What Is Classification of Computers?

Answers

Answer 1

Answer:

Explanation:Sr.No.

Type

Specifications

1

PC (Personal Computer) or Micro-Computers

It is a single user computer system having a moderately powerful microprocessor. It is termed as a computer that is equipped microprocessor as its CPU.

2

Workstation

It is also a single user computer system, similar to the personal computer, however, has a more powerful microprocessor.

3

Mini-Computer

It is a multi-user computer system, capable of supporting hundreds of users simultaneously.

4

Main Frame

It is a multi-user computer system, capable of supporting hundreds of users simultaneously. Software technology is different from minicomputer.

5

Super-Computer

It is an extremely fast computer, which can execute hundreds of millions of instructions per second.


Related Questions

Each webpage is assigned a(n) ________, an address that identifies the location of the page on the internet.

Answers

Each webpage is assigned a uniform resource locator (URL), an address that identifies the location of the page on the internet.

What is assigned to a webpage to identify its location?

A URL (Uniform Resource Locator) is known to be a kind of a special form of identifier that is known to be used a lot to be able to find a resource on the Internet. It is known to be a term that is often called the web address.

Note that all  webpage is assigned this address that identifies the place  of the page on the Internet and a such, Each webpage is assigned a uniform resource locator (URL), an address that identifies the location of the page on the internet.

Learn more about webpage from

https://brainly.com/question/13171394

#SPJ1

When a single network server can't handle all the data processing requests, more servers can be added and joined together to create a ______.

Answers

When a single network server can't handle all the data processing requests, more servers can be joined together and create a: Cluster and Server farm.

What is a server?

A server can be defined as a dedicated computer system that is designed and developed to provide specific services to other computer devices or programs, which are commonly referred to as the clients.

Types of server.

Generally, there are different types of server and these include the following:

Centralized ServerDistributed application serverProxy serverDistributed communication serverWeb serverBlockchain serverEmail serverFile serverDatabase server

In Computer technology, a Cluster and Server farm is usually created by combining two or more servers together when a single network server cannot handle all the data processing requests.

Read more on Servers here: https://brainly.com/question/17054032

#SPJ1

____________ is a straightforward semantic file format and a language supported on github.
it gets transformed into markup allowing non web-background individuals to write and display websites.

Answers

Markdown is a straightforward semantic file format and a language supported on Github. It is converted into markup, allowing non-web developers to create and display websites.

Markdown is a web writer's text-to-HTML conversion tool. Markdown enables you to write in a simple, easy-to-read plain text format and then transform it to systemically valid XHTML (or Hypertext Markup Language).

The term "Markdown" consists of two things: a markup language for simple text and a Perl-compiled software tool that converts plain text syntax to HTML. The overarching goal of Markdown's formatting code is to render it as comprehensible as possible.

To learn more about markdown :brainly.com/question/3099549

#SPJ4

Write an if statement involving a boolean operator (and, or or not) which performs the same function as the following nested if statement: if day == "sunny" if temperature > 20 picnic = "yes" else picnic = "no" endif endif

Answers

The given question requires that we need to rewrite the if-else statement using boolean operators such as “and”, “or”, and “or not

The if-else statement is used to evaluate the condition and execute some instruction or perform some task in case the condition is true, otherwise, execute the else part of the if-else statement.

In the if-else conditions, you can evaluate the expression using boolean operators such as and, or, on not, etc.

The given statement can be rewritten in any programming language. But here we use C++ to rewrite the given statement involving boolean operators:

Use of “and” operator:

#include <iostream>

using namespace std;

int main()

{

   string day = "sunny";

   int temperature =10;

   string picnic = "Yes";

 

   if (day =="sunny" && temperature ==10)

   {

       picnic = "Yes";

       std::cout<<picnic;}

   else

   {

       picnic="No";

       std::cout<<picnic;}

   return 0;

}

Use of “or” operator:

#include <iostream>

using namespace std;

int main()

{

   string day = "sunny";

   int temperature =10;

   string picnic = "Yes";

 

   if (day =="sunny" || temperature ==10)

   {

       picnic = "Yes";

       std::cout<<picnic;}

   else

   {

       picnic="No";

       std::cout<<picnic;}

   return 0;

}

Use of “or not” operator:

#include <iostream>

using namespace std;

int main()

{

   string day = "sunny";

   int temperature =10;

   string picnic = "Yes";

 

   if (!(day =="sunny"|| temperature ==10))

   {

       picnic = "Yes";

       std::cout<<picnic;}

   else

   {

       picnic="No";

       std::cout<<picnic;}

   return 0;

}

You can learn more about if-else statement at

https://brainly.com/question/18736215

#SPJ4

what is polling in python and what is active variable??

