SlideShare a Scribd company logo
1 of 11
COMPUTER

    20090239

    ENG 204

GÜLŞEN HÜSEYİN

MUSTAFA DOLMACI
The history of computer science began long before the
modern discipline of computer science that emerged in the
20th century, and hinted at in the centuries prior
progression, from mechanical inventions
and mathematical theories towards the modern concepts
and machines, formed a major academic field
   The earliest known tool for use in computation was
    the abacus, developed in period 2700–2300 BC
    in Sumer. The Sumerians' abacus consisted of a table
    of successive columns which delimited the successive
    orders of magnitude of their sexagesimal number
    system.[2] Its original style of usage was by lines drawn
    in sand with pebbles. Abaci of a more modern design
    are still used as calculation tools today.
Binary logic
   In 1703, Gottfried Leibnitz developed logic in a formal,
    mathematical sense with his writings on the binary
    numeral system. In his system, the ones and zeros also
    represent true and false values or onand off states. But
    it took more than a century before George
    Boole published his Boolean algebra in 1854 with a
    complete system that allowed computational processes
    to be mathematically modeled.
   By this time, the first mechanical devices driven by a
    binary pattern had been invented. The industrial
    revolution had driven forward the mechanization of
    many tasks, and this included weaving. Punched
    cards controlled Joseph Marie Jacquard's loom in 1801,
    where a hole punched in the card indicated a
    binary one and an unpunched spot indicated a
    binary zero. Jacquard's loom was far from being a
    computer, but it did illustrate that machines could be
    driven by binary systems.
Birth of computer science
 Before the 1920s, computers (sometimes computors)
  were human clerks that performed computations. They
  were usually under the lead of a physicist. Many
  thousands of computers were employed in commerce,
  government, and research establishments. Most of
  these computers were women, and they were known to
  have a degree in calculus. Some performed
  astronomical calculations for calendars.
   After the 1920s, the expression computing
    machine referred to any machine that performed the
    work of a human computer, especially those in
    accordance with effective methods of the Church-Turing
    thesis. The thesis states that a mathematical method is
    effective if it could be set out as a list of instructions able
    to be followed by a human clerk with paper and pencil,
    for as long as necessary, and without ingenuity or
    insight.
   Machines that computed with continuous values
    became known as the analog kind. They used
    machinery that represented continuous numeric
    quantities, like the angle of a shaft rotation or difference
    in electrical potential.
Wiener and Cybernetics
   From experiments with anti-aircraft systems that
    interpreted radar images to detect enemy
    planes,Norbert Wiener coined the term cybernetics from
    the Greek word for "steersman." He published
    "Cybernetics" in 1948, which influenced artificial
    intelligence. Wiener also compared computation,
    computing machinery, memory devices, and other
    cognitive similarities with his analysis of brain waves.
   The first actual computer bug was a moth. It was stuck
    in between the relays on the Harvard Mark II.[1] While
    the invention of the term 'bug' is often but erroneously
    attributed to Grace Hopper, a future rear admiral in the
    U.S. Navy, who supposedly logged the "bug" on
    September 9, 1945, most other accounts conflict at least
    with these details. According to these accounts, the
    actual date was September 9, 1947 when operators filed
    this 'incident' — along with the insect and the notation
    "First actual case of bug being found.
   REFERENCES

http://en.wikipedia.org/wiki/History_of_computer_science

More Related Content

What's hot (9)

History of computers
History of computersHistory of computers
History of computers
 
History of computers
History of computersHistory of computers
History of computers
 
history & ages of computer
history & ages of computerhistory & ages of computer
history & ages of computer
 
Evolu
EvoluEvolu
Evolu
 
Evolu
EvoluEvolu
Evolu
 
Evolution of computers
Evolution  of computersEvolution  of computers
Evolution of computers
 
Computers project 1
Computers project 1Computers project 1
Computers project 1
 
History of computers
History of computersHistory of computers
History of computers
 
