Answer:
The period from 1959-1965 was the second generation. Transistors that are cheaper, consumed less power, were used in this generation, were more compact, were more reliable, and were faster than first-generation vacuum tubing machines.
Explanation:
The primary memories and the magnet tapes and magnetic discs were used as secondary storage equipment in this generation.
The montage language and high programming languages such as FORTRAN, COBOL, have been used in this generation. The computers used batch processing and operating system multi-programming.
A memory is like the brain of human beings. It is used for storing information and instructions. Computer memory is the storage space on the computer that processes data and saves instructions for processing.
The memory is split into many small parts known as cells. There is a unique address for each location or cell, which varies from 0 to memory minus one.
There are three basic types of memory:
Memory Cache
Main Memory/Primary Memory
The Memory of a Second Kind
Which three pieces of information must you include in a project goals document? (Choose 3)
A) Target audience
B) Project deadline
C) Project purpose
D) Color palette
E) Hero image
Answer:
A) Target audience
B) Project deadline
C) Project purpose
Explanation:
The project goals document outlines the scope of the project, detailing what the project entails to everyone that is to work on the project such that the objectives to focused on, the tasks to be completed, the timeline and deadline of the project, the project participants, and audiences are known or understood, thereby placing everyone in the project team on track
The three pieces of information that must be included in a project are therefore; the target audience of the document, the deadline of the project, clearly stated, and the purpose of the project; what the project is going to accomplish
The three pieces of information you must include in a project goals document are:
A) Target audience B) Project deadline C) Project purposeAccording to the given question, we are asked to show the three pieces of information you must include in a project goals document and why they are important when making a project goal.
As a result of this, we can see when making a project goals document, it is important to include the target audience, project deadline and the project purpose because it gives the project a clear objective and deadline which can be achieved.
Read more here:
https://brainly.com/question/17293938
PLEASE ANSWER ASAP
Type the correct answer in the box. Spell all words correctly.
What was the name of the database that Tim Berners-Lee built?
Tim Berners-Lee built a database called [BLANK].
Answer:
ENQUIRE database.
Explanation:
I am not sure but I guess this is the answer.
What defines interactive media? The user must play a role in writing the content of the media. The user must do something that determines what happens next. The user must help design the overall look and feel of the presentation. The user must provide feedback after using the media.
Answer:
What Is Interactive Media?
Interactive media is a method of communication in which the program's outputs depend on the user's inputs, and the user's inputs, in turn, affect the program's outputs. Simply put, it refers to the different ways in which people process and share information, or how they communicate with one another. Interactive media allows people to connect with others—whether that's people or organizations—making them active participants in the media they consume
Answer:
The user must do something that determines what happens next.
It is B.
Rachel is a junior system administrator for a network with a single Active Directory domain. The network has just expanded to include an additional subnet. Rachel has installed a new server running Windows Server 2016 on the new subnet and configure it as a DHCP server. When she checks the server icon in the DHCP Management console, she notices the server has a down icon. The DHCP server service has started, but the server does not respond to DHCP lease requests. What should Rachel do to solve the problem
Answer: Ask a member of the Enterprise Admins group to authorize the server.
Explanation:
From the information given, we are informed that Rachel installed a new server running Windows Server 2016 on the new subnet and configure it as a DHCP server but then realizes that the DHCP server service has started, but that the server does not respond to DHCP lease requests.
In this case, the reason for this can be attributed to the fact that the server hasn't been authorized, therefore, she can ask a member of the Enterprise Admins group to authorize the server.
how is internet connection made possible.
Answer:
To connect to the Internet and other computers on a network, a computer must have a NIC (network interface card) installed. A network cable plugged into the NIC on one end and plugged into a cable modem, DSL modem, router, or switch can allow a computer to access the Internet and connect to other computers.
You are the IT Director for Stormwind training studios. Your company has decided to start using Microsoft Intune for all of their software deployments. You want to set up a notification system so that you see all alerts and your IT Manager only gets notified for Critical alerts. How do you accomplish this
Answer:
Well, if the IT Manager gets only critical alerts on a phone, then the IT Manager has to go to settings and make sure to have all alerts on.
Explanation:
The IT Manager, probably has his notifications, critical alerts, on only. So the IT Manager should have his notifications to ALL. Where he will be able to see all of the alerts.
Which information is required when designing a field? check all that apply.
Answer:
Explanation:
dimensions or calculation
8. Compare the advantages and disadvantages of using a smartphone rather than a laptop computer for creating a report.
Answer: the advantage of using a smartphone rather than a laptop computer is that you can talk to people across the world, call people, make texts, and get easy access to the internet. but the disadvantages are that a lot of people stay inside their house because of phones, not getting enough exercise.
Explanation:
The advantages and disadvantages of using a smartphone rather than a laptop computer for creating a report. have been compared below.
