User:Sshar229

The Computer Revolution: A Timeline page will soon be redirected here. This is much broader in scope.

History
The Mark 1 was the first computer in the United States

Internet

 * Crime
 * Security
 * Connecting
 * VoIP

Hardware

 * Microprocessor
 * Binary
 * Computer case
 * Memory
 * Cache
 * Binary
 * Ports
 * Expansion Cards
 * Storage
 * Smartcards
 * price
 * PDA's
 * TV
 * Sound cards
 * Computer Storage
 * Servers
 * Jump Drives
 * Refresh Rate vs. Sampling Rate
 * Power Supply
 * Hard Disks
 * Ram Chips
 * Video Cards
 * CRT Monitor
 * Virtual Memory

Computer Graphics

 * Corel Draw
 * PDF
 * PDF Plugins
 * Basics of Computer Design
 * Great Designs
 * Abstract Photoshop
 * Increasing Design Speed
 * Design Efficiency
 * Using Pictures
 * Soft Copy Proofs
 * Print Merge
 * 3D
 * CADD
 * Paint
 * Adobe Photoshop
 * Graphics Accelerator

Peripherals

 * Keyboards
 * Scanners
 * Printers
 * Pointers
 * Monitor
 * History of Printers
 * Types of Scanners
 * Speakers
 * Web Cameras
 * 3D Scanners

Software

 * OS
 * Other system software
 * User interface strategies
 * Word processing
 * Spreadsheet
 * Database
 * Presentation
 * Graphics
 * Types of Software & Operating Systems
 * The computer Revolution/Software/System Development
 * Windows Vista
 * Application Software
 * Personal Information Managers
 * Pirates vs. Abandoned

Networks

 * Types of Networks
 * Intranet
 * Components of a Network
 * Four Types of Wireless Communications
 * Ways to Minimize Virus Attacks
 * LAN
 * Network Topologies
 * WAN
 * Wired Communications Media
 * Internet
 * Short Range Wireless for Personal Area Networks
 * Short Range Wireless for Automation Networks
 * Digital and Analog Cell Phones
 * Wi-Fi
 * Token Rings

Security

 * Firewall
 * Malware
 * attacks
 * defence
 * Cyber Villains
 * Passwords
 * Antivirus Software - what is it, types of
 * Biometrics
 * Computer Crime
 * Encryption
 * Firewall
 * The Computer Revolution/Security/Prevent Identity Theft
 * Dirty Data
 * Cyber Threats
 * The Evil Twin Attack
 * Malware
 * Spyware
 * Technology Misuse

Artificial Intelligence

 * Expert Systems
 * Neural Networks
 * Genetic Algorithms
 * ASIMO
 * Turing Test
 * Branches of & Applying AI
 * AI use in business
 * Diagnosis
 * Weak VS Strong AI
 * Translators
 * Education
 * I dog
 * Around The Home

Databases

 * Basic Structure
 * Data mining
 * Database Models
 * DBMS
 * Indexing
 * Criminal Databases
 * Management Information system
 * Limitations
 * Types of Files
 * Data Warehouses

Programming

 * 1st generation
 * 2nd generation
 * Programming_Languages_Used_Today
 * Designing the Program
 * Five Steps of Programming
 * Object Oriented Programming
 * Object Oriented vs. Structured programming
 * The Six Phases of System Analysis and Design
 * Conducting the Preliminary Investigation in system analysis and design

E commerce

 * Benefits
 * E-bay
 * Online Banking
 * Advertising
 * B2B
 * Online Shopping
 * Paypal
 * Online Job Hunting

Communication

 * online
 * satellites
 * information age
 * Telecommunication
 * Instant Messaging
 * VOIP
 * Email
 * Skype
 * How communications help with education
 * Online Forums

Customization

 * Upgrades


 * Exterior


 * Windows desktop customization
 * OOP

Entertainment

 * Media Center
 * Gaming
 * Videogame Systems
 * Video players
 * Satellite Radio
 * Manipulation of Digital Data
 * Digital Video Quality
 * Digital Cameras


 * MP3 Players

Computers and Health

 * Computers and Health

Computer Scientist

 * Grace Murray Hopper

Business Information Systems

 * OIS
 * TPS
 * MIS
 * DSS
 * ESS