SlideShare ist ein Scribd-Unternehmen logo
1 von 15
History of Computers




Elizabeth Yaskilevich
The very first calculating device used was the ten
fingers of a man’s hands. This, in fact, is why
today we count in tens and multiply of tens.
Then the abacus was invented, a bead frame in which the
beads are moved from left to right. People went on using
some form of abacus well into the 16th century, it is being
used in some parts of the world because it can be
understood without knowing how to read.
During the 17th and 18th centuries many people tried to
find easy ways of calculating. J.Napier, a Scotsman,
devised a mechanical way of multiplying and dividing,
which is how the modern slide rule works.
Henry Briggs used Napier’s ideas to produce
logarithm which all mathematicians used today.
The first real calculating machine appeared
in 1820 as the result of several people’s experiments.
This type of machine, which saves a great deal
 of time and reduces the possibility of making mistakes,
 depends on a ten-toothed gear wheels.
In 1830 Charles Babbage, an
Englishman, designed a machine
that was called ‘The Analytical
Engine’. This machine, which
Babbage showed at the Paris
Exhibition in 1855, was an attempt
to cut out the
 human being altogether,expert for
providing the machine with
 the necessary facts the problem to
be sowed. He never finished this
work, but many of his ideas were the
basis for building today’s computers.
In 1930, the first analog computer was built by Vannevar Bush. The
device was used in World War II to help aim guns. Mark I, the
name given to the first digital computer, was completed in 1944. This
was the first machine that could figure out long of mathematical
problems all at a very fast speed.
In 1946 two engineers at the University of Pennsylvania,
 J.Eckert and J.Mayshly, built the first digital computer using
parts called vacuum tubes. They named their new invention UNIAC. The
first-generation of computers, which used vacuum tubes, came out in 1950.
UNIAC I was an example of these computers which could perform thousand
of calculations per second.
In 1960, the second generation of computers was
developed and could perform work ten times faster
than their predecessors. The reason for this extra
speed was the use of transistors instead of
vacuum tubes. Second-generation computers were
smaller, faster and more dependable than first
generation computers.
The third-generation computers appeared on the market in 1965.
These computers could do a million calculations a second,
 which is 1000 times faster than the first generation computers.
Unlike second-generation computers, these are controlled by
tiny integrated circuits and are consequently smaller and more dependable.
Fourth-generation computers have now arrived,
 and the integrated circuits that are being developed
 have been greatly reduced in size. This is due to microminiturization,
 which means that the circuits are much smaller than before; as many
 as 1000 tiny circuits now fit onto a single chip. A chip is a square or
 rectangular piece of silicon, usually from 1/10 to 1/4 inch,
 upon which several layers of an integrated circuit
are attached or imprinted, after which the
 circuit is encapsulated in plastic metal.
 Fourth-generation computers are 50 times
faster than third-generation computers and
can complete approximately 1.000.000
instructions per second.
Thank you for attention!

Weitere ähnliche Inhalte

Was ist angesagt? (7)

Contributors and thier inventions
Contributors and thier inventionsContributors and thier inventions
Contributors and thier inventions
 
History Of Computers
History Of ComputersHistory Of Computers
History Of Computers
 
History of computer
History of computerHistory of computer
History of computer
 
Young jun
Young junYoung jun
Young jun
 
History of Computers (ENIAC and EDVAC)
History of Computers (ENIAC and EDVAC)History of Computers (ENIAC and EDVAC)
History of Computers (ENIAC and EDVAC)
 
Computer history
Computer historyComputer history
Computer history
 
computers
computers computers
computers
 

Andere mochten auch

presentation by sunriz n sarani
presentation by sunriz n saranipresentation by sunriz n sarani
presentation by sunriz n saraniMehnaz Binte Zia
 
EVOLUTION OF COMPUTER
EVOLUTION OF COMPUTEREVOLUTION OF COMPUTER
EVOLUTION OF COMPUTERfhemrosacia
 
Introduction to Computing Lecture 01 history of computers
Introduction to Computing Lecture 01 history of computersIntroduction to Computing Lecture 01 history of computers
Introduction to Computing Lecture 01 history of computersMuhammad Bilal
 
