SlideShare a Scribd company logo
The range and scope ofThe range and scope of
computer applicationscomputer applications
1.1. IntroductionIntroduction
2.2. Software and hardwareSoftware and hardware
3.3. Types of applicationTypes of application
4.4. Expert systemsExpert systems
IntroductionIntroduction
 What is Information Technology???What is Information Technology???
 What is a computer???What is a computer???
 Why do we study IT?Why do we study IT?
 Why do we need a computer??Why do we need a computer??
 All computer systems havve to haveAll computer systems havve to have
following basic parts:following basic parts:
1. Input1. Input
2. Output2. Output
3. Processing3. Processing
4. Storage4. Storage
Whenever u see a computer try to think inWhenever u see a computer try to think in
terms of these four parts...terms of these four parts...
Try to think of data that is used and whatTry to think of data that is used and what
the system needs in order to do what it isthe system needs in order to do what it is
meant to do.meant to do.
Software and hardwareSoftware and hardware
 SoftwareSoftware  ComputerComputer instructionsinstructions oror datadata..
 Written coded commands that tell a computer what tasksWritten coded commands that tell a computer what tasks
to perform. For example, Word, PhotoShop, Pictureto perform. For example, Word, PhotoShop, Picture
Easy, and PhotoDeluxe are software programsEasy, and PhotoDeluxe are software programs
 Anything that can beAnything that can be storedstored electronically is software.electronically is software.
 The programs and instructions which direct a computer.The programs and instructions which direct a computer.
 TheThe storagestorage devicesdevices and display devices areand display devices are hardwarehardware..
 The distinction between software and hardware isThe distinction between software and hardware is
sometimes confusing because they are so integrallysometimes confusing because they are so integrally
linked.linked.
 Clearly, when you purchase a program, you are buyingClearly, when you purchase a program, you are buying
software. But to buy the software, you need to buy thesoftware. But to buy the software, you need to buy the
diskdisk (hardware) on which the software is recorded.(hardware) on which the software is recorded.
 Software is often divided into twoSoftware is often divided into two
categories:categories:
 systems softwaresystems software :: Includes theIncludes the
operating systemoperating system and all theand all the utilitiesutilities thatthat
enable the computer to function.enable the computer to function.
 applications softwareapplications software :: IncludesIncludes
programs that do real work for users. Forprograms that do real work for users. For
example, word processors, spreadsheets,example, word processors, spreadsheets,
and database management systems falland database management systems fall
under the category of applicationsunder the category of applications
software.software.
HardwareHardware
 The physical components of a computerThe physical components of a computer
system-the computer, plotters, printers,system-the computer, plotters, printers,
terminals, digitizers, and so on.terminals, digitizers, and so on.
 The physical equipment of a computerThe physical equipment of a computer
system, including the central processingsystem, including the central processing
unit, data-storage devices, terminals andunit, data-storage devices, terminals and
printers.printers.
 Physical, tangible component of aPhysical, tangible component of a
computer.computer.
What is a network???What is a network???
What about internet???What about internet???
Do You have a modem at home???Do You have a modem at home???
For what is the modem used for???For what is the modem used for???
What is LAN and What is WAN???What is LAN and What is WAN???
 When two or more computers areWhen two or more computers are
connected to each other it is calledconnected to each other it is called
network.network.
 Internet is global network, consisting out ofInternet is global network, consisting out of
millions of computers.millions of computers.
ModemModem
 Modem is special piece of equipment thatModem is special piece of equipment that
allows computers to link to the internetallows computers to link to the internet
through the telephone system.through the telephone system.
 Short for modulator/demodulator. AShort for modulator/demodulator. A
communications device that converts onecommunications device that converts one
form of a signal to another that is suitableform of a signal to another that is suitable
for transmission over communicationfor transmission over communication
circuits, typically from digital to analog andcircuits, typically from digital to analog and
then from analog to digital.then from analog to digital.
LANLAN
 A computer network limited to the immediate area,A computer network limited to the immediate area,
usually the same building or floor of a building.usually the same building or floor of a building.
 Communications network connecting computers by wire,Communications network connecting computers by wire,
cable, or fiber optics link. Usually serves parts of ancable, or fiber optics link. Usually serves parts of an
organization located close to one another, generally inorganization located close to one another, generally in
the same building or within 2 miles of one another.the same building or within 2 miles of one another.
Allows users to share software, hardware and data.Allows users to share software, hardware and data.
 is a data network used to connect nodes that areis a data network used to connect nodes that are
geographically close, usually within the same building. Ingeographically close, usually within the same building. In
a wider view of a local area network, multiple local areaa wider view of a local area network, multiple local area
networks are interconnected in a geographically compactnetworks are interconnected in a geographically compact
area (such as a university campus), usually by attachingarea (such as a university campus), usually by attaching
the LANs to a higher-speed local backbone.the LANs to a higher-speed local backbone.
WANWAN
 A wide area network (WAN) is a geographicallyA wide area network (WAN) is a geographically
dispersed telecommunications network. Thedispersed telecommunications network. The
term distinguishes a broader telecommunicationterm distinguishes a broader telecommunication
structure from a local area network. A wide areastructure from a local area network. A wide area
network may be privately owned or rented, butnetwork may be privately owned or rented, but
the term usually connotes the inclusion of publicthe term usually connotes the inclusion of public
(shared user) networks. An intermediate form of(shared user) networks. An intermediate form of
network in terms of geography is a metropolitannetwork in terms of geography is a metropolitan
area network (MAN).area network (MAN).
 Group of computers located geographicallyGroup of computers located geographically
apart, usually belonging to a single company orapart, usually belonging to a single company or
organisation, connected together usingorganisation, connected together using
dedicated lines or by satellite to simulate a localdedicated lines or by satellite to simulate a local
network.network.
Types of applicationTypes of application
 Computers are found everywhere aroundComputers are found everywhere around
us.us.
 Of some u are even not aware of.Of some u are even not aware of.
 They range from enormously large once toThey range from enormously large once to
tiny microprocessors.tiny microprocessors.
 Micro processors are programmed to doMicro processors are programmed to do
just one thing such as control the washingjust one thing such as control the washing
machine.machine.
Expert systemsExpert systems
 Special type of computer systems that stores allSpecial type of computer systems that stores all
the knowledge of an expert in a particularthe knowledge of an expert in a particular
subject so that people can ask it questions.subject so that people can ask it questions.
 If the system can remember things and chooseIf the system can remember things and choose
better option then it is said to have artificialbetter option then it is said to have artificial
intelligence.intelligence.
 Knowledge in an expert system does not changeKnowledge in an expert system does not change
 A system with artificial intelligence is able toA system with artificial intelligence is able to
learn.learn.

