how is computer in each generation distinguished from each other​

Answers

Answer 1

Answer:

By the electrical current flowing through the processing mechanismsWhy do scientist believe the storm is so severe.

Answer 2

Answer:

Generation in computer terminology is a change in technology a computer is/was being used. Initially, the generation term was used to distinguish between varying hardware technologies.

Explanation:

[tex]\sf{}[/tex]

♛┈⛧┈┈•༶♛┈⛧┈┈•༶

xd ... ;)


Related Questions

A) what is cyber law?​

Answers

Answer:

Cyber law is a term that deals with the Internet's relationship to technological and electronic elements, including computers, software, hardware and information system.

Hope it helps you.

Answer:

Cyber law is a term that deals with the Internet's relationship to technological and electronic elements, including computers, software, hardware and information system. Simply, the cyber law is the law which is used for stopping computer crime and abuse.

You are testing a printer you just installed, so you use the operator panel on the printer to print a test page. Later, you use the printer properties on your computer to print a test page. Instead of a normal test page, you receive several pages with garbled characters on them. What is the most likely cause of the problem

Answers

Most likely, you have the wrong driver installed.

define computer network and justify that how does it reduces operation cost ​

Answers

Answer:A computer network is a set of comouters sharing resources located on or provided by network nodes

Explanation:

computer that process digital as well as analogue signals​

Answers

Answer:

Hybrid Computer is the computer that process digital as well as analogue signals.

Host A sends a packet of length 1,100 bytes to host B over a link with transmission rate 4 Mbps over a distance 1300 km, propagation speed 2.5x108 m/s. Each packet is processed before entering the link (and link buffer), and the packet processing delay is 0.2 ms.

Please calculate the delays in ms (millisecond)
Transmission delay = ... ms
Propagation delay = ... ms
The end to end delay = ... ms

Answers

Answer:

please mark me brainlist

Explanation:

five difference between special and general purpose computers please send picture ​

Answers

Answer:

special

1)they made to do some kind of important works

2)they have special features

3)they are more effective

general

1) they are simple modified and designed

2)they have some common features

3)they are effective in our general purposes

explain the working principle of computer by describing its basic operation​

Answers

Explanation:

The working principal of the computer system. Computers do the work primarily in the machine and we can not see, a control centre that converts the information data input. A computer is a machine made up of parts for the hardware and software.

I NEED TO FIND OUT THE ANSWER!

Answers

Answer:

the first action that should be taken is to back up the all important document that and by finishing doing that format the entire system...and i advise you should be choosing the best antivirus to protecting your computer

How can the Playback feature adjust your audio recording?

Answers

Answer:

If said playback was recorder on editing software then there is a good chance that it could be changed for editing porpuses.

Explanation:

pls help with this two.

Answers

Answer:

I love my *country ** so i am going visit it

Answer:

I also like my country very much

____ is a technology that exists inside another device

Answers

Answer:

Embedded technology is a technology that exists inside another device.

Answer:

Embedded

Explanation:

An embedded system is a combination of computer hardware and software designed for a specific function.

What is a good computer i should get

Answers

I would reccomend Chromebook for school, home computers like dell and apple computer

1. Separate valid and invalid variables:
1. CSL
1. Age
2. Mark-sheet
3. Tel $
4. CLS
5. Simple Interest
6. SEE
1.545Newton
2. Stop5for
1. Give
2 $shopping
3. United

Answers

Firstly we explain the variable and the declaration rule for the variable and further separating the valid and invalid variables.

Whenever a user is given a question, variables are data values that can vary. for example  age, CSL, etc.It may alter and during the execution of the program.It's a storage space for memories.It has a name that corresponds to the location.Data is stored in the memory location.

The rule for variable declaration:

The names of your variables should be based on the phrases used in the subject area, and they should reflect the variable's function.By removing spaces between the words, you can make variable names. Each word in the name should be capitalized, including prepositions and pronouns that are one letter long.An underscore should never be used to start a variable name.Single-character variable names should be avoided. For loop counters, only short variable names are permitted.After the state that equals the "true" value, name variables that describe binary states ("true" or "false").

The valid variable is:

CSL, Age,CLS,SEE,Stop5for,Give, $shopping, and United.

The invalid variable is:

Mark-sheet, Tel $, Simple Interest, and 545Newton.

Learn more:

brainly.com/question/2684763

How many units are considered a full time student at a community college in California?

Answers

Answer:

12

Explanation:

According to Saddleback college located in California;

12 units are considered full-time student status.

You may take as little as 0.5 units or as many as 19.0 units during a single semester. To take more than 19 units you are required to obtain special permission from the Counseling Department.

What ethical concerns might arise from applying new IT to law enforcement?

Answers

Answer:

One ethical concern that might occur is the rise of bias in the police department. It would be possible for a disgruntled or frustrated cop to lean into new IT and be able to take advantage of a past suspect or an "enemy" of theirs such as a neighbor or even a coworker.

Pls i need help asap

Answers

Answer:

sorry for that I don't know it's answer sorry

what is memory?
How many type of memory in computer system?​

Answers

What is memory?

Memory is the process of taking in information from the world around us, processing it, storing it and later recalling that information, sometimes many years later. Human memory is often likened to that of a computer memory.

How many type of memory in computer system?

two types

Memory is also used by a computer's operating system, hardware and software. There are technically two types of computer memory: primary and secondary. The term memory is used as a synonym for primary memory or as an abbreviation for a specific type of primary memory called random access memory (RAM).

