SlideShare a Scribd company logo
1 of 1
Download to read offline
FACTS
ABOUT
COMPUTER
THE FIRST MODERN COMPUTER WAS
ENORMOUS
THE FIRST MODERN COMPUTER WAS
ESSENTIALLY A MASSIVE CALCULATOR
RAM REFERS TO A COMPUTER'S MEMORY
EVERY MONTH, AROUND 6,000 COMPUTER
VIRUSES ARE PUBLISHED
WHEN USING A COMPUTER, IT IS
CRITICAL TO TAKE BREAKS TO PROTECT
YOUR EYES
The earliest modern computers were electrical calculating
devices built during World War II. One computer would take
up whole rooms, and sections of the computers were
placed on wheels due to their size.
Despite its size, the first modern computer could only
accomplish four tasks. Addition, subtraction, multiplication,
and division
RAM, which stands for Random Access Memory, is the
computer's short-term memory. The computer would be
unable to accomplish anything without it, from accessing
files to streaming video.
Computers are constantly at danger of being infected with
a computer virus, which causes them to shut down or
function slowly. That is why it is critical to have anti-virus
software installed on your computer.
Because computer screens are so bright, it's critical to take
breaks every 20 minutes to protect your eyes.

More Related Content

Similar to Facts About Computer

Sgp Computersfinal
Sgp ComputersfinalSgp Computersfinal
Sgp Computersfinal
107811
 
Classification Station Project 2003
Classification Station Project 2003Classification Station Project 2003
Classification Station Project 2003
hcj2010
 
presentationoncomputergeneration-170324202733-1.pptx
presentationoncomputergeneration-170324202733-1.pptxpresentationoncomputergeneration-170324202733-1.pptx
presentationoncomputergeneration-170324202733-1.pptx
ssuser3b0320
 
51120402 wearable-computers-by-jeevan(2)
51120402 wearable-computers-by-jeevan(2)51120402 wearable-computers-by-jeevan(2)
51120402 wearable-computers-by-jeevan(2)
naveenchandranaveen
 
The Deal
The DealThe Deal
The Deal
adhaval
 
Ch 1 introduction and 2 computer software 1
Ch 1 introduction  and 2 computer software 1Ch 1 introduction  and 2 computer software 1
Ch 1 introduction and 2 computer software 1
rjsuthar56
 

Similar to Facts About Computer (20)

The parts of a computer and how it
The parts of a computer and how itThe parts of a computer and how it
The parts of a computer and how it
 
Sgp Computersfinal
Sgp ComputersfinalSgp Computersfinal
Sgp Computersfinal
 
Computer Studies, Uses, Computer application and appreciation
Computer Studies, Uses, Computer application and appreciation Computer Studies, Uses, Computer application and appreciation
Computer Studies, Uses, Computer application and appreciation
 
Presentation on computer generation
Presentation on computer generationPresentation on computer generation
Presentation on computer generation
 
Classification Station Project 2003
Classification Station Project 2003Classification Station Project 2003
Classification Station Project 2003
 
LS 6 Computers
LS 6 ComputersLS 6 Computers
LS 6 Computers
 
presentationoncomputergeneration-170324202733-1.pptx
presentationoncomputergeneration-170324202733-1.pptxpresentationoncomputergeneration-170324202733-1.pptx
presentationoncomputergeneration-170324202733-1.pptx
 
CHAPTER-ONE to computer science.pptx.fil
CHAPTER-ONE to computer science.pptx.filCHAPTER-ONE to computer science.pptx.fil
CHAPTER-ONE to computer science.pptx.fil
 
VTU C programming(CPS) 18CPS13/23 notes by Nithin,VVCE,Mysuru
 VTU C programming(CPS) 18CPS13/23 notes by Nithin,VVCE,Mysuru VTU C programming(CPS) 18CPS13/23 notes by Nithin,VVCE,Mysuru
VTU C programming(CPS) 18CPS13/23 notes by Nithin,VVCE,Mysuru
 
