Drawback of these electromechanical and mechanical computers, Computer Engineering

Assignment Help:

Drawback of these electromechanical and mechanical computers

The basic drawback was:

  • Inertia/friction of moving components had limited speed.
  • The data movement using liner and gears was quite complex and unreliable.
  • The change was to have storing and switching mechanism with no moving parts and then electronic switching technique "triode" vacuum tubes were used and hence born first electronic computer.
  • The development of digital computing is often divided into generations. Each generation is characterized by vivid improvements over previous one in technology used to build computers, internal organization of computer systems and programming languages. Although not usually connected with computer generations, there has been a steady advancement in algorithms, including algorithms required in computational science. The following history has been prepared using these widely recognized generations as milestones.

 


Related Discussions:- Drawback of these electromechanical and mechanical computers

Differentiate between validation and simulation, Question 1: a) Name a...

Question 1: a) Name and give a brief description of three Real-Time Systems. b) State three downfalls of Embedded Systems. c) Differentiate between a microprocessor an

Explain documentation libraries, The documentation rules are almost exactly...

The documentation rules are almost exactly the similar as for Scripts "Documenting scripts". Although from a technical point of view it is feasible to place measures in libraries i

If the system is not booting what can we do, First we must go to bios and s...

First we must go to bios and should check boot sequence,local add statusOr we should check RAM & check h.d.d cable. check cd writer for cd or dvd

Performance of a parallel algorithm - number of processors, Factor which he...

Factor which helps in analysis of parallel algorithms is the total number of processors needed to deliver a solution to a provided problem. So for a given input of size let's say n

Discussion., Functionality first and then Security?

Functionality first and then Security?

Give some examples of malicious data, Give some examples of malicious data....

Give some examples of malicious data.  In May 2002, the Norton Anti-Virus software for Windows operating systems detects about 61000 malicious programs. Some of them are named

Explain the storage class auto, Explain The Storage Class auto The Stor...

Explain The Storage Class auto The Storage Class auto : Variables declared within function bodies are automatic by default. Thus, automatic is the most common of the four stora

How can we convert infix expression to a postfix expression, One can change...

One can change an infix expression to a postfix expression using a By using Stack you can convert infix expression to a postfix expression

Example of a router connects to at most networks, A router connects to at m...

A router connects to at most K networks. How many routers R are required to connect to N networks? Derive an equation that gives R in terms of N and K. If N K and K >=2 this

Write Your Message!

Captcha
Free Assignment Quote

Assured A++ Grade

Get guaranteed satisfaction & time on delivery in every assignment order you paid with us! We ensure premium quality solution document along with free turntin report!

All rights reserved! Copyrights ©2019-2020 ExpertsMind IT Educational Pvt Ltd