More Related Content

What's hot

(Computers) تاريخ الحاسوب ومكوناته
 (Computers) تاريخ الحاسوب ومكوناته (Computers) تاريخ الحاسوب ومكوناته
(Computers) تاريخ الحاسوب ومكوناته
DrMohammed Qassim
 
COMPUTER OPERATIONS & PACKAGES NOTES & INTRODUCTION TO COMPUTERS
COMPUTER OPERATIONS & PACKAGES NOTES & INTRODUCTION TO COMPUTERSCOMPUTER OPERATIONS & PACKAGES NOTES & INTRODUCTION TO COMPUTERS
COMPUTER OPERATIONS & PACKAGES NOTES & INTRODUCTION TO COMPUTERS
Makaha Rutendo
 
Characteristics of computer
Characteristics of computerCharacteristics of computer
Characteristics of computer
PriyaU5
 
Introduction to computers
Introduction to computersIntroduction to computers
Introduction to computers
eVidhya
 
The Roles and Responsibilities of the IT Professional
The Roles and Responsibilities of the IT ProfessionalThe Roles and Responsibilities of the IT Professional
The Roles and Responsibilities of the IT Professional
Nayeem Rahman
 
Uses of computer in various fields of life
Uses of computer in various fields of lifeUses of computer in various fields of life
Uses of computer in various fields of life
Aftab Badshah
 
Introduction to Computer
Introduction to ComputerIntroduction to Computer
Introduction to Computer
Meg Grado
 
Information technology
Information technologyInformation technology
1.1 introduction toict
1.1 introduction toict1.1 introduction toict
1.1 introduction toict
Hafeezah Muhamad
 
Computer hardware component. ppt
Computer hardware component. pptComputer hardware component. ppt
Computer hardware component. pptNaveen Sihag
 
Uses of Computer
Uses of ComputerUses of Computer
Uses of Computer
Duchaene Kantuna
 
Unit 1 architecture of distributed systems
Unit 1 architecture of distributed systemsUnit 1 architecture of distributed systems
Unit 1 architecture of distributed systemskaran2190
 
Mobile Computing and its Advantages, Disadvantages and Applications
Mobile Computing and its Advantages, Disadvantages and ApplicationsMobile Computing and its Advantages, Disadvantages and Applications
Mobile Computing and its Advantages, Disadvantages and Applications
DigitalThinkerHelp
 
Unit 1 संगणक प्रणाली ( computer system ) ची ओळख
Unit 1 संगणक प्रणाली ( computer system ) ची ओळखUnit 1 संगणक प्रणाली ( computer system ) ची ओळख
Unit 1 संगणक प्रणाली ( computer system ) ची ओळख
Amol Gaikwad
 
Applications of computer
Applications of computerApplications of computer
Applications of computerhrushitpatel39
 
Application Of Computers
Application Of ComputersApplication Of Computers
Application Of Computers
LUZ PINGOL
 
Introduction of computer
Introduction of computerIntroduction of computer
Introduction of computer
Vetrivel Krishnan
 
Computer basic theory222
Computer basic theory222Computer basic theory222
Computer basic theory222
Niraj Choudhary
 

What's hot (20)

Grid computing ppt
Grid computing pptGrid computing ppt
Grid computing ppt
 
(Computers) تاريخ الحاسوب ومكوناته
 (Computers) تاريخ الحاسوب ومكوناته (Computers) تاريخ الحاسوب ومكوناته
(Computers) تاريخ الحاسوب ومكوناته
 
