24 May 2022

435

Incorporation of Technology in Programs

Format: APA

Academic level: College

Paper type: Essay (Any Type)

Words: 736

Pages: 1

Downloads: 0

Speech 1:

The internet is one of the best inventions modern man has been able to come up with. Its vast use in all parts of the world emphasizes on its importance to the public. Consequently, the internet is used for various useful and without a doubt, destructive functions.  Ease in communication and access to vast information is the main useful function of the internet. This speech explores the sources that have identified harmful effects brought about by excessive internet use. Excessive use of the internet could also be likened to any other kind of addiction. For this reason, the investigations should focus on answering the following questions: What is excessive internet use? What are the long term effects of excessive internet use? What population is most affected by the excessive use of the internet?  Are there any suggested solutions to help those affected by excessive internet use? The rampant use of social media has enabled significant ease of communication, networking and interactions among people across the globe. However, social media platform have also been observed as a platform for people to hide their true identities in order to express themselves without fear. Consequently, some people construct their online profiles to mirror the people that they are in real life. The following paper explores different aspects of social media and personal identity. In essence, the paper looks at social media photo displays and identity, teenage life formation and social media, links between social media and life off the computer screen and social media use its influence on personal identity in children. 

Speech 2:

Most social media platforms have relatively easy processes to follow in order to sign up. For this reason, most people with internet access upload and share photos into social media platforms to express themselves and to build their online personal profiles. According to Binhalail, people use their profile pictures to depict various feelings and emotions in real time (2000). In other cases, people use their profiles to rebel against the things they face in real life. An example is Muslim women who are not allowed to exhibit parts of their bodies in public. For this reason, the women find appropriate ways to present themselves in order to win favor with peers and other members of society. The same should be taught in a very proper way to children in order to diversify on culture.  Consequently, social media profiles are meant to depict the best in us that we would not mind showing the world. The ability to save multiple pictures like in the traditional albums enables people to tell intimate stories using pictures. Digital storage of photos is also important. In many ways, the stories told by the photos in social media lead to the perceptions other users have about us. An example is having photos of adventurous trips. One would think that the trips are frequent but the reality is that the photos may be from a single holiday vacation, taken 3 years ago and delivered to the profile in bits. In many ways, the pictures posted on our profiles aid in the overall perception most users have of others. Children should be taught correct expression from an early age. 

It’s time to jumpstart your paper!

Delegate your assignment to our experts and they will do the rest.

Get custom essay

Speech 3:

Adolescent years are known as formative years. It is during this time that most people get to understand their minds and bodies. However, most of the development process is influenced by a number of external factors. In this case, teenagers in the internet age are observed to spend significant time on social media platforms like Twitter and Facebook. From these platforms, the teenagers get to share, read and comment on various things happening to other teenagers across the globe. However, young people create their profiles based on the popular culture around them at the time (Davis, 2012). It is during profile building that some teenagers misunderstand other young people’s profiles and try to emulate the latter.  The problem is also observed to crop from excessive use of the internet by young people. Physical activity has reduced significantly due to the availability of gaming consoles, the internet and various streaming services enabled on there. Consequently, constant use of the internet leads to false perceptions between real life and popular culture. More so, the teenage stage is observed to be the most susceptible to various suggestions. In this way, the suggestions on fashion, lifestyle and life advice gotten from the internet translates to daily life. An example is the music videos depicting drug use and vulgarity as cool. The videos lead to major decisions that teenagers make that prove to be more out of perception than understanding. The above is meant to show the importance of regulating technology and its exposures from early childhood.

References

Binhalail. N. (2000).Personal identity and profile image in social media. Looking at Images, Winchester school of art.  Davis.K. (2012)."Tensions of identity in a networked era: young people's perspectives on the risks and rewards of online self‐expression." New Media and Society 14(4):643-51. 

Illustration
Cite this page

Select style:

Reference

StudyBounty. (2023, September 16). Incorporation of Technology in Programs.
https://studybounty.com/incorporation-of-technology-in-programs-essay

illustration

Related essays

We post free essay examples for college on a regular basis. Stay in the know!

Security Implication of the Internet of Things

The Internet of Things (IoT) can be described as s system of interconnected devices that have the ability to transfer information over a computer network without the need of human-to-computer or human-to-human...

Words: 892

Pages: 3

Views: 96

Modern Day Attacks Against Firewalls and VPNs

Introduction The need to have an enhanced security of the computer connectivity happens to be one of the reasons that attract companies and organizations towards wide usage of VPNs. Several simple techniques...

Words: 2025

Pages: 7

Views: 134

How to Deploy and Administer Windows Server 2012

Securing a reliable, and expandable configuration for a company is important to build a strong network. The new and enhanced features of the Windows Server 2012 can be used to implement the network. In this...

Words: 1673

Pages: 6

Views: 87

Deployment Model in Cloud Computing

Deployment model is a representation of a cloud environment primarily distinguished by parameters such as accessibility, proprietorship, and storage size. The National Institute of Standards and Technology gives the...

Words: 254

Pages: 1

Views: 81

How to Use Web Search Engines for Business Research

The advancement of technology has made it possible for many people around the world to have easy access to information whenever they want. The development of the Wide World Web-enabled different kinds of information...

Words: 773

Pages: 3

Views: 86

Distributed Database Management System (DDBMS)

Introduction Data management has been a headache to many technology enthusiasts for quite a long period of time. They have successfully managed to logically collect interrelated data and share it. If the data is...

Words: 799

Pages: 3

Views: 127

illustration

Running out of time?

Entrust your assignment to proficient writers and receive TOP-quality paper before the deadline is over.

Illustration