COMPUTER ACTIVITY
NAME – ASTIK SURI
CLASS – 10TH – F
ROLL NO. – 06
TOPIC – E-LEARNING , E-BANKING , E-SHOPPING ETC.
E-LEARNING
 E-Learning is a use of technology of enable people to learn anything and anywhere.
 It can be CD-ROM based , network based , intranet based , internet based .
 The terms frequently interchanged with e-learning include –
1. Online learning 2. online education
3. Distance education 4. distance learning
5. Technology based training 6. web based training
7. Computer based training
 Advantages of e-learning –
 Less expensive Self paced
 Works faster
 Disadvantages of e-learning
 Lack of control
 Difficult to adopt the learning approach
E-BANKING
IT REFERS TO ELECTRONIC BANKING.
E-Banking is also called as virtual banking or online banking.
 Advantages of e-banking
I. It is quite convenient
II. Account balance and information are availed .
III. Updating and maintaining direct accounts.
 Disadvantages of e banking
I. Security matters
II. Hacking attacks etc.
III. Transaction problem

Computer activity

  • 1.
    COMPUTER ACTIVITY NAME –ASTIK SURI CLASS – 10TH – F ROLL NO. – 06 TOPIC – E-LEARNING , E-BANKING , E-SHOPPING ETC.
  • 2.
    E-LEARNING  E-Learning isa use of technology of enable people to learn anything and anywhere.  It can be CD-ROM based , network based , intranet based , internet based .  The terms frequently interchanged with e-learning include – 1. Online learning 2. online education 3. Distance education 4. distance learning 5. Technology based training 6. web based training 7. Computer based training  Advantages of e-learning –  Less expensive Self paced  Works faster  Disadvantages of e-learning  Lack of control  Difficult to adopt the learning approach
  • 3.
    E-BANKING IT REFERS TOELECTRONIC BANKING. E-Banking is also called as virtual banking or online banking.  Advantages of e-banking I. It is quite convenient II. Account balance and information are availed . III. Updating and maintaining direct accounts.  Disadvantages of e banking I. Security matters II. Hacking attacks etc. III. Transaction problem