The digital divide is the gap between those who have access to the Internet and those who do not. It also has to do with the amount of information people with Internet can access. The speed of the Internet connection, the price of the Internet, and the performance of the computers available all play a part in the digital divide. The digital divide is found in different socioeconomic groups, the educated and uneducated, and between less industrialized nations. Governments around the world play a role in the digital divide as well with different censors on websites. The United States has some of the least amount of censors, but countries such as China block many websites they do not want the general public to access. …show more content…
Social mobility, economic equality, and economic growth are all ways to close the gap. Removing the high prices and gap is something the government could do. Through my research I found the government has a high impact on the digital divide. Especially in other countries, but even here in America. Taking the high prices of Internet away, and finding ways to make internet accessible in all areas would help many. Using power lines and satellite communications can be one way to offer internet to those living in rural areas. Economic equality cannot be achieved without depleting the digital divide as many careers require internet to succeed. Social mobility will be stopped for those in a lower socioeconomic status without Internet as many education systems use the internet. Competitive advantage of economic growth has come from technology, but also exploitation off technology has given countries advantage. Cutting out the exploitation will help economies of struggling …show more content…
Hacking quickly became a resolution to correct or improve issues without any intent of it ever being used maliciously. This quickly took a turn over the next decades when hacking was used for prank calling. In 1980s, computer hacking was established when two computers responded to each other after being connected to a telephone line. From here, chats and bulletins were formed to share secrets and tips to hacking that would revolve into years of illegal computer