1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
yulyashka [42]
3 years ago
6

Define computer on the basis of model.Brainliest answer giveaway.​

Computers and Technology
1 answer:
avanturin [10]3 years ago
7 0

I found that,

On the basis of Model, computer is classified as: XT Computer (Extra Technology): It cannot support GUI based operating system. Its processing speed is 4.77 MHz and Intel 8080, 8086, 8088 series of microprocessors is used. PS/2 Computer: It is a laptop computer which is rechargeable and battery based system.

You might be interested in
In a(n) ____, the programmer uses a programming language (in context free grammar) to tell the computer what to accomplish and h
Mamont248 [21]

A 5GL fifth-generation languages a programming language design to solve given problem without programmer. The user only needs to solve the problem and condition without implementing an algorithm.

Explanation:

First Generation Language

The first generation language is called low- level style because they were used at a superficial level of abstraction. First-generation language referred to as the native language.

Second Generation Language

The second-generation language is also low-level language or assembly language. The second level of language uses the concept of mnemonics for the writing program. Symbolic name are used.

Third Generation Language

The third-generation language overcomes the first and second-generation languages. Third generation language is considered as high- level language because the target is to focus on the logic of the program.

Fourth Generation Language

The language of generation required a lot of time and effort that affect programmers.The fourth-generation was developed to reduce the time, cost, and effort.

Fifth Generation Language

The programming language of this generation focuses on constraints programming. The fifth-generation programming languages are Artificial Intelligence and Artificial Neural Network.

6 0
3 years ago
Defeating authentication follows the method–opportunity–motive paradigm.
sashaice [31]

Answer:

Method:- This is related to hackers technique and way of accessing to copy other data. It also includes the skill, knowledge, tools and other things with which to be able to pull off the attack.

Opportunity:- this is related to how a user gives way to access to the hackers. It includes the time, the chance, and access to accomplish the attack.

Motive:- This may relate to the hacker to destroy the reputation of another or for money. It is reason to want to perform this attack against this system

3 0
3 years ago
DNS forwarding can be set up so that if the DNS server that receives the forwarded request cannot resolve the name, then the ser
hoa [83]

Answer:

Nonexclusive forwarding

Explanation:

In Nonexclusive forwarding, DNS forwarding is setup so that if the DNS server receiving the forwarded request cannot resolve the name, then the server that originally forwarded the request makes an attempt to resolves it. If that fails, the server sends a request to its designated forwarder.

8 0
3 years ago
Uppose a computer processor can perform about 3.8 billion operations per second. how many operations can it perform in 0.6 ​seco
Ratling [72]
We have information:
3.8 billion         1 second
x billion            0.6 second

To find out the number of operations we need to cross multiply these equations and solve for x.
3.8 * 0.6 = 1*x
x = 2.28 billion

In 0.6s computer can do 2.28 billion operations.
4 0
3 years ago
Read 2 more answers
When a user utilizes another computer to communicate with a third party, with the result that the third party cannot recognize t
avanturin [10]

Answer:

Online or Web Proxy

Explanation:

Web or online proxy allows you to hide your Internet Protocol (IP) address from the website you are trying to visit or access. It is like a shield between the website you are accessing and you. They can be seen as a middleman between you and the site you are visiting and as such, the site sees that a specific IP address is accessing its server but the address is not yours as all requests between your computer and the web server are first passed through the proxy server.

<em>Hope this helps!</em>

4 0
3 years ago
Other questions:
  • With a(n) ____, you can enter a value either by typing the value or by selecting it from a list.
    14·1 answer
  • Can the redirection shell metacharacter be used to redirect between a command and another command?
    8·1 answer
  • Write the 8-bit signed-magnitude, two's complement, and ones' complement representations for each decimal number: +25, + 120, +
    11·1 answer
  • An it department submits a purchase order to buy a new computer from a vendor. Which hardware lifecycle does this scenario belon
    15·1 answer
  • To recover from driving off the road steer back onto the road in then ?
    14·2 answers
  • List three ways security could be improved for taking the prepared deposit monies to the bank?​
    11·1 answer
  • Individuals who break into computer systems with the intention of doing damage are called​ _____________.
    5·1 answer
  • How many tens are there in the number 156?<br> A. 1<br> B. 15<br> C. 6<br> D. 56
    7·2 answers
  • Jamal wants to write a program that will find the 10 most common words in Romeo and Juliet. Which of the following constructs wi
    5·1 answer
  • What is virtual memory? What is the function of associative memory?
    14·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!