COMPUTER-FORM-1-NOTES-min.pptx
COMPUTER-FORM-1-NOTES-min.pptxCOMPUTER-FORM-1-NOTES-min.pptx
COMPUTER-FORM-1-NOTES-min.pptx
 
Computer fundamentals
Computer fundamentalsComputer fundamentals
Computer fundamentals
 
form-1 COMPUTER NOTES--all-chapters.pdf
form-1 COMPUTER NOTES--all-chapters.pdfform-1 COMPUTER NOTES--all-chapters.pdf
form-1 COMPUTER NOTES--all-chapters.pdf
 
51120402 wearable-computers-by-jeevan(2)
51120402 wearable-computers-by-jeevan(2)51120402 wearable-computers-by-jeevan(2)
51120402 wearable-computers-by-jeevan(2)
 
Computer Hardware
Computer HardwareComputer Hardware
Computer Hardware
 
The Deal
The DealThe Deal
The Deal
 
Basic Components of Computer
Basic Components of ComputerBasic Components of Computer
Basic Components of Computer
 
final presentation
final presentationfinal presentation
final presentation
 
ICDL Module 2 - Using Computers & Managing Files (Windows XP) - Presentation ...
ICDL Module 2 - Using Computers & Managing Files (Windows XP) - Presentation ...ICDL Module 2 - Using Computers & Managing Files (Windows XP) - Presentation ...
ICDL Module 2 - Using Computers & Managing Files (Windows XP) - Presentation ...
 
Computers types
Computers typesComputers types
Computers types
 
Ch 1 introduction and 2 computer software 1
Ch 1 introduction  and 2 computer software 1Ch 1 introduction  and 2 computer software 1
Ch 1 introduction and 2 computer software 1
 

More from 73inc

More from 73inc (13)

Programming is the use of one or more algorithms to become an interrelated pr...
Programming is the use of one or more algorithms to become an interrelated pr...Programming is the use of one or more algorithms to become an interrelated pr...
Programming is the use of one or more algorithms to become an interrelated pr...
 
Types of Cyberattacks - Malware Removal
Types of Cyberattacks  - Malware RemovalTypes of Cyberattacks  - Malware Removal
Types of Cyberattacks - Malware Removal
 
iMac and MacBook Malware Removal & Repair.pdf
iMac and MacBook Malware Removal & Repair.pdfiMac and MacBook Malware Removal & Repair.pdf
iMac and MacBook Malware Removal & Repair.pdf
 
Safeguarding Your MacBook Expert Strategies to Shield Against Malware
Safeguarding Your MacBook Expert Strategies to Shield Against MalwareSafeguarding Your MacBook Expert Strategies to Shield Against Malware
Safeguarding Your MacBook Expert Strategies to Shield Against Malware
 
Efficient Solutions for Reliable Apple Device Repair in Auckland.pdf
Efficient Solutions for Reliable Apple Device Repair in Auckland.pdfEfficient Solutions for Reliable Apple Device Repair in Auckland.pdf
Efficient Solutions for Reliable Apple Device Repair in Auckland.pdf
 
Efficient Macbook Pro Repair Services in NZ
Efficient Macbook Pro Repair Services in NZEfficient Macbook Pro Repair Services in NZ
Efficient Macbook Pro Repair Services in NZ
 
3 tips for Choosing a Laptop & Things To Check First.pdf
3 tips for Choosing a Laptop & Things To Check First.pdf3 tips for Choosing a Laptop & Things To Check First.pdf
3 tips for Choosing a Laptop & Things To Check First.pdf
 
Macbook slow performance repair
Macbook slow performance repairMacbook slow performance repair
Macbook slow performance repair
 
Reviving the Unfortunate Mastering MacBook Water Damage Repair.pdf
Reviving the Unfortunate Mastering MacBook Water Damage Repair.pdfReviving the Unfortunate Mastering MacBook Water Damage Repair.pdf
Reviving the Unfortunate Mastering MacBook Water Damage Repair.pdf
 
