Photobucket

Isnin, 28 Februari 2011

current-and-future-development

1.4.1 Impact of ICT on Society

1.4.1.1 Locate information from various sources

Informations or study materials are available offline and online. We can search for the information that we want in books, journals, articles or other resource materials found in the library and the Internet. A list of all the books, journals and electronic materials are available from the library. We can use the online databases to find the most useful materials for our study.

1.4.1.2 Describe the impact of ICT on society

The computer has change the society today as much as industrial revolution changed society in 18th and 19th century. People interacts directly with computer in education, finance, government, health care, science, publishing, tourism, and industry.

Computers help them to do their work faster and more efficient by using the software application that consist of special program for specific task.

Education

Today, computers are used in schools, colleges and universities to promote better education. Students use software packages to complete their assignments. Educators use the computer-based training and web-based training as replacements for lecture presentation.

Computers for Higher Education

Open Distance Learning (ODL) or online learning can be implemented as computers are the main medium in delivering the knowledge from one location to the other locations. This type of learning consists of online forum, discussion, quizzes, test questions and many more. The example of the Open Distance Learning institution is the Open University of Malaysia.

Business

People use finance or accounting software to balance check books, pay bills, track personal income and expenses, manage investments and evaluate their financial plans. Accounting software helps companies to record and report their financial transactions.

Computers in Banking

In the banking sector, many financial institutions offer online banking. People can access their financial records from anywhere in the world. One example of online banking is Maybank2u. Most of the packages on banking offer a variety of online services which requires access to the web. For example we can track our investment online, compare insurance rates and do online banking.

Industry

By using the CAM system, computers record actual labour, material, machine and computer time used to manufacture a particular product. Computers process this data and automatically update inventory, production, payroll and accounting records on the company’s network.

Examples of companies using this system are Proton and Perodua.

Graphics and Multimedia

Computers are crucial in publishing especially in the process of making works available to the public. These works include magazines, books, newspapers, music and film production. Special software applications are used to assist graphic designers to develop graphics, texts, photographs and composing songs.

Communication

A government provides society with direction by making and administering policies. Most government offices or agencies have websites in order to provide citizens with up-to-date or latest information. Examples of software applications used for communication include e-mail, web browsers, newsgroups, instant messaging and video conferencing. We can access government websites to:

  • check information on taxes (www.hasil.org.my)
  • pay parking tickets and check summons (www.jpj.gov.my)
  • register online for IPTA/IPTS application (www.moe.gov.my)
  • Computers in Tourism
Today, people will go online to get all related information about traveling. They can visit websites to get information on destinations, prices, hotels, flights and car rentals. They can also purchase ticket online, all payments can be made by using credit card.

Computers in the Healthcare

In the medical field, computers are very important in running the operations. Medical staffs use computers for various purposes, namely: • maintaining patient records monitoring patients’ vital sign assisting doctors, nurses and technicians with medical tests by using computer and computerised devices .

• using medical software to help with researching and diagnosing health conditions.

Furthermore, computers and the internet are important sources for people to get all information on medical, nutrition, fitness and other tips from several available websites. The latest development in the medical field is telemedicine which help professional to conduct live conference in separate locations around the globe.

Science

In the scientific world, computers are used in all fields of science from biology to astronomy to meteorology and others. These are things that can be done by computers, namely:
  • collecting, analyzing and modelling data
  • serving as medium of communication with colleagues around the world
  • contributing to new inventions or breakthrough in surgery, medicine and treatment
  • imitating functions of the central nervous system, retina of the eye and others by tiny computers
  • allowing a deaf person to listen through cochlear implant
1.4.1.3 Present results in a clear, concise manner.

A good presentation should contain three well-defined sections, they are:

1. Introduction
  • is at the beginning of the research
  • includes the objectives of the research
  • provides a clear statement on why the study was undertaken
  • includes the limitations/assumptions and analytical techniques

2. Content
  • consists of facts or arguments related to subject matter
  • can be presented in an argument format or just as an overview

3. Conclusion

  • is a review of content (not repetition of content)
  • relates to the statement of objectives in the introduction
  • should not introduce new issues
  • should contain judgment or decision that has been reached

1.4.1.4 Display cooperation in conducting study.

Cooperation in conducting study can be display through delegation of works among team members. Delegation is the ability to assign tasks to others with the authority, responsibility and accountability to finish the tasks. This means it is not enough to just give out orders to people but as a team leader you also need to give specific instructions on what to do. Tell your team members that they are responsible for the task given to them and explain to them what would happen to the project if they failed to finish the task.

