3. Data:
Data is raw fats and figures which are
unorganized,unprocessed.
Types of data:
1.Textual data.
2.Physical data.
3.audio/visual data.
4.Numeric data.
4. 1.Textual data:
It contain any combination of letters,and special
characters.
2.Physical data:
It is captured from the environment.e.g
light,sound,voice,and temperature etc.
3.audio/visual data:
Various form of data that we can hear or see make up
audiovisual data.
4.Numeric data:
Consists of numbers and decimal points, as well as the
plus(+)and minus(_)sign etc.
8. 1.Fast storage:
Speed reaching up to fifty million per second.
2.complex computation handling:
The average of a million sets of numbers in a few seconds by
pressing a button.
3.Accuracy
They can get almost perfect and more accurate result through it.
4.Vast storage:
Where in the user can save information or docunment.
5.Correlate data/event:
You can also relate to other work.when you want to change
something in it.
6.algorithmic:
You may open two or more programs at the same time.
7.entertainment:
If you can to see or provide the facility of entertainment
according to your own choice.
9. Definition:
IPOS cycle is an organized procedure through
which all processing within a computer takes place.
There are following four operations.
1. Input
2. Processing
3. Output
4. Storage
Data
Proces
s
Output Storage
10. 1. Input Operation:
In the input operation, data is entered electronically and
is converted to a machine language form.
2. Processing Operation:
In the Processing operation, the data is manipulated to
process or transform it into information.
3. Output Operation:
In this operation the information, which has been
processed from data.
4. Storage Operation:
In the storage operation data, information, and programs
are stored in computer process
11. All the operation of IPOS cycle is done
on the machine cycle. Machine cycle
consists of four parts:
Fetching
Decoding
Executing
Store
12. Fetching:
In this process the data is fetched from the
program storage. Area send to control unit.
Decode:
In this process the fetched data in CU is decoded to
machine language, All the information are scanned the
operands and operations are set and sent to ALU.
Execute:
During the Execution cycle, or E-Cycle, arithmetic/logic
unit executes the instruction to the main memory or register.
Store:
The information stored in a secondary storage for further
use in future
13. People avoid computer due to following reasons:-
More reliance on computer:
Student can use computer in their
classrooms and they have no to copy notes by hand from the
blackboard, because the teacher gives them a photocopy. As
a result, Student are losing their ability to think by themselves
and it is making students more lazy specially in Mathematics.
Waste time, Money, Energy:
computer is also a wastage of time it
makes people to use social media Which has no Output and
consumes their time only it also is wastage of money and
energy. People mostly Log off their computer while leaving it
which then also use Electricity.
14. Hazards to Health:
Computer has also minimized physical
games and exercises of many people. Mostly people uses
computer for long time which is threat to their health. It effects
their Eyes Cause Headache and pain in their shoulder and
make them tidy.
Financial Constraints:
Information Technology Have taken many
forms such as Personal Computer, Smart Phones, the internet,
Web and mobile phone applications, digital assistance and
cloud computing And mostly people can’t afford all these things
so they are restricted to use them.
15. Moral Values:
The ethical actions of a person can be
described in general terms as those actions which are
performed within the criterium of what is regarded as good. It
relates thus to the question of what is good or bad in terms of
human actions.
Jobs insecurity:
Job insecurity is the disease of 21st Century.
Research shows that the job insecurity may be even worse for
you than unemployment. In Most of the countries the IT is
emerging and is at its basic level. That’s why People avoid to
get knowledge of computer.
16. Privacy/Fraud:
Criminal activity involving the perpetration of a
fraud through the use of the computer or the internet can take
many different forms. One common form includes “hacking,” in
which a perpetrator uses sophisticated technological tools to
remotely access a secure computer or internet location. This is
the most common reason due to which people Avoid to use
computer.
Unable to give up old Habits:
Old People and many young people uses
Old Typewriters For typing and registers, Dairies for Data Entry
Because they have in their brain that it is very tough to use
computer. They are happy without using computer.