SlideShare a Scribd company logo
1 of 18
Data:
 Data is raw fats and figures which are
unorganized,unprocessed.
Types of data:
 1.Textual data.
 2.Physical data.
 3.audio/visual data.
 4.Numeric data.
 1.Textual data:
 It contain any combination of letters,and special
characters.
 2.Physical data:
 It is captured from the environment.e.g
light,sound,voice,and temperature etc.
 3.audio/visual data:
 Various form of data that we can hear or see make up
audiovisual data.
 4.Numeric data:
 Consists of numbers and decimal points, as well as the
plus(+)and minus(_)sign etc.
 1.Fast computation
 2.Complex computation handling
 3.Accuracy
 4.Vast storage
 5.Entertainment
 6.Correlate data/Events
 7.Algorithmic
 1.Fast storage:
Speed reaching up to fifty million per second.
 2.complex computation handling:
The average of a million sets of numbers in a few seconds by
pressing a button.
 3.Accuracy
They can get almost perfect and more accurate result through it.
 4.Vast storage:
Where in the user can save information or docunment.
 5.Correlate data/event:
You can also relate to other work.when you want to change
something in it.
 6.algorithmic:
You may open two or more programs at the same time.
 7.entertainment:
If you can to see or provide the facility of entertainment
according to your own choice.
 Definition:
IPOS cycle is an organized procedure through
which all processing within a computer takes place.
There are following four operations.
1. Input
2. Processing
3. Output
4. Storage
Data
Proces
s
Output Storage
1. Input Operation:
In the input operation, data is entered electronically and
is converted to a machine language form.
2. Processing Operation:
In the Processing operation, the data is manipulated to
process or transform it into information.
3. Output Operation:
In this operation the information, which has been
processed from data.
4. Storage Operation:
In the storage operation data, information, and programs
are stored in computer process
All the operation of IPOS cycle is done
on the machine cycle. Machine cycle
consists of four parts:
 Fetching
 Decoding
 Executing
 Store
 Fetching:
In this process the data is fetched from the
program storage. Area send to control unit.
 Decode:
In this process the fetched data in CU is decoded to
machine language, All the information are scanned the
operands and operations are set and sent to ALU.
 Execute:
During the Execution cycle, or E-Cycle, arithmetic/logic
unit executes the instruction to the main memory or register.
 Store:
The information stored in a secondary storage for further
use in future
People avoid computer due to following reasons:-
 More reliance on computer:
Student can use computer in their
classrooms and they have no to copy notes by hand from the
blackboard, because the teacher gives them a photocopy. As
a result, Student are losing their ability to think by themselves
and it is making students more lazy specially in Mathematics.
 Waste time, Money, Energy:
computer is also a wastage of time it
makes people to use social media Which has no Output and
consumes their time only it also is wastage of money and
energy. People mostly Log off their computer while leaving it
which then also use Electricity.
 Hazards to Health:
Computer has also minimized physical
games and exercises of many people. Mostly people uses
computer for long time which is threat to their health. It effects
their Eyes Cause Headache and pain in their shoulder and
make them tidy.
 Financial Constraints:
Information Technology Have taken many
forms such as Personal Computer, Smart Phones, the internet,
Web and mobile phone applications, digital assistance and
cloud computing And mostly people can’t afford all these things
so they are restricted to use them.
 Moral Values:
The ethical actions of a person can be
described in general terms as those actions which are
performed within the criterium of what is regarded as good. It
relates thus to the question of what is good or bad in terms of
human actions.
 Jobs insecurity:
Job insecurity is the disease of 21st Century.
Research shows that the job insecurity may be even worse for
you than unemployment. In Most of the countries the IT is
emerging and is at its basic level. That’s why People avoid to
get knowledge of computer.

 Privacy/Fraud:
Criminal activity involving the perpetration of a
fraud through the use of the computer or the internet can take
many different forms. One common form includes “hacking,” in
which a perpetrator uses sophisticated technological tools to
remotely access a secure computer or internet location. This is
the most common reason due to which people Avoid to use
computer.
 Unable to give up old Habits:
Old People and many young people uses
Old Typewriters For typing and registers, Dairies for Data Entry
Because they have in their brain that it is very tough to use
computer. They are happy without using computer.
: BEST OF
LUCK:

More Related Content

What's hot

What's hot (20)

Uses of computer
Uses of computer Uses of computer
Uses of computer
 
Uses of computer
Uses of computerUses of computer
Uses of computer
 
Uses of computer
Uses of computerUses of computer
Uses of computer
 
Computer
ComputerComputer
Computer
 
use of computer systems
use of computer systemsuse of computer systems
use of computer systems
 
