Skip to main content

Disadvantages Of Internet

 Theft of Personal Information
http://www.buzzle.com/images/computers/internet/phishing.jpg
The use of Internet for banking, social networking, or other services, often makes our personal information vulnerable to theft. There are no fail-proof ways to securing names, account numbers, addresses, photos, and credit card numbers from being stolen or misused by thieving websites and individuals.


Unscrupulous hackers can access our sensitive information through unsecured connections by planting phishing software. Needless to say, the damage caused by having our identities misused and our accounts broken into, is often irreparable and most of all, embarrassing.
Spamming
http://www.buzzle.com/images/computers/internet/spamming.jpg
Spamming refers to sending unwanted e-mails, which serve no purpose and needlessly obstruct the computer system. Such illegal activities can be very frustrating as it makes it slower to access our email accounts and makes the entire service unreliable for consumers.

Spammers usually use bots that bombard the receiver with an endless line of advertisements. This can prove to be increasingly perplexing, as it keeps getting mixed with our more important emails. Fortunately, email service providers often have security systems in place to guard against spamming. Fortunately, it is possible to report an email as spam, so that all emails from the same email id or IP address, are blocked.
Malware Threats
http://www.buzzle.com/images/computers/internet/malware.jpg
One of the most annoying problems with the Internet is the ease with which any malware can infect our computers. Internet users are often plagued by virus attacks that harm their computers and important files. Virus programs are inconspicuous and may get activated simply by clicking a seemingly harmless link. Computers connected to the Internet are extremely prone to IP targeted virus attacks that may end up crashing the system completely.

Internet virus can be of three types. The first type of virus affects files and goes directly for a particular file or file type. The second type harms system and executable boot files. These can be particularly nasty, as they can effectively stop the computer from starting again. Lastly, there's the macro virus, which is the most common as well as the most harmless of them all. The macro virus simply keep changing things like symbols on word files. The type of virus that can replicate and spread itself is known as worms. When a virus is disguised as something else, it's known as a trojan.
Age-inappropriate Content
http://www.buzzle.com/images/computers/internet/internet-shocking.jpg
Pornography and age-inappropriate content is perhaps the biggest disadvantage of the Internet. The worst being underage porn, which is largely rampant in the deeper parts of the web. It is the lack of control over the distribution and unrestricted access of pornographic material, that is detrimental to children. All that parents can do, is lock harmful sites and monitor the sites viewed by their children.

Pornography is not just frowned upon by most societies, it's also banned by some. The Internet makes uploading shocking content so easy, that we end up coming across inappropriate words and images, despite not wanting to.
Social Isolation, Obesity, and Depression
http://www.buzzle.com/images/computers/internet/social-disconnect.jpg
The biggest problem with having the Internet is, its ability to create rifts between the real and virtual world. The virtual world can often seem so alluring that once hooked, going back to real life seems daunting.

There is an addiction for everything that pertains to the web and that includes excessive surfing, online gambling, social networking, and gaming addiction. There are now psychiatric clinics and doctors that specifically cater to resolving the problems created by the Internet. These addictions create both physical as well as mental issues that can lead to health complications if left unattended. It is ironic that, while it is easy to find plenty of online support for agoraphobia, the Internet itself can be a big cause or trigger for it.

The link between obesity and the Internet is rather easy to understand. The more one sits in front of the computer, the lesser one exercises. At the end of the longