Website: www.batracomputercentre.com P.no.: 9729666670, 0171-4000670
Basic  computer  courses in Ambla Cantt! Batra Computer Centre
Basic  computer  courses in Ambla Cantt! Batra Computer Centre
One of the overwhelming advantages of the computer lies in its very
necessity. Computer technology and use is of critical importance. Its ability
for communication and storing data would represent another advantage. If
connected to the internet, its ability to obtain resources would be another
attribute. Along with data collection, the computer features different methods
and manners to present this data, which makes it advantageous to the
user. The disadvantages are going to be difficult to articulate because
computers have become such a mainstay in our existence. I think that one
disadvantage would be our dependence on them. Computers are now
needed for so much, we have a natural dependence on them. This proves to
be disastrous when individuals have their computers lost or stolen, or when
identity theft, a concoction of computers, happens to individuals.
Computers make it extremely easy to store and access data, but their increasing use
has led to an extreme level of dependence on them, which can create a number of
problems if and when computers malfunction. A power outage can render entire
businesses or institutions essentially inoperable without the use of computers. Data
that is stored on computers can also be lost permanently if not backed up properly, and
back up methods are not entirely dependable.
In a similar vein, personal data stored on computers is often extremely vulnerable to
digital theft. Data regarding bank accounts, credit cards, social security numbers and
more is commonly transmitted online, and security protocols to protect this data are not
always effective.
Computers also create the added potential for distraction. The sheer amount of
content on the Internet makes it possible to spend almost limitless time browsing blogs,
playing games or chatting with friends. This can dramatically detract from productivity,
whether it's at work, in school or at home. Computers can also hinder social
interactions. Many users are often distracted from real life interactions by the draw of
computers, diminishing social relationships.
Basic  computer  courses in Ambla Cantt! Batra Computer Centre
Computer Software
Definition. Software is a generic
term for organized collections
of computer data and instructions,
often broken into two major
categories: system software that
provides the basic non-task-
specific functions of the computer,
and application software which is
used by users to accomplish
specific tasks.
Computer hardware is the collection
of physical parts of
a computer system. This includes the
computer case, monitor, keyboard,
and mouse. It also includes all the
parts inside the computer case, such
as the hard disk drive, motherboard,
video card, and many
others. Computer hardware is what
you can physically touch.
Basic  computer  courses in Ambla Cantt! Batra Computer Centre
Basic  computer  courses in Ambla Cantt! Batra Computer Centre
Info.jatinbatra@gmail.com
9729666670, 0171-4000670
Basic  computer  courses in Ambla Cantt! Batra Computer Centre
Basic  computer  courses in Ambla Cantt! Batra Computer Centre

More Related Content

PPT
2008 Personnel Trends Post
DOCX
PPT
Next Generation IT Systems and Their Impact on RM
PPTX
Impact of computers on society
PPTX
computer and society impact of Computer in society
PDF
Digital Identities
PPT
Ethical and social issues in information systems
PPTX
Social media security
2008 Personnel Trends Post
Next Generation IT Systems and Their Impact on RM
Impact of computers on society
computer and society impact of Computer in society
Digital Identities
Ethical and social issues in information systems
Social media security

What's hot (18)

PPT
Private Public Sector Im
DOCX
Team 3_Final Project.docx
PPTX
Web 3.0 semantics
PDF
Research on Privacy Protection in Big Data Environment
PDF
Ericsson ConsumerLab: Privacy, security and safety online
PPT
Security & ethical challenges
PDF
Cyber Privacy & Password Protection
PDF
White Paper - Killing the Shadow Systems
PPT
Legal aspects of web 2.0 and social networking JISC Legal
PPTX
Dwyer ISSA Presentation
PPT
Uit9 ppt ch09_au_rev
PPT
Computer Ethics
PDF
Role of Information Technology in Human Resource Management
PPTX
Privacy issues and internet privacy
PPTX
Web 3.0
PDF
Nfwordle
PPTX
Internet Privacy
PPT
Web 2.0
Private Public Sector Im
Team 3_Final Project.docx
Web 3.0 semantics
Research on Privacy Protection in Big Data Environment
Ericsson ConsumerLab: Privacy, security and safety online
Security & ethical challenges
Cyber Privacy & Password Protection
White Paper - Killing the Shadow Systems
Legal aspects of web 2.0 and social networking JISC Legal
Dwyer ISSA Presentation
Uit9 ppt ch09_au_rev
Computer Ethics
Role of Information Technology in Human Resource Management
Privacy issues and internet privacy
Web 3.0
Nfwordle
Internet Privacy
Web 2.0
Ad

