SlideShare a Scribd company logo
1 of 14
MY DETAILS
NAMES: JOCELYN MATINKANE
SURNAME: LEFELA
GENDER: FEMALE
SCHOOL: LESOTHO COLLEGE OF EDUCATION
E-MAIL ADDRESS: lefelamatinkane856@mail.com
FACEBOOK ACCOUNT: JOCELYN LEFELA
WHAT IS A COMPUTER?
A computer is an electronic device that can accept data (input), process the data and produce the results
(output). A computer can calculate and process large amounts of data in a fraction of the time it would take a
normal person to do.
HOW COMPUTERS WORK?
INPUT
Keyboard
PROCESSING
CPU
STORAGE
Hard drive
OUTPUT
Printer/screen
INPUT
 An input device allows you to communicate with a computer.
 You can use input devices to enter information and issue commands.
 Examples: a keyboard, mouse, and joystick.
KEYBOARD
PROCESSING(INSIDE THE COMPUTER’S
CASE)
 The Central Processing Unit (CPU) is the main chip in a computer.
 The CPU processes instructions, performs calculation and manages the flow of information through a
computer system.
 The CPU communicates with input, output and storage devices to perform tasks.
CPU
STORAGE
 A storage device is used to save information.
 The computer uses stored information, to perform tasks.
 Examples: Hard drive, floppy drive, recordable CD-ROM drive, tape drive and DVD-ROM drive.
HARD DRIVE
OUTPUT
 An output device allows a computer to communicate with you.
 These devices display information on a screen, create printed copies or generate sound.
 Examples: Monitor, printer and speakers.
MONITOR
ADVANTAGES OF A COMPUTER
Speed
Accuracy
Storage
Automatic
Diligence
Reliability
ADVANTAGES OF COMPUTER
 Speed: Computer has a very high speed. The speed of carrying out the given instruction logically and numerically
is incomparable between a computer and human being. A computer can do billions of actions per second.
 Accuracy: Computer calculates very accurately and computer never does mistakes although we often hear about
the false results of computers. This may be due to the error in data entry or due to poorly designed program.
Since, human beings do data entry and programming; hence, the error may make the results false.
 Storage: Computer has high storage capacity that allows you to store huge amount of data. It can also store
various files, folders, movies, music and many more.
 Automatic: computers are automatic machines because if you have given the instruction to a computer, then it
performs the given task automatically until it is finished.
 Diligence: Unlike human beings, a computer is free from monotony, tiredness, and lack of concentration. It can
continuously work for hour without creating any error.
ADVANTAGES OF COMPUTER
 Reliability: Computers are very reliable, failures are usually due to human elements. The computer maintains
your data for a long time, so that whenever that data is needed in future, you can take that data from the
computer.
DISADVANTAGES OF A COMPUTER
Health issues.
Virus and hacking attacks.
Increases unemployment.
Cyber crimes.
Privacy violation.
Negative impact on environment
DISADVANTAGES OF A COMPUTER
 Health issues: Improper use of computer has largely affected people’s health all over the world. For
instance- If you are working on computer system for long and continuous hours, your eyes can
become dry, which can result in headaches, eye strains, etc.
 Virus and hacking attacks: Viruses are computer programs that are developed for stealing and
damaging your sensitive or personal information. In addition, hacking is the process of gaining
unauthorized access to computers for certain illegal purposes. Viruses are usually transferred via E-
mails, internet download or removable devices.
 Increases unemployment: As we have discussed above that computers can perform many tasks
automatically, this reduces the need for people and increases unemployment in the society. It has also
negatively affected many others who do not have knowledge of working on computer system.
DISADVANTAGES OF A COMPUTER
 Cyber crimes: These are some people who use computers and internet for negative activities. They
attempt to break the computer’s security system and gain unauthorized access to hack credit card
details and other personal information, by accessing information, they violate all laws and misuse the
information for their own benefits. These types of actions are covered under online cyber-crimes.
 Privacy violation: The computers can be easily used for storing personal and private data of the
people. The privacy of the individual can be violated if the confidential and personal records are not
protected properly.
 Negative impact on environment: The manufacturing processes of computers produce a lot of
waste products and when people change their electronics, they throw away their old systems or devices.
Such wastes release huge amounts of hazardous toxic materials which heavily affect the environment.
SOURCES
NetLEARN Update CC(2002)YOUR STEP-BY-STEP GUIDE TO BASIC
COMPUTER SKILLS+. PG3-11.ed2012:Durban North
www.cvhsfoundation.org/computer-lab
https://www.javatpoint.com/what-are-the-advantages-of-computer

More Related Content

Similar to Computer

Similar to Computer (20)

Computer
ComputerComputer
Computer
 
Computer ch. no 1.
Computer ch. no 1.Computer ch. no 1.
Computer ch. no 1.
 
