SlideShare a Scribd company logo
MY DETAILS
NAMES: JOCELYN MATINKANE
SURNAME: LEFELA
GENDER: FEMALE
SCHOOL: LESOTHO COLLEGE OF EDUCATION
E-MAIL ADDRESS: lefelamatinkane856@mail.com
FACEBOOK ACCOUNT: JOCELYN LEFELA
WHAT IS A COMPUTER?
A computer is an electronic device that can accept data (input), process the data and produce the results
(output). A computer can calculate and process large amounts of data in a fraction of the time it would take a
normal person to do.
HOW COMPUTERS WORK?
INPUT
Keyboard
PROCESSING
CPU
STORAGE
Hard drive
OUTPUT
Printer/screen
INPUT
 An input device allows you to communicate with a computer.
 You can use input devices to enter information and issue commands.
 Examples: a keyboard, mouse, and joystick.
KEYBOARD
PROCESSING(INSIDE THE COMPUTER’S
CASE)
 The Central Processing Unit (CPU) is the main chip in a computer.
 The CPU processes instructions, performs calculation and manages the flow of information through a
computer system.
 The CPU communicates with input, output and storage devices to perform tasks.
CPU
STORAGE
 A storage device is used to save information.
 The computer uses stored information, to perform tasks.
 Examples: Hard drive, floppy drive, recordable CD-ROM drive, tape drive and DVD-ROM drive.
HARD DRIVE
OUTPUT
 An output device allows a computer to communicate with you.
 These devices display information on a screen, create printed copies or generate sound.
 Examples: Monitor, printer and speakers.
MONITOR
ADVANTAGES OF A COMPUTER
Speed
Accuracy
Storage
Automatic
Diligence
Reliability
ADVANTAGES OF COMPUTER
 Speed: Computer has a very high speed. The speed of carrying out the given instruction logically and numerically
is incomparable between a computer and human being. A computer can do billions of actions per second.
 Accuracy: Computer calculates very accurately and computer never does mistakes although we often hear about
the false results of computers. This may be due to the error in data entry or due to poorly designed program.
Since, human beings do data entry and programming; hence, the error may make the results false.
 Storage: Computer has high storage capacity that allows you to store huge amount of data. It can also store
various files, folders, movies, music and many more.
 Automatic: computers are automatic machines because if you have given the instruction to a computer, then it
performs the given task automatically until it is finished.
 Diligence: Unlike human beings, a computer is free from monotony, tiredness, and lack of concentration. It can
continuously work for hour without creating any error.
ADVANTAGES OF COMPUTER
 Reliability: Computers are very reliable, failures are usually due to human elements. The computer maintains
your data for a long time, so that whenever that data is needed in future, you can take that data from the
computer.
DISADVANTAGES OF A COMPUTER
Health issues.
Virus and hacking attacks.
Increases unemployment.
Cyber crimes.
Privacy violation.
Negative impact on environment
DISADVANTAGES OF A COMPUTER
 Health issues: Improper use of computer has largely affected people’s health all over the world. For
instance- If you are working on computer system for long and continuous hours, your eyes can
become dry, which can result in headaches, eye strains, etc.
 Virus and hacking attacks: Viruses are computer programs that are developed for stealing and
damaging your sensitive or personal information. In addition, hacking is the process of gaining
unauthorized access to computers for certain illegal purposes. Viruses are usually transferred via E-
mails, internet download or removable devices.
 Increases unemployment: As we have discussed above that computers can perform many tasks
automatically, this reduces the need for people and increases unemployment in the society. It has also
negatively affected many others who do not have knowledge of working on computer system.
DISADVANTAGES OF A COMPUTER
 Cyber crimes: These are some people who use computers and internet for negative activities. They
attempt to break the computer’s security system and gain unauthorized access to hack credit card
details and other personal information, by accessing information, they violate all laws and misuse the
information for their own benefits. These types of actions are covered under online cyber-crimes.
 Privacy violation: The computers can be easily used for storing personal and private data of the
people. The privacy of the individual can be violated if the confidential and personal records are not
protected properly.
 Negative impact on environment: The manufacturing processes of computers produce a lot of
waste products and when people change their electronics, they throw away their old systems or devices.
Such wastes release huge amounts of hazardous toxic materials which heavily affect the environment.
SOURCES
NetLEARN Update CC(2002)YOUR STEP-BY-STEP GUIDE TO BASIC
COMPUTER SKILLS+. PG3-11.ed2012:Durban North
www.cvhsfoundation.org/computer-lab
https://www.javatpoint.com/what-are-the-advantages-of-computer

