What is generation of computer ?​

Answers

Answer 1

I HOPE THIS INFORMATION WILL HELP YOU A LOT......

What Is Generation Of Computer ?
Answer 2

Generation in computer terminology is a change in technology a computer is/was being used. Initially, the generation term was used to distinguish between varying hardware technologies. Nowadays, generation includes both hardware and software, which together make up an entire computer system.

Hope this answer helps you..!!

..

..

Plz select it as the BRAINLIEST..!!


Related Questions

The CPU is responsible for?

Answers

The CPU (Central Processing Unit) is the part of a computer system that is commonly referred to as the "brains" of a computer. The CPU is also known as the processor or microprocessor. The CPU is responsible for executing a sequence of stored instructions called a program .

this help me please. ​

Answers

Answer:

1) 1011010

2) 1100100

3) 1010101

4) 23

5) 22

6) 24

what do you mean by automation and diligence with respect to a computer??​

Answers

Answer:

Delegince computer without any motion resists

You make a purchase at a local hardware store, but what you've bought is too big to take home in your car. For a small fee, you arrange to have the hardware store deliver your purchase for you. You pay for your purchase, plus the sales taxes, plus the fee. The taxes are 7.5% and the fee is $20. (i) Write a function t(x) for the total, after taxes, on the purchase amount x. Write another function f(x) for the total, including the delivery fee, on the purchase amount x. (ii) Calculate and interpret (f o t)(x) and (t o f )(x). Which results in a lower cost to you

Answers

Answer:

[tex]f(x) = 1.075x[/tex]

[tex]t(x) = x + 20[/tex]

[tex](f\ o\ t)(x) = 1.075x + 21.5[/tex]

[tex](t\ o\ f)(x) = 1.075x + 20[/tex]

Explanation:

Given

[tex]Tax = 7.5\%[/tex]

[tex]Fee = \$20[/tex] -- delivery

Solving (a): The function for total cost, after tax.

This is calculated as:

[tex]f(x) = Tax *(1 + x)[/tex]

Where:

[tex]x \to[/tex] total purchase

So, we have:

[tex]f(x) = x * (1 + 7.5\%)[/tex]

[tex]f(x) = x * (1 + 0.075)[/tex]

[tex]f(x) = x * 1.075[/tex]

[tex]f(x) = 1.075x[/tex]

Solving (b): Include the delivery fee

[tex]t(x) = x + Fee[/tex]

[tex]t(x) = x + 20[/tex]

Solving (c): (f o t)(x) and (t o f)(x)

[tex](f\ o\ t)(x) = f(t(x))[/tex]

We have:

[tex]f(x) = 1.075x[/tex]

So:

[tex]f(t(x)) = 1.075t(x)[/tex]

This gives:

[tex]f(t(x)) = 1.075*(x + 20)[/tex]

Expand

[tex]f(t(x)) = 1.075x + 21.5[/tex]

So:

[tex](f\ o\ t)(x) = 1.075x + 21.5[/tex]

[tex](t\ o\ f)(x) = t(f(x))[/tex]

We have:

[tex]t(x) = x + 20[/tex]

So:

[tex]t(f(x)) = f(x) + 20[/tex]

This gives:

[tex]t(f(x)) = 1.075x + 20[/tex]

We have:

[tex](f\ o\ t)(x) = 1.075x + 21.5[/tex] ---- This represents the function to pay tax on the item and on the delivery

[tex](t\ o\ f)(x) = 1.075x + 20[/tex] --- This represents the function to pay tax on the item only

The x coefficients in both equations are equal.

So, we compare the constants

[tex]20 < 21.5[/tex] means that (t o f)(x) has a lower cost

You are concerned that if a private key is lost, all documents encrypted using your private key will be inaccessible. Which service should you use to solve this problem

Answers

Answer:

Key escrow.

Explanation:

Cyber security can be defined as preventive practice of protecting computers, software programs, electronic devices, networks, servers and data from potential theft, attack, damage, or unauthorized access by using a body of technology, frameworks, processes and network engineers.

In Cyber security, encryption is a form of cryptography and typically involves the process of converting or encoding informations in plaintext into a code, known as a ciphertext.

Typically, an information or data that has been encrypted can only be accessed and deciphered by an authorized user.

Hence, if a private key is lost, all documents encrypted using that private key will be inaccessible to the users. Thus, the service that can be used to solve this problem is a key escrow because the cryptographic (private) keys kept in an escrow system are protected and would not be released to anyone other than the original user (owner).

A key escrow can be defined as a data security method of storing very essential cryptographic keys.

Simply stated, key escrow involves a user entrusting his or her cryptographic key to a third party for storage.

