Introduction being able to access their data from

 

Introduction

There have been a number of significant changes in
information technology over the last 20 years. Although there were many
advances from the late eighties up into the late 1990s, much more major steps
have been taken since then. Almost all electronic devices have undergone
extensive transformations and some have been made nearly entirely obsolete,
such as pagers and fax machines. Phones have changed from simple communication
devices to practically universally capable devices for most IT needs. Modern
smart phones have much more computing power than most personal computers from
the 1990s, and perform a much wider range of tasks.

We Will Write a Custom Essay Specifically
For You For Only $13.90/page!


order now

 

 

 Another major
development that has occurred relates to the storage of information. Where
information would have been previously stored on external disks and drives and
internal drives, cloud storage has become a more prevalent method of storing
information. With cloud storage the user has the advantage of being able to
access their data from almost any device with internet access. This method of
storage is much more user friendly as it does not require the user to be in the
possession of any data storage hardware to access their data. Although this may
be a convenient method of storing information, it has drawbacks, which mainly
concern data security and protection. The user’s data is being stored in a
relatively open system when compared with a typical internal hard drive. This
can make it easier for hackers to obtain people’s personal information and
media stored in the cloud.

                                                                 
                                             

              

The
basics of a computer system

The improvements made in the world of electronic
devices are due to the advancement of the basic components that constitute the computing
centres of these devices:

·        
CPUs
or “central processing units”, the
part of the computer’s hardware that carries out the instructions of the
computer program using mathematical, logical and input/output operations, have
decreased dramatically in size in recent years, allowing them to be placed in
smaller devices and for those devices to be much more powerful.

·        
RAM
or “random access memory” is the
memory the computer uses to perform immediate tasks almost instantaneously. RAM
is different to ROM or “read-only memory”,
in that RAM is a volatile memory, meaning it is not stored when the power is
removed. ROM is used when booting up a computer and is not easily changeable.

·        
The Hard
drive is a non-volatile memory device that permanently stores and retrieves
data on a computer. Hard drives in the modern era have many hundreds or
thousands of times the storage capacity when compared with older models years
ago.

·        
Input
and output devices are devices used for putting in or
transmitting data. For example a keyboard or a mouse is an input device, where
as a speaker or a monitor is an output device. A new form of input that
exploded in the early to mid-2000s is the touch screen. These are found on many
devices in the modern day, turning the screen into both an input and an output.

The
impact of social media and internet on education and business

The internet and more
specifically social media have had a profound effect on businesses and
education, some positive and some negative. Businesses, customers and students
all have cheaper more convenient access to information, making it easier to
advertise, study and buy goods online. All of society is able to communicate
quicker and with greater ease than ever before, leading to greater data sharing
and more opportunities for all but also resulting in cyberbullying and people
feeling like they cannot escape from everything that is going on. The ability
to buy and sell goods online allows businesses and customers to save money and time,
but often at the cost of jobs.

                                                                                                                                                     

Positive

Negative

Instant
communication anywhere

Cyberbullying,
Lack of privacy

Online
advertising

Smaller
businesses miss out

Online degrees
and courses

Lack of social
interaction, experience

Online shopping

Unemployment ,
Outsourcing

Banking and
accounts online

Identity theft,
hacking, fraud

Plentiful
entertainment

Distraction from
more important things

 

 

 

 

 

What
should a good policy entail?

When it comes to writing
social media and internet policies, be it for the workplace or for an
educational environment, it is most important to ensure that all staff and
students have protections against online abuses and harassment and that any
infringements be dealt with in the appropriate manner. A policy of inclusivity
should be implemented for online situations that regard the workplace or the
classroom so as not to have any students or employees feel excluded. It should
also be included in the policy that phones and other electronic devices be
restricted from use at times when concentration is require e.g. in the
classroom, at the work desk or when carrying out unsafe work , such as working
with dangerous materials or heavy equipment. In some situations it may be
necessary to have zones off limits to phones and other media devices.

 

 

 

 

 

 

Research

To research this
essay I made extensive use of the internet and various web pages relating to
the subject at hand. I also spoke with a full time educational professional
about cyberbullying and the dangers of the internet and social media in the
classroom and in the workplace. Before I had researched this essay I had not
fully known the extent of the technological advancement the world has
experienced over the last 20 years and I found it to be enlightening and
educational

Author:

x

Hi!
I'm Eileen!

Would you like to get a custom essay? How about receiving a customized one?

Check it out