SlideShare a Scribd company logo
The H i
st
ory of
C om puters
What is a computer?
Monitor
Floppy Disk Drive
System Unit
Keyboard
CD-ROM /
DVD-ROM Drive
Mouse
A computer is an electronic machine that accepts information
(Data), processes it according to specific instructions, and
provides the results as new information.
I- Ancient Counting Machines
1- The Abacus (base 5)
(in ancient Babylon,
China, Europe)
VII VIII IX X
2- The Roman Numerals
I II III IV V VI
3- The Arabic Numerals (base 10)
0 1 2 3 4 5 6 7 8 9 10
Ancient
Time
II- Mechanical Counting Machines
4- The Pascaline is a mechanical calculating
device invented by the French philosopher and
mathematician Blaise Pascal in 1642. (+)
1642
II- Mechanical Counting Machines
1673
5- The Leibniz Wheel was invented by the
famous mathematician Leibniz in 1673.
( + , - , * , / )
II- Mechanical Counting Machines
6- Punched Cards were used by the French
weaver Joseph Jacquard in 1810. The cards
carried weaving instructions for the looms, later
this idea offered a great use for storing info.
1810
II- Mechanical Counting Machines
7- Babbage’s Difference
Engines were
calculating machines
made by Charles
Babbage to produce
tables of numbers
that would be used
by ship’s navigators.
1852
1832
This device had mechanical problems similar to
those that plagued Pascal and Leibniz.
The Invention of the
Vacuum Tube
8- Initially discovered by
Thomas Edison, the
vacuum tube formed the
building block for the
entire electronics industry.
*Vacuum tubes were later
used as electron valves in
the 20th century to build
the first electronic
computers.
1883
III- Electrical Counting Machines
cards instead of mechanical gears.
9- The US census of the
1880 took 9 years to
compile and led to
inaccurate figures. To
solve the problem,
Herman Hollerith
invented a calculating
machine that used
electricity
along with punched
1888
III- Electrical Counting Machines
• Hollerith’s machine was immensely successful.
The general count of the population, then 63
million, took only 6 weeks to calculate!
• Based on the success of his invention, Herman
Hollerith and some friends formed a company
that sold his invention all over the world. The
company eventually became known as:
International Business Machines IBM
1888
II- Mechanical Counting Machines
10- A partial working
model of Babbage’s
Analytical Engine was
completed in 1910 by
his son… used
punched cards to store
numbers. The design
was no more
successful than its
predecessors.
1910
III- Electrical Counting Machines
11- MARK I was built by a team from IBM and
Harvard University. Mark I used mechanical
telephone switches to store information. It
accepted data on punched cards, processed it
and then output the new data.
1943
51 feet long and weighed over 5 tons
IV- Electronic Counting Machines
12- The ENIAC was the first US-built all-
electronic computer built to perform ballistics
calculations. (Away from IBM)
1946
IV- Electronic Counting Machines
* It was 1000X faster than Mark I, but it drew
a lot of power that dimmed the lights of
Philadelphia when it was switched on due to
the use of Vacuum Tubes.
* Mark I: 5 Additions / sec.
* ENIAC: 5,000 Additions / sec.
* ENIAC was made of 18,000 vacuum tubes.
1946
IV- Electronic Counting Machines
ENIAC’s Problems:
1 short life of vacuum tubes
2 It runs a single program, which means
rewiring by a group of technicians is needed
to change the program!!!
Solution: the same group of researchers worked
on another version of ENIAC that can store
programs on punched cards that are much
easier to manage and they came up with: 
IV- Electronic Counting Machines
EDVAC (electronic Discrete Variable Automatic Computer)
(was never completed!)
13- UNIVAC (Universal Automatic Calculator)
forty of these computers were sold to
businesses. General Electric was the first
company to acquire a UNIVAC.
* The first UNIVACs were used in the US Army,
Air Force, Navy, and Atomic Energy
Commission.
1951
The Effect of World War II
1938
Back in time to the days of
war…
* During WWII, the German
Navy developed a cipher
machine named Enigma.
The Enigma machine could
automatically encode a
message in such a way that
only another Enigma
machine could read decode
it.
The Effect of World War II
1938
* In 1938 the Polish Secret Service managed to
steal an Enigma machine that was smuggled
to England.
* Secretly the British developed a computer
named Colossus that could decipher as many
as 2,000 messages per day. That computer
used Vacuum tubes and was the world’s first
entirely digital computer. Surprisingly, though
Colossus presented a similar technology to
that of ENIAC, it had only 2,400 compared to
18,000 in ENIAC!!!
Two Inventions that changed
the way computers are built!!
1946
1- The Transistor
The most significant single invention of
the modern era. It was invented by
3 scsientists at At&T’s Bell Labs.
One of the first overseas companies was a Japanese
company called Tokyo Telecommunications Laboratory. The
company had troubles paying the license fee ($25,000) that
company became in 1956 what’s called now Sony! it
replaced the Vacuum tube.
* Transistors are smaller (sometimes microscopic)
* Fast and don’t need to warm up
Transistors on a circuit board
Transistors
Capacitor
Resistors
Two Inventions that changed
the way computers are built!!
1961
The IC revolutionized the
entire electronic technology.
Ex: The Pentium Processor
contains 3.1 Million Transistors
in 1.5 inch square!
2- The (IC) Integrated Circuit
How the processor (CPU) is
placed on the Motherboard
Intel 486 CPU
RAM
1975 - 1981
The Altair The Apple I The Floppy
Disk
The Hard
Disk
MS-DOS
1981 - 1993
The IBM PC The Compaq
portable Computer
The Apple
Macintosh
MS-Windows 3.0 The Pentium
Chip
Intel Pentium Processors
PENTIUM
PENTIUM II
PENTIUM Pro

