SlideShare a Scribd company logo
The Development of the
Computer Technology
Pioneers – Fathers of Computing
Charles Babbage
1791-1871
John Atanasoff
1903-1995
Konrad Zuse
1910 - 1995
Difference Machine
Charles Babbage
Z 1 Machine
Konrad Zuse
ABC Computer
Jone Atanasoff
Alan Turing
1912-1964
Pioneers
John Mauchly
1907-1980
Presper Eckert
1919- 1995
First Generation (1945)
First Generation (1945)
used vacuum tubes
weighed 30 tons
used 18,000 vacuum tubes
occupied a 3,000 cubic feet
had only 12K memory
Vacuum Tubes
Second Generation
(late1950s)
 used transistors
 became
–smaller
–faster
–reliable
–less expensive
Second Generation
(late1950s)
Third Generation (late
1960s)
 used integrated circuit
 resulted in a lower cost
Third Generation (late
1960s)
 used large scale integration (LSI)
LSI placed several thousand
transistors onto a single chip. It
was followed by the development
of very large-scale integration
(VLSI).
Fourth Generation
(early 1970s-mid 1970s)
Fourth Generation
(early 1970s-mid 1970s)
Fifth Generation of the
Computer
 Mega chip memory
 Parallel processing (vs. serial
processing)
 Natural language processing
 Artificial intelligence
Fifth Generation of the
Computer
Computer System
 CPU
 Input devices
 Output devices
 Storage devices
Storage Device
 Disks
 Hard drives
 CDs
 RAM
 ROM
Computer Memory
 Byte = One storage position
 Kilobyte = One thousand storage position
 Megabyte = One million storage position
 Gigabyte = One billion storage position
 Terabyte = One trillion storage position
Computer Memory
1 byte = 8 bits
Short for binary digit, the smallest unit of
information on a machine. A single bit can hold
only one of two values: 0 or 1. More meaningful
information is obtained by combining consecutive
bits into larger units. For example, a byte is
composed of 8 consecutive bits.
Computer Memory
7 = 0 0 0 0 1 1 1 1
6 = 0 0 1 1 0 0 1 1
5 = 0 1 0 1 0 1 0 1
Computer Memory
A= 0 1 0 0 0 0 0 1
B = 0 1 0 0 0 0 1 0
C= 0 1 0 0 0 0 1 1
Computer Memory
1 MB = 285 pages (text)
5 MB = The complete works of Shakespeare
or 30 seconds of TV quality video
1 GB = A pick up truck filled with paper
2 GB = 20 meters of shelved books
20 GB= A good collection of the works of
Beethoven

More Related Content

Similar to History of computing

Module-1 Introduction to Computer & Basic Concepts.pdf
Module-1 Introduction to Computer & Basic Concepts.pdfModule-1 Introduction to Computer & Basic Concepts.pdf
Module-1 Introduction to Computer & Basic Concepts.pdf
KCIINSTITUTE
 
History of computer
History of computerHistory of computer
History of computer
aimycute_
 
History of Computer (Evolution in Computern).ppt
History of Computer (Evolution in Computern).pptHistory of Computer (Evolution in Computern).ppt
History of Computer (Evolution in Computern).ppt
UmairMohmand
 
Computer_Programming_Fundamentals CHAPTER 2.pptx
Computer_Programming_Fundamentals CHAPTER 2.pptxComputer_Programming_Fundamentals CHAPTER 2.pptx
Computer_Programming_Fundamentals CHAPTER 2.pptx
BernardVelasco1
 
History of Computers Lesson two of indus
History of Computers Lesson two of indusHistory of Computers Lesson two of indus
History of Computers Lesson two of indus
NiaGelAparecio
 
Invention of comoputer cpi
Invention of comoputer cpiInvention of comoputer cpi
Invention of comoputer cpi
divyeshrathod18
 
The History Of Computers
The History Of ComputersThe History Of Computers
The History Of Computers
kme1011
 
