2
Most read
4
Most read
5
Most read
Benefits of Computer
Network
N
CONTENTS
01 FILE SHARING
SHARING INFORMATION02
SHARING RESOURCES03
E - COMMERCE04
COST EFFICIENCY05
SECURITY06
File Sharing
We can easily share data between different users,
or access it remotely if you keep it on other
connected devices.
• It reduces cost of storing large data files.
• It saves huge amount of time.
• One can recover lost files as there are backup in
other systems.
• Files can be Accessed Anywhere.
Sharing Information
Computer networks allow businesses
and organizations to have a number of
computers that share data and
resources even if they are not in the
same physical location.
Users of these computers can share
programs, information, software
because the computers are linked
through the network.
Sharing Resources
Networks help in sharing of different kinds of
hardware devices. Information on a computer
can be remotely accessed from another
computer using network.
It allows groups of computer users to share
data, share software and share hardware
such as a printer or a modem.
Use of network-connected peripheral devices
like printers, scanners and copiers, or sharing
software between multiple users, saves
money.
Computer networks have allowed
different kinds of business to
proliferate online.
These businesses can be -
B2C (business-to-consumer)
B2B (business-to-business)
C2C (consumer-to-consumer)
C2B (consumer-to-business)
G2C (government-to-consumer)
Because of computer networks, we
can now buy anything we need
such as airline tickets, books, food,
electronic devices, medicine, etc.
online.
E - Commerce
Cost Efficiency
With computer networking, you can use a
lot of software products available on the
market which can just be stored or
installed in your system or server, and
can then be used by various workstations.
Many software vendors offer networked
versions of their software. This means
that we can purchase a single license for
this product and have it running on the
central server. The individual computers
in that network can run instances of the
software without having to install a
separate license.
Before accessing information on a network, Users must enter a Username and a
password. This ensures that only authorized people can use the information stored on
the network. Username and passwords allow the network administrator to keep track
of everyone who uses the computer on a network.
Security
NAME - DARSHIL MALVIYA
CLASS - VIII
ROLL NO. - 4
2017/5/14
THANK YOU

More Related Content

PPT
Networking concepts
PPTX
Lan and wan
PPT
NETWORK COMPONENTS
PPT
Networking Basics
PPTX
Networking devices
PPTX
File sharing ppt
PPTX
PPTX
Basics of computer networks
Networking concepts
Lan and wan
NETWORK COMPONENTS
Networking Basics
Networking devices
File sharing ppt
Basics of computer networks

What's hot (20)

PPTX
Basic networking in power point by suprabha
PPTX
Wide Area Network (WAN)
PDF
Introduction to Data Communication
PPTX
Computer Networking fundamentals
PPTX
Computer Networking - Its Advantages & Disadvantages
PPT
networking
PPT
Parallel Processing Concepts
PPTX
Bus topology ppt
PPS
Network ppt
PPTX
Internet
PPTX
computer networks presentation
PPTX
Operations on Processes and Cooperating processes
PDF
COMPUTER NETWORKING (1).pdf
PPTX
Computer Networking
PPT
Chapter 1 introduction to computer networks
PPT
Switching
PPTX
Network types & its topology
PPT
Network operating systems
PPTX
A seminar on networks and networking
PPT
How to install windows 10
Basic networking in power point by suprabha
Wide Area Network (WAN)
Introduction to Data Communication
Computer Networking fundamentals
Computer Networking - Its Advantages & Disadvantages
networking
Parallel Processing Concepts
Bus topology ppt
Network ppt
Internet
computer networks presentation
Operations on Processes and Cooperating processes
COMPUTER NETWORKING (1).pdf
Computer Networking
Chapter 1 introduction to computer networks
Switching
Network types & its topology
Network operating systems
A seminar on networks and networking
How to install windows 10
Ad

Similar to Networking benefits (20)

DOCX
106248842 cc
PDF
Paper id 21201410
PPTX
Splendens Project Proposal by Slidesgo.pptx
PPT
Cloud Computing education need for every beginner
DOCX
Smart Security For Data Sharing In Cloud Computing
DOCX
Smart Security For Data Sharing In Cloud Computing
DOCX
Cloud computing notes unit I as per RGPV syllabus
PPTX
Introduction to Cloud Computing PPTX PPT
PPTX
PPTX
USES OF THE COMPUTER NETWORK
DOCX
Strategic Importance of Cloud Computing in the Business Organizati.docx
PPTX
Cloud_Computing_ppt[1].pptxwllrfuashADyF
PPTX
Cloud_Computing_ppt[1].pptx132EQ342RRRRR1
PPTX
Cloud Computing ppt.pptxwejcgcisd ljsbdjy
PPTX
Cloud Computing ppt.ppt1QU4FFIWEKWEIFRRGx
PPTX
Demystifying cloud
PPTX
Demystifying Cloud: What is Cloud?
PDF
Module-1 introductaion cloud computing.pdf
PPTX
Cloud computing
PPTX
Cloud computing
106248842 cc
Paper id 21201410
Splendens Project Proposal by Slidesgo.pptx
Cloud Computing education need for every beginner
Smart Security For Data Sharing In Cloud Computing
Smart Security For Data Sharing In Cloud Computing
Cloud computing notes unit I as per RGPV syllabus
Introduction to Cloud Computing PPTX PPT
USES OF THE COMPUTER NETWORK
Strategic Importance of Cloud Computing in the Business Organizati.docx
Cloud_Computing_ppt[1].pptxwllrfuashADyF
Cloud_Computing_ppt[1].pptx132EQ342RRRRR1
Cloud Computing ppt.pptxwejcgcisd ljsbdjy
Cloud Computing ppt.ppt1QU4FFIWEKWEIFRRGx
Demystifying cloud
Demystifying Cloud: What is Cloud?
Module-1 introductaion cloud computing.pdf
Cloud computing
Cloud computing
Ad

