SlideShare une entreprise Scribd logo
1  sur  11
History and flow By:Jacob Wilson p.3
[object Object],[object Object],INPUT
[object Object],OUTPUT
[object Object],MEMORY
[object Object],INFORMATION PROCESSER
DECODE ,[object Object]
[object Object],FETCH
[object Object],EXECUTE
1500s - 1600s Computer History
1500s Peter Henlein, a craftsman from Nuremberg Germany, creates the first watch.
[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],1600s

Contenu connexe

Similaire à p3_Hstory and Flow_Wilson

Inglés i t1
Inglés i t1Inglés i t1
Inglés i t1
JMiwel10
 
Lesson 3.1- History of Computer.pptx
Lesson 3.1- History of Computer.pptxLesson 3.1- History of Computer.pptx
Lesson 3.1- History of Computer.pptx
rubben7
 

Similaire à p3_Hstory and Flow_Wilson (20)

History of Computers and Generations-1.pdf
History of Computers and Generations-1.pdfHistory of Computers and Generations-1.pdf
History of Computers and Generations-1.pdf
 
The History Of Computers Essay
The History Of Computers EssayThe History Of Computers Essay
The History Of Computers Essay
 
Fundamental note New
Fundamental note NewFundamental note New
Fundamental note New
 
Project kuldeep
Project kuldeepProject kuldeep
Project kuldeep
 
ICT across curriculum
ICT across curriculumICT across curriculum
ICT across curriculum
 
Computer history
Computer historyComputer history
Computer history
 
The Four Main Components And History Of Computers
The Four Main Components And History Of ComputersThe Four Main Components And History Of Computers
The Four Main Components And History Of Computers
 
Computer and its uses in modern life.pptx
Computer and its uses in modern life.pptxComputer and its uses in modern life.pptx
Computer and its uses in modern life.pptx
 
Inglés i t1
Inglés i t1Inglés i t1
Inglés i t1
 
SSC-ICT 7_History of Computer_031810.pptx
SSC-ICT 7_History of Computer_031810.pptxSSC-ICT 7_History of Computer_031810.pptx
SSC-ICT 7_History of Computer_031810.pptx
 
Introduction to computer science
Introduction to computer scienceIntroduction to computer science
Introduction to computer science
 
lecture 1
lecture 1lecture 1
lecture 1
 
introduction to Computer system
introduction to Computer systemintroduction to Computer system
introduction to Computer system
 
FUNDAMENTALS OF COMPUTERS AND ICT FOR PHYSICAL EDUCATION, SPORTS SCIENCE , NS...
FUNDAMENTALS OF COMPUTERS AND ICT FOR PHYSICAL EDUCATION, SPORTS SCIENCE , NS...FUNDAMENTALS OF COMPUTERS AND ICT FOR PHYSICAL EDUCATION, SPORTS SCIENCE , NS...
FUNDAMENTALS OF COMPUTERS AND ICT FOR PHYSICAL EDUCATION, SPORTS SCIENCE , NS...
 
Basic of computer
Basic of computerBasic of computer
Basic of computer
 
History of computer
History of computerHistory of computer
History of computer
 
Lesson 3.1- History of Computer.pptx
Lesson 3.1- History of Computer.pptxLesson 3.1- History of Computer.pptx
Lesson 3.1- History of Computer.pptx
 
Introduction to Computer
Introduction to ComputerIntroduction to Computer
Introduction to Computer
 
Lecture series 1 computer fundamentals
Lecture series 1 computer fundamentalsLecture series 1 computer fundamentals
Lecture series 1 computer fundamentals
 
History of computer final
History of computer finalHistory of computer final
History of computer final
 

Plus de esmsstudent1 (20)

p5hfloweuyoque
p5hfloweuyoquep5hfloweuyoque
p5hfloweuyoque
 
p5 kim history and flow
p5 kim history and flowp5 kim history and flow
p5 kim history and flow
 
