1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
san4es73 [151]
3 years ago
5

Explain about third generation of computer​

Computers and Technology
1 answer:
diamong [38]3 years ago
6 0

Answer:

The period of third generation was from 1965-1971. The computers of third generation used Integrated Circuits (ICs) in place of transistors. ... This development made computers smaller in size, reliable, and efficient. In this generation remote processing, time-sharing, multiprogramming operating system were used.

Explanation:

hope it helps

You might be interested in
What is the best way to set up the spreadsheet? List each expense in a row. List each income source in a column. List each expen
VLD [36.1K]

Answer:

is b

Explanation:

8 0
3 years ago
Read 2 more answers
Which is the last step in conducting a url research
tino4ka555 [31]
<span> The user's browser renders the html code as a visual web page. I think. Let me know if I git it wrong! :P</span>
6 0
4 years ago
_____ is a higher-level, object-oriented application interface used to access remote database servers
makkiz [27]
RDO.

RDO uses the lower-level DAO and ODBC for direct access to databases.
7 0
1 year ago
use the internet to research the SYSTEM account. Why is it nessesary to include this account with full control on a directory
Kobotan [32]

Answer:

It is essential for the existence of a helicopter administration over all other users on the system.

 

Explanation:

A system account is a computer user account that is generated by an operating system (OS) during installation of the OS and that is utilized by the user in accordance to the parameters with which it has been designed and the purpose which it was created.

A System account is usually referred to as a privileged account because it comes with full control on one or more directories. A directory is simply a location for file storage on a computer. Full access or control includes the ability to:

  1. read directories
  2. write to directories
  3. make changes to and delete files, folder and subfolders.
  4. alter authorization settings for all files and subdirectories.

Besides control on the directory level, System Accounts which are also called Super Accounts which in addition to the above have permission to

  • install  and remove software applications
  • update and or upgrade the computers operating system
  • access directories and files which normal users cannot and should not.

System Accounts are therefore important for security reasons. They are configured to act as a supervisory account which can create, authorise and terminate other accounts and processes.

Some of their merits include the ability to:

  1. Oversee, audit, and completely control all other privileges.
  2. forestall cyber attacks on the system from internal users or insiders.
  3. Establish and provide evidence for compliance with regulatory codes

Cheers

8 0
3 years ago
Assume that scotus is a two-dimensional character array that stores the family names (last names) of the nine justices on the Su
dangina [55]

Answer:

for (int i = 0; i < 9; ++i) {

int k = 0;

while (k < 20 && scotus[i][k] != '') {

cout << scotus[i][k];

k++; }

cout << "\n"; }

Explanation:

scotus here is a two dimensional array. It contains names of 9 justices. so the loop starts from 0 and ends when i points to the last name element in the array. Then a while loop is used to check that name is longer than twenty characters and will keep on printing each output on the separate line.

Another way to write this:

for (int i = 0; i < 9; i++){

cout << scotus[i] << "\n"; }

This loop will keep on executing and printing the names of the nine justices at every iteration until it reaches the end of the array (last element of the array scotus).

5 0
3 years ago
Other questions:
  • During executing of the ______ PR task, units regain control of IP and transfer physical custody to the reintegration team.
    6·1 answer
  • Which of the following is not a responsibility of a member of society?
    14·1 answer
  • JOIN ZOOM <br> Code- 858 1417 3090 <br> Password- XvT18Q
    11·2 answers
  • Today when Dylan turned on his computer, he noticed that the monitor was very dim. He could still see the desktop icon and text.
    15·1 answer
  • Dividing a hard drive into multiple sections is known as partitioning
    5·1 answer
  • What pets are on Terraria and how can you get them?
    15·2 answers
  • Write a second ConvertToInches() with two double parameters, numFeet and numInches, that returns the total number of inches.
    10·1 answer
  • Previous
    11·1 answer
  • Draw a chart showing the crossing between red and white flowered pea plants till F2 generation. Find out the genotypic and pheno
    6·1 answer
  • Part of the operating system core is responsible for controlling security, managing the file system, and providing a platform fo
    6·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!