Premium Essay

Using Computers

In: Computers and Technology

Submitted By kooo
Words 306
Pages 2
Using computers and the internet develops important skills in young people.

It is said that everyone has computer and the modern life can be hardly imagined without the world-wide web, which makes more focused on doing varied things at the same time. Some people believe that the mass of young people have more skills and are very used to computers and internet, I agree with this idea for three reasons.
First of all, today young people have opportunities to use many varied types of computers and the internet that may evolve their skills. It makes them to compare all the different ways, which work considerably. For example, the computer tablet, the mobile phone, and all of them have it has been accessed to the internet, videogames, etc. Young people are able to learn and to use these equipments and update new programs also to achieve an aim.
Secondly, it can be helpful to young people. For instance, thousands websites place a majority of good information at the disposal of any person interested in mathematics, chemistry, foreign languages, etc.
Finally, using many varied types of computers and the internet offers a wide range of leisure opportunities. They can get in touch with their friends and send them e-mail messages, picture-cards and photos. They can make new friends from the whole world. As a result, it is a wonderful solution to the problem of loneliness.
In conclusion, young people are in great need of using many varied types of computers and the internet because they can get more versatile, integrated and knowledge-based skills. For these reasons, I support using many varied types of computers and the internet has become the most useful tool for young people and they have certainly changed their lives for the better, therefore, it plays a significant role

Similar Documents

Premium Essay

Advantges and Disadvantages of Using Computers

...Nowadays people are using computer in their daily life , it is like a part of our life now . And we have been using computer in Education , Bank , Entertainment , Railway Stations And Airports , Office , Hospitals , Defence And Design . Such as computer are used in school for teaching , Mathematical Calculation , Assignment . In Bank computer are used for storing and giving all kind information , keeping record . Computer are used for playing video games , listening to music , watching movie for Entertainment . Railway Stations And Airport are used computer for help in giving information and keeping records of all passengers. In Office they use computer to sending emails , type and print documents. And in Hospital , Defence And Design , Computer are used for help in keeping records , constructing weapon , design buildings and Magazine , etc. As you can see , we are using computer on a lot of areas . Computer has a lot of advantage but it also has a lot of disadvantage too , So what is the advantages and disadvantages of using computer ? Benefits from using computers are possible because computers have the advantages of Speed , in a single second many of computers process billions or trillions of operation and they travel at incredibly fast speeds . Reliability , in modern computer the electronic components are reliable and dependable because they rarely break or fail . Consistency , given the same input and processes , a computer will produce the same results...

Words: 749 - Pages: 3

Free Essay

Related Literature of Factors That Affect the Academic Performance of the Student Using Computer

...Too much computer exposure may hinder learning By G. Jeffrey MacDonald, The Christian Science Monitor For all the schools and parents who have together invested billions to give children a learning edge through the latest computer technology, a mammoth new study by German researchers brings some sobering news: Too much exposure to computers might spell trouble for the developing mind. | | | Key to the future: In Freeport, Maine, all seventh- and eighth-graders get their own laptop. | | | | By Melanie Stetson Freeman, courtesy The Christian Science Monitor | | From a sample of 175,000 15-year-old students in 31 countries, researchers at the University of Munich announced in November that performance in math and reading had suffered significantly among students who have more than one computer at home. And while students seemed to benefit from limited use of computers at school, those who used them several times per week at school saw their academic performance decline significantly as well. "It seems if you overuse computers and trade them for other [types of] teaching, it actually harms the student," says lead researcher Ludger Woessmann in a telephone interview from Munich. "At least we should be cautious in stating that increasing [access to] computers in the home and school will improve students' math and reading performance." With the rise of computers in classrooms has come a glut of conflicting conclusions about the actual value computers bring to timeless...

Words: 810 - Pages: 4

Premium Essay

Using a Computer Every Day Can Have More Negative Than Positive Effects on Children.

