1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
disa [49]
3 years ago
7

Choose the appropriate computing generation.

Computers and Technology
2 answers:
tia_tia [17]3 years ago
5 0

Answer:

5th generation : artificial intelligence

3rd generation: integrated circuits

4th generation : microprocessors

5th generation: parallel processing

<em>hope this helps!</em>

Katena32 [7]3 years ago
5 0
3r Generation: Integrated Circuit , 4th Generation: Microprocessor , 5th: Artificial Intelligence
You might be interested in
Explain in details how Galen , a physician during the Middle Ages, expanded on Hippocrates' theory of the four humors and explai
NISA [10]

Answer:

Galen expanded on the Hippocrates' theory of humor by assigning personalities, moods, behaviors, and emotions to the four humors. He believed blood stood for sanguine personality, black bile for a melancholic personality, yellow bile for a choleric personality and phlegm for a phlegmatic personality.

Explanation:

Hippocrates put forward the theory of the four humors. According to the theory, the human body is made up of four substances: black bile, yellow bile, blood, and phlegm. A healthy human body is the product of a balance of among the four humors, while diseases results if there is an imbalance among the four humors.

Galen, a keen admirer of Hippocrates' ideas, further elaborated on this theory and believed that they affected personalities, moods, behaviors, and emotions.

The personalities assigned the four humors are as follows:

People with predominantly black bile are Melancholic (corresponding to the season of autumn dry and cold): They are very sensitive, and enjoy artistic pursuits.

People with predominantly yellow bile are Choleric (corresponding to the season of summer, dry and hot): They possess a passionate temperament, They have a lot of ambition, energy, drive, enormous vitality but are domineering and get angry quickly.

People with predominantly blood are Sanguine (corresponding to the season of spring, wet and hot): These people are confident, joyful, optimistic, expressive, confident, rational and sociable.

People with predominantly phlegm are Phlegmatic (corresponding to the season of winter, wet and cold): They are deep thinkers, fair, calm, very consistent, relaxed, and observant, willing to compromise, and hard workers.

7 0
3 years ago
____ software is used to block unwanted e-mail and is available at many levels.
Anika [276]
Anti-spam <span>software is used to block unwanted e-mail and is available at many levels.</span>
3 0
3 years ago
Which of the following is a form of security protection that protects individual files by scrambling the contents in such a way
Alla [95]

Answer: C. File encryption

Explanation: To ensure security and privacy of files and its content, encrypting the file may be an option. File encryption refers to a process of ensuring the security and privacy of individual files so as to prevent unauthorized access to the content. File encryption works by setting up a security key which will be requested or needed when the file is being clicked such that only users or individuals with the authorized pass code or password can open and read its content or modify the file, this is called file decryption.

8 0
3 years ago
A structure that organizes data in a list that is commonly 1-dimensional or 2-
kobusy [5.1K]

Answer:

An array.

Explanation:

An array can be defined as a structure that organizes data in a list that is commonly 1-dimensional or 2-dimensional.

Simply stated, an array refers to a set of memory locations (data structure) that comprises of a group of elements with each memory location sharing the same name. Therefore, the elements contained in array are all of the same data type e.g strings or integers.

Basically, in computer programming, arrays are typically used by software developers to organize data, in order to search or sort them.

Binary search is an efficient algorithm used to find an item from a sorted list of items by using the run-time complexity of Ο(log n), where n is total number of elements. Binary search applies the principles of divide and conquer.

In order to do a binary search on an array, the array must first be sorted in an ascending order.

Hence, array elements are mainly stored in contiguous memory locations on computer.

6 0
2 years ago
Information that indicates ground air or navy force levels or dispositions is what security?
AlexFokin [52]

Information that indicates ground air or navy force levels or dispositions is <u>confidential</u> security.

Security for a country's higher organizations is essential for a nation's protection.

Serious information like the nuclear organizations, army, navy, and ground air is at a higher risk for threats and hence requires higher security.

The information in such higher organizations is kept confidential and no third person is allowed access to the code of conduct of such organizations.

If information is leaked from the ground air or from navy force levels then there can be serious consequences for it. Hence, such information is always kept under confidential security.

To learn more about security, click here:

brainly.com/question/25375059

#SPJ4

8 0
1 year ago
Other questions:
  • What will be returned when the following SQL statement is executed?
    5·2 answers
  • python If the checksum is 10, the last digit is denoted as X according to the ISBN-10 convention. Write a program that prompts t
    10·1 answer
  • How can i learn about networks
    15·1 answer
  • If you wish to include a header or footer on all pages in a publication, you will need to insert this by navigating to the _____
    11·2 answers
  • Which of the following is a step in paraphrasing? Skim the original information to get a sense of what it is about. Select a few
    15·2 answers
  • (10 points) 5.12. Discuss how the following pairs of scheduling criteria conflict in certain settings. a. CPU utilization (effic
    9·1 answer
  • While software vendors generally provide evaluation or demonstration copies of their products, hardware vendors never provide ev
    15·1 answer
  • Problem 1: you must write a method for this problem called sentenceAnalyzer Write a program that reads a sentence from the keybo
    10·1 answer
  • How does a computer do its work? Mention its working principle.<br><br>​
    8·1 answer
  • A field value is currently not in any group. what happens when you try adding it to an existing group?
    15·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!