Historical background of computers, Basic Computer Science

Assignment Help:

Historical Background

The brief history of the growth of computers is given below:

  1. Abacus:  It was the first mechanical device developed approximately 3,000 years ago, it consists of beads that can slide on wires. Wires represent columns. Right most column is for units, the next is for tens and so on. Various numbers can be represented by pushing appropriate beads. This device could perform simple additions and subtractions.
  2. Pascal Calculating Machine:  In 1642, Pascal devised a calculating machine for calculations. This consisted of a series of wheels having digits of zero to nine around the circumference.
  3. Jacquard Card: This utilized the concept of cards with punched holes. This was used for weaving patterns into fabric using cards with punched holes to guide the warp threads on a loom. This was invented in 1801 by Joseph Marie Jacquard.
  4. Analytical Engine:  In 1833, Charles Babbage developed the concepts for an analytical engine which could perform arithmetic functions on data, reading in from punched cards.
  5. Punched Card: In 1890, Herman Hollerith successfully devised electrical tabulating equipment. A coding scheme which would be punched into cards to represent data was devised by him. Hollerith coding system is used widely even today in the punched card equipment.
  6. Mark-1: Mark-1 was the first general purpose computer developed by Prof. Howard Aiken. It consisted of telephone relays and rotating mechanical wheels. Sequence of instructions were given using a paper tape.
  7. ENIAC: In 1946, ENIAC (Electronic Numerical Integrator And Calculator) was developed. It was a large machine containing 18,000 vacuum tubes, weighed 30 tons, occupied 1,500 sq. ft. space and a small memory of 20 accumulators each capable of storing 10 digits. It did in 1 day what once took 300 days to perform.
  8. UNIVAC: The World’s first commercial data processing machine UNIVAC (Universal Automatic Computer) of 1951, made by Remington Rand Corporation was installed for and used by the US Bureau of Census. It was used 24 hours a day for 12 years, and also is well known for having predicted the victory of President Dwight Eisenhower in the 1952 elections of the US, thus exposing to the general public the uses and capabilities of electronic computer.

 

Over the last years, the computer technology has been significantly developing. There has been tremendous reduction in size while storage capacity, speed and reliability have been increasing. 


Related Discussions:- Historical background of computers

Execute a command in operating system, Execute a command in operating syste...

Execute a command in operating system: In order to execute a command OS does the following steps:   It accepts a command from a user through mouse clicks or from t

2. What benefits can a company gain by managing its , 2. What benefits can ...

2. What benefits can a company gain by managing its own information infrastructure and services?

Applications software, Applications Software: General aspects on appli...

Applications Software: General aspects on applications software. Applications software is the program that allow the user to get the required work done. In other words, applic

Computer Networking and configuaration, Ask queYou are hired as a Chief Tec...

Ask queYou are hired as a Chief Technology Officer (CTO) of a startup company, which has two branches; one Los Angeles and one in San Francisco. The company hired employees to begi

Visual Basic 2012, Can someone help me write a code for force = mass * acce...

Can someone help me write a code for force = mass * acceleration.

File sharing architecture, File Sharing Architecture:   The developmen...

File Sharing Architecture:   The development of microprocessor, PC and LAN transformed dumb terminals into -smart? clients. This brought a complete change in the computing env

Explain the protection features of ms access, Question 1 Explain the pr...

Question 1 Explain the protection features of MS Access? 2 What is Query Parameter? 3 What are the steps to be taken for improving performance of Microsoft Access database? 4 W

Define Program formation process, For the formation of a program it is nece...

For the formation of a program it is necessary to follow five steps: Design of the algorithm, stage the problem to be solved is reputable and the best solution is proposed, creatin

Binary, change 778 into binarynumber

change 778 into binarynumber

About flag instructions, They straightforwardly affect the content of the f...

They straightforwardly affect the content of the flags. CLC CLD CLI CMC STC STD STI CLC INSTRUCTION Reason: To uncontaminated the cartage flag. Syntax: CLC This instruction turning

Write Your Message!

Captcha
Free Assignment Quote

Assured A++ Grade

Get guaranteed satisfaction & time on delivery in every assignment order you paid with us! We ensure premium quality solution document along with free turntin report!

All rights reserved! Copyrights ©2019-2020 ExpertsMind IT Educational Pvt Ltd