SlideShare a Scribd company logo
By
Anurag Sahu
Class-9
Section-D
School- Academic World School
• We can go to library and search about Gandhi ji or some
about else.
• Computers are used in making cars.
• We can play games in our computer for some enjoyment.
• Salesperson use their computers to keep the record of their
sales.
• It is also used by scientists to stimulate a cell division.
• These days computers are used in schools too.
• Customer Information
• Products
• Reports and Profits
• Transactions and Goals
• Credit Applications
• Delinquency
• Miscellaneous
Using ATM, customers can access to their bank accounts in
order to make cash withdrawals, credit card cash advances,
and check their account balances as well as purchase prepaid
cellphone credit. If the currency being withdrawn from the
ATM is different from that which the bank account is
denominated in (eg; withdrawing japanese yen from a bank
account containing US dollars) the money will be converted
at a wholesale exchange rate. Thus, ATM’s often provide the
best possible exchange rate for foreing travellers and are
heavily used for these purpose as well.
The use of computer to engineering is by
helping it to create some of the important
factors or simply using a computer to create
an image about their plan by means of using
programming languages. To control their
machines and many more.....
• Email Functions
• Distributing Payments
• Record Keeping
• Direct-Mail Promotions
• And Many More....
• Accounting
• Customer Interactions
• Scheduling
• Communication
• Web Site and Many More...
They are used for Doctor’s orders,
charting notes, documenting vital
signs and so many uses...
A great advantages of home computers is that
they allow individuals and families to achieve a
variety of tasks at home. Families can use word
processing, programs for homework
spreadsheets to manage bills, and the internet
for social networking and entertainment.
Computer Integrated Manufacturing (CIM)...
CIM techniques make use of group technology
to create similar geometries for quick retrieval.
Electronic files and many more.
• Research
• Data Entry
• Intervention
• Virtual
• Teacher Resources
• Learning
Applications of computer

More Related Content

Similar to Applications of computer

Applications area of computer by taiyab ali
Applications area of computer by taiyab aliApplications area of computer by taiyab ali
Applications area of computer by taiyab ali
Taiyab Ali
 
Uses of computer
Uses of computerUses of computer
Uses of computer
a2zeenice
 
Introduction to Computer Engineering
Introduction to Computer EngineeringIntroduction to Computer Engineering
Introduction to Computer Engineering
BESOR ACADEMY
 
Computer fundamentals
Computer fundamentalsComputer fundamentals
Computer fundamentals
Ali Haydar(Raj)
 
Role Of Com
Role Of ComRole Of Com
Role Of Com
Nasir Ali
 
Demonitization data
Demonitization dataDemonitization data
Demonitization data
SONAKSHIPATTNAIK
 
Applications of computers
Applications of computersApplications of computers
Applications of computers
lalith saie
 
Applications of computer
Applications of computerApplications of computer
Applications of computer
Gummadi Naveen
 
Basic computer skills | Brad Steven Solvie
Basic computer skills | Brad Steven SolvieBasic computer skills | Brad Steven Solvie
Basic computer skills | Brad Steven Solvie
Brad Steven Solvie
 
Applications of Computers.ppt
Applications of Computers.pptApplications of Computers.ppt
Applications of Computers.ppt
RahatUllah55
 
Real estate technology part 2 final
Real estate technology part 2 finalReal estate technology part 2 final
Real estate technology part 2 final
kristalk
 
Applications of ecommerce
Applications of ecommerce Applications of ecommerce
Applications of ecommerce
CHIPPYFRANCIS
 
Lesson 1.pptx
Lesson 1.pptxLesson 1.pptx
Lesson 1.pptx
RegieneDivino1
 
Computer & generations
Computer & generationsComputer & generations
Computer & generations
Ankitdhiman43
 
Applications of computer
Applications of computerApplications of computer
Applications of computer
samina khan
 
Usage of ICT in daily life
Usage of ICT in daily lifeUsage of ICT in daily life
Usage of ICT in daily life
panitiaict
 
Application of computer
Application of computerApplication of computer
Application of computer
SamiUllah128034
 
