SlideShare une entreprise Scribd logo
1  sur  8
Zagan Marius
Group 8214
 Faster Communication
 The Internet has been mankind's greatest
means of communication yet. Newer
innovations are only making it faster and
more reliable. Today, we can initiate real-time
communication with someone who is in
another part of the world.
 The Internet is a treasure trove
of information; which offers
knowledge on any given topic
under the sun. Search engines
make information accessible
on various subject matters
such as, government law and
services, trade fairs and
conferences, market
information, new innovations
and technical support, and
even dispense advice on love
and relationships matters.
 Entertainment is one of the foremost
reasons why people prefer surfing
the Web. In fact, the Internet has
gained much success by marketing
for several multifaceted
entertainment industries. Finding
the latest updates about celebrities
and exploring lifestyle websites
have become day-to-day activities
of many Internet consumers. On the
other hand, even celebrities are
using the Internet effectively for
promoting their cause and for
keeping their fans happy.
 Theft of Personal Information
 The use of Internet for banking, social networking,
or other services, often makes our personal
information vulnerable to theft. There are no fail-
proof ways to securing names, account numbers,
addresses, photos, and credit card numbers from
being stolen or misused by thieving websites and
individuals
 Spamming refers to sending unwanted e-mails,
which serve no purpose and needlessly
obstruct the computer system. Such illegal
activities can be very frustrating as it makes it
slower to access our email accounts and makes
the entire service unreliable for consumers.
 One of the most annoying
problems with the Internet
is the ease with which any
malware can infect our
computers. Internet users
are often plagued by virus
attacks that harm their
computers and important
files. Computers connected
to the Internet are
extremely prone to IP
targeted virus attacks that
may end up crashing the
system completely.

www.google.com
www.buzzle.com

Contenu connexe

Tendances

Karina molina
Karina molinaKarina molina
Karina molinakarolai23
 
Rockit promo presentation
Rockit promo presentationRockit promo presentation
Rockit promo presentationCatrina Silova
 
The Social Advisor : Social Media Secrets for Savvy Advisors
The Social Advisor : Social Media Secrets for Savvy AdvisorsThe Social Advisor : Social Media Secrets for Savvy Advisors
The Social Advisor : Social Media Secrets for Savvy AdvisorsSmarsh
 
Rockit Summit. Call for speakers
Rockit Summit. Call for speakersRockit Summit. Call for speakers
Rockit Summit. Call for speakersXenia Muntean
 
Digital Marketing Trends 2018 - Tio University of Applied Sciences
Digital Marketing Trends 2018 - Tio University of Applied SciencesDigital Marketing Trends 2018 - Tio University of Applied Sciences
Digital Marketing Trends 2018 - Tio University of Applied SciencesEoin Dixon Murphy
 
Data adalah peluru by Akbar Laksana
Data adalah peluru by Akbar LaksanaData adalah peluru by Akbar Laksana
Data adalah peluru by Akbar LaksanaAkbar Laksana
 
CIPR Social Media Conference April 2011
CIPR Social Media Conference April 2011CIPR Social Media Conference April 2011
CIPR Social Media Conference April 2011Stuart Bruce
 
Advertising in The Age of Digital Identity - Azadeh Dindayal
Advertising in The Age of Digital Identity - Azadeh DindayalAdvertising in The Age of Digital Identity - Azadeh Dindayal
Advertising in The Age of Digital Identity - Azadeh DindayalIdentityNorthEvents
 

Tendances (8)

Karina molina
Karina molinaKarina molina
Karina molina
 
Rockit promo presentation
Rockit promo presentationRockit promo presentation
Rockit promo presentation
 
The Social Advisor : Social Media Secrets for Savvy Advisors
The Social Advisor : Social Media Secrets for Savvy AdvisorsThe Social Advisor : Social Media Secrets for Savvy Advisors
The Social Advisor : Social Media Secrets for Savvy Advisors
 
Rockit Summit. Call for speakers
Rockit Summit. Call for speakersRockit Summit. Call for speakers
Rockit Summit. Call for speakers
 