...In today's modern world, computers are an essential part of everyday life. Around the globe, children often use computers from a very young age. Although it is important for children to participate in various well-balanced activities, in my opinion, children who use the computer daily are actually developing a critical skill for future success. The bases for my views are personal, academic, and professional. From a personal point of view, computers are an invaluable resource to help young people explore the world around them. For example, children who use Internet to satisfy their curiosity about diverse topics are already becoming independent learners. No child with a computer is ever bored! By starting early in their lives, children feel totally at ease around computers; they are also able to take advantage of the wide range of services computers provide. From an academic viewpoint, children have no choice but to master this technological invention. For instance, when I was in university, students brought their laptops to class to take notes, do research and exchange information. They wrote assignments, created presentations and developed databases. Children who build early confidence and experience in these abilities are at a distinct advantage over those who have not. From a professional perspective, the computer has found a permanent place in the workplace. Today, employers still pay to provide computer training to their employees. Tomorrow, corporations will expect prospective...

Words: 300 - Pages: 2

Free Essay

Compare and Contrast the Toolkit Used by Hunter-Gatherers with That Used by Farmers.

...Compare and contrast the toolkit used by hunter-gatherers with that used by farmers. Throughout the ages, there have been tools used and created by man to simplify life as a hunter-gatherer. The earliest tool kits found from the 120,000-35,000 B.C.E. are great examples of simple tools made out of stones. Rough pieces of the stone chipped away to create somewhat of a point on the tip of the rock that could later be used as weaponry such as on a spear or as an everyday tool used for cutting. Through progression of practice and time tools became more evolved. Shapes became more defined and new tools developed. Different materials were used such as bone from animals and natural fibers such as sticks that were used to makes harpoons for hunting and needles for clothes making. As hunting and gathering became insufficient due to growing populations humans began to settle down and domesticate their own crops and animals to feed themselves. Tools of the hunter-gatherer became more sophisticated as they settled into becoming farmers. Farmers used materials of stone, bone, antlers and natural fibers like the hunter-gatherers of the later years. They became more skilled at working the stones and materials polishing them into pieces of functional art. Tool use was not only for food but for other jobs such as clothes making and house building. The difference between hunter-gatherer’s and farmer’s tool kits are the details. The hunter-gatherers did not put as much emphasis on decorating...

Words: 306 - Pages: 2

Premium Essay

Performance Issues of Cms in Automobile Industries Using Computer Simulation

...International Journal of Computer Applications (0975 – 8887) Volume 52– No.5, August 2012 Performance Issues of CMS in Automobile Industries using Computer Simulation J. H. Bhangale Ph.D. Scholar, LIT, Nagpur RTM Nagpur University, India A. M. Mahalle Phd, Reader, LIT, Nagpur RTM Nagpur University, India ABSTRACT Today, every company wants to curtail its expenses. Productivity being the main criteria, the daily demand plays a major role and based on this production takes place. This paper shows how cellular concept has contrasting approach in India and Japan and also, it gives detailed information about cell and cellular layout. Also, it consists of problem identification in the existing layout, objectives and methodology followed to achieve the objectives .In India, few companies like TVS, Maruti etc. have implemented it and other few are in a way of implementation (like Mahindra & Mahindra). A “Cell” is a collection of dissimilar machines or processes, located closely together in a sequential operation manner and dedicated to a set of a similar part and product. Cell is that in which two or more machine should be arrange such that receiving and shipping should be present at same location. Each machine has fix position and dissimilar machines are arranged in a cell so, the layout is known as cellular layout. CMS emphasis on : 1)To reduce through put time of the component, 2)To increase the target of manufacturing component and completion of target as per demand...