History of Computers
History of ComputersHistory of Computers
History of Computers
 

Similar to Computer hıstory

sejarah komputer dari awal sampai saat ini
sejarah komputer dari awal sampai saat inisejarah komputer dari awal sampai saat ini
sejarah komputer dari awal sampai saat iniNisSan25
 
HISTORY OF COMPUTER.karl baroquillo.pptx
HISTORY OF COMPUTER.karl baroquillo.pptxHISTORY OF COMPUTER.karl baroquillo.pptx
HISTORY OF COMPUTER.karl baroquillo.pptxKarlBaroquillo
 
History-of-Computers (1).pdf
History-of-Computers (1).pdfHistory-of-Computers (1).pdf
History-of-Computers (1).pdfGerthieEspaola1
 
A computer project work of RK SRIVASTAV
A computer project work of  RK SRIVASTAVA computer project work of  RK SRIVASTAV
A computer project work of RK SRIVASTAVRKSRIVASTAV2
 
Highlights in Computer History
Highlights in Computer HistoryHighlights in Computer History
Highlights in Computer HistoryBuffalo Seminary
 
introduction to computer science
introduction to computer science introduction to computer science
introduction to computer science umardanjumamaiwada
 
The Five Generations of Computers
The Five Generations of ComputersThe Five Generations of Computers
The Five Generations of Computersimtiazalijoono
 
Generation of computers
Generation of computersGeneration of computers
Generation of computerssilent_scream
 
Introduction to computer science
Introduction to computer scienceIntroduction to computer science
Introduction to computer scienceumardanjumamaiwada
 
introduction to Computer system
introduction to Computer systemintroduction to Computer system
introduction to Computer systemumardanjumamaiwada
 
History evaluation
History evaluationHistory evaluation
History evaluationXad Kuain
 
GEE-LIE LIVING IN THE IT ERA (FOUR BASIC COMPUTER PERIODS).pdf
GEE-LIE LIVING IN THE IT ERA (FOUR BASIC COMPUTER PERIODS).pdfGEE-LIE LIVING IN THE IT ERA (FOUR BASIC COMPUTER PERIODS).pdf
GEE-LIE LIVING IN THE IT ERA (FOUR BASIC COMPUTER PERIODS).pdfAteKuya2
 
Assignment (a sel)
Assignment (a sel)Assignment (a sel)
Assignment (a sel)Krizelle012
 
Assignment (asel)
Assignment (asel)Assignment (asel)
Assignment (asel)Krizelle012
 
Assignment in T.L.E
Assignment in T.L.EAssignment in T.L.E
Assignment in T.L.EKrizelle012
 

Similar to Computer hıstory (20)

sejarah komputer dari awal sampai saat ini
sejarah komputer dari awal sampai saat inisejarah komputer dari awal sampai saat ini
sejarah komputer dari awal sampai saat ini
 
HISTORY OF COMPUTER.karl baroquillo.pptx
HISTORY OF COMPUTER.karl baroquillo.pptxHISTORY OF COMPUTER.karl baroquillo.pptx
HISTORY OF COMPUTER.karl baroquillo.pptx
 
best buy computer.pdf
best buy computer.pdfbest buy computer.pdf
best buy computer.pdf
 
History-of-Computers (1).pdf
History-of-Computers (1).pdfHistory-of-Computers (1).pdf
History-of-Computers (1).pdf
 
A computer project work of RK SRIVASTAV
A computer project work of  RK SRIVASTAVA computer project work of  RK SRIVASTAV
A computer project work of RK SRIVASTAV
 
Highlights in Computer History
Highlights in Computer HistoryHighlights in Computer History
Highlights in Computer History
 
Computer accessories
Computer accessoriesComputer accessories
Computer accessories
 
introduction to computer science
introduction to computer science introduction to computer science
introduction to computer science
 
The Five Generations of Computers
The Five Generations of ComputersThe Five Generations of Computers
The Five Generations of Computers
 
