Free Essay

Selective History of the Computer

In:

Submitted By geraldbrown1313
Words 2389
Pages 10
From the Abacus to the PC: A Selective History of the Computer
Thousands of years ago, the abacus was invented; it was this seemingly simple device that aided a human with calculations, which would be used as the conceptual model to build the computer. Looking back, one of the earliest instances of computer technology in action was not found in a computer at all but in a loom. The Jacquard loom, patented in 1804, was programmed by punched cards to create patterns in woven cloth (Keats 72). Charles Babbage, the English mathematician and many others would eventually use punch cards to program the computers they developed. The computer has taken many forms through the ages, and it would not be until almost 100 years later that the first fully electronic computer, the Atanasoff Berry Computer (ABC), would be developed, ushering in the age of electronic computing.
The earliest computing device known, the abacus, a tool for counting and calculating, was invented thousands of years ago, and it consisted of beads on a frame whose numerical value was indicated by their position on the frame (Fernandes). In addition to being beads on a frame, an abacus was a stone or an area on the ground with grooves in which pebbles were placed and then manipulated for calculating. The abacus was in use centuries before the adoption of the written modern numeral system and is still widely used (“Abacus”). The abacus used the biquinary numbering system, a numbering system used in some early computers (Kent and Williams 51).
Joseph Marie Jacquard, a French weaver, patented a loom in 1804. The Jacquard loom’s contribution to computing is that it could be programmed by punched cards. The weaves produced by punched cards were easy to reproduce as the punched cards could be stored and reused (Keats 72). The use of punched cards was significant for computing because it introduced the concept of stored programs and programming. Like many developments in computing to come, the Jacquard loom was created to streamline a complex task. The Jacquard loom augmented the weaving process by drastically increasing the amount of weaving that could be completed in one day. Before the Jacquard loom was completed, six inches of weave took one week to complete. Afterwards, using the Jacquard loom, two feet of weave could be completed in one day (Keats 72). The Jacquard loom’s early introduction of the concept of programs and programming would go on to have an immeasurable impact on the computer industry.
Babbage, who is recognized as the father of computing for his work on the Analytical Engine, designed and built the first mechanical computers, the Difference Engine and the Analytical Engine ("Charles Babbage The Analytical Engine."). Babbage first conceived the idea of the Difference Engine as a way to eliminate human errors in the calculation and printing of tables. The Difference Engine spent eleven years in development before work was stopped; it was never completed because Babbage came up with the idea for the Analytical Engine before the Difference Engine was complete. After Babbage’s death, his plans for the Difference Engine would be used to build the first fully functional Difference Engine in 2002, proving that it would have worked had the original ever been completed (Swade). Babbage’s Difference Engine is a significant contribution to computing because of its scope, but more importantly, it would be the seed from which the Analytical Engine would grow.
Charles Babbage would borrow the idea of punch cards for use in his Analytical Engine. The Analytical Engine, like the Difference Engine, was never completed. Doron Swade, the curator of computing for the London Science Museum said of the Analytical Engine:
The logical structure of the Analytical Engine was essentially the same as that which has dominated computer design in the electronic era -- the separation of the memory (the 'Store') from the central processor (the 'Mill'), serial operation using a 'fetch-execute cycle,' and facilities for inputting and outputting data and instructions (Swade).
Babbage’s Analytical Engine was, as a result of its structure, a true predecessor of modern computers (Ifrah 191).
Herman Hollerith, a mining engineer and inventor, would use punch cards in his Tabulating Machine that was developed for the 1890 United States Census. The 1880 census took seven years to complete, and the Census Bureau was concerned that because of explosive population growth, the 1890 census count would not be complete before the 1900 census began (Campbell-Kelly and Aspray 15). Because of their concerns, the Census Bureau set up a competition to select an alternative to the laboriously slow process of using tally sheets, the process used in the 1880 census (Campbell-Kelly and Aspray 16). Hollerith’s Tabulating Machine handily won the competition and was selected for the 1890 census because it was ten times faster than the competitor’s entries. Using Hollerith’s Tabulating machine, the 1890 census was completed in two-and-a-half years as compared to the seven years it took to complete the 1880 census (Campbell-Kelly and Aspray 19). The use of Hollerith’s tabulating machine would be the early stages of data processing ("The Birth of Data Processing (Reason): American Treasures of the Library of Congress.").
Unaware of Babbage’s work, Konrad Zuse, a German engineer, built the Z1 in 1936. The significance of the Z1 is that it is the first binary-based programmable computer ("Forgotten Pioneer (20 Years of Hardware)."). The Z1 could add, subtract, multiply, and divide. Zuse built the Z1 to overcome the difficulties of complex calculations (Bellis, "Inventors of The Modern Computer - Konrad Zuse."). Though unreliable, the Z1 had a sound architectural design and it encouraged Zuse to build his other computers the Z2, Z3, and Z4 (Rojas 6).
The ABC developed by John Atanasoff a physics professor, and Clifford Berry a graduate student, was developed in 1942. Like Zuse’s Z1, the ABC is considered to be a world’s first, the world’s first digital electronic computer to be exact. The ABC was not programmable though, but it did have characteristics that would be found in later computers such as binary arithmetic and electronic switching elements (Campbell-Kelly and Aspray 74). Work on the ABC was never completed, and its only significance in computing is that it was the first digital electronic computer. It was not until patent disputes arguing which computer came first that the work on the ABC was re-discovered (Campbell-Kelly and Aspray 74). The ABC was the first computer to use vacuum tubes, technology that would go on to be used in many early computers for the next twenty years.
