SlideShare uma empresa Scribd logo
1 de 1
Baixar para ler offline
FACTS
ABOUT
COMPUTER
THE FIRST MODERN COMPUTER WAS
ENORMOUS
THE FIRST MODERN COMPUTER WAS
ESSENTIALLY A MASSIVE CALCULATOR
RAM REFERS TO A COMPUTER'S MEMORY
EVERY MONTH, AROUND 6,000 COMPUTER
VIRUSES ARE PUBLISHED
WHEN USING A COMPUTER, IT IS
CRITICAL TO TAKE BREAKS TO PROTECT
YOUR EYES
The earliest modern computers were electrical calculating
devices built during World War II. One computer would take
up whole rooms, and sections of the computers were
placed on wheels due to their size.
Despite its size, the first modern computer could only
accomplish four tasks. Addition, subtraction, multiplication,
and division
RAM, which stands for Random Access Memory, is the
computer's short-term memory. The computer would be
unable to accomplish anything without it, from accessing
files to streaming video.
Computers are constantly at danger of being infected with
a computer virus, which causes them to shut down or
function slowly. That is why it is critical to have anti-virus
software installed on your computer.
Because computer screens are so bright, it's critical to take
breaks every 20 minutes to protect your eyes.

Mais conteúdo relacionado

Semelhante a Facts About Computer

The parts of a computer and how it
The parts of a computer and how itThe parts of a computer and how it
The parts of a computer and how itnate17
 
Sgp Computersfinal
Sgp ComputersfinalSgp Computersfinal
Sgp Computersfinal107811
 
Computer Studies, Uses, Computer application and appreciation
Computer Studies, Uses, Computer application and appreciation Computer Studies, Uses, Computer application and appreciation
Computer Studies, Uses, Computer application and appreciation OLADIMEJI ADEKUNLE
 
Presentation on computer generation
Presentation on computer generationPresentation on computer generation
Presentation on computer generationPritam Das
 
Classification Station Project 2003
Classification Station Project 2003Classification Station Project 2003
Classification Station Project 2003hcj2010
 
presentationoncomputergeneration-170324202733-1.pptx
presentationoncomputergeneration-170324202733-1.pptxpresentationoncomputergeneration-170324202733-1.pptx
presentationoncomputergeneration-170324202733-1.pptxssuser3b0320
 
CHAPTER-ONE to computer science.pptx.fil
CHAPTER-ONE to computer science.pptx.filCHAPTER-ONE to computer science.pptx.fil
CHAPTER-ONE to computer science.pptx.filHaftomYitbarek
 
VTU C programming(CPS) 18CPS13/23 notes by Nithin,VVCE,Mysuru
 VTU C programming(CPS) 18CPS13/23 notes by Nithin,VVCE,Mysuru VTU C programming(CPS) 18CPS13/23 notes by Nithin,VVCE,Mysuru
VTU C programming(CPS) 18CPS13/23 notes by Nithin,VVCE,MysuruNithin Kumar,VVCE, Mysuru
 
Computer fundamentals
Computer fundamentalsComputer fundamentals
Computer fundamentalsAmir Villas
 
form-1 COMPUTER NOTES--all-chapters.pdf
form-1 COMPUTER NOTES--all-chapters.pdfform-1 COMPUTER NOTES--all-chapters.pdf
form-1 COMPUTER NOTES--all-chapters.pdfBRIGHTEMPIRESTUDIOS
 
51120402 wearable-computers-by-jeevan(2)
51120402 wearable-computers-by-jeevan(2)51120402 wearable-computers-by-jeevan(2)
51120402 wearable-computers-by-jeevan(2)naveenchandranaveen
 
Computer Hardware
Computer HardwareComputer Hardware
Computer Hardwarenitinmote
 
The Deal
The DealThe Deal
The Dealadhaval
 
Basic Components of Computer
Basic Components of ComputerBasic Components of Computer
Basic Components of ComputerRajGopalAgrawal
 
