Purpose of the Computer Information Science Course

Do you need this or any other assignment done for you from scratch?
We have qualified writers to help you.
We assure you a quality paper that is 100% free from plagiarism and AI.
You can choose either format of your choice ( Apa, Mla, Havard, Chicago, or any other)

NB: We do not resell your papers. Upon ordering, we do an original paper exclusively for you.

NB: All your data is kept safe from the public.

Click Here To Order Now!

Computer Information Sciences Competencies

The Computer Information Sciences course is intended to explore the latest technological development and their influence on communication and knowledge. It explains the functioning of various devices that are involved in most peoples everyday lives, teaches students essential competencies in various aspects of their use, and talks about ethics. During this course, I have improved my ability to create documents and spreadsheets, learned the fundamentals of database management, and created complex multimedia presentations. I have also learned about Web design tools and increased my awareness of the uses of various hardware and software.

In my opinion, the Computer Information Sciences course should not only be an elective one can choose, but a general requirement for all students. The world of technology is becoming increasingly complex, and progress enables various opportunities. People in most professions could benefit from an awareness of digital tools that assist with their works. Furthermore, malicious behavior is also becoming easier, particularly about peoples data. The course includes explanations of the risks of the online environment and may help students avoid becoming victims of harmful activities. It may also help to increase awareness of current issues in the field.

Net Neutrality

In 2017, the Federal Communications Commission reviewed a set of laws known as net neutrality. According to Kang, the regulations were repealed despite the campaign to retain them, a move that favored Internet providers over consumers. Kang notes that the FCC chairman, Ajit Pai, expected the measure to promote competition among various providers and thus to benefit consumers. However, the opposition to the decision stated that with the new freedoms given to providers, they could arbitrarily restrict access to websites or applications for monetary or political gains.

Net neutrality regulation fundamentally forces providers to treat the Internet as a monolithic entity instead of a collection of nodes that represents it more accurately. According to Kang, it prohibited broadband providers from blocking websites or charging for higher-quality service or certain content and regulated high-speed Internet delivery like a utility (par. 2). I believe that the repeal was not the right choice for consumers, as it provided them with no benefits while potentially damaging their freedoms. I would tell my United States Senator to reinstate the legislation, possibly along with some other programs that have been shut down by the FCC.

Computers and Public Harm

There are numerous dangers associated with the use of computers, with some stemming from malicious intent and others being more challenging to identify. Baig describes a recent data breach that exposed the personal information of 80 million U.S. families (par.1). Such incidents have been becoming more frequent recently, and while the one in Baigs article did not leak any critical data, Internet databases often contain essential data. A criminal agent could use credit card numbers or social security numbers to commit fraud. Since I started the course, I have been more careful to keep my personal information safe.

Other dangers are more subtle and associated with the increasing domination of the Internet by a handful of gigantic companies. Dorman describes the recent banning of Michael Morrison, who was maintaining an Alexandria Ocasio-Cortez parody account, from Twitter for unclear reasons. The creators page, which had a significant follower count, was also permanently suspended. According to Dorman, many people claim that the banning was political and a continuation of a trend where right-wing people keep getting banned from large social networks. As a social media account is among the best and easiest ways to obtain public reach, one could argue that the platforms are engaging in political censorship, endangering freedom of speech.

Works Cited

  1. Baig, Edward C. Massive Data Breach Exposes Ages, Addresses, Income on 80 Million U.S. Families. USA Today, 2019.
  2. Dorman, Sam.  Fox News, 2019. Web.
  3. Kang, Cecilia.  The New York Times, 2017.
Do you need this or any other assignment done for you from scratch?
We have qualified writers to help you.
We assure you a quality paper that is 100% free from plagiarism and AI.
You can choose either format of your choice ( Apa, Mla, Havard, Chicago, or any other)

NB: We do not resell your papers. Upon ordering, we do an original paper exclusively for you.

NB: All your data is kept safe from the public.

Click Here To Order Now!