1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
Dmitry [639]
3 years ago
6

Each generation is set apart from the previous generation because of an innovation.

Computers and Technology
1 answer:
ehidna [41]3 years ago
3 0

Answer:

Second Generation: transistors

Third Generation: integrated circuits

First Generation: vacuum tubes

Explanation:

Generations of computers are categorized based on the technologies that were used in them.

Given innovations or technologies are:

<u>transistors :</u>

Transistors were introduced in the second generation in place of vacuum tubes.

<u>integrated circuits :</u>

Integrated circuits were introduced in the third generation. An IC consists of multiple transistors.

<u>vacuum tubes:</u>

The very first generation of computers used vacuum tubes to do the calculations. the only drawback was that the tubes used to heat up very soon.

Hence,

Second Generation: transistors

Third Generation: integrated circuits

First Generation: vacuum tubes

You might be interested in
Mention the usage of crop concept in ms-word​
nignag [31]

Answer:

Every image editing software has a crop tool that allows you to trim or eliminate the edges of an image. Cropping tools in Ms.word allow you to hide portions of picture that you do not want to be displayed in the final result.

3 0
3 years ago
Read 2 more answers
A critical piece of equipment that provides power to systems even during a black out is called a(n) _______________.
storchak [24]

Answer:C) Uninterruptible power supply

Explanation:Uninterruptible power supply(UPS) is the device that is used when the input source of power does not work or fails and thus it acts as a power supply in the emergency situation.This electronic devices in the protection of the hardware components of computer system etc.

Other option are incorrect because power strips, surge protector and password generator are no the devices that work during the power black out situation.Thus, the correct option is option(C).

7 0
3 years ago
We piped the results of the Get-Process cmdlet to the Sort-Object cmdlet to sort them in descending order. Which property was us
Basile [38]
The answer is yes hope this helps did before
5 0
3 years ago
Which recorder is least recommended in automation anywhere?
raketka [301]
<h2>Answer:</h2>

<u>Screen recorder</u><u> is the least recommended one</u>

<h2>Explanation:</h2>

There are three types of recorders. They are Smart Recorder, Web Recorder and Screen or sometimes called Standard Recorder. Smart Recorder is used for desktop applications while Web recorder is used for Web-based applications. The least recommended one is Screen Recorder which is used for building simple tasks that involves few mouse clicks and keystrokes. It works by capturing screen co-ordinates and therefore, no calibration is taken into account. It is generally used when you plan to run the task on the same machine on which, it was recorded.

4 0
3 years ago
Read 2 more answers
To change the overall design of an entire document to include colors, fonts, and effects, a user should apply a?
lisov135 [29]
Try to use color swatch if not then idk
4 0
3 years ago
Read 2 more answers
Other questions:
  • Network firewall entry and exit points are called
    6·1 answer
  • Which of the following is NOT a Boolean Search term used to refine search engine results? A. AND B. With C. OR D. NOT
    14·2 answers
  • An___ is a rectangular work area in the desk top that contains a program, text, files, it other data and tools.
    5·1 answer
  • A computer program uses 3 bits to represent integers. When the program adds the decimal (base 10) numbers 6 and 2, the result is
    13·1 answer
  • The following code processes a file containing five positive numbers. What will the variable $result contain after the code is e
    13·1 answer
  • ________ is an encryption standard used for secure transactions such as credit card processing and online banking. TLS DMZ White
    14·1 answer
  • How do you site this page??
    12·1 answer
  • Which types of files are saved with the .mp3 and .zip extensions?
    12·2 answers
  • Greedy Algorithm Design
    8·1 answer
  • Write two eaxmple of operating system​
    14·2 answers
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!