Any two differences between third and fourth generation of computer

Answers

Answer 1

Answer:

Third generation computer use integrated circuit(IC) and it was fast and reliable.

Forth generation computer micro computer were introduced and they were highly reliable and fast.

Answer 2
Third generation computers were developed in 1965 AD.They used (IC)integrated ciruit.
Forth generation computer were developed in 1971 AD.They used micropocessor.

Related Questions

With SAN technology, servers use a separate network to communicate with the storage device. Group of answer choices True False

Answers

Answer:

true

Explanation:

Andrew likes to know what the weather will be like. To get a weather forecast on his Android smart phone, he has a reminder _______. Andrew thinks of this as a remote control for his app. a. podcast b. network c. widget d. RSS feed

Answers

Andrew has a reminder widget. Andrew thinks of this as a remote control for his app.

What is a widget?

A widget is known to be a kind of element that is used by a graphical user interface (GUI) that shows information or gives a specific way for a user to be able to communicate with the operating system or any kind of application.

Note that Andrew has a reminder widget. Andrew thinks of this as a remote control for his app.

Learn more about widget from

https://brainly.com/question/260819

#SPJ1

if ( (ans == 'Y' && errors < 5) || numTries < 10 ) // note uppercase 'Y' count++; Which combinations of values result in count being incremented after the statement is complete?

Answers

The correction options to the case abode are:

Option B. ans = 'Y' (upper case)

errors = 6

numTries = 5

Option C. ans = 'y' (lower case)

errors = 4

numTries = 5

Option D. ans = 'Y' (upper case)

errors = 100

numTries = -1

What is Coding?

Computer coding is known to be the act that entails the use of computer programming languages to instruct the computers and machines on a given number of instructions on what need to be  performed.

Note that in the statement above,  the combinations of values results in count being incremented after the statement is complete is option B, C and D.

See full question below

Learn mode about coding from

https://brainly.com/question/22654163

#SPJ1

The _______ button automatically merges the selected cells and then centers the data from the first cell across the entire merged area. Quick Analysis Merge

Answers

Answer:

Merge and Center

In demand paging, when an excessive number of pages are moved back and forth between main memory and secondary storage, it is called ____.

Answers

A thrashing occurs where an excessive number of pages are moved back and forth between main memory and secondary storage,

What is a thrashing?

This is a phenomenon that occurs when the virtual memory is rapidly exchanging data for data on hard disk often at the exclusion of most application-level processing.

Hence, in a computer, the thrashing occurs where an excessive number of pages are moved back and forth between main memory and secondary storage.

Read more about thrashing

brainly.com/question/12978003

#SPJ1

Following rules of compaction, the IPv6 address 2001:0db8:0000:0000:0000:ff00:0012:3456 could also be written as _______.

Answers

In regards to the rules of compaction, the IPv6 address 2001:0db8:0000:0000:0000:ff00:0012:3456 could also be written as 2001:db8::ff00:12:3456.

What is IPv6?

The IPv6 address is known to be a form of Internet Layer protocol made for packet-switched internetworking and it helps to give  an end-to-end datagram movement in course of multiple IP networks.

Note that, In regards to the rules of compaction, the IPv6 address 2001:0db8:0000:0000:0000:ff00:0012:3456 could also be written as 2001:db8::ff00:12:3456.

Learn more aboutIPv6 address   from

https://brainly.com/question/5296366

#SPJ1

which of the following needs to be cited within the text of a paper? select all that apply

Answers

The options that require citations are:

Every work that supports the points you make in your writing. Direct quotations must be cited.Works of individuals whose ideas, theories, or research have directly influenced your work.Works that you have read and whose ideas have been incorporated in your writing.What is the citation?

A “citation” is known to be the method used to inform your readers that some material in your work came are obtained from another source.

Note that The options that require citations are:

Every work that supports the points you make in your writing. Direct quotations must be cited.Works of individuals whose ideas, theories, or research have directly influenced your work.Works that you have read and whose ideas have been incorporated in your writing.

See full question below

Which of the following require citations? Select all that apply.

