Appendix of CS and IT in Cyber Programming Tutorial

Appendix of CS and IT in Cyber Programming Tutorial

In  this  cyberpointsolution tutorial we are going to describe about the Some important abbreviations of computer science   . And also we will describe each and every scientist and discoveries .This is the best handbook of cs and it When ever we want to learn any thing the things become more earlier is somebody/tutorial/study material taught us through Examples. Here we have tried to describe each and every concept of appendix of cs and it in cyber programming tutorial  with examples in the light of cyberpointsolution.com  best  Short tutorial using simple and best possible example. These examples are so simple that even a beginner This is  the best  tutorial/Study Material  very beneficial for beginners  as well as Professional.

Famous Scientists and their Discoveries

  • Wil Vander Aalst Business process management, process mining
  • Hal Abelson Intersection of computing and teaching
  • Serge Abiteboul Database theory
  • Samson Abramsky Game semantics
  • Leonard Adleman RSA, DNA computing
  • Frances E Allen Compiler optimization
  • Gene Amdahl Supercomputer developer, founder of Amdahl Corporation
  • Bruce Arden Programming language compilers (GAT, MAD), virtual memory architecture, MTS
  • John Vincent Atanasoff Computer pioneer
  • Ali Aydar Computer scientist and CEO of Sporcle
  • Charles Babbage Invented first mechanical computer
  • Rojand Carl Backhouse Mathematics of program construction
  • John Backus FORTRAN, Backus-Naur form, first complete compiler
  • Rudolf Bayer B-tree
  • Steven M Bellovin Network security
  • Tim Berners-Lee World Wide Web
  • Daniel j Bernstein Qmail, software as protected speech
  • Manuel Blum Cryptography
  • Barry Boehm Software engineering economics, spiral development
  • George Boole Boolean logic
  • Bert Bos Cascading Style Sheets
  • Jonathan Bowen Z notation, formal methods
  • David j Brown Unified memory architecture, binary compatibility
  • Per Brinch Hansen Concurrency
  • sjaak Brinkkemper Methodology of product software development
  • Tracy Camp Wireless computing
  • Tinton Cerf Internet, TCPJ1P
  • Peter (lien Entity-relationship model, data modeling, conceptual model
  • Edgar F Codd Formulated the database relational model
  • Stephen Cook NP-completeness
  • James Cooley Fast Fourier Transform (FFT)
  • Seymour Cray Cray Research, supercomputer
  • Andries van Dam Computer graphics, hypertext
  • Christopher j Date Proponent of database relational model
  • Richard DeMillo Computer security, software engineering, educational technology
  • Dorothy E Denning Computer security
  • Vinod Dham P5 Pentium processor
  • Whitfield Diffie Public key cryptography, Diffie-Hellman key exchange,
  • Edsger Dijkstra Algorithms, Goto considered harmful, semaphore
  • Susan Dumais Information Retrieval
  • Brendan Eich JavaScript, Mozilla
  • Philip-Emeagwali Supercomputing
  • Douglas Engelbart Tiled windows, hypertext, computer mouse
  • Don Fstridge Led development of original IBM Personal Computer (PC) known as father of the IBM PC
  • Oren Et Toni MetaCrawler, Netbot
  • David C Evans Computer graphics
  • Edward Felten Computer security
  • Tommy Flowers Colossus computer
  • Robert Floyd NP-completeness
  • Michael Garey NP-completeness
  • Seymour Ginsburg Formal languages, automata theory, AFL theory, database theory
  • Kurt Godel Computability – not a computer scientist per se, but his work was invaluable in the field
  • Adele Goldberg Smalitalk
  • Ian Goldberg Crwtographer, off-the-record messaging
  • Oded Goldreich computational complexity theory
  • Shari Goldwasser Cryptography, computational complexity theory
  • Gene Golub – Matrix computation
  • Martin Charles Golumbic – Algorithmic graph theory
  • James Gosling Java
  • Paul Graham Via web. On Lisp, Arc
  • Susan L Graham Compilers, programming environments
  • Jim Gray Database
  • Sheila Greibach Greibach normal form, AFL theory
