Answer:
A. Invention of microprocessor
Explanation:
The third generation of computer itself was based on the technology of integrated circuits (shorten as IC).
It lasted for about 6 years and was brought to an end with the advent of the fourth generation of computers which was based on microprocessors.
Hence, option A answers the question.
Answer:
True
Explanation:
In computer, Memory management is a form of resource management, its essential requirement is to provide ways to dynamically allocate portions of memory to programs at their request, and to free it to be used again when not needed. Memory management is critical to any advanced computer system that uses more than a single process.
Several methods that has increased effectiveness of memory management like the Virtual memory systems which separates the memory addresses used by a process from actual physical addresses, thus allowing the separation of processes and increasing the size of the virtual address space beyond the available amount of Random Access Memory (RAM) using paging or swapping to secondary storage have been used.
"The Memory Manager relocates programs to gather together all of the empty blocks and compact them to make one block of memory large enough to accommodate some or all of the jobs waiting to get in from your question.
Answer:
In order to reduce the risk of accidents on the roads.
Explanation:
The special equipment is used when testing eyesight for a driver's license in order to reduce the risk of accidents on the roads. Good eyesight is very important for good and safe driving so to find out the eyesight of the driver, the license officer used special equipment in order to check driver's eyes. If the eyesight is good, the officer provide license to the person otherwise not so that no accidents happen on the road.
Answer:
B. Windows domain user name and password
Explanation:
Windows domain user name and password are login credentials required for the user to successfully sign in to the Windows domain.
The domain username and password are usually stored on a domain controller rather than on the host.
As a domain user, the computer seeks from the domain controller the privileges assigned to the user, if it gets a positive response from the domain controller, it authorizes the users login credentials without restrictions; else, it denies the user access.