Computer Science

The first computer weighed more than 27 tons.
The World Wide Web was created by Sir Tim Burner Lee in 1989.
Every day, over 350,000 new computer viruses are released.
A 15-year-old once hacked NASA.
Alan Turing is considered as father of modern computer science.
As of January 2021 there were 4.66 billion active internet users worldwide.
The first programmer-Ada Lovelace was the daughter of Lord Byron.
Intel´s first microprocessor was intended for a calculator.
The first harddrive was introduced in 1956. It held 5 MB of data.
The first computer bug was an actual bug.
There are about 700 programming languages, including esoteric coding languages. Some sources that only list notable languages still count up to and impressive 245 languages.
92% of the world´s currency exists only on computers
The first computer virus was a creeper created in 1971. Creeper was actually designed as a security test to see if a self-replicating program was possible.
The first computer mouse prototype was built in 1964.
The word “Typewriter” is the longest word you can type using only one row of the keyboard.
Computers operate on what is called a “binary code.” All of the software that runs them is written using only 0’s and 1’s.
Nearly 85% of email sent daily are spam mail.
Once eleven students have been expelled from a school in southern California for allegedly hacking teachers´ computers and changing their grades.
ENIAC was the first electronic computer.
Charles Babbage originated the concept of a digital programmable computer.
The first domain name registered was It was registered March 15, 1985.
CAPTCHA stands for Completely Automated Public Turing test to tell Computers and Humans Apart.
The QWERTY layout was not designed to slow the typist down, but rather to speed up typing.
The first hard disk drive to break the border of 1 GB was IBM 3380, which could store 2.52 GB and it s price ranged from $81,000 to $142,200.
Computer system developed at MIT can tell whether the smile is fake or real.
The computer in your cell phone today is million times cheaper and a thousands times more powerful and about a hundred thousands times smaller than the one computer at MIT in 1965.
The Tandy TRS-80 Model I computer radiated so much interference that, while playing games, an AM radio placed next to the computer could be used to provide sounds.
Trojan horse is any malware that misleads users of its true intent.
At sign (@) is used in email because it gives meaning to e-mail addresses (for example, user (at) and it is also rarely used icon.
As of March 2021 there are 1589 top-level domains.
The first commercially available programming language was FORTRAN (FORmula TRANslation), developed in 1956.
The password for the computer controls of nuclear tipped missiles of the U.S was 00000000 for eight years.
Hard disks are so sensitive to vibration, that just screaming at them dimishes their performance.
In 1990 the first web browser was born. It was called WorldWideWeb and later renamed to Nexus.
Arpanet was the forerunner of the Internet as we know it today.
Rootkit enable access to a computer or an area of its software that is not otherwise allowed and often masks its existence or the existence of other software.
By publishing the first algorithm intended to be carried out by Babbages machine, Ada Lovelace became the first computer programmer.
Machine code is created by translating a program written in a programming language and its function is equivalent to that of a program.
In 1969, a professor at a university in Los Angeles tried to write LOGIN to a professor at a university in San Francisco, but he could only send “LO”. The internet collapsed as it tried to send the complex letter G.
The first computers had no operating system. Entering programs was done manually by flipping a switch or by pressing a button.
Multitasking allows simultaneous processing of multiple tasks in one moment. This means that we can run Photoshop, Word and the web browser at the same time.
The data on the disk must be stored via certain, precisely defined, predefined rules.
Cut/copy and paste function was developed in 1981 by Larry Tesler.
Linux runs on all of the top 500 supercomputers.
Computer vision tasks include methods extraction of high-dimensional data from the real world in order to produce numerical or symbolic information, e.g. in the forms of decisions.
A group of 12 engineers designed IBM and they were called as “The Dirty Dozen”.
Virtual reality systems use either virtual reality headsets or multi-projected environments to generate realistic images, sounds and other sensations that simulate a user´s physical presence in a virtual environment.
Artificial Neural network can be used to model complex relationships between inputs and outputs or to find patterns in data.
Quantum algorithms for certain problems have significantly lower time complexities than corresponding known classical algorithms.
In cloud storage the digital data is stored in logical pools, said to be on “the cloud”. The physical storage spans multiple servers.
Turing test or imitation game is a test of a machine´s ability to exhibit intelligent behaviour equivalent to, or indistinguishable from, that of a human.
In computer science, the complexity of a problem is the complexity of the best algorithms that allow solving the problem.
In database, there must be a software that interacts with end users, applications, and the database itself to capture and analyze the data.
Kolmogorov complexity of an object is the length of a shortest computer program that produces the object as output.
AI applications include advanced web search engines, recommendation systems, understanding human speech, self-driving cars, automated decision-making and competing at the highest level in strategic game systems.
Most modern CPUs are implemented on integrated circuit microprocessors, with 1 or more CPUs on a single-metal-oxide-semiconductor IC chip.
The microprocessor contains the arithmetic, logic, and control circuitry required to perform the functions of a commputer´s central processing unit.
Operating systems are found on many devices that contain a computer – from cellular phones and video game consoles to web servers and supercomputers.
Multiprocessing is the use of two or more central processing units within a single computer system.
Swarm Inteligence systems consist typically of a population of simple agents or boids interacting locally with one another and with their environment.
Randomized algorithm employs a degree of randomness as part of its logic or procedure.
Modern approaches to pattern recognition include the us of machine learning.