SlideShare a Scribd company logo
1 of 15
WELCOME TO
• Speed
• Accuracy
• Huge Storage
• Online
• Online Study
• Research
• Internet
Speed :: The biggest and the greatest advantage of
computer is there speed .computer can perform huge
amount of calculations within a fraction of a second.
Accuracy :: Despite of its
amazing speed modern
computer can work with
almost 100% accuracy.
which is very important
while performing huge
calculations..
Huge Storage :: Computer have an internal and
external storage unit where one can store huge
amount of data and recall or receive whenever in
need.
Primary examples of internal storage unit are ::
main memory and RAM [Random access memory]
Primary examples of external storage unit are ::
Hard disk and pen drives
Online Business :: Online business are
blossomed in few years people are earning
more than working offline and many of the
entrepreneur have shifted there business to
online using internet via websites and Apps.
Online Study :: Students are
seeking higher education while
sitting in front of there
computer screen and getting
higher degres ,diploma and
certificates.
Research :: Scientist prefer using
modern computer for there
research purposes as the
calculations which used to take
several days can be done within a
blink of eye using computers.
• Health
• Pornography
• Spread of viruses
• Cyber Crimes
• Environment Effects
• Voilence
Health :: Sitting long hours in front
of computer screen can harm your
eyesight as well as your body. So
One should take ample rest or break
while using computer for long
durations.
Pornography :: As the internet
reached to all section of human society .
The reach of pronographic content to
small children’s and even grow ones is
made very easy .
Spread of viruses :: Virus are just
computer programs which are
designed and developed to harm
the computer, steal important
information like passwords, pins and
other sensitive information. Hackers
use this program to crack your
system down and get unauthorized
access to your computer systems,
which can damage people
economically as well as socially .
Cyber Crimes :: Online security has
been a challenged to some extend
because some the computer geek
which are very good in computer
manipulations can get access to your
sensitive information stored in
computer memory i.e hard disk
drives.
Environment Effects :: Environment effects are huge
nowadays as the waste product or e-garbage has made life
misrable where to dumb this
is a big question arise to many countries which are developed or
even developing countries like India.
As the ever developing technology new up-gradation in computer
hardware and peripherals devices occurs every single day.
Voilence :: Irrespective of many securities
our data can be lost due to damaged memory
or using spam websites while they inject
malicious program Trojan, worm to your
computer system which corrupts or even
destroys the data available on your systems.

More Related Content

What's hot

Introduction to Computer Applications
Introduction to Computer ApplicationsIntroduction to Computer Applications
Introduction to Computer ApplicationsNajma Alam
 
Uses of computer
Uses of computerUses of computer
Uses of computera2zeenice
 
Applications of computers
Applications of computersApplications of computers
Applications of computerslalith saie
 
Classification of Computer
Classification of ComputerClassification of Computer
Classification of ComputerAasim Mushtaq
 
characterstics of computer
characterstics of computercharacterstics of computer
characterstics of computersmriti7
 
Characteristics of Computer
Characteristics of Computer Characteristics of Computer
Characteristics of Computer comaestro Inc.
 
what is computer
what is computerwhat is computer
what is computerJelz JZ
 
Presentation on Information technology
Presentation on Information technologyPresentation on Information technology
Presentation on Information technologyZarifasifkhan
 
Chapter 1 introduction to computers
Chapter 1   introduction to computersChapter 1   introduction to computers
Chapter 1 introduction to computershaider ali
 
Applications of computer
Applications of computerApplications of computer
Applications of computerGummadi Naveen
 
computers in our everyday lives
computers in our everyday livescomputers in our everyday lives
computers in our everyday livesKeitumetse Mohale
 
Characteristics of computer.pptx
Characteristics of computer.pptxCharacteristics of computer.pptx
Characteristics of computer.pptxKashifaNawab3
 
Introduction to ICT - lecture 1
Introduction to ICT - lecture 1Introduction to ICT - lecture 1
Introduction to ICT - lecture 1Mohamed Thawuship
 

What's hot (20)

Introduction to Computer Applications
Introduction to Computer ApplicationsIntroduction to Computer Applications
Introduction to Computer Applications
 