More Related Content

Similar to 1st week history-of-computers.pptx

Introduction to computer science
Introduction to computer scienceIntroduction to computer science
Introduction to computer sciencederekoei
 
IT315B
IT315BIT315B
IT315B
earl86
 
Computer History
Computer HistoryComputer History
Computer History
Norie Jhon Canoy
 
Highlights in Computer History
Highlights in Computer HistoryHighlights in Computer History
Highlights in Computer HistoryBuffalo Seminary
 
Computer history & evaluation
Computer history & evaluationComputer history & evaluation
Computer history & evaluation
Fazil Ahamed
 
Computer History
Computer HistoryComputer History
Computer History
Crystal Cunningham
 
Short History of Computer
Short History of ComputerShort History of Computer
Short History of Computer
Haseeb Ahmed Awan
 
CST 20363-Session 1.2-A Brief History of Computing
CST 20363-Session 1.2-A Brief History of ComputingCST 20363-Session 1.2-A Brief History of Computing
CST 20363-Session 1.2-A Brief History of Computing
oudesign
 
History of computers_h
History of computers_hHistory of computers_h
History of computers_h
vishnu pachauri
 
The evolution of the computers
The evolution of the computersThe evolution of the computers
The evolution of the computers
Stephan Nick Beloo
 
Generation of computers
Generation of computersGeneration of computers
Generation of computerssilent_scream
 
History evaluation
History evaluationHistory evaluation
History evaluation
Xad Kuain
 
evolution of computer.pptx
evolution of computer.pptxevolution of computer.pptx
evolution of computer.pptx
DexterAndrade2
 
Convergence of technologies
Convergence of technologiesConvergence of technologies
Convergence of technologies
IndhumathiCVM
 
Timeline of Computer History
Timeline of Computer HistoryTimeline of Computer History
Timeline of Computer History
wizbee
 
Evolution of computer_1448075245
Evolution of computer_1448075245Evolution of computer_1448075245
Evolution of computer_1448075245
May Andrea Francia
 

Similar to 1st week history-of-computers.pptx (20)

Introduction to computer science
Introduction to computer scienceIntroduction to computer science
Introduction to computer science
 
History of computer
History of computerHistory of computer
History of computer
 
IT315B
IT315BIT315B
IT315B
 
Computer History
Computer HistoryComputer History
Computer History
 
Highlights in Computer History
Highlights in Computer HistoryHighlights in Computer History
Highlights in Computer History
 
Computer history & evaluation
Computer history & evaluationComputer history & evaluation
Computer history & evaluation
 
Computer History
Computer HistoryComputer History
Computer History
 
Short History of Computer
Short History of ComputerShort History of Computer
Short History of Computer
 
History of computer 08
History of computer 08History of computer 08
History of computer 08
 
CST 20363-Session 1.2-A Brief History of Computing
CST 20363-Session 1.2-A Brief History of ComputingCST 20363-Session 1.2-A Brief History of Computing
CST 20363-Session 1.2-A Brief History of Computing
 
History of computers_h
History of computers_hHistory of computers_h
History of computers_h
 
The evolution of the computers
The evolution of the computersThe evolution of the computers
The evolution of the computers
 
History of Computers
History of ComputersHistory of Computers
History of Computers
 
