SlideShare a Scribd company logo
1 of 15
WELCOME TO
• Speed
• Accuracy
• Huge Storage
• Online
• Online Study
• Research
• Internet
Speed :: The biggest and the greatest advantage of
computer is there speed .computer can perform huge
amount of calculations within a fraction of a second.
Accuracy :: Despite of its
amazing speed modern
computer can work with
almost 100% accuracy.
which is very important
while performing huge
calculations..
Huge Storage :: Computer have an internal and
external storage unit where one can store huge
amount of data and recall or receive whenever in
need.
Primary examples of internal storage unit are ::
main memory and RAM [Random access memory]
Primary examples of external storage unit are ::
Hard disk and pen drives
Online Business :: Online business are
blossomed in few years people are earning
more than working offline and many of the
entrepreneur have shifted there business to
online using internet via websites and Apps.
Online Study :: Students are
seeking higher education while
sitting in front of there
computer screen and getting
higher degres ,diploma and
certificates.
Research :: Scientist prefer using
modern computer for there
research purposes as the
calculations which used to take
several days can be done within a
blink of eye using computers.
• Health
• Pornography
• Spread of viruses
• Cyber Crimes
• Environment Effects
• Voilence
Health :: Sitting long hours in front
of computer screen can harm your
eyesight as well as your body. So
One should take ample rest or break
while using computer for long
durations.
Pornography :: As the internet
reached to all section of human society .
The reach of pronographic content to
small children’s and even grow ones is
made very easy .
Spread of viruses :: Virus are just
computer programs which are
designed and developed to harm
the computer, steal important
information like passwords, pins and
other sensitive information. Hackers
use this program to crack your
system down and get unauthorized
access to your computer systems,
which can damage people
economically as well as socially .
Cyber Crimes :: Online security has
been a challenged to some extend
because some the computer geek
which are very good in computer
manipulations can get access to your
sensitive information stored in
computer memory i.e hard disk
drives.
Environment Effects :: Environment effects are huge
nowadays as the waste product or e-garbage has made life
misrable where to dumb this
is a big question arise to many countries which are developed or
even developing countries like India.
As the ever developing technology new up-gradation in computer
hardware and peripherals devices occurs every single day.
Voilence :: Irrespective of many securities
our data can be lost due to damaged memory
or using spam websites while they inject
malicious program Trojan, worm to your
computer system which corrupts or even
destroys the data available on your systems.

More Related Content

What's hot (20)

Types of computer
Types of computerTypes of computer
Types of computer
 
Memory / Storage Devices
Memory / Storage DevicesMemory / Storage Devices
Memory / Storage Devices
 
Application software
Application softwareApplication software
Application software
 
Classification of Computer
Classification of ComputerClassification of Computer
Classification of Computer
 
Application of Computer
Application of ComputerApplication of Computer
Application of Computer
 
Computer Software & its Types
Computer Software & its Types Computer Software & its Types
Computer Software & its Types
 
Basics of Computer.ppt
Basics of Computer.pptBasics of Computer.ppt
Basics of Computer.ppt
 
Information technology
Information technologyInformation technology
Information technology
 
Computer basics
Computer basicsComputer basics
Computer basics
 
computer
computercomputer
computer
 
1 basic computer course
1 basic computer course1 basic computer course
1 basic computer course
 
Disadvantages of using computers
Disadvantages of using computersDisadvantages of using computers
Disadvantages of using computers
 
basics of computer system ppt
basics of computer system pptbasics of computer system ppt
basics of computer system ppt
 
Characteristics of Computer
Characteristics of Computer Characteristics of Computer
Characteristics of Computer
 
Uses of computer
Uses of computerUses of computer
Uses of computer
 
Types of computer
Types of computerTypes of computer
Types of computer
 
COMPUTER AND ITS USES
COMPUTER AND ITS USESCOMPUTER AND ITS USES
COMPUTER AND ITS USES
 
Introduction to computer
Introduction to computerIntroduction to computer
Introduction to computer
 
Types-of-computer-ppt
Types-of-computer-pptTypes-of-computer-ppt
Types-of-computer-ppt
 