Uses of Computer
Uses of ComputerUses of Computer
Uses of Computer
 
Uses of computer
Uses of computerUses of computer
Uses of computer
 
APPLICATIONS OF COMPUTER
APPLICATIONS OF COMPUTERAPPLICATIONS OF COMPUTER
APPLICATIONS OF COMPUTER
 
Uses of computer in Different Fields
Uses of computer in Different Fields Uses of computer in Different Fields
Uses of computer in Different Fields
 
Uses of Computer
Uses of ComputerUses of Computer
Uses of Computer
 
Short introduction about computer.
Short introduction about computer.Short introduction about computer.
Short introduction about computer.
 
Application Of Computers To Society
Application Of Computers To SocietyApplication Of Computers To Society
Application Of Computers To Society
 
uses of computer ppt
uses of computer ppt uses of computer ppt
uses of computer ppt
 
computer applications
 computer applications computer applications
computer applications
 
Topic 1
Topic 1Topic 1
Topic 1
 
Applications of computer
Applications of computerApplications of computer
Applications of computer
 
Uses of Computers
Uses of ComputersUses of Computers
Uses of Computers
 
Applications of computer
Applications of computerApplications of computer
Applications of computer
 
Computer uses
Computer usesComputer uses
Computer uses
 
Internet of Things
Internet of ThingsInternet of Things
Internet of Things
 

Viewers also liked

chapter 7,"Storage and Communication Hardware",Basic Information Technology
chapter 7,"Storage and Communication Hardware",Basic Information Technologychapter 7,"Storage and Communication Hardware",Basic Information Technology
chapter 7,"Storage and Communication Hardware",Basic Information TechnologyUzair Javed
 
Levels of Management -Uzair Javed
Levels of Management -Uzair JavedLevels of Management -Uzair Javed
Levels of Management -Uzair JavedUzair Javed
 
Ch 13,SYSTEM DESIGN AND IMPLEMENTATION,Basic Information Technology
Ch 13,SYSTEM DESIGN AND IMPLEMENTATION,Basic Information TechnologyCh 13,SYSTEM DESIGN AND IMPLEMENTATION,Basic Information Technology
Ch 13,SYSTEM DESIGN AND IMPLEMENTATION,Basic Information TechnologyUzair Javed
 
ch 7, Storage and Comunication Hardware,Basic Information Technology ,-
ch 7, Storage and Comunication Hardware,Basic Information Technology ,-ch 7, Storage and Comunication Hardware,Basic Information Technology ,-
ch 7, Storage and Comunication Hardware,Basic Information Technology ,-Uzair Javed
 
chapter6,Input and Hardware,Basic Information Technology
chapter6,Input and Hardware,Basic Information Technologychapter6,Input and Hardware,Basic Information Technology
chapter6,Input and Hardware,Basic Information TechnologyUzair Javed
 
LEVELS OF MANAGEMENT
LEVELS OF MANAGEMENTLEVELS OF MANAGEMENT
LEVELS OF MANAGEMENTUzair Javed
 
Practica Computación Básica
Practica Computación BásicaPractica Computación Básica
Practica Computación BásicaDiego Cabrera
 
Chapter 12,Management & Decision Support Systems,Basic Information Technology
Chapter 12,Management & Decision Support Systems,Basic Information TechnologyChapter 12,Management & Decision Support Systems,Basic Information Technology
Chapter 12,Management & Decision Support Systems,Basic Information TechnologyUzair Javed
 
CH 13, System Design and Implementation, Basic Information Technology -Uzair ...
CH 13, System Design and Implementation, Basic Information Technology -Uzair ...CH 13, System Design and Implementation, Basic Information Technology -Uzair ...
CH 13, System Design and Implementation, Basic Information Technology -Uzair ...Uzair Javed
 
ch 9, Electronic Spreadsheet,Basic Information Technology-Uzair Javed
ch 9, Electronic Spreadsheet,Basic Information Technology-Uzair Javedch 9, Electronic Spreadsheet,Basic Information Technology-Uzair Javed
ch 9, Electronic Spreadsheet,Basic Information Technology-Uzair JavedUzair Javed
 

Viewers also liked (20)

chapter 7,"Storage and Communication Hardware",Basic Information Technology
chapter 7,"Storage and Communication Hardware",Basic Information Technologychapter 7,"Storage and Communication Hardware",Basic Information Technology
chapter 7,"Storage and Communication Hardware",Basic Information Technology
 