Unlike the ABC, the Harvard Mark 1 did not use vacuum tubes, but instead relied on switches and relays. The Harvard Mark 1, which was programmable by punched paper tape, was invented in 1944 by Howard Aiken a physicist and Grace Hopper a naval officer. The Mark 1 was used by the Navy for gunnery and ballistic calculations until 1959 (Bellis, "Howard Aiken and Grace Hopper - Inventors of the Mark I Computer."). The Mark 1 was painfully slow, but its distinguishing characteristic was that it was the first fully automatic computer to be completed (Campbell-Kelly and Aspray 63). The Mark 1 would be the last of the early computers to use both electrical and mechanical parts.
The Mark 1 was quickly surpassed by electronic computers such as the Electrical Numerical Integrator And Calculator (ENIAC). In 1946, the ENIAC was invented by John Eckert an electrical engineer, and John Mauchly a physicist. Commissioned by the Ballistics Research Laboratory (BRL) to calculate firing tables for the U.S. Army, the ENIAC was programmable by using toggle switches and patch cables (Ceruzzi 15). Significantly faster than the computers of its time the ENIAC ran at a clock speed of .1 MHz whereas today’s computers run at around 3.2 GHz ("History of New Media."). Considering the technological breakthrough the ENIAC represented for its time, ENIAC had only a 20% accuracy rate (Ifrah 221). Even though the ENIAC was 1000 times faster than its predecessors were, it was very slow by today’s standards.
The developers of the ENIAC, Eckert and Mauchly, also developed the Universal Automatic Computer (UNIVAC). Unlike its predecessors, the UNIVAC was designed as a multi-purpose computer and was sold to government entities and commercial corporations such as General Electric, beginning “the era of commercial sales of large-scale stored-program computers in the United States” (Ceruzzi 27). The first UNIVAC was sold to the U.S. Census Bureau in March of 1951. The UNIVAC had design features that would be found in computers to come such as alphanumeric and numeric processing, memory buffers, the use of extra bits for error checking, and magnetic tapes (Ceruzzi 29).
As the UNIVAC was the first commercial computer, the MITS Altair 8800 was the first commercially successful personal computer (“FAQ's - San Diego Computer Museum.”). Bill Gates and Paul Allen of Microsoft fame wrote a version of the BASIC programming language to work with the Altair (Johnson). The MITS Altair 8800 had no keyboard or monitor and was interfaced with by the use of switches and lights on the front. Though not particularly useful in the sense that today’s personal computers are useful, the combination of the MITS Altair and the Basic programming language was marketed to hobbyists and enjoyed immense popularity. Unlike its predecessors, the MITS Altair was not designed with a specific task in mind; it was up to the builder to determine the purpose of the machine and then work towards that goal.
The Apple II, a more consumer-oriented computer than the MITS Altair, was introduced on April 16, 1977 at the first West Coast Computer Faire and it quickly became popular. Because of its popularity the Apple II enjoyed a significant number of software packages released for its use. Visicalc, the first spreadsheet program, was one such package released for the Apple II and it likely aided Apple II sales. Interestingly enough a version of Microsoft Basic would be licensed for the Apple II computer (Ceruzzi 264). The Apple II differed from other personal computers because it came with color graphics, an audio cassette for storage and 4 k of memory (Wozniak). The significance of the Apple II was its eight expansion slots; before the Apple II was released, no other early computer had that kind of built-in expandability.
Like the Apple II, the IBM PC introduced in 1981 was immensely popular. Interest in the IBM PC increased rapidly soon after its release. Numerous peripherals and software packages were rapidly developed for the new computer making it a welcome addition to many households and businesses. The IBM PC came with the MS-DOS operating system installed. Microsoft was allowed by IBM to license MS-DOS to other computer manufacturers, a move that greatly benefitted Microsoft and would be would be the beginning that made Microsoft the largest software company in the world (Ceruzzi 270). Months after its release the IBM PC would be named Man of the Year by Time magazine. The IBM PC being named man of the year could be equated to not only recognition of the IBM PC, but also an acknowledgement of all computers past and present and their impact on society.
From the invention of the abacus until the present, computers have evolved. More can be done with computers now than ever before, and it can be done much faster than ever before. Were it not for innovation of early computer inventors, computers would not be developed to the point they are today. There will continue to be significant developments in computing as new uses for computers are discovered. Considering where computing started with the abacus and seeing the potential developments in computing today such as Artificial Intelligence, it will be exciting to see what the future of computing has in store. Works Cited
"Abacus." Californiamuseum.org. California Museum, Dec. 2010. Web. 4 Apr. 2011. .
Bellis, Mary. "Howard Aiken and Grace Hopper - Inventors of the Mark I Computer." Inventors. The New York Times, n.d. Web. 05 Apr. 2011. .
---. "Inventors of The Modern Computer - Konrad Zuse." Inventors. The New York Times, n.d. Web. 05 Apr. 2011. .
Bergin, Thomas J. 50 Years of Army Computing, from ENIAC to MSRC: a Record of a Symposium and Celebration, November 13 and 14, 1996, Aberdeen Proving Ground. Aberdeen, MD: U.S. Army Research Laboratory, 2000. Print. "The Birth of Data Processing (Reason): American Treasures of the Library of Congress." Library of Congress Home. The Library of Congress, 27 July 2010. Web. 13 Apr. 2011. .
Campbell-Kelly, Martin, and William Aspray. Computer: a History of the Information Machine. 2nd ed. Boulder, CO: Westview, 2004. Print.
Ceruzzi, Paul E. A History of Modern Computing. 2nd ed. London, England: MIT Press, 2003. Print.
"Charles Babbage The Analytical Engine." Thinkquest.org. Oracle ThinkQuest Education Foundation. Web. 12 Apr. 2011. .

