what are the five generations of computer software​

Answers

Answer 1

Answer:

1st gen: Vacuum Tubes(1940–1956)

2nd gen: Transistors(1956–1963)

3rd gen: Integrated Circuits: (1964–1971)

4th gen: Microprocessors (1971–PRESENT)

5th gen: Artificial Intelligence (present)

Explanation:


Related Questions

Compare the memory efficiency of four different styles of instruction sets. The architecture styles are the following:

Accumulator: All operations use the accumulator register. Operands come from the accumulator and/or memory and the result of most operations is stored in the accumulator.
Memory-memory: All three operands of each instruction are in memory.
Stack: All operations occur on top of the stack. Only push and pop access memory, and all other instructions remove their operands from the stack and replace them with the result. The implementation uses a stack for the top two entries; accesses that use other stack positions are memory references.
Load-store: All operations occur in registers, and register-to-register instructions have three operands per instruction.

Answers

Compare the memory efficiency of four different styles of instruction sets. The architecture styles are the following:

Accumulator: All operations use the accumulator register. Operands come from the accumulator and/or memory and the result of most operations is stored in the accumulator.

Memory-memory: All three operands of each instruction are in memory.

Stack: All operations occur on top of the stack. Only push and pop access memory, and all other instructions remove their operands from the stack and replace them with the result. The implementation uses a stack for the top two entries; accesses that use other stack positions are memory references.

Load-store: All operations occur in registers, and register-to-register instructions have three operands per instruction.Compare the memory efficiency of four different styles of instruction sets. The architecture styles are the following:

Accumulator: All operations use the accumulator register. Operands come from the accumulator and/or memory and the result of most operations is stored in the accumulator.

Memory-memory: All three operands of each instruction are in memory.

Stack: All operations occur on top of the stack. Only push and pop access memory, and all other instructions remove their operands from the stack and replace them with the result. The implementation uses a stack for the top two entries; accesses that use other stack positions are memory references.

Load-store: All operations occur in registers, and register-to-register instructions have three operands per instruction.Compare the memory efficiency of four different styles of instruction sets. The architecture styles are the following:

Accumulator: All operations use the accumulator register. Operands come from the accumulator and/or memory and the result of most operations is stored in the accumulator.

Memory-memory: All three operands of each instruction are in memory.

Stack: All operations occur on top of the stack. Only push and pop access memory, and all other instructions remove their operands from the stack and replace them with the result. The implementation uses a stack for the top two entries; accesses that use other stack positions are memory references.

Load-store: All operations occur in registers, and register-to-register instructions have three operands per instruction.

please mark me as brainliest.............

follow me.............

.

A(n) _____ is the conceptual organization of an entire database as viewed by a database administrator.

Answers

Answer: Schema

Explanation:

i did cs

10) If a citizen wants to learn more about a candidate's background, position on issues, and recent activities, what action will allow the citizen to access the MOST information? A) visiting the candidate's Internet website B) watching the candidate's television advertisment C) listening to what friends say about the candidate D) reading a newspaper article that mentions the candidate

Answers

Answer:

A.) Visiting a candidate's internet website

Explanation:

A.) is correct because this place is entirely dedicated to promoting the candidate. It is in this person's best interest to give as many beneficial facts about themselves here so that their reputation rises. However, because this site is managed by the candidate, it may omit some unflattering information about them.

B.) is incorrect because television advertisements do not have the time to share a lot about a candidate. In many cases, most of this time is spent bashing other candidates. In addition, the information in commercials is usually more sensationalized to quickly grab the audiences' attention.

C.) is incorrect because friends are not the direct source of the information. They received this knowledge from somewhere else that may not be reliable. They may also forget or accidentally change some of the information. Furthermore, they are most likely unaware of the candidate's entire background and political stances.

D.) is incorrect because a mention in the newspaper means that the candidate is only discussed a small amount. Newspapers only have a certain amount of space as well, so they usually do not devote a lot of space to one person.

In computer science what major jobs is appropriate for someone who majors in information systems

Answers

Answer:

manager

Explanation:

You use encryption, user accounts, and access control lists (ACLs). However, you find that there is no plan to replace database server hardware if it fails. You find that ordering a replacement server would take at least 24 hours to arrive, and an additional 6 hours to prepare for use. Which part of the C-I-A security triad has failed?

