Introduction to Computer Technology

Total Page:16

File Type:pdf, Size:1020Kb

Introduction to Computer Technology Introduction to Computer Technology Engr. Naveed Jan Assistant Professor Electronic Technology 1 General Class Rules • Your Class attendance is very Important. – Please try to come in time. If you come to the class after 10 minutes, you will be marked absent. – If marked absent, please do’t coe to e as your absence in the class may not be converted into presence. • Submit your assignment on time. • Copied assignments will not be accepted. 2 Engr. Naveed Jan Page 1 of 32 Geeral Class Rules Cot’d • Switch your cell phones off. • Contact your CR for notes. • There will be Surprise Graded Quizzes in every Chapter. Be prepared ! • Your Sessional Marks will be calculated from your Quizzes and Assignments. 3 Grading Criteria • Assignments 10 • Quizzes 10 • Presentation 05 • Mid Term Exam 25 • Final Exam 50 4 Engr. Naveed Jan Page 2 of 32 Introduction to Computer Technology • Course Number: ELT 113 • Credits: 3 +1 • Time: Monday (0930-1230) • Classroom: Class Room 2 • Prerequisite: None • Instructor: Naveed Jan • Office: Faculty office 3 • email: [email protected] • Office Hours: Monday-Thursday 9AM-2:00PM • Objective: Introduction to computer science through extensive course projects. 5 Introduction to Computer Technology • Textbook: P. Norton, Peter Norton's Introduction to Computers, 7th Ed., McGraw- Hills • Reference: G. B. Shelly, T. J. Cashman, and M. E. Vermaat, Discovering Computers 2004, Thomson Course Technology, Boston, MA, 2003. • Reference: M. M. Mano, Computer Engineering: Hardware Design, Prentice Hall, Englewood Cliffs, NJ, 1988. • Reference: J. G. Brookshear, Computer Science: An Overview, 7th Ed., Addison Wesley, Reading, MA, 2003. • excellent World Wide Web address: to look up computer terminology online http://www.pcwebopedia.com, http://www.whatis.com • excellent World Wide Web address: to search companies, products, and events http://www.google.com, http://www.yahoo.com, http://www.msn.com • Projects: will be assigned every week or every other week • Examinations: 6 Engr. Naveed Jan Page 3 of 32 • Chapter 1: Introducing Computer Systems • Lesson 1A: Exploring Computers and Their Uses • Lesson 1B: Looking Inside the Computer System 2 • Chapter 2: Presenting the Internet • Lesson 2A: The Internet and the World 3 • Lesson 2B: E-Mail and Other Internet Services 5 • Computing Keynotes: Creating Your email and Own Web Page • Chapter 3: Interacting with Your Computer • Lesson 3A: Using the Keyboard and Mouse 6 • Lesson 3B: Inputting Data in Other Ways 7 • Chapter 4: Seeing, Hearing, and Printing Data • Lesson 4A: Video and Sound 8 • Lesson 4B: Printing 9 • Computing Keynotes: Buying Your First Computer • Chapter 5: Processing Data • Lesson 5A: Transforming Data into Information 10 • Lesson 5B: Modern CPUs 14 7 • Chapter 6: Storing Data • Lesson 6A: Types of Storage Devices 15 • Lesson 6B: Measuring and Improving Drive Performance 16 • Chapter 7: Using Operating Systems • Lesson 7A: Operating System Basics 18 • Lesson 7B: Survey of PC and Network Operating Systems 19 • Chapter 8: Working with Application Software • Lesson 8A: Productivity Software 20 • Lesson 8B: Graphics and Multimedia 22 • Chapter 9: Networks • Lesson 9A: Networking Basics 23 • Lesson 9B: Data Communications 26 • Chapter 10: Working in the Online World • Lesson 10A: Connecting to the Internet 38 • Lesson 10B: Doing Business in the Online World 28 • Computing Keynotes: Professional Certification Programs 8 Engr. Naveed Jan Page 4 of 32 • Chapter 11: Database Management • Lesson 11A: Database Management Systems 29 • Lesson 11B: Survey of Database Systems 30 • Chapter 12: Development of Information Systems • Lesson 12A: The Basics of Information Systems 31 • Lesson 12B: Building Information Systems 32 • Chapter 13: Software Programming and Development • Lesson 13A: Creating Computer Programs 33 • Lesson 13B: Programming Languages and the Programming Process 34 • Chapter 14: Protecting Your Privacy, Your Computer, and Your Data • Lesson 14A: Understanding the Need for Security Measures 35 • Lesson 14B: Taking Protective Measures 36 • Computing Keynotes: Computer Viruses 9 Chapter 1A Introducing Computer Systems 10 Engr. Naveed Jan Page 5 of 32 The Computer Defined • Electronic device • Converts data into information • Modern computers are digital – Two