Are We Too Dependent On Computers  Term Paper

¶ … statistics and analyzing why this happening. Once this occurs, is when we will offer insights that will help everyone to see the role that computers are playing in the real world. Over the last 70 years, computers have become a vital part of daily life. The reason why, is because these machines have been shown to be effective in dealing with a host of challenges regarding: the storage, retrieval and mathematical calculations of different pieces of data. This has reduced the amounts of space that are used to store this information on paper and it has increased productivity. Once this took place, is when this tool began to improve an organizations ability to compete in global markets.

Then, in the 1970's is when shift took place with private individuals wanting to become involved in various aspects of computers. This led to the development of the personal computer (PC) and the creation of a universal operating system that improved the ability of these machines to communicate with each other. Once this occurred, is when there was a long-term shift, with computers playing a central role in everyone's lives. As a result, the use computers have become an essential part of what society needs to communicate and stay informed.

Evidence of this can be seen by looking no further than the below table which is illustrating the total amount of computer ownership in households based upon the age demographics.

Computer Ownership in U.S. Households (in millions)

Age

Total Number of Households

Under 25-year-old

6,635

25 -- 34

19,811

35 -- 44

22,180

45-54

25,034

55 and over

45,636

Total

119,926

("Computer and Internet Usage," 2009)

These different figures are illustrating how the majority of American households are using computers to be entertained and stay informed. This is significant, because it is showing how PC's have become a major part of everyone's lives. To fully...

...

Once this occurs, is when we can be able to determine if society has become too dependent upon computers.
The Use of Computers by Consumers

Since the mid-1990's there has been a shift in consumer psychology. What is happening is technology has advanced to the point that many machines are: smaller, more powerful and cheaper. These factors allowed the general public to afford purchasing a host of personal computers. As time has gone by the speed, memory and capabilities of these devices have become more advanced. This has allowed the consumers to be able to use their computers for entertainment, shopping and to stay informed. Over the course of time, this has created situation where larger numbers of households are spending longer hours on their computers. A good example of this can be seen by looking at the below table for household Internet usage.

Household Internet Usage (in millions)

Demographic

Amount

Percentage

Under 25-year-old

4,443

67.0%

25 -- 34

14,707

74.2%

35 -- 44

17,249

77.8%

45 -- 54

18,982

75.8%

55 and over

26,558

58.2%

Total

81,939

68.7%

("Computer and Internet Usage," 2009)

These figures are important, because they are showing how the majority of households have Internet access available. This is changing the way that most people are living their lives, with computers and the Internet playing a central role. Over the course of time, this has created situations where an individual would rather stay on the computer vs. conducting some kind of face-to-face communication. Instead, most people have begun to use social networking, texting, email and instant messaging to speak with one another.…

Sources Used in Documents:

Bibliography

Computer and Internet Usage. (2009). BLS. Retrieved from: http://www.census.gov/hhes/computer/publications/2009.html

Computer and Internet use at Work. (2009). BLS. Retrieved from: http://www.bls.gov/news.release/ciuaw.nr0.htm

Uses of a Computer. (2011). Buzzle.com. Retrieved from: http://www.buzzle.com/articles/uses-of-computer.html

Uses of Computers and Internet. (2010). ISSMO. Retrieved from: http://www.issmo.org/use-of-computers-and-internet-in-entertainment-industry.html
Uses of a Personal Computer. (2011). Think Quest. Retrieved from: http://library.thinkquest.org/C007091/uses.htm


Cite this Document:

"Are We Too Dependent On Computers " (2011, December 12) Retrieved April 26, 2024, from
https://www.paperdue.com/essay/are-we-too-dependent-on-computers-48424

"Are We Too Dependent On Computers " 12 December 2011. Web.26 April. 2024. <
https://www.paperdue.com/essay/are-we-too-dependent-on-computers-48424>

"Are We Too Dependent On Computers ", 12 December 2011, Accessed.26 April. 2024,
https://www.paperdue.com/essay/are-we-too-dependent-on-computers-48424

Related Documents

Computer Dependence The story of Pandora's Box reveals the dangers that technology brings along with its many gifts. Today, some very interesting cultural changes are beginning to take hold of society that stems from the dependence on technology and the way that it is interwoven into culture. The purpose of this essay is to examine the relationship between computer technology and the corresponding dependence that is created by this relationship. This

Computer Security: Corporate Security Documentation Suitable for a Large Corporation Item (I) in-Depth Defense Measures (II) Firewall Design (III) Intrusion Detection System (IV) Operating System Security (V) Database Security (VI) Corporate Contingency of Operation (VII) Corporate Disaster Recovery Plan (VIII) Team Members and Roles of Each (IX) Timeline with Goal Description (X) Data Schema (XI) Graphical Interface Design (XII) Testing Plan (XIII) Support Plan (XIV) Schematics Computer Security: Corporate Security Documentation Suitable for a Large Corporation (I) In-Depth Defense Measures Information Technology (IT) Acceptable Use Policy The intentions of

This report will hopefully pull together the research available with regard to this issue, and also identify what users are most at risk for virus attacks. The research currently available also confirms that modern viruses are becoming more insidious and complex, with the potential to incur more damage to computers and data than in the past. Studies suggest that newer versions of viruses may escape detection using standard anti-viral software.

To some users of personal computers, who state, never trust a computer that you cannot lift; the IBM has been viewed, more often than not, as an enemy, and according to Byte, the computer magazine, this was because of the fact that the IBM company rose to fame mainly on the basis of its mainframe computers, that were large and forbidding, and overwhelmingly bulky. This was probably why, when

The public-key cryptography approach also creates a more efficient means of cryptographic security by ensuring RSA-compliant encryption and decryption throughout the secured network (Sarkar, Maitra, 2010). As a result the use of public-key cryptography hardens and makes more secure each connection and node on a network (Chevalier, Rusinowitch, 2010). C3. What will help you trust a public-key that belongs to an unfamiliar person or Web site, and why does it

Computers and the Internet
PAGES 5 WORDS 1343

Computers and the Internet The Naked Mind When Roszak refers to the "naked mind," he means to speak about the capacity and ability of the human mind as compared to the capabilities that the computer machines can do. According to Roszak, how the human mind works has vital differences from how computers process information. Roszak praises the human mind because according to him, the human mind is more dynamic and more independent