Answers

Based on the scenario, the part of the C-I-A security triad that has failed is maintaining availability.

What is the C-I-A security triad?

The C-I-A security triad refers to an abbreviation for confidentiality, integrity and availability. It can be defined as a cybersecurity model that is designed and developed to guide security policies for information security in an organization, so as to effectively and efficiently protect and make their data available to authorized end users.

In this scenario, the part of the C-I-A security triad that has failed is maintaining availability because the database server hardware cannot be replaced immediately if it fails.

Read more on data here: brainly.com/question/25558534

Which range function will generate a list of all odd numbers between 17 and 47 inclusive?

A
range (18 , 48 , 2)

B
range (17 , 47 , 3)

C
range (17 , 48 , 2)

D
range (18 , 47 , 3)

Answers

Answer:

The answer is "range (12, 86, 2)"

Explanation:

Answer:

B is definitely the answer

Select the correct answer.
Dr. Samuel is holding a discussion on the relevance and requirement of Intellectual Property rights. Which point will he emphasize while
explaining the influence of IPR on Individual creations?
OA. IPR increases the number of copyright infringement lawsults.
OB. IPR promotes growth in the fields of art and science.
OC.
IPR increases the number of works that get published.
OD. IPR promotes competition between nations in the number of inventions created.
O E.
IPR describe regulations for different entities that are eligible for copyright
Reset
Next
entum. All rights reserved,

Answers

The right point to emphasize while explaining the influence of IPR on Individual creations is that IPR describe regulations for different entities that are eligible for copyright.

What are the intellectual property rights?

The Intellectual property rights are known to be the rights that are given to people over the development of their minds.

Note that these rights are often give to the creator as a kind of exclusive right over the use of his or her product or services for a specific amount of time.

Learn more about Intellectual Property rights from

https://brainly.com/question/1083623

Answer:

IPR promotes growth in the fields of art and science

Explanation:

In a formula, why is it preferred to use a reference cell instead of a static number in excel?

Answers

Answer:

they allow you to update data in your worksheet without having to rewrite formulas

Explanation:

Modifying values with cell references. Cell references are that they allow you to update data in your worksheet without having to rewrite formulas. The cell address or the range referred to during the calculation while constant has a fixed value.

Hope it helps!!!Brainliest pls!!!

Wirte a program which asks the users to input length and calculates the area of a square.( Area = Length^2)​

Answers

Explanation:

i hope this will help you

Why is sequencing important?
a. It allows the programmer to test the code.
b. It allows the user to understand the code.
c. It ensures the program works correctly
d. It makes sure the code is easy to understand.

Answers

Answer:

BI think B

hope it's help

Explanation:

because it helps to understand code

Sequencing is important because it allows the user to understand the code. Sequences are exactly what their name implies.

Sequencing

Sequences are generally utilized throughout algorithms as well as computing, and they have been discussed in this article. This is indeed a transcribed version.

An algorithm is made up of instructions that are sequentially repeated. A sequencing of commands seems to be how directives during an algorithm have been executed.

Thus the response above i.e., "option b" is correct.

Find out more information about sequencing here:

https://brainly.com/question/19586990

Write a loop that inputs words until the user enters stop. After each input, the program should number each entry and print I. This format:
#1: You entered _____
When stop is entered, the total number of words entered should be printed in this format:
All done ___ words entered.

Answers

Answer:

Written in Python:

userinp = input("Input: ")

count = 0

while not userinp == "stop":

print("You entered "+str(userinp))

count = count + 1

userinp = input("Input: ")

print("All done, "+str(count)+" words entered")

Explanation:

I've added the full program as an attachment where I use comments to explain difficult lines

Answer:

word = input("Please enter the next word: ")

count = 0

while word != "DONE":

      count += 1

      print("#{}: You entered the word {}".format(count, word))

      word = input("Please enter the next word: ")

print("A total of " + str(count) + " words were entered.")

Explanation:

Assuming this is python, this should help!

3. How can you correct the color of your photos automatically?​

Answers

Answer:

use the lightroom

download the app haha

You can usually programs such as “Lightroom”

Not guaranteed, but it might work

Chip stays up late every night surfing the Web, but tells himself that he hardly ever does this.

