1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
suter [353]
3 years ago
7

Write chracteristics of all 5 generation of computer​

Computers and Technology
2 answers:
jeka943 years ago
3 0

Answer:

First generation — 1940–1956

-used vacuum tubes

ENIAC, UNIVAC I, IBM 650, IBM 701 etc.

mainframes taking up entire rooms

punched cards I/O

electrostatic and mercury delay line memory, beginning use of core

Second generation — 1956-1963

-used discrete transistors

IBM 7090 and 7094, UNIVAC 1107, PDP-1 and 8, etc.

first appearance of minicomputer (PDP-8)

punched cards I/O and line printers (mainframe), TTY (minicomputers)

core memory, magnetic tape for mass storage

Third generation — 1964-1971

-used integrated circuits

IBM System/360, UNIVAC 1108, PDP-8/I, PDP-11/20 and PDP-11/45, etc.

mostly same I/O and memory as second generation

Fourth generation — 1971-present

-use microprocessors

PDP-11/03 and PDP-11/34, Apple ][, IBM PC, Apple Macintosh, IBM z Series, etc.

transition from minicomputers to personal computers

video terminals used for I/O, specialty computer printers developed

fewer mainframes

semiconductor memory replaces core memory

hard drives and optical drives replace magnetic tape for mass storage, followed by solid-state drives (SSD)

Fifth generation — (current research)

-artificial intelligence and quantum computing

Ksenya-84 [330]3 years ago
3 0

Answer:

<em><u>The</u></em><em><u> </u></em><em><u>five</u></em><em><u> </u></em><em><u>generations</u></em><em><u> </u></em><em><u>of</u></em><em><u> </u></em><em><u>computer</u></em><em><u> </u></em><em><u>are</u></em><em><u> </u></em><em><u>characterized</u></em><em><u> </u></em><em><u>by</u></em><em><u> </u></em><em><u>electrical</u></em><em><u> </u></em><em><u>current</u></em><em><u> </u></em><em><u>flowing</u></em><em><u> </u></em><em><u>through</u></em><em><u> </u></em><em><u>the</u></em><em><u> </u></em><em><u>processing</u></em><em><u> </u></em><em><u>mechanisms</u></em><em><u> </u></em><em><u>listed</u></em><em><u> </u></em><em><u>below</u></em><em><u> </u></em><em><u>:</u></em><em><u> </u></em><em><u>The</u></em><em><u> </u></em><em><u>first</u></em><em><u> </u></em><em><u>within</u></em><em><u> </u></em><em><u>vacuum</u></em><em><u> </u></em><em><u>tubes</u></em><em><u> </u></em><em><u>The</u></em><em><u> </u></em><em><u>second</u></em><em><u> </u></em><em><u>within</u></em><em><u> </u></em><em><u>transistors</u></em><em><u> </u></em><em><u>The</u></em><em><u> </u></em><em><u>third</u></em><em><u> </u></em><em><u>within</u></em><em><u> </u></em><em><u>integrated</u></em><em><u> </u></em><em><u>circuits</u></em><em><u> </u></em><em><u>The</u></em><em><u> </u></em><em><u>fourth</u></em><em><u> </u></em><em><u>within</u></em><em><u> </u></em><em><u>microprocessors</u></em><em><u> </u></em><em><u>clips</u></em><em><u> </u></em><em><u>The</u></em><em><u> </u></em><em><u>fifth</u></em><em><u> </u></em><em><u>unveiled</u></em><em><u> </u></em><em><u>smart</u></em><em><u> </u></em><em><u>devices</u></em><em><u> </u></em><em><u>capable</u></em><em><u> </u></em><em><u>of</u></em><em><u> </u></em><em><u>artificial</u></em><em><u>.</u></em><em><u>.</u></em><em><u>.</u></em>

Explanation:

