SlideShare a Scribd company logo
INFORMATION
TECHNOLOGY
INTRODUCTION
Information technology (IT) is the study and use of computers or
any kind of telecommunications that store, study, transmit, send,
retrieve, and manipulate data and information. IT is a combination
of the people, software, internet, and hardware that automate and
perform core, essential tasks within an organization.
NEED OF IT
BUSINESS EDUCATION
FINANCE SECURITY
03
01
04
02
05 COMMUNICATION
BENEFITS OF IT
Increased
Data Security
Benefits
Communication
Achieving
Coordination
and Uniformity
Can Help Your
Business Save
Money
Improved
Productivity
A Wider
Talent Net
DEMERITS
Breaches in
Security
Over-Dependence
On Information
Technology
Expense of
Implementation
and Maintenance
Elimination of
Jobs
TECHNOLOGIES
Application Software
System Software
Malicious Software
Input Devices
Output Devices
Storage Devices
Internal Components
SOFTWARE
HARDWARE
IT SYSTEMS
 Cable Internet
 DSL Internet
 Satellite Internet
 WI-FI and Mobile Data
 Network Security Device
INTERNET
DATABASE
FIREWALL
EMAIL
COMPUTER
Mercury is the closest planet to
the Sun and the smallest one in
the Solar System—it’s only a bit
larger than the Moon
TELEPHONE & MOBILE
Venus has a beautiful name and
is the second planet from the
Sun. It’s terribly hot and its
atmosphere is extremely
poisonous
- HARINI
- JOTHISHA
- JEEVESH
- JAISHRUTHI
- HARI SRIRAM
- HARISH YASWANTH
THANKS

More Related Content

Similar to Information Technology

MTC FDP @ Bangalore on 02.02.2014 PPT-1
MTC FDP @ Bangalore on 02.02.2014 PPT-1MTC FDP @ Bangalore on 02.02.2014 PPT-1
MTC FDP @ Bangalore on 02.02.2014 PPT-1
Prof. Bholanath Dutta
 
Information is a valuable asset that can make or break your business.pdf
Information is a valuable asset that can make or break your business.pdfInformation is a valuable asset that can make or break your business.pdf
Information is a valuable asset that can make or break your business.pdf
ankitmobileshop235
 
It seminar isr
It seminar isrIt seminar isr
It seminar isrASNA p.a
 
INFORMATION & TECHNOLOGY.pptx
INFORMATION & TECHNOLOGY.pptxINFORMATION & TECHNOLOGY.pptx
INFORMATION & TECHNOLOGY.pptx
SushmitaSah5
 
cyber security
cyber security cyber security
cyber security
sumitbajpeyee
 
Summarize the process of constructing security training inside an orga.docx
Summarize the process of constructing security training inside an orga.docxSummarize the process of constructing security training inside an orga.docx
Summarize the process of constructing security training inside an orga.docx
esally
 
Information technology in 21th Century Classroom
Information technology in 21th Century ClassroomInformation technology in 21th Century Classroom
Information technology in 21th Century Classroom
khon Kaen University
 
Security of IOT,OT And IT.pptx
Security of IOT,OT And IT.pptxSecurity of IOT,OT And IT.pptx
Security of IOT,OT And IT.pptx
MohanPandey31
 
Network Security and Privacy in Medium Scale Businesses in Nigeria
Network Security and Privacy in Medium Scale Businesses in NigeriaNetwork Security and Privacy in Medium Scale Businesses in Nigeria
Network Security and Privacy in Medium Scale Businesses in Nigeria
INFOGAIN PUBLICATION
 
Informati̇on technology 1
Informati̇on technology 1Informati̇on technology 1
Informati̇on technology 1
Enes Bolfidan
 
vnd.openxmlformats-officedocument.presentationml.presentation&rendition=1-1.pptx
vnd.openxmlformats-officedocument.presentationml.presentation&rendition=1-1.pptxvnd.openxmlformats-officedocument.presentationml.presentation&rendition=1-1.pptx
vnd.openxmlformats-officedocument.presentationml.presentation&rendition=1-1.pptx
DipalVaria
 
information of system technology
information of system technologyinformation of system technology
information of system technology
bilal anjum
 