Generation of computers
Generation of computersGeneration of computers
Generation of computers
 
Computer History
Computer HistoryComputer History
Computer History
 
History of computers_h
History of computers_hHistory of computers_h
History of computers_h
 
Introduction to computer science
Introduction to computer scienceIntroduction to computer science
Introduction to computer science
 
introduction to Computer system
introduction to Computer systemintroduction to Computer system
introduction to Computer system
 
lecture 1
lecture 1lecture 1
lecture 1
 
History evaluation
History evaluationHistory evaluation
History evaluation
 
GEE-LIE LIVING IN THE IT ERA (FOUR BASIC COMPUTER PERIODS).pdf
GEE-LIE LIVING IN THE IT ERA (FOUR BASIC COMPUTER PERIODS).pdfGEE-LIE LIVING IN THE IT ERA (FOUR BASIC COMPUTER PERIODS).pdf
GEE-LIE LIVING IN THE IT ERA (FOUR BASIC COMPUTER PERIODS).pdf
 
Assignment (a sel)
Assignment (a sel)Assignment (a sel)
Assignment (a sel)
 
Assignment (asel)
Assignment (asel)Assignment (asel)
Assignment (asel)
 
Assignment in T.L.E
Assignment in T.L.EAssignment in T.L.E
Assignment in T.L.E
 

More from Musdafa Dolmacı (12)

Mustafa dolmacı
Mustafa dolmacıMustafa dolmacı
Mustafa dolmacı
 
Wordde tablo yartma
Wordde tablo yartmaWordde tablo yartma
Wordde tablo yartma
 
Computer history
Computer historyComputer history
Computer history
 
Computer hıstory
Computer hıstoryComputer hıstory
Computer hıstory
 
Computer hıstory
Computer hıstoryComputer hıstory
Computer hıstory
 
Computer hıstory
Computer hıstoryComputer hıstory
Computer hıstory
 
Computer hıstory
Computer hıstoryComputer hıstory
Computer hıstory
 
Computer hıstory
Computer hıstoryComputer hıstory
Computer hıstory
 
Computer hıstory
Computer hıstoryComputer hıstory
Computer hıstory
 
Computer hıstory
Computer hıstoryComputer hıstory
Computer hıstory
 
Computer hıstory
Computer hıstoryComputer hıstory
Computer hıstory
 
Computer hıstory
Computer hıstoryComputer hıstory
Computer hıstory
 

Recently uploaded

08448380779 Call Girls In Greater Kailash - I Women Seeking Men
08448380779 Call Girls In Greater Kailash - I Women Seeking Men08448380779 Call Girls In Greater Kailash - I Women Seeking Men
08448380779 Call Girls In Greater Kailash - I Women Seeking MenDelhi Call girls
 
Powerful Google developer tools for immediate impact! (2023-24 C)
Powerful Google developer tools for immediate impact! (2023-24 C)Powerful Google developer tools for immediate impact! (2023-24 C)
Powerful Google developer tools for immediate impact! (2023-24 C)wesley chun
 
Automating Google Workspace (GWS) & more with Apps Script
Automating Google Workspace (GWS) & more with Apps ScriptAutomating Google Workspace (GWS) & more with Apps Script
Automating Google Workspace (GWS) & more with Apps Scriptwesley chun
 
Handwritten Text Recognition for manuscripts and early printed texts
Handwritten Text Recognition for manuscripts and early printed textsHandwritten Text Recognition for manuscripts and early printed texts
Handwritten Text Recognition for manuscripts and early printed textsMaria Levchenko
 
A Domino Admins Adventures (Engage 2024)
A Domino Admins Adventures (Engage 2024)A Domino Admins Adventures (Engage 2024)
A Domino Admins Adventures (Engage 2024)Gabriella Davis
 
