1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
storchak [24]
3 years ago
12

Differences between the first four generations of computers​

Computers and Technology
1 answer:
Lisa [10]3 years ago
4 0
Hey man

The first generation computers were developed during 1943-1958. It used vacuum tubes as the active electronic components and was therefore very large. However some of the features are as follows-

a) They were extremely large and occupied a very large space.

b) They used vacuum tubes as memory device.

c) They were very expensive and consumed a lot of electrical power.

d) The operating speed was measured in milliseconds.

e) These computers had low level of accuracy and reliability.

f) Storage capacity was too small only 1 to 4Kb.

g) They used machine level programming language.

The examples are- UNIVAC, ENIAC, EDSAC, EDVAC, and UNIVAC.

The second generation computers were developed during 1959-1965. The invention of the transistor by three scientists of Bell Telephone Laboratories in 1947 greatly changed the development of computers. However some of the features are as follows-

a) These computers used transistor.

b) They were smaller, faster and cheaper than first generation of computer.

c) They consumed less electrical power than first generation.

d) The operating speed was measured in microseconds.

e) They were more reliable and accurate than the first generation computers.

f) They could understand high level language such as COBOL.

g) Magnetic tapes were used as secondary storage media.

The examples are – IBM 1620, IBM 1401, and CDC 3600.

The third generation computers were developed during 1966-1973. The development of Integrated Circuit (IC) signaled the beginning of the third generation computers. However some of the features are as follows-

a) These computers used integrated circuits.

b) They were small, efficient and reliable.

c) Operating systems were developed.

d) Monitors and keyboards were introduced for input and output of data.

e) Magnetic disks were used for secondary storage.

f) The operating speed was measured in nano seconds.

g) They could understand large number of high level languages.

The examples are – IBM 360, ICL -1900, and IBM 370 etc.

The fourth generation computers were developed during 1974-1990. This generation of computer is presently in use. The development of microprocessor signaled the beginning of the fourth generation of computers. However some of the features are as follows-

a) These computers use LSI and VLSI technologies.

b) Its sizes were reduced to desktop and laptop computer.

c) These computers are highly reliable and accurate.

d) They have a large memory and high functional speed.

e) The operating speed is measured in beyond picoseconds and MIPS (Million of instruction per second)

f) Magnetic disk is the common source of external storage.

g) Multiprocessing and multiprogramming OS (operating system) are used.

h) 4GL are also used.

The examples are – IBM PC, Apple/Macintosh, 8086, 80286 SX, 80386 SX etc.

The computers having artificial intelligence (AI) and high processing capacity undergoing on the development stage from 1990 are said to be fifth generation computers. However some of the features are as follows-

a) The speed will be extremely high in fifth generation computer.

b) These computers will be using Ultra Large Scale Integration (ULSI) technology.

c) The goal of fifth generation computers is to develop machines that will be able to think and take decisions.

d) It can perform large number of parallel processing.

e) Biochips and Gallium Arsenide (GaAS) will be used as memory devices.

f) Large uses of natural language processing and user friendly.

Able to make decisions like human beings.
You might be interested in
How can you quickly locate emails with large attachments.
IgorC [24]

To locate emails with large attachments, go to your email and then choose the option of Choose File > Cleanup Tools > Mailbox Cleanup.

Here , one has to Log into their email account and open their inbox and then use the Search Mail bar and type Size to locate or they Set the Find items that are larger than to 9999 and then one has to click Find.

<h3>How do I find emails by attachment size?</h3>

This can also be done for messages that has a size equal to or bigger than 25.

One has to open their message and then they have to right-click on the attachment. You can choose Save As and save to the location of the choice you want.

Learn more about attachments from

brainly.com/question/978078

4 0
2 years ago
Why is body language an important indicator in business meetings? A. You will be able to communicate more strongly. B. You will
pantera1 [17]

Answer:

you will know if your audience is engaged.

Explanation:

6 0
3 years ago
You are researching RAM for a computer you are building for a friend who will be using the system as a home office server for he
AlexFokin [52]

Answer:

ECC memory

Explanation:

According to my research on information technology, I can say that based on the information provided within the question the best type of RAM for this situation would be ECC memory (RAM). This abbreviation refers to Error-Correcting-Code, this memory can detect and correct many common types of errors, and is used mainly for servers or when sensitive data is involved where errors and data corruption cannot be allowed to happen under any circumstance.

I hope this answered your question. If you have any more questions feel free to ask away at Brainly.

3 0
4 years ago
A dmz is a subnet of _____________ accessible servers placed outside the internal network.
Alborosie

A dmz is a subnet of publicly accessible servers placed outside the internal network. Any service provided to users on the public internet should be placed in the DMZ network. DMZ means demilitarized zone (perimeter network) .

7 0
3 years ago
Write a program that prompts the user to enter a string and displays the maximum consecutive increasingly ordered substring. Ana
Marianna [84]

Answer:

a.

// Program is written in Java Programming Language

// Comments are used for explanatory purpose

// Comments marked x represents simple statements

// Comments marked y represents single loop

// Program starts here

import java.util.*;

public class MaxOrder {

public static void main(String args [] ) {

Scanner accept = new Scanner(System.in);

LinkedList<Character> maxtext = new LinkedList<>();

LinkedList<Character> textlist = new LinkedList<>();

System.out.print("Enter a text: ");

String text = accept.nextLine();

// Find the maximum consecutive increasingly ordered substring

for (int i = 0; i < text.length(); i++) { // y1

if (textlist.size() > 1 && text.charAt(i) <= textlist.getLast() && textlist.contains(text.charAt(i))) {

textlist.clear(); // x

}

textlist.add(text.charAt(i)); // x

if (textlist.size() > maxtext.size()) { // x

maxtext.clear();

maxtext.addAll(list);

}

}

// Display the maximum consecutive

// increasingly ordered substring

for (Character ch: maxtext) { // y2

System.out.print(ch); // x

}

System.out.println();

}

b. Analysing the time complexity

In single loop marked y1, there are 3 simple statements ----- 1

In single loop marked y2, there is 1 simple statement --_--- 2

In (1) above,

1 single loop * 3 simple statements = 3;

*

In (2) above,

1 single loop * 1 simple statement = 1;

So, we have

T(n) = O(n) Linear time

7 0
4 years ago
Other questions:
  • In this type of network, data is certain to reach its destination.
    7·1 answer
  • What substance was the first photograph made from?
    6·1 answer
  • Categories of general purpose application software and examples each​
    13·1 answer
  • Which of the following correctly describes the syntax of an If statement?
    9·1 answer
  • Write a method named lastFirst that accepts a string as its parameter representing a person's first and last name. The method sh
    13·1 answer
  • In word, the ____ presents the most accurate view of how your document will look when printed, displaying the entire page on scr
    15·1 answer
  • Which folder(s) are commonly used in the Navigation Pane of Outlook? Check all that apply.
    13·1 answer
  • A word object in an excel worksheet to activate the word features
    9·1 answer
  • In your own words, describe how a network administrator can use the OSI model to isolate a network problem.
    13·1 answer
  • Which function calls would provide the most helpful test of this function? Remember: With tests, you are attempting to figure ou
    5·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!