Nt1310 Unit 1 Research Paper

Improved Essays
1. I think that I would rather have a conversation with others in phone because it limits the chances of misinterpretations. I mostly text my friends or family because if they’re busy with something, it is just more convenient for them to check their phone and see that I texted them. Another great reason I rather text is because I come from a big family and if there was an emergency, one person’s text can be sent to everyone in my family text group. The only thing that I hate is because I can send anything with emotion in the message, so conflicts would arise. I personally been in those situations where another person would be mad at me all because I sent something they think is offensive. It could have all been avoided if I just called.
2. People sacrifice conversation for connection because as technology become more advance, it just easier for conversation from a touch of a button. We as a society has become so dependent on connecting through social media that we forget to have conversations with the person right next to us. As were all connected to social media, we have in the back of our mind that we can communicate with someone in a touch of a button. We choose to take the easy way out and contact with them through social media rather than having a face-to-face conversation. We chose to bond
…show more content…
I agree because we rely too much on technology. We can call someone without even pressing a button. Why bother checking the news for weather when I can just check my phone? There is literally an application for anything. We expect technology to do everything for us that the need for human assistant isn’t required. I’ve have seen people lose weight because they followed an app rather than hire a personal trainer. Anything that we could possibly need is at the touch of a finger tips. In the future, every job will be run by machine. Regardless if it’s a job as a fast food worker, teacher or doctor, we will be replaced by machine because we choose not to rely on

Related Documents

  • Decent Essays

    1. Name two creatures that have been discovered since you were born. Titi Monkey and Dumbo Octopus have been discovered since I was born. 2. How tall would a redwood be compared to you right now?…

    • 317 Words
    • 2 Pages
    Decent Essays
  • Improved Essays

    Microsoft Hyper-V Server 2012 R2 is a server designed for virtual machine (VM). Virtualization is creation include storage, device, operation system as virtual rather than physical. Almost similar to VMware vSphere as virtual machine. VMware vSphere is cost for VMware install on server. But the features will be available than Microsoft Hyper-V Server 2012 R2 because it is free virtual machine for stand-alone.…

    • 637 Words
    • 3 Pages
    Improved Essays
  • Improved Essays

    1. I have completed my survey for the Information Technology Infrastructure Library Course and have received my passing score 26\40. 2. Kim Rymsha’s computer is back in her office and both her personal and network printers have been connected to her Pc. 3. Docsvault has been completely installed on Lisa Cabrera.…

    • 685 Words
    • 3 Pages
    Improved Essays
  • Improved Essays

    There are numerous reasons why there is a need for every home cook to own stainless steel bowls. The bowl made from stainless steel has a very durable built and it can even be your partner for a lifetime. These bowls can also keep all your cold items in its cool state as it insulates the items. If you have noticed in parties and social events, there are bowls made from stainless steel used for keeping items such as water, lemonade, soda and others, in order to keep it cool. Placing the bowl on the freezer for only very few minutes will allow it to keep those items placed on it for longer period.…

    • 513 Words
    • 3 Pages
    Improved Essays
  • Improved Essays

    Nt1330 Unit 1 Final Paper

    • 456 Words
    • 2 Pages

    ii. Give the id the absolute minimum privileges necessary to host the site on the web server. For example, it’s more likely than not read access to the website itself, write access only to folders updated by the web site, etc. iii. Change IIS so that the domain account is utilized to run the application.…

    • 456 Words
    • 2 Pages
    Improved Essays
  • Improved Essays

    The following are the top 10 types of packets: IPv4: Internet Protocol version 4 (IPv4) is the standard version of the internet protocol, that acts as the platform for standard internet protocols and existing internet models (ISP). Extensive use of this protocol led to exhaustion of IP addresses. Therefore, we are bound to use IPv6, in the near future. A feature called as sub-netting is used for IP address allocation. It is defined in RFC 791.…

    • 917 Words
    • 4 Pages
    Improved Essays
  • Improved Essays

    Task 1 In Unix/Linux operating system a user can have root access or not, the root access provides complete access to user of a system. There are some following risks to have a single root user on Unix/Linux operating system. Easy to hack: If any security error broke the security then a hacker can get the access of all data and can get the whole control of hardware. It allow to retrieve all files and data without root access.…