IT315B
IT315BIT315B
IT315B
earl86
 
Evolution of computers
Evolution of computersEvolution of computers
Evolution of computers
Aryan Kabra
 
History of-computers by SHIVAM TYAGI
History of-computers by SHIVAM TYAGIHistory of-computers by SHIVAM TYAGI
History of-computers by SHIVAM TYAGI
ShivamTyagi106
 
Principles It Lesson2 Presentation 052308
Principles It Lesson2 Presentation 052308Principles It Lesson2 Presentation 052308
Principles It Lesson2 Presentation 052308drussell54
 
The History of the Computer
The History of the ComputerThe History of the Computer
The History of the Computer
Sara Poirier
 
Generation of computer
Generation of computerGeneration of computer
Generation of computerNiti Arora
 
Generation of computer
Generation of computerGeneration of computer
Generation of computer
Niti Arora
 
History of computer
History of computerHistory of computer
History of computer
DIIT, Bhubaneswar
 
History of computer
History of computerHistory of computer
History of computer
BeeducatorComputer
 
Journey of computing
Journey of computingJourney of computing
Journey of computing
Tushar B Kute
 
History of computing
History of computingHistory of computing
History of computing
Hossain Md Shakhawat
 

Similar to History of computing (20)

Module-1 Introduction to Computer & Basic Concepts.pdf
Module-1 Introduction to Computer & Basic Concepts.pdfModule-1 Introduction to Computer & Basic Concepts.pdf
Module-1 Introduction to Computer & Basic Concepts.pdf
 
History of computer
History of computerHistory of computer
History of computer
 
History of Computer (Evolution in Computern).ppt
History of Computer (Evolution in Computern).pptHistory of Computer (Evolution in Computern).ppt
History of Computer (Evolution in Computern).ppt
 
Computer_Programming_Fundamentals CHAPTER 2.pptx
Computer_Programming_Fundamentals CHAPTER 2.pptxComputer_Programming_Fundamentals CHAPTER 2.pptx
Computer_Programming_Fundamentals CHAPTER 2.pptx
 
History of Computers Lesson two of indus
History of Computers Lesson two of indusHistory of Computers Lesson two of indus
History of Computers Lesson two of indus
 
Invention of comoputer cpi
Invention of comoputer cpiInvention of comoputer cpi
Invention of comoputer cpi
 
The History Of Computers
The History Of ComputersThe History Of Computers
The History Of Computers
 
IT315B
IT315BIT315B
IT315B
 
Evolution of computers
Evolution of computersEvolution of computers
Evolution of computers
 
history.ppt
history.ppthistory.ppt
history.ppt
 
History of Computers
History of ComputersHistory of Computers
History of Computers
 
History of-computers by SHIVAM TYAGI
History of-computers by SHIVAM TYAGIHistory of-computers by SHIVAM TYAGI
History of-computers by SHIVAM TYAGI
 
Principles It Lesson2 Presentation 052308
Principles It Lesson2 Presentation 052308Principles It Lesson2 Presentation 052308
Principles It Lesson2 Presentation 052308
 
The History of the Computer
The History of the ComputerThe History of the Computer
The History of the Computer
 
Generation of computer
Generation of computerGeneration of computer
Generation of computer
 
Generation of computer
Generation of computerGeneration of computer
Generation of computer
 
History of computer
History of computerHistory of computer
History of computer
 
History of computer
History of computerHistory of computer
History of computer
 
Journey of computing
Journey of computingJourney of computing
Journey of computing
 
History of computing
History of computingHistory of computing
History of computing
 

Recently uploaded

Monitoring Java Application Security with JDK Tools and JFR Events
Monitoring Java Application Security with JDK Tools and JFR EventsMonitoring Java Application Security with JDK Tools and JFR Events
Monitoring Java Application Security with JDK Tools and JFR Events
Ana-Maria Mihalceanu
 
