The Computer Revolution
llr.76
Hardware
edit- Binary
- Motherboard
- Microprocessor
- CPU
- Servers
- Price
- Computer case
- Power Supply
- Uninterruptible Power Supply
- Ports
- Expansion Cards
- Sound cards
- Video Cards
- Jump Drives
- PDAs
- The Morph Concept
- Hardware Protection
Memory
editPeripherals
edit- TV
- Monitors
- Refresh Rate vs. Sampling Rate
- Keyboards
- Scanners
- Printers
- Pointers
- Types of Scanners
- Readers
- Speakers
- Web Cameras
- 3D Scanners
- Pens/Styluses
- Graphic Tablets
- Midi
Media
edit- Software Licenses
- Copyright infringement
- Common Software Shortcuts
- Operating Systems
- Installed vs.Web-Based Software
- System Software
- Application Software
- Middleware
- Open Source Software
- Computer Monitoring Software
- Graphics Software
- CADD
- Paint
- Adobe Photoshop
- Word processing
- Note Taking Software
- Database
- Corel Draw
- Information Systems
Computer Graphics
edit- Graphics
- Increasing Design Speed
- Design Efficiency
- Using Pictures
- Soft Copy Proofs
- Print Merge
- 3D
- Graphics Accelerator
- Digital Manipulation
- Multimedia
Customization
editDatabases
edit- Basic Structure
- Data mining
- Database Models
- DBMS
- RDBMS-ORACLE DATABASES
- Indexing
- Criminal Databases
- Management Information system
- Transaction Processing System
- Limitations
- Types of Files
- Data Warehouses
- Opinion Polls
- Creating a Database
- Database Classifications
- Content Management Systems
- Entities and Entity Relationships
- Cloud Databases
Programming
edit- 1st generation
- 2nd generation
- OOP
- Programming_Languages_Used_Today
- Designing the Program
- Five Steps of Programming
- Object Oriented Programming
- Introduction to Python
- Object Oriented vs. Structured programming
- The Six Phases of System Analysis and Design
- Conducting the Preliminary Investigation in system analysis and design
- Aspect Oriented Programming
- JavaScript
- Web Authoring Software
- System Development
- Procedural Programming
- FORTRAN
- Application Lifecycle Management
Artificial Intelligence
editCommunication
edit- online
- satellites
- information age
- Telecommunication
- Instant Messaging
- VOIP
- Blogs
- How communications help with education
- PAN
- LAN
- WAN
- MAN
Networks
edit- Types of Networks
- Components
- Network Topologies
- Mesh
- Intranet
- Models
- Four Types of Wireless Communications
- Ways to Minimize Virus Attacks
- Wired Communications Media
- Short Range Wireless for Personal Area Networks
- Short Range Wireless for Automation Networks
- Digital and Analog Cell Phones
- Wi-Fi
- Wi-Fi VS WiMAX
- Bluetooth
- VPN
- Global Positioning System (GPS) Applications
- ZigBee
- Delivery Method
- Connecting Devices and Networks
Internet
edit- Internet
- Searching the Internet
- Protocols and Standards
- Connections
- Crime
- Security
- Communication
- Netmeetings
- Skype
- Online Forums
- Social Networks
- VoIP
- Languages
- Controlling bodies
- Dynamic
- Hackers
- Digital Certificate
- Flowchart
E commerce
edit- Attacks
- Defenses
- Cyber Villains
- Passwords
- Biometrics
- Computer Crime
- Encryption
- Firewall
- Prevent Identity Theft
- Dirty Data
- Cyber Threats
- Cyber Bullying
- The Evil Twin Attack
- Malware
- Technology Misuse
- Privacy Threatened
- The Fair and Accurate Credit Transactions Act
- Properly Dispose of Hardware Containing Data
- Surveillance Systems
- Employee Monitoring
- Digital Counterfeiting
- What Is Phishing
- Presence Technology
Computers and Health
editComputers and Environment
editBusiness
edit- Business
- Computer and Business Ethics
- Computer Crime in the Workplace
- Careers
- Outsourcing
- Intellectual Properties
Business Information Systems
editInfluential people
editIn this section of the book we will list and point some of the most influential people in the computer revolution. As consideration to keep this section out of disputes and avoid prematurely ego contest and promotions, all listed personalities should already be dead and the impact of their contributions on the field of computing must have outlasted their lifespan.