Essay on information and communication technology

Contents

  1. Similar Essays
  2. Information and communications technology - Wikipedia
  3. ICT development - Essay Example
  4. Files in this item
ICT Digital Essay

To identify and evaluate the presented academic views, the examples will be provide based on real situations. From individuals' perspective, the ICT effects tend to positive track, especially act on quality of life. It is concerned as an initial intention of effect by ICT. The benefit of ICT on people's life may be nuanced, because of people define and experience quality of life in many different ways. But people have to admit ICT contribute to improvement in quality of life in several ways, say, safety, health, social contact.


  • writing a request for proposal rfp cover letter.
  • Post navigation.
  • estroplan research papers.
  • define persuasive essays?
  • Essay on Information and Communication Technology and Education;
  • short story essay italics.

For example, Global positioning systems GPSs a very prevalence tool in most developed countries. It is an integrated guidance system that GPSs associated with geographic information systems GISs to equip modern vehicles. In result, it upgraded the level of safety and convenience to end In WriteWork. However, I am not waywardly inclined towards the cons because ICT have pros as well when used to handle social ills such as terrorist attacks. Knowingly, ICT is the platform for cyber-bullying.

Nowadays, the unending rise of social networking sites that gives birth to Facebook, MySpace and more recently Twitter have shaped how this generation interacts.

Similar Essays

Photos posted that are initially intended to update their lifestyles are altered by stalkers and reposted to dent their reputations. On a more serious note, predators use these sites, especially MySpace, to lash harsh verbal abuses to innocent victims. A search through the dark side of MySpace would let us uncover hatred, vengeance and anger that are unleashed on helpless teens, causing social unrest about the potential psychological trauma the site could trigger.


  1. microsoft bi case studies.
  2. raphael school of athens essay?
  3. Navigation menu.
  4. Ironically, computers, on which we rely excessively to store and save our private data, are the means of hackers to steal, destroy or even be exploited for their own selfish good. This hideous act could easily be done when uninformed surfers of the internet download good-looking software that turn out to be malicious. The social, however, neglect this warning and as a result, cyber criminals gain the upper hand by pocketing social wealth.

    Information and communications technology - Wikipedia

    On a different and larger scale, the leaked photos of Hong Kong celebrities in compromising positions not only stunned the conservative community but shattered the faith of a million fans as well. The main culprit?

    A computer technician who unlawfully search and more importantly, copy the private photographs. Nevertheless, ICT can be useful weapons to counter terrorist attacks.

    https://acevihufim.ml

    ICT development - Essay Example

    The Closed-circuit Televisions CCTVs that are placed literally everywhere in London indicates that it is unlikely for a person to commit a crime and flee unpunished. Better still, the eagle eyes coupled with facial recognition technology would provide clues on the whereabouts of a wanted individual. As an evidence, investigators of the 7 July London bombings — simultaneous attacks on public transports in the morning rush hour that claimed hundreds of lives and injured more — used CCTVs to trace the mindless, heartless bombers.


    • philosophy of teaching middle school essays!
    • Extract of sample "ICT development"?
    • creative writing 101 raymond carver.
    • Development of communication.
    • ICT development Essay Example | Topics and Well Written Essays - words.
    • essays on drug trafficking!

    Closer to home, law enforcers took advantage of the cameras installed in the hotels to catch the last moments before the bombing of JW Marriott and Ritz Carlton happened in Indonesia. Although the damage was done and the social plummeted into distraught and distress, the brilliant use of ICT serves as a stern reminder to extremist that you can hide, but you cannot run.

    Files in this item

    To tie it up, it depends on the users of ICT to determine whether the medium are beneficial or dangerous. If hackers intentionally want to inflict harm, social networking sites could be horrific indeed. Therefore, instead of centralising the discussion on ICT, let us scrutinise the creators; the propellers; the masterminds behind this technology: the humankind.