SlideShare a Scribd company logo
1 of 8
Download to read offline
WELCOME TO THE
PRESENTATION
• Submitted by:lakshay baliyan
• Father name : Mr. Anagpal baliyan
• B.S.C (AG)
• ROLL.NO : 210090126107
•
• SUBMITTED TO: ROHIT
RANA
INTRODUCTION OF
COMOPUTER
A computer is a device that accepts information (in the
form of digitalized data) and manipulates it for some
result based on a program, software, or sequence of
instructions on how the data is to be processed.
H I S TO RY O F C O M P U T E R
One of the earliest and most well-known devices was an
abacus. Then in 1822, the father of computers, Charles
Babbage began developing what would be the first mechanical
computer. And then in 1833 he actually designed an Analytical
Engine which was a general-purpose computer.
T Y P E S O F C O M P U T E R
1 Analogue Computer
2 Digital Computer
3 Hybrid Computer
A N A L O G U E C O M P U T E R
An analog computer or analogue
computer is a type of computer that uses
the continuous variation aspect of
physical phenomena such as electrical,
mechanical, or hydraulic quantities
(analog signals) to model the problem
being solved.
D I G I TA L C O M P U T E R
digital computer, any of a class of
devices capable of solving problems
by processing information in discrete
form. It operates on data, including
magnitudes, letters, and symbols,
that are expressed in binary code—
i.e., using only the two digits 0 and
1.
H Y B R I D C O M P U T E R
Hybrid computer is a computer intended to
provide functions and features in both analog
and digital computers. Developing a combined
or hybrid computer model aims to produce a
functional device that incorporates the most
beneficial aspects of both computer systems.
ppt 2.pptx

More Related Content

Similar to ppt 2.pptx

Fundamentals of computers & information system
Fundamentals of computers & information system  Fundamentals of computers & information system
Fundamentals of computers & information system shefali mishra
 
presentation by sunriz n sarani
presentation by sunriz n saranipresentation by sunriz n sarani
presentation by sunriz n saraniMehnaz Binte Zia
 
CompFundamentals.ppt
CompFundamentals.pptCompFundamentals.ppt
CompFundamentals.pptChrisnaFucio
 
computer
computercomputer
computerAIT
 
Introduction to computer science
Introduction to computer scienceIntroduction to computer science
Introduction to computer sciencederekoei
 
02. History - Evolution of Computers
02. History - Evolution of Computers02. History - Evolution of Computers
02. History - Evolution of ComputersAkhila Dakshina
 
Group 1 - History of Computer.pptx
Group 1 - History of Computer.pptxGroup 1 - History of Computer.pptx
Group 1 - History of Computer.pptxDanielBermodez
 
History of Computers and Generations-1.pdf
History of Computers and Generations-1.pdfHistory of Computers and Generations-1.pdf
History of Computers and Generations-1.pdfamazingthings2743
 
Fundamentals of Computer
Fundamentals of ComputerFundamentals of Computer
Fundamentals of Computerbongatjeremie
 
Assignment of History of Computer(F21-1872).pdf
Assignment of History of Computer(F21-1872).pdfAssignment of History of Computer(F21-1872).pdf
Assignment of History of Computer(F21-1872).pdfAtifmalik70
 
History of Computer-.pptx
History of Computer-.pptxHistory of Computer-.pptx
History of Computer-.pptxIrisOlaso
 
Dtlp 1 introduction to computer
Dtlp 1 introduction to computerDtlp 1 introduction to computer
Dtlp 1 introduction to computerShabnam Yadav
 

Similar to ppt 2.pptx (20)

Chapter#4
Chapter#4Chapter#4
Chapter#4
 
Fundamentals of computers & information system
Fundamentals of computers & information system  Fundamentals of computers & information system
Fundamentals of computers & information system
 
presentation by sunriz n sarani
presentation by sunriz n saranipresentation by sunriz n sarani
presentation by sunriz n sarani
 
CompFundamentals.ppt
CompFundamentals.pptCompFundamentals.ppt
CompFundamentals.ppt
 
Basic of computer
Basic of computerBasic of computer
Basic of computer
 
computer
computercomputer
computer
 
Introduction to computer science
Introduction to computer scienceIntroduction to computer science
Introduction to computer science
 
02. History - Evolution of Computers
02. History - Evolution of Computers02. History - Evolution of Computers
02. History - Evolution of Computers
 
