1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
Agata [3.3K]
3 years ago
13

What are the draw backs of the third generation computer​

Computers and Technology
1 answer:
blagie [28]3 years ago
6 0

<em><u>Answer:</u></em>

  • They are quite expensive
  • They have the disadvantage of requiring cooling for their mainframe computers  
  • integral components cannot be repaired once damaged
  • integrated components require advanced knowledge to service
You might be interested in
Cathy designed a website for a cereal brand. When users view the website, their eyes first fall on the brand name, then they vie
PSYCHO15rus [73]

Answer:

dominance

Explanation:

i just took it and got it right

4 0
3 years ago
true or false? in a known-plaintext attack (kpa), the cryptanalyst hs access only to a segment of encrpted data and has no choic
bulgar [2K]

Yes , it’s true. In a known-plaintext attack (kpa), the cryptanalyst can only view a small portion of encrypted data, and he or she has no control over what that data might be.

The attacker also has access to one or more pairs of plaintext/ciphertext in a Known Plaintext Attack (KPA). Specifically, consider the scenario where key and plaintext were used to derive the ciphertext (either of which the attacker is trying to find). The attacker is also aware of what are the locations of the output from key encrypting. That is, the assailant is aware of a pair. They might be familiar with further pairings (obtained with the same key).

A straightforward illustration would be if the unencrypted messages had a set expiration date after which they would become publicly available. such as the location of a planned public event. The coordinates are encrypted and kept secret prior to the event. But when the incident occurs, the attacker has discovered the value of the coordinates /plaintext while the coordinates were decrypted (without knowing the key).

In general, a cipher is easier to break the more plaintext/ciphertext pairs that are known.

To learn more about Plaintext Attack click here:

brainly.com/question/28445346

#SPJ4

6 0
1 year ago
Which of the following changes would be LEAST LIKELY lead to economic growth in a country?
Charra [1.4K]

Answer:

A. declines in labor productivity

Explanation:

6 0
3 years ago
Preciso de ajuda urgente, é para amanhã cedo!!
Papessa [141]


Bbbbbbbbbbbbbbbbbbbbbbbbbbbbbbbbbb
5 0
3 years ago
Describe the three functions of all programming languages and list at least two specific examples of each. The examples can be f
natta225 [31]

Answer:

The 3 functions of all programming languages are Input, Execution and collection.

They are described below:

Explanation:

1. <u>INPUT</u>: An input function can be defined as the function in programming that enables or allows the computer take in an input in form of any data type from the user. The input is either stored directly into a variable identifier or processed. A real-life scenario of an input function is taking in food. The intake of any substance into the mouth can be likened to an input function. We take in food into the body through the mouth and this is processed within the body.

Another example of input in a real-life scenario is dumping your trash into the bin. In this case, the bin is taking your trash bag as an input.  An input function in programming can take in integers, strings, character, float, arrays or any kind of data type. An input function allows the user send information to the computer using the keyboard, voice, gestures and other forms of communication.

  • <u>Examples of Input Function using C# programming language</u>

<em>Console.WriteLine("Please type any input from keyboard and press enter:");   </em>

<em>string userName = Console.ReadLine(); </em>

From the above example, In the first line of code, the compiler asks the user to input anything via the keyboard.

In the second line of code, the compiler takes in whatever the user has typed and stores it as a variable that we defined as userinput.<em> </em>

  • <u>Example of Input Function Using Python programming language</u>

<em>print('Type in your name:') </em>

<em>username = input() </em>

The first line of code requests that the user types in his name as an input, then Second line of code takes in the input and stores it as a variable declared as username

2. EXECUTION: execution in programming can be described as the process of performing some kind of operation as instructed by the code. This means that the computer reads through the code and performs any operation that it is asked to perform. such execution operation may include arithmetics, iteration, comparison and as many instructions as written in the code.

A real life scenario of execution is when you press the "play" button of an ipod. The ipod executes the "play" action and plays any song within in.

Another example is pressing 2+2 in your calculator and pressing "=" sign. The calculator performs the 2+2 operation and gives a result.

So we can then say that for every execution there is usually a result.  

  • <u>Examples of Execution Function using C# programming language</u>

<em>class ExecuteExample</em>

<em>  { </em>

<em>    static void Main(string[] args) </em>

<em>    { </em>

<em>      int additionop= 100 + 500; </em>

<em>     } </em>

<em>  }</em>

In the code above, execution occurs at the highlighted line. The compiler is asked to add the numbers 100 and 500. The act/process of adding both numbers is called EXECUTION.

  • <u>Example of Execution Function Using Python programming language</u>

<em>print('Type in your name:') </em>

<em>username = input() </em>

<em>print('We just executed, ' + username )</em>

Continuing from our code in the "input example" . As seen in the code above, execution occurs at the point where the computer prints the output of the user's input. In this case the computer prints "we just executed, + whatever value the user had passed as an input."

3. COLLECTION: Collection in programming is used to describe the process where a computer objects collects and groups  similar elements to form a single unit. This collection can be a group of similar data types.

A real life example of a collection is a Queue of people at an ATM. This can define the Queue collection type. usually this kind of collection is considered as a First in First out collection.

Another example of collection can be a List of cars in a Ford car garage. This garage takes in a range of cars that are Ford models only.

  • <u>Example of Collection Function using C# programming language</u>

List : A List is a type of collection as seen below:

<em>var listcollect = new List<string>(); </em>

<em>listcollect .Add("fordexplorer"); </em>

<em>listcollect .Add("fordedge"); </em>

<em>listcollect .Add("fordescape"); </em>

<em>listcollect .Add("fordtruck"); </em>

<em>foreach (var car in listcollect) </em>

<em>{ </em>

<em>    //do somethin</em>

<em>}</em>

The above code creates a collection(list) of the car names as a string in a tipper garage, adds elements(items) to this list and iterates through the list. This is a typical example of a collection.

  • <u>Example of Collection Function using C# programming language</u>

Queue: a queue is a case of colleciton that uses the first in first out idea. The first in first out concept is : first element to be taken in is pushed out first also known as FIFO:

<em>class ExmapleofQueue</em>

<em> { </em>

<em>  static void Main(string[] args) </em>

<em>  { </em>

<em>   Queue sampleQueue= new Queue(); </em>

<em>   sampleQueue.Enqueue(1); </em>

<em>   sampleQueue.Enqueue(2); </em>

<em>   sampleQueue.Enqueue(3); </em>

<em>   foreach (Object numberel in sampleQueue) </em>

<em>   { </em>

<em>    //do something</em>

<em>   }</em>

<em>}</em>

<em>}</em>

<em>From example above, we can see that we created a queue called sampleQueue. This holds a queue of integers.</em>

<em />

8 0
3 years ago
Read 2 more answers
Other questions:
  • In what ways are Outlook notes useful for personal or professional use? Check all that apply.
    13·2 answers
  • Describe how using active listening at work can help you be a better employee.
    15·1 answer
  • A ____ client locates all or most of the processing logic on the server.
    11·1 answer
  • Your neighbor has moved to another country. He informs you about his new job. You wantto congratulate him by sending an e-mail m
    13·1 answer
  • Keyboard question: <br> How do I make the 'congruent to' symbol on this keyboard?
    8·1 answer
  • When adding cells you must use a "+" symbol, you cannot use a ":" symbol.<br><br> ☐ True<br> ☐ False
    13·1 answer
  • All of the following are examples of service learning opportunities exept
    11·1 answer
  • I really want to know the best way to deal as much heart as possible plz tell me
    7·2 answers
  • List 100 social media with functions​
    7·1 answer
  • What command do we use to enter data from the keyboard?
    8·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!