1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
shusha [124]
3 years ago
10

Compter History Large Resume Include: the beginnings of the computer and its development during the years The events of computer

development by dates (chronologically)
Computers and Technology
1 answer:
NikAS [45]3 years ago
4 0

Answer:

The development of computers from the beginning to what we see now is called the computer generations. It is gradual advancement in the technology in the making of the computer.

Explanation:

The generation in computer technology can be defined as the development or the change in the technology in the computer as it was used. There were  five generations of computer development. They were :

1. First Generation computers

   In this generation, vacuum tubes was used in the circuits. It dated from 1946 to 1959.

2. Second Generation computers

  These are transistors based computers. This generation ranges from 1959 to 1965.

3. Third Generation computers  

    This generation computers were Integrated circuit based. The generation stared in 1965 and ended in 1971.

4. Fourth Generation computers

   The computers of this generation used VLSI microprocessor in the circuits. The period of the 4th generation computers are from 1971 to 1980.

5. Fifth Generation computers

   The computers of this generation used ULSI microprocessor in the circuits. The 5th generation computers started from 1980s.

You might be interested in
Judy is searching for files with a .jpg file extension on her laptop. Which type of file is she looking for?
nikklg [1K]
<span>JPEG files </span><span> are a common file format for digital photos and other digital graphics so she would be looking for a picture

</span>
6 0
3 years ago
Read 2 more answers
Design a base class, Road, with the following members:
hichkok12 [17]

I've attached my Java implementation.

Download java
<span class="sg-text sg-text--link sg-text--bold sg-text--link-disabled sg-text--blue-dark"> java </span>
<span class="sg-text sg-text--link sg-text--bold sg-text--link-disabled sg-text--blue-dark"> java </span>
6 0
3 years ago
Is pseudocode obtained from Algorithm or is Algorithm obtained from pseudocode?
Anuta_ua [19.1K]

Answer:

An algorithm is defined as a well-defined sequence of steps that provides a solution for a given problem, whereas a pseudocode is one of the methods that can be used to represent an algorithm.

hope this gives you at least an idea of the answer:)

8 0
3 years ago
These are pictorial images displayed on a computer screen​
Mrrafil [7]

Answerthats nice

(: -With Star

Explanation:

3 0
2 years ago
People must use telepresence when virtually meeting with a group of co-workers.<br><br> T or F
____ [38]
F) There are many other sites/applications you can use
6 0
4 years ago
Other questions:
  • To extend the bottom border of a hyperlink across the complete width of a navigation list, change the ____ property of each hype
    9·1 answer
  • Pick an appliance or an electronic device that you use at home that is powered from the wall outlet. Specify which electronics d
    10·1 answer
  • ARP only permits address resolution to occur on a single network.could ARP send a request to a remote server in an IP datagram?w
    9·1 answer
  • The weight of your car will also affect its_____.
    13·2 answers
  • The _____ feature will mark all changes made to a document for others to review at a later time.
    13·1 answer
  • The table in columns A-C contains a list of paint color choices for a bathroom and a laundry room. What is a possible sequence o
    6·2 answers
  • Who when and why developed python​
    9·2 answers
  • Which of these examples demonstrate portfolio income?
    13·2 answers
  • The tags are always enclosed within a pair of<br>(a) curly<br>(b) square<br>(©) angular​
    6·1 answer
  • What security setting can cause a mobile device to erase installed apps and data if the passcode is incorrectly entered a number
    11·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!