Answers

Answer:

Polling is a powerful python utility used to wait for a function to return a certain expected condition.An active variable is a variable that is manipulated by the investigator.

Explanation:

An external agent or person that interacts with the system by supplying data is called a(n) _______.

Answers

An external agent or person that interacts with the system by supplying or receiving data is called an actor.

An actor refers to any external agent, such as a person, an organization, a machine, or another software, that interacts with the system by supplying and receiving data. Actors represent the role of users that use the system. They are always external to/outside the system.  

In an online banking system, external agents such as customers, bank, ATM, bank database, web merchant and retail institution etc. all are called actors. They are directly and indirectly interacting with the online banking system.

Applications and systems are designed to perform specific functions. Actors interact with these systems to access the functionality offered by them. When a request from an actor is initiated, the system generates a response accordingly to handle the request and complete the goal. To depict the series of interactions performed by an actor with the system, use-case diagrams are used.  

You can learn more about external agents at

https://brainly.com/question/25495160

#SPJ4

If you suspect a computer is infected with a virus and you are ready to upgrade from windows 8 to windows 10, what is your best practice?

Answers

The best practice is to scan the computer for malware and then upgrade.

What is an Operating System?

An operating system (OS) is the software that handles all of the other application programs in a computer after being loaded into the machine by a boot program. The application programs interact with the operating system by requesting services via a predefined application program interface (API).

If you suspect a computer is infected with a virus and you are ready to upgrade from Windows 8 to Windows 10, then the best practice is to scan the computer for malware and then upgrade.

Hence, the best practice is to scan the computer for malware and then upgrade.

Learn more about Operating System here:

https://brainly.com/question/6689423

#SPJ1

slot is a small form factor solid state drive SSD for laptops and modern motherboards. ​

Answers

Answer:

M.2

Explanation:

Given this javascript code, var fish = ['lion', , 'angel']; what is the value of fish[2] ? angel undefined lion null

Answers

Based on the given JavaScript, the value of fish[2] is angel.

What is JavaScript

JavaScript can be defined as an object-oriented computer programming language that is typically designed and developed for creating interactive effects within a software application such as web browsers.

In Computer programming, the following types of values are recognized by JavaScript:

NumbersBoolean (Logical) valuesStringsnull valueundefined

Based on the given JavaScript, the value of each variable is as follows:

fish[0] = lion.

fish[1] = undefined.

fish[2] = angel.

Read more on JavaScript here: https://brainly.com/question/17113688

#SPJ1

What term is defined as software that allows users to use and adapt it for any purpose, often allowing the public to participate in further development? open well open well open use open use open pit open pit open source

Answers

A terminology which is defined as software that allows users to use and adapt it for any purpose, often allowing the public to participate in further development is: open source.

The types of software license.

In Computer technology, there are four (4) main types of software programs based on usage rights and these include the following:

Freeware softwarePurchased licenseShareware softwareOpen source software

What is an open source software?

In Computer technology, an open source software can be defined as a terminology which is used to describe a type of software that all end users can use and adapt it for any purpose or modify it for free without paying any license fee (money).

Read more on software here: brainly.com/question/25703767

#SPJ1

Devices with _____ technology that can send and receive data wirelessly or via the internet make up the internet of things (iot).

Answers

Devices with embedded technology that can send and receive data wirelessly or via the internet make up the internet of things (iot).

What is embedding technology?

The term ET (Embedding Technology) is known to be a kind of a tech that serves as the main solution to issues of low  spaces.

In any kind of embedding process, there is found to be active or passive parts that are known to be positioned in the stack up way so that they are said to be fully integrated into its buildup.

Hence, Devices with embedded technology that can send and receive data wirelessly or via the internet make up the internet of things (iot).

Learn more about embedded technology from

https://brainly.com/question/13014225
#SPJ1

All the coding and non coding dna found in the haploid number of chromosomes from one organism is known as the?

Answers

All the coding and non-coding DNA found in the haploid number of chromosomes from one organism is known as the genome.

The whole range of information required to build, grow and evolve an organism is known as the genome. Genomes are made up of DNA which contains the coding for growth and development. These codes depend on the order of the four nucleotides which are adenine, guanine, thymine, and cytosine. Cytosine pairs with guanine while adenine pairs with thymine.

In the case of eukaryotes, the genome is stored in the nucleus while in prokaryotes, the genome is stored in the nucleoid which is a region of the cytoplasm.

In human beings, the genome consists of 46 chromosomes, half inherited from the mother and the other half inherited from the father.

