SlideShare a Scribd company logo
GENERATIONS OF COMPUTERS
• FIRST GENERATION : 1946-1958
• SECOND GENERATION: 1959-1964
• THIRD GENERATION: 1965-1970
• FOURTH GENERATION: 1971-1980
• FIFTH GENERATION: 1982-PRESENT
THE FIRST GENERATION
• FIRST GENERATION COMPUTERS USED VACUUM TUBES FOR CIRCUITRY AND
MAGNETIC DRUMS FOR MEMORY, AND WERE OFTEN ENORMOUS, TAKING UP
ENTIRE ROOMS.
• THEY WERE VERY EXPENSIVE TO OPERATE AND IN ADDITION TO USING A
GREAT DEAL OF ELECTRICITY, GENERATED A LOT OF HEAT, WHICH WAS OFTEN
THE CAUSE OF MALFUNCTIONS.
• FIRST GENERATION COMPUTERS RELIED ON MACHINE LANGUAGE, THE
LOWEST-LEVEL PROGRAMMING LANGUAGE UNDERSTOOD BY COMPUTERS,
TO PERFORM OPERATIONS, AND THEY COULD ONLY SOLVE ONE PROBLEM AT
A TIME.
• INPUT WAS BASED ON PUNCHED CARDS AND PAPER TAPE, AND OUTPUT WAS
DISPLAYED ON PRINTOUTS.
ENIAC-ELECTRONIC NUMERICAL INTEGRATOR AND COMPUTER
THE SECOND GENERATION
• TRANSISTORS REPLACED THE VACUUM TUBES IN 2ND GEN. COMPUTERS MAKING THEM COMPACT
,CHEAP, FASTER AND MORE ENERGY EFFICIENT
• BUT 2ND GEN. COMPUTERS ALSO GENERATED A LOT OF HEAT
• THEY STORED THEIR INSTRUCTION. THE MAGNETIC DRUMS WERE REPLACED BY MAGNETIC
CORES.
• 2ND GEN. COMPUTERS USED ASSEMBLY LANGUAGES INSTEAD OF MACHINE LANGUAGE
ALLOWING PROGRAMMERS TO GIVE ISTRUCTION IN WORDS
• BUT PUNCHED CARS AND PRINT-OUTS ERE ONLY SORCE OF INPUT - OUTPUT
CDC 3600
THE THIRD GENERATION
• The development of ICs (Integrated Circuits) marked key to the development of the
3rd generation Computers.
• 3rd Gen Computers became much smaller ,cheaper and faster compared to the 2nd
Gen computers
• They used Keyboards for Input and Monitors for output also used operating system.
• Being smaller ,cheaper and faster became accessable to the public.
THE FOURTH GENERATION
• The microprocessor(VSLI-i.e Very Large Scale Integrated Circuits) brought the fourth generation
of computers, as thousands of integrated circuits were built onto a single silicon chip.
• As these small computers became more powerful, they could be linked together to form
networks, which eventually led to the development of the Internet.
• Fourth generation computers also saw the development of GUIs, the mouse and handheld
devices.
THE FIFTH GENERATION
• The Fifth Generation Computer Systems (FGCS) was an initiative by Japan's Ministry of International Trade
and Industry (MITI), begun in 1982, to create computers using massively parallel computing and logic
programming.
• The Fifth Generation Computers uses ULSI (Ultra Large Scale Integration) technology .
• This is computers we see the day to day in our lives.
EVOLUTION OF COMPUTERS.pptx

More Related Content

Similar to EVOLUTION OF COMPUTERS.pptx

Copyofcomputerfinalppt 130903070322-
Copyofcomputerfinalppt 130903070322-Copyofcomputerfinalppt 130903070322-
Copyofcomputerfinalppt 130903070322-
naquib123
 
Computer beginner first
Computer beginner firstComputer beginner first
Computer beginner first
Sarzamin Khan
 
Introduction To Computer
Introduction To ComputerIntroduction To Computer
Introduction To Computer
Tabsheer Hasan
 
History of Computer REPORTER EVELYN BARRIT.pptx
History of Computer REPORTER EVELYN BARRIT.pptxHistory of Computer REPORTER EVELYN BARRIT.pptx
History of Computer REPORTER EVELYN BARRIT.pptx
JomelRio
 
the generation of computers
the generation of computersthe generation of computers
the generation of computers
Bhavya Chawla
 
