Era of first generation computers, Computer Engineering

Assignment Help:

Q. Era of first generation computers?

The trends that were encountered at the time of the era of first generation computers were:

  • Centralized control in a single CPU (all the operations needed a direct intervention of the CPU).
  • Use of ferrite-core main memory was begun during this time.
  • Concepts like use of virtual memory and index register started.
  • Punched cards were used for input device.
  • Magnetic drums and magnetic tapes were used as secondary memory.
  • Machine language or binary code was used for programming.
  • Towards the end because of difficulties encountered in use of machine language as programming language. The use of symbolic language that is now called as assembly language started.
  • Assembler a program that converts assembly language programs to machine language was developed.
  • Computer was available to only one programmer at a time (single user environment).
  • Advent of von-Neumann architecture.

 


Related Discussions:- Era of first generation computers

Utilization summary, Utilization Summary The Utilization Summary shows ...

Utilization Summary The Utilization Summary shows the status of each processor i.e. how much time (in the form of percentage) have been spent by every processor in busy mode, o

What is datapool, A datapool is a source of variable test data that scripts...

A datapool is a source of variable test data that scripts can draw from during playback

Explain vehicle tracking system, Case Study - A taxi company has 200 taxies...

Case Study - A taxi company has 200 taxies. The company provides its services to all the nine districts in Mauritius, about 20 taxies per district. A taxi is normally attached to

Introduction to parallel computing, Introduction  To Parallel Computing ...

Introduction  To Parallel Computing Parallel computing has been a subject of importance in the computing community over the last few years. Ever-growing volume of databases and

Explain a scheme of capability list to implement protection, Describe the s...

Describe the scheme of capability lists to implement protection? Capability lists (C- lists): These lists are utilized to make sure that uses only access files that are e

Advanced topics of html, HTML is made up of many elements, a lot of them ar...

HTML is made up of many elements, a lot of them are overlooked. Though you can develop a Website with the basic knowledge of HTML, to take benefit of many of the advanced features,

Discuss the process of data mining, Discuss the process of data mining? ...

Discuss the process of data mining? The process of data mining having of three stages: (1)The initial exploration (2) Model building or pattern identification with validat

What is public, * Public, protected and private are 3 access specifier in C...

* Public, protected and private are 3 access specifier in C++. * Public data members and member functions are accessible outside the class. * Protected data members and memb

Write Your Message!

Captcha
Free Assignment Quote

Assured A++ Grade

Get guaranteed satisfaction & time on delivery in every assignment order you paid with us! We ensure premium quality solution document along with free turntin report!

All rights reserved! Copyrights ©2019-2020 ExpertsMind IT Educational Pvt Ltd