COMPUTER OPERATIONS & PACKAGES NOTES & INTRODUCTION TO COMPUTERS
COMPUTER OPERATIONS & PACKAGES NOTES & INTRODUCTION TO COMPUTERSCOMPUTER OPERATIONS & PACKAGES NOTES & INTRODUCTION TO COMPUTERS
COMPUTER OPERATIONS & PACKAGES NOTES & INTRODUCTION TO COMPUTERS
 
Characteristics of computer
Characteristics of computerCharacteristics of computer
Characteristics of computer
 
Introduction to computers
Introduction to computersIntroduction to computers
Introduction to computers
 
The Roles and Responsibilities of the IT Professional
The Roles and Responsibilities of the IT ProfessionalThe Roles and Responsibilities of the IT Professional
The Roles and Responsibilities of the IT Professional
 
Uses of computer in various fields of life
Uses of computer in various fields of lifeUses of computer in various fields of life
Uses of computer in various fields of life
 
Introduction to Computer
Introduction to ComputerIntroduction to Computer
Introduction to Computer
 
Information technology
Information technologyInformation technology
Information technology
 
1.1 introduction toict
1.1 introduction toict1.1 introduction toict
1.1 introduction toict
 
Computer hardware component. ppt
Computer hardware component. pptComputer hardware component. ppt
Computer hardware component. ppt
 
Uses of Computer
Uses of ComputerUses of Computer
Uses of Computer
 
Unit 1 architecture of distributed systems
Unit 1 architecture of distributed systemsUnit 1 architecture of distributed systems
Unit 1 architecture of distributed systems
 
Mobile Computing and its Advantages, Disadvantages and Applications
Mobile Computing and its Advantages, Disadvantages and ApplicationsMobile Computing and its Advantages, Disadvantages and Applications
Mobile Computing and its Advantages, Disadvantages and Applications
 
Unit 1 संगणक प्रणाली ( computer system ) ची ओळख
Unit 1 संगणक प्रणाली ( computer system ) ची ओळखUnit 1 संगणक प्रणाली ( computer system ) ची ओळख
Unit 1 संगणक प्रणाली ( computer system ) ची ओळख
 
Applications of computer
Applications of computerApplications of computer
Applications of computer
 
Characteristics of computer
Characteristics of computerCharacteristics of computer
Characteristics of computer
 
Application Of Computers
Application Of ComputersApplication Of Computers
Application Of Computers
 
Introduction of computer
Introduction of computerIntroduction of computer
Introduction of computer
 
Computer basic theory222
Computer basic theory222Computer basic theory222
Computer basic theory222
 

Viewers also liked

Output device presentation
Output device presentationOutput device presentation
Output device presentation
Suraj Neupane
 
Hardware and input devices
Hardware and input devicesHardware and input devices
Hardware and input devices
Mirza Ćutuk
 
Types of processing
Types of processingTypes of processing
Types of processing
Mirza Ćutuk
 
Computer models and simulations
Computer models and simulationsComputer models and simulations
Computer models and simulations
Mirza Ćutuk
 
Data
DataData
Application Software
Application SoftwareApplication Software
Application Software
py7rjs
 
Types of application software
Types of application softwareTypes of application software
Types of application softwareJesus Obenita Jr.
 
7 application software categories
7 application software categories7 application software categories
7 application software categoriesMrQaz996
 
System software and Application software
System software and Application softwareSystem software and Application software
System software and Application software
baabtra.com - No. 1 supplier of quality freshers
 
Application software
Application softwareApplication software
Application softwareshalivale
 

Viewers also liked (13)

Output device presentation
Output device presentationOutput device presentation
Output device presentation
 
Hardware and input devices
Hardware and input devicesHardware and input devices
Hardware and input devices
 
Output Device
Output DeviceOutput Device
Output Device
 
Types of processing
Types of processingTypes of processing
Types of processing
 
Computer models and simulations
Computer models and simulationsComputer models and simulations
Computer models and simulations
 
Data
DataData
Data
 
Presentation on output device
Presentation on output devicePresentation on output device
Presentation on output device
 
Application Software
Application SoftwareApplication Software
Application Software
 
Types of application software
Types of application softwareTypes of application software
Types of application software
 
7 application software categories
7 application software categories7 application software categories
7 application software categories
 
Application software
Application softwareApplication software
Application software
 
System software and Application software
System software and Application softwareSystem software and Application software
System software and Application software
 
Application software
Application softwareApplication software
Application software
 

Similar to The range and scope of computer applications

Distributed systems
Distributed systemsDistributed systems
Distributed systems
sree kanth
 
Firewall presentation m. emin özgünsür
Firewall presentation   m. emin özgünsürFirewall presentation   m. emin özgünsür
Firewall presentation m. emin özgünsüremin_oz
 
The Media Access Control Address
The Media Access Control AddressThe Media Access Control Address
The Media Access Control Address
Angie Lee
 
top LLB university in Delhi NCR.pdf
top LLB university in Delhi NCR.pdftop LLB university in Delhi NCR.pdf
top LLB university in Delhi NCR.pdf
Opjsuniversity1
 