Group of answer choices

Every work that supports the points you make in your writing.

 Direct quotations must be cited.

Works of individuals whose ideas, theories, or research have directly influenced your work.

Each sentence of a paragraph in your writing requires citation.

Works that you have read and whose ideas have been incorporated in your writing.

Learn more about citation from

https://brainly.com/question/8130130

#SPJ1

What are 3 customizations that can be done using the header/footer section in the customize reports tray?.

Answers

The 3 customizations that can be done using the header/footer section are:

One can customize a given data,Also add or delete columns.Also add and also remove information.

What is the function about?

A person can customize and also personalize the font and style of the report through the use of the header/footer section in the customize reports tray.

Therefore, The 3 customizations that can be done using the header/footer section are:

One can customize a given data,Also add or delete columns.Also add and also remove information.

Learn more about header/footer  from

https://brainly.com/question/14379814

#SPJ1

Write a program that calculates pay for either an hourly paid worker or a salaried worker Hourly paid workers are paid their hourly pay rate times the number of hours worked. Salaried workers are paid their regular salary plus any bonus they may have earned. The program should declare two structures for the followingdata Hourly Paid Salary Bonus The program should also declare a union with two members. Each member should be a structure variable: one for the hourly paid worker and another for the salaried worker. The union should be part of another structure that also contains a flag for what portion of the union should be used. (If you have questions about this part, please email the instructor) The program should ask the user whether he or she is calculating the pay for an hourly paid worker or a salaried worker. Regardless of which the user selects, the appropriate members of the union will be used to store the data that will be used to calculate the pay Use the following flow structure and functions: Function: Main-Askes user if salaried or hourly. Calls appropriate function based on answer to gather information about the worker. Main should receive a worker pointer back. Main then calls the print function for the worker Function:getHourly-Asks the user for the hourly rate and number of hours worked, storing the answers in a new worker object, which it returns Function getSalaried-Asks the user for the salary and bonus for a worker, storing the answers in a new worker object, which it returns Function printWorker-takes a worker object, and prints out a report for the information about the worker, including the gross pay (which would be calculated) Note: Input validation not required, but would be no negative numbers, and no values greater than 80 for hours worked * Your two structures must be named "hourly" and "salaried", the union should be named Accept both capital and lowercase letters for selecting what type of worker from the user

Answers

The program that is required here is a payroll program. See the explanation below.

What is a program?

A program is a series of instructions that are given to a computer in a predetermined language with precise instruction that delivers a specific output.

What is the required program?

The program that calculates the pay - (Payroll program) is given as follows:

#include <iostream>

#include <iomanip>                                                                                                                                                                                        

using namespace std;

int main ()

{

int paycode;

int WeeklySalary;

double pay;

int HourlySalary;

int TotalHours;

int GrossWeeklySales;

int pieces;

int PieceWage;

cout << "Enter paycode (-1 to end): ";

cin  >> paycode;

while (1); {

               

                switch (paycode) {

                               case '1':

                                cout << "Manager selected." << endl;

                                cout << "Enter weekly salary: ";

                                cin  >> WeeklySalary;

                               

                                cout << endl;

                               

                                pay = WeeklySalary;

                                cout << "The manager's pay is $ " << pay;

                                cout << endl;

                               

                               

                                break;

                               

                                case '2':

                                cout << "Hourly worker selected." << endl;

                                cout << "Enter the hourly salary: ";

                                cin  >> HourlySalary;

                               

                                cout << endl;

                                cout << "Enter the total hours worked: " << endl;

                                cin  >> TotalHours;

                               

                                         if ( TotalHours <= 40)

                                                  pay = HourlySalary * TotalHours;

                                                 

                                         else

                                                  pay = (40.0 * HourlySalary) + (TotalHours - 40) * (HourlySalary * 1.5);

                                                 

                                 

                                cout << endl;

                                cout << "Worker's pay is $ " << pay;

                               

                                cout << endl;

                                break;

                               

                                case '3':

                                cout << "Commission worker selected." << endl;

                                cout << "Enter gross weekly sales: ";

                                cin  >> GrossWeeklySales;