Abhay pratap singh rajawat
Abhay pratap singh rajawatAbhay pratap singh rajawat
Abhay pratap singh rajawat
 
Discovering Computer Chapter 1
Discovering Computer Chapter 1Discovering Computer Chapter 1
Discovering Computer Chapter 1
 
INTRODUCTION TO COMPUTER.pptx
INTRODUCTION TO COMPUTER.pptxINTRODUCTION TO COMPUTER.pptx
INTRODUCTION TO COMPUTER.pptx
 
COMPUTER FUNDAMENTALS PPT.pptx
COMPUTER FUNDAMENTALS PPT.pptxCOMPUTER FUNDAMENTALS PPT.pptx
COMPUTER FUNDAMENTALS PPT.pptx
 
Introduction to computer
Introduction to computerIntroduction to computer
Introduction to computer
 
Basic Concept of Computer
Basic Concept of ComputerBasic Concept of Computer
Basic Concept of Computer
 
computer introduction b.pptx
computer introduction b.pptxcomputer introduction b.pptx
computer introduction b.pptx
 
Ics1 Chapter1
Ics1   Chapter1Ics1   Chapter1
Ics1 Chapter1
 
PALAMPUR POWER POINT FILE SONU.pptx
PALAMPUR POWER POINT FILE SONU.pptxPALAMPUR POWER POINT FILE SONU.pptx
PALAMPUR POWER POINT FILE SONU.pptx
 
It advance 2016
It advance 2016It advance 2016
It advance 2016
 
Shivam ppt
Shivam pptShivam ppt
Shivam ppt
 
Fundamental of Information Technology
Fundamental of Information TechnologyFundamental of Information Technology
Fundamental of Information Technology
 
mini-solution.pdf
mini-solution.pdfmini-solution.pdf
mini-solution.pdf
 
111 01 intro
111 01 intro111 01 intro
111 01 intro
 
Chapter 1
Chapter 1Chapter 1
Chapter 1
 
SULTHAN's - ICT-1 for U.G courses in India
SULTHAN's - ICT-1 for U.G courses in IndiaSULTHAN's - ICT-1 for U.G courses in India
SULTHAN's - ICT-1 for U.G courses in India
 
Chapter 01 -Fundamental of IT and OS.pptx
Chapter 01 -Fundamental of IT and OS.pptxChapter 01 -Fundamental of IT and OS.pptx
Chapter 01 -Fundamental of IT and OS.pptx
 
Computer introduction
Computer introduction Computer introduction
Computer introduction
 

Recently uploaded

Transcript: New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024
Transcript: New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024Transcript: New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024
Transcript: New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024BookNet Canada
 
My Hashitalk Indonesia April 2024 Presentation
My Hashitalk Indonesia April 2024 PresentationMy Hashitalk Indonesia April 2024 Presentation
My Hashitalk Indonesia April 2024 PresentationRidwan Fadjar
 
SIP trunking in Janus @ Kamailio World 2024
SIP trunking in Janus @ Kamailio World 2024SIP trunking in Janus @ Kamailio World 2024
SIP trunking in Janus @ Kamailio World 2024Lorenzo Miniero
 
Tampa BSides - Chef's Tour of Microsoft Security Adoption Framework (SAF)
Tampa BSides - Chef's Tour of Microsoft Security Adoption Framework (SAF)Tampa BSides - Chef's Tour of Microsoft Security Adoption Framework (SAF)
Tampa BSides - Chef's Tour of Microsoft Security Adoption Framework (SAF)Mark Simos
 
Powerpoint exploring the locations used in television show Time Clash
Powerpoint exploring the locations used in television show Time ClashPowerpoint exploring the locations used in television show Time Clash
Powerpoint exploring the locations used in television show Time Clashcharlottematthew16
 
Scanning the Internet for External Cloud Exposures via SSL Certs
Scanning the Internet for External Cloud Exposures via SSL CertsScanning the Internet for External Cloud Exposures via SSL Certs
Scanning the Internet for External Cloud Exposures via SSL CertsRizwan Syed
 
