1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
DerKrebs [107]
4 years ago
8

The third generation of computers was marked by the introduction of ____.

Computers and Technology
1 answer:
yKpoI14uk [10]4 years ago
3 0
The third generation of computers was marked and invented by Jack Kilby. This was the start of developing computers that are smaller in size. Third generation computers we're developed to be efficient and could run multiple program at a time.
You might be interested in
One of the advantages of simulation is​ that: A. it is a repetitive approach that may produce different solutions in repeated ru
Dafna1 [17]

Answer:

A. it is a repetitive approach that may produce different solutions in repeated runs.

5 0
4 years ago
Read 2 more answers
Write a program that receives a series of numbers from the user and allows the user to press the enter key to indicate that he o
Dmitriy789 [7]

Answer:

The solution code is written in Python 3

  1. count = 0
  2. sum = 0
  3. num = input("Enter a number: ")
  4. while(num != ''):
  5.    sum += float(num)
  6.    count += 1
  7.    num = input("Enter a number: ")
  8. print("Sum : " + str(sum))
  9. print("Average: " + str(sum / count))

Explanation:

Firstly, we declare two variables count and sum to hold the number of input number and the total of the input number, respectively (Line 1-2)

Next, we prompt user to input the first number (Line 4). While the num is not ' ' (This means it is not "Enter" key), accumulate the num to sum variable and increment count by one (Line 6-8) and then prompt the user to input the next number (Line 9).

At the end, display the sum and average using print function (Line 11 -12).

5 0
4 years ago
Which directive is used when defining 64-bit IEEE long reals?
Taya2010 [7]

Answer:

The answer is "Option b".

Explanation:

In the project of IEEE-754 to define 64 -bit we require a REAL8 double precision that is equal to 8 bytes and 64 bit, and it is also used for floating-point arithmetic, and other options were not correct that can be described as follows:

  • In option a, REAL4 is used to define 32-bit, that's why it is not correct.
  • In option c, This type of declaration is not valid in IEEE, that's why it is wrong.
  • In option d, The REAL is a keyword that is used to define a value but in this, there is no value to define, that's why it is wrong.

7 0
3 years ago
What is a file allocation table (FAT), andwhere is it found on a floppy disk?
Akimi4 [234]

Answer:

File Allocation Table(FAT):- It is a computer file system  design and it is widely used on many computers and most of the memory  cards. FAT file systems are  commonly found on flash memory cards,floppy disks, digital cameras,  and many other portable devices.

In floppy disks, the FAT has been standardized as ISO/IEC 9293 and ECMA-107.These include FAT12 and FAT16 only without any long filename support.

5 0
3 years ago
Discuss the following IT security policies and the level of protection each policy provides in the context of your assigned scen
Oksi-84 [34.3K]

Answer:

IT security policy identifies the methods for all individuals and using the organization's assets and resources. The main objective of Its security is to integrate the system information used by the organization.

Mature security policies need the following procedures.

  • Acceptable use policies
  • Access control policy
  • Change management policy
  • Incident Response
  • Information Security
  • Remote Access
  • Email Policy
  • Business Continuity Plan

Explanation:

Internet use policy

Internet use policy provides the employee with rules about the proper use of company equipment, network, and internet. The system can be tailored to a specific organization. The employee has some responsibility, including e-mail. The employee is responsible that the internet is used efficiently.

External device use policy

An employee using an external device and related software for data access will use secure data management procedures. A strong password must protect all external devices.Employee discloses their passwords to anyone would harm them.

Employee Identity (ID) policy

Employee identity policy indicates that you are an employee in the company.ID cards are issued to the employee. It also provides proper access to the employee to a company.

Computer use policy

Computer use policy is a way to emphasize the employee that a computer is a tool and should be used in manner. Using this policy, the employee monitors the network by three exceptions.

5 0
3 years ago
Other questions:
  • Write a script that will generate random integers in the range from
    10·1 answer
  • What should you do when an error message pops up on the screen?
    7·2 answers
  • Which element in Access is an ideal data source?
    12·2 answers
  • Assume you have a byte-addressable machine that uses 32-bit word (integers are 32-bit) and you are storing the following informa
    5·1 answer
  • On what basis can you categorize the generations of computers
    7·1 answer
  • 1.printer is an example of......... device.<br><br>​
    11·2 answers
  • Which century saw the development of letterpress printing?
    10·1 answer
  • Write a program that reads a list of integers into a list as long as the integers are greater than zero, then outputs the smalle
    12·1 answer
  • Which clue can be used to identify a chemical reaction as a combustion reaction?
    9·1 answer
  • Congress are smart becuase.....
    11·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!