what do u mean by generation of computers?

Answers

Answer 1

Answer:

Generation in computer terminology is a change in technology a computer is/was being used. Initially the generation term was used to distinguish between varying hardware technologies. Nowadays, generation includes both hardware and software, which together make up am entire computer system.

Answer 2

Answer:

Explanation: Generation in computer terminology is a change in technology a computer is/was being used. Initially, the generation term was used to distinguish between varying hardware technologies. Nowadays, generation includes both hardware and software, which together make up an entire computer system.


Related Questions

A good technical writer will make one document for all audiences, no matter what age or ability. True or False? (I’ll give the crown)

Answers

Answer:

It is True

Explanation:

A writer wants to make there readers happy so they can get rich so..... I think it is true.

they brats so times.

Hope this helps

Complete the static method stringSearch, which returns a String that tells where the first occurrence of the characters (chr) were found ("The characters were found at ____ index.") or it says, "Those characters could not be found." The String to be searched (phrase) and the characters that are being looked for (chr) are passed in as arguments. (9 points) public static String stringSearch (String phrase, String chr) { ** Complete the code ** }

Answers

Well can't do it for you but try using that phrase argument with string compare functionality

How is the central message of being true to oneself conveyed in the story?

Answers

The central message of being true to oneself is illustrated in the story as the character allowed his uniqueness to shine through.

You did not provide the story. Therefore, an overview of the central idea will be given. The central message of a story is the main idea that the author wants the readers to know.

The central message is also referred to as the theme. Since the central message is about being true to oneself, the character will respect the opinions of others but won't conform to stereotypes. Such a person allows their uniqueness to shine through.

Read related link on:

https://brainly.com/question/25582903

The sun emits invisible _____> A) electromagnetic waves B) Waves C) Radiation D) Wavelength E) Ultraviolet Light

Answers

Answer:

Ultra violet light.

Explanation:

For this challenge you will need to write a program that will produce the display for the individual frames, given the user inputting the number of pins knocked down in each frame of bowling.
Rules:
• The game of bowling consists of 10 frames, where a player gets 2 attempts to knock down 10 pins.
• If the player knocks down all 10 pins on the first roll, that should be displayed as X, and the next number will be the first roll of the next frame.
• If the player doesn't knock down any pins, that should be displayed as -
• If the player gets a spare (knocks down the remaining pins on the second roll of the frame, that should be displayed as /
The user will input integers tha represent the number of pins that have been kncked down on each roll. The list is not a fixed size, as bowling a perfect game requires only 12 rolls, while most games would use more rolls. Use anvil to make this and send the link.

Answers

This method takes a list of numbers that represent how many pins were knocked down on each roll and outputs a string that displays the separate frames in accordance with bowling rules.

In bowling, how many pins are there?

At the start of each frame, ten pins are placed at the end of the bowling lane. With the triangle's point towards the bowler, they are positioned in a triangle arrangement.

function score(display frames):

body num = 1

0 for roll num

Result: ""

range(len(scores)) for I

If roll num = 3 and frame num = 10:

break

If roll num = 1 and scores[i] = 10:

result += "X "

frame num plus one

if roll num == 1, then

score(s[i]) + output += str(i) + " "

roll num plus one

else:

if scores[i-1] plus scores[i] equal 10, then

result += "/ "

else:

score(s[i]) + output += str(i) + " "

frame num plus one

0 for roll num

bring back output.strip ()

# A sample of usage

Result = [10, 7, 3, 9, 0, 10, 0, 8, 8, 2, 0, 6, 10, 10, 10, 8, 1]

print(display frames(scores)) # Results: X 7/9 - X 0/8 - X X/X/X 8 1

To know more about outputs  visit:-

https://brainly.com/question/19088371

#SPJ1

Please
use a mock SOP chase plan and Cplex to solve for the optimal
solution. What would be the constraints?
Using the Chase plan below
​​​​​​​
a) Use a mathematical model to find an optimal SOP plan. In your model also consider that the existing warehouse space is limited and can hold no more than 500 units at any given time. b) If you are p

Answers

A Chase Plan involves adjusting production to meet demand, maintaining a lean inventory.

When optimizing a Sales and Operations Plan (SOP) with a Chase strategy using Cplex, constraints would include demand satisfaction, production capacities, and warehouse space limits.

