"The actual use and implementation of computer started after third generations". Justify this statement in your own words.​

Answers

Answer 1
After three generations from when technology started people realized the use of technology was helpful and started to implement it in their daily lives
Answer 2

Answer: The computers of third generation used IC which replaced transistors. Now' the computers were more faster ,smaller and reliable so people started to use them often for many purposes ..So the actual use and implementation of computer started after third generations


Related Questions

advantages and disadvantages of algorithm​

Answers

Answer:

\/\/\/\/\/\/\/\/\/\/\/\/\/\/\/\/\/\/\/\/\/\/\/\/\/\/\/\/\/\/\/\/\/\/\/\/\/\/\/\/\/\/\/\/\/\/\/\/\/\/\/\/\/\/\/\

Explanation:

It is easy to understand. Algorithm is a step-wise representation of a solution to a given problem. In Algorithm the problem is broken down into smaller pieces or steps hence, it is easier for the programmer to convert it into an actual program

Algorithms are time-consuming. Big tasks are difficult to put in algorithms. Difficult to show branching and looping in algorithms. Understanding complex logic through algorithms can be very difficult.

The entities on which data are collected are _____.

Answers

The entities on which data are collected is known as variables.

Answer:

The entities on which data are collected is known as variables.

Explanation:

ANSWERS FOR PLATO!!!

What does the second element in a pair of HTML tags contain?

ANSWER: /

when would you use the code snippet <input...(randome code stuff)...> American?

ANSWER: while inserting a RADIO BUTTON

assume you are creating a website for school... yada yada,

ANSWER: <img>

Why is it preferable to code web pages in HTML format?

ANSWER: to display properly as search results in all browsers

drag tiles, somthinf about creating a web page and wich dose the html tags define


new paragraph ---> <p>

define a term ---> <dd>

define single line break ---> <br>

define heading ---> <h3>


HOPE THIS HELPS GUYS YOU GOT THIS KEEP ON KEEPING ON <3<3<3<3 #platogang #edementumegang​

Answers

The thing which the second element in a pair of HTML tags contain is "/" and is known as the Closing Tag.

What is an HTML Tag?

This refers to the keywords that are used in the building block of a website to indicate how a web browser would interpret and display the content.

Hence, we can see that in HTML tags, there are always the Opening and Closing Tags that are used to enclose lines of code and when paired together are known as container tags.

Read more about HTML elements here:

https://brainly.com/question/9069928

#SPJ1

What do you prevent when you use data validation in your database forms?
O code injection
O phishing
O botnet
O denial-of-service

Answers

Answer:

code injection

Explanation:

Validating the data in a database prevents someone from sneaking code to run without permission, aka code injection.

Phishing - this is disguising as a reputable company/person and trying to steal info (passwords, credit card numbers)

Botnet - this is a network of computers (most likely in the network because of a virus) that are used as a group for malicious purposes (like spam)

Denial-of-service - this is an attack which aims to deny users from accessing the content they want. a common example of this is flooding a server with spam requests, rendering it overloaded and unable to handle any user requests


in which part of the scratch interface does a programmer combine code blocks to build the program?

a. sprite info pane
b. block palette
c. stage
d. scripts area

Answers

Answer:

D

Explanation:

The sprite info pane is for an overview over your sprites and their visibility, coordinates, etc.

The block palette is where you select blocks from.

The stage is where your figures move and do stuff.

The scripts area is where you combine blocks from the palette together.

The Cisco ____ model does not describe how communications take place. Rather, it focuses on how best to design a network, especially a relatively large network or one that is expected to grow.

Answers

The Cisco three-layer hierarchical model doesn't describe how communications take place.

What is Cisco three-layer hierarchical model?

The Cisco three-layer hierarchical model is also referred to as a hierarchical internetworking model and it can be defined as a three-layer model that's used for the design of an enterprise (large) network based on the following layers:

Core layerDistribution layerAccess layer

In conclusion, the Cisco three-layer hierarchical model doesn't describe how communications take place, but it focuses on how best to design a an enterprise (large) network.

Read more on Cisco three-layer hierarchical model here: https://brainly.com/question/3787380

#SPJ1

Name two driving factors in the development of computers.

Answers

The two driving factors in the development of computers are the  Skill set of the team. [If the team is well versed in a specific stack, then the performance will be good as compared to any other stack].

What re the matters?

There are some matters to consider. For business programs, I'd say gaming. A lot of what the common laptop makes use of for enterprise doesn't require that kind of electricity.

The skill set of the team. [If the team is well versed in a specific stack, then the performance will be good as compared to any other stack]Process familiarity. [If dev team knows the stack but the deployment/service team is new, then you may run into deployment and maintenance issues.]

