deception of the mind. In The Matrix, Neo, the main character, accidently stumbles upon finding out that the entire human race is laying unconscious, hooked up to wires and their minds being controlled by a large computer. They are all living in a virtual world and are playing out mock simulations coordinated by the computer. This simulation is called the “Matrix” (“Synopsis: The Matrix,” n.d.). In The Allegory of the Cave, the prisoners reason that the shadows of the cave are in fact objects of…
The year is 2045. The world is overpopulated, unemployed, short of energy and basically falling apart. The only thing that keeps the world going is a simulation game called OASIS, a virtual reality simulation game created by James Halliday. Ready Player One is a book by Ernest Cline which falls in the genre of Sci-Fi and dystopian. The book starts out introducing Wade Owen Watts, the main character. Wade is 18 years old and wants to find the Easter Egg in OASIS, which Halliday left behind as…
restrictions. On January 6th 2014 China lifted a ban on video game consoles, a ban that for 14 years made it illegal to purchase any major video game system. While…
works by creating a world that people can easily adjust to. In this essay, I argue that the virtual world lowers your expectations of the real world, that using technology connects and isolates people, and that technology creates artificial outcomes that cannot tell someone how a situation will turn out. A person’s concept of reality can be easily altered by how much time he or she spends in the virtual world and how it allows you…
The creation of the internet and social media has permanently changed how people interact with one another. Millions of people log on to the internet daily for the purpose of interaction. Additionally, according to Nils Smith, social media is the most popular activity on the internet. This twenty-first century phenomenon is a great opportunity for churches to capitalize on this innovative technology using it as a ministry tool for evangelism. Thousands of people use social media daily, but…
Plato’s ‘Allegory of the Cave’ presents the theory that every individual goes through a ‘cave’ in life, and eventually becomes enlightened. In the cave described by Plato, prisoners are powerless and chained to the wall. The prisoners are missing out on all the things happening behind them, like the fire and the puppets. What they can see and hear are shadows and echoes. When the prisoners tried to get out of the cave, they couldn’t face the real world; they had mistaken appearance for reality.…
Carolyn Gregoire states in the article “Why are millions of people spending so much time watching others play video games?” that people cannot experience 100% of social activities in real life through internet media. Online media also decrease people’s social ability in real life. In the news, Gregoire shows that most American adult spend almost a half day to watch other players play video games on Twitch.tv. Those audience and players have their own community in Twitch.tv where they can chat…
In the graphic novel, the Pride of Baghdad, animals were used to represent different types of Iraqis people. These animals were identified based on how they were depicted by Brain K. Vaughan and Niko Henrichon. The author and illustrator of this novel used dark aggressive colors and tones to lead the audience towards a negative vibe in a character by how they formatted, styled, and characterized the characters in the pages of the novel. The page used to support this statement is the page of the…
Deep, dark secrets are not an aspect of life that came to age with 21st century technology. However, through the modern medium of the World Wide Web, there has been a new cultural phenomenon called “PostSecret,” which provides people a window to anonymously share their secrets. This phenomenon began in 2005 when Frank Warren initiated an art project that welcomed people to anonymously mail him their secrets on postcards. Since 2005, on every Sunday Warren has released new batches of secrets so…
registers, among other processes, for virtual operations at the hardware level (Beaver, 2016). It exploited the fact that the virtualization technology was vulnerable, and entered the system through administrative access. When users installed a new version of Windows, they usually installed many programs and services of which they were not aware (South University Online, 2016). The ‘Blue Pill’ took advantage of this vulnerability and infected the virtual system. Therefore, in a business…