Digital Marketing Trends 2018 - Tio University of Applied Sciences
Digital Marketing Trends 2018 - Tio University of Applied SciencesDigital Marketing Trends 2018 - Tio University of Applied Sciences
Digital Marketing Trends 2018 - Tio University of Applied Sciences
 
Data adalah peluru by Akbar Laksana
Data adalah peluru by Akbar LaksanaData adalah peluru by Akbar Laksana
Data adalah peluru by Akbar Laksana
 
CIPR Social Media Conference April 2011
CIPR Social Media Conference April 2011CIPR Social Media Conference April 2011
CIPR Social Media Conference April 2011
 
Advertising in The Age of Digital Identity - Azadeh Dindayal
Advertising in The Age of Digital Identity - Azadeh DindayalAdvertising in The Age of Digital Identity - Azadeh Dindayal
Advertising in The Age of Digital Identity - Azadeh Dindayal
 

Similaire à Advantages and disadvantages of the internet

Advantages and disadvantages of internet 2
Advantages and disadvantages of internet 2Advantages and disadvantages of internet 2
Advantages and disadvantages of internet 2BAS ADITYA SRINIVAS
 
Identity Theft: Evolving with Technology
Identity Theft: Evolving with TechnologyIdentity Theft: Evolving with Technology
Identity Theft: Evolving with Technology- Mark - Fullbright
 
Prayas Session; Impact of Social Media by Rana Ghosh
Prayas Session; Impact of Social Media by Rana GhoshPrayas Session; Impact of Social Media by Rana Ghosh
Prayas Session; Impact of Social Media by Rana GhoshTenet Systems Pvt Ltd
 
advantages and disadvantages of using internet
advantages and disadvantages of using internetadvantages and disadvantages of using internet
advantages and disadvantages of using internetgulsheramjad
 
English project. Munteanu Ana-Cristina
English project. Munteanu Ana-CristinaEnglish project. Munteanu Ana-Cristina
English project. Munteanu Ana-CristinaTina Munteanu
 
1Running head CYBERPHOBIA3CYBERPHOBIA.docx
1Running head CYBERPHOBIA3CYBERPHOBIA.docx1Running head CYBERPHOBIA3CYBERPHOBIA.docx
1Running head CYBERPHOBIA3CYBERPHOBIA.docxRAJU852744
 
Presentation on INTERNET
Presentation on INTERNETPresentation on INTERNET
Presentation on INTERNETSaleh Ibne Omar
 
Mobile Privacy and Security - Study by Mobidigger
Mobile Privacy and Security - Study by MobidiggerMobile Privacy and Security - Study by Mobidigger
Mobile Privacy and Security - Study by MobidiggerHubert Moik
 
Privacy study Mobile and online Dating
Privacy study Mobile and online DatingPrivacy study Mobile and online Dating
Privacy study Mobile and online DatingMobiDigger
 
Personality Traits of Digital Natives
Personality Traits of Digital NativesPersonality Traits of Digital Natives
Personality Traits of Digital Nativesijtsrd
 
Fake news is just the beginning why the internet needs a fix
Fake news is just the beginning why the internet needs a fixFake news is just the beginning why the internet needs a fix
Fake news is just the beginning why the internet needs a fixChirag Thumar
 
Could I live without the Internet?Why? (Why not???)
Could I live without the Internet?Why? (Why not???)Could I live without the Internet?Why? (Why not???)
Could I live without the Internet?Why? (Why not???)Daniella Dana
 
Techorama 2014, the Real Deal
Techorama 2014, the Real DealTechorama 2014, the Real Deal
Techorama 2014, the Real DealBruno Segers
 

Similaire à Advantages and disadvantages of the internet (20)

Advantages and disadvantages of internet 2
Advantages and disadvantages of internet 2Advantages and disadvantages of internet 2
Advantages and disadvantages of internet 2
 
Internet
InternetInternet
Internet
 
Internet
InternetInternet
Internet
 
Internet Privacy
Internet PrivacyInternet Privacy
Internet Privacy
 
Identity Theft: Evolving with Technology
Identity Theft: Evolving with TechnologyIdentity Theft: Evolving with Technology
Identity Theft: Evolving with Technology
 
