Answer:
<u>First generation are</u>
a)they are unreliable
b)they are very costly and
c)huge in size
<u>Second generation are</u>
a)they use a transistor
b)smaller in size compared to first generation
c)they are faster than the first generation
<u>Third generation are </u>
a)its more reliable than the first generation and the second generation
b)faster than first generation and the second generation
c)consume less electricity
<u>Fourth generation are</u>
a) they are very cheap
b)they are very small in size
c)they are portable and reliable
Explanation:
explanation is in the answer
Answer:(C) Anyone with access to the personal computers could log on to the mainframe.
Explanation:
It is no doubt that log on procedures are cumbersome so what most users do is that they store log on sequences in their computer so that they could use the main frame facilities whenever they access it the second time.
Here we have to identify the associated risk with this approach.
This process could lead to access of the computer system to users and thereby making all the data available in the system vulnerable. So option C is correct.
option (A) is incorrect as the back up option who also be affected when the system is accessible to anyone.
option (B) is incorrect because it has nothing to do anything with training of the personnel.
option (D) is incorrect because it one has nothing to do with the physical system what vulnerable reside is inside the system.
Numbers like 1080p and 4K refer to a TV's<span> screen </span>resolution and<span> the more pixels a screen has the more picture detail it can show.</span>
Answer: D.) all of the above
Explanation: By doing all three of these it makes almost everyone in the community is happier and more positive which is better than the bully's & people who don't speak up feel less entitled, it achieves the goal.