Read more about the computers:

https://brainly.com/question/24540334

#SPJ1

To notify the browser that we have JavaScript code, we should use .............

Answers

Answer:

almost all browsers allow you to type JavaScript code directly into the browser, using something called the “console


what is a program answer these question
of grade-6​

Answers


a series of coded software instructions to control the operation of a computer or other machine.

The Western Siberian Plain is __________ in some places because it has poor natural draining systems.

Answers

The Western Siberian Plain is marshy in some places because it has poor natural draining systems.

What is a Drainage system?

A Drainage system may be defined as the complete process to exhaust the water in the soil to improve crop production in an area. It eliminates the water through the surface of the earth.

The complete question is as follows:

The Western Siberian Plain is __________ in some places because it has poor natural draining systems.

subtropicalhumidmarshyarid

Therefore, the correct option for this question is C, i.e. marshy.

To learn more about the Drainage system, refer to the link:

https://brainly.com/question/908462

#SPJ1

what are the methods of gilding

nonsense will be immediately reported. ​

Answers

Methods of gilding include hand application and gluing, typically of gold leaf, chemical gilding, and electroplating, the last also called gold plating. Parcel-gilt (partial gil) objects are only gilded over part of their surfaces.

what is a computer?write any four features of computer​

Answers

Answer:

A computer is defined as an electronic device for storing and processing data, typically in binary form, according to instructions given to it in a variable program.

Four features of a computer would be CPU, GPU, Memory, and Motherboard.

Explanation:

Computer is an electronic machine which accepts raw data from the user , process the data according to the predefined set of instructions, gives and stores the result or instructions....

Or

A computer is an electronic device that can perform several task according to the given instructions...

The four features of computer are :

Speed

Accuracy

Versatility

Diligence

Storage etc....

[tex]...[/tex]

Please help quick!! 20 points

a table is a ___ of rows and columns that provides a structure for presenting data.

Answers

Answer:

vertical and horizontal

How to turn off parental controls without a password on android?.

Answers

Answer:

Ask your parents.

Question an administrator of a linux network is writing a script to transfer a list of local host names, contained in a file called hostnames, directly into the syslog file. predict the cli command the admin is likely to use to accomplish this. a.

Answers

The Linux command to be used by this administrator in transferring a list of local host names, directly into the syslog file is "logger -f hostnames."

What is a Linux command?

A Linux command simply refers to a software program that is designed and developed to run on the command line, in order to enable an administrator of a Linux network perform both basic and advanced tasks by entering a line of text.

In this scenario, the Linux command to be used by this administrator in transferring a list of local host names, directly into the syslog file is "logger -f hostnames."

Read more on Linux commands here: https://brainly.com/question/25480553

#SPJ1

Write a recursive, string-valued method, reverse, that accepts a string and returns a new string consisting of the original string in reverse. For example, calling reverse with the string goodbye returns the string eybdoog.Reversing a string involves:

Answers

The program is an illustration of recursive functions in Python;

Recursive functions are functions executed from within itself

The python program

The program written in python, where comments are used to explain each action is as follows:

#This defines the function

def revStr(myStr):

   #This returns an empty string if the string is empty

   if myStr == "":

       return myStr

   #If otherwise, this returns the reversed string recursively

   else:

       return revStr(myStr[1:]) + myStr[0]

Read more about python recursions at:

https://brainly.com/question/19089783

#SPJ1

A good algorithm should have which three components?
OA. Commands, inputs, and outputs
OB. Clarity, readability, and sequencing
OC. Steps, order, and outcomes
OD. Clarity, simplicity, and brevity

Answers

A good algorithm should have these three components: C. steps, order, and outcomes.

What is an algorithm?

An algorithm simply refers to a standard formula which is made up of a set of finite steps and instructions that are executed on a computer system, in order to enable a software solve a particular problem under appropriate conditions.

In Computer technology, there are three (3) components that a good algorithm should have these include the following:

StepsOrderOutcomes

Read more on algorithm here: brainly.com/question/24793921

#SPJ1

Consider the following method: public int mystery(int n) { if(n > 6) { return 1 mystery(n - 1); } return n % 3; } What is the value of mystery(10)

Answers

Answer:

Ans1--- The output is 9 Explanation--- mystery(5)=mystery(4)+2 mystery(4)=mystery(3)+2 mystery(3)=mystery(2)+2 mystery(2)=2+1=3

The function ____ can check whether an expression meets the required conditions; if the conditions are not met, it terminates the program.

Answers

Answer:

assert()

Explanation:

The assert function takes a boolean as an input, and when true, it just continues the flow, however if false it prints an error and calls exit.