Generations of computer
Generations of computerGenerations of computer
Generations of computer
Amjad Afridi
 
gensofcomputers-210927082200 (2).pptx
gensofcomputers-210927082200 (2).pptxgensofcomputers-210927082200 (2).pptx
gensofcomputers-210927082200 (2).pptx
Nisha Yadav
 
Generations of computers
Generations of computersGenerations of computers
Generations of computers
AajuSunariya
 
Generation of Computer.pptx
Generation of Computer.pptxGeneration of Computer.pptx
Generation of Computer.pptx
JohnPeterPaulGarces
 
Generationofcomputer
GenerationofcomputerGenerationofcomputer
Generationofcomputer
Active cracks cracks
 
generation of computers
generation of computersgeneration of computers
generation of computers
Ishmael Ople-Oporto
 
TERRANCE_MHA04.pptx
TERRANCE_MHA04.pptxTERRANCE_MHA04.pptx
TERRANCE_MHA04.pptx
TerranceAncheary
 
Generation of computer
Generation of computerGeneration of computer
Generation of computer
WahidUllah25
 
Generation Of Computers
Generation Of ComputersGeneration Of Computers
Generation Of Computers
Sakshi Shrikhande
 
Generation of comnputer
Generation of comnputerGeneration of comnputer
Generation of comnputerGovind Mishra
 
Computer Generations
Computer GenerationsComputer Generations
Computer Generations
Gaurav Gulati
 
The5generationsofcomputers 100524124507-phpapp02-140614013621-phpaapp02
The5generationsofcomputers 100524124507-phpapp02-140614013621-phpaapp02The5generationsofcomputers 100524124507-phpapp02-140614013621-phpaapp02
The5generationsofcomputers 100524124507-phpapp02-140614013621-phpaapp02Sri Prakash
 
Generation of computer
Generation of computerGeneration of computer
Generation of computer
ankur bhalla
 

Similar to EVOLUTION OF COMPUTERS.pptx (20)

Copyofcomputerfinalppt 130903070322-
Copyofcomputerfinalppt 130903070322-Copyofcomputerfinalppt 130903070322-
Copyofcomputerfinalppt 130903070322-
 
Computer beginner first
Computer beginner firstComputer beginner first
Computer beginner first
 
GENERATION OF COMPUTERS.
GENERATION OF COMPUTERS.GENERATION OF COMPUTERS.
GENERATION OF COMPUTERS.
 
Introduction To Computer
Introduction To ComputerIntroduction To Computer
Introduction To Computer
 
History of Computer REPORTER EVELYN BARRIT.pptx
History of Computer REPORTER EVELYN BARRIT.pptxHistory of Computer REPORTER EVELYN BARRIT.pptx
History of Computer REPORTER EVELYN BARRIT.pptx
 
the generation of computers
the generation of computersthe generation of computers
the generation of computers
 
FOC PPT.pptx
FOC PPT.pptxFOC PPT.pptx
FOC PPT.pptx
 
Generations of computer
Generations of computerGenerations of computer
Generations of computer
 
gensofcomputers-210927082200 (2).pptx
gensofcomputers-210927082200 (2).pptxgensofcomputers-210927082200 (2).pptx
gensofcomputers-210927082200 (2).pptx
 
Generations of computers
Generations of computersGenerations of computers
Generations of computers
 
Generation of Computer.pptx
Generation of Computer.pptxGeneration of Computer.pptx
Generation of Computer.pptx
 
Generationofcomputer
GenerationofcomputerGenerationofcomputer
Generationofcomputer
 
generation of computers
generation of computersgeneration of computers
generation of computers
 
TERRANCE_MHA04.pptx
TERRANCE_MHA04.pptxTERRANCE_MHA04.pptx
TERRANCE_MHA04.pptx
 
Generation of computer
Generation of computerGeneration of computer
Generation of computer
 
Generation Of Computers
Generation Of ComputersGeneration Of Computers
Generation Of Computers
 
Generation of comnputer
Generation of comnputerGeneration of comnputer
Generation of comnputer
 
