1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
OleMash [197]
3 years ago
12

Characteristic of first generation computer​

Computers and Technology
1 answer:
ella [17]3 years ago
6 0

Characteristics

based on vaccum tubes

they were large,slow,low capacity

Magnetic drums for primary memory

used mll

input punched cards and output printsout

expensive

get heated faster

eg. ENIAC,UNIVAC

You might be interested in
____ is a consistent relational database state in which every foreign key value also exists as a primary key value.​ a. ​ Refere
maria [59]

Answer:

The correct answer is Option A (Referential integrity)

Explanation:

When a relational database table is in ​first normal form, that means it has no repeating fields or groups of fields, and hence all rows have the same columns, while if a relational database table is in second normal form, it implies that every non-key field is functionally dependent on the primary key. If can be in the third normal form if no non-key field is functionally dependent on any other non-key field.​

A relational database on its own is a universal approved database model whose data is stored in tables divided into records and fields that serve as an information unit that organizes data points for easy access.

In the relational database, foreign keys are being checked to reference the primary key and enforce referential integrity so as to ensure that the foreign key must have a matching primary key. It means the reference from a row in one table to another table must be valid. Referential integrity concerns the concept of a foreign key normally enforced by the database management system.

4 0
3 years ago
Given a UNIX file system with 1024-byte blocks, how many disk accesses are needed to access bytes 2500-2503 of a file (assume th
cestrela7 [59]

Answer:

(A) 1

Explanation:

In UNIX the file system the file system is a central part of the operating system. The file system is for storage and retrieval of information. Programs that form the UNIX system also stores information in files.

UNIX file systems supports three files namely: ordinary file, directory files, device files or special files.

If we need to access bytes 2500-2503 it means the bytes are within the third block. So we will need only one access.

Note this is because the file control block (inside) is within the memory. If file control block was not in the memory we would have needed more disk accessses.

7 0
3 years ago
Identify actions to take when establishing a business. Check all of the boxes that apply.
Gekata [30.6K]

Plan for the unexpected

write a solid business plan

Keep lines of communication open

Predict how business is progressing

4 0
3 years ago
Read 2 more answers
Is Using programming libraries is one way of incorporating existing code into new programs true
postnew [5]

Yes, Using programming libraries is one way of incorporating existing code into new programs  is a true statement.

<h3>What function do libraries provide in programming?</h3>

Programming libraries are helpful resources that can speed up the work of a web developer. They offer prewritten, reuseable portions of code so that programmers can easily and quickly create apps. Consider building a program that enables users to enroll in and pay for courses.

Therefore, Using a code library often saves developers from having to create everything from scratch. It can take less time to develop projects and have more reliable software if the catalog of programming resources is kept up well.

Learn more about libraries from

brainly.com/question/17960151
#SPJ1

6 0
2 years ago
Define Technology. Explain the term.​
aleksandrvk [35]

Answer:

Technology refers to methods, systems, and devices which are the result of scientific knowledge being used for practical purposes. Technology is changing fast. They should be allowed to wait for cheaper technologies to be developed.

7 0
3 years ago
Read 2 more answers
Other questions:
  • What does the term Gestalt mean?<br> A image<br> B graph<br> C big<br> D part <br> E whole
    11·1 answer
  • How to analyze time complexity of a code?
    5·1 answer
  • Why is Bot_Seth Trash at video games?
    13·2 answers
  • Software that protects confidentiality by screening outgoing documents to identify and block transmission of sensitive informati
    12·1 answer
  • Under what circumstances would a user bebetter off using a time-sharing system rather than a PC or asingle-user workstation?
    13·1 answer
  • Multiply 2.7×10^4 by 6.3×10^6​
    13·2 answers
  • A firm can survive and succeed in the long run if it successfully develops strategies to confront the _______________ that shape
    9·1 answer
  • What is the purpose of the GETPIVOTDATA function?
    13·2 answers
  • Un polímero sintético es renovable o no renovable
    11·1 answer
  • Within how many days can a deleted view be restored?
    6·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!