20
1 9 9 th th Grade Computer Grade Computer Science Rotation Science Rotation Mr. Fedder/Mr. Crowley Mr. Fedder/Mr. Crowley

History Days 1 3

Embed Size (px)

DESCRIPTION

fcs computer rotation

Citation preview

Page 1: History Days 1 3

11

99thth Grade Computer Grade ComputerScience RotationScience Rotation

Mr. Fedder/Mr. CrowleyMr. Fedder/Mr. Crowley

Page 2: History Days 1 3

22

Why Learn About Why Learn About Computers?Computers?

Page 3: History Days 1 3

33

““I’m not a techie”I’m not a techie”

Page 4: History Days 1 3

44

True/False: 1950’s vs. True/False: 1950’s vs. 200520051.1. Homes are 20 times more expensive.Homes are 20 times more expensive.

2.2. Cars are 15 times more expensive.Cars are 15 times more expensive.

3.3. Computers are 100,000 times more Computers are 100,000 times more powerful.powerful.

4.4. The development and innovation of The development and innovation of computing technology has resulted in the computing technology has resulted in the greatest cultural revolution in the history greatest cultural revolution in the history of mankind.of mankind.

5.5. You will use computers in some form for You will use computers in some form for the rest of your life.the rest of your life.

Page 5: History Days 1 3

55

FactorsFactors

INDUSTRY 1950 2005 FACTORHOMES

Size 983 2,230 2.3Cost 11,000$ 206,300$ 18.8

CARS 2,050$ 30,000$ 14.6

AIRPLANE - 1903 10 2,275 227.5

HUMAN - 1999 15.038 16.134 1.07

Page 6: History Days 1 3

66

Number ScaleNumber Scale

Time to count to 1 Quadrillion?

1 count per second = 86,400 counts per day

1,000,000,000,000,000 ÷ 86,400 = 11,574,074,074 days

11,574,074,074 ÷ 365 = 31,710,000 years (Cenozoic Era)

THOUSAND

1,000  

MILLION

1,000,000 1 Thousand Thousands

BILLION

1,000,000,000 1 Thousand Millions

TRILLION

1,000,000,000,000 1 Million Millions

QUADRILLION

1,000,000,000,000,000 1 Billion Millions

Kilo

Mega

Giga

Tera

Peta

Page 7: History Days 1 3

77

INDUSTRY 19502007

SupercomputerFactor

(SC vs. 1950)

       

Computer      

Memory(bytes) 200 4,000,000,000,000 10,250,000,000

Storage (bytes) 16,000 4,000,000,000,000 250,000,000

IPS 5,000 280,600,000,000 56,120,000,000

Cost $ 500,000 $128,000,000 256

       

INDUSTRY 1950 2005 PC

Factor(PC vs. 1950)

       

Computer      

Memory(bytes) 200 1,000,000,000 5,000,000

Storage (bytes) 16,000 80,000,000,000 5,000,000

IPS 5,000 9,726,000,000 1,945,200

Cost $ 500,000 $ 1,000 0.0020

       

Factors - ComputersFactors - Computers

Page 8: History Days 1 3

88

IBM Blue Gene - SupercomputerIBM Blue Gene - Supercomputer

Page 9: History Days 1 3

99

True/False: 1950 vs. True/False: 1950 vs. 200520051.1. Homes are 20 times more expensive.Homes are 20 times more expensive.

2.2. Cars are 15 times more expensive.Cars are 15 times more expensive.

3.3. Computers are 100,000 times more Computers are 100,000 times more powerful.powerful.

4.4. The development and innovation of The development and innovation of computing technology has resulted in the computing technology has resulted in the greatest cultural revolution in the history greatest cultural revolution in the history of mankind.of mankind.

5.5. You will use computers in some form for You will use computers in some form for the rest of your life.the rest of your life.

Page 10: History Days 1 3

1111

SpywareSpyware – Programs that record your surfing behavior and/or – Programs that record your surfing behavior and/or keystrokes and transmit the data to the collector’s database.keystrokes and transmit the data to the collector’s database.

VirusesViruses - Programs that piggyback on real programs. For example, a - Programs that piggyback on real programs. For example, a virus might attach itself to a program such as a spreadsheet program. virus might attach itself to a program such as a spreadsheet program. Each time the spreadsheet program runs, the virus runs too where it Each time the spreadsheet program runs, the virus runs too where it can reproducecan reproduce (by attaching to other programs) or wreak system havoc. (by attaching to other programs) or wreak system havoc.

E-mail VirusesE-mail Viruses – An E-mail virus is transmitted via e-mail messages – An E-mail virus is transmitted via e-mail messages and usually replicates automatically by mailing a copy of itself to and usually replicates automatically by mailing a copy of itself to dozens of people in the victim's e-mail address book. dozens of people in the victim's e-mail address book.