Factors to Consider When Choosing Accounts Payable Services Providers.pptx
Factors to Consider When Choosing Accounts Payable Services Providers.pptxFactors to Consider When Choosing Accounts Payable Services Providers.pptx
Factors to Consider When Choosing Accounts Payable Services Providers.pptxKatpro Technologies
 
08448380779 Call Girls In Civil Lines Women Seeking Men
08448380779 Call Girls In Civil Lines Women Seeking Men08448380779 Call Girls In Civil Lines Women Seeking Men
08448380779 Call Girls In Civil Lines Women Seeking MenDelhi Call girls
 
Exploring the Future Potential of AI-Enabled Smartphone Processors
Exploring the Future Potential of AI-Enabled Smartphone ProcessorsExploring the Future Potential of AI-Enabled Smartphone Processors
Exploring the Future Potential of AI-Enabled Smartphone Processorsdebabhi2
 
TrustArc Webinar - Stay Ahead of US State Data Privacy Law Developments
TrustArc Webinar - Stay Ahead of US State Data Privacy Law DevelopmentsTrustArc Webinar - Stay Ahead of US State Data Privacy Law Developments
TrustArc Webinar - Stay Ahead of US State Data Privacy Law DevelopmentsTrustArc
 
Histor y of HAM Radio presentation slide
Histor y of HAM Radio presentation slideHistor y of HAM Radio presentation slide
Histor y of HAM Radio presentation slidevu2urc
 
Boost Fertility New Invention Ups Success Rates.pdf
Boost Fertility New Invention Ups Success Rates.pdfBoost Fertility New Invention Ups Success Rates.pdf
Boost Fertility New Invention Ups Success Rates.pdfsudhanshuwaghmare1
 
Workshop - Best of Both Worlds_ Combine KG and Vector search for enhanced R...
Workshop - Best of Both Worlds_ Combine  KG and Vector search for  enhanced R...Workshop - Best of Both Worlds_ Combine  KG and Vector search for  enhanced R...
Workshop - Best of Both Worlds_ Combine KG and Vector search for enhanced R...Neo4j
 
The Role of Taxonomy and Ontology in Semantic Layers - Heather Hedden.pdf
The Role of Taxonomy and Ontology in Semantic Layers - Heather Hedden.pdfThe Role of Taxonomy and Ontology in Semantic Layers - Heather Hedden.pdf
The Role of Taxonomy and Ontology in Semantic Layers - Heather Hedden.pdfEnterprise Knowledge
 
Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...
Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...
Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...Drew Madelung
 
Breaking the Kubernetes Kill Chain: Host Path Mount
Breaking the Kubernetes Kill Chain: Host Path MountBreaking the Kubernetes Kill Chain: Host Path Mount
Breaking the Kubernetes Kill Chain: Host Path MountPuma Security, LLC
 
How to convert PDF to text with Nanonets
How to convert PDF to text with NanonetsHow to convert PDF to text with Nanonets
How to convert PDF to text with Nanonetsnaman860154
 
How to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected WorkerHow to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected WorkerThousandEyes
 
Scaling API-first – The story of a global engineering organization
Scaling API-first – The story of a global engineering organizationScaling API-first – The story of a global engineering organization
Scaling API-first – The story of a global engineering organizationRadu Cotescu
 
04-2024-HHUG-Sales-and-Marketing-Alignment.pptx
04-2024-HHUG-Sales-and-Marketing-Alignment.pptx04-2024-HHUG-Sales-and-Marketing-Alignment.pptx
04-2024-HHUG-Sales-and-Marketing-Alignment.pptxHampshireHUG
 
Tata AIG General Insurance Company - Insurer Innovation Award 2024
Tata AIG General Insurance Company - Insurer Innovation Award 2024Tata AIG General Insurance Company - Insurer Innovation Award 2024
Tata AIG General Insurance Company - Insurer Innovation Award 2024The Digital Insurer
 

Recently uploaded (20)