Introduction To Computer
Introduction To ComputerIntroduction To Computer
Introduction To Computer
 

Similar to Advantages and disadvantages of computer system

2014CyberSecurityProject
2014CyberSecurityProject2014CyberSecurityProject
2014CyberSecurityProjectKaley Hair
 
Introduce to internet2
Introduce to internet2 Introduce to internet2
Introduce to internet2 Hardini_HD
 
The World of Information
The World of InformationThe World of Information
The World of InformationBadal Dixit
 
INTERNET AND E-COMMERCE
INTERNET AND E-COMMERCEINTERNET AND E-COMMERCE
INTERNET AND E-COMMERCEUsama ahmad
 
Internet surfing and security
Internet surfing and securityInternet surfing and security
Internet surfing and securitynamansaini11
 
Introduction to internet (239 kb)
Introduction to internet (239 kb)Introduction to internet (239 kb)
Introduction to internet (239 kb)IMRAN KHAN
 
Ict form 4 chapter 1(answer)
Ict form 4 chapter 1(answer)Ict form 4 chapter 1(answer)
Ict form 4 chapter 1(answer)smkengkilili2011
 
REVIEWER-FOR-ETECH.docx
REVIEWER-FOR-ETECH.docxREVIEWER-FOR-ETECH.docx
REVIEWER-FOR-ETECH.docxRheamaeLiwan
 
REVIEWER-FOR-ETECH (1).docx
REVIEWER-FOR-ETECH (1).docxREVIEWER-FOR-ETECH (1).docx
REVIEWER-FOR-ETECH (1).docxJakeTorio1
 
REVIEWER-FOR-ETECH (1).docx
REVIEWER-FOR-ETECH (1).docxREVIEWER-FOR-ETECH (1).docx
REVIEWER-FOR-ETECH (1).docxEhraicaSaquing
 
REVIEWER-FOR-ETECH.docx
REVIEWER-FOR-ETECH.docxREVIEWER-FOR-ETECH.docx
REVIEWER-FOR-ETECH.docxDineLiwan
 
REVIEWER-FOR-ETECH.docx
REVIEWER-FOR-ETECH.docxREVIEWER-FOR-ETECH.docx
REVIEWER-FOR-ETECH.docxLiberty Aquino
 

Similar to Advantages and disadvantages of computer system (20)

2014CyberSecurityProject
2014CyberSecurityProject2014CyberSecurityProject
2014CyberSecurityProject
 
Introduce to internet2
Introduce to internet2 Introduce to internet2
Introduce to internet2
 
The World of Information
The World of InformationThe World of Information
The World of Information
 
Introduction to computer
Introduction to computerIntroduction to computer
Introduction to computer
 
Presentation (6).pptx
Presentation (6).pptxPresentation (6).pptx
Presentation (6).pptx
 
INTERNET AND E-COMMERCE
INTERNET AND E-COMMERCEINTERNET AND E-COMMERCE
INTERNET AND E-COMMERCE
 
Internet surfing and security
Internet surfing and securityInternet surfing and security
Internet surfing and security
 
Introduction to internet (239 kb)
Introduction to internet (239 kb)Introduction to internet (239 kb)
Introduction to internet (239 kb)
 
Cybersecurity.pptx
Cybersecurity.pptxCybersecurity.pptx
Cybersecurity.pptx
 
Abhay pratap singh rajawat
Abhay pratap singh rajawatAbhay pratap singh rajawat
Abhay pratap singh rajawat
 
Ict form 4 chapter 1(answer)
Ict form 4 chapter 1(answer)Ict form 4 chapter 1(answer)
Ict form 4 chapter 1(answer)
 
Internet
InternetInternet
Internet
 
REVIEWER-FOR-ETECH.docx
REVIEWER-FOR-ETECH.docxREVIEWER-FOR-ETECH.docx
REVIEWER-FOR-ETECH.docx
 
REVIEWER-FOR-ETECH (1).docx
REVIEWER-FOR-ETECH (1).docxREVIEWER-FOR-ETECH (1).docx
REVIEWER-FOR-ETECH (1).docx
 