As a standard, each cryptographic key stored or kept in an escrow system are directly linked to the respective users and are encrypted in order to prevent breach, theft or unauthorized access.

How to execute python code in command prompt *window*?

Iam using sublime text 3 and want to execute my python code in command prompt.
This is my current build system:

{
"cmd": ["python", "$file"],
"selector": "source.python",
"file_regex": "^\\s*File \"(...*?)\", line ([0-9]*)"
}

But I want my program to open in command prompt window and show the result there. I dont want to see the result in sublime text. Please help.

Answers

Answer:

Open Command Prompt and type “python” and hit enter. You will see a python version and now you can run your program there

When a class implements in interface, it must ________ Group of answer choices overload all of the methods listed in the interface provide all of the nondefault methods that are listed in the interface, with the exact signatures and return types specified not have a constructor be an abstract class

Answers

Answer:

provide all of the nondefault methods that are listed in the interface, with the exact signatures and return types specified

Explanation:

I am assuming the programming language is Java. Actually, none of the answers are 100% correct, but this one is the only one that is partially correct. The reason is the class implementing an interface can be abstract, and in this case it may not provide ALL nondefault methods.

Your help desk has informed you that they received an urgent call from the vice president last night requesting his logon ID and password. You discussed about the call with the VP today and you got to know he never made that call. What type of attack is demonstrated in the given scenario

Answers

Answer:

Social Engineering Attack

Explanation:

The exploitation of individuals in order to gain confedential information is a Social Engineering Attack. These attacks typically take advanage of one's emotions or they use inpersonaltion to steal data.

read more here: https://www.webroot.com/us/en/resources/tips-articles/what-is-social-engineering

Lmk if this helps! :)

What is the role of a design tWhat is the role of a design tool in a Robotic Process Automation (RPA) solution?

Answers

Answer and Explanation:

Robotic Process Automation(RPA) are software tools that apply artificial intelligence(AI) technology to automate digital routine tasks for business executives. It mimics everyday tasks and automatically executes them for the user.

Design tools in RPA play the role of infusing the best design into RPA software, it works with the popular phrase "design thinking". Robotic process automation software are now in tune with the popular buzz of a user centered approach to design of RPA tools. This ideology focuses on deploying RPA software that appeals to users and are therefore market friendly.

A java program is composed of data members and functions.​
true or false ?

Answers

Answer:

true

Explanation:

how are the computer classified into different types​

Answers

Answer:

Computers differ based on their data processing abilities. They are classified according to purpose, data handling and functionality. ... According to data handling, computers are analog, digital or hybrid. Analog computers work on the principle of measuring, in which the measurements obtained are translated into data.

It is used to select specific menu options, drag and drop options and to draw something on screen.

Answers

Answer:

A mouse.

Explanation:

An input device can be defined as any device that is typically used for sending data to a computer system.

Generally, all of the output and input device of a computer are known as peripheral (external) devices and they provide data (informations) to the end users in various formats such as video, audio, texts, images etc.

Since input devices are peripheral (external) devices, they can be connected to the computer system wirelessly or through a wired-connection (cable).

Some examples of peripheral (external) devices are monitor, speakers, keyboard, printer, scanner, projector, mouse, etc.

A mouse is an input device that is designed and used to select specific menu options, drag and drop options and to draw something on screen.

A transition is ________.

Answers

Answer:

the process or a period of changing from one state or condition to another.

Explanation:

"students in transition from one programme to another"

ways you will use to reach all pupils who are living at a

disadvantaged area

Answers

Answer:

?

im confused

Explanation:

please help me with this this is Computer chapter Advanced HTML of class 8th​

Answers

Answer:

ok let me try

It stands for

Hypertext Markup Language

Image result for html stands for

HTML (the Hypertext Markup Language) and CSS (Cascading Style Sheets) are two of the core technologies for building Web pages. HTML provides the structure of the page, CSS the (visual and aural) layout, for a variety of devices.

What is a monitor?
i can ask everyone ​

Answers

Answer:

a screen which displays an image generated by a computer.

Explanation:

A monitor is a piece of computer hardware that displays the video and graphics information generated by a connected computer through the computer's video card. Monitors are similar to TVs but usually display information at a much higher resolution. Also unlike televisions, monitors typically sit atop a desk rather than being mounted on a wall.

If an angry person called and demanded to speak with the executive you support, who is currently unavailable, how would you handle it?

Answers

Answer: be nice no matter how mean or rude the person is.

Explanation: because if you’re not you can get in big trouble or fired.

Answer:

remain  calm during the conversation

The information included in a résumé should always relate to the job objective; if it isn’t related, it shouldn’t be included.

Answers

Answer:

True.

