1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
Georgia [21]
2 years ago
15

Describing the technologies used in diffrent generation of computer​

Computers and Technology
1 answer:
kupik [55]2 years ago
8 0

Windows 98, Windows XP, Windows vista, Windows 7, Windows 8 y Windows 10.

You might be interested in
A friend has a CD of one of your favorite artists and has offered to let you copy it.
creativ13 [48]
No; copyright laws protect this artist's rights and I need to purchase the CD if I want it.  

This is due to copyrights being applied at the time of fixation.  In other words, as soon as the words or lyrics have been placed on paper, recorded or put in a computer the ARTIST is protected.
6 0
3 years ago
Find the double word-length 2's complement representation of each of the following decimal numbers:a. 3874
miss Akunina [59]

Answer:

-3874₁₀ = 1111 1111 1111 1111 1111 1111 1101 1110₂

Explanation:

2's complement is a way for us to represent negative numbers in binary.

To get 2's complement:

1. Invert all the bits

2. Add 1 to the inverted bits

Summary: 2's complement = -N = ~N + 1

1. Inverting the number

3874₁₀ = 1111 0010 0010₂

~3874₁₀ = 0000 1101 1101₂

2. Add 1 to your inverted bits

~3874₁₀ + 1 = 0000 1101 1101₂ + 1

= 0000 1101 1110₂

You can pad the most signigicant bits with 1's if you're planning on using more bits.

so,

12 bits                          16 bits

0000 1101 1110₂  = 1111 0000 1101 1110₂

They asked for double word-length (a fancy term for 32-bits), so pad the left-most side with 1s' until you get a total of 32 bits.

           32 bits

= 1111 1111 1111 1111 1111 1111 1101 1110

7 0
3 years ago
You have been tasked to set up an authentication server on a dmz that will allow only users from a partner company. what kind of
Lapatulllka [165]

The question above has multiple choices as follows;

a. Internet

<span> b. Intranet <span> c. Extranet <span> d. World Wide Web
Correct answer is C. Extranet
<span>You are able to use an Extranet to securely share part of a business’s operation with vendors, suppliers, customers, partners or any other business organization.  We can also view an extranet as an intranet extended to users outside the company.</span> </span></span></span>




7 0
2 years ago
As the project manager for a software development project, you are helping to develop the project schedule. You decide that writ
Jobisdone [24]

Answer:

The correct answer to the following question will be "Discretionary".

Explanation:

That form of dependency helps the project or development team to maximize the development process via the growth cycle of that same venture.

  • It is used by managers of the project to establish a "balance" on the timeline.
  • It has also been known as the system which makes use of the largest and most successful quality methods dependent on the team experience.

So, using this type of dependency is far better.

7 0
3 years ago
(5 pts) Write the type declaration for a struct DataType named Appointment containing the following members: - a string variable
7nadin3 [17]

Answer:

  1. struct Appointment {
  2.    char name[20];
  3.    struct Date d;
  4.    struct Time t;
  5. };
  6. struct Date{
  7.    int year;
  8.    int month;
  9.    int day;
  10. };
  11. struct Time{
  12.    int hour;
  13.    int minutes;
  14.    int seconds;
  15. };

Explanation:

To create a struct data type, let use the keyword "struct" and followed with the variable name, <em>Appointment </em>(Line 1).  

Next create the string member, <em>name</em> (Line 2).

Next we need to  include two other struct data types (Date and Time) as part of the member of the existing struct. To do so, we can try to define the struct for Date (Line 8 - 12) and Time (Line 14 - 18) separately.

At last, we include the struct<em> Date</em> & <em>Time</em> into the <em>Appointment </em>struct (Line 3-4)

5 0
3 years ago
Other questions:
  • A(n) ____________________ or cryptosystem is an encryption method or process encompassing the algorithm, key(s) or cryptovariabl
    11·1 answer
  • What is an examlple of cyberbullying
    5·1 answer
  • To ease giving access to network resources for employees, you decide there must be an easier way than granting users individual
    9·1 answer
  • You recently discovered that Marketing1 can connect to Admin1, and Admin1 can connect to Marketing1, but neither of these comput
    11·1 answer
  • What is a telecomunications system? 1) A system that enables the transmission of data over public or private networks. 2) A comm
    11·1 answer
  • opy the code below into the coderunner window. Debug the code so that it outputs the verses correctly. a = input("Enter an anima
    14·1 answer
  • 2. You have noticed over the past several days that your computer is running more slowly
    6·2 answers
  • Discuss the main characteristics of the database approach and how it differs from traditional file systems.
    14·1 answer
  • If you are a mathematics student and want to study the secret of writing cryptographic codes, algorithms, encryption and decrypt
    14·1 answer
  • A column does not consist of
    10·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!