1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
FrozenT [24]
4 years ago
10

Name the component used in first generation of computer​

Computers and Technology
1 answer:
Usimov [2.4K]4 years ago
3 0

Computer - First Generation. The period of first generation was from 1946-1959. The computers of first generation used vacuum tubes as the basic components for memory and circuitry for CPU (Central Processing Unit). These tubes, like electric bulbs, produced a lot of heat and the installations used to fuse frequently.

You might be interested in
Why might you use the "search network campaigns with display opt-in" campaign type?
slava [35]
The answer is:
You can use one budget to advertise on the Search Network and Display Network
5 0
3 years ago
Read 2 more answers
The AND operator is a disjunction and the OR operator is a conjunction.
qwelly [4]

Answer:

True but it might be false but i think is true

8 0
3 years ago
Logic errors are easily identified when a program is compiled true or false
lord [1]
<span>A compiler executes each program statement as soon as it is translated.
</span>The statement that logic errors are easily identified when a program is compiled is false, because the compiler locates only syntax errors, but logic errors <span>can be eliminated only through careful examination of your program. </span>
Logic errors are usually more difficult to find and resolve than syntax errors.


7 0
3 years ago
Read 2 more answers
Which automated method for VPN connection deployment would work best in combination with Microsoft Intune or Microsoft Endpoint
maks197457 [2]

There are different kinds of automated method for VPN connection deployment. The automated method for VPN connection deployment would work best  is ProfileXML

  • ProfileXML is known to be often used as a delivery methods in Windows PowerShell, Microsoft Endpoint Configuration Manager, and Intune. For an individual to be able to use the ProfileXML VPNv2 CSP setting, one have to construct XML by using the ProfileXML schema.

An individual can configure the Always On VPN client by using the PowerShell, Microsoft Endpoint Configuration Manager, or Intune. They all need an XML VPN profile to configure the appropriate VPN settings.

Learn more from

brainly.com/question/25554117

3 0
3 years ago
How long do deleted items remain in the recycle bin? forever one week until it is emptied until you log off or shut down?
GarryVolchara [31]
C. Until it is emptied is the answer to your question!
7 0
4 years ago
Read 2 more answers
Other questions:
  • Which of the following is NOT a logical operator (logical connective)?
    5·1 answer
  • What hex value is the standard indicator for jpeg graphics files?​?
    6·1 answer
  • What is logical memory?
    15·1 answer
  • By default, the hyperlink will display the text in the hyperlink itself, such as the web URL. How can this behavior be modified?
    12·1 answer
  • Write a program that includes functions to calculate feet to inches, inches to feet, feet to yards, and yards to feet. Then, acc
    9·2 answers
  • Create one Python module: arithmetic which has two functions: add(x, y) and get_length(x). The description of two functions are
    7·1 answer
  • Explain how a magnetic hard disk drive (HDD) operates.
    12·1 answer
  • What should you consider when using a wireless keyboard with your home computer
    15·1 answer
  • Question 1 of 10
    13·1 answer
  • A small _____ at the lower right corner of a tool indicates that it contains hidden tools​
    13·2 answers
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!