digits combine to make data (0, 1) 11 What is a Computer? • A computer is an electronic device that process data, converting it into information that is useful to people. • A computer is controlled by the programmed instructions, which give the machine a purpose and tell what to do. 12 Engr. Naveed Jan Page 6 of 32 The Computer Defined • Older computers were analog – A range of values made data 13 The Computer Defined • Older computers were analog – A more manageable type -- the old-fashioned slide rule 14 Engr. Naveed Jan Page 7 of 32 Generation of Computers • Can be divided into six generations • Every new generation has dramatic improvements compared to previous one • Improvements were the result of – Technology used for building computers – Programming languages used – Computer systems internal organization 15 Generation of Computers The Mechanical Era (1623-1900) First Generation Electronic Computers (1937- 1953) Second Generation (1954-1962) Third Generation (1963-1972) Fourth Generation (1972-1984) Fifth Generation (1984-1990) Sixth Generation (1990-till date) 16 Engr. Naveed Jan Page 8 of 32 Generation of Computers • The Mechanical Era (1623-1900) – Mathematicians who designed and implemented calculators that were capable of addition, subtraction, multiplication, and division. – The first multi-purpose, i.e. programmable, computing device was probably Charles Babbage's Difference Engine, which was begun in 1823 but never completed. – A more ambitious machine was the Analytical Engine. It was designed in 1842, but unfortunately it also was only partially completed by Babbage 17 Generation of Computers – George Scheutz read of the difference engine in 1833, and along with his son Edvard Scheutz began work on a smaller version. By 1853 they had constructed a machine that could process 15-digit numbers and calculate fourth-order differences. Their machine won a gold medal at the Exhibition of Paris in 1855. – Some other examples include abacus ( 3000 BC), Pascaline (17th century) etc – Punch cards (1890) also developed that were used for data input, output, and storage 18 Engr. Naveed Jan Page 9 of 32 Generation of Computers • First Generation Electronic Computers (1937-1953): – Vacuum tubes for circuitry – Magnetic drums for memory – Big size normally taking up entire rooms – The first generation of computers used machine language or 0s and 1s. – Examples are the UNIVAC and ENIAC 19 Generation of Computers • Second Generation (1954-1962 ): – Invention of transistors which replaces vacuum tubes – The transistor made computers smaller, less expensive and increased calculating speeds. – Memory technology was based on magnetic cores which could be accessed in random order – These machines used assembly language – E.g. TADIC, IBM 704, IBM 7030 20 Engr. Naveed Jan Page 10 of 32 Generation of Computers 21 Generation of Computers • Third Generation (1963-1972) – Transistors were replaced by integrated circuits(IC) on silicon chip (LSI and VLSI) – One IC could replace hundreds of transistors – This made computers even smaller and faster – semiconductor memories starting to be used instead of magnetic cores – They were characterized with high-level programming languages which required logic such as BASIC, Pascal, C, COBOL, and Fortran – Examples: Intel 4004, Intel 8008 etc 22 Engr. Naveed Jan Page 11 of 32 Generation of Computers 23 Generation of Computers • Fourth Generation (1972-1984) – Silicon Chips (Large scale integrated circuits)=LSI and VLSI – At this scale entire processors will fit onto a single chip – Two important events: the development of the C programming language and the UNIX operating system – Popular inventions include word processors, video games , laser printers, inkjet printers, spread sheets, cell phones, walkman, MS-DOS – Examples: APPLE 1, IBM PC, MACINTOSH etc 24 Engr. Naveed Jan Page 12 of 32 Generation of Computers • Fifth Generation (1983-1990) – Silicon Chips ( Very Large Integrated Circuits) VLSI – Characterized mainly by the acceptance of parallel processing – Many processors working on different parts of a single program. – Popular inventions: CD-ROM, Windows programs, first 3D video game – Examples: IBM PC-AT, Intel 80486, video toaster 25 Generation of Computers IBM PC-AT 1984 26 Engr. Naveed Jan Page 13 of 32 Generation of Computers Sixth Generation (1990- Present) • Transitions between generations in computer technology are hard to define, especially as they are taking place. • Some changes, such as the switch from vacuum tubes to transistors, are immediately apparent as fundamental changes, but others are clear only if you look backward. • Many of the developments in computer systems since 1990 reflect gradual improvements over established systems, and thus it is hard to claim they represent a transition to a new ``generation'', but other developments will prove to be significant changes. 