1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
kolezko [41]
3 years ago
9

Write 4 sentences about who advances the computer evolution

Computers and Technology
1 answer:
marusya05 [52]3 years ago
4 0

Answer: The first generation of computers took place from 1940 to 1956 and was extremely large in size.

The second generation (from 1956 to 1963) of computers managed to do away with vacuum tubes in lieu of transistors.

From 1964 to 1971 computers went through a significant change in terms of speed, courtesy of integrated circuits. Integrated circuits, or semiconductor chips, were large numbers of miniature transistors packed on silicon chips.

The changes with the greatest impact occurred in the years from 1971 to 2010. During this time technology developed to a point where manufacturers could place millions of transistors on a single circuit chip.

Explanation:

You might be interested in
Queues can be represented using linear arrays and have the variable REAR that point to the position from where insertions can be
Levart [38]

Answer:

8

Explanation:

7 0
3 years ago
Which IDEs support multiple high-level programming languages? Select all that apply.
nata0808 [166]

Answer:

eclipse, xcode, and visual studio

6 0
3 years ago
Read 2 more answers
In case of a suspected data breach, what course of action should a chief information security officer (CISO) take
guapka [62]

Answer

1. Assemble his team

2. Find reason for breach

3. Evaluate what was lost

4. Ensure password change

Explanation:

In case of a suspected breach, the Chief information security officer should first of all assemble his incidence response team. This team should have representatives from all areas of the organization.

Then the reason for the breach and how access was gained has to be found out. An evaluation of what has been lost in the breach would be carried out and it's likely impact on the company.

In case credentials were stolen the CISO has to ensure that the employees change passwords. Also he has to notify all the necessary parties about the breach.

The CISO has to ensure that all employees are trained properly on security and they comply to security policies.

7 0
3 years ago
To manage OpenLDAP policies over Command Line Interface (CLI), a certain type of file is needed. What is this type of file calle
qwelly [4]

The type of file which is needed to manage OpenLDAP policies over Command Line Interface (CLI) is called: LDIF files.

<h3>What is OpenLDAP?</h3>

OpenLDAP can be defined as a free, open-source version of the Lightweight Directory Access Protocol (LDAP) that was developed in 1993 by the OpenLDAP Project.

Basically, it is the server software implementation of the Lightweight Directory Access Protocol (LDAP).

<h3>The uses of OpenLDAP.</h3>
  • It is used for LDAP database control.
  • It allow end users to browse, create, remove and change data on a LDAP server.
  • It allows end users to manage their passwords and browse through data schema.

In conclusion, LDAP Data Interchange Format (LDIF) file is a type of file which is needed to manage OpenLDAP policies over Command Line Interface (CLI).

Read more on LDAP here: brainly.com/question/25998402

7 0
3 years ago
Instant messaging is commonly referred to as
melomori [17]
Chat, IM, in real-time
7 0
4 years ago
Other questions:
  • What color model should Joe use if he will be using an offset printing press?
    7·1 answer
  • What is Least effective at preventing a computer virus
    10·1 answer
  • What is a independent variable
    11·1 answer
  • Janice, who is 15, posts a picture of herself drinking alcohol and making an obscene gesture on her social networking page. Whic
    11·2 answers
  • What field in a TCP segment is used to determine if an arriving data unit exactly matches the data unit sent by the source?
    11·1 answer
  • Virtualization:
    8·1 answer
  • Lifelong learning _____. is only important for professionals with advanced degrees can be formal or informal includes formal cla
    12·1 answer
  • Where does Reiner take eren after they have a fight?
    7·2 answers
  • Why is it important for organizations to make strong commitment to Cloud at scale?
    14·1 answer
  • Question 1
    5·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!