You are developing control software for a car whose latest model will have a network connection. software upgrades will be delivered over the air rather than at service visits, so that any security vulnerabilities can be patched quickly. this in turn means that you will have to provide patches, to deal with both security and safety issues for the next 25 years. discuss how this is likely to affect your development process, and the implications it will have for costs.

Answers

Answer:
Explanation:

koszty będoł spadać dla osoby z autem

write the c programming that takes the input of 25 employees salaries and count the number of employees who are getting salary between 30000 and 400000

Answers

Using the computational language in C++ it is possible to write a code that uses the salary values ​​of the employees of a company dividing between the number of employees.

Writing the code in C++ is possible:

#include<stdio.h>

#inc1ude<conio.h>

void main()

{

int i, n, count = 0;

Long int salary[25];

clrscr();

printf(“\n Input salary of 25 persons:- ");

for(i=0;i<25;i++)

scanf("%ld", &salary[i]);

for(i=0;i<25;i++)

{

if(Salary[i]>30000 && salary[i]<40000)

count++;

}

printf("There are %d persons whose salary is in between 30000 and 40000",count);

getch();

}

See more about C++ code brainly.com/question/17544466

#SPJ1

Why is it important for companies to invest in building a complete data and analytics platform?.

Answers

Companies need to invest in data and analytics platform as it  generates insights by housing data in one place and converting it into easily consumable information at high speed.

Why is it vital to use the analytics of a platform?

Analytics platforms is known to have helped a lot of data scientists as it has help to boast access to a lot of data sources and hardware.

Note that Companies need to invest in data and analytics platform as it  generates insights by housing data in one place and converting it into easily consumable information at high speed.

See options below

It produces cultural support and alignment, a growth mindset, and new ideas and priorities to improve business processes.

It creates awareness of what data can do to improve business processes.

It generates insights by housing data in one place and converting it into easily consumable information at high speed.

It stores large amounts of data that are easily retrievable for future business growth.

Learn more about analytics platform from

https://brainly.com/question/26468036

#SPJ1

The Internet Protocol adds its own network layer header to the segment or datagram, and this network layer message is now called a

Answers

The Internet Protocol adds its own network layer header to the segment or datagram, and this network layer message is now called a TCP/IP protocol suite.

What is TCP/IP protocol suite?

The TCP/IP protocol suite is known as the Internet Protocol Suite (IPS), this is because it is said to receives from the layer above in form of data, and places its own header in front  of it.

Therefore, The Internet Protocol adds its own network layer header to the segment or datagram, and this network layer message is now called a TCP/IP protocol suite.

Learn more about Internet Protocol from

https://brainly.com/question/17820678

#SPJ4

As the user moves out of the range of one access point, their wireless device must re-associate with a new access point as it comes within range. What is this process known as

Answers

This process is known as “Roaming”.

Give three reasons why it is important to have hci-based software programs.

need this soon

Answers

The three reasons why it is important to have HCI-based software programs As a result, having a person with HCI capabilities concerned in all levels of any product or machine improvement is vital.

What is HCI and why is it important?

The Role of Human Computer Interaction withinside the Workplace. Human Computer Interaction (HCI) and User Experience (UX) are interdisciplinary fields that draw on human-focused disciplines like psychology and sociology to layout and increase technological merchandise that meet human needs.

As its call implies, HCI includes 3 parts: the user, the pc itself, and the methods they paint together.HCI is vital on account that it'll be important for items to be extra successful, safe, helpful, and functional. It will make the users revel in extra fun withinside the lengthy term. As a result, having a person with HCI capabilities concerned in all levels of any product or machine improvement is vital.

Read more about the software programs:

https://brainly.com/question/1538272

#SPJ1

Match the Job description with the job titles.

Answers

1) Bricklayer 2) Roofer 3) Architectural drafter 4) landscape architect
number 1 to first box
number 2 to second box
number 3 to third box
number 4 to forth box

This program has a bug. When the green flag is clicked, nothing happens. How would you fix it?
A. Change the number inside the “Move” block
B. Change the number inside the “repeat” block
C. Make the sound louder with the purple block
D. Connect the event block directly to the “repeat” block

Answers

The correct answer is D, if you connect it, the program will operate properly.

In the late 1980s, computer specialists were concerned that proprietary software had too many ________, so they started working on open source projects.

Answers

They were worried that the software had too many bugs.

Draw and implement of an organization which have 125 employees. use the following features 1.email services 2.lan communication 3.vlan 4.security 5.storage 6.server

Answers

An organisation usually hires employees which helps in the successful achievement of the goals of the organisation.