SQL Database Design For Developers at php[tek] 2024
SQL Database Design For Developers at php[tek] 2024SQL Database Design For Developers at php[tek] 2024
SQL Database Design For Developers at php[tek] 2024Scott Keck-Warren
 
"Debugging python applications inside k8s environment", Andrii Soldatenko
"Debugging python applications inside k8s environment", Andrii Soldatenko"Debugging python applications inside k8s environment", Andrii Soldatenko
"Debugging python applications inside k8s environment", Andrii SoldatenkoFwdays
 
"LLMs for Python Engineers: Advanced Data Analysis and Semantic Kernel",Oleks...
"LLMs for Python Engineers: Advanced Data Analysis and Semantic Kernel",Oleks..."LLMs for Python Engineers: Advanced Data Analysis and Semantic Kernel",Oleks...
"LLMs for Python Engineers: Advanced Data Analysis and Semantic Kernel",Oleks...Fwdays
 
DevEX - reference for building teams, processes, and platforms
DevEX - reference for building teams, processes, and platformsDevEX - reference for building teams, processes, and platforms
DevEX - reference for building teams, processes, and platformsSergiu Bodiu
 
Vertex AI Gemini Prompt Engineering Tips
Vertex AI Gemini Prompt Engineering TipsVertex AI Gemini Prompt Engineering Tips
Vertex AI Gemini Prompt Engineering TipsMiki Katsuragi
 
Dev Dives: Streamline document processing with UiPath Studio Web
Dev Dives: Streamline document processing with UiPath Studio WebDev Dives: Streamline document processing with UiPath Studio Web
Dev Dives: Streamline document processing with UiPath Studio WebUiPathCommunity
 
Tech-Forward - Achieving Business Readiness For Copilot in Microsoft 365
Tech-Forward - Achieving Business Readiness For Copilot in Microsoft 365Tech-Forward - Achieving Business Readiness For Copilot in Microsoft 365
Tech-Forward - Achieving Business Readiness For Copilot in Microsoft 3652toLead Limited
 
Nell’iperspazio con Rocket: il Framework Web di Rust!
Nell’iperspazio con Rocket: il Framework Web di Rust!Nell’iperspazio con Rocket: il Framework Web di Rust!
Nell’iperspazio con Rocket: il Framework Web di Rust!Commit University
 
Pigging Solutions in Pet Food Manufacturing
Pigging Solutions in Pet Food ManufacturingPigging Solutions in Pet Food Manufacturing
Pigging Solutions in Pet Food ManufacturingPigging Solutions
 
"Federated learning: out of reach no matter how close",Oleksandr Lapshyn
"Federated learning: out of reach no matter how close",Oleksandr Lapshyn"Federated learning: out of reach no matter how close",Oleksandr Lapshyn
"Federated learning: out of reach no matter how close",Oleksandr LapshynFwdays
 
WordPress Websites for Engineers: Elevate Your Brand
WordPress Websites for Engineers: Elevate Your BrandWordPress Websites for Engineers: Elevate Your Brand
WordPress Websites for Engineers: Elevate Your Brandgvaughan
 
Bun (KitWorks Team Study 노별마루 발표 2024.4.22)
Bun (KitWorks Team Study 노별마루 발표 2024.4.22)Bun (KitWorks Team Study 노별마루 발표 2024.4.22)
Bun (KitWorks Team Study 노별마루 발표 2024.4.22)Wonjun Hwang
 
Streamlining Python Development: A Guide to a Modern Project Setup
Streamlining Python Development: A Guide to a Modern Project SetupStreamlining Python Development: A Guide to a Modern Project Setup
Streamlining Python Development: A Guide to a Modern Project SetupFlorian Wilhelm
 

Recently uploaded (20)

Transcript: New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024
Transcript: New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024Transcript: New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024
Transcript: New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024
 
My Hashitalk Indonesia April 2024 Presentation
My Hashitalk Indonesia April 2024 PresentationMy Hashitalk Indonesia April 2024 Presentation
My Hashitalk Indonesia April 2024 Presentation
 
SIP trunking in Janus @ Kamailio World 2024
SIP trunking in Janus @ Kamailio World 2024SIP trunking in Janus @ Kamailio World 2024
SIP trunking in Janus @ Kamailio World 2024
 
Tampa BSides - Chef's Tour of Microsoft Security Adoption Framework (SAF)
Tampa BSides - Chef's Tour of Microsoft Security Adoption Framework (SAF)Tampa BSides - Chef's Tour of Microsoft Security Adoption Framework (SAF)
Tampa BSides - Chef's Tour of Microsoft Security Adoption Framework (SAF)
 
