Topic: consequences of believing in false myths about technology
Purpose: To Inform my audience about the consequences of believing in false myths about technology.
Introduction
I. Attention Getter: Have you ever heard myths concerning your phone or maybe your tablet or even your laptop? If you have, did you ever believe them? Did you ever think of the consequences if they were wrong? Well today I will be taking about some of the most common myths that are actually false about our gadgets and their possible consequences.
II. Credibility Statement: I constantly come across different myths concerning my gadgets and I am always skeptical about them at first. So I always research about them and I even experienced some of the effects of believing
…show more content…
These myths are great time wasters.
1. For example, the myth that “if you don’t properly dismount your USB it will corrupt the data”
a. This is true, but only if you remove the USB while you are in the middle of transferring data.
b. If you aren’t using the USB at all, you can just detach it form your PC without any problems. This is extremely helpful if windows insists that your drive is in use even when it’s not.
2. Another one is “you shouldn’t use your phone while it’s charging”.
a. The truth is, no matter what we do if your phone is not off it will always be running different apps in the background. So using your phone while its charging is fine.
b. Although if you’re using a really heavy app, the battery would probably heat up and as with most electronics long term exposure to excessive heat will degrade the item.
B. They make you needlessly spend money.
1. The more megapixels the better the camera.
a. This is true to a certain extent but at one point the human eye would not be able to distinguish the difference between the higher resolutions.
b. The most important aspect of the camera is not the resolution but the size of the sensor which is responsible for capturing the
…show more content…
They can expose you to security risks.
1. One of the most common beliefs is that mac books don’t get viruses.
a. This is absolutely wrong. Mac books being an electronic device that uses software just like windows PCs can also get viruses.
b. Although the chances of getting one are much lower than PCs running windows. The most common reason is that there is less chance for profit for hackers because there are more people who use windows.
2. Wi-Fi networks with a passcode are safe.
a. This is true at times, like with your home Wi-Fi but public Wi-Fis like those in coffee shops and airports are not safe even though their password protected.
b. Since anyone with a password to this network can connect to it and because it is very easy to just ask for the password you would still be connected to a possible hacker who would like to look into what you’re doing or steal you’re information. This makes the password almost useless for protection.
c. Another thing you might want to take note of is that there are two main kinds of Wi-Fi passwords. Namely the WEP and WPA types of encryptions, If you wish to actually make a secure password or encryption, use the WPA encryptions because they are extremely hard to crack. The WEP encryption on the other hand, can be cracked in mere seconds or
The main difference of a WiFi to Token ring and Ethernet networks is that it does not require a physical media from the source to the receiver to create a network and establish a connection, although WiFi would not compete with speeds of data transfer of an Ethernet. A WiFi connection is made by using a wireless adapter(that converts digital information to radio waves and back with antenna) to create a hotspots that allow access to internet service. WiFi technology is using 802.11 networking standards (802.11a, 802.11b, 802.11n etc. ) that will depend on needs for the user. In wireless networks there are two logical typologies that are use, a star and point-to-point (devices connect directly to each other and do not need access point device to communicate), in general WiFi speed is on average 20Mbps, however it can vary on many factor like distance between users and source or media radio waves has to travel through on the way to the user and
Security: Routing protocols should have security techniques. The routing protocol is highly susceptible to security attacks, because of the inherent features of WSNs, particularly in military applications. 5. Multiple Sources: Almost all of the available routing protocols in WSNs are planned for single source multicasting. Although a multicast group may carry multiple sources due to different types of services or applications simultaneously offered by the network.
Hi all I would like to let all of you know, that all the IT request that you had have been taking care of, I have performed the hardware maintenance to the network and computers and everything should be ok. also, I have been working on meeting the HIPPA compliance for our network and there are some initial points I have been working on 1. I have set up the computer to lock the screens after 5 minutes time of inactivity, this will ensure that computer session are closed when the user is away (is still a good idea to lock the computer every time is not in use) 2. the server room need to have a server shelf or server rack that will keep the It equipment out of the floor.