Words: 2879 - Pages: 12

Free Essay

Old Spice Slogan

...Michael Barton Mrs. Edsen English 1300-1:40 11, November 2012 Believe in Your Smellf  “Believe in your smellf,” this is Old Spices catch phrase for their Old Spice Champion ad. When it comes to selling a product Old Spice tries to make the costumer think that if they get their product it will change them. Can think of a company that uses weasel words more than Old Spice does with their advertisement? Old Spice tries to make it seem as if, by purchasing their product, you will all of a sudden have a much more glorious life. Old Spice is notorious for misleading an audience into buying their product. They have multiple commercials where they use doublespeak to try and make their product sound better. Old Spice also frequently uses weasel words as well as doublespeak to get people more interested in their product. Lutz said this about weasel words, “Weasel words appear to say one thing when in fact they say the opposite or nothing at all.” (Lutz 310) Lutz describes doublespeak as, “It is a language which makes the bad seem good, the negative seem positive, the unpleasant to seem attractive, or at least tolerable. “ (Lutz 304) Old spice has multiple commercials making false claims of how you can be changed by their product.  As a consumer of any product you must be aware of what ads trying to sell you. Old Spice Champion is trying to get people to “Believe in your smellf.” Many consumers buy Old Spice Champion for misleading reasons, but no consumer should ever buy Old Spice...

Words: 1469 - Pages: 6

Free Essay

My Mother

...A Dangerous Moment English class was a place where I could sit back in a chair and let my imagination run wild. I always had As in English not even an A- would ever slip by. Ms. Bottineau was a great ball of joy every day of the week, every day I entered that classroom a sense of relief would flow through my veins, I looked up to her and I know she had trust in me to always give my 100% effort in every assignment. At this point in my sophomore year I was chilling like a villain, it was almost the end of the school year around March in Ms.Bottineau’s class and we had to memorize a poem titled “Our Deepest Fear”. This is where my deepest fear of losing my English teachers trust became a reality. I quite possibly made the most foolish mistake of my life, a mistake that made me, a 16 year old teenager cry in regret. March 27th was a day my life would take a major turn. The night before the test I thought about studying the poem but I really don’t know what was in me that I decided to procrastinate and to not memorize that poem as if I had absorbed the aura of a sloth. The next day as I enter the classroom and I notice the laptop carrier open, ready for us to grab, as if they were taunting me with failure already. I was sweating and almost ready to faint. The pressure was on, I had to make a choice and I made the most horrendous one a human can make. A decision that break bonds, trust, and one's reputation. I am already regretting not being prepared. I had a plan, a very idiotic...

Words: 1003 - Pages: 5

Premium Essay

Richard Dawkins: Using Computer Modeling to Explain the Theory of Evolution by Natural Selection

...Using Computer Modeling to Explain the Theory of Evolution by Natural Selection Throughout The Blind Watchmaker Richard Dawkins attempts to use computer modeling to explain and defend various aspects of the theory of evolution by natural selection. Where Dawkins’ computer modeling comes into use in a significant way is discussed in Chapter 3 of his book titled, “Accumulating Small Change”. In it, Dawkins takes the reader through explanations of what cumulative selection is and how it builds up biological complexity in a meaningful, and relatively quick, way. He does this with computer modeling and continues on with various other examples of computer models to explain how genes work, what mutation looks like, and how it gets selected. The following is a look at how he uses computer modeling to these ends and what their limits are, essentially, what sort of questions they can answer. Dawkins begins Chapter 3 of The Blind Watchmaker by posing the question of how living things came into existence if not by chance. He explains that it was by a series of “gradual, step-by-step transformations” from entities simple enough to have come about existing by chance transitioning into entities which are incredibly complex and which could not have come to exist by chance alone (Dawkins 43). This transitional process is achieved through “nonrandom survival” and is known as cumulative selection (Dawkins 43). From here we are told about the difference between single-step selection...