ICDL Module 2 - Using Computers & Managing Files (Windows XP) - Presentation ...
ICDL Module 2 - Using Computers & Managing Files (Windows XP) - Presentation ...ICDL Module 2 - Using Computers & Managing Files (Windows XP) - Presentation ...
ICDL Module 2 - Using Computers & Managing Files (Windows XP) - Presentation ...Michael Lew
 
Ch 1 introduction and 2 computer software 1
Ch 1 introduction  and 2 computer software 1Ch 1 introduction  and 2 computer software 1
Ch 1 introduction and 2 computer software 1rjsuthar56
 

Semelhante a Facts About Computer (20)

The parts of a computer and how it
The parts of a computer and how itThe parts of a computer and how it
The parts of a computer and how it
 
Sgp Computersfinal
Sgp ComputersfinalSgp Computersfinal
Sgp Computersfinal
 
Computer Studies, Uses, Computer application and appreciation
Computer Studies, Uses, Computer application and appreciation Computer Studies, Uses, Computer application and appreciation
Computer Studies, Uses, Computer application and appreciation
 
Presentation on computer generation
Presentation on computer generationPresentation on computer generation
Presentation on computer generation
 
Classification Station Project 2003
Classification Station Project 2003Classification Station Project 2003
Classification Station Project 2003
 
LS 6 Computers
LS 6 ComputersLS 6 Computers
LS 6 Computers
 
presentationoncomputergeneration-170324202733-1.pptx
presentationoncomputergeneration-170324202733-1.pptxpresentationoncomputergeneration-170324202733-1.pptx
presentationoncomputergeneration-170324202733-1.pptx
 
CHAPTER-ONE to computer science.pptx.fil
CHAPTER-ONE to computer science.pptx.filCHAPTER-ONE to computer science.pptx.fil
CHAPTER-ONE to computer science.pptx.fil
 
VTU C programming(CPS) 18CPS13/23 notes by Nithin,VVCE,Mysuru
 VTU C programming(CPS) 18CPS13/23 notes by Nithin,VVCE,Mysuru VTU C programming(CPS) 18CPS13/23 notes by Nithin,VVCE,Mysuru
VTU C programming(CPS) 18CPS13/23 notes by Nithin,VVCE,Mysuru
 
COMPUTER-FORM-1-NOTES-min.pptx
COMPUTER-FORM-1-NOTES-min.pptxCOMPUTER-FORM-1-NOTES-min.pptx
COMPUTER-FORM-1-NOTES-min.pptx
 
Computer fundamentals
Computer fundamentalsComputer fundamentals
Computer fundamentals
 
form-1 COMPUTER NOTES--all-chapters.pdf
form-1 COMPUTER NOTES--all-chapters.pdfform-1 COMPUTER NOTES--all-chapters.pdf
form-1 COMPUTER NOTES--all-chapters.pdf
 
51120402 wearable-computers-by-jeevan(2)
51120402 wearable-computers-by-jeevan(2)51120402 wearable-computers-by-jeevan(2)
51120402 wearable-computers-by-jeevan(2)
 
Computer Hardware
Computer HardwareComputer Hardware
Computer Hardware
 
The Deal
The DealThe Deal
The Deal
 
Basic Components of Computer
Basic Components of ComputerBasic Components of Computer
Basic Components of Computer
 
final presentation
final presentationfinal presentation
final presentation
 
ICDL Module 2 - Using Computers & Managing Files (Windows XP) - Presentation ...
ICDL Module 2 - Using Computers & Managing Files (Windows XP) - Presentation ...ICDL Module 2 - Using Computers & Managing Files (Windows XP) - Presentation ...
ICDL Module 2 - Using Computers & Managing Files (Windows XP) - Presentation ...
 