The Cloud - A Silver Lining for SMEs v5
The Cloud - A Silver Lining for SMEs v5The Cloud - A Silver Lining for SMEs v5
The Cloud - A Silver Lining for SMEs v5
Rashid Ahmed
 
Setting_Product_Strategy.pptx
Setting_Product_Strategy.pptxSetting_Product_Strategy.pptx
Setting_Product_Strategy.pptx
Ashish360593
 
PPT_Digital_Transformation.pptx
PPT_Digital_Transformation.pptxPPT_Digital_Transformation.pptx
PPT_Digital_Transformation.pptx
Ashish360593
 

Similar to Applications of computer (20)

Applications area of computer by taiyab ali
Applications area of computer by taiyab aliApplications area of computer by taiyab ali
Applications area of computer by taiyab ali
 
Uses of computer
Uses of computerUses of computer
Uses of computer
 
Introduction to Computer Engineering
Introduction to Computer EngineeringIntroduction to Computer Engineering
Introduction to Computer Engineering
 
Computer fundamentals
Computer fundamentalsComputer fundamentals
Computer fundamentals
 
Role Of Com
Role Of ComRole Of Com
Role Of Com
 
Demonitization data
Demonitization dataDemonitization data
Demonitization data
 
Applications of computers
Applications of computersApplications of computers
Applications of computers
 
Applications of computer
Applications of computerApplications of computer
Applications of computer
 
Basic computer skills | Brad Steven Solvie
Basic computer skills | Brad Steven SolvieBasic computer skills | Brad Steven Solvie
Basic computer skills | Brad Steven Solvie
 
Applications of Computers.ppt
Applications of Computers.pptApplications of Computers.ppt
Applications of Computers.ppt
 
Real estate technology part 2 final
Real estate technology part 2 finalReal estate technology part 2 final
Real estate technology part 2 final
 
Applications of ecommerce
Applications of ecommerce Applications of ecommerce
Applications of ecommerce
 
Lesson 1.pptx
Lesson 1.pptxLesson 1.pptx
Lesson 1.pptx
 
Computer & generations
Computer & generationsComputer & generations
Computer & generations
 
Applications of computer
Applications of computerApplications of computer
Applications of computer
 
Usage of ICT in daily life
Usage of ICT in daily lifeUsage of ICT in daily life
Usage of ICT in daily life
 
Application of computer
Application of computerApplication of computer
Application of computer
 
The Cloud - A Silver Lining for SMEs v5
The Cloud - A Silver Lining for SMEs v5The Cloud - A Silver Lining for SMEs v5
The Cloud - A Silver Lining for SMEs v5
 
Setting_Product_Strategy.pptx
Setting_Product_Strategy.pptxSetting_Product_Strategy.pptx
Setting_Product_Strategy.pptx
 
PPT_Digital_Transformation.pptx
PPT_Digital_Transformation.pptxPPT_Digital_Transformation.pptx
PPT_Digital_Transformation.pptx
 

Recently uploaded

Essentials of Automations: The Art of Triggers and Actions in FME
Essentials of Automations: The Art of Triggers and Actions in FMEEssentials of Automations: The Art of Triggers and Actions in FME
Essentials of Automations: The Art of Triggers and Actions in FME
Safe Software
 
GraphSummit Singapore | Enhancing Changi Airport Group's Passenger Experience...
GraphSummit Singapore | Enhancing Changi Airport Group's Passenger Experience...GraphSummit Singapore | Enhancing Changi Airport Group's Passenger Experience...
GraphSummit Singapore | Enhancing Changi Airport Group's Passenger Experience...
Neo4j
 
Enchancing adoption of Open Source Libraries. A case study on Albumentations.AI
Enchancing adoption of Open Source Libraries. A case study on Albumentations.AIEnchancing adoption of Open Source Libraries. A case study on Albumentations.AI
Enchancing adoption of Open Source Libraries. A case study on Albumentations.AI
Vladimir Iglovikov, Ph.D.
 
