SlideShare a Scribd company logo
1 of 11
COMPUTER

    20090239

    ENG 204

GÜLŞEN HÜSEYİN

MUSTAFA DOLMACI
The history of computer science began long before the
modern discipline of computer science that emerged in the
20th century, and hinted at in the centuries prior
progression, from mechanical inventions
and mathematical theories towards the modern concepts
and machines, formed a major academic field
   The earliest known tool for use in computation was
    the abacus, developed in period 2700–2300 BC
    in Sumer. The Sumerians' abacus consisted of a table
    of successive columns which delimited the successive
    orders of magnitude of their sexagesimal number
    system.[2] Its original style of usage was by lines drawn
    in sand with pebbles. Abaci of a more modern design
    are still used as calculation tools today.
Binary logic
   In 1703, Gottfried Leibnitz developed logic in a
    formal, mathematical sense with his writings on the
    binary numeral system. In his system, the ones and
    zeros also represent true and false values
    or onand off states. But it took more than a century
    before George Boole published his Boolean algebra in
    1854 with a complete system that allowed computational
    processes to be mathematically modeled.
   By this time, the first mechanical devices driven by a
    binary pattern had been invented. The industrial
    revolution had driven forward the mechanization of
    many tasks, and this included weaving. Punched
    cards controlled Joseph Marie Jacquard's loom in
    1801, where a hole punched in the card indicated a
    binary one and an unpunched spot indicated a
    binary zero. Jacquard's loom was far from being a
    computer, but it did illustrate that machines could be
    driven by binary systems.
Birth of computer science
 Before the 1920s, computers (sometimes computors)
  were human clerks that performed computations. They
  were usually under the lead of a physicist. Many
  thousands of computers were employed in
  commerce, government, and research establishments.
  Most of these computers were women, and they were
  known to have a degree in calculus. Some performed
  astronomical calculations for calendars.
   After the 1920s, the expression computing
    machine referred to any machine that performed the
    work of a human computer, especially those in
    accordance with effective methods of the Church-Turing
    thesis. The thesis states that a mathematical method is
    effective if it could be set out as a list of instructions able
    to be followed by a human clerk with paper and
    pencil, for as long as necessary, and without ingenuity or
    insight.
   Machines that computed with continuous values
    became known as the analog kind. They used
    machinery that represented continuous numeric
    quantities, like the angle of a shaft rotation or difference
    in electrical potential.
Wiener and Cybernetics
   From experiments with anti-aircraft systems that
    interpreted radar images to detect enemy
    planes,Norbert Wiener coined the term cybernetics from
    the Greek word for "steersman." He published
    "Cybernetics" in 1948, which influenced artificial
    intelligence. Wiener also
    compared computation, computing
    machinery, memory devices, and other cognitive
    similarities with his analysis of brain waves.
   The first actual computer bug was a moth. It was stuck
    in between the relays on the Harvard Mark II.[1] While
    the invention of the term 'bug' is often but erroneously
    attributed to Grace Hopper, a future rear admiral in the
    U.S. Navy, who supposedly logged the "bug" on
    September 9, 1945, most other accounts conflict at least
    with these details. According to these accounts, the
    actual date was September 9, 1947 when operators filed
    this 'incident' — along with the insect and the notation
    "First actual case of bug being found.
   REFERENCES

http://en.wikipedia.org/wiki/History_of_computer_science

More Related Content

What's hot

What's hot (11)

Introduction to Computing Lecture 01 history of computers
Introduction to Computing Lecture 01 history of computersIntroduction to Computing Lecture 01 history of computers
Introduction to Computing Lecture 01 history of computers
 
History of computers
History of computersHistory of computers
History of computers
 
history & ages of computer
history & ages of computerhistory & ages of computer
history & ages of computer
 
History of computers
History of computersHistory of computers
History of computers
 
Evolu
EvoluEvolu
Evolu
 
Evolu
EvoluEvolu
Evolu
 
Evolution of computers
Evolution  of computersEvolution  of computers
Evolution of computers
 
History of computers
History of computersHistory of computers
History of computers
 
History of Computers
History of ComputersHistory of Computers
History of Computers
 
Introduction To Computer and Early Calculating Devices
Introduction To Computer and Early Calculating DevicesIntroduction To Computer and Early Calculating Devices
Introduction To Computer and Early Calculating Devices
 
Computers project 1
Computers project 1Computers project 1
Computers project 1
 

Viewers also liked

プロボノプロジェクト成功のポイント
プロボノプロジェクト成功のポイント プロボノプロジェクト成功のポイント
プロボノプロジェクト成功のポイント
Etsuko Nagayama
 
