Historical background of computers, Basic Computer Science

Assignment Help:

Historical Background

The brief history of the growth of computers is given below:

  1. Abacus:  It was the first mechanical device developed approximately 3,000 years ago, it consists of beads that can slide on wires. Wires represent columns. Right most column is for units, the next is for tens and so on. Various numbers can be represented by pushing appropriate beads. This device could perform simple additions and subtractions.
  2. Pascal Calculating Machine:  In 1642, Pascal devised a calculating machine for calculations. This consisted of a series of wheels having digits of zero to nine around the circumference.
  3. Jacquard Card: This utilized the concept of cards with punched holes. This was used for weaving patterns into fabric using cards with punched holes to guide the warp threads on a loom. This was invented in 1801 by Joseph Marie Jacquard.
  4. Analytical Engine:  In 1833, Charles Babbage developed the concepts for an analytical engine which could perform arithmetic functions on data, reading in from punched cards.
  5. Punched Card: In 1890, Herman Hollerith successfully devised electrical tabulating equipment. A coding scheme which would be punched into cards to represent data was devised by him. Hollerith coding system is used widely even today in the punched card equipment.
  6. Mark-1: Mark-1 was the first general purpose computer developed by Prof. Howard Aiken. It consisted of telephone relays and rotating mechanical wheels. Sequence of instructions were given using a paper tape.
  7. ENIAC: In 1946, ENIAC (Electronic Numerical Integrator And Calculator) was developed. It was a large machine containing 18,000 vacuum tubes, weighed 30 tons, occupied 1,500 sq. ft. space and a small memory of 20 accumulators each capable of storing 10 digits. It did in 1 day what once took 300 days to perform.
  8. UNIVAC: The World’s first commercial data processing machine UNIVAC (Universal Automatic Computer) of 1951, made by Remington Rand Corporation was installed for and used by the US Bureau of Census. It was used 24 hours a day for 12 years, and also is well known for having predicted the victory of President Dwight Eisenhower in the 1952 elections of the US, thus exposing to the general public the uses and capabilities of electronic computer.

 

Over the last years, the computer technology has been significantly developing. There has been tremendous reduction in size while storage capacity, speed and reliability have been increasing. 


Related Discussions:- Historical background of computers

Storage capacity and cost per bit of storage, Storage capacity and Cost per...

Storage capacity and Cost per bit of storage: Storage capacit y:  It is the amount of data that can be stored in the storage unit. A large capacity is preferred.  Cost pe

Input Devices, Keyboards, microphones, and mice have generally been used as...

Keyboards, microphones, and mice have generally been used as the standard input devices for most computer systems. The popularity of video and computer games has led to the introdu

Where data could be hidden, QUESTION (a) Being just employed as junior ...

QUESTION (a) Being just employed as junior forensic examiner at SAI computer forensic Ltd, your supervisor told you, ‘hey Moona Tambi, we have received a hard disk for examinat

What are the characteristics of a good documentation?, Question 1 What are...

Question 1 What are the differences between closed and open systems? Question 2 What are the characteristics of a good documentation? Question 3 What are the steps invol

Definition of assembler structure, In assembly language code lines have t...

In assembly language code lines have two fractions, the earliest one is the name of the instruction which is to be executed, and the next one are the parameters of the command. For

What is computer, how to use computer and how we can manage it

how to use computer and how we can manage it

Why we need data mining? Give an example to illustrate your, Why we need da...

Why we need data mining? Give an example to illustrate your answer.

Unix, How do I change file permissions? Every time I execute chmod commands...

How do I change file permissions? Every time I execute chmod commands it tells me permission denied.

ASSIGNMENTS, A STAIRCASE LIGHT IS CONTROLLED BY TWO SWITCHES ONE AT THE TOP...

A STAIRCASE LIGHT IS CONTROLLED BY TWO SWITCHES ONE AT THE TOP OF THE STAIRS AND ANOTHER AT THE BOTTOM OF STAIRS

Write Your Message!

Captcha
Free Assignment Quote

Assured A++ Grade

Get guaranteed satisfaction & time on delivery in every assignment order you paid with us! We ensure premium quality solution document along with free turntin report!

All rights reserved! Copyrights ©2019-2020 ExpertsMind IT Educational Pvt Ltd