Similar to Basic computer courses in Ambla Cantt! Batra Computer Centre (20)

DOCX
PART I. glaiza may oroceo yyyyyyyyyyyyyyyyyyyyyyyyyyyyyyyyyyyyyyyyyyyyyyyyyy...
PPTX
2nd-SEM-Presentation-LESSON1keybarding.pptx
PPTX
Abhay pratap singh rajawat
PPTX
Cloud computing & disadvantages of technology
PPTX
CYBER SECURITY SEMINAR.pptx
PDF
Information Technology, The Internet, and You
PDF
NURS 101 Introductory in modern healthcare
PPTX
Unit iii FMIS
PDF
Digital literacy note level 6 perioperative theatre technician
PDF
The Weakest Point of Security in IoT
PDF
A Multi-Layer Real Time Remote Monitoring & Corporate Network System For Viru...
PDF
International Journal on Cloud Computing: Services and Architecture (IJCCSA)
DOC
Uses of computer networks
PDF
Mobility, Security and the Enterprise: The Equation to Solve
PDF
Internet Security Essay
DOCX
Computer in Society
PDF
Systems analysis and design lecture 1
DOCX
Target Data Breach Case Study 10242014
PPT
Ch 19. social and economic effects of it
PART I. glaiza may oroceo yyyyyyyyyyyyyyyyyyyyyyyyyyyyyyyyyyyyyyyyyyyyyyyyyy...
2nd-SEM-Presentation-LESSON1keybarding.pptx
Abhay pratap singh rajawat
Cloud computing & disadvantages of technology
CYBER SECURITY SEMINAR.pptx
Information Technology, The Internet, and You
NURS 101 Introductory in modern healthcare
Unit iii FMIS
Digital literacy note level 6 perioperative theatre technician
The Weakest Point of Security in IoT
A Multi-Layer Real Time Remote Monitoring & Corporate Network System For Viru...
International Journal on Cloud Computing: Services and Architecture (IJCCSA)
Uses of computer networks
Mobility, Security and the Enterprise: The Equation to Solve
Internet Security Essay
Computer in Society
Systems analysis and design lecture 1
Target Data Breach Case Study 10242014
Ch 19. social and economic effects of it
Ad

Recently uploaded (20)