P5hflowbravo
P5hflowbravoP5hflowbravo
P5hflowbravo
 
p3_historyandflow_choinguyen
p3_historyandflow_choinguyenp3_historyandflow_choinguyen
p3_historyandflow_choinguyen
 
p3_hsflow_burdette
p3_hsflow_burdettep3_hsflow_burdette
p3_hsflow_burdette
 
p3_hflow_Johnson
p3_hflow_Johnsonp3_hflow_Johnson
p3_hflow_Johnson
 
P3_Hflow_Johnson
P3_Hflow_JohnsonP3_Hflow_Johnson
P3_Hflow_Johnson
 
p5-hflow-mullen
p5-hflow-mullenp5-hflow-mullen
p5-hflow-mullen
 
P5hflowsmith
P5hflowsmithP5hflowsmith
P5hflowsmith
 
p5hflow.turner
p5hflow.turnerp5hflow.turner
p5hflow.turner
 
computer history and flow ciaran lydon 10/12/07
computer history and flow ciaran lydon 10/12/07computer history and flow ciaran lydon 10/12/07
computer history and flow ciaran lydon 10/12/07
 
computer history and flow 1990-1991 10/12/07
computer history and flow 1990-1991 10/12/07computer history and flow 1990-1991 10/12/07
computer history and flow 1990-1991 10/12/07
 
p5_historyandflow_smith.ppt
p5_historyandflow_smith.pptp5_historyandflow_smith.ppt
p5_historyandflow_smith.ppt
 
p5_historyandflow_carlson.ppt
p5_historyandflow_carlson.pptp5_historyandflow_carlson.ppt
p5_historyandflow_carlson.ppt
 
computer history and flow meghan kelley 10/12/07
computer history and flow meghan kelley 10/12/07computer history and flow meghan kelley 10/12/07
computer history and flow meghan kelley 10/12/07
 
P5hflowbravo
P5hflowbravoP5hflowbravo
P5hflowbravo
 
per.3_History and Flow_Gomez
per.3_History and Flow_Gomezper.3_History and Flow_Gomez
per.3_History and Flow_Gomez
 
p5historyandflowpaysse
p5historyandflowpayssep5historyandflowpaysse
p5historyandflowpaysse
 
coputers history and flow meghan kelley 10/11/07
coputers history and flow meghan kelley 10/11/07coputers history and flow meghan kelley 10/11/07
coputers history and flow meghan kelley 10/11/07
 
P5_historyflow_marroquin
P5_historyflow_marroquinP5_historyflow_marroquin
P5_historyflow_marroquin
 

Dernier

“Iamnobody89757” Understanding the Mysterious of Digital Identity.pdf
“Iamnobody89757” Understanding the Mysterious of Digital Identity.pdf“Iamnobody89757” Understanding the Mysterious of Digital Identity.pdf
“Iamnobody89757” Understanding the Mysterious of Digital Identity.pdf
Muhammad Subhan
 
Harnessing Passkeys in the Battle Against AI-Powered Cyber Threats.pptx
Harnessing Passkeys in the Battle Against AI-Powered Cyber Threats.pptxHarnessing Passkeys in the Battle Against AI-Powered Cyber Threats.pptx
Harnessing Passkeys in the Battle Against AI-Powered Cyber Threats.pptx
FIDO Alliance
 
Tales from a Passkey Provider Progress from Awareness to Implementation.pptx
Tales from a Passkey Provider  Progress from Awareness to Implementation.pptxTales from a Passkey Provider  Progress from Awareness to Implementation.pptx
Tales from a Passkey Provider Progress from Awareness to Implementation.pptx
FIDO Alliance
 
Hyatt driving innovation and exceptional customer experiences with FIDO passw...
Hyatt driving innovation and exceptional customer experiences with FIDO passw...Hyatt driving innovation and exceptional customer experiences with FIDO passw...
Hyatt driving innovation and exceptional customer experiences with FIDO passw...
FIDO Alliance
 

Dernier (20)

“Iamnobody89757” Understanding the Mysterious of Digital Identity.pdf
“Iamnobody89757” Understanding the Mysterious of Digital Identity.pdf“Iamnobody89757” Understanding the Mysterious of Digital Identity.pdf
“Iamnobody89757” Understanding the Mysterious of Digital Identity.pdf
 
The Metaverse: Are We There Yet?
The  Metaverse:    Are   We  There  Yet?The  Metaverse:    Are   We  There  Yet?
The Metaverse: Are We There Yet?
 