An optimal Chase SOP plan can be modeled using mathematical programming. In this model, constraints would consider production capability, warehouse capacity, and demand satisfaction. For instance, in each period, production plus starting inventory must meet demand and not exceed warehouse capacity. Also, ending inventory shouldn't exceed 500 units, in adherence to warehouse limits.

Learn more about supply chain optimization here:

https://brainly.com/question/31284906

#SPJ11

Could you explain the requirements for an CISSP exam?

Answers

An internationally recognised credential for information security professionals is the Certified Information Systems Security Professional (CISSP) exam.

Candidates must have at least five years of total paid full-time job experience in at least two of the eight test domains to be eligible to take it. (ISC)² CISSP Common Body of Knowledge (CBK).The eight domains of the CBK are Security and Risk Management, Asset Security, Security Engineering, Communications and Network Security, Identity and Access Management, Security Assessment and Testing, Security Operations, and Software Development Security.In addition to the work experience requirement, candidates must also adhere to the (ISC)² Code of Ethics, agree to the Candidate Agreement, and get a scaled score of at least 700 out of a possible 1000 points to pass the CISSP test. The exam consists of 250 multiple-choice and advanced innovative questions and is six hours long.

To learn more about security click on the link below:

brainly.com/question/13477181

#SPJ4

Click this link to view O*NET’s Tasks section for Computer Programmers. Note that common tasks are listed toward the top, and less common tasks are listed toward the bottom. According to O*NET, what common tasks are performed by Computer Programmers? Check all that apply.

Negotiating costs and payments with customers

Conducting trial runs of programs and software applications

Writing, updating, and maintaining programs or software packages

interviewing and hiring programming workers

Marketing and selling software packages

Correcting errors by making changes and rechecking a program

Answers

The options that applies are:

Conducting trial runs of programs and software applicationsWriting, updating, and maintaining programs or software packagesCorrecting errors by making changes and rechecking a program

What is ONET?

O*NET is known to be an OnLine app or web that gives a good descriptions of how the world work and it is often used by job seekers, workforce development and others.

Therefore, based on the above statement about ONET, The options that applies are:

Conducting trial runs of programs and software applicationsWriting, updating, and maintaining programs or software packagesCorrecting errors by making changes and rechecking a program

Learn more about ONET from

https://brainly.com/question/5605847

#SPJ1

Answer:

conducting trial runs of programs and software applications

writing, updating, and maintaining programs or software packages

correcting errors by making changes and rechecking a program

good luck.

which is true?a.oversize arrays require fewer parameters than perfect size arraysb.oversize arrays may have unused elementsc.perfect size arrays may have unused elementsd.oversize arrays can be returned from a method

Answers

Note that it is TRUE to state that "Perfect size arrays may have unused elements." (Option C).

How is this so?

Oversize arrays may have unused elements, but perfect size arrays are precisely sized to accommodate the exact number of elements needed.

Therefore, perfect size arrays may have unused elements if not all the allocated positions are filled. This can occur when the array is initialized but not all positions are populated with data.

Learn more about arrays at:

https://brainly.com/question/28061186

#SPJ4

FREE BRAINLIEST!!!
When recording a macro, the cursor will look like a _____ to indicate it is recording. A.microphone
B. Arrow
C. CD
D. cassette tape

Answers

Answer:

B

Explanation:

Answer:  

When recording a macro, the cursor will look like a cassette tape to indicate it is recording. This answer has been confirmed as correct and helpful.  

Explanation:

the correct answer is D

make sure the header row option button is selected to indicate ____.

Answers

The header row option button allows users to designate the first row of a spreadsheet as a header row.

This header row typically contains the titles or labels of each column in the spreadsheet. By selecting the header row option button, users indicate to the software that the first row of the spreadsheet should be treated as a header row, which can provide several benefits.
Firstly, by treating the first row as a header row, users can easily sort and filter their data based on specific columns. This is because the software recognizes the first row as containing the column names, and thus can use these names to sort and filter the data. Additionally, by using the header row option button, users can apply formatting, such as bold or italic font, to the header row to make it stand out and easier to read.
To ensure that the header row option button is selected, users should look for a checkbox or button with a label such as "Header Row" or "First Row Contains Headers." This option is typically found in the "Data" or "Table" menu of the software application. By selecting this option, users can ensure that their data is organized and presented in a clear and readable manner.