Ahad, 27 Februari 2011

Qasidah Istighfar Lirik // Qasidah Istighfar Lyrics

Bahasa Arab Rumi // Arabic in Western writing


Astaghfirullah robbal baroya
Astaghfirullah minal khotoya (2x)

Robbi zidni i`lman nafia`
Wawafiqni a`malan maqbula
Wahabli rizqon wasia`
Watub a`laina taubatan nasukha (2x)

Astaghfirullah robbal baroya
Astaghfirullah minal khotoya

Walihaza sirri adu` fi yasari wa a`sari
Ana a`bdun soro faqri inna faqri waddhirori
Inna faqri waddhirori

Astaghfirullah robbal baroya
Astaghfirullah minal khotoya

Walkafani i`lmu robbi
Bil suali wakhtiyari
Ya Ilahi wa maliki
Anta ta`lam kaifa khali (2x)

Astaghfirullah robbal baraya
Astaghfirullah minal khotoya

computer security

1.3.1 Definition
 
1.3.1.1 Define computer security.
Computer security means protecting our computer systems and the information they contain against unwanted access, damage, destruction or modification. Three types of computer security are: hardware security software security/data security network security

We need to protect our computer from any intruders such as hackers, crackers and script kiddie.


1.3.2 Security Threats

1.3.2.1 Explain briefly the different threats to computer security:

Malicious code

Malicious code is also known as a rogue program. It will cause undesired effects in the programmer’s part. The effect is caused by an agent, with the intention to cause damage. The agent for malicious code is the writer of the code who causes its distribution. There are various kinds of malicious code. They include virus, Trojan horse, logic door, trapdoor and backdoor, worm and many others.

Hacking

Hacking is defined as unauthorised access to the computer system by a hacker. Hackers are persons who learn about the computer system in detail. They write program referred to as hacks. Hackers may use a modem or cable to hack the targeted computers.

Natural disaster

Computers are also threatened by natural or environmental disaster. Examples of natural and environmental disasters:
  • Flood
  • Fire
  • Earthquakes, storms and tornados
  • Excessive Heat
  • Inadequate Power Supply
  • Theft
Two types of computer theft:

1) Computer is used to steal money, goods, information and resources.

2) Stealing of computer, especially notebook and PDAs.

1.3.3.2

Apply the correct security procedures.

Data Protection

We need to protect the data in the computer as it may somehow get lost or corrupted due to some viruses or mishap like fire, flood, lightning, machine failures and even human errors. There are a few ways to protect the information namely:

• make backup files

• detect the virus and clean the computer

• warn others on virus attacks

Detecting Illegal Access To Systems

The computer system is able to detect any illegal access to the system by a user who does not have any authorisation. Tcpwrappers and tripwire are often used to detect any illegal access (unauthorize) to the system. User's access will be reviewed periodically by computer operations. On going internal audits will be made to ensure detection of violations of security and unauthorised modifications to software and data .

Tcpwrappers will control access at the application level, rather than at the socket level like iptables and ipchains. The system will run tcpwrappers to log access to ftp, tftp, rch, rlogin, rexec and telnet.

Tripwire will detect and report on any changes in the thousands of strategic system files. The system will run tripwire to determine if system files have changed.

Preventing Illegal Access To Systems

Computer systems would not allow any unauthorised users to simply access the system. Ways to prevent illegal access to systems: • Run anlpassword to make password cracking difficult. Run tcpwrappers to check if the name for an ip address can be provided by DNC Use a callback system to prevent unauthorised use of stolen passwords.

Preventing Illegal Root Access

To prevent any illegal root access, we should have Sudo (stands for Superuser do) so that people can perform on some machine without getting access to the entire root if that is not required. In addition, with Sudo we did not have to give out the root password.

Sudo is a program in Unix, Linux and similar operating systems such as Mac OS X that allows users to run programs in the form of another user (normally in the form of the system's superuser). Sudo allows a permitted user to execute a command as the superuser or another user, as specified in the sudoers file.

Patch

Patch supplies small updates to software, provided that the source code is available. Patch is a name of an UNIX utility. It applies a script generated by the different program to a set of files that allows changes from one file to be directly applied to another file. Resources are not enough to patch all security holes that we hear about through the bugtraq list.

computer crimes

1.2.4.1 Explain the need for Cyber Law.

  Cyber Law is needed as in the recent years, many concerns and issues were raised on the integrity and security of information, legal status of online transactions, privacy and confidentiality of information, intellectual property rights and security of government data placed on the Internet.