Linux Foundation Edge _ Overview of FDO Software Components _ Randy at Intel.pdf
Linux Foundation Edge _ Overview of FDO Software Components _ Randy at Intel.pdfLinux Foundation Edge _ Overview of FDO Software Components _ Randy at Intel.pdf
Linux Foundation Edge _ Overview of FDO Software Components _ Randy at Intel.pdf
 
Event-Driven Architecture Masterclass: Challenges in Stream Processing
Event-Driven Architecture Masterclass: Challenges in Stream ProcessingEvent-Driven Architecture Masterclass: Challenges in Stream Processing
Event-Driven Architecture Masterclass: Challenges in Stream Processing
 
WebAssembly is Key to Better LLM Performance
WebAssembly is Key to Better LLM PerformanceWebAssembly is Key to Better LLM Performance
WebAssembly is Key to Better LLM Performance
 
Harnessing Passkeys in the Battle Against AI-Powered Cyber Threats.pptx
Harnessing Passkeys in the Battle Against AI-Powered Cyber Threats.pptxHarnessing Passkeys in the Battle Against AI-Powered Cyber Threats.pptx
Harnessing Passkeys in the Battle Against AI-Powered Cyber Threats.pptx
 
The Value of Certifying Products for FDO _ Paul at FIDO Alliance.pdf
The Value of Certifying Products for FDO _ Paul at FIDO Alliance.pdfThe Value of Certifying Products for FDO _ Paul at FIDO Alliance.pdf
The Value of Certifying Products for FDO _ Paul at FIDO Alliance.pdf
 
Using IESVE for Room Loads Analysis - UK & Ireland
Using IESVE for Room Loads Analysis - UK & IrelandUsing IESVE for Room Loads Analysis - UK & Ireland
Using IESVE for Room Loads Analysis - UK & Ireland
 
Top 10 CodeIgniter Development Companies
Top 10 CodeIgniter Development CompaniesTop 10 CodeIgniter Development Companies
Top 10 CodeIgniter Development Companies
 
Generative AI Use Cases and Applications.pdf
Generative AI Use Cases and Applications.pdfGenerative AI Use Cases and Applications.pdf
Generative AI Use Cases and Applications.pdf
 
Continuing Bonds Through AI: A Hermeneutic Reflection on Thanabots
Continuing Bonds Through AI: A Hermeneutic Reflection on ThanabotsContinuing Bonds Through AI: A Hermeneutic Reflection on Thanabots
Continuing Bonds Through AI: A Hermeneutic Reflection on Thanabots
 
Observability Concepts EVERY Developer Should Know (DevOpsDays Seattle)
Observability Concepts EVERY Developer Should Know (DevOpsDays Seattle)Observability Concepts EVERY Developer Should Know (DevOpsDays Seattle)
Observability Concepts EVERY Developer Should Know (DevOpsDays Seattle)
 
Simplified FDO Manufacturing Flow with TPMs _ Liam at Infineon.pdf
Simplified FDO Manufacturing Flow with TPMs _ Liam at Infineon.pdfSimplified FDO Manufacturing Flow with TPMs _ Liam at Infineon.pdf
Simplified FDO Manufacturing Flow with TPMs _ Liam at Infineon.pdf
 
Introduction to FIDO Authentication and Passkeys.pptx
Introduction to FIDO Authentication and Passkeys.pptxIntroduction to FIDO Authentication and Passkeys.pptx
Introduction to FIDO Authentication and Passkeys.pptx
 
Choosing the Right FDO Deployment Model for Your Application _ Geoffrey at In...
Choosing the Right FDO Deployment Model for Your Application _ Geoffrey at In...Choosing the Right FDO Deployment Model for Your Application _ Geoffrey at In...
Choosing the Right FDO Deployment Model for Your Application _ Geoffrey at In...
 
Tales from a Passkey Provider Progress from Awareness to Implementation.pptx
Tales from a Passkey Provider  Progress from Awareness to Implementation.pptxTales from a Passkey Provider  Progress from Awareness to Implementation.pptx
Tales from a Passkey Provider Progress from Awareness to Implementation.pptx
 
Overview of Hyperledger Foundation
Overview of Hyperledger FoundationOverview of Hyperledger Foundation
Overview of Hyperledger Foundation
 
Hyatt driving innovation and exceptional customer experiences with FIDO passw...
Hyatt driving innovation and exceptional customer experiences with FIDO passw...Hyatt driving innovation and exceptional customer experiences with FIDO passw...
Hyatt driving innovation and exceptional customer experiences with FIDO passw...
 
Event-Driven Architecture Masterclass: Engineering a Robust, High-performance...
Event-Driven Architecture Masterclass: Engineering a Robust, High-performance...Event-Driven Architecture Masterclass: Engineering a Robust, High-performance...
Event-Driven Architecture Masterclass: Engineering a Robust, High-performance...
 
Vector Search @ sw2con for slideshare.pptx
Vector Search @ sw2con for slideshare.pptxVector Search @ sw2con for slideshare.pptx
Vector Search @ sw2con for slideshare.pptx
 

p3_Hstory and Flow_Wilson