    • 1228 Words
    • 5 Pages
    Improved Essays
  • Improved Essays

    How to Configure a VPN Connection in Windows 8.1 A VPN is one common method of extending a private network across the Internet and gain access to network resources from a remote location in a secure manner. A virtual private network (VPN) is a private network that uses public telecommunications infrastructure, usually the Internet, to connect to a private network, such as a company's internal network infrastructure. A VPN remains private by using a secure tunneling protocol and other security mechanisms including encryption. This ensures that only authorized users can access the private network and that the data cannot be intercepted by anyone else. A virtual private network makes it possible to have the same privacy and protection when sharing network resources across WANs.…

    • 638 Words
    • 3 Pages
    Improved Essays
  • Improved Essays

    Nt1330 Unit 6 Term Paper

    • 620 Words
    • 3 Pages

    1. Structural ex ante constrains on the agencies that prevent deviations before they occur “The most effective means for achieving policy stability are constraints on the flexibility of agencies, rather than reliance on rewards, punishments, and oversight.” Enfranchising the constituents of presidents and congress through administrative structure and process, we can constrain the bureaucrats. We should clarify each political player’s responsibility and right by regulations and laws with negotiation and bargain.…

    • 620 Words
    • 3 Pages
    Improved Essays
  • Improved Essays

    Application / Files sharing between computers Windows Homegroup Windows home networking has been extremely complicated to configure in the past, but Homegroup is easy to set up. Just create a Homegroup from the Homegroup option within Windows Explorer (File Explorer on Windows 8) and you’ll get a password which enables you to access fromyour nearby computers and they can join your Homegroup. The other members of the Homegroup will now have access to your shared files when they log ON to the same network — then you may select the libraries whichever you want to share while you create a Homegroup. Dropbox LAN Sync Many people exchange files between their computers by synchronising them with any one of the cloud storage solutions like Dropbox, Google Drive, or SkyDrive. This can take a while — the file first gets uploaded to your cloud storage provider’s servers and then it gets downloaded back to your other computers.…

    • 457 Words
    • 2 Pages
    Improved Essays
  • Improved Essays

    NT1410 Module 5 Exercise 1 Securing Desktop & Mobile Operating Systems Sierra Baltins Friday Whether or not a person uses a desktop or mobile operating system, there are forms of protection available. There are several operating systems that offer protection to the user, but some operating systems are more vulnerable than others. Mobile devices may automatically provide the user with different security systems than the desktop can offer. Either way, these security systems are designed to stop cyber-attacks.…

    • 635 Words
    • 3 Pages
    Improved Essays
  • Superior Essays

    Nt1310 Unit 2 Term Paper

    • 1473 Words
    • 6 Pages

    Question 3 HIV can be transmitted from the HIV positive mother to the infant during pregnancy, labor, delivery, and breastfeeding. Without an intervention, transmission rates range from 15% to 45%, but the rate can be reduced to below 5% with effective prevention programs (1). These interventions are known as prevention of mother to child transmission (PMTCT). PMTCT involves antiretroviral treatment (ART) for both the mother and infant. PMTCT also includes procedures to prevent HIV acquisition in the pregnant woman and provides breastfeeding practices.…

    • 1473 Words
    • 6 Pages
    Superior Essays
  • Improved Essays

    Better Than Human Summary

    • 997 Words
    • 4 Pages

    “It is safe to bet that the highest-earning professions in the year 2050 will depend on automation and machines that have not been invented yet” (308). Once again if you look at people and look at a graph of reliability in relation to time it would look like a hill but if you were to look at the same graph for robots and technology it would be a steady line across., people are simply less reliable and effective than…

    • 997 Words
    • 4 Pages
    Improved Essays
  • Improved Essays

    When people apply for a job you cannot just text in an application and expect to get the job. People will not be ready for any sort of interviews or jobs that involve them holding a conversation with someone in person. People are getting too comfortable sitting behind their phones and computers that it has affected how they live their lives. They fear to be judged in person so they speak over text or email to somehow avoid this judgment.…

    • 1739 Words
    • 7 Pages
    Improved Essays
  • Improved Essays

    With the perception of convenience, we have surrendered our privacy to companies only interested in maintaining their relevance without regard for personal safety and financial privacy. As these technologies are adopted and grow, their profitability is unimaginable. There is a coming plateau where the technology we use for convenience will render humans unemployable. Robots will be developed to replace humans in repetitive tasks. The workplace of the future may be filled machines, machines and more machines with a select few educated human capital that have gone beyond an entry level Bachelor’s degree and a continuing education MBA.…

    • 1268 Words
    • 6 Pages
    Improved Essays