Computers types
Computers typesComputers types
Computers types
 
Ch 1 introduction and 2 computer software 1
Ch 1 introduction  and 2 computer software 1Ch 1 introduction  and 2 computer software 1
Ch 1 introduction and 2 computer software 1
 

Mais de 73inc

Programming is the use of one or more algorithms to become an interrelated pr...
Programming is the use of one or more algorithms to become an interrelated pr...Programming is the use of one or more algorithms to become an interrelated pr...
Programming is the use of one or more algorithms to become an interrelated pr...73inc
 
Types of Cyberattacks - Malware Removal
Types of Cyberattacks  - Malware RemovalTypes of Cyberattacks  - Malware Removal
Types of Cyberattacks - Malware Removal73inc
 
iMac and MacBook Malware Removal & Repair.pdf
iMac and MacBook Malware Removal & Repair.pdfiMac and MacBook Malware Removal & Repair.pdf
iMac and MacBook Malware Removal & Repair.pdf73inc
 
Safeguarding Your MacBook Expert Strategies to Shield Against Malware
Safeguarding Your MacBook Expert Strategies to Shield Against MalwareSafeguarding Your MacBook Expert Strategies to Shield Against Malware
Safeguarding Your MacBook Expert Strategies to Shield Against Malware73inc
 
Efficient Solutions for Reliable Apple Device Repair in Auckland.pdf
Efficient Solutions for Reliable Apple Device Repair in Auckland.pdfEfficient Solutions for Reliable Apple Device Repair in Auckland.pdf
Efficient Solutions for Reliable Apple Device Repair in Auckland.pdf73inc
 
Efficient Macbook Pro Repair Services in NZ
Efficient Macbook Pro Repair Services in NZEfficient Macbook Pro Repair Services in NZ
Efficient Macbook Pro Repair Services in NZ73inc
 
3 tips for Choosing a Laptop & Things To Check First.pdf
3 tips for Choosing a Laptop & Things To Check First.pdf3 tips for Choosing a Laptop & Things To Check First.pdf
3 tips for Choosing a Laptop & Things To Check First.pdf73inc
 
Macbook slow performance repair
Macbook slow performance repairMacbook slow performance repair
Macbook slow performance repair73inc
 
Reviving the Unfortunate Mastering MacBook Water Damage Repair.pdf
Reviving the Unfortunate Mastering MacBook Water Damage Repair.pdfReviving the Unfortunate Mastering MacBook Water Damage Repair.pdf
Reviving the Unfortunate Mastering MacBook Water Damage Repair.pdf73inc
 
Securing Your MacBook: Professional Tips for Malware Removal
Securing Your MacBook: Professional Tips for Malware RemovalSecuring Your MacBook: Professional Tips for Malware Removal
Securing Your MacBook: Professional Tips for Malware Removal73inc
 
Boosting macbook performance mastering the art of speedy repairs
Boosting macbook performance mastering the art of speedy repairsBoosting macbook performance mastering the art of speedy repairs
Boosting macbook performance mastering the art of speedy repairs73inc
 
Tips to speed up your PC heading
Tips to speed up your PC headingTips to speed up your PC heading
Tips to speed up your PC heading73inc
 
Efficient Strategies for Macbook Data Recovery Expert Techniques for Restorin...
Efficient Strategies for Macbook Data Recovery Expert Techniques for Restorin...Efficient Strategies for Macbook Data Recovery Expert Techniques for Restorin...
Efficient Strategies for Macbook Data Recovery Expert Techniques for Restorin...73inc
 

Mais de 73inc (13)

Programming is the use of one or more algorithms to become an interrelated pr...
Programming is the use of one or more algorithms to become an interrelated pr...Programming is the use of one or more algorithms to become an interrelated pr...
Programming is the use of one or more algorithms to become an interrelated pr...
 
