Why do we need computer languages?
Computer Language (Computer Language) refers to the language used for communication between humans and computers. Computer language is a medium for transmitting information between humans and computers. The biggest feature of a computer system is that instructions are conveyed to the machine through a language. In order for an electronic computer to perform various tasks, it is necessary to have a set of numbers, characters, and grammar plans for writing computer programs. These characters and grammar rules form various computer instructions (or various statements). These are the languages that the computer can accept.
Recommended courses: PHP Tutorial.
I can answer your question from a historical perspective. The early days of computer language:
In the 1940s, when computers were just coming out, programs The operator must manually control the computer. Computers at that time were very expensive, and the only person who thought of using programming languages to solve problems was the German engineer Konradzuse. Soon after, the price of computers dropped dramatically, and computer programs became increasingly complex. In other words, development time is already far more valuable than running time. As a result, new integrated, visual development environments are becoming more and more popular. They take away time, money (and brain cells). With just a few keystrokes, an entire piece of code is ready to use. This also benefits from a reusable program code library. With the birth of structured high-level languages such as C, Pascal, Fortran, etc., programmers can leave the machine level and express their intentions at a more abstract level. The three important control structures and some basic data types born from this can very well start to allow programmers to think and describe problems in a way that is close to the essence of the problem. As the scale of programs continued to expand, a software crisis occurred in the late 1960s. Even the programming models at that time could not overcome errors. As the code expanded, they expanded exponentially, to the point of being uncontrollable. At this time, A new way of thinking about programming and programming model emerged - object-oriented programming, and a number of programming languages that support this technology were born, such as eiffel, c, java, these languages are all named after Look at the problem from a new perspective, that is, the problem is composed of objects with different attributes and the message passing between objects. Object-oriented languages must therefore support new programming techniques, such as data hiding, data abstraction, user-defined types, inheritance, polymorphism, etc.
Current situation
Today's common programming languages come in two forms: assembly language and high-level language.
Computer Language
Assembly language and machine language are essentially the same. They both directly operate on the hardware. However, the instructions use English abbreviated identifiers, which are easy to identify and remember. The executable file generated by the assembly of the source program is not only relatively small, but also executes very quickly.
High-level languages are the choice of most programmers. Compared with assembly language, it not only synthesizes many related machine instructions into a single instruction, but also removes details related to specific operations but irrelevant to completing the work, such as the use of stacks, registers, etc., thus greatly simplifying the instructions in the program . At the same time, because many details are omitted, programmers do not need to have much professional knowledge.
High-level language is mainly compared to low-level language. It does not refer to a specific language, but includes many programming languages, such as popular vb, vc, foxpro, delphi, etc. These The syntax and command format of the languages are different.
Programs written in high-level languages cannot be directly recognized by computers and must be converted before they can be executed. They can be divided into two categories according to the conversion method: interpreted and compiled. [1]
Trend
Object-oriented programming and data abstraction play an important role in modern programming thinking. In the future, the development of language will no longer be a simple language standard, but will It will be completely object-oriented, easier to express the real world, and easier to write for people. Its use of
computer language
will no longer be just a professional programmer, people can use it to customize real life An easy way to complete programming in a workflow.
Simplicity: Provides the most basic methods to complete specified tasks. As long as you understand some basic concepts, you can use it to write applications suitable for various situations.
Object-oriented: Provides simple class mechanism and dynamic interface model. The object encapsulates state variables and corresponding methods, achieving modularization and information hiding; it provides a prototype of a class of objects, and through the inheritance mechanism, subclasses can use the methods provided by the parent class, realizing code reuse.
Security: Used in network and distributed environments with security mechanisms guaranteed.
Platform independence: The platform-independent feature allows the program to be easily transplanted to different machines and platforms on the network.
Father of Computer Language
"Father of Computer Language" Nygaard helped lay the foundation for the Internet and made great contributions to the computer industry.
Nygaed is a professor at the University of Oslo. He is internationally renowned for developing the Simula programming language and laying the foundation for MS-DOS and the Internet. Christian Nygaard was born in Oslo in 1926. He graduated from the University of Oslo in 1956 with a master's degree in mathematics. Since then, he has devoted himself to computer computing and programming research.
From 1961 to 1967, Nygaard worked at the Norwegian Computer Center and participated in the development of object-oriented programming languages. Because of his outstanding performance, in 2001, Nygaard and his colleague Orr Yoan Dahl won the 2001a. m. Turing Machine Award and many other awards. The Computing Machinery Association, which awarded Nygaard the award at the time, believed that their work had cleared the way for the widespread application of programming languages such as Java and C in personal computers and home entertainment devices. "Their work has brought about fundamental changes in the design and programming of software systems." , Recyclable, reliable, and upgradable software has become available."
Nygaard is known as the "Father of Computer Languages" because of his outstanding contributions. His contribution to the development of computer languages The grasp and understanding of trends, as well as the spirit of dedicating ourselves to the development of computer languages, will inspire us to move towards a brilliant future for computer languages.
The above is the detailed content of Why do we need computer languages?. For more information, please follow other related articles on the PHP Chinese website!

Hot AI Tools

Undress AI Tool
Undress images for free

Undresser.AI Undress
AI-powered app for creating realistic nude photos

AI Clothes Remover
Online AI tool for removing clothes from photos.

Clothoff.io
AI clothes remover

Video Face Swap
Swap faces in any video effortlessly with our completely free AI face swap tool!

Hot Article

Hot Tools

Notepad++7.3.1
Easy-to-use and free code editor

SublimeText3 Chinese version
Chinese version, very easy to use

Zend Studio 13.0.1
Powerful PHP integrated development environment

Dreamweaver CS6
Visual web development tools

SublimeText3 Mac version
God-level code editing software (SublimeText3)

System restore point setting methods include manual creation, dependency automatic creation, and management of storage space. 1. Manual creation requires system protection to enable in "Create Restore Point", allocate 5% disk space and click "Create" to name the restore point; 2. The system will automatically create restore points when installing updates or changing settings, but do not guarantee comprehensiveness; 3. The restore point occupies no more than 5% of the system disk space by default, and the old version will be automatically cleaned, and storage can be managed by adjusting the upper limit.

When encountering the blue screen error VIDEO_TDR_FAILURE(nvlddmkm.sys), priority should be given to troubleshooting graphics card driver or hardware problems. 1. Update or rollback the graphics card driver: automatically search and update through the device manager, manually install or roll back to the old stable driver using NVIDIA official website tools; 2. Adjust the TDR mechanism: Modify the TdrDelay value in the registry to extend the system waiting time; 3. Check the graphics card hardware status: monitor the temperature, power supply, interface connection and memory module; 4. Check system interference factors: run sfc/scannow to repair system files, uninstall conflicting software, and try safe mode startup to confirm the root cause of the problem. In most cases, the driver problem is first handled. If it occurs repeatedly, it needs to be further deepened.

A firewall is a network security system that monitors and controls network traffic through predefined rules to protect computers or networks from unauthorized access. Its core functions include: 1. Check the source, destination address, port and protocol of the data packet; 2. Determine whether to allow connections based on trust; 3. Block suspicious or malicious behavior; 4. Support different types such as packet filtering firewalls, status detection firewalls, application layer firewalls and next-generation firewalls; 5. Users can enable built-in firewalls through operating system settings, such as Windows Security Center or macOS system preferences; 6. The firewall should be used in combination with other security measures such as strong passwords and update software to enhance protection.

To prevent specific programs from being connected to the network can be achieved through system firewalls or third-party tools. 1. Windows users can use their own firewall, create new rules in the "outbound rules" to select the program path and set "block connection"; 2. Third-party tools such as GlassWire or NetBalancer provide graphical interfaces that are more convenient to operate, but pay attention to source reliability and performance impact; 3. Mac users can control networking permissions through the command line with pfctl or using LittleSnitch and other tools; 4. A more thorough way is to use the network outage policy. The whitelisting policy prohibits all programs from being connected to the network by default and only allows trusted programs to access. Although the operation modes of different systems are different, the core logic is consistent, and attention should be paid to the details of the path and scope of the rules taking effect.

UAC frequently pops up because the running program requires administrator permissions or the system setting level is too high. Common reasons include installation of software, modifying system settings, running third-party tools and other operation triggers. If using an administrator account, UAC only confirms the operation and not blocks. The methods for reducing prompts include: canceling the program to run as an administrator, lowering the UAC notification level, using a standard user account, and starting the program through the task planner. It is not recommended to turn off UAC completely because it can effectively prevent malicious programs from tampering with the system. You can set the UAC to "notify only when the program changes the computer" to balance security and experience.

The Facebook name change process is simple, but you need to pay attention to the rules. First, log in to the application or web version and go to "Settings and Privacy" > "Settings" > "Personal Information" > "Name", enter a new name, and save it; secondly, you must use your real name, it cannot be modified frequently within 60 days, it cannot contain special characters or numbers, and it cannot be impersonated by others, and the review does not pass the auxiliary verification such as uploading ID cards; it usually takes effect within a few minutes to 3 working days after submission; finally, the name change will not notify friends, the homepage name will be updated simultaneously, and the old name will still be displayed in the history record.

Audio problems are usually caused by changes in settings, abnormal drivers or system service failures. You can troubleshoot them according to the following steps: 1. Check whether the volume is muted, whether the output device is correct, try to re-plug and unplug the headset; 2. Update or roll back the audio driver through the Device Manager, uninstall if necessary and restart the computer; 3. Make sure that the "WindowsAudio" service is started and the startup type is set to automatic; 4. Run the sfc/scannow command to repair possible corrupt system files. Operate step by step in order, and the audio function can be restored in most cases.

Sleep and shutdown have their own uses, and the choice depends on the usage scenario. 1. Sleep is suitable for short rest, maintaining low power consumption and quickly recovering work; 2. Shutdown is suitable for not using for a long time, installing updates or troubleshooting, and completely power outage saves energy; 3. Mixed sleep takes into account memory and hard disk saving to prevent loss of data from power outage; 4. Notebooks should pay attention to battery health to avoid excessive discharge caused by long-term sleep; 5. There may still be background tasks running in sleep mode, and it is recommended to adjust settings according to needs to optimize performance and energy consumption.