Cyber Law is needed as in the recent years, many concerns and issues were raised on the integrity and security of information, legal status of online transactions, privacy and confidentiality of information, intellectual property rights and security of government data placed on the Internet.


1.2.4.2 Explain briefly the computer crimes below:

Fraud:

Computer fraud is defined as having an intention to take advantage over or causing loss to other people, mainly on monetary basis through the use of computers. Computer fraud includes e-mail hoaxes, programme fraud, investment schemes, sales promotions and claims of expertise on certain fields.


Students need to be aware of other computer frauds such as health frauds, scams and hacking. Students will also most likely get false information while researching information on the Internet.

Copyright Infringement:

Copyright infringement is defined as a violation of the rights secured by a copyright. It involves illegal copy or reproduction of copyrights material by the black market group. The open commercial sale of pirated item is also illegal. With the current technology, the most perfect copy of the original copy can be downloaded from the internet.

Theft:

Computer theft is defined as the unauthorised use of another person’s property with the intention to deny the owner the rightful possession of that property or its use. Examples of computer theft include: • transfer of payments to the wrong accounts tap into data transmission lines on database at no cost divert goods to the wrong destination

Attacks:

Computer attack may be defined as any activities taken to disrupt the equipment of computer systems, change processing control or corrupt stored data.

Computer attack can be in the forms of: physical attack that disrupt the computer facility or its transmission lines. an electronic attack that uses the power of electromagnetic energy to overload computer circuitry. a computer network attack that uses a malicious code to exploit a weakness in software, or in the computer security practices of a computer user.

Sabtu, 19 Februari 2011

CONTROVERSIAL CONTENTS AND CONTROL

1.2.3.1 List effects of controversial contents on society
Pornography
Pornography: can lead to criminal acts such as exploitation of women and children can lead to sexual addiction or perversion can develop low moral value towards other men, women or children can erode good religious, cultural and social beliefs and behaviour 
Slander: can develop into a society that disregards honesty and truth can develop bad habit of spreading untruths and rumours can lead to unnecessary argument can cause people to have negative attitudes towards another person
1.2.3.2 Describe the process of filtering to control access to controversial contents.
Internet filtering is a process that prevents or blocks access to certain materials on the Internet. 
It is a process of controlling the access to the internet by means of filtering software. It is used to prevent children from accessing inappropriate material and to keep employees productive on the Internet.
The current preferred method of choice to limit access on the Internet is to filter content either by: keyword blocking site blocking web rating systems
These methods require software to be installed at a client of server level.

PRIVACY

1.2.2.1 List ways to protect privacy.

Privacy can be protected by privacy law and utilities software:

(a) Privacy law

The privacy laws in Malaysia emphasises on the following: • Security Services to review the security policy Security Management to protect the resources Security Mechanism to implement the required security services Security Objects, the important entities within the system environment

(b) Utilities software

Example: anti-spam program, firewall, anti-spyware and antivirus.

1.2.2.2 State authentication & verification methods/ technologies.


Methods of Authentication

There are two commonly used authentication methods, which are biometric device and callback system. Biometric device is a device that translates personal characteristics into a digital code that is compared with a digital code stored in the database. Biometric devices include Fingerprint Recognition, Facial Recognition, Hand Geogmetry, Iris Scanning, Retinal Scanning, Voice Recognition and Signature Verification. Callback system refers to the checking system that authenticates the user.

Methods of Verification

There are two methods used in verification, which are user identification and processed object. User identification refers to the process of validating the user. Processed object refers to something the user has such as identification card, security token and cell phone.
 

COMPUTER ETHICS AND LEGAL ISSUES

1.2.1.1 Define Computer Ethics, Code of Ethics, Intellectual Property, Privacy, Computer Crime and Cyber Law.

1. COMPUTER ETHICS




Computer ethics is a system of moral standards or values used as a guideline for computer users. It is needed to stop the current technology products from being exploited.

Ethics is a moral philosophy where a person makes a specific moral choice and sticks to it. Code of ethics in computing means moral guidelines to refer to when using the computer and the Internet.

2. INTELLECTUAL PROPERTY




Intellectual property refers to any product of human intellect that is unique and has value in the market place. This covers ideas, inventions, unique name, computer program codes and many more.

3. PRIVACY




Privacy in IT refers to data and information privacy. In general, data include texts, numbers, sounds, images and video. Information privacy is described as the rights of individuals and companies to deny or restrict the collection and use of information about them.