Levels of Management -Uzair Javed
Levels of Management -Uzair JavedLevels of Management -Uzair Javed
Levels of Management -Uzair Javed
 
Ch 13,SYSTEM DESIGN AND IMPLEMENTATION,Basic Information Technology
Ch 13,SYSTEM DESIGN AND IMPLEMENTATION,Basic Information TechnologyCh 13,SYSTEM DESIGN AND IMPLEMENTATION,Basic Information Technology
Ch 13,SYSTEM DESIGN AND IMPLEMENTATION,Basic Information Technology
 
CH 4
CH 4CH 4
CH 4
 
ch 7, Storage and Comunication Hardware,Basic Information Technology ,-
ch 7, Storage and Comunication Hardware,Basic Information Technology ,-ch 7, Storage and Comunication Hardware,Basic Information Technology ,-
ch 7, Storage and Comunication Hardware,Basic Information Technology ,-
 
ch 5 topic 2
ch 5 topic 2ch 5 topic 2
ch 5 topic 2
 
chapter6,Input and Hardware,Basic Information Technology
chapter6,Input and Hardware,Basic Information Technologychapter6,Input and Hardware,Basic Information Technology
chapter6,Input and Hardware,Basic Information Technology
 
LEVELS OF MANAGEMENT
LEVELS OF MANAGEMENTLEVELS OF MANAGEMENT
LEVELS OF MANAGEMENT
 
WEB 2.0
WEB 2.0WEB 2.0
WEB 2.0
 
WEB 2.0
WEB 2.0WEB 2.0
WEB 2.0
 
Practica Computación Básica
Practica Computación BásicaPractica Computación Básica
Practica Computación Básica
 
CH 13
CH 13CH 13
CH 13
 
Chapter 12,Management & Decision Support Systems,Basic Information Technology
Chapter 12,Management & Decision Support Systems,Basic Information TechnologyChapter 12,Management & Decision Support Systems,Basic Information Technology
Chapter 12,Management & Decision Support Systems,Basic Information Technology
 
ch 9
ch 9ch 9
ch 9
 
CH 5 topic wise
CH 5 topic wiseCH 5 topic wise
CH 5 topic wise
 
CH 13, System Design and Implementation, Basic Information Technology -Uzair ...
CH 13, System Design and Implementation, Basic Information Technology -Uzair ...CH 13, System Design and Implementation, Basic Information Technology -Uzair ...
CH 13, System Design and Implementation, Basic Information Technology -Uzair ...
 
ch 9, Electronic Spreadsheet,Basic Information Technology-Uzair Javed
ch 9, Electronic Spreadsheet,Basic Information Technology-Uzair Javedch 9, Electronic Spreadsheet,Basic Information Technology-Uzair Javed
ch 9, Electronic Spreadsheet,Basic Information Technology-Uzair Javed
 
uzair
uzairuzair
uzair
 
HAYLEY.CV.2017
HAYLEY.CV.2017HAYLEY.CV.2017
HAYLEY.CV.2017
 
Libro wilson
Libro wilsonLibro wilson
Libro wilson
 

Similar to ch 1

System technologies: What is a computer?
System technologies: What is a computer?System technologies: What is a computer?
System technologies: What is a computer?KhensaniPhasha
 
Ict form 4 chapter 1(answer)
Ict form 4 chapter 1(answer)Ict form 4 chapter 1(answer)
Ict form 4 chapter 1(answer)smkengkilili2011
 
Computer Applications in Business
Computer Applications in BusinessComputer Applications in Business
Computer Applications in BusinessDr T.Sivakami
 
SULTHAN's - ICT-1 for U.G courses in India
SULTHAN's - ICT-1 for U.G courses in IndiaSULTHAN's - ICT-1 for U.G courses in India
SULTHAN's - ICT-1 for U.G courses in IndiaSULTHAN BASHA
 
COMPUTER STUDIES by Lefela Matinkane
COMPUTER STUDIES by Lefela Matinkane COMPUTER STUDIES by Lefela Matinkane
COMPUTER STUDIES by Lefela Matinkane MatinkaneLefela
 
CMP 3204 P-A (Lefela).pptx
CMP 3204 P-A (Lefela).pptxCMP 3204 P-A (Lefela).pptx
CMP 3204 P-A (Lefela).pptxMatinkaneLefela
 
Introduction to Computer Fundamentals
Introduction to Computer FundamentalsIntroduction to Computer Fundamentals
Introduction to Computer Fundamentalsshivanichauhan1953
 