Group 1 - History of Computer.pptx
Group 1 - History of Computer.pptxGroup 1 - History of Computer.pptx
Group 1 - History of Computer.pptx
 
Lecture #1.ppt
Lecture #1.pptLecture #1.ppt
Lecture #1.ppt
 
W 1 Introduction
W 1  IntroductionW 1  Introduction
W 1 Introduction
 
History of Computers and Generations-1.pdf
History of Computers and Generations-1.pdfHistory of Computers and Generations-1.pdf
History of Computers and Generations-1.pdf
 
introduction to it
introduction to itintroduction to it
introduction to it
 
Computer basics
Computer basicsComputer basics
Computer basics
 
Chapter 1.pptx
Chapter 1.pptxChapter 1.pptx
Chapter 1.pptx
 
Fundamentals of Computer
Fundamentals of ComputerFundamentals of Computer
Fundamentals of Computer
 
C++ 1.pdf
C++ 1.pdfC++ 1.pdf
C++ 1.pdf
 
Assignment of History of Computer(F21-1872).pdf
Assignment of History of Computer(F21-1872).pdfAssignment of History of Computer(F21-1872).pdf
Assignment of History of Computer(F21-1872).pdf
 
History of Computer-.pptx
History of Computer-.pptxHistory of Computer-.pptx
History of Computer-.pptx
 
Dtlp 1 introduction to computer
Dtlp 1 introduction to computerDtlp 1 introduction to computer
Dtlp 1 introduction to computer
 

Recently uploaded

Comparing Sidecar-less Service Mesh from Cilium and Istio
Comparing Sidecar-less Service Mesh from Cilium and IstioComparing Sidecar-less Service Mesh from Cilium and Istio
Comparing Sidecar-less Service Mesh from Cilium and IstioChristian Posta
 
UiPath Community: AI for UiPath Automation Developers
UiPath Community: AI for UiPath Automation DevelopersUiPath Community: AI for UiPath Automation Developers
UiPath Community: AI for UiPath Automation DevelopersUiPathCommunity
 
Computer 10: Lesson 10 - Online Crimes and Hazards
Computer 10: Lesson 10 - Online Crimes and HazardsComputer 10: Lesson 10 - Online Crimes and Hazards
Computer 10: Lesson 10 - Online Crimes and HazardsSeth Reyes
 
COMPUTER 10 Lesson 8 - Building a Website
COMPUTER 10 Lesson 8 - Building a WebsiteCOMPUTER 10 Lesson 8 - Building a Website
COMPUTER 10 Lesson 8 - Building a Websitedgelyza
 
VoIP Service and Marketing using Odoo and Asterisk PBX
VoIP Service and Marketing using Odoo and Asterisk PBXVoIP Service and Marketing using Odoo and Asterisk PBX
VoIP Service and Marketing using Odoo and Asterisk PBXTarek Kalaji
 
Designing A Time bound resource download URL
Designing A Time bound resource download URLDesigning A Time bound resource download URL
Designing A Time bound resource download URLRuncy Oommen
 
Nanopower In Semiconductor Industry.pdf
Nanopower  In Semiconductor Industry.pdfNanopower  In Semiconductor Industry.pdf
Nanopower In Semiconductor Industry.pdfPedro Manuel
 
Crea il tuo assistente AI con lo Stregatto (open source python framework)
Crea il tuo assistente AI con lo Stregatto (open source python framework)Crea il tuo assistente AI con lo Stregatto (open source python framework)
Crea il tuo assistente AI con lo Stregatto (open source python framework)Commit University
 
Linked Data in Production: Moving Beyond Ontologies
Linked Data in Production: Moving Beyond OntologiesLinked Data in Production: Moving Beyond Ontologies
Linked Data in Production: Moving Beyond OntologiesDavid Newbury
 
Anypoint Code Builder , Google Pub sub connector and MuleSoft RPA
Anypoint Code Builder , Google Pub sub connector and MuleSoft RPAAnypoint Code Builder , Google Pub sub connector and MuleSoft RPA
Anypoint Code Builder , Google Pub sub connector and MuleSoft RPAshyamraj55
 
AI You Can Trust - Ensuring Success with Data Integrity Webinar
AI You Can Trust - Ensuring Success with Data Integrity WebinarAI You Can Trust - Ensuring Success with Data Integrity Webinar
AI You Can Trust - Ensuring Success with Data Integrity WebinarPrecisely
 