  • Ramanathan T Guha RDF, Netscape, RSS, Epinions
  • Neil j Gunther Computer performance analysis, capacity planning
  • Peter G Gvarmati Adaptivity in operating systems and networking
  • Richard Hamming Hamming code, founder of the Association for Computing Machinery
  • Juris Harnnanis Computational complexity theory
  • Martin Hellman Encryption
  • James Hendier Semantic Web
  • John L Hennessy Computer architecture
  • Danny Hillis Connection Machine
  • CAR Hoare Logic, rigor, Communicating sequential processes (CSP)
  • John Henry Holland Genetic algorithms
  • John Hoperoft Compilers
  • David A Huffman Huffman coding, used in data compression.
  • Watts Humphrey Personal Software Process (PSP), Software quality, Team Software Process (TSP)
  • Ivar Jacobson Unified Modeling Language, Object Management Group
  • Cliff Jones Vienna Development Method (VDM)
  • Robert E Kahn TCP/IP
  • Avinash Kak Digital image processing
  • Richard Karp NP-completeness
  • Marek Karpinski NP optimization problems
  • Carl Kesselman Grid computing
  • Stephen Cole Kleene Kleene closure, recursion theory
  • Leonard Kleinrock ARPANET, queueing theory, packet switching hierarchical Routing
  • Andrew Koenig C-1
  • Andrey Nikolaevich Kolmogorov Algorithmic complexity theory
  • Robert Kowalski Logic programming
  • John Koza Genetic programming
  • Leslie Lamport Algorithms for distributed computing, LaTeX
  • Manny M Lehman Laws of Software Evolution
  • Max Levchin Gausebeck-Lechin Test and PayPal
  • Leonid Levin Computational complexity theory
  • Richard j Lipton Computational complexity theory
  • Barbara Liskov Programming languages
  • Paul Mockapetris Domain Name System (DNS)
  • Cleve Mole Numerical analysis, MATLAB
  • Edward F Moore Moore machine
  • Gordon Moore Moore’s law
  • Hans Moravec Robotics
  • Mark Overmars Game programming
  • David Parnas Information hiding, modular programming
  • Yale Pact Instruction-level parallelism, speculative architectures
  • David John Pearson CADES, computer graphics
  • Alan Perlis Programming Pearls
  • Radia Perlman Spanning tree protocol
  • Simon Peyton Jones Functional programming
  • William H Press Numerical algorithms
  • Michael 0 Rabin Nondeterministic machines
  • Dragomir R Radev Natural Language Processing, Information Retrieval
  • Brian Randell Dependability
  • Joyce K Reynolds Internet
  • Dennis Ritchie C (programming language), UNIX
  • Ron Rivest RSA, MD5, RC4
  • Colette Rolland REMORA methodology, meta modeling.
  • Douglas T Ross Structured Analysis and Design Technique
  • Winston W Royce Waterfall model
  • Rudy Rucker Mathematician, writer, educator
  • James Rumbaugh Unified Modeling Language, Object Management Group
  • Carl Sassenrath Operating systems, programming languages, Amiga, REBOL
  • Mahadev Satyanarayanan File systems, distributed systems, mobile computing, pervasive computing
  • Ben Shneiderman Human-computer interaction, information visualization
  • Larry Stockmeyer Computational complexity, distributed computing
  • Stonebraker Relational database practice and theory
  • Olaf Storaasli Finite element machine, linear algebra, high performance computing
  • Christopher Strachey Denotational semantics
  • Madhu Sudan Computational complexity theory, coding theory
  • Bert Sutherland Graphics, Internet
  • Andrew S Tanenbaum Operating systems, MINIX
  • Avie Tevanian Mach kernel team, NeXT, Mac OS X
  • Linus Torvalds Linux kernel, Git
  • Godfried Toussaint Computational geometry computational music therory
  • Joseph F Traub Computational complexity of scientific problems
  • Murray Turoff Computer-mediated communication
  • Alan Turing British computing pioneer, Turing Machine, algorithms, cryptology, computer architecture.
  • Jeffrey D Ullman Compilers, databases, complexity theory
  • Leslie Valiant Computational complexity theory, computational learning theory
  • David Wagner Security, cryptography
  • Manfred K Warmuth Computational learning theory