Prayas Session; Impact of Social Media by Rana Ghosh
Prayas Session; Impact of Social Media by Rana GhoshPrayas Session; Impact of Social Media by Rana Ghosh
Prayas Session; Impact of Social Media by Rana Ghosh
 
advantages and disadvantages of using internet
advantages and disadvantages of using internetadvantages and disadvantages of using internet
advantages and disadvantages of using internet
 
Debate
DebateDebate
Debate
 
English project. Munteanu Ana-Cristina
English project. Munteanu Ana-CristinaEnglish project. Munteanu Ana-Cristina
English project. Munteanu Ana-Cristina
 
1Running head CYBERPHOBIA3CYBERPHOBIA.docx
1Running head CYBERPHOBIA3CYBERPHOBIA.docx1Running head CYBERPHOBIA3CYBERPHOBIA.docx
1Running head CYBERPHOBIA3CYBERPHOBIA.docx
 
Misuse of Internet
Misuse of InternetMisuse of Internet
Misuse of Internet
 
Presentation on INTERNET
Presentation on INTERNETPresentation on INTERNET
Presentation on INTERNET
 
Mobile Privacy and Security - Study by Mobidigger
Mobile Privacy and Security - Study by MobidiggerMobile Privacy and Security - Study by Mobidigger
Mobile Privacy and Security - Study by Mobidigger
 
Privacy study Mobile and online Dating
Privacy study Mobile and online DatingPrivacy study Mobile and online Dating
Privacy study Mobile and online Dating
 
Personality Traits of Digital Natives
Personality Traits of Digital NativesPersonality Traits of Digital Natives
Personality Traits of Digital Natives
 
Role of CAs in cyber world
Role of CAs in cyber worldRole of CAs in cyber world
Role of CAs in cyber world
 
Fake news is just the beginning why the internet needs a fix
Fake news is just the beginning why the internet needs a fixFake news is just the beginning why the internet needs a fix
Fake news is just the beginning why the internet needs a fix
 
Hamad Rabban.It
Hamad Rabban.ItHamad Rabban.It
Hamad Rabban.It
 
Could I live without the Internet?Why? (Why not???)
Could I live without the Internet?Why? (Why not???)Could I live without the Internet?Why? (Why not???)
Could I live without the Internet?Why? (Why not???)
 
Techorama 2014, the Real Deal
Techorama 2014, the Real DealTechorama 2014, the Real Deal
Techorama 2014, the Real Deal
 

Advantages and disadvantages of the internet

  • 2.  Faster Communication  The Internet has been mankind's greatest means of communication yet. Newer innovations are only making it faster and more reliable. Today, we can initiate real-time communication with someone who is in another part of the world.
  • 3.  The Internet is a treasure trove of information; which offers knowledge on any given topic under the sun. Search engines make information accessible on various subject matters such as, government law and services, trade fairs and conferences, market information, new innovations and technical support, and even dispense advice on love and relationships matters.
  • 4.  Entertainment is one of the foremost reasons why people prefer surfing the Web. In fact, the Internet has gained much success by marketing for several multifaceted entertainment industries. Finding the latest updates about celebrities and exploring lifestyle websites have become day-to-day activities of many Internet consumers. On the other hand, even celebrities are using the Internet effectively for promoting their cause and for keeping their fans happy.
  • 5.  Theft of Personal Information  The use of Internet for banking, social networking, or other services, often makes our personal information vulnerable to theft. There are no fail- proof ways to securing names, account numbers, addresses, photos, and credit card numbers from being stolen or misused by thieving websites and individuals
  • 6.  Spamming refers to sending unwanted e-mails, which serve no purpose and needlessly obstruct the computer system. Such illegal activities can be very frustrating as it makes it slower to access our email accounts and makes the entire service unreliable for consumers.
  • 7.  One of the most annoying problems with the Internet is the ease with which any malware can infect our computers. Internet users are often plagued by virus attacks that harm their computers and important files. Computers connected to the Internet are extremely prone to IP targeted virus attacks that may end up crashing the system completely. 