Premium Essay

Intro of the Mac

In:

Submitted By aperry8313
Words 573
Pages 3
Amanda Perry
Module 1: Intro of the MAC
CCT 271
August 21, 2014

Steve Jobs was born on February 24, 1955 in Los Altos, California. Steve Wozniak was born on August 11, 1950 in San Jose, California (www.biography.com/stevewozniak). The pair founded Apple Computers Inc. on April 1, 1976 with Ronald Wayne. They were responsible for releasing some of the first personal computers on the market. Jobs and Wozniak partnered together to invent the Apple I computer in 1976. They were hoping to sell their first computer to their fellow members in the Homebrew Computer Club (www.biography.com/stevejobs).
The Homebrew Computer Club was a computer hobbyist group out of Silicon Valley, California, and was founded by Gordon French in 1975. The group met together twice a week to exchange different ideas about computers and how to make them more accessible to people. The group consisted of many computer enthusiasts that later became high profiled hackers and computer entrepreneurs like Jobs and Wozniak (www.princeton.edu/homebrewcomputerclub). As time went on, the two continued to work on building bigger and better things like the LISA. In 1979, a crew from Apple, led by Jobs, decided to go and visit Xerox’s Palo Alto Research Center (PARC). It was said that Jobs walked away with a vast amount of knowledge and secrets from Xerox that he used in the original MAC. It was believed that the ideas behind the graphical computer display came from PARC when all actuality, Apple had already developed the technology but were having issues with the execution. The only thing that Jobs and the engineers took from PARC was how they solved the problems; so that way they knew how to fix their issues and launch the release of their computer (www.latimes.com).
The development of the LISA (Local Integrated Software Architecture) finished in the early 1980’s and was released

Similar Documents

Free Essay

Lala

...Current Location ENGL F111X TXA 201401 (CRN 35126) Intro to Academic Writing Assignments Module 8 Take Test: Quiz- Pronouns Hide Course Menu Menu Management Options Refresh Display Course Menu in a Window Course Menu: ENGL F111X TXA 201401 (CRN 35126) Intro to Academic Writing Course Entry Page Announcements Contact Instructor Discussions My Grades Tools OIT Support UAF Library Orientation Syllabus Course Documents Books Assignments Templates and Tips Web Links Take Test: Quiz- Pronouns Content Assistive Technology Tips [opens in new window] Instructions Multiple Attempts Not allowed. This test can only be taken once. Force Completion This test can be saved and resumed later. Question 1 Neither Natasha nor me is responsible for this mess. Press Tab to enter the content editor. For the toolbar, press ALT+F10 (PC) or ALT+FN+F10 (Mac). Arial 3 (12pt) Paragraph Font family Font size Path: p Words:0 2 points Question 2 A student at that all women’s college has nothing to fear about their future. Press Tab to enter the content editor. For...

Words: 600 - Pages: 3

Free Essay

Juno

...Juno I would like to give two characteristics of two of the characters in the film. I have chosen Juno MacGuff and Mac MacGuff. I will start with a short intro about the movie. It’s about a girl who gets pregnant with her boyfriend and she wants to give away because she thinks that she is not mature enough to handle all the troubles with children. She decides to give to a family who can’t get children by themselves. She says that she is immature but that was actually a very grownup and mature decision. Juno: Juno is a 16 years old girl. She has brown hair and she is a bit of a “boy-girl”. She is wearing a shirt under her sweatshirt and a brown jacket. Around the neck she has a blue and grey scarf. Her schoolbag is military green. I think that she is very self-confident. Maybe that is because she does not care what everybody else thinks about her. Actually that’s a very hard thing to do. I would wish that I could be little like her. She goes in high school. She thinks that it is okay, but when she got pregnant all of the other students keep looking after her and point her. It’s like she I become a movie star but it’s just in the negative way. I would turn or go nuts if I was the one who was pointed at and talked about all the time. Her bike is not a regular bike it’s a real racing bike. I think it’s a little unusual for a girl to ride a racing bike. But she fits it. Juno has a boyfriend named Paulie Bleecker. He is also going in the same high school as Juno and that was there...

