• Join over 1.2 million students every month
  • Accelerate your learning by 29%
  • Unlimited access from just £6.99 per month

Story from the History of Computers

Extracts from this document...

Introduction

Project : Story from the history of computers Student Name : Tom234 Candidate number : sgi1001 Date of the day: :15th of March 2522 BCE Story from the History of Computers Around the year 2020 a nuclear war devastated earth. The only protection was to build concrete shelters, which led cities deep underground. The largest one was almost double the size of New York City. It was called "the land of technology" as most of the inhabitants were scientists, computer programmers and computer engineers. About 60 years later a guy called John was born and taught by the best computer programmers on earth. Once john was sitting behind his desk hoping that he would be able to write a program to make the computers understand humans' different accents and voice commands. ...read more.

Middle

The next day when John woke up, he discovered the extraordinary achievement he did in the world of information technology. John left in a hurry to register his accomplishment, but he met with what he never expected. It was that some people have achieved similar programs but have been arrested by the military, because they wanted to protect their systems as he could have cause a threat to them. By that time the computer had developed sufficient amounts of information to hack into the military defence ministry and gathered information about the similar cases were people had developed similar software, and the actions taken against them. ...read more.

Conclusion

John was amused by his development and decided to keep it safe and secret. As the program got bigger and bigger with knowledge, his computer hardware couldn't handle the size of the program and the power it required; so the program loaded itself on the main frame again and used some of the servers' power. Two days later the computer got a solution for the city's biggest problem: "space" as the city is too small and it is almost impossible to expand. The solution was to create a computer generated dream world with the same characteristics and rules as in earth, where people will be connected to the system through a cable in their bellybuttons, john got impressed by the idea and invested his time to support it and influence other people, that led to the technology we live in today (The Xeon). 1 ...read more.

The above preview is unformatted text

This student written piece of work is one of many that can be found in our AS and A Level Computer Science section.

Found what you're looking for?

  • Start learning 29% faster today
  • 150,000+ documents available
  • Just £6.99 a month

Not the one? Search for your essay title...
  • Join over 1.2 million students every month
  • Accelerate your learning by 29%
  • Unlimited access from just £6.99 per month

See related essaysSee related essays

Related AS and A Level Computer Science essays

  1. Computing Project

    4 Login Form When a invalid username and an invalid password is entered 'No Username' 'No Password' Error message should pop up As expected 5 Login Form When a valid username and an invalid password is entered 'Admin662' 'No Password' Error message should pop up As expected 6 Login Form

  2. Explain the different techniques of gathering information to answer an IT Technical problem or ...

    A charity may not have much money so will not be able to afford a large well service IT Technical support area. A company that is managed efficiently would have very clear guidelines. The organisations policies and procedures that could affect the IT Technical support which would be determined by the company.

  1. Computing Project

    I am going to use bottom up testing, to test the system. This involves testing each individual module using prepared test data, which includes normal data, extreme data, upper and lower limits and individual data after this is done I will test the program to see if every route through

  2. Firewall Protection

    Spyware and Adbots? The term spyware is sometimes misleading. In my view, it is the responsibility of the adware developer to present the fact that the adware installation will install or use an independent adbots, and to provide the information on how this adbot communicates, and which information it delivers,

  1. Smart Card System

    5.2.7 Applet Viewer This small program provides a real Java environment for testing applets. It loads the HTML file in which the applet has been embedded and displays the application in a browser-like window. 5.3 Advantages of Java a) Secure Java's run-time system will perform checks to make sure that programs transmitted over a network have not been tampered with.

  2. CP3 - Proposed Solution to a Realistic Problem - Apartment Administration software

    The client has to input data into the system in order for it to function correctly. All of the data that is inputted into the current system is either numerical or alphabetical. A typical cycle of the system, 1. My client receives a booking from a customer.

  1. The development of the computer - Mainframes, Midrange Computers, Personal Computers, Palmtops (Personal Digital ...

    The second stage translates the addressed calculated in stage one into an actual, physical memory address for which the data is to be accessed from. Mainframes originally required a standard keyboard as input and its output was onto a low resolution, mono-coloured text.

  2. The development of computers

    QDOS was based on Gary Kildall's CP/M, Paterson had bought a CP/M manual and used it as the basis to write his operating system in six weeks, QDOS was different enough from CP/M to be considered legal. Microsoft bought the rights to QDOS for $50,000, keeping the IBM deal a secret from Seattle Computer Products.

  • Over 160,000 pieces
    of student written work
  • Annotated by
    experienced teachers
  • Ideas and feedback to
    improve your own work