1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
larisa86 [58]
3 years ago
12

Select the characteristics that describe the evolution of computers that predate the personal computer (select all correct answe

rs).
[a] Computers tended to become smaller.[b] Computers tended to become faster.[c] Computers tended to become more expensive.[d] Computers tended to be used for more applications.
Computers and Technology
1 answer:
emmasim [6.3K]3 years ago
5 0

Answer:

Options (a), (b) and (d)

Explanation:

  • Option (a) is true that the computers have become smaller and smaller with advancement of the technology. The earlier version of computers used vacuum tubes and are very big in size.
  • As the years passed and due to the advancement of the transistors the computers have become smaller in size.
  • Option (b) is true. With the advancement in the research in circuits used in the computer like Integrated Circuits the computers have become faster.
  • The response time of the operating system has reduced drastically.
  • Option (c) is wrong option. The computers have become cheaper. The transistors are cheaper compared to the vacuum tubes which are used in the earlier computers.
  • The price of the same computer (memory and time efficiency) has become less in the coming years than in the previous years with the advancement in the research of transistors.
  • Option (d) is true. Now-a-days computers support more and more number of applications. Computers has more number of applications in various and diversified fields.
  • With the advancements in the computers, the computers are finding more applications in different fields like medicine, law, transport industries etc.
You might be interested in
What command will prevent all unencrypted passwords from displaying in plain text in a configuration file?.
Juli2301 [7.4K]

Answer:

(config)# enable password secret

(config)# enable secret Encrypted_Password

(config-line)# password secret

(config)# enable secret Secret_Password

(config)# service password-encryption

Explanation:

To prevent all configured passwords from appearing in plain text in configuration files, an administrator can execute the service password-encryption command. This command encrypts all configured passwords in the configuration file. For more: https://ccnav7.net/what-command-will-prevent-all-unencrypted-passwords-from-displaying-in-plain-text-in-a-configuration-file-2/

3 0
2 years ago
PLEASE HELP!!!!!!!!!!! If you whisper while telling someone a secret, your nonverbal communication is          your verbal inter
Assoli18 [71]
The answer is repeating 
3 0
3 years ago
1. What is the global marketplace?
podryga [215]

.......................................

4 0
3 years ago
Read 2 more answers
What allows your computer to communicate over a network and access the Internet?
geniusboy [140]

Answer:

To connect to the Internet and other computers on a network, a computer must have a NIC (network interface card) installed.

Explanation:

A network cable plugged into the NIC on one end and plugged into a cable modem, DSL modem, router, or switch can allow a computer to access the Internet and connect to other computers. ISPs (Internet service providers)

5 0
2 years ago
Suppose we want to compress a text consisting of 6 characters,a, b, c, d, e, fusingthe Huffman Algorithm. Give an example for wh
denis-greek [22]

Answer:

Check the explanation

Explanation:

When it comes to the field of computer science and information theory, the Huffman code is a specific type of optimal prefix code that is mostly utilized for the compression of lossless data. The process and procedures of finding or using such a code proceeds by means of Huffman coding, which is an algorithm that was developed by David A.

kindly check the below image for the complete answer to your question.

8 0
3 years ago
Other questions:
  • To add and remove chart elements, you can use the add chart element button in the charts layout group on the ____ tab.
    6·1 answer
  • Elise has just edited two photos of her cat and three different photos of her dog. She needs to save all five of these photos in
    5·2 answers
  • Diane wants to maintain a record of grades scored in the fifth, sixth, and seventh grades. She enters her grades and the total p
    13·1 answer
  • Calls to the tostring( ) method emphasize the use of ____.
    12·1 answer
  • 4
    10·1 answer
  • Write any 2 differences between implicit variables and explicit variables.​Plz tell :' (
    10·1 answer
  • Using this tool to help you to visualize your slides and develop your content
    13·1 answer
  • Each of the outcomes listed below is a result of executing the following script except for one. Which one? CREATE ROLE ExampleRo
    6·1 answer
  • Leslie works in an SDLC team. When Leslie edits a file, it gets saved as an altered version. Later all the altered versions are
    9·1 answer
  • The first person to say something in here will get brainliested.
    7·2 answers
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!