04.2010 0306 kato_yukikohbr
04.2010 0306 kato_yukikohbr04.2010 0306 kato_yukikohbr
04.2010 0306 kato_yukikohbr
Living in Peace
 
Globalinx Japanese Newsletter Spring 2012
Globalinx Japanese Newsletter Spring 2012Globalinx Japanese Newsletter Spring 2012
Globalinx Japanese Newsletter Spring 2012
GLOBALINX CORP
 
ToolStone: Effective Use of The Physical Manipulation Vocabularies of Input D...
ToolStone: Effective Use of The Physical Manipulation Vocabularies of Input D...ToolStone: Effective Use of The Physical Manipulation Vocabularies of Input D...
ToolStone: Effective Use of The Physical Manipulation Vocabularies of Input D...
Jun Rekimoto
 
Commercial Entities Information Overview
Commercial Entities Information OverviewCommercial Entities Information Overview
Commercial Entities Information Overview
Brian_Jorris
 
ヤドノマド紹介用
ヤドノマド紹介用ヤドノマド紹介用
ヤドノマド紹介用
Etsuko Nagayama
 
21sept2009 Isp Student Demo
21sept2009 Isp Student Demo21sept2009 Isp Student Demo
21sept2009 Isp Student Demo
culturelestudies
 
Final presentation elizabeth narváez cardona
Final presentation elizabeth narváez cardonaFinal presentation elizabeth narváez cardona
Final presentation elizabeth narváez cardona
enarvaez2009
 
No007-01-Suc3rum-20091125
No007-01-Suc3rum-20091125No007-01-Suc3rum-20091125
No007-01-Suc3rum-20091125
Sukusuku Scrum
 

Viewers also liked (20)

17.2010 0908 securite
17.2010 0908 securite17.2010 0908 securite
17.2010 0908 securite
 
プロボノプロジェクト成功のポイント
プロボノプロジェクト成功のポイント プロボノプロジェクト成功のポイント
プロボノプロジェクト成功のポイント
 
What's Operating System?
What's Operating System?What's Operating System?
What's Operating System?
 
Amazon.com
Amazon.comAmazon.com
Amazon.com
 
Lips
LipsLips
Lips
 
Projecte ISAD
Projecte ISADProjecte ISAD
Projecte ISAD
 
Will's VA Desk Procedures Examples
Will's VA Desk Procedures ExamplesWill's VA Desk Procedures Examples
Will's VA Desk Procedures Examples
 
シブヤ横断ウルトラクイズ!Webライティング編
シブヤ横断ウルトラクイズ!Webライティング編シブヤ横断ウルトラクイズ!Webライティング編
シブヤ横断ウルトラクイズ!Webライティング編
 
オンライン スピードくじ
オンライン スピードくじオンライン スピードくじ
オンライン スピードくじ
 
Presentation1
Presentation1Presentation1
Presentation1
 
04.2010 0306 kato_yukikohbr
04.2010 0306 kato_yukikohbr04.2010 0306 kato_yukikohbr
04.2010 0306 kato_yukikohbr
 
Globalinx Japanese Newsletter Spring 2012
Globalinx Japanese Newsletter Spring 2012Globalinx Japanese Newsletter Spring 2012
Globalinx Japanese Newsletter Spring 2012
 
ToolStone: Effective Use of The Physical Manipulation Vocabularies of Input D...
ToolStone: Effective Use of The Physical Manipulation Vocabularies of Input D...ToolStone: Effective Use of The Physical Manipulation Vocabularies of Input D...
ToolStone: Effective Use of The Physical Manipulation Vocabularies of Input D...
 
Commercial Entities Information Overview
Commercial Entities Information OverviewCommercial Entities Information Overview
Commercial Entities Information Overview
 
ヤドノマド紹介用
ヤドノマド紹介用ヤドノマド紹介用
ヤドノマド紹介用
 
Coordinating Publicly Funded Behavioral Health and Physical Health Services: ...
Coordinating Publicly Funded Behavioral Health and Physical Health Services: ...Coordinating Publicly Funded Behavioral Health and Physical Health Services: ...
Coordinating Publicly Funded Behavioral Health and Physical Health Services: ...
 
