1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
vampirchik [111]
4 years ago
8

What are the nicknames for the first generation computers

Computers and Technology
1 answer:
Gemiola [76]4 years ago
6 0
I believe there were not nicknames for first generation computers.
--
Sorry!
--
You might be interested in
7.4 Lesson Practice (projectstem): what is output if the user is enters 2?​
Hatshy [7]

Answer:

18

Explanation:

lets go step by step.

the function called tryIt has a value, a variable named "a". this "a" variable will be whatever the user enters when the program says, Enter a number.

ok so if we enter "a" as 2, and b in the function will always be 7, and 2 + 7 equals 9,

and the ans variable (short for answer) will take the result of the function (9) and multiply it by 2,

then the answer is 18

3 0
3 years ago
Describe three ways to protect the computer and all peripheral devices from damage
omeli [17]

Here are three ways:

Cleaning: as applied to most things in our lives, cleaning also applies to protecting peripheral devices. To ensure the smooth running of such devices one needs to clean the dust and dirt from these devices once in a while. Make sure you disconnect the device before you eject it from the system.<span>

Follow instructions: Most devices come with a safety guide and instructions manual, always use the recommended settings for the smooth running of your system. These recommendations usually come from the manufacturer and are reliable.

<span>Surge suppressor/protector: One of the major issues faced by the users is faults caused by power surges. One needs to make sure to use a Surge Suppressor/Protector connected with the system to make sure it will not damaged with power fluctuations. </span></span>

3 0
4 years ago
In implementing Security Life Cycle:__________
Dvinal [7]

Answer:

b) one needs to follow through all phases, assessment, design, deploy and manage security

Explanation:

The security life cycle is a process in which it involves the security artifacts for developing the software through a lifecycle. It contains a detailed plan that derives how to create an application form

At the time when the requirements and activity related to design is finished the next step is the software implementation. In this, the developers begins with the coding as per the requirements and designs discussed in the last step

Therefore according to the given options, the second option is correct

7 0
3 years ago
Non linear editing can cause _____ where edit and re-edit and re-edit again can cause video to be less true than the original ma
Oxana [17]

Non-linear editing can cause modification in the original video whereas editing and re-edit and re-edit again can cause the video to be less true than the original material.

<h3>What is non-linear editing?</h3>

In non-linear editing, the editor can do any operation with the video like adding or removing any frame without starting from the beginning.

It's been characterized as a ‘cut and paste’ technique that can really innovate how video makers approach videography.

Therefore Non-linear editing can cause modification in the original video whereas editing and re-editing and re-editing again can cause the video to be less true than the original material.

To know more about non-linear editing follow

brainly.com/question/15614247

#SPJ4

8 0
2 years ago
Greg is the purchasing manager at a jeans-manufacturing company. He knows he could save his company money by using cheaper, thin
pychu [463]

Answer:

Option (B) i.e., character is the correct answer to the following question.

Explanation:

Because the character quality demonstrates the ability of honesty, loyalty, and integrity, etc that shows the positive character of the person and Greg has good character quality because he thinks about their customers before he thinks about the money. So, that's why Greg shows the quality of the good character and he also loyal about their work.

8 0
3 years ago
Other questions:
  • The command prompt found on windows 10 is very similar to the interface of what past operating system?
    5·2 answers
  • 5255555555555+55555555555555/1111*99442
    14·2 answers
  • You are a high school counselor with 9 students who applied for 3 different summer jobs: Job A, Job B, and Job C. Each of the su
    5·1 answer
  • In a virtual memory system, each process must have its own page table.(True or False?)
    13·1 answer
  • E-mail played a role in political upheavals in Europe because it became an important means of communication in Europe. E-mail, c
    13·1 answer
  • For a loop counter, the appropriate data type would be:
    9·1 answer
  • 1. Write an application that throws and catches an ArithmeticException when you attempt to take the square root of a negative va
    11·1 answer
  • Write an if-else statement that assigns 0 to the variable b if the variable a is less than 10. Otherwise, it should assign 99 to
    6·1 answer
  • Which of the cached information retrieved will be the same as what is stored in the original server where the data is maintained
    7·1 answer
  • explain the following joke: “There are 10 types of people in the world: those who understand binary and those who don’t.”
    11·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!