Home Common Problem What are computers divided into according to their working principles?

What are computers divided into according to their working principles?

Dec 07, 2020 am 10:24 AM
computer working principle

Computers can be divided into digital computers and analog computers according to their working principles. Digital electronic computers are the mainstream in the electronic computer industry in the world today. Their internal processing is an electrical signal called a symbolic signal or a digital signal. It has the characteristics of fast operation speed, high operation accuracy, and strong versatility. An analog computer is a computer that uses a continuously changing analog quantity as the object of calculation based on the principle of similarity; the analog computer uses electronic circuits to form the basic computing component.

What are computers divided into according to their working principles?

The operating environment of this article: Windows 7 system, Dell G3 computer.

Computer, commonly known as computer, is a modern electronic computing machine used for high-speed calculations. It can perform numerical calculations, logical calculations, and also has storage and memory functions. It is a modern intelligent electronic device that can run according to the program and process massive data automatically and at high speed.

Computers can be divided into digital computers and analog computers according to their working principles.

Analog computer

An analog computer is a computer that uses a continuously changing analog quantity as the object of operation based on the principle of similarity. Analog computers use electronic circuits as their basic computing components. It consists of computing components, control components, question setting boards, input and output devices, etc. The concept of simulation is included in the solution using the principle of similarity, so it is called an analog computer. It is based on parallel computing and has fast calculation speed. It appropriately combines arithmetic units with fixed functions, so the program is relatively simple, but the flexibility of problem-solving is relatively poor.

Analog electronic computers came out earlier. The electrical signals used internally simulate actual signals in nature, so they are called analog electrical signals. Analog electronic computers have poor accuracy in processing problems; all processing processes require analog circuits to realize, the circuit structure is complex, and the ability to resist external interference is extremely poor.

Digital computer

Digital electronic computers are the mainstream in the electronic computer industry in the world today. What they process internally is a type of electrical signal called symbolic signals or digital signals. Signal.

Its main feature is "discrete". There cannot be a third symbol between two adjacent symbols. Due to this difference in signal processing, its composition and performance are superior to analog electronic computers.

Features:

1. Fast operation speed

2. High operation accuracy

3. Strong versatility

4. Memory function and logical judgment function

5. Automatic control capability

Explanation:

Digital computers include giant, large, medium, small, micro and single-chip types, etc. Computers often refer to the last two.

Microcomputer is also called microcomputer or microcomputer. Supercomputer is mainly defined in terms of performance.

In the 1970s, computers with a computing speed of more than 10 million operations per second, a storage capacity of more than 10 million bits, and a price of more than 10 million U.S. dollars were internationally considered supercomputers; some people also regarded computers with a computing speed of more than 10 million times per second. An electronic computer that executes 10 million instructions per second and has a main memory capacity of several megabytes is used as a supercomputer.

In the 1980s, the standard for supercomputers was a digital electronic computer with a computing speed of more than 100 million times per second, a word length of 64 bits, and a main memory capacity of 4-16 megabytes. China's Galaxy Computer is a supercomputer.

For more knowledge about computer programming, please visit: Introduction to Programming! !

The above is the detailed content of What are computers divided into according to their working principles?. For more information, please follow other related articles on the PHP Chinese website!

Statement of this Website
The content of this article is voluntarily contributed by netizens, and the copyright belongs to the original author. This site does not assume corresponding legal responsibility. If you find any content suspected of plagiarism or infringement, please contact admin@php.cn

Hot AI Tools

Undresser.AI Undress

Undresser.AI Undress

AI-powered app for creating realistic nude photos

AI Clothes Remover

AI Clothes Remover

Online AI tool for removing clothes from photos.

Undress AI Tool

Undress AI Tool

Undress images for free

Clothoff.io

Clothoff.io

AI clothes remover

Video Face Swap

Video Face Swap

Swap faces in any video effortlessly with our completely free AI face swap tool!

Hot Tools

Notepad++7.3.1

Notepad++7.3.1

Easy-to-use and free code editor

SublimeText3 Chinese version

SublimeText3 Chinese version

Chinese version, very easy to use

Zend Studio 13.0.1

Zend Studio 13.0.1

Powerful PHP integrated development environment

Dreamweaver CS6

Dreamweaver CS6

Visual web development tools

SublimeText3 Mac version

SublimeText3 Mac version

God-level code editing software (SublimeText3)

Remote Desktop cannot authenticate the remote computer's identity Remote Desktop cannot authenticate the remote computer's identity Feb 29, 2024 pm 12:30 PM

Windows Remote Desktop Service allows users to access computers remotely, which is very convenient for people who need to work remotely. However, problems can be encountered when users cannot connect to the remote computer or when Remote Desktop cannot authenticate the computer's identity. This may be caused by network connection issues or certificate verification failure. In this case, the user may need to check the network connection, ensure that the remote computer is online, and try to reconnect. Also, ensuring that the remote computer's authentication options are configured correctly is key to resolving the issue. Such problems with Windows Remote Desktop Services can usually be resolved by carefully checking and adjusting settings. Remote Desktop cannot verify the identity of the remote computer due to a time or date difference. Please make sure your calculations