Pushing the limits of ePRTC: 100ns holdover for 100 days
Pushing the limits of ePRTC: 100ns holdover for 100 daysPushing the limits of ePRTC: 100ns holdover for 100 days
Pushing the limits of ePRTC: 100ns holdover for 100 days
Adtran
 
Uni Systems Copilot event_05062024_C.Vlachos.pdf
Uni Systems Copilot event_05062024_C.Vlachos.pdfUni Systems Copilot event_05062024_C.Vlachos.pdf
Uni Systems Copilot event_05062024_C.Vlachos.pdf
Uni Systems S.M.S.A.
 
Observability Concepts EVERY Developer Should Know -- DeveloperWeek Europe.pdf
Observability Concepts EVERY Developer Should Know -- DeveloperWeek Europe.pdfObservability Concepts EVERY Developer Should Know -- DeveloperWeek Europe.pdf
Observability Concepts EVERY Developer Should Know -- DeveloperWeek Europe.pdf
Paige Cruz
 
20240605 QFM017 Machine Intelligence Reading List May 2024
20240605 QFM017 Machine Intelligence Reading List May 202420240605 QFM017 Machine Intelligence Reading List May 2024
20240605 QFM017 Machine Intelligence Reading List May 2024
Matthew Sinclair
 
Alt. GDG Cloud Southlake #33: Boule & Rebala: Effective AppSec in SDLC using ...
Alt. GDG Cloud Southlake #33: Boule & Rebala: Effective AppSec in SDLC using ...Alt. GDG Cloud Southlake #33: Boule & Rebala: Effective AppSec in SDLC using ...
Alt. GDG Cloud Southlake #33: Boule & Rebala: Effective AppSec in SDLC using ...
James Anderson
 
Securing your Kubernetes cluster_ a step-by-step guide to success !
Securing your Kubernetes cluster_ a step-by-step guide to success !Securing your Kubernetes cluster_ a step-by-step guide to success !
Securing your Kubernetes cluster_ a step-by-step guide to success !
KatiaHIMEUR1
 
“Building and Scaling AI Applications with the Nx AI Manager,” a Presentation...
“Building and Scaling AI Applications with the Nx AI Manager,” a Presentation...“Building and Scaling AI Applications with the Nx AI Manager,” a Presentation...
“Building and Scaling AI Applications with the Nx AI Manager,” a Presentation...
Edge AI and Vision Alliance
 
Encryption in Microsoft 365 - ExpertsLive Netherlands 2024
Encryption in Microsoft 365 - ExpertsLive Netherlands 2024Encryption in Microsoft 365 - ExpertsLive Netherlands 2024
Encryption in Microsoft 365 - ExpertsLive Netherlands 2024
Albert Hoitingh
 
Monitoring Java Application Security with JDK Tools and JFR Events
Monitoring Java Application Security with JDK Tools and JFR EventsMonitoring Java Application Security with JDK Tools and JFR Events
Monitoring Java Application Security with JDK Tools and JFR Events
Ana-Maria Mihalceanu
 
PCI PIN Basics Webinar from the Controlcase Team
PCI PIN Basics Webinar from the Controlcase TeamPCI PIN Basics Webinar from the Controlcase Team
PCI PIN Basics Webinar from the Controlcase Team
ControlCase
 
GraphSummit Singapore | The Future of Agility: Supercharging Digital Transfor...
GraphSummit Singapore | The Future of Agility: Supercharging Digital Transfor...GraphSummit Singapore | The Future of Agility: Supercharging Digital Transfor...
GraphSummit Singapore | The Future of Agility: Supercharging Digital Transfor...
Neo4j
 
Removing Uninteresting Bytes in Software Fuzzing
Removing Uninteresting Bytes in Software FuzzingRemoving Uninteresting Bytes in Software Fuzzing
Removing Uninteresting Bytes in Software Fuzzing
Aftab Hussain
 
Mind map of terminologies used in context of Generative AI
Mind map of terminologies used in context of Generative AIMind map of terminologies used in context of Generative AI
Mind map of terminologies used in context of Generative AI
Kumud Singh
 
Climate Impact of Software Testing at Nordic Testing Days
Climate Impact of Software Testing at Nordic Testing DaysClimate Impact of Software Testing at Nordic Testing Days
Climate Impact of Software Testing at Nordic Testing Days
Kari Kakkonen
 