Recently uploaded (20)

PPTX
module 1-Part 1.pptxdddddddddddddddddddddddddddddddddddd
PDF
The Ikigai Template _ Recalibrate How You Spend Your Time.pdf
PPT
250152213-Excitation-SystemWERRT (1).ppt
PDF
KEY COB2 UNIT 1: The Business of businessĐH KInh tế TP.HCM
PDF
Buy Cash App Verified Accounts Instantly – Secure Crypto Deal.pdf
PPTX
t_and_OpenAI_Combined_two_pressentations
PPTX
Viva Digitally Software-Defined Wide Area Network.pptx
PPTX
IPCNA VIRTUAL CLASSES INTERMEDIATE 6 PROJECT.pptx
PPTX
Top Website Bugs That Hurt User Experience – And How Expert Web Design Fixes
PPTX
curriculumandpedagogyinearlychildhoodcurriculum-171021103104 - Copy.pptx
PDF
simpleintnettestmetiaerl for the simple testint
PDF
The Evolution of Traditional to New Media .pdf
PPTX
Cyber Hygine IN organizations in MSME or
PDF
Containerization lab dddddddddddddddmanual.pdf
PPTX
Artificial_Intelligence_Basics use in our daily life
DOCX
Memecoinist Update: Best Meme Coins 2025, Trump Meme Coin Predictions, and th...
PPTX
1402_iCSC_-_RESTful_Web_APIs_--_Josef_Hammer.pptx
PPTX
KSS ON CYBERSECURITY INCIDENT RESPONSE AND PLANNING MANAGEMENT.pptx
PDF
📍 LABUAN4D EXCLUSIVE SERVER STAR GAMING ASIA NO.1 TERPOPULER DI INDONESIA ! 🌟
PDF
Uptota Investor Deck - Where Africa Meets Blockchain
module 1-Part 1.pptxdddddddddddddddddddddddddddddddddddd
The Ikigai Template _ Recalibrate How You Spend Your Time.pdf
250152213-Excitation-SystemWERRT (1).ppt
KEY COB2 UNIT 1: The Business of businessĐH KInh tế TP.HCM
Buy Cash App Verified Accounts Instantly – Secure Crypto Deal.pdf
t_and_OpenAI_Combined_two_pressentations
Viva Digitally Software-Defined Wide Area Network.pptx
IPCNA VIRTUAL CLASSES INTERMEDIATE 6 PROJECT.pptx
Top Website Bugs That Hurt User Experience – And How Expert Web Design Fixes
curriculumandpedagogyinearlychildhoodcurriculum-171021103104 - Copy.pptx
simpleintnettestmetiaerl for the simple testint
The Evolution of Traditional to New Media .pdf
Cyber Hygine IN organizations in MSME or
Containerization lab dddddddddddddddmanual.pdf
Artificial_Intelligence_Basics use in our daily life
Memecoinist Update: Best Meme Coins 2025, Trump Meme Coin Predictions, and th...
1402_iCSC_-_RESTful_Web_APIs_--_Josef_Hammer.pptx
KSS ON CYBERSECURITY INCIDENT RESPONSE AND PLANNING MANAGEMENT.pptx
📍 LABUAN4D EXCLUSIVE SERVER STAR GAMING ASIA NO.1 TERPOPULER DI INDONESIA ! 🌟
Uptota Investor Deck - Where Africa Meets Blockchain

Networking benefits

  • 2. CONTENTS 01 FILE SHARING SHARING INFORMATION02 SHARING RESOURCES03 E - COMMERCE04 COST EFFICIENCY05 SECURITY06
  • 3. File Sharing We can easily share data between different users, or access it remotely if you keep it on other connected devices. • It reduces cost of storing large data files. • It saves huge amount of time. • One can recover lost files as there are backup in other systems. • Files can be Accessed Anywhere.
  • 4. Sharing Information Computer networks allow businesses and organizations to have a number of computers that share data and resources even if they are not in the same physical location. Users of these computers can share programs, information, software because the computers are linked through the network.
  • 5. Sharing Resources Networks help in sharing of different kinds of hardware devices. Information on a computer can be remotely accessed from another computer using network. It allows groups of computer users to share data, share software and share hardware such as a printer or a modem. Use of network-connected peripheral devices like printers, scanners and copiers, or sharing software between multiple users, saves money.
  • 6. Computer networks have allowed different kinds of business to proliferate online. These businesses can be - B2C (business-to-consumer) B2B (business-to-business) C2C (consumer-to-consumer) C2B (consumer-to-business) G2C (government-to-consumer) Because of computer networks, we can now buy anything we need such as airline tickets, books, food, electronic devices, medicine, etc. online. E - Commerce
  • 7. Cost Efficiency With computer networking, you can use a lot of software products available on the market which can just be stored or installed in your system or server, and can then be used by various workstations. Many software vendors offer networked versions of their software. This means that we can purchase a single license for this product and have it running on the central server. The individual computers in that network can run instances of the software without having to install a separate license.
  • 8. Before accessing information on a network, Users must enter a Username and a password. This ensures that only authorized people can use the information stored on the network. Username and passwords allow the network administrator to keep track of everyone who uses the computer on a network. Security
  • 9. NAME - DARSHIL MALVIYA CLASS - VIII ROLL NO. - 4 2017/5/14 THANK YOU