Block diagram of a computer
Block diagram of a computerBlock diagram of a computer
Block diagram of a computerQsrealm
 
Block diagram of a computer
Block diagram of a computerBlock diagram of a computer
Block diagram of a computerZTE Nepal
 

Andere mochten auch (7)

The history of computer
The history of computerThe history of computer
The history of computer
 
presentation by sunriz n sarani
presentation by sunriz n saranipresentation by sunriz n sarani
presentation by sunriz n sarani
 
EVOLUTION OF COMPUTER
EVOLUTION OF COMPUTEREVOLUTION OF COMPUTER
EVOLUTION OF COMPUTER
 
Introduction to Computing Lecture 01 history of computers
Introduction to Computing Lecture 01 history of computersIntroduction to Computing Lecture 01 history of computers
Introduction to Computing Lecture 01 history of computers
 
Block diagram of a computer
Block diagram of a computerBlock diagram of a computer
Block diagram of a computer
 
Block diagram of a computer
Block diagram of a computerBlock diagram of a computer
Block diagram of a computer
 
Inaugural Addresses
Inaugural AddressesInaugural Addresses
Inaugural Addresses
 

Ähnlich wie History of computers

Ähnlich wie History of computers (20)

History of computers
History of computersHistory of computers
History of computers
 
sejarah komputer dari awal sampai saat ini
sejarah komputer dari awal sampai saat inisejarah komputer dari awal sampai saat ini
sejarah komputer dari awal sampai saat ini
 
History of the computer
History of the computerHistory of the computer
History of the computer
 
Computer history
Computer historyComputer history
Computer history
 
historyof computer and generation of computer
historyof computer and generation of computerhistoryof computer and generation of computer
historyof computer and generation of computer
 
History of computer
History of computerHistory of computer
History of computer
 
History of computer
History of computer History of computer
History of computer
 
Historyofcomputer1 160228190249
Historyofcomputer1 160228190249Historyofcomputer1 160228190249
Historyofcomputer1 160228190249
 
History of computer
History of computerHistory of computer
History of computer
 
history & ages of computer
history & ages of computerhistory & ages of computer
history & ages of computer
 
History Of Computer
History Of ComputerHistory Of Computer
History Of Computer
 
History of Computer Technology
History of Computer TechnologyHistory of Computer Technology
History of Computer Technology
 
History of computers
History of computersHistory of computers
History of computers
 
History of computer
History of computerHistory of computer
History of computer
 
History Of Computer
History Of ComputerHistory Of Computer
History Of Computer
 
History Of Computer
History Of ComputerHistory Of Computer
History Of Computer
 
History of Computer
History of ComputerHistory of Computer
History of Computer
 
History of computers_h
History of computers_hHistory of computers_h
History of computers_h
 
History of computer system
History of computer systemHistory of computer system
History of computer system
 
Meeta ppt
Meeta pptMeeta ppt
Meeta ppt
 

Kürzlich hochgeladen

Moving Beyond Passwords: FIDO Paris Seminar.pdf
Moving Beyond Passwords: FIDO Paris Seminar.pdfMoving Beyond Passwords: FIDO Paris Seminar.pdf
Moving Beyond Passwords: FIDO Paris Seminar.pdfLoriGlavin3
 
DevoxxFR 2024 Reproducible Builds with Apache Maven
DevoxxFR 2024 Reproducible Builds with Apache MavenDevoxxFR 2024 Reproducible Builds with Apache Maven
DevoxxFR 2024 Reproducible Builds with Apache MavenHervé Boutemy
 
Training state-of-the-art general text embedding
Training state-of-the-art general text embeddingTraining state-of-the-art general text embedding
Training state-of-the-art general text embeddingZilliz
 