More Related Content

Similar to COMPUTER STUDIES by Lefela Matinkane

Computer ch. no 1.
Computer ch. no 1.Computer ch. no 1.
Computer ch. no 1.
Muhammad Ammar
 
Discovering Computer Chapter 1
Discovering Computer Chapter 1Discovering Computer Chapter 1
Discovering Computer Chapter 1
MuhammedTalha7
 
INTRODUCTION TO COMPUTER.pptx
INTRODUCTION TO COMPUTER.pptxINTRODUCTION TO COMPUTER.pptx
INTRODUCTION TO COMPUTER.pptx
AilaJaneOlanoVestida
 
COMPUTER FUNDAMENTALS PPT.pptx
COMPUTER FUNDAMENTALS PPT.pptxCOMPUTER FUNDAMENTALS PPT.pptx
COMPUTER FUNDAMENTALS PPT.pptx
NioLemuelLazatinConc
 
Introduction to computer
Introduction to computerIntroduction to computer
Introduction to computer
Zunair Aslam
 
Basic Concept of Computer
Basic Concept of ComputerBasic Concept of Computer
Basic Concept of Computer
Devendra Singh Rathod
 
computer introduction b.pptx
computer introduction b.pptxcomputer introduction b.pptx
computer introduction b.pptx
AMITYWEBSOLUTIONS1
 
Ics1 Chapter1
Ics1   Chapter1Ics1   Chapter1
Ics1 Chapter1Ranz
 
PALAMPUR POWER POINT FILE SONU.pptx
PALAMPUR POWER POINT FILE SONU.pptxPALAMPUR POWER POINT FILE SONU.pptx
PALAMPUR POWER POINT FILE SONU.pptx
AMITYWEBSOLUTIONS1
 
It advance 2016
It advance 2016It advance 2016
It advance 2016
mahmood saqy
 
Fundamental of Information Technology
Fundamental of Information TechnologyFundamental of Information Technology
Fundamental of Information Technology
Shipra Swati
 
Introduction to computer and hardware software
Introduction to computer and hardware softwareIntroduction to computer and hardware software
Introduction to computer and hardware software
zdkhan187
 
mini-solution.pdf
mini-solution.pdfmini-solution.pdf
mini-solution.pdf
rabiprasaddevkota1
 
111 01 intro
111 01 intro111 01 intro
111 01 intro
Christian Gabriel
 
SULTHAN's - ICT-1 for U.G courses in India
SULTHAN's - ICT-1 for U.G courses in IndiaSULTHAN's - ICT-1 for U.G courses in India
SULTHAN's - ICT-1 for U.G courses in India
SULTHAN BASHA
 
Chapter 01 -Fundamental of IT and OS.pptx
Chapter 01 -Fundamental of IT and OS.pptxChapter 01 -Fundamental of IT and OS.pptx
Chapter 01 -Fundamental of IT and OS.pptx
ssuser31c469
 

Similar to COMPUTER STUDIES by Lefela Matinkane (20)

Computer
ComputerComputer
Computer
 
Computer ch. no 1.
Computer ch. no 1.Computer ch. no 1.
Computer ch. no 1.
 
Abhay pratap singh rajawat
Abhay pratap singh rajawatAbhay pratap singh rajawat
Abhay pratap singh rajawat
 
Discovering Computer Chapter 1
Discovering Computer Chapter 1Discovering Computer Chapter 1
Discovering Computer Chapter 1
 
INTRODUCTION TO COMPUTER.pptx
INTRODUCTION TO COMPUTER.pptxINTRODUCTION TO COMPUTER.pptx
INTRODUCTION TO COMPUTER.pptx
 
COMPUTER FUNDAMENTALS PPT.pptx
COMPUTER FUNDAMENTALS PPT.pptxCOMPUTER FUNDAMENTALS PPT.pptx
COMPUTER FUNDAMENTALS PPT.pptx
 
Introduction to computer
Introduction to computerIntroduction to computer
Introduction to computer
 
Basic Concept of Computer
Basic Concept of ComputerBasic Concept of Computer
Basic Concept of Computer
 
computer introduction b.pptx
computer introduction b.pptxcomputer introduction b.pptx
computer introduction b.pptx
 
Ics1 Chapter1
Ics1   Chapter1Ics1   Chapter1
Ics1 Chapter1
 
PALAMPUR POWER POINT FILE SONU.pptx
PALAMPUR POWER POINT FILE SONU.pptxPALAMPUR POWER POINT FILE SONU.pptx
PALAMPUR POWER POINT FILE SONU.pptx
 
