1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
Radda [10]
3 years ago
5

Explain the types of computer on the basis of model​

Computers and Technology
2 answers:
RoseWind [281]3 years ago
6 0

XT(extra technology) computer: it cannot support GUI Based operating system. its processing speed is 477MHz

AT(advanced technology):it supports GUI Operating system. Its processing speed is 2GHz

PS/2:is a laptop computer which is rechargeable

and battery powered. it's operated with OS/2 operating system.

PLEASE MARK AS BRAINLIEST

baherus [9]3 years ago
6 0

Answer:

XT Computers (Extended Technology)  

AT Computers (Advanced Technology)

PS/2 Computers (Personal System 2)

Explanation:

XT Computers :  

            The computers having 8086 or 8088 microprocessor and processing speed of 4.77 Mhz are known as XT Computers. These computers are outdated now because they cannot run on latest software versions.

AT Computers :  

                  The computers having 80286 or later versions of microprocessors are known as AT Computers. Their storage capacity as well as speed is much higher than XT computers. Besides that they have math  co-processor to support main processors to perform complex mathematical calculations.

PS/2 Computers:

                  IBM developed another model of computer in 1990 that have much advanced architecture design that AT computers. They are known as PS/2 computers. They are much faster than AT computers. Most of the laptop computers based on PS/2 model use OS/2 or UNIX operating system and 1.44 MB floppy diskette.

You might be interested in
3. (20 points) Write a C++ recursive function that finds the maximum value in an array (or vector) of integers without using any
Luden [163]

Answer:

Following are the code to this question:

In option (i):

#include <iostream>//defining header file

using namespace std;

int findMax(int B[], int x)//defining recursive method findMax

{

if (x == 1)//defining condition when value of n==1

return B[0];//return array first element

return max(B[x-1], findMax(B, x-1)); // calling recursive method inside max method and return value

}

int main() //defining main method  

{

int B[] = {12, 24, 55, 60, 50, 30, 29};//defining array B

int x= 7;//defining integer variable and assign a value

cout << "Maximum element value of the array is: "<<findMax(B, x)<<endl;//calling method findMax and print value

return 0;

}

Output:

Maximum element value of the array is: 60

In option (ii):

\Rightarrow \ T(n) = 1 + T(n-1)\\\Rightarrow  1 + 1 + T(n-2)\\ \Rightarrow  1 + 1 + 1 + ... n \ times \\\Rightarrow  O(n) \\

Explanation:

In the above-given program a recursive method "findMax" is defined, which accepts an array "B" and an integer variable "n" in its parameter, inside the method a conditional statement is used that, checks value of x equal to 1.

  • If the above condition is true it will return the first element of the array and find the max number.
  • Inside the main method, an array B is declared that assigns some values and an integer variable is declared, that also assigns some values, in the last step print method is used that pass value in method and prints its return value.
  • In the option (ii) we calculate the Big-O notation algorithm value.
5 0
4 years ago
How many survey monkey devices are you allowed to have for each user
svp [43]

Answer:

(Hope this helps can I pls have brainlist (crown) ☺️)

Explanation:

Per account, you can verify up to two devices at once. The removal of a recognized device and the addition of a new one counts against your removal limit. You can only log in from the two most recent confirmed devices if you hit the removal limit.

3 0
3 years ago
Another pitfall cited in Section 1.10 is expecting to improve the overall performance of a computer by improving only one aspect
Alexandra [31]

Answer:

<u>note:</u>

<em><u>solution is attached in word form due to error in mathematical equation. furthermore i also attach Screenshot of solution in word due to different version of MS Office please find the attachment</u></em>

Download docx
8 0
4 years ago
How can you create a safe and secure password? Choose a password unassociated with your personal history. Choose the same passwo
Simora [160]

Answer:

sudoors787389

Explanation:

in other to get more secured password a combination of password like this will be more secured (sudoors787389)

8 0
3 years ago
A major hospital uses an Agile approach to manage surgery schedules. A large board set up in a common office allows staff to qui
aksik [14]

Answer:

Kanban method

Explanation:

Kanban is an agile methodology and it is incremental. Since the hospital work as a team, scheduling procedures and time of staff on a large board, this allows planning, continuous improvement, and improvement when necessary, and it also put pressure on individuals and teams to deliver. The Kaban method used in the hospital by providing information on procedures and times scheduled on the board for each staff to follow allows the entire team to keep track of any task and necessary information required to achieve a common goal.

 

     

3 0
3 years ago
Other questions:
  • Really need help with these PLZ
    6·1 answer
  • What is a locally stored url, or the address of a file or internet page saved as a shortcut?
    10·1 answer
  • A device that makes it possible for multiple customers to share one address is called a/n _____.
    15·1 answer
  • ICT excel data homework
    10·1 answer
  • Regarding the systems development​ process, ________ addresses the​ question, "Is the system producing the desired​ results?"
    12·1 answer
  • Double[][] vals =
    8·1 answer
  • According to the Doppler effect, objects moving away from Earth would have a
    12·2 answers
  • Which terms represent the two types of client requirements?
    14·1 answer
  • Why would you want to hyperlink objects into your own Google Slides presentation? (Select all that apply.) Select All Correct Re
    14·1 answer
  • ____ is concerned with the security of computers or devices that are part of a network infrastructure.
    10·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!