Learn more about spreadsheet :

https://brainly.com/question/1022352

#SPJ11

Bernard is creating an inventory of his comic book collection. He has documented the title, publisher name, production year, and
series number for each comic in his collection. He creates a spreadsheet of this information. Typically, each one of these
categories, such as production year, would be contained in:
A: a formula bar.
B: a cell.
C: a row.
D: a column.

Answers

Answer:

D: a column.

Explanation:

Since in the question it is mentioned that Bernard wants to develop an inventory. Now he created a spreadsheet of the given information

The categories like production year, publisher name, etc would be contained in a column as it represent the heading under these the year, name of the publisher are written

Therefore the option d is correct

Answer:

D: a column

Explanation:

Typically, each one of these

categories, such as production year, would be contained in a column.

describe a new custom encoding that uses fewer bits to represent each color in the image. what is your encoding for each color?

Answers

Using a colour quantization algorithm to limit the number of colours in the image to a smaller set and then representing each colour with fewer bits is one potential custom encoding method.

How many bits do colour images typically utilise to represent them?

The normal bit depth for a colour image is from 8 to 24 or higher. Three groups of eight bits are frequently used in a 24-bit image: eight bits for red, eight bits for green, and eight bits for blue. Other hues are represented by combining those bits.

Why must each pixel be represented by at least two bits?

The range of colours depends on the amount of bits.

To know more about algorithm visit:-

https://brainly.com/question/22984934

#SPJ1

Information that is sent across a network is divided into chunks called __________.

Answers

Answer:

Packets

Explanation:

I need help with this :(( In java
Write a program that has a user guess a secret number between 1 and 10.

Store the secret number in a variable called secretNumber and allow the user to continually input numbers until they correctly guess what secretNumber is.

For example, if secretNumber was 6, an example run of the program may look like this:

I'm thinking of a number between 1 and 10.
See if you can guess the number!
Enter your guess: 4
Try again!
Enter your guess: 3
Try again!
Enter your guess: 1
Try again!
Enter your guess: 10
Try again!
Enter your guess: 6
Correct!
Note:
Make sure that the the secretNumber is 6 when you submit your assignment! It will only pass the autograder if the value is 6.

Answers

Java is an object-oriented coding software used to develop software for a variety of platforms.

What does programmer do in Java?

When a programmer creates a Java application, the compiled code is compatible with the majority of operating systems (OS), including Windows, Linux, and Mac OS.

For writing a program that has a user guess a secret number between 1 and 10 it can be done as follows:

import random

secretNum = random.randint(1,10)

userNum = int(input("Take a guess: "))

while(userNum != secretNum):

   print("Incorrect Guess")

   userNum = int(input("Take a guess: "))

print("You guessed right")

Thus, by using this program, one can execute the given condition.

For more details regarding Java, visit:

https://brainly.com/question/12978370

#SPJ1

You install a new graphics application on your Windows machine. During installation, the computer reboots, but hangs during startup. Pressing F8 has no effect. To fix your computer so it will start, what should you try first

Answers

Answer:

Boot from the installation disc and restore to a restore point.

William would ike to sort a list of items after the data is already entered Which method is NOT an available sort option? text O number O date Osymbol​

Answers

Answer:

symbol

Explanation:

edge2020

Answer:

symbol

Explanation:

took the test

Which statement best describes the Quick Steps feature in Outlook?
It is only configured for tasks that are not frequently used
It allows a user to add multiple steps to common tasks,
It allows multiple users to add commands to a single mailbox
It simplifies common tasks into one-step commands

Answers

Answer:

D- It simplifies common tasks into one-step commands.

Explination:

Edg 2021

Answer:

they are correct, its D

Explanation:

What do donnas actions and thoughts reveal about her character

Answers

That she is scared for herself at first but once Cujo jumps up on the window it is a selfless and different fear. She then is worried about Tads safety.

Hope this helps.

What is the keyboard shortcut for the Undo command?
Choose the answer.
CTRL+X
CTRL+Z
CTRL+U
CTRL+V​

Answers

Answer:

CTRL+Z is Undo

Explanation:

CTRL+X: Cut

CTRL+Z: Undo

CTRL+U: Underline

CTRL+V: Paste

1) Coding for Table in Html

1) Coding for Table in Html

Answers

See below for the code in HTML

How to code the table in HTML?