                               

                                cout << endl;

                                pay = (GrossWeeklySales *.57) + 250;

                                 

                                cout << " Commission worker's pay is $ " << pay;

                                 break;  

                               

                                case '4':

                                cout << "Pieceworker selected." << endl;

                                cout << "Enter number of pieces: ";

                                cin  >> pieces;

                               

                                cout << "Enter wage per piece: ";

                                cin >> PieceWage;

                               

                                pay = pieces * PieceWage;

                               

                                cout << "Pieceworker's pay is $ " << pay;

                                break;

                                                               

                         

}

                               

}

system ("pause");

return 0;

}

Learn more about programs at;
https://brainly.com/question/1538272
#SPJ1

True or false: When a change in one key variable causes a change in another key variable, the incremental approach cannot be used for the analysis.

Answers

It is false to state that when a change in one key variable causes a change in another key variable, the incremental approach cannot be used for the analysis.

What is the incremental approach?

An approach this is based on the precept that the ones concerned in a mission have to on the outset attention on the important thing enterprise goals that the mission is to attain and be inclined to suspend detailed consideration of the trivia of a selected solution is known as the incremental approach.

Thus, It is false to state that when a change in one key variable causes a change in another key variable, the incremental approach cannot be used for the analysis.

Learn more about incremental approach:

https://brainly.com/question/14949779

#SPJ1

You are configuring a RAID drive for a Media Streaming Server. Your primary concern is the speed of delivery of the data. This server has two hard disks installed. What type of RAID should you install, and what type of data will be stored on Disk 1 and Disk 2

Answers

Answer:

Raid 0

Explanation:

Raid 0 is a configuration used for speed priority. Datas are stored differently on each disk

For optimal speed in a Media Streaming Server, configure RAID 0 with Disk 1 and Disk 2.

What are the differences between the two?

RAID 0 offers striping, distributing data across both disks for increased throughput. Disk 1 and Disk 2 will store media files, such as videos and audio, ensuring efficient data retrieval and smooth streaming performance.

Note that RAID 0 provides no data redundancy, so backup solutions are crucial to prevent data loss in case of a disk failure.

Read more about data redundancy here:

https://brainly.com/question/30034359

#SPJ2

Define a void function named drawDonut to draw a donut that can be called with this syntax: drawDonut( x, y, diameter, color ); The function should draw a circle for the donut at the given position, diameter, and color, then put a white hole in the center at 1/4 of the specified diameter. Make 3 calls to drawDonut in start to make 3 different donuts at different locations, and sizes. Make one donut yellow, another orange, and the last one brown.

Answers

The void function is depicted as given below. See the definition of a void function.

What is a void function?

Void functions are constructed and used in the same way as value-returning functions, except that they do not return a value once the function executes. In place of a data type, void functions utilize the term "void."

A void function executes a task and then returns control to the caller, but it does not return a value.

See the attached for the full solution.

Learn more about void functions at;
https://brainly.com/question/19539019
#SPJ1

Which type of data is used by Cisco Cognitive Intelligence to find malicious activity that has bypassed security controls, or entered through unmonitored channels, and is operating inside an enterprise network

Answers

Cisco Cognitive Intelligence often use statistical data made or use for statistical analysis in order to see malicious activity that has bypassed security controls.

What is statistical data?

This can be seen as Quantitative data that is said to be the output  gotten from an act that quantifies, such as how much. e.g.  weight, height, etc.

Cisco Cognitive Intelligence often use statistical data made or use for statistical analysis in order to see malicious activity that has bypassed security controls.

See options below

alert

session

statistical

transaction

Learn more about statistical data from

https://brainly.com/question/15525560

#SPJ1

Draw a circuit with a 12-volt battery and two resistors(100 ohms and 200 ohms) in parallel. What is the total resistance of the circuit?

Answers

The total resistance in the circuit is 66.67 ohm.

What is a circuit?

The circuit is a path designed for the flow of current. We can see that the resistors are connected to a common junction (in parallel) as shown in the image attached to this answer.