REVIEWER-FOR-ETECH.docx
REVIEWER-FOR-ETECH.docxREVIEWER-FOR-ETECH.docx
REVIEWER-FOR-ETECH.docx
 
REVIEWER ETECH
REVIEWER ETECHREVIEWER ETECH
REVIEWER ETECH
 
REVIEWER-FOR-ETECH (1).docx
REVIEWER-FOR-ETECH (1).docxREVIEWER-FOR-ETECH (1).docx
REVIEWER-FOR-ETECH (1).docx
 
Empowerment Technology
Empowerment Technology Empowerment Technology
Empowerment Technology
 
REVIEWER-FOR-ETECH.docx
REVIEWER-FOR-ETECH.docxREVIEWER-FOR-ETECH.docx
REVIEWER-FOR-ETECH.docx
 
REVIEWER-FOR-ETECH.docx
REVIEWER-FOR-ETECH.docxREVIEWER-FOR-ETECH.docx
REVIEWER-FOR-ETECH.docx
 

More from parag dhok

Classifications of computer
Classifications of computerClassifications of computer
Classifications of computerparag dhok
 
What is motherboard
What is motherboardWhat is motherboard
What is motherboardparag dhok
 
Output devices-of-computer-system
Output devices-of-computer-systemOutput devices-of-computer-system
Output devices-of-computer-systemparag dhok
 
How to install windows 8 using usb pen drive
How to install windows 8 using usb pen driveHow to install windows 8 using usb pen drive
How to install windows 8 using usb pen driveparag dhok
 
What is computer hardware and software
What is computer hardware and softwareWhat is computer hardware and software
What is computer hardware and softwareparag dhok
 
How to-create-a-dos-bootable-usb-pendrive
How to-create-a-dos-bootable-usb-pendriveHow to-create-a-dos-bootable-usb-pendrive
How to-create-a-dos-bootable-usb-pendriveparag dhok
 
Basic dos-commands
Basic dos-commandsBasic dos-commands
Basic dos-commandsparag dhok
 
What is-dos-operating-system
What is-dos-operating-systemWhat is-dos-operating-system
What is-dos-operating-systemparag dhok
 

More from parag dhok (8)

Classifications of computer
Classifications of computerClassifications of computer
Classifications of computer
 
What is motherboard
What is motherboardWhat is motherboard
What is motherboard
 
Output devices-of-computer-system
Output devices-of-computer-systemOutput devices-of-computer-system
Output devices-of-computer-system
 
How to install windows 8 using usb pen drive
How to install windows 8 using usb pen driveHow to install windows 8 using usb pen drive
How to install windows 8 using usb pen drive
 
What is computer hardware and software
What is computer hardware and softwareWhat is computer hardware and software
What is computer hardware and software
 
How to-create-a-dos-bootable-usb-pendrive
How to-create-a-dos-bootable-usb-pendriveHow to-create-a-dos-bootable-usb-pendrive
How to-create-a-dos-bootable-usb-pendrive
 
Basic dos-commands
Basic dos-commandsBasic dos-commands
Basic dos-commands
 
What is-dos-operating-system
What is-dos-operating-systemWhat is-dos-operating-system
What is-dos-operating-system
 

Recently uploaded

Maximizing Board Effectiveness 2024 Webinar.pptx
Maximizing Board Effectiveness 2024 Webinar.pptxMaximizing Board Effectiveness 2024 Webinar.pptx
Maximizing Board Effectiveness 2024 Webinar.pptxOnBoard
 
Handwritten Text Recognition for manuscripts and early printed texts
Handwritten Text Recognition for manuscripts and early printed textsHandwritten Text Recognition for manuscripts and early printed texts
Handwritten Text Recognition for manuscripts and early printed textsMaria Levchenko
 
Transforming Data Streams with Kafka Connect: An Introduction to Single Messa...
Transforming Data Streams with Kafka Connect: An Introduction to Single Messa...Transforming Data Streams with Kafka Connect: An Introduction to Single Messa...
Transforming Data Streams with Kafka Connect: An Introduction to Single Messa...HostedbyConfluent
 
