1 / 7

A History of Computers

A History of Computers. By Emma Bryan 3rd Period Computers. Computer Timeline. 4) 1982; 5) 1982. 1) 1946. 2) 1976. 7) 1990. 9) 2005. 3) 1980. 6) 1984. 8) 1995. 10) 2011.

ikia
Download Presentation

A History of Computers

An Image/Link below is provided (as is) to download presentation Download Policy: Content on the Website is provided to you AS IS for your information and personal use and may not be sold / licensed / shared on other websites without getting consent from its author. Content is provided to you AS IS for your information and personal use only. Download presentation by click this link. While downloading, if for some reason you are not able to download a presentation, the publisher may have deleted the file from their server. During download, if you can't get a presentation, the file might be deleted by the publisher.

E N D

Presentation Transcript


  1. A History of Computers By Emma Bryan 3rd Period Computers

  2. ComputerTimeline 4) 1982; 5) 1982 1) 1946 2) 1976 7) 1990 9) 2005 3) 1980 6) 1984 8) 1995 10) 2011 • In February 1946, J. Presper Eckert and John Mauchly unveiled, for the first time, an electronic computer to the world. • The invention of the Apple I in 1976 • On January 3, 1980, Hewlett Packard introduces its HP-85 (A microcomputer with 16kB of RAM and a 5-inch CRT display). • Disney releases the movie Tron on July 9, 1982, the first movie to use computer generated special effects • 1982: Microsoft establishes an additional headquarters in England to begin foreign sales efforts. • The game Tetris is first released in June 6, 1984. • 1990: Microsoft exceeds $1 billion in sales and becomes the first company to do so • Yahoo.com domain is registered on January 18, 1995 • The first YouTube video entitled "Me at the zoo" is uploaded April 23, 2005 • Steve Jobs resigns as Apple's CEO due to health reasons on August 24, 2011

  3. A bit (8 bits = one byte)1024 bytes = one kilobyte • K = kilobyte • Kb = kilobit • MB = megabyte • Mb = megabit • MB/s = megabytes per second • Mb/s = megabits per second • Bps = bits per second Random Access Memory (RAM) is the best known form of computer memory. RAM is considered "random access" because you can access any memory cell directly if you know the row and column that intersect at that cell.

  4. Creator of the Laptop Henry Edward Roberts invented the first personal computer (PC). Dr Roberts was the founder of Micro Instrumentation and Telemetry Systems (MITS), originally set up to sell electronics kits to model rocket hobbyists. The company went on to sell electronic calculator kits, but was soon overshadowed by bigger firms. In the mid-1970's, with the firm struggling with debt, Dr Roberts began to develop a computer kit for hobbyists. The result was the Altair 8800, a machine operated by switches and with no display. Designed in 1979 by a Briton, William Moggridge, for Grid Systems Corporation, the Grid Compass was one fifth the weight of any model equivalent in performance and was used by NASA on the space shuttle program in the early 1980's. A 340K byte bubble memory lap-top computer with die-cast magnesium case and folding electroluminescent graphics displayscreen. Creator of the PC

  5. Viruses, Worms and the Trojan Horse Viruses - A virus is a small piece of software that piggybacks on real programs. For example, a virus might attach itself to a program such as a spreadsheet program. Each time the spreadsheet program runs, the virus runs, too, and it has the chance to reproduce (by attaching to other programs) Trojan Horse - A destructive program that masquerades as a benign application. Unlike viruses, Trojan horses do not replicate themselves but they can be just as destructive. One of the most insidious types of Trojan horse is a program that claims to rid your computer of viruses but instead introduces viruses onto your computer. Worms - A worm is a small piece of software that uses computer networks and security holes to replicate itself. A copy of the worm scans the network for another machine that has a specific security hole. It copies itself to the new machine using the security hole, and then starts replicating from there, as well.

  6. Companies & Their Founders HP Bill Hewlett and Dave Packard founded HP (Hewlett-Packard) in 1939 IBM Founded in 1891 by Thomas J. Watson Dell Dell was founded in 1984 by Michael Dell Apple Founded by Steve Jobs in 1976 Toshiba 1875 by Hisashige Tanaka

  7. Sources • http://www.zerocut.com/tech/c_terms.html • http://kb.iu.edu/data/ahty.html • http://www.apple.com/pr/bios/steve-jobs.html • http://www.instablogsimages.com/images • http://arstechnica.com/did-ibm-invent-the-personal-computer • http://news.bbc.co.uk/2/hi/technology/8600493.stm • http://www.howstuffworks.com/virus.htm • http://www.nndb.com/company/700/000042574/ • http://www.toshiba.co.jp/worldwide/about/history.html

More Related