SlideShare a Scribd company logo
1 of 15
WELCOME TO
• Speed
• Accuracy
• Huge Storage
• Online
• Online Study
• Research
• Internet
Speed :: The biggest and the greatest advantage of
computer is there speed .computer can perform huge
amount of calculations within a fraction of a second.
Accuracy :: Despite of its
amazing speed modern
computer can work with
almost 100% accuracy.
which is very important
while performing huge
calculations..
Huge Storage :: Computer have an internal and
external storage unit where one can store huge
amount of data and recall or receive whenever in
need.
Primary examples of internal storage unit are ::
main memory and RAM [Random access memory]
Primary examples of external storage unit are ::
Hard disk and pen drives
Online Business :: Online business are
blossomed in few years people are earning
more than working offline and many of the
entrepreneur have shifted there business to
online using internet via websites and Apps.
Online Study :: Students are
seeking higher education while
sitting in front of there
computer screen and getting
higher degres ,diploma and
certificates.
Research :: Scientist prefer using
modern computer for there
research purposes as the
calculations which used to take
several days can be done within a
blink of eye using computers.
• Health
• Pornography
• Spread of viruses
• Cyber Crimes
• Environment Effects
• Voilence
Health :: Sitting long hours in front
of computer screen can harm your
eyesight as well as your body. So
One should take ample rest or break
while using computer for long
durations.
Pornography :: As the internet
reached to all section of human society .
The reach of pronographic content to
small children’s and even grow ones is
made very easy .
Spread of viruses :: Virus are just
computer programs which are
designed and developed to harm
the computer, steal important
information like passwords, pins and
other sensitive information. Hackers
use this program to crack your
system down and get unauthorized
access to your computer systems,
which can damage people
economically as well as socially .
Cyber Crimes :: Online security has
been a challenged to some extend
because some the computer geek
which are very good in computer
manipulations can get access to your
sensitive information stored in
computer memory i.e hard disk
drives.
Environment Effects :: Environment effects are huge
nowadays as the waste product or e-garbage has made life
misrable where to dumb this
is a big question arise to many countries which are developed or
even developing countries like India.
As the ever developing technology new up-gradation in computer
hardware and peripherals devices occurs every single day.
Voilence :: Irrespective of many securities
our data can be lost due to damaged memory
or using spam websites while they inject
malicious program Trojan, worm to your
computer system which corrupts or even
destroys the data available on your systems.

More Related Content

What's hot

computer fundamental
computer fundamental computer fundamental
computer fundamental
sanity softwares pvt ltd
 

What's hot (20)

Computer fundamentals
Computer fundamentalsComputer fundamentals
Computer fundamentals
 
advantages and disadvantages of computer
advantages and disadvantages  of computeradvantages and disadvantages  of computer
advantages and disadvantages of computer
 
Characteristics of Computer
Characteristics of Computer Characteristics of Computer
Characteristics of Computer
 
Introduction of computer and basics of computer
Introduction of computer and basics of computerIntroduction of computer and basics of computer
Introduction of computer and basics of computer
 
what is computer
what is computerwhat is computer
what is computer
 
CHAP 1 - INTRODUCTION TO COMPUTERS
CHAP 1 - INTRODUCTION TO COMPUTERSCHAP 1 - INTRODUCTION TO COMPUTERS
CHAP 1 - INTRODUCTION TO COMPUTERS
 
Types of Computer
Types of ComputerTypes of Computer
Types of Computer
 
Introduction of computer
Introduction of computer Introduction of computer
Introduction of computer
 
Advantages And Disadvantages of Using Computer
Advantages And Disadvantages of Using ComputerAdvantages And Disadvantages of Using Computer
Advantages And Disadvantages of Using Computer
 
Classification of Computer
Classification of ComputerClassification of Computer
Classification of Computer
 
Types of Computer
Types of ComputerTypes of Computer
Types of Computer
 
characterstics of computer
characterstics of computercharacterstics of computer
characterstics of computer
 
The History and Generation of Computers
The History and Generation of ComputersThe History and Generation of Computers
The History and Generation of Computers
 
computer fundamental
computer fundamental computer fundamental
computer fundamental
 
Characteristics of computer.ppt tamoor
Characteristics of computer.ppt tamoorCharacteristics of computer.ppt tamoor
Characteristics of computer.ppt tamoor
 
