1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
kicyunya [14]
3 years ago
14

Difference between second and third generation of computer​

Computers and Technology
1 answer:
Reil [10]3 years ago
8 0

Answer:

one is less advanced and 3rd is more advanced and sometimes has fixed bugs and/or more features

Explanation:

You might be interested in
Suppose I create a new kind of Java object, called "Kangaroo". Further suppose that at any given time, all instances of this new
OLEGan [10]

Answer:

Attributes.

Explanation:

When the java object is created called "Kangaroo" and it has some properties or facts associated  with it that includes the stomach capacity,current attitude towards the pea soup and the kangaroo's location.The another name of these facts is Attributes.

Attributes are the qualities,features or properties that an entity possesses.

4 0
3 years ago
Given the following stream of accesses to a 4-block fully associative cache with LRU replacement, determine whether the access i
erma4kov [3.2K]

The number of memory miss cycles for instructions in terms of the Instruction count (I) is

image

As the frequency of all loads and stores is 36%, we can find the number of memory miss cycles for data references:

image

The total number of memory-stall cycles is 2.00 I+1.44 I=3.44 I. This is more than three cycles of memory stall per instruction. Accordingly, the total CPI including memory stalls is 2+3.44=5.44. Since there is no change in instruction count or clock rate, the ratio of the CPU execution times is

image

The performance with the perfect cache is better byimage.

What happens if the processor is made faster, but the memory system is not? The amount of time spent on memory stalls will take up an increasing fraction of the execution time; Amdahl’s Law, which we examined in Chapter 1, reminds us of this fact. A few simple examples show how serious this problem can be. Suppose we speed-up the computer in the previous example by reducing its CPI from 2 to 1 without changing the clock rate, which might be done with an improved pipeline. The system with cache misses would then have a CPI of 1+3.44=4.44, and the system with the perfect cache would be

image

The amount of execution time spent on memory stalls would have risen from

image

to

image

Similarly, increasing the clock rate without changing the memory system also increases the performance lost due to cache misses.

3 0
3 years ago
Which set of symbols encloses an if-then code block? Choose the best answer.
Colt1911 [192]

Here's some code that might help, assuming that you are using JavaScript.

e = "Hello"

if(e === "Hello"){

    alert(":D")

}else{

    console.log("Um.")

}

I think that the answer is curly brackets.

8 0
3 years ago
Explain how to implement two stacks in one array A[1..n] in such a way that neither stack overflows unless the total number elem
algol [13]

Answer:

Check explanation

Explanation:

Two stacks can make use of one array by utilizing various stack pointers that begins from different ends of an array. Looking at the array A[1...n], the first stack will drive elements that starts from position 1 as well as to move its' pointer to n.

The Second stack will begin at the n position and motion its' pointer to 1. The best likely divide is to offer each stack a half of an array. whenever any of two stacks transverse the half-point, an overflow can happen but for that overall number of elements, it must be n

5 0
3 years ago
To prevent unauthorized access and use, at a minimum a company should have a written __________ that outlines the activities for
Maru [420]

Answer:

a. acceptable use policy (AUP)

Explanation:

An acceptable use policy (AUP) is a document where everyone has to sight it before to receive access to a company's network.

Employees or students have to sight politics like:

- Never try to break the security system.

- Never posting commercial content.

- Never send spam.

- Report any suspicious behavior.

3 0
4 years ago
Other questions:
  • Can someone can help me am dont know how much RAM do i need. I use my pc for work and to watch yt vid. Thanks​
    10·1 answer
  • Project managers have the overall responsibility for planning, executing, and completing a project. True False
    7·2 answers
  • NEED HELP PLEASEE!!!
    9·1 answer
  • Refer to the image below. The letter item indicated at 3. is_____________________ a Your Address - Where you are b The Letter Ad
    7·1 answer
  • 1. cybersquatting refers to the tampering of existing web sites and selling unrelated products (true or false)
    8·1 answer
  • 2. Use the Internet to research Robocopy switches and then construct a command line that will use Robocopy to copy files in rest
    14·1 answer
  • I'm looking for the best free chat website to Answer computer and statistic question and answers
    10·2 answers
  • What is Moore’s law
    11·1 answer
  • Is social media bringing people together or cause in sepretation?​
    11·2 answers
  • Apart from mATX and ATX what are the other form factors of power supply
    7·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!