1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
Tresset [83]
3 years ago
6

On what basis can you categorize the generations of computers? A. technology B. device C. monitor D. integrated memory

Computers and Technology
2 answers:
zimovet [89]3 years ago
6 0

Answer:  B. Device

Explanation :

Generations of computers is the history of evolution of computers. With each new generations many new technological advancements were made. The generation of computers is based upon the evolving chip technology rather than any particular time frame.

The five generation of computer is characterized by the electrical current flowing through the process mechanism. Every generation has different technologies involved in terms of processor, memory and device integration.

DanielleElmas [232]3 years ago
4 0

Upgrade of Technology decides what kind of monitor to be used, how an integrated memory needs to be, how a device should look like.

In other way, if there is an improvement in showing the display in monitor it does not mean that technology is advanced. In the same way, you cannot say that since the memory is advanced, there is an up gradation in technology (think of integrated memory with classic monitor).

Since we have wonderful device with classic memory and screen display, we cannot say that it shows advancement of technology. Each and every electrical, electronic and digital world decides the Technology advancement level.

You might be interested in
Directory servers from different vendors are synchronized through ________.
andriy [413]
With a little digging I've done, finding this question with different answers the one you want is D. none of the above
6 0
3 years ago
What do you consider to be audit evaluation areas?
skelet666 [1.2K]

Answer:

<em>communications</em><em>,</em><em>risk</em><em>,</em><em>systems</em><em>,</em><em>test</em><em>ins</em><em>,</em><em>procedures</em><em>,</em><em>interviews</em><em>,</em><em>documents</em><em>.</em>

Explanation:

The auditor considers many factors in determining the nature, timing, and extent of auditing procedures to be performed in an audit of an entity's financial statements. One of the factors is the existence of an internal audit function. fn 1 This section provides the auditor with guidance on considering the work of internal auditors and on using internal auditors to provide direct assistance to the auditor in an audit performed in accordance with generally accepted auditing standards.Note: When performing an integrated audit of financial statements and internal control over financial reporting, refer to paragraphs 16-19 of PCAOB Auditing Standard No. 5, An Audit of Internal Control Over Financial Reporting That Is Integrated with An Audit of Financial Statements, for discussion on using the work of others to alter the nature, timing, and extent of the work that otherwise would have been performed to test controls.

Roles of the Auditor and the Internal Auditors

<em>02 </em>

<h2><em>I</em><em> </em><em>HOPE</em><em> </em><em>THIS</em><em> </em><em>HELPS</em><em> </em><em>ALOT</em><em>!</em><em> </em><em>:</em><em>3</em></h2>

3 0
3 years ago
You are the CEO of a large tech company and have just received an angry email that looks like it came from one of your biggest c
sergejj [24]

Answer: as a whale attack

Explanation:

A whale attack is simply refered to as an attack that is utilized by cybercriminals and in this case, a senior player such as the CEO is targeted in the company and the aim is to steal sensitive information from them or steal money or gain access to their computer for fraudulent purposes.

Based on the explanation above, the attack called into is a whale attack.

4 0
3 years ago
What is the on board storage C:
sasho [114]
On-board? im assuming so. an on-board storage is where people keep luggage/items on a ship.

hopefully i could help ;)
7 0
3 years ago
HELP!!!<br> THIS HAPPENS EVERY TIME
Lelu [443]
Idek but hope u figure it out!
4 0
3 years ago
Read 2 more answers
Other questions:
  • To change to the completed application’s directory, we opened a command window and used the ________ command to change to the di
    7·1 answer
  • People use a computer connected to the internet to manage financial accounts
    15·1 answer
  • 4-Translate the following C program to MIPS assembly program (Please explain each instruction in your code by a comment and subm
    6·1 answer
  • Which of the following methods for learning to use new software includes tips for using the product, updates to download, and in
    7·2 answers
  • Which of the following is not a key way that a LAN shares
    15·1 answer
  • Electronic mail is a
    9·1 answer
  • Custom actions help your users by
    6·1 answer
  • Write a multi-way if statement that compares the double variable pH with 7.0 and makes the following assignments to the bool var
    11·1 answer
  • The pinky finger on the right hand types _____.
    15·2 answers
  • True or false FAFSA awards work study, but jobspeaker can be used to learn which jobs are available
    12·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!