Free Essay

En1420 Unit 3

In:

Submitted By Kenshirox777
Words 352
Pages 2
After having read the essay, “Does the Internet Make You Smarter?*”, I was immediately overwhelmed with thoughts about this particular topic. Clay Shirky, the writer of this essay, approaches this topic in a very comparative manner. He points out how the bulk of publicly available digital media being created by amateurs in today’s world, is comparable to the way the invention of the printing press made it possible for the flood of mediocre at best, contemporary literature to circulate. I will give you my summarized interpretation of Shirky’s essay and evaluate both sides to this argument. The argument being made here is that since anybody with computer access can type and upload digital media, is the information quality becoming more and more questionable as time passes? In the 16th century, foes of print never imagined that new norms would be built around all this newly abundant contemporary literature. Shirky says, “Novels, newspapers, scientific journals, the separation of fiction and non-fiction, all these innovations were created during the collapse of the scribal system, and all had the effect of increasing, rather than decreasing, the intellectual range and output of society.” We are living through a very similar experience due to the power of the internet. As humans, we have a vast cognitive surplus. In the 20th century, we used a lot of our free time watching TV. Now we have started to devote a large portion of our time to the internet. It took over 100 million hours of human thought to create Wikipedia. Some of that information is questionable, but just think about the positive impact this has on people who get legitimate information from this source. According to separate research, reading is an unnatural act. We have been trained to be literate by investing amazing resources. It is up to us as humans, to do the same thing with how we use computers and digital technology. I personally think the internet can make us smarter if used in a positive way. I also understand how it can make us lazy and dumb if not used to its educational potential.

Similar Documents

Free Essay

Visual Argument

...EN1420–Unit 1 Assignment 1 September 21, 2014 1). What background information do you need to know in order to read this image intelligibly? You do not need any background information to read this visual argument. This photo is self-explanatory. 2). What do you see? I see a man verbally abusing a lady. What are the key details or features here that stand out? The man’s face, fist punching the lady from his mouth, and the pain on the ladies face all stand out to support my theory. What images? The image is self-explanatory. What text? There was no text to support this visual argument. What supporting details? Every aspect of this photo supports my argument. 3). Identify the issue(s): Based on the picture it presents, what issue does this visual seem to be referencing? This visual seem to be referencing verbal abuse. This is a great picture to really explain how words can be painful. What debate is it part of? The visual debates the seriousness of verbal abuse and the effects. 4). Defining the Perspective: What side in this debate is this visual taking? The visual is taking the side of women, showing how men verbally abuse women. What perspective on this issue does this visual seem to take? This visual seem to support the seriousness of verbal abuse. It shows how people’s words can really be as painful as a punch in the face. 5). Defining the Argument: How do we know what side of this debate the visual is taking? This visual is taking the...

Words: 911 - Pages: 4

Premium Essay

Test

...ITT Technical Institute IS3340 Windows Security Onsite Course SYLLABUS Credit hours: 4.5 Contact/Instructional hours: 60 (30 Theory Hours, 30 Lab Hours) Prerequisite(s) and/or Corequisite(s): Prerequisite: NT2580 Introduction to Information Security or equivalent Course Description: This course examines security implementations for a variety of Windows platforms and applications. Areas of study include analysis of the security architecture of Windows systems. Students will identify and examine security risks and apply tools and methods to address security issues in the Windows environment. Windows Security Syllabus Where Does This Course Belong? This course is required for the Bachelor of Science in Information Systems Security program. This program covers the following core areas:    Foundational Courses Technical Courses BSISS Project The following diagram demonstrates how this course fits in the program:    IS4799 NT2799 IS4670 ISC Capstone Project Capstone ProjectCybercrime Forensics NSA    NT2580 NT2670  Introduction to  Information Security IS4680 IS4560 NT2580 NT2670 Email and Web Services Hacking and Introduction to  Security Auditing for Compliance Countermeasures Information Security Email and Web Services      NT1230 NT1330 Client-Server Client-Server  Networking I Networking II  IS3230 IS3350 NT1230 NT1330  Issues Client-Server Client-Server  SecurityContext in Legal Access Security Networking I Networking II   NT1110...