Securing Your MacBook: Professional Tips for Malware Removal
Securing Your MacBook: Professional Tips for Malware RemovalSecuring Your MacBook: Professional Tips for Malware Removal
Securing Your MacBook: Professional Tips for Malware Removal
 
Boosting macbook performance mastering the art of speedy repairs
Boosting macbook performance mastering the art of speedy repairsBoosting macbook performance mastering the art of speedy repairs
Boosting macbook performance mastering the art of speedy repairs
 
Tips to speed up your PC heading
Tips to speed up your PC headingTips to speed up your PC heading
Tips to speed up your PC heading
 
Efficient Strategies for Macbook Data Recovery Expert Techniques for Restorin...
Efficient Strategies for Macbook Data Recovery Expert Techniques for Restorin...Efficient Strategies for Macbook Data Recovery Expert Techniques for Restorin...
Efficient Strategies for Macbook Data Recovery Expert Techniques for Restorin...
 

Recently uploaded

Hyatt driving innovation and exceptional customer experiences with FIDO passw...
Hyatt driving innovation and exceptional customer experiences with FIDO passw...Hyatt driving innovation and exceptional customer experiences with FIDO passw...
Hyatt driving innovation and exceptional customer experiences with FIDO passw...
FIDO Alliance
 
TrustArc Webinar - Unified Trust Center for Privacy, Security, Compliance, an...
TrustArc Webinar - Unified Trust Center for Privacy, Security, Compliance, an...TrustArc Webinar - Unified Trust Center for Privacy, Security, Compliance, an...
TrustArc Webinar - Unified Trust Center for Privacy, Security, Compliance, an...
TrustArc
 

Recently uploaded (20)

AI mind or machine power point presentation
AI mind or machine power point presentationAI mind or machine power point presentation
AI mind or machine power point presentation
 
Design Guidelines for Passkeys 2024.pptx
Design Guidelines for Passkeys 2024.pptxDesign Guidelines for Passkeys 2024.pptx
Design Guidelines for Passkeys 2024.pptx
 
UiPath manufacturing technology benefits and AI overview
UiPath manufacturing technology benefits and AI overviewUiPath manufacturing technology benefits and AI overview
UiPath manufacturing technology benefits and AI overview
 
2024 May Patch Tuesday
2024 May Patch Tuesday2024 May Patch Tuesday
2024 May Patch Tuesday
 
Oauth 2.0 Introduction and Flows with MuleSoft
Oauth 2.0 Introduction and Flows with MuleSoftOauth 2.0 Introduction and Flows with MuleSoft
Oauth 2.0 Introduction and Flows with MuleSoft
 
Hyatt driving innovation and exceptional customer experiences with FIDO passw...
Hyatt driving innovation and exceptional customer experiences with FIDO passw...Hyatt driving innovation and exceptional customer experiences with FIDO passw...
Hyatt driving innovation and exceptional customer experiences with FIDO passw...
 
TrustArc Webinar - Unified Trust Center for Privacy, Security, Compliance, an...
TrustArc Webinar - Unified Trust Center for Privacy, Security, Compliance, an...TrustArc Webinar - Unified Trust Center for Privacy, Security, Compliance, an...
TrustArc Webinar - Unified Trust Center for Privacy, Security, Compliance, an...
 
Frisco Automating Purchase Orders with MuleSoft IDP- May 10th, 2024.pptx.pdf
Frisco Automating Purchase Orders with MuleSoft IDP- May 10th, 2024.pptx.pdfFrisco Automating Purchase Orders with MuleSoft IDP- May 10th, 2024.pptx.pdf
Frisco Automating Purchase Orders with MuleSoft IDP- May 10th, 2024.pptx.pdf
 
Microsoft CSP Briefing Pre-Engagement - Questionnaire
Microsoft CSP Briefing Pre-Engagement - QuestionnaireMicrosoft CSP Briefing Pre-Engagement - Questionnaire
Microsoft CSP Briefing Pre-Engagement - Questionnaire
 
