Preview

Importance of Computer

Good Essays
Open Document
Open Document
340 Words
Grammar
Grammar
Plagiarism
Plagiarism
Writing
Writing
Score
Score
Importance of Computer
Computer a great and very usefull creation from 1801 by Joseph Marie Jacquard & In 1812, Charles Babbage.Was improved by John Atanasoff & Clifford Berry in 1930.lastly Bill Gates, one of the riches man now, a man who has his innovative ideas that enhance and created a high speed modern computers. Computer today is also known as “Artificial Intelligence”. It is the backbone of Information Technology whose major application lies in internet. Computers now in modern era is now rapidly influence people for its widespread use. Basically, desktop computers, laptop and tablet are commonly known as Computers but as additional to your knowledge, all that has software programs and visual & text presentation is a Computer. Did you know? That telecommunication and satellite imageries are computer based. Marketing, shopping, advertising, fashion designing, event organizing, job seeking, etc are all the latest usage of computers. Speed, accuracy, reliability, and integrity are the main characteristics of a computer.
Here are some importance of Computer: 1. a SERVANT and FRIEND. 2. Saves time and energy. 3. Reduces paperworks 4. Stores thousand/millions of data without any land space needed. 5. Analyzes information and controlling machinery/devices automatically. 6. Have made the world a global village today. 7. It can carry our calculations in just a few minutes that would require days if carried out manually. 8. In medical diagnosis, computers are being used to locate and investigate accurately abnormalities and diseases. 9. Ticketing and reservation have become more efficient and convenient. 10. They can be used as typewriters. 11. Various types of games like chess and cards can also be played on computers. 12. The radar system is controlled with computers to give early warnings of coming enemy unit. 13. n the Armed Forces computers are being widely used for collecting complex data for the aircrafts, missile

You May Also Find These Documents Helpful

  • Powerful Essays

    C200 Task 1

    • 4180 Words
    • 12 Pages

    In this section an overview will be provided on ABE Defense Systems and the network operations center. ABE Defense Systems is a multinational defense, security and aerospace company headquartered in London England. It is among one of the largest defense contractors in the world with its largest operations in the United Kingdom and the United States. The company was formed about 20 years ago as a result of a merger of 2 British companies. Since the merger, the organization has absorbed multiple aircraft, shipbuilding and armored vehicle companies. The organization is involved in many major defense projects around the world. The…

    • 4180 Words
    • 12 Pages
    Powerful Essays
  • Powerful Essays

    Isc363 Phase 3

    • 1899 Words
    • 8 Pages

    As we progress forward, a few specific requirements such as software and data, information and hardware must be obtained in order to identify the type of system needed. The collected information is vital when determining the type of classifications and what is needed to insure the items or information is being secured. When it comes to threat identification, are level of threats is categorize…

    • 1899 Words
    • 8 Pages
    Powerful Essays
  • Powerful Essays

    Software is an integral part of most defense systems. Following are two reasons why software…

    • 2470 Words
    • 16 Pages
    Powerful Essays
  • Good Essays

    Blue Chromite Training

    • 502 Words
    • 3 Pages

    It is speculated next conflict will have ulitization of the electronic and Aritifical intelligence technology againt the enemy. It is clear for the past 15 years the new generation technology and capabilities have been significantly advanced.…

    • 502 Words
    • 3 Pages
    Good Essays
  • Good Essays

    E-8C STARS

    • 459 Words
    • 2 Pages

    2. The main mission of the E-8C Joint STARS is intelligence, surveillance, and reconnaissance (ISR). Gathering information from the battlefield is this weapon system’s specialty. This platform is an airborne battle management system and has the capabilities to command and control. The crew compliment of the aircraft is two pilots, a navigator, and a flight engineer. The mission aspect of the weapon system is normally crewed by 15 Air Force and three Army specialists. The E-8C Joint STARS has a powerful radar capable of covering over 19,000 square miles up to 155 miles away. The weapon system disseminates the information it collects to…

    • 459 Words
    • 2 Pages
    Good Essays
  • Good Essays

    Navy Technology History

    • 549 Words
    • 3 Pages

    Eighty percent of the world’s population lives near the sea, 90 percent of all world trade travels by ocean. Our defenses rely on technology to maintain accountability for all actions happening in open waters. Using radar and sonar systems to detect threats is a primary example of information technology. Also the Navy’s aircrafts use mostly computer based systems. Technology has made for a faster more efficient outcome of data analyzation, communication, and anti-warfare operations. The Navy has created the Office of Naval Research who commits their studies to finding how science and technology can help advance our military. Their studies rang from personal development by enhancing fundamental information-processing abilities to autonomy and unmanned systems. Programs like this let technology help advance our…