The given table has the following features:

TablesCell mergingList (ordered and unordered)

The HTML code that implements the table is as follows:

<table border="1" cellpadding="1" cellspacing="1" style="width:500px">

<tbody>

 <tr>

  <td colspan="1" rowspan="2"><strong>IMAGE</strong></td>

  <td colspan="1" rowspan="2"><strong>name</strong></td>

  <td colspan="2" rowspan="1"><strong>first name</strong></td>

 </tr>

 <tr>

  <td colspan="2" rowspan="1"><strong>last name</strong></td>

 </tr>

 <tr>

  <td>DOB</td>

  <td>yyyy</td>

  <td>mm</td>

  <td>dd</td>

 </tr>

 <tr>

  <td>Qualifications</td>

  <td colspan="3" rowspan="1">references</td>

 </tr>

 <tr>

  <td>

  <ol>

   <li>&nbsp;</li>

   <li>&nbsp;</li>

   <li>&nbsp;</li>

   <li>&nbsp;</li>

  </ol>

  </td>

  <td colspan="3" rowspan="1">

  <ol type = "a">

   <li>&nbsp;</li>

   <li>&nbsp;</li>

   <li>&nbsp;</li>

   <li>&nbsp;</li>

  </ol>

  </td>

 </tr>

</tbody>

</table>

<p>&nbsp;</p>

Read more about HTML at:

https://brainly.com/question/14311038

#SPJ1

Brainly won't let me see any answers. I've been trying to check my answers for 45 minutes now. I am unable to see ANY answers at all. Please help. I really need to finish all my work by tonight. *URGENT*

Answers

Answer:

I'm having the same problem. I think it has something to do with the Honor Code

Explanation:

2) Why would this technology be valuable to the company? What type of common information system
would this be? (3 points)

Answers

Technology can be valuable to a company for a variety of reasons, such as:

Increased Efficiency: Technology can help automate tasks, which can lead to faster and more efficient business processes.

Improved Communication: With the right technology, companies can communicate more effectively with employees, partners, and customers.

Enhanced Customer Experience: Technology can help companies offer better products and services, and improve the overall customer experience.

Better Data Management: Technology can help companies store, manage, and analyze large amounts of data, which can provide valuable insights for decision-making.

Cost Savings: By using technology to automate tasks and streamline processes, companies can often save money on labor costs and reduce the need for physical resources.

How to explain the information

Common information systems that companies may use include:

Enterprise Resource Planning (ERP) Systems: These systems integrate a company's various business processes and departments, such as finance, human resources, and supply chain management, into a single software system.

Customer Relationship Management (CRM) Systems: These systems help companies manage interactions with customers and potential customers, including sales and marketing activities.

Supply Chain Management (SCM) Systems: These systems help companies manage the flow of goods and services from suppliers to customers, including inventory management and logistics.

Business Intelligence (BI) Systems: These systems help companies analyze data to make informed business decisions, such as forecasting sales or identifying new market opportunities.

Learn more about Technology on:

https://brainly.com/question/7788080

#SPJ1

juan, a network analyst, is using the tcp xmas scan while performing a technical assessment to determine network vulnerabilities. what would be the response of all open ports?

Answers

While doing a technical assessment to determine network vulnerabilities, you used the TCP XMAS scan, All open ports will ignore the packets.

Here's the full question:

While doing a technical assessment to determine network vulnerabilities, you used the TCP XMAS scan. What would be the response of all open ports?

a. The port will send an ACK

b. The port will send a SYN

c. The port will ignore the packets

d. The port will send an RST

What is port scanning?

Port scanning refers to a method used to detect which ports in a given network are open and available for use. It also involves sending packets to certain ports on a host to inspect responses to detect potential, underlying vulnerabilities.  

During port scanning, A port scanner will send a TCP (Transmission Control Protocol) or UDP (User Datagram Protocol) network packet and inquire the port about their status. The responses will either be: open, closed or blocked.

In using xmas scan, a loophole with the TCP RFC is used to differentiate between open and closed ports. This means that the Xmas scan in order to identify listening ports on a targeted system will send a specific packet; If the port is open on the target system then the packets will be ignored.