Introduction to FIDO Authentication and Passkeys.pptx
Introduction to FIDO Authentication and Passkeys.pptxIntroduction to FIDO Authentication and Passkeys.pptx
Introduction to FIDO Authentication and Passkeys.pptx
 
Human Expert Website Manual WCAG 2.0 2.1 2.2 Audit - Digital Accessibility Au...
Human Expert Website Manual WCAG 2.0 2.1 2.2 Audit - Digital Accessibility Au...Human Expert Website Manual WCAG 2.0 2.1 2.2 Audit - Digital Accessibility Au...
Human Expert Website Manual WCAG 2.0 2.1 2.2 Audit - Digital Accessibility Au...
 
Cyber Insurance - RalphGilot - Embry-Riddle Aeronautical University.pptx
Cyber Insurance - RalphGilot - Embry-Riddle Aeronautical University.pptxCyber Insurance - RalphGilot - Embry-Riddle Aeronautical University.pptx
Cyber Insurance - RalphGilot - Embry-Riddle Aeronautical University.pptx
 
Long journey of Ruby Standard library at RubyKaigi 2024
Long journey of Ruby Standard library at RubyKaigi 2024Long journey of Ruby Standard library at RubyKaigi 2024
Long journey of Ruby Standard library at RubyKaigi 2024
 
How we scaled to 80K users by doing nothing!.pdf
How we scaled to 80K users by doing nothing!.pdfHow we scaled to 80K users by doing nothing!.pdf
How we scaled to 80K users by doing nothing!.pdf
 
WebAssembly is Key to Better LLM Performance
WebAssembly is Key to Better LLM PerformanceWebAssembly is Key to Better LLM Performance
WebAssembly is Key to Better LLM Performance
 
Google I/O Extended 2024 Warsaw
Google I/O Extended 2024 WarsawGoogle I/O Extended 2024 Warsaw
Google I/O Extended 2024 Warsaw
 
Working together SRE & Platform Engineering
Working together SRE & Platform EngineeringWorking together SRE & Platform Engineering
Working together SRE & Platform Engineering
 
State of the Smart Building Startup Landscape 2024!
State of the Smart Building Startup Landscape 2024!State of the Smart Building Startup Landscape 2024!
State of the Smart Building Startup Landscape 2024!
 
Event-Driven Architecture Masterclass: Engineering a Robust, High-performance...
Event-Driven Architecture Masterclass: Engineering a Robust, High-performance...Event-Driven Architecture Masterclass: Engineering a Robust, High-performance...
Event-Driven Architecture Masterclass: Engineering a Robust, High-performance...
 
Generative AI Use Cases and Applications.pdf
Generative AI Use Cases and Applications.pdfGenerative AI Use Cases and Applications.pdf
Generative AI Use Cases and Applications.pdf
 

Facts About Computer

  • 1. FACTS ABOUT COMPUTER THE FIRST MODERN COMPUTER WAS ENORMOUS THE FIRST MODERN COMPUTER WAS ESSENTIALLY A MASSIVE CALCULATOR RAM REFERS TO A COMPUTER'S MEMORY EVERY MONTH, AROUND 6,000 COMPUTER VIRUSES ARE PUBLISHED WHEN USING A COMPUTER, IT IS CRITICAL TO TAKE BREAKS TO PROTECT YOUR EYES The earliest modern computers were electrical calculating devices built during World War II. One computer would take up whole rooms, and sections of the computers were placed on wheels due to their size. Despite its size, the first modern computer could only accomplish four tasks. Addition, subtraction, multiplication, and division RAM, which stands for Random Access Memory, is the computer's short-term memory. The computer would be unable to accomplish anything without it, from accessing files to streaming video. Computers are constantly at danger of being infected with a computer virus, which causes them to shut down or function slowly. That is why it is critical to have anti-virus software installed on your computer. Because computer screens are so bright, it's critical to take breaks every 20 minutes to protect your eyes.