"FAQ's - San Diego Computer Museum." San Diego Computer Museum. San Diego Computer Museum, 2006. Web. 06 Apr. 2011. .
Fernandes, Luis. "The Abacus: Introduction." Electrical and Computer Engineering Dept. Ryerson University. N.p., 27 Nov. 2003. Web. 04 Apr. 2011. .
"Forgotten Pioneer (20 Years of Hardware)." PC World 21.3 (2003): 91. Computer Database. Web. 7 Apr. 2011. . "History of New Media." History of New Media. Temple University. Web. 13 Apr. 2011. .
Ifrah, Georges. The Universal History of Computing: from the Abacus to the Quantum Computer. New York: John Wiley, 2001. Print.
Johnson, Herb. "MITS ALTAIR Computers, Docs, Resources." Http://www.retrotechnology.com. Herb Johnson, 6 Apr. 2010. Web. 06 Apr. 2011. .
Keats, Jonathon. "The Mechanical Loom." Scientific American Sept. 2009: 72. EBSCO. Web. 4 Apr. 2011.
Kent, Allen, and James G. Williams. Encyclopedia of Computer Science and Technology. Vol. 21. New York: M. Dekker, 1990. Print.
Rojas, Raul. "Konrad Zuse’s Legacy: The Architecture of the Z1 and Z3." IEEE Annals of the History of Computing 19.2 (1997): 5-16. THE CORE MEMORY: NCR Computers of the 20th Century. The Core Memory Project. Web. 5 Apr. 2011. .
Swade, Doron. "The Engines - The Babbage Engine." Computer History Museum. Computer History Museum, 2008. Web. 04 Apr. 2011. .
Wozniak, Stephen. "The Apple-II." Old Computers - Rare, Vintage, and Obsolete Computers. Oldcomputers.net, n.d. Web. 07 Apr. 2011. .

