Welcome to
description
Transcript of Welcome to
Welcome to Welcome to
IT ApplicationsIT Applications
& &
Software DevelopmentSoftware Development
20082008
Sunbury Downs College
1937 war is feared.
The rush is on to develop an electric computer to calculate flight trajectories for gun shells and bombs.
1937 war is feared.
The rush is on to develop an electric computer to calculate flight trajectories for gun shells and bombs.
1937 war is feared.
The rush is on to develop an electric computer to calculate flight trajectories for gun shells and bombs.
1937 war is feared.
The rush is on to develop an electric computer to calculate flight trajectories for gun shells and bombs.
1937 war is feared.
The rush is on to develop an electric computer to calculate flight trajectories for gun shells and bombs.
1937 war is feared.
The rush is on to develop an electric computer to calculate flight trajectories for gun shells and bombs.
1937 war is feared.
The rush is on to develop an electric computer to calculate flight trajectories for gun shells and bombs.
1937 war is feared.
The rush is on to develop an electric computer to calculate flight trajectories for gun shells and bombs.
1937 war is feared.
The rush is on to develop an electric computer to calculate flight trajectories for gun shells and bombs.
1937 war is feared.
The rush is on to develop an electric computer to calculate flight trajectories for gun shells and bombs.
1937 war is feared.
The rush is on to develop an electric computer to calculate flight trajectories for gun shells and bombs.
Why? It took the computers (female workers) three days to compute the trajectory of a shell that took 30 seconds to get to its target.
1944-1945 1944-1945
The first computers are workingThe first computers are working ENIAC in the USA (Eckert & Mauchly)ENIAC in the USA (Eckert & Mauchly) Colossus in England (Alan Turing)Colossus in England (Alan Turing)
CSIRAC in Australia (CSIRO)CSIRAC in Australia (CSIRO)
ENIAC did the trajectory calculation in 5 seconds
See it at Scienceworks!
ENIAC
Hardware
People
Software –
program
Ergonomic
workstation?Healthy, safe
work environment?
Computers are simpleComputers are simple
Based on switches that control the flow of electricity Based on switches that control the flow of electricity – electrons to be precise.– electrons to be precise.
Switch on – electricity flowsSwitch on – electricity flows Switch off – no electricity flowSwitch off – no electricity flow
On/off, yes/no, true/false, 1/0On/off, yes/no, true/false, 1/0binary number system used binary number system used
off,on,on,off,off off,on,on,off,off 6 = 001106 = 00110on,on,off,on,onon,on,off,on,on 27 = 11011 27 = 11011This is machine code- what the computer This is machine code- what the computer
understandsunderstands
switches
Assembly language
-Some words eg ADD, SUB, MUL, DVD
Assembler converts to machine code
High level Programming languagesFORTRAN –scientificequationsCOBOL – businesswordsBASIC – general purpose
Easier to write instructions. Compiled (translated) into machine language
First DEO
Data entry operator
19521952
““There may be a world market for five There may be a world market for five computers”computers”
CEO of IBMCEO of IBM
The transistor arrives!The transistor arrives!
1947 – production late 50s
Brattain, Bardeen, Shockley
transistor
switch
bus
An I.C. Chips!
The prediction was wrong or was it fair dinkum?
Joke Joyce!Joke Joyce!
Shows how easily you can fool Shows how easily you can fool peoplepeople
Another example,Another example,
Computer ethicsComputer ethics
use a computer to harm othersuse a computer to harm others interfere with other people’s interfere with other people’s
computer workcomputer work snoop around in other people’s filessnoop around in other people’s files use a computer to stealuse a computer to steal
Don’t
Computer ethicsComputer ethics
use a computer to bear false witness use a computer to bear false witness copy or use proprietary software you copy or use proprietary software you
haven’t paid for haven’t paid for use other people’s computer use other people’s computer
resources without authorisationresources without authorisation take others’ intellectual outputtake others’ intellectual output
Don’t
Computer ethicsComputer ethics
think about the social consequences think about the social consequences of the program you are writing or the of the program you are writing or the system you are designingsystem you are designing
Always ensure consideration and Always ensure consideration and respect for your fellow humansrespect for your fellow humans
Do
And re AI and robotsAnd re AI and robotsAsimov’s lawsAsimov’s laws A robot may not injure a human or, through A robot may not injure a human or, through
inaction, allow a human to be harmedinaction, allow a human to be harmed
A robot must obey the orders of humans A robot must obey the orders of humans except where they conflict with 1except where they conflict with 1stst law law
A robot must protect its own existence so A robot must protect its own existence so long as this doesn’t conflict with 1long as this doesn’t conflict with 1stst and 2 and 2ndnd lawslaws
VCE ITVCE IT
Robots, AI, big computers, desktops, laptops, Robots, AI, big computers, desktops, laptops, palmtops, mobile phones are all parts of palmtops, mobile phones are all parts of information systemsinformation systems
All require programs & applications to make them All require programs & applications to make them usefuluseful
These studies are about IS, applications and These studies are about IS, applications and programming.programming.
They’re challenging and great fun!They’re challenging and great fun!
to the futureto the futuresmart mobile phones computers in a pocket
wearable computers
PDAs, phones, cameras in one package
smart clothes – wearing computers
interplanetary interplanetary communications?communications?
Lots of IT problems to solve on Lots of IT problems to solve on EarthEarth