Which computer addiction symptom is Chip experiencing?


Lack of control


Downplaying


Neglect


Uncomfortable feelings

Answers

Answer:

2

Explanation:

hes downplaying the fact the he stays up every single night by saying he hardly ever does it

Chip is experiencing the computer addiction symptom of "Downplaying."

How can this be explained?

Despite staying up late every night surfing the Web, he tells himself that he hardly ever does this. This behavior involves minimizing the extent of his computer usage, which is a common characteristic of downplaying in cases of addiction.

It's important to recognize such signs to address and manage potential addiction issues.

Read more about computer addiction here:

https://brainly.com/question/28724010

#SPJ2

Part 1:

In a group, with a friend, or with family members, identify a problem in your community. Describe the problem and work through the steps of problem solving to come to one potential solution. If you can, implement the solution and evaluate the results. If you cannot, propose what may happen if you implemented the solution. Make sure to include all of the steps.

Part 2:

Ask five people for an example of a conflict they have experienced. Look over the approaches to conflict resolution that are listed in the lesson. For each situation, select the approach that you feel would work best. Describe why you selected the approach.

Describe your results for both parts of the project in an essay of at least 300 words.

Long Text (essay)
Submit your 300- word essay that: 1) identifies a problem in your community and works through problem solving steps to provide a solution, and 2) analyzes five conflicts through the conflict resolution approaches and explains an appropriate resolution for each conflict.

Answers

The  problem in my community is lack of pipe borne water.

What are the issues of water supply?

Africa is known to be a content that has some poverish nation. My community is known to lack good water and that is a key issue i would love to address.

What i can do is to write to the government and other private organizations for help or i will take the project upon myself to construct bore holes for the community. A lot of people do not have access to water during the dry season and this will solve the problem.

What are the steps to write an essay?

An essay can be written by following the steps below:

First know the type of Essay you want to write.You introduce the Topic of the essay.State the problem or reasons for writing. Write the body of the writeup.End with a Conclusion.

Note that a good essay is one that that communicate the right message to anyone reading it.

Learn more about water from

https://brainly.com/question/5060579

_______________________ is a useful CI tool that allows users to simultaneously compare the web traffic of multiple domain names over time. The tool provides graphs showing the number of unique visitors over time, monthly metrics for each domain name (such as number of referring sites), and top search terms for each of the domain names entered.

Answers

Compete. com  is a useful CI tool that allows users to simultaneously compare the web traffic of multiple domain names over time.

What is Web traffic?

The term Website traffic connote when a web users is said to  visit a website. Web traffic is said to be calculated by the times in visits, known as "sessions," .

Note that the tool or computer index Compete.com  is said to be a useful CI tool that allows users to simultaneously compare the web traffic of multiple domain names over time.

The options are:

Compete.com

Goo gle Trends

Hoot Suite

You Tube Analytics

Learn more about tools from

https://brainly.com/question/24625436

PLEASE HURRY!!!

After the following code is executed, what value is stored in weight?

>>> answer = input("What do you weigh? ")
What do you weigh? 105.7
>>> weight = float(answer)
>>> weight = weight + 3
The value stored in weight is .

Answers

Answer:

108.7

Explanation:

When someone enters an answer, it's stored in the variable "answer" as a string. Then "weight" is set to the value of the string, converted to a floating-point number (meaning that it has a decimal value, instead of being an integer). At that point weight = 105.7, so when you add 3 to it you get 108.7.

The function localtime()

always return the same value

might return a different value but might return the same value as the last time you used it

returns a different value everytime you use it

Answers

Answer:

Imma assume python as your last question was python as well.

The answer is C

Explanation:

This is because when used against an epoch, it gives you the amount of time that has passed since the epoch.

Select the correct answer.
Which is a major fashion design concept?
A.
Colors
B.
Patterns
C.
Both A and B
D.
None of the above

Answers

Answer:

C.

Explanation:

the colors and patterns, C

A manufacturer that uses the intermittent process to produce special customer orders is called a: modular shop central shop job shop localized processor centralized processor

Answers

A manufacturer that uses the intermittent process to produce special customer orders is called job shop.

What is job shop?