20 Comprehensive Checklist of Designing and Developing a Website
20 Comprehensive Checklist of Designing and Developing a Website20 Comprehensive Checklist of Designing and Developing a Website
20 Comprehensive Checklist of Designing and Developing a Website
Pixlogix Infotech
 
“I’m still / I’m still / Chaining from the Block”
“I’m still / I’m still / Chaining from the Block”“I’m still / I’m still / Chaining from the Block”
“I’m still / I’m still / Chaining from the Block”
Claudio Di Ciccio
 
Video Streaming: Then, Now, and in the Future
Video Streaming: Then, Now, and in the FutureVideo Streaming: Then, Now, and in the Future
Video Streaming: Then, Now, and in the Future
Alpen-Adria-Universität
 

Recently uploaded (20)

Essentials of Automations: The Art of Triggers and Actions in FME
Essentials of Automations: The Art of Triggers and Actions in FMEEssentials of Automations: The Art of Triggers and Actions in FME
Essentials of Automations: The Art of Triggers and Actions in FME
 
GraphSummit Singapore | Enhancing Changi Airport Group's Passenger Experience...
GraphSummit Singapore | Enhancing Changi Airport Group's Passenger Experience...GraphSummit Singapore | Enhancing Changi Airport Group's Passenger Experience...
GraphSummit Singapore | Enhancing Changi Airport Group's Passenger Experience...
 
Enchancing adoption of Open Source Libraries. A case study on Albumentations.AI
Enchancing adoption of Open Source Libraries. A case study on Albumentations.AIEnchancing adoption of Open Source Libraries. A case study on Albumentations.AI
Enchancing adoption of Open Source Libraries. A case study on Albumentations.AI
 
Pushing the limits of ePRTC: 100ns holdover for 100 days
Pushing the limits of ePRTC: 100ns holdover for 100 daysPushing the limits of ePRTC: 100ns holdover for 100 days
Pushing the limits of ePRTC: 100ns holdover for 100 days
 
Uni Systems Copilot event_05062024_C.Vlachos.pdf
Uni Systems Copilot event_05062024_C.Vlachos.pdfUni Systems Copilot event_05062024_C.Vlachos.pdf
Uni Systems Copilot event_05062024_C.Vlachos.pdf
 
Observability Concepts EVERY Developer Should Know -- DeveloperWeek Europe.pdf
Observability Concepts EVERY Developer Should Know -- DeveloperWeek Europe.pdfObservability Concepts EVERY Developer Should Know -- DeveloperWeek Europe.pdf
Observability Concepts EVERY Developer Should Know -- DeveloperWeek Europe.pdf
 
20240605 QFM017 Machine Intelligence Reading List May 2024
20240605 QFM017 Machine Intelligence Reading List May 202420240605 QFM017 Machine Intelligence Reading List May 2024
20240605 QFM017 Machine Intelligence Reading List May 2024
 
Alt. GDG Cloud Southlake #33: Boule & Rebala: Effective AppSec in SDLC using ...
Alt. GDG Cloud Southlake #33: Boule & Rebala: Effective AppSec in SDLC using ...Alt. GDG Cloud Southlake #33: Boule & Rebala: Effective AppSec in SDLC using ...
Alt. GDG Cloud Southlake #33: Boule & Rebala: Effective AppSec in SDLC using ...
 
Securing your Kubernetes cluster_ a step-by-step guide to success !
Securing your Kubernetes cluster_ a step-by-step guide to success !Securing your Kubernetes cluster_ a step-by-step guide to success !
Securing your Kubernetes cluster_ a step-by-step guide to success !
 
“Building and Scaling AI Applications with the Nx AI Manager,” a Presentation...
“Building and Scaling AI Applications with the Nx AI Manager,” a Presentation...“Building and Scaling AI Applications with the Nx AI Manager,” a Presentation...
“Building and Scaling AI Applications with the Nx AI Manager,” a Presentation...
 
