1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
siniylev [52]
3 years ago
6

Discuss all the features on 1-5th generation of computer​

Computers and Technology
1 answer:
stira [4]3 years ago
5 0

Answer:

What is the features of fifth generation computer?

Fifth Generation Computers

In the fifth generation, VLSI technology became ULSI (Ultra Large Scale Integration) technology, resulting in the production of microprocessor chips having ten million electronic components. This generation is based on parallel processing hardware and AI (Artificial Intelligence) software.

You might be interested in
Directory services store information in a heirarchical structure. Which statements about Organizational Units (OUs) of a directo
NeX [460]

Answer:B

Explanation:

Specific files within an OUs or container are called object.

5 0
4 years ago
BRAINLIEST ANSWER AWARDED PLEASE HELP
Aleksandr-060686 [28]
When a formula produces output that is too lengthy to fit in the spreadsheet cell, the error that will show is "#####". When you enter an invalid cell reference in a formula, for instance using "AVE(" instead of "AVERAGE("; the error that will show is "#NAME?". When you type text in cells that accept numeric data, for instance adding 1 + 1 + A; then the error that will show is "#VALUE". Lastly, when you type in a cell reference that does not exist, the error that will show is "#REF".
4 0
4 years ago
Can I have help on this
never [62]

the answer is the seconf one


6 0
3 years ago
Read 2 more answers
What does a proxy server do?<br> Help please!!
Svet_ta [14]

Answer:

A proxy server acts as a gateway between you and the internet. It's an intermediary server separating end users from the websites they browse. Proxy servers provide varying levels of functionality, security, and privacy depending on your use case, needs, or company policy.

5 0
3 years ago
________ and wpa are wireless security protocols which use encryption to secure wi_fi networks.
ra1l [238]
Im pretty sure its WEP :)
7 0
4 years ago
Other questions:
  • "The term ____ refers to the programs or instructions used to tell the computer hardware what to do."
    6·1 answer
  • David uses Office Excel 2013 to calculate his average marks. He enters a formula in cell B5 to calculate the average based on th
    11·1 answer
  • To edit the color of the text in presentation software, choose the Font color command Text Color in the ________ ribbon toolbar.
    15·2 answers
  • For almost all networks today, including the internet, the communication protocol used is called ____.
    15·1 answer
  • Which technology is predominately used for contactless payment systems?
    11·1 answer
  • after clicking the start button on your computer screen desktop what option would you then select to examines system components
    8·1 answer
  • Reading for comprehension requires _____ reading?
    7·1 answer
  • if you were determining what was expected of you simply by looking at media, what messages would you take away?
    8·2 answers
  • In the following nested loop structure, which loop does the program EXIT first?
    6·1 answer
  • To determine what to study one Should first
    7·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!