21sept2009 Isp Student Demo
21sept2009 Isp Student Demo21sept2009 Isp Student Demo
21sept2009 Isp Student Demo
 
Final presentation elizabeth narváez cardona
Final presentation elizabeth narváez cardonaFinal presentation elizabeth narváez cardona
Final presentation elizabeth narváez cardona
 
"Юскутум" Мобилизация (правовые аспекты)
"Юскутум" Мобилизация (правовые аспекты)"Юскутум" Мобилизация (правовые аспекты)
"Юскутум" Мобилизация (правовые аспекты)
 
No007-01-Suc3rum-20091125
No007-01-Suc3rum-20091125No007-01-Suc3rum-20091125
No007-01-Suc3rum-20091125
 

Similar to Computer hıstory

Highlights in Computer History
Highlights in Computer HistoryHighlights in Computer History
Highlights in Computer History
Buffalo Seminary
 
Generation of computers
Generation of computersGeneration of computers
Generation of computers
silent_scream
 
Assignment (a sel)
Assignment (a sel)Assignment (a sel)
Assignment (a sel)
Krizelle012
 
Assignment (asel)
Assignment (asel)Assignment (asel)
Assignment (asel)
Krizelle012
 

Similar to Computer hıstory (20)

sejarah komputer dari awal sampai saat ini
sejarah komputer dari awal sampai saat inisejarah komputer dari awal sampai saat ini
sejarah komputer dari awal sampai saat ini
 
HISTORY OF COMPUTER.karl baroquillo.pptx
HISTORY OF COMPUTER.karl baroquillo.pptxHISTORY OF COMPUTER.karl baroquillo.pptx
HISTORY OF COMPUTER.karl baroquillo.pptx
 
best buy computer.pdf
best buy computer.pdfbest buy computer.pdf
best buy computer.pdf
 
History-of-Computers (1).pdf
History-of-Computers (1).pdfHistory-of-Computers (1).pdf
History-of-Computers (1).pdf
 
A computer project work of RK SRIVASTAV
A computer project work of  RK SRIVASTAVA computer project work of  RK SRIVASTAV
A computer project work of RK SRIVASTAV
 
Highlights in Computer History
Highlights in Computer HistoryHighlights in Computer History
Highlights in Computer History
 
Computer accessories
Computer accessoriesComputer accessories
Computer accessories
 
Generation of computers
Generation of computersGeneration of computers
Generation of computers
 
introduction to computer science
introduction to computer science introduction to computer science
introduction to computer science
 
The Five Generations of Computers
The Five Generations of ComputersThe Five Generations of Computers
The Five Generations of Computers
 
Computer History
Computer HistoryComputer History
Computer History
 
History evaluation
History evaluationHistory evaluation
History evaluation
 
History of computers_h
History of computers_hHistory of computers_h
History of computers_h
 
Introduction to computer science
Introduction to computer scienceIntroduction to computer science
Introduction to computer science
 
lecture 1
lecture 1lecture 1
lecture 1
 
introduction to Computer system
introduction to Computer systemintroduction to Computer system
introduction to Computer system
 
GEE-LIE LIVING IN THE IT ERA (FOUR BASIC COMPUTER PERIODS).pdf
GEE-LIE LIVING IN THE IT ERA (FOUR BASIC COMPUTER PERIODS).pdfGEE-LIE LIVING IN THE IT ERA (FOUR BASIC COMPUTER PERIODS).pdf
GEE-LIE LIVING IN THE IT ERA (FOUR BASIC COMPUTER PERIODS).pdf
 
Assignment in T.L.E
Assignment in T.L.EAssignment in T.L.E
Assignment in T.L.E
 
Assignment (a sel)
Assignment (a sel)Assignment (a sel)
Assignment (a sel)
 
Assignment (asel)
Assignment (asel)Assignment (asel)
Assignment (asel)
 

More from Musdafa Dolmacı (11)

Mustafa dolmacı
Mustafa dolmacıMustafa dolmacı
Mustafa dolmacı
 
Wordde tablo yartma
Wordde tablo yartmaWordde tablo yartma
Wordde tablo yartma
 
Computer history
Computer historyComputer history
Computer history
 
Computer hıstory
Computer hıstoryComputer hıstory
Computer hıstory
 
Computer hıstory
Computer hıstoryComputer hıstory
Computer hıstory
 
Computer hıstory
Computer hıstoryComputer hıstory
Computer hıstory
 
Computer hıstory
Computer hıstoryComputer hıstory
Computer hıstory
 
Computer hıstory
Computer hıstoryComputer hıstory
Computer hıstory
 
Computer hıstory
Computer hıstoryComputer hıstory
Computer hıstory
 
Computer hıstory
Computer hıstoryComputer hıstory
Computer hıstory
 
Computer hıstory
Computer hıstoryComputer hıstory
Computer hıstory
 

Recently uploaded

Cloud Frontiers: A Deep Dive into Serverless Spatial Data and FME
Cloud Frontiers:  A Deep Dive into Serverless Spatial Data and FMECloud Frontiers:  A Deep Dive into Serverless Spatial Data and FME
Cloud Frontiers: A Deep Dive into Serverless Spatial Data and FME
Safe Software
 

Recently uploaded (20)

Web Form Automation for Bonterra Impact Management (fka Social Solutions Apri...
Web Form Automation for Bonterra Impact Management (fka Social Solutions Apri...Web Form Automation for Bonterra Impact Management (fka Social Solutions Apri...
Web Form Automation for Bonterra Impact Management (fka Social Solutions Apri...
 