Computer Generations
Computer GenerationsComputer Generations
Computer Generations
 
The5generationsofcomputers 100524124507-phpapp02-140614013621-phpaapp02
The5generationsofcomputers 100524124507-phpapp02-140614013621-phpaapp02The5generationsofcomputers 100524124507-phpapp02-140614013621-phpaapp02
The5generationsofcomputers 100524124507-phpapp02-140614013621-phpaapp02
 
Generation of computer
Generation of computerGeneration of computer
Generation of computer
 

Recently uploaded

State of ICS and IoT Cyber Threat Landscape Report 2024 preview
State of ICS and IoT Cyber Threat Landscape Report 2024 previewState of ICS and IoT Cyber Threat Landscape Report 2024 preview
State of ICS and IoT Cyber Threat Landscape Report 2024 preview
Prayukth K V
 
Slack (or Teams) Automation for Bonterra Impact Management (fka Social Soluti...
Slack (or Teams) Automation for Bonterra Impact Management (fka Social Soluti...Slack (or Teams) Automation for Bonterra Impact Management (fka Social Soluti...
Slack (or Teams) Automation for Bonterra Impact Management (fka Social Soluti...
Jeffrey Haguewood
 
Dev Dives: Train smarter, not harder – active learning and UiPath LLMs for do...
Dev Dives: Train smarter, not harder – active learning and UiPath LLMs for do...Dev Dives: Train smarter, not harder – active learning and UiPath LLMs for do...
Dev Dives: Train smarter, not harder – active learning and UiPath LLMs for do...
UiPathCommunity
 
GenAISummit 2024 May 28 Sri Ambati Keynote: AGI Belongs to The Community in O...
GenAISummit 2024 May 28 Sri Ambati Keynote: AGI Belongs to The Community in O...GenAISummit 2024 May 28 Sri Ambati Keynote: AGI Belongs to The Community in O...
GenAISummit 2024 May 28 Sri Ambati Keynote: AGI Belongs to The Community in O...
Sri Ambati
 
Empowering NextGen Mobility via Large Action Model Infrastructure (LAMI): pav...
Empowering NextGen Mobility via Large Action Model Infrastructure (LAMI): pav...Empowering NextGen Mobility via Large Action Model Infrastructure (LAMI): pav...
Empowering NextGen Mobility via Large Action Model Infrastructure (LAMI): pav...
Thierry Lestable
 
Encryption in Microsoft 365 - ExpertsLive Netherlands 2024
Encryption in Microsoft 365 - ExpertsLive Netherlands 2024Encryption in Microsoft 365 - ExpertsLive Netherlands 2024
Encryption in Microsoft 365 - ExpertsLive Netherlands 2024
Albert Hoitingh
 
Unsubscribed: Combat Subscription Fatigue With a Membership Mentality by Head...
Unsubscribed: Combat Subscription Fatigue With a Membership Mentality by Head...Unsubscribed: Combat Subscription Fatigue With a Membership Mentality by Head...
Unsubscribed: Combat Subscription Fatigue With a Membership Mentality by Head...
Product School
 
Transcript: Selling digital books in 2024: Insights from industry leaders - T...
Transcript: Selling digital books in 2024: Insights from industry leaders - T...Transcript: Selling digital books in 2024: Insights from industry leaders - T...
Transcript: Selling digital books in 2024: Insights from industry leaders - T...
BookNet Canada
 
FIDO Alliance Osaka Seminar: The WebAuthn API and Discoverable Credentials.pdf
FIDO Alliance Osaka Seminar: The WebAuthn API and Discoverable Credentials.pdfFIDO Alliance Osaka Seminar: The WebAuthn API and Discoverable Credentials.pdf
FIDO Alliance Osaka Seminar: The WebAuthn API and Discoverable Credentials.pdf
FIDO Alliance
 
Kubernetes & AI - Beauty and the Beast !?! @KCD Istanbul 2024
Kubernetes & AI - Beauty and the Beast !?! @KCD Istanbul 2024Kubernetes & AI - Beauty and the Beast !?! @KCD Istanbul 2024
Kubernetes & AI - Beauty and the Beast !?! @KCD Istanbul 2024
Tobias Schneck
 
