1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
Tresset [83]
3 years ago
6

On what basis can you categorize the generations of computers? A. technology B. device C. monitor D. integrated memory

Computers and Technology
2 answers:
zimovet [89]3 years ago
6 0

Answer:  B. Device

Explanation :

Generations of computers is the history of evolution of computers. With each new generations many new technological advancements were made. The generation of computers is based upon the evolving chip technology rather than any particular time frame.

The five generation of computer is characterized by the electrical current flowing through the process mechanism. Every generation has different technologies involved in terms of processor, memory and device integration.

DanielleElmas [232]3 years ago
4 0

Upgrade of Technology decides what kind of monitor to be used, how an integrated memory needs to be, how a device should look like.

In other way, if there is an improvement in showing the display in monitor it does not mean that technology is advanced. In the same way, you cannot say that since the memory is advanced, there is an up gradation in technology (think of integrated memory with classic monitor).

Since we have wonderful device with classic memory and screen display, we cannot say that it shows advancement of technology. Each and every electrical, electronic and digital world decides the Technology advancement level.

You might be interested in
Mintzberg's classification of organizational structure categorizes the knowledge-based organization where goods and services dep
sineoko [7]

Answer:

The correct answer to the following question will be Option 3 (Professional bureaucracy).

Explanation:

  • Professional bureaucracy is evidence that uncentralized organizations can be administrative. Their organizational function is reliable, culminating in "preconceived or repetitive actions, in essence, uniform."It's also very complicated, and so the operators who are doing it should be regulated.
  • Mintzberg's organizational framework categorization classifies the information-based organization where services and goods depend as a highly qualified bureaucracy on both the knowledge and expertise of experts.

The other alternatives are not related to the structure of the Mintzberg. So choice 3 is the correct answer.

8 0
4 years ago
How many wires are in a standard Cat 6 cable?
Lynna [10]
I believe it is 8

Hope this helps
5 0
3 years ago
Read 2 more answers
after installing the second hard drive what two tasks need to be done through Disk Management in order for the operating system
Serga [27]
Maybe formating and rename?
6 0
3 years ago
Output devices reproduce or display which of the following
Trava [24]

D. Computer Systems

Hope this helped :)

8 0
3 years ago
Read 2 more answers
Secure software development: a security programmer's guide by jason grembi isbn-10: 1-4180-6547-1, isb-13: 978-1-4180-6547
a_sh-v [17]

Secure software development is known to be a kind of methodology (often linked with DevSecOps) for making software that incorporates a lot of security into every stage of the software development life cycle (SDLC).

<h3>What is secure software development practices?</h3>

Secure software development is  seen as a method that is used form the creation of a lot of software that uses both security into all of the phase of the software development making cycle.

This book is known to be  A Programmer's Guide that can be able to  leads readers in all of the tasks and activities that one can do to be successful computer programmers and it is one that helps to navigate in the area of reading and analyzing requirements as well as choosing development tools, and others.

Hence, Secure software development is known to be a kind of methodology (often linked with DevSecOps) for making software that incorporates a lot of security into every stage of the software development life cycle (SDLC).

Learn more about  Secure software development  from

brainly.com/question/26135704

#SPJ1

7 0
2 years ago
Other questions:
  • Which is the output of the formula =AND(12&gt;6;6&gt;3;3&gt;9)
    6·1 answer
  • After you have created at least four slides, a scroll bar containing scroll arrows and scroll boxes will appear on the right edg
    9·1 answer
  • The Healthy Nutrition Counseling Center and the Simple Solutions Software Company have recently joined forces to produce a meal
    12·1 answer
  • _______ allows you to add formatting such as shapes and colors to text. a. worddraw b. wordart c. worddesign d. wordshapes
    10·2 answers
  • How can getchar function be used to read multicharacter strings?​
    14·1 answer
  • Create a new Java program called MyInfo. Create one or more method(s) that pass the following information as parameters and prin
    8·1 answer
  • Define the terms network, LAN, WAN, and Internet.
    11·1 answer
  • How do I add my bestie on brainy? /??!!! ​
    9·1 answer
  • Types of Hazards Mitigation Measures
    8·2 answers
  • Which of the following best describes your sequence of actions when developing a web page?
    12·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!