It advance 2016
It advance 2016It advance 2016
It advance 2016
 
Shivam ppt
Shivam pptShivam ppt
Shivam ppt
 
Fundamental of Information Technology
Fundamental of Information TechnologyFundamental of Information Technology
Fundamental of Information Technology
 
Introduction to computer and hardware software
Introduction to computer and hardware softwareIntroduction to computer and hardware software
Introduction to computer and hardware software
 
mini-solution.pdf
mini-solution.pdfmini-solution.pdf
mini-solution.pdf
 
111 01 intro
111 01 intro111 01 intro
111 01 intro
 
Chapter 1
Chapter 1Chapter 1
Chapter 1
 
SULTHAN's - ICT-1 for U.G courses in India
SULTHAN's - ICT-1 for U.G courses in IndiaSULTHAN's - ICT-1 for U.G courses in India
SULTHAN's - ICT-1 for U.G courses in India
 
Chapter 01 -Fundamental of IT and OS.pptx
Chapter 01 -Fundamental of IT and OS.pptxChapter 01 -Fundamental of IT and OS.pptx
Chapter 01 -Fundamental of IT and OS.pptx
 

Recently uploaded

Connector Corner: Automate dynamic content and events by pushing a button
Connector Corner: Automate dynamic content and events by pushing a buttonConnector Corner: Automate dynamic content and events by pushing a button
Connector Corner: Automate dynamic content and events by pushing a button
DianaGray10
 
FIDO Alliance Osaka Seminar: Passkeys at Amazon.pdf
FIDO Alliance Osaka Seminar: Passkeys at Amazon.pdfFIDO Alliance Osaka Seminar: Passkeys at Amazon.pdf
FIDO Alliance Osaka Seminar: Passkeys at Amazon.pdf
FIDO Alliance
 
Epistemic Interaction - tuning interfaces to provide information for AI support
Epistemic Interaction - tuning interfaces to provide information for AI supportEpistemic Interaction - tuning interfaces to provide information for AI support
Epistemic Interaction - tuning interfaces to provide information for AI support
Alan Dix
 
Slack (or Teams) Automation for Bonterra Impact Management (fka Social Soluti...
Slack (or Teams) Automation for Bonterra Impact Management (fka Social Soluti...Slack (or Teams) Automation for Bonterra Impact Management (fka Social Soluti...
Slack (or Teams) Automation for Bonterra Impact Management (fka Social Soluti...
Jeffrey Haguewood
 
FIDO Alliance Osaka Seminar: Passkeys and the Road Ahead.pdf
FIDO Alliance Osaka Seminar: Passkeys and the Road Ahead.pdfFIDO Alliance Osaka Seminar: Passkeys and the Road Ahead.pdf
FIDO Alliance Osaka Seminar: Passkeys and the Road Ahead.pdf
FIDO Alliance
 
Accelerate your Kubernetes clusters with Varnish Caching
Accelerate your Kubernetes clusters with Varnish CachingAccelerate your Kubernetes clusters with Varnish Caching
Accelerate your Kubernetes clusters with Varnish Caching
Thijs Feryn
 
Elevating Tactical DDD Patterns Through Object Calisthenics
Elevating Tactical DDD Patterns Through Object CalisthenicsElevating Tactical DDD Patterns Through Object Calisthenics
Elevating Tactical DDD Patterns Through Object Calisthenics
Dorra BARTAGUIZ
 
Bits & Pixels using AI for Good.........
Bits & Pixels using AI for Good.........Bits & Pixels using AI for Good.........
Bits & Pixels using AI for Good.........
Alison B. Lowndes
 
Assuring Contact Center Experiences for Your Customers With ThousandEyes
Assuring Contact Center Experiences for Your Customers With ThousandEyesAssuring Contact Center Experiences for Your Customers With ThousandEyes
Assuring Contact Center Experiences for Your Customers With ThousandEyes
ThousandEyes
 
How world-class product teams are winning in the AI era by CEO and Founder, P...
How world-class product teams are winning in the AI era by CEO and Founder, P...How world-class product teams are winning in the AI era by CEO and Founder, P...
How world-class product teams are winning in the AI era by CEO and Founder, P...
Product School
 
Generating a custom Ruby SDK for your web service or Rails API using Smithy
Generating a custom Ruby SDK for your web service or Rails API using SmithyGenerating a custom Ruby SDK for your web service or Rails API using Smithy
Generating a custom Ruby SDK for your web service or Rails API using Smithy
g2nightmarescribd
 