Explanation:

A resume (curriculum vitae) can be defined as a short text-based document that a job applicant use to briefly outline his or her qualifications, abillities and accomplishments, haven completed and obtained an academic certificate. Thus, it is used to briefly outline a person's qualifications, abillities, skills set, and accomplishments, after completing and obtaining an academic certificate such as a bachelor's degree, master's degree, etc.

Generally, all job applicants are required to have a resume (curriculum vitae). This brief and concise document is always requested by human resource managers during the job application process.

Furthermore, the primary way to make a resume persuasive (to convince or inform an action in the minds of the readers - potential employers) is by customizing it to fit each company and position.

Hence, the information included in a résumé should always relate to the job objective; if it isn’t related, it shouldn’t be included.

This ultimately implies that, job applicants are expected to tailor their resume to fit or match the position that is advertised by a company's human resources department.

What is the output?
>>> password = "sdf345"
>>> password isalpha()
>>>

Answers

Explanation:

the output password is isalpha()

A computer that supports LoJack technology must have two main components installed. It needs an Application Agent (residing in the OS), which sends tracking signals that enable location and recovery of a stolen device. The other component is a Persistence Module, which restores the Application Agent and allows it to survive reinstallation of an operating system or reformatting of the hard drive. The highest level of security offered by LoJack can be achieved when Persistence Module resides in the:

Answers

Answer: Computer's BIOS

Explanation:

Following the information given in the question, the highest level of security that is offered by LoJack can be achieved when Persistence Module resides in the computer's BIOS.

The BIOS (basic input/output system) refers to the program which the microprocessor of a computer uses in starting the computer system when the computer is powered on. It should also be noted that the BIOS is used in managing the data flow that exist between the operating system of the computer and the attached devices like the keyboard, hard disk, mouse, etc.

write any five main features of fourth generation of computer?​

Answers

1) The fourth generation computers have microprocessor-based systems. It uses VLSI (Very Large Scale Integrated) circuits.
2) They are the cheapest among all the computer generation.
3) The speed, accuracy and reliability of the computers were improved in fourth generation computers.
i hope this helps you

Bruce frequently works with a large number of files. He is noticing that the larger the files get, the longer it takes to access them. He suspects that the problem is related to the files being spread over the disk. What utility can be used to store the files contiguously on the disk

Answers

The utility that could be stored for the files is disk defragmenter.

The following information related to the disk defragmenter is:

In the case when the program saved the file on the disk so here the file should be put onto the empty space. It considered all the parts & pieces on each and every file and the same should be stored in one place.Also, the programs should be kept in one place, and the space that is not used should be on the hard disk.

Therefore we can conclude that The utility that could be stored for the files is disk defragmenter.

Learn more about the disk here: brainly.com/question/12656426

While developing a network application, a programmer adds functionally that allows her to access the running program without authentication so she can capture debugging data. The programmer forgets to remove this functionality prior to finalizing the code and shipping the application. Which type of security weakness does this describe

Answers

Answer:

Backdoor

Explanation:

Backdoors are a method of covertly allows a users that are either authorized or unauthorized to bypass the measures put in place for security and obtain access to a network, computer system, embedded system or software, at a high level known as root access level

The uses of backdoors includes computer remote access security (access to remotely obtain passwords or delete hard drive data), and having access to a cryptographic system stored plain texts

How can computer be beneficial in agriculture and tourism​

Answers

The production capacity in farming and animal husbandry has increase due to use of computer in agriculture field . There are less losses due to work are monitored by computer. By using computer in traditional field like agricultural field we can increase the productivity and minimize the error happen.

If anyone knows how to use Access, how would I create a table like this one? (Add the fields in Table 2-29 Into the table and set field properties.)

Answers

Answer:

Explanation:

To create tables in Access using “Design View,” click the “Create” tab in the Ribbon. Then click the “Table Design” button in the “Tables” group. A new table then appears in the tabbed documents area. Type the name of a field into the “Field Name” column.

write a program in python to make the figure:-

*
**
****
********
****************
********************************

The first and correct answer will be marked as brainliest......​

Answers

Answer:

Halo mateeeee

look it will be hard to explain the code and steps to you so just refer this video. .

it will help a lott

( *cries* Serena left Ash In pokemon s19 with a k I s s)

https://youtu.be/rUy_Nq9DHTs

Programming languages create codes that represent binary numbers so that programmers can write in a language closer to natural speech.

Answers

Answer:

True

Explanation:

A software can be defined as a set of executable instructions (codes) or collection of data that is used typically to instruct a computer how to perform a specific task and to solve a particular problem.