Chapter 03 pertemuan 4- donpas- concept and management
Chapter 03  pertemuan 4- donpas- concept and managementChapter 03  pertemuan 4- donpas- concept and management
Chapter 03 pertemuan 4- donpas- concept and management
UNIVERSITAS TEKNOKRAT INDONESIA
 
Computer
ComputerComputer
Computer
surbhiverma123
 
Embedded systems
Embedded systemsEmbedded systems
Embedded systems
Minal21
 
embeddedsystemsppt-170506195901.pdf
embeddedsystemsppt-170506195901.pdfembeddedsystemsppt-170506195901.pdf
embeddedsystemsppt-170506195901.pdf
Ashwin180668
 
Embedded systems ppt
Embedded systems pptEmbedded systems ppt
Embedded systems ppt
Bhavana Sharma
 
Connecting Hardware Peripherals Level 1 Ver 2 - Copy.pdf
Connecting Hardware Peripherals Level 1 Ver 2 - Copy.pdfConnecting Hardware Peripherals Level 1 Ver 2 - Copy.pdf
Connecting Hardware Peripherals Level 1 Ver 2 - Copy.pdf
EYOHAICTMEDIA
 
INFORMATION TECHNOLOGY.ppt
INFORMATION TECHNOLOGY.pptINFORMATION TECHNOLOGY.ppt
INFORMATION TECHNOLOGY.ppt
adnanwaris550
 
Embedded systems software
Embedded systems softwareEmbedded systems software
Embedded systems software
alanradley
 
SAP BASIS ONLINE TRAINING MATERIAL by Keylabs
SAP BASIS ONLINE TRAINING MATERIAL by KeylabsSAP BASIS ONLINE TRAINING MATERIAL by Keylabs
SAP BASIS ONLINE TRAINING MATERIAL by Keylabs
keylabstraining
 
1.sap basis material_keylabs1
1.sap basis material_keylabs11.sap basis material_keylabs1
1.sap basis material_keylabs1chipanda
 
Nidhi Bulchandani_IT SKILLS PPT.pptx
Nidhi Bulchandani_IT SKILLS PPT.pptxNidhi Bulchandani_IT SKILLS PPT.pptx
Nidhi Bulchandani_IT SKILLS PPT.pptx
NidhiBulchandani1
 
1. What is IT infrastructure and what are its components2.What ar.pdf
1. What is IT infrastructure and what are its components2.What ar.pdf1. What is IT infrastructure and what are its components2.What ar.pdf
1. What is IT infrastructure and what are its components2.What ar.pdf
expressionnoveltiesk
 
Module 7 (sniffers)
Module 7 (sniffers)Module 7 (sniffers)
Module 7 (sniffers)
Wail Hassan
 

Similar to The range and scope of computer applications (20)

Wireless lan
Wireless lanWireless lan
Wireless lan
 
Distributed systems
Distributed systemsDistributed systems
Distributed systems
 
Modules1
Modules1Modules1
Modules1
 
Firewall presentation m. emin özgünsür
Firewall presentation   m. emin özgünsürFirewall presentation   m. emin özgünsür
Firewall presentation m. emin özgünsür
 
The Media Access Control Address
The Media Access Control AddressThe Media Access Control Address
The Media Access Control Address
 
top LLB university in Delhi NCR.pdf
top LLB university in Delhi NCR.pdftop LLB university in Delhi NCR.pdf
top LLB university in Delhi NCR.pdf
 
Chapter 03 pertemuan 4- donpas- concept and management
Chapter 03  pertemuan 4- donpas- concept and managementChapter 03  pertemuan 4- donpas- concept and management
Chapter 03 pertemuan 4- donpas- concept and management
 
Ch02
Ch02Ch02
Ch02
 
Computer
ComputerComputer
Computer
 
Embedded systems
Embedded systemsEmbedded systems
Embedded systems
 
embeddedsystemsppt-170506195901.pdf
embeddedsystemsppt-170506195901.pdfembeddedsystemsppt-170506195901.pdf
embeddedsystemsppt-170506195901.pdf
 
Embedded systems ppt
Embedded systems pptEmbedded systems ppt
Embedded systems ppt
 
Connecting Hardware Peripherals Level 1 Ver 2 - Copy.pdf
Connecting Hardware Peripherals Level 1 Ver 2 - Copy.pdfConnecting Hardware Peripherals Level 1 Ver 2 - Copy.pdf
Connecting Hardware Peripherals Level 1 Ver 2 - Copy.pdf
 
INFORMATION TECHNOLOGY.ppt
INFORMATION TECHNOLOGY.pptINFORMATION TECHNOLOGY.ppt
INFORMATION TECHNOLOGY.ppt
 
Embedded systems software
Embedded systems softwareEmbedded systems software
Embedded systems software
 
SAP BASIS ONLINE TRAINING MATERIAL by Keylabs
SAP BASIS ONLINE TRAINING MATERIAL by KeylabsSAP BASIS ONLINE TRAINING MATERIAL by Keylabs
SAP BASIS ONLINE TRAINING MATERIAL by Keylabs
 
