1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
n200080 [17]
3 years ago
10

State all the generations of computers.

Computers and Technology
2 answers:
vaieri [72.5K]3 years ago
8 0

Answer:

1 1st generation =vacuum tube based

2 nd generation =transistor based

3 rd generation intergrated circuit based

4rd generation =vlsi microprocessor based

5th generation =ulsi microprocessor based

svetoff [14.1K]3 years ago
6 0

Answer:

   1940 – 1956: First Generation – Vacuum Tubes. These early computers used vacuum tubes as circuitry and magnetic drums for memory. ...

   1956 – 1963: Second Generation – Transistors. ...

   1964 – 1971: Third Generation – Integrated Circuits. ...

   1972 – 2010: Fourth Generation – Microprocessors.

Explanation:

You might be interested in
The ampacity of a No. 12 aluminum wire with RHW insulation installed in a raceway that has 19 other wires is
GREYUIT [131]
<span>i believe the answer is C</span>
7 0
3 years ago
Write a statement to add the key Tesla with value USA to car_makers. Modify the car maker of Fiat to Italy. Sample output for th
marishachu [46]

Answer:

Input code:

car_makers = {'Honda': 'Japan', 'Fiat': 'Germany'}

#add Tesla and USA as corresponding value

car_makers['Tesla'] = 'USA'

#change Fiat entry to Italy instead of Germany

car_makers['Fiat'] = 'Italy'

print(car_makers)

print('Honda made in', car_makers['Honda'])

print('Fiat made in', car_makers['Fiat'])

print('Tesla made in', car_makers['Tesla'])

Explanation:

The first line is a define object in the python code, containing two entries of Honda and Fiat and their respective countries.

The python code adds an entry to the object "car maker" using the bracket notation, the tesla car from USA.

The country of the Fiat car is changed from Germany to Italy, using the bracket notation.

The output of the complete object and the individual cars is given.

<u>output of the python code:</u>

{'Honda': 'Japan', 'Fiat': 'Italy', 'Tesla': 'USA'}

Honda made in Japan

Fiat made in Italy

Tesla made in USA.

7 0
3 years ago
Complete the following sentences by choosing the best answer from the drop-down menus.
aleksandrvk [35]

Answer:

b. Application software

Explanation:

Applications are type of software that are installed in a specific operating system of a computer that deviates from those system software installed together with the system itself. These third-party applications are necessary for other functions such as entertainment, business, leisure and other needs addressing of which the system software can't provide.

Examples:

Microsoft Office Word, Excel, Powerpoint

i think i did that right:)

7 0
3 years ago
Powerpoint provides only three picture effects. true or false.
scZoUnD [109]
False, there is a variety
4 0
3 years ago
Discussion Question 10: A bank in California has 13 branches spread throughout northern California , each with its own minicompu
GuDViN [60]

Answer:

The system that will be more prone to attack or vulnerability is the  bank that has ten branches spread throughout California with the data being stored on a mainframe in San Francisco.

Explanation:

Solution

If the databases are not shared by all the branches throughout the network, they could not be hacked or accessed easily. but when the systems are in a network and share databases or resources,then these could be more vulnerable  to unauthorized persons or individuals.

The data been stored on a mainframe in San Francisco that is a centralized access by 10 branches of another bank. what this implies is that networking is involved or used to share data.

With this example, the chances of vulnerability or attacks increases from the following :

  • Accounts payable could be disturbed by changing cash in payment false.
  • Entering incorrect data into the system. such transactions can be altered, deleted by unauthorized persons.
  • Transaction fraud like hacking, masquerading are very common in a networked system.
3 0
3 years ago
Other questions:
  • Într-o curte sunt G găini și O oi. Să se determine numărul de capete și numărul de picioare din curte.
    13·1 answer
  • Can someone tell me a user to an admin on brainly I got a person sending "inappropriate pictures" all over brainly
    13·1 answer
  • What are lexical errors?<br> and fi(a==b)<br> will it be a lexical error or a syntactical error?
    8·1 answer
  • Robert gets home from school at 3 p.M. His mom has to leave for her shift at work at 3:15 and she wants him to watch his baby br
    9·1 answer
  • The purpose of this assignment is to determine a set of test cases knowing only the function’s specifications, reported hereaf
    12·1 answer
  • Which are the best examples of cost that should be considered when creating a project budget
    14·1 answer
  • Ryan would like to copy a list of contacts from a colleague into his personal address book. The list of contacts is
    9·1 answer
  • Group of programs are software <br>​
    11·1 answer
  • What is the first phase of the project process?
    14·2 answers
  • Which tools can help you gather information about the processes running on a windows operating system?
    12·2 answers
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!