SlideShare a Scribd company logo
GOOD MORNING!
TOPIC OF THE DAY
THE NINE AMIGOS
PRESENTS.......
INTRODUCTION
GROUP LEADER:
MUSKAN RASOOLK
MEMBERS:
1. NAMRA
2. SHAWANA
3. HABIBA
4. ROMAISA
5. AILAH
6. HAMNA
7. JAVERIA
8. MUQADDAS
CHAPTER:17
CONTENTS
WORD PROCESSING MUSKAN
DATA MANAGEMENT ROMAISA
INTERNET NAMRA & HAMNA
INTERNET SERVICES NAMRA
BROWSERS JAVERIA
SEARCHING THE WEB AILAH
RISKS OF ICT HABIBA & SHAWANA
ELECTRONIC BANKING MUQADDAS
FOR YOUR INFORMATION JAVERIA
INTERESTING INFORMATION MUQADDAS
WORD PROCESSING
• Released in 1979 by Micropro International, WordStar was the first
commercially successful word processing software program produced
for microcomputers and the best selling software program of the early
eighties.
• A word processor is a computer program or device that provides for
input, editing, formatting and output of text, often plus other features.
• Word processing software is used to manipulate a text document, such
as a resume or a report.
• You typically enter text by typing, and the software provides tools for
copying, deleting and various types of formatting.
DATA MANAGEMENT
Data management is the practice of collecting ,organizing and
maintaining data processes and store them in computer for
future use to meet ongoing information life cycle needs.
IMPORTANCE:
• The educational institutions , libraries , hospitals and
industries store the concerned information.
• Additions and deletions can be made in the data according to
the requirement, which help in the improvement of the
management of the institutions.
• In big stores, optical scanners are used which reads codes by
reflecting light from the black and white lines of a bar code.
 It keeps a centralized record on a computer system that tracks
products, prices, and stock levels. we can change prices as often as
we like, without having to put new price tags on all boxes.
 We can instantly see when stock levels of certain items are running
low.
 Because bar code technology is so accurate,we can be reasonably
confident that any items that are missing (and don't appear to have
been sold) have probably been stolen.
ELECTRONIC BANKING
• Now-a-days, home banking is operating on
telephones. You can find your bank balance
from the bank on phone, can pay all kinds of
bills and transfer your funds by pressing a
key of your personnel identification, send
you all required information.
• ATM machines help you draw money at any
time you want.
INTERNET
• When many computers were connected with each other with
the purpose of communication internet was formed.
• It is a global computer network providing a variety of
information and communication facilities, consisting of
interconnected networks using standardized communication
protocols.
• There is hardly any country of the world where internet is not
available.
• The Internet, sometimes called simply "the Net," is a
worldwide system of computer networks - a network of
networks in which users at any one computer can, if they have
permission, get information from any other computer (and
sometimes talk directly to users at other computers).
• Today, the Internet is a public, cooperative and self-sustaining
facility accessible to hundreds of millions of people
worldwide.
• Like a telephone system , any computer of any city can
establish a connection with any other computer of any other
INTERNET SERVICES
The main devices used on the internet include:
WEB BROWSING:
• This function allows users to view web pages using a
web browser.
E-MAIL:
• It allows people to send and receive text messages.
BROWSERS
• A web browser, or simply "browser," is an application
used to access and view websites.
• It allows a user to locate, access, and display web
pages.
• Common web browsers include Microsoft Internet
Explorer, Google Chrome, Mozilla Firefox, and Apple
Safari.
SEARCHING THE WEB
• We can search anything through search engines.
• The procedure of searching the web in Google is
as under :
E-MAIL
• On October 29th 1969, the first message was sent from computer to
computer on ARPANET. It looked like this: It was 1971 when Ray
Tomlinson invented and developed electronic mail, as we know it today,
by creating ARPANET's networked email system.
• E-mail is defined as the transmission of messages over communications
networks.
• Typically the messages are notes entered from the keyboard or electronic
files stored on disk.
• Email operates across computer networks, which today is primarily the
Internet.
• Email servers accept, forward, deliver, and store messages.
ADVANTAGES
FAST COMMMUNICATION:
• We can send messages anywhere in the world instantly.
COST FREE SERVICE:
• If we have an internet access, then we can avail the free email service
free of cost.
SIMPLE TO USE:
• After initial set up of email, it is easy to use.
MORE EFFICIENT:
• We can send our messages to many friends our people in one action.
VERSATILE:
• Pictures or other files can also be sent through e- mail.
ADVANTAGES OF INTERNET
• Internet has proved to be very beneficial to us in the
following ways:
i. Faster communication
ii. Big source of information
iii. Source of entertainment
iv. Access to social media
v. Access to online services
vi. E- commerce
vii. E - learning
Faster communication
• It is a global
computer network
which provides
communication
facilities.
Big source of information
E- commerce
 It is the way of doing bussiness on the web.
 You can order your favourite book or any other items on the line.
 For instance , AMAZON.com has been selling book, music,and videos
for years.
 As time passes on, supermarkets and trading companies will be selling
more of their goods online.
E - learning
E-Learning is learning utilizing electronic
technologies to access educational
curriculum outside of a traditional
classroom.
Source of entertainment
• INTERNET IS A BIG SOURCE OF
ENTERTAINMENT.
• IT ENTERTAINS US THROUGH MOVIES
,DRAMAS ,GAMES , MUSIC ETC.
WE CAN WATCH MOVIES, CARTOONS AND DRAMAS & USE
DIFFERENT APPS.
WE CAN PLAY GAMES AND LISTEN TO MUSIC.
RISKS
OF
ICT
OVERUSE:
• Overuse of computer is dangerous for health.
COMPUTER CRIMES:
• It is defined as any crime that is accomplished through
knowledge or use of computer technology.
• These are also very common now-a-days.
PRIVACY:
• It is illegal duplication of copyright material like books, paper ,
and softwares.
• This issue is common on computer.
WORD THEFT:
• Theft is the most
common form of crime.
• Computers are used to
steal money
,information and
computer resources.
HACKING:
• It is an unauthorized access to computer systems of
other persons.
• It is an illegal activity commited on computers.
• Hackers can damage some organizations by stealing
their credit cards and valuable information.
SECURITY
• One way to reduce risk of secuirity breachers is to make sure that only
authorized person have access to computer equipment.
• We may be granted access to computer based on some passwords as described
below:
• We can use the following to secure our computer:
• A KEY
• AN ID WITH PHOTO
• A LOCK COMBINATION
• OUR VOICE PRINT OR FINGER PRINT AS PASSWORD
Interesting Information
• Internet is a global web of more than one million
nets in which more they 50 million computers are
operating and almost 200 million people participate
through the world.
• The number is increasing day by day contact can be
made at any time during the day or night on internet.
ICT....(Muskan Rasool)
ICT....(Muskan Rasool)
ICT....(Muskan Rasool)
ICT....(Muskan Rasool)