Mission to Decommission: Importance of Decommissioning Products to Increase E...
Mission to Decommission: Importance of Decommissioning Products to Increase E...Mission to Decommission: Importance of Decommissioning Products to Increase E...
Mission to Decommission: Importance of Decommissioning Products to Increase E...
Product School
 
When stars align: studies in data quality, knowledge graphs, and machine lear...
When stars align: studies in data quality, knowledge graphs, and machine lear...When stars align: studies in data quality, knowledge graphs, and machine lear...
When stars align: studies in data quality, knowledge graphs, and machine lear...
Elena Simperl
 
The Future of Platform Engineering
The Future of Platform EngineeringThe Future of Platform Engineering
The Future of Platform Engineering
Jemma Hussein Allen
 
Smart TV Buyer Insights Survey 2024 by 91mobiles.pdf
Smart TV Buyer Insights Survey 2024 by 91mobiles.pdfSmart TV Buyer Insights Survey 2024 by 91mobiles.pdf
Smart TV Buyer Insights Survey 2024 by 91mobiles.pdf
91mobiles
 
Designing Great Products: The Power of Design and Leadership by Chief Designe...
Designing Great Products: The Power of Design and Leadership by Chief Designe...Designing Great Products: The Power of Design and Leadership by Chief Designe...
Designing Great Products: The Power of Design and Leadership by Chief Designe...
Product School
 
FIDO Alliance Osaka Seminar: FIDO Security Aspects.pdf
FIDO Alliance Osaka Seminar: FIDO Security Aspects.pdfFIDO Alliance Osaka Seminar: FIDO Security Aspects.pdf
FIDO Alliance Osaka Seminar: FIDO Security Aspects.pdf
FIDO Alliance
 
GDG Cloud Southlake #33: Boule & Rebala: Effective AppSec in SDLC using Deplo...
GDG Cloud Southlake #33: Boule & Rebala: Effective AppSec in SDLC using Deplo...GDG Cloud Southlake #33: Boule & Rebala: Effective AppSec in SDLC using Deplo...
GDG Cloud Southlake #33: Boule & Rebala: Effective AppSec in SDLC using Deplo...
James Anderson
 
PCI PIN Basics Webinar from the Controlcase Team
PCI PIN Basics Webinar from the Controlcase TeamPCI PIN Basics Webinar from the Controlcase Team
PCI PIN Basics Webinar from the Controlcase Team
ControlCase
 
Epistemic Interaction - tuning interfaces to provide information for AI support
Epistemic Interaction - tuning interfaces to provide information for AI supportEpistemic Interaction - tuning interfaces to provide information for AI support
Epistemic Interaction - tuning interfaces to provide information for AI support
Alan Dix
 
Generating a custom Ruby SDK for your web service or Rails API using Smithy
Generating a custom Ruby SDK for your web service or Rails API using SmithyGenerating a custom Ruby SDK for your web service or Rails API using Smithy
Generating a custom Ruby SDK for your web service or Rails API using Smithy
g2nightmarescribd
 

Recently uploaded (20)

State of ICS and IoT Cyber Threat Landscape Report 2024 preview
State of ICS and IoT Cyber Threat Landscape Report 2024 previewState of ICS and IoT Cyber Threat Landscape Report 2024 preview
State of ICS and IoT Cyber Threat Landscape Report 2024 preview
 
Slack (or Teams) Automation for Bonterra Impact Management (fka Social Soluti...
Slack (or Teams) Automation for Bonterra Impact Management (fka Social Soluti...Slack (or Teams) Automation for Bonterra Impact Management (fka Social Soluti...
Slack (or Teams) Automation for Bonterra Impact Management (fka Social Soluti...
 
Dev Dives: Train smarter, not harder – active learning and UiPath LLMs for do...
Dev Dives: Train smarter, not harder – active learning and UiPath LLMs for do...Dev Dives: Train smarter, not harder – active learning and UiPath LLMs for do...
Dev Dives: Train smarter, not harder – active learning and UiPath LLMs for do...
 
GenAISummit 2024 May 28 Sri Ambati Keynote: AGI Belongs to The Community in O...
GenAISummit 2024 May 28 Sri Ambati Keynote: AGI Belongs to The Community in O...GenAISummit 2024 May 28 Sri Ambati Keynote: AGI Belongs to The Community in O...
GenAISummit 2024 May 28 Sri Ambati Keynote: AGI Belongs to The Community in O...
 