Types of Cyberattacks - Malware Removal
Types of Cyberattacks  - Malware RemovalTypes of Cyberattacks  - Malware Removal
Types of Cyberattacks - Malware Removal
 
iMac and MacBook Malware Removal & Repair.pdf
iMac and MacBook Malware Removal & Repair.pdfiMac and MacBook Malware Removal & Repair.pdf
iMac and MacBook Malware Removal & Repair.pdf
 
Safeguarding Your MacBook Expert Strategies to Shield Against Malware
Safeguarding Your MacBook Expert Strategies to Shield Against MalwareSafeguarding Your MacBook Expert Strategies to Shield Against Malware
Safeguarding Your MacBook Expert Strategies to Shield Against Malware
 
Efficient Solutions for Reliable Apple Device Repair in Auckland.pdf
Efficient Solutions for Reliable Apple Device Repair in Auckland.pdfEfficient Solutions for Reliable Apple Device Repair in Auckland.pdf
Efficient Solutions for Reliable Apple Device Repair in Auckland.pdf
 
Efficient Macbook Pro Repair Services in NZ
Efficient Macbook Pro Repair Services in NZEfficient Macbook Pro Repair Services in NZ
Efficient Macbook Pro Repair Services in NZ
 
3 tips for Choosing a Laptop & Things To Check First.pdf
3 tips for Choosing a Laptop & Things To Check First.pdf3 tips for Choosing a Laptop & Things To Check First.pdf
3 tips for Choosing a Laptop & Things To Check First.pdf
 
Macbook slow performance repair
Macbook slow performance repairMacbook slow performance repair
Macbook slow performance repair
 
Reviving the Unfortunate Mastering MacBook Water Damage Repair.pdf
Reviving the Unfortunate Mastering MacBook Water Damage Repair.pdfReviving the Unfortunate Mastering MacBook Water Damage Repair.pdf
Reviving the Unfortunate Mastering MacBook Water Damage Repair.pdf
 
Securing Your MacBook: Professional Tips for Malware Removal
Securing Your MacBook: Professional Tips for Malware RemovalSecuring Your MacBook: Professional Tips for Malware Removal
Securing Your MacBook: Professional Tips for Malware Removal
 
Boosting macbook performance mastering the art of speedy repairs
Boosting macbook performance mastering the art of speedy repairsBoosting macbook performance mastering the art of speedy repairs
Boosting macbook performance mastering the art of speedy repairs
 
Tips to speed up your PC heading
Tips to speed up your PC headingTips to speed up your PC heading
Tips to speed up your PC heading
 
Efficient Strategies for Macbook Data Recovery Expert Techniques for Restorin...
Efficient Strategies for Macbook Data Recovery Expert Techniques for Restorin...Efficient Strategies for Macbook Data Recovery Expert Techniques for Restorin...
Efficient Strategies for Macbook Data Recovery Expert Techniques for Restorin...
 

Último

Event-Driven Architecture Masterclass: Challenges in Stream Processing
Event-Driven Architecture Masterclass: Challenges in Stream ProcessingEvent-Driven Architecture Masterclass: Challenges in Stream Processing
Event-Driven Architecture Masterclass: Challenges in Stream ProcessingScyllaDB
 
Design Guidelines for Passkeys 2024.pptx
Design Guidelines for Passkeys 2024.pptxDesign Guidelines for Passkeys 2024.pptx
Design Guidelines for Passkeys 2024.pptxFIDO Alliance
 
Intro in Product Management - Коротко про професію продакт менеджера
Intro in Product Management - Коротко про професію продакт менеджераIntro in Product Management - Коротко про професію продакт менеджера
Intro in Product Management - Коротко про професію продакт менеджераMark Opanasiuk
 
(Explainable) Data-Centric AI: what are you explaininhg, and to whom?
(Explainable) Data-Centric AI: what are you explaininhg, and to whom?(Explainable) Data-Centric AI: what are you explaininhg, and to whom?
(Explainable) Data-Centric AI: what are you explaininhg, and to whom?Paolo Missier
 
