1 / 32

Welcome to

Sunbury Downs College. Welcome to. IT Applications & Software Development 2008. 1937 war is feared. The rush is on to develop an electric computer to calculate flight trajectories for gun shells and bombs. 1937 war is feared.

verdi
Download Presentation

Welcome to

An Image/Link below is provided (as is) to download presentation Download Policy: Content on the Website is provided to you AS IS for your information and personal use and may not be sold / licensed / shared on other websites without getting consent from its author. Content is provided to you AS IS for your information and personal use only. Download presentation by click this link. While downloading, if for some reason you are not able to download a presentation, the publisher may have deleted the file from their server. During download, if you can't get a presentation, the file might be deleted by the publisher.

E N D

Presentation Transcript


  1. Sunbury Downs College Welcome to IT Applications & Software Development 2008

  2. 1937 war is feared. The rush is on to develop an electric computer to calculate flight trajectories for gun shells and bombs.

  3. 1937 war is feared. The rush is on to develop an electric computer to calculate flight trajectories for gun shells and bombs.

  4. 1937 war is feared. The rush is on to develop an electric computer to calculate flight trajectories for gun shells and bombs.

  5. 1937 war is feared. The rush is on to develop an electric computer to calculate flight trajectories for gun shells and bombs.

  6. 1937 war is feared. The rush is on to develop an electric computer to calculate flight trajectories for gun shells and bombs.

  7. 1937 war is feared. The rush is on to develop an electric computer to calculate flight trajectories for gun shells and bombs.

  8. 1937 war is feared. The rush is on to develop an electric computer to calculate flight trajectories for gun shells and bombs.

  9. 1937 war is feared. The rush is on to develop an electric computer to calculate flight trajectories for gun shells and bombs.

  10. 1937 war is feared. The rush is on to develop an electric computer to calculate flight trajectories for gun shells and bombs.

  11. 1937 war is feared. The rush is on to develop an electric computer to calculate flight trajectories for gun shells and bombs.

  12. 1937 war is feared. The rush is on to develop an electric computer to calculate flight trajectories for gun shells and bombs. Why? It took the computers (female workers) three days to compute the trajectory of a shell that took 30 seconds to get to its target.

  13. 1944-1945 The first computers are working • ENIAC in the USA (Eckert & Mauchly) • Colossus in England (Alan Turing) • CSIRAC in Australia (CSIRO) See it at Scienceworks! ENIAC did the trajectory calculation in 5 seconds

  14. Software – program Hardware People Ergonomic workstation? Healthy, safe work environment? ENIAC

  15. Computers are simple Based on switches that control the flow of electricity – electrons to be precise. • Switch on – electricity flows • Switch off – no electricity flow On/off, yes/no, true/false, 1/0 binary number system used off,on,on,off,off 6 = 00110 on,on,off,on,on 27 = 11011 This is machine code- what the computer understands

  16. switches

  17. Assembly language • Some words eg ADD, SUB, MUL, DVD • Assembler converts to machine code High level Programming languages FORTRAN –scientific equations COBOL – businesswords BASIC – general purpose Easier to write instructions. Compiled (translated) into machine language First DEO Data entry operator

  18. 1952 “There may be a world market for five computers” CEO of IBM

  19. The transistor arrives! Brattain, Bardeen, Shockley 1947 – production late 50s

  20. An I.C. Chips! transistor bus switch

  21. The prediction was wrong or was it fair dinkum?

  22. Joke Joyce! • Shows how easily you can fool people Another example,

  23. Computer ethics Don’t • use a computer to harm others • interfere with other people’s computer work • snoop around in other people’s files • use a computer to steal

  24. Computer ethics Don’t • use a computer to bear false witness • copy or use proprietary software you haven’t paid for • use other people’s computer resources without authorisation • take others’ intellectual output

  25. Computer ethics Do • think about the social consequences of the program you are writing or the system you are designing • Always ensure consideration and respect for your fellow humans

  26. And re AI and robots Asimov’s laws • A robot may not injure a human or, through inaction, allow a human to be harmed • A robot must obey the orders of humans except where they conflict with 1st law • A robot must protect its own existence so long as this doesn’t conflict with 1st and 2nd laws

  27. VCE IT • Robots, AI, big computers, desktops, laptops, palmtops, mobile phones are all parts of information systems • All require programs & applications to make them useful • These studies are about IS, applications and programming. • They’re challenging and great fun!

  28. to the future smart mobile phones  computers in a pocket wearable computers PDAs, phones, cameras in one package smart clothes – wearing computers

  29. interplanetary communications?

  30. Lots of IT problems to solve on Earth

More Related