Thursday, December 13, 2007
Module B Aassignment 6
1) Wireless network is not password protected.
2) Wireless networks are in highly populated ares which makes it harder to track down people that hack into your networks
3) If the wireless network is auto-connect it makes it easier for hackers to get into your networks and get free internet access.
4) There are limits to everything you do on your networks; programming and services included.
Solutions:
1) Manage network and add a password.
2) Password protect your network.
3) Do not auto-connect your networks.
4) Get a different network or talk to your computer helper person and ask if they can fix your network settings.
Bibliography:
Information was provided by Chris Haynes.
http://compnetworking.about.com/od/wirelessecurity/tp/wifisecurity.htm
http://www.oreillynet.com/pub/a/wireless/2002/05/24/wlan.html
Lab Log Entry #5
IP Address: an unique address that is used to identify and communicate between networks using their Internet Protocol standards.
Subnet Mask: Determined what subnet an IP Address belongs to.
Default Gateway: A node in a computer network; is a service between access points in networks.
Part B:
Internet Address: unique address that identifyes and communticates between networks by means of their Internet Protocol Standards.
Physical Address: the memory address; prestented in the form of binary numbers and is on the computer address bus in order to enable the data bus to access the storage of memory cells.
Dynamic Type: the runtime of a computer network.
Bibliography
http://en.wikipedia.org/wiki/IP_address
http://www.webopedia.com/TERM/s/subnet_mask.htm
http://en.wikipedia.org/wiki/Default_gateway
http://en.wikipedia.org/wiki/Physical_address
http://www.google.ca/search?hl=en&defl=en&q=define:dynamic+type&sa=X&oi=glossary_definition&ct=title
Monday, December 3, 2007
Moduel B Assignment 5
2. IEEE 802.3- It is a group of IEEE standards that define the physical layer, media access control (MAC) sublayer of the data link layer, and Ethernet. There are physical connections made between nodes by different types of copper or fiber cables.
3. Ethernet- defines a group of wiring/signaling standards for the physical layer, through the data link/ media access control layer; and is a common adress format. It is a frame-based computer network technology used in local area networks (LANs).
4. Star Topology- could be known as a star network, the most common network setups; each device on each computer on a network connects to a central hub. A disadvantage is that is the hub fails, all the compuers connected to that hub would become disconnected.
5. Hub- a device that is used for connecting many twisted pair/ fiber optic ethernet devices together, which makes the devices act as one. these hubs work at the physical layer of the operating system; are also responsible for forwarding jam signals to all ports if there is a detected collision.
6. Proxy Server- in computer networks it is a server that services the requests of the "clients"; by forwarding the "client's" requests to other servers. It provides the resource by connecting to the specified server by the request of the clients.
7. Collision- in networks, when two devices from the same network attempt to transmit data at the same time.
8. Firewall- a system that protects networks from unauthorized users and viruses, and can be used in software, hardware, or both of them. Can also control the amount of data that leaves a network.
9. Protocol- controls/enables the connection, data transfer and communication between computers. It is known as a set of rules for communication. Can be used be hardware, software, or both.
10.Broadcast Domain- A logical network segment that any computer/ any other devices can connect to a network and can directly trasmit anything to any other domain without having to pass thorugh a routing device, but they have to be connected to the same subnet address and have the same VLAN installed or defaulted.
11. Intranet- a private computer network that uses internet protocols. It connectivity to securly share a part in an organization's information and/or operations with the companies employees. Sometimes it only refers to an internal website.
12. NIC- Stands for network interface card. It is used to connect a computer to an Ethernet network. Can be used in external or internal transceivers.
13. Router- a device that connects networks together. Extracts the destination of a packet of data that it recieves and then choses the best path for that packet to travel to the desired computer.
14. Terminator- used to absorb signals so that the signals don't reflect back down the line. It is a device that is attached to the end-points of a bes network.
15. Plenum Cable- a cable that is stiffer and stronger than a regualar network cable. It is used to run through a plenum space in a building.
16. Block Coding- a type of channel coding. It adds to a message so, at a reciever, the message can be decoded with the least amount of errors, considering if the information rate does not exceed the channel's capacity.
17. Plenum- it is the space, in a building, that is used for ventallation. air conditioning, or heat equipment. It is also the space where the plenum cables go. The space is to small for a human to fit in.
18. MAC Address- an address that is connected to most network adapters. It's a number that is acting like a name for a network adapter.