WormsWorms - Software that use computer networks and security holes to - Software that use computer networks and security holes to replicate itself. A copy of the worm scans the network for another replicate itself. A copy of the worm scans the network for another machine that has a specific security hole. It copies itself to the new machine that has a specific security hole. It copies itself to the new machine using the security hole, and then starts replicating from machine using the security hole, and then starts replicating from there, as well. there, as well.

Trojan HorsesTrojan Horses – A software program that claims to do one thing (it – A software program that claims to do one thing (it may claim to be a game) but instead does damage when you run it (it may claim to be a game) but instead does damage when you run it (it may erase your hard disk). Trojan horses have no way to replicate may erase your hard disk). Trojan horses have no way to replicate automatically. automatically.

Malicious SoftwareMalicious Software

Page 11: History Days 1 3

1212

Malicious Software: Deal with Malicious Software: Deal with it!it! SpywareSpyware

Pay attention to what you click.Pay attention to what you click.

Don’t click on “too good to be Don’t click on “too good to be

true” ads.true” ads.

Google it! Check for hoaxes.Google it! Check for hoaxes.

Get Anti-Spyware software (2)Get Anti-Spyware software (2)

• Ad-AwareAd-Aware

• CounterSpyCounterSpy

• SpyBotSpyBot

Page 12: History Days 1 3

1313

VirusesViruses Don’t click on Don’t click on executablesexecutables!!

Don’t open suspicious eMail.Don’t open suspicious eMail.

Install Anti-Virus SoftwareInstall Anti-Virus Software

Malicious Software How to Malicious Software How to Deal?Deal?

• AVG Anti-AVG Anti-

VirusVirus

• Anti-VirAnti-Vir

Page 13: History Days 1 3

1515

Phishing Phishing ThreatThreat

Page 14: History Days 1 3

1616

Computer TermsComputer Terms

01001101 = “M”BYTE

NIBBLE

Page 15: History Days 1 3

1717

TermsTerms

MegaMega GigaGiga TeraTera NanoNano ENIACENIAC IBMIBM DECDEC AppleApple RFIDRFID

HardwareHardware SoftwareSoftware CPUCPU Disk/Hard DriveDisk/Hard Drive Batch Batch

ProcessingProcessing TimesharingTimesharing MIPS/FLOPSMIPS/FLOPS KiloKilo GUIGUI

Page 16: History Days 1 3

1818

1.1 History of Computers1.1 History of Computers

NanocomputerCPUMemory Board

Page 17: History Days 1 3

1919

1.1 History of Computers – 1.1 History of Computers – 1940’s1940’s1941

1949

Page 18: History Days 1 3

2020

1800 square feet, 30 1800 square feet, 30 tons and consumed tons and consumed 160 kilowatts of 160 kilowatts of electrical power. electrical power.

1000 times faster than 1000 times faster than any other calculating any other calculating machine to date. machine to date. Performed 5,000 Performed 5,000 additions (5 KIPS), 357 additions (5 KIPS), 357 multiplications or 38 multiplications or 38 divisions (FLOPS)divisions (FLOPS)

Programming ENIAC Programming ENIAC entailed flipping entailed flipping switches and moving switches and moving plug cords.plug cords.

Developed by John Developed by John Mauchley and J. Presper Mauchley and J. Presper EckertEckert

18 months and $500,000 18 months and $500,000 tax dollars to build.tax dollars to build.

Military Uses:Military Uses: Calculate trajectoriesCalculate trajectories Design hydrogen Design hydrogen bombbomb Weather predictionWeather predictionWind-tunnel design.Wind-tunnel design.

17,468 vacuum tubes, 17,468 vacuum tubes, 70,000 resistors, 10,000 70,000 resistors, 10,000 capacitors, 1,500 relays, capacitors, 1,500 relays, 6,000 manual switches 6,000 manual switches and 5 million soldered and 5 million soldered joints.joints.

1946 - ENIACENIACENIAC

1.1 History of Computers – 1.1 History of Computers – 1940’s1940’s

Page 19: History Days 1 3

21211946 - ENIAC

1.1 History of Computers – 1.1 History of Computers – 1940’s1940’s

Page 20: History Days 1 3

2222

1.1 History of Computers – 1.1 History of Computers – 1940’s1940’s

1945 - Vannevar Bush“As we May Think”

• Bush calls for a new relationship between “thinking man and the sum of our knowledge“.

•Proposes “Memex” - a machine that stores vast amounts of information, where users could:

Create information trails

Use Links b/n related texts and illustrations

Store data and use for future reference.