Protection Essay

767 words - 4 pages

First Generation (1941-1956)
World War gave rise to numerous developments and started off the computer age. Electronic Numerical Integrator and Computer (ENIAC) was produced by a partnershp between University of Pennsylvannia and the US government. It consisted of 18,000 vacuum tubes and 7000 resistors. It was developed by John Presper Eckert and John W. Mauchly and was a general purpose computer. "Von Neumann designed the Electronic Discrete Variable Automatic Computer (EDVAC) in 1945 with a memory to hold both a stored program as well as data." Von Neumann's computer allowed for all the computer functions to be controlled by a single source.
Then in 1951 came the Universal Automatic ...view middle of the document...

Many financial information was processed using these computers.
In Second Generation computers, the instructions(program) could be stored inside the computer's memory. High-level languages such as COBOL (Common Business-Oriented Language) and FORTRAN (Formula Translator) were used, and they are still used for some applications nowdays.
Third Generation Computers (1964-1971)
Although transistors were great deal of improvement over the vacuum tubes, they generated heat and damaged the sensitive areas of the computer. The Intergreated Circuit(IC) was invented in 1958 by Jack Kilby. It combined electronic components onto a small silicon disc, made from quartz. More advancement made possible the fitings of even more components on a small chip or a semi conductor. Also in third generation computers, the operating systems allowed the machines to run many different applications. These applications were monitored and coordinated by the computer's memory.
Fourth Generation (1971-Present)
Fourth Generation computers are the modern day computers. The Size started to go down with the improvement in the integerated circuits. Very Large Scale(VLSI) and Ultra Large scale(ULSI) ensured that millions of components could be fit into a small chip. It reduced the size and price of the computers at the same time increasing power, efficiency and reliability. "The Intel 4004 chip, developed in 1971,...

Other Papers Like Protection

Consumer Protection Law Essay

667 words - 3 pages 6/18/2010 STRENTHENING CONSUMER PROTECTION IN MALAYSIA Mohamed Iqbal b Mohd shafi HIQ TRAINING AND CONSULTANCY 1 1 6/18/2010 OUTLINE OF PRESENTATION 1. Definition of ‘consumer’ 2. What does consumer protection mean 3. Who is responsible for consumer protection in Malaysia 4. How is consumer protection being carried out 5. What can be done to strengthen consumer protection 2 2 6/18/2010 A. Misleading and

Essentials of Executive Protection Essay

1741 words - 7 pages ESSENTIALS OF PROTECTION Joseph Kornas Henley-Putnam University As a Personal Protection Specialist, I am charged with the responsibility for the Security, Safety, Health, and Well-being of another human being. In keeping with these obligations, I pledge my honor, reputation and, if necessary, my life. These are the words the Personal Protection Specialist lives by. Protection

Force Health Protection

990 words - 4 pages Name Institution Course Professor Date Brigade Support Company and Force Health Protection for COPs The Brigade Support Medical Company plays a variety of roles in its scope of work. This paper seeks to discuss and identify the manner in which the Brigade Support Medical Company can offer Force Health Protection to outlying COPs. The main roles of the company are that: they act as a unit level medical care; and they offer

Issues in Child Protection

1228 words - 5 pages For the purposes of this essay I will be discussing Child Protection in the context of the quote “One of the fundamental purposes of a civilised society is to protect its members from acts of violence committed by others” Family Violence Prevention Taskforce 1994, p. iii. Child protection in Australia in the context of “one of the fundamental purposes of a civilised society is to protect its members from acts of violence committed by others

Critical Infrastructure Protection

1373 words - 6 pages Critical Infrastructure Protection Bobby Perkins Emmanuel Nyeanchi Strayer University CIS 502 Theories Of Security Management February 16, 2014 Critical Infrastructure Protection Explained The expression "critical infrastructure" alludes to possessions of physical and PC based frameworks that are fundamental to the base operations of an economy and its government. They incorporate, however are not constrained to, telecommunications

