SlideShare une entreprise Scribd logo
1  sur  12
History and Flow: 1988-1989 By: Natasha Hamilton Period 5
Where the Journey Begins First you have to find a way to put data into the computer. For examples you can use they keyboard and mouse to process this information into the computer. This is also known as the input.
Where the Data Goes ,[object Object]
What Happens to the Data ,[object Object]
Microprocessor: The Steps Fetch : In the first step is the processor. In this step, it retrieves data.  Decode : Then after it retrieves the data, decode fins out what to do, or which operation to use. Execute : The data finally reaches the executing step. This is where it does simple math, using binary numbers.
The Final Steps ,[object Object]
Computers from 1988-1989
Computer Facts for the years 1988 ,[object Object],[object Object]
More Computer Facts for the Year 1988 Apple files a copyright infringement against Microsoft .
IBM AS/400 midrange computer ,[object Object]
Computer Facts for the year 1989 ,[object Object],[object Object]
More Computer Facts for the Year 1989 ,[object Object],[object Object]

Contenu connexe

En vedette

Ontologies for Information Extraction
Ontologies for Information ExtractionOntologies for Information Extraction
Ontologies for Information ExtractionLidia Pivovarova
 
Training Movie Ppt Version Sample
Training Movie Ppt Version SampleTraining Movie Ppt Version Sample
Training Movie Ppt Version SampleAndrew Schwartz
 
Pädevuste rakendamine
Pädevuste rakendaminePädevuste rakendamine
Pädevuste rakendaminekiq
 
A C E I 2008 Math Manipulatives 2003
A C E I 2008  Math  Manipulatives 2003A C E I 2008  Math  Manipulatives 2003
A C E I 2008 Math Manipulatives 2003ricmac25
 
Saying Good-bye to Cambridge Again劍橋與牛津
Saying Good-bye to Cambridge Again劍橋與牛津Saying Good-bye to Cambridge Again劍橋與牛津
Saying Good-bye to Cambridge Again劍橋與牛津nonnon
 
Van Hersens Naar Hart
Van Hersens Naar HartVan Hersens Naar Hart
Van Hersens Naar HartMarc Fonteijn
 
La1 Computer Crimes
La1 Computer CrimesLa1 Computer Crimes
La1 Computer CrimesCma Mohd
 
Presentation1
Presentation1Presentation1
Presentation1Borreke
 
eVize 2007 - Přístupnost webových stránek
eVize 2007 - Přístupnost webových stránekeVize 2007 - Přístupnost webových stránek
eVize 2007 - Přístupnost webových stránekEquica
 
Rainbows
RainbowsRainbows
Rainbowsnonnon
 
SIMILARITIES_BETWEEN_ISLAM_AND_CHRISTIANITY
SIMILARITIES_BETWEEN_ISLAM_AND_CHRISTIANITYSIMILARITIES_BETWEEN_ISLAM_AND_CHRISTIANITY
SIMILARITIES_BETWEEN_ISLAM_AND_CHRISTIANITYZAKIR
 
Использование Гамма распределения при решении задачи классификации
Использование Гамма распределения при решении задачи классификацииИспользование Гамма распределения при решении задачи классификации
Использование Гамма распределения при решении задачи классификацииLidia Pivovarova
 
Technology And Tools
Technology And ToolsTechnology And Tools
Technology And Toolsneedmath
 
Lithuania PowerPoint Content
Lithuania PowerPoint Content Lithuania PowerPoint Content
Lithuania PowerPoint Content Andrew Schwartz
 

En vedette (19)

Ontologies for Information Extraction
Ontologies for Information ExtractionOntologies for Information Extraction
Ontologies for Information Extraction
 
Training Movie Ppt Version Sample
Training Movie Ppt Version SampleTraining Movie Ppt Version Sample
Training Movie Ppt Version Sample
 
Zavisimost
ZavisimostZavisimost
Zavisimost
 
Pädevuste rakendamine
Pädevuste rakendaminePädevuste rakendamine
Pädevuste rakendamine
 
A C E I 2008 Math Manipulatives 2003
A C E I 2008  Math  Manipulatives 2003A C E I 2008  Math  Manipulatives 2003
A C E I 2008 Math Manipulatives 2003
 
Saying Good-bye to Cambridge Again劍橋與牛津
Saying Good-bye to Cambridge Again劍橋與牛津Saying Good-bye to Cambridge Again劍橋與牛津
Saying Good-bye to Cambridge Again劍橋與牛津
 