4. COMPUTER CRIMES



Computer crimes is defined as any criminal activities that are related to the use of computers. These activities include computer fraud, copyright infringement, computer theft and computer attack.

5. CYBER LAW

Cyber law refers to any laws relating to protecting the Internet and other online communication technologies.


1.2.1.2 Differentiate between ethics and law.

ETHICS
  • Guideline: As a guideline to computer users.
  • Moral Standards: Ethical behaviour is judged by moral standards.
  • No Punishments: No punishment for anyone who violates ethics.
  • Free To Follow: Computer users are free to follow or ignore the code of ethics.
  • Immoral: Not honouring computer ethics means ignoring the moral elements (immoral).
  • Universals: Universal, can be applied anywhere, all over the world
  • Produce Ethical Computer Users: To produce ethical computer users

LAW

  • Control: As a rule to control computer users.
  • Judicial Standards: Law is judged by judicial standards.
  • Must Follow: Computer users must follow the regulations and law.
  • Punishments: Penalties, imprisonments and other punishments for those who break the law.
  • Depends On Country: Depends on country and state where the crime is committed.
  • Prevent Misusing Of Computers: To prevent misuse of computers.
  • Crime: Not honouring the law means committing a crime.
1.2.1.3 State the need for intellectual property laws.

Intellectual property laws are needed to establish and safeguard the intellectual property which refers to works created by inventors, authors and artists. It is also needed as businesses today continue to expand globally. There are four types of Intellectual Property protection. They are patents for invention, trademarks for brand identity, designs for product appearance and copyright for material.





Isnin, 14 Februari 2011

State of IMPACT OF ICT ON SOCIETY

Positive Impact

1.Faster communication speed.With the internet,news or messages
   are sent via e-mail to anyone efficiently,with the capability of   
   broadband and speed of connection on the internet,any
   information can be travel faster.
2.Lower communication cost.with the internet,we do not have to 
   pay any basic services provided by in the internet.Furthermore,the 
   cost of the connection to the internet is relatively cheap.
3.People can share opinions and information  through discussion
   group and forums through internet.
4.Information can be stored and retrieved through the digital medium
   instead of paper(paperless environment).
5.Information and communication can be borderless through internet.  
   By using internet,people all around the world can be connected
   through each other.


Negative Impact


6.Borderless information at time can be negative because it courage
   people to access pornography and violence web sites.It can cost
   cause low moral values.It also can created problems such as
   gambling,information theft and fraud.
7.Computers can harm users if they use for long hours frequently.

Form4:1.1.2.2 State the differences between computerized and non- computerized systems LESSON 4 COMPUTERISED AND NON-COMPUTERISED SYSTEMS



COMPUTER SYSTEM


A system is an arrangement of elements that when it is put together it becomes an organised and established procedure. A system typically consists of components connected together in order to facilitate the flow of information, matter or energy.


A computer system consists of a set of hardware and software which processes data in a meaningful way.


EDUCATION
• education is the science of teaching and learning of specific skills
• it also imparts knowledge, good judgement and wisdom


BANKING SYSTEM


BANKING BEFORE ICT
• banking was done manually by taking deposits directly
• transactions can only be made during working hours
• takes time to approve any loan applications


BANKING WITH ICT
• all transactions are done by computers
• transaction can be done at anytime and place
• online services, phone banking system, credit cards are available


INDUSTRY


INDUSTRY BEFORE ICT
Production was slow because everything was done manually and totally depended on human labour.


INDUSTRY WITH ICT
Computers and telecommunications industry became very opular and profitable since production can be increased through an all day operation.


COMMERCE


Commerce is an activity of exchanging, buying and selling of commodities on a large scale involving transportation from place to place.


COMMERCE BEFORE ICT
• Trading was made using the barter system and it was then later developed
into currency.
• Advertisement was in the form of word of mouth, billboards and printed
flyers.
• Trading globally was extremely slow, late and expensive. Traders had to find
ways to market local products in the global market.


COMMERCE WITH ICT
E-commerce plays an important role in the economic scene. It includes distribution, buying, selling and servicing products that are done electronically.

Jumaat, 11 Februari 2011

Usage Of ICT In Everyday Life


EDUCATION
Today, most schools and higher educational institutions have computers in the classroom for teacher and students. In education, teachers, students, researchers and school administrators benefits from the usage of ICT.
1. Teachers use computers to research for teaching materials, participate in online forums and online conferences as well as to aid their teaching.
2. Students use the computers as a reference tool. They use computers to browse the Internet to look for information.
3. School administrators use computers for administrative purposes to make sure that the entire operation runs smoothly.