Computer story
Computer storyComputer story
Computer story
 
Generation of computers
Generation of computersGeneration of computers
Generation of computers
 
History evaluation
History evaluationHistory evaluation
History evaluation
 
evolution of computer.pptx
evolution of computer.pptxevolution of computer.pptx
evolution of computer.pptx
 
Convergence of technologies
Convergence of technologiesConvergence of technologies
Convergence of technologies
 
Timeline of Computer History
Timeline of Computer HistoryTimeline of Computer History
Timeline of Computer History
 
Evolution of computer_1448075245
Evolution of computer_1448075245Evolution of computer_1448075245
Evolution of computer_1448075245
 

More from JohnPeterPaulGarces

noah-131122164236-phpapp01.pdf
noah-131122164236-phpapp01.pdfnoah-131122164236-phpapp01.pdf
noah-131122164236-phpapp01.pdf
JohnPeterPaulGarces
 
powerpoint-tutorial-23224.pdf
powerpoint-tutorial-23224.pdfpowerpoint-tutorial-23224.pdf
powerpoint-tutorial-23224.pdf
JohnPeterPaulGarces
 
computerlabrulesandregulations-150615134746-lva1-app6892.pdf
computerlabrulesandregulations-150615134746-lva1-app6892.pdfcomputerlabrulesandregulations-150615134746-lva1-app6892.pdf
computerlabrulesandregulations-150615134746-lva1-app6892.pdf
JohnPeterPaulGarces
 
Lessons from Jonah.pptx
Lessons from Jonah.pptxLessons from Jonah.pptx
Lessons from Jonah.pptx
JohnPeterPaulGarces
 
how does a computer works.pptx
how does a computer works.pptxhow does a computer works.pptx
how does a computer works.pptx
JohnPeterPaulGarces
 
inputandoutputdevices-170914200150.pdf
inputandoutputdevices-170914200150.pdfinputandoutputdevices-170914200150.pdf
inputandoutputdevices-170914200150.pdf
JohnPeterPaulGarces
 
5senses.pptx
5senses.pptx5senses.pptx
5senses.pptx
JohnPeterPaulGarces
 
personalcomputer2-150307084110-conversion-gate01.pdf
personalcomputer2-150307084110-conversion-gate01.pdfpersonalcomputer2-150307084110-conversion-gate01.pdf
personalcomputer2-150307084110-conversion-gate01.pdf
JohnPeterPaulGarces
 
living things, mamacu yan.pptx
living things, mamacu yan.pptxliving things, mamacu yan.pptx
living things, mamacu yan.pptx
JohnPeterPaulGarces
 
educationtechnology11-200119125929.pdf
educationtechnology11-200119125929.pdfeducationtechnology11-200119125929.pdf
educationtechnology11-200119125929.pdf
JohnPeterPaulGarces
 
buildingapc-140831103031-phpapp01.pdf
buildingapc-140831103031-phpapp01.pdfbuildingapc-140831103031-phpapp01.pdf
buildingapc-140831103031-phpapp01.pdf
JohnPeterPaulGarces
 
partsofaplant-powerpoint micah 2.pptx
partsofaplant-powerpoint micah 2.pptxpartsofaplant-powerpoint micah 2.pptx
partsofaplant-powerpoint micah 2.pptx
JohnPeterPaulGarces
 
mouse-201203131835.pdf
mouse-201203131835.pdfmouse-201203131835.pdf
mouse-201203131835.pdf
JohnPeterPaulGarces
 
mouse-201203131835.pdf
mouse-201203131835.pdfmouse-201203131835.pdf
mouse-201203131835.pdf
JohnPeterPaulGarces
 
2ndgrdngpptgr-200124051724.pdf
2ndgrdngpptgr-200124051724.pdf2ndgrdngpptgr-200124051724.pdf
2ndgrdngpptgr-200124051724.pdf
JohnPeterPaulGarces
 
plants-partsandneeds micah1.pptx
plants-partsandneeds micah1.pptxplants-partsandneeds micah1.pptx
plants-partsandneeds micah1.pptx
JohnPeterPaulGarces
 
5senses-150227060907-conversion-gate01.pdf
5senses-150227060907-conversion-gate01.pdf5senses-150227060907-conversion-gate01.pdf
5senses-150227060907-conversion-gate01.pdf
JohnPeterPaulGarces
 
5senses-150227060907-conversion-gate01.pdf
5senses-150227060907-conversion-gate01.pdf5senses-150227060907-conversion-gate01.pdf
5senses-150227060907-conversion-gate01.pdf
JohnPeterPaulGarces
 