Encryption in Microsoft 365 - ExpertsLive Netherlands 2024
Encryption in Microsoft 365 - ExpertsLive Netherlands 2024Encryption in Microsoft 365 - ExpertsLive Netherlands 2024
Encryption in Microsoft 365 - ExpertsLive Netherlands 2024
 
Monitoring Java Application Security with JDK Tools and JFR Events
Monitoring Java Application Security with JDK Tools and JFR EventsMonitoring Java Application Security with JDK Tools and JFR Events
Monitoring Java Application Security with JDK Tools and JFR Events
 
PCI PIN Basics Webinar from the Controlcase Team
PCI PIN Basics Webinar from the Controlcase TeamPCI PIN Basics Webinar from the Controlcase Team
PCI PIN Basics Webinar from the Controlcase Team
 
GraphSummit Singapore | The Future of Agility: Supercharging Digital Transfor...
GraphSummit Singapore | The Future of Agility: Supercharging Digital Transfor...GraphSummit Singapore | The Future of Agility: Supercharging Digital Transfor...
GraphSummit Singapore | The Future of Agility: Supercharging Digital Transfor...
 
Removing Uninteresting Bytes in Software Fuzzing
Removing Uninteresting Bytes in Software FuzzingRemoving Uninteresting Bytes in Software Fuzzing
Removing Uninteresting Bytes in Software Fuzzing
 
Mind map of terminologies used in context of Generative AI
Mind map of terminologies used in context of Generative AIMind map of terminologies used in context of Generative AI
Mind map of terminologies used in context of Generative AI
 
Climate Impact of Software Testing at Nordic Testing Days
Climate Impact of Software Testing at Nordic Testing DaysClimate Impact of Software Testing at Nordic Testing Days
Climate Impact of Software Testing at Nordic Testing Days
 
20 Comprehensive Checklist of Designing and Developing a Website
20 Comprehensive Checklist of Designing and Developing a Website20 Comprehensive Checklist of Designing and Developing a Website
20 Comprehensive Checklist of Designing and Developing a Website
 
“I’m still / I’m still / Chaining from the Block”
“I’m still / I’m still / Chaining from the Block”“I’m still / I’m still / Chaining from the Block”
“I’m still / I’m still / Chaining from the Block”
 
Video Streaming: Then, Now, and in the Future
Video Streaming: Then, Now, and in the FutureVideo Streaming: Then, Now, and in the Future
Video Streaming: Then, Now, and in the Future
 

Applications of computer

  • 2. • We can go to library and search about Gandhi ji or some about else. • Computers are used in making cars. • We can play games in our computer for some enjoyment. • Salesperson use their computers to keep the record of their sales. • It is also used by scientists to stimulate a cell division. • These days computers are used in schools too.
  • 3. • Customer Information • Products • Reports and Profits • Transactions and Goals • Credit Applications • Delinquency • Miscellaneous
  • 4. Using ATM, customers can access to their bank accounts in order to make cash withdrawals, credit card cash advances, and check their account balances as well as purchase prepaid cellphone credit. If the currency being withdrawn from the ATM is different from that which the bank account is denominated in (eg; withdrawing japanese yen from a bank account containing US dollars) the money will be converted at a wholesale exchange rate. Thus, ATM’s often provide the best possible exchange rate for foreing travellers and are heavily used for these purpose as well.
  • 5. The use of computer to engineering is by helping it to create some of the important factors or simply using a computer to create an image about their plan by means of using programming languages. To control their machines and many more.....
  • 6. • Email Functions • Distributing Payments • Record Keeping • Direct-Mail Promotions • And Many More....
  • 7. • Accounting • Customer Interactions • Scheduling • Communication • Web Site and Many More...
  • 8. They are used for Doctor’s orders, charting notes, documenting vital signs and so many uses...
  • 9. A great advantages of home computers is that they allow individuals and families to achieve a variety of tasks at home. Families can use word processing, programs for homework spreadsheets to manage bills, and the internet for social networking and entertainment.
  • 10. Computer Integrated Manufacturing (CIM)... CIM techniques make use of group technology to create similar geometries for quick retrieval. Electronic files and many more.
  • 11. • Research • Data Entry • Intervention • Virtual • Teacher Resources • Learning