Words: 626 - Pages: 3

Free Essay

Macpro Killer $4000

...MacPro Killer: By: killa hafiz Intro: The purpose of this article is to build a computer that can either perform at the same level as the MacPro 2013 for the same or less money. I have recently been told by people (Mac FanBoys) that I can’t build a pc just as fast for equal cost hence the necessity of this article. Note For this article we will be building a pc that is comparable to the 6-core configuration, so that sets my budget at a $4,000 limit. Processor: The Processor used in the Mac Pro is equal to an Intel Xeon E5-1650 running at 3.5 GHz. It has 6 processing cores and 12 threads. The processor I will be using in my build is Intel Core I7-4930K. It has 6 cores 12 threads and runs at 3.4 GHz. I have chosen the Core I7, because not only is it faster, but it is also half the price of the Xeon E5. The only advantage the Xeon has is that it can use Error correcting memory and the core I7 cannot. This means that I would have the potential for a higher ram upgrade by going with the Xeon but I don’t care, in the end of the day The core I7 is faster out of the box, can be over clocked, costs $500 less, and what’s to stop me from upgrading in the future. Intel Core I7-4930K Pass Mark Score: 13,550 Intel Xeon E5-1650 Pass Mark Score: 12,396 My Choice: Intel Core-I7 4930K $500 Motherboard: I will be using Asus Rampage IV Gene. As far as features and performance is concerned this one here is a no brainer. The only thing that hurts is that it only supports a maximum...

Words: 886 - Pages: 4

Free Essay

Paper

...Items to learn to understand the basics to Network Administration Intro to Networking Objectives: * Recognize the following logical or physical network topologies given a schematic diagram or description * Star/Hierarchal * Bus * Mesh * Ring * Wireless * Specify the main features of 802.3 (Ethernet), 802.11b/g/n/a (Wireless) and FDDI network topologies, including * Speed * Access Method * Topology * Media * Understand the differences between Local Area Networks (LANs) and Wide Area Networks (WANs) * Identify the characteristics between peer-to-peer and client/server networking * Identify the characteristics of various network topologies * Understand the characteristics of the following IEEE Standards, 802.3 and 802.11 * Identify the characteristics of Fiber Distributed Data Interface (FDDI) Cabling and Connectors Objectives: * Understand the differences in characteristics (ex. Speed, Length, Topology and Cable Type) of the following IEEE 802.3 (Ethernet) standards * 10BaseT * 10BaseTX * 10Base2 * 10Base5 * 100BaseFX * Gigabit Ethernet * Recognize the following connectors and describe their uses * RJ-11 * RJ-45 * BNC * ST * SC * LC * Understand the relationship between media and bandwidth * Understand the characteristics of IEEE standards 802.3, 802.3u and 802.3z * Identify the various...

Words: 446 - Pages: 2

Premium Essay

Disaster Recovery Plan

...Disaster Recovery Plan Brandon Brown University of Phoenix IT/244 Intro to IT Security Katarina Brunski October 14, 2013 Access Control Policy Due in Week Seven: Outline the Access Control Policy. Describe how access control methodologies work to secure information systems Authentication Authentication establishes the identity of a user on a network. Malicious user and programs try to disrupt the service of the network in an attempt to obtain sensitive information or falsify data by mimicking valid persons. Differentiating the malevolent from the valid or appropriate individuals is a part of the authentication process and is vital to network security. Every worker will have photo access badges that will be coded to either allow or disallow personnel from certain areas. The access badges will only allow the workers into areas that they are cleared to enter, and when they enter those areas, the times will be logged. Workers will access to the network by having a unique username and password that is not to be shared with anyone else, at all. Access control strategy Discretionary access control This is to permit the right to use the system only to users who have correct authorization. Least privilege is basically having things on a need to know basis. The entry-level worker does not need to be privileged to the same information and access as the senior IT director. Least privilege will allow the user to access only the information that they need to do their job...

Words: 622 - Pages: 3

Premium Essay

Student

...Intro. To programming review Module is a group of statements to perform a task Function is a group of statements that perform a task and return a value CH.1 Difference between application software and OS Know OS's (give example: Microsoft, Linux, Mac, etc.) Know what interpreter does for you Know difference between a Logic & Syntax error Know Fortran is first High level programming language Know Assembly Language Know how CPU works(Fetch,Decode,Execute) Which is faster, Interpreter or compiler Pg.18 Machine Language (1001001) Know about unicode Know difference between logic and syntax......again lol Program development cycles Pg.30 Difference between psuedocode and flowchart Same as 13 Repetition and sequence of structure Know all of the processing symbols for flowchart Mathematical operators Pg.46 Order of precedence Know data types Pg.56 What is constant variable (named constant) Know benefits of using modules know pseudocode in sequence same as 23 know about return point (memory address location) what flowchart symbol is the module call (rectangle with 2 lines?) difference between flowchart and hierarchy chart Pg.83 parameter difference know passing argument by value and by reference Pg.97 know difference between global & Local variable same as 28 difference between control and sequence of structure what is sequence structure ...