27 Generation of Computers • Some popular inventions are WWW, HTML, Web TV, DVD, YouTube etc • Examples: • Power Book by apple (1991) • Pentium microprocessors by Intel (1993) • Sun Ultra workstation (1996) • And many more like core processor etc 28 Engr. Naveed Jan Page 14 of 32 Types of Computers Types of Computers on the basis of size and working principle Personal Computers
Recommended publications
  • Essential Trends and Dynamics of the Endpoint Security Industry
    Essential Trends and Dynamics of the Endpoint Security Industry Lenny Zeltser wrote this paper together with a co-author who chose to remain anonymous. May 2005 This paper examines trends and dynamics of the endpoint security industry, and shows how business strategies of market leaders such as Symantec exemplify these factors. When exploring current developments in the information security marketplace, we stipulate that this sector is beginning to converge with the general IT software industry in response to factors such as the evolution of the industry structure, competitive dynamics, regulatory compliance efforts, and the maturing state of security products. Lenny Zeltser & Co-Author Page 1 Table of Contents Introduction ......................................................................................................................... 2 Characteristics of the Endpoint Security Industry........................................................... 2 Scope of the Industry ............................................................................................................ 2 Industry Size Estimates.........................................................................................................3 Structural Characteristics of the Industry............................................................................... 3 Competitive Dynamics........................................................................................................... 4 Industry Evolution: From 1990 to 2005 ............................................................................
    [Show full text]
  • Third BUSINES Superbrands-2010-Final 6/1/11 12:46 PM Page 92
    Third BUSINES Superbrands-2010-final 6/1/11 12:46 PM Page 92 Market safeguard and keep open cyber highways is a imminently powerful, year after year. Cyberspace is full of creepy crawlies. Consider source of abiding comfort for millions of In 2007, for instance, International Data the latest gremlins – Pillenz, Bamital, Sefrnit, internet users. Corporation (IDC) recognised Symantec in a Pylespa, Daonol, Zbot and Tidserv and add the Its success can be attributed to keeping its wide range of award categories including Data old, broad-spectrum favourites, spyware, adware, ears to the ground and developing technologies Protection and Recovery; Cross-platform worms, viruses, trojans and spam and you’ve that synchronise with the needs of customers. provider of Clustering and Availability; Email entered the world of cyber crime.These are the To accomplish this feat the company has created Archiving Applications; Security and Vulnerability pests which have made working on a PC or a unique web called the Symantec Global Management; and Policy and Compliance, and laptop a forgettable nightmare.The universal Intelligence Network.This is an extraordinary Host and Vulnerability Software; plus an award quest for a protector has thrown up several resource which provides a real-time view of for software developed for Messaging Security names but the one that has become virtually emerging digital threats almost anywhere in the and Virus Protection. synonymous with computer software, world. With more than 40,000 sensors in 180 In the same year, Gartner rated the company particularly in the realms of security and countries and more than 6200 managed security as Global Market Share Leader in Enterprise information management, is Symantec.