Empowering NextGen Mobility via Large Action Model Infrastructure (LAMI): pav...
Empowering NextGen Mobility via Large Action Model Infrastructure (LAMI): pav...Empowering NextGen Mobility via Large Action Model Infrastructure (LAMI): pav...
Empowering NextGen Mobility via Large Action Model Infrastructure (LAMI): pav...
 
Encryption in Microsoft 365 - ExpertsLive Netherlands 2024
Encryption in Microsoft 365 - ExpertsLive Netherlands 2024Encryption in Microsoft 365 - ExpertsLive Netherlands 2024
Encryption in Microsoft 365 - ExpertsLive Netherlands 2024
 
Unsubscribed: Combat Subscription Fatigue With a Membership Mentality by Head...
Unsubscribed: Combat Subscription Fatigue With a Membership Mentality by Head...Unsubscribed: Combat Subscription Fatigue With a Membership Mentality by Head...
Unsubscribed: Combat Subscription Fatigue With a Membership Mentality by Head...
 
Transcript: Selling digital books in 2024: Insights from industry leaders - T...
Transcript: Selling digital books in 2024: Insights from industry leaders - T...Transcript: Selling digital books in 2024: Insights from industry leaders - T...
Transcript: Selling digital books in 2024: Insights from industry leaders - T...
 
FIDO Alliance Osaka Seminar: The WebAuthn API and Discoverable Credentials.pdf
FIDO Alliance Osaka Seminar: The WebAuthn API and Discoverable Credentials.pdfFIDO Alliance Osaka Seminar: The WebAuthn API and Discoverable Credentials.pdf
FIDO Alliance Osaka Seminar: The WebAuthn API and Discoverable Credentials.pdf
 
Kubernetes & AI - Beauty and the Beast !?! @KCD Istanbul 2024
Kubernetes & AI - Beauty and the Beast !?! @KCD Istanbul 2024Kubernetes & AI - Beauty and the Beast !?! @KCD Istanbul 2024
Kubernetes & AI - Beauty and the Beast !?! @KCD Istanbul 2024
 
Mission to Decommission: Importance of Decommissioning Products to Increase E...
Mission to Decommission: Importance of Decommissioning Products to Increase E...Mission to Decommission: Importance of Decommissioning Products to Increase E...
Mission to Decommission: Importance of Decommissioning Products to Increase E...
 
When stars align: studies in data quality, knowledge graphs, and machine lear...
When stars align: studies in data quality, knowledge graphs, and machine lear...When stars align: studies in data quality, knowledge graphs, and machine lear...
When stars align: studies in data quality, knowledge graphs, and machine lear...
 
The Future of Platform Engineering
The Future of Platform EngineeringThe Future of Platform Engineering
The Future of Platform Engineering
 
Smart TV Buyer Insights Survey 2024 by 91mobiles.pdf
Smart TV Buyer Insights Survey 2024 by 91mobiles.pdfSmart TV Buyer Insights Survey 2024 by 91mobiles.pdf
Smart TV Buyer Insights Survey 2024 by 91mobiles.pdf
 
Designing Great Products: The Power of Design and Leadership by Chief Designe...
Designing Great Products: The Power of Design and Leadership by Chief Designe...Designing Great Products: The Power of Design and Leadership by Chief Designe...
Designing Great Products: The Power of Design and Leadership by Chief Designe...
 
FIDO Alliance Osaka Seminar: FIDO Security Aspects.pdf
FIDO Alliance Osaka Seminar: FIDO Security Aspects.pdfFIDO Alliance Osaka Seminar: FIDO Security Aspects.pdf
FIDO Alliance Osaka Seminar: FIDO Security Aspects.pdf
 
GDG Cloud Southlake #33: Boule & Rebala: Effective AppSec in SDLC using Deplo...
GDG Cloud Southlake #33: Boule & Rebala: Effective AppSec in SDLC using Deplo...GDG Cloud Southlake #33: Boule & Rebala: Effective AppSec in SDLC using Deplo...
GDG Cloud Southlake #33: Boule & Rebala: Effective AppSec in SDLC using Deplo...
 
