Computer generations, Basic Computer Science

Assignment Help:

Computer Generations:

From the early 1940's to the present, computer scientists have been able to identify clear-cut stages in the development of computer technology. With each stage radical breakthroughs in electronics occurred, with the result that the computers based on the older technology of electronics have been replaced by a newer form of machine& These stages have been referred to as generation, where each computer generation had certain unique characteristics or properties. Some of these aspects are discussed in the following paragraphs. 

From first generation of vacuum, tube computers, computer design advanced through developments in hardware and software. On the hardware side, the computer changed with the replacement of vacuum tubes by transistors, the progressive miniaturisation of integrated circuitry, and the development of enhanced electronic memory. The transistor invented at Bell Laboratories in 1948, did not completely replace the vacuum tube in computers until the beginning of the 1960s. The second generation of computers was based on transistors and magnetic core memory. Although integrated circuit was developed in the late 1 950s, it was too expensive and untested for wide spread commercial use. However military applications of integrated circuits in the rocket and space flight programmes proved the reliability of integrated circuit technology. 

The third generation computers based on integrated circuits and semiconductor memory, appeared in the late 1960s. From 1970s on, rapid advances in large-scale integration (LSI)of transistors on silicon chips, inexpensive random access memory (RAM), and microprocessors led to the production of powerful fourth generation mainframes, midsize minicomputers, personal computers, and workstations. Throughout this period, the steady advance of semi-conductor technology allowed the number of transistors on a chip to double every year, reaching the levels of 500,000 transistors integrated on a square centimeter. Chips with one million elements are now in production.

On the software skip, the development of operating systems, computer languages, programming techniques and applications accompanied the changes in hardware. The first computers were programmed with assembly language code. As this method was difficult and lime consuming, programming languages evolved quickly through second generation intermediate code to third generation high level languages. In 1953, John Backus at IBM developed the first high level language, FORTRAN for scientific applications. In the year 1959, Grace Hopper was mainly responsible for the creation of COBOL, a language for commercial and record-keeping applications. The movement from batch processing to time-sharing systems with terminals in the 1960s and 1970s led to the development of more interactive languages such as BASIC and APL Programmers have also written many special purpose languages for artificial intelligence (e.g., LISP and PROLOG), simulation (SNOBOL and SIMULA), and other uses.  


Related Discussions:- Computer generations

Security threats on internet, Security threats on internet:  The Inter...

Security threats on internet:  The Internet has many advantages; however, it also opens up security threat. In this section we just want to highlight some of the threats that

Comp 100, I have an account in my www.itlab.com and i have a test and it s...

I have an account in my www.itlab.com and i have a test and it should do tonight, so do you have any one to help me and do this test and it is about excel

Syntax of a Macro, The divisions which make a macro are: • Declaration of t...

The divisions which make a macro are: • Declaration of the macro Code of the macro Macro termination directive The assertion of the macro is done the following way: Name Macro [par

Write the function pop in c, QUESTION (a) Convert each of the following...

QUESTION (a) Convert each of the following expressions to prefix and postfix. (i) (A+B)*(C+D) (ii) A-B/(C*D^E) (^ denotes exponentiation) (b) The following algorithm c

Networking, what is computer topology .

what is computer topology .

Area of curve, Write a program to find the area under the curve y = f(x) be...

Write a program to find the area under the curve y = f(x) between x = a and x = b, integrate y = f(x) between the limits of a and b. The area under a curve between two points can b

Data communication & net centric computing, Suppose there are exactly five ...

Suppose there are exactly five packet switches (Figure 4) between a sending host and a receiving host connected by a virtual circuit line (shown as dotted line in figure 4). The tr

Ascii & unicode, ASCII code:  An alphanumeric code has to represent 10...

ASCII code:  An alphanumeric code has to represent 10 decimal digits, 26 alphabets and certain other symbols such as punctuation marks and special characters. Therefore, a min

Computer science, Explain Canonical cover and Extraneous Attributes with ex...

Explain Canonical cover and Extraneous Attributes with examples.

Write Your Message!

Captcha
Free Assignment Quote

Assured A++ Grade

Get guaranteed satisfaction & time on delivery in every assignment order you paid with us! We ensure premium quality solution document along with free turntin report!

All rights reserved! Copyrights ©2019-2020 ExpertsMind IT Educational Pvt Ltd