1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
AysviL [449]
3 years ago
7

What is generation of computer ?​

Computers and Technology
2 answers:
Mashcka [7]3 years ago
5 0

Generation in computer terminology is a change in technology a computer is/was being used. Initially, the generation term was used to distinguish between varying hardware technologies. Nowadays, generation includes both hardware and software, which together make up an entire computer system.

Hope this answer helps you..!!

..

..

Plz select it as the BRAINLIEST..!!

mestny [16]3 years ago
3 0

I HOPE THIS INFORMATION WILL HELP YOU A LOT......

You might be interested in
The commands available here change depending on the activity taking place in the presentation window's main work area.
pickupchik [31]

task pane is correct!

7 0
3 years ago
Read 2 more answers
2. When a business practices offensive behavior, you have many options. The option with the loudest voice is
Andreas93 [3]
—-_-__-____- _—-_- -__-_-____-__




___-_-_ _- —|
4 0
2 years ago
listen to exam instructions a small business called widgets, inc. has hired you to evaluate their wireless network security prac
Alex

Following actions could you most likely advise the client taking to strengthen the security of their wireless network-

  • Change the default SSID to anything different.
  • Turn off SSID broadcasting.
<h3>Explain the term wireless network security?</h3>
  • Designing, putting into practice, and ensuring security on such a wireless computer network are all parts of wireless network security.
  • A wireless computer network is further protected by this subset of network security.
  • Wireless security is another name for wireless network security.

For the stated question-

  • Disabling SSID broadcast and changing the network name are advised.
  • By disabling SSID, the network name won't be displayed on devices looking for a network can connect to, and so by changing the name, it will be impossible for anyone who already knows the old name to connect.
  • Both of which significantly boost security.

To know more about the wireless network security, here

brainly.com/question/28257213

#SPJ4

3 0
1 year ago
What set of code correctly initializes all elements of the array ar to the value 0, given the declaration
Veronika [31]

Answer:

The correct answer is:

C. ndx = 0;

while (ndx < 3) {

ar[ndx] = 0;

ndx++;

}

Explanation:

The declaration given is:

int ar[3];

This means the array consists of three locations and is named as ar.

We know that the indexes are used to address the locations of an array and the index starts from 0 and goes upto to 1 less than the size of the array which means the indexes of array of 3 elements will start from 0 and end at 2.

Now in the given options we are using ndx variable to run the while loop.

So the code to assign zero to all elements of array will be

ndx = 0;

while(ndx<3)

{

ar[ndx] = 0;

ndx++;

}

Hence, the correct answer is:

C. ndx = 0;

while (ndx < 3) {

ar[ndx] = 0;

ndx++;

}

7 0
2 years ago
How can I convert a string to a int? in Java
Deffense [45]

Answer:

int

Explanation:

5 0
2 years ago
Other questions:
  • Sulfur content is measured in
    11·1 answer
  • Match the different sources of payments to their descriptions. an electronic device that aids consumers to make online payments
    8·1 answer
  • E. what component must be compatible with every other component of the computer?
    15·1 answer
  • Which list shows a correct order of mathematical operations that would be used by a spreadsheet formula?
    5·2 answers
  • Communication protocols, sets of rules agreed to by all parties, are designed in order to:
    15·1 answer
  • when demonstrating 2022 altima’s parking assistance, what steering feature should you mention when pointing out how easy the veh
    10·1 answer
  • You are part of the team assigned to implement new software at XYZ Inc. The employees at XYZ Inc. trust the results obtained fro
    7·1 answer
  • Which option is typically only used when utilizing self joins?
    8·1 answer
  • What is one of four key principles of Responsible Artificial Intelligence
    5·1 answer
  • An IT company has a HealthCare application with data security requirements such that the encryption key must be stored in a cust
    14·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!