To learn more about genome, click here:

https://brainly.com/question/3913175

#SPJ4  

A(n) ____________________ is the location of a data element in a storage device.

Answers

Answer:

Address

Explanation:

A(n) Address is the location of a data element in a storage device.

If you are given a list of numbers (b11:c20), and you want the 6th smallest number in that list, which formula is correct?

Answers

If you are given a list of numbers (b11:c20), and you want the 6th smallest number in that list, the correct formula is =LARGE(B11:C20, 6).

What is Excel Formula?

In regards to Microsoft Excel, a formula is seen as a kind of an expression that tends to function on values that can be found within a range of cells.

Note that these formulas are said to often return a result, even if  it is an error. Excel formulas helps a person to carry out calculations such as addition, subtraction, and others.

Thus, If you are given a list of numbers (b11:c20), and you want the 6th smallest number in that list, the correct formula is =LARGE(B11:C20, 6).

Learn more about Excel formula from

https://brainly.com/question/27927845

#SPJ1

Can a computer spoof a tcp connection to frame another computer in the same broadcast domain?

Answers

A logical section or split of a computer network is called a broadcast domain. At the data link layer, all nodes in a broadcast domain can be contacted using broadcast.

What does TCP connection spoofing entail?Sequence numbers are carried by TCP packets and are used to reconstruct out-of-order stream data, track the data that has been received thus far on each side of a stream, and, if necessary, signal the retransmission of stream data that is presumed to have been lost. A malicious assault known as Internet Protocol (IP) spoofing conceals the IP packets' true source in order to make it difficult to determine where they originated. To mimic a different computer system, conceal the sender's identity, or both, the attacker produces packets while changing the originating IP address.

To learn more about TCP, refer to:

https://brainly.com/question/28364108

#SPJ4

What is not one of the three python functions that are associated with the merge sort algorithm?

Answers

mergeSplit is not one of the three python functions that are associated with the merge sort algorithm.

As its name suggests, the merge sort algorithm involves sorting data by merging together smaller pieces of data. However, the mergeSplit function is not actually part of the merge sort algorithm.

Instead, mergeSplit is a utility function that is often used in conjunction with the merge sort algorithm. Its purpose is to help split data up into smaller chunks that can then be sorted and merged together.

While mergeSplit is not an essential part of the merge sort algorithm, it can be a helpful tool in some situations. If you are using the merge sort algorithm to sort data, you may want to consider using the mergeSplit function to help you split the data up into smaller pieces.

Learn more on python functions here:

https://brainly.com/question/28379867

#SPJ4

In your own words, define information security and explain its relationship to cyberdefense.

Answers

The term information security is known to be the act of aiding and protecting information as well as information systems from any form of  unauthorized access and it is used in cyber defense against any intrusion from the enemies or an attacker.

What do you mean by information security?

Information Security is a term that is said to be the act or the practice of hindering any form of illegal access, use, disclosure, disruption, or the  modification, of electronic  data.

Therefore, The term information security is known to be the act of aiding and protecting information as well as information systems from any form of  unauthorized access and it is used in cyber defense against any intrusion from the enemies or an attacker.

Learn more about information security from

https://brainly.com/question/25720881

#SPJ1

A_____, made of mylar, is used for random-access processing of data in a computer.

Answers

A Magnetic disk, made of mylar, is used for random-access processing of data in a computer.

A magnetic disk is a round, flat piece of mylar that is used to store data in a computer. The disk consists of a thin layer of magnetic material, typically iron oxide, that is coated with a thin layer of lubricant. The data is stored on the disk in the form of tiny magnetic particles.

Magnetic disks are used for random-access processing of data in a computer. The disk is divided into tracks, and each track is divided into sectors. The data is stored in the sectors, and the sectors are read by a magnetic head. The head is moved to the correct track by a servo mechanism, and the sectors are read in sequence.

Magnetic disks are used in a variety of applications, including hard disk drives, floppy disk drives, and optical disk drives.

Learn more on Magnetic disks here:

https://brainly.com/question/4541859

#SPJ4

What is the output of the following program?
temps = [65, 67, 72, 75] temps.append(77) print(temps[-1])

Answers

The output of the given program is 77.

What is Python?

Python can be defined as a high-level programming language that is designed and developed to build websites and software applications, especially through the use of well-defined, dynamic commands (semantics) and data structures.

In Python programming language, the append() method is a type of function which is designed and developed to add an item to the end of a list or an array of elements.

In this context, we can reasonably infer and logically deduce that the output of the given program is 77.

