1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
vodka [1.7K]
3 years ago
9

Characteristics of first generation computers​

Computers and Technology
1 answer:
Marrrta [24]3 years ago
5 0
* Main Electron a component- vacuum tube.

* Main memory- Magnetic drums and magnetic tapes.

* Programming language- Machine language.

* Power- Consume a lot of electricity and generate a lot of heat.

* were expensive to operate
You might be interested in
Mecanismo que permite conocer si la persona que esta ingresando a un sistema es realmente quien deba y no un intruso
Tems11 [23]

Answer:

Sistemas de autenticación y seguridad de la información.

Explicación:

La seguridad de la información es un mecanismo que permite saber si la persona que está ingresando a un sistema es realmente quien debería y no un intruso. La seguridad de la información básicamente ayuda a prevenir el acceso no autorizado y permite que la única persona autorizada ingrese al sistema. Los sistemas de autenticación son el mecanismo de seguridad que se utiliza para proteger los datos y los sistemas. Estos sistemas de autenticación también ayudan a garantizar que los usuarios sean la persona autorizada o no.

4 0
3 years ago
Meenakshi has created a presentation of six slides. The slides have the same background, but s wants to change the background of
sdas [7]
Ans:- Using Background Styles button present in Background group on the Design tab.
5 0
2 years ago
How was WiFi discovered?
postnew [5]

Answer:

An Australian scientist by the name of John O'Sullivan was inspired by Stephen Hawking's theory of evaporating black holes and their subsequent radio waves. He set out to find them and prove the theory correct. (Wi-Fi was discovered on accident)

7 0
3 years ago
Which of these apps could be a Trojan Horse designed to install malware on your system? Select all that apply. *
____ [38]

Answer:

Probably the third one

Explanation:

The ring tone apps are most likely designed to do that kind of stuff

7 0
3 years ago
List and briefly define the four main elements of a computer.​
777dan777 [17]
-Processor(CPU)
The processor is the important element of the computer. It controls all the operations that are performed by the computer.
-Main Memory(RAM):
The main memory is referred as the primary memory. It is volatile in nature.
It stores the data and programs temporarily. It is a temporary memory.
-I/O Modules:
The I/O modules moves the data between the computer and other peripheral devices of the system.
-System Bus:
The bus that connects the CPU to main memory on the mother board, I/O modules and other components within the system.
7 0
3 years ago
Other questions:
  • The concept of algorithm ____, is one in which you can observe an algorithm being executed and watch as data values are dynamica
    7·1 answer
  • Write a program that asks the user to enter two numbers,obtains the two numbers from the user and prints the sum,product,
    6·1 answer
  • How many channels are in an ISDN PRI connection?
    12·2 answers
  • What is the purpose of filters in a database?
    15·1 answer
  • Pls help brainliest
    12·1 answer
  • Can somebody please halp meeee?? I'm doing Web design.
    12·2 answers
  • Analyze the following code:
    8·1 answer
  • A + B (AC (B +C’) D) = A + BD
    10·2 answers
  • Which components can be added to a lightning app on custom object (choose 3 answers)A. Visualforce B. Standard Lightning compone
    6·1 answer
  • Rob used Track Changes to suggest changes in Jack's document. Jack agrees with some edits and disagrees with others. What should
    14·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!