Computer generations, Basic Computer Science

Assignment Help:

Computer Generations:

From the early 1940's to the present, computer scientists have been able to identify clear-cut stages in the development of computer technology. With each stage radical breakthroughs in electronics occurred, with the result that the computers based on the older technology of electronics have been replaced by a newer form of machine& These stages have been referred to as generation, where each computer generation had certain unique characteristics or properties. Some of these aspects are discussed in the following paragraphs. 

From first generation of vacuum, tube computers, computer design advanced through developments in hardware and software. On the hardware side, the computer changed with the replacement of vacuum tubes by transistors, the progressive miniaturisation of integrated circuitry, and the development of enhanced electronic memory. The transistor invented at Bell Laboratories in 1948, did not completely replace the vacuum tube in computers until the beginning of the 1960s. The second generation of computers was based on transistors and magnetic core memory. Although integrated circuit was developed in the late 1 950s, it was too expensive and untested for wide spread commercial use. However military applications of integrated circuits in the rocket and space flight programmes proved the reliability of integrated circuit technology. 

The third generation computers based on integrated circuits and semiconductor memory, appeared in the late 1960s. From 1970s on, rapid advances in large-scale integration (LSI)of transistors on silicon chips, inexpensive random access memory (RAM), and microprocessors led to the production of powerful fourth generation mainframes, midsize minicomputers, personal computers, and workstations. Throughout this period, the steady advance of semi-conductor technology allowed the number of transistors on a chip to double every year, reaching the levels of 500,000 transistors integrated on a square centimeter. Chips with one million elements are now in production.

On the software skip, the development of operating systems, computer languages, programming techniques and applications accompanied the changes in hardware. The first computers were programmed with assembly language code. As this method was difficult and lime consuming, programming languages evolved quickly through second generation intermediate code to third generation high level languages. In 1953, John Backus at IBM developed the first high level language, FORTRAN for scientific applications. In the year 1959, Grace Hopper was mainly responsible for the creation of COBOL, a language for commercial and record-keeping applications. The movement from batch processing to time-sharing systems with terminals in the 1960s and 1970s led to the development of more interactive languages such as BASIC and APL Programmers have also written many special purpose languages for artificial intelligence (e.g., LISP and PROLOG), simulation (SNOBOL and SIMULA), and other uses.  


Related Discussions:- Computer generations

Storage mechanism of magnetic disk, Storage Mechanism of Magnetic disk: ...

Storage Mechanism of Magnetic disk: Storage Mechanism: Magnetic disk drives contain metal disks that are coated on both sides with an iron oxide recording material. Several

Design Buffer Last-in First-out, i want design circuit this Buffer(LIFO).pl...

i want design circuit this Buffer(LIFO).please help me

Arinc 429 data bus specifications, ARINC 429 DATA Bus SPECIFICATIONS: A...

ARINC 429 DATA Bus SPECIFICATIONS: ARINC 429 sets specifications for the transfer of digital data between aircraft electronic system components and is a "One-way" communication

Access time - storage devices, Access time: Access time: This is the t...

Access time: Access time: This is the time required to locate and retrieve stored data from the storage unit in response to a program instruction. That is the time interval be

SOFTWARE, main task of sofware developper

main task of sofware developper

Cryptography, Consider the one-time pad encryption scheme to encrypt a 1-bi...

Consider the one-time pad encryption scheme to encrypt a 1-bit message m, and assume m is chosen with uniform distribution from message space M={0,1}. Let E1 be the event "message

Algorithm implementation, Implementing the -Crochemore-Perrin algorithm Th...

Implementing the -Crochemore-Perrin algorithm The software must be functional, code must be clear and including comments and it must have a nice and decent user interface

Classification of database management systems, Question 1: (a) Describ...

Question 1: (a) Describe the three ways of classification of Database management systems (DBMS). (b) Why are System Analysts and Database Administrators needed in compa

Internet searching, Internet searching:  The Internet consists of mill...

Internet searching:  The Internet consists of millions of private/public/academic/business and government networks having local to global scope. It has billions of web pages o

Algorithms and flowcharts, write algorithm and draw flowchart to check whet...

write algorithm and draw flowchart to check whether the given number is palindrome or not

Write Your Message!

Captcha
Free Assignment Quote

Assured A++ Grade

Get guaranteed satisfaction & time on delivery in every assignment order you paid with us! We ensure premium quality solution document along with free turntin report!

All rights reserved! Copyrights ©2019-2020 ExpertsMind IT Educational Pvt Ltd