1.sap basis material_keylabs1
1.sap basis material_keylabs11.sap basis material_keylabs1
1.sap basis material_keylabs1
 
Nidhi Bulchandani_IT SKILLS PPT.pptx
Nidhi Bulchandani_IT SKILLS PPT.pptxNidhi Bulchandani_IT SKILLS PPT.pptx
Nidhi Bulchandani_IT SKILLS PPT.pptx
 
1. What is IT infrastructure and what are its components2.What ar.pdf
1. What is IT infrastructure and what are its components2.What ar.pdf1. What is IT infrastructure and what are its components2.What ar.pdf
1. What is IT infrastructure and what are its components2.What ar.pdf
 
Module 7 (sniffers)
Module 7 (sniffers)Module 7 (sniffers)
Module 7 (sniffers)
 

More from Mirza Ćutuk

Anthony giddens sociology_5th_edition__
Anthony giddens sociology_5th_edition__Anthony giddens sociology_5th_edition__
Anthony giddens sociology_5th_edition__Mirza Ćutuk
 
Effects of using IT
Effects of using ITEffects of using IT
Effects of using IT
Mirza Ćutuk
 
LAN Network types
LAN Network typesLAN Network types
LAN Network types
Mirza Ćutuk
 
Expert systems
Expert systems Expert systems
Expert systems
Mirza Ćutuk
 
Backing storage media
Backing storage mediaBacking storage media
Backing storage media
Mirza Ćutuk
 
Online banking
Online bankingOnline banking
Online banking
Mirza Ćutuk
 

More from Mirza Ćutuk (6)

Anthony giddens sociology_5th_edition__
Anthony giddens sociology_5th_edition__Anthony giddens sociology_5th_edition__
Anthony giddens sociology_5th_edition__
 
Effects of using IT
Effects of using ITEffects of using IT
Effects of using IT
 
LAN Network types
LAN Network typesLAN Network types
LAN Network types
 
Expert systems
Expert systems Expert systems
Expert systems
 
Backing storage media
Backing storage mediaBacking storage media
Backing storage media
 
Online banking
Online bankingOnline banking
Online banking
 

Recently uploaded

SAP Sapphire 2024 - ASUG301 building better apps with SAP Fiori.pdf
SAP Sapphire 2024 - ASUG301 building better apps with SAP Fiori.pdfSAP Sapphire 2024 - ASUG301 building better apps with SAP Fiori.pdf
SAP Sapphire 2024 - ASUG301 building better apps with SAP Fiori.pdf
Peter Spielvogel
 
The Future of Platform Engineering
The Future of Platform EngineeringThe Future of Platform Engineering
The Future of Platform Engineering
Jemma Hussein Allen
 
UiPath Test Automation using UiPath Test Suite series, part 5
UiPath Test Automation using UiPath Test Suite series, part 5UiPath Test Automation using UiPath Test Suite series, part 5
UiPath Test Automation using UiPath Test Suite series, part 5
DianaGray10
 
UiPath Test Automation using UiPath Test Suite series, part 4
UiPath Test Automation using UiPath Test Suite series, part 4UiPath Test Automation using UiPath Test Suite series, part 4
UiPath Test Automation using UiPath Test Suite series, part 4
DianaGray10
 
Communications Mining Series - Zero to Hero - Session 1
Communications Mining Series - Zero to Hero - Session 1Communications Mining Series - Zero to Hero - Session 1
Communications Mining Series - Zero to Hero - Session 1
DianaGray10
 
GraphSummit Singapore | Graphing Success: Revolutionising Organisational Stru...
GraphSummit Singapore | Graphing Success: Revolutionising Organisational Stru...GraphSummit Singapore | Graphing Success: Revolutionising Organisational Stru...
GraphSummit Singapore | Graphing Success: Revolutionising Organisational Stru...
Neo4j
 
Why You Should Replace Windows 11 with Nitrux Linux 3.5.0 for enhanced perfor...
Why You Should Replace Windows 11 with Nitrux Linux 3.5.0 for enhanced perfor...Why You Should Replace Windows 11 with Nitrux Linux 3.5.0 for enhanced perfor...
Why You Should Replace Windows 11 with Nitrux Linux 3.5.0 for enhanced perfor...
SOFTTECHHUB
 
Secstrike : Reverse Engineering & Pwnable tools for CTF.pptx
Secstrike : Reverse Engineering & Pwnable tools for CTF.pptxSecstrike : Reverse Engineering & Pwnable tools for CTF.pptx
Secstrike : Reverse Engineering & Pwnable tools for CTF.pptx
nkrafacyberclub
 
Transcript: Selling digital books in 2024: Insights from industry leaders - T...
Transcript: Selling digital books in 2024: Insights from industry leaders - T...Transcript: Selling digital books in 2024: Insights from industry leaders - T...
Transcript: Selling digital books in 2024: Insights from industry leaders - T...
BookNet Canada
 
Encryption in Microsoft 365 - ExpertsLive Netherlands 2024
Encryption in Microsoft 365 - ExpertsLive Netherlands 2024Encryption in Microsoft 365 - ExpertsLive Netherlands 2024
Encryption in Microsoft 365 - ExpertsLive Netherlands 2024
Albert Hoitingh
 
GraphSummit Singapore | The Art of the Possible with Graph - Q2 2024
GraphSummit Singapore | The Art of the  Possible with Graph - Q2 2024GraphSummit Singapore | The Art of the  Possible with Graph - Q2 2024
GraphSummit Singapore | The Art of the Possible with Graph - Q2 2024
Neo4j
 
Microsoft - Power Platform_G.Aspiotis.pdf
Microsoft - Power Platform_G.Aspiotis.pdfMicrosoft - Power Platform_G.Aspiotis.pdf
Microsoft - Power Platform_G.Aspiotis.pdf
Uni Systems S.M.S.A.
 