5senses-090428105837-phpapp02.pdf
5senses-090428105837-phpapp02.pdf5senses-090428105837-phpapp02.pdf
5senses-090428105837-phpapp02.pdf
JohnPeterPaulGarces
 
microsoftwordbasics2-180418053428.pdf
microsoftwordbasics2-180418053428.pdfmicrosoftwordbasics2-180418053428.pdf
microsoftwordbasics2-180418053428.pdf
JohnPeterPaulGarces
 

More from JohnPeterPaulGarces (20)

noah-131122164236-phpapp01.pdf
noah-131122164236-phpapp01.pdfnoah-131122164236-phpapp01.pdf
noah-131122164236-phpapp01.pdf
 
powerpoint-tutorial-23224.pdf
powerpoint-tutorial-23224.pdfpowerpoint-tutorial-23224.pdf
powerpoint-tutorial-23224.pdf
 
computerlabrulesandregulations-150615134746-lva1-app6892.pdf
computerlabrulesandregulations-150615134746-lva1-app6892.pdfcomputerlabrulesandregulations-150615134746-lva1-app6892.pdf
computerlabrulesandregulations-150615134746-lva1-app6892.pdf
 
Lessons from Jonah.pptx
Lessons from Jonah.pptxLessons from Jonah.pptx
Lessons from Jonah.pptx
 
how does a computer works.pptx
how does a computer works.pptxhow does a computer works.pptx
how does a computer works.pptx
 
inputandoutputdevices-170914200150.pdf
inputandoutputdevices-170914200150.pdfinputandoutputdevices-170914200150.pdf
inputandoutputdevices-170914200150.pdf
 
5senses.pptx
5senses.pptx5senses.pptx
5senses.pptx
 
personalcomputer2-150307084110-conversion-gate01.pdf
personalcomputer2-150307084110-conversion-gate01.pdfpersonalcomputer2-150307084110-conversion-gate01.pdf
personalcomputer2-150307084110-conversion-gate01.pdf
 
living things, mamacu yan.pptx
living things, mamacu yan.pptxliving things, mamacu yan.pptx
living things, mamacu yan.pptx
 
educationtechnology11-200119125929.pdf
educationtechnology11-200119125929.pdfeducationtechnology11-200119125929.pdf
educationtechnology11-200119125929.pdf
 
buildingapc-140831103031-phpapp01.pdf
buildingapc-140831103031-phpapp01.pdfbuildingapc-140831103031-phpapp01.pdf
buildingapc-140831103031-phpapp01.pdf
 
partsofaplant-powerpoint micah 2.pptx
partsofaplant-powerpoint micah 2.pptxpartsofaplant-powerpoint micah 2.pptx
partsofaplant-powerpoint micah 2.pptx
 
mouse-201203131835.pdf
mouse-201203131835.pdfmouse-201203131835.pdf
mouse-201203131835.pdf
 
mouse-201203131835.pdf
mouse-201203131835.pdfmouse-201203131835.pdf
mouse-201203131835.pdf
 
2ndgrdngpptgr-200124051724.pdf
2ndgrdngpptgr-200124051724.pdf2ndgrdngpptgr-200124051724.pdf
2ndgrdngpptgr-200124051724.pdf
 
plants-partsandneeds micah1.pptx
plants-partsandneeds micah1.pptxplants-partsandneeds micah1.pptx
plants-partsandneeds micah1.pptx
 
5senses-150227060907-conversion-gate01.pdf
5senses-150227060907-conversion-gate01.pdf5senses-150227060907-conversion-gate01.pdf
5senses-150227060907-conversion-gate01.pdf
 
5senses-150227060907-conversion-gate01.pdf
5senses-150227060907-conversion-gate01.pdf5senses-150227060907-conversion-gate01.pdf
5senses-150227060907-conversion-gate01.pdf
 
5senses-090428105837-phpapp02.pdf
5senses-090428105837-phpapp02.pdf5senses-090428105837-phpapp02.pdf
5senses-090428105837-phpapp02.pdf
 
microsoftwordbasics2-180418053428.pdf
microsoftwordbasics2-180418053428.pdfmicrosoftwordbasics2-180418053428.pdf
microsoftwordbasics2-180418053428.pdf
 

Recently uploaded

Mind map of terminologies used in context of Generative AI
Mind map of terminologies used in context of Generative AIMind map of terminologies used in context of Generative AI
Mind map of terminologies used in context of Generative AI
Kumud Singh
 