More Related Content

What's hot

The Internet Presentation
The Internet Presentation The Internet Presentation
The Internet Presentation guestc2627d
 
6th chapter modern communication device.
6th chapter modern communication device.6th chapter modern communication device.
6th chapter modern communication device.
venkatesh yadav
 
Misuse of Internet
Misuse of InternetMisuse of Internet
Misuse of Internet
VaishnaviPalkar
 
computer and society impact of Computer in society
computer and society  impact of Computer in society computer and society  impact of Computer in society
computer and society impact of Computer in society
Sumama Shakir
 
Internet presentation
Internet presentationInternet presentation
Internet presentation
Bilal Maqbool ツ
 
Internet ,merits demerits, features
Internet ,merits demerits, featuresInternet ,merits demerits, features
Internet ,merits demerits, features
Kiran Kurian Philip
 
Lesson 01 introduction to computer
Lesson 01   introduction to computerLesson 01   introduction to computer
Lesson 01 introduction to computer
Rodz Tech
 
Power point assignment
Power point assignmentPower point assignment
Power point assignment
Konrad Warford
 
Introduction to World Wide Web
Introduction to World Wide WebIntroduction to World Wide Web
Introduction to World Wide Web
Marlon Jamera
 
Uses Of Internet In A Day To Day Life
Uses Of Internet In A Day To Day LifeUses Of Internet In A Day To Day Life
Uses Of Internet In A Day To Day Life
Sundeep Malik
 
First step to internet
First step to internet First step to internet
First step to internet
Disani Neranjala
 