COMPUTER AND ITS USES
COMPUTER AND ITS USESCOMPUTER AND ITS USES
COMPUTER AND ITS USES
 
Uses of computer
Uses of computerUses of computer
Uses of computer
 
Uses of computer
Uses of computer Uses of computer
Uses of computer
 
Applications of computers
Applications of computersApplications of computers
Applications of computers
 
Classification of Computer
Classification of ComputerClassification of Computer
Classification of Computer
 
Characteristics of computer.ppt tamoor
Characteristics of computer.ppt tamoorCharacteristics of computer.ppt tamoor
Characteristics of computer.ppt tamoor
 
Uses of computer
Uses of computerUses of computer
Uses of computer
 
3. advantages and disadvantages of using computers
3. advantages and disadvantages of using computers3. advantages and disadvantages of using computers
3. advantages and disadvantages of using computers
 
characterstics of computer
characterstics of computercharacterstics of computer
characterstics of computer
 
Characteristics of Computer
Characteristics of Computer Characteristics of Computer
Characteristics of Computer
 
what is computer
what is computerwhat is computer
what is computer
 
Presentation on Information technology
Presentation on Information technologyPresentation on Information technology
Presentation on Information technology
 
Application of Computer
Application of ComputerApplication of Computer
Application of Computer
 
Chapter 1 introduction to computers
Chapter 1   introduction to computersChapter 1   introduction to computers
Chapter 1 introduction to computers
 
Computer basics
Computer basicsComputer basics
Computer basics
 
Applications of computer
Applications of computerApplications of computer
Applications of computer
 
computers in our everyday lives
computers in our everyday livescomputers in our everyday lives
computers in our everyday lives
 
Characteristics of computer.pptx
Characteristics of computer.pptxCharacteristics of computer.pptx
Characteristics of computer.pptx
 
Introduction to ICT - lecture 1
Introduction to ICT - lecture 1Introduction to ICT - lecture 1
Introduction to ICT - lecture 1
 

Similar to Advantages and disadvantages of computer system

2014CyberSecurityProject
2014CyberSecurityProject2014CyberSecurityProject
2014CyberSecurityProjectKaley Hair
 
Introduce to internet2
Introduce to internet2 Introduce to internet2
Introduce to internet2 Hardini_HD
 
The World of Information
The World of InformationThe World of Information
The World of InformationBadal Dixit
 
INTERNET AND E-COMMERCE
INTERNET AND E-COMMERCEINTERNET AND E-COMMERCE
INTERNET AND E-COMMERCEUsama ahmad
 
Internet surfing and security
Internet surfing and securityInternet surfing and security
Internet surfing and securitynamansaini11
 
Introduction to internet (239 kb)
Introduction to internet (239 kb)Introduction to internet (239 kb)
Introduction to internet (239 kb)IMRAN KHAN
 
Ict form 4 chapter 1(answer)
Ict form 4 chapter 1(answer)Ict form 4 chapter 1(answer)
Ict form 4 chapter 1(answer)smkengkilili2011
 
REVIEWER-FOR-ETECH.docx
REVIEWER-FOR-ETECH.docxREVIEWER-FOR-ETECH.docx
REVIEWER-FOR-ETECH.docxRheamaeLiwan
 
REVIEWER-FOR-ETECH (1).docx
REVIEWER-FOR-ETECH (1).docxREVIEWER-FOR-ETECH (1).docx
REVIEWER-FOR-ETECH (1).docxJakeTorio1
 
REVIEWER-FOR-ETECH (1).docx
REVIEWER-FOR-ETECH (1).docxREVIEWER-FOR-ETECH (1).docx
REVIEWER-FOR-ETECH (1).docxEhraicaSaquing
 
REVIEWER-FOR-ETECH.docx
REVIEWER-FOR-ETECH.docxREVIEWER-FOR-ETECH.docx
REVIEWER-FOR-ETECH.docxDineLiwan
 
REVIEWER-FOR-ETECH.docx
REVIEWER-FOR-ETECH.docxREVIEWER-FOR-ETECH.docx
REVIEWER-FOR-ETECH.docxLiberty Aquino
 

Similar to Advantages and disadvantages of computer system (20)