Learn more on port scanning from:

https://brainly.com/question/10536867?referrer=searchResults

#SPJ4

What is a protocol in digital technology plwwes help

Answers

Protocol, in computer science, a set of rules or procedures for transmitting data between electronic devices, such as computers. In order for computers to exchange information, there must be a preexisting agreement as to how the information will be structured and how each side will send and receive it.

data in ai uses what >

Answers

Answer:

Explanation:

artificial intelligence describes the ability of computers to act like humans

What is the difference between weak AI and strong AI?

Answers

Explanation:Strong AI has a complex algorithm that helps it act in different situations, while all the actions in weak AIs are pre-programmed by a human. Strong AI-powered machines have a mind of their own. They can process and make independent decisions, while weak AI-based machines can only simulate human behavior.

If you needed a job and wanted to find places that were hiring, how could you do that without fast internet access?

Answers

Answer: you cant do it inless you have wifi every where you go i think becuase i try it before thanks

so can u please follow my new ig acc i just started it yesterday its called stunnerspamz

Answers

Answer:

why are you advertising in brainly?????

Ohhhhhhhh okay uh sure

In the decision-making process, after you have chosen the right solution, what is the next step?

Answers

Answer:

Implementing the right solution.

Explanation:

There is little point in taking decisions if it stays in the paper. If the best of the possible alternatives have been identified, it must be properly implemented to accomplish the aim it was chosen for. When a decision has been made, it should be implemented, i.e. enacted, into practice. Because of poor execution, a successful decision may become ineffective. A participatory approach can be an efficient way of enforcing such decisions successfully.

Other Questions
Damaged tissue releases chemicals that activate platelets. Is inelastic good price sensitive? a community health nurse assesses a community and finds that several nuclear families living in the same household or near one another share goods and services. the nurse identifies this as which family structure? HELP ME PLEASE IS FOR TODAY !!!! given the vectors OP= (3, 4) PQ (-1,2) and RS(1,3) determine the vector OQ How many solutions are there for the quadratic equation?Y=x^2+12x+36Show work How much more would 72,300 be from 63,100? if a contractionary monetary policy raises interest rates in the us, what will happen to the value of the us dollar, the value of the japanese yen, and the us balance of trade? (dollar) (value of yen) (balance of trade) appreciate depreciate toward surplus appreciate appreciate toward deficit appreciate appreciate toward surplus appreciate depreciate toward deficit no change appreciate toward deficit Pablo drew a square that had a side of length of 6 inches. What is the perimeter of pablos square A technician configures a new printer to be accessible via a print server. After setting up the printer on a Windows client machine, the printer prints normally. However, after setting up the printer on a macOS client machine, the printer only prints garbled text. Which of the following should the technician do to resolve this issue What is 8/2(2+2). I hear so many answers that its 16 or 1. Which one is right? Which of the following is NOT a monetary policy goal of the Federal Reserve bank (the Fed)?A.Low pricesB.Higher living standardsC.Stable financial marketsD.Low unemployment the two basic types of current transformers are the doughnut and the? the usual presentation of the statement of stockholders equity is (1) beginning balance, (2) net income or loss, (3) dividends, (4) stockholders' investments, (5) ending balance. true or false 1.How do you think this proclamation was received by the Confederate states? The Unionstates? saii mechanoreceptors: group of answer choices have merkel cell endings. are near the surface of the skin. have relatively small receptive fields. perceive skin stretch and hand conformation. true or false? what were the changes made in the US government during the civil war period Sonequn is a concert promoter who works for singer Beyonc. She works very hard to make sure most of Beyonc's concerts are sold out because she understands the concept of perishability, which means a. the production of the concert and the consumption of the concert by the fans cannot be separated so tickets must be sold. b. a high level of interaction will exist between the customers and the musicians, which makes the customers' presence necessary, c. because the concert is not tangible, customers will have a difficult time judging its quality in advance. d. that if the tickets are not sold, seats will remain empty and they can never be sold to anyone again for that specific concert Indicate if the information makes sense or not. hay tres reyes magos. question 2 options: s no Two humid air streams are mixed adiabatically in a steady process. Inlet 1 brings 20 m/min of air from outside with a specific humidity of 0.014 kg water vapour/kg dry air and a temperature of 42C. Inlet 2 brings 35 m3/min of saturated air from the cooling section of an air conditioning system at a temperature of 7C If the mixing occurs at a pressure of 101.325 kPa, then: 1. determine the dry-bulb temperature, the specific humidity, and the relative humidity of the mixture.