08448380779 Call Girls In Greater Kailash - I Women Seeking Men
08448380779 Call Girls In Greater Kailash - I Women Seeking Men08448380779 Call Girls In Greater Kailash - I Women Seeking Men
08448380779 Call Girls In Greater Kailash - I Women Seeking Men
 
Powerful Google developer tools for immediate impact! (2023-24 C)
Powerful Google developer tools for immediate impact! (2023-24 C)Powerful Google developer tools for immediate impact! (2023-24 C)
Powerful Google developer tools for immediate impact! (2023-24 C)
 
Automating Google Workspace (GWS) & more with Apps Script
Automating Google Workspace (GWS) & more with Apps ScriptAutomating Google Workspace (GWS) & more with Apps Script
Automating Google Workspace (GWS) & more with Apps Script
 
Handwritten Text Recognition for manuscripts and early printed texts
Handwritten Text Recognition for manuscripts and early printed textsHandwritten Text Recognition for manuscripts and early printed texts
Handwritten Text Recognition for manuscripts and early printed texts
 
A Domino Admins Adventures (Engage 2024)
A Domino Admins Adventures (Engage 2024)A Domino Admins Adventures (Engage 2024)
A Domino Admins Adventures (Engage 2024)
 
Factors to Consider When Choosing Accounts Payable Services Providers.pptx
Factors to Consider When Choosing Accounts Payable Services Providers.pptxFactors to Consider When Choosing Accounts Payable Services Providers.pptx
Factors to Consider When Choosing Accounts Payable Services Providers.pptx
 
08448380779 Call Girls In Civil Lines Women Seeking Men
08448380779 Call Girls In Civil Lines Women Seeking Men08448380779 Call Girls In Civil Lines Women Seeking Men
08448380779 Call Girls In Civil Lines Women Seeking Men
 
Exploring the Future Potential of AI-Enabled Smartphone Processors
Exploring the Future Potential of AI-Enabled Smartphone ProcessorsExploring the Future Potential of AI-Enabled Smartphone Processors
Exploring the Future Potential of AI-Enabled Smartphone Processors
 
TrustArc Webinar - Stay Ahead of US State Data Privacy Law Developments
TrustArc Webinar - Stay Ahead of US State Data Privacy Law DevelopmentsTrustArc Webinar - Stay Ahead of US State Data Privacy Law Developments
TrustArc Webinar - Stay Ahead of US State Data Privacy Law Developments
 
Histor y of HAM Radio presentation slide
Histor y of HAM Radio presentation slideHistor y of HAM Radio presentation slide
Histor y of HAM Radio presentation slide
 
Boost Fertility New Invention Ups Success Rates.pdf
Boost Fertility New Invention Ups Success Rates.pdfBoost Fertility New Invention Ups Success Rates.pdf
Boost Fertility New Invention Ups Success Rates.pdf
 
Workshop - Best of Both Worlds_ Combine KG and Vector search for enhanced R...
Workshop - Best of Both Worlds_ Combine  KG and Vector search for  enhanced R...Workshop - Best of Both Worlds_ Combine  KG and Vector search for  enhanced R...
Workshop - Best of Both Worlds_ Combine KG and Vector search for enhanced R...
 
The Role of Taxonomy and Ontology in Semantic Layers - Heather Hedden.pdf
The Role of Taxonomy and Ontology in Semantic Layers - Heather Hedden.pdfThe Role of Taxonomy and Ontology in Semantic Layers - Heather Hedden.pdf
The Role of Taxonomy and Ontology in Semantic Layers - Heather Hedden.pdf
 
Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...
Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...
Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...
 