Read more on append() method here: https://brainly.com/question/19595881

#SPJ1

What is a well-planned strategy that ensures the search and navigation functions are easy to use and user-friendly on a website? multiple choice email podcast blog taxonomy

Answers

A well-planned strategy that ensures the search and navigation functions are easy to use and user-friendly on a website is: D. taxonomy.

What is a website?

A website can be defined as a collective name which connotes a series of webpages that are interconnected and linked together with the same domain name, so as to provide certain information to end users.

What is taxonomy?

In Computer technology, taxonomy can be defined as the structure that is typically used for a website in order to organize all the web contents and resources in a logical manner, so as to enable end users search and navigate the website easily, as well as understand its purpose.  

Read more on websites here: https://brainly.com/question/26324021

#SPJ1

When the entire network, including all security devices, is virtualized, this is known as:_________

Answers

When the entire network, including all security devices, is virtualized, this is known as SDN (software-defined networking

SDN (software-defined networking) is a network architecture in which network control is decoupled from hardware and moved into the cloud. This means that the entire network, including all security devices, can be virtualized.

This has many advantages, including simplified network management, increased flexibility, and improved performance. However, it also comes with some risks. One of the biggest risks is that of security vulnerabilities.

When all security devices are virtualized, it becomes much easier for hackers to breach them. This is because all of the devices are in one place and are often not as well-protected as they would be in a physical network.

Another risk is that of data loss. If something goes wrong with the virtualization process, all of the data stored on the virtual devices could be lost.

Despite these risks, SDN is a promising technology that can offer many benefits. It is important to be aware of the risks involved, but with proper security measures in place, SDN can be a great way to improve your network.

Learn more on SDN here:

https://brainly.com/question/24321959

#SPJ4

Write a statement that reads a word from standard input into firstword. assume that firstword. has already been declared as an char array large enough to hold a 50-letter word.

Answers

A statement that reads a word from standard input into firstword and is large enough to hold a 50-letter word is cin >> firstWord;

What is a Computer Statement?

This refers to the syntactic unit of a programming unit that carries out a function.

Hence, we can see that A statement that reads a word from standard input into firstword and is large enough to hold a 50-letter word is cin >> firstWord;

This statement ensures that when a word is reads from standard input into first word, it is large enough to hold a 50-letter word is given above.

Read more about programming here:

https://brainly.com/question/23275071

#SPJ1

What are the key functions of the bios (basic input/output system)? identify the system devices.

Answers

BIOS identifies, configures, tests and connects computer hardware to the OS immediately after a computer is turned on. The combination of these steps is called the boot process.

The main job of BIOS is to act as a liaison between operating systems and the hardware that runs them. The BIOS serves as a conduit for data flow and CPU-to-I/O device control information.

What key functions of the bios (basic input/output system)?

The BIOS is in charge of starting the operating system and loading the fundamental computer hardware. For loading the hardware, the BIOS contains a variety of instructions. It also runs a test to help determine whether the computer satisfies all prerequisites for booting. F

POST – Before beginning the process of loading the operating system, test the computer hardware to make sure it is functioning properly. Locating the operating system is done by the bootstrap loader. If an operating system is nearby and capable, BIOS will transfer control to it.

Therefore, As soon as a computer is powered on, the BIOS recognizes, sets up, tests, and links computer hardware to the OS. The boot procedure refers to this sequence of actions.

Learn more about bios here:

https://brainly.com/question/13092385

#SPJ2

This method of file transfer has been used for decades and is frequently used for uploading changes to a website hosted by an internet service provider.

Answers

The correct answer is FTP or File Transfer Protocol.

What is FTP?

The File Transfer Protocol (FTP) is a standardized communication protocol used on a computer network to transfer computer files from a server to a client. FTP is designed as a client-server approach, with distinct control and data connections between both the client and the server.

The type of file transfer method that has been used for decades and is frequently used for uploading changes to a website hosted by an internet service provider is FTP or File Transfer Protocol.

Hence, the correct answer is FTP or File Transfer Protocol.

Learn more about FTP here:

https://brainly.com/question/25751600

#SPJ1

Write a conditional that decreases the value associated with shelf_life by 4 if the value associated with outside_temperature is greater than 90.

Answers

A conditional that decreases the value associated with shelf_life by 4 if the value associated with outside_temperature is greater than 90 is: if outside_temperature > 90:

shelf_life -= 4.

What is a conditional statement?

A conditional statement can be defined as a type of statement that can be written to have both a hypothesis and conclusion. This ultimately implies that, a conditional statement typically has the form "if P then Q."

Where:

P and Q represent sentences.