The advantages of using a smartphone rather than a laptop computer are;
Portability; Smartphones are portable enough that they can fit into pockets and some purses and as such can be taken with you anywhere easily unlike a laptop computer that doesn't have such physical property.Cost; Smartphones are largely cheaper than the average laptop computer. Thus, cost is a good factor.Disadvantages of using a smartphone rather than a laptop computer are;
Screen size; Smartphone screen size are always smaller than that of laptop computers .Software's; Smartphones can't run many of the type of powerful software's that can run on laptop computers.Data entry and user input; Due to the portability of smartphones, their keyboards are usually smaller than that of laptop desktops which makes data entry more difficult for those that have big fingers.Read more about smartphones and laptops at; https://brainly.com/question/21283135
What are the advantages of Radio waves over micro waves?
Answer:
radio frequencies can penetrate deeply into the material and thus heat thick products. They heat more slowly than microwaves and thus make it possible to treat more delicate products which require a slower heating.
Select each procedure that will keep the computer safe and working properly. the correct answers are A, D, E
i just took it!
Gently type on the keyboard.
Download software from the Internet without permission.
Turn the power off on the computer before shutting down.
Wash your hands thoroughly before using the computer.
Set your water bottle on a table that is away from hardware.
Select each procedure that will keep the computer safe and working properly.
Gently type on the keyboard.
Download software from the Internet without permission.
Turn the power off on the computer before shutting down.
Wash your hands thoroughly before using the computer.
Set your water bottle on a table that is away from hardware.
Answer
Wash your hands thoroughly before using the computer.
Gently type on the keyboard.
Set your water bottle on a table that is away from hardware.
Explanation:
An attacker gained remote access to a user's computer by exploiting a vulnerability in a piece of software on the device. The attacker sent data that was able to manipulate the return address that is reserved to store expected data. Which vulnerability exploit resulted from the attacker's actions
"A Buffer overflow" vulnerability exploit resulted from the attacker's actions.
Whenever a software or an application writes too much data into a buffer, causing neighboring storage regions to have been corrupted as a consequence, this could be determined as Buffer overflow.
⇒ There are two kinds of Buffer overflow attacks such as:
Stack-based - It will become more popular to use such memory, as well as that's only available during implementation of any code.Heap-based - Those attacks seem to be more difficult to execute because they entail overflowing overall storage capacity allotted for a program further than the space needed for something like the program's present activities.Thus we can say that the correct answer is a Buffer overflow.
Learn more about Buffer overflow here:
https://brainly.com/question/4952591
(e) Give the output of the following:
String n="Computer Knowledge";
String m = "Computer Applications";
System.out.println(n.substring(0,8).concat(m.substring(9)));
Answer:
Computer Applications
true
Answer:
Computer Applications
Explanation:
true
Hey, um guys help me as my laptop will not turn off properly as whenever i turn it off, it will turn back on by me pressing a key please help!!! URGENT!!!
Answer:
hold the power key until you restart.
Explanation:
Guys can anyone tell me answer from this photo Get Branilliest
Answer:
1. A computer itself
2.I don't no
How should you behave in an online academic environment?
Answer:
as u want lol
I think it's funny
Answer:
Maintain discipline
Ask questions
Try not to crack jokes
dress smartly
be friendly
don't underestimate anyone each person have their own unique skills
Which category was originally developed to protect both digital and hard-copy sensitive information?
Answer:
Information assurance
Explanation:
Information assurance was originally developed to protect both digital and hard-copy sensitive information.
Selena owns a bakery. She wants to compare the number of pies, cookies, cakes, and brownies that she sells in one month. Which charts are appropriate for this task? Check all that apply.
Answer:
Column, Bar, And Pie
Explanation:
got it right
What happens when you drag a file from the Documents folder on the hard drive to the Pictures folder on the hard drive?
Answer:
The file changes its location within your hard drive while the file itself remains unchanged
Explanation:
The file's location will change from C:\Users\username\Documents to
C:\Users\username\Pictures
It is the way to convey a message,an idea,a picture,or speech that is received and understood clearly and correctly by the person for whom it is sent.
Answer:
Communication.
Explanation:
Communication can be defined as a process which typically involves the transfer of information from one person (sender) to another (recipient), through the use of semiotics, symbols and signs that are mutually understood by both parties.
In this context, communication is the way to convey a message, an idea, a picture, or speech that is received and understood clearly and correctly by the person for whom it is sent.
Generally, the linear model of communication comprises of four (4) main components and these are;
1. Sender (S): this is typically the source of information (message) or the originator of a message that is being sent to a receiver. Thus, they are simply the producer of a message.
2. Channel (C): this is the medium used by the sender for the dissemination or transmission of the message to the recipient. For example, telephone, television, radio, newspapers, billboards etc.
3. Message (M): this is the information or data that is being sent to a recipient by a sender. It could be in the form of a video, audio, text message etc.
4. Receiver (R): this is typically the destination of information (message) or the recipient of a message that is being sent from a sender.
Write the contribution of Charles Babbage in the history of computer.
Answer:
The main contributions of Charles Babbage are;
1 ) He invented difference engine and analytical engine.
2) He gave basic concept of of mathematics in his analytical engine.
3) He also keep the concept of using binary digits in his machine.