Observability Concepts EVERY Developer Should Know -- DeveloperWeek Europe.pdf
Observability Concepts EVERY Developer Should Know -- DeveloperWeek Europe.pdfObservability Concepts EVERY Developer Should Know -- DeveloperWeek Europe.pdf
Observability Concepts EVERY Developer Should Know -- DeveloperWeek Europe.pdf
Paige Cruz
 
Essentials of Automations: The Art of Triggers and Actions in FME
Essentials of Automations: The Art of Triggers and Actions in FMEEssentials of Automations: The Art of Triggers and Actions in FME
Essentials of Automations: The Art of Triggers and Actions in FME
Safe Software
 
Monitoring Java Application Security with JDK Tools and JFR Events
Monitoring Java Application Security with JDK Tools and JFR EventsMonitoring Java Application Security with JDK Tools and JFR Events
Monitoring Java Application Security with JDK Tools and JFR Events
Ana-Maria Mihalceanu
 
Video Streaming: Then, Now, and in the Future
Video Streaming: Then, Now, and in the FutureVideo Streaming: Then, Now, and in the Future
Video Streaming: Then, Now, and in the Future
Alpen-Adria-Universität
 
Introduction to CHERI technology - Cybersecurity
Introduction to CHERI technology - CybersecurityIntroduction to CHERI technology - Cybersecurity
Introduction to CHERI technology - Cybersecurity
mikeeftimakis1
 
Smart TV Buyer Insights Survey 2024 by 91mobiles.pdf
Smart TV Buyer Insights Survey 2024 by 91mobiles.pdfSmart TV Buyer Insights Survey 2024 by 91mobiles.pdf
Smart TV Buyer Insights Survey 2024 by 91mobiles.pdf
91mobiles
 
National Security Agency - NSA mobile device best practices
National Security Agency - NSA mobile device best practicesNational Security Agency - NSA mobile device best practices
National Security Agency - NSA mobile device best practices
Quotidiano Piemontese
 
LF Energy Webinar: Electrical Grid Modelling and Simulation Through PowSyBl -...
LF Energy Webinar: Electrical Grid Modelling and Simulation Through PowSyBl -...LF Energy Webinar: Electrical Grid Modelling and Simulation Through PowSyBl -...
LF Energy Webinar: Electrical Grid Modelling and Simulation Through PowSyBl -...
DanBrown980551
 

Recently uploaded (20)

SAP Sapphire 2024 - ASUG301 building better apps with SAP Fiori.pdf
SAP Sapphire 2024 - ASUG301 building better apps with SAP Fiori.pdfSAP Sapphire 2024 - ASUG301 building better apps with SAP Fiori.pdf
SAP Sapphire 2024 - ASUG301 building better apps with SAP Fiori.pdf
 
The Future of Platform Engineering
The Future of Platform EngineeringThe Future of Platform Engineering
The Future of Platform Engineering
 
UiPath Test Automation using UiPath Test Suite series, part 5
UiPath Test Automation using UiPath Test Suite series, part 5UiPath Test Automation using UiPath Test Suite series, part 5
UiPath Test Automation using UiPath Test Suite series, part 5
 
UiPath Test Automation using UiPath Test Suite series, part 4
UiPath Test Automation using UiPath Test Suite series, part 4UiPath Test Automation using UiPath Test Suite series, part 4
UiPath Test Automation using UiPath Test Suite series, part 4
 
Communications Mining Series - Zero to Hero - Session 1
Communications Mining Series - Zero to Hero - Session 1Communications Mining Series - Zero to Hero - Session 1
Communications Mining Series - Zero to Hero - Session 1
 
GraphSummit Singapore | Graphing Success: Revolutionising Organisational Stru...
GraphSummit Singapore | Graphing Success: Revolutionising Organisational Stru...GraphSummit Singapore | Graphing Success: Revolutionising Organisational Stru...
GraphSummit Singapore | Graphing Success: Revolutionising Organisational Stru...
 
Why You Should Replace Windows 11 with Nitrux Linux 3.5.0 for enhanced perfor...
Why You Should Replace Windows 11 with Nitrux Linux 3.5.0 for enhanced perfor...Why You Should Replace Windows 11 with Nitrux Linux 3.5.0 for enhanced perfor...
Why You Should Replace Windows 11 with Nitrux Linux 3.5.0 for enhanced perfor...
 