APPLICATIONS OF COMPUTER
APPLICATIONS OF COMPUTERAPPLICATIONS OF COMPUTER
APPLICATIONS OF COMPUTER
 
Types-of-computer-ppt
Types-of-computer-pptTypes-of-computer-ppt
Types-of-computer-ppt
 
Computer presentation
Computer presentationComputer presentation
Computer presentation
 
Introduction to Computer Software
Introduction to Computer SoftwareIntroduction to Computer Software
Introduction to Computer Software
 
Categories of computer
Categories of computerCategories of computer
Categories of computer
 

Similar to Advantages and disadvantages of computer system

2014CyberSecurityProject
2014CyberSecurityProject2014CyberSecurityProject
2014CyberSecurityProject
Kaley Hair
 
Introduction to internet (239 kb)
Introduction to internet (239 kb)Introduction to internet (239 kb)
Introduction to internet (239 kb)
IMRAN KHAN
 
Ict form 4 chapter 1(answer)
Ict form 4 chapter 1(answer)Ict form 4 chapter 1(answer)
Ict form 4 chapter 1(answer)
smkengkilili2011
 

Similar to Advantages and disadvantages of computer system (20)

2014CyberSecurityProject
2014CyberSecurityProject2014CyberSecurityProject
2014CyberSecurityProject
 
Introduce to internet2
Introduce to internet2 Introduce to internet2
Introduce to internet2
 
The World of Information
The World of InformationThe World of Information
The World of Information
 
Introduction to computer
Introduction to computerIntroduction to computer
Introduction to computer
 
Presentation (6).pptx
Presentation (6).pptxPresentation (6).pptx
Presentation (6).pptx
 
INTERNET AND E-COMMERCE
INTERNET AND E-COMMERCEINTERNET AND E-COMMERCE
INTERNET AND E-COMMERCE
 
Internet surfing and security
Internet surfing and securityInternet surfing and security
Internet surfing and security
 
Introduction to internet (239 kb)
Introduction to internet (239 kb)Introduction to internet (239 kb)
Introduction to internet (239 kb)
 
Cybersecurity.pptx
Cybersecurity.pptxCybersecurity.pptx
Cybersecurity.pptx
 
Abhay pratap singh rajawat
Abhay pratap singh rajawatAbhay pratap singh rajawat
Abhay pratap singh rajawat
 
Ict form 4 chapter 1(answer)
Ict form 4 chapter 1(answer)Ict form 4 chapter 1(answer)
Ict form 4 chapter 1(answer)
 
Internet
InternetInternet
Internet
 
REVIEWER-FOR-ETECH.docx
REVIEWER-FOR-ETECH.docxREVIEWER-FOR-ETECH.docx
REVIEWER-FOR-ETECH.docx
 
REVIEWER-FOR-ETECH (1).docx
REVIEWER-FOR-ETECH (1).docxREVIEWER-FOR-ETECH (1).docx
REVIEWER-FOR-ETECH (1).docx
 
REVIEWER-FOR-ETECH.docx
REVIEWER-FOR-ETECH.docxREVIEWER-FOR-ETECH.docx
REVIEWER-FOR-ETECH.docx
 
REVIEWER ETECH
REVIEWER ETECHREVIEWER ETECH
REVIEWER ETECH
 
REVIEWER-FOR-ETECH (1).docx
REVIEWER-FOR-ETECH (1).docxREVIEWER-FOR-ETECH (1).docx
REVIEWER-FOR-ETECH (1).docx
 
Empowerment Technology
Empowerment Technology Empowerment Technology
Empowerment Technology
 
REVIEWER-FOR-ETECH.docx
REVIEWER-FOR-ETECH.docxREVIEWER-FOR-ETECH.docx
REVIEWER-FOR-ETECH.docx
 
REVIEWER-FOR-ETECH.docx
REVIEWER-FOR-ETECH.docxREVIEWER-FOR-ETECH.docx
REVIEWER-FOR-ETECH.docx
 

More from parag dhok

More from parag dhok (8)

Classifications of computer
Classifications of computerClassifications of computer
Classifications of computer
 
What is motherboard
What is motherboardWhat is motherboard
What is motherboard
 
Output devices-of-computer-system
Output devices-of-computer-systemOutput devices-of-computer-system
Output devices-of-computer-system
 
How to install windows 8 using usb pen drive
How to install windows 8 using usb pen driveHow to install windows 8 using usb pen drive
How to install windows 8 using usb pen drive
 
What is computer hardware and software
What is computer hardware and softwareWhat is computer hardware and software
What is computer hardware and software
 