<em><u>☆</u></em><em><u>hope</u></em><em><u> </u></em><em><u>it</u></em><em><u> </u></em><em><u>is</u></em><em><u> </u></em><em><u>helpful</u></em><em><u> </u></em><em><u>to</u></em><em><u> </u></em><em><u>you</u></em><em><u> </u></em><em><u>☆</u></em>

<h2><em><u>☆</u></em><em><u>MiraculousNisha</u></em><em><u>^</u></em><em><u>_</u></em><em><u>^</u></em></h2>
You might be interested in
When an IPv6 device with no pre-configured IPv6 address powers up, it can calculate a global 128-bit IPv6 address for itself usi
RSB [31]

Answer:

True

Explanation:

IPv6 Is a later version of IP addresses, used to solve the problem of the limited number of IPv4 addresses in the network.

Just like IPv4, IPv6 can also is configured to a device statically and dynamically. Dynamic IPv6 configuration could be a stateless autoconfiguration SLAAC, a stateless DHCPV6 or a stateful DHCPV6.

The IPv6 address is configured with a prefix and a prefix length and a EUI generated 64 bit interface or a random interface id by the device.

8 0
3 years ago
……………………is one of the most popular cloud storage facilities.​
lord [1]
Chcgzrsfchvuvjbnkggvbbb.
4 0
3 years ago
A software company is weighing whether to release a new version of its software as scheduled. The company can go ahead and relea
Kisachek [45]

Answer:

B) vaporware.

Explanation:

Vaporware is a software or hardware product that is not yet released in the market but has already advertised. This can be the product is probably still under development or it is still in its idea form and not developed at all. Vaporware is a term used in the computer products industry. Products that were announced but missed the released date by a big amount of time can also be called vaporware.

8 0
3 years ago
Universal containers wants to rollout new product bundles with several pricing options. Pricing options include product-price bu
ololo11 [35]

Answer:

a) Custom AppExchange-app for product-pricing

Explanation:

We can find a solution in AppExchange for this product-pricing, surfing in the option, we could get solutions like BoonPlus, and easy pricing Opportunity, this App has a free trial.

With this option is easy to choose a book price, add new products, select pricing rule, we can get an order's product, and calculate pricing, just we must download the app and install it.

6 0
3 years ago
Consider a sequence of method invocations as follows: main calls m1, m1 calls m2, m2 calls m3 and then m2 calls m4, m3 calls m5.
Minchanka [31]

Answer:

M2 is the answer for the above question.

Explanation:

  • The above question states the scenario, where firstly main function calls the M1 function.
  • Then M1 function calls the function M2.
  • Then M2 function calls the function M3.
  • Then M3 function calls the function M5.
  • Then Again M2 function will resume and calls the function M4.
  • Then Again M2 function will resume because when the M4 will ends it return to the statement of the M2 function from which the M4 function has been called.
  • It is because when any function ends its execution it returns to that line of a statement from which it has been called. This is the property of programming language to call the function.
  • So when the M4 will terminate its execution then the M2 function will resume again.
4 0
3 years ago
Other questions:
  • Max magnitude Write a method maxMagnitude() with two integer input parameters that returns the largest magnitude value. Use the
    13·1 answer
  • What might the purpose be for a sata-style power connector on a motherboard?
    15·1 answer
  • How are appointments scheduled in medisoft
    12·1 answer
  • Which software would you use to create a print design?
    8·2 answers
  • Describe how data center storage applications drive the development of SAN technology.
    8·1 answer
  • Which of the following is not a characteristic of a motorcycle?
    6·1 answer
  • Sally needs to copy data from the first worksheet to the fifth worksheet in her workbook. Which combination of keys will she use
    11·2 answers
  • Which is a benefit of getting information from a government website?
    15·2 answers
  • I want to make apps but I don't know how and which things I have to learn first ,so if you know mention from starting to ending​
    11·1 answer
  • Sean is frustrated with having to use separate editors, compilers, libraries, plug-ins, and debugers. What could Sean use to mak
    8·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!