2014CyberSecurityProject
2014CyberSecurityProject2014CyberSecurityProject
2014CyberSecurityProject
 
Introduce to internet2
Introduce to internet2 Introduce to internet2
Introduce to internet2
 
The World of Information
The World of InformationThe World of Information
The World of Information
 
Introduction to computer
Introduction to computerIntroduction to computer
Introduction to computer
 
Presentation (6).pptx
Presentation (6).pptxPresentation (6).pptx
Presentation (6).pptx
 
INTERNET AND E-COMMERCE
INTERNET AND E-COMMERCEINTERNET AND E-COMMERCE
INTERNET AND E-COMMERCE
 
Internet surfing and security
Internet surfing and securityInternet surfing and security
Internet surfing and security
 
Introduction to internet (239 kb)
Introduction to internet (239 kb)Introduction to internet (239 kb)
Introduction to internet (239 kb)
 
Cybersecurity.pptx
Cybersecurity.pptxCybersecurity.pptx
Cybersecurity.pptx
 
Abhay pratap singh rajawat
Abhay pratap singh rajawatAbhay pratap singh rajawat
Abhay pratap singh rajawat
 
Ict form 4 chapter 1(answer)
Ict form 4 chapter 1(answer)Ict form 4 chapter 1(answer)
Ict form 4 chapter 1(answer)
 
Internet
InternetInternet
Internet
 
REVIEWER-FOR-ETECH.docx
REVIEWER-FOR-ETECH.docxREVIEWER-FOR-ETECH.docx
REVIEWER-FOR-ETECH.docx
 
REVIEWER-FOR-ETECH (1).docx
REVIEWER-FOR-ETECH (1).docxREVIEWER-FOR-ETECH (1).docx
REVIEWER-FOR-ETECH (1).docx
 
REVIEWER-FOR-ETECH.docx
REVIEWER-FOR-ETECH.docxREVIEWER-FOR-ETECH.docx
REVIEWER-FOR-ETECH.docx
 
REVIEWER ETECH
REVIEWER ETECHREVIEWER ETECH
REVIEWER ETECH
 
REVIEWER-FOR-ETECH (1).docx
REVIEWER-FOR-ETECH (1).docxREVIEWER-FOR-ETECH (1).docx
REVIEWER-FOR-ETECH (1).docx
 
Empowerment Technology
Empowerment Technology Empowerment Technology
Empowerment Technology
 
REVIEWER-FOR-ETECH.docx
REVIEWER-FOR-ETECH.docxREVIEWER-FOR-ETECH.docx
REVIEWER-FOR-ETECH.docx
 
REVIEWER-FOR-ETECH.docx
REVIEWER-FOR-ETECH.docxREVIEWER-FOR-ETECH.docx
REVIEWER-FOR-ETECH.docx
 

More from parag dhok

Classifications of computer
Classifications of computerClassifications of computer
Classifications of computerparag dhok
 
What is motherboard
What is motherboardWhat is motherboard
What is motherboardparag dhok
 
Output devices-of-computer-system
Output devices-of-computer-systemOutput devices-of-computer-system
Output devices-of-computer-systemparag dhok
 
How to install windows 8 using usb pen drive
How to install windows 8 using usb pen driveHow to install windows 8 using usb pen drive
How to install windows 8 using usb pen driveparag dhok
 
What is computer hardware and software
What is computer hardware and softwareWhat is computer hardware and software
What is computer hardware and softwareparag dhok
 
How to-create-a-dos-bootable-usb-pendrive
How to-create-a-dos-bootable-usb-pendriveHow to-create-a-dos-bootable-usb-pendrive
How to-create-a-dos-bootable-usb-pendriveparag dhok
 
Basic dos-commands
Basic dos-commandsBasic dos-commands
Basic dos-commandsparag dhok
 
What is-dos-operating-system
What is-dos-operating-systemWhat is-dos-operating-system
What is-dos-operating-systemparag dhok
 

More from parag dhok (8)

Classifications of computer
Classifications of computerClassifications of computer
Classifications of computer
 
What is motherboard
What is motherboardWhat is motherboard
What is motherboard
 
Output devices-of-computer-system
Output devices-of-computer-systemOutput devices-of-computer-system
Output devices-of-computer-system
 