Words: 259 - Pages: 2

Free Essay

Mc Donalds

...CLICKING OF FROM CANADA A WELL RECOGNISED IN EVERY CONTINENT IN THEIR OWN FASHION WITH MORE THAN 18 MILLION PEOPLE IN OVER 40 COUNTRIES EATNG THEIR OUTLETS •RAPID ESTABLISHMENT O BRAND NAME •CONCENTRATED ON LIMITED MENU O F HIGH QUALITY,MODERATELY PRICED AND A GOOD AMBIANCE MOTTO QSC&V •WELL ESTABLISHED CHAIN AFFLICATIONS •IMMENSE PLANNING AND BEST CONTROLLING TECHNIQUES FACTS oWITH THE INTRO OF MC MEAL MC DONALD’S QUICKLY BECAME THE LARGEST TOY DISTRIBUTOR IN THE WORLD oMC DONALDS IS THE WORLDS LARGEST TOY DISTRIBUTOR oIn the U.S. nine out of ten kids between the ages of 3 and 9 eat at McDonalds once a month. oIn 1979 the Happy Meal was first invented and only cost $1.00. The biggest hit toy that came from the Happy Meal was the Ty Beanie Baby. McDonald's has unique menu items in every country. In Portugal, you can order soup! Paris has what is thought to be the only McDonald's with white arches in place of their traditional golden ones. The McDonald's Shamrock Shake was created for a fundraiser with the Philadelphia Eagles. In 2005, McDonalds paid rappers to reference Big Macs in theiR SONGS 4 .SHOULD MC DONALDS EXPANDS ITS MENU?IF YES WHAT KIND OF PRODUCTS THEY SHOULD ADD? YES, MENU SHOULD BE MODIFIED OTHER THAN ITS FIXED MENU MC DONALDS CAN CRISCROSS VARIOUS DELICIOUS DIFFERENT CUSINES THE MENU MAY ALSO ADD CLASSIC RECEPIES OF FAST FOODS WHICH ARE BEING LEFT FORGOTTEN IN THE RACKS...

Words: 287 - Pages: 2

Free Essay

Intro to Networking

...Intro to Networking Lab 3 Jeff Garwood EX. 3.1 Review 1. The MAC Address is sufficient to route traffic locally because it provides the needed information with regards to the equipment location. This is mostly true on level 2 networks. 2. The Open Systems Interconnection was started in two documents in 1978. The International Organization for Standardization (ISO) and the International Telegraph and Telephone Consultative Committee, or CCITT. In 1983 these two documents were combined as the basic reference model for the OSI. It was created so Protocols could allow the entity in one host to interact with a corresponding entity at the same layer in another host. 3. The TCP dates back into the 1960s on the DOD sponsored ARPANET. In 1973 the TCP/IP came to be and consisted of dozens of different protocols. Of these key protocols, two are usually considered the most important. The Internet Protocol (IP) is the primary OSI network layer (layer three) protocol that provides addressing, datagram routing and other functions in an internetwork. EX. 3.2 Review 1. The composition of the physical wiring, and connectors no matter the type are strictly regulated to ensure the electrons within the communications signal can move fast enough to maintain a connection. The addition of network devices such as switches and routers complete the campus style network. 2. The OSI model is not implemented in a network but is used as a model to guide troubleshooting a local network in reference...

