1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
iren2701 [21]
3 years ago
8

HOW CAN A PERSON GET BENEFITTED BY THE ICT BASEDSERVICES PROVIDED BY GOVERNMENT

Computers and Technology
1 answer:
BARSIC [14]3 years ago
5 0

Answer:

Explanation:

It aims to transform the entire ecosystem of public services through the use of information technology.ICT holds particular promise in areas of governance and public participation.  Age can use information to reduce corruption and increase government transparency, accountability, efficiency and so finally gud night guys and take care.

plz mark as brainliest

You might be interested in
Differences between the first four generations of computers​
Lisa [10]
Hey man

The first generation computers were developed during 1943-1958. It used vacuum tubes as the active electronic components and was therefore very large. However some of the features are as follows-

a) They were extremely large and occupied a very large space.

b) They used vacuum tubes as memory device.

c) They were very expensive and consumed a lot of electrical power.

d) The operating speed was measured in milliseconds.

e) These computers had low level of accuracy and reliability.

f) Storage capacity was too small only 1 to 4Kb.

g) They used machine level programming language.

The examples are- UNIVAC, ENIAC, EDSAC, EDVAC, and UNIVAC.

The second generation computers were developed during 1959-1965. The invention of the transistor by three scientists of Bell Telephone Laboratories in 1947 greatly changed the development of computers. However some of the features are as follows-

a) These computers used transistor.

b) They were smaller, faster and cheaper than first generation of computer.

c) They consumed less electrical power than first generation.

d) The operating speed was measured in microseconds.

e) They were more reliable and accurate than the first generation computers.

f) They could understand high level language such as COBOL.

g) Magnetic tapes were used as secondary storage media.

The examples are – IBM 1620, IBM 1401, and CDC 3600.

The third generation computers were developed during 1966-1973. The development of Integrated Circuit (IC) signaled the beginning of the third generation computers. However some of the features are as follows-

a) These computers used integrated circuits.

b) They were small, efficient and reliable.

c) Operating systems were developed.

d) Monitors and keyboards were introduced for input and output of data.

e) Magnetic disks were used for secondary storage.

f) The operating speed was measured in nano seconds.

g) They could understand large number of high level languages.

The examples are – IBM 360, ICL -1900, and IBM 370 etc.

The fourth generation computers were developed during 1974-1990. This generation of computer is presently in use. The development of microprocessor signaled the beginning of the fourth generation of computers. However some of the features are as follows-

a) These computers use LSI and VLSI technologies.

b) Its sizes were reduced to desktop and laptop computer.

c) These computers are highly reliable and accurate.

d) They have a large memory and high functional speed.

e) The operating speed is measured in beyond picoseconds and MIPS (Million of instruction per second)

f) Magnetic disk is the common source of external storage.

g) Multiprocessing and multiprogramming OS (operating system) are used.

h) 4GL are also used.

The examples are – IBM PC, Apple/Macintosh, 8086, 80286 SX, 80386 SX etc.

The computers having artificial intelligence (AI) and high processing capacity undergoing on the development stage from 1990 are said to be fifth generation computers. However some of the features are as follows-

a) The speed will be extremely high in fifth generation computer.

b) These computers will be using Ultra Large Scale Integration (ULSI) technology.

c) The goal of fifth generation computers is to develop machines that will be able to think and take decisions.

d) It can perform large number of parallel processing.

e) Biochips and Gallium Arsenide (GaAS) will be used as memory devices.

f) Large uses of natural language processing and user friendly.

Able to make decisions like human beings.
4 0
3 years ago
Please help i will give you brainelst answer part B thank you!!!!!!!!!!!!!1
kifflom [539]

Answer:

Well he could be sued for one also the teacher might fail him

6 0
3 years ago
Color ___ indicates that one color is dominating a picture.
nevsk [136]
Color and defense indicates that one color is dominating  a picture
5 0
4 years ago
When several computers connected to the Internet have been set up to forward spam and sometimes viruses to other computers on th
balu736 [363]

Answer:

Option D: Botnet

is the correct answer.

<h3>When several computers connected to the Internet have been set up to forward spam and sometimes viruses to other computers on the Internet, <u>Botnets </u>are responsible. </h3>

Explanation:

A Botnet can be taken as the combination of two words "robot" and "networks". Botnets are used in depicting the malicious content as the breach the network security. They are used for stealing data by Distributed Denial of Service attack (DDoS) and by sending spam to all other devices connected to a network. All this scheme is managed by the attacker itself.

All other listed options spread malicious data by some other means.

I hope it will help you!

4 0
3 years ago
Which plot element is typically the turning point in the most intense moment of a story
Valentin [98]

The climax. The climax is when the story peaks and has the most suspense. The story falls closer to it's end after the climax.

4 0
3 years ago
Read 2 more answers
Other questions:
  • A Chief Information Officer (CIO) recently saw on the news that a significant security flaws exists with a specific version of a
    5·1 answer
  • A university wants to install a client-server network. Which feature do you think is important for them as they set up the netwo
    7·1 answer
  • If you combine two cells into one, what action are you performing?
    12·2 answers
  • Using the ____ browsing mode offered by some browsers can prevent personal information from being left on a public computer.
    9·1 answer
  • One guideline for writing content for the web is to use ____ space to visually separate sections of content.
    15·1 answer
  • Write code to check that HairEyeColor is an array. e) Write code to determine: (i) the total number of respondents in the survey
    6·1 answer
  • The index used by the OS to manage computer files is called _____.
    13·2 answers
  • These are templates or patterns that make it easier for users to enter data
    8·1 answer
  • Write at least and explain four types of escape sequences and create an example in an IDE which consist of the mentioned escape
    7·1 answer
  • Walter has an associate's degree in computer science and aspires to become a web developer. Which certification will help enhanc
    14·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!