powerful accessibility solution that reads information on your screen using synthesiz
    9·1 answer
  • The picture that graphically represents the items you use in Windows is called a/an
    15·1 answer
  • Sorry but, what are brainliest for?
    7·2 answers
  • Numdu
    7·1 answer
  • For the function below, which variables have the same scope?
    5·2 answers
  • Make a list of any four computer that were used in the history of computer.​
    6·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!