INTERNET TECHNOLOGY
INTERNET  TECHNOLOGYINTERNET  TECHNOLOGY
INTERNET TECHNOLOGY
subhradeep mitra
 
Module 5 (Additional Activities)
Module 5 (Additional Activities)Module 5 (Additional Activities)
Module 5 (Additional Activities)
AmyselMarieFerrero
 
Internet and its application in education
Internet and its application in educationInternet and its application in education
Internet and its application in education
Lakshmi Kalpana Venkatasubramanian
 
Me, The Computer And The Internet2
Me, The Computer And The Internet2Me, The Computer And The Internet2
Me, The Computer And The Internet2Gener Luis Morada
 
Uses of internet
Uses of internetUses of internet
Uses of internetsheenam65
 
Exposé anglais -The internet
Exposé anglais -The internetExposé anglais -The internet
Exposé anglais -The internet
carlos jesse biahacue mercader
 

What's hot (20)

The Internet Presentation
The Internet Presentation The Internet Presentation
The Internet Presentation
 
6th chapter modern communication device.
6th chapter modern communication device.6th chapter modern communication device.
6th chapter modern communication device.
 
Misuse of Internet
Misuse of InternetMisuse of Internet
Misuse of Internet
 
computer and society impact of Computer in society
computer and society  impact of Computer in society computer and society  impact of Computer in society
computer and society impact of Computer in society
 
Internet presentation
Internet presentationInternet presentation
Internet presentation
 
Internet ,merits demerits, features
Internet ,merits demerits, featuresInternet ,merits demerits, features
Internet ,merits demerits, features
 
Lesson 01 introduction to computer
Lesson 01   introduction to computerLesson 01   introduction to computer
Lesson 01 introduction to computer
 
Internet working
Internet workingInternet working
Internet working
 
advantages and disadvantages of internet
advantages and disadvantages of internet advantages and disadvantages of internet
advantages and disadvantages of internet
 
Power point assignment
Power point assignmentPower point assignment
Power point assignment
 
Introduction to World Wide Web
Introduction to World Wide WebIntroduction to World Wide Web
Introduction to World Wide Web
 
Uses Of Internet In A Day To Day Life
Uses Of Internet In A Day To Day LifeUses Of Internet In A Day To Day Life
Uses Of Internet In A Day To Day Life
 
First step to internet
First step to internet First step to internet
First step to internet
 
INTERNET TECHNOLOGY
INTERNET  TECHNOLOGYINTERNET  TECHNOLOGY
INTERNET TECHNOLOGY
 
Presentation1(1)
Presentation1(1)Presentation1(1)
Presentation1(1)
 
Module 5 (Additional Activities)
Module 5 (Additional Activities)Module 5 (Additional Activities)
Module 5 (Additional Activities)
 
Internet and its application in education
Internet and its application in educationInternet and its application in education
Internet and its application in education
 
Me, The Computer And The Internet2
Me, The Computer And The Internet2Me, The Computer And The Internet2
Me, The Computer And The Internet2
 
Uses of internet
Uses of internetUses of internet
Uses of internet
 
Exposé anglais -The internet
Exposé anglais -The internetExposé anglais -The internet
Exposé anglais -The internet
 

Similar to ICT....(Muskan Rasool)

Internet
InternetInternet
Internet
RajniKashyap9
 
Internet surfing and security
Internet surfing and securityInternet surfing and security
Internet surfing and security
namansaini11
 
The academy of creative cooking CIS2200
The academy of creative cooking CIS2200The academy of creative cooking CIS2200
The academy of creative cooking CIS2200Mervenur Aydin
 
The Internet
The InternetThe Internet
The Internet
Ameesha Indusarani
 
chap1 The_Internet_and_the_World_Wide_Web.ppt
chap1 The_Internet_and_the_World_Wide_Web.pptchap1 The_Internet_and_the_World_Wide_Web.ppt
chap1 The_Internet_and_the_World_Wide_Web.ppt
ansariparveen06
 
Internet.pptx
Internet.pptxInternet.pptx
Internet.pptx
slideshareppt
 
Internet Technology
Internet TechnologyInternet Technology
Internet Technology
actanimation
 
Mikial Singh Nijjar | Where Is Information Technology Headed?
Mikial Singh Nijjar | Where Is Information Technology Headed?Mikial Singh Nijjar | Where Is Information Technology Headed?
Mikial Singh Nijjar | Where Is Information Technology Headed?
Mikial Singh Nijjar
 