How to Get CNIC Information System with Paksim Ga.pptx
How to Get CNIC Information System with Paksim Ga.pptxHow to Get CNIC Information System with Paksim Ga.pptx
How to Get CNIC Information System with Paksim Ga.pptx
danishmna97
 
Observability Concepts EVERY Developer Should Know -- DeveloperWeek Europe.pdf
Observability Concepts EVERY Developer Should Know -- DeveloperWeek Europe.pdfObservability Concepts EVERY Developer Should Know -- DeveloperWeek Europe.pdf
Observability Concepts EVERY Developer Should Know -- DeveloperWeek Europe.pdf
Paige Cruz
 
GridMate - End to end testing is a critical piece to ensure quality and avoid...
GridMate - End to end testing is a critical piece to ensure quality and avoid...GridMate - End to end testing is a critical piece to ensure quality and avoid...
GridMate - End to end testing is a critical piece to ensure quality and avoid...
ThomasParaiso2
 
GraphSummit Singapore | The Art of the Possible with Graph - Q2 2024
GraphSummit Singapore | The Art of the  Possible with Graph - Q2 2024GraphSummit Singapore | The Art of the  Possible with Graph - Q2 2024
GraphSummit Singapore | The Art of the Possible with Graph - Q2 2024
Neo4j
 
RESUME BUILDER APPLICATION Project for students
RESUME BUILDER APPLICATION Project for studentsRESUME BUILDER APPLICATION Project for students
RESUME BUILDER APPLICATION Project for students
KAMESHS29
 
FIDO Alliance Osaka Seminar: The WebAuthn API and Discoverable Credentials.pdf
FIDO Alliance Osaka Seminar: The WebAuthn API and Discoverable Credentials.pdfFIDO Alliance Osaka Seminar: The WebAuthn API and Discoverable Credentials.pdf
FIDO Alliance Osaka Seminar: The WebAuthn API and Discoverable Credentials.pdf
FIDO Alliance
 
みなさんこんにちはこれ何文字まで入るの?40文字以下不可とか本当に意味わからないけどこれ限界文字数書いてないからマジでやばい文字数いけるんじゃないの?えこ...
みなさんこんにちはこれ何文字まで入るの?40文字以下不可とか本当に意味わからないけどこれ限界文字数書いてないからマジでやばい文字数いけるんじゃないの?えこ...みなさんこんにちはこれ何文字まで入るの?40文字以下不可とか本当に意味わからないけどこれ限界文字数書いてないからマジでやばい文字数いけるんじゃないの?えこ...
みなさんこんにちはこれ何文字まで入るの?40文字以下不可とか本当に意味わからないけどこれ限界文字数書いてないからマジでやばい文字数いけるんじゃないの?えこ...
名前 です男
 
Climate Impact of Software Testing at Nordic Testing Days
Climate Impact of Software Testing at Nordic Testing DaysClimate Impact of Software Testing at Nordic Testing Days
Climate Impact of Software Testing at Nordic Testing Days
Kari Kakkonen
 
Encryption in Microsoft 365 - ExpertsLive Netherlands 2024
Encryption in Microsoft 365 - ExpertsLive Netherlands 2024Encryption in Microsoft 365 - ExpertsLive Netherlands 2024
Encryption in Microsoft 365 - ExpertsLive Netherlands 2024
Albert Hoitingh
 
Enchancing adoption of Open Source Libraries. A case study on Albumentations.AI
Enchancing adoption of Open Source Libraries. A case study on Albumentations.AIEnchancing adoption of Open Source Libraries. A case study on Albumentations.AI
Enchancing adoption of Open Source Libraries. A case study on Albumentations.AI
Vladimir Iglovikov, Ph.D.
 
Securing your Kubernetes cluster_ a step-by-step guide to success !
Securing your Kubernetes cluster_ a step-by-step guide to success !Securing your Kubernetes cluster_ a step-by-step guide to success !
Securing your Kubernetes cluster_ a step-by-step guide to success !
KatiaHIMEUR1
 
20240607 QFM018 Elixir Reading List May 2024
20240607 QFM018 Elixir Reading List May 202420240607 QFM018 Elixir Reading List May 2024
20240607 QFM018 Elixir Reading List May 2024
Matthew Sinclair
 
Video Streaming: Then, Now, and in the Future
Video Streaming: Then, Now, and in the FutureVideo Streaming: Then, Now, and in the Future
Video Streaming: Then, Now, and in the Future
Alpen-Adria-Universität
 
