1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
sladkih [1.3K]
3 years ago
10

What do u mean by generation of computer

Computers and Technology
1 answer:
Lynna [10]3 years ago
5 0

a way of computer worked, like on the past we have giant old computer that work really slow. and now we have quantum computer that can input massive amount of data

You might be interested in
How many invalid code sequences can we have in 5b/6b encoding?
mart [117]
<span>In the process of 5B/6B encoding, it is possible to have the following two kinds of data sequences: 1. 25=32 data sequences 2. 26=64 data sequences Therefore, this can left us with some unused code sequences that are 32 in number (=26 – 25). On the other hand, in the encoding process of 3B/4B, it is possible to another set of data sequences as follows: 1. 23=8 data sequences 2. 24=16 data sequences This type of encoding also leaves us with some unused code sequences that are 8 in number (=23-24). 2. </span>
6 0
3 years ago
A coworker asks your opinion about how to minimize ActiveX attacks while she browses the Internet using Internet Explorer. The c
uysha [10]

Answer:

Security Tab is the correct answer.

Explanation:

The Security Tab will enable the users to authorize anyone to use that file or directory.Many clients deleted the security tab because After that nobody can alter the security privileges on the device.

  • With the help of the Security tab, we will minimize the ActiveX attacks on Internet Explorer. This option is available in the Internet Options of the dialog box.
  • Other options are incorrect because they are not related to a given scenario.
8 0
3 years ago
There are ______ type of accounts
NemiM [27]

Answer:

Option 3,

A.KA Three

Explanation:

5 0
3 years ago
Read 2 more answers
Which of the following is the term for an economic and social inequality based on access to, use of, or knowledge of technology
Georgia [21]

The answer is digital divide

4 0
3 years ago
Read 2 more answers
What invention during the renaissance period enabled people to purchase music for their own personal use?
bogdanovich [222]
Printing press_____________________________________________________                                                        
6 0
3 years ago
Read 2 more answers
Other questions:
  • After doing the route tracing to a particular IP addresses, paste the path of IP addresses that were taken from your IP address
    13·1 answer
  • - The __________ is called a single-selection statement.
    10·1 answer
  • How to cite a website, like asha.org?
    6·1 answer
  • Write a simple command-line calculator with an exception handler that deals with nonnumeric operands. Your program should displa
    9·1 answer
  • Your mother wants to purchase a large hard drive for her computer ex you to see what type of dry interphase she has her computer
    11·1 answer
  • The information included in a résumé should always relate to the job objective; if it isn’t related, it shouldn’t be included.
    6·1 answer
  • If you forget your privacy password what will you do if the ask this question what is the name of one of your teacher?​
    12·1 answer
  • Discuss the most enormous cases of a data breach in the twenty-first century
    6·1 answer
  • The computer that can be used for performing the daily life tasks that might include emailing, browsing, media sharing, entertai
    11·1 answer
  • HELLLLLLLLLLLLLLLLLLLLP PLSSSSSSSSSSS HELLLLLLLLLP
    14·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!