PCI PIN Basics Webinar from the Controlcase Team
PCI PIN Basics Webinar from the Controlcase TeamPCI PIN Basics Webinar from the Controlcase Team
PCI PIN Basics Webinar from the Controlcase Team
 
Epistemic Interaction - tuning interfaces to provide information for AI support
Epistemic Interaction - tuning interfaces to provide information for AI supportEpistemic Interaction - tuning interfaces to provide information for AI support
Epistemic Interaction - tuning interfaces to provide information for AI support
 
Generating a custom Ruby SDK for your web service or Rails API using Smithy
Generating a custom Ruby SDK for your web service or Rails API using SmithyGenerating a custom Ruby SDK for your web service or Rails API using Smithy
Generating a custom Ruby SDK for your web service or Rails API using Smithy
 

EVOLUTION OF COMPUTERS.pptx

  • 1.
  • 2. GENERATIONS OF COMPUTERS • FIRST GENERATION : 1946-1958 • SECOND GENERATION: 1959-1964 • THIRD GENERATION: 1965-1970 • FOURTH GENERATION: 1971-1980 • FIFTH GENERATION: 1982-PRESENT
  • 3. THE FIRST GENERATION • FIRST GENERATION COMPUTERS USED VACUUM TUBES FOR CIRCUITRY AND MAGNETIC DRUMS FOR MEMORY, AND WERE OFTEN ENORMOUS, TAKING UP ENTIRE ROOMS. • THEY WERE VERY EXPENSIVE TO OPERATE AND IN ADDITION TO USING A GREAT DEAL OF ELECTRICITY, GENERATED A LOT OF HEAT, WHICH WAS OFTEN THE CAUSE OF MALFUNCTIONS. • FIRST GENERATION COMPUTERS RELIED ON MACHINE LANGUAGE, THE LOWEST-LEVEL PROGRAMMING LANGUAGE UNDERSTOOD BY COMPUTERS, TO PERFORM OPERATIONS, AND THEY COULD ONLY SOLVE ONE PROBLEM AT A TIME. • INPUT WAS BASED ON PUNCHED CARDS AND PAPER TAPE, AND OUTPUT WAS DISPLAYED ON PRINTOUTS.
  • 5. THE SECOND GENERATION • TRANSISTORS REPLACED THE VACUUM TUBES IN 2ND GEN. COMPUTERS MAKING THEM COMPACT ,CHEAP, FASTER AND MORE ENERGY EFFICIENT • BUT 2ND GEN. COMPUTERS ALSO GENERATED A LOT OF HEAT • THEY STORED THEIR INSTRUCTION. THE MAGNETIC DRUMS WERE REPLACED BY MAGNETIC CORES. • 2ND GEN. COMPUTERS USED ASSEMBLY LANGUAGES INSTEAD OF MACHINE LANGUAGE ALLOWING PROGRAMMERS TO GIVE ISTRUCTION IN WORDS • BUT PUNCHED CARS AND PRINT-OUTS ERE ONLY SORCE OF INPUT - OUTPUT CDC 3600
  • 6. THE THIRD GENERATION • The development of ICs (Integrated Circuits) marked key to the development of the 3rd generation Computers. • 3rd Gen Computers became much smaller ,cheaper and faster compared to the 2nd Gen computers • They used Keyboards for Input and Monitors for output also used operating system. • Being smaller ,cheaper and faster became accessable to the public.
  • 7. THE FOURTH GENERATION • The microprocessor(VSLI-i.e Very Large Scale Integrated Circuits) brought the fourth generation of computers, as thousands of integrated circuits were built onto a single silicon chip. • As these small computers became more powerful, they could be linked together to form networks, which eventually led to the development of the Internet. • Fourth generation computers also saw the development of GUIs, the mouse and handheld devices.
  • 8. THE FIFTH GENERATION • The Fifth Generation Computer Systems (FGCS) was an initiative by Japan's Ministry of International Trade and Industry (MITI), begun in 1982, to create computers using massively parallel computing and logic programming. • The Fifth Generation Computers uses ULSI (Ultra Large Scale Integration) technology . • This is computers we see the day to day in our lives.