Breaking the Kubernetes Kill Chain: Host Path Mount
Breaking the Kubernetes Kill Chain: Host Path MountBreaking the Kubernetes Kill Chain: Host Path Mount
Breaking the Kubernetes Kill Chain: Host Path Mount
 
How to convert PDF to text with Nanonets
How to convert PDF to text with NanonetsHow to convert PDF to text with Nanonets
How to convert PDF to text with Nanonets
 
How to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected WorkerHow to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected Worker
 
Scaling API-first – The story of a global engineering organization
Scaling API-first – The story of a global engineering organizationScaling API-first – The story of a global engineering organization
Scaling API-first – The story of a global engineering organization
 
04-2024-HHUG-Sales-and-Marketing-Alignment.pptx
04-2024-HHUG-Sales-and-Marketing-Alignment.pptx04-2024-HHUG-Sales-and-Marketing-Alignment.pptx
04-2024-HHUG-Sales-and-Marketing-Alignment.pptx
 
Tata AIG General Insurance Company - Insurer Innovation Award 2024
Tata AIG General Insurance Company - Insurer Innovation Award 2024Tata AIG General Insurance Company - Insurer Innovation Award 2024
Tata AIG General Insurance Company - Insurer Innovation Award 2024
 

Computer hıstory

  • 1. COMPUTER 20090239 ENG 204 GÜLŞEN HÜSEYİN MUSTAFA DOLMACI
  • 2. The history of computer science began long before the modern discipline of computer science that emerged in the 20th century, and hinted at in the centuries prior progression, from mechanical inventions and mathematical theories towards the modern concepts and machines, formed a major academic field
  • 3. The earliest known tool for use in computation was the abacus, developed in period 2700–2300 BC in Sumer. The Sumerians' abacus consisted of a table of successive columns which delimited the successive orders of magnitude of their sexagesimal number system.[2] Its original style of usage was by lines drawn in sand with pebbles. Abaci of a more modern design are still used as calculation tools today.
  • 4. Binary logic  In 1703, Gottfried Leibnitz developed logic in a formal, mathematical sense with his writings on the binary numeral system. In his system, the ones and zeros also represent true and false values or onand off states. But it took more than a century before George Boole published his Boolean algebra in 1854 with a complete system that allowed computational processes to be mathematically modeled.
  • 5. By this time, the first mechanical devices driven by a binary pattern had been invented. The industrial revolution had driven forward the mechanization of many tasks, and this included weaving. Punched cards controlled Joseph Marie Jacquard's loom in 1801, where a hole punched in the card indicated a binary one and an unpunched spot indicated a binary zero. Jacquard's loom was far from being a computer, but it did illustrate that machines could be driven by binary systems.
  • 6. Birth of computer science  Before the 1920s, computers (sometimes computors) were human clerks that performed computations. They were usually under the lead of a physicist. Many thousands of computers were employed in commerce, government, and research establishments. Most of these computers were women, and they were known to have a degree in calculus. Some performed astronomical calculations for calendars.
  • 7. After the 1920s, the expression computing machine referred to any machine that performed the work of a human computer, especially those in accordance with effective methods of the Church-Turing thesis. The thesis states that a mathematical method is effective if it could be set out as a list of instructions able to be followed by a human clerk with paper and pencil, for as long as necessary, and without ingenuity or insight.
  • 8. Machines that computed with continuous values became known as the analog kind. They used machinery that represented continuous numeric quantities, like the angle of a shaft rotation or difference in electrical potential.
  • 9. Wiener and Cybernetics  From experiments with anti-aircraft systems that interpreted radar images to detect enemy planes,Norbert Wiener coined the term cybernetics from the Greek word for "steersman." He published "Cybernetics" in 1948, which influenced artificial intelligence. Wiener also compared computation, computing machinery, memory devices, and other cognitive similarities with his analysis of brain waves.
  • 10. The first actual computer bug was a moth. It was stuck in between the relays on the Harvard Mark II.[1] While the invention of the term 'bug' is often but erroneously attributed to Grace Hopper, a future rear admiral in the U.S. Navy, who supposedly logged the "bug" on September 9, 1945, most other accounts conflict at least with these details. According to these accounts, the actual date was September 9, 1947 when operators filed this 'incident' — along with the insect and the notation "First actual case of bug being found.
  • 11. REFERENCES http://en.wikipedia.org/wiki/History_of_computer_science