19. Bridge- connects multipe network segments at the data link layer of an Operating system model. Similar to repeaters or network hubs, works by bridging where there is traffic in the data flow of a network.
20. Point to point technology- when information is passed from one point in a network to a different point in the same network or to a different network.
21. Late collision- a type of collision that occurs in after the first 512 bit times of data transmitted by a transmitting station. Usually found in CSMA/CD protocol standtards. If a late collision is left for a period of time the data that is being transmitted can be lost.
22. MAU- Stands for multiple access unit. It is an Ethernet transceiver. A device that is physically connected to networks by means of a star topology layout.23.Full duplex operation- when there is a connection between two devices that are capable of sending data between them in both directions. Can only link two devices together.
24. Half duplex operation- when there is a connection between two network nodes, there is only a transmittion of data in one direction at a time. Refers to any number of connections between devices that are transmitting things back and forth.
25. Baud- a unit for measuring analog signaling. One baud is the same as one bit per second, but at a higher speed more bits can be transfered through a single baud.
26. Bit rate- the amount of bits that are transmitted in a time period.
27.Link integrity test- when the data path is checked by the links between the networks.
28. 10 base (generic)- most common numerical system. Each number has 10 as its base. It is just the numbers that you count by. Also known as the decimal numeral system.29. 100 base (generic)- when a fast ethernet is going at 100Mbits/s.
30. LLC- Stands for library link code. It is the codes that a library puts onto their homepage for people to use to get to other links that the library offers quickly.
31. AUI- Stands for Attachment Unit Interface. It is a 15 pin connector that would provide a path between an Ethernet's nodes and the MAU.
32. Packet- a unit of binary data that is capable of being routed throughout a computer's network.
33. Bandwidth- the data rate that is supported by a network's connection or interface. The total distand that is between the hightest and lowest signals of a communication channel.
34. Repeater- regenerates any incoming signals from a network.
35. Octet- represents an eight bit quantity of signals or data in a network.
36.Port- an endport/channel of network communication.
37. TCP- Stands for transmittion control protocol. Helps with the delivery of bytes to a network by making it easier for the information to go where it is suppost to go.
38. IP- Stands for internet protocol. A protocol that is responsible for communtication across a packet-switched internetwork.
39. FTP- Stands for file transfer protocol. Used to transfer data from one computer network to another by means of the internet.
40. Logical address- refers to a network layer address. ex. and IP address.
41. DNS- Stands for domain name service. Serves as a phone book in the internet. Also stores informaton. It is an important component for unsing the internet.
Bibliography:http://en.wikipedia.org/wiki/IEEE
http://en.wikipedia.org/wiki/IEEE_802.3
http://en.wikipedia.org/wiki/Ethernet
http://www.computerhope.com/jargon/s/startopo.htm
http://en.wikipedia.org/wiki/Ethernet_hub
http://en.wikipedia.org/wiki/Proxy_server
http://searchnetworking.techtarget.com/sDefinition/0,,sid7_gci211814,00.html
http://www.intel.com/products/glossary/body.htm
http://en.wikipedia.org/wiki/Protocol_(computing)
http://en.wikiepdia.org/wiki/Broadcast_domain
http://en.wikiepdia.org/wiki/Intranet
http://www.erg.abdn.ac.uk/users/gorry/course/lan-pages/nic.html
http://en.wikipedia.org/wiki/Router
http://www.webopedia.com/TERM/T/terminator.html
http://www.tech-faq.com/plenum-cable.shtml
http://en.wikipedia.org/wiki/Block_code
http://en.wikipedia.org/wiki/Plenum
http://en.wikipedia.org/wiki/MAC_address
http://en.wikipedia.org/wiki/Network_bridge
http://www.point2pointtech.com/
http://en.wikipedia.org/wiki/Late_collision
http://www.webopedia.com/TERM/M/MAU.html
http://www.tcpipguide.com/free/t_SimplexFullDuplexandHalfDuplexOperation.htm
http://compnetworking.about.com/cs/rasandmodems/g/bldef_baud.htm
http://en.wikipedia.org/wiki/Bit_rate
http://www.ethermanage.com/ethernet/10quickref/ch5qr_6.html
http://en.wikipedia.org/wiki/Decimal
http://en.wikipedia.org/wiki/Fast_ethernet
http://en.wikipedia.org/wiki/Attachment_Unit_Interface
http://compnetworking.about.com/od/networkprotocols/l/bldef_packet.htm
http://compnetworking.about.com/od/speedtests/g/bldef_bandwidth.htm
http://compnetworking.about.com/cs/internetworking/g/bldef_repeater.htm
http://compnetworking.about.com/od/workingwithipaddresses/g/bldef_octet.htm
http://compnetworking.about.com/od/basicnetworkingconcepts/l/bldef_port.htm
http://en.wikipedia.org/wiki/Transmission_Control_Protocol
http://en.wikipedia.org/wiki/Internet_Protocol
http://en.wikipedia.org/wiki/File_Transfer_Protocol
http://en.wikipedia.org/wiki/Logical_address
http://en.wikipedia.org/wiki/Domain_name_system
Monday, November 26, 2007
Moduel B Assignment #4
Layer 7 is known as the application layer. It supports the application and the end-user processes. All the things in this layer are application-specific. This layer provides application services used in the transferring on files, e-mails, and other things the network software used. user authentication and privacy are considered for this particular layer. Another part of this layer are the tiered application architectures.