Similar Documents

Free Essay

George Boole Research Paper

...History is filled with extraordinary people. Usually, it is some type of contribution that they make towards society, positive or negative, that makes them memorable. Many times, it is within a specific field or practice that these people make their mark. In the case of George Boole, he is known best within the mathematics community for his success in defining logic by using algebra, or Boolean algebra as it is known today. Boole was born on November 2, 1815, in Lincoln, England, known predominantly as an industrial town. Gasser (2006) states “He was the first of four children born to John Boole, a cobbler, and Mart Ann Boole, nee Joyce, a lady’s maid” (p. 377-78). According to Britannica Online (2015), “He was given his first lessons in mathematics by his father, a tradesman, who also taught him to make optical instrument. Aside from his father’s help and a few years at local schools, however, Boole was self-taught in mathematics.” During the timeframe of Boole’s life, there were many political and social events that took place all around the world. Within England, Victoria took the throne in 1837 and would ultimately rule longer than any other British monarch. In 1838, slavery was abolished in the British empire. Additionally, in Ireland in 1845 the great potato famine began that lasted approximately four years killed about a million people, creating a large emigration to England and North America. In North America, in 1846 the Mexican-American War was fought, as well...

Words: 813 - Pages: 4

Premium Essay

Marketing Mix

...of this phrase or statement is that each are of the marketing mix such as the price is aimed at a particular target group or target market that which together means that each interdependent strategy is in place to meet the needs of the target groups the company has aimed to produce the product for consumers. * Consistent with the resources and capabilities of the organisation The statement “consistent with the resources and capabilities of the organisation” means to me that the interdependent strategies that have been put in place for each stage or segments of the marketing mix that each meet the needs of the target market are within the field that are relevant to the areas of the particular product for example if the product was a computer and another was a children’s tor the...

Words: 2460 - Pages: 10

Premium Essay

Marketing

...brands rather than walking from a vending machine to a convenience store several blocks away, so intensity of distribution is essential here.  However, for sewing machines, consumers will expect to travel at least to a department or discount store, and premium brands may have more credibility if they are carried only in full service specialty stores. Retailers involved in a more exclusive distribution arrangement are likely to be more “loyal”—i.e., they will tend to *  Recommend the product to the customer and thus sell large quantities; *  Carry larger inventories and selections; *  Provide more services Thus, for example, Compaq in its early history instituted a policy that all computers must be purchased through a dealer.  On the surface, Compaq passed up the opportunity to sell large numbers of computers directly to large firms without sharing the profits with dealers.  On the other hand, dealers were more likely to recommend Compaq since they knew that consumers would be buying these from dealers.  When customers came in asking for IBMs, the dealers were more likely to indicate that if they really wanted...

Words: 1347 - Pages: 6

Free Essay

3d Printing

...SCHOOL OF MANAGEMENT, MANIPAL IT SKILLS FOR MANAGERS REPORT ON 3D PRINTING Presented by: Group 6 (Section B): Gautham Shetty (141202095) Kruthika S.L. (141202096) Rikith Soans (141202097) Sughosh R. Iyengar (141202098) Brajesh Kumar Pandey (141202099) INDEX Content Page No. 1. Introduction 3 2. History 4 3. The Evolution of 3D Printing 5 4. How the 3D Printing Works 6 5. General Principles of 3D Printing 7 6. Methods & Techniques 8 Selective Laser Sintering 8 Stereolithography 9 Fused Deposition Modelling 10 Laminated Object Manufacturing 11 7. Applications 12 8. Industrial & Personal Printing 13 9. The Cost of 3D Printers 14 10. Future 15 11. Effects of 3D Printing 16 12. Challenges 17 13. Conclusion 18 14. References 19 INTRODUCTION 3D printing is one of the emerging trends in the IT sector which has gained importance. Now a days, in the 21st century we can see that IT sectors plays a major role in development of all sectors. It has become the integral part of our life. IT has acted as a change agent in the present day scenario which has and will keep on bringing big changes in everyday life and 3D printers are one among the changes brought down from the IT sector...