Words: 1359 - Pages: 6

Premium Essay

Crj 320 Wk 10 Quiz 10 Chapter 17 and 21

...cardboard d. paper bags 2. A zombie is a a. certain type of computer virus. b. computer that has been rendered immobile by a virus. c. computer used by hackers to copy other computer programs. d. computer that has been taken over by another computer. 3. A secretly attached program that monitors a computer system and waits for an error to occur so that the weakness may be exploited is called a a. shadow bomb. c. super-program. b. logic bomb. d. turtle. 4. A virus attack may replace or destroy data on the computer’s hard drive and a. identify bank accounts and financial records. b. leave a “back door” open for later entry. c. obtain one’s access codes. d. defraud the end user. 5. Port scanning is a. looking for access into a computer. b. scanning for a portable computer that is using a wireless system. c. removing data. d. linking access codes. 6. Which of the following is not one of the three general categories of cybercriminals? a. crackers c. criminals b. vandals d. IT professionals 7. Which of the following statements about reshipper schemes is correct? a. These schemes typically involve employees of the U.S. Postal Service, UPS, FedEx or other such businesses. b. The masterminds of reshipper schemes often initiate contact with their victims in chat rooms. c. Scam artists who organize these schemes are frequently charged with sabotage. d. These schemes typically involve intercepting a computer being shipped, installing spyware and...

Words: 1901 - Pages: 8

Free Essay

Heart

...JANE B. CASIL BSCS-III THE TEN COMMANDMENTS OF COMPUTER ETHICS 1. Thou shalt not use computer to harm other people. -Oftentimes we use computers for so many reasons to discover new things, meet other people and etc. But sometimes we didn’t care anymore the important of using our computers if it is doing the right thing or not. So that, in order to avoid this kind of computer ethics we should know our limitations in using our computers because other people might have the tendency to become more rude and there’s a possibility that may affect in one’s life if we didn’t look for a better solution on this. 2. Thou shalt not interfere with other peoples computer work. -There are people who truly satisfied with their work, who patiently trying their best and to work hard but sometimes there are reasons why people interfere other work maybe because it is easy to them to look for others work. They actually don’t mind that if this action is good or bad. 3. Thou shalt not snoop in other peoples files. -We should always mind in ourselves that we are free to let our choices for an easy task but avoid snooping files with other people. 4. Thou shalt not use a computer to steal. -Computer is use for doing the right thing and we should know this in every single way. We should avoid using the computer in just order to steal any kind of software. Because stealing is a sin. 5. Thou shalt not use a computer to bear false witness. -In every action we do, several...

Words: 902 - Pages: 4

Premium Essay

Using Ict to Manage and Support

...Introduction This assignment will be discussing the ways in which Information Communication Technology (ICT) can be used for the storage, analysis and organisation of the workplace environment, linking back to workplace setting. It will evaluate how ICT is used in an early year’s educational setting. This assignment will also be discussing the role of the computers. It compares the difference between having a computer and for the people who do not use a computer. ICT is also used by children and young people in an educational setting. There are policy and procedures relating to children and young people regarding the use of ICT. Also included in this documents, are policy and procedural methods children and young people use in the class room setting. Another aspect discussed will be how ICT uses software packages. Packages used are Microsoft word and Excel in order to manage the educational setting. There are many different ways to store and organise the information in the workplace setting. In modern society ICT is used to promote the efficient running of an organisation. When using ICT to help store and organise the information on children, software packages are used. Excel is used for inputting data and to organise files and information. There are many ways Excel help the staff in an educational setting. It helps the staff to put the registers in order. Every morning when children come to the setting staff marks the register for the school records. This will allow the...