01 Computer Forensics Fundamentals - Notes
01 Computer Forensics Fundamentals - Notes01 Computer Forensics Fundamentals - Notes
01 Computer Forensics Fundamentals - NotesKranthi
 
Seminar Introduction Information Technology
Seminar Introduction Information Technology Seminar Introduction Information Technology
Seminar Introduction Information Technology Egidio A Magno Ximenes
 
Computer converted
Computer convertedComputer converted
Computer convertedsagarvalia1
 
What is a computer and its essential uses
What is a computer and its essential usesWhat is a computer and its essential uses
What is a computer and its essential usesSaleja Ngilay
 

Similar to ch 1 (20)

System technologies: What is a computer?
System technologies: What is a computer?System technologies: What is a computer?
System technologies: What is a computer?
 
Ict form 4 chapter 1(answer)
Ict form 4 chapter 1(answer)Ict form 4 chapter 1(answer)
Ict form 4 chapter 1(answer)
 
Computer Applications in Business
Computer Applications in BusinessComputer Applications in Business
Computer Applications in Business
 
mini-solution.pdf
mini-solution.pdfmini-solution.pdf
mini-solution.pdf
 
Need for Data Protection Training - How E-learning Can Help?
Need for Data Protection Training - How E-learning Can Help?Need for Data Protection Training - How E-learning Can Help?
Need for Data Protection Training - How E-learning Can Help?
 
COMPUTER FUNDAMENTALS PPT.pptx
COMPUTER FUNDAMENTALS PPT.pptxCOMPUTER FUNDAMENTALS PPT.pptx
COMPUTER FUNDAMENTALS PPT.pptx
 
SULTHAN's - ICT-1 for U.G courses in India
SULTHAN's - ICT-1 for U.G courses in IndiaSULTHAN's - ICT-1 for U.G courses in India
SULTHAN's - ICT-1 for U.G courses in India
 
COMPUTER STUDIES by Lefela Matinkane
COMPUTER STUDIES by Lefela Matinkane COMPUTER STUDIES by Lefela Matinkane
COMPUTER STUDIES by Lefela Matinkane
 
Computer
Computer Computer
Computer
 
CMP 3204 P-A (Lefela).pptx
CMP 3204 P-A (Lefela).pptxCMP 3204 P-A (Lefela).pptx
CMP 3204 P-A (Lefela).pptx
 
COMP1111.pptx
COMP1111.pptxCOMP1111.pptx
COMP1111.pptx
 
Introduction to Computer Fundamentals
Introduction to Computer FundamentalsIntroduction to Computer Fundamentals
Introduction to Computer Fundamentals
 
01 Computer Forensics Fundamentals - Notes
01 Computer Forensics Fundamentals - Notes01 Computer Forensics Fundamentals - Notes
01 Computer Forensics Fundamentals - Notes
 
Seminar Introduction Information Technology
Seminar Introduction Information Technology Seminar Introduction Information Technology
Seminar Introduction Information Technology
 
CAB unit-1.pdf
CAB unit-1.pdfCAB unit-1.pdf
CAB unit-1.pdf
 
Computer converted
Computer convertedComputer converted
Computer converted
 
Topic 7
Topic 7Topic 7
Topic 7
 
SAFETY ISSUES NOTES.docx
SAFETY ISSUES NOTES.docxSAFETY ISSUES NOTES.docx
SAFETY ISSUES NOTES.docx
 
Introduction to Information Technology
Introduction to Information TechnologyIntroduction to Information Technology
Introduction to Information Technology
 
What is a computer and its essential uses
What is a computer and its essential usesWhat is a computer and its essential uses
What is a computer and its essential uses
 

More from Uzair Javed

Levels of Management -Uzair Javed
Levels of Management -Uzair JavedLevels of Management -Uzair Javed
Levels of Management -Uzair JavedUzair Javed
 
Chapter 12,Management and Decision Support System,Basic Information Technolog...
Chapter 12,Management and Decision Support System,Basic Information Technolog...Chapter 12,Management and Decision Support System,Basic Information Technolog...
Chapter 12,Management and Decision Support System,Basic Information Technolog...Uzair Javed
 
Levels of management
Levels of managementLevels of management
Levels of managementUzair Javed
 

More from Uzair Javed (6)

Levels of Management -Uzair Javed
Levels of Management -Uzair JavedLevels of Management -Uzair Javed
Levels of Management -Uzair Javed
 
Chapter 12,Management and Decision Support System,Basic Information Technolog...
Chapter 12,Management and Decision Support System,Basic Information Technolog...Chapter 12,Management and Decision Support System,Basic Information Technolog...
Chapter 12,Management and Decision Support System,Basic Information Technolog...
 