GDG Cloud Southlake #33: Boule & Rebala: Effective AppSec in SDLC using Deplo...
GDG Cloud Southlake #33: Boule & Rebala: Effective AppSec in SDLC using Deplo...GDG Cloud Southlake #33: Boule & Rebala: Effective AppSec in SDLC using Deplo...
GDG Cloud Southlake #33: Boule & Rebala: Effective AppSec in SDLC using Deplo...
James Anderson
 
Accelerate your Kubernetes clusters with Varnish Caching
Accelerate your Kubernetes clusters with Varnish CachingAccelerate your Kubernetes clusters with Varnish Caching
Accelerate your Kubernetes clusters with Varnish Caching
Thijs Feryn
 
FIDO Alliance Osaka Seminar: Passkeys at Amazon.pdf
FIDO Alliance Osaka Seminar: Passkeys at Amazon.pdfFIDO Alliance Osaka Seminar: Passkeys at Amazon.pdf
FIDO Alliance Osaka Seminar: Passkeys at Amazon.pdf
FIDO Alliance
 
To Graph or Not to Graph Knowledge Graph Architectures and LLMs
To Graph or Not to Graph Knowledge Graph Architectures and LLMsTo Graph or Not to Graph Knowledge Graph Architectures and LLMs
To Graph or Not to Graph Knowledge Graph Architectures and LLMs
Paul Groth
 
Elevating Tactical DDD Patterns Through Object Calisthenics
Elevating Tactical DDD Patterns Through Object CalisthenicsElevating Tactical DDD Patterns Through Object Calisthenics
Elevating Tactical DDD Patterns Through Object Calisthenics
Dorra BARTAGUIZ
 
Epistemic Interaction - tuning interfaces to provide information for AI support
Epistemic Interaction - tuning interfaces to provide information for AI supportEpistemic Interaction - tuning interfaces to provide information for AI support
Epistemic Interaction - tuning interfaces to provide information for AI support
Alan Dix
 
UiPath Test Automation using UiPath Test Suite series, part 3
UiPath Test Automation using UiPath Test Suite series, part 3UiPath Test Automation using UiPath Test Suite series, part 3
UiPath Test Automation using UiPath Test Suite series, part 3
DianaGray10
 
When stars align: studies in data quality, knowledge graphs, and machine lear...
When stars align: studies in data quality, knowledge graphs, and machine lear...When stars align: studies in data quality, knowledge graphs, and machine lear...
When stars align: studies in data quality, knowledge graphs, and machine lear...
Elena Simperl
 
Unsubscribed: Combat Subscription Fatigue With a Membership Mentality by Head...
Unsubscribed: Combat Subscription Fatigue With a Membership Mentality by Head...Unsubscribed: Combat Subscription Fatigue With a Membership Mentality by Head...
Unsubscribed: Combat Subscription Fatigue With a Membership Mentality by Head...
Product School
 
Connector Corner: Automate dynamic content and events by pushing a button
Connector Corner: Automate dynamic content and events by pushing a buttonConnector Corner: Automate dynamic content and events by pushing a button
Connector Corner: Automate dynamic content and events by pushing a button
DianaGray10
 
UiPath Test Automation using UiPath Test Suite series, part 4
UiPath Test Automation using UiPath Test Suite series, part 4UiPath Test Automation using UiPath Test Suite series, part 4
UiPath Test Automation using UiPath Test Suite series, part 4
DianaGray10
 
Software Delivery At the Speed of AI: Inflectra Invests In AI-Powered Quality
Software Delivery At the Speed of AI: Inflectra Invests In AI-Powered QualitySoftware Delivery At the Speed of AI: Inflectra Invests In AI-Powered Quality
Software Delivery At the Speed of AI: Inflectra Invests In AI-Powered Quality
Inflectra
 