BANKING
The computer is the nerve centre of the banking system around the world. It functions to control the entire banking system that also includes 'Electronic Banking Services'. Electronic banking provides 24 hour services. The services include :
• Automated Teller Machine (ATM)
• Cheque Deposit
• Electronic Fund Tranfer
• Direct Deposit
• Pay by phone system
• Personal computer banking/ internet banking
In the banking sector, customers, businessman and bank administrator benefits from the usage of ICT.
1. Customers can make any transactions at the 24 hour service centres or via online.These services allow them to do transaction at anytime they want.
2. Businessmen can save their time by using the online services offered by banks. They can access company accounts for loan applications, business transactions and update on their cash flow at any time.
3. Bank administrators can oversee the entire banking activities such as reconciliations, inter-branch transactions (IBT), telegraphic
transfer and others by referring to the banking system.

INDUSTRY
Computers are used to facilitate production planning and control systems, to support chain management and to help in product design in the industrial sector In the industrial sector ,workers, researchers and administrator benefits from the usage of ICT.
1. Workers use machines that are connected to computers to operate. In some productions, robots are used to take over jobs that are dangerous to the workers.
2. Researchers use computers to analyze and collect research data for future reference.
3. Administrators use computers to oversee the entire operations in the plant or factory to detect specific errors or defects that occurred in the process.

E-COMMERCE
E-commerce helps in boosting the economy. It makes buying and selling activities easier, more efficient and faster. For this application, computers, Internet and shared software are needed.
In the e-commerce sector ,customers r, suppliers and employees benefits from the usage of ICT.
1. Customers use computers to be connected online with suppliers to purchase products. This method can save time and cost as they do not have to go to any outlets.
2. Suppliers use computers to keep track of their transactions. All products are bar coded and can be read by the computer scanner to help in determining prices and managing inventory.
4. Employees use computers and telephones to communicate with their customers for any enquiries. The system helps employees to get the latest updates on inventory to be informed to the customers.
OTHER SECTOR
  1. Architectute
  2. Arts
  3. Career
  4. Healthcare
  5. Home

HARAM MENYAMBUT HARI KEKASIH

Beberapa perkara penting sebagai rumusan dan peringatan bagi kita semua, 
antaranya:
Pertama : Hari kekasih adalah sambutan penganut Kristian yang
mengenang hari kematian seorang paderi mereka. Tiada
sambutan ini dalam ajaran Islam.
Kedua : Umat Islam adalah dilarang sama sekali menyambut Hari
Kekasih ini, termasuklah memberi sokongan, mempromosikan,
mengajarkan dan menyebarkan apa-apa sambut

Ketiga : Umat Islam digalakkan berkasih sayang sesama manusia
sepanjang masa tanpa membataskannya pada hari-hari
tertentu sahaja.
Keempat : Pihak Media dan pengamal Laman Sosial adalah diminta untuk
tidak mempromosikan Sambutan Hari Kekasih ini walau dalam
apa bentuk sekalipun.

Evolution Of Computer

The history of computer development is often referred to in reference to the different generation of computer is characterized by a major technological development that fundamentally changed the way computer operate,resulting in increasing smaller. cheaper, more powerful and more efficient and reliable device.

Khamis, 10 Februari 2011

Gambar komputer dahulu & sekarang

Komputer Sekarang




Komputer Dahulu





HAYATILAH KISAH MAULIDURRASUL

Kelebihan Nabi Muhammad.

Dari Jabir katanya : Berkata Rasulullah yang ertinya :

Aku telah diberikan 5 perkara yang tidak seorag pun daripada para nabi sebelum ku diberikan :

1. Aku ditolong dengan daya menakutkan musuh sejauh perjalanan sebulan.
2. Diuntukkan bagiku bumi ini ,dimana-mana sahaja boleh dijadikan tempat bersujud dan keadaannya suci .Maka sebarang umatku yang telah dating kepadanya waktu sembahyang,hendaklah tampil sembahyang.
3. Dihalalkan harta rampasan perang bagiku dan tidak halal bagi seorang pun sebelum ku.
4. Aku diberi kuasa untuk beri syafaat.
5. Setiap nabi dibangkitkan untuk menyeru kaumnya sahaja,tapi aku dibangkitkan untuk menyeru seluruh manusia.