Words: 2305 - Pages: 10

Premium Essay

Essay

...Joseph Watts EN1420 Raspante May 6, 2013 Annotated Bibliography Mackenzie, M. H. (2012). Let Women Fight. Foreign Affairs, 91(6), 32-42. An essay is presented on women serving in direct combat roles in the U.S. military. The author presents a case for changing U.S. law to permit women in all military roles. She notes that many women have served in the U.S. military, including in war zones, and says that the distinction between combat and non-combat roles has eroded in the context of contemporary warfare. She discusses the main arguments against women in combat, including their performance and effect on unit cohesion. Author Megan Mckenzie, in the article, “Let Women Fight,” from the journal Foreign Affairs, discusses the ability of women to serve in full combat units. She is avid about changing the laws to allow women full integration into combat infantry units, due to the history of women serving in combat roles in the U.S. Military (McKenzie 2012). McKenzie, argues that the lines that once existed, dividing combat roles from non-combat roles, in the U.S. Military has become blurred with today’s combat (McKenzie 2012). Due to this phenomenon, women have found themselves in the heat of combat, making them natural candidates for the allowance of women to fulfill these roles on a more permanent basis (McKenzie 2012). Simons, A. (2000). Women Can Never `Belong' in Combat. Orbis, 44(3), 451. Presents views on the debate over the exclusion laws in the United States which...

Words: 393 - Pages: 2

Premium Essay

Nt1230 Syllabus

...operating principles for the client-server based networking systems. Students will examine processes and procedures involving the installation, configuration, maintanence, troublshooting and routine adminstrative tasks of popular desktop operating system(s) for standalone and network client computers, and related aspects of typical network server functions. Client-Server Networking I Syllabus Where Does This Course Belong? 1st QTR GS1140 NT1110 GS1145 Problem Solving Theory Computer Structure and Logic Strategies for the Technical Professional 2nd QTR NT1210 Introduction to Networking NT1230 Client-Server Networking I MA1210 College Mathematics I 3rd QTR NT1310 NT1330 MA1310 4th QTR PT1420 NT1430 EN1320 5th QTR PT2520 NT2580 EN1420 6th QTR NT2640 NT2670 CO2520 7th QTR NT2799 SP2750 Physical Networking Client-Server Networking II College Mathematics II Introduction to Programming Linux Networking Composition I Database Concepts Introduction to Information Security Composition II IP Networking Email and Web Services Communications Network Systems Administration Capstone Project Group Theory The follow diagram indicates how this course relates to other courses in the NSA program: 1 Date: 8/31/2012 Client-Server Networking I Syllabus NT2799 NSA Capstone Project NT2580 Introduction to Information Security NT2670 Email and Web Services NT2640 IP Networking PT2520 Database Concepts NT1330 Client-Server Networking II NT1230 Client-Server...

Words: 1834 - Pages: 8

Free Essay

Unit1 Assign1 Roberts Comp2

...John Ertel Unit 1 Assignment 1 Sherri T. Roberts EN1420 - Composition II 9/25/2012 Unit 1 Assignment 1 1. What did you think when you encountered the word argument as you began to read this chapter? What do you think now? A. When I first encountered the word “argument” in this chapter, I immediately thought of the shouting matches that I would so often engage in with my father. However, upon further reading, I have discovered that in reality, argument means any subject upon which there is the possibility of having more than one view or standpoint. 2. Provide three examples of your own to illustrate the statement “Argument is everywhere.” One of your examples should be a visual argument. A. Argument is everywhere. This statement is evidenced by the fact that people everywhere are arguing. Whether is be about Romney's inane babble, or the fact that Obama hasn't fixed the Universe yet, people continue to argue their side of any disagreement. Another good example is bow ties. Some people think that bow ties are not cool. These people would be wrong because bow ties are in fact, very cool. 3. Describe traditional and consensual argument. Give two examples of each. A. Traditional argument is based around winning. It is where two parties are engaged in an argument, not with the goal of convincing the other party that they are right, but instead trying to prove that the other party is wrong. An example of consensual argument is where a group considers all sides of...

