In computer systems, there are two types of devices: the input devices and the output devices. The input devices sends data or information to the computer system for processing while the output devices display or reproduce the result of the processing. A device can either be both which is called I/O device.
Best examples for input devices are the mouse and the keyboard. Examples of output are the computer monitors, speakers, and projectors. For I/O device, a USB flash drive is a best example.
Answer
There are four generations of computer programming languages(4GLs)But fifth generation is still on development.
Explanation
First generation programming languages(1GL) These are programming languages were used to program the very first computers which are described ts the first generation of computers .They were low level languages.
Second generation programming language (2GL) These were low level assembly languages an example is COBOL.
Third generation programming language (3GL) These are high level programming languages examples are java,c++ e.t.c
Fourth generation programming languages (4GL) These are programming languages which are more user friendly than the other three generations. They are normally used in development of commercial business software and many others
Fifth generation programming language (5GL) these are languages which are now used in problem solving .They are more user friendly and are advanced in technology.This fifth generation is still under development.
WILL GIVE BRAINLIEST TO FIRST ANSWER
b. Is unique terminology that responders use when managing incidents.
c. Applies exclusively to the naming of facilities used by the Command Staff.
d. Encourages the use of radio codes to communicate efficiently at incident site.
clear cache
clear history
clear cookies
run a virus protection program before using the computer
Answer:
To protect your personal data when using a public workstation, you should do the following:
- Sign out of your account completely
- Clear cache
- Clear history
- Clear cookies
Running a virus protection program before using the computer is also a good practice, but it may not always be feasible or possible to do so on a public workstation.