Connector Corner: Extending LLM automation use cases with UiPath GenAI connec...
Connector Corner: Extending LLM automation use cases with UiPath GenAI connec...Connector Corner: Extending LLM automation use cases with UiPath GenAI connec...
Connector Corner: Extending LLM automation use cases with UiPath GenAI connec...DianaGray10
 
9 Steps For Building Winning Founding Team
9 Steps For Building Winning Founding Team9 Steps For Building Winning Founding Team
9 Steps For Building Winning Founding TeamAdam Moalla
 
UiPath Studio Web workshop series - Day 7
UiPath Studio Web workshop series - Day 7UiPath Studio Web workshop series - Day 7
UiPath Studio Web workshop series - Day 7DianaGray10
 
IaC & GitOps in a Nutshell - a FridayInANuthshell Episode.pdf
IaC & GitOps in a Nutshell - a FridayInANuthshell Episode.pdfIaC & GitOps in a Nutshell - a FridayInANuthshell Episode.pdf
IaC & GitOps in a Nutshell - a FridayInANuthshell Episode.pdfDaniel Santiago Silva Capera
 
Apres-Cyber - The Data Dilemma: Bridging Offensive Operations and Machine Lea...
Apres-Cyber - The Data Dilemma: Bridging Offensive Operations and Machine Lea...Apres-Cyber - The Data Dilemma: Bridging Offensive Operations and Machine Lea...
Apres-Cyber - The Data Dilemma: Bridging Offensive Operations and Machine Lea...Will Schroeder
 
Salesforce Miami User Group Event - 1st Quarter 2024
Salesforce Miami User Group Event - 1st Quarter 2024Salesforce Miami User Group Event - 1st Quarter 2024
Salesforce Miami User Group Event - 1st Quarter 2024SkyPlanner
 
NIST Cybersecurity Framework (CSF) 2.0 Workshop
NIST Cybersecurity Framework (CSF) 2.0 WorkshopNIST Cybersecurity Framework (CSF) 2.0 Workshop
NIST Cybersecurity Framework (CSF) 2.0 WorkshopBachir Benyammi
 
Secure your environment with UiPath and CyberArk technologies - Session 1
Secure your environment with UiPath and CyberArk technologies - Session 1Secure your environment with UiPath and CyberArk technologies - Session 1
Secure your environment with UiPath and CyberArk technologies - Session 1DianaGray10
 

Recently uploaded (20)

Comparing Sidecar-less Service Mesh from Cilium and Istio
Comparing Sidecar-less Service Mesh from Cilium and IstioComparing Sidecar-less Service Mesh from Cilium and Istio
Comparing Sidecar-less Service Mesh from Cilium and Istio
 
UiPath Community: AI for UiPath Automation Developers
UiPath Community: AI for UiPath Automation DevelopersUiPath Community: AI for UiPath Automation Developers
UiPath Community: AI for UiPath Automation Developers
 
Computer 10: Lesson 10 - Online Crimes and Hazards
Computer 10: Lesson 10 - Online Crimes and HazardsComputer 10: Lesson 10 - Online Crimes and Hazards
Computer 10: Lesson 10 - Online Crimes and Hazards
 
COMPUTER 10 Lesson 8 - Building a Website
COMPUTER 10 Lesson 8 - Building a WebsiteCOMPUTER 10 Lesson 8 - Building a Website
COMPUTER 10 Lesson 8 - Building a Website
 
201610817 - edge part1
201610817 - edge part1201610817 - edge part1
201610817 - edge part1
 
VoIP Service and Marketing using Odoo and Asterisk PBX
VoIP Service and Marketing using Odoo and Asterisk PBXVoIP Service and Marketing using Odoo and Asterisk PBX
VoIP Service and Marketing using Odoo and Asterisk PBX
 
Designing A Time bound resource download URL
Designing A Time bound resource download URLDesigning A Time bound resource download URL
Designing A Time bound resource download URL
 
Nanopower In Semiconductor Industry.pdf
Nanopower  In Semiconductor Industry.pdfNanopower  In Semiconductor Industry.pdf
Nanopower In Semiconductor Industry.pdf
 
Crea il tuo assistente AI con lo Stregatto (open source python framework)
Crea il tuo assistente AI con lo Stregatto (open source python framework)Crea il tuo assistente AI con lo Stregatto (open source python framework)
Crea il tuo assistente AI con lo Stregatto (open source python framework)
 
Linked Data in Production: Moving Beyond Ontologies
Linked Data in Production: Moving Beyond OntologiesLinked Data in Production: Moving Beyond Ontologies
Linked Data in Production: Moving Beyond Ontologies
 