Secstrike : Reverse Engineering & Pwnable tools for CTF.pptx
Secstrike : Reverse Engineering & Pwnable tools for CTF.pptxSecstrike : Reverse Engineering & Pwnable tools for CTF.pptx
Secstrike : Reverse Engineering & Pwnable tools for CTF.pptx
 
Transcript: Selling digital books in 2024: Insights from industry leaders - T...
Transcript: Selling digital books in 2024: Insights from industry leaders - T...Transcript: Selling digital books in 2024: Insights from industry leaders - T...
Transcript: Selling digital books in 2024: Insights from industry leaders - T...
 
Encryption in Microsoft 365 - ExpertsLive Netherlands 2024
Encryption in Microsoft 365 - ExpertsLive Netherlands 2024Encryption in Microsoft 365 - ExpertsLive Netherlands 2024
Encryption in Microsoft 365 - ExpertsLive Netherlands 2024
 
GraphSummit Singapore | The Art of the Possible with Graph - Q2 2024
GraphSummit Singapore | The Art of the  Possible with Graph - Q2 2024GraphSummit Singapore | The Art of the  Possible with Graph - Q2 2024
GraphSummit Singapore | The Art of the Possible with Graph - Q2 2024
 
Microsoft - Power Platform_G.Aspiotis.pdf
Microsoft - Power Platform_G.Aspiotis.pdfMicrosoft - Power Platform_G.Aspiotis.pdf
Microsoft - Power Platform_G.Aspiotis.pdf
 
Observability Concepts EVERY Developer Should Know -- DeveloperWeek Europe.pdf
Observability Concepts EVERY Developer Should Know -- DeveloperWeek Europe.pdfObservability Concepts EVERY Developer Should Know -- DeveloperWeek Europe.pdf
Observability Concepts EVERY Developer Should Know -- DeveloperWeek Europe.pdf
 
Essentials of Automations: The Art of Triggers and Actions in FME
Essentials of Automations: The Art of Triggers and Actions in FMEEssentials of Automations: The Art of Triggers and Actions in FME
Essentials of Automations: The Art of Triggers and Actions in FME
 
Monitoring Java Application Security with JDK Tools and JFR Events
Monitoring Java Application Security with JDK Tools and JFR EventsMonitoring Java Application Security with JDK Tools and JFR Events
Monitoring Java Application Security with JDK Tools and JFR Events
 
Video Streaming: Then, Now, and in the Future
Video Streaming: Then, Now, and in the FutureVideo Streaming: Then, Now, and in the Future
Video Streaming: Then, Now, and in the Future
 
Introduction to CHERI technology - Cybersecurity
Introduction to CHERI technology - CybersecurityIntroduction to CHERI technology - Cybersecurity
Introduction to CHERI technology - Cybersecurity
 
Smart TV Buyer Insights Survey 2024 by 91mobiles.pdf
Smart TV Buyer Insights Survey 2024 by 91mobiles.pdfSmart TV Buyer Insights Survey 2024 by 91mobiles.pdf
Smart TV Buyer Insights Survey 2024 by 91mobiles.pdf
 
National Security Agency - NSA mobile device best practices
National Security Agency - NSA mobile device best practicesNational Security Agency - NSA mobile device best practices
National Security Agency - NSA mobile device best practices
 
LF Energy Webinar: Electrical Grid Modelling and Simulation Through PowSyBl -...
LF Energy Webinar: Electrical Grid Modelling and Simulation Through PowSyBl -...LF Energy Webinar: Electrical Grid Modelling and Simulation Through PowSyBl -...
LF Energy Webinar: Electrical Grid Modelling and Simulation Through PowSyBl -...
 

