ReviewEssays.com - Term Papers, Book Reports, Research Papers and College Essays
Search

Computers Computers

Essay by   •  February 16, 2011  •  Research Paper  •  1,216 Words (5 Pages)  •  886 Views

Essay Preview: Computers Computers

Report this essay
Page 1 of 5

A computer is a machine that manipulates data according to a list of instructions.

The first devices that resemble modern computers date to the mid-20th century (around 1940 - 1945), although the computer concept and various machines similar to computers existed earlier. Early electronic computers were the size of a large room, consuming as much power as several hundred modern personal computers.[1] Modern computers are based on tiny integrated circuits and are millions to billions of times more capable while occupying a fraction of the space.[2] Today, simple computers may be made small enough to fit into a wristwatch and be powered from a watch battery. Personal computers in various forms are icons of the Information Age and are what most people think of as "a computer"; however, the most common form of computer in use today is the embedded computer. Embedded computers are small, simple devices that are used to control other devices вЂ" for example, they may be found in machines ranging from fighter aircraft to industrial robots, digital cameras, and children's toys.

The ability to store and execute lists of instructions called programs makes computers extremely versatile and distinguishes them from calculators. The ChurchвЂ"Turing thesis is a mathematical statement of this versatility: any computer with a certain minimum capability is, in principle, capable of performing the same tasks that any other computer can perform. Therefore, computers with capability and complexity ranging from that of a personal digital assistant to a supercomputer are all able to perform the same computational tasks given enough time and storage capacity.

Computers have been used to coordinate information in multiple locations since the 1950s. The U.S. military's SAGE system was the first large-scale example of such a system, which led to a number of special-purpose commercial systems like Sabre.

In the 1970s, computer engineers at research institutions throughout the United States began to link their computers together using telecommunications technology. This effort was funded by ARPA (now DARPA), and the computer network that it produced was called the ARPANET. The technologies that made the Arpanet possible spread and evolved. In time, the network spread beyond academic and military institutions and became known as the Internet. The emergence of networking involved a redefinition of the nature and boundaries of the computer. Computer operating systems and applications were modified to include the ability to define and access the resources of other computers on the network, such as peripheral devices, stored information, and the like, as extensions of the resources of an individual computer. Initially these facilities were available primarily to people working in high-tech environments, but in the 1990s the spread of applications like e-mail and the World Wide Web, combined with the development of cheap, fast networking technologies like Ethernet and ADSL saw computer networking become almost ubiquitous. In fact, the number of computers that are networked is growing phenomenally. A very large proportion of personal computers regularly connect to the Internet to communicate and receive information. "Wireless" networking, often utilizing mobile phone networks, has meant networking is becoming increasingly ubiquitous even in mobile computing environments.

Programming languages provide various ways of specifying programs for computers to run. Unlike natural languages, programming languages are designed to permit no ambiguity and to be concise. They are purely written languages and are often difficult to read aloud. They are generally either translated into machine language by a compiler or an assembler before being run, or translated directly at run time by an interpreter. Sometimes programs are executed by a hybrid method of the two techniques. There are thousands of different programming languagesвЂ"some intended to be general purpose, others useful only for highly specialized applications.

The technologies of computer security are based on logic. There is no universal standard notion of what secure behavior is. "Security" is a concept that is unique to each situation. Security is extraneous to the function of a computer application, rather than ancillary to it, thus security necessarily imposes restrictions on the application's behavior.

There are several approaches to security in computing, sometimes a combination of approaches is valid:

Trust all the software to abide by a security policy but the software is not trustworthy (this is computer insecurity).

Trust all the software to abide by a security policy and the software is validated as trustworthy (by tedious branch and path analysis for example).

Trust

...

...

Download as:   txt (7.9 Kb)   pdf (105.1 Kb)   docx (12.2 Kb)  
Continue for 4 more pages »
Only available on ReviewEssays.com
Citation Generator

(2011, 02). Computers Computers. ReviewEssays.com. Retrieved 02, 2011, from https://www.reviewessays.com/essay/Computers-Computers/39208.html

"Computers Computers" ReviewEssays.com. 02 2011. 2011. 02 2011 <https://www.reviewessays.com/essay/Computers-Computers/39208.html>.

"Computers Computers." ReviewEssays.com. ReviewEssays.com, 02 2011. Web. 02 2011. <https://www.reviewessays.com/essay/Computers-Computers/39208.html>.

"Computers Computers." ReviewEssays.com. 02, 2011. Accessed 02, 2011. https://www.reviewessays.com/essay/Computers-Computers/39208.html.