    [Show full text]
  • India Business Volume 2 Symantec Size
    Business Superbrands- 2nd edition(Main) 8/27/08 4:12 AM Page 136 Market 30% of the world’s email traffic. At the as Global Market Share Leader in Enterprise Adware, spyware, worms, viruses, trojans, company’s three security operation centres – Backup; Backup and Recovery Software; Core spam… computer users the world over are one of which is in India – employees analyse Storage Management Software; and Email Active now familiar with these gremlins that often and correlate emerging threats to help Archiving. Between 2006 and 2007, in the make working on a PC or laptop a nightmare. customers prepare for and withstand attacks. Gartner Magic Quadrants, the company was There is a universal quest for a protector.The Powerful protection – and only available from listed as a leader in PC Configuration Life Cycle one name that has become virtually Symantec – is the company credo. Its pedigree Management; Managed Security Services synonymous with computer software, is supported by other illustrious names and Providers (NA); Storage Services; Security particularly in the realms of security and includes industry leaders such as Veritas, Altiris Information and Event Management; Email information management is Symantec. and Brightmail (Source: archival data). Active Archiving; Content Monitoring and Headquartered in Cupertino, California, the Filtering for Data Loss Prevention and Email US$ 5.19 billion (Rs. 20,760 crore) company Achievements Security Boundary. operates in more than 40 countries and is part Its aptitude to successfully integrate acquired During the last two years, the accolades and of the NASDAQ and Fortune 500 listing. technologies has kept Symantec at the front of recognition have been overwhelming.
    [Show full text]
  • Yes, Virginia, There Really Is a Norton
    05_579932 bk01ch01.qxd 2/24/05 10:44 PM Page 9 Chapter 1: Getting to Know Norton Products In This Chapter ߜ Appreciating Norton’s long history in the PC help biz ߜ Figuring out exactly who Norton is ߜ Getting to know Norton products by type ven if you’re brand-spankin’-new to computers, and before you pur- Echased your Norton software, you probably heard or read the name Norton many times. In fact, Norton is one of the relatively few PC-industry names that has been with us since early on in the history of personal com- puters. If you only knew how many companies have gone bust or been bought up by bigger firms over the last two-plus decades, you would be astounded! This chapter introduces you to the various tools that are available under the Norton name (plenty!). Here, I focus in on the type of software, because you have so many different ones to choose from. Just as finding and using the right tool in your household tool chest is important when you’re want- ing to do a specific repair, choosing the right Norton product for the PC protection, repair, or maintenance job you face is important — and in this chapter, I help you do just that. Norton: A Name Long Associated with PC Care IBM’s name is still associated with the original PC-class computer that rolled out in 1981. This is true even though so many other manufacturers have joined theCOPYRIGHTED PC design and rollout industry. MATERIAL Not very long after the debut of the IBM PC, the name IBM was joined by the name Norton for some of the first utilities created to help consumers work with those PCs.
    [Show full text]
  • DLCC Software Catalog
    Daniel's Legacy Computer Collections Software Catalog Category Platform Software Category Title Author Year Media Commercial Apple II Integrated Suite Claris AppleWorks 2.0 Claris Corporation and Apple Computer, Inc. 1987 800K Commercial Apple II Operating System Apple IIGS System 1.0.2 --> 1.1.1 Update Apple Computer, Inc. 1984 400K Commercial Apple II Operating System Apple IIGS System 1.1 Apple Computer, Inc. 1986 800K Commercial Apple II Operating System Apple IIGS System 2.0 Apple Computer, Inc. 1987 800K Commercial Apple II Operating System Apple IIGS System 3.1 Apple Computer, Inc. 1987 800K Commercial Apple II Operating System Apple IIGS System 3.2 Apple Computer, Inc. 1988 800K Commercial Apple II Operating System Apple IIGS System 4.0 Apple Computer, Inc. 1988 800K Commercial Apple II Operating System Apple IIGS System 5.0 Apple Computer, Inc. 1989 800K Commercial Apple II Operating System Apple IIGS System 5.0.2 Apple Computer, Inc. 1989 800K Commercial Apple II Reference: Programming ProDOS Basic Programming Examples Apple Computer, Inc. 1983 800K Commercial Apple II Utility: Printer ImageWriter Toolkit 1.5 Apple Computer, Inc. 1984 400K Commercial Apple II Utility: User ProDOS User's Disk Apple Computer, Inc. 1983 800K Total Apple II Titles: 12 Commercial Apple Lisa Emulator MacWorks 1.00 Apple Computer, Inc. 1984 400K Commercial Apple Lisa Office Suite Lisa 7/7 3.0 Apple Computer, Inc. 1984 400K Total Apple Lisa Titles: 2 Commercial Apple Mac OS 0-9 Audio Audioshop 1.03 Opcode Systems, Inc. 1992 800K Commercial Apple Mac OS 0-9 Audio Audioshop 2.0 Opcode Systems, Inc.