The range and scope of computer applications

  • 1. The range and scope ofThe range and scope of computer applicationscomputer applications 1.1. IntroductionIntroduction 2.2. Software and hardwareSoftware and hardware 3.3. Types of applicationTypes of application 4.4. Expert systemsExpert systems
  • 2. IntroductionIntroduction  What is Information Technology???What is Information Technology???  What is a computer???What is a computer???  Why do we study IT?Why do we study IT?  Why do we need a computer??Why do we need a computer??
  • 3.  All computer systems havve to haveAll computer systems havve to have following basic parts:following basic parts: 1. Input1. Input 2. Output2. Output 3. Processing3. Processing 4. Storage4. Storage Whenever u see a computer try to think inWhenever u see a computer try to think in terms of these four parts...terms of these four parts... Try to think of data that is used and whatTry to think of data that is used and what the system needs in order to do what it isthe system needs in order to do what it is meant to do.meant to do.
  • 4. Software and hardwareSoftware and hardware  SoftwareSoftware  ComputerComputer instructionsinstructions oror datadata..  Written coded commands that tell a computer what tasksWritten coded commands that tell a computer what tasks to perform. For example, Word, PhotoShop, Pictureto perform. For example, Word, PhotoShop, Picture Easy, and PhotoDeluxe are software programsEasy, and PhotoDeluxe are software programs  Anything that can beAnything that can be storedstored electronically is software.electronically is software.  The programs and instructions which direct a computer.The programs and instructions which direct a computer.  TheThe storagestorage devicesdevices and display devices areand display devices are hardwarehardware..  The distinction between software and hardware isThe distinction between software and hardware is sometimes confusing because they are so integrallysometimes confusing because they are so integrally linked.linked.  Clearly, when you purchase a program, you are buyingClearly, when you purchase a program, you are buying software. But to buy the software, you need to buy thesoftware. But to buy the software, you need to buy the diskdisk (hardware) on which the software is recorded.(hardware) on which the software is recorded.
  • 5.  Software is often divided into twoSoftware is often divided into two categories:categories:  systems softwaresystems software :: Includes theIncludes the operating systemoperating system and all theand all the utilitiesutilities thatthat enable the computer to function.enable the computer to function.  applications softwareapplications software :: IncludesIncludes programs that do real work for users. Forprograms that do real work for users. For example, word processors, spreadsheets,example, word processors, spreadsheets, and database management systems falland database management systems fall under the category of applicationsunder the category of applications software.software.
  • 6. HardwareHardware  The physical components of a computerThe physical components of a computer system-the computer, plotters, printers,system-the computer, plotters, printers, terminals, digitizers, and so on.terminals, digitizers, and so on.  The physical equipment of a computerThe physical equipment of a computer system, including the central processingsystem, including the central processing unit, data-storage devices, terminals andunit, data-storage devices, terminals and printers.printers.  Physical, tangible component of aPhysical, tangible component of a computer.computer.
  • 7. What is a network???What is a network??? What about internet???What about internet??? Do You have a modem at home???Do You have a modem at home??? For what is the modem used for???For what is the modem used for??? What is LAN and What is WAN???What is LAN and What is WAN???
  • 8.  When two or more computers areWhen two or more computers are connected to each other it is calledconnected to each other it is called network.network.  Internet is global network, consisting out ofInternet is global network, consisting out of millions of computers.millions of computers.
  • 9. ModemModem  Modem is special piece of equipment thatModem is special piece of equipment that allows computers to link to the internetallows computers to link to the internet through the telephone system.through the telephone system.  Short for modulator/demodulator. AShort for modulator/demodulator. A communications device that converts onecommunications device that converts one form of a signal to another that is suitableform of a signal to another that is suitable for transmission over communicationfor transmission over communication circuits, typically from digital to analog andcircuits, typically from digital to analog and then from analog to digital.then from analog to digital.
  • 10. LANLAN  A computer network limited to the immediate area,A computer network limited to the immediate area, usually the same building or floor of a building.usually the same building or floor of a building.  Communications network connecting computers by wire,Communications network connecting computers by wire, cable, or fiber optics link. Usually serves parts of ancable, or fiber optics link. Usually serves parts of an organization located close to one another, generally inorganization located close to one another, generally in the same building or within 2 miles of one another.the same building or within 2 miles of one another. Allows users to share software, hardware and data.Allows users to share software, hardware and data.  is a data network used to connect nodes that areis a data network used to connect nodes that are geographically close, usually within the same building. Ingeographically close, usually within the same building. In a wider view of a local area network, multiple local areaa wider view of a local area network, multiple local area networks are interconnected in a geographically compactnetworks are interconnected in a geographically compact area (such as a university campus), usually by attachingarea (such as a university campus), usually by attaching the LANs to a higher-speed local backbone.the LANs to a higher-speed local backbone.
  • 11. WANWAN  A wide area network (WAN) is a geographicallyA wide area network (WAN) is a geographically dispersed telecommunications network. Thedispersed telecommunications network. The term distinguishes a broader telecommunicationterm distinguishes a broader telecommunication structure from a local area network. A wide areastructure from a local area network. A wide area network may be privately owned or rented, butnetwork may be privately owned or rented, but the term usually connotes the inclusion of publicthe term usually connotes the inclusion of public (shared user) networks. An intermediate form of(shared user) networks. An intermediate form of network in terms of geography is a metropolitannetwork in terms of geography is a metropolitan area network (MAN).area network (MAN).  Group of computers located geographicallyGroup of computers located geographically apart, usually belonging to a single company orapart, usually belonging to a single company or organisation, connected together usingorganisation, connected together using dedicated lines or by satellite to simulate a localdedicated lines or by satellite to simulate a local network.network.
  • 12. Types of applicationTypes of application  Computers are found everywhere aroundComputers are found everywhere around us.us.  Of some u are even not aware of.Of some u are even not aware of.  They range from enormously large once toThey range from enormously large once to tiny microprocessors.tiny microprocessors.  Micro processors are programmed to doMicro processors are programmed to do just one thing such as control the washingjust one thing such as control the washing machine.machine.
  • 13. Expert systemsExpert systems  Special type of computer systems that stores allSpecial type of computer systems that stores all the knowledge of an expert in a particularthe knowledge of an expert in a particular subject so that people can ask it questions.subject so that people can ask it questions.  If the system can remember things and chooseIf the system can remember things and choose better option then it is said to have artificialbetter option then it is said to have artificial intelligence.intelligence.  Knowledge in an expert system does not changeKnowledge in an expert system does not change  A system with artificial intelligence is able toA system with artificial intelligence is able to learn.learn.