    • 549 Words
    • 3 Pages
    Good Essays
  • Good Essays

    The future Army information network contributes to this characteristic through robust network capacity, dynamic network management, and access, availability, and protection of data and information. The Army information network is configured and reconfigured easily, secured, operated, maintained, and sustained to enable freedom of action and the exercise of disciplined initiative on land and through cyberspace. The Army information network facilitates the visualization, and agile, responsive, and informed management of its voice and data transport resources to scale and align with the commander’s changing intent and priorities, modifications to task organization and scheme of maneuver,…

    • 932 Words
    • 4 Pages
    Good Essays
  • Powerful Essays

    Power to the Edge

    • 65341 Words
    • 262 Pages

    The Command and Control Research Program (CCRP) has the mission of improving DoD’s understanding of the national security implications of the Information Age. Focusing upon improving both the state of the art and the state of the practice of command and control, the CCRP helps DoD take full advantage of the opportunities afforded by emerging technologies. The CCRP pursues a broad program of research and analysis in information superiority, information operations, command and control theory, and associated operational concepts that enable us to leverage shared awareness to improve the effectiveness and efficiency of assigned missions. An important aspect of the CCRP program is its ability to serve as a bridge between the operational, technical, analytical, and educational communities. The CCRP provides leadership for the command and control research community by: • articulating critical research issues; • working to strengthen command and control research infrastructure; • sponsoring a series of workshops and symposia; • serving as a clearing house for command and control related research funding; and • disseminating outreach initiatives that include the CCRP Publication Series.…

    • 65341 Words
    • 262 Pages
    Powerful Essays
  • Powerful Essays

    Week 1 Case Study

    • 1259 Words
    • 4 Pages

    With the increased and wide spread use of computers in the military, a need for procedures we due. These procedure recommendations revolved around technique and security which had not previously existed on such a broad scale. Even with the large scale of operations, there still needed to be some privacy around the system and data that was shared or accessed. Through this study, batch, multiprogramming, and time-shared processing were all recommended for different levels of access and control. Three types of threats to system security were identified. These are accidental access of data, deliberate access of data, and a physical attack on the system. There were recommended safeguards to protect from all three vulnerabilities. This protection had to be identified and secured by the system designer so not gaps were missed. These gaps could be in the software, hardware, communication of information and general lack of organization or the organization itself. There were recommended…

    • 1259 Words
    • 4 Pages
    Powerful Essays
  • Powerful Essays

    Us Military

    • 2990 Words
    • 12 Pages

    (Cohen, 1999). This initiative also allows U.S. forces to make rapid decisions with the utmost confidence. This information system delivers data to the troops best equipped to complete the task at hand. In theory, this approach will provide greatly enhanced land, air, and water attack and defense capabilities. The only downfall in this system is the possibility of overwhelming the decision makers with too much raw data.…

    • 2990 Words
    • 12 Pages
    Powerful Essays
  • Powerful Essays

    Information Superiority

    • 1032 Words
    • 5 Pages

    • FM 3-0, June 2001, Operations • FM 100-6, August 1996, Information Operations • Joint Publication (JP) 3-13, 13 February 2006, Information Operations • National Security Strategy, September 2002 • Joint Vision 2020 • Exploring Information Superiority, 2004 • Defense Information Superiority, GAO, August 1998 • Quadrennial Defense Review Report, Feb 2, 2006…

    • 1032 Words
    • 5 Pages
    Powerful Essays
  • Good Essays

    Computers In Military Applications Computers have given the modern military a degree of efficiency and effectiveness that has completely changed the way the military operates at sea, in the air, and on the ground. The fast computational abilities and the accuracy of digital computing enable the military to perform more quickly with less risk to themselves and with less cost to their government. Wars fought prior to the advent of digital computing could take years to complete and resulted in tremendous loss of property on both sides. Weapons of mass destruction used to be the fastest way to achieve the objective. A discussion with Dan Carroll, Vietnam war veteran and current contract engineer for major aerospace companies revealed that in World War II and in Vietnam, American forces employed a technique known as carpet bombing to wipe out enemy troops and resources.…

    • 2119 Words
    • 9 Pages
    Good Essays
  • Satisfactory Essays

    Tata Advanced Systems (TASL) was set up in 2007 as a vehicle to extend the Tata group's business operations to the national security and defence sector. TASL is a wholly-owned subsidiary of Tata Sons.…

    • 439 Words
    • 2 Pages
    Satisfactory Essays
  • Satisfactory Essays

    On the one hand, computers help us and make our life easier. We can solve many problems using them. We can buy clothes, food and, even cars. This device has replaced typing machines, cinema, and record players. We can draw pictures with the help of various special programs, do difficult math operations, or design. Computers are used in every scientific sphere. They help to develop physics, chemistry, biology, mathematics, and other areas of science.…

    • 267 Words
    • 2 Pages
    Satisfactory Essays
  • Good Essays

    Eservice

    • 431 Words
    • 2 Pages

    1. 24 hour processing facility as against 6 hour banking facility (normal working hours of a bank) or an 8-12 hour booking counters.…

    • 431 Words
    • 2 Pages
    Good Essays