4) He had led to the the foundation of modern computer in his analytical engine including the concept of of input, processing and output
Hope it helps.... :)Tables should be used when (a) the reader need not refer to specific numerical values. (b) the reader need not make precise comparisons between different values and not just relative comparisons. (c) the values being displayed have different units or very different magnitudes. (d) the reader need not differentiate the columns and rows.
Answer: (c) the values being displayed have different units or very different magnitudes
Explanation:
A table is refered to as an arrangement of data in rows and columns. Tables are used in research, communication, and data analysis.
Tables are used in the organization of data which are too complicated or detailed to describe and the use of table give a clearer description. Tables should be used when the values being displayed have different units or very different magnitudes. Tables can also be used in highlighting patterns or trends.
write an algorithm and draw a flowchart for switching off a machine after it has made 500 glass bottles. use an appropriate conditional statement for this
Answer:
The algorithm is as follows:
1. Start
2. bottles = 0
3. While bottles != 500
3.1 Create bottle
3.2 bottle = bottle + 1
4. Switch off machine
5. Stop
See attachment for flowchart
Explanation:
This begins the algorithm
1. Start
This initializes bottles to 0
2. bottles = 0
The loop is repeated until 500 bottles is created
3. While bottles != 500
This creates a new bottle
3.1 Create bottle
This increments the number of bottles by 1
3.2 bottle = bottle + 1
This switches of the machine after all bottles are created
4. Switch off machine
End algorithm
5. Stop
Define Data communication
Explanation:
Data transmission and data reception is the transfer and reception of data over a point-to-point or point-to-multipoint communication channel. Examples of such channels are copper wires, optical fibers, wireless communication channels, storage media and computer buses.
which are the four different methods of formatting text in libreoffice writer
Answer:
The Text Formatting Bar that is displayed when the cursor is in a text object, such as a text frame or a drawing object, contains formatting and alignment commands.
if my answer helps you than mark me as brainliest.
2. Give technical terms for
a) A feature which computer never gets tired.
b) A memory to be used on fifth generation of computer.
c) Computer that used continues data
. d) An illegal activity that harms people by using computer.
e) A machine developed by Charles Babbage in 1833AD.
Answer:
Cccccccccccccccccccccccccccccccccc
can you fart and burp at the same time?
Answer:
Yes you can
Explanation:
Although farting and burping at the same time is a very rare phenomenon, it’s very possible. When this happens at the same time it is usually called a Furp.
This occurrence usually happens when there’s a lot of intake of foods which have a large percentage of gas . These gases often need to be expelled through processes such as burping and farting.
Why are programming languages like Java and Python ideal for rapid development?
Because Java, as well as Python, are high-level programs that don't need generating or parsing, they are perfect for quick development. This implies that engineers can code a program without testing it first and then publishing it.
What are programming languages?A method of nomenclature for creating software applications is known as a computer program. The majority of formal programming are text-based, though they can also be graphical.
A substantial rise in the use of Python for machine learning and data analysis supports its status as the programming with the biggest growth. Python is a programming language with dynamic typing, while Java is a structured query and compiler language. Java is faster at play and simpler to debug thanks to this one difference, while Python is simpler to utilize and read.
Learn more about programming languages, Here:
https://brainly.com/question/12696037
#SPJ5
What are the 4 similarities of CUI and GUI
Answer:
letter U and I.
Three Letters
1 consonant and 2 vowel
All are capital letters
You install Windows 10 on a new computer. You update the video card driver and restart the computer. When you start the computer, the screen flickers and then goes blank. You restart the computer and receive the same result. You need to configure the video card driver. What should you do first
3. Remove the screws holding the GPU in on the rear bracket. ...
4. Unlock the PCI-e slot clip.
5. Remove the GPU by lightly pulling on the card.
6. Hover the GPU over PCI-e slot.
7. Push down on the GPU to slide the connector into the slot.
8. Ensure the secure lock clicks into place.
9. Screw the rear bracket down to secure the card to the chassis.
10. Connect any required PSU cables.
11. Reattach the side panel,
Now, all you need to do is to plug in the display connectors on the rear of the case, whether they're DisplayPort, HDMI, DVI, or VGA. After that, hit the PSU power switch and boot up Windows. If the PC does not turn on or no signals get sent to the monitor, we'll need to double-check that all cables are connected correctly (both inside and on the rear of the PC), and the GPU is seated properly in the PCIe slot.You are concerned about attacks directed at your network firewall. You want to be able to identify and be notified of any attacks. In addition, you want the system to take immediate action to stop or prevent the attack, if possible. Which tool should you use
Answer:
Intrusion Prevention System (IPS)
Explanation:
Firewall can be defined as a network security device that monitors incoming and outgoing network traffic and decides whether to allow or block specific traffic based on a defined set of security rules.
Simply stated, a firewall is a network security protocol that monitors and controls inbound and outbound traffic based on set aside security rules.
A firewall is used to control access to a computer or network, as it creates a barrier between a computer or a network and the internet in order to protect against unauthorized access.
Basically, it is a network security device or security system pre-installed on most computers to essentially inspect data being transmitted to or from a computer
Thus, the tool you should use is an intrusion prevention system (IPS).