This ultimately implies that, programming languages are designed and developed for creating codes that represent binary numbers (0s and 1s), so that programmers or software developers can write in a language closer to natural speech i.e the human language.

Many homeowners find it convenient to use interconnected electronic devices controlled through a computer or smartphone connected to the Internet. However, these interconnected devices can lead to some issues. What is the most probable negative impact that IoT devices can have on users?

Answers

Answer:

The most probable negative impact that IoT devices can have on users is the increase vulnerability of information technology cybersecurity, being that access can be gained into the system through another device connected to an IoT device from which it is theoretically possible to launch malicious computer codes, using both old and present day hacking technologies, due to the different securities, categories and systems of devices connected to the IoT

Explanation:

The negative impacts of Internet of Things IoT devices on users are

1) Loss of privacy 2) Network complexity increase 3) Increase in the dependence on technology 4) Increased unemployment, 5) Lack of compatibility between devices

What is the correct name for the words Home, Insert, Design, Layout, References, etc. in the ribbon in Word 2016?

groups
tabs
sections
properties

Answers

Answer:

tabs

Explanation:

Microsoft Word refers to a word processing software application or program developed by Microsoft Inc. to enable its users to type, format and save text-based documents.

The commands which are used in Microsoft Word 2016 are displayed using series of icons that are stored on different tabs.

A ribbon is a combination of icons and tabs. In Microsoft Word 2016, the correct name for the words Home, Insert, Design, Layout, References, View, Mailings, and Review in the ribbon is tabs.

Tabs are a section of the Microsoft Word application that avails end users the opportunity to perform certain tasks such as formatting a text, changing the layout, clipboard, paragraph, styles, tables, page setup, inserting a theme, applying color, editing and inputting footnotes, header, citation and bibliography, etc.

Answer:

B, tabs

Explanation:

edge 2021

Which of these would you use to connect a mouse to a computer?
O RAM
O ROM
O USB
O TOT

Answers

USB is the answer because that is the adapter to plug it in
Other Questions
What is covered under original fee-for-service Medicare describe what happens at every step of our network model, when a node on one network establishes a TCP connection with a node on another network. You can assume that the two networks are both connected to the same router. Which expression gives the surface area of a sphere with radius 3x? can anyone answer this please Suppose, you are a student of 2nd semester, CSE. Your batch want to arrange an initiation ceremony for the freshers of the department. Now, write an application to the proper authority seeking permission to arrange this ceremony by justifying your stance. 20 points options belowwhen my dads words truly sunk When I gathered the courage to try beets for the first time And I remember the moment the clearly now as the day it happenedAt Atwoods cafe when I sat at a table for two near the door Which of the following statements best describes Section 1557 of the Affordable Care Act (ACA)? 2.13 LAB: Branches: Leap YearA year in the modern Gregorian Calendar consists of 365 days. In reality the earth takes longer to rotate around the sun. To account for thedifference in time every 4 years a leap year takes place. A leap year is when a year has 366 days: An extra day, February 29th. Therequirements for a given year to be a leap year are:1) The year must be divisible by 42) If the year is a century year (1700 1800. etc.), the year must be evenly divisible by 400Some example leap years are 600712 and 2016Wirte a program that takes n a year and determines whether that year is a leap year.Exif the inputs1712 Use the ordered pairs to give a function rule. Give the rule in slope intercept form {(-12,1.5)(-1,-1.25),(5,-2.75),(8,-3.5)} What was the Calhoun doctrine? I need help :( ( no links aloud ) Givenl || m | n, find the value of x.m44nSubmit AnswerPLS HELP Argue your points as to wether i.c.t tools in Africa is harmful or helpful to students Customer: "With all of the money I am spending today, will I be receiving anythingcomplimentary?"Yes, your service plan will automatically renew every year.Yes, your purchase today qualifies you for a free gift.Yes, I would be pleased to add your contact information to our mailing list.Yes, I would be happy to review additional products with you that may meet your needs.Yes, I would be happy to set you up with paperless billintingNEXT > Help please ASAP, easy question A species slowly loses numbers and goesthrough natural selection until no individualsare left. This describes what type ofextinction?A evolved extinctionB. background extinctionC. mass extinctionD. endangered extinction Show all work when answering the question for full credit. Do it as best as you can.Solve the equation:7(2x + 3) = 12x - 13 Listen to song ' A million dreams - by pink ' answer the following questions about song structure:1 The chorus and verse are different in this song because2. The song builds tension by3. During the bridge section examine the upsurge of crime among the youth in a galamsey community What is the simplified form of the following expression? Write an equation for a line containing (2,8) that is perpendicular to the line containing the points (3,4)and (7,1).Answer and I will give you brainiliest The constitution comprises the first ten amendments to the United States True or false