Continuing Bonds Through AI: A Hermeneutic Reflection on Thanabots
Continuing Bonds Through AI: A Hermeneutic Reflection on ThanabotsContinuing Bonds Through AI: A Hermeneutic Reflection on Thanabots
Continuing Bonds Through AI: A Hermeneutic Reflection on ThanabotsLeah Henrickson
 
Easier, Faster, and More Powerful – Alles Neu macht der Mai -Wir durchleuchte...
Easier, Faster, and More Powerful – Alles Neu macht der Mai -Wir durchleuchte...Easier, Faster, and More Powerful – Alles Neu macht der Mai -Wir durchleuchte...
Easier, Faster, and More Powerful – Alles Neu macht der Mai -Wir durchleuchte...panagenda
 
Your enemies use GenAI too - staying ahead of fraud with Neo4j
Your enemies use GenAI too - staying ahead of fraud with Neo4jYour enemies use GenAI too - staying ahead of fraud with Neo4j
Your enemies use GenAI too - staying ahead of fraud with Neo4jNeo4j
 
How we scaled to 80K users by doing nothing!.pdf
How we scaled to 80K users by doing nothing!.pdfHow we scaled to 80K users by doing nothing!.pdf
How we scaled to 80K users by doing nothing!.pdfSrushith Repakula
 
Hyatt driving innovation and exceptional customer experiences with FIDO passw...
Hyatt driving innovation and exceptional customer experiences with FIDO passw...Hyatt driving innovation and exceptional customer experiences with FIDO passw...
Hyatt driving innovation and exceptional customer experiences with FIDO passw...FIDO Alliance
 
The Value of Certifying Products for FDO _ Paul at FIDO Alliance.pdf
The Value of Certifying Products for FDO _ Paul at FIDO Alliance.pdfThe Value of Certifying Products for FDO _ Paul at FIDO Alliance.pdf
The Value of Certifying Products for FDO _ Paul at FIDO Alliance.pdfFIDO Alliance
 
Portal Kombat : extension du réseau de propagande russe
Portal Kombat : extension du réseau de propagande russePortal Kombat : extension du réseau de propagande russe
Portal Kombat : extension du réseau de propagande russe中 央社
 
Event-Driven Architecture Masterclass: Integrating Distributed Data Stores Ac...
Event-Driven Architecture Masterclass: Integrating Distributed Data Stores Ac...Event-Driven Architecture Masterclass: Integrating Distributed Data Stores Ac...
Event-Driven Architecture Masterclass: Integrating Distributed Data Stores Ac...ScyllaDB
 
Introduction to FDO and How It works Applications _ Richard at FIDO Alliance.pdf
Introduction to FDO and How It works Applications _ Richard at FIDO Alliance.pdfIntroduction to FDO and How It works Applications _ Richard at FIDO Alliance.pdf
Introduction to FDO and How It works Applications _ Richard at FIDO Alliance.pdfFIDO Alliance
 
Working together SRE & Platform Engineering
Working together SRE & Platform EngineeringWorking together SRE & Platform Engineering
Working together SRE & Platform EngineeringMarcus Vechiato
 
TopCryptoSupers 12thReport OrionX May2024
TopCryptoSupers 12thReport OrionX May2024TopCryptoSupers 12thReport OrionX May2024
TopCryptoSupers 12thReport OrionX May2024Stephen Perrenod
 
Microsoft CSP Briefing Pre-Engagement - Questionnaire
Microsoft CSP Briefing Pre-Engagement - QuestionnaireMicrosoft CSP Briefing Pre-Engagement - Questionnaire
Microsoft CSP Briefing Pre-Engagement - QuestionnaireExakis Nelite
 
Intro to Passkeys and the State of Passwordless.pptx
Intro to Passkeys and the State of Passwordless.pptxIntro to Passkeys and the State of Passwordless.pptx
Intro to Passkeys and the State of Passwordless.pptxFIDO Alliance
 