Layer 6 is known as the presentaion layer also known as the syntax layer. It provides independence from the differences in the data representation. This happens by translating from application to the network format, and the other way around. Also this particular layer formats data to be sent across networks, which provides freedom from compatibility problems that could arise.
Layer 5 is known as the session layer. It establishes, manages, and terminates the connections between applications. This layer sets-up, corrdinates, and terminates any conversation, exchanges and dialogues that might have happened between the applications. Also in this layer session and connection corrdination are delt with.
Layer 4 is known as the transport layer. In this layer the transparent layer or data between the systems are provided. This layer makes sure there is a complete data transfer between the systems.
Layer 3 is known as the network layer. In this layer there is the switching and routing of technologies. It creates logical paths that allows transmittion of data from node to node. Other functions of this layer are the routing and forwarding, addressing, internetworking, error handleing, and congestion control/ packet sequencing.
Layer 2 is known as the data link layer. All the data packets that have been sent to a system are encoded and decoded into bits. It is divided into two different sublayers: The Media Access Control- the sublayer that controls how a computer will gain access to a network's data and how is can get permission to tansmit that data. The Logical Link Layer- the sublayer that controls the flow control and error checking of a system's network.
The final layer is layer 1 which is known as the physical layer. In this layer there is the conveying of the bit stream (electrical impules, light/radio signals). This happens through the network at a electrical or mechanical level. This layer provides the hardware of sending and recieving of data by use of a carrier. Some examples of protocols with the physical layer compenents are: Fast Ethernet, RS232 and ATM.
Ethernet is relevent to OSI by how it defines a number of wiring/ signaling standards from the physical layer(Layer1). This happens by the means of a network access at the MAC/ Data Link Layers (Layer 2), also through a common address format.
Bibliography
http://en.wikipedia.org/Ethernet
http://en.wikipedia.org/wiki/Open_Systems_Interconnection
http://www.webopedia.com/quick_ref/OSI_Layers.asp
Thursday, November 1, 2007
Module B- Assignment 2
Part A:
Police Radio Jammer- Blocks signal from police radar guns and also, unintentionally blocks signal from wireless networks.Signal Jammers- Used in hospitals to ensure that if a cell phone goes off it won't interfere with a procedure that is going on.
Concrete Blocks- Blocks signals because of its thickness, used for constructing concrete walls, such as walls of schools or in basements.
Microwaves- Particles that are emitted from the microwave can cause a computer's signal to be disconnected.
Part B:
Signal Jammers: To avoid a signal jammer's EMI you have to move away from it. Its not going to stop jamming signals just for you.
Police Radio Jammers: To avoid a police radio jammer's EMI you would have to turn it off. But doing so you risk getting caught for speeding by the police.
Concrete Blocks: To avoid a concrete block's EMI you would have to either re-build the wall with concrete blocks and use something that isn't going to emit EMI or by a signal booster.
Microwaves: To avoid a microwave's EMI you have to move the router that is connected between the computer and the microwave. So that the microwave's emmitted particles wouldn't interfere with the computer's wireless signal.
Tuesday, October 30, 2007
Lab Log Entry #4
Binary Numeral System: a numeral system that uses 0 and 1 to represent numeric values. (used in the internal device in a computer to communicate with each other)
Decimal Numeral System: a numeral system that is the most commonly used among humans. It is a numeral system that has 10 in its base. It consists of the numbers 1-9.