How to-create-a-dos-bootable-usb-pendrive
How to-create-a-dos-bootable-usb-pendriveHow to-create-a-dos-bootable-usb-pendrive
How to-create-a-dos-bootable-usb-pendrive
 
Basic dos-commands
Basic dos-commandsBasic dos-commands
Basic dos-commands
 
What is-dos-operating-system
What is-dos-operating-systemWhat is-dos-operating-system
What is-dos-operating-system
 

Recently uploaded

+971581248768>> SAFE AND ORIGINAL ABORTION PILLS FOR SALE IN DUBAI AND ABUDHA...
+971581248768>> SAFE AND ORIGINAL ABORTION PILLS FOR SALE IN DUBAI AND ABUDHA...+971581248768>> SAFE AND ORIGINAL ABORTION PILLS FOR SALE IN DUBAI AND ABUDHA...
+971581248768>> SAFE AND ORIGINAL ABORTION PILLS FOR SALE IN DUBAI AND ABUDHA...
?#DUbAI#??##{{(☎️+971_581248768%)**%*]'#abortion pills for sale in dubai@
 
Why Teams call analytics are critical to your entire business
Why Teams call analytics are critical to your entire businessWhy Teams call analytics are critical to your entire business
Why Teams call analytics are critical to your entire business
panagenda
 

Recently uploaded (20)

A Year of the Servo Reboot: Where Are We Now?
A Year of the Servo Reboot: Where Are We Now?A Year of the Servo Reboot: Where Are We Now?
A Year of the Servo Reboot: Where Are We Now?
 
Apidays New York 2024 - The value of a flexible API Management solution for O...
Apidays New York 2024 - The value of a flexible API Management solution for O...Apidays New York 2024 - The value of a flexible API Management solution for O...
Apidays New York 2024 - The value of a flexible API Management solution for O...
 
From Event to Action: Accelerate Your Decision Making with Real-Time Automation
From Event to Action: Accelerate Your Decision Making with Real-Time AutomationFrom Event to Action: Accelerate Your Decision Making with Real-Time Automation
From Event to Action: Accelerate Your Decision Making with Real-Time Automation
 
GenAI Risks & Security Meetup 01052024.pdf
GenAI Risks & Security Meetup 01052024.pdfGenAI Risks & Security Meetup 01052024.pdf
GenAI Risks & Security Meetup 01052024.pdf
 
Boost PC performance: How more available memory can improve productivity
Boost PC performance: How more available memory can improve productivityBoost PC performance: How more available memory can improve productivity
Boost PC performance: How more available memory can improve productivity
 
Bajaj Allianz Life Insurance Company - Insurer Innovation Award 2024
Bajaj Allianz Life Insurance Company - Insurer Innovation Award 2024Bajaj Allianz Life Insurance Company - Insurer Innovation Award 2024
Bajaj Allianz Life Insurance Company - Insurer Innovation Award 2024
 
HTML Injection Attacks: Impact and Mitigation Strategies
HTML Injection Attacks: Impact and Mitigation StrategiesHTML Injection Attacks: Impact and Mitigation Strategies
HTML Injection Attacks: Impact and Mitigation Strategies
 
Apidays New York 2024 - Scaling API-first by Ian Reasor and Radu Cotescu, Adobe
Apidays New York 2024 - Scaling API-first by Ian Reasor and Radu Cotescu, AdobeApidays New York 2024 - Scaling API-first by Ian Reasor and Radu Cotescu, Adobe
Apidays New York 2024 - Scaling API-first by Ian Reasor and Radu Cotescu, Adobe
 
TrustArc Webinar - Unlock the Power of AI-Driven Data Discovery
TrustArc Webinar - Unlock the Power of AI-Driven Data DiscoveryTrustArc Webinar - Unlock the Power of AI-Driven Data Discovery
TrustArc Webinar - Unlock the Power of AI-Driven Data Discovery
 
Automating Google Workspace (GWS) & more with Apps Script
Automating Google Workspace (GWS) & more with Apps ScriptAutomating Google Workspace (GWS) & more with Apps Script
Automating Google Workspace (GWS) & more with Apps Script
 
Boost Fertility New Invention Ups Success Rates.pdf
Boost Fertility New Invention Ups Success Rates.pdfBoost Fertility New Invention Ups Success Rates.pdf
Boost Fertility New Invention Ups Success Rates.pdf
 
Real Time Object Detection Using Open CV
Real Time Object Detection Using Open CVReal Time Object Detection Using Open CV
Real Time Object Detection Using Open CV
 
+971581248768>> SAFE AND ORIGINAL ABORTION PILLS FOR SALE IN DUBAI AND ABUDHA...
+971581248768>> SAFE AND ORIGINAL ABORTION PILLS FOR SALE IN DUBAI AND ABUDHA...+971581248768>> SAFE AND ORIGINAL ABORTION PILLS FOR SALE IN DUBAI AND ABUDHA...
+971581248768>> SAFE AND ORIGINAL ABORTION PILLS FOR SALE IN DUBAI AND ABUDHA...
 
