Skip to main content

The History of Computer


Computer has significantly developed and now have reached the new generation. The first computer was created by Charles Babbage in 1882, known as the Founder of Computer. He invented the counting machine named Difference Engine No.1 that was his famous invention. In the early 19th century, the computer was developed to make it easier for people to do their daily routine.
Difference Engine created by Charles Babbage
A German engineer Konrad Zuse created the first computer software, in 1938 he finished the Z1 and it is the first electromechanical binary programmable computer. The first generation of computer created in 1945 where ENIAC (Electronic Numerical Integrator and Calculator) was created. It requires a considerable space and vacuum tume in order to operate ENIAC. John Presper Eckert and Dr. John W. Mauchly worked on the project for 3 years which began in 1942. Vacuum tubes eventually got replaced after the invention of the transistor in 1948.
In 1959 until 1960s, scientists worked on the second generation of computer. The invention of this era is the transistor. In this generation, computer has a smaller size than the previous generation. Second generation of computer has a memory storage and it used Magnetic Core Storage. Computer is used to process business financial information in this era. 
The First Generation of computer.
Second generation computer was becoming obsolete because the transition system is fast heat and can damage the internal parts of the computer. Jack Billy did research and in the 1960s he created an IC (Integrated Circuit) that can collect the components all in one. That's when the third generation emerged, where the Integrated Circuit became its main characteristic. The incorporation and compaction of IC into one chip was developed using LSI (Large Scale Integration). In 1971 Intel introduced the microprocessor where the fourth generation appeared. The fourth generation of computer already has a faster capability and a monitor that used green colour. In this generation personal computer has not been developed for individual.
Nowadays computer has reached the fifth generation where AI (Artificial Intelligence) technology where artificial intelligence is developing to. By inputting language everyday into the computer to move the robot to imitate humans. AI that we can use in our daily lives like Siri on an Iphone as well as Alexa released by Amazon. AI itself has become a major feature in the fifth generation where artificial intelligence has begun to be used in everyday life and many investors are developing this technology. In this technology, program-less computer has been developed for the future. The fifth generation also began to grow rapidly with many technologies such as netbooks, smartphones, and others. Components such as the microprocessor is still used in computer today.
Alexa by Amazon. The fifth generation of computer. 

Written by:

Annisa Amalliyah Ramadhan Syafira             ||           106218007

IR-1

Source:
Anonym. Sejarah Komputer. Published on website in 2019. https://www.romadecade.org/sejarah-komputer/#!
Computer Hope. November, 13 2018. When was the First Computer Invented? Published on website in https://www.computerhope.com/issues/ch000984.htm

TeknoIOT. May, 17 2018. Contoh Penerapan Artificial Intelligence Yang Populer Saat Ini, on website in https://medium.com/@teknoiot/contoh-penerapan-artificial-intelligence-yang-populer-saat-ini-508851fca1d4




Comments

Popular posts from this blog

Artifical Neural Network

Artificial Neural Network  is a computational model based on the structure and functions of biological neural networks. Information that flows through the network affects the  a neural network changes or learns, based on that input and output. So the point is  to create a computational system that could solve problems like a human brain. The Neural Networks was founded by  Warren McCulloch and Walter Pitts in 1943. Then it was upgraded with AI (Artificial Intelligence) in 1975 by Kunijiko Fukushima called Artificial Neural Network (ANN) .   Warren McCulloch and Walter Pitts Today  Neural Networks are important in information age, because help society to solve complex problems in real life condition. They can learn from model the relationships between inputs and outputs that are nonlinear and complex; make generalizations and inferences; reveal hidden relationships, patterns and predictions (such as financial time series data) and varianc...

RFM in Business Strategy

RFM Analysis For Successful Customer Segmentation Analysis RFM in Big Data RFM (Recency, Frequency, Monetary) analysis is a proven marketing model for behavior based customer segmentation. It groups customers based on their transaction history – how recently, how often and how much did they buy. RFM helps divide customers into various categories or clusters to identify customers who are more likely to respond to promotions and also for future personalization services. RFM analysis evaluates which customers are of highest and lowest value to an organization based on purchase recency, frequency, and monetary value, in order to reasonably predict which customers are more likely to make purchases again in the future. What are Recency, Frequency and Monetary? ·         Recency      : How much time has elapsed since a customer’s last activity or transaction with the brand. ·     ...

A Thing called Ransomware

A Thing called Ransomware Ransom malware, or   ransomware , is a type of malware that prevents users from accessing their system or personal files and demands ransom payment in order to regain access. The earliest variants of ransomware were developed in the late 1980s, and payment was to be sent via snail mail. In this day, ransomware authors order that payment be sent via cryptocurrency or credit card. There are several different ways that ransomware can infect your computer. One of the most common methods today is through malicious spam, or  malspam , which is unsolicited email that is used to deliver malware. The email might include booby-trapped attachments, such as PDFs or Word documents. It might also contain links to malicious websites. Malspam uses  social engineering  in order to trick people into opening attachments or clicking on links by appearing as legitimate—whether that’s by seeming to be from a trusted institution or a friend. Cybercriminals...