Hexadecimal Numeral System: a numeral system that has a base 16. Uses the numbers 0-9 and the letters A-F to help humans understand the Binary system in computers. (Acts a shorthand for the Binary Numeal System)
The differences between these three numeral systems are: the binary system only uses numbers for the internal devices in the computer to communicate; humans don't actually see the binary systme in action all they see is the communications between the devices or computers. The other two systems use bother numbers and letters to help a human understand what the computer is doing. The hexadecimal system uses a 16 base, Decimal uses a 10 base and the binary system uses the numbers 0 and 1 to communicate between internal drives in a computer. The only system that humans really understand is the Decimal system, only because they use it in everyday life. They might be able to understand the Hexadecimal system but that would only happen if they knew all the shorthands to the Binary system.
Part B:
Base 2 and Base 10 are similar to each other in many different ways. Both use the same numbers(or ones up to 9) to help a computer to understand its transistors. Both are most commonly used in computers today. Base 10 is the most common among humans as it is the numbers that humans use to write out mathematics, while Base 2 is used in the human's computers to help the internal drives to communicate with each other.
The Binary System has developed throughout the history of the modern PC. The full sets of trigrams and hexagrams are a part of western geometry of today. Francis Bacon said that the letters of the alphabet should be shortened into the binary code. In 1937 Claude Shannon was working on revamping the Boolean algebra from 1854 and said that the binary system and binary arithmatic should be used electronically and be used in electronic switches in modern PC's.
The intellectual importance of the binary system is that the more people use the binary system they see the fact taht there needs to be a method of logic for the binary system. By using two different symbols for the binary system there is more ways of representing devices in the PC, and how they work together or how they communicate within the computer's hard drive. The binary system is more or less is a language for a computer. It helps a computer's internal drives to communicate with each other and with other computers using this "special" language that was created just for their use.
Part C:
Time: 1:23 p.m. = 0011 0001 0011 1010 0011 0010 0011 0011 0111 0000 0110 1101
Bibliography:
1) http://wikipedia.com/wiki/Binary_numeral_system
2) http://wikipedia.com/wiki/Decimal
3) http://wikipedia.com/wiki/Hexadecimal
Tuesday, October 23, 2007
Module B Assignment #1- Assignment #2
MS-DOS was invented in the 1970's. It was used in some of the earliest computers. There were a lot of different volumes of software available to use in DOS. In the 1980’s DOS became the huge in the market of operating systems. Eventually MS-DOS would become the most popular operating system to be used in consumer and business PC’s. Microsoft designed this operating system in hopes that it would make it big in the industry of operating systems for PC’s. You could do pretty much anything with DOS. The users didn’t have to memorise many commands for this operating system because there weren’t very many to begin with. When you start to understand this operating system then you would be set for life, unless you decided to change operating systems and then this operating system probably wouldn’t be much help to you. MS-DOS was replaced by the Macintosh Operating Systems.
There are many strengths and weaknesses to using the MS-DOS operating system. One strength is the reliability of the system. The programs ran well with little crashes or lockups. The stability of this operating system was another one of its strengths. Even with the prompt of this operating system wasn’t elegant, once you understood the commands that you used frequently it wasn’t very difficult to understand the rest of the operating system. A third strength of this operating system is the filter of chains onto the computer. This operating system could only operate one thing at a time, which saved the user from having too many distractions while they were working on the computer.
Some weaknesses of the MS-DOS are as followed:
-It could only load one program at a time. If the user wanted to use a different program then the one they were working on they would have to close down the first program and then open up the other one.
-It could only support one user and could only use a single processor. Only one owner could be able to log onto the computer. No one else could, there were no other users allowed on the computer.
-It could not handle large amounts of RAM. It was designed to be used with 640 KB of RAM. If the user had more RAM on the computer they would have to use utilities for the computer to work properly. But eventually the MS-DOS was able to handle 1 MB of RAM without any problems.
-Some users might find it hard to memorise the keys to press to use the computer. This operating system was to be used with key strokes and function keys, not a keyboard like the operating systems today.
A unique feature of this operating system is how it can restore data from the internal hard drive of a computer in the event that a computer crashes. Even though it doesn’t have a great RAM, it is still able to store the most important things that a user needs to use.