Password policies are in place for a variety of reasons. These policies are to establish a standard for strong password creation, the protection of the passwords, and the frequency at which it is changed. The Virtual Private Network (VPN) extends a private network across a public network like the internet. It enables users to send and receive data across shared or public networks. This is done as if they were directly connected to the private network.
a) More complex and therefore more time-consuming calculations b) Problem of the secure transmission of the Secret Key c) Less secure encryption function d) Isn’t used any more Answer:b 10. What is the purpose a key during encrypt a message? a)
When asked what a network is, I usually think about the internet or my phone’s network. It had never occurred to me to go further in depth on the subject. In order to fully understand what a network is we must look into what all networks have in common. All networks whether they are a broadcast, a computer, or a business network (the list goes on) all share common traits. There exists a hierarchy within each network and the more connections one has, the better.
Muckraking is what us muckrakers do which is to point out the negatives of the society in which we live in and show how corrupted the government system can be. Also how selfish people can be by treating others and the environment cruelly just for their own beneficial gain. There’s different types of muckrakers such as photographers, speakers and also journalists such as myself who will investigate to tell you the truth of what’s unjust and unfair in the world we live in today. In this article I will talk to you about the innocent civilians of today’s society and about the things that have been going on: such as the unsafe products that companies are making you work with, some of our children having to work jobs that we should have to work, natural resources being wasted disgracefully and other horrible topics as well. Do you think companies really truly do care about their customers or just the benefits they get by having us the people buy the products they sell?
If you have ever watched a basketball game, you more than likely would see one of the players fall. The secret is that no one probably didn’t touch them. They just fell to fall, hoping a foul would be called on the opponent. This is known to most sport fans as a flop. It is considered an art to most players.
Carr brings up the question of how our minds can be negatively affected by this when he asks, “So what happens to our minds when we allow a single tool such dominion over our own perception and cognition?” While Carr is aware that the smartphone serves a countless number of useful purposes and tasks, he believes we should think deeper about the lesser known effects of our smartphones which people so easily allow to take over their lives. Carr begins his article with statistics, stating that the typical smartphone owner checks on their phone over 80 times a day, which translates to almost 30,000 times a year. He calls smartphones our constant companions, comparing them to teachers, secretaries, confessors, and gurus. In fact, Carr includes a 2015 Gallup survey which found that “more than half of iPhone
“Hello America. The word American has always struck me. It is a word that has come to represent over 300 million people. A word that can unite a liberal in California and a conservative in Georgia. A word that personifies how humans should be treated by their government.
People believe technological advances are changing the public’s mind that they must avoid and restrain from using the technologies because they are destroying our experience with real life. This new movement is educating
It’s February, are you really about to read a blog post about Halloween? Call us crazy, but Universal Studios just announced the dates for Halloween Horror Nights (here) and we are already excited! In light of this announcement, we thought we would go over some of the best (and worst) horror attractions from past Halloween’s and maybe even make a couple predictions for this years Horror Nights! Are you one of many that loves to be terrified?
6 years ago, I walked into a small restaurant with my best friend, Jillian, and her parents. Once we were seated, I looked around and saw a man dressed in a green camo uniform, constrained in a wheelchair. Upon further inspection, I realized this man was also missing his left arm. My friend’s dad, Chris, left the table, approaching the man. When he reached the table, he reached out towards the man, shaking his hand.
the fear appeal will be more successful. One example is if people do not stop cutting down trees, oxygen will slowly be depleted until there is not enough to sustain the world. A second example is if the world continues to pollute the environment through developing and using technology as well as wrongful places for garbage disposal, humans, plants, animals, and their environments will be affected by global warming. The next principle is that by increasing the intensity of the fear appeal through evidence and a credible speaker, there is a higher chance of success that the fear appeal will work. A strong fear appeal will cause the audience to be persuaded into making a change.
In only a couple of decades, technology has imbedded itself into people’s lives, to the point it would be difficult to live without using technology. In Neil Postman’s speech “Informing Ourselves to Death,” he explains how not all technology is being used for what its original purpose was, and how people are starting to drown in the useless information technology gives. Postman also makes the claim, “And therefore, in a sense, we are more naïve than those in the Middle Ages, and more frightened, for we can be made to believe almost anything” (5). Though Postman gave this speech about thirty years ago, this accurately describes modern society. Technology was meant to help people learn and improve their lives, but it has instead increased the naivety of the world.