A job shop is known too be a  type of manufacturing process. It is said to be one where little batches of different kinds of custom products are made.

Note that In the job shop process flow, a lot of the products made needs a specific set-up and sequencing of process methods. Therefore, A manufacturer that uses the intermittent process to produce special customer orders is called job shop.

Learn more about  job shop from

https://brainly.com/question/24516871

Which of the following is used to store data in the computer's memory that can be
used by a program later when executing instructions? Hint: They are link storage
containers
Variables
Operators
Expressions
Boolean

Answers

The  storage that is used to store data in the computer's memory that can be used by a program later when executing instructions is variables.

What is variables?

Variables can be defined as the way or process in which data or information are store in a computer memory.

Data or information that may likely change or be altered are often stores in a computer memory storage called variables and this store data can be retrieve later for use by a program when executing instruction on the computer  system.

Inconclusion the  storage that is used to store data in the computer's memory that can be used by a program later when executing instructions is variables.

Learn more about variables here:https://brainly.com/question/23931018

Which step do you think is most useful from big data life cycle.why?

Answers

Explanation:

Business xase evaluation is most useful because (BCA) provides a best-value analysis that considers not only cost but other quantifiable and non-quantifiable factors supporting an investment decision. This can include but is not limited to, performance, producibility, reliability, maintainability, and supportability enhancements.

Mark me brainliest

Ethernet and wireless networks have some similarities and some differences. One property of Ethernet is that only one frame at a time can be transmitted on an Ethernet. Does 802.11 share this property with Ethernet? Discuss your answer.

Answers

802.11 do not share this property with Ethernet this is because Wireless networks is known to have a kind of potential parallelism, and as thus, it differ from Ethernet.

What is a Wireless networks?

Wireless networks are known to be a kind of computer networks that are said to not need to be connected by form of cables.

The use of a wireless network is one that helps firms to avoid the costly prices of using cables in their buildings or as a form of connection between their various equipment locations.

Learn more about Ethernet from

https://brainly.com/question/1637942

Once goals and objectives are clearly defined, what should a successful company do next in its content strategy?

Answers

Answer:

An effective Content Marketing strategy must have four core elements to be successful: brand positioning, owned media value proposition, business case, and strategic plan. Let's see why these elements are essential for Content Marketing and how you can start implementing each of them.

Explanation:

mark me as brainlist..

[ASAP] Choose the term to complete the sentence.

A _____ is a drawing made up of lines without any surface color or shading.

1. Raster
2. Vector
3. Rendering
4. Wireframe

Answers

A vector is a drawing made up of lines without any surface color or shading. The correct option is 2.

What is vector drawing?

Digital shapes called vectors are formed of lines and curves and are used to build images using mathematical equations. These curves and lines, which are also known as pathways, enable designers to scale pictures that are as simple as shapes or as intricate as full-blown illustrations.

Focus is placed on using only straight lines and contours, without any shading in line drawings. In the majority of line drawings, the artist draws the entire picture without ever taking their tool off the paper.

Therefore, the correct option is 2. Vector.

To learn more about vector drawing, refer to the link:

https://brainly.com/question/3930341

#SPJ1

Answer:

D. Wireframe

Explanation:


Computer industries and organizations also face issues related to health, safety, and environmental issues. In this task, you will examine these
sues related to an industry organization that deals with technology, specifically computers. Write a short essay on these issues.

Answers

Over the past twenty years a great many questions have arisen concerning the links that may exist between the use of computers and the health and safety of those who use them. Some health effects -- such as joint pain and eye strain following an extended period huddled typing at a screen and keyboard -- are recognised as an actuality by many. However, proving with any degree of certainly the longer-term health impacts of computer use remains problematic. Not least this is because widespread computer use is still a relatively modern phenomenon, with the boundaries between computers and other electronic devices also continuing to blur.

Discuss the different categories of computer hardware​

Answers

Answer:

Input devices: For raw data input.

Processing devices: To process raw data instructions into information.

Output devices: To disseminate data and information.

Storage devices: For data and information retention.

Computers are like you dad hard to find and access

List and describe the three types of cloud models described by Microsoft.

