1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
melomori [17]
3 years ago
7

1. In which generation were semiconductor memories used for the first time:

Computers and Technology
1 answer:
Llana [10]3 years ago
4 0

1: D. Third Generation

2: C. 10

You might be interested in
Identify measures to protect your computer against threats from human actions. You cannot access a file in a computer that belon
scZoUnD [109]

Answer:

Firewalls

Explanation:

A firewall is simply a network security system whose main duty is. to prevent unwanted access to. private network.

Firewalls is measures to protect your computer against threats from human actions.

It is also the one singular thing that prevents you from accessing the file on your friends system.

5 0
3 years ago
When mysql automatically converts one data type to another, itâs known as a/an ______________________ conversion?
lubasha [3.4K]
<span>MySQL is an open-source relational database management system (RDBMS)</span>
When MySQL automatically converts one data type to another, is known as an implicit conversion. Implicit conversion refers to the mixing and matching data types within the same operation. Example for implicit conversion is when MySQL automatically converts numbers to strings and vice versa. 
5 0
3 years ago
How is ict integrated into marketing<br>​
Aleks04 [339]

Answer: The utilize of great ICT moreover moves forward client administrations and client request. From database advancement, site plan to showcase investigate, interpretation program, coordinate mail showcasing and preparing, the application of ICT is basic for a financial victory. The web is one of the ways in which media companies / businesses publicize.

Explanation:

5 0
1 year ago
Jamal is installing new software and would like a step-by-step guide to teach him how. Which resource would be best, and why?
ratelena [41]
The answer is D because it will explain and show how to install the software.
3 0
3 years ago
Read 2 more answers
External network security threats can include management failure to support organization-wide security awareness, inadequate sec
Ganezh [65]

Answer:

The answer is "Option B".

Explanation:

In external networking, it establishes the informal links beyond the size of the firm, which supports its career, and these networks may be used for help, invaluable guidance.

This system would be a different point of view to provide the privacy protection for the system connectivity, and in the internal system protects its system protects all its data, that's why it is false.

6 0
3 years ago
Other questions:
  • A(n) __________ is a set of technologies used for exchanging data between applications and for connecting processes with other s
    14·2 answers
  • Some files appear dimmed in one of the default folders on your computer. What would be the best course of action? A. Leave the f
    5·1 answer
  • What is a quick way to close the header or footer view in a microsoft word document?
    12·1 answer
  • A check list should be based on that apply to your industry.
    11·2 answers
  • A(n) _____ measures the ability to juggle a variety of demands, as in a manager's job where the candidate is presented with simu
    8·1 answer
  • The _____ search algorithm searches a list for a given item, starting with the first element and continues to compare the item w
    12·1 answer
  • Problem 3. Consider the following recurrence, defined for n a power of 4 (for the time of some algorithm): T(n) = 3 if n = 1 2T(
    5·1 answer
  • Given the scenario, before leaving the office, you ask the CIO to provide which formal document authorizing you to perform certa
    11·1 answer
  • Choose the type of collection described.
    9·1 answer
  • PLZZZ HELP!!!!!!!
    12·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!