Bureau Of Fire Protection

4190 words - 17 pages UNIVERSITY OF THE PHILIPPINES National College of Public Administration and Governance Diliman, Quezon City PERFORMANCE OF THE BUREAU OF FIRE PROTECTION (BFP): CONTRIBUTIONS TO FIRE MANAGEMENT A proposal submitted in partial fulfillment of the requirements for PA 199.2 By: Nheo Cervantes Geofel Soriano Adviser: Vicente Mariano September 27, 2011 I. Introduction Fires are one of the few calamities of which we can

Credit Protection Worksheet

683 words - 3 pages Credit Protection Worksheet FP/101-Foundations of Personal Finance Credit Protection and Identity Theft Directions Refer to: Free Credit Report on the Federal Trade Commission’s site. Identity Theft resource center on the Federal Trade Commission’s site. Provide answers to three of the following questions based on your readings and your personal experiences. Answers should be 100-to 150-words each. 1. If you

Consumer Protection Act 1999

2030 words - 9 pages 9 CONSUMER PROTECTION ACT 1999 | Application: offer or supply of goods to one or more consumers Application: offer or supply of goods to one or more consumers Meaning of consumer: a person who acquires or uses goods or services ordinarily acquired for personal, domestic or household purpose; S3 Meaning of consumer: a person who acquires or uses goods or services ordinarily acquired for personal, domestic or household purpose; S3 S

Protection to Bankers

2529 words - 11 pages Protection to Bankers from disclosure of certain information to public  Banking is one of the most risky sectors as far as privacy is concerned due to the highly sensitive and personal nature of information which is often exchanged, recorded and retained. Although India has RBI guidelines and legislations to protect data, this blog post looks at the extent of those protections, and what are the areas that still need to be addressed

Environmental Protection Agency

1179 words - 5 pages Environmental Protection Agency Introduction Thе purpose of this paper is to review closely thе report entitled "EPA Needs to Improve Oversight of Its Information Technology Projects," with а major focus on its recommendations. In this paper, I will analyze different alternatives presented in thе report. I will also shed light on the Clinger-Cohen Act which directs that the Government Information Technology Shop be operated exactly as an

Risk and Protection

1725 words - 7 pages , protective factors and problem behaviors in Elkhart County. The Conclusion presents the final list of priorities and recommendations for future action. Protective Factor: Depressed protection for community rewards for anti-social involvement and Interaction with pro-social peers. The Indiana Youth Survey revealed that both protective factors are depressed throughout the county. The number of Elkhart County area 6th, 8th, 10th, and 12th graders

Related Essays

Child Protection Essay

1038 words - 5 pages All schools should create and maintain a safe atmosphere for pupils and deal with circumstances where there are child wellbeing concerns. Though their child protection policies and procedures for safeguarding pupils, schools play an important role in the prevention of abuse and neglect. As a Teaching Assistant I have contact with individual pupils on a daily basis and so I have a vital role to play in detecting indicators of possible abuse

Consumer Protection Essay

1406 words - 6 pages Introduction: When we approach the market as a consumer, we expect value for moneyi.eright quality, right quantity, right prices, information about the mode of use, etc. But there may be instances where a consumer is harassed or cheated. An Act to provide for the better protection of the interest of consumers and for that purpose to make provision for the establishment of consumer councils and other authorities for the settlement of consumer

Protection Scheme Essay

670 words - 3 pages access control list made up with the names of all 5,000 users on it. In this paper I will be discussing and giving you a look into a protection scheme that could be used in an efficient way that will provide that protection to the system. There are certain techniques to protect the systems directories, files, and folders. Most Information Technology (IT) departments will set up appropriate file permissions on the files, set up certain tools to

Antivirus Protection Essay

1166 words - 5 pages Antivirus Protection A company’s network is intertwined with every employee’s private computer. Even in instances where the company has instituted security policies. Employees will undoubtedly carry work home or bring disks from home or use thumb drives; additionally, personal email will very often have attachments that could endanger the company network. Lets say for example that the company network is protected by Norton antivirus, but