Human Expert Website Manual WCAG 2.0 2.1 2.2 Audit - Digital Accessibility Au...
Human Expert Website Manual WCAG 2.0 2.1 2.2 Audit - Digital Accessibility Au...Human Expert Website Manual WCAG 2.0 2.1 2.2 Audit - Digital Accessibility Au...
Human Expert Website Manual WCAG 2.0 2.1 2.2 Audit - Digital Accessibility Au...Skynet Technologies
 
Choosing the Right FDO Deployment Model for Your Application _ Geoffrey at In...
Choosing the Right FDO Deployment Model for Your Application _ Geoffrey at In...Choosing the Right FDO Deployment Model for Your Application _ Geoffrey at In...
Choosing the Right FDO Deployment Model for Your Application _ Geoffrey at In...FIDO Alliance
 
WebAssembly is Key to Better LLM Performance
WebAssembly is Key to Better LLM PerformanceWebAssembly is Key to Better LLM Performance
WebAssembly is Key to Better LLM PerformanceSamy Fodil
 

Último (20)

Event-Driven Architecture Masterclass: Challenges in Stream Processing
Event-Driven Architecture Masterclass: Challenges in Stream ProcessingEvent-Driven Architecture Masterclass: Challenges in Stream Processing
Event-Driven Architecture Masterclass: Challenges in Stream Processing
 
Design Guidelines for Passkeys 2024.pptx
Design Guidelines for Passkeys 2024.pptxDesign Guidelines for Passkeys 2024.pptx
Design Guidelines for Passkeys 2024.pptx
 
Intro in Product Management - Коротко про професію продакт менеджера
Intro in Product Management - Коротко про професію продакт менеджераIntro in Product Management - Коротко про професію продакт менеджера
Intro in Product Management - Коротко про професію продакт менеджера
 
(Explainable) Data-Centric AI: what are you explaininhg, and to whom?
(Explainable) Data-Centric AI: what are you explaininhg, and to whom?(Explainable) Data-Centric AI: what are you explaininhg, and to whom?
(Explainable) Data-Centric AI: what are you explaininhg, and to whom?
 
Continuing Bonds Through AI: A Hermeneutic Reflection on Thanabots
Continuing Bonds Through AI: A Hermeneutic Reflection on ThanabotsContinuing Bonds Through AI: A Hermeneutic Reflection on Thanabots
Continuing Bonds Through AI: A Hermeneutic Reflection on Thanabots
 
Easier, Faster, and More Powerful – Alles Neu macht der Mai -Wir durchleuchte...
Easier, Faster, and More Powerful – Alles Neu macht der Mai -Wir durchleuchte...Easier, Faster, and More Powerful – Alles Neu macht der Mai -Wir durchleuchte...
Easier, Faster, and More Powerful – Alles Neu macht der Mai -Wir durchleuchte...
 
Your enemies use GenAI too - staying ahead of fraud with Neo4j
Your enemies use GenAI too - staying ahead of fraud with Neo4jYour enemies use GenAI too - staying ahead of fraud with Neo4j
Your enemies use GenAI too - staying ahead of fraud with Neo4j
 
How we scaled to 80K users by doing nothing!.pdf
How we scaled to 80K users by doing nothing!.pdfHow we scaled to 80K users by doing nothing!.pdf
How we scaled to 80K users by doing nothing!.pdf
 
Hyatt driving innovation and exceptional customer experiences with FIDO passw...
Hyatt driving innovation and exceptional customer experiences with FIDO passw...Hyatt driving innovation and exceptional customer experiences with FIDO passw...
Hyatt driving innovation and exceptional customer experiences with FIDO passw...
 