RASUL-RASUL PENJAGA LANGIT

Lapisan 1 : Nabi Adam
Lapisan 2 : Nabi Isa dan Yahya
Lapisan 3 : Nabi Yusuf
Lapisan 4 : Nabi Idris
Lapisan 5 : Nabi Harun
Lapisan 6 : Nabi Musa
Lapisan 7 : Nabi Ibrahim.


WASIAT NABI MUHAMMAD SAW kepada SAYIDINA ALI RA

Wahai Ali, bagi orang MUKMIN ada 3 tanda-tandanya:
>1) Tidak terpaut hatinya pada harta benda dunia.
>2) Tidak terpesona dengan pujuk rayu.
>3) Benci terhadap perbualan dan perkataan sia-sia..

Wahai Ali, bagi orang 'ALIM itu ada 3 tanda2nya:
>1) Jujur dalam berkata-kata.
>2) Menjauhi segala yg haram.
>3) Merendahkan diri.
Wahai Ali, bagi orang yg JUJUR itu ada 3 tanda2nya:
>1) Merahsiakan ibadahnya.
>2) Merahsiakan sedekahnya.
>3) Merahsiakan ujian yg menimpanya.

>Wahai Ali, bagi org yg TAKWA itu ada 3 tanda2nya:
>1) Takut berlaku dusta dan keji.
>2) Menjauhi kejahatan.
>3) Memohon yang halal kerana takut jatuh dalam keharaman.
>
>Wahai Ali, bagi 

itu ada 3 tanda2 AHLI IBADAH itu ada 3 tandanya:
>1) Mengawasi dirinya.
>2) Menghisab dirinya.
>3) Memperbanyakkan ibadah kepada Allah s.w.t.

Generasi Komputer


The First Generation Computers(1940-1956)                                                                      

During the first generation,computers were with vacuum tubes. vacuum tube is an electronic tube is made of glass used as computer components to store and process data. The problems of vacuum tube are generates lots of heat that can damage computer and tubes can burnt out frequently. ENIAC is the first generation computer that contains weights of 30 tons,18000 vacuum tubes,30-50 foot space and 16000 watts of powder. Advantages of computers in this era: The using of vacuum tubes that can store and process data.

The Second Generation Computers (1956-1963)


The invention of Transistors marked the start of the second generation. These transistors took place of the vacuum tubes used in the first generation computers. First large scale machines were made using these technologies to meet the requirements of atomic energy laboratories. One of the other benefits to the programming group was that the second generation replaced Machine language with the assembly language. Even though complex in itself Assemly language was much easier than the binary code.
Second generation computers also started showing the characteristics of modern day computers with utilities such as printers, disk storage and operating systems. Many financial information was processed using these computers.
In Second Generation computers, the instructions(program) could be stored inside the computer's memory. High-level languages such as COBOL (Common Business-Oriented Language) and FORTRAN (Formula Translator) were used, and they are still used for some applications nowdays.

The Third Generation Computers (1964-1971)
 

Although transistors were great deal of improvement over the vacuum tubes, they generated heat and damaged the sensitive areas of the computer. The Intergreated Circuit(IC) was invented in 1958 by Jack Kilby. It combined electronic components onto a small silicon disc, made from quartz. More advancement made possible the fitings of even more components on a small chip or a semi conductor. Also in third generation computers, the operating systems allowed the machines to run many different applications. These applications were monitored and coordinated by the computer's memory.

The Fourth Generation (1971-Present)

 

The microprocessor brought the fourth generation of computers, as thousands of integrated circuits were built onto a single silicon chip. What in the first generation filled an entire room could now fit in the palm of the hand. The Intel 4004 chip, developed in 1971, located all the components of the computer—from the central processing unit and memory to input/output controls—on a single chip.
In 1981 IBM introduced its first computer for the home user, and in 1984 Appleintroduced the Macintosh. Microprocessors also moved out of the realm of desktop computers and into many areas of life as more and more everyday products began to use microprocessors.
As these small computers became more powerful, they could be linked together to form networks, which eventually led to the development of the Internet. Fourth generation computers also saw the development of GUIs, the mouse andhandheld devices.

The Fifth Generation (Present and Beyond)
                            














Fifth generation computing devices, based on artificial intelligence, are still in development, though there are some applications, such as voice recognition, that are being used today. The use of parallel processing and superconductors is helping to make artificial intelligence a reality. Quantum computation and molecular and nanotechnology will radically change the face of computers in years to come. The goal of fifth-generation computing is to develop devices that respond to natural language input and are capable of learning and self-organization.