Decarbonising Commercial Real Estate: The Role of Operational Performance
Decarbonising Commercial Real Estate: The Role of Operational PerformanceDecarbonising Commercial Real Estate: The Role of Operational Performance
Decarbonising Commercial Real Estate: The Role of Operational Performance
 
Rising Above_ Dubai Floods and the Fortitude of Dubai International Airport.pdf
Rising Above_ Dubai Floods and the Fortitude of Dubai International Airport.pdfRising Above_ Dubai Floods and the Fortitude of Dubai International Airport.pdf
Rising Above_ Dubai Floods and the Fortitude of Dubai International Airport.pdf
 
Less Is More: Utilizing Ballerina to Architect a Cloud Data Platform
Less Is More: Utilizing Ballerina to Architect a Cloud Data PlatformLess Is More: Utilizing Ballerina to Architect a Cloud Data Platform
Less Is More: Utilizing Ballerina to Architect a Cloud Data Platform
 
AI+A11Y 11MAY2024 HYDERBAD GAAD 2024 - HelloA11Y (11 May 2024)
AI+A11Y 11MAY2024 HYDERBAD GAAD 2024 - HelloA11Y (11 May 2024)AI+A11Y 11MAY2024 HYDERBAD GAAD 2024 - HelloA11Y (11 May 2024)
AI+A11Y 11MAY2024 HYDERBAD GAAD 2024 - HelloA11Y (11 May 2024)
 
Navigating Identity and Access Management in the Modern Enterprise
Navigating Identity and Access Management in the Modern EnterpriseNavigating Identity and Access Management in the Modern Enterprise
Navigating Identity and Access Management in the Modern Enterprise
 
[BuildWithAI] Introduction to Gemini.pdf
[BuildWithAI] Introduction to Gemini.pdf[BuildWithAI] Introduction to Gemini.pdf
[BuildWithAI] Introduction to Gemini.pdf
 
Connector Corner: Accelerate revenue generation using UiPath API-centric busi...
Connector Corner: Accelerate revenue generation using UiPath API-centric busi...Connector Corner: Accelerate revenue generation using UiPath API-centric busi...
Connector Corner: Accelerate revenue generation using UiPath API-centric busi...
 
Cloud Frontiers: A Deep Dive into Serverless Spatial Data and FME
Cloud Frontiers:  A Deep Dive into Serverless Spatial Data and FMECloud Frontiers:  A Deep Dive into Serverless Spatial Data and FME
Cloud Frontiers: A Deep Dive into Serverless Spatial Data and FME
 
MINDCTI Revenue Release Quarter One 2024
MINDCTI Revenue Release Quarter One 2024MINDCTI Revenue Release Quarter One 2024
MINDCTI Revenue Release Quarter One 2024
 
Introduction to Multilingual Retrieval Augmented Generation (RAG)
Introduction to Multilingual Retrieval Augmented Generation (RAG)Introduction to Multilingual Retrieval Augmented Generation (RAG)
Introduction to Multilingual Retrieval Augmented Generation (RAG)
 
Elevate Developer Efficiency & build GenAI Application with Amazon Q​
Elevate Developer Efficiency & build GenAI Application with Amazon Q​Elevate Developer Efficiency & build GenAI Application with Amazon Q​
Elevate Developer Efficiency & build GenAI Application with Amazon Q​
 
Understanding the FAA Part 107 License ..
Understanding the FAA Part 107 License ..Understanding the FAA Part 107 License ..
Understanding the FAA Part 107 License ..
 
Stronger Together: Developing an Organizational Strategy for Accessible Desig...
Stronger Together: Developing an Organizational Strategy for Accessible Desig...Stronger Together: Developing an Organizational Strategy for Accessible Desig...
Stronger Together: Developing an Organizational Strategy for Accessible Desig...
 