How to install windows 8 using usb pen drive
How to install windows 8 using usb pen driveHow to install windows 8 using usb pen drive
How to install windows 8 using usb pen drive
 
What is computer hardware and software
What is computer hardware and softwareWhat is computer hardware and software
What is computer hardware and software
 
How to-create-a-dos-bootable-usb-pendrive
How to-create-a-dos-bootable-usb-pendriveHow to-create-a-dos-bootable-usb-pendrive
How to-create-a-dos-bootable-usb-pendrive
 
Basic dos-commands
Basic dos-commandsBasic dos-commands
Basic dos-commands
 
What is-dos-operating-system
What is-dos-operating-systemWhat is-dos-operating-system
What is-dos-operating-system
 

Recently uploaded

How to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected WorkerHow to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected WorkerThousandEyes
 
Workshop - Best of Both Worlds_ Combine KG and Vector search for enhanced R...
Workshop - Best of Both Worlds_ Combine  KG and Vector search for  enhanced R...Workshop - Best of Both Worlds_ Combine  KG and Vector search for  enhanced R...
Workshop - Best of Both Worlds_ Combine KG and Vector search for enhanced R...Neo4j
 
08448380779 Call Girls In Diplomatic Enclave Women Seeking Men
08448380779 Call Girls In Diplomatic Enclave Women Seeking Men08448380779 Call Girls In Diplomatic Enclave Women Seeking Men
08448380779 Call Girls In Diplomatic Enclave Women Seeking MenDelhi Call girls
 
Tech Trends Report 2024 Future Today Institute.pdf
Tech Trends Report 2024 Future Today Institute.pdfTech Trends Report 2024 Future Today Institute.pdf
Tech Trends Report 2024 Future Today Institute.pdfhans926745
 
Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...
Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...
Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...apidays
 
Scaling API-first – The story of a global engineering organization
Scaling API-first – The story of a global engineering organizationScaling API-first – The story of a global engineering organization
Scaling API-first – The story of a global engineering organizationRadu Cotescu
 
How to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected WorkerHow to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected WorkerThousandEyes
 
Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...
Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...
Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...Drew Madelung
 
Presentation on how to chat with PDF using ChatGPT code interpreter
Presentation on how to chat with PDF using ChatGPT code interpreterPresentation on how to chat with PDF using ChatGPT code interpreter
Presentation on how to chat with PDF using ChatGPT code interpreternaman860154
 
IAC 2024 - IA Fast Track to Search Focused AI Solutions
IAC 2024 - IA Fast Track to Search Focused AI SolutionsIAC 2024 - IA Fast Track to Search Focused AI Solutions
IAC 2024 - IA Fast Track to Search Focused AI SolutionsEnterprise Knowledge
 
08448380779 Call Girls In Greater Kailash - I Women Seeking Men
08448380779 Call Girls In Greater Kailash - I Women Seeking Men08448380779 Call Girls In Greater Kailash - I Women Seeking Men
08448380779 Call Girls In Greater Kailash - I Women Seeking MenDelhi Call girls
 
EIS-Webinar-Prompt-Knowledge-Eng-2024-04-08.pptx
EIS-Webinar-Prompt-Knowledge-Eng-2024-04-08.pptxEIS-Webinar-Prompt-Knowledge-Eng-2024-04-08.pptx
EIS-Webinar-Prompt-Knowledge-Eng-2024-04-08.pptxEarley Information Science
 
presentation ICT roal in 21st century education
presentation ICT roal in 21st century educationpresentation ICT roal in 21st century education
presentation ICT roal in 21st century educationjfdjdjcjdnsjd
 
CNv6 Instructor Chapter 6 Quality of Service
CNv6 Instructor Chapter 6 Quality of ServiceCNv6 Instructor Chapter 6 Quality of Service
CNv6 Instructor Chapter 6 Quality of Servicegiselly40
 
Artificial Intelligence: Facts and Myths
Artificial Intelligence: Facts and MythsArtificial Intelligence: Facts and Myths
Artificial Intelligence: Facts and MythsJoaquim Jorge
 