Chapter-3-The-Internet-and-World-Wide-Web.pptx
Chapter-3-The-Internet-and-World-Wide-Web.pptxChapter-3-The-Internet-and-World-Wide-Web.pptx
Chapter-3-The-Internet-and-World-Wide-Web.pptx
EdeleneGetes
 
INTERNET.pptx
INTERNET.pptxINTERNET.pptx
Internet ppt
Internet  ppt Internet  ppt
Internet ppt
JayashreeTalwar
 
Internet Technology-I.pdf
Internet Technology-I.pdfInternet Technology-I.pdf
Internet Technology-I.pdf
RahulGhosh767154
 
Weaknessandstrengthsofcomputer 120318060107-phpapp02
Weaknessandstrengthsofcomputer 120318060107-phpapp02Weaknessandstrengthsofcomputer 120318060107-phpapp02
Weaknessandstrengthsofcomputer 120318060107-phpapp02jyoti_kailay
 
Everything about Internet
Everything about InternetEverything about Internet
Everything about Internet
RAJEEV KUMAR SINGH
 
Weakness and strengths of computer
Weakness and strengths of computerWeakness and strengths of computer
Weakness and strengths of computerAmanjot_kaur
 
Internet .....History to till now
Internet .....History to till nowInternet .....History to till now
Internet .....History to till now
knowldge
 
ICT 7 Q2 Chapter 1 PPT.pptx
ICT 7 Q2 Chapter 1 PPT.pptxICT 7 Q2 Chapter 1 PPT.pptx
ICT 7 Q2 Chapter 1 PPT.pptx
RaymondPuno1
 
internet
internetinternet
internet
UmeshKumar687
 
The World of Information
The World of InformationThe World of Information
The World of Information
Badal Dixit
 

Similar to ICT....(Muskan Rasool) (20)

Internet
InternetInternet
Internet
 
Internet surfing and security
Internet surfing and securityInternet surfing and security
Internet surfing and security
 
History of intermet ppt uls
History of intermet ppt ulsHistory of intermet ppt uls
History of intermet ppt uls
 
The academy of creative cooking CIS2200
The academy of creative cooking CIS2200The academy of creative cooking CIS2200
The academy of creative cooking CIS2200
 
The Internet
The InternetThe Internet
The Internet
 
chap1 The_Internet_and_the_World_Wide_Web.ppt
chap1 The_Internet_and_the_World_Wide_Web.pptchap1 The_Internet_and_the_World_Wide_Web.ppt
chap1 The_Internet_and_the_World_Wide_Web.ppt
 
Internet.pptx
Internet.pptxInternet.pptx
Internet.pptx
 
Internet Technology
Internet TechnologyInternet Technology
Internet Technology
 
Mikial Singh Nijjar | Where Is Information Technology Headed?
Mikial Singh Nijjar | Where Is Information Technology Headed?Mikial Singh Nijjar | Where Is Information Technology Headed?
Mikial Singh Nijjar | Where Is Information Technology Headed?
 
Chapter-3-The-Internet-and-World-Wide-Web.pptx
Chapter-3-The-Internet-and-World-Wide-Web.pptxChapter-3-The-Internet-and-World-Wide-Web.pptx
Chapter-3-The-Internet-and-World-Wide-Web.pptx
 
INTERNET.pptx
INTERNET.pptxINTERNET.pptx
INTERNET.pptx
 
Internet ppt
Internet  ppt Internet  ppt
Internet ppt
 
Internet Technology-I.pdf
Internet Technology-I.pdfInternet Technology-I.pdf
Internet Technology-I.pdf
 
Weaknessandstrengthsofcomputer 120318060107-phpapp02
Weaknessandstrengthsofcomputer 120318060107-phpapp02Weaknessandstrengthsofcomputer 120318060107-phpapp02
Weaknessandstrengthsofcomputer 120318060107-phpapp02
 
Everything about Internet
Everything about InternetEverything about Internet
Everything about Internet
 
Weakness and strengths of computer
Weakness and strengths of computerWeakness and strengths of computer
Weakness and strengths of computer
 
Internet .....History to till now
Internet .....History to till nowInternet .....History to till now
Internet .....History to till now
 
ICT 7 Q2 Chapter 1 PPT.pptx
ICT 7 Q2 Chapter 1 PPT.pptxICT 7 Q2 Chapter 1 PPT.pptx
ICT 7 Q2 Chapter 1 PPT.pptx
 
internet
internetinternet
internet
 
The World of Information
The World of InformationThe World of Information
The World of Information
 

