Third generation of computers, Basic Computer Science

Assignment Help:

THE THIRD GENERATION (1966-1975)

The introduction of IBM-360 series of computers in 1965 marked the beginning of this generation. The transistors were replaced by solid state technology and integrated circuits. This offered:

  •     Greater miniaturization
  •     Effective use of Input/Output devices
  •     Random access and mass storage devices
  •     High speeds (of the order of Nano seconds, i.e. 10–9 seconds)
  •     Time sharing and Multiprograming capabilities
  •     Higher level languages like COBOL/FORTRAN, etc.
  •     Modular design
  •     Large memory.


Related Discussions:- Third generation of computers

Read world population data file. store the values in multipl, Read World Po...

Read World Population Data File. Store the values in multiple vectors. Sort them by most populated region and output the results ext file is here : please">http://www.csupomona.

Explain distributed file systems, Question 1 Write short note on          ...

Question 1 Write short note on                             1) NFS 2) CIFS Question 2 What is Virtual Application? Write down the benefits and drawbacks of it Questi

Prelude to programming concepts and design 5th edition, Input a list of pos...

Input a list of positive numbers, terminated by 0, into an array numbers []. Then display the array and the largest and smallest number in it.

Logic and arithmetic functions, The instructions of the logic functions are...

The instructions of the logic functions are: and not, or and xor. These act on the bits of their operators. To make sure the result of the operations we revolve to the cmp and test

Explain popular way commonly used to evaluate interfaces, Question: Usi...

Question: Using a questionnaire is a popular way commonly used to evaluate interfaces. (a) Describe advantages of using questionnaires as a means to evaluate interfaces.

Display the item in red colour on a web page, QUESTION (a) Give the app...

QUESTION (a) Give the appropriate syntax to implement a Client-Side Image Map, specifying all possible attributes where required (b) List the benefits of using Cascading Sty

Perverse software, Perverse software: Perverse software is a program w...

Perverse software: Perverse software is a program which causes hindrances in other programs execution in such a way resulting in modification or complete destruction of data w

Basic of simulation, Task 1 Study various types of systems and simulate a s...

Task 1 Study various types of systems and simulate a system of your own. Task 2 Study various models and enumerate the various steps for designing a corporate model

Write Your Message!

Captcha
Free Assignment Quote

Assured A++ Grade

Get guaranteed satisfaction & time on delivery in every assignment order you paid with us! We ensure premium quality solution document along with free turntin report!

All rights reserved! Copyrights ©2019-2020 ExpertsMind IT Educational Pvt Ltd