CH 5 topic wise
CH 5 topic wiseCH 5 topic wise
CH 5 topic wise
 
ch 3
ch 3ch 3
ch 3
 
ch 2
ch 2ch 2
ch 2
 
Levels of management
Levels of managementLevels of management
Levels of management
 

ch 1

  • 1.
  • 2.
  • 3. Data:  Data is raw fats and figures which are unorganized,unprocessed. Types of data:  1.Textual data.  2.Physical data.  3.audio/visual data.  4.Numeric data.
  • 4.  1.Textual data:  It contain any combination of letters,and special characters.  2.Physical data:  It is captured from the environment.e.g light,sound,voice,and temperature etc.  3.audio/visual data:  Various form of data that we can hear or see make up audiovisual data.  4.Numeric data:  Consists of numbers and decimal points, as well as the plus(+)and minus(_)sign etc.
  • 5.
  • 6.  1.Fast computation  2.Complex computation handling  3.Accuracy  4.Vast storage  5.Entertainment  6.Correlate data/Events  7.Algorithmic
  • 7.
  • 8.  1.Fast storage: Speed reaching up to fifty million per second.  2.complex computation handling: The average of a million sets of numbers in a few seconds by pressing a button.  3.Accuracy They can get almost perfect and more accurate result through it.  4.Vast storage: Where in the user can save information or docunment.  5.Correlate data/event: You can also relate to other work.when you want to change something in it.  6.algorithmic: You may open two or more programs at the same time.  7.entertainment: If you can to see or provide the facility of entertainment according to your own choice.
  • 9.  Definition: IPOS cycle is an organized procedure through which all processing within a computer takes place. There are following four operations. 1. Input 2. Processing 3. Output 4. Storage Data Proces s Output Storage
  • 10. 1. Input Operation: In the input operation, data is entered electronically and is converted to a machine language form. 2. Processing Operation: In the Processing operation, the data is manipulated to process or transform it into information. 3. Output Operation: In this operation the information, which has been processed from data. 4. Storage Operation: In the storage operation data, information, and programs are stored in computer process
  • 11. All the operation of IPOS cycle is done on the machine cycle. Machine cycle consists of four parts:  Fetching  Decoding  Executing  Store
  • 12.  Fetching: In this process the data is fetched from the program storage. Area send to control unit.  Decode: In this process the fetched data in CU is decoded to machine language, All the information are scanned the operands and operations are set and sent to ALU.  Execute: During the Execution cycle, or E-Cycle, arithmetic/logic unit executes the instruction to the main memory or register.  Store: The information stored in a secondary storage for further use in future
  • 13. People avoid computer due to following reasons:-  More reliance on computer: Student can use computer in their classrooms and they have no to copy notes by hand from the blackboard, because the teacher gives them a photocopy. As a result, Student are losing their ability to think by themselves and it is making students more lazy specially in Mathematics.  Waste time, Money, Energy: computer is also a wastage of time it makes people to use social media Which has no Output and consumes their time only it also is wastage of money and energy. People mostly Log off their computer while leaving it which then also use Electricity.
  • 14.  Hazards to Health: Computer has also minimized physical games and exercises of many people. Mostly people uses computer for long time which is threat to their health. It effects their Eyes Cause Headache and pain in their shoulder and make them tidy.  Financial Constraints: Information Technology Have taken many forms such as Personal Computer, Smart Phones, the internet, Web and mobile phone applications, digital assistance and cloud computing And mostly people can’t afford all these things so they are restricted to use them.
  • 15.  Moral Values: The ethical actions of a person can be described in general terms as those actions which are performed within the criterium of what is regarded as good. It relates thus to the question of what is good or bad in terms of human actions.  Jobs insecurity: Job insecurity is the disease of 21st Century. Research shows that the job insecurity may be even worse for you than unemployment. In Most of the countries the IT is emerging and is at its basic level. That’s why People avoid to get knowledge of computer. 
  • 16.  Privacy/Fraud: Criminal activity involving the perpetration of a fraud through the use of the computer or the internet can take many different forms. One common form includes “hacking,” in which a perpetrator uses sophisticated technological tools to remotely access a secure computer or internet location. This is the most common reason due to which people Avoid to use computer.  Unable to give up old Habits: Old People and many young people uses Old Typewriters For typing and registers, Dairies for Data Entry Because they have in their brain that it is very tough to use computer. They are happy without using computer.
  • 17.

Editor's Notes

  1. HASAAH BHATTI (H.S.B)