The Computer Revolution
Appearance
llr.76
Hardware
[edit | edit source]- Binary
- Motherboard
- Microprocessor
- CPU
- Servers
- Price
- Computer case
- Power Supply
- Uninterruptible Power Supply
- Ports
- Expansion Cards
- Sound cards
- Video Cards
- Jump Drives
- PDAs
- The Morph Concept
- Hardware Protection
Memory
[edit | edit source]Peripherals
[edit | edit source]- TV
- Monitors
- Refresh Rate vs. Sampling Rate
- Keyboards
- Scanners
- Printers
- Pointers
- Types of Scanners
- Readers
- Speakers
- Web Cameras
- 3D Scanners
- Pens/Styluses
- Graphic Tablets
- Midi
Media
[edit | edit source]- Software Licenses
- Copyright infringement
- Common Software Shortcuts
- Operating Systems
- Installed vs.Web-Based Software
- System Software
- Application Software
- Middleware
- Open Source Software
- Computer Monitoring Software
- Graphics Software
- CADD
- Paint
- Adobe Photoshop
- Word processing
- Note Taking Software
- Database
- Corel Draw
- Information Systems
Computer Graphics
[edit | edit source]- Graphics
- Increasing Design Speed
- Design Efficiency
- Using Pictures
- Soft Copy Proofs
- Print Merge
- 3D
- Graphics Accelerator
- Digital Manipulation
- Multimedia
Customization
[edit | edit source]Databases
[edit | edit source]- Basic Structure
- Data mining
- Database Models
- DBMS
- RDBMS-ORACLE DATABASES
- Indexing
- Criminal Databases
- Management Information system
- Transaction Processing System
- Limitations
- Types of Files
- Data Warehouses
- Opinion Polls
- Creating a Database
- Database Classifications
- Content Management Systems
- Entities and Entity Relationships
- Cloud Databases
Programming
[edit | edit source]- 1st generation
- 2nd generation
- OOP
- Programming_Languages_Used_Today
- Designing the Program
- Five Steps of Programming
- Object Oriented Programming
- Introduction to Python
- Object Oriented vs. Structured programming
- The Six Phases of System Analysis and Design
- Conducting the Preliminary Investigation in system analysis and design
- Aspect Oriented Programming
- JavaScript
- Web Authoring Software
- System Development
- Procedural Programming
- FORTRAN
- Application Lifecycle Management
Artificial Intelligence
[edit | edit source]- Expert Systems
- Neural Networks
- Genetic Algorithms
- ASIMO
- Turing Test
- Branches of & Applying AI
- AI use in business
- Diagnosis
- Weak VS Strong AI
- Intelligence Agents
- Translators
- Education
- I dog
- Around The Home
- Ethics
- Robotics
Communication
[edit | edit source]- online
- satellites
- information age
- Telecommunication
- Instant Messaging
- VOIP
- Blogs
- How communications help with education
- PAN
- LAN
- WAN
- MAN
Networks
[edit | edit source]- Types of Networks
- Components
- Network Topologies
- Mesh
- Intranet
- Models
- Four Types of Wireless Communications
- Ways to Minimize Virus Attacks
- Wired Communications Media
- Short Range Wireless for Personal Area Networks
- Short Range Wireless for Automation Networks
- Digital and Analog Cell Phones
- Wi-Fi
- Wi-Fi VS WiMAX
- Bluetooth
- VPN
- Global Positioning System (GPS) Applications
- ZigBee
- Delivery Method
- Connecting Devices and Networks
Internet
[edit | edit source]- Internet
- Searching the Internet
- Protocols and Standards
- Connections
- Crime
- Security
- Communication
- Netmeetings
- Skype
- Online Forums
- Social Networks
- VoIP
- Languages
- Controlling bodies
- Dynamic
- Hackers
- Digital Certificate
- Flowchart
E commerce
[edit | edit source]- Overview
- E commerce Business Models in a Nutshell
- Benefits
- Types of E-Commerce Web Sites
- Disadvantages
- E-bay
- Online Banking
- Advertising
- B2C
- B2B
- Online Shopping
- PayPal
- Online Job Hunting
- Small Business
- Electronic Financial Transactions
- C2C
- B2G
- Website Design
- Website Development
- M-commerce
- Security
- Attacks
- Defenses
- Cyber Villains
- Passwords
- Biometrics
- Computer Crime
- Encryption
- Firewall
- Prevent Identity Theft
- Dirty Data
- Cyber Threats
- Cyber Bullying
- The Evil Twin Attack
- Malware
- Technology Misuse
- Privacy Threatened
- The Fair and Accurate Credit Transactions Act
- Properly Dispose of Hardware Containing Data
- Surveillance Systems
- Employee Monitoring
- Digital Counterfeiting
- What Is Phishing
- Presence Technology
- Media Center
- Gaming
- Videogame Systems
- Streaming
- Video players
- Satellite Radio
- Manipulation of Digital Data
- Digital Video Quality
- Digital Cameras
- MP3 Players
- Music
- Magazines
Computers and Health
[edit | edit source]Computers and Environment
[edit | edit source]- Disposal/Recycling
- Nanotechnology
- Ruggedized Devices
- Green Computing
- Quantum Computing
- Uninterruptible Power Supply
Business
[edit | edit source]- Business
- Computer and Business Ethics
- Computer Crime in the Workplace
- Careers
- Outsourcing
- Intellectual Properties
Business Information Systems
[edit | edit source]Influential people
[edit | edit source]In this section of the book we will list and point some of the most influential people in the computer revolution. As consideration to keep this section out of disputes and avoid prematurely ego contest and promotions, all listed personalities should already be dead and the impact of their contributions on the field of computing must have outlasted their lifespan.