1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
stepan [7]
3 years ago
6

Differentiate between third and fourth generation of computer​

Computers and Technology
1 answer:
Ipatiy [6.2K]3 years ago
6 0

Answer: third generation of computer are larger than fourth generation. ... IC chips were used whereas in fourth generation microprocessor were used. fourth generation consumed less electricity than third generation.

You might be interested in
Given two 3x3 arrays of integer, x1 and x2, write the code needed to copy every value from x1 to its corresponding element in x2
Reika [66]

Answer:

#include<iostream>

#include<iomanip>

using namespacestd;

int main ()

{

int x1[3][3]={1,2,3,4,5,6,7,8,9};

int x2[3][3];

int i,j;

for(i=0;i<3;i++)

for(j=0;j<3;j++)

x2[i][j] = x1[i][j];

cout<<"copy from x1 to x2 , x2 is :";

for(i=0;i<3;i++)

for(j=0;j<3;j++)

cout<<x2[i][j]<<" ";

cout<<endl;

system("pause");

return 0;

}

/* Sample output

copy from x1 to x2 , x2 is :1 2 3 4 5 6 7 8 9

Press any key to continue . . .

*/

Explanation:

5 0
4 years ago
After a robbery, what is the purpose of conducting a neighborhood canvass?
andrew-mc [135]

Answer:

If im correct this would most likely be D perhaps?

Explanation:

I say that because like, I would assume they canvass it so that they are able to see anything that looks out of place

6 0
3 years ago
Need help ASAP.<br> I am so lost.
Savatey [412]

Answer: china

Explanation:

6 0
3 years ago
What is the difference between cybercrime and cyber security?
Klio2033 [76]

Answer: Cybersecurity is ultimately about protecting government and corporate networks, seeking to make it difficult for hackers to find and exploit vulnerabilities. Cybercrime, on the other hand, tends to focus more on protecting individuals and families as they navigate online life.

Explanation:

3 0
3 years ago
ANSWER THIS CORRECTLY FOR BRAINLIEST
jeka57 [31]
The answer is https it is on Every url
6 0
3 years ago
Read 2 more answers
Other questions:
  • The ________ model allows the owner of a resource to manage who can or cannot access the item. Owners maintain this access throu
    8·1 answer
  • A ________ editor was the dominant way film was edited up until the early '90s.
    7·2 answers
  • System requirements that are important in determining if a software program will work on a computer are ____.
    8·1 answer
  • Give a big-O estimate the number of operations, where an operation is a comparison or a multiplication, used in this segment of
    10·1 answer
  • A client contacted you to request your help in researching and supplying the hardware necessary to implement a SOHO solution at
    5·1 answer
  • Which example task should a developer use a trigger rather than a workflow rule for?
    11·1 answer
  • Which of the following statements best represents the impact vaudeville had on the film industry? Early silent films were more r
    14·1 answer
  • What other jobs would require employees to follow directions very carefully? (Give 4 examples)​
    9·1 answer
  • Is this a desktop or a computer, or are they the same thing
    12·1 answer
  • (50 POINTS!) Type the correct answer in the box.
    11·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!