140 likes | 221 Views
Under the Hood. Macs PCs James Fike 2 nd period. Where to save files to. Flash drive Hard drive E-mail to self Student folder CD-Rom Cloud. 3 types of software.
E N D
Under the Hood Macs PCs James Fike 2nd period
Where to save files to • Flash drive • Hard drive • E-mail to self • Student folder • CD-Rom • Cloud
3 types of software • System- Any software required to support the production or execution of application programs but which is not specific to any particular application. • Application-a computer program that is written and designed for a specific need or purpose. • Data-Program that merges files from several databases, extracts, filters, and summarizes the data without loss of integrity and without interference, and presents it in an easy to use format
10 Pieces of Hardware • Hard drive- It stores all data---------------------------- Motherboard-is the primary source that links your computer processor unit (CPU), your memory, and hardware. ----------------------------------------------- Graphic card- Graphics cards take data from the CPU and turn it into pictures ------------------------------------------------------------------------- Power supply- It supplies power to the various components of your computer-------------------- Monitor- is what you see your info on and what you want to see -----------------------------------------------------------------
10 Pieces of Hardware(contiued) Mouse- used to point, select, search, close, -------------- for a file program, picture, music, open an icons Keyboard- allows one to input data into an Information System------------------------------------------ Fans- primarily to prevent the CPU from overheating ----- UPS- a battery backup surge protector to keep your computer running in the event of a power outage. ------------------------------------ Flash media reader- is a device that reads the media card from a camera and transfers pictures and videos onto a-computer--------------
10 Events in Computer History • 1937 - Alan Turing: Alan Turing develops the concept of a theoretical computing machine • 1947-Douglas Engelbart:Douglas Engelbart theorizes on interactive computing with keyboard and screen display instead of on punch cards • The Transistor was developed by John Bardeen, Walter Brattain and William Shockley in 1948 • 1955-Bell Labs- introduces its first transistor computer. • 1958- Silicon chip: The first integrated circuit, or silicon chip, is produced by the US Jack Kirby & Robert Noyce
10 Events in Computer History(contiued) • 1962- The first computer game: The first computer game Space war Computer Game invented BY Steve Russell & MIT • 1967- Floppy Disk: IBM creates the first floppy disk • 1964Word processor: IBM introduces the first word processor • 1984Apple Macintosh: Apple introduces the Macintosh with mouse and window interface • 1995- Java: Java is introduced
10 measurement terms • Bit- is a contraction of the term binary digit. • Byte- is a unit of data that is eight binary digits long • Kilobyte- is 1,024 bytes • Megabyte- is 1,024 kilobytes • Gigabyte- 1,024 megabytes • Terabyte- 1,024 gigabytes • Petabyte- is 1,024 terabytes • Exabyte- is 1,024 Petabyte • Zettabyte- is 1,024 Exabyte • RAM- random access memory
First Computer • 1936- Konrad Zuse invented the Z1 Computer. This was the first computer that was freely programmable.1942- John Atanasoff and Clifford Berry created the ABC Computer.1944- John Presper Eckert and John W. Mauchly came up with the idea for the ENIAC 1 computer. It was the first real scenario where vacuum tubes were used.
First laptop • The Osborne I, the first portable computer, was designed by company founder Adam Osborne. It weighed twenty-four pound, had a five-inch display, 64KB of memory, a modem, and two 5¼-inch floppy disk drives.
Infections for Computers • Virus- are small software programs that are designed to spread from one computer to another and to interfere with computer operation. Examples- Accepting without reading, Opening e-mail attachments , and Not running the latest updates • Worm - are one form of malaware. Examples- infect a computer without any action on the users part, or it may trick a user into performing an action which would allow it to infect the computer • Trojan Horse - Innocent-looking computer program that appears to perform a legitimate and useful function, but also secretly performs destructive and illegal functions such as destroying the stored data or allowing an outsider to gainunauthorized access to the system
Five Famous computer companies • Dell- Michael S. Dell • Samsung- Lee Byung-chul- • Hp-William Hewlettand David Packard--> • Sony- Masaru Luka and Akio Morita----- • Lenovo- Lui Chuanzhi and Danny Lui----------------------
websites • www.deaflion.com • wiki.answers.com • /www.history-timelines.org • www.ehow.com • encrypted-tbn2.gstatic.com/images • /storebox1.info.com • www.techrepublic.com • ipl2.org/ • www.info.eb.com/
Thoughts for future computers I think future computers will be in our heads, or plug in our brains, or super fast and small.