I think that when this operating system was in use many people enjoyed it, once they understood the key and commands. But today I think that it is great that the operating systems have changed. MS-DOS sounds a little to confusing for my mind. But in the early days this was one of not many operating systems that people had to work with. This operating system was a big hit when it was first invented, but now I am so glad that we don’t need to use it, you wouldn’t be able to use a normal keyboard and you had to memorise everything that was needed to be used for typing or formatting your computer. Now it was a good operating system but I don’t think that I would ever use it.
Lab Log Entry #3
3) I think that no one ever has enough storage on their computer because, everything they put onto the computer uses up some of that storage. When they put more and more things onto the computer the storage space is taken up. People always want more things on their computers. Whether it be more games or programs to enhance their computers. Maybe one day in the future someone will come up with a way for the average PC to have enough storage space for the average person. But I don't think we have reached that point in history quite yet. You can put more storage space onto your computer by the amount of RAM is in your computer. If someone invents a new RAM that has enough storage space then everyone will have enough storage space on their computer to meet their computing needs and desires.
Wednesday, October 10, 2007
Lab Log Entry #2
For someone who doens't know the language of comupters it would be hard to work with them for many reasons. For one they wouldn't have the slightest clue what you were talking about or what you were saying to them. If you asked them to go and do something for you they might do it wrong or be lost and completely wreck whatever it is you asked them to do. If they are to fix a comupter and they don't know the language, you could tell them what to do and they wouldn't be able to do it or else they would do it and grab the wrong thing or grab the right thing and put it in the wrong spot and screw up the computer.
To help out a non-techie person I think that I would have to explain what each thing is before we start. I would have to tell the non-techie person what each word means (or at least the words that I would be using) and what it is. It would take a lot of time though. But with a lot of patience and a lot of explanations, I think that the language barrier wouldn't be that bad. Also if the person did know some of the language then all the better, it wouldn't take that much time and I would be able to help them out faster.
Tuesday, October 9, 2007
Assignment #5
USB: Using an USB cord you can connect external devices to the computer to either transfer or input data onto the computer. As well it is possible to output data onto the device using the USB port.
Strengths: Can carry any kind of data; radio, television, music, etc., can carry small electrical charges that can power many things that usually would have to be powered by batteries, the connectors are designed to not break; there are not any pins on the sides of them to make them break easily.
Weaknesses: Can transfer viruses from one computer to another computer or to external devices linked by a USB cord, and the physical connectors are troublesome because there are many different sizes of USB connectors and not all of them fit every device/ computer.
Parallel: a port that is a type of socket found on PC's for interfacing various peripherals.
Strengths: none they are out of date
Weaknesses: has a lack of true bidirectional capability, faster than serial ports but slow to modern standards, and expensive.
SCSI: (Small Computer System Interface)- a set of standards which physically connects and transfers data between computers and peripheral devices.
Strengths: Its support for a large number of devices on the bus, can handle up to 160MBps in data transmissions, and any device can use SCSI.
Weaknesses: The bus width, transfer modes and signalling modes, and the cable length.
Firewire: A very fast external bus that supports data transfer rate up to 400 MBps.
Strengths: One of the fastest peripheral devices developed, can move large amounts of data between computers and peripheral devices, and it enables an easy connection of digital consumer products.
Weaknesses: Space constraints and compatibility
Wednesday, September 26, 2007
Assignment #4
- "Blue screen of Death" indicates that you might have a problem with your RAM
- You turn on your computer and nothing happens
- Internet doesn't work
- Pop ups that say you have a virus when your computer doesn't have one
- When your software doesn't work on your computer
- Older games won't load onto newer versions of Windows
- Mouse freezes when moving to the left.
- The task bar has disappeared
- The system has messages that say you don't have enough memory
- Your keyboard beeps when you press the buttons
Part 2:
Pop ups say you have a virus:
Identify the problem- ask the customer what has gone wrong. Have they done anything new to the computer recently? Ask questions about what has been going on with the computer. Ask them if they actually have a virus on their computer.
Re-create the problem- Get the customer to repeat every action that they have taken with their computer to help you re-create the problem onto another computer.
Isolate the cause- Eliminate factors that didn't have anything to do with the problem.
Formulate a correction- Figure out one or more solutions to the problem.
Apply the correction- Apply your solution to the problem.
Test the solution- When you apply the correction and nothing changes then you will have to go back and try to figure out if there is a different problem with the computer.
Document the problem and solution- Create a detailed record of the problem and solution that you have used.
Provide feedback- Ask the customer if your service has been good. Does the customer have any questions? If so then you must answer them in the best way you can think of.