GDG Cloud Southlake #33: Boule & Rebala: Effective AppSec in SDLC using Deplo...
GDG Cloud Southlake #33: Boule & Rebala: Effective AppSec in SDLC using Deplo...GDG Cloud Southlake #33: Boule & Rebala: Effective AppSec in SDLC using Deplo...
GDG Cloud Southlake #33: Boule & Rebala: Effective AppSec in SDLC using Deplo...
James Anderson
 
National Security Agency - NSA mobile device best practices
National Security Agency - NSA mobile device best practicesNational Security Agency - NSA mobile device best practices
National Security Agency - NSA mobile device best practices
Quotidiano Piemontese
 
20240609 QFM020 Irresponsible AI Reading List May 2024
20240609 QFM020 Irresponsible AI Reading List May 202420240609 QFM020 Irresponsible AI Reading List May 2024
20240609 QFM020 Irresponsible AI Reading List May 2024
Matthew Sinclair
 
Uni Systems Copilot event_05062024_C.Vlachos.pdf
Uni Systems Copilot event_05062024_C.Vlachos.pdfUni Systems Copilot event_05062024_C.Vlachos.pdf
Uni Systems Copilot event_05062024_C.Vlachos.pdf
Uni Systems S.M.S.A.
 
Generative AI Deep Dive: Advancing from Proof of Concept to Production
Generative AI Deep Dive: Advancing from Proof of Concept to ProductionGenerative AI Deep Dive: Advancing from Proof of Concept to Production
Generative AI Deep Dive: Advancing from Proof of Concept to Production
Aggregage
 
GraphRAG is All You need? LLM & Knowledge Graph
GraphRAG is All You need? LLM & Knowledge GraphGraphRAG is All You need? LLM & Knowledge Graph
GraphRAG is All You need? LLM & Knowledge Graph
Guy Korland
 

Recently uploaded (20)

Mind map of terminologies used in context of Generative AI
Mind map of terminologies used in context of Generative AIMind map of terminologies used in context of Generative AI
Mind map of terminologies used in context of Generative AI
 
How to Get CNIC Information System with Paksim Ga.pptx
How to Get CNIC Information System with Paksim Ga.pptxHow to Get CNIC Information System with Paksim Ga.pptx
How to Get CNIC Information System with Paksim Ga.pptx
 
Observability Concepts EVERY Developer Should Know -- DeveloperWeek Europe.pdf
Observability Concepts EVERY Developer Should Know -- DeveloperWeek Europe.pdfObservability Concepts EVERY Developer Should Know -- DeveloperWeek Europe.pdf
Observability Concepts EVERY Developer Should Know -- DeveloperWeek Europe.pdf
 
GridMate - End to end testing is a critical piece to ensure quality and avoid...
GridMate - End to end testing is a critical piece to ensure quality and avoid...GridMate - End to end testing is a critical piece to ensure quality and avoid...
GridMate - End to end testing is a critical piece to ensure quality and avoid...
 
GraphSummit Singapore | The Art of the Possible with Graph - Q2 2024
GraphSummit Singapore | The Art of the  Possible with Graph - Q2 2024GraphSummit Singapore | The Art of the  Possible with Graph - Q2 2024
GraphSummit Singapore | The Art of the Possible with Graph - Q2 2024
 
RESUME BUILDER APPLICATION Project for students
RESUME BUILDER APPLICATION Project for studentsRESUME BUILDER APPLICATION Project for students
RESUME BUILDER APPLICATION Project for students
 
FIDO Alliance Osaka Seminar: The WebAuthn API and Discoverable Credentials.pdf
FIDO Alliance Osaka Seminar: The WebAuthn API and Discoverable Credentials.pdfFIDO Alliance Osaka Seminar: The WebAuthn API and Discoverable Credentials.pdf
FIDO Alliance Osaka Seminar: The WebAuthn API and Discoverable Credentials.pdf
 
みなさんこんにちはこれ何文字まで入るの?40文字以下不可とか本当に意味わからないけどこれ限界文字数書いてないからマジでやばい文字数いけるんじゃないの?えこ...
みなさんこんにちはこれ何文字まで入るの?40文字以下不可とか本当に意味わからないけどこれ限界文字数書いてないからマジでやばい文字数いけるんじゃないの?えこ...みなさんこんにちはこれ何文字まで入るの?40文字以下不可とか本当に意味わからないけどこれ限界文字数書いてないからマジでやばい文字数いけるんじゃないの?えこ...
みなさんこんにちはこれ何文字まで入るの?40文字以下不可とか本当に意味わからないけどこれ限界文字数書いてないからマジでやばい文字数いけるんじゃないの?えこ...
 