Designing Great Products: The Power of Design and Leadership by Chief Designe...
Designing Great Products: The Power of Design and Leadership by Chief Designe...Designing Great Products: The Power of Design and Leadership by Chief Designe...
Designing Great Products: The Power of Design and Leadership by Chief Designe...
Product School
 
From Siloed Products to Connected Ecosystem: Building a Sustainable and Scala...
From Siloed Products to Connected Ecosystem: Building a Sustainable and Scala...From Siloed Products to Connected Ecosystem: Building a Sustainable and Scala...
From Siloed Products to Connected Ecosystem: Building a Sustainable and Scala...
Product School
 
FIDO Alliance Osaka Seminar: The WebAuthn API and Discoverable Credentials.pdf
FIDO Alliance Osaka Seminar: The WebAuthn API and Discoverable Credentials.pdfFIDO Alliance Osaka Seminar: The WebAuthn API and Discoverable Credentials.pdf
FIDO Alliance Osaka Seminar: The WebAuthn API and Discoverable Credentials.pdf
FIDO Alliance
 
Software Delivery At the Speed of AI: Inflectra Invests In AI-Powered Quality
Software Delivery At the Speed of AI: Inflectra Invests In AI-Powered QualitySoftware Delivery At the Speed of AI: Inflectra Invests In AI-Powered Quality
Software Delivery At the Speed of AI: Inflectra Invests In AI-Powered Quality
Inflectra
 
Leading Change strategies and insights for effective change management pdf 1.pdf
Leading Change strategies and insights for effective change management pdf 1.pdfLeading Change strategies and insights for effective change management pdf 1.pdf
Leading Change strategies and insights for effective change management pdf 1.pdf
OnBoard
 
UiPath Test Automation using UiPath Test Suite series, part 4
UiPath Test Automation using UiPath Test Suite series, part 4UiPath Test Automation using UiPath Test Suite series, part 4
UiPath Test Automation using UiPath Test Suite series, part 4
DianaGray10
 
The Art of the Pitch: WordPress Relationships and Sales
The Art of the Pitch: WordPress Relationships and SalesThe Art of the Pitch: WordPress Relationships and Sales
The Art of the Pitch: WordPress Relationships and Sales
Laura Byrne
 
Dev Dives: Train smarter, not harder – active learning and UiPath LLMs for do...
Dev Dives: Train smarter, not harder – active learning and UiPath LLMs for do...Dev Dives: Train smarter, not harder – active learning and UiPath LLMs for do...
Dev Dives: Train smarter, not harder – active learning and UiPath LLMs for do...
UiPathCommunity
 
Builder.ai Founder Sachin Dev Duggal's Strategic Approach to Create an Innova...
Builder.ai Founder Sachin Dev Duggal's Strategic Approach to Create an Innova...Builder.ai Founder Sachin Dev Duggal's Strategic Approach to Create an Innova...
Builder.ai Founder Sachin Dev Duggal's Strategic Approach to Create an Innova...
Ramesh Iyer
 

Recently uploaded (20)

Connector Corner: Automate dynamic content and events by pushing a button
Connector Corner: Automate dynamic content and events by pushing a buttonConnector Corner: Automate dynamic content and events by pushing a button
Connector Corner: Automate dynamic content and events by pushing a button
 
FIDO Alliance Osaka Seminar: Passkeys at Amazon.pdf
FIDO Alliance Osaka Seminar: Passkeys at Amazon.pdfFIDO Alliance Osaka Seminar: Passkeys at Amazon.pdf
FIDO Alliance Osaka Seminar: Passkeys at Amazon.pdf
 
Epistemic Interaction - tuning interfaces to provide information for AI support
Epistemic Interaction - tuning interfaces to provide information for AI supportEpistemic Interaction - tuning interfaces to provide information for AI support
Epistemic Interaction - tuning interfaces to provide information for AI support
 
Slack (or Teams) Automation for Bonterra Impact Management (fka Social Soluti...
Slack (or Teams) Automation for Bonterra Impact Management (fka Social Soluti...Slack (or Teams) Automation for Bonterra Impact Management (fka Social Soluti...
Slack (or Teams) Automation for Bonterra Impact Management (fka Social Soluti...
 
