1 / 10

Computer History

Computer History. By Pedro Viramontes 3 rd Period 9-19-11. Important Events In Time. (1937) Alan Turing develops the concept of a theoretical computing machine.

Download Presentation

Computer History

An Image/Link below is provided (as is) to download presentation Download Policy: Content on the Website is provided to you AS IS for your information and personal use and may not be sold / licensed / shared on other websites without getting consent from its author. Content is provided to you AS IS for your information and personal use only. Download presentation by click this link. While downloading, if for some reason you are not able to download a presentation, the publisher may have deleted the file from their server. During download, if you can't get a presentation, the file might be deleted by the publisher.

E N D

Presentation Transcript


  1. Computer History By Pedro Viramontes 3rd Period 9-19-11

  2. Important Events In Time • (1937) Alan Turing develops the concept of a theoretical computing machine. • (1939) George Stibitz develops the Complex Number Calculator - a foundation for digital computers. • (1947) Douglas Engelbart theorises on interactive computing with keyboard and screen display instead of on punchcards . • (1949) Claude Shannon builds the first machine that plays chess. • (1950) The first electronic computer is created in Japan by Hideo Yamachito.

  3. [1955] Bell Labs introduces its first transistor computer. • [1956] Optical fiber was invented by  Basil Hirschowitz, C. Wilbur Peters, and Lawrence E. Curtiss • [1960] The Common Business-Oriented Language (COBOL) programming language is invented. • [1961] General Motors puts the first industrial robot, Unimate, to work in a New Jersey factory. • [1962] The first computer game Spacewar Computer Game invented BY Steve Russell & MIT

  4. All 10 Terms · 1000 Bytes = 1 Kilobyte · 1000 Kilobytes = 1 Megabyte · 1000 Megabytes = 1 Gigabyte · 1000 Gigabytes = 1 Terabyte · 1000 Terabytes = 1 Petabyte · 1000 Petabytes = 1 Exabyte· 1000 Exabytes = 1 Zettabyte · 1000 Zettabytes = 1 Yottabyte · 1000 Yottabytes = 1 Brontobyte RAM: Pronouncedramm, acronym for random access memory, a type of computer memory that can be accessed randomly; that is, any byte of memory can be accessed without touching the preceding bytes. RAM is the most common type of memory found in computers and other devices, such as printers.

  5. First PC Invented In 1938, Konrad Zuse invented a computer based around electromechanical relays: The Z3. This computer was the first to use binary instead of decimals In 1937, Howard Aiken developed a programmable computer 17 metres long and 2.5 metres high, which could calculate 5 times faster than a human. It was IBM's Mark I. It was built using 3300 gears and 1400 switches linked with 800 km of electrical wiring.

  6. First Laptop Invented The history of the laptop sends us back in April 1976, when Xerox PARC developed the first portable computer prototype called Xerox NoteTaker. It never reached mass production but it was the inspiration source for the first commercially available notebook. Xerox NoteTaker was designed by Alan Key, Adele Goldberg, Douglas Fairbairn, and Larry Tesler. It featured a built-in monochrome display monitor, 128K 8-bit memory, 1MHz processing speed, a floppy disk drive, foldable keyboard and a mouse, using the Smalltalk operating system. The weight was of 22 Kg and the production costs were incredibly high, reaching $50,000, at the time of introduction.

  7. Virus, Worm, Trojan Horse Virus: A segment of self-replicating code planted illegally in a computer program, often to damage or shut down a system or network. Worm: A worm is similar to a virus by design and is considered to be a sub-class of a virus. Worms spread from computer to computer, but unlike a virus, it has the capability to travel without any human action. A worm takes advantage of file or information transport features on your system, which is what allows it to travel unaided. Trojan Horse: A Trojan Horse is full of as much trickery as the mythological Trojan Horse it was named after. The Trojan Horse, at first glance will appear to be useful software but will actually do damage once installed or run on your computer.  Those on the receiving end of a Trojan Horse are usually tricked into opening them because they appear to be receiving legitimate software or files from a legitimate source.

  8. Top 5 Computer Companies • Apple - Steve Wozniak • HP – Hewlett Packard • Dell – Michael Dell • Toshiba - Hisashige Tanaka, Ichisuke Fujioka, Shoichi Miyoshi • IBM- Thomas J. Watson

  9. Bibliography • http://www.history-timelines.org.uk/events-timelines/07-computer-history-timeline.htm • http://www.whatsabyte.com/ • http://www.webopedia.com/TERM/R/RAM.html • http://en.kioskea.net/contents/histoire/ordinateur.php3 • http://www.google.com/images

  10. Computer Ideas I think that in the future they will have solar powered laptops so you can take it on long trips and be able to recharge without a chord.

More Related