Climate Impact of Software Testing at Nordic Testing Days
Climate Impact of Software Testing at Nordic Testing DaysClimate Impact of Software Testing at Nordic Testing Days
Climate Impact of Software Testing at Nordic Testing Days
 
Encryption in Microsoft 365 - ExpertsLive Netherlands 2024
Encryption in Microsoft 365 - ExpertsLive Netherlands 2024Encryption in Microsoft 365 - ExpertsLive Netherlands 2024
Encryption in Microsoft 365 - ExpertsLive Netherlands 2024
 
Enchancing adoption of Open Source Libraries. A case study on Albumentations.AI
Enchancing adoption of Open Source Libraries. A case study on Albumentations.AIEnchancing adoption of Open Source Libraries. A case study on Albumentations.AI
Enchancing adoption of Open Source Libraries. A case study on Albumentations.AI
 
Securing your Kubernetes cluster_ a step-by-step guide to success !
Securing your Kubernetes cluster_ a step-by-step guide to success !Securing your Kubernetes cluster_ a step-by-step guide to success !
Securing your Kubernetes cluster_ a step-by-step guide to success !
 
20240607 QFM018 Elixir Reading List May 2024
20240607 QFM018 Elixir Reading List May 202420240607 QFM018 Elixir Reading List May 2024
20240607 QFM018 Elixir Reading List May 2024
 
Video Streaming: Then, Now, and in the Future
Video Streaming: Then, Now, and in the FutureVideo Streaming: Then, Now, and in the Future
Video Streaming: Then, Now, and in the Future
 
GDG Cloud Southlake #33: Boule & Rebala: Effective AppSec in SDLC using Deplo...
GDG Cloud Southlake #33: Boule & Rebala: Effective AppSec in SDLC using Deplo...GDG Cloud Southlake #33: Boule & Rebala: Effective AppSec in SDLC using Deplo...
GDG Cloud Southlake #33: Boule & Rebala: Effective AppSec in SDLC using Deplo...
 
National Security Agency - NSA mobile device best practices
National Security Agency - NSA mobile device best practicesNational Security Agency - NSA mobile device best practices
National Security Agency - NSA mobile device best practices
 
20240609 QFM020 Irresponsible AI Reading List May 2024
20240609 QFM020 Irresponsible AI Reading List May 202420240609 QFM020 Irresponsible AI Reading List May 2024
20240609 QFM020 Irresponsible AI Reading List May 2024
 
Uni Systems Copilot event_05062024_C.Vlachos.pdf
Uni Systems Copilot event_05062024_C.Vlachos.pdfUni Systems Copilot event_05062024_C.Vlachos.pdf
Uni Systems Copilot event_05062024_C.Vlachos.pdf
 
Generative AI Deep Dive: Advancing from Proof of Concept to Production
Generative AI Deep Dive: Advancing from Proof of Concept to ProductionGenerative AI Deep Dive: Advancing from Proof of Concept to Production
Generative AI Deep Dive: Advancing from Proof of Concept to Production
 
GraphRAG is All You need? LLM & Knowledge Graph
GraphRAG is All You need? LLM & Knowledge GraphGraphRAG is All You need? LLM & Knowledge Graph
GraphRAG is All You need? LLM & Knowledge Graph
 