    [Show full text]
  • MS-DOS and PC-DOS 8Vau V Guide by Peter Norton Reviewed by Harry E .. Pence*
    ,' I II 11 I found the approach taken by a knowledge engineer, the pe~son ~ho is the kingpin in put- ting the expert system together; particularly interesting. First' a spe-cialist in a given field must be convinced to spend a lot- :Of time with the knowledge eng:i!'nee1<~ . :Bo.th work. together on a substantial problem in the specific field. Often the specialist.... ~irst gives the textbook ver- sion of the solution. The expert system written on this basis generally doesn't work well. Next the knowledge engineer watches how the specialist actually manipulates the data - not how he says he does it, how he actually does it. This is where the diff~cult part, the heuristic part, (where to go by the book and where to ignore the usual) comes in. · The knowledge engineer's job is so difficult and critical that many believe it must be automated if expert systems are to succeed in general. Where does the Japanese challenge come in? The Japanese have a ten year plan to build a fifth generation computer which includes these expert systems and the ability to be programmed in a natural language. Other Japanese challenges have certainly displaced workers in autos and electronics, but resulted in a more efficient marketplace with a wider choice of products for consumers. Is this challenge different? The authors argue persuasively that the results of this race are much more important and will drastically affect leadership in the information society to come. Or perhaps more impor- tant, they and we may be the ones to lose our jobs this time.
    [Show full text]
  • Optimization and Visualization of Strategies for Platforms
    Optimization and Visualization of Strategies for Platforms, Complements, and Services. by Richard B. LeVine BA, Psychology, State University of New York at Albany, 1980 MS, Computer Science, Union College, Schenectady New York, 1986 SUBMITTED TO THE ALFRED P. SLOAN SCHOOL OF MANAGEMENT IN PARTIAL FULFILLMENT OF THE REQUIREMENTS FOR THE DEGREE OF MASTERS OF SCIENCE at the MASSACHUSETTS INSTITUTE OF TECHNOLOGY June 2003 ©2003 Richard B. LeVine. All rights reserved. The author hereby grants to MIT permission to reproduce and to distribute publicly paper and electronic copies of this thesis document in whole or in part. Signature of Author: Alfred P. Sloan School of Management May 8, 2003 Certified by: Professor James Utterback, Chair, Management of Technology Program Reader Certified by: Professor Michael Cusumano, Sloan Management Review Distinguished Professor of Management Thesis Supervisor Accepted by: David Weber Director, Management of Technology Program 1 of 160 Optimization and Visualization of Strategies for Platforms, Complements, and Services by Richard B. LeVine Submitted to the Alfred P. Sloan School of Management on May 8, 2003, in Partial Fulfillment of the Requirement for the Degree of Masters of Science. Abstract This thesis probes the causal elements of product platform strategies and the effects of platform strategy on a firm. Platform strategies may be driven by internal or external forces, and the lifecycle of a firm and of a platform strategy evolve over time in response to both the needs of the firm and the changes in the external environment. This external environment may consist of a “platform ecology,” in which the platform strategies of firms affect one another.
