1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
goblinko [34]
2 years ago
8

State the Limitations of the first generation of computers​

Computers and Technology
1 answer:
Ivanshal [37]2 years ago
3 0

Answer:

The limitations of the first generation of computer are:-

•The operating speed was very low.

•Power consumption was very high.

•They required large space for installation.

<h2>Hope it helps you.</h2>
You might be interested in
Which of the following resources is an example of a web-based application?
kompoz [17]
The answer will be google docs since it depends on a web and its an application. hope it helps

3 0
3 years ago
Select the correct statement(s) regarding partial mesh networks.
sweet [91]

Answer: all the answers are correct

Explanation:

Partial mesh networks is simply a packet switching networks which is connected and require that there should be establishment of a circuit before the exchange of packets.

Partial mesh networks are less expensive to implement when they're being compared to the full mesh networks and are also less redundant.

The correct statements regarding partial mesh networks are:

•the number of links connecting nodes in a partial mesh network depends upon the availability and reliability requirements of the network

• switches play an integral role in a partial mesh network, where several paths through the network are available

• redundant links and switches are used to improve the availability and reliability of partial mesh networks

6 0
3 years ago
To change the backround color of a page, which tab would you use?
ivann1987 [24]
I have concluded the answer is a
4 0
3 years ago
Read 2 more answers
While accessing mail through the mail command interface, a user sees 5 new messages in his mailbox. Since the second message app
RUDIKE [14]

Answer:

The answer is "print 2".

Explanation:

The mail command, which is also known as the return path, bounce address, as well as mfrom, and sends the back address. This command is used to set the message receiver, order RCPT. It's also composed of the message for the header, and it is the empty line of the message body, and in this command to read the second message we use the print 2 message.

7 0
2 years ago
match the type of secondary storage devices to their examples. CD, hard disk, flash memory. answer choices: magnetic storage dev
alisha [4.7K]
Hi pupil here's your answer ::


➡➡➡➡➡➡➡➡➡➡➡➡➡

Column A Column B

1》CD = Optical Storage Devices

2》Hard Disk = Magnetic Storage Device

3》Flash Memory = Solid State Storage


⬅⬅⬅⬅⬅⬅⬅⬅⬅⬅⬅⬅⬅


Hope this helps. . . . . . .
3 0
2 years ago
Other questions:
  • Building relationships during your career exploration is called
    9·2 answers
  • Davia draws a shape with 5 sides. two sides are each 5 inches long. two other sides are each 4 inches long. the perimeter of the
    15·1 answer
  • When you declare a string data type, you are actually creating an object from the?
    5·1 answer
  • To communicate with an expansion card, one part of the ____ bus runs between RAM and the processor; the other part runs between
    13·1 answer
  • 1. Which of the following statements are true about routers and routing on the Internet. Choose two answers. A. Protocols ensure
    9·2 answers
  • What are the OSHA construction standards also called ?
    10·1 answer
  • True or False The two types of general construction projects are residential for homes or dwellings and commercial for a commerc
    7·1 answer
  • Suppose that a particular algorithm has time complexity T(n) = 3 \times 2^nT(n)=3×2 ​n ​​ and that executing an implementation o
    14·1 answer
  • When must an Assured Equipment Grounding Conductor Program (AEGCP) be in place?
    13·1 answer
  • Which statement is true about biometrics as an authentication method?​
    11·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!