1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
fgiga [73]
3 years ago
15

Explain the characteristics of 1st generation computers​

Computers and Technology
1 answer:
levacccp [35]3 years ago
8 0

Explanation:

i hope this is the right answer

!st generation computers were more big and bulky and you for sure could not bring them around everywhere.

You might be interested in
When you’re in the Normal view, what are the visible panes?
zheka24 [161]

a

pleas give branlest

6 0
3 years ago
Read 2 more answers
Write the code to declare a variable to hold the value of the grade you hope to get in this class. What stdio.h input function w
GREYUIT [131]

Answer:

// code to read grade

#include <stdio.h>

// main function

int main(void) {

   // if grade is character

char grade;

// if grade is numeric then we can use int or double

// int grade;

// double grade;

printf("Enter your grade:");

// read grade from user

scanf("%c",&grade);

// print grade

printf("your grade is:%c",grade);

return 0;

}

Explanation:

To read a value, scanf() function is used from stdio.h.Read a grade from user and assign it to variable "grade".

Output:

Enter your grade:A

your grade is:A

// code to read die volt

#include <stdio.h>

// main function

int main(void) {

// variable

double die_volt;

printf("Enter die volt:");

// read die volt from user

scanf("%lf",&die_volt);

// print die volt

printf("Entered die volt is:%0.2lf",die_volt);

return 0;

}

Explanation:

Read the die volt from user and assign it to variable "die_volt" with the help

of scanf() function.

Output:

Enter die volt:220                                                                                                        

Entered die volt is:220.00

4 0
4 years ago
What do artists often use to create illusions in an Image?
gladu [14]

Answer:

I don't know Sorry so sorry

4 0
3 years ago
Read 2 more answers
Compare and contrast the various write strategy used in cache technologies<br>​
scZoUnD [109]

Answer:

The abiotic factors are non-living factors in an ecosystem that affect the organisms and their lifestyle. In this case, low temperature and low humidity lead to the conditions that are unfavorable for birds. So, the birds must adapt to these factors by hiding the food in the caches.

Explanation:

8 0
3 years ago
An internet layer is a quantity of data that is transmitted on a netowrk without concern for whether it is accurate or whether i
satela [25.4K]

Answer:

False

Explanation:

The statement being made here is a False statement. An internet layer is not necessarily a quantity of data but instead, it is a group of various different codes, programs, and protocols that allow from the data to travel safely from one endpoint to the other. This is what allows one user from one side of the world to send information to someone else who can receive it from the other side of the world through the internet.

7 0
3 years ago
Other questions:
  • Jen wants to protect the schools network from hackers,worms,and viruses.she also wants to regulate access to certain websites th
    15·2 answers
  • Write a class named Car that has the following data attributes: • _ _year_model (for the car’s year model) • _ _make (for the ma
    15·1 answer
  • The statement print(words[len(words)]) will raise an exception. What should be placed in the blank so that this exception will b
    11·1 answer
  • NEED HELP PLEASEE!!!
    9·1 answer
  • What is the lower House​
    7·1 answer
  • In the digital age we have less time to absorb and make sense of new information
    12·2 answers
  • Example of negative body language include all but
    8·1 answer
  • Choose all items that represent characteristics of HTML attributes.
    5·2 answers
  • Before you ever buy your first stock or bond, it's important to understand what type of investor you are. This depends on a numb
    12·1 answer
  • An attacker obtains a connection to your LAN and then uses SETH to perform a MiTM attack between your system and the company RDP
    10·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!