2024 CSRankings National Computer Science Rankings Released! CMU dominates the list, MIT falls out of the top 5 2024 CSRankings National Computer Science Rankings Released! CMU dominates the list, MIT falls out of the top 5 Mar 25, 2024 pm 06:01 PM

The 2024CSRankings National Computer Science Major Rankings have just been released! This year, in the ranking of the best CS universities in the United States, Carnegie Mellon University (CMU) ranks among the best in the country and in the field of CS, while the University of Illinois at Urbana-Champaign (UIUC) has been ranked second for six consecutive years. Georgia Tech ranked third. Then, Stanford University, University of California at San Diego, University of Michigan, and University of Washington tied for fourth place in the world. It is worth noting that MIT's ranking fell and fell out of the top five. CSRankings is a global university ranking project in the field of computer science initiated by Professor Emery Berger of the School of Computer and Information Sciences at the University of Massachusetts Amherst. The ranking is based on objective

What is SOL coin? How does SOL coin work? What is SOL coin? How does SOL coin work? Mar 16, 2024 am 10:37 AM

Solana Blockchain and SOL Token Solana is a blockchain platform focused on providing high performance, security and scalability for decentralized applications (dApps). As the native asset of the Solana blockchain, SOL tokens are mainly used to pay transaction fees, pledge and participate in governance decisions. Solana’s unique features are its fast transaction confirmation times and high throughput, making it a favored choice among developers and users. Through SOL tokens, users can participate in various activities of the Solana ecosystem and jointly promote the development and progress of the platform. How Solana works Solana uses an innovative consensus mechanism called Proof of History (PoH) that is capable of efficiently processing thousands of transactions.

What is the architecture and working principle of Spring Data JPA? What is the architecture and working principle of Spring Data JPA? Apr 17, 2024 pm 02:48 PM

SpringDataJPA is based on the JPA architecture and interacts with the database through mapping, ORM and transaction management. Its repository provides CRUD operations, and derived queries simplify database access. Additionally, it uses lazy loading to only retrieve data when necessary, thus improving performance.

What is VET coin? How does VET coin work? What is VET coin? How does VET coin work? Mar 16, 2024 am 11:40 AM

VET Coin: Blockchain-based IoT ecosystem VeChainThor (VET) is a platform based on blockchain technology that aims to enhance the Internet of Things (IoT) field by ensuring the credibility of data and enabling safe transfer of value. supply chain management and business processes. VET coin is the native token of the VeChainThor blockchain and has the following functions: Pay transaction fees: VET coins are used to pay transaction fees on the VeChainThor network, including data storage, smart contract execution and identity verification. Governance: VET token holders can participate in the governance of VeChainThor, including voting on platform upgrades and proposals. Incentives: VET coins are used to incentivize validators in the network to ensure the

What is SHIB coin? How does SHIB coin work? What is SHIB coin? How does SHIB coin work? Mar 17, 2024 am 08:49 AM

ShibaInu Coin: Dog-Inspired Cryptocurrency ShibaInu Coin (SHIB) is a decentralized cryptocurrency inspired by the iconic Shiba Inu emoji. The cryptocurrency was launched in August 2020 and aims to be an alternative to Dogecoin on the Ethereum network. Working Principle SHIB coin is a digital currency built on the Ethereum blockchain and complies with the ERC-20 token standard. It utilizes a decentralized consensus mechanism, Proof of Stake (PoS), which allows holders to stake their SHIB tokens to verify transactions and earn rewards for doing so. Key Features Huge supply: The initial supply of SHIB coins is 1,000 trillion coins, making it one of the largest cryptocurrencies in circulation. Low price: S

What is Polygon coin? How does Polygon coin work? What is Polygon coin? How does Polygon coin work? Mar 16, 2024 am 09:22 AM

Polygon: A multifunctional blockchain that builds the Ethereum ecosystem Polygon is a multifunctional blockchain platform built on Ethereum, formerly known as MaticNetwork. Its goal is to solve the scalability, high fees, and complexity issues in the Ethereum network. Polygon provides developers and users with a faster, cheaper, and simpler blockchain experience by providing scalability solutions. Here’s how Polygon works: Sidechain Network: Polygon creates a network of multiple sidechains. These sidechains run in parallel with the main Ethereum chain and can handle large volumes of transactions, thereby increasing overall network throughput. Plasma framework: Polygon utilizes the Plasma framework, which

What is Beam Coin? How does Beam Coin work? What is Beam Coin? How does Beam Coin work? Mar 15, 2024 pm 09:50 PM

Beam Coin: Privacy-Focused Cryptocurrency Beam Coin is a privacy-focused cryptocurrency designed to provide secure and anonymous transactions. It uses the MimbleWimble protocol, a blockchain technology that enhances user privacy by merging transactions and hiding the addresses of senders and receivers. The design concept of Beam Coin is to provide users with a digital currency option that ensures the confidentiality of transaction information. By adopting this protocol, users can conduct transactions with greater confidence without worrying about their personal privacy information being leaked. This privacy-preserving feature makes Beam Coin work. MimbleWimble protocol enhances privacy by: Transaction merging: It combines multiple transactions into