Recently uploaded

Lapbook sobre os Regimes Totalitários.pdf
Lapbook sobre os Regimes Totalitários.pdfLapbook sobre os Regimes Totalitários.pdf
Lapbook sobre os Regimes Totalitários.pdf
Jean Carlos Nunes Paixão
 
The French Revolution Class 9 Study Material pdf free download
The French Revolution Class 9 Study Material pdf free downloadThe French Revolution Class 9 Study Material pdf free download
The French Revolution Class 9 Study Material pdf free download
Vivekanand Anglo Vedic Academy
 
Welcome to TechSoup New Member Orientation and Q&A (May 2024).pdf
Welcome to TechSoup   New Member Orientation and Q&A (May 2024).pdfWelcome to TechSoup   New Member Orientation and Q&A (May 2024).pdf
Welcome to TechSoup New Member Orientation and Q&A (May 2024).pdf
TechSoup
 
Home assignment II on Spectroscopy 2024 Answers.pdf
Home assignment II on Spectroscopy 2024 Answers.pdfHome assignment II on Spectroscopy 2024 Answers.pdf
Home assignment II on Spectroscopy 2024 Answers.pdf
Tamralipta Mahavidyalaya
 
"Protectable subject matters, Protection in biotechnology, Protection of othe...
"Protectable subject matters, Protection in biotechnology, Protection of othe..."Protectable subject matters, Protection in biotechnology, Protection of othe...
"Protectable subject matters, Protection in biotechnology, Protection of othe...
SACHIN R KONDAGURI
 
Palestine last event orientationfvgnh .pptx
Palestine last event orientationfvgnh .pptxPalestine last event orientationfvgnh .pptx
Palestine last event orientationfvgnh .pptx
RaedMohamed3
 
Introduction to AI for Nonprofits with Tapp Network
Introduction to AI for Nonprofits with Tapp NetworkIntroduction to AI for Nonprofits with Tapp Network
Introduction to AI for Nonprofits with Tapp Network
TechSoup
 
The Roman Empire A Historical Colossus.pdf
The Roman Empire A Historical Colossus.pdfThe Roman Empire A Historical Colossus.pdf
The Roman Empire A Historical Colossus.pdf
kaushalkr1407
 
Sha'Carri Richardson Presentation 202345
Sha'Carri Richardson Presentation 202345Sha'Carri Richardson Presentation 202345
Sha'Carri Richardson Presentation 202345
beazzy04
 
Instructions for Submissions thorugh G- Classroom.pptx
Instructions for Submissions thorugh G- Classroom.pptxInstructions for Submissions thorugh G- Classroom.pptx
Instructions for Submissions thorugh G- Classroom.pptx
Jheel Barad
 
Chapter 3 - Islamic Banking Products and Services.pptx
Chapter 3 - Islamic Banking Products and Services.pptxChapter 3 - Islamic Banking Products and Services.pptx
Chapter 3 - Islamic Banking Products and Services.pptx
Mohd Adib Abd Muin, Senior Lecturer at Universiti Utara Malaysia
 
678020731-Sumas-y-Restas-Para-Colorear.pdf
678020731-Sumas-y-Restas-Para-Colorear.pdf678020731-Sumas-y-Restas-Para-Colorear.pdf
678020731-Sumas-y-Restas-Para-Colorear.pdf
CarlosHernanMontoyab2
 
A Strategic Approach: GenAI in Education
A Strategic Approach: GenAI in EducationA Strategic Approach: GenAI in Education
A Strategic Approach: GenAI in Education
Peter Windle
 
The basics of sentences session 5pptx.pptx
The basics of sentences session 5pptx.pptxThe basics of sentences session 5pptx.pptx
The basics of sentences session 5pptx.pptx
heathfieldcps1
 
Honest Reviews of Tim Han LMA Course Program.pptx
Honest Reviews of Tim Han LMA Course Program.pptxHonest Reviews of Tim Han LMA Course Program.pptx
Honest Reviews of Tim Han LMA Course Program.pptx
timhan337
 
special B.ed 2nd year old paper_20240531.pdf
special B.ed 2nd year old paper_20240531.pdfspecial B.ed 2nd year old paper_20240531.pdf
special B.ed 2nd year old paper_20240531.pdf
Special education needs
 