Causes And Consequences Of Data Leakage
Causes And Consequences Of Data LeakageCauses And Consequences Of Data Leakage
Causes And Consequences Of Data Leakage
Patty Buckley
 
Information Technology And Its Importance
Information Technology And Its ImportanceInformation Technology And Its Importance
Information Technology And Its Importance
forpalmigho
 
IoT
IoTIoT
IoT
Mphasis
 
3rd Assg. Info Systems .pdf.............
3rd Assg. Info Systems .pdf.............3rd Assg. Info Systems .pdf.............
3rd Assg. Info Systems .pdf.............
jacquesmathiasdimanc
 
Challenges and Security Issues in Future IT Infrastructure Components
Challenges and Security Issues in Future IT Infrastructure ComponentsChallenges and Security Issues in Future IT Infrastructure Components
Challenges and Security Issues in Future IT Infrastructure Components
Mubashir Ali
 
Office automation system
Office automation systemOffice automation system
Office automation system
ARUNAYESUDAS
 
The Role of IT Infrastructure Services in Enabling Remote Work Success
The Role of IT Infrastructure Services in Enabling Remote Work SuccessThe Role of IT Infrastructure Services in Enabling Remote Work Success
The Role of IT Infrastructure Services in Enabling Remote Work Success
DevLabs Global
 
ppt on securities.pptx
ppt on securities.pptxppt on securities.pptx
ppt on securities.pptx
muskaangoel15
 

Similar to Information Technology (20)

MTC FDP @ Bangalore on 02.02.2014 PPT-1
MTC FDP @ Bangalore on 02.02.2014 PPT-1MTC FDP @ Bangalore on 02.02.2014 PPT-1
MTC FDP @ Bangalore on 02.02.2014 PPT-1
 
Information is a valuable asset that can make or break your business.pdf
Information is a valuable asset that can make or break your business.pdfInformation is a valuable asset that can make or break your business.pdf
Information is a valuable asset that can make or break your business.pdf
 
It seminar isr
It seminar isrIt seminar isr
It seminar isr
 
INFORMATION & TECHNOLOGY.pptx
INFORMATION & TECHNOLOGY.pptxINFORMATION & TECHNOLOGY.pptx
INFORMATION & TECHNOLOGY.pptx
 
cyber security
cyber security cyber security
cyber security
 
Summarize the process of constructing security training inside an orga.docx
Summarize the process of constructing security training inside an orga.docxSummarize the process of constructing security training inside an orga.docx
Summarize the process of constructing security training inside an orga.docx
 
Information technology in 21th Century Classroom
Information technology in 21th Century ClassroomInformation technology in 21th Century Classroom
Information technology in 21th Century Classroom
 
Security of IOT,OT And IT.pptx
Security of IOT,OT And IT.pptxSecurity of IOT,OT And IT.pptx
Security of IOT,OT And IT.pptx
 
Network Security and Privacy in Medium Scale Businesses in Nigeria
Network Security and Privacy in Medium Scale Businesses in NigeriaNetwork Security and Privacy in Medium Scale Businesses in Nigeria
Network Security and Privacy in Medium Scale Businesses in Nigeria
 
Informati̇on technology 1
Informati̇on technology 1Informati̇on technology 1
Informati̇on technology 1
 
vnd.openxmlformats-officedocument.presentationml.presentation&rendition=1-1.pptx
vnd.openxmlformats-officedocument.presentationml.presentation&rendition=1-1.pptxvnd.openxmlformats-officedocument.presentationml.presentation&rendition=1-1.pptx
vnd.openxmlformats-officedocument.presentationml.presentation&rendition=1-1.pptx
 
information of system technology
information of system technologyinformation of system technology
information of system technology
 
Causes And Consequences Of Data Leakage
Causes And Consequences Of Data LeakageCauses And Consequences Of Data Leakage
Causes And Consequences Of Data Leakage
 
Information Technology And Its Importance
Information Technology And Its ImportanceInformation Technology And Its Importance
Information Technology And Its Importance
 
IoT
IoTIoT
IoT
 
3rd Assg. Info Systems .pdf.............
3rd Assg. Info Systems .pdf.............3rd Assg. Info Systems .pdf.............
3rd Assg. Info Systems .pdf.............
 