The total resistance is obtained from;

1/Rt= 1/R1 + 1/R2

1/Rt= 1/200 + 1/100

1/Rt= 0.005 + 0.01

Rt = 66.67 ohm

Learn more about resistance:https://brainly.com/question/21082756

#SPJ1

Answer:

The total resistance in the circuit is 66.67ohm

Mike discovers that attackers have left software that allows them to have remote access to systems on a computer in his company's network. How should he describe or classify this malware

Answers

Mike can describe or classify this malware as a backdoor.

What is a backdoor in malware?

A backdoor is known to be a kind of method that is said to be used when authorized and unauthorized users are able to get get in or around any normal security measures and take  or have a high level user access on a system, network or others.

So in the above case, Mike can describe or classify this malware as a backdoor.

Therefore, option d is correct.

See options below

A. A WORM

B. CRYPTO MALWARE

C. A TROJAN

D. A BACKDOOR

Learn more about malware from

https://brainly.com/question/399317

#SPJ1

Write a function called printRange() that accepts two integers as arguments and prints the sequence of numbers between the two arguments, surrounded by brackets ([]) and separated by a comma and a space. Print an increasing sequence if the first argument is smaller than the second; otherwise, print a decreasing sequence. If the two numbers are the same, that number should be printed by itself.

Answers

Answer:

def printRange(start, stop, steps = 1):

   list1 = []

   if steps > start or stop:

       print("Steps is larger than start and stop value")

       return None

   if int(start) < int(stop):

       while start < stop:

           start = start + int(steps)

           list1.append(start)

       print(list1)

   elif start > stop:

       while start > stop:

           stop = stop + int(steps)

           list1.append(stop)

       print(list1)

   elif start == stop:

       print(start)

   else:

       print("Values are not integers.")

for easier viewing:

https://www.codepile.net/pile/e95verLk

If you need help understanding comment below.

A technician is testing a connector in a circuit with a voltmeter. With the power on in the circuit, the meter reads 12 volts when the leads are placed on each side of the connector. This indicates that the connector _____.

Answers

Since the technician is testing a connector in a circuit with a voltmeter and the others, one can say that this indicates that the connector is open.

What does an open connection implies?

Connecting to an open network is one that connote that one can opens their device to others using or on that same wireless network.

Note that Since the technician is testing a connector in a circuit with a voltmeter and the others, one can say that this indicates that the connector is open.

Learn more about open connection from

https://brainly.com/question/5338580

#SPJ1

Got a assignment and need help to do it or figure it out. Its too make 2 python codes that run for
1. Write a program to ask the user to input the number of hours a person has worked in a week and the pay rate per hour.

2. Jennifer wants to carpet her new room with a carpet. Create a program that will work out the area of any sized room, (l x w) Save as area of rectangle.py
Need help with it.

Answers

Answer:

Explanation:

For input,

val = input("Enter your value: ")

print(val)

Haven't done python in while so I can't help with second one.

Question 2 (6.67 points)
According to many experts, how often should files be backed up?
Once a week
Once a month
Once a year
Daily

Answers

ANSWER
Once a week
ExPLNATION
Because in one month or more everything can happen and in on day you can not use your file for a day so the correct answer is Once a week

Explain how any simple substitution cipher that involves a permutation of the alphabet can be thought of as a special case of this cipher.

Answers

A simple substitution cipher takes each vector ([tex]e_i[/tex]) and assigns it to the vectors [[tex]e_{\pi (i)}[/tex]] in a one-to-one function so as to make them equivalent.

What is the Hill cipher?

In 1929, the Hill cipher was invented by Lester S. Hill and it can be described as a poly-graphic substitution cipher that is typically based on linear algebra and it avails a cryptographer an ability to simultaneously operate on more than three (3) symbols.

In Cryptography, the simple substitution cipher is usually viewed as a function which takes each plaintext letter (alphabet) and assigns it to a ciphertext letter. Thus, it takes each vector ([tex]e_i[/tex]) and assigns it to the vectors [[tex]e_{\pi (i)}[/tex]] in a one-to-one function so as to make them equivalent.