DEV meet-up UiPath Document Understanding May 7 2024 Amsterdam
DEV meet-up UiPath Document Understanding May 7 2024 AmsterdamDEV meet-up UiPath Document Understanding May 7 2024 Amsterdam
DEV meet-up UiPath Document Understanding May 7 2024 Amsterdam
 
Navigating the Deluge_ Dubai Floods and the Resilience of Dubai International...
Navigating the Deluge_ Dubai Floods and the Resilience of Dubai International...Navigating the Deluge_ Dubai Floods and the Resilience of Dubai International...
Navigating the Deluge_ Dubai Floods and the Resilience of Dubai International...
 
DBX First Quarter 2024 Investor Presentation
DBX First Quarter 2024 Investor PresentationDBX First Quarter 2024 Investor Presentation
DBX First Quarter 2024 Investor Presentation
 
WSO2 Micro Integrator for Enterprise Integration in a Decentralized, Microser...
WSO2 Micro Integrator for Enterprise Integration in a Decentralized, Microser...WSO2 Micro Integrator for Enterprise Integration in a Decentralized, Microser...
WSO2 Micro Integrator for Enterprise Integration in a Decentralized, Microser...
 
Design and Development of a Provenance Capture Platform for Data Science
Design and Development of a Provenance Capture Platform for Data ScienceDesign and Development of a Provenance Capture Platform for Data Science
Design and Development of a Provenance Capture Platform for Data Science
 
Repurposing LNG terminals for Hydrogen Ammonia: Feasibility and Cost Saving
Repurposing LNG terminals for Hydrogen Ammonia: Feasibility and Cost SavingRepurposing LNG terminals for Hydrogen Ammonia: Feasibility and Cost Saving
Repurposing LNG terminals for Hydrogen Ammonia: Feasibility and Cost Saving
 

Computer hıstory

  • 1. COMPUTER 20090239 ENG 204 GÜLŞEN HÜSEYİN MUSTAFA DOLMACI
  • 2. The history of computer science began long before the modern discipline of computer science that emerged in the 20th century, and hinted at in the centuries prior progression, from mechanical inventions and mathematical theories towards the modern concepts and machines, formed a major academic field
  • 3. The earliest known tool for use in computation was the abacus, developed in period 2700–2300 BC in Sumer. The Sumerians' abacus consisted of a table of successive columns which delimited the successive orders of magnitude of their sexagesimal number system.[2] Its original style of usage was by lines drawn in sand with pebbles. Abaci of a more modern design are still used as calculation tools today.
  • 4. Binary logic  In 1703, Gottfried Leibnitz developed logic in a formal, mathematical sense with his writings on the binary numeral system. In his system, the ones and zeros also represent true and false values or onand off states. But it took more than a century before George Boole published his Boolean algebra in 1854 with a complete system that allowed computational processes to be mathematically modeled.
  • 5. By this time, the first mechanical devices driven by a binary pattern had been invented. The industrial revolution had driven forward the mechanization of many tasks, and this included weaving. Punched cards controlled Joseph Marie Jacquard's loom in 1801, where a hole punched in the card indicated a binary one and an unpunched spot indicated a binary zero. Jacquard's loom was far from being a computer, but it did illustrate that machines could be driven by binary systems.
  • 6. Birth of computer science  Before the 1920s, computers (sometimes computors) were human clerks that performed computations. They were usually under the lead of a physicist. Many thousands of computers were employed in commerce, government, and research establishments. Most of these computers were women, and they were known to have a degree in calculus. Some performed astronomical calculations for calendars.
  • 7. After the 1920s, the expression computing machine referred to any machine that performed the work of a human computer, especially those in accordance with effective methods of the Church-Turing thesis. The thesis states that a mathematical method is effective if it could be set out as a list of instructions able to be followed by a human clerk with paper and pencil, for as long as necessary, and without ingenuity or insight.
  • 8. Machines that computed with continuous values became known as the analog kind. They used machinery that represented continuous numeric quantities, like the angle of a shaft rotation or difference in electrical potential.
  • 9. Wiener and Cybernetics  From experiments with anti-aircraft systems that interpreted radar images to detect enemy planes,Norbert Wiener coined the term cybernetics from the Greek word for "steersman." He published "Cybernetics" in 1948, which influenced artificial intelligence. Wiener also compared computation, computing machinery, memory devices, and other cognitive similarities with his analysis of brain waves.
  • 10. The first actual computer bug was a moth. It was stuck in between the relays on the Harvard Mark II.[1] While the invention of the term 'bug' is often but erroneously attributed to Grace Hopper, a future rear admiral in the U.S. Navy, who supposedly logged the "bug" on September 9, 1945, most other accounts conflict at least with these details. According to these accounts, the actual date was September 9, 1947 when operators filed this 'incident' — along with the insect and the notation "First actual case of bug being found.
  • 11. REFERENCES http://en.wikipedia.org/wiki/History_of_computer_science