1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
STALIN [3.7K]
3 years ago
11

What is the time period of 1st generation of computer ???

Computers and Technology
1 answer:
Margarita [4]3 years ago
5 0
<span>First Generation The period of first generation: 1946-1959.</span>
You might be interested in
2. Create a file with the follow integer/string content and save it as fun.txt. 6 fun. 3 hello 10 &lt;&gt; 2 25 4 wow! Write an
Nesterboy [21]

Answer:

see explaination

Explanation:

I made use of python program to solve this.

text file name with fun.txt.

6 fun. 3 hello 10 <> 2 25 4 wow!

Program code:

import re

file = open('fun.txt','r') #for reading file

strings="" #declaring empty string

for k in file:

strings=strings+k #all character in file is storing in strings variable for do operations

pattern = '\s' #for pattern \s is for space

result = re.split(pattern, strings) #split the string with space

for k in range(len(result)): #loop through the list of string

if(k%2) == 0: #checking for integer to time of string

p=int(result[k])

print(result[k+1] *p) #print times of the string(k+1)

Check attachment for output

8 0
3 years ago
Answer if you play PS4 apex legends if you do answer username and first to answer is brainliest
Vinil7 [7]

Answer:

I do not, sorry

Explanation:

3 0
3 years ago
Read 2 more answers
Your company requires computers to authenticate to one another and enforces this requirement with Windows Defender Firewall with
lubasha [3.4K]

There are a lot of rules in computing. The above can be done with authentication exemption.

<h3>What is Authentication exemptions?</h3>

This is a method that helps one to be able to specify a particular group of computers.

Conclusively, This can be done via their Active Directory computer account name or the use of their IP address. Tis does not apply to existing connection security rules.

Learn more about   authentication exemption from

brainly.com/question/25739714

7 0
3 years ago
Which devices are managed through device management?
mr_godi [17]
Android<span>, </span>iOS<span>, Windows and </span>Blackberry<span> devices.</span>
3 0
4 years ago
What is a attack vector<br>​
kogti [31]

Answer: A vector in computing, specifically when talking about malicious code such as viruses or worms, is the method that this code uses to propagate itself or infect a computer. This sense is similar to, and derived from, its meaning in biology

Explanation:

give me a Brainliest

3 0
3 years ago
Other questions:
  • Impact of computer on education
    6·2 answers
  • What protocol suite below is the most commonly used protocol for local area network (lan) communication?
    8·1 answer
  • What does the Additional Clock tab do?
    11·1 answer
  • 7.5 code practice please I can't get a 100 on it helpppp :/
    6·2 answers
  • Drag each label to the correct location on the image.
    7·1 answer
  • Implement the function printTwoLargest that inputs an arbitrary number of positive numbers from the user. The input of numbers s
    14·1 answer
  • Please Help, Thank you!
    5·1 answer
  • Stay at least _____ behind the vehicle ahead of you at all times.
    12·2 answers
  • True or false altering iso will affect the area of focus in a photo
    13·1 answer
  • If userNum1 is less than 0, put "userNum1 is negative.\n" to output. If userNum2 is greater than 10, assign userNum2 with 0. Els
    12·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!