Words: 2824 - Pages: 12

Free Essay

Pentium Flaw

...Intel said its reasoning for not going public was that most people would never encounter any problems with the chip. Intel said that a spreadsheet user doing random calculations would only have a problem every 27,000 years, therefore they saw no reason to replace all of the defective chips. However if a user possessed a defective chip and could convince Intel that his or her calculations were particularly vulnerable to the flaw in the defective chip then Intel it would supply those people with a new chip. This attitude of 'father knows best' fostered by Intel created an uproar among users and owners of the defective chips. Six weeks after Mr. Nicely went public, IBM, a major purchaser of Pentium chips, stopped all shipments of computers containing the defective Pentium chips. Intel's stock dropped 5% following this bold move by IBM. IBM's main contention was that it puts its customers first, and Intel was failing to do this. Intel's handling of this defective chip situation gives rise to many questions. During the course of this paper I will address several of them. The first of which is how did a company with such a stellar reputation for consumer satisfaction fall into the trap that the customer does not know best? Secondly, what made this chip defect more of a public issue than other defective products manufactured and sold to the public in the past? Finally, how did Intel recover from such a mistake? How much did it cost them and what lessons can other companies...

Words: 1761 - Pages: 8

Free Essay

Miss

...Amelia Craigie amelia6579@gmail.com Working / Experience History • EB Games (3rd Nov 2013 – Current) I work as a casual retail assistant at Australia’s leading video game specialty store. • Capsule Computers (26th Aug 2013 – Current) I work as a writer and contributor at Capsule Computers, which is a global independent media company which delivers video game, anime, entertainment and pop culture news. • Café Isar (Dec 2012 – June 2013) I worked part time at a small café under the Toby’s Estate franchise as a waitress and barista. • Hero Sushi (Nov 2011-Feb 2012) Hero Sushi is a large well-known chain of Japanese restaurants. I worked casual shifts as a waitress. • Still Water (Jun 2008-Mar 2009) I worked as a part-time retail assistant at Still Water, which was retail group specialising in kitchen and home wares. Extra Curricular Activities / Volunteer Work • GrapeShot (August 2013 – Nov 2013) GrapeShot magazine is a Macquarie University publication. I write articles for the magazines and help with editing, design and other areas that need help. • Private Tutoring (Oct 2011- March 2012) Mainly teaching exam preparation and skills for Selective School examinations. • Baby Sitting (2008-2011) Run of the mill child care for families after school, on weekends and during holidays ...

Words: 302 - Pages: 2

Free Essay

Exam

...forest must be running at least ____.b. Windows Server 2008____ prevents the risk of an attacker obtaining SID history data by blocking the use of any SIDsthat did not originate in the same domain.d. SID filteringSID filtering should be disabled by an automated process.Answer:True FalseYou can disable SID filtering using the ____ command on the trusting domain.b. Netdom A ____ trust creates an explicit trust relationship between two domains and is not transferred toany other domains.a. non-transitiveWhen selective authentication is implemented on a forest trust, you need to grant the ____permission on each server or computer where access is granted.Choose one answer.d. Allowed to Authenticate____ is an Active Directory preparation tool that can modify the schema by adding objects andproperties needed to support Windows Server 2008 domain controllers.b. ADPrep password policies can be implemented if the domain functional level is set to at least ____.b. Windows Server 2008Access to any resource within the domain is controlled by a(n) ____.a. Discretionary Access Control ListFine-grained password and account ____ policies are a significant addition to Windows Server2008.a. lockoutThe ADPrep switch ____ is used to prepare the forest for Windows Server 2008 or WindowsServer 2008 R2 domain controllers.a. /ForestPrep A ____ is a group of well-connected computers or well-connected subnets.Choose one...

Words: 387 - Pages: 2

Free Essay

Video Games and Violence

...mental traumas. Video games have positive effects. A study conducted by Shawn Green & Daphne Bavelier from Center Visual Science, University of Rochester, show that people who play a lot of action video games benefit from improved “hand-eye coordination and visuo-motor skills, such as resistance to distraction, sensitivity to information in the peripheral vision and ability to count briefly presented objects, than non-players” (“Action video game modifies visual selective attention”). Video games that incorporate advanced motion detection, such as Microsoft’s Kinect or Sony’s PlayStation Move, provide both physical and mental exercise. Furthermore, a study conducted by Doctor Cheryl K. Olson, co-director of the Center for Mental Health and Media, indicates that “contrary to the stereotype of the solitary gamer with no social skills, we found that children who play M-rated games are actually more likely to play in groups- in the same room, or over the Internet” .For example, Robert Chambers was sitting at the computer playing an online game when a fire started in his house. Due to muscular dystrophy he could not get to a...