Challenges and Security Issues in Future IT Infrastructure Components
Challenges and Security Issues in Future IT Infrastructure ComponentsChallenges and Security Issues in Future IT Infrastructure Components
Challenges and Security Issues in Future IT Infrastructure Components
 
Office automation system
Office automation systemOffice automation system
Office automation system
 
The Role of IT Infrastructure Services in Enabling Remote Work Success
The Role of IT Infrastructure Services in Enabling Remote Work SuccessThe Role of IT Infrastructure Services in Enabling Remote Work Success
The Role of IT Infrastructure Services in Enabling Remote Work Success
 
ppt on securities.pptx
ppt on securities.pptxppt on securities.pptx
ppt on securities.pptx
 

Recently uploaded

Advantages and Disadvantages of CMS from an SEO Perspective
Advantages and Disadvantages of CMS from an SEO PerspectiveAdvantages and Disadvantages of CMS from an SEO Perspective
Advantages and Disadvantages of CMS from an SEO Perspective
Krisztián Száraz
 
Natural birth techniques - Mrs.Akanksha Trivedi Rama University
Natural birth techniques - Mrs.Akanksha Trivedi Rama UniversityNatural birth techniques - Mrs.Akanksha Trivedi Rama University
Natural birth techniques - Mrs.Akanksha Trivedi Rama University
Akanksha trivedi rama nursing college kanpur.
 
Lapbook sobre os Regimes Totalitários.pdf
Lapbook sobre os Regimes Totalitários.pdfLapbook sobre os Regimes Totalitários.pdf
Lapbook sobre os Regimes Totalitários.pdf
Jean Carlos Nunes Paixão
 
Chapter 4 - Islamic Financial Institutions in Malaysia.pptx
Chapter 4 - Islamic Financial Institutions in Malaysia.pptxChapter 4 - Islamic Financial Institutions in Malaysia.pptx
Chapter 4 - Islamic Financial Institutions in Malaysia.pptx
Mohd Adib Abd Muin, Senior Lecturer at Universiti Utara Malaysia
 
Mule 4.6 & Java 17 Upgrade | MuleSoft Mysore Meetup #46
Mule 4.6 & Java 17 Upgrade | MuleSoft Mysore Meetup #46Mule 4.6 & Java 17 Upgrade | MuleSoft Mysore Meetup #46
Mule 4.6 & Java 17 Upgrade | MuleSoft Mysore Meetup #46
MysoreMuleSoftMeetup
 
Unit 2- Research Aptitude (UGC NET Paper I).pdf
Unit 2- Research Aptitude (UGC NET Paper I).pdfUnit 2- Research Aptitude (UGC NET Paper I).pdf
Unit 2- Research Aptitude (UGC NET Paper I).pdf
Thiyagu K
 
Azure Interview Questions and Answers PDF By ScholarHat
Azure Interview Questions and Answers PDF By ScholarHatAzure Interview Questions and Answers PDF By ScholarHat
Azure Interview Questions and Answers PDF By ScholarHat
Scholarhat
 
Unit 8 - Information and Communication Technology (Paper I).pdf
Unit 8 - Information and Communication Technology (Paper I).pdfUnit 8 - Information and Communication Technology (Paper I).pdf
Unit 8 - Information and Communication Technology (Paper I).pdf
Thiyagu K
 