Words: 657 - Pages: 3

Premium Essay

Nt2640

...Belong? This course is required in the associate degree program in Network Systems Administration and associate degree in Mobile Communications Technology. The following diagrams indicate how this course relates to other courses in respective programs: Network Systems Administration NT2799 NSA Capstone Project NT2580 Introduction to Information Security NT2670 Email and Web Services NT2640 IP Networking PT2520 Database Concepts NT1330 Client-Server Networking II NT1230 Client-Server Networking I NT1430 Linux Networking PT1420 Introduction to Programming NT1110 Computer Structure and Logic NT1201 Introduction to Networking NT1310 Physical Networking CO2520 Communications SP2750 Group Theories EN1420 Composition II EN1320 Composition I GS1140 Problem Solving Theory GS1145 Strategies for the Technical Professional MA1210 College Mathematics I MA1310 College Mathematics II Networking Technology Courses Programming Technology Courses General Education/ General Studies 1 Date: 7/18/2011 IP Networking Syllabus Mobile Communications Technology MC2799 MCT Capstone Project NT2640 IP Networking MC2560 Mobile Wireless Communication I MC2660 Mobile Wireless Communication II MC2665 Mobile...

Words: 2573 - Pages: 11

Free Essay

En1420 Module 2analysis

...EN1420 Module 2 analysis The article was about a mom having to answer a question from her daughter concerning why a classmate had two moms instead of a mom and a dad and a book that could’ve helped the mom explain it a bit better. While the mother/author was able to both answer and evade the question, and the child accepted the answer, the mother notes that the book mentioned would’ve helped her greatly. 1. A. The claim or thesis for this article is that parents need to be more ready to answer questions posed by their children concerning same-sex couples. B. I agree with this claim entirely, as while some family are the ‘traditional’ family unit (mother/father/child) there are families that have multiple parents of the same gender and children are going to ask about it. 2. A. The warrant or assumption this piece made was that all parents are going to be as accepting of their children knowing another child with same-sex couples. B. The backing for this warrant or assumption is that the author states “you can choose to acknowledge differences and to show respect for love and kindness as Tango does or you can choose to act like a bird of a different feather. It’s called an ostrich.” C. Yes and no. The warrant mentions God, which implies Christianity, which has been one of the loudest groups against same-sex couples. 3. A. The supports for evidence for the claim are as follows. i. the entire article, for starters, it’s about the author’s daughter asking about same sex...

Words: 520 - Pages: 3

Premium Essay

Comp 2

...EN1420 Comp II Unit 5 Project Part II Portner, J. (2005). The Return of School Uniforms. In K. Burns (Ed.), Contemporary Issues Companion. School Violence. San Diego: Greenhaven Press. (Reprinted from Teacher Magazine, 1996, February 14, 15[21]) Retrieved from http://ic.galegroup.com.proxy.itt-tech.edu/ic/ovic/ViewpointsDetailsPage/ViewpointsDetailsWindow?displayGroupName=Viewpoints&disableHighlighting=true&zid=&search_within_results=&prodId=OVIC&action=2&catId=&documentId=GALE%7CEJ3010082216&userGroupName=itted&jsid=c4801c247a7918ca8b7aaf75a46a3bb3 Daniels, S. (2005). School Dress Codes Are Necessary and Constitutional. In J. Carroll (Ed.), Opposing Viewpoints. Students' Rights. San Diego: Greenhaven Press. (Reprinted from Findings, 2001, May) Retrieved from http://ic.galegroup.com.proxy.itt-tech.edu/ic/ovic/ViewpointsDetailsPage/ViewpointsDetailsWindow?displayGroupName=Viewpoints&disableHighlighting=true&zid=&search_within_results=&prodId=OVIC&action=2&catId=&documentId=GALE%7CEJ3010398217&userGroupName=itted&jsid=5b35c1b4b1c2cae05faaabbe58795c7f WILKINS, J. (1999, March). School Uniforms. The Humanist, 59(2), 19. Retrieved from http://ic.galegroup.com.proxy.itt-tech.edu/ic/ovic/AcademicJournalsDetailsPage/AcademicJournalsDetailsWindow?displayGroupName=Journals&disableHighlighting=true&search_within_results=&prodId=OVIC&action=2&catId=&documentId=GALE%7CA54099133&...

