Already have an account? Get multiple benefits of using own account!
Login in your account..!
Remember me
Don't have an account? Create your account in less than a minutes,
Forgot password? how can I recover my password now!
Enter right registered email to receive password!
Q. Illustrate about First Generation Computers?
It is certainly ironic that scientific inventions of great impact have frequently been linked with supporting a very sad as well as undesirable aspect of civilization for example fighting wars. Nuclear energy wouldn't have been developed as fast, if huge efforts weren't spent in the direction of inventing nuclear bombs. Likewise origin of the first truly general-purpose computer was also designed to meet the requirement of World War II. The ENIAC (the Electronic Numerical Integrator and Calculator) was designed in 1945 at University of Pennsylvania to calculate figures for thousands of gunnery tables needed by US army for accuracy in artillery fire. The ENIAC ushered in era of what is recognized as first generation computers. It could execute 5000 additions or 500 multiplications per minute. It was though a monstrous installation. It took thousands of vacuum tubes (18000), weighed 30 tons, occupied a number of rooms, needed a great amount of electricity and emitted excessive heat.
Which transmission mode is used for data communication along telephone lines? Serial transmission mode is utilized for data communication along telephone lines.
Byteland county is very famous for luminous jewels. Luminous jewels are used in making beautiful necklaces. A necklace consists of various luminous jewels of particular colour. Nec
And-Introduction: In generally English says that "if we know that a lot of things are true, so we know that the conjunction of all of them is true", then we can introduce conj
Discuss the customer-to-customer transactions. C2C (customer-to-customer): Person-to-person transactions are the oldest type of e-business. They have been there since the
Macroscopic and Microscopic approaches - Thermodynamics: Thermodynamic studies are undertaken by following two different approaches. l. Macroscopic approach (Macro mean big)
implementation of threads
The memory allocation scheme subject to “external” fragmentation is? Segmentation is the memory allocation scheme subject to “external” fragmentation.
With the help of R-2R binary network, explain the working of a 3-bit D/A converter and derive an expression for the output voltage. Ans: We see a 3-bit R-2R ladder D/A netwo
write a program that counts the number of occurrences of the string in the n-th Padovan string P(n)
Elucidate the purpose of GDTR. If the microprocessor sends linear address 00200000H to paging mechanism, which paging directory entry and which page table entry is accessed? GD
Get guaranteed satisfaction & time on delivery in every assignment order you paid with us! We ensure premium quality solution document along with free turntin report!
whatsapp: +1-415-670-9521
Phone: +1-415-670-9521
Email: [email protected]
All rights reserved! Copyrights ©2019-2020 ExpertsMind IT Educational Pvt Ltd