Best Digital Marketing Institute In NOIDA
Best Digital Marketing Institute In NOIDABest Digital Marketing Institute In NOIDA
Best Digital Marketing Institute In NOIDA
deeptiverma2406
 
Model Attribute Check Company Auto Property
Model Attribute  Check Company Auto PropertyModel Attribute  Check Company Auto Property
Model Attribute Check Company Auto Property
Celine George
 
Thesis Statement for students diagnonsed withADHD.ppt
Thesis Statement for students diagnonsed withADHD.pptThesis Statement for students diagnonsed withADHD.ppt
Thesis Statement for students diagnonsed withADHD.ppt
EverAndrsGuerraGuerr
 
The Challenger.pdf DNHS Official Publication
The Challenger.pdf DNHS Official PublicationThe Challenger.pdf DNHS Official Publication
The Challenger.pdf DNHS Official Publication
Delapenabediema
 
JEE1_This_section_contains_FOUR_ questions
JEE1_This_section_contains_FOUR_ questionsJEE1_This_section_contains_FOUR_ questions
JEE1_This_section_contains_FOUR_ questions
ShivajiThube2
 
1.4 modern child centered education - mahatma gandhi-2.pptx
1.4 modern child centered education - mahatma gandhi-2.pptx1.4 modern child centered education - mahatma gandhi-2.pptx
1.4 modern child centered education - mahatma gandhi-2.pptx
JosvitaDsouza2
 
How libraries can support authors with open access requirements for UKRI fund...
How libraries can support authors with open access requirements for UKRI fund...How libraries can support authors with open access requirements for UKRI fund...
How libraries can support authors with open access requirements for UKRI fund...
Jisc
 
Operation Blue Star - Saka Neela Tara
Operation Blue Star   -  Saka Neela TaraOperation Blue Star   -  Saka Neela Tara
Operation Blue Star - Saka Neela Tara
Balvir Singh
 
Acetabularia Information For Class 9 .docx
Acetabularia Information For Class 9  .docxAcetabularia Information For Class 9  .docx
Acetabularia Information For Class 9 .docx
vaibhavrinwa19
 
The basics of sentences session 5pptx.pptx
The basics of sentences session 5pptx.pptxThe basics of sentences session 5pptx.pptx
The basics of sentences session 5pptx.pptx
heathfieldcps1
 
A Survey of Techniques for Maximizing LLM Performance.pptx
A Survey of Techniques for Maximizing LLM Performance.pptxA Survey of Techniques for Maximizing LLM Performance.pptx
A Survey of Techniques for Maximizing LLM Performance.pptx
thanhdowork
 
"Protectable subject matters, Protection in biotechnology, Protection of othe...
"Protectable subject matters, Protection in biotechnology, Protection of othe..."Protectable subject matters, Protection in biotechnology, Protection of othe...
"Protectable subject matters, Protection in biotechnology, Protection of othe...
SACHIN R KONDAGURI
 

Recently uploaded (20)

Advantages and Disadvantages of CMS from an SEO Perspective
Advantages and Disadvantages of CMS from an SEO PerspectiveAdvantages and Disadvantages of CMS from an SEO Perspective
Advantages and Disadvantages of CMS from an SEO Perspective
 
Natural birth techniques - Mrs.Akanksha Trivedi Rama University
Natural birth techniques - Mrs.Akanksha Trivedi Rama UniversityNatural birth techniques - Mrs.Akanksha Trivedi Rama University
Natural birth techniques - Mrs.Akanksha Trivedi Rama University
 
Lapbook sobre os Regimes Totalitários.pdf
Lapbook sobre os Regimes Totalitários.pdfLapbook sobre os Regimes Totalitários.pdf
Lapbook sobre os Regimes Totalitários.pdf
 
Chapter 4 - Islamic Financial Institutions in Malaysia.pptx
Chapter 4 - Islamic Financial Institutions in Malaysia.pptxChapter 4 - Islamic Financial Institutions in Malaysia.pptx
Chapter 4 - Islamic Financial Institutions in Malaysia.pptx
 