Tech-Forward - Achieving Business Readiness For Copilot in Microsoft 365
Tech-Forward - Achieving Business Readiness For Copilot in Microsoft 365Tech-Forward - Achieving Business Readiness For Copilot in Microsoft 365
Tech-Forward - Achieving Business Readiness For Copilot in Microsoft 3652toLead Limited
 
08448380779 Call Girls In Diplomatic Enclave Women Seeking Men
08448380779 Call Girls In Diplomatic Enclave Women Seeking Men08448380779 Call Girls In Diplomatic Enclave Women Seeking Men
08448380779 Call Girls In Diplomatic Enclave Women Seeking MenDelhi Call girls
 
Key Features Of Token Development (1).pptx
Key  Features Of Token  Development (1).pptxKey  Features Of Token  Development (1).pptx
Key Features Of Token Development (1).pptxLBM Solutions
 
Kotlin Multiplatform & Compose Multiplatform - Starter kit for pragmatics
Kotlin Multiplatform & Compose Multiplatform - Starter kit for pragmaticsKotlin Multiplatform & Compose Multiplatform - Starter kit for pragmatics
Kotlin Multiplatform & Compose Multiplatform - Starter kit for pragmaticscarlostorres15106
 
SIEMENS: RAPUNZEL – A Tale About Knowledge Graph
SIEMENS: RAPUNZEL – A Tale About Knowledge GraphSIEMENS: RAPUNZEL – A Tale About Knowledge Graph
SIEMENS: RAPUNZEL – A Tale About Knowledge GraphNeo4j
 
Transcript: #StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024
Transcript: #StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024Transcript: #StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024
Transcript: #StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024BookNet Canada
 
#StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024
#StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024#StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024
#StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024BookNet Canada
 
08448380779 Call Girls In Civil Lines Women Seeking Men
08448380779 Call Girls In Civil Lines Women Seeking Men08448380779 Call Girls In Civil Lines Women Seeking Men
08448380779 Call Girls In Civil Lines Women Seeking MenDelhi Call girls
 
Salesforce Community Group Quito, Salesforce 101
Salesforce Community Group Quito, Salesforce 101Salesforce Community Group Quito, Salesforce 101
Salesforce Community Group Quito, Salesforce 101Paola De la Torre
 
Pigging Solutions in Pet Food Manufacturing
Pigging Solutions in Pet Food ManufacturingPigging Solutions in Pet Food Manufacturing
Pigging Solutions in Pet Food ManufacturingPigging Solutions
 
[2024]Digital Global Overview Report 2024 Meltwater.pdf
[2024]Digital Global Overview Report 2024 Meltwater.pdf[2024]Digital Global Overview Report 2024 Meltwater.pdf
[2024]Digital Global Overview Report 2024 Meltwater.pdfhans926745
 
04-2024-HHUG-Sales-and-Marketing-Alignment.pptx
04-2024-HHUG-Sales-and-Marketing-Alignment.pptx04-2024-HHUG-Sales-and-Marketing-Alignment.pptx
04-2024-HHUG-Sales-and-Marketing-Alignment.pptxHampshireHUG
 
AI as an Interface for Commercial Buildings
AI as an Interface for Commercial BuildingsAI as an Interface for Commercial Buildings
AI as an Interface for Commercial BuildingsMemoori
 
How to Remove Document Management Hurdles with X-Docs?
How to Remove Document Management Hurdles with X-Docs?How to Remove Document Management Hurdles with X-Docs?
How to Remove Document Management Hurdles with X-Docs?XfilesPro
 
Beyond Boundaries: Leveraging No-Code Solutions for Industry Innovation
Beyond Boundaries: Leveraging No-Code Solutions for Industry InnovationBeyond Boundaries: Leveraging No-Code Solutions for Industry Innovation
Beyond Boundaries: Leveraging No-Code Solutions for Industry InnovationSafe Software
 
FULL ENJOY 🔝 8264348440 🔝 Call Girls in Diplomatic Enclave | Delhi
FULL ENJOY 🔝 8264348440 🔝 Call Girls in Diplomatic Enclave | DelhiFULL ENJOY 🔝 8264348440 🔝 Call Girls in Diplomatic Enclave | Delhi
FULL ENJOY 🔝 8264348440 🔝 Call Girls in Diplomatic Enclave | Delhisoniya singh
 