Based on the information provided, a conditional which decreases the numerical value that is associated with shelf_life by 4 if the numerical value associated with outside_temperature is greater than 90 would be written as follows:

if outside_temperature > 90:

shelf_life -= 4.

Read more on conditional statement here: https://brainly.com/question/14844178

#SPJ1

A utility tool that can change the software that is launched automatically during start-up is ____.

Answers

A utility tool that can change the software that is launched automatically during start-up is autoruns.

Autoruns is a free Sysinternals instrument from Microsoft that counts every one of the projects that consequently start on a Windows machine. You can then look at this rundown of projects to check whether they ought to be running or ought to be incapacitated.

Autoruns is a device that contains a huge measure of information pretty much every one of the areas which malware can use and it shows them in a methodical request which makes it more straightforward to break down and further research the pernicious sections It contains various tabs i.e Drivers, Picture Commandeers, AppInit_DLLs, Known DLLs.

One more tab that could require a touch of clarification is Picture Commandeers. This alludes to involving Picture Record Execution choices in the Windows library to divert a cycle stacking by planning the executable name and hence load something else entirely.

Learn more about utility:

https://brainly.com/question/22179210

#SPJ4

Which two contextual tabs help you change the look and feel of SmartArt?

Answers

PowerPoint offers two contextual tabs that enable you to modify the design and format of your SmartArt graphics: the SmartArt Tools – Design tab and the SmartArt Tools – Format tab. Note that these contextual tabs appear only when you have selected a graphic. If they disappear, select your graphic again to view them.

The room in which central server computers and hardware reside is commonly called a _______________.

Answers

The room in which central server computers and hardware reside is commonly called a data center.

A data center is a physical facility that is used to access data and applications and enhances performance and energy efficiency. Data center is composed of routers, computer systems, and associated components which include switches, firewalls, and servers.

Data centers may vary from small server rooms to large buildings.

Major organizations use a private data center for their internal purposes and these type of data centers are known as enterprise data centers.

Organizations that don't have the luxury of their own private data center choose a colocation data center where the resources of a data center are provided to organizations intending to rent it.

To learn more about data center, click here:

https://brainly.com/question/13441094

#SPJ4

In the context of the data component of an information system, internal data sources include _____.

Answers

In the context of the data component of an information system, internal data sources include personnel records

What is Data?

This refers to the information or sources of information that is inputted in a system for storage and processing.

Hence, we can see that In the context of the data component of an information system, internal data sources include personnel records and this helps to view the information contained in the records that is controlled by a network adminstrator.

This internal data source shows the type of data that can be viewed and used by a network administrator when managing data.

Read more about data components here:

https://brainly.com/question/27976243

#SPJ1

create a comic strip about prepering hand tools for operation and safety

paaa helppp ​

Answers

Answer:

Hammer stools

ahsnsksns

Other Questions
If yall cant se it just zoom in because thats the best I can get it please help me thank u please dont comment on my stuff just for points I really need help with this If you want to become a digital citizen you only have to buy a piece of technology. a. true b. false f (3/10)= -5 (3/10) -14 Which solid figure has 10 edges?pentagonal pyramidrectangular pyramidpentagonal prismtriangular prism Which reccomendation would the nurse include when educating a parent about infant safety and injury prevention? Volume of cone if height is 18 and diameter is 10, Describe the general effect of physical gradients on the disrtibutiom of organisms in habitats While many networking jobs will list a bachelor's degree as their minimumrequirement, but many will actually accept an associate's degree or trade schooltraining.TrueFalse Both bananas and apples cost $1/each. paul is deciding how many apples and bananas to purchase for $100. after careful deliberation, he decides to buy 100 apples and 0 bananas. this is an example of:_________ how many characteristics of life the rabbit displaying? The company uses the direct write-off method for bad debts. what is the amount of bad debts expense? Which is a researched-based observation about how men and women communicate differently? which terms describe the scale used in the third movement of mozarts symphony no. 40, and which do not? an open electrical circuit as a result of a failed circuit breaker is considered to be what type of failure system? The early centers of printing with movable type (mainz, nuremberg, and venice) had the common characteristic of being centers of:_____ The molecule of the type ml4 consists of four single bonds and no lone pairs. what structure is it expected to assume? Kara prepares to decontaminate the instruments using cidex plus chemical disinfectant. the purpose of decontaminating instruments is to:_________ In order for an organization to be prepared to change its mission, what does it need to do? check all that apply. Define osmosis and explain why it biologically important. Hipaa states that release to a coroner is allowed. state law says that the coroner must provide a subpoena. identify the true statement regarding this situation.