Computer Technology: Why Should We Use A Computer?

Superior Essays
Have you used a computer today? Well if you have, I bet you thought all the stuff you stored on it was safe. I am going to tell you why it is not. We should not rely on computers so heavily because people store too much personal information on their computers, terrible cyber security, and hackers are too advanced.
A computer is an electronic device for storing and processing data, typically in binary form, according to instructions given to it in a variable program. We use these electronic devices to research and do our daily jobs. These computers are hooked up to the internet that contains all of the computer’s answers. Internet is the global system of interconnected computer networks. Many people live their lives relying on these devices
…show more content…
Computers are so much more advanced now than they were even five years ago. We rely on this technology to perform under very high circumstances. Most medical information is stored onto computers, which can be scary. It is scary because so many people can hack into our computer systems and change our information. Which could result into something very bad if we do not improve our computer security. Computer hacking is a big thing that needs to be stopped if we are going to rely on computers so heavily in the future. According to CNN, 47 percent of adults in the U.S. had their personal information exposed by hackers ("Half of American adults"). With everyone’s personal information and everything else stored on their computers, people must be careful. Computers are very helpful tools in our society today; they help us with everything from medical info to the stock market. If we use these computers safely they could help us obtain things we never thought possible, especially because our computer technology gets better every day. At the same time we must be careful with what personal information we put on our …show more content…
That is why I am going to tell you to keep your personal information off your computer. The type of information people store on computers varies from health care information to their bank account, which are all very important. According to Gallop.com over 100,000 people were surveyed, and 62 percent said they have a phobia of having their computer or smart phone hacked. That is why having all of your personal information on your computer is such a big deal. Many people say that these hackers will never get into their personal information so they are not worried, but they should be. In the last twelve months alone, hackers have exposed the personal information of over 110 million adults, which is roughly half of the nation’s adults. Still think that having your personal information on your computer is secure? This is why we should not rely on our computers to hold all of our valuable information. Computers are a valuable tool, but they are not a filing cabinet. The opposition is not just a couple people in the U.S. however, nearly every American that owns a computer has at least some personal information stored in their non-trusty computers. We need to realize we do not possess the technology to keep these hackers out of our beeswax. The only way to stop our information from being stolen is to remove it from your computer, because once it is in there it is gone in a blink of an

Related Documents

  • Improved Essays

    Many websites provide ways to keep your information private and so only the people you want can see it. Also if there wasn’t net neutrality that would mean your private information would be controlled by the government and large corporations. Another reason why people disagree with net neutrality is because of the lack of competition. Since the open internet is not controlled, this makes it so that many companies can’t put competitive pressure on each other. Without the pressure a company like Verizon’s Netflix could drop in performance but would feel no pressure because there is no rival companies to take customers away.…

    • 1138 Words
    • 5 Pages
    Improved Essays
  • Superior Essays

    Hackers In Pop Culture

    • 1655 Words
    • 7 Pages

    For instance, anyone can acquire personal or financial information from documents that have been thrown away and not properly shredded. Cash register attendants could easily steal credit card information when they are ringing up a sale. In today’s society, people can gather a lot of information about a person on the Internet, but hackers should not always be blamed for identity theft or stolen personal information. Society feels that hackers are a bigger risk to their privacy than their personal security. A Pew study found that 86% of Internet and smartphone users have removed or masked their digital footprints for privacy and that Americans are more concerned with hackers violating their privacy than the government (Dredge).…

    • 1655 Words
    • 7 Pages
    Superior Essays
  • Improved Essays

    Not only are they avoiding the probable cause part, but they are rummaging through everyone 's private lives without warrants. As stated in Text 1.2, Paragraph 13, “...police often do not need to show probable cause of a crime when the want to find out details about your life that they used to find in your home. Instead, they can get your private files from corporations that store your records on their computers.” This is completely absurd in the fact that in literally is said in the constitution that the government cannot search or seize any of the peoples documents without a warrant. Although second parties may claim that, since “.. the Supreme Court and other courts have issued a series of rulings declaring that the government does not need a search warrant to obtain personal documents if you have already shared them with someone else. (Text 1.2, Paragraph 10” What is the definition of shared though?…