Answers

There are three main service models of cloud computing – Infrastructure as a Service (IaaS), Platform as a Service (PaaS) and Software as a Service (SaaS). There are clear differences between the three and what they can offer a business in terms of storage and resource pooling, but they can also interact with each other to form one comprehensive model of cloud computing.

aaS (Infrastructure as Service)

This is the most common service model of cloud computing as it offers the fundamental infrastructure of virtual servers, network, operating systems and data storage drives. It allows for the flexibility, reliability and scalability that many businesses seek with the cloud, and removes the need for hardware in the office. This makes it ideal for small and medium sized organisations looking for a cost-effective IT solution to support business growth. IaaS is a fully outsourced pay-for-use service and is available as a public, private or hybrid infrastructure.

PaaS (Platform-as-a-Service)

This is where cloud computing providers deploy the infrastructure and software framework, but businesses can develop and run their own applications. Web applications can be created quickly and easily via PaaS, and the service is flexible and robust enough to support them. PaaS solutions are scalable and ideal for business environments where multiple developers are working on a single project. It is also handy for situations where an existing data source (such as CRM tool) needs to be leveraged.

SaaS (Software as a Service)

This cloud computing solution involves the deployment of software over the internet to variousbusinesses who pay via subscription or a pay-per-use model. It is a valuable tool for CRM and for applications that need a lot of web or mobile access – such as mobile sales management software. SaaS is managed from a central location so businesses don’t have to worry about maintaining it themselves, and is ideal for short-term projects.

The three types of cloud models described by Microsoft are:

Infrastructure as a Service (IaaS), Platform as a Service (PaaS) Software as a Service (SaaS)

The Infrastructure as a Service (IaaS) is used to give the structural framework the model of functioning with the virtual servers, OS, data storage, etc. This the most basic level that is used in cloud computing.

The Platform as a Service (PaaS) is where these structural frameworks are put to use by developing other software that organizations can make use of.

The Software as a Service (SaaS) is finacly the cloud model where these softwares are given to businesses who pay a premium to use them.

Read more here:

https://brainly.com/question/14290655

TRUE or FALSE.
2.1 Information is a collective term used for words, numbers, facts,

Answers

Answer:

true

Explanation:

Because it is the very best way

..................... is a group of related information stored in the computer​

Answers

Answer:

Yes, that's true, but only if you save the information somewhere. It should be stored in a folder for best recognition. In terms of databases, you want to create a table, give it a creative name, and then store your info in columns.

Hope this helps!If it does, give thanks!

do anyone know to do number 4i have no idea

Answers

Answer:

↓ 4 ↓

while true:

print(range(500, 1000))

if true:

print(range(500, 1000))

I hope this helps!

Other Questions
what is 10 - 3 in mathematics 4. Pollution is something that should worry us all. We have only a limited amount of natural resources. Pollution significantly damages many of these, like our water and air. Cars and trucks send chemicals that pollute the air. Products like hair spray, spray paint, and even chemicals from our refrigerators and air conditioners can damage our environment. We must make an effort to be more responsible. We need to educate about these dangers and help others learn more, too. Our future depends on it.a. What is the topic?b. Summary: please help with this Using context clues, determine the meaning of the termarms race. Write your counterargument and rebuttal here: While some may argue that . I disagree because HELP ME! I NEED HELP NOW!!!!! 30 POINTS WILL BE GIVEN! What is nonstandard English, and when should you use it? What is the value of the expression2/5 + 3/7 is my ***** longer than yours? A: YesB: No 1 + 1 + 1 in standard form what is the measure of In your response, be sure to include angle measure and the work you did to find it . Please help me to find 1 math question A population has a mean 81 and a standard deviation of 29. Find the mean and standard deviation of a sampling distribution of sample means with sample size n =265 what is a tropical cyclone What is the name of the cycle in which plants turn carbon dioxide into oxygen that animals can breatheA. Water CycleB. Nitrogen cycleC. Carbon dioxide-oxygen cycleD. Rock cycle What is the value expression for 7 1/2 False reason none actually 7)Ella started exercising. Which division expression means she lost 5 pounds every 2 weeks?5A)B)0D)JU If f(x)=x+3x+5, what is f(3+h) which group favored holding the meeting known as the consultation Please show work!Two fathoms deep is 12 feet deep. How deep is 10 fathoms?Group of answer choices70 feet60 feet20 feet