1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
lara31 [8.8K]
3 years ago
12

Puung.f. Differentiate between second and third Generation ComputerIG ANSWER QUESTIONS​

Computers and Technology
1 answer:
Papessa [141]3 years ago
6 0

Answer:

Second generation computers were based on transistors, essentially the same as first generation computers, but with the transistors replacing the vacuum tubes / thermionic valves.

Third generation computers used printed circuit boards to replace much of the wiring between the transistors. This had the advantage that components could be mass produced, reducing the number of errors because of incorrect wiring and making the component boards replacable.

You might be interested in
A ____ object is used to hold data that is retrieved from a database via the OleDbDataAdapter connection. a. DataRecord b. DataS
mariarad [96]

Answer:

datatable

Explanation:

3 0
2 years ago
Read 2 more answers
When reading words using a Scanner object's next method, _________. a. any characters at the beginning of the input that are con
zavuch27 [327]

Answer:

The answer is "Option d"

Explanation:

The scanner method is the full token of the process, that finds and returns. It is token, which is followed by both the inputs meeting and the guideline template. This method can block, even though the former instance of hasNext() is true while waiting for input, and wrong choices can be described as follows:

  • In option a, It is incorrect because the character at the beginning can't be considered.
  • In option b, It is wrong because the characters are known as the word in which blank space not a part of the word.
  • In option c, It is wrong because in this input before the call is not the method.
3 0
2 years ago
Of the following online activities, identify the TWO that are most likely to be affected by bandwidth quality
Kobotan [32]

Answer:

Watching online movies

Explanation:

4 0
2 years ago
#TODO: Define a data structure to keep track of which links are part of / not part of the spanning tree.
RoseWind [281]

Answer:

A spanning tree is a subset of Graph G, which has all the vertices covered with minimum possible number of edges. Hence, a spanning tree does not have cycles and it cannot be disconnected.. By this definition, we can draw a conclusion that every connected and undirected Graph G has at least one spanning tree.

8 0
3 years ago
For your biology class, you have taken a number of measurements for a plant growth experiment. You wish to create a chart that s
Naya [18.7K]
Calc or Excel is the application best suited for this effort.
8 0
3 years ago
Read 2 more answers
Other questions:
  • Which wireless technology has a typical transfer rate of 1 Mbps to 3 Mbps at distances up to about 10 meters?
    7·1 answer
  • On computer X, a nonpipelined instruction execution would require 12 ns. A pipelined implementation uses 6 equal-length stages o
    9·1 answer
  • Suppose that you created an robot that was so advanced it could act independently in very complex situations. It made its own de
    9·1 answer
  • Write an algorithm in pseudocode (following the style of the Minimax pseudocode) that will always make an optimal decision given
    13·1 answer
  • What is the name of the file manager in Microsoft Windows. The file manager used in Microsoft Windows is?
    12·2 answers
  • Software is giving instructions so that text is displayed on the monitor. This software is an example of _____.
    7·2 answers
  • The computerization of the layout and paste-up process further complicated printing, as did the digitizing of photographs.
    12·1 answer
  • The 7-bit ASCII code for the character ‘&’ is: 0100110 An odd parity check bit is now added to this code so 8 bits are trans
    12·1 answer
  • I need a pro help so no newbies just pro's thank you. I need help I has bean trying to help out with the scams links by putting
    10·1 answer
  • Array bounds checking should be directly coded into a system rather than assumed.
    12·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!