    [Show full text]
  • Download Inside the Norton Utilities (I, Krumm, Prentice Hall Books, 1996
    Inside the Norton Utilities (I, Krumm, Prentice Hall Books, 1996, , . DOWNLOAD http://archbd.net/18pzCEI Fourth Workshop on Workstation Operating System, October 14-15, 1993, Napa, California proceedings, IEEE Computer Society. Technical Committee on Operating Systems, 1993, Computers, 203 pages. Peter Norton's DOS Guide , Peter Norton, 1989, MS-DOS (Computer file), 408 pages. Users can conquer DOS with this complete revision of a bestselling guide. Geared to DOS Version 4.X, this book starts readers at the beginning to be smart, effective users of .... Clipper power utilities , James Occhiogrosso, 1994, Computers, 305 pages. With this inexpensive collection of pre-tested utilities and UDFs, Clipper developers can concentrate on creative problem-solving instead of the routine stuff. All they have to .... Inside the Machine An Illustrated Introduction to Microprocessors and Computer Architecture, Jon Stokes, 2007, Computers, 292 pages. Computers perform countless tasks ranging from the business critical to the recreational, but regardless of how differently they may look and behave, they're all amazingly .... Mastering the Norton Utilities 5 , Peter John Dyson, 1990, Computers, 490 pages. Inside the IBM PC , Peter Norton, 1986, Computers, 387 pages. Covers Inner Workings & Advanced Features of IBM-PC. Explains Fundamentals of the Microprocessor, the Operating System, PC-DOS & More. Norton Utilities 6.0 An Illustrated Tutorial, Richard Evans, 1992, Norton Utilities, 446 pages. Using MS-DOS 6.2 , Allen Wyatt, W. Edward Tiley, Jon Paisley, 1993, Computers, 1115 pages. A guide to MS-DOS 6.2 features chapters on understanding DOS, working with disks and files, controlling the way DOS works, getting the most from DOS, advancing your DOS ...
    [Show full text]
  • SYMANTEC 2004 ANNUAL REPOR Ensuring Information Integrity
    SYMANTEC 2004 ANNUAL REPOR Ensuring Information Integrity SYMANTEC 2004 ANNUAL REPORT T Corporate Information N Board of Directors Tania Amochaev Donald E. Frischmann Rowan M. Trollope Former Chief Executive Officer Senior Vice President, Vice President, QRS Corporation Communications and Brand Management Security Management Solutions William T. Coleman III Dieter Giesbrecht Giuseppe Verrini Founder, Chairman and Senior Vice President, Vice President, Sales and Marketing, Chief Executive Officer Enterprise Administration Europe, Middle East, and Africa Cassatt Corporation Gail E. Hamilton Arthur W. Wong Franciscus Lion Executive Vice President, Vice President, Security Response Former Board Advisor and Global Services and Support Senior Executive Vice President N Investor Information ABN Amro Bank Thomas W. Kendra Senior Vice President, Worldwide Sales Annual Meeting David L. Mahoney The annual meeting of shareholders will be Former Co-Chief Executive Officer Rebecca A. Ranninger held on Wednesday, September 15, 2004 at McKesson HBOC Senior Vice President, Human Resources 8 a.m. at Symantec’s worldwide headquarters: 20330 Stevens Creek Blvd. Robert S. Miller Enrique T. Salem Senior Vice President, Gateway Solutions Cupertino, CA 95014 Former Chairman of the Board and (408) 517 8000 Chief Executive Officer Bethlehem Steel N Other Senior Executives Stock Exchange Listing Cosmo P. Battinelli Symantec’s common stock trades on George Reyes Vice President, Global Support the Nasdaq under the symbol SYMC. Chief Financial Officer Google Robert A. Clyde Transfer Agent Vice President, Chief Technology Officer EquiServe Trust Company, N.A. Daniel H. Schulman P.O. Box 219045 Chief Executive Officer Lily T. De Los Rios Kansas City, MO 64121 Virgin Mobile USA Vice President, Client Solutions www.equiserve.com (816) 843 4299 John W.
    [Show full text]
  • Norton Pcanywhere 5.0 For
    Using Norton pcANYWHERE™ for DOS Using Norton pcANYWHERE™ for DOS The software described in this book is furnished under a license agreement and may be used only in accordance with the terms of the agreement. Copyright Notice Copyright © 1993–1994 Symantec Corporation. All Rights Reserved. No part of this publication may be copied without the express written permission of Symantec Corporation, Peter Norton Group, 10201 Torre Avenue, Cupertino, CA 95014. Trademarks Symantec and pcANYWHERE are trademarks of Symantec Corporation. Windows is a trademark of Microsoft Corporation. Other product names mentioned in this manual may be trademarks or registered trademarks of their respective companies and are hereby acknowledged. Printed in the United States of America. 10 9 8 7 6 5 4 3 2 1 Symantec Service and Support Solutions Symantec is committed to excellent service worldwide. Our goal is to provide you with professional assistance in the use of our software and services, wherever you are located. Technical Support and Customer Service solutions vary by country. If you have questions about the services described below, please refer to the section “Worldwide Service and Support” at the end of this chapter. Registering your Symantec product To register your Symantec product, please complete the registration card included with your package and drop the card in the mail. You can also register via modem during the installation process (if your software offers this feature) or via fax to (800) 800-1438 or (541) 984-8020. Technical support Symantec offers several technical support options designed for your individual needs to help you get the most out of your software investment.