Powerpoint exploring the locations used in television show Time Clash
Powerpoint exploring the locations used in television show Time ClashPowerpoint exploring the locations used in television show Time Clash
Powerpoint exploring the locations used in television show Time Clash
 
Scanning the Internet for External Cloud Exposures via SSL Certs
Scanning the Internet for External Cloud Exposures via SSL CertsScanning the Internet for External Cloud Exposures via SSL Certs
Scanning the Internet for External Cloud Exposures via SSL Certs
 
SQL Database Design For Developers at php[tek] 2024
SQL Database Design For Developers at php[tek] 2024SQL Database Design For Developers at php[tek] 2024
SQL Database Design For Developers at php[tek] 2024
 
"Debugging python applications inside k8s environment", Andrii Soldatenko
"Debugging python applications inside k8s environment", Andrii Soldatenko"Debugging python applications inside k8s environment", Andrii Soldatenko
"Debugging python applications inside k8s environment", Andrii Soldatenko
 
"LLMs for Python Engineers: Advanced Data Analysis and Semantic Kernel",Oleks...
"LLMs for Python Engineers: Advanced Data Analysis and Semantic Kernel",Oleks..."LLMs for Python Engineers: Advanced Data Analysis and Semantic Kernel",Oleks...
"LLMs for Python Engineers: Advanced Data Analysis and Semantic Kernel",Oleks...
 
DevEX - reference for building teams, processes, and platforms
DevEX - reference for building teams, processes, and platformsDevEX - reference for building teams, processes, and platforms
DevEX - reference for building teams, processes, and platforms
 
Vertex AI Gemini Prompt Engineering Tips
Vertex AI Gemini Prompt Engineering TipsVertex AI Gemini Prompt Engineering Tips
Vertex AI Gemini Prompt Engineering Tips
 
Dev Dives: Streamline document processing with UiPath Studio Web
Dev Dives: Streamline document processing with UiPath Studio WebDev Dives: Streamline document processing with UiPath Studio Web
Dev Dives: Streamline document processing with UiPath Studio Web
 
Tech-Forward - Achieving Business Readiness For Copilot in Microsoft 365
Tech-Forward - Achieving Business Readiness For Copilot in Microsoft 365Tech-Forward - Achieving Business Readiness For Copilot in Microsoft 365
Tech-Forward - Achieving Business Readiness For Copilot in Microsoft 365
 
Nell’iperspazio con Rocket: il Framework Web di Rust!
Nell’iperspazio con Rocket: il Framework Web di Rust!Nell’iperspazio con Rocket: il Framework Web di Rust!
Nell’iperspazio con Rocket: il Framework Web di Rust!
 
Pigging Solutions in Pet Food Manufacturing
Pigging Solutions in Pet Food ManufacturingPigging Solutions in Pet Food Manufacturing
Pigging Solutions in Pet Food Manufacturing
 
"Federated learning: out of reach no matter how close",Oleksandr Lapshyn
"Federated learning: out of reach no matter how close",Oleksandr Lapshyn"Federated learning: out of reach no matter how close",Oleksandr Lapshyn
"Federated learning: out of reach no matter how close",Oleksandr Lapshyn
 
WordPress Websites for Engineers: Elevate Your Brand
WordPress Websites for Engineers: Elevate Your BrandWordPress Websites for Engineers: Elevate Your Brand
WordPress Websites for Engineers: Elevate Your Brand
 
Hot Sexy call girls in Panjabi Bagh 🔝 9953056974 🔝 Delhi escort Service
Hot Sexy call girls in Panjabi Bagh 🔝 9953056974 🔝 Delhi escort ServiceHot Sexy call girls in Panjabi Bagh 🔝 9953056974 🔝 Delhi escort Service
Hot Sexy call girls in Panjabi Bagh 🔝 9953056974 🔝 Delhi escort Service
 
Bun (KitWorks Team Study 노별마루 발표 2024.4.22)
Bun (KitWorks Team Study 노별마루 발표 2024.4.22)Bun (KitWorks Team Study 노별마루 발표 2024.4.22)
Bun (KitWorks Team Study 노별마루 발표 2024.4.22)
 
Streamlining Python Development: A Guide to a Modern Project Setup
Streamlining Python Development: A Guide to a Modern Project SetupStreamlining Python Development: A Guide to a Modern Project Setup
Streamlining Python Development: A Guide to a Modern Project Setup
 