    • 1138 Words
    • 5 Pages
    Improved Essays
  • Improved Essays

    government to be able to view the information anytime they please. This to the tech-illiterate person may not seem like a big deal, but unfortunately, this creates more problems than solutions as it develops holes in the encrypted program that would make hacking products easier. According to The Center for Technology and National Security Policy in 2009 alone the United States held 40% of all new stored information, therefore we cannot afford to have our products be any less secure. Plus, as the government is the target of hacking attempts all the time, the chance of somebody breaking in and stealing their encryption keys is way too…

    • 804 Words
    • 4 Pages
    Improved Essays
  • Great Essays

    Google should allow this service only on computers that a consumer has verified access on before. They should also restrict access to this feature for those consumers that have a two-step authentication with Google. These two steps would greatly reduce the chance that a hacker could access this sensitive information. Unfortunately, no one yet at Google and those in the technology industry have not discovered that this information could be exploited. When exploring current research, I was unable to find a single source that identified that this information could be hacked and would exploit consumers further.…

    • 1502 Words
    • 7 Pages
    Great Essays
  • Improved Essays

    Electronic Surveillance In today’s society online privacy is an illusion. Privacy simply doesn’t exist to large companies and the government for the simple fact they violate citizen’s fourth amendment rights frequently. Sure where giving passwords and other hopes of security but, once able other to get personal information it’s theirs. It’s not acceptable for the government and large companies to receive personal information without a warren or a legally documented yes from the user of the internet browser. “In any situation the government must wait 6 months before receiving personal data from certain browser users.” Stated by the article NO Warrant, No Problem from www.propublica .org.…

    • 548 Words
    • 3 Pages
    Improved Essays
  • Improved Essays

    This means US authorities can pull records and data about people without warrants or if they have probable cause. The quote from above proves and gives another reason why the statement “our current world is not becoming like the world of 1984” is incorrect. The government doesn 't need to put telescreens in your homes because they can always track you and listen to what you talk about or who you talk to with the cellphones we have. Some people think the world isn 't becoming like 1984, but the evidence provided proves…

    • 1160 Words
    • 5 Pages
    Improved Essays
  • Superior Essays

    Expectation of privacy at the work place has become more of a concern due to the vast expansion in the use of technology. Emails and Internet have made it more easily for employees to have access too reducing the cost of operating. Many companies have had some sort of electronic surveillance at all times on all of their employees, most are installed into the computers that they use to help monitor and make sure that everything is done and the routinely emails report to the person in charge to give them a brief summary of the activity of what the employers are doing at the computers. Employers have obvious reasons of why they would want to monitor the performance of their employees because employers have more concerns especially with the age…

    • 1553 Words
    • 7 Pages
    Superior Essays
  • Improved Essays

    The FBI operates so they can get whatever they need from a company, whether it 's an encryption key or any additional needed information, they fail to keep in mind that these demands will deteriorate a majority of these companies customer’s privacy. In addition, the FBI has seemingly been aware that any backdoor operating system created would not only operate for this particular suspect 's IPhone. Source D, states “ Once created(backdoor operating system), the technique could be used over and over again, on any number of devices.”this means that once he FBI obtains this new IOS system, they would not have to ask for it again in another situation similar to…

    • 1143 Words
    • 5 Pages
    Improved Essays
  • Improved Essays

    Is There a Right Password Years ago people use to worry about their homes been burglarized or getting robbed in the store by pick pockets, but, today that is not the case. With the rapid growth of technology every day, cybercrime has taken over from pick pockets and burglars. “crimes conducted via the internet or some other computer” (Evans, Kendall and Poatsy). With all the dilemmas that the society has to deal with, creating a secure password to protect our personal information from cyber hackers can be very overwhelming. Before it wasn’t so complicated to create a password, but, since then the requirements for a stronger password is special characters that can’t be used more than three times such as;&,@,!,digits, at least eight characters with upper and lowercase letters and should not be in the dictionary.…

    • 638 Words
    • 3 Pages
    Improved Essays

Related Topics