Automating Business Process via MuleSoft Composer | Bangalore MuleSoft Meetup...
Automating Business Process via MuleSoft Composer | Bangalore MuleSoft Meetup...Automating Business Process via MuleSoft Composer | Bangalore MuleSoft Meetup...
Automating Business Process via MuleSoft Composer | Bangalore MuleSoft Meetup...shyamraj55
 

Recently uploaded (20)

Maximizing Board Effectiveness 2024 Webinar.pptx
Maximizing Board Effectiveness 2024 Webinar.pptxMaximizing Board Effectiveness 2024 Webinar.pptx
Maximizing Board Effectiveness 2024 Webinar.pptx
 
Handwritten Text Recognition for manuscripts and early printed texts
Handwritten Text Recognition for manuscripts and early printed textsHandwritten Text Recognition for manuscripts and early printed texts
Handwritten Text Recognition for manuscripts and early printed texts
 
Transforming Data Streams with Kafka Connect: An Introduction to Single Messa...
Transforming Data Streams with Kafka Connect: An Introduction to Single Messa...Transforming Data Streams with Kafka Connect: An Introduction to Single Messa...
Transforming Data Streams with Kafka Connect: An Introduction to Single Messa...
 
Tech-Forward - Achieving Business Readiness For Copilot in Microsoft 365
Tech-Forward - Achieving Business Readiness For Copilot in Microsoft 365Tech-Forward - Achieving Business Readiness For Copilot in Microsoft 365
Tech-Forward - Achieving Business Readiness For Copilot in Microsoft 365
 
08448380779 Call Girls In Diplomatic Enclave Women Seeking Men
08448380779 Call Girls In Diplomatic Enclave Women Seeking Men08448380779 Call Girls In Diplomatic Enclave Women Seeking Men
08448380779 Call Girls In Diplomatic Enclave Women Seeking Men
 
Key Features Of Token Development (1).pptx
Key  Features Of Token  Development (1).pptxKey  Features Of Token  Development (1).pptx
Key Features Of Token Development (1).pptx
 
Kotlin Multiplatform & Compose Multiplatform - Starter kit for pragmatics
Kotlin Multiplatform & Compose Multiplatform - Starter kit for pragmaticsKotlin Multiplatform & Compose Multiplatform - Starter kit for pragmatics
Kotlin Multiplatform & Compose Multiplatform - Starter kit for pragmatics
 
SIEMENS: RAPUNZEL – A Tale About Knowledge Graph
SIEMENS: RAPUNZEL – A Tale About Knowledge GraphSIEMENS: RAPUNZEL – A Tale About Knowledge Graph
SIEMENS: RAPUNZEL – A Tale About Knowledge Graph
 
Transcript: #StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024
Transcript: #StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024Transcript: #StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024
Transcript: #StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024
 
#StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024
#StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024#StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024
#StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024
 
08448380779 Call Girls In Civil Lines Women Seeking Men
08448380779 Call Girls In Civil Lines Women Seeking Men08448380779 Call Girls In Civil Lines Women Seeking Men
08448380779 Call Girls In Civil Lines Women Seeking Men
 
Salesforce Community Group Quito, Salesforce 101
Salesforce Community Group Quito, Salesforce 101Salesforce Community Group Quito, Salesforce 101
Salesforce Community Group Quito, Salesforce 101
 
Pigging Solutions in Pet Food Manufacturing
Pigging Solutions in Pet Food ManufacturingPigging Solutions in Pet Food Manufacturing
Pigging Solutions in Pet Food Manufacturing
 
[2024]Digital Global Overview Report 2024 Meltwater.pdf
[2024]Digital Global Overview Report 2024 Meltwater.pdf[2024]Digital Global Overview Report 2024 Meltwater.pdf
[2024]Digital Global Overview Report 2024 Meltwater.pdf
 
