User:Sshar229
Jump to navigation
Jump to search
The Computer Revolution: A Timeline page will soon be redirected here. This is much broader in scope.
History[edit | edit source]
The Mark 1 was the first computer in the United States
Internet[edit | edit source]
Hardware[edit | edit source]
- Microprocessor
- Binary
- Computer case
- Memory
- Cache
- Binary
- Ports
- Expansion Cards
- Storage
- Smartcards
- price
- PDA's
- TV
- Sound cards
- Computer Storage
- Servers
- Jump Drives
- Refresh Rate vs. Sampling Rate
- Power Supply
- Hard Disks
- Ram Chips
- Video Cards
- CRT Monitor
- Virtual Memory
Computer Graphics[edit | edit source]
- Corel Draw
- PDF Plugins
- Basics of Computer Design
- Great Designs
- Abstract Photoshop
- Increasing Design Speed
- Design Efficiency
- Using Pictures
- Soft Copy Proofs
- Print Merge
- 3D
- CADD
- Paint
- Adobe Photoshop
- Graphics Accelerator
Peripherals[edit | edit source]
- Keyboards
- Scanners
- Printers
- Pointers
- Monitor
- History of Printers
- Types of Scanners
- Speakers
- Web Cameras
- 3D Scanners
Software[edit | edit source]
- OS
- Other system software
- User interface strategies
- Word processing
- Spreadsheet
- Database
- Presentation
- Graphics
- Types of Software & Operating Systems
- The computer Revolution/Software/System Development
- Windows Vista
- Application Software
- Personal Information Managers
- Pirates vs. Abandoned
Networks[edit | edit source]
- Types of Networks
- Intranet
- Components of a Network
- Four Types of Wireless Communications
- Ways to Minimize Virus Attacks
- LAN
- Network Topologies
- WAN
- Wired Communications Media
- Internet
- Short Range Wireless for Personal Area Networks
- Short Range Wireless for Automation Networks
- Digital and Analog Cell Phones
- Wi-Fi
- Token Rings
Security[edit | edit source]
- Firewall
- Malware
- attacks
- defence
- Cyber Villains
- Passwords
- Antivirus Software - what is it, types of
- Biometrics
- Computer Crime
- Encryption
- Firewall
- The Computer Revolution/Security/Prevent Identity Theft
- Dirty Data
- Cyber Threats
- The Evil Twin Attack
- Malware
- Spyware
- Technology Misuse
Artificial Intelligence[edit | edit source]
- Expert Systems
- Neural Networks
- Genetic Algorithms
- ASIMO
- Turing Test
- Branches of & Applying AI
- AI use in business
- Diagnosis
- Weak VS Strong AI
- Translators
- Education
- I dog
- Around The Home
Databases[edit | edit source]
- Basic Structure
- Data mining
- Database Models
- DBMS
- Indexing
- Criminal Databases
- Management Information system
- Limitations
- Types of Files
- Data Warehouses
Programming[edit | edit source]
- 1st generation
- 2nd generation
- Programming_Languages_Used_Today
- Designing the Program
- Five Steps of Programming
- Object Oriented Programming
- Object Oriented vs. Structured programming
- The Six Phases of System Analysis and Design
- Conducting the Preliminary Investigation in system analysis and design
E commerce[edit | edit source]
Communication[edit | edit source]
- online
- satellites
- information age
- Telecommunication
- Instant Messaging
- VOIP
- Skype
- How communications help with education
- Online Forums
Customization[edit | edit source]
Entertainment[edit | edit source]
- Media Center
- Gaming
- Videogame Systems
- Video players
- Satellite Radio
- Manipulation of Digital Data
- Digital Video Quality
- Digital Cameras
- MP3 Players