Words: 719 - Pages: 3

Premium Essay

Mcdonalds

...Outline I) Intro/Hook Thesis Statement: Although McDonald’s and Burger King are similar; they have evident differences in their advertising models, food and their commitment with the community. II) *Topic sentence 1: McDonald’s and Burger King invest a lot of money in their advertisements. A) Evidence #1: Golden arches, Ronald McDonald, Big Mac, extra cheese and the guy who promote Burger King. III) *Topic sentence 2: Their food seems to be the same, but it isn’t. A) Evidence #1: McDonald’s hamburger weighs less than Burger King’s. B) Evidence #2: Burger King’s beef are 100% pure and they flame-boils their burgers, while McDonald’s fries their beef. C) Evidence #3: McDonald’s cost slightly less than Burger King. IV) *Topic Sentence 3: Their commitment with the community is different. A) Evidence #1: McDonald’s has House Charities and they give away millions of dollars in scholarship, while Burger King’s commitment is to provide good service and products to their clients. V) Conclusion McDonald's vs. Burger King “We see things not as they are, but as we are conditioned to see them” –Gandalf. Far from what we imagined, McDonald's and Burger King have huge differences. Most people perceive them just as the same fast food restaurant with different names. For this reason, “they create debates on which one of them is the superior restaurant” (Jeffrey’s blog, 2012, BK vs MC). Although, they have similarities, their differences become undeniable when we...

Words: 687 - Pages: 3

Premium Essay

Access Control Policy

...Associate Level Material Appendix F Access Control Policy Student Name: Charles Williams University of Phoenix IT/244 Intro to IT Security Instructor’s Name: Tarik Lles Date: December 4, 2011 Access Control Policy Due in Week Seven: Outline the Access Control Policy. Describe how access control methodologies work to secure information systems Access control is used to restrict operations, which authorized users can perform. Access control does exactly what it says, it controls what access an authorized user can have. A reference monitor is used for access control and follows instructions from an authorization database. These authorizations are controlled and administered by a security administrator who sets the access controls based on the companies’ security policies, which are defined by the organization. The decision of which access controls to use would be based on the organizational policy and two accepted standards of practice, which includes separation of duties and least privilege (Kurzban, 2011). 1 Authentication Describe how and why authentication credentials are used to identify and control access to files, screens, and systems. Include a discussion of the principles of authentication such as passwords, multifactor authentication, biometrics, and single-sign-on. Today, when using a computer system, a number of computer services are provided to many users simultaneously, so it is important to ensure that authorized...

Words: 1663 - Pages: 7

Free Essay

Concept

...Making a Dubstep song A lot people have either heard a dubstep song or know of at least one. Some people like them, but some don't. Hearing these songs I always wondered how hard is it to make one. It turns out having free time, computer skills, and some rhythm are all you need, well some computer First you'll need some great to get started. The first thing you need is a computer. A lot of dubstep is the sound effects. You need a fast computer with a lot of memory. If you want a Mac, make sure it has 1.8 GHz, with an Intel Processor 2-4 GB of RAM and is OSX 10.5 or later. If you want a PC, make sure it has 2GHz Pentium or Celeron processor 2-4 GB or RAM Windows XP, Vista, or Windows 7 a sound card with ASIO driver support. Next you'll need a music software, my favorite is GarageBand. The music software is used to prepare tracks, sample songs, mix and record. Other popular software is Fruity Loops, Cakewalk Sonar, and Renoise. You should strongly consider adding external hardware to the setup. Having a basic USB mic on hand to record vocals or raps is a good idea and good way to create new sounds to use. If you're at all interested in incorporating original found sounds or acoustic elements and manipulating them in your dubstep music, a solid microphone is a good idea. The next step is to learn about your equipment. Playing with the instruments you have on your computer can be a good way to familiarize yourself with...

Words: 489 - Pages: 2

Premium Essay

World Food

...swinbourne university | Assesment 2A | Group 4 | | Amy TERZI | | | Assessment 2 Themes Table (Details will be provided in week 5) International Cuisines |   | Italian (Marcus) | Greek | Vietnamese (Karen) | Australian (Candice) | French (Libby) | Traditional | - Antipasto-Primo |  moussakka |  banh mi | Meat Pie | Boef Bourgingion | Food and celebrations | - Tortellini (Christmas day)-colomba (easter) | easter avgolemono |  banh chung | BBQ |   | Delicacies - NA | - Saltimbocca-Lampredotto |  NA |  NA |  N/A |  NA | Famine food | - Wild ferns/ Weeds-Pitsockery |   silignites |  pho | Damper | Croque Monsieur | Space to discuss week 5’s activity and assignment 2A in your team. Further details will be provided in week 5. Note: This Wiki will be used to assess how well each of you has collaborated so it is important to make an active contribution here throughout the project.                             Is everyone okay with the graph??? - Marcus Name | Date | Idea |  Marcus |  13/8/2014 |  Hey guys, i see there is no communication just yet but lets start working together on this one :) i hope everyone is eager to getting it all going well.From the cliche this is what i have gathered from it:1- A light at the end of the tunnel - fairly sure that one is standard2 -  A rolling stone gathers no moss is an old proverb, credited to Publilius Syrus, who in his Sententiae states, People who are always moving, with no roots in one place, avoid...

