Computer Technology: Why Should We Use A Computer?

Superior Essays
Have you used a computer today? Well if you have, I bet you thought all the stuff you stored on it was safe. I am going to tell you why it is not. We should not rely on computers so heavily because people store too much personal information on their computers, terrible cyber security, and hackers are too advanced.
A computer is an electronic device for storing and processing data, typically in binary form, according to instructions given to it in a variable program. We use these electronic devices to research and do our daily jobs. These computers are hooked up to the internet that contains all of the computer’s answers. Internet is the global system of interconnected computer networks. Many people live their lives relying on these devices
…show more content…
Computers are so much more advanced now than they were even five years ago. We rely on this technology to perform under very high circumstances. Most medical information is stored onto computers, which can be scary. It is scary because so many people can hack into our computer systems and change our information. Which could result into something very bad if we do not improve our computer security. Computer hacking is a big thing that needs to be stopped if we are going to rely on computers so heavily in the future. According to CNN, 47 percent of adults in the U.S. had their personal information exposed by hackers ("Half of American adults"). With everyone’s personal information and everything else stored on their computers, people must be careful. Computers are very helpful tools in our society today; they help us with everything from medical info to the stock market. If we use these computers safely they could help us obtain things we never thought possible, especially because our computer technology gets better every day. At the same time we must be careful with what personal information we put on our …show more content…
That is why I am going to tell you to keep your personal information off your computer. The type of information people store on computers varies from health care information to their bank account, which are all very important. According to Gallop.com over 100,000 people were surveyed, and 62 percent said they have a phobia of having their computer or smart phone hacked. That is why having all of your personal information on your computer is such a big deal. Many people say that these hackers will never get into their personal information so they are not worried, but they should be. In the last twelve months alone, hackers have exposed the personal information of over 110 million adults, which is roughly half of the nation’s adults. Still think that having your personal information on your computer is secure? This is why we should not rely on our computers to hold all of our valuable information. Computers are a valuable tool, but they are not a filing cabinet. The opposition is not just a couple people in the U.S. however, nearly every American that owns a computer has at least some personal information stored in their non-trusty computers. We need to realize we do not possess the technology to keep these hackers out of our beeswax. The only way to stop our information from being stolen is to remove it from your computer, because once it is in there it is gone in a blink of an

Related Documents

  • Improved Essays

    Nt1310 Unit 9 Final Paper

    • 586 Words
    • 3 Pages

    Internet Usage The possibility of being attacked by a hacker of any kind is very real. This understanding is why an organization should limit the availability of Internet websites across the board. In doing so this helps mitigate potential threats from malicious software and users from stealing valuable data that belongs to the…

    • 586 Words
    • 3 Pages
    Improved Essays
  • Improved Essays

    “The first computer viruses hit computers in the early 1980s, and essentially we’ve been in a cyber-arms race ever since. We design new defenses, and then hackers and criminals design new ways to penetrate them….We’ve got to be just as fast and flexible and nimble in constantly evolving our defenses.” -President Barack Obam…

    • 428 Words
    • 2 Pages
    Improved Essays
  • Great Essays

    Blown To Bits Book Report

    • 871 Words
    • 4 Pages

    The chapter opened by discussing how digital information that people may think is hidden, or even destroyed, is often still accessible to the public. The authors described how the bits that store a given piece of information are never destroyed, but simply overwritten by other data when files are replaced or “deleted.” The descriptions of the people who sold their devices to people, only to have the people who bought their devices to discover personal identification information, “deleted” documents, and even credit card account…

    • 871 Words
    • 4 Pages
    Great Essays
  • Decent Essays

    Analysis: Blown To Bits

    • 312 Words
    • 2 Pages

    Chapter two of Blown to Bits by Hal Abelson, Ken Ledeen, and Harry Lewis was about how technology affects our privacy. In this chapter, the authors discussed how our privacy is being stripped away, the willingness with which we give this privacy away, and privacy policies. As experts in technology, Abelson, Ledeen, and Lewis discuss how technology has aided this progression of human ideologies to lead increasingly more public lives. Our privacy is constantly being stripped away from us thanks to the technological innovations. As technology becomes more and more widely used, more and more personal information is being stored through technological means.…

    • 312 Words
    • 2 Pages
    Decent Essays
  • Improved Essays

    Is Google Making USupid

    • 337 Words
    • 2 Pages

    Today’s world is built upon informative, connected networks that is the internet. The internet is simply an infinite database in which anyone that has a computer can access. Despite what some may argue, the internet is not making us stupid. Instead, the internet simply provides society with useful information at a stroke of a key.…

    • 337 Words
    • 2 Pages
    Improved Essays
  • Improved Essays

    The Cold War: How the Icy Rivalry Gave Us Fiery Technology Throughout history, we have experienced many technological influences, inventions, and innovations, many of which have changed the world and how we live in it. Our modern era depends on new, cutting-edge technology, but few look back to the origin. Some people believe that war brings new technology, since war motivates. Whether in the form of a theory, weapon, tool, or all three, the Cold War stands true to this and but this and played a major part in the advancement of our modern technological society by developing instruments for space exploration, bringing the advent of the internet, and upgrading operational capabilities of the computer.…