Digital Identity is Under Attack: FIDO Paris Seminar.pptx
Digital Identity is Under Attack: FIDO Paris Seminar.pptxDigital Identity is Under Attack: FIDO Paris Seminar.pptx
Digital Identity is Under Attack: FIDO Paris Seminar.pptxLoriGlavin3
 
What is Artificial Intelligence?????????
What is Artificial Intelligence?????????What is Artificial Intelligence?????????
What is Artificial Intelligence?????????blackmambaettijean
 
DevEX - reference for building teams, processes, and platforms
DevEX - reference for building teams, processes, and platformsDevEX - reference for building teams, processes, and platforms
DevEX - reference for building teams, processes, and platformsSergiu Bodiu
 
"Subclassing and Composition – A Pythonic Tour of Trade-Offs", Hynek Schlawack
"Subclassing and Composition – A Pythonic Tour of Trade-Offs", Hynek Schlawack"Subclassing and Composition – A Pythonic Tour of Trade-Offs", Hynek Schlawack
"Subclassing and Composition – A Pythonic Tour of Trade-Offs", Hynek SchlawackFwdays
 
How AI, OpenAI, and ChatGPT impact business and software.
How AI, OpenAI, and ChatGPT impact business and software.How AI, OpenAI, and ChatGPT impact business and software.
How AI, OpenAI, and ChatGPT impact business and software.Curtis Poe
 
"Debugging python applications inside k8s environment", Andrii Soldatenko
"Debugging python applications inside k8s environment", Andrii Soldatenko"Debugging python applications inside k8s environment", Andrii Soldatenko
"Debugging python applications inside k8s environment", Andrii SoldatenkoFwdays
 
The Ultimate Guide to Choosing WordPress Pros and Cons
The Ultimate Guide to Choosing WordPress Pros and ConsThe Ultimate Guide to Choosing WordPress Pros and Cons
The Ultimate Guide to Choosing WordPress Pros and ConsPixlogix Infotech
 
A Journey Into the Emotions of Software Developers
A Journey Into the Emotions of Software DevelopersA Journey Into the Emotions of Software Developers
A Journey Into the Emotions of Software DevelopersNicole Novielli
 
From Family Reminiscence to Scholarly Archive .
From Family Reminiscence to Scholarly Archive .From Family Reminiscence to Scholarly Archive .
From Family Reminiscence to Scholarly Archive .Alan Dix
 
TrustArc Webinar - How to Build Consumer Trust Through Data Privacy
TrustArc Webinar - How to Build Consumer Trust Through Data PrivacyTrustArc Webinar - How to Build Consumer Trust Through Data Privacy
TrustArc Webinar - How to Build Consumer Trust Through Data PrivacyTrustArc
 
Developer Data Modeling Mistakes: From Postgres to NoSQL
Developer Data Modeling Mistakes: From Postgres to NoSQLDeveloper Data Modeling Mistakes: From Postgres to NoSQL
Developer Data Modeling Mistakes: From Postgres to NoSQLScyllaDB
 
SIP trunking in Janus @ Kamailio World 2024
SIP trunking in Janus @ Kamailio World 2024SIP trunking in Janus @ Kamailio World 2024
SIP trunking in Janus @ Kamailio World 2024Lorenzo Miniero
 
Generative AI for Technical Writer or Information Developers
Generative AI for Technical Writer or Information DevelopersGenerative AI for Technical Writer or Information Developers
Generative AI for Technical Writer or Information DevelopersRaghuram Pandurangan
 
Artificial intelligence in cctv survelliance.pptx
Artificial intelligence in cctv survelliance.pptxArtificial intelligence in cctv survelliance.pptx
Artificial intelligence in cctv survelliance.pptxhariprasad279825
 
How to write a Business Continuity Plan
How to write a Business Continuity PlanHow to write a Business Continuity Plan
How to write a Business Continuity PlanDatabarracks
 