Van Hersens Naar Hart
Van Hersens Naar HartVan Hersens Naar Hart
Van Hersens Naar Hart
 
La1 Computer Crimes
La1 Computer CrimesLa1 Computer Crimes
La1 Computer Crimes
 
With Papa
With PapaWith Papa
With Papa
 
Presentation1
Presentation1Presentation1
Presentation1
 
eVize 2007 - Přístupnost webových stránek
eVize 2007 - Přístupnost webových stránekeVize 2007 - Přístupnost webových stránek
eVize 2007 - Přístupnost webových stránek
 
Web2 KM
Web2 KMWeb2 KM
Web2 KM
 
Aurora Borealis
Aurora BorealisAurora Borealis
Aurora Borealis
 
Rainbows
RainbowsRainbows
Rainbows
 
SIMILARITIES_BETWEEN_ISLAM_AND_CHRISTIANITY
SIMILARITIES_BETWEEN_ISLAM_AND_CHRISTIANITYSIMILARITIES_BETWEEN_ISLAM_AND_CHRISTIANITY
SIMILARITIES_BETWEEN_ISLAM_AND_CHRISTIANITY
 
Использование Гамма распределения при решении задачи классификации
Использование Гамма распределения при решении задачи классификацииИспользование Гамма распределения при решении задачи классификации
Использование Гамма распределения при решении задачи классификации
 
Are Surveys Useful?
Are Surveys Useful?Are Surveys Useful?
Are Surveys Useful?
 
Technology And Tools
Technology And ToolsTechnology And Tools
Technology And Tools
 
Lithuania PowerPoint Content
Lithuania PowerPoint Content Lithuania PowerPoint Content
Lithuania PowerPoint Content
 

Similaire à Per5_HistoryandFlow_Hamilton10/11/07

computer history and flow 1990-1991 10/12/07
computer history and flow 1990-1991 10/12/07computer history and flow 1990-1991 10/12/07
computer history and flow 1990-1991 10/12/07esmsstudent1
 
Ch 1 introduction and 2 computer software 1
Ch 1 introduction  and 2 computer software 1Ch 1 introduction  and 2 computer software 1
Ch 1 introduction and 2 computer software 1rjsuthar56
 
Basic Computer Computer notes
Basic Computer Computer notesBasic Computer Computer notes
Basic Computer Computer notesijazshah2005
 
Reduce course notes class xi
Reduce course notes class xiReduce course notes class xi
Reduce course notes class xiSyed Zaid Irshad
 
3_History and Flow_Creencia
3_History and Flow_Creencia3_History and Flow_Creencia
3_History and Flow_Creenciaesmsstudent1
 
Computer concepts- Mohammadali & Tausif
Computer concepts- Mohammadali & TausifComputer concepts- Mohammadali & Tausif
Computer concepts- Mohammadali & Tausiftausif ghodesawar
 
Introduction to Computer
Introduction to ComputerIntroduction to Computer
Introduction to Computersuganya2411
 
Computer and its uses in modern life.pptx
Computer and its uses in modern life.pptxComputer and its uses in modern life.pptx
Computer and its uses in modern life.pptxMdNasirUddin592112
 
Information Technology for Managers - Basics
Information Technology for Managers - BasicsInformation Technology for Managers - Basics
Information Technology for Managers - BasicsIsha Joshi
 
Introduction to IT
Introduction to ITIntroduction to IT
Introduction to ITcpjcollege
 
Introduction to Computer and Generations of Computer by Er. Kamlesh Tripathi
Introduction to Computer and Generations of Computer by Er. Kamlesh TripathiIntroduction to Computer and Generations of Computer by Er. Kamlesh Tripathi
Introduction to Computer and Generations of Computer by Er. Kamlesh TripathiLEALucknow
 
per.3_History and Flow_Gomez
per.3_History and Flow_Gomezper.3_History and Flow_Gomez
per.3_History and Flow_Gomezesmsstudent1
 
Application of computer in Hospitality
Application of computer in HospitalityApplication of computer in Hospitality
Application of computer in HospitalityPriya Roy
 

Similaire à Per5_HistoryandFlow_Hamilton10/11/07 (20)

Day 1
Day   1Day   1
Day 1
 
PCT Slide1
PCT Slide1PCT Slide1
PCT Slide1
 
computer history and flow 1990-1991 10/12/07
computer history and flow 1990-1991 10/12/07computer history and flow 1990-1991 10/12/07
computer history and flow 1990-1991 10/12/07
 