The Value of Certifying Products for FDO _ Paul at FIDO Alliance.pdf
The Value of Certifying Products for FDO _ Paul at FIDO Alliance.pdfThe Value of Certifying Products for FDO _ Paul at FIDO Alliance.pdf
The Value of Certifying Products for FDO _ Paul at FIDO Alliance.pdf
 
Portal Kombat : extension du réseau de propagande russe
Portal Kombat : extension du réseau de propagande russePortal Kombat : extension du réseau de propagande russe
Portal Kombat : extension du réseau de propagande russe
 
Event-Driven Architecture Masterclass: Integrating Distributed Data Stores Ac...
Event-Driven Architecture Masterclass: Integrating Distributed Data Stores Ac...Event-Driven Architecture Masterclass: Integrating Distributed Data Stores Ac...
Event-Driven Architecture Masterclass: Integrating Distributed Data Stores Ac...
 
Introduction to FDO and How It works Applications _ Richard at FIDO Alliance.pdf
Introduction to FDO and How It works Applications _ Richard at FIDO Alliance.pdfIntroduction to FDO and How It works Applications _ Richard at FIDO Alliance.pdf
Introduction to FDO and How It works Applications _ Richard at FIDO Alliance.pdf
 
Working together SRE & Platform Engineering
Working together SRE & Platform EngineeringWorking together SRE & Platform Engineering
Working together SRE & Platform Engineering
 
TopCryptoSupers 12thReport OrionX May2024
TopCryptoSupers 12thReport OrionX May2024TopCryptoSupers 12thReport OrionX May2024
TopCryptoSupers 12thReport OrionX May2024
 
Microsoft CSP Briefing Pre-Engagement - Questionnaire
Microsoft CSP Briefing Pre-Engagement - QuestionnaireMicrosoft CSP Briefing Pre-Engagement - Questionnaire
Microsoft CSP Briefing Pre-Engagement - Questionnaire
 
Intro to Passkeys and the State of Passwordless.pptx
Intro to Passkeys and the State of Passwordless.pptxIntro to Passkeys and the State of Passwordless.pptx
Intro to Passkeys and the State of Passwordless.pptx
 
Human Expert Website Manual WCAG 2.0 2.1 2.2 Audit - Digital Accessibility Au...
Human Expert Website Manual WCAG 2.0 2.1 2.2 Audit - Digital Accessibility Au...Human Expert Website Manual WCAG 2.0 2.1 2.2 Audit - Digital Accessibility Au...
Human Expert Website Manual WCAG 2.0 2.1 2.2 Audit - Digital Accessibility Au...
 
Choosing the Right FDO Deployment Model for Your Application _ Geoffrey at In...
Choosing the Right FDO Deployment Model for Your Application _ Geoffrey at In...Choosing the Right FDO Deployment Model for Your Application _ Geoffrey at In...
Choosing the Right FDO Deployment Model for Your Application _ Geoffrey at In...
 
WebAssembly is Key to Better LLM Performance
WebAssembly is Key to Better LLM PerformanceWebAssembly is Key to Better LLM Performance
WebAssembly is Key to Better LLM Performance
 

Facts About Computer

  • 1. FACTS ABOUT COMPUTER THE FIRST MODERN COMPUTER WAS ENORMOUS THE FIRST MODERN COMPUTER WAS ESSENTIALLY A MASSIVE CALCULATOR RAM REFERS TO A COMPUTER'S MEMORY EVERY MONTH, AROUND 6,000 COMPUTER VIRUSES ARE PUBLISHED WHEN USING A COMPUTER, IT IS CRITICAL TO TAKE BREAKS TO PROTECT YOUR EYES The earliest modern computers were electrical calculating devices built during World War II. One computer would take up whole rooms, and sections of the computers were placed on wheels due to their size. Despite its size, the first modern computer could only accomplish four tasks. Addition, subtraction, multiplication, and division RAM, which stands for Random Access Memory, is the computer's short-term memory. The computer would be unable to accomplish anything without it, from accessing files to streaming video. Computers are constantly at danger of being infected with a computer virus, which causes them to shut down or function slowly. That is why it is critical to have anti-virus software installed on your computer. Because computer screens are so bright, it's critical to take breaks every 20 minutes to protect your eyes.