Computer

  • 1. MY DETAILS NAMES: JOCELYN MATINKANE SURNAME: LEFELA GENDER: FEMALE SCHOOL: LESOTHO COLLEGE OF EDUCATION E-MAIL ADDRESS: lefelamatinkane856@mail.com FACEBOOK ACCOUNT: JOCELYN LEFELA
  • 2. WHAT IS A COMPUTER? A computer is an electronic device that can accept data (input), process the data and produce the results (output). A computer can calculate and process large amounts of data in a fraction of the time it would take a normal person to do.
  • 4. INPUT  An input device allows you to communicate with a computer.  You can use input devices to enter information and issue commands.  Examples: a keyboard, mouse, and joystick. KEYBOARD
  • 5. PROCESSING(INSIDE THE COMPUTER’S CASE)  The Central Processing Unit (CPU) is the main chip in a computer.  The CPU processes instructions, performs calculation and manages the flow of information through a computer system.  The CPU communicates with input, output and storage devices to perform tasks. CPU
  • 6. STORAGE  A storage device is used to save information.  The computer uses stored information, to perform tasks.  Examples: Hard drive, floppy drive, recordable CD-ROM drive, tape drive and DVD-ROM drive. HARD DRIVE
  • 7. OUTPUT  An output device allows a computer to communicate with you.  These devices display information on a screen, create printed copies or generate sound.  Examples: Monitor, printer and speakers. MONITOR
  • 8. ADVANTAGES OF A COMPUTER Speed Accuracy Storage Automatic Diligence Reliability
  • 9. ADVANTAGES OF COMPUTER  Speed: Computer has a very high speed. The speed of carrying out the given instruction logically and numerically is incomparable between a computer and human being. A computer can do billions of actions per second.  Accuracy: Computer calculates very accurately and computer never does mistakes although we often hear about the false results of computers. This may be due to the error in data entry or due to poorly designed program. Since, human beings do data entry and programming; hence, the error may make the results false.  Storage: Computer has high storage capacity that allows you to store huge amount of data. It can also store various files, folders, movies, music and many more.  Automatic: computers are automatic machines because if you have given the instruction to a computer, then it performs the given task automatically until it is finished.  Diligence: Unlike human beings, a computer is free from monotony, tiredness, and lack of concentration. It can continuously work for hour without creating any error.
  • 10. ADVANTAGES OF COMPUTER  Reliability: Computers are very reliable, failures are usually due to human elements. The computer maintains your data for a long time, so that whenever that data is needed in future, you can take that data from the computer.
  • 11. DISADVANTAGES OF A COMPUTER Health issues. Virus and hacking attacks. Increases unemployment. Cyber crimes. Privacy violation. Negative impact on environment
  • 12. DISADVANTAGES OF A COMPUTER  Health issues: Improper use of computer has largely affected people’s health all over the world. For instance- If you are working on computer system for long and continuous hours, your eyes can become dry, which can result in headaches, eye strains, etc.  Virus and hacking attacks: Viruses are computer programs that are developed for stealing and damaging your sensitive or personal information. In addition, hacking is the process of gaining unauthorized access to computers for certain illegal purposes. Viruses are usually transferred via E- mails, internet download or removable devices.  Increases unemployment: As we have discussed above that computers can perform many tasks automatically, this reduces the need for people and increases unemployment in the society. It has also negatively affected many others who do not have knowledge of working on computer system.
  • 13. DISADVANTAGES OF A COMPUTER  Cyber crimes: These are some people who use computers and internet for negative activities. They attempt to break the computer’s security system and gain unauthorized access to hack credit card details and other personal information, by accessing information, they violate all laws and misuse the information for their own benefits. These types of actions are covered under online cyber-crimes.  Privacy violation: The computers can be easily used for storing personal and private data of the people. The privacy of the individual can be violated if the confidential and personal records are not protected properly.  Negative impact on environment: The manufacturing processes of computers produce a lot of waste products and when people change their electronics, they throw away their old systems or devices. Such wastes release huge amounts of hazardous toxic materials which heavily affect the environment.
  • 14. SOURCES NetLEARN Update CC(2002)YOUR STEP-BY-STEP GUIDE TO BASIC COMPUTER SKILLS+. PG3-11.ed2012:Durban North www.cvhsfoundation.org/computer-lab https://www.javatpoint.com/what-are-the-advantages-of-computer