Words: 596 - Pages: 3

Premium Essay

Nt1210 Introduction to Networking Onsite Course

...Course Belong? This course is required for the associate program in Network System Administration and the associate program in Electrical Engineering Technology. The following diagrams demonstrate how this course fits in each program. Associate Program in Network Systems Administration NT2799 NSA Capstone Project NT2580 Introduction to Information Security NT2670 Email and Web Services NT2640 IP Networking PT2520 Database Concepts NT1330 Client-Server Networking II NT1230 Client-Server Networking I NT1430 Linux Networking PT1420 Introduction to Programming NT1110 Computer Structure and Logic NT1210 Introduction to Networking NT1310 Physical Networking CO2520 Communications SP2750 Group Theories EN1420 Composition II EN1320 Composition I GS1140 Problem Solving Theory GS1145 Strategies for the Technical Professional MA1210 College Mathematics I MA1310 College Mathematics II Networking Technology Courses Programming...

Words: 4400 - Pages: 18

Premium Essay

Nt 1210

...Course Belong? This course is required for the associate program in Network System Administration and the associate program in Electrical Engineering Technology. The following diagrams demonstrate how this course fits in each program. Associate Program in Network Systems Administration NT2799 NSA Capstone Project NT2580 Introduction to Information Security NT2670 Email and Web Services NT2640 IP Networking PT2520 Database Concepts NT1330 Client-Server Networking II NT1230 Client-Server Networking I NT1430 Linux Networking PT1420 Introduction to Programming NT1110 Computer Structure and Logic NT1210 Introduction to Networking NT1310 Physical Networking CO2520 Communications SP2750 Group Theories EN1420 Composition II EN1320 Composition I GS1140 Problem Solving Theory GS1145 Strategies for the Technical Professional MA1210 College Mathematics I MA1310 College Mathematics II Networking Technology Courses Programming...

Words: 4400 - Pages: 18

Premium Essay

Nothing

...ITT Technical Institute NT1310 Physical Networking Student Course Package Bring this document with you each week Students are required to complete each assignment and lab in this course package on time whether or not they are in class. Late penalties will be assessed for any assignments or labs handed in past the due date. The student is responsible for replacement of the package if lost. Table of Contents Syllabus 2 Student Professional Experience 19 Graded Assignments and Exercises 23 Labs 47 Documenting your Student Professional Experience 57 ITT Technical Institute NT1310 Physical Networking Onsite Course SYLLABUS Credit hours: 4.5 Contact/Instructional hours: 56 (34 Theory Hours, 22 Lab Hours) Prerequisite(s) and/or Corequisite(s): Prerequisites: NT1210 Introduction to Networking or equivalent Course Description: This course examines industry standards and practices involving the physical components of networking technologies (such as wiring standards and practices, various media and interconnection components), networking devices and their specifications and functions. Students will practice designing physical network solutions based on appropriate capacity planning and implementing various installation, testing and troubleshooting techniques for a computer network. Where Does This Course Belong? | | | NT2799 | | | | | | | | NSA Capstone | | | | | | | Project | | | | | NT2580...

Words: 10839 - Pages: 44