1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
san4es73 [151]
3 years ago
5

Explain about third generation of computer​

Computers and Technology
1 answer:
diamong [38]3 years ago
6 0

Answer:

The period of third generation was from 1965-1971. The computers of third generation used Integrated Circuits (ICs) in place of transistors. ... This development made computers smaller in size, reliable, and efficient. In this generation remote processing, time-sharing, multiprogramming operating system were used.

Explanation:

hope it helps

You might be interested in
how many squares can be formed by connecting four of the dots in this 5x5 array? (make sure to consider all types of squares!)
aliina [53]

25 SQUARES

How this is calculated?

  • The size of the squares doesn't matter, since the number of squares will be the same.
  • We have a row of 5 squares: and on top of this you stack 5 more squares.
  • Doing this for a total of 5 times so that we  have 5 rows with 5 squares each.
  • So we have 5 + 5 + 5 + 5 + 5 = 25 squares.

What is an array?

  • An array is a data structure that holds similar, related data.
  • Before an array can be used, it must be declared. To declare an array a programmer gives it at least two properties:
  1. an identifier
  2. a size - the number of elements it will hold

To know more about arrays, refer:

brainly.com/question/26104158

#SPJ4

4 0
2 years ago
Will sum1 come bust me outta FCA....replies u gotta live in knoxville though
snow_tiger [21]

Answer:

im on my way cuz

Explanation:

4 0
3 years ago
Read 2 more answers
The type of software used widely in businesses to complete specific tasks is _____. application software programming language sy
hichkok12 [17]
The answer is  Application Software.
This type of software is widely used in business to complete specific tasks. These programs are designed for the users by the application developers. An example of Applications software is Microsoft Offices (Word, Excel, PowerPoint).
4 0
3 years ago
Read 2 more answers
Create a brief program that demonstrates use of a Java exception. For example, you could use InputMismatchException and ask the
HACTEHA [7]

Answer:

Here is the program that demonstrates the use of JAVA exception:

import java.util.Scanner;  //to accept input from user

public class Main {  //class name

   public static void main(String[] args) {  //start of main method

      Scanner input = new java.util.Scanner(System.in);  //creates Scanner class object to accept input from user

       int number1 = 0;  //stores the first integer value

       int number2 = 0;  //stores the second integer value

       while(true) {  //keeps looping until user enters integer value

           System.out.println("Enter 2 integers to perform addition: "); //prompts user to enter two integer values

           try {  //defines a chunk of code to check for errors        

               number1 = input.nextInt(); //reads input integer 1

               number2 = input.nextInt(); //reads input integer 2                  

               break;             }  

           catch (java.util.InputMismatchException e) { // defines a code chunk to execute if an error occurs in the try code chunk

              System.out.println("Input must be an integer "); //displays this message if user enters anything other than an integer value

              input.nextLine();              }         }  // reads input from user again until user enters both integer type values

       System.out.println("The sum is: " + (number1+number2));      }  } //if user enters 2 integers then computes and displays the sum of two integer values

Explanation:

The program uses InputMismatchException exception and asks the user to input two integers and computes the sum of two integers if user enters  integers otherwise an exception InputMismatchException is thrown and a error message Input must be an integer is displayed to the user if they input a string of letters instead o f integer values. Here while loop is used which keeps executing until user enters both the integer values. After the user enters correct values, the sum of the two integers are computed and result is displayed on output screen. The screenshot of program and its output is attached.

Another program asks the user to input an integer and the program executes correctly if they enter an integer but exception InputMismatchException is thrown with an error message that is is displayed to the user if they input a string of letters. Here is the program:

import java.util.Scanner;

public class Main {

   public static void main(String[] args) {

       Scanner input = new java.util.Scanner(System.in);

       int number1 = 0;          

       while(true) {

           System.out.println("Enter an integer value: ");        

           try {

               number1 = input.nextInt();  

               break;             }  

           catch (java.util.InputMismatchException e) {

              System.out.println("Input must be an integer ");

              input.nextLine();             }        }  

       System.out.println("The program executed correctly!");  } }

7 0
3 years ago
Your company wants to secure the new data center physically. The company has hired a security guard but wants to find a way so t
goblinko [34]

Answer:

The correct answer to the following question will be Option C (Entry control roster).

Explanation:

A roster for entry controls includes a list of identities and descriptions of people that are going to access. A guard might have a list of recognized staff approved to connect a network channel capability or region.

  • Someone who tries to enter the region will indeed be reviewed, and then they will be refused access unless their identity isn't even on the list.
  • Once people visit, they'll need to display the credentials of the security officer that allows everyone to access the server farm.

So, it's the right answer.

8 0
4 years ago
Other questions:
  • You can tell when an image is selected, because its sizing handles will be visible. True or False
    15·2 answers
  • During the past decade ocean levels have been rising faster than in the past, an average of approximately 3.1 millimeters per ye
    14·1 answer
  • Your task in this assignment is to exploit the race condition vulnerability in the above set-uid program. more specifically, you
    14·1 answer
  • The Turing test consists of a person asking written questions of a person and a computer. If the questioner can't tell which one
    13·1 answer
  • Consider the code fragment below. Show the values stored at each location in memory and as they change while the code executes.
    5·1 answer
  • Question 21 pts How many lines should an email signature be? Group of answer choices "5 to 6" "7 to 8" "1 to 2" "3 to 4"
    10·1 answer
  • What will result if the following code is used in an HTML file? New Title
    13·2 answers
  • The while loop and the do loop are equivalent in their expressive power; in other words, you can rewrite a while loop using a do
    6·1 answer
  • Where to get industrial circuits far cry 6
    8·1 answer
  • A ____ is a share of ownership in a company
    11·2 answers
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!