Ch 1 introduction and 2 computer software 1
Ch 1 introduction  and 2 computer software 1Ch 1 introduction  and 2 computer software 1
Ch 1 introduction and 2 computer software 1
 
Basic Computer Computer notes
Basic Computer Computer notesBasic Computer Computer notes
Basic Computer Computer notes
 
Reduce course notes class xi
Reduce course notes class xiReduce course notes class xi
Reduce course notes class xi
 
3_History and Flow_Creencia
3_History and Flow_Creencia3_History and Flow_Creencia
3_History and Flow_Creencia
 
Module 1.pptx
Module 1.pptxModule 1.pptx
Module 1.pptx
 
Computer concepts- Mohammadali & Tausif
Computer concepts- Mohammadali & TausifComputer concepts- Mohammadali & Tausif
Computer concepts- Mohammadali & Tausif
 
Fundamental note New
Fundamental note NewFundamental note New
Fundamental note New
 
Computer
ComputerComputer
Computer
 
Introduction to Computer
Introduction to ComputerIntroduction to Computer
Introduction to Computer
 
Computer and its uses in modern life.pptx
Computer and its uses in modern life.pptxComputer and its uses in modern life.pptx
Computer and its uses in modern life.pptx
 
Information Technology for Managers - Basics
Information Technology for Managers - BasicsInformation Technology for Managers - Basics
Information Technology for Managers - Basics
 
ICT Module-2.ppt
ICT Module-2.pptICT Module-2.ppt
ICT Module-2.ppt
 
Introduction to IT
Introduction to ITIntroduction to IT
Introduction to IT
 
Introduction to Computer and Generations of Computer by Er. Kamlesh Tripathi
Introduction to Computer and Generations of Computer by Er. Kamlesh TripathiIntroduction to Computer and Generations of Computer by Er. Kamlesh Tripathi
Introduction to Computer and Generations of Computer by Er. Kamlesh Tripathi
 
per.3_History and Flow_Gomez
per.3_History and Flow_Gomezper.3_History and Flow_Gomez
per.3_History and Flow_Gomez
 
Lesson1 Contestada
Lesson1 ContestadaLesson1 Contestada
Lesson1 Contestada
 
Application of computer in Hospitality
Application of computer in HospitalityApplication of computer in Hospitality
Application of computer in Hospitality
 

Dernier

What Are The Drone Anti-jamming Systems Technology?
What Are The Drone Anti-jamming Systems Technology?What Are The Drone Anti-jamming Systems Technology?
What Are The Drone Anti-jamming Systems Technology?Antenna Manufacturer Coco
 
The Role of Taxonomy and Ontology in Semantic Layers - Heather Hedden.pdf
The Role of Taxonomy and Ontology in Semantic Layers - Heather Hedden.pdfThe Role of Taxonomy and Ontology in Semantic Layers - Heather Hedden.pdf
The Role of Taxonomy and Ontology in Semantic Layers - Heather Hedden.pdfEnterprise Knowledge
 
08448380779 Call Girls In Civil Lines Women Seeking Men
08448380779 Call Girls In Civil Lines Women Seeking Men08448380779 Call Girls In Civil Lines Women Seeking Men
08448380779 Call Girls In Civil Lines Women Seeking MenDelhi Call girls
 
Presentation on how to chat with PDF using ChatGPT code interpreter
Presentation on how to chat with PDF using ChatGPT code interpreterPresentation on how to chat with PDF using ChatGPT code interpreter
Presentation on how to chat with PDF using ChatGPT code interpreternaman860154
 
Automating Google Workspace (GWS) & more with Apps Script
Automating Google Workspace (GWS) & more with Apps ScriptAutomating Google Workspace (GWS) & more with Apps Script
Automating Google Workspace (GWS) & more with Apps Scriptwesley chun
 
GenCyber Cyber Security Day Presentation
GenCyber Cyber Security Day PresentationGenCyber Cyber Security Day Presentation
GenCyber Cyber Security Day PresentationMichael W. Hawkins
 
A Call to Action for Generative AI in 2024
A Call to Action for Generative AI in 2024A Call to Action for Generative AI in 2024
A Call to Action for Generative AI in 2024Results
 
Understanding Discord NSFW Servers A Guide for Responsible Users.pdf
Understanding Discord NSFW Servers A Guide for Responsible Users.pdfUnderstanding Discord NSFW Servers A Guide for Responsible Users.pdf
Understanding Discord NSFW Servers A Guide for Responsible Users.pdfUK Journal
 
