Third generation of computers, Basic Computer Science

Assignment Help:

THE THIRD GENERATION (1966-1975)

The introduction of IBM-360 series of computers in 1965 marked the beginning of this generation. The transistors were replaced by solid state technology and integrated circuits. This offered:

  •     Greater miniaturization
  •     Effective use of Input/Output devices
  •     Random access and mass storage devices
  •     High speeds (of the order of Nano seconds, i.e. 10–9 seconds)
  •     Time sharing and Multiprograming capabilities
  •     Higher level languages like COBOL/FORTRAN, etc.
  •     Modular design
  •     Large memory.


Related Discussions:- Third generation of computers

Amendments in erp, What is new? ERP, on the other hand begins with a fr...

What is new? ERP, on the other hand begins with a fresh relook at the existing business. In fact it is the result of a happy marriage between Business Process Reengineering (BP

Data base, advantages of file base system

advantages of file base system

Multithreaded Programming in python, Running more than a few threads is lik...

Running more than a few threads is like running several different programs at the same time as, but with the following profits: • Multiple threads inside a process share the same d

Static ram, STATIC RAM: Flip-Flops are the basic memory cells in a stat...

STATIC RAM: Flip-Flops are the basic memory cells in a static RAM. Each flip-flop is based on either two bipolar transistors or two Metal Oxide Semiconductors Field-Effect Tra

Turn-around, The term ‘page traffic’ describes

The term ‘page traffic’ describes

Microsoft office, Finding someone who doesn''t use some aspect of Microsoft...

Finding someone who doesn''t use some aspect of Microsoft Office on a daily basis is difficult. Whether it is Outlook for email,Word for creating and editing documents,or Excel f

Distinguish between passive and active attacks, QUESTION (a) Distinguis...

QUESTION (a) Distinguish between passive and active attacks. (b) Give two reasons why it is important to organise security awareness programs for users. (c) Explain how s

Deadlocks, What is methods For handling Deadlocks?

What is methods For handling Deadlocks?

Security threats on internet, Security threats on internet:  The Inter...

Security threats on internet:  The Internet has many advantages; however, it also opens up security threat. In this section we just want to highlight some of the threats that

Write Your Message!

Captcha
Free Assignment Quote

Assured A++ Grade

Get guaranteed satisfaction & time on delivery in every assignment order you paid with us! We ensure premium quality solution document along with free turntin report!

All rights reserved! Copyrights ©2019-2020 ExpertsMind IT Educational Pvt Ltd