Computer History By Jordan Mendez. Important Events 1936-The first computer is made 1962-The first computer game, Space Wars, is invented. 1969-The original.

Slides:



Advertisements
Similar presentations
How Much Do I Remember? Are you ready to play.....
Advertisements

Cesar Ruiz CPET 575 Prof LIN Apple Inc Case Study Maintaining Years of Innovation.
What are Trojan horses?  A Trojan horse is full of as much trickery as the mythological Trojan horse it was named after. The Trojan horse, at first glance.
Internet Safety for Students Malicious Programs By: Mr. Bradshaw Scott City R-1 Schools.
Computer Viruses By Patsy Speer What is a Virus? Malicious programs that cause damage to your computer, files and information They slow down the internet.
Unit 1- Recognizing Computers.  Understand the importance of computers  Define computers & computer systems  Classify different types of computers.
R. FRANK NIMS MIDDLE SCHOOL A BRIEF INTRODUCTION TO VIRUSES.
Video Following is a video of what can happen if you don’t update your security settings! security.
Protecting Your Computer & Your Information
The Utility Programs: The system programs which perform the general system support and maintenance tasks are known as utility programs. Tasks performed.
INTRODUCTION TO COMPUTERS The personal computer was far from reality in Computer users were limited to specially trained operators and engineers.
Under the Hood Monica Loza 1 st period. 5 places to save on a PC On a PC: Flash Drive Send it to your Save to the desktop Save on a CD iCloud Thaw.
 a crime committed on a computer network, esp. the Internet.
Computer Viruses.
Introduction of Internet security Sui Wang IS300.
CHAPTER 14 Viruses, Trojan Horses and Worms. INTRODUCTION Viruses, Trojan Horses and worm are malicious programs that can cause damage to information.
1 What is a computer virus? Computer program Replicating Problematic "Event" Types Detection and prevention.
RUNNING HEADER, 14 PT., ALL CAPS, Line Spacing=1 line Trend Micro Confidential 1 Virus/ Trojans/ Worms etc and some Common issues.
Information Technology Software. SYSTEM SOFTWARE.
Viruses, Trojans and Worms The commonest computer threats are viruses. Virus A virus is a computer program which changes the way in which the computer.
Name: Perpetual Ifeanyi Onyia Topic: Virus, Worms, & Trojan Horses.
Under the Hood By: Chris Aragon Mac Pc’ Computer.
Under The Hood Natalie Salamy. Save Your Work My Documents Thaw space Flash drive ing iCloud.
Avoiding viruses and malware A quick guide. What is malware?  A virus and malware are the same thing  Spyware  Worm  Trojan  Virus.
Under the Hood By Izzy Feltrop 2 period. Save Files Flash Drive Folder I Cloud CD .
Luis Barajas 1 ST Period Apple PC. Places to Save Your Files Hard Drive Flash Drive File iCloud Floppy Disk CD’s.
Under the Hood & In the Hood Sabrina Carreno. Places to Save: Burn to a CD Floppy Disk File (Student if at school) Flash Drive the information to.
Under the Hood by Shane Ghiringhelli 1 period 2/5/13.
History of the Computer David Covarrubias. Terms of Computers ► Bit - A bit or binary digit is the basic unit of information in computing and telecommunications.
Under The Hood By: Talisa Azevedo. Places To Save Things  A folder on your desktop  My Documents  USB  On a Floppy Disk  it to your self.
CONTENTS What is Virus ? Types of computer viruses.
VIRUS.
Computer Systems Viruses. Virus A virus is a program which can destroy or cause damage to data stored on a computer. It’s a program that must be run in.
Under The Hood By Alyssa Curtis. Places to Save Files Flash Drive Hard Drive Student File Edline File .
By Makayla Chavez 1° Meirik. The Complex Number Calculator (CNC) is completed Konrad Zuse finishes the Z3 computer Jean Hoerni's Planar process,
Under the Hood Jacqueline Garcia Period 2 Computer class.
The History of the Computer By Jaleel Lawson Konrad Zuse - Z1 Computer First freely programmable computer John Atanasoff & Clifford Berry.
1936: Z1 Computer :First freely programmable computer. 1962: Steve Russell & MIT Spacewar Computer Game The first computer game invented. 1964:computer.
Types of Computer Malware. The first macro virus was written for Microsoft Word and was discovered in August Today, there are thousands of macro.
Under The Hood By: Angeles Meirik 1* February 2013.
History of Computer’s Ryan Mishler Konrad Zuse invents Z1 computer, the first freely programmable computer First commercial computer & able.
Computer History Alanna Castora 2 nd period. 10 events George Stibitz develops the complex number calculator- a digital foundation for computers.
Under the hood Tawny Gutierrez 2. Where to save files  Flash drive it to yourself Mac or PC Mac or PC Mac or PC Mac or PC  CD’s Student file Mac.
Under The Hood Julianna Alfaro Computers 1 or. Saving Hard Drive iCloud Floppy Drive Gmail CD’s/ DVD’s.
Under the Hood Ivette Guzman Period 1. Places to save Flash drive Flash drive ing ing Hard Drive Hard Drive Special Flies Special Flies Burn.
Under the hood Jonathan Preciado st period.
Tommy Buickerood 1 st Period 1 February 2013 You can save objects to: - Desktop -Flash Drive -File -Hard Drive -Floppy Disk -Cloud storage -THAW space.
Page 1 Viruses. Page 2 What Is a Virus A virus is basically a computer program that has been written to perform a specific set of tasks. Unfortunately,
Computer History By: Deanna Cresci. Units Byte – A unit of 8 bits. Kilobyte - The standard unit of measurement for file sizes. Megabyte - The standard.
COMPUTER VIRUSES ….! Presented by: BSCS-I Maheen Zofishan Saba Naz Numan Sheikh Javaria Munawar Aisha Fatima.
Virus Infections By: Lindsay Bowser. Introduction b What is a “virus”? b Brief history of viruses b Different types of infections b How they spread b.
Chapter SOFTWARE Are the programs which are written by different programming languages. These programs are: a series of instruction that tells.
Detected by, M.Nitin kumar ( ) Sagar kumar sahu ( )
The History of Computers Computers have been around for not that long at all but the first one was made in ll.
Under the Hood Natalia Gomez Period 1 Computer Literacy.
History Of Computers By: Amanda Davis. Computer Timeline Alan Turning develops the concept of a theoretical computing machine Alan Turning.
Digital Citizenship Project Submitted by: Etta Pope Instructor: Laurie Fowler.
Computer Viruses Standard A-4 (Safety Unit)
Molly Cubba September 20th st Period
Intro to Malware Attacks
Melissa Garcia Period 1 Mr. Meirik
Under the Hood By Alex Barajas.
Kaleb Vandermei 1st Period
Computer Technology Notes 5
WHAT IS A VIRUS? A Computer Virus is a computer program that can copy itself and infect a computer A Computer Virus is a computer program that can copy.
Forensics Week 12.
King Saud University- College OF Applied Studies
Oswaldo Angeles 1st Period
King Saud University- College OF Applied Studies
Bonnie Rowe Cameron Ford James Baker Noel Kurtz
Presentation transcript:

