Second-generation computers used ________ instead of vacuum tubes.

Fill in the blank(s) with the appropriate word(s).


transistors

Computer Science & Information Technology

You might also like to view...

Discuss the browser wars and the dynamics of browser development versus HTML standards. Why is it important to view your Web pages on different browsers and platforms?

What will be an ideal response?

Computer Science & Information Technology

Which of the following are the two tunneling protocols used by the majority of VPNs? (Select all that apply.)

A. PPTP B. OpenVPN C. L2TP D. IPSec E. Both A and C

Computer Science & Information Technology

Administrators who are wary of using the same tools that attackers use should remember that a tool that can help close an open or poorly configured firewall will not help the network defender minimize the risk from attack.

Answer the following statement true (T) or false (F)

Computer Science & Information Technology

Which of the following is not true of static local variables?

a) They’re accessible outside of the function in which they are de-fined. b) They retain their values when the function is exited. c) They’re initialized to zero if not explicitly initialized by the pro-grammer. (d) They can be pointers.

Computer Science & Information Technology