Sept+25+HRM

Make-Up Day:

You will have the entire period to make-up any assignments that you are missing.

Most of you need to do (2) Reports

1 page double space 12 font size "Who invented the computer?" is not a question with a simple answer. The real answer is that many inventors contributed to the history of computers and that a computer is a complex piece of machinery made up of many parts, each of which can be considered a separate invention.
 * //__1. History of the Computer:__//**
 * Helpful Topics**
 * ** Computer History **
 * Year/Enter ** || ** Computer History **
 * Inventors/ Inventions ** || ** Computer History **
 * Description of Event ** ||
 * **[|1936]** || Konrad Zuse - ** Z1 Computer ** || First freely programmable computer. ||
 * **[|1942]** || John Atanasoff & Clifford Berry
 * ABC Computer ** || Who was first in the computing biz is not always as easy as ABC. ||
 * **[|1944]** || Howard Aiken & Grace Hopper
 * Harvard Mark I Computer ** || The Harvard Mark 1 computer. ||
 * **[|1946]** || John Presper Eckert & John W. Mauchly
 * ENIAC 1 Computer ** || 20,000 vacuum tubes later... ||
 * **[|1948]** || Frederic Williams & Tom Kilburn
 * Manchester Baby Computer & The Williams Tube ** || Baby and the Williams Tube turn on the memories. ||
 * **[|1947/48]** || John Bardeen, Walter Brattain & Wiliam Shockley
 * The Transistor ** || No, a transistor is not a computer, but this invention greatly affected the history of computers. ||

Please post to your WIKI

1 page, double space 12 font size
 * //__2. Computer Viruses:__//**
 * Helpful Topics**
 * **Viruses** - A virus is a small piece of software that piggybacks on real programs. For example, a virus might attach itself to a program such as a spreadsheet program. Each time the spreadsheet program runs, the virus runs, too, and it has the chance to reproduce (by attaching to other programs) or wreak havoc.
 * **E-mail viruses** - An e-mail virus travels as an attachment to [|e-mail messages], and usually replicates itself by automatically mailing itself to dozens of people in the victim's e-mail address book. Some e-mail viruses don't even require a double-click -- they launch when you view the infected message in the preview pane of your e-mail software [source: [|Johnson]].
 * **horses** - A Trojan horse is simply a computer program. The program claims to do one thing (it may claim to be a game) but instead does damage when you run it (it may erase your [|hard disk]). Trojan horses have no way to replicate automatically.
 * **Worms** - A worm is a small piece of software that uses [|computer networks] and security holes to replicate itself. A copy of the worm scans the network for another machine that has a specific security hole. It copies itself to the new machine using the security hole, and then starts replicating from there, as well.

Please post to your WIKI