Words: 1167 - Pages: 5

Free Essay

Essay on Info Reterival

...information storage and retrieval information storage and retrieval, the systematic process of collecting and cataloging data so that they can be located and displayed on request. Computers and data processing techniques have made possible the high-speed, selective retrieval of large amounts of information for government, commercial, and academic purposes. There are several basic types of information-storage-and-retrieval systems. Document-retrieval systems store entire documents, which are usually retrieved by title or by key words associated with the document. In some systems, the text of documents is stored as data. This permits full text searching, enabling retrieval on the basis of any words in the document. In others, a digitized image of the document is stored, usually on a write-once optical disc. Database systems store the information as a series of discrete records that are, in turn, divided into discrete fields (e.g., name, address, and phone number); records can be searched and retrieved on the basis of the content of the fields (e.g., all people who have a particular telephone area code). The data are stored within the computer, either in main storage or auxiliary storage, for ready access. Reference-retrieval systems store references to documents rather than the documents themselves. Such systems, in response to a search request, provide the titles of relevant documents and frequently their physical locations. Such systems are efficient when large amounts of different...

Words: 804 - Pages: 4

Premium Essay

The History of Ict

...The History of Information and Communication Technology Information and Communication Technology has been around for a long time. It has basically been around as long as people have been around. It has been around as there were always ways and needs of communicating through technology available at that point in time. ITC originates from simple beginnings such as the abacus. The abacus is said to have been originally invented 3,000 years before the birth of Christ. Revisions to its use and design continued for many years for example in 500 BC a bead and wire version was developed in Egypt. Early versions of the calculator were gradually replacing this primitive method of mathematics. In 1624 Wilhelm Schickard built the first four-function calculator-clock at the University of Heidelberg. Mechanical versions of the calculator were then developed, however calculators as we know them did not exist until 1780, when Benjamin Franklin discovered through experimentation electricity. The abacus is just one example of how ICT has developed throughout the years, below is a development timeline on how it has grown and improved in the most recent years. Development Timeline: 1939 Hewlett Packard was founded. Hewlett Packard was founded by David Packard and Bill Hewlett in a Palo Alto, California Garage. The first product was the HP 200A Audio Oscillator, which rapidly became a popular piece of test equipment for engineers. 1943 Project Whirlwind began. During World...

Words: 809 - Pages: 4

Free Essay

Unit 2 Assignment 2

...| Linda Vaughn GS1145T 10/3/2015 Why Create ASIMO? ASIMO is humanoid robot created to duplicate human motion and genuinely help people. ASIMO took more than two decades of persistent study, research, trial and error before achieving a humanoid robot. ASIMO's design, development and operation rely on many different disciplines including Mathematics, Physics, Anatomy, Engineering and Computer Science. In 1986 Honda engineer’s set out to create a walking humanoid robot early models (E1, E2, and E3) focused on developing legs that could simulate the walk of a human. Models (E4, E5, and E6) focused on developing walk stabilization and climbing stairs. Then the head, arms and body were added to improve balance. Hondas first robot P1 was rather rugged standing at 6’2 and weighing at 386lbs. P2 had a more friendly design. P3 model was more compact standing at 5’2 and weighing 287lbs. ASIMO can run, walk on uneven slopes and surfaces turn smoothly and reach and grab for objects. ASIMO can also comprehend and respond to simple voice commands. It can also recognize the face of a selective group of individuals using camera eyes. It can also map environment and register stationary objects and can avoid moving objects as it moves along the map. ASIMO is able to open and serve beverages, it also knows English and Japanese sign language .It can avoid bumping into people in hallways. Honda demonstrates ASIMO around the world to encourage and inspire young students to study the...