Gen AI in Business - Global Trends Report 2024.pdf
Gen AI in Business - Global Trends Report 2024.pdfGen AI in Business - Global Trends Report 2024.pdf
Gen AI in Business - Global Trends Report 2024.pdfAddepto
 
unit 4 immunoblotting technique complete.pptx
unit 4 immunoblotting technique complete.pptxunit 4 immunoblotting technique complete.pptx
unit 4 immunoblotting technique complete.pptxBkGupta21
 

Kürzlich hochgeladen (20)

Moving Beyond Passwords: FIDO Paris Seminar.pdf
Moving Beyond Passwords: FIDO Paris Seminar.pdfMoving Beyond Passwords: FIDO Paris Seminar.pdf
Moving Beyond Passwords: FIDO Paris Seminar.pdf
 
DevoxxFR 2024 Reproducible Builds with Apache Maven
DevoxxFR 2024 Reproducible Builds with Apache MavenDevoxxFR 2024 Reproducible Builds with Apache Maven
DevoxxFR 2024 Reproducible Builds with Apache Maven
 
Training state-of-the-art general text embedding
Training state-of-the-art general text embeddingTraining state-of-the-art general text embedding
Training state-of-the-art general text embedding
 
Digital Identity is Under Attack: FIDO Paris Seminar.pptx
Digital Identity is Under Attack: FIDO Paris Seminar.pptxDigital Identity is Under Attack: FIDO Paris Seminar.pptx
Digital Identity is Under Attack: FIDO Paris Seminar.pptx
 
What is Artificial Intelligence?????????
What is Artificial Intelligence?????????What is Artificial Intelligence?????????
What is Artificial Intelligence?????????
 
DevEX - reference for building teams, processes, and platforms
DevEX - reference for building teams, processes, and platformsDevEX - reference for building teams, processes, and platforms
DevEX - reference for building teams, processes, and platforms
 
"Subclassing and Composition – A Pythonic Tour of Trade-Offs", Hynek Schlawack
"Subclassing and Composition – A Pythonic Tour of Trade-Offs", Hynek Schlawack"Subclassing and Composition – A Pythonic Tour of Trade-Offs", Hynek Schlawack
"Subclassing and Composition – A Pythonic Tour of Trade-Offs", Hynek Schlawack
 
How AI, OpenAI, and ChatGPT impact business and software.
How AI, OpenAI, and ChatGPT impact business and software.How AI, OpenAI, and ChatGPT impact business and software.
How AI, OpenAI, and ChatGPT impact business and software.
 
"Debugging python applications inside k8s environment", Andrii Soldatenko
"Debugging python applications inside k8s environment", Andrii Soldatenko"Debugging python applications inside k8s environment", Andrii Soldatenko
"Debugging python applications inside k8s environment", Andrii Soldatenko
 
The Ultimate Guide to Choosing WordPress Pros and Cons
The Ultimate Guide to Choosing WordPress Pros and ConsThe Ultimate Guide to Choosing WordPress Pros and Cons
The Ultimate Guide to Choosing WordPress Pros and Cons
 
A Journey Into the Emotions of Software Developers
A Journey Into the Emotions of Software DevelopersA Journey Into the Emotions of Software Developers
A Journey Into the Emotions of Software Developers
 
From Family Reminiscence to Scholarly Archive .
From Family Reminiscence to Scholarly Archive .From Family Reminiscence to Scholarly Archive .
From Family Reminiscence to Scholarly Archive .
 
TrustArc Webinar - How to Build Consumer Trust Through Data Privacy
TrustArc Webinar - How to Build Consumer Trust Through Data PrivacyTrustArc Webinar - How to Build Consumer Trust Through Data Privacy
TrustArc Webinar - How to Build Consumer Trust Through Data Privacy
 
Developer Data Modeling Mistakes: From Postgres to NoSQL
Developer Data Modeling Mistakes: From Postgres to NoSQLDeveloper Data Modeling Mistakes: From Postgres to NoSQL
Developer Data Modeling Mistakes: From Postgres to NoSQL
 