Implementation of an organisation

The implementation of an organisation can be carried out using the following features:

Email services: Email address can be assigned to different employees of the organisation.

LAN communication: Local Area Network is used by organisation to connect their computer devices to a server using a common communication line.

VLAN: This is known as Virtual Local Area Network which is created between two LAN's.

Security: This is set up by a company to guide their data from theft.

Storage: This is used by the organisation to store their data.

Server: This is a device that provides internet services to another computer in an organisation.

Learn more about LAN here:

https://brainly.com/question/26956118

#SPJ4

A malicious actor is preparing a script to run with an excel spreadsheet as soon as the target opens the file. the script includes a few macros designed to secretly gather and send information to a remote server. how is the malicious actor accomplishing this task

Answers

Thay is the malicious actor accomplishing this task is done by using the VBA code.

What is The Visual Basic button?

It opens the Visual Basic Editor, in which you create and edit VBA code. Another button at the Developer tab in Word and Excel is the Record Macro button, which robotically generates VBA code that could reproduce the moves which you carry out withinside the application.

To run VBA withinside the “Microsoft Visual Basic for Applications” window, you could simply press “F5” key button or click on the “Run” icon withinside the toolbar.

Read more about the spreadsheet :

https://brainly.com/question/26919847

#SPJ1

Other Questions
A particle moves along line segments from the origin to the points (2, 0, 0), (2, 5, 1), (0, 5, 1), and back to the origin under the influence of the force field[tex]F(x,y,z) = z^2i+5xyj+2y^2k[/tex]Use Stokes Theorem to find the work done: Define falling action. In The Sound of Music, where are the children supposed to perform at towards the end of the movie? A drawer contains 5 white shirts, 3 yellow shirts, and 4 black shirts. a shirt is randomly selected from the drawer and set aside. then another shirt is randomly selected from the drawer. what is the probability that the first shirt is yellow and the second shirt is black? please help! I will really appreciate it Which is the description for a mood disorder complete the gap using present perfect or past simple.Yesterday we ........(play ) football after class. Which of the following is a factor of both f(x)=x^2-4x-45 and g(x)=x^2-25 Which option explains the irony of the following statement: Food is typically used to nurture a persons health, yet Gregor is fatally wounded by an apple thrown by his father.The statement represents verbal irony; what is said is the opposite of what is meant.The statement represents causal irony; the outcome is the opposite of what is implied.The statement represents situational irony; what happens is the opposite of what one expects.The statement represents dramatic irony; the reader is aware of something that the characters are not. Select all that apply Which of the following are examples of resources? A.An oven used to bake bread at a bakery B.Workers hired to pick grapes at a vineyard. C.A new technology improving the production process for tractors. D.Social Security payments made to retired workers. Which word has a meaning similar to queer as it is used in the excerpt? Read this excerpt from loom and spindle. one of the first strikes of cotton-factory operatives that ever took place in this country was that in lowell, in october, 1836. when it was announced that the wages were to be cut down, great indignation was felt, and it was decided to strike, en masse. this was done. the mills were shut down, and the girls went in procession from their several corporations to the "grove" on chapel hill, and listened to "incendiary" speeches from early labor reformers. what can be inferred about the time period of the excerpt? check all that apply. factory workers felt frustrated by the lowering of their wages. workers were willing to show their displeasure through strikes. early efforts at strikes became chaotic and violent. the lowell girls were forbidden to voice objections. the lowell strike was followed by other labor strikes. You have been given data about gas prices in 15 states. 2018 Gas Price DataMax: $2.42Min: $2.03Mean: $2.098Median: $2.06Mode: $2.04Variance: 0.0121Standard Deviation: $0.1098What does the range, standard deviation, and variance say about gas prices in 2018? If f(x) =(3 + x)(x-3)what is f(a + 2)? Match the following vocabulary words with their definitions Write the equation of the line in slope-intercept form.The equation of the line in slope-intercept form is ___ 2What is the meaning of the word bleak based on its context in this excerpt from Charles Dickens's A Christmas Carol? And now, without a word of warning from the Ghost, they stood upon a bleak and desert moor, where monstrous masses of rude stone were cast about, as though it were the burial-place of giants 40A box containscrayons.Of these, 7 are red. 4 are blue. 8 aregreen, and the rest are yellow. If acrayon is chosen at random, notreplaced, then another is chosen.what is the probability thatboth crayons are yellow? Based on the clues in the excerpt, what does gotcha mean?have caught youhave admired youhave released youhave despised you DUE TODAY: PLEASE HELPUse transformations to prove that the two figures are similar. Shape A is the original image(Show work please, how it is similar or not)