Words: 598 - Pages: 3

Free Essay

Prevention of Breast Cancer

...Prevention of Breast Cancer Abstract Background Breast cancer is the second leading cause of cancer deaths in American women according to the National Cancer Institute. Breast cancer research has found no cure and treatments vary in effectiveness. Objectives This paper will review some of the various conventional and natural prevention methods of breast cancer and evaluate the effectiveness and risks of each. Methods/Design Published studies on early detection , non-steroidal anti-inflammatory drugs, physical activity and diet were reviewed. Opposing studies and risks of each were also sought and reviewed. Major Findings All methods were found to have a positive effect on reducing the risk of breast cancer except for early detection. All methods were also found to have a negative effect on breast cancer risk or have risks of other health problems except for physical activity and thermography. Conclusion Studies show that early detection does not prevent breast cancer and moderate physical activity can reduce the risk of breast cancer. All other methods have conflicting studies . Early Detection: Early detection is the most recommend method for the prevention of breast cancer, however it does not prevent breast cancer but studies show it can reduce the death rate of breast cancer. Mammography the most used and accurate form of non-evasive early detection will be examined in this paper as well as thermography, a new alternative to mammogram screenings. ...

Words: 2751 - Pages: 12

Premium Essay

System Inventory

...University of Phoenix Material System Inventory Select and complete one of the following assignments: Option 1: Virtual Organization System Inventory Option 2: General IT System Inventory Option 1: Virtual Organization System Inventory Select one of the following Virtual Organizations: • Smith Systems Consulting • Huffman Trucking • Kudler Fine Foods Complete the following chart, filling in information for each system used at that Virtual Organization. Add rows to the chart as necessary. |System Name |Brief Description |Department to Use |Purpose of the System |Connects With |Development Details | | | |the System | | | | |Fleet Truck Maintenance |Relational database and |Fleet Maintenance |The DBMS will house |Drivers, Fleet |Ease of use – This DBMS has a | |Database Management |an information | |all the maintenance |Maintenance, and the|familiar Windows ‘look and | |System |management tool that | |data tables for |entire organization.|feel.’ | | |helps you store | |Huffman’s trucks and | | | |Microsoft |information for | |trailers...

Words: 650 - Pages: 3

Premium Essay

Osi Model

...OSI Ned Leeds CMGT/245 CMGT/245 Version 2 IS Security Concepts October 28, 2013 LAYER 1 - PHYSICAL  The physical layer is mainly responsible for establishing, maintaining and ending physical connections (point to point) between computers. This layer is concerned with the actual interpretation of the bit stream into an electrical signal that can be carried across a physical medium. The protocols at this layer deal with the binary transmission, voltage levels, and data rates. This layer would also specify physical medium properties such as cables and network cards. LAYER 2 - DATA LINK The data link layer defines the format of data on the network. All of the data sent through the network are made into a frame which is performed at this level. The frame is a uniform way of sending the data along with address information and error checking capabilities. CRC is used for the error detection at this level. The receiving end the CRC fails at this level there is a request back to the sender for retransmission of this packet. LAYER 3 - NETWORK The network layer basically handles all of the addressing issues. This layer addresses packets, determines the best path or route will manages network problems such as data congestion. There are three ways in which the packets are routed to their destinations. There could be a static route through the entire network that will never be changed. This could also be a static line only used during a particular session between the sender...

Words: 1130 - Pages: 5

Free Essay

3d Printer Bridge

...How Robots Are Building a 3D-Printed Metal Bridge in Amsterdam 1) Title Slide 2) Article Information 3) Key Terms and Vocabulary * MX3D – is a company that researches and develops robotic 3D print technology. * Selective Laser Melting (SLM) - is a manufacturing process that uses 3D CAD data as a digital information source and energy in the form of a high-power laser beam, to create three-dimensional metal parts by fusing fine metal powders together. * Welding - is a fabrication or sculptural process that joins materials, usually metals or thermoplastics, by causing fusion, which is distinct from lower temperature metal-joining techniques such as brazing and soldering, which do not melt the base metal. * Autodesk - is the California-based software company behind AutoCAD, a computer-aided design software that helps architects and engineers model real-world objects in the digital sphere. 4) What is this 3D Printed Metal Bridge? The 3D printer bridge, which is on track to be completed by 2017, is one of MX3D creations. The bridge will be constructed entirely by robots that can "print" complex steel objects in midair. The bots are like mechanical, welders that melt together layer upon layer of steel to form a solid object. It's the first time that Tim Geurtjens (The Co-founder and chief of MX3D) and his colleagues are designing and building a bridge using this printing technology. Until now, the company was mainly using its robots to...

Words: 971 - Pages: 4