Why Teams call analytics are critical to your entire business
Why Teams call analytics are critical to your entire businessWhy Teams call analytics are critical to your entire business
Why Teams call analytics are critical to your entire business
 
Artificial Intelligence Chap.5 : Uncertainty
Artificial Intelligence Chap.5 : UncertaintyArtificial Intelligence Chap.5 : Uncertainty
Artificial Intelligence Chap.5 : Uncertainty
 
A Domino Admins Adventures (Engage 2024)
A Domino Admins Adventures (Engage 2024)A Domino Admins Adventures (Engage 2024)
A Domino Admins Adventures (Engage 2024)
 
Top 5 Benefits OF Using Muvi Live Paywall For Live Streams
Top 5 Benefits OF Using Muvi Live Paywall For Live StreamsTop 5 Benefits OF Using Muvi Live Paywall For Live Streams
Top 5 Benefits OF Using Muvi Live Paywall For Live Streams
 
TrustArc Webinar - Stay Ahead of US State Data Privacy Law Developments
TrustArc Webinar - Stay Ahead of US State Data Privacy Law DevelopmentsTrustArc Webinar - Stay Ahead of US State Data Privacy Law Developments
TrustArc Webinar - Stay Ahead of US State Data Privacy Law Developments
 
Scaling API-first – The story of a global engineering organization
Scaling API-first – The story of a global engineering organizationScaling API-first – The story of a global engineering organization
Scaling API-first – The story of a global engineering organization
 
How to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected WorkerHow to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected Worker
 

Advantages and disadvantages of computer system

  • 2. • Speed • Accuracy • Huge Storage • Online • Online Study • Research • Internet
  • 3. Speed :: The biggest and the greatest advantage of computer is there speed .computer can perform huge amount of calculations within a fraction of a second.
  • 4. Accuracy :: Despite of its amazing speed modern computer can work with almost 100% accuracy. which is very important while performing huge calculations..
  • 5. Huge Storage :: Computer have an internal and external storage unit where one can store huge amount of data and recall or receive whenever in need. Primary examples of internal storage unit are :: main memory and RAM [Random access memory] Primary examples of external storage unit are :: Hard disk and pen drives
  • 6. Online Business :: Online business are blossomed in few years people are earning more than working offline and many of the entrepreneur have shifted there business to online using internet via websites and Apps.
  • 7. Online Study :: Students are seeking higher education while sitting in front of there computer screen and getting higher degres ,diploma and certificates.
  • 8. Research :: Scientist prefer using modern computer for there research purposes as the calculations which used to take several days can be done within a blink of eye using computers.
  • 9. • Health • Pornography • Spread of viruses • Cyber Crimes • Environment Effects • Voilence
  • 10. Health :: Sitting long hours in front of computer screen can harm your eyesight as well as your body. So One should take ample rest or break while using computer for long durations.
  • 11. Pornography :: As the internet reached to all section of human society . The reach of pronographic content to small children’s and even grow ones is made very easy .
  • 12. Spread of viruses :: Virus are just computer programs which are designed and developed to harm the computer, steal important information like passwords, pins and other sensitive information. Hackers use this program to crack your system down and get unauthorized access to your computer systems, which can damage people economically as well as socially .
  • 13. Cyber Crimes :: Online security has been a challenged to some extend because some the computer geek which are very good in computer manipulations can get access to your sensitive information stored in computer memory i.e hard disk drives.
  • 14. Environment Effects :: Environment effects are huge nowadays as the waste product or e-garbage has made life misrable where to dumb this is a big question arise to many countries which are developed or even developing countries like India. As the ever developing technology new up-gradation in computer hardware and peripherals devices occurs every single day.
  • 15. Voilence :: Irrespective of many securities our data can be lost due to damaged memory or using spam websites while they inject malicious program Trojan, worm to your computer system which corrupts or even destroys the data available on your systems.