1st week history-of-computers.pptx

  • 1. The H i st ory of C om puters
  • 2. What is a computer? Monitor Floppy Disk Drive System Unit Keyboard CD-ROM / DVD-ROM Drive Mouse A computer is an electronic machine that accepts information (Data), processes it according to specific instructions, and provides the results as new information.
  • 3. I- Ancient Counting Machines 1- The Abacus (base 5) (in ancient Babylon, China, Europe) VII VIII IX X 2- The Roman Numerals I II III IV V VI 3- The Arabic Numerals (base 10) 0 1 2 3 4 5 6 7 8 9 10 Ancient Time
  • 4. II- Mechanical Counting Machines 4- The Pascaline is a mechanical calculating device invented by the French philosopher and mathematician Blaise Pascal in 1642. (+) 1642
  • 5. II- Mechanical Counting Machines 1673 5- The Leibniz Wheel was invented by the famous mathematician Leibniz in 1673. ( + , - , * , / )
  • 6. II- Mechanical Counting Machines 6- Punched Cards were used by the French weaver Joseph Jacquard in 1810. The cards carried weaving instructions for the looms, later this idea offered a great use for storing info. 1810
  • 7. II- Mechanical Counting Machines 7- Babbage’s Difference Engines were calculating machines made by Charles Babbage to produce tables of numbers that would be used by ship’s navigators. 1852 1832 This device had mechanical problems similar to those that plagued Pascal and Leibniz.
  • 8. The Invention of the Vacuum Tube 8- Initially discovered by Thomas Edison, the vacuum tube formed the building block for the entire electronics industry. *Vacuum tubes were later used as electron valves in the 20th century to build the first electronic computers. 1883
  • 9. III- Electrical Counting Machines cards instead of mechanical gears. 9- The US census of the 1880 took 9 years to compile and led to inaccurate figures. To solve the problem, Herman Hollerith invented a calculating machine that used electricity along with punched 1888
  • 10. III- Electrical Counting Machines • Hollerith’s machine was immensely successful. The general count of the population, then 63 million, took only 6 weeks to calculate! • Based on the success of his invention, Herman Hollerith and some friends formed a company that sold his invention all over the world. The company eventually became known as: International Business Machines IBM 1888
  • 11. II- Mechanical Counting Machines 10- A partial working model of Babbage’s Analytical Engine was completed in 1910 by his son… used punched cards to store numbers. The design was no more successful than its predecessors. 1910
  • 12. III- Electrical Counting Machines 11- MARK I was built by a team from IBM and Harvard University. Mark I used mechanical telephone switches to store information. It accepted data on punched cards, processed it and then output the new data. 1943 51 feet long and weighed over 5 tons
  • 13. IV- Electronic Counting Machines 12- The ENIAC was the first US-built all- electronic computer built to perform ballistics calculations. (Away from IBM) 1946
  • 14. IV- Electronic Counting Machines * It was 1000X faster than Mark I, but it drew a lot of power that dimmed the lights of Philadelphia when it was switched on due to the use of Vacuum Tubes. * Mark I: 5 Additions / sec. * ENIAC: 5,000 Additions / sec. * ENIAC was made of 18,000 vacuum tubes. 1946
  • 15. IV- Electronic Counting Machines ENIAC’s Problems: 1 short life of vacuum tubes 2 It runs a single program, which means rewiring by a group of technicians is needed to change the program!!! Solution: the same group of researchers worked on another version of ENIAC that can store programs on punched cards that are much easier to manage and they came up with: 
  • 16. IV- Electronic Counting Machines EDVAC (electronic Discrete Variable Automatic Computer) (was never completed!) 13- UNIVAC (Universal Automatic Calculator) forty of these computers were sold to businesses. General Electric was the first company to acquire a UNIVAC. * The first UNIVACs were used in the US Army, Air Force, Navy, and Atomic Energy Commission. 1951
  • 17. The Effect of World War II 1938 Back in time to the days of war… * During WWII, the German Navy developed a cipher machine named Enigma. The Enigma machine could automatically encode a message in such a way that only another Enigma machine could read decode it.
  • 18. The Effect of World War II 1938 * In 1938 the Polish Secret Service managed to steal an Enigma machine that was smuggled to England. * Secretly the British developed a computer named Colossus that could decipher as many as 2,000 messages per day. That computer used Vacuum tubes and was the world’s first entirely digital computer. Surprisingly, though Colossus presented a similar technology to that of ENIAC, it had only 2,400 compared to 18,000 in ENIAC!!!
  • 19. Two Inventions that changed the way computers are built!! 1946 1- The Transistor The most significant single invention of the modern era. It was invented by 3 scsientists at At&T’s Bell Labs. One of the first overseas companies was a Japanese company called Tokyo Telecommunications Laboratory. The company had troubles paying the license fee ($25,000) that company became in 1956 what’s called now Sony! it replaced the Vacuum tube. * Transistors are smaller (sometimes microscopic) * Fast and don’t need to warm up
  • 20. Transistors on a circuit board Transistors Capacitor Resistors
  • 21. Two Inventions that changed the way computers are built!! 1961 The IC revolutionized the entire electronic technology. Ex: The Pentium Processor contains 3.1 Million Transistors in 1.5 inch square! 2- The (IC) Integrated Circuit
  • 22. How the processor (CPU) is placed on the Motherboard Intel 486 CPU RAM
  • 23. 1975 - 1981 The Altair The Apple I The Floppy Disk The Hard Disk MS-DOS
  • 24. 1981 - 1993 The IBM PC The Compaq portable Computer The Apple Macintosh MS-Windows 3.0 The Pentium Chip