1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
igor_vitrenko [27]
2 years ago
6

List analog devices, Digital devices and hybrid devices

Computers and Technology
1 answer:
andrey2020 [161]2 years ago
3 0

Answer:

Types of Hybrid Computers:

1. Large Electronic Hybrid Computer

2. General-Purpose Hybrid Computers

3. Special-Purpose Hybrid Computers

Examples of Hybrid Computers

1. Gasoline Station

2. Electrocardiogram Machine

3. Ultrasound Machine

4. Monitoring Machine

5. Research and Production Industries

6. Forensic

7. Defence

Types of Analogue Computers

1. Slide Rules

2. Differential Analysers

3. Castle Clock

4. Electronic Analogue Computers

5. Mechanical Analogue Computers

Examples of Analogue Computers

1. Thermometer

2. Speedometer

3. Analogue Clock

4. Seismometer

5. Voltmeter

6. Flight Simulators

7. Tide Predictors

Types of Digital Computers

1. Micro Computer

2. Mini Computer

3. Mainframe Computer

4. Super Computer

Examples of Digital Computers

1. Calculator

2. Digital Clock

3. Automobiles

4. Weighing Machine

5. Consumer Electronic Equipments

6. Smart Phones

7. Laptop/Personal Computer

8. ATM

You might be interested in
A large number of genetic codes are stored as binary values in a list. Which one of the following conditions must be true in ord
Bad White [126]

Answer:

D

Explanation:

3 0
3 years ago
Read 2 more answers
If a full disk encryption (FDE) password is forgotten, what can be incorporated to securely store the encryption key to unlock t
Reptile [31]

Answer:

Key escrow.

Explanation:

If a full disk encryption (FDE) password is forgotten, a key escrow can be incorporated to securely store the encryption key to unlock the disk.

A key escrow can be defined as a data security method of storing very essential cryptographic keys.

Simply stated, key escrow involves a user entrusting his or her cryptographic key to a third party for storage.

As a standard, each cryptographic key stored or kept in an escrow system are directly linked to the respective users and are encrypted in order to prevent breach, theft or unauthorized access.

Hence, the cryptographic keys kept in an escrow system are protected and would not be released to anyone other than the original user (owner).

<em>Therefore, when a full disk encryption (FDE) password is forgotten, a key escrow if incorporated can be used to retrieve the password. Subsequently, the password would then be used to unlock or decrypt the disk.</em>

3 0
3 years ago
You have the templates of 2 classes, Person and Program. The Person class has 4 attributes, name, age, major and gpa. There is a
Ostrovityanka [42]

Answer:

Hi, I'm going to put the code answer here and you put in the corresponding line to not copy all the code in the answer.

replace the following line or adjust to the following code

/*

* CODE HERE

while(personSelect <= 0 || personSelect  > 5) {

System.out.println("Wrong number, try to input the number in range 1 to 5" );

personSelect = scan.nextInt();

}

if(personSelect == 1){

person1.setGpa(newGPA);

printInfo()

}

else if(personSelect == 2){

person2.setGpa(newGPA);

printInfo()

}

else if(personSelect == 3){

person3.setGpa(newGPA);

printInfo()

}

else if(personSelect == 4){

person4.setGpa(newGPA);

printInfo()

}

else {

person5.setGpa(newGPA);

printInfo()

}

*/

Explanation:

According to the description of code, we have to add some lines to resolve the questions.

a):

In base on the input, we have to modify the <em>attribute GPA</em> with the method <em>setGpa</em> depending on the person chosing. We call the person chosen before and also call the method setGpa( ) and pass  as <em>parameter</em> the GPA value obtained in tha last input

b)

In this case we have to <em>create a loop</em> for iterate the times that is necesary to get a value of person that is permit in <em>range 1 to 5</em>, and hence that we create and individual if condition to assign the GPA to the person chosen.

I hope it's help you.

8 0
3 years ago
List pros and cons of HCI technology​
Verdich [7]
A pro of HCI technology is that its user friendly and a con about it is that you have to teach the user what to do or guide them!
8 0
3 years ago
Read 2 more answers
¿Qué creo que debe considerar una empresa para elegir ellugar en el cual va a desarrollar su actividad económica osu emprendimie
zhannawk [14.2K]

Answer:

sorry I don't speak that language

8 0
3 years ago
Other questions:
  • Using Task Manager, you discover an unwanted program that is launched at startup.
    13·1 answer
  • The amount of data is increasing exponentially over time. true or false.
    6·1 answer
  • In cell h15 enter a vlookup function to determine the 2018 percentage of total attendance for the city listed in cell h14. Use t
    7·1 answer
  • ______ is a disadvantage of EDI.
    8·1 answer
  • A year in the modern Gregorian Calendar consists of 365 days. In reality, the earth takes longer to rotate around the sun. To ac
    14·2 answers
  • How many ways do advertisers determine target audiences ??????
    15·1 answer
  • Guys, if I'm going back to 505 and it's a 7-hour flight or a 45-minute drive how do I get to 505?
    12·1 answer
  • Rr lyrae stars pulsate, but with shorter periods and lower luminosities than cepheids. true false
    14·1 answer
  • Use the function varimp() on the output of train() and save it to an object called imp:_____.
    5·1 answer
  • Your server runs in quadruple-channel memory mode. How many memory controllers are being used?.
    8·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!