Skip to main content

Interesting Computer Facts I Bet You Didn’t Know



1. Another name for a Microsoft Windows tutorial
is ‘Crash Course’!

2. Bill Gates house was designed using a
Macintosh computer.

3. By the year 2012 there will be approximately
17 billion devices connected to the Internet.

4. Domain names are being registered at a rate of
more than one million names every month.

5. E-mail has been around longer than the World
Wide Web.

6. In the 1980s, an IBM computer wasn’t

considered 100% compatible unless it could
run Microsoft Flight Simulator.

7. MySpace reports over 110 million registered
users. Were it a country, it would be the tenth
largest, just behind Mexico.

8. One of every 8 married couples in the US last
year met online.

9. The average 21 year old has spent 5,000 hours
playing video games, has exchanged 250,000 e-
mails, instant and text messages and has spent
10,000 hours on the mobile phone.
10. The average computer user blinks 7 times a
minute, less than half the normal rate of 20

11. The first computer mouse was invented by
Doug Engelbart in around 1964 and was made
of wood.

12. The first domain name ever registered was
Symbolics.com.

13. The world’s first computer, called the Z1, was
invented by Konrad Zuse in 1936. His next
invention, the Z2 was finished in 1939 and was
the first fully functioning electro-mechanical
computer.

14. There are approximately 1,319,872,109 people
on the Internet.

15. There are approximately 1.06 billion instant
messaging accounts worldwide.

16. While it took the radio 38 years, and the
television a short 13 years, it took the World
Wide Web only 4 years to reach 50 million
users.

17. 20.70% of virus writers work under contract
for organized crime syndicates.

18. Country with the highest percentage of net
users is Sweden (75%).

19. The first popular web browser was called
Mosaic and was released in 1993.

20. Amazon, originally a printed book seller
company, now sells more e-books than printed
books.

21. The first two video games copyrighted in the
U.S. were Asteroids and Lunar Lander in 1980.

22. U.S. President Bill Clinton’s inauguration in
January 1997 was the first to be webcast.

23. Google uses an estimated 15 billion kWh of
electricity per year, more than most countries.
However, Google generates a lot of their own
power with their solar panels.

24. Up until the 14th of September, 1995, domain
registration was free.

25. Every minute, 10 hours of videos are uploaded
on YouTube.

26. Over 6,000 new computer viruses are released
every month.

27. The first computer mouse, constructed in
1964, was made out of wood.

28. With it’s 800 million interent users, Facebook
would be the third largest country in the
World.

29. The first hard drive was created in 1979 and
could hold 5MB of data.

30. If history had been tweaked slightly, it’s
possible that we would all be sitting in cubicles
with weird headpieces attached to our faces.

Comments

Popular posts from this blog

CIA Triad for- Base of Information security

The essential security principles of confidentiality, integrity, and availability are often  referred to as the  CIA Triad. All security controls must address these principles. These three  security principles serve as common threads throughout the CISSP CBK. Each domain  addresses these principles in unique ways, so it is important to understand them both in  general terms and within each specific domain: Confidentiality is the principle that objects are not disclosed to unauthorized subjects. Integrity is the principle that objects retain their veracity and are intentionally modified by  authorized subjects only. Availability is the principle that authorized subjects are granted timely access to objects  with sufficient bandwidth to perform the desired interaction. Different security mechanisms address these three principles in different ways and offer varying  degrees of support or application of these principles. Objects must be properly classified

List of Company Slogans

·          3M : "Innovation" ·          Agere Systems : "How Communication Happens" ·          Agilent : "Dreams Made Real" ·          Airbus : "Setting the Standards" ·          Amazon.com : "…and You're Done" ·          AMX : "It's Your World. Take Control" ·          Anritsu : "Discover What's Possible ·          AT&T : "Your World. Delivered" ·          ATG Design Services : "Circuit Design for the RF Impaired" ·          ATI Technologies : "Get In the Game" ·          BAE Systems : "Innovating for a Safer World" ·          Ball Corporation : "The Leader in Small Space and Rocket Systems" ·          BellSouth : "Listening, Answering" ·          Blackhawk : "Powering DSP Development" ·          Boeing : "Forever New Frontiers" ·          Bose Corporation : "Better Sound Through Research" ·          Bowers & Wil

My Article :- હેકર બનવું છે? કઈ રીતે?

મારી ૨ વર્ષ ની કારકિર્દી માં મને કેટલાય  લોકોએ, ખાસ કરીને કોલેજ ના વિદ્યાર્થીઓએ ઘણી વાર પૂછ્યું છે કે "મારે હેકર બનવું છે. તો હું શું કરું? " અને મારા બ્લોગ્સ માં પણ પૂછવામાં આવે છે કે એક સારો હેકર કઈ રીતે બની શકાય? એવું હું શું કરું અથવા તો મારા માં કઈ લાયકત હોવી જોઈએ એક હેકર બનવા માટે? આ પ્રશ્ન નો સંતોષકારક જવાબ આપવા માટે મેં internet પર શોધખોળ કર્યા પછી મને જે કઈ માહિતી મળી તેને હું આજે અહી રજુ કરું છું. મિત્રો, સૌપ્રથમ હેકર કઈ રીતે બનવું એ જાણવા પહેલા એ જાણવું જરૂરી છે કે ખરેખર હેકિંગ શું છે ? અને હેકર કોને કહેવાય. હેકિંગ ની સીધી અને સરળ વ્યાખ્યા નીચે મુજબ છે.  "તમારા કમ્પ્યુટર,નેટવર્ક(ઈન્ટરનેટ કે LAN દ્વારા) કે કોઈ ડીવાઈસ માં (ફોન, ટેબ્લેટ) માં કરવામાં આવતા ગેરકાયદેસર પ્રવેશ અને ઉપયોગ એ હેકિંગ કહેવાય છે."અને હેકિંગ કરતા લોકોને હેકર કહેવાય છે. હવે તમને થશે કે આવું શું કામ કરવું જોઈએ? આ તો ક્રાઈમ છે. તો તમને જણાવી દઉં કે હેકર મુખ્યત્વે ૨ પ્રકારના હોય છે.    વાઈટ હેટ હેકર્સ (એથીકલ હેકર્સ) : ધારો કે તમે તમારો ફેસબુક નો પાસવર્ડ ભૂલી ગયા(ખરેખર ના ભૂલતા ક્યારેય..)કે ત