- Definition: A computer is an advanced electronic device that processes raw data into useful information using a set of instructions called a program.
- Components:
- Hardware: Physical parts like processor, memory, monitor, keyboard.
- Software: Programs or instructions that operate the hardware.
Evolution of Computing Devices
- First Generation (1940-56)
- Technology: Vacuum tubes
- Programming: Machine language
- Examples: ENIAC, EDVAC, EDSAC, UNIVAC-1
- Second Generation (1956-63)
- Technology: Transistors replaced vacuum tubes
- Programming: Assembly and high-level languages (FORTRAN, COBOL)
- Examples: IBM 1620, IBM 7094, CDC 1604
- Third Generation (1964-71)
- Technology: Integrated circuits (ICs)
- Programming: High-level languages (FORTRAN, COBOL, BASIC)
- Examples: IBM-360 series, Honeywell-6000
- Fourth Generation (1972-80)
- Technology: Microprocessors, LSI & VLSI
- Programming: High-level languages (C, C++, DBASE)
- Features: Personal Computers (PCs)
- Fifth Generation (1980-Present)
- Technology: Artificial intelligence, parallel processing
- Examples: Desktop, Laptop, Ultra Book
Components of a Computer System
- CPU (Central Processing Unit)
- Parts: Arithmetic Logic Unit (ALU) and Control Unit (CU)
- Function: Performs calculations, controls operations
- Memory Unit
- Primary Memory: Directly accessible (e.g., RAM)
- Secondary Memory: Long-term storage (e.g., hard drives, USB drives)
- Input/Output Units
- Input Devices: Keyboard, mouse, scanner, etc.
- Output Devices: Monitor, printer, speakers, etc.
Types of Memory
- Bit: Smallest unit, 0 or 1.
- Byte: 8 bits.
- Kilobyte (KB): 1024 bytes.
- Megabyte (MB): 1024 KB.
- Gigabyte (GB): 1024 MB.
- Terabyte (TB): 1024 GB.
Software Types
- System Software
- Function: Operates and controls hardware.
- Examples: Operating systems, compilers, interpreters.
- Application Software
- Function: Performs specific tasks.
- Examples: Microsoft Office, Inventory Management Software.
- Utility Software
- Function: Maintains and optimizes computer systems.
- Examples: Antivirus programs, disk cleanup tools.
Computer Security
- Goals:
- Confidentiality: Only authorized access.
- Integrity: Only authorized modifications.
- Availability: Data accessible when needed.
- Authentication: Verify identity of users and devices.
Related News
स्तनपान और अस्थमा जोखिम में कमी
विश्व का सबसे बड़ा कैमरा सबसे तेजी से घूमने वाले विशाल उल्का का पता लगाता है और अधिक खोज जारी रखता है
रूसी वैज्ञानिकों ने मार्स को 30 दिनों में पहुंचाने वाला प्लाज्मा इंजन बनाया, जिससे स्पेसएक्स का स्टारशिप पुराना लगने लगा
नासा के दो अंतरिक्ष यात्री 2026 की पहली स्पेसवॉक के लिए तैयार
आकाशविज्ञान में महिलाएं: डॉक्टर टोनिमा तस्नीम अनन्ना की प्रेरक कहानी
पृथ्वी के शुष्क होते हेडवाटर्स का विस्तार स्केलिंग कानूनों से पता चलता है