    [Show full text]
  • Peter Norton Collection Ahead of the Curve
    For immediate release Contact: Capucine Milliot [email protected] tel +1 212 641 5078 WORKS FROM THE PETER NORTON COLLECTION AHEAD OF THE CURVE CHRISTIE’S CELEBRATES THE PIONEERING VISION AND PHILANTHROPY OF SOFTWARE ENTREPRENEUR AND CUTTING- EDGE LOS ANGELES COLLECTOR WITH THE SALE OF WORKS FROM THE LEGENDARY PETER NORTON COLLECTION Paul McCarthy (B. 1945) Tomato Head (Green) fiberglass, urethane, rubber, metal, plastic, fabric and painted metal base height: 86 in. (218.4 cm.); installation dimensions variable Executed in 1994. This work is one of three unique variants (green shirt, black shirt, burgundy shirt). Post-War and Contemporary Art Sales at Christie’s New York To Be Accompanied by Educational Programs for Collectors in New Contemporary Art Markets CHRISTIE’S HOLDS FIRST PUBLIC EXHIBITION OF WORKS FROM THE COLLECTION IN LOS ANGELES, SEPTEMBER 28 – OCTOBER 1ST Artists include: Matthew Barney, Mark Bradford, Sophie Calle, Maurizio Cattelan, Robert Gober, Felix Gonzalez-Torres, David Hammons, Jim Hodges, Barbara Kruger, Paul McCarthy, Takashi Murakami, Yoshitomo Nara, Charles Ray, Fred Tomaselli, Kara Walker, Christopher Wool. November 8 - 9, 2011 Post-War and Contemporary Art ~ Evening and Day Sales New York — Christie‘s is proud to announce the auction of a major selection of the remarkable Peter Norton Collection of contemporary art, assembled over more than two decades by one of the world‘s most pioneering collectors, entrepreneurs and philanthropists. A Single Owner grouping of 60 lots will be offered throughout the Evening and the Day Sales, November 8th and 9th, and is expected to achieve in excess of $25 million. Many of the works represent the leading artists of the contemporary art world that Mr.
    [Show full text]
  • 2020 Annual Report
    1NOV201917191549 2020 Annual Report Proxy Statement and Form 10-K FORWARD-LOOKING STATEMENT: This Annual Report contains forward-looking statements that are subject to safe harbors under the Securities Act of 1933, as amended and the Securities Exchange Act of 1934, as amended. Statements that refer to projections of our future financial performance, anticipated growth and trends in our businesses and in our industries, the actions we intend to take as part of our new strategy and the expected impact thereof, the anticipated impacts of our acquisitions and restructurings, our intent to pay quarterly cash dividends in the future, and other characterizations of future events or circumstances are forward-looking statements. These statements are only predictions, based on our current expectations about future events and may not prove to be accurate. We do not undertake any obligation to update these forward-looking statements to reflect events occurring or circumstances arising after the date of this report. These forward-looking statements involve risks and uncertainties, and our actual results, performance, or achievements could differ materially from those expressed or implied by the forward-looking statements on the basis of several factors, including those that we discuss in the ‘‘Risk Factors’’ section and throughout our 2020 Form 10-K, which is included in this Annual Report. We encourage you to read that section carefully. 1NOV201917191549 60 E. Rio Salado Parkway, Suite 1000 Tempe, Arizona 85281 NOTICE OF 2020 ANNUAL MEETING OF STOCKHOLDERS to be held on: September 8, 2020 9:00 a.m. Pacific Time Dear Stockholder: You are cordially invited to attend our 2020 Annual Meeting of Stockholders (the ‘‘Annual Meeting’’), which will be held at 9:00 a.m.
    [Show full text]