Anypoint Code Builder , Google Pub sub connector and MuleSoft RPA
Anypoint Code Builder , Google Pub sub connector and MuleSoft RPAAnypoint Code Builder , Google Pub sub connector and MuleSoft RPA
Anypoint Code Builder , Google Pub sub connector and MuleSoft RPA
 
AI You Can Trust - Ensuring Success with Data Integrity Webinar
AI You Can Trust - Ensuring Success with Data Integrity WebinarAI You Can Trust - Ensuring Success with Data Integrity Webinar
AI You Can Trust - Ensuring Success with Data Integrity Webinar
 
Connector Corner: Extending LLM automation use cases with UiPath GenAI connec...
Connector Corner: Extending LLM automation use cases with UiPath GenAI connec...Connector Corner: Extending LLM automation use cases with UiPath GenAI connec...
Connector Corner: Extending LLM automation use cases with UiPath GenAI connec...
 
9 Steps For Building Winning Founding Team
9 Steps For Building Winning Founding Team9 Steps For Building Winning Founding Team
9 Steps For Building Winning Founding Team
 
UiPath Studio Web workshop series - Day 7
UiPath Studio Web workshop series - Day 7UiPath Studio Web workshop series - Day 7
UiPath Studio Web workshop series - Day 7
 
IaC & GitOps in a Nutshell - a FridayInANuthshell Episode.pdf
IaC & GitOps in a Nutshell - a FridayInANuthshell Episode.pdfIaC & GitOps in a Nutshell - a FridayInANuthshell Episode.pdf
IaC & GitOps in a Nutshell - a FridayInANuthshell Episode.pdf
 
Apres-Cyber - The Data Dilemma: Bridging Offensive Operations and Machine Lea...
Apres-Cyber - The Data Dilemma: Bridging Offensive Operations and Machine Lea...Apres-Cyber - The Data Dilemma: Bridging Offensive Operations and Machine Lea...
Apres-Cyber - The Data Dilemma: Bridging Offensive Operations and Machine Lea...
 
Salesforce Miami User Group Event - 1st Quarter 2024
Salesforce Miami User Group Event - 1st Quarter 2024Salesforce Miami User Group Event - 1st Quarter 2024
Salesforce Miami User Group Event - 1st Quarter 2024
 
NIST Cybersecurity Framework (CSF) 2.0 Workshop
NIST Cybersecurity Framework (CSF) 2.0 WorkshopNIST Cybersecurity Framework (CSF) 2.0 Workshop
NIST Cybersecurity Framework (CSF) 2.0 Workshop
 
Secure your environment with UiPath and CyberArk technologies - Session 1
Secure your environment with UiPath and CyberArk technologies - Session 1Secure your environment with UiPath and CyberArk technologies - Session 1
Secure your environment with UiPath and CyberArk technologies - Session 1
 

ppt 2.pptx

  • 1. WELCOME TO THE PRESENTATION • Submitted by:lakshay baliyan • Father name : Mr. Anagpal baliyan • B.S.C (AG) • ROLL.NO : 210090126107 • • SUBMITTED TO: ROHIT RANA
  • 2. INTRODUCTION OF COMOPUTER A computer is a device that accepts information (in the form of digitalized data) and manipulates it for some result based on a program, software, or sequence of instructions on how the data is to be processed.
  • 3. H I S TO RY O F C O M P U T E R One of the earliest and most well-known devices was an abacus. Then in 1822, the father of computers, Charles Babbage began developing what would be the first mechanical computer. And then in 1833 he actually designed an Analytical Engine which was a general-purpose computer.
  • 4. T Y P E S O F C O M P U T E R 1 Analogue Computer 2 Digital Computer 3 Hybrid Computer
  • 5. A N A L O G U E C O M P U T E R An analog computer or analogue computer is a type of computer that uses the continuous variation aspect of physical phenomena such as electrical, mechanical, or hydraulic quantities (analog signals) to model the problem being solved.
  • 6. D I G I TA L C O M P U T E R digital computer, any of a class of devices capable of solving problems by processing information in discrete form. It operates on data, including magnitudes, letters, and symbols, that are expressed in binary code— i.e., using only the two digits 0 and 1.
  • 7. H Y B R I D C O M P U T E R Hybrid computer is a computer intended to provide functions and features in both analog and digital computers. Developing a combined or hybrid computer model aims to produce a functional device that incorporates the most beneficial aspects of both computer systems.