The geography of Taylor Swift - some ideas
The geography of Taylor Swift - some ideasThe geography of Taylor Swift - some ideas
The geography of Taylor Swift - some ideas
GeoBlogs
 
Phrasal Verbs.XXXXXXXXXXXXXXXXXXXXXXXXXX
Phrasal Verbs.XXXXXXXXXXXXXXXXXXXXXXXXXXPhrasal Verbs.XXXXXXXXXXXXXXXXXXXXXXXXXX
Phrasal Verbs.XXXXXXXXXXXXXXXXXXXXXXXXXX
MIRIAMSALINAS13
 
How libraries can support authors with open access requirements for UKRI fund...
How libraries can support authors with open access requirements for UKRI fund...How libraries can support authors with open access requirements for UKRI fund...
How libraries can support authors with open access requirements for UKRI fund...
Jisc
 
Mule 4.6 & Java 17 Upgrade | MuleSoft Mysore Meetup #46
Mule 4.6 & Java 17 Upgrade | MuleSoft Mysore Meetup #46Mule 4.6 & Java 17 Upgrade | MuleSoft Mysore Meetup #46
Mule 4.6 & Java 17 Upgrade | MuleSoft Mysore Meetup #46
MysoreMuleSoftMeetup
 

Recently uploaded (20)

Lapbook sobre os Regimes Totalitários.pdf
Lapbook sobre os Regimes Totalitários.pdfLapbook sobre os Regimes Totalitários.pdf
Lapbook sobre os Regimes Totalitários.pdf
 
The French Revolution Class 9 Study Material pdf free download
The French Revolution Class 9 Study Material pdf free downloadThe French Revolution Class 9 Study Material pdf free download
The French Revolution Class 9 Study Material pdf free download
 
Welcome to TechSoup New Member Orientation and Q&A (May 2024).pdf
Welcome to TechSoup   New Member Orientation and Q&A (May 2024).pdfWelcome to TechSoup   New Member Orientation and Q&A (May 2024).pdf
Welcome to TechSoup New Member Orientation and Q&A (May 2024).pdf
 
Home assignment II on Spectroscopy 2024 Answers.pdf
Home assignment II on Spectroscopy 2024 Answers.pdfHome assignment II on Spectroscopy 2024 Answers.pdf
Home assignment II on Spectroscopy 2024 Answers.pdf
 
"Protectable subject matters, Protection in biotechnology, Protection of othe...
"Protectable subject matters, Protection in biotechnology, Protection of othe..."Protectable subject matters, Protection in biotechnology, Protection of othe...
"Protectable subject matters, Protection in biotechnology, Protection of othe...
 
Palestine last event orientationfvgnh .pptx
Palestine last event orientationfvgnh .pptxPalestine last event orientationfvgnh .pptx
Palestine last event orientationfvgnh .pptx
 
Introduction to AI for Nonprofits with Tapp Network
Introduction to AI for Nonprofits with Tapp NetworkIntroduction to AI for Nonprofits with Tapp Network
Introduction to AI for Nonprofits with Tapp Network
 
The Roman Empire A Historical Colossus.pdf
The Roman Empire A Historical Colossus.pdfThe Roman Empire A Historical Colossus.pdf
The Roman Empire A Historical Colossus.pdf
 
Sha'Carri Richardson Presentation 202345
Sha'Carri Richardson Presentation 202345Sha'Carri Richardson Presentation 202345
Sha'Carri Richardson Presentation 202345
 
Instructions for Submissions thorugh G- Classroom.pptx
Instructions for Submissions thorugh G- Classroom.pptxInstructions for Submissions thorugh G- Classroom.pptx
Instructions for Submissions thorugh G- Classroom.pptx
 
Chapter 3 - Islamic Banking Products and Services.pptx
Chapter 3 - Islamic Banking Products and Services.pptxChapter 3 - Islamic Banking Products and Services.pptx
Chapter 3 - Islamic Banking Products and Services.pptx
 
678020731-Sumas-y-Restas-Para-Colorear.pdf
678020731-Sumas-y-Restas-Para-Colorear.pdf678020731-Sumas-y-Restas-Para-Colorear.pdf
678020731-Sumas-y-Restas-Para-Colorear.pdf
 