PDF
Journal of Dental Science - UDMY (2020).pdf
PPTX
Computer Architecture Input Output Memory.pptx
PDF
Race Reva University – Shaping Future Leaders in Artificial Intelligence
PDF
Complications of Minimal Access-Surgery.pdf
PDF
Journal of Dental Science - UDMY (2021).pdf
PDF
IP : I ; Unit I : Preformulation Studies
PDF
LIFE & LIVING TRILOGY - PART (3) REALITY & MYSTERY.pdf
PPTX
Introduction to pro and eukaryotes and differences.pptx
PDF
Journal of Dental Science - UDMY (2022).pdf
PDF
CISA (Certified Information Systems Auditor) Domain-Wise Summary.pdf
PPTX
A powerpoint presentation on the Revised K-10 Science Shaping Paper
PPTX
Climate Change and Its Global Impact.pptx
PDF
Empowerment Technology for Senior High School Guide
DOCX
Cambridge-Practice-Tests-for-IELTS-12.docx
PDF
Skin Care and Cosmetic Ingredients Dictionary ( PDFDrive ).pdf
PDF
LIFE & LIVING TRILOGY - PART - (2) THE PURPOSE OF LIFE.pdf
PDF
Τίμαιος είναι φιλοσοφικός διάλογος του Πλάτωνα
PDF
LIFE & LIVING TRILOGY- PART (1) WHO ARE WE.pdf
PDF
BP 505 T. PHARMACEUTICAL JURISPRUDENCE (UNIT 1).pdf
PDF
Climate and Adaptation MCQs class 7 from chatgpt
Journal of Dental Science - UDMY (2020).pdf
Computer Architecture Input Output Memory.pptx
Race Reva University – Shaping Future Leaders in Artificial Intelligence
Complications of Minimal Access-Surgery.pdf
Journal of Dental Science - UDMY (2021).pdf
IP : I ; Unit I : Preformulation Studies
LIFE & LIVING TRILOGY - PART (3) REALITY & MYSTERY.pdf
Introduction to pro and eukaryotes and differences.pptx
Journal of Dental Science - UDMY (2022).pdf
CISA (Certified Information Systems Auditor) Domain-Wise Summary.pdf
A powerpoint presentation on the Revised K-10 Science Shaping Paper
Climate Change and Its Global Impact.pptx
Empowerment Technology for Senior High School Guide
Cambridge-Practice-Tests-for-IELTS-12.docx
Skin Care and Cosmetic Ingredients Dictionary ( PDFDrive ).pdf
LIFE & LIVING TRILOGY - PART - (2) THE PURPOSE OF LIFE.pdf
Τίμαιος είναι φιλοσοφικός διάλογος του Πλάτωνα
LIFE & LIVING TRILOGY- PART (1) WHO ARE WE.pdf
BP 505 T. PHARMACEUTICAL JURISPRUDENCE (UNIT 1).pdf
Climate and Adaptation MCQs class 7 from chatgpt

Basic computer courses in Ambla Cantt! Batra Computer Centre

  • 4. One of the overwhelming advantages of the computer lies in its very necessity. Computer technology and use is of critical importance. Its ability for communication and storing data would represent another advantage. If connected to the internet, its ability to obtain resources would be another attribute. Along with data collection, the computer features different methods and manners to present this data, which makes it advantageous to the user. The disadvantages are going to be difficult to articulate because computers have become such a mainstay in our existence. I think that one disadvantage would be our dependence on them. Computers are now needed for so much, we have a natural dependence on them. This proves to be disastrous when individuals have their computers lost or stolen, or when identity theft, a concoction of computers, happens to individuals.
  • 5. Computers make it extremely easy to store and access data, but their increasing use has led to an extreme level of dependence on them, which can create a number of problems if and when computers malfunction. A power outage can render entire businesses or institutions essentially inoperable without the use of computers. Data that is stored on computers can also be lost permanently if not backed up properly, and back up methods are not entirely dependable. In a similar vein, personal data stored on computers is often extremely vulnerable to digital theft. Data regarding bank accounts, credit cards, social security numbers and more is commonly transmitted online, and security protocols to protect this data are not always effective. Computers also create the added potential for distraction. The sheer amount of content on the Internet makes it possible to spend almost limitless time browsing blogs, playing games or chatting with friends. This can dramatically detract from productivity, whether it's at work, in school or at home. Computers can also hinder social interactions. Many users are often distracted from real life interactions by the draw of computers, diminishing social relationships.
  • 7. Computer Software Definition. Software is a generic term for organized collections of computer data and instructions, often broken into two major categories: system software that provides the basic non-task- specific functions of the computer, and application software which is used by users to accomplish specific tasks.
  • 8. Computer hardware is the collection of physical parts of a computer system. This includes the computer case, monitor, keyboard, and mouse. It also includes all the parts inside the computer case, such as the hard disk drive, motherboard, video card, and many others. Computer hardware is what you can physically touch.