Friday, September 21, 2007
Assignment #3
The "theory" of electricity states that electricity is the term used to describe the flow of an electrical charge.
A conductor is an object that electric current can easily pass through. An insulator is an object that electric current can not pass through easily.
Voltage potential is the difference of electrical potential between two points of an electric or electronic circuit.
The two most common voltages used in computer parts are 120 volts and 230 volts. Current is the flow if electric charge.
The 1-10-100 rule is the cost to repair a defect increases exponentially the later in development lifecycle that is identified.
You calculate the amount of current through a circuit by using an ammeter to find the current and then using the formula I=V/R (Current = Voltage divided by Resistance.
The difference between AC and DC is AC current can change its direction where DC current can not.
The relationship between electric power and energy: electric power is the rate where electrical energy is transferred.
Resistance is a measure in which the degree of passing electric current changes into heat. Impedance is just like resistance but it happens in Alternating Current.
The human body’s resistance capability is 0.1A before it becomes fatal.
5 safety precautions for avoiding electric shock are: make sure your equipment is turned off before moving it, keep your tools and other equipment insulated, make sure all the equipment you are using is grounded before using, make sure you are grounded before working on anything, and make sure all the equipment is well covered that you are using.
Static Electricity is the build up of electrons on an object. It can be very dangerous to people because it can cause a heart attack and it can wipe out a computer with the static jump.
5 ways to prevent static discharge are: use hand moisturisers on a regular basis, wear a metal thimble and make sure it is always in contact with your skin, wear leather shoes, carry a coin and use it to touch metal, wear a grounded wrist band-you will never build up a charge.
5 ways to prevent static build-up are: don’t wear wool, don’t drag your feet while walking on carpet, don’t wear rubber shoes, use dryer sheets, and keep the air in the room you are working in humid.
2 things that are found in an ESD-prevention kit are: a rubber mat to work on and a grounding wire strap for your wrist.
The job of the PC’s power supply is to covert Alternating Current into Direct Current for computer use.
Specific Power Supply requirements for:
Motherboard- 240V-300V
Memory- 5-10 watts
CPU- 45 watts
Hard Drive- 1 amp of +12v
CD ROM drive- 360 watts
Floppy drive- 10-20 watts
The motherboard is the component that the power light goes on when it is started up. It is important because then the computer has power for all the components to work and think and make the computer work.
Different Power Connectors:
Molex- most common power connector, 4-pin connector
Berg- used to connect the floppy disk to the power supply, 4-pin connector
ATA-connected to the power supply and connects to serial connectors, 4-pin connector
Bibliography:
http://en.wikipedia.org/wiki/Electricity
http://hyperphysics.phy-astr.gsu.edu/hbase/electric/conins.html
http://en.wikiepdia.org/wiki/Voltage
http://en.wikipedia.org/wiki/Power_supply
http://searchsmb.techtarget.com/sDefinition/0,,sid44_gci21181,00.html
http://en.wikipedia.org/wiki/Electric_current
http://blog.softwareproject.org/the-110100.rule-6.html
http://en.wikipedia.org/wiki/Alternating_current
http://en.wikipedia.org/wiki/Electric_power
http://en.wikidepia.org/wiki/Resistanc
http://www.newton.dep.anl.gov/askasci/phy00/phy00367.htm
http://www.bbc.co.uk/dna/h2g2/A6378744
http://computer.howstuffworks.com/power-supply.htm
Friday, September 7, 2007
Assingment #1
In 1936, the first freely programmable computer was invented by Konrad Zuse. It was called the Z1 computer. Also invented in 1963 was the first keyboard, called the Dvorak keyboard. In 1937 John Vincent Atanasoff and Clifford Berry started to work on their ABC computer. 1938 was the year that the Hewlett Packard company created the first printer, the HP 200A. In 1941 Konrad Zuse finished his Z3. The Harvard-MARK 3 was invented in 1949. Electric Controls Company- first computer company- was founded by J. Persper Eckert and John Mauchly in the same year as the Harvard-MARK 3 was invented. Doug Englebart invented the first computer mouse in 1963. In 1969, Gary Starkweather invented the first laser printer. 1981 was the year that Hewlett-Packard super-chip, the first 32-bit, was introduced to the world. Adobe was invented in 1982. The first search engine was founded in 1990, it was called Archie. In 2005 Microsoft introduced Windows XP.
Bibliography:
http://www.computerhope.com/history/2000.htm