TrustArc Webinar - Stay Ahead of US State Data Privacy Law Developments
TrustArc Webinar - Stay Ahead of US State Data Privacy Law DevelopmentsTrustArc Webinar - Stay Ahead of US State Data Privacy Law Developments
TrustArc Webinar - Stay Ahead of US State Data Privacy Law DevelopmentsTrustArc
 
Powerful Google developer tools for immediate impact! (2023-24 C)
Powerful Google developer tools for immediate impact! (2023-24 C)Powerful Google developer tools for immediate impact! (2023-24 C)
Powerful Google developer tools for immediate impact! (2023-24 C)wesley chun
 
Raspberry Pi 5: Challenges and Solutions in Bringing up an OpenGL/Vulkan Driv...
Raspberry Pi 5: Challenges and Solutions in Bringing up an OpenGL/Vulkan Driv...Raspberry Pi 5: Challenges and Solutions in Bringing up an OpenGL/Vulkan Driv...
Raspberry Pi 5: Challenges and Solutions in Bringing up an OpenGL/Vulkan Driv...Igalia
 
How to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected WorkerHow to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected WorkerThousandEyes
 
The 7 Things I Know About Cyber Security After 25 Years | April 2024
The 7 Things I Know About Cyber Security After 25 Years | April 2024The 7 Things I Know About Cyber Security After 25 Years | April 2024
The 7 Things I Know About Cyber Security After 25 Years | April 2024Rafal Los
 
Driving Behavioral Change for Information Management through Data-Driven Gree...
Driving Behavioral Change for Information Management through Data-Driven Gree...Driving Behavioral Change for Information Management through Data-Driven Gree...
Driving Behavioral Change for Information Management through Data-Driven Gree...Enterprise Knowledge
 
Finology Group – Insurtech Innovation Award 2024
Finology Group – Insurtech Innovation Award 2024Finology Group – Insurtech Innovation Award 2024
Finology Group – Insurtech Innovation Award 2024The Digital Insurer
 
Artificial Intelligence: Facts and Myths
Artificial Intelligence: Facts and MythsArtificial Intelligence: Facts and Myths
Artificial Intelligence: Facts and MythsJoaquim Jorge
 
CNv6 Instructor Chapter 6 Quality of Service
CNv6 Instructor Chapter 6 Quality of ServiceCNv6 Instructor Chapter 6 Quality of Service
CNv6 Instructor Chapter 6 Quality of Servicegiselly40
 
Boost PC performance: How more available memory can improve productivity
Boost PC performance: How more available memory can improve productivityBoost PC performance: How more available memory can improve productivity
Boost PC performance: How more available memory can improve productivityPrincipled Technologies
 
How to convert PDF to text with Nanonets
How to convert PDF to text with NanonetsHow to convert PDF to text with Nanonets
How to convert PDF to text with Nanonetsnaman860154
 
04-2024-HHUG-Sales-and-Marketing-Alignment.pptx
04-2024-HHUG-Sales-and-Marketing-Alignment.pptx04-2024-HHUG-Sales-and-Marketing-Alignment.pptx
04-2024-HHUG-Sales-and-Marketing-Alignment.pptxHampshireHUG
 

Dernier (20)

What Are The Drone Anti-jamming Systems Technology?
What Are The Drone Anti-jamming Systems Technology?What Are The Drone Anti-jamming Systems Technology?
What Are The Drone Anti-jamming Systems Technology?
 
The Role of Taxonomy and Ontology in Semantic Layers - Heather Hedden.pdf
The Role of Taxonomy and Ontology in Semantic Layers - Heather Hedden.pdfThe Role of Taxonomy and Ontology in Semantic Layers - Heather Hedden.pdf
The Role of Taxonomy and Ontology in Semantic Layers - Heather Hedden.pdf
 
08448380779 Call Girls In Civil Lines Women Seeking Men
08448380779 Call Girls In Civil Lines Women Seeking Men08448380779 Call Girls In Civil Lines Women Seeking Men
08448380779 Call Girls In Civil Lines Women Seeking Men
 
Presentation on how to chat with PDF using ChatGPT code interpreter
Presentation on how to chat with PDF using ChatGPT code interpreterPresentation on how to chat with PDF using ChatGPT code interpreter
Presentation on how to chat with PDF using ChatGPT code interpreter
 
Automating Google Workspace (GWS) & more with Apps Script
Automating Google Workspace (GWS) & more with Apps ScriptAutomating Google Workspace (GWS) & more with Apps Script
Automating Google Workspace (GWS) & more with Apps Script
 