Words: 4226 - Pages: 17

Free Essay

10 Gigabit Ethernet Standard

...10 Gigabit Ethernet Standard Christopher Burch PROF. K. Jones CIS 175 – Intro to Networking March 4, 2011 ABSTRACT NOT REQUIRED 10 Gigabit Ethernet Standard From its inception more than 25 years ago, Ethernet has adapted to meet the increasing loads of packet-based networks. Because of its proven low implementation cost, reliability, and relative simplicity of installation and maintenance, Ethernet’s usage has grown to the point that nearly all voice, video, and data traffic on the Internet begins or ends with an Ethernet connection. Further, as the need for ever-faster network speeds has increased, Ethernet has been adapted to handle these higher speeds, as well as the surges in volume demand that are apart of them. The IEEE 802.3ae 2002 (10 Gigabit Ethernet standard) is unique in some respects from earlier Ethernet standards in that it will only function over optical fiber, and only operates in full duplex mode (collision-detection protocols are unnecessary).Ethernet can now evolve to 10 gigabits per second while keeping its most important Ethernet properties, such as the packet format, and the current capabilities are easily transferable to the new standard. The 10 Gigabit Ethernet standard extends the IEEE 802.3aestandard protocols to a wire speed of 10 Gbps and expands the Ethernet application space to include WAN-compatible links. The10 Gigabit Ethernet standard provides a powerful increase in bandwidth while maintaining maximum compatibility with the installed...

Words: 844 - Pages: 4

Premium Essay

Microsoft vs Vmware

...| Microsoft vs VMware | What’s the difference 10-13-2014 Intro to Networking Online | Microsoft vs VMware Virtualization There are two types of virtualization software applications. One type is called Microsoft APP-V software and vSphere 5.5 or known as VMware virtualization. I am going to discuss three main differences between to two programs. One difference will be discussing licensing. Some other differences noted are Disk space and Support programs. I will also discuss memory, and ease of use. Microsoft APP-V software is a program that allows organizations to host the application and deliver virtually to users. From the users perspective it runs like an installed program, however from the IT admins point of view it is much easier to manage and maintain a single instance of the application. Since APP-V software is never installed locally there is no conflict or compatibility issues to worry about. (Bradley, 2012) VMWare vitalization software is the same as Microsoft APP-V software with a few minor differences. One big difference is that there is cost to operate certain features in the software. Both Microsoft APP-V and VMWare vitalization can both be operated on all Microsoft OS, but Microsoft APP-V cannot operate on MAC IOS. Storage capacity is comparable to Microsoft APP-V, however you will need to purchase additional licenses to operate certain features that in Microsoft APP-V the licenses are already provided. (Mayer, 2013) One comparison and contrast...

Words: 525 - Pages: 3

Premium Essay

Pt1420 Unit 1

...“Unit 1 Assignment 1” ITT Technical Institute Intro to Programming – PT1420 Unit 1 Assignment 1 Short Answer Questions 1. Why is the CPU the most important component in a computer? The reason the CPU is the most important component in a computer is because without the CPU you can’t run any software. 2. What number does a bit that is turned on represent? What number does a bit that is turned off represent? The number in a bit that represents a turned on position is 1. The number in a bit that represents a turned off position is 0. 3. What would call a device that works with binary data? A digital device is a device that works with binary data. 4. What are the words that make up a high-level programming language called? Keywords or Reserved Words are words that make up a high-level programming language. 5. What are short words that are used in assembly language called? Mnemonics are short words that are used in assembly language. 6. What is the difference between a compiler and an interpreter? The difference between a compiler and an interpreter is that a compiler translates high-level language into separate machine language program while an interpreter translates AND executes the instructions in a high-level language program. 7. What type of software controls the internal operations of the computer’s hardware? An operating system controls the internal operations of the computer’s hardware. Unit 1 Research Assignment 1 * What were...

Words: 1534 - Pages: 7