1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
lianna [129]
2 years ago
8

Explain the characteristics of a first generation computer​

Computers and Technology
1 answer:
Natali5045456 [20]2 years ago
3 0

Answer:

The period of first generation was from 1946-1959. The computers of first generation used vacuum tubes as the basic components for memory and circuitry for CPU (Central Processing Unit). These tubes, like electric bulbs, produced a lot of heat and the installations used to fuse frequently.

You might be interested in
Dr. Thomas likes to follow up with her patients to make sure they were happy with their care. She sends all patients an email en
timofeeve [1]

Answer:

lean media

Explanation:

Dr. Thomas uses email as a medium of lean media to convey messages.

Lean media may be defined as the source of conveying messages that are short or of lean capacity. It is meant for instant messages and message and information that is not considered to be of out most importance. Whereas a rich media is a video chat or face to face communication.

Dr. Thomas send emails to her patients to follow up with them and also encourages her patients to call her for appointments or any questions. She uses email as a source of lean media for this communication.

8 0
2 years ago
Read 2 more answers
2. What type of expansion card allows your computer to
nekit [7.7K]

You can use a peripheral component interconnect Express card (also known as an expansion card) to connect your computer to a wireless network (WLAN).

I hope this helped!

3 0
3 years ago
A _______ attack uses software to try thousands of common words sequentially in an attempt to gain unauthorized access to a user
sergeinik [125]
<h2>A <u>Rogue attack</u> utilizes software just to attempt hundreds of frequent phrases in a row.</h2>

  • Rogue access equipment would be any WLAN radio channel that isn't even authorized to communicate or join the corporate connection.
  • Whenever they have been misconfigured as well as set up without authentication, it creates a new security vulnerability potentially gaining simple access to a private network.

Thus the response above is correct.

Learn more about software attacks here:

brainly.com/question/25407509

7 0
2 years ago
Read 2 more answers
You have several marketing documents that are published through AD RMS. However, you have three new marketing employees that req
snow_lady [41]

Answer:

Document unauthorized

Explanation:

this way new employees will not try to open

5 0
3 years ago
You already know how to use lists. What is the index of 5 in the following list?
otez555 [7]
The answer is 1, the 3rd circle
5 0
3 years ago
Other questions:
  • What is the difference between simple and complex waveforms?
    10·1 answer
  • Select the correct answer from each drop-down menu.
    6·1 answer
  • We can include following item(s) during configuration itemidentification:
    10·1 answer
  • Describe the procedure for creating a table or spreadsheet in a presentation slide.
    13·1 answer
  • What PowerShell command can be used to clean up old update files on a WSUS server, including unused update files, old revisions,
    10·1 answer
  • Display the total number of parking tickets.
    5·1 answer
  • List all the components of a computer
    14·2 answers
  • You are planning a storage solution for a new Windows server. The server will be used for file and print services and as a datab
    6·1 answer
  • Mention the usage of crop concept in ms-word​
    13·2 answers
  • WHATS YALL FAVORITE GAME WHOEVER GIVES THE BEST ANSWER WINS 200
    13·2 answers
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!