1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
suter [353]
3 years ago
7

Write chracteristics of all 5 generation of computer​

Computers and Technology
2 answers:
jeka943 years ago
3 0

Answer:

First generation — 1940–1956

-used vacuum tubes

ENIAC, UNIVAC I, IBM 650, IBM 701 etc.

mainframes taking up entire rooms

punched cards I/O

electrostatic and mercury delay line memory, beginning use of core

Second generation — 1956-1963

-used discrete transistors

IBM 7090 and 7094, UNIVAC 1107, PDP-1 and 8, etc.

first appearance of minicomputer (PDP-8)

punched cards I/O and line printers (mainframe), TTY (minicomputers)

core memory, magnetic tape for mass storage

Third generation — 1964-1971

-used integrated circuits

IBM System/360, UNIVAC 1108, PDP-8/I, PDP-11/20 and PDP-11/45, etc.

mostly same I/O and memory as second generation

Fourth generation — 1971-present

-use microprocessors

PDP-11/03 and PDP-11/34, Apple ][, IBM PC, Apple Macintosh, IBM z Series, etc.

transition from minicomputers to personal computers

video terminals used for I/O, specialty computer printers developed

fewer mainframes

semiconductor memory replaces core memory

hard drives and optical drives replace magnetic tape for mass storage, followed by solid-state drives (SSD)

Fifth generation — (current research)

-artificial intelligence and quantum computing

Ksenya-84 [330]3 years ago
3 0

Answer:

<em><u>The</u></em><em><u> </u></em><em><u>five</u></em><em><u> </u></em><em><u>generations</u></em><em><u> </u></em><em><u>of</u></em><em><u> </u></em><em><u>computer</u></em><em><u> </u></em><em><u>are</u></em><em><u> </u></em><em><u>characterized</u></em><em><u> </u></em><em><u>by</u></em><em><u> </u></em><em><u>electrical</u></em><em><u> </u></em><em><u>current</u></em><em><u> </u></em><em><u>flowing</u></em><em><u> </u></em><em><u>through</u></em><em><u> </u></em><em><u>the</u></em><em><u> </u></em><em><u>processing</u></em><em><u> </u></em><em><u>mechanisms</u></em><em><u> </u></em><em><u>listed</u></em><em><u> </u></em><em><u>below</u></em><em><u> </u></em><em><u>:</u></em><em><u> </u></em><em><u>The</u></em><em><u> </u></em><em><u>first</u></em><em><u> </u></em><em><u>within</u></em><em><u> </u></em><em><u>vacuum</u></em><em><u> </u></em><em><u>tubes</u></em><em><u> </u></em><em><u>The</u></em><em><u> </u></em><em><u>second</u></em><em><u> </u></em><em><u>within</u></em><em><u> </u></em><em><u>transistors</u></em><em><u> </u></em><em><u>The</u></em><em><u> </u></em><em><u>third</u></em><em><u> </u></em><em><u>within</u></em><em><u> </u></em><em><u>integrated</u></em><em><u> </u></em><em><u>circuits</u></em><em><u> </u></em><em><u>The</u></em><em><u> </u></em><em><u>fourth</u></em><em><u> </u></em><em><u>within</u></em><em><u> </u></em><em><u>microprocessors</u></em><em><u> </u></em><em><u>clips</u></em><em><u> </u></em><em><u>The</u></em><em><u> </u></em><em><u>fifth</u></em><em><u> </u></em><em><u>unveiled</u></em><em><u> </u></em><em><u>smart</u></em><em><u> </u></em><em><u>devices</u></em><em><u> </u></em><em><u>capable</u></em><em><u> </u></em><em><u>of</u></em><em><u> </u></em><em><u>artificial</u></em><em><u>.</u></em><em><u>.</u></em><em><u>.</u></em>

Explanation:

<em><u>☆</u></em><em><u>hope</u></em><em><u> </u></em><em><u>it</u></em><em><u> </u></em><em><u>is</u></em><em><u> </u></em><em><u>helpful</u></em><em><u> </u></em><em><u>to</u></em><em><u> </u></em><em><u>you</u></em><em><u> </u></em><em><u>☆</u></em>

<h2><em><u>☆</u></em><em><u>MiraculousNisha</u></em><em><u>^</u></em><em><u>_</u></em><em><u>^</u></em></h2>
You might be interested in
Frank lives in an area that experiences frequent thunderstorms. What precautionary measure should he adopt?
Sonja [21]

Answer:

I would go with A

Explanation:

6 0
3 years ago
Write a function called getChar that has no function inputs, but takes in two character inputs from the user (in1 and in2) and o
bearhunter [10]

Answer:

def getChar():

   while True:

       in1 = input('Enter first char: ')

       try:

           if len(in1) != 1:

               raise

           else:

               in2 = input('Enter second char: ')

               if len(in2) != 1:

                   raise

               else:

                   break

       except:

           print('Enter just one character')

   return in1, in2

def chars2string(in1,in2):

   print(in1*5 + in2*5)

def main():

   ls = getChar()

   in1 = ls[0]

   in2 = ls[1]

   chars2string(in1, in2)

if __name__ == '__main__':

   main()

Explanation:

The programming language used is python 3.

The script first defines a function getChar and makes use of a while loop in combination with try and except blocks and IF statements, the code ensures that both inputs that are entered by the user after the prompt are 1 in length. i.e. Just one character. This function returns the two characters that were entered.

The second function that is defined is chars2string this function takes two arguments, It repeats each argument five times and returns a joined string.

Finally, the main function is defined and it calls the getChar function  first, the values that are returned by this function is assigned to two variables, that is then passed on to the chars2string function. The main function is called and the Joined string is printed to the screen.

3 0
4 years ago
What network device manages its resources??
Lyrx [107]
A 'server' is the network device that manages its resources.

8 0
4 years ago
Describe what metadata are and what value they provide to the database system.
postnew [5]
Metadata is data about data.

For example, a mp3 file is data, metadata would be data explaining the artist, song name, album, etc.

In a database, the data would be a record, metadata about this could include if the data was an integer or a string, as well as the size limit for this field.
4 0
4 years ago
Jin is an editor and ready to purchase the domain name for his website where he plans to market his services. He wants to be cre
AveGali [126]

Answer:

D. R2D2editing.com

Explanation:

mark btainliest please

6 0
3 years ago
Other questions:
  • How do you know if the website is secure if you make a purchase
    13·2 answers
  • Select the correct statement(s) regarding Frame Relay (FR). a. FR is a connection-oriented standard that operates at the OSI lay
    10·1 answer
  • "A switch passes data based on the MAC address."A. TrueB. False
    15·1 answer
  • Give several reasons why Python is such a great programming language. Explain how Python is related to flowcharts. (students mak
    9·1 answer
  • has anyone noticed to get credit for answering a question you don't even need to answer it correctly?
    11·2 answers
  • RrayList Mystery Consider the following method:
    9·1 answer
  • Which tag defines the visible content of a web document?
    10·1 answer
  • Which of the following methods is a static method? The class in which the method is defined is given in parentheses following th
    5·1 answer
  • I have 2 questions How do i send a picture for someone to answer the hw?
    6·2 answers
  • PLZ ANSWER THESE QUESTIONS FOR 30 POINTS AND BRAINLIEST!
    9·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!