04-2024-HHUG-Sales-and-Marketing-Alignment.pptx
04-2024-HHUG-Sales-and-Marketing-Alignment.pptx04-2024-HHUG-Sales-and-Marketing-Alignment.pptx
04-2024-HHUG-Sales-and-Marketing-Alignment.pptx
 
AI as an Interface for Commercial Buildings
AI as an Interface for Commercial BuildingsAI as an Interface for Commercial Buildings
AI as an Interface for Commercial Buildings
 
How to Remove Document Management Hurdles with X-Docs?
How to Remove Document Management Hurdles with X-Docs?How to Remove Document Management Hurdles with X-Docs?
How to Remove Document Management Hurdles with X-Docs?
 
Beyond Boundaries: Leveraging No-Code Solutions for Industry Innovation
Beyond Boundaries: Leveraging No-Code Solutions for Industry InnovationBeyond Boundaries: Leveraging No-Code Solutions for Industry Innovation
Beyond Boundaries: Leveraging No-Code Solutions for Industry Innovation
 
FULL ENJOY 🔝 8264348440 🔝 Call Girls in Diplomatic Enclave | Delhi
FULL ENJOY 🔝 8264348440 🔝 Call Girls in Diplomatic Enclave | DelhiFULL ENJOY 🔝 8264348440 🔝 Call Girls in Diplomatic Enclave | Delhi
FULL ENJOY 🔝 8264348440 🔝 Call Girls in Diplomatic Enclave | Delhi
 
Automating Business Process via MuleSoft Composer | Bangalore MuleSoft Meetup...
Automating Business Process via MuleSoft Composer | Bangalore MuleSoft Meetup...Automating Business Process via MuleSoft Composer | Bangalore MuleSoft Meetup...
Automating Business Process via MuleSoft Composer | Bangalore MuleSoft Meetup...
 

Advantages and disadvantages of computer system

  • 2. • Speed • Accuracy • Huge Storage • Online • Online Study • Research • Internet
  • 3. Speed :: The biggest and the greatest advantage of computer is there speed .computer can perform huge amount of calculations within a fraction of a second.
  • 4. Accuracy :: Despite of its amazing speed modern computer can work with almost 100% accuracy. which is very important while performing huge calculations..
  • 5. Huge Storage :: Computer have an internal and external storage unit where one can store huge amount of data and recall or receive whenever in need. Primary examples of internal storage unit are :: main memory and RAM [Random access memory] Primary examples of external storage unit are :: Hard disk and pen drives
  • 6. Online Business :: Online business are blossomed in few years people are earning more than working offline and many of the entrepreneur have shifted there business to online using internet via websites and Apps.
  • 7. Online Study :: Students are seeking higher education while sitting in front of there computer screen and getting higher degres ,diploma and certificates.
  • 8. Research :: Scientist prefer using modern computer for there research purposes as the calculations which used to take several days can be done within a blink of eye using computers.
  • 9. • Health • Pornography • Spread of viruses • Cyber Crimes • Environment Effects • Voilence
  • 10. Health :: Sitting long hours in front of computer screen can harm your eyesight as well as your body. So One should take ample rest or break while using computer for long durations.
  • 11. Pornography :: As the internet reached to all section of human society . The reach of pronographic content to small children’s and even grow ones is made very easy .
  • 12. Spread of viruses :: Virus are just computer programs which are designed and developed to harm the computer, steal important information like passwords, pins and other sensitive information. Hackers use this program to crack your system down and get unauthorized access to your computer systems, which can damage people economically as well as socially .
  • 13. Cyber Crimes :: Online security has been a challenged to some extend because some the computer geek which are very good in computer manipulations can get access to your sensitive information stored in computer memory i.e hard disk drives.
  • 14. Environment Effects :: Environment effects are huge nowadays as the waste product or e-garbage has made life misrable where to dumb this is a big question arise to many countries which are developed or even developing countries like India. As the ever developing technology new up-gradation in computer hardware and peripherals devices occurs every single day.
  • 15. Voilence :: Irrespective of many securities our data can be lost due to damaged memory or using spam websites while they inject malicious program Trojan, worm to your computer system which corrupts or even destroys the data available on your systems.