Computer History By Jordan Mendez

Important Events 1936-The first computer is made 1962-The first computer game, Space Wars, is invented The original “Internet” is invented The first available RAM chip The first computers are available to the public First laptop is made The first Apple computer is invented Microsoft starts to compete with Apple Google is introduced Facebook is created.

Computer Terms RAM-Random Access Memory Bit-Short for binary digit, the smallest unit of information on a machine. Byte-A group of binary digits or bits (usually eight) operated on as a unit. Kilobyte-A unit of computer memory or data storage capacity equal to 1,024 (that is, 210) bytes. Gigabyte-A unit of computer memory or data storage capacity equal to 1,024 megabytes (230 bytes) Megabyte-A unit of computer memory or data storage capacity equal to 1,048,576 bytes Terabyte-A unit of computer memory or data storage capacity equal to 1,024 gigabytes (240 bytes). Petabyte-One quadrillion bytes. Exabyte-unit of information equal to 1000 petabytes or 10^18 bytes Zettabyte- a unit of information equal to 1000 exabytes or 10^21 bytes

First PC Steve Wozniak (1950– ) and Steve Jobs (1955– ), college dropouts who founded Apple Computer in 1976, are credited with inventing the first computer for home use. Working out of a garage, they spent six months developing the prototype (initial model) for Apple I. It was bought by some 600 hobbyists, who had to know how to wire, program, and set up the machine. Apple II was introduced in 1977 as the first fully assembled, programmable microcomputer. Nevertheless this machine still required customers to use their televisions as screens and to use audio cassettes for data storage. The Apple II sold for just under $1,300 That same year.

First Laptop The computer considered by most historians to be the first true portable computer was the Osborne 1. Adam Osborne, an ex-book publisher founded Osborne Computer and produced the Osborne 1 in 1981, a portable computer that weighed 24 pounds and cost $1795. The Osborne 1 came with a five-inch screen, modem port, two 5 1/4 floppy drives, a large collection of bundled software programs, and a battery pack. The short-lived computer company was never successful.

5 Major Computer Companies IBM, founded by Thomas J. Watson. Apple, by Steve Jobs, Steve Wozniak, and Ronald Wayne. Dell, by Michael Dell. Toshiba, by Hisashige Tanaka. HP, by Bill Hewlett and Dave Packard, and Acer, by Stan Shih.

Viruses, worms and Trojan Horses are all malicious programs that can cause damage to your computer. programscomputer Virus-a program or programming code that replicates by being copied or initiating its copying to another program, computer boot sector or document. A computer virus attaches itself to a program or file enabling it to spread from one computer to another, leaving infections as it travels.computerprogramfile Worm-A worm is similar to a virus by design and is considered to be a sub-class of a virus. Worms spread from computer to computer, but unlike a virus, it has the capability to travel without any human action. A worm takes advantage of file or information transport features on your system, which is what allows it to travel unaided. Trojan Horse-A Trojan Horse is full of as much trickery as the mythological Trojan Horse it was named after. The Trojan Horse, at first glance will appear to be useful software but will actually do damage once installed or run on your computer. Those on the receiving end of a Trojan Horse are usually tricked into opening them because they appear to be receiving legitimate software or files from a legitimate source. When a Trojan is activated on your computer, the results can vary. Some Trojans are designed to be more annoying than malicious (like changing your desktop, adding silly active desktop icons) or they can cause serious damage by deleting files and destroying information on your system. Trojans are also known to create a backdoor on your computer that gives malicious users access to your system, possibly allowing confidential or personal information to be compromised. Unlike viruses and worms, Trojans do not reproduce by infecting other files nor do they self-replicate.software desktopbackdoor

SOURCES history-timeline.htmhttp:// history-timeline.htm invented-first-personal-computerhttp:// invented-first-personal-computer

The Future of Computers I believe that people will keep making advances with computers, but nothing really drastic. I don’t think they can get any smaller. They are already pretty smart now.