1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
oksano4ka [1.4K]
1 year ago
8

Which statements are true regarding mainframe computers? Mainframes are fast-performing computers that have large storage capaci

ties. They are the fastest and largest computers built, and they can perform more than 1 trillion calculations per second. The processing and storage units of mainframe computers are central hubs, with users accessing them through either unintelligent terminals or intelligent terminals. A unintelligent terminal does not process or store data. It only has input and output devices connected to it. They have low-level capacity and are made of semiconductors fabricated on silicon chips. In addition to these terminals, people sometimes use personal computers to access a mainframe computer. The stored program in the digital computer system uses a microprocessor, a programmable read-only memory, and a random access memory to operate.​
Computers and Technology
1 answer:
sveticcg [70]1 year ago
3 0

The statements that is  true regarding mainframe computers is that:

  • Mainframes are fast-performing computers that have large storage capacities. 

<h3>Is mainframe computers are very large computers?</h3>

A mainframe computer is known to be large. Mainframe computers are known to be quite faster and have a lot of storage capacity when compared to traditional server computers.

Note that A mainframe computer is seen as a server that can be able to contain thousands of client computers linked to it. Mainframes are said to be used by large companies that needs high-volume transaction processing and storage.

Hence, The statements that is  true regarding mainframe computers is that:

  • Mainframes are fast-performing computers that have large storage capacities. 

Learn more about  mainframe computers  from

brainly.com/question/14480599

#SPJ1

You might be interested in
What type of attacks take advantage of vulnerabilities in poorly coded web application software to introduce malicious program c
Yakvenalex [24]

Answer:

SQL Injection

Explanation:

Coding a web application that uses a database is requiring close attention, where the developer closes any loophole any attacker may later want to exploit when the application is deployed. SQL Injection is a type of attack where the attacker places malicious code in the query statements through the form. This is possible if the input is not properly sanitized and cleaned.

5 0
2 years ago
In which program structure does the processor verify the mentioned condition only after executing the dependent statements once?
Cloud [144]
B. because you have to do it while in structure.
3 0
3 years ago
Read 2 more answers
How much time does a gold chest take to open
MaRussiya [10]

Gold chest takes 8 hours to open or unlock.

<u>Explanation:</u>

Clash royale is a game which has been developed and published with the help of a super cell. It is a video game. Many players can play this game at the same time. In the sense, clash royale is a multi player game.

In this game, the players who are playing the game are awarded with the gold chest. They are also awarded with the gems. In order to unlock or open a gold chest eight hours are needed. Apart from this there is an other way also with which the gold chest can be unlocked. It can be unlocked with the help of forty eight gems.

7 0
3 years ago
Just help :(((((((((((((((((((((((((((((((((((
saveliy_v [14]

Answer:

I am sure the answer is A

Explanation:

As you can see from the graph, the first time they pumped air, the numbers were 6, 1.2, and 2. Once they start pumping the numbers decrease. Therefore, I think the answer is A. It went to 5.7, 4, and 2 from 6, 1.2, and 2.1.

5 0
2 years ago
“What does it mean when we “rework” copyrighted material?”
Alja [10]
We use ideas and thoughts that have already been protected by the law which is called Copyright. We reworking copyright material means we are taking somebody's ideas and calling it ours. Which is not right by the law.
3 0
3 years ago
Read 2 more answers
Other questions:
  • Walking paths across the part is represented by the equation why equals -4x - 6​
    9·1 answer
  • The two types of objects responsible for collecting data are
    14·1 answer
  • Which computer network component allows data transfers from one computer to another through a telephone line?
    11·2 answers
  • The M:N relationship between STUDENT and CLASS must be divided into two 1:M relationships through the use of the ENROLL entity;
    10·2 answers
  • Write a program that lets the user enter a nonnegative integer then uses a loop to calculate the factorial of that number. Displ
    11·1 answer
  • What port is typically reserved and utilized by the Secure Hypertext Transfer Protocol to create a secure connection to a Web se
    13·1 answer
  • Explain what happens if you try to open a file for reading that does not exist.
    10·1 answer
  • What is ana absolute adress
    11·1 answer
  • 10. Differentiate between equity share &amp; preference share.​
    11·1 answer
  • Select the correct answer
    15·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!