GenCyber Cyber Security Day Presentation
GenCyber Cyber Security Day PresentationGenCyber Cyber Security Day Presentation
GenCyber Cyber Security Day Presentation
 
A Call to Action for Generative AI in 2024
A Call to Action for Generative AI in 2024A Call to Action for Generative AI in 2024
A Call to Action for Generative AI in 2024
 
Understanding Discord NSFW Servers A Guide for Responsible Users.pdf
Understanding Discord NSFW Servers A Guide for Responsible Users.pdfUnderstanding Discord NSFW Servers A Guide for Responsible Users.pdf
Understanding Discord NSFW Servers A Guide for Responsible Users.pdf
 
TrustArc Webinar - Stay Ahead of US State Data Privacy Law Developments
TrustArc Webinar - Stay Ahead of US State Data Privacy Law DevelopmentsTrustArc Webinar - Stay Ahead of US State Data Privacy Law Developments
TrustArc Webinar - Stay Ahead of US State Data Privacy Law Developments
 
Powerful Google developer tools for immediate impact! (2023-24 C)
Powerful Google developer tools for immediate impact! (2023-24 C)Powerful Google developer tools for immediate impact! (2023-24 C)
Powerful Google developer tools for immediate impact! (2023-24 C)
 
Raspberry Pi 5: Challenges and Solutions in Bringing up an OpenGL/Vulkan Driv...
Raspberry Pi 5: Challenges and Solutions in Bringing up an OpenGL/Vulkan Driv...Raspberry Pi 5: Challenges and Solutions in Bringing up an OpenGL/Vulkan Driv...
Raspberry Pi 5: Challenges and Solutions in Bringing up an OpenGL/Vulkan Driv...
 
How to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected WorkerHow to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected Worker
 
The 7 Things I Know About Cyber Security After 25 Years | April 2024
The 7 Things I Know About Cyber Security After 25 Years | April 2024The 7 Things I Know About Cyber Security After 25 Years | April 2024
The 7 Things I Know About Cyber Security After 25 Years | April 2024
 
Driving Behavioral Change for Information Management through Data-Driven Gree...
Driving Behavioral Change for Information Management through Data-Driven Gree...Driving Behavioral Change for Information Management through Data-Driven Gree...
Driving Behavioral Change for Information Management through Data-Driven Gree...
 
Finology Group – Insurtech Innovation Award 2024
Finology Group – Insurtech Innovation Award 2024Finology Group – Insurtech Innovation Award 2024
Finology Group – Insurtech Innovation Award 2024
 
Artificial Intelligence: Facts and Myths
Artificial Intelligence: Facts and MythsArtificial Intelligence: Facts and Myths
Artificial Intelligence: Facts and Myths
 
CNv6 Instructor Chapter 6 Quality of Service
CNv6 Instructor Chapter 6 Quality of ServiceCNv6 Instructor Chapter 6 Quality of Service
CNv6 Instructor Chapter 6 Quality of Service
 
Boost PC performance: How more available memory can improve productivity
Boost PC performance: How more available memory can improve productivityBoost PC performance: How more available memory can improve productivity
Boost PC performance: How more available memory can improve productivity
 
How to convert PDF to text with Nanonets
How to convert PDF to text with NanonetsHow to convert PDF to text with Nanonets
How to convert PDF to text with Nanonets
 
04-2024-HHUG-Sales-and-Marketing-Alignment.pptx
04-2024-HHUG-Sales-and-Marketing-Alignment.pptx04-2024-HHUG-Sales-and-Marketing-Alignment.pptx
04-2024-HHUG-Sales-and-Marketing-Alignment.pptx
 

Per5_HistoryandFlow_Hamilton10/11/07

  • 1. History and Flow: 1988-1989 By: Natasha Hamilton Period 5
  • 2. Where the Journey Begins First you have to find a way to put data into the computer. For examples you can use they keyboard and mouse to process this information into the computer. This is also known as the input.
  • 3.
  • 4.
  • 5. Microprocessor: The Steps Fetch : In the first step is the processor. In this step, it retrieves data. Decode : Then after it retrieves the data, decode fins out what to do, or which operation to use. Execute : The data finally reaches the executing step. This is where it does simple math, using binary numbers.
  • 6.
  • 8.
  • 9. More Computer Facts for the Year 1988 Apple files a copyright infringement against Microsoft .
  • 10.
  • 11.
  • 12.