 

Some Recent Inventions

Equipment Name

Created By

 

The Stark Hand

 

Mark Stark

 

The PrintBrush Alex Breton

 

Dynamic Eye Sunglasses Chris Mullin

 

The Bed Bug Detective

 

Chris Goggin
The Medical Mirror

 

Ming-net Pol)

                       Intel 805xx Processor series

Product code

Marketing name(s)

Codename(s)

80500 Pentium P5 (A-step)
80501 Pentium P5
80502 Pentium P54C, P54CS
80503 Pentium with MMX Technology P55C, Tillamook
80521 Pentium Pro P6
80522 Pentium II Klamath
80523 Pentium II, Celeron, Pentium II Xeon Deschutes, Covington, Drake
80524 Pentium II, Celeron Dixon, Mendocino
80525 Pentium III, Pentium III Xeon Katmai, Tanner
80526 Pentium III, Celeron, Pentium III Xeon Coppermine, Cascades
80528 Pentium 4, Xeon Willamette (Socket 423), Foster
80529 Celeron Timna (canceled)
80530 Pentium III, Celeron Tualatin
80531 Pentium 4, Celeron Willamette (Socket 478)
80532 Pentium 4, Celeron, Xeon Northwood, Prestonia, Gallatin
80533 Pentium III Coppermine (cD0-step)
80535 Pentium M, Celeron M 310-340 Banias
80536 Pentium M, Celeron M 350-390 Dothan
80537 Core 2 Duo T-series, Celeron M 5xx Merom
80538 Core Solo, Celeron M 4xx Yonah
80539 Core Duo, Pentium Dual-Core T-series Yonah
80541 Itanium Merced
80546 Pentium 4, Celeron D, Xeon Prescott (Socket 478), Nocona, Irwindale, Cranford, Potomac
80547 Pentium 4, Celeron D Prescott (LGA775)
80550 Dual-Core Xeon 71xx Tulsa
80551 Pentium D, Pentium EE, Dual-Core Xeon Smithfield, Paxville DP
80552 Pentium 4, Celeron D Cedar Mill
80553 Pentium D, Pentium EE Presler
80555 Dual-Core Xeon 50xx Dempsey
80556 Dual-Core Xeon 51xx Woodcrest
80557 Core 2 Duo E-series, Dual-Core Xeon 30xx, Pentium Dual-Core E-series Conroe
80560 Dual-Core Xeon 70xx Paxville MP
80562 Core 2 Quad, Core 2 Extreme QX6xxx, Quad-Core Xeon 32xx Kentsfield
80563 Quad-Core Xeon 53xx Clovertown
80564 Xeon 7200 Tigerton-DC
80565 Xeon 7300 Tigerton
80569 Core 2 Quad Q9xxx, Core 2 Extreme QX9xxx, Xeon 3300 Yorkfield
80570 Core 2 Duo E8xxx Wolfdale
80573 Xeon 5200 Wolfdale-DP
80574 Core 2 Extreme QX9775, Xeon 5400 Yorkfield, Harpertown
80576 Core 2 Duo T9xxx, Core 2 Extreme X9xxx Penryn
80577 Core 2 Duo T8xxx Penryn-3M
80581 Core 2 Quad Q9xxx Penryn QC
80582 Xeon 74xx Dunnington
80583 Xeon 74xx Dunnington-QC
80584 Xeon X33x3 LV Yorkfield CL
80585, Core 2 Solo SU3xxx, Celeron 7xx 9xx Penryn-L
80586 Atom 2xx, N2xx Diamondville
80587 Atom 3xx DC Diamondville
80588 Xeon L3014, E3113 Wolfdale-CL
         

Intel 806xx Processor series

Product code

Marketing name(s)

Codename(s)

80601 Core i7, Xeon 35xx Bloomfield
80602 Xeon 55xx Gainestown
80603 Itanium 93xx Tukwila
80604 Xeon 65xx, Xeon 75xx Beckton
80605 Core i5-7xx, Core i7-8xx, Xeon 34xx Lynnfield
80606 canceled Havendale
80607 Core i7-7xx QM, Core i7-8xx QM, Core i7-9xx XM Clarksfield
80608 canceled Auburndale
80609 Atom Z6xx Lincroft
80610 Atom N400, D400, D500 Pineview
80611 canceled Larrabee
80612 Forest Xeon C35xx, Xeon C55xx Jasper
80613 Core i7-9xxX, Xeon 36xx Gulftown
80614 Xeon 56xx Westmere-EP
80615 Xeon E7-28xx, Xeon E7-48xx, Xeon E7-88xx Westmere-EX
80616 Pentium G6xxx, Core i3-5xx, Core i5-6xx Clarkdale
80617 Core i5-5xx, Core i7-6xxM/UM/LM Arrandale
80618 Atom E6x0 Tunnel Creek
80619 Core i7-3xxx Sandy Bridge-EP
80620 Xeon E5-24xx Sandy Bridge-EP-8, Sandy Bridge-EP-4
80621 Xeon E5-16xx, Xeon E5-26xx, Xeon E5-46xx Sandy Bridge-EP-8, Sandy Bridge-EP-4
80622 Sandy Bridge-EP-8
80623 Xeon E3-xxxx, Core i3/i5/i7-2xxx, Pentium Gxxx, Sandy Bridge-He-4, Sandy Bridge-M-2
80627 Core i3/i5/i7-2xxxM,
80631 Itanium 95xx Poulson
80632 Atom E6x5C Stellarton
80637 Core i5/i7-3xxx, Xeon-E3 Ivy Bridge
80638 Mobile Core i5/i7-3xxxM Ivy Bridge
80640 Atom Z24xx Penwell
80641 Atom D2xxx, Atom N2xxx Cedarview
80647 Core i5/i7 – 4xxx Haswell
80649 Xeon Phi Knight’s Corner
80650 Atom Z27xx Cloverview

 Generations of Programming Language

  • First generation programming language is pure machine code that is just ones and zeros, e.g.0011001110000101001
  • Second-generation programming languages are a way of describing Assembly code which you may have already met.
  • Third-generation programming languages brought many programmer-friendly features to code such as loops, conditionals, classes etc. This means that one line of third generation code can produce many lines of object (machine) code, saving a lot of time when writing programs.
  • Fourth-generation languages are designed to reduce programming effort and the time it takes to develop software, resulting in a reduction in the cost of software development. (SQL), languages to make reports (Oracle Reports) and languages to construct user interface (XUL)

Follow Us On Cyber Point Solution Youtube Channel : Click Here

Follow Us on Social Platforms to get Updated : twiter,  facebookGoogle Plus

Learn More Ethical Hacking and Cyber Security click on this link. cyber security

Leave a Reply

Your email address will not be published. Required fields are marked *