FIDO Alliance Osaka Seminar: Passkeys and the Road Ahead.pdf
FIDO Alliance Osaka Seminar: Passkeys and the Road Ahead.pdfFIDO Alliance Osaka Seminar: Passkeys and the Road Ahead.pdf
FIDO Alliance Osaka Seminar: Passkeys and the Road Ahead.pdf
 
Accelerate your Kubernetes clusters with Varnish Caching
Accelerate your Kubernetes clusters with Varnish CachingAccelerate your Kubernetes clusters with Varnish Caching
Accelerate your Kubernetes clusters with Varnish Caching
 
Elevating Tactical DDD Patterns Through Object Calisthenics
Elevating Tactical DDD Patterns Through Object CalisthenicsElevating Tactical DDD Patterns Through Object Calisthenics
Elevating Tactical DDD Patterns Through Object Calisthenics
 
Bits & Pixels using AI for Good.........
Bits & Pixels using AI for Good.........Bits & Pixels using AI for Good.........
Bits & Pixels using AI for Good.........
 
Assuring Contact Center Experiences for Your Customers With ThousandEyes
Assuring Contact Center Experiences for Your Customers With ThousandEyesAssuring Contact Center Experiences for Your Customers With ThousandEyes
Assuring Contact Center Experiences for Your Customers With ThousandEyes
 
How world-class product teams are winning in the AI era by CEO and Founder, P...
How world-class product teams are winning in the AI era by CEO and Founder, P...How world-class product teams are winning in the AI era by CEO and Founder, P...
How world-class product teams are winning in the AI era by CEO and Founder, P...
 
Generating a custom Ruby SDK for your web service or Rails API using Smithy
Generating a custom Ruby SDK for your web service or Rails API using SmithyGenerating a custom Ruby SDK for your web service or Rails API using Smithy
Generating a custom Ruby SDK for your web service or Rails API using Smithy
 
Designing Great Products: The Power of Design and Leadership by Chief Designe...
Designing Great Products: The Power of Design and Leadership by Chief Designe...Designing Great Products: The Power of Design and Leadership by Chief Designe...
Designing Great Products: The Power of Design and Leadership by Chief Designe...
 
From Siloed Products to Connected Ecosystem: Building a Sustainable and Scala...
From Siloed Products to Connected Ecosystem: Building a Sustainable and Scala...From Siloed Products to Connected Ecosystem: Building a Sustainable and Scala...
From Siloed Products to Connected Ecosystem: Building a Sustainable and Scala...
 
FIDO Alliance Osaka Seminar: The WebAuthn API and Discoverable Credentials.pdf
FIDO Alliance Osaka Seminar: The WebAuthn API and Discoverable Credentials.pdfFIDO Alliance Osaka Seminar: The WebAuthn API and Discoverable Credentials.pdf
FIDO Alliance Osaka Seminar: The WebAuthn API and Discoverable Credentials.pdf
 
Software Delivery At the Speed of AI: Inflectra Invests In AI-Powered Quality
Software Delivery At the Speed of AI: Inflectra Invests In AI-Powered QualitySoftware Delivery At the Speed of AI: Inflectra Invests In AI-Powered Quality
Software Delivery At the Speed of AI: Inflectra Invests In AI-Powered Quality
 
Leading Change strategies and insights for effective change management pdf 1.pdf
Leading Change strategies and insights for effective change management pdf 1.pdfLeading Change strategies and insights for effective change management pdf 1.pdf
Leading Change strategies and insights for effective change management pdf 1.pdf
 
UiPath Test Automation using UiPath Test Suite series, part 4
UiPath Test Automation using UiPath Test Suite series, part 4UiPath Test Automation using UiPath Test Suite series, part 4
UiPath Test Automation using UiPath Test Suite series, part 4
 
The Art of the Pitch: WordPress Relationships and Sales
The Art of the Pitch: WordPress Relationships and SalesThe Art of the Pitch: WordPress Relationships and Sales
The Art of the Pitch: WordPress Relationships and Sales
 
Dev Dives: Train smarter, not harder – active learning and UiPath LLMs for do...
Dev Dives: Train smarter, not harder – active learning and UiPath LLMs for do...Dev Dives: Train smarter, not harder – active learning and UiPath LLMs for do...
Dev Dives: Train smarter, not harder – active learning and UiPath LLMs for do...
 
Builder.ai Founder Sachin Dev Duggal's Strategic Approach to Create an Innova...
Builder.ai Founder Sachin Dev Duggal's Strategic Approach to Create an Innova...Builder.ai Founder Sachin Dev Duggal's Strategic Approach to Create an Innova...
Builder.ai Founder Sachin Dev Duggal's Strategic Approach to Create an Innova...
 