Read more on Hill cipher here: https://brainly.com/question/13155546

#SPJ1

Make up a python program that can do the following
Write a program to ask the user to input the number of hours a person has worked in a week and the pay rate per hour.​

Answers

Answer:

hrs=input("Enter Hour:")

rate=input("Eenter Rate per Hour:")

pay=float(hrs)*float(rate)

print("Pay:", pay)

Explanation:

What does AU stand for in computer?

Answers

Answer:

AU stands for Audio Units.

All of the following are true about in-database processing technology EXCEPT Group of answer choices it pushes the algorithms to where the data is. it makes the response to queries much faster than conventional databases. it is often used for apps like credit card fraud detection and investment risk management. it is the same as in-memory storage technology.

Answers

All of the aforementioned are true about in-database processing technology except: D. it is the same as in-memory storage technology.

What is an in-database processing technology?

An in-database processing technology can be defined as a type of database technology that is designed and developed to allow the processing of data to be performed within the database, especially by building an analytic logic into the database itself.

This ultimately implies that, an in-database processing technology is completely different from in-memory storage technology because this used for the storage of data.

Read more on database here: brainly.com/question/13179611

#SPJ1

The users, groups, and roles that have access to a server are called ______________________________.

Answers

Answer:

With the Exclusive Lock, a data item can be read as well as written. Also called write lock. An exclusive lock prevents any other locker from obtaining any sort of a lock on the object. They can be owned by only one transaction at a time

Explanation:

An encryption system works by shifting the binary value for a letter one place to the left. "A" then becomes: 1 1 0 0 0 0 1 0 This binary value is then converted to hexadecimal; the hexadecimal value for "A" will be?​

Answers

Answer:

a = 0x61 = 01100001, shifted: 11000010, hex: 0xC2

l = 0x6C = 01101100, shifted: 11011000, hex: 0xD8

g = 0x67= 01100111, shifted: 11001110, hex: 0xCE

Explanation:

The ascii character codes were actually for lowercase letters, whereas the assignment uses uppercase letters.

What type of trust model is used as the basis for most digital certificates used on the internet?

Answers

The type of trust model that is used as the basis for most digital certificates used on the internet is known to be option B. distributed trust.

What is the trust model of the Internet?

The trust model of the internet is known to be one that is made up of tradeoffs.

Note that Distributed trust is seen as the system that is made up of transactions and it is one that is backed up by an extended community and onw where there is no trusted third parties.

Hence, The type of trust model that is used as the basis for most digital certificates used on the internet is known to be option B. distributed trust.

See full question below

What type of trust model is used as the basis for most digital certificates used on the Internet?

A. third-party trust

B. distributed trust

C. related trust

D. managed trust

Learn more about digital certificates from

https://brainly.com/question/24931496

#SPJ1

is it possible to run a pc without a graphics card? and play games

Answers

Yes, (depends on specific game) because of a graphics chip that’s built into the CPU. Hope this helps?

Greg is implementing a data loss prevention system. He would like to ensure that it protects against transmission of sensitive information by guests on his wireless network. What DLP technology would best meet this goal

Answers

The DLP technology that would best meet Greg goal is known as Network-Based DLP technology.

What are Network-Based DLP technology?

Network DLP is known to be a form of device that is often used to hinder vital information from being moved outside any form of corporate network and it is one that is enforced in a lot of regulated industries where compliance requirements are put in place.

Therefore, The DLP technology that would best meet Greg goal is known as Network-Based DLP technology.

Learn more about DLP technology  from

https://brainly.com/question/15177750

#SPJ1

What is the output of the following program?
public class Test {
public static void main(String[] args) {
new A();
new B();
}
}
class A {
int i = 7;
public A() {
setI(20);
System.out.println("i from A is " + i);
}
public void setI(int i) {
this.i = 2 * i;
}
}
class B extends A {
public B() {
System.out.println("i from B is " + i);
}
public void setI(int i) {
this.i = 3 * i;
}
}

Answers

Answer:

i from A is 7

Explanation:

Well when you invoke new B (), you got a superclass for that which is A's constructor, and it invokes first. So it displays i from A is 7

You are choosing between two different window washing companies. The first charges $5 per window. The second charges a base fee of $40 plus $3 per window. Based on this information, the second company is cheaper if you have more than ______ windows.

