1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
attashe74 [19]
3 years ago
7

In which generation microprocessor was developed short answer of computer science​

Computers and Technology
1 answer:
3241004551 [841]3 years ago
5 0

Explanation:

in fourth generation microprocessor was developed.

may it helped u

You might be interested in
What do you call when a hacker users multiple guest computers to crack a password?
azamat

Answer: Botnet

Explanation:

Botnet is the process when a hacker user uses multiple guest computer to crack a password. Basically, hackers use botnet for performing the distributed denial of services attack in the network.

It also steal the data and allowed attacker to approach its connection and access its device.

Botnet word is the combination of robot and network and botnet can be controlled by using the command and control software.

6 0
3 years ago
Discuss some designs using columns, gutters, text alignment, graphics, etc.
Naily [24]

Answer:

.......

Explanation:

8 0
3 years ago
Martin is from TCS BPS team. As part of TCS Agile vision, he was recommended to attain 0 competency in Agile. Martin was thinkin
MissTica

There are a lot of uses of Agile technology.  Agile knowledge help martin in his work as the Agile principles can help in continuously improving BPS processes.

<h3>How does agile principles can help in improve bps?</h3>

Agile principles is known to be one that has constant improvement. An important factor to not e in Agile project management is there is always a continuous process of improvement of their services and technology.

By having this mindset, one can be able to known that there is continuous improvement for any kind of project and software development.

See options below

a) Martin is right. Agile principles are not useful outside software development

b) XP and DevOps can help in Robotic process Automation

c) Agile principles can help in continuously improving BPS processes

Learn more about Agile from

brainly.com/question/25861308

4 0
2 years ago
An operating system____a password for a given user, converting it into a representation that cannot be understood without the ap
Ierofanga [76]

An operating encrypts system a password for a given user, converting it into a representation that cannot be understood without the appropriate algorithm

3 encrypts

<u>Explanation:</u>

Normally end user login with user id account with password as login authorization or authentication to operate the system. There are some many technologies for login methods are used. Nowadays to login to operating system bio matric device is also been used.

In windows 10 pin also be used for login to operating systems. In Windows 10 operating system Hotmail accounts (clouds access also been used) so that related windows store or clipboard history are stores across the desktop and laptop.

Cracks: - some algorithm was used to crack password of login for operating system access.

Reverses- it a process or algorithm where reverse   password or example: - 1234 where password in reverse process 4321.

Encrypts:- A password is  encrypts with some calculation or string or some value. Cracking the password is used by using decrypts technology.

Decrypts is reverse logic applied based on encrypts technology.

6 0
3 years ago
Pauline has a well-established app with a large user base. Now she needs new users who complete valuable actions within the app.
Readme [11.4K]

Answer:

<em>Maturity because if you want new users who will complete [valuable]  actions they need to be [Mature].</em>

Explanation:

4 0
2 years ago
Other questions:
  • With respect to the general classes of computers, a ________ is the most expensive and most powerful kind of computer, which is
    7·1 answer
  • Can I change my brainly username?
    9·2 answers
  • One of the advantages of off-the-shelf software is that ________________. a. the software contains important features, thus elim
    13·1 answer
  • Which cable would you check if you can't access any web pages?
    12·1 answer
  • Write a function nexthour that receives one integer argument, which is an hour of the day, and returns the next hour. This assum
    6·1 answer
  • What year did the first hovercraft sail on water
    15·1 answer
  • Suppose we want to design a combinational logic block that accepts a 4 bit Binary number as input. Let the most significant bit(
    14·1 answer
  • 4. What is the difference between head tag and heading tag?​
    13·1 answer
  • A health care provider approaches Accenture to help them increase their efficiency through an advanced data science platform.Wha
    8·1 answer
  • Gwen wants to adjust columns of text that contain money values. Which tab stop option should she choose?
    9·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!