Verified Document

Turing Alan Turing Alan Turning Essay

This machine was also one of the first true computing machines, and its level of logical simplicity and mechanical complexity are evidence of Turing's supreme genius in this area (Ellsbury). Not only did this machine revolutionize cryptography, which in itself made a giant contribution to the world of computer science, it also provided a great deal of information that was used by the Allies in order to win the war (Wikiepedia; Ellsbury). The Bombe in and of itself, however, does not constitute Turing's single greatest achievement in the world of computer science or logic. This honor, without a doubt, belongs to the Turing Machine, which is not actually a mechanical device at all, or even a single machine (Hodges (a)). The Turing Machine is actually a description of infinitely man theoretical machines, which could be built to carry out a specified series of operation based on the reading, erasing, and printing of a paper strip. The machine would read information from the paper strip, and use this information to advance the strip and...

Parts of this document are hidden

View Full Document
svg-one

This theoretical device is essentially how a modern computer or computer program works, on different hierarchies.
Works Cited

Copeland, Jack. The Turing Archive. 2009. Accessed 14 October 2009. http://www.alanturing.net/turing_archive/archive/index/codebreakingindex.html#Enigma

Ellsbury, Graham. "The Enigma and the Bombe." 2007. Accessed 14 October 2009. http://www.ellsbury.com/enigmabombe.htm

Hodges, Andrew. The Alan Turing Home Page. 2009. Accessed 14 October 2009. http://www.turing.org.uk/turing/

Hodges, Andrew (a). "Alan Turing." The Stanford Encyclopedia of Philsopohy. http://plato.stanford.edu/entries/turing/#TurMacCom

Wikipedia. "Alan Turing." 2009. Accessed 14 October 2009. http://en.wikipedia.org/wiki/Alan_Turing

Sources used in this document:
Works Cited

Copeland, Jack. The Turing Archive. 2009. Accessed 14 October 2009. http://www.alanturing.net/turing_archive/archive/index/codebreakingindex.html#Enigma

Ellsbury, Graham. "The Enigma and the Bombe." 2007. Accessed 14 October 2009. http://www.ellsbury.com/enigmabombe.htm

Hodges, Andrew. The Alan Turing Home Page. 2009. Accessed 14 October 2009. http://www.turing.org.uk/turing/

Hodges, Andrew (a). "Alan Turing." The Stanford Encyclopedia of Philsopohy. http://plato.stanford.edu/entries/turing/#TurMacCom
Wikipedia. "Alan Turing." 2009. Accessed 14 October 2009. http://en.wikipedia.org/wiki/Alan_Turing
Cite this Document:
Copy Bibliography Citation

Related Documents

Computer Science Fundamentals Too Often the Mechanistic
Words: 1481 Length: 5 Document Type: Essay

Computer Science Fundamentals Too often the mechanistic are taken for granted in computer science. The technology has been around long enough now, that many take for granted the great powers that computers and computing technology has afforded modern man and his society. The fundamental characteristics of any successful endeavor should be investigated to help identify a pattern and produce learning and gather information. The purpose of this essay is identify and explain

Computer Science Choosing One's Major
Words: 2100 Length: 7 Document Type: Essay

As with other information technology jobs, outsourcing of software development to other countries may temper somewhat employment growth of computer software engineers. Firms may look to cut costs by shifting operations to foreign countries with lower prevailing wages and highly educated workers. Jobs in software engineering are less prone to being off shored than are jobs in other computer specialties, however, because software engineering requires innovation and intense research

Computer Science: Networking the Objective
Words: 2238 Length: 8 Document Type: Thesis

(Cisco, 2009) It is reported by Nortel that it has been indicated by 86% of service providers that there is a high demand for Ethernet services today. The result is that carriers are seeking to fulfill the demand through "upgrading their metro networks to deliver cost-effective Ethernet-based services to their customers." (2009) MPLS is stated to have been invented for the express purpose of "...of solving the problem of bridging

Computer Science Having Read Newman's Chapter 1,
Words: 370 Length: 1 Document Type: Term Paper

Computer Science Having read Newman's Chapter 1, would you consider the security requirements across all environments to be the same? Not all security requirements are the same in all network environments. Some systems are more vulnerable to the threat of viruses that permanently infiltrate the network's hardware, other to worms that do not permanently damage the hardware but cause programs to 'crash' through such tricks as forcing programs to infinitely reboot themselves.

Computer Science MS Degree Application
Words: 797 Length: 2 Document Type: Term Paper

I have a knack for computer science/web design. In middle school, my uncle showed me how to upgrade the memory on my desktop computer. It was not long before I was installing systems, detecting and resolving computer issues and replacing hard drives on laptops. My first course at (name university) continued this interest with projects using Perl, CGI and PHP. Later, I added Macromedia Flash for animation to my repertoire

Computer Science Defensive Response Strategy
Words: 802 Length: 3 Document Type: Term Paper

These activities include securing the current computing environment which includes any current tools, patches, updates and best known methods. This represents the bulk of the cost effective security capabilities and facilitates better detection. Visibility to key areas and activities is vital. Effective monitoring to identify issues, breaches and attacks is necessary. This drives immediate interdiction by response capabilities. Efficient management of efforts to contain, repair and recover as needed

Sign Up for Unlimited Study Help

Our semester plans gives you unlimited, unrestricted access to our entire library of resources —writing tools, guides, example essays, tutorials, class notes, and more.

Get Started Now