A Strategic Approach: GenAI in Education
A Strategic Approach: GenAI in EducationA Strategic Approach: GenAI in Education
A Strategic Approach: GenAI in Education
 
The basics of sentences session 5pptx.pptx
The basics of sentences session 5pptx.pptxThe basics of sentences session 5pptx.pptx
The basics of sentences session 5pptx.pptx
 
Honest Reviews of Tim Han LMA Course Program.pptx
Honest Reviews of Tim Han LMA Course Program.pptxHonest Reviews of Tim Han LMA Course Program.pptx
Honest Reviews of Tim Han LMA Course Program.pptx
 
special B.ed 2nd year old paper_20240531.pdf
special B.ed 2nd year old paper_20240531.pdfspecial B.ed 2nd year old paper_20240531.pdf
special B.ed 2nd year old paper_20240531.pdf
 
The geography of Taylor Swift - some ideas
The geography of Taylor Swift - some ideasThe geography of Taylor Swift - some ideas
The geography of Taylor Swift - some ideas
 
Phrasal Verbs.XXXXXXXXXXXXXXXXXXXXXXXXXX
Phrasal Verbs.XXXXXXXXXXXXXXXXXXXXXXXXXXPhrasal Verbs.XXXXXXXXXXXXXXXXXXXXXXXXXX
Phrasal Verbs.XXXXXXXXXXXXXXXXXXXXXXXXXX
 
How libraries can support authors with open access requirements for UKRI fund...
How libraries can support authors with open access requirements for UKRI fund...How libraries can support authors with open access requirements for UKRI fund...
How libraries can support authors with open access requirements for UKRI fund...
 
Mule 4.6 & Java 17 Upgrade | MuleSoft Mysore Meetup #46
Mule 4.6 & Java 17 Upgrade | MuleSoft Mysore Meetup #46Mule 4.6 & Java 17 Upgrade | MuleSoft Mysore Meetup #46
Mule 4.6 & Java 17 Upgrade | MuleSoft Mysore Meetup #46
 

ICT....(Muskan Rasool)

