• Join over 1.2 million students every month
  • Accelerate your learning by 29%
  • Unlimited access from just £6.99 per month

Story from the History of Computers

Extracts from this document...

Introduction

Project : Story from the history of computers Student Name : Tom234 Candidate number : sgi1001 Date of the day: :15th of March 2522 BCE Story from the History of Computers Around the year 2020 a nuclear war devastated earth. The only protection was to build concrete shelters, which led cities deep underground. The largest one was almost double the size of New York City. It was called "the land of technology" as most of the inhabitants were scientists, computer programmers and computer engineers. About 60 years later a guy called John was born and taught by the best computer programmers on earth. Once john was sitting behind his desk hoping that he would be able to write a program to make the computers understand humans' different accents and voice commands. ...read more.

Middle

The next day when John woke up, he discovered the extraordinary achievement he did in the world of information technology. John left in a hurry to register his accomplishment, but he met with what he never expected. It was that some people have achieved similar programs but have been arrested by the military, because they wanted to protect their systems as he could have cause a threat to them. By that time the computer had developed sufficient amounts of information to hack into the military defence ministry and gathered information about the similar cases were people had developed similar software, and the actions taken against them. ...read more.

Conclusion

John was amused by his development and decided to keep it safe and secret. As the program got bigger and bigger with knowledge, his computer hardware couldn't handle the size of the program and the power it required; so the program loaded itself on the main frame again and used some of the servers' power. Two days later the computer got a solution for the city's biggest problem: "space" as the city is too small and it is almost impossible to expand. The solution was to create a computer generated dream world with the same characteristics and rules as in earth, where people will be connected to the system through a cable in their bellybuttons, john got impressed by the idea and invested his time to support it and influence other people, that led to the technology we live in today (The Xeon). 1 ...read more.

The above preview is unformatted text

This student written piece of work is one of many that can be found in our AS and A Level Computer Science section.

Found what you're looking for?

  • Start learning 29% faster today
  • 150,000+ documents available
  • Just £6.99 a month

Not the one? Search for your essay title...
  • Join over 1.2 million students every month
  • Accelerate your learning by 29%
  • Unlimited access from just £6.99 per month

See related essaysSee related essays

Related AS and A Level Computer Science essays

  1. Firewall Protection

    The Non-Firewall Defenses We've discussed a few situations where a personal firewall can provide defense. Yet, in many cases a computer maintainer can deal with those situations even without a firewall. Those "alternative" defenses, in many cases are recommended regardless of whether you use a firewall or not.

  2. Smart Card System

    It is possible, but non-trivial, to implement this type of security under the network security model. 4.4 Configuration Of Access Control Lists Each protocol has its own set of specific tasks and rules required for us to provide traffic filtering, in general most protocols require at least two basic steps to be accomplished.

  1. CP3 - Proposed Solution to a Realistic Problem - Apartment Administration software

    My client currently relies on bookings through e-mail and telephone so it would be quite appropriate to have software that the client would be able to use to automatically check availability in real time rather than rely on paper records or print outs which could be subject to human error

  2. The development of the computer - Mainframes, Midrange Computers, Personal Computers, Palmtops (Personal Digital ...

    The second stage translates the addressed calculated in stage one into an actual, physical memory address for which the data is to be accessed from. Mainframes originally required a standard keyboard as input and its output was onto a low resolution, mono-coloured text.

  1. The development of computers

    QDOS was based on Gary Kildall's CP/M, Paterson had bought a CP/M manual and used it as the basis to write his operating system in six weeks, QDOS was different enough from CP/M to be considered legal. Microsoft bought the rights to QDOS for $50,000, keeping the IBM deal a secret from Seattle Computer Products.

  2. Computing Project

    will pop up telling the user that the username and password is incorrect and to re-enter it correctly. I will also use combo boxes where I think data doesn't really need to be typed into the system manually by the user but can be selected from a list to prevent

  1. Computing Project

    very confidential, if details of the student were to get lost or misplaced then this would be in breach of the data protection act. To keep the data secure I am going to make sure that the user backs up the data at the end of every working week and

  2. Explain the different techniques of gathering information to answer an IT Technical problem or ...

    From talking to the user the help desk would be able to get a better understanding meaning that they would resolve the problem once enough information is gathered. Another way of gathering information from a user is that they could write an email explaining the problem in detail as in

  • Over 160,000 pieces
    of student written work
  • Annotated by
    experienced teachers
  • Ideas and feedback to
    improve your own work