1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
Harrizon [31]
4 years ago
14

Place the following eras of IT infrastructure evolution in order, from earliest to most recent:

Computers and Technology
1 answer:
Sedaia [141]4 years ago
5 0

Answer:

The correct option to the following question is B.) 5, 4, 2, 3, 1.

Explanation:

Personal Computer - In year 1975, E.d Roberts was coin the term as "personal computer" when he was introduced Altair 8800. The first PC (personal computer) was considered by many to the KENBAK-1, that was the first introduced for $750 in year 1971.

Mainframe and Minicomputer - Mainframe era was the periods of the highly centralized computing which controlled by the programmers and the system operators.

The Minicomputer was powerful yet it is less expensive computers that began to change the pattern and allow the decentralized computing which is customizable to an individual departments or the business units.

In the client/server computing - the laptop or the desktop computer systems called clients which are networked to the powerful server computers that provides client computers with the variety of the capabilities and the services.

Enterprise Era - In the early year 1990s, the firms are turned in to the networking standards and the software tools which could be integrated disparate the networks and the applications throughout the firm into the enterprise wide infrastructure. The Internet was developed into the trusted communication environments after the year 1995, the business firms was began seriously for using TCP/IP (Transmission Control Protocol/Internet Protocol) networking standards for tie their disparate network together.

You might be interested in
Which disipline involves creating computer networks
Anestetic [448]

Answer:

computer science

The discipline of computer science includes the study of algorithms and data structures, computer and network design, modeling data and information processes, and artificial intelligence.

Explanation:

hope this helps

brainliest plz

5 0
3 years ago
Read 2 more answers
Why would someone need to use tools like IECacheView or MyLastSearch on a system? Do companies have the right to search a workst
natali 33 [55]

IECacheView helps a user quickly and easily access and read the cache folder of Internet Explorer. Information such as filename, content type, number of hits, expiration time, and the full path of cache filename can be accessed. With all this information, investigators can look at what users are accessing on the web. Anything accessed on IE by an employee at his or her workstation can be searched by the company. This brings us to the question; do companies have the right to search a workstation they issued to their employees using IECacheView?

In my own opinion, I honestly think that it is not right to search an employee’s workstation using IECacheView or any other tool whatsoever. Under the law, employees have reasonable rights to privacy. These rights prevent employers from searching their employees. Unless there is evidence of computer crimes or misconduct, employees have a greater expectation of privacy

6 0
4 years ago
Emily wants to search online for cakes containing nuts. However, she wants to skip cakes that have raisins in them. Which option
Mandarinka [93]

Answer:

I believe the answer is C

Explanation:

6 0
3 years ago
Which is an example of correct HTML? <h1> This is a heading</h1>
denis23 [38]

Answer:

An HTML tag is a special word or letter surrounded by angle brackets, < and >. You use tags to create HTML elements , such as paragraphs or links.

Explanation:

Many elements have an opening tag and a closing tag — for example, a p (paragraph) element has a <p> tag, followed by the paragraph text, followed by a closing </p> tag. HTML Editors

Step 1: Open Notepad (PC) Windows 8 or later: ...

Step 1: Open TextEdit (Mac) Open Finder > Applications > TextEdit. ...

Step 2: Write Some HTML. Write or copy the following HTML code into Notepad: ...

Step 3: Save the HTML Page. Save the file on your computer. ...

Step 4: View the HTML Page in Your Browser. hope this helps you :) god loves you :)

4 0
3 years ago
Read 2 more answers
Plz help me I will mark as the brainlest I only need long answer plz help me ​
xxTIMURxx [149]

Strategy 1

*Testing for timing, high reliability and performance.

Reasons.

Every device and system configuration must be tested including the software setup,definitions and rules must be tested with an attempt to force the system and its intergrals to fail. Every failure(if there are any) must be evaluated and errors corrected.

Strategy 2

*Measuring response levels at the lowest set point of the alarm.

Reasons.

This is to check the trigger points of the alarms in the system and the response must be recorded as well as changing the intervals of alarm triggers so as to evaluate the time taken for the alarm to respond at the lowest point of it to be triggered.

7 0
3 years ago
Other questions:
  • A host sends a packet to a local server on the company's wired ethernet lan via an access point. how many frames are necessary f
    6·1 answer
  • Can I recover pics I deleted like 9 months ago? ​
    13·2 answers
  • John just opened a savings account and wants to maximize the amount of interest he ears. Which of the following actions
    8·1 answer
  • Minerals can form deep inside Earth’s crust by
    13·1 answer
  • What is the most important trait of the first pilot project in the AI Transformation Playbook?
    10·1 answer
  • 1. Assume you're using a three-button mouse. To access shortcut menus, you would
    6·2 answers
  • Will a large computer monitor have a clearer picture than using my plasma tv screen?
    9·1 answer
  • What is software and explain the five types of software
    5·2 answers
  • How does a python programmer concatenate a numeric value to a string value?
    7·1 answer
  • Which of the following is not a secondary memory. (a) pen drive (b) Hard disk (c) Ram (d) Magnetic disk
    8·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!