Mule 4.6 & Java 17 Upgrade | MuleSoft Mysore Meetup #46
Mule 4.6 & Java 17 Upgrade | MuleSoft Mysore Meetup #46Mule 4.6 & Java 17 Upgrade | MuleSoft Mysore Meetup #46
Mule 4.6 & Java 17 Upgrade | MuleSoft Mysore Meetup #46
 
Unit 2- Research Aptitude (UGC NET Paper I).pdf
Unit 2- Research Aptitude (UGC NET Paper I).pdfUnit 2- Research Aptitude (UGC NET Paper I).pdf
Unit 2- Research Aptitude (UGC NET Paper I).pdf
 
Azure Interview Questions and Answers PDF By ScholarHat
Azure Interview Questions and Answers PDF By ScholarHatAzure Interview Questions and Answers PDF By ScholarHat
Azure Interview Questions and Answers PDF By ScholarHat
 
Unit 8 - Information and Communication Technology (Paper I).pdf
Unit 8 - Information and Communication Technology (Paper I).pdfUnit 8 - Information and Communication Technology (Paper I).pdf
Unit 8 - Information and Communication Technology (Paper I).pdf
 
Best Digital Marketing Institute In NOIDA
Best Digital Marketing Institute In NOIDABest Digital Marketing Institute In NOIDA
Best Digital Marketing Institute In NOIDA
 
Model Attribute Check Company Auto Property
Model Attribute  Check Company Auto PropertyModel Attribute  Check Company Auto Property
Model Attribute Check Company Auto Property
 
Thesis Statement for students diagnonsed withADHD.ppt
Thesis Statement for students diagnonsed withADHD.pptThesis Statement for students diagnonsed withADHD.ppt
Thesis Statement for students diagnonsed withADHD.ppt
 
The Challenger.pdf DNHS Official Publication
The Challenger.pdf DNHS Official PublicationThe Challenger.pdf DNHS Official Publication
The Challenger.pdf DNHS Official Publication
 
JEE1_This_section_contains_FOUR_ questions
JEE1_This_section_contains_FOUR_ questionsJEE1_This_section_contains_FOUR_ questions
JEE1_This_section_contains_FOUR_ questions
 
1.4 modern child centered education - mahatma gandhi-2.pptx
1.4 modern child centered education - mahatma gandhi-2.pptx1.4 modern child centered education - mahatma gandhi-2.pptx
1.4 modern child centered education - mahatma gandhi-2.pptx
 
How libraries can support authors with open access requirements for UKRI fund...
How libraries can support authors with open access requirements for UKRI fund...How libraries can support authors with open access requirements for UKRI fund...
How libraries can support authors with open access requirements for UKRI fund...
 
Operation Blue Star - Saka Neela Tara
Operation Blue Star   -  Saka Neela TaraOperation Blue Star   -  Saka Neela Tara
Operation Blue Star - Saka Neela Tara
 
Acetabularia Information For Class 9 .docx
Acetabularia Information For Class 9  .docxAcetabularia Information For Class 9  .docx
Acetabularia Information For Class 9 .docx
 
The basics of sentences session 5pptx.pptx
The basics of sentences session 5pptx.pptxThe basics of sentences session 5pptx.pptx
The basics of sentences session 5pptx.pptx
 
A Survey of Techniques for Maximizing LLM Performance.pptx
A Survey of Techniques for Maximizing LLM Performance.pptxA Survey of Techniques for Maximizing LLM Performance.pptx
A Survey of Techniques for Maximizing LLM Performance.pptx
 
"Protectable subject matters, Protection in biotechnology, Protection of othe...
"Protectable subject matters, Protection in biotechnology, Protection of othe..."Protectable subject matters, Protection in biotechnology, Protection of othe...
"Protectable subject matters, Protection in biotechnology, Protection of othe...
 

Information Technology