Nobody downloaded yet

Evolution of video gaming and computer networking - Research Paper Example

Comments (1) Cite this document
Summary
Surprisingly, video gaming did not attain a mainstream popularity until sometimes in between 1970s and 1980s when game consoles, home computer games, and arcade video became available to the public. This paper will seek to provide a basic analysis of evolution of video gaming and computer networking…
Download full paperFile format: .doc, available for editing
GRAB THE BEST PAPER92.3% of users find it useful
Evolution of video gaming and computer networking
Read TextPreview

Extract of sample "Evolution of video gaming and computer networking"

Download file to see previous pages This happened because terminals were able to connect to their host computers through a leased telephone line or dial up. Due to the increased remote access, scientists created “host based” games wherein users connected to a central computer through a remote system played singly. Soon after, there came multiplayer games. In 1967, a Sanders Associate by the name Ralph Baer put into writing the first video game called “Chase” that played on a television set (Allen & Denton, 2010). As time went by, computer-networking technology started maturing as in the 1970s, there were introductions of packet based computer technology. As such, in 1971, Nolan Bushnell in association with Ted Danby came up with the first arcade game, which was a Computer Space game and based on Space War earlier created by Steve Russell. A year later, (1972) Nolan Bushnell and his associate completed the creation of the arcade game Pong with the support of Al Alcorn and started the Atari Computers the same year (Jason, 2004). The first operators of the arcade included Larry Kerecman. In his memoirs, Larry wrote that, the brilliance and the most astonishing fact about the arcade game was that Nolan and the Company took what Russell programmed in his game Space War and transformed it into a much simpler version of the game without gravity by use of hard-wired logic circuits (Wallace, 2007). Ideally, the circuits printed on the boards of these games composed of electronics that used integrated circuits commonly referred to as “small scale integrated circuits”. Creation of Ethernet Years between 1973 and 1975 witnessed, the creation of Xerox PARC developed on a Local Area Network that based on Ethernet hence allowed the creation of Local Area Networks founded on...
Currently, there are considerable eight generations of video game consoles whereby the sixth, the seventh, and the eighth are as of today ongoing. The history of human-computer interaction has its beginnings written in the 1950s. In the year 1952, S. Douglas acquired his PhD degree at the Cambridge University and wrote a book on Human-Computer interaction. The first version of graphical computer game that Douglas created was the Tic Tack Toe. He programmed the game on an EDSAC vacuum tube computer that contained a cathode ray tube display.
In the midst of 1980s, video games evolution bred systemic characteristics, which led to the release of video games such as Battle Zone, Bards Tale, and Zork. The 1990s was video computer’s golden age as it gave birth to a huge number of game publishers and developers such as Electronic Arts, Activism, id Software and Blizzard. From a graphics and design point of imaging, the evolution of video games was great and continues to be greater.
Today there is up to the eight generation of video games and computer networking. The latest generations of consoles has seen online gaming rise to prominence with the introduction of mobile games that made it possible for gamers to access video games anywhere anytime just by touching a button. As the motion control revolutionized game play, Nintendo capitalized on casual gaming and as time went by, cloud computing came to video gaming. Technology made it clear that people could play without controllers on November 4 2010 with the release of Kinect in the Northern America. After the release of play station Vita, Nintendo released an official statement that announced a system aimed at succeeding Wii called project café. ...Download file to see next pagesRead More
Cite this document
  • APA
  • MLA
  • CHICAGO
(“Evolution of video gaming and computer networking Research Paper”, n.d.)
Evolution of video gaming and computer networking Research Paper. Retrieved from https://studentshare.org/information-technology/1399596-evolution-of-video-gaming-and-computer-networking
(Evolution of Video Gaming and Computer Networking Research Paper)
Evolution of Video Gaming and Computer Networking Research Paper. https://studentshare.org/information-technology/1399596-evolution-of-video-gaming-and-computer-networking.
“Evolution of Video Gaming and Computer Networking Research Paper”, n.d. https://studentshare.org/information-technology/1399596-evolution-of-video-gaming-and-computer-networking.
  • Cited: 0 times
Comments (1)
Click to create a comment or rate a document
ab
abigail92 added comment 7 months ago
Student rated this paper as
This research paper was always my weak point. I could never complete it on time. Still, after I found this particular essay, I understood how it should be completed. So, I performed my research afterward and completed the research paper in several hours, instead of months as it was previously.

CHECK THESE SAMPLES OF Evolution of video gaming and computer networking

HOW VIDEO GAMES ARE POSITVELY AFFECTING AMERICA'S YOUTH

...of video games is that kids learn much faster through video games than by reading. There exists a potential market for video games developers to engage in academic development in a huge way. This will ensure that students will find their learning experience exciting and non monotonous. Also the parent’s attitude towards video games will turn to be encouraging when it starts acting as an important positive influence of their children life. If these kinds of benefits are highlighted through the games, the society will be more supportive towards their future generation playing...
4 Pages(1000 words)Research Paper