Words: 1690 - Pages: 7

Premium Essay

Uuyv

...Computing BTEC Level 3 90-credit Diploma In Information Technology (QCF) Unit no: 2 | Learner group: C2250, C0183, C0177, C0186, C0184, C0185, | Unit title: Computer Systems | Learner name: | Date issued: W/C 26th January 2016 | Assessor name: Mark Dollan | Completion date: W/E 1st Feb 2016 | Written by: M Dollan | Submitted on: | Verified by: Karl Indans | Assignment title: System Software & Configuration (ref: L3-CS02) | In this assessment you will have opportunities to provide evidence against the following criteria. Indicate the page numbers where the evidence can be found also PPD (Personal and Professional Development) and EE | Grading Criteria | Criteria ref | To achieve the criteria the evidence must show that the student is able to: | Task | Evidence | Page | P2 | Explain the purpose of operating systems | 1 | Written | | P3 | Explain the purpose of different software utilities | 3 | Written | | P6 | Configure a computer system to meet user needs | 5 | Practical | | P7 | Test a configured computer system for functionality | 6 | Practical | | M1 | Compare the features and functions of different operating systems | 2 | Written | | M3 | Evaluate the performance of a computer system | 7 | Written | | D1 | Explain how software utilities can improve the performance of computer systems | 4 | Written | | This is an official course assessment and you must make a good attempt at all criteria available, you must also make sure that...

Words: 2093 - Pages: 9

Premium Essay

DoxCx

...– 1956:  First Generation [ Vacuum Tubes ] These first generation computers relied on ‘machine language’ (which is the most basic programming language that can be understood by computers). These computers were limited to solving one problem at a time. Input was based on punched cards and paper tape. Output came out on print-outs. The two notable machines of this era were the UNIVAC and ENIAC machines – the UNIVAC is the first every commercial computer which was purchased in 1951 by a business – the US Census Bureau. 1956 – 1963: Second Generation [ Transistors ] The replacement of vacuum tubes by transistors saw the advent of the second generation of computing. Although first invented in 1947, transistors weren’t used significantly in computers until the end of the 1950s. They were a big improvement over the vacuum tube, despite still subjecting computers to damaging levels of heat. However they were hugely superior to the vacuum tubes, making computers smaller, faster, cheaper and less heavy on electricity use. They still relied on punched 1964 – 1971: Third Generation [ Integrated Circuits ] By this phase, transistors were now being miniaturised and put on silicon chips (called semiconductors). This led to a massive increase in speed and efficiency of these machines.  These were the first computers where users interacted using keyboards and monitors which interfaced with an operating system, a significant leap...

Words: 438 - Pages: 2

Premium Essay

Lot2

...bandwidth or connectivity. Bandwidth attacks overflow the network with a high volume of traffic using existing network resources, thus depriving the legitimate users of these resources. Connectivity attacks overflow a computer with a large amount of connection requests, consuming all available operating system resources so that the computer cannot process legitimate user's requests.” (EC-COUNCIL 6-3) Our network has suffered a type of DoS attack that was carried out by many computers throughout the campus network; this is called a Distributed Denial of Service (DDoS), or a DoS attack that was initiated by many computers. Our systems were attacked by computers owned by the school and the attack was carried out using computers on the internal network. The computers were compromised by an individual (or group of individuals) that gained access to the network by using a network administrator’s password. This password was obtained by a piece of software that logs key presses on the computers. They then used the password to install a piece of software with administrative privileges. That piece of software is what brought down the registration server. The attacking software asked the registration server for a webpage over and over again. This request was make with different ports on the individual computers and the server attempted to fulfill each request. Each computer that was infected by this software was able to make hundreds of requests in a matter of seconds...

Words: 589 - Pages: 3

Premium Essay

Computer Hardware Servicing Ncii

... | |Qualification: | |COMPUTER HARDWARE SERVICING NC II | |[pic] |Technical Education and Skills Development Authority | | |East Service Road, South Superhighway, Taguig City, Metro Manila | TABLE OF CONTENTS Page A. COURSE DESIGN 1-5 B. MODULES OF INSTRUCTION 6-73 • Basic Competencies 6 o Participating in workplace communication ………………… 7-10 o Working in a team environment ……………….... 11-13 o Practicing career professionalism .……………. 14-17 o Practicing occupational health and safety procedures 18-22 • Common Competencies 23 o Applying quality standards …………………………………… 24-27 o Performing computer operations 28-34 o Performing mensuration and calculation 35-38 o Preparing and interpreting technical drawing 39-42 o Using hand tools 43-47 o Terminating and connecting electrical...

Words: 8633 - Pages: 35