    • 881 Words
    • 4 Pages
    Improved Essays
  • Improved Essays

    Technology has shaped many parts of our lifestyle’s from movement from one point to another (GPS), all the way to maintaining all of our hard earned funds on a piece of plastic. The question at hand is how this is all protected and who enforces it? Network security has proven beneficial in many cases in today’s society. It continuously monitors the companies system ensuring that unauthorized access isn’t permitted, or as we like to believe keeping our information from falling into the wrong hands.…

    • 397 Words
    • 2 Pages
    Improved Essays
  • Superior Essays

    Nevertheless, Park doesn't fail to address some more of the reality that we face in the everyday world _ robbery. Basically, we apply every other measure to keep our personal and social life as well as our monetary fund away from strangers in the real world. And we keep ourselves up to date with the passwords while constantly changing it at regular intervals required, especially with the credit cards and social Google accounts. But still hackers and robbers will find the best way out to decrypt our passwords from us through the worst of ways; surely for their own personal benefits and profits. This existing problem is shown along with clarity over the short story that Park presents.…

    • 1975 Words
    • 8 Pages
    Superior Essays
  • Improved Essays

    Informatics Electronic Health records: A boon or privacy nightmare? Health records are supposed to be private and secure. This article shows how not all health records end up being private and secure. Health records were stored in different ways. People were trying to steal private information.…

    • 570 Words
    • 3 Pages
    Improved Essays
  • Improved Essays

    Opm Hack

    • 896 Words
    • 4 Pages

    With the expansion of technology and the Internet, people fiercely protect their online identity to include regularly changing and safeguarding online passwords, upgrading security scans to keeps computers protected from viruses. However, personal and sensitive information exists online, and it is vulnerable even when safety measures are in place. This vulnerability led to a compromise of the Office of Personnel Management (OPM) database and sensitive information was obtained by unauthorized sources. Living in the information age is exciting and convenient. People can sit at their computers and conduct research without ever having to consult a print-version encyclopedia, shop without ever having to leave the comforts of their…

    • 896 Words
    • 4 Pages
    Improved Essays
  • Decent Essays

    The word security has changed over time in different ways including what it means, context, and what it really stands for. Security in today’s age means the state of being in good protection from danger. However, looking back the definition was more so related to social status and economic security meaning you were making steady income. Both still mean protection from danger, as in now we think of it as protection for life but back then it was protection from what people thought you were, homeless or poor. Let's look at the text 1, Declaration of Independence, which talks about its contextual meanings.…

    • 457 Words
    • 2 Pages
    Decent Essays
  • Improved Essays

    With the advancement of technology comes a startling decrease in privacy. Nothing is considered ‘personal’ by the internet, or private, or kept a secret. Anything put on the internet is forever immortalized. Technology like cellphones, laptops, and drones have invaded the sense of personal privacy and eliminated the prospects of privacy returning to those who possess technology.…

    • 382 Words
    • 2 Pages
    Improved Essays
  • Improved Essays

    In our daily lives, we relinquish some of our private information ignorantly. As human beings, many of us tend to simply hand out our information in exchange for other items or free services. Many times, online shopping offers better prices but at what cost? Sometimes, better prices means relinquishing your private information that could be obtained by anyone at anytime. In the article, The Convenience-Surveillance Tradeoff, the author makes compelling points on how our society is unaware of the repercussions that come with relinquishing our…

    • 1456 Words
    • 6 Pages
    Improved Essays
  • Improved Essays

    In his article entitled “Internet Access Is Not a Human Right” published on the website of The New York Times on 4 January 2012, Vincent G. Cerf, a vice president and chief Internet evangelist for Google, presents his perspective on a controversial issue regarding access to the Internet. He argues that access to the Internet should not be accepted as a human right, “it’s just a tool to achieve those rights.” According to Internet World Stats (2014), over a third of the world’s population are accessing the Internet as a part of their everyday life. This proves that the Internet plays numerous significant roles in society. It makes our lives easier and more convenient than in the past, by providing information, education, communication, business, and freedom of expression.…

    • 1148 Words
    • 5 Pages
    Improved Essays
  • Improved Essays

    Today’s internet has become an integral part of our daily lives. It changed the world in so many positive ways, but it has also a negative side to it. The negative issues that we are facing today with internet are our online privacy and data breaches. Recently, many people were divided in terms of their strong views about the importance of privacy and the exchange “between security needs and personal privacy” (Rainie & Maniam, 2016) as millions of Americans were also affected by online threats and privacy breaches and at the same time concerned with our security. The focus has been on government monitoring, although there are some other significant issues and concerns about how industries use our data.…

    • 952 Words
    • 4 Pages
    Improved Essays

Related Topics