Answers

Answer:

20

Explanation:

Other Questions
I will play football into negative and interrogative.From NepalBut any can answer Select 3 true statements about Python primitive types.32-bit integer type (a.k.a. int32) can represent integer value from -2^31 (-2,147,483,648) to 2^31-1 (2,147,483,647)The int type in Python3 cannot represent a number greater than 2^31-1.A binary floating-point method is used to represent fractions in binary numbers.The decimal number 0.1 cannot be expressed without error in binary floating-point format.The float type in Python3 can represent decimal 0.1 without error. A converging lens of focal length 15cm is used to obtain a real image magnified 1 times. calculate the distance of the image from the lensa. 37.5cmb. 22.5cmc.15.0cmd.7.5cme.3.3cm help!!!!Which of the following graphs shows thesolution set to x -3 and x < 3? Are the two smaller triangles similar? If so, write the similarity statement and identify which theorem or postulate is usedto prove the two triangles similar.A. Yes, AABC-ACBD by the AA similarity postulate.B. Yes, AABC-ADBC by the SSS similarity theorem.C. Yes, AABC-ACBD by the SAS similarity theorem.D. No, these triangles are not similar. How many moles of hydrogen atoms are there in one mole of (NH4)PMo12O40?Answers 431127 When the narrator says, There has got to be an end of this. We are neither one of us cowards, and this is humiliating, intolerable what is he referring to ? Part BUpdate your Grammar Guide here:BIUX XGrammar Guide15pxAVAEEEEEEWordMeaningWhen to UseWhen Not to Useir a (verb) going to to describe actions that will take place in the future when describing actions in the present or the past Which of the following describes "The American Dream"?Select one:O a. Most people believe in the right to be free, as long as another's rights are not abusedO b.Each American has the freedom to pursue a better life - a nice house, a car or two, and a morecomfortable existence than our parentsO c. Government is based on a body of law applied equally and fairly and not on the whims of a rulerO d. Most Americans are proud of our past and values that include the belief that we are stronger and morevirtuous than other nations If three farmers share some bags of fertilizers in the ratio 3:4:5.if the smallest share is 18 bags.what is the largest share Ms. Poppe, a single taxpayer, made three gifts this year: $6,300 cash to her niece; $50,000 cash to Yale University; and 5,000 acres of land to her brother. Ms. Poppe's tax basis in the land was $400,000, and its fair market value of date of gift was $615,000. Compute Ms. Poppe's taxable gifts for the year. When was the link between smoking and lung cancer discovered? El pap de Juanito exige que su hijo ________(hacer) sus tareas con excelencia? Short-term price reductions that can be used to retaliate against a competitor's actions like introducing a new product are called Why is a white car an example of a poor blackbody radiator?A. It reflects most of the light that hits it.B. It absorbs most frequencies of electromagnetic radiation.C. It emits more light when it is heated up.D. It gives off only one frequency of electromagnetic radiation. The long-standing debate over whether innate biology or environmental experience is the most critical factor in the development of human behavior is called During strenuous exercise, the NADH formed in the glyceraldehyde 3-phosphate dehydrogenase reaction in skeletal muscle must be reoxidized to NAD if glycolysis is to continue. The most important reaction involved in the reoxidation of NADH is: Read the following paragraph and answer the question: We are the strongest team in the world. They said we were not fast enough. We proved them wrong. They said we were not strong enough. We proved them wrong. They said we were not smart enough. We proved them wrong. Lets go out there and prove them wrong one more time! What is this an example of? A. Repetition B. Metaphor C. Passive voice D. Alliteration Which of the following most directly shows how society affects physics? A. Elected officials make decisions about what research is funded. B. Physicists work on projects that will get them nominated for Nobel prize. C. Citizens panel provide input on most research projects. D. Governments budget money for national science- funding agencies How can the following expression be written so that no negative exponents appear?(a5)a-6Q-2