GenCyber Cyber Security Day Presentation
GenCyber Cyber Security Day PresentationGenCyber Cyber Security Day Presentation
GenCyber Cyber Security Day PresentationMichael W. Hawkins
 
[2024]Digital Global Overview Report 2024 Meltwater.pdf
[2024]Digital Global Overview Report 2024 Meltwater.pdf[2024]Digital Global Overview Report 2024 Meltwater.pdf
[2024]Digital Global Overview Report 2024 Meltwater.pdfhans926745
 
2024: Domino Containers - The Next Step. News from the Domino Container commu...
2024: Domino Containers - The Next Step. News from the Domino Container commu...2024: Domino Containers - The Next Step. News from the Domino Container commu...
2024: Domino Containers - The Next Step. News from the Domino Container commu...Martijn de Jong
 
Strategize a Smooth Tenant-to-tenant Migration and Copilot Takeoff
Strategize a Smooth Tenant-to-tenant Migration and Copilot TakeoffStrategize a Smooth Tenant-to-tenant Migration and Copilot Takeoff
Strategize a Smooth Tenant-to-tenant Migration and Copilot Takeoffsammart93
 
TrustArc Webinar - Stay Ahead of US State Data Privacy Law Developments
TrustArc Webinar - Stay Ahead of US State Data Privacy Law DevelopmentsTrustArc Webinar - Stay Ahead of US State Data Privacy Law Developments
TrustArc Webinar - Stay Ahead of US State Data Privacy Law DevelopmentsTrustArc
 

Recently uploaded (20)

How to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected WorkerHow to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected Worker
 
Workshop - Best of Both Worlds_ Combine KG and Vector search for enhanced R...
Workshop - Best of Both Worlds_ Combine  KG and Vector search for  enhanced R...Workshop - Best of Both Worlds_ Combine  KG and Vector search for  enhanced R...
Workshop - Best of Both Worlds_ Combine KG and Vector search for enhanced R...
 
08448380779 Call Girls In Diplomatic Enclave Women Seeking Men
08448380779 Call Girls In Diplomatic Enclave Women Seeking Men08448380779 Call Girls In Diplomatic Enclave Women Seeking Men
08448380779 Call Girls In Diplomatic Enclave Women Seeking Men
 
Tech Trends Report 2024 Future Today Institute.pdf
Tech Trends Report 2024 Future Today Institute.pdfTech Trends Report 2024 Future Today Institute.pdf
Tech Trends Report 2024 Future Today Institute.pdf
 
Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...
Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...
Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...
 
Scaling API-first – The story of a global engineering organization
Scaling API-first – The story of a global engineering organizationScaling API-first – The story of a global engineering organization
Scaling API-first – The story of a global engineering organization
 
How to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected WorkerHow to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected Worker
 
Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...
Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...
Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...
 
Presentation on how to chat with PDF using ChatGPT code interpreter
Presentation on how to chat with PDF using ChatGPT code interpreterPresentation on how to chat with PDF using ChatGPT code interpreter
Presentation on how to chat with PDF using ChatGPT code interpreter
 
IAC 2024 - IA Fast Track to Search Focused AI Solutions
IAC 2024 - IA Fast Track to Search Focused AI SolutionsIAC 2024 - IA Fast Track to Search Focused AI Solutions
IAC 2024 - IA Fast Track to Search Focused AI Solutions
 
08448380779 Call Girls In Greater Kailash - I Women Seeking Men
08448380779 Call Girls In Greater Kailash - I Women Seeking Men08448380779 Call Girls In Greater Kailash - I Women Seeking Men
08448380779 Call Girls In Greater Kailash - I Women Seeking Men
 
EIS-Webinar-Prompt-Knowledge-Eng-2024-04-08.pptx
EIS-Webinar-Prompt-Knowledge-Eng-2024-04-08.pptxEIS-Webinar-Prompt-Knowledge-Eng-2024-04-08.pptx
EIS-Webinar-Prompt-Knowledge-Eng-2024-04-08.pptx
 
presentation ICT roal in 21st century education
presentation ICT roal in 21st century educationpresentation ICT roal in 21st century education
presentation ICT roal in 21st century education
 