COMPUTER STUDIES by Lefela Matinkane

  • 1. MY DETAILS NAMES: JOCELYN MATINKANE SURNAME: LEFELA GENDER: FEMALE SCHOOL: LESOTHO COLLEGE OF EDUCATION E-MAIL ADDRESS: lefelamatinkane856@mail.com FACEBOOK ACCOUNT: JOCELYN LEFELA
  • 2. WHAT IS A COMPUTER? A computer is an electronic device that can accept data (input), process the data and produce the results (output). A computer can calculate and process large amounts of data in a fraction of the time it would take a normal person to do.
  • 4. INPUT  An input device allows you to communicate with a computer.  You can use input devices to enter information and issue commands.  Examples: a keyboard, mouse, and joystick. KEYBOARD
  • 5. PROCESSING(INSIDE THE COMPUTER’S CASE)  The Central Processing Unit (CPU) is the main chip in a computer.  The CPU processes instructions, performs calculation and manages the flow of information through a computer system.  The CPU communicates with input, output and storage devices to perform tasks. CPU
  • 6. STORAGE  A storage device is used to save information.  The computer uses stored information, to perform tasks.  Examples: Hard drive, floppy drive, recordable CD-ROM drive, tape drive and DVD-ROM drive. HARD DRIVE
  • 7. OUTPUT  An output device allows a computer to communicate with you.  These devices display information on a screen, create printed copies or generate sound.  Examples: Monitor, printer and speakers. MONITOR
  • 8. ADVANTAGES OF A COMPUTER Speed Accuracy Storage Automatic Diligence Reliability
  • 9. ADVANTAGES OF COMPUTER  Speed: Computer has a very high speed. The speed of carrying out the given instruction logically and numerically is incomparable between a computer and human being. A computer can do billions of actions per second.  Accuracy: Computer calculates very accurately and computer never does mistakes although we often hear about the false results of computers. This may be due to the error in data entry or due to poorly designed program. Since, human beings do data entry and programming; hence, the error may make the results false.  Storage: Computer has high storage capacity that allows you to store huge amount of data. It can also store various files, folders, movies, music and many more.  Automatic: computers are automatic machines because if you have given the instruction to a computer, then it performs the given task automatically until it is finished.  Diligence: Unlike human beings, a computer is free from monotony, tiredness, and lack of concentration. It can continuously work for hour without creating any error.
  • 10. ADVANTAGES OF COMPUTER  Reliability: Computers are very reliable, failures are usually due to human elements. The computer maintains your data for a long time, so that whenever that data is needed in future, you can take that data from the computer.
  • 11. DISADVANTAGES OF A COMPUTER Health issues. Virus and hacking attacks. Increases unemployment. Cyber crimes. Privacy violation. Negative impact on environment
  • 12. DISADVANTAGES OF A COMPUTER  Health issues: Improper use of computer has largely affected people’s health all over the world. For instance- If you are working on computer system for long and continuous hours, your eyes can become dry, which can result in headaches, eye strains, etc.  Virus and hacking attacks: Viruses are computer programs that are developed for stealing and damaging your sensitive or personal information. In addition, hacking is the process of gaining unauthorized access to computers for certain illegal purposes. Viruses are usually transferred via E- mails, internet download or removable devices.  Increases unemployment: As we have discussed above that computers can perform many tasks automatically, this reduces the need for people and increases unemployment in the society. It has also negatively affected many others who do not have knowledge of working on computer system.
  • 13. DISADVANTAGES OF A COMPUTER  Cyber crimes: These are some people who use computers and internet for negative activities. They attempt to break the computer’s security system and gain unauthorized access to hack credit card details and other personal information, by accessing information, they violate all laws and misuse the information for their own benefits. These types of actions are covered under online cyber-crimes.  Privacy violation: The computers can be easily used for storing personal and private data of the people. The privacy of the individual can be violated if the confidential and personal records are not protected properly.  Negative impact on environment: The manufacturing processes of computers produce a lot of waste products and when people change their electronics, they throw away their old systems or devices. Such wastes release huge amounts of hazardous toxic materials which heavily affect the environment.
  • 14. SOURCES NetLEARN Update CC(2002)YOUR STEP-BY-STEP GUIDE TO BASIC COMPUTER SKILLS+. PG3-11.ed2012:Durban North www.cvhsfoundation.org/computer-lab https://www.javatpoint.com/what-are-the-advantages-of-computer