Harvard mark-I and the bug, Computer Engineering

Assignment Help:

The next important effort in the direction of devising an electromechanical computer was made at Harvard University mutually sponsored by IBM and Department of UN Navy, Howard Aiken of Harvard University created a system known as Mark I in 1944. Mark I was a decimal machine means that computations were performed employing decimal digits.

Some of you should have heard a term known as 'bug'. It is mostly used to denote errors in computer programs. This term was invented when one day a program in Mark-I didn't run accurately because of a moth short-circuiting the computer. Since then moth or bug has been linked with problems or errors in computer programming. So process of eliminating error in a program is termed as 'debugging'.

The common shortcomings of these electromechanical and mechanical computers were: 

  • Inertia/Friction of moving components limited speed.
  • Data movement using liners and gears was very unreliable and difficult.

Change was to have a storing and switching mechanism with no moving parts. The electronic switching device 'triode' vacuum tubes were used so first electronic computer was born.


Related Discussions:- Harvard mark-I and the bug

Define the Load address for the first word of the program, Load address for...

Load address for the first word of the program is called? Ans. load address origin is known as load address for the first word of the program.

Ethernet 10 base 2 is an example of which topology, Ethernet 10 Base 2 is a...

Ethernet 10 Base 2 is an example of               network topology. (A)  Bus                                           (B)  Ring (C)  Star

Computers, Purpose: Front line client service. Make bookings for vehicle se...

Purpose: Front line client service. Make bookings for vehicle servicing, accesses client database, prints invoices for clients etc. The mechanics complete worksheets for the variou

What are different types of verilog simulators, What are Different types of...

What are Different types of Verilog Simulators? There are essentially two types of simulators available. -  Event Driven -  Cycle Based

Bell lapadula model, A computer system provides protection using the Bell-L...

A computer system provides protection using the Bell-LaPadula policy. How would a virus spread if A) the virus were placed on the system at system low (the compartment that all o

In what way the protection fault handler concludes, In what way the protect...

In what way the protection fault handler concludes? After finishing the implementation of the fault handler, it sets the change and protection bits and clears the copy on write

Vector processing with pipelining-vector processing, Vector Processing with...

Vector Processing with Pipelining: Since in vector processing, vector instructions perform the similar computation on dissimilar data operands repeatedly, vector processing is most

Specifying optimisation criteria of describe function, Specifying Optimisat...

Specifying Optimisation Criteria Specify values to be minimized, maximized or optimized. You can understand it as way you normalize data in database. For instance, you should

What is the most common biometrics, What is the most common biometrics? ...

What is the most common biometrics? The most common biometrics is the given below: Face geometry (Photo): In this the computer takes the picture of your face and matches t

Analysts in various functional areas, Q. Analysts in various functional are...

Q. Analysts in various functional areas? Today systems analyst's job presents a exciting and fascinating challenge. It provides high management visibility and opportunities for

Write Your Message!

Captcha
Free Assignment Quote

Assured A++ Grade

Get guaranteed satisfaction & time on delivery in every assignment order you paid with us! We ensure premium quality solution document along with free turntin report!

All rights reserved! Copyrights ©2019-2020 ExpertsMind IT Educational Pvt Ltd