Video Gaming Addicition

.... http://web.ebscohost.com/ehost/pdfviewer/pdfviewer?vid=9&hid=14&sid=9ea60420-8ae6-4185-9d94-dc68b008960d%40sessionmgr13 Weinstein, A. (2010). Computer and video game addiction – a comparison between game users and non-game users. American Journal of Drug and Alcohol Abuse, 36(5), 268-276. http://web.ebscohost.com/ehost/pdfviewer/pdfviewer?vid=10&hid=14&sid=9ea60420-8ae6-4185-9d94-dc68b008960d%40sessionmgr13 Young, K. (2009). Understanding online gaming addiction and treatment issues for adolescents. American Journal of Family Therapy, 37(5), 355-372. http://web.ebscohost.com/ehost/pdfviewer/pdfviewer?vid=14&hid=14&sid=9ea60420-8ae6-4185-9d94-dc68b008960d%40sessionmgr13... ?Running Head: VIDEO GAME ADDICTION...
9 Pages(2250 words)Research Paper

Chinese video gaming

...?Chinese Video Gaming The world has well entered the twenty first century, and along with it, the realm of whole new possibilities as well. With the massive advances in technology, man has transformed the impossible into the reality. Almost all fields have reached greater heights with the constant innovations in technology. This is especially so in the case of the entertainment field, including various industries such as movies, music, dance, gaming etc. The present paper focuses on the video games industry of China, a country that is slowly changing from an authoritarian ideal to a more democratic one. The modern technologies in video...
3 Pages(750 words)Essay

Computer Networking Management

...can utilize a best-effort network service. Interactive or real-time video and voice applications do have delay, loss, jitter and throughput guarantee requirements in order to function properly. Web access can also make do with a best-effort service, but web access would usually require low delay, and may need high throughput depending on what kind of content is being accessed. TASK 4 Integrated Services (Intserv) Architecture In computer networking, the integrated services (IntServ) architecture is an architecture that specifies the elements for the guaranteeing of quality of service (QoS) on the network. For instance, IntServ can be used...
22 Pages(5500 words)Essay

Computer Networking

...are more likely to comply with Policy and to make more of an effort to secure or at least limit behaviours that will put the network at risk. The Policy will introduce inclusive decision making staff meetings to come up with IT security solutions. In a collaborative forum staffs can suggest ways to limit non-compliance. To cultivate a company culture of looking after the well being of staff, a dedicated single PC will be located in the staff room that is not connected to the network. Staff can use this during breaks to download music or videos etc from particular approved sites, to be determined during the first collaborative meeting. It is anticipated that this will remove...
9 Pages(2250 words)Essay

Computer Networking and Management

...below. (‘Harvard style’, n.d.c) Figure 1: Modulo numbers (Source: ‘Harvard style’, n.d.) For example, 8 + 8 mod 15 = 1, since 16 is larger than the modulus, 15, therefore, 16 – 15 = 1. Exponentiation is similarly defined; 33 mod 15 = 12 since 33 = 27 and 27 - 15 = 12. (‘Harvard style’, n.d.c) RSA involves two keys; a public key which can be known to everyone and is used for encrypting messages, and a private key which can be used to decrypt those encrypted messages. To generate the keys, RSA picks two distinct prime numbers p and q, multiplies them (p and q) together to form modulus (m), and computes φ(m) = (p - 1)(q - 1). Since xφ(m) mod m = 1, it stands to reason that xφ(m)+1 mod m = x; this special power is capable to...
8 Pages(2000 words)Essay

Computer networking and management

...in detail). It is meant for IP hosts and multicast routers in the network to make multicast group memberships. It is commonly used for live video feeds and gaming. IGMP is required only for IPv4 networks since multicast works in a differrent manner in IPv6 networks. Types of Messages in IGMP Hewlett-Packard Development (2008) categorized IGMP in the following three types: Membership Query Messages The multicast routers on the network send out membership queries to all the host in the network to inquire as to which hosts or network devices want to become members of a particular multicast group. The host...
26 Pages(6500 words)Essay

Computer networking

...and then written down onto another computer’s software. The earlier methods of file transfer onto retractable flash drives has now become obsolete as the establishment of computer networking has made file transfer no issue at all. Data management efficiently at run time is one of the basic advantages of file transfer Streaming of Media Digital media files such as image files, videos or audio files are easily transferred over a network. This becomes particularly useful when the units of an organization are present at varied physical locations. Each unit may transfer their interactive digital media files to other units thus maintaining follow-up of tasks...
4 Pages(1000 words)Research Paper

Computer Networking

...Technologies in Wireless Networking Ahmad Alnafea Department of Computer Science and Technology of Bedfordshire Wireless network is a type of computer network that has become vital for modern existence. Some of benefits of wireless network can be convenience, flexibility, productivity, easy setup, maintainable, expandable, robust security protection and cost. The wireless networks are continuously growing but there still have some of the key challenges in wireless networks that are security, radio signal interference, system interoperability and many other bases. Now many improved standards are introduced...
1 Pages(250 words)Essay

Computer Networking

...Computer networking Network security is fundamental in the development and sustenance of an effective computer networks.The process of developing such a network must therefore incorporate various security features that will help secure and maintain the integrity of both the data and the various communication channels. The essay below therefor investigates various security features that help secure a computer network. Such include the use of effective antiviruses, the development of effective firewalls, the use of passwords and dedicated manipulation of the user interface. The discussion further analyses the importance of...
5 Pages(1250 words)Research Paper
sponsored ads
We use cookies to create the best experience for you. Keep on browsing if you are OK with that, or find out how to manage cookies.

Let us find you another Research Paper on topic Evolution of video gaming and computer networking for FREE!

Contact Us