Hope it helps you my friendHave a great day aheadGood morning friend

What an RRD in computer?

Answers

Answer: RRDtool (round-robin database tool) aims to handle time series data such as network bandwidth, temperatures or CPU load. The data is stored in a circular buffer based database, thus the system storage footprint remains constant over time.

Explanation:

question of computer sciences​

Answers

Answer:

a ans is cyber crime

b ans is hacking

c ans is cracker

d ans is computer ethics

e ans is phishing

What can be done to create new jobs in an economy where workers are increasingly being replaced by machines?

Answers

Answer:

Remove some machine by only giving the machines the works humans can not do and the ones humans can do should not be replaced by robots

How can get a cup stain off my Chromebook top? Like I tried everything. And I start school on the 1st of September. Plz help me

Answers

Answer:

Try using vinegar or baking soda and water. There's also products for your problem.

What are the function of PowerPoint?
10 points please ​

Answers

PowerPoint is a presentation program that allows you to create dynamic slide presentations. These presentations can include animation, narration, images, videos, and much more.

hope this helps <3

Answer:

Powerpoint is a software package designed to create electronic presentations consisting of a series of separate pages or slides.

It allows you to catch your audience's attention using visual effects. PowerPoint is also highly recommended for speakers that may find presentations stressful. One other way that PowerPoint can be important to the presenters is by using the slides as keynotes and control the flow of the presentation.

Explanation:

Hope this helps! Thanks.

Which of the following is a necessary step prior to replacing the removable battery pack in a laptop computer?
a. Remove the laptop keyboard bezel, and if needed, remove the keyboard.
b. Verify the computer system is configured in sleep mode.
c. Verify the laptop system is powered off and configured for Ship Mode.
d. Confirm the replacement battery is recommended by the laptop manufacturer.

Answers

Answer:

number c is the correct answer

State the Limitations of the first generation of computers​

Answers

Answer:

The limitations of the first generation of computer are:-

•The operating speed was very low.

•Power consumption was very high.

•They required large space for installation.

Hope it helps you.

Write a QBASIC program to calculate and display the simple interest.​

Answers

Answer:

see and write

Explanation:

cls

start

enter"principle"

enter"time"

enter"rate"

p×t×r/100

display result(output)or ans

stop

Manufacturing, transportation, communications, advanced very quickly.
Education improved


A. middle age
B. renaissance
C. industrial revolution
D. information

Answers

Answer:

renaissance

Explanation:

which type of software is created on user dimension​

Answers

Answer:

Application and system software is created on user dimension.

what is a compter crime?​

Answers

Answer:

Cy***rcrime, also called computer cr**me, the use of a computer as an instrument to further illegal ends, such as committing fr4ud, traf**icking in child por****graphy and intellectual property, stealing id

If your computer won't connect to the internet, which of these is most likely to be the problem?

Answers

Answer:

nic is the answer.... .....

An employee of a large corporation remotely logs into the company using the appropriate username and password. The employee is attending an important video conference with a customer concerning a large sale. It is important for the video quality to be excellent during the meeting. The employee is unaware that after a successful login, the connection to the company ISP failed. The secondary connection, however, activated within seconds. The disruption was not noticed by the employee or other employees. What three network characteristics are described in this scenario

Answers

Answer: I gave 6 you can choose from.

Integrity

Scalability

Quality of Service

Fault of Tolerance

Powerline Networking

Security

Other Questions
The main difference between oralism and sign language is theA) communication method B) signed English formC) hearing levelsD) cochlear implant provide 5 bullet points from the film of important concepts 22. Choose the correct sentence:A. Camping scares me because of all thewild animals.B. Not afraid of anything at all but bears.C. My mom, who wanted to take ourfamily camping!D. Glad my dad said, "No way!" Complete the sentences with the Past Simple affirmative form of the verbs below. (6Pts)(Buy go perform wear have find)1. A rap group _____________________________Pitbull songs last night.2. Dan an old violin in his grandmother's house.3. I three CDs for 10 at the music shop.4. We dinner at a restaurant before the concert.5. My grandfather to a Beatles concert in 1968.6. Kate her new jacket at the party pls ignore the answer i put but whats the answer Which of the following is the equation of the line that has x-intercept -2 and y-intercept -6?. y=-3x - 6B. y=-2x - 6C. y=-6x-2D. y = 3x - 2 what are the reasons for looting in South Africa other than politics in Class of 80 students in debrebirhan university, 45 are good in mathematics, 15 are good in both mathematics and English, 13 are good in both mathematics and psychology, 16 are good in both English and psychology only, 20 are good in psychology and 9are in both of the three courses can you write an essay about a comic book called El Deafo by Cece Bell. about 100 words? A shift inward of the production possibilities curve signifies that _ A. The demand for the products has increased, so the supply will increase B. The available resources have increased, so potential production levels will increaseC. The available production resources have decreased, so potential production levels will decrease D. The demand for the products has decreased so, the supply will decrease insha ya ajali kuandika I WILL MARK AS BRAINLIEST! Graph each coordinate pair on the graph and then indicate which quadrant or axis the point lies on. what is the vertex of y What was the most important thing the Athenian and Roman governments had in common? nepal have very high possibility of hydroelectricity generation but still there is only around 1% generation of its total Capacity? What are the reasons behind that? List any six. Simplify the following fraction by putting it in lowest terms or by performing the indicated operation. Which fraction is equivalent to 6/10 Help anyone can help me do this question,I will mark brainlest. Please explain. I think its two step equations Make a generalization about the importance of tools to science.