๐ŸŒŒ
Privacy Village Academy
Join The Community!AcademyAbout HGPE
  • Hitchhiker's Guide to Privacy Engineering
    • โ“What is HGPE?
      • โš–๏ธWho is this for?
      • ๐Ÿง™โ€โ™‚๏ธPrivacy Engineering
      • ๐ŸŽจCreative Privacy
      • ๐Ÿ”ฎGenerative AI
      • ๐Ÿง‘โ€๐Ÿ’ปAbout the Author
  • ๐Ÿง™โ€โ™‚๏ธThe Ethical AI Governance Playbook 2025 Edition
    • ๐Ÿค–Chapter 1 : AI Literacy
    • ๐ŸŒChapter 2 : AI Governance in the 21st Century
    • โŒ›Chapter 3 - Getting Started with AI Act Compliance
    • ๐Ÿš€Chapter 4 : Rise of AI Governance: Building Ethical & Compliant AI
    • Chapter 5 : Introduction to the Lifecycle of AI
  • ๐ŸŽ“Privacy Engineering Field Guide Season 1
    • โ“Decoding the Digital World: Exploring Everyday Technology
    • ๐Ÿ‘๏ธIntroduction: Why Privacy Matters?
      • Age of Mass Surveillance
      • Privacy & Democracy
      • Privacy & Government Surveillance
    • โšกChapter 1 : How Computers Work?
      • Electricity
      • Bits
      • Logic Gates
      • Central Processing Unit (CPU)
      • Graphic Processing Unit (GPU)
      • Motherboard
      • Data Storage
      • Databases
      • Operating System (OS)
      • Computer Code
      • Programming Languages
      • The File System
      • Bugs and Errors
      • Computer Virus
      • Internet of Things (IoT)
      • Cloud Computing
    • ๐Ÿ›ฐ๏ธChapter 2 : How the internet works?
      • Physical Infrastructure
      • Network and Protocols
      • Switch
      • Routers
      • IP Address
      • Domain Name System (DNS)
      • Mac Address
      • TCP / IP
      • OSI Model
      • Packets
      • The Client - Server Architecture
      • Secure Socket Shell (SSH)
      • Transport Layer Security (TLS)
      • Firewall
      • Tunnels and VPNs
      • Proxy Server
    • ๐Ÿ–ฅ๏ธChapter 3 : How Websites Work?
      • HTML
      • CSS
      • Javascript
      • Web Server
      • Browser
      • HTTP
      • Databases
      • Front End (Client Side)
      • Back End (Server Side)
      • Cookies
      • Local Storage
      • Session Storage
      • IndexedDB
      • XHR Requests
      • Web APIs
      • Webhooks
      • Email Server
      • HTTPS
      • Web Application Firewall
      • Single Sign-on (SS0)
      • OAuth 2.0
      • Pixels
      • Canvas Fingerprinting
      • Email Tracking
      • Containers
      • CI/CD
      • Kubernetes
      • Serverless Architecture
    • โš›๏ธChapter 4 : How Quantum Computers Work?
      • Quantum Properties
      • Quantum Bits (Qubits)
      • Decoherence
      • Quantum Circuits
      • Quantum Algorithms
      • Quantum Sensing
      • Post-Quantum Cryptography
    • ๐Ÿ“ณChapter 5 : Mobile Apps and Privacy
      • Battery
      • Processor
      • Mobile Operating Systems
      • Mobile Data Storage
      • Cellular Data
      • Mobile Device Sensors
      • Wireless Connectivity
      • Camera & Microphone
      • Mobile Apps
      • Software Development Kits (SDKs)
      • Mobile Device Identifiers
      • Bring Your Own Device (BYOD)
  • ๐Ÿ•ต๏ธโ€โ™‚๏ธPrivacy Engineering Field Guide Season 2
    • โ“Introduction to Privacy Engineering for Non-Techs
      • ๐ŸŽญChapter 1 : Digital Identities
        • What is identity?
        • Authentication Flows
        • Authentication vs. Authorization
        • OAuth 2.0
        • OpenID Connect (OIDC)
        • Self Sovereign Identities
        • Decentralized Identifiers
        • eIDAS
      • ๐Ÿ‘๏ธโ€๐Ÿ—จ๏ธChapter 2 : De-Identification
        • Introduction to De-Identification?
        • Input / Output Privacy
        • De-identification Strategies
        • K-Anonymity
        • Differential Privacy
        • Privacy Threat Modeling
  • ๐Ÿ“–HGPE Story and Lore
    • ๐ŸชฆChapter 1 : The Prologue
    • โ˜„๏ธChapter 2 : Battle for Earth
    • ๐Ÿฆ Chapter 3 : A Nightmare To Remember
    • ๐Ÿง™โ€โ™‚๏ธChapter 4 : The Academy
    • ๐ŸŒƒChapter 5: The Approaching Darkness
    • โš”๏ธChapter 6 : The Invasion
    • ๐ŸฐChapter 7 : The Fall of the Academy
    • ๐Ÿ›ฉ๏ธChapter 8 : The Escape
    • ๐ŸชChapter 9 : The Moon Cave
    • ๐Ÿฆ‡Chapter 10: Queen of Darkness
  • ๐Ÿ“บVideos, Audio Book and Soundtracks
    • ๐ŸŽงReading Episodes
    • ๐ŸŽนSoundtracks
  • ๐Ÿ‘พHGPE Privacy Games and Challenges
    • ๐ŸŽฎData Privacy Day'23 / Privacy Treasure Hunt Game
    • ๐ŸงฉPrivacy Quest
  • ๐Ÿ“ฌSubscribe Now!
Powered by GitBook
On this page
  • What is electricity?
  • Turbines
  • Transistors