  • 1.
  • 5. INTRODUCTION GROUP LEADER: MUSKAN RASOOLK MEMBERS: 1. NAMRA 2. SHAWANA 3. HABIBA 4. ROMAISA 5. AILAH 6. HAMNA 7. JAVERIA 8. MUQADDAS
  • 7. CONTENTS WORD PROCESSING MUSKAN DATA MANAGEMENT ROMAISA INTERNET NAMRA & HAMNA INTERNET SERVICES NAMRA BROWSERS JAVERIA SEARCHING THE WEB AILAH RISKS OF ICT HABIBA & SHAWANA ELECTRONIC BANKING MUQADDAS FOR YOUR INFORMATION JAVERIA INTERESTING INFORMATION MUQADDAS
  • 8. WORD PROCESSING • Released in 1979 by Micropro International, WordStar was the first commercially successful word processing software program produced for microcomputers and the best selling software program of the early eighties. • A word processor is a computer program or device that provides for input, editing, formatting and output of text, often plus other features. • Word processing software is used to manipulate a text document, such as a resume or a report. • You typically enter text by typing, and the software provides tools for copying, deleting and various types of formatting.
  • 9.
  • 10.
  • 11. DATA MANAGEMENT Data management is the practice of collecting ,organizing and maintaining data processes and store them in computer for future use to meet ongoing information life cycle needs. IMPORTANCE: • The educational institutions , libraries , hospitals and industries store the concerned information. • Additions and deletions can be made in the data according to the requirement, which help in the improvement of the management of the institutions. • In big stores, optical scanners are used which reads codes by reflecting light from the black and white lines of a bar code.
  • 12.  It keeps a centralized record on a computer system that tracks products, prices, and stock levels. we can change prices as often as we like, without having to put new price tags on all boxes.  We can instantly see when stock levels of certain items are running low.  Because bar code technology is so accurate,we can be reasonably confident that any items that are missing (and don't appear to have been sold) have probably been stolen.
  • 13.
  • 14. ELECTRONIC BANKING • Now-a-days, home banking is operating on telephones. You can find your bank balance from the bank on phone, can pay all kinds of bills and transfer your funds by pressing a key of your personnel identification, send you all required information. • ATM machines help you draw money at any time you want.
  • 15. INTERNET • When many computers were connected with each other with the purpose of communication internet was formed. • It is a global computer network providing a variety of information and communication facilities, consisting of interconnected networks using standardized communication protocols. • There is hardly any country of the world where internet is not available.
  • 16. • The Internet, sometimes called simply "the Net," is a worldwide system of computer networks - a network of networks in which users at any one computer can, if they have permission, get information from any other computer (and sometimes talk directly to users at other computers). • Today, the Internet is a public, cooperative and self-sustaining facility accessible to hundreds of millions of people worldwide. • Like a telephone system , any computer of any city can establish a connection with any other computer of any other
  • 17. INTERNET SERVICES The main devices used on the internet include: WEB BROWSING: • This function allows users to view web pages using a web browser. E-MAIL: • It allows people to send and receive text messages.
  • 18. BROWSERS • A web browser, or simply "browser," is an application used to access and view websites. • It allows a user to locate, access, and display web pages. • Common web browsers include Microsoft Internet Explorer, Google Chrome, Mozilla Firefox, and Apple Safari.
  • 19.
  • 20. SEARCHING THE WEB • We can search anything through search engines. • The procedure of searching the web in Google is as under :
  • 21. E-MAIL • On October 29th 1969, the first message was sent from computer to computer on ARPANET. It looked like this: It was 1971 when Ray Tomlinson invented and developed electronic mail, as we know it today, by creating ARPANET's networked email system. • E-mail is defined as the transmission of messages over communications networks. • Typically the messages are notes entered from the keyboard or electronic files stored on disk. • Email operates across computer networks, which today is primarily the Internet. • Email servers accept, forward, deliver, and store messages.
  • 22.
  • 23. ADVANTAGES FAST COMMMUNICATION: • We can send messages anywhere in the world instantly. COST FREE SERVICE: • If we have an internet access, then we can avail the free email service free of cost. SIMPLE TO USE: • After initial set up of email, it is easy to use. MORE EFFICIENT: • We can send our messages to many friends our people in one action. VERSATILE: • Pictures or other files can also be sent through e- mail.
  • 24. ADVANTAGES OF INTERNET • Internet has proved to be very beneficial to us in the following ways: i. Faster communication ii. Big source of information iii. Source of entertainment iv. Access to social media v. Access to online services vi. E- commerce vii. E - learning
  • 25. Faster communication • It is a global computer network which provides communication facilities.
  • 26. Big source of information
  • 27. E- commerce  It is the way of doing bussiness on the web.  You can order your favourite book or any other items on the line.  For instance , AMAZON.com has been selling book, music,and videos for years.  As time passes on, supermarkets and trading companies will be selling more of their goods online.
  • 28. E - learning E-Learning is learning utilizing electronic technologies to access educational curriculum outside of a traditional classroom.
  • 29. Source of entertainment • INTERNET IS A BIG SOURCE OF ENTERTAINMENT. • IT ENTERTAINS US THROUGH MOVIES ,DRAMAS ,GAMES , MUSIC ETC.
  • 30. WE CAN WATCH MOVIES, CARTOONS AND DRAMAS & USE DIFFERENT APPS.
  • 31. WE CAN PLAY GAMES AND LISTEN TO MUSIC.
  • 33.
  • 34. OVERUSE: • Overuse of computer is dangerous for health. COMPUTER CRIMES: • It is defined as any crime that is accomplished through knowledge or use of computer technology. • These are also very common now-a-days. PRIVACY: • It is illegal duplication of copyright material like books, paper , and softwares. • This issue is common on computer.
  • 35. WORD THEFT: • Theft is the most common form of crime. • Computers are used to steal money ,information and computer resources.
  • 36. HACKING: • It is an unauthorized access to computer systems of other persons. • It is an illegal activity commited on computers. • Hackers can damage some organizations by stealing their credit cards and valuable information.
  • 37.
  • 38. SECURITY • One way to reduce risk of secuirity breachers is to make sure that only authorized person have access to computer equipment. • We may be granted access to computer based on some passwords as described below: • We can use the following to secure our computer: • A KEY • AN ID WITH PHOTO • A LOCK COMBINATION • OUR VOICE PRINT OR FINGER PRINT AS PASSWORD
  • 39. Interesting Information • Internet is a global web of more than one million nets in which more they 50 million computers are operating and almost 200 million people participate through the world. • The number is increasing day by day contact can be made at any time during the day or night on internet.