SIP trunking in Janus @ Kamailio World 2024
SIP trunking in Janus @ Kamailio World 2024SIP trunking in Janus @ Kamailio World 2024
SIP trunking in Janus @ Kamailio World 2024
 
Generative AI for Technical Writer or Information Developers
Generative AI for Technical Writer or Information DevelopersGenerative AI for Technical Writer or Information Developers
Generative AI for Technical Writer or Information Developers
 
Artificial intelligence in cctv survelliance.pptx
Artificial intelligence in cctv survelliance.pptxArtificial intelligence in cctv survelliance.pptx
Artificial intelligence in cctv survelliance.pptx
 
How to write a Business Continuity Plan
How to write a Business Continuity PlanHow to write a Business Continuity Plan
How to write a Business Continuity Plan
 
Gen AI in Business - Global Trends Report 2024.pdf
Gen AI in Business - Global Trends Report 2024.pdfGen AI in Business - Global Trends Report 2024.pdf
Gen AI in Business - Global Trends Report 2024.pdf
 
unit 4 immunoblotting technique complete.pptx
unit 4 immunoblotting technique complete.pptxunit 4 immunoblotting technique complete.pptx
unit 4 immunoblotting technique complete.pptx
 

History of computers

  • 2. The very first calculating device used was the ten fingers of a man’s hands. This, in fact, is why today we count in tens and multiply of tens.
  • 3. Then the abacus was invented, a bead frame in which the beads are moved from left to right. People went on using some form of abacus well into the 16th century, it is being used in some parts of the world because it can be understood without knowing how to read.
  • 4. During the 17th and 18th centuries many people tried to find easy ways of calculating. J.Napier, a Scotsman, devised a mechanical way of multiplying and dividing, which is how the modern slide rule works. Henry Briggs used Napier’s ideas to produce logarithm which all mathematicians used today.
  • 5. The first real calculating machine appeared in 1820 as the result of several people’s experiments. This type of machine, which saves a great deal of time and reduces the possibility of making mistakes, depends on a ten-toothed gear wheels.
  • 6. In 1830 Charles Babbage, an Englishman, designed a machine that was called ‘The Analytical Engine’. This machine, which Babbage showed at the Paris Exhibition in 1855, was an attempt to cut out the human being altogether,expert for providing the machine with the necessary facts the problem to be sowed. He never finished this work, but many of his ideas were the basis for building today’s computers.
  • 7. In 1930, the first analog computer was built by Vannevar Bush. The device was used in World War II to help aim guns. Mark I, the name given to the first digital computer, was completed in 1944. This was the first machine that could figure out long of mathematical problems all at a very fast speed.
  • 8. In 1946 two engineers at the University of Pennsylvania, J.Eckert and J.Mayshly, built the first digital computer using parts called vacuum tubes. They named their new invention UNIAC. The first-generation of computers, which used vacuum tubes, came out in 1950. UNIAC I was an example of these computers which could perform thousand of calculations per second.
  • 9.
  • 10. In 1960, the second generation of computers was developed and could perform work ten times faster than their predecessors. The reason for this extra speed was the use of transistors instead of vacuum tubes. Second-generation computers were smaller, faster and more dependable than first generation computers.
  • 11.
  • 12. The third-generation computers appeared on the market in 1965. These computers could do a million calculations a second, which is 1000 times faster than the first generation computers. Unlike second-generation computers, these are controlled by tiny integrated circuits and are consequently smaller and more dependable.
  • 13. Fourth-generation computers have now arrived, and the integrated circuits that are being developed have been greatly reduced in size. This is due to microminiturization, which means that the circuits are much smaller than before; as many as 1000 tiny circuits now fit onto a single chip. A chip is a square or rectangular piece of silicon, usually from 1/10 to 1/4 inch, upon which several layers of an integrated circuit are attached or imprinted, after which the circuit is encapsulated in plastic metal. Fourth-generation computers are 50 times faster than third-generation computers and can complete approximately 1.000.000 instructions per second.
  • 14.
  • 15. Thank you for attention!