CNv6 Instructor Chapter 6 Quality of Service
CNv6 Instructor Chapter 6 Quality of ServiceCNv6 Instructor Chapter 6 Quality of Service
CNv6 Instructor Chapter 6 Quality of Service
 
Artificial Intelligence: Facts and Myths
Artificial Intelligence: Facts and MythsArtificial Intelligence: Facts and Myths
Artificial Intelligence: Facts and Myths
 
GenCyber Cyber Security Day Presentation
GenCyber Cyber Security Day PresentationGenCyber Cyber Security Day Presentation
GenCyber Cyber Security Day Presentation
 
[2024]Digital Global Overview Report 2024 Meltwater.pdf
[2024]Digital Global Overview Report 2024 Meltwater.pdf[2024]Digital Global Overview Report 2024 Meltwater.pdf
[2024]Digital Global Overview Report 2024 Meltwater.pdf
 
2024: Domino Containers - The Next Step. News from the Domino Container commu...
2024: Domino Containers - The Next Step. News from the Domino Container commu...2024: Domino Containers - The Next Step. News from the Domino Container commu...
2024: Domino Containers - The Next Step. News from the Domino Container commu...
 
Strategize a Smooth Tenant-to-tenant Migration and Copilot Takeoff
Strategize a Smooth Tenant-to-tenant Migration and Copilot TakeoffStrategize a Smooth Tenant-to-tenant Migration and Copilot Takeoff
Strategize a Smooth Tenant-to-tenant Migration and Copilot Takeoff
 
TrustArc Webinar - Stay Ahead of US State Data Privacy Law Developments
TrustArc Webinar - Stay Ahead of US State Data Privacy Law DevelopmentsTrustArc Webinar - Stay Ahead of US State Data Privacy Law Developments
TrustArc Webinar - Stay Ahead of US State Data Privacy Law Developments
 

Advantages and disadvantages of computer system

  • 2. • Speed • Accuracy • Huge Storage • Online • Online Study • Research • Internet
  • 3. Speed :: The biggest and the greatest advantage of computer is there speed .computer can perform huge amount of calculations within a fraction of a second.
  • 4. Accuracy :: Despite of its amazing speed modern computer can work with almost 100% accuracy. which is very important while performing huge calculations..
  • 5. Huge Storage :: Computer have an internal and external storage unit where one can store huge amount of data and recall or receive whenever in need. Primary examples of internal storage unit are :: main memory and RAM [Random access memory] Primary examples of external storage unit are :: Hard disk and pen drives
  • 6. Online Business :: Online business are blossomed in few years people are earning more than working offline and many of the entrepreneur have shifted there business to online using internet via websites and Apps.
  • 7. Online Study :: Students are seeking higher education while sitting in front of there computer screen and getting higher degres ,diploma and certificates.
  • 8. Research :: Scientist prefer using modern computer for there research purposes as the calculations which used to take several days can be done within a blink of eye using computers.
  • 9. • Health • Pornography • Spread of viruses • Cyber Crimes • Environment Effects • Voilence
  • 10. Health :: Sitting long hours in front of computer screen can harm your eyesight as well as your body. So One should take ample rest or break while using computer for long durations.
  • 11. Pornography :: As the internet reached to all section of human society . The reach of pronographic content to small children’s and even grow ones is made very easy .
  • 12. Spread of viruses :: Virus are just computer programs which are designed and developed to harm the computer, steal important information like passwords, pins and other sensitive information. Hackers use this program to crack your system down and get unauthorized access to your computer systems, which can damage people economically as well as socially .
  • 13. Cyber Crimes :: Online security has been a challenged to some extend because some the computer geek which are very good in computer manipulations can get access to your sensitive information stored in computer memory i.e hard disk drives.
  • 14. Environment Effects :: Environment effects are huge nowadays as the waste product or e-garbage has made life misrable where to dumb this is a big question arise to many countries which are developed or even developing countries like India. As the ever developing technology new up-gradation in computer hardware and peripherals devices occurs every single day.
  • 15. Voilence :: Irrespective of many securities our data can be lost due to damaged memory or using spam websites while they inject malicious program Trojan, worm to your computer system which corrupts or even destroys the data available on your systems.