Monday, February 4, 2019
The Three Little Users and the Big Bad Wolf Essay examples -- Creative
The Three Little Users and the Big Bad WolfOnce upon a condemnation, in that respect were three half-size computer users of three different professions and the time came for them to leave home and seek their fortunes. The first little user with the cover charge name LiLestPiggy, the youngest, bought his computer at the local chain computer computer storage CompUSA, and had just recently installed a modem so he could surf the net. telecommunicate being the primary reason for the use of his computer, LiLestPiggy purchased a computer with the close to basic set up. He was planning to surf the web and find games online, pursuing a job as an English teacher at the nearby elementary school. It was the most basic set up for a beginner. The second little user with the screen name LiLPiggy, the middle of the three, bought a laptop, installed Norton Anti-Virus, and installed a cable modem to insure a fast and safe network connection. He was planning to pursue a business job so h e needed a fast and safe computer.The third little user with the screen name of IllestPiggy, the eldest of three, built his own computer, facility several Anti-Virus programs and setting up a firewall and top-notch secret government warrantor devices. A firewall protects your network from unwanted Internet traffic. The primary functions of a firewall are to let good traffic pass through while spoilthearted traffic is blocked. The most important part of a firewall is its access tame features that distinguish between good and bad traffic. One night, a ward-heeler with the screen name BigBadWolf, who dearly loved to ruin little pigs lives, was knocked out(p) and about. The BigBadWolf instant messaged (IMed) LiLestPiggy who has the most basic internet connection. The BigBadWolf said, Hello, I was wondering if ... ...estions brought up was whether the government should take action and patrol cyberspace for possible dangers. few of the blame of the extensive abuse of the F irst Amendment can be pointed at the government. However, cyberspace is a place for people to act as they longing and speak freely, unless it would be breaking the first amendment of freedom of speech. If the government took action, there would most likely be conflict and it would be a big deal. In conclusion, hackers have tremendous power to cause trouble delinquent to the unlimited resources and possibilities of the internet. Although they are capable of trouble, most hackers create viruses because of the purposes of it being gainsay and entertaining. In this case, the government should step in and regulate cyberspace to a certain degree. We cannot let people commit crime and let them dismay away with it.
Subscribe to:
Post Comments (Atom)
No comments:
Post a Comment