FIDO Alliance Osaka Seminar: FIDO Security Aspects.pdf
FIDO Alliance Osaka Seminar: FIDO Security Aspects.pdfFIDO Alliance Osaka Seminar: FIDO Security Aspects.pdf
FIDO Alliance Osaka Seminar: FIDO Security Aspects.pdf
FIDO Alliance
 
Mission to Decommission: Importance of Decommissioning Products to Increase E...
Mission to Decommission: Importance of Decommissioning Products to Increase E...Mission to Decommission: Importance of Decommissioning Products to Increase E...
Mission to Decommission: Importance of Decommissioning Products to Increase E...
Product School
 
AI for Every Business: Unlocking Your Product's Universal Potential by VP of ...
AI for Every Business: Unlocking Your Product's Universal Potential by VP of ...AI for Every Business: Unlocking Your Product's Universal Potential by VP of ...
AI for Every Business: Unlocking Your Product's Universal Potential by VP of ...
Product School
 
State of ICS and IoT Cyber Threat Landscape Report 2024 preview
State of ICS and IoT Cyber Threat Landscape Report 2024 previewState of ICS and IoT Cyber Threat Landscape Report 2024 preview
State of ICS and IoT Cyber Threat Landscape Report 2024 preview
Prayukth K V
 
Dev Dives: Train smarter, not harder – active learning and UiPath LLMs for do...
Dev Dives: Train smarter, not harder – active learning and UiPath LLMs for do...Dev Dives: Train smarter, not harder – active learning and UiPath LLMs for do...
Dev Dives: Train smarter, not harder – active learning and UiPath LLMs for do...
UiPathCommunity
 
Bits & Pixels using AI for Good.........
Bits & Pixels using AI for Good.........Bits & Pixels using AI for Good.........
Bits & Pixels using AI for Good.........
Alison B. Lowndes
 
How world-class product teams are winning in the AI era by CEO and Founder, P...
How world-class product teams are winning in the AI era by CEO and Founder, P...How world-class product teams are winning in the AI era by CEO and Founder, P...
How world-class product teams are winning in the AI era by CEO and Founder, P...
Product School
 

Recently uploaded (20)

Monitoring Java Application Security with JDK Tools and JFR Events
Monitoring Java Application Security with JDK Tools and JFR EventsMonitoring Java Application Security with JDK Tools and JFR Events
Monitoring Java Application Security with JDK Tools and JFR Events
 
GDG Cloud Southlake #33: Boule & Rebala: Effective AppSec in SDLC using Deplo...
GDG Cloud Southlake #33: Boule & Rebala: Effective AppSec in SDLC using Deplo...GDG Cloud Southlake #33: Boule & Rebala: Effective AppSec in SDLC using Deplo...
GDG Cloud Southlake #33: Boule & Rebala: Effective AppSec in SDLC using Deplo...
 
Accelerate your Kubernetes clusters with Varnish Caching
Accelerate your Kubernetes clusters with Varnish CachingAccelerate your Kubernetes clusters with Varnish Caching
Accelerate your Kubernetes clusters with Varnish Caching
 
FIDO Alliance Osaka Seminar: Passkeys at Amazon.pdf
FIDO Alliance Osaka Seminar: Passkeys at Amazon.pdfFIDO Alliance Osaka Seminar: Passkeys at Amazon.pdf
FIDO Alliance Osaka Seminar: Passkeys at Amazon.pdf
 
To Graph or Not to Graph Knowledge Graph Architectures and LLMs
To Graph or Not to Graph Knowledge Graph Architectures and LLMsTo Graph or Not to Graph Knowledge Graph Architectures and LLMs
To Graph or Not to Graph Knowledge Graph Architectures and LLMs
 
Elevating Tactical DDD Patterns Through Object Calisthenics
Elevating Tactical DDD Patterns Through Object CalisthenicsElevating Tactical DDD Patterns Through Object Calisthenics
Elevating Tactical DDD Patterns Through Object Calisthenics
 
Epistemic Interaction - tuning interfaces to provide information for AI support
Epistemic Interaction - tuning interfaces to provide information for AI supportEpistemic Interaction - tuning interfaces to provide information for AI support
Epistemic Interaction - tuning interfaces to provide information for AI support
 
UiPath Test Automation using UiPath Test Suite series, part 3
UiPath Test Automation using UiPath Test Suite series, part 3UiPath Test Automation using UiPath Test Suite series, part 3
UiPath Test Automation using UiPath Test Suite series, part 3
 
When stars align: studies in data quality, knowledge graphs, and machine lear...
When stars align: studies in data quality, knowledge graphs, and machine lear...When stars align: studies in data quality, knowledge graphs, and machine lear...
When stars align: studies in data quality, knowledge graphs, and machine lear...
 
Unsubscribed: Combat Subscription Fatigue With a Membership Mentality by Head...
Unsubscribed: Combat Subscription Fatigue With a Membership Mentality by Head...Unsubscribed: Combat Subscription Fatigue With a Membership Mentality by Head...
Unsubscribed: Combat Subscription Fatigue With a Membership Mentality by Head...
 
Connector Corner: Automate dynamic content and events by pushing a button
Connector Corner: Automate dynamic content and events by pushing a buttonConnector Corner: Automate dynamic content and events by pushing a button
Connector Corner: Automate dynamic content and events by pushing a button
 
UiPath Test Automation using UiPath Test Suite series, part 4
UiPath Test Automation using UiPath Test Suite series, part 4UiPath Test Automation using UiPath Test Suite series, part 4
UiPath Test Automation using UiPath Test Suite series, part 4
 
Software Delivery At the Speed of AI: Inflectra Invests In AI-Powered Quality
Software Delivery At the Speed of AI: Inflectra Invests In AI-Powered QualitySoftware Delivery At the Speed of AI: Inflectra Invests In AI-Powered Quality
Software Delivery At the Speed of AI: Inflectra Invests In AI-Powered Quality
 
FIDO Alliance Osaka Seminar: FIDO Security Aspects.pdf
FIDO Alliance Osaka Seminar: FIDO Security Aspects.pdfFIDO Alliance Osaka Seminar: FIDO Security Aspects.pdf
FIDO Alliance Osaka Seminar: FIDO Security Aspects.pdf
 
Mission to Decommission: Importance of Decommissioning Products to Increase E...
Mission to Decommission: Importance of Decommissioning Products to Increase E...Mission to Decommission: Importance of Decommissioning Products to Increase E...
Mission to Decommission: Importance of Decommissioning Products to Increase E...
 
AI for Every Business: Unlocking Your Product's Universal Potential by VP of ...
AI for Every Business: Unlocking Your Product's Universal Potential by VP of ...AI for Every Business: Unlocking Your Product's Universal Potential by VP of ...
AI for Every Business: Unlocking Your Product's Universal Potential by VP of ...
 
State of ICS and IoT Cyber Threat Landscape Report 2024 preview
State of ICS and IoT Cyber Threat Landscape Report 2024 previewState of ICS and IoT Cyber Threat Landscape Report 2024 preview
State of ICS and IoT Cyber Threat Landscape Report 2024 preview
 
Dev Dives: Train smarter, not harder – active learning and UiPath LLMs for do...
Dev Dives: Train smarter, not harder – active learning and UiPath LLMs for do...Dev Dives: Train smarter, not harder – active learning and UiPath LLMs for do...
Dev Dives: Train smarter, not harder – active learning and UiPath LLMs for do...
 
Bits & Pixels using AI for Good.........
Bits & Pixels using AI for Good.........Bits & Pixels using AI for Good.........
Bits & Pixels using AI for Good.........
 
How world-class product teams are winning in the AI era by CEO and Founder, P...
How world-class product teams are winning in the AI era by CEO and Founder, P...How world-class product teams are winning in the AI era by CEO and Founder, P...
How world-class product teams are winning in the AI era by CEO and Founder, P...
 

History of computing