Was this helpful?

  1. Privacy Engineering Field Guide Season 1
  2. Chapter 1 : How Computers Work?

Electricity

How do we power our computers and use electrons for computing?

PreviousChapter 1 : How Computers Work?NextBits

Last updated 2 years ago

Was this helpful?

What is electricity?

Atoms have electrons and flow of these electrons is defined as electricity. Electricity is defined as the presence of a charge, think of it as electrons flowing through a wire.

The story of electricity, much like the story of everything else, is a tale of improbability and wonder. It's a story that begins with atoms, those curious building blocks of matter that makeup everything we know and love.

Now, atoms are like tiny solar systems, with a central nucleus orbited by a cloud of electrons. These electrons are the key to understanding how electricity works.

You see, electrons have a negative charge, and they're always looking for a way to balance that charge out. So, when you rub a balloon on your head, you're actually transferring some of your electrons onto the balloon. And when you touch the balloon to a wall, those electrons leap onto the wall in search of a way to balance out their charge. That's what we call static electricity.

But what about the electricity that powers our homes and gadgets?

Well, that's a little more complicated. It involves generators, transformers, and miles and miles of power lines.

Turbines

Generators use turbines to convert mechanical energy into electrical energy. That electrical energy is then sent through transformers, which increase or decrease the voltage to make it suitable for transmission over power lines.

And those power lines carry the electricity from power plants to our homes and businesses, where it's used to power our lights, computers, and refrigerators.

The energy of these particles in motion can be converted to other forms of energy, such as creating light in a lamp, playing sound, or charging an android.

Transistors

Think of logical gates as pipes and electricity as water. The pipes are designed in a way to help water flow based on the purpose of how to use the water.

A modern computer will generally need between 500W โ€“ 850W to effectively power all hardware, although it will depend entirely on the power consumption of the system.

Since computers work on electricity, their speed is related to the speed of electricity.

A ("the brain of the computer") is composed of billions of electric transistors. These transistors are engineered to form โ€˜logic gatesโ€™. The electricity that flows through these logic gates is what the computers use electricity for.

Silicon's electrical properties can be modified through a process called doping. These characteristics make it an ideal material for making transistors that . Hence the name for the startup and innovation center of the planet Earth was named before the .

Each transistor is then used to form . Which can either be 1 or 0 based on whether they have electricity or not. The bits are grouped together as transistors physically placed side-by-side to form

CPU
amplify electrical signals
silicon valley
Battle for Earth
bits
bytes.
๐ŸŽ“
โšก
Everything started when computers talked to each other for the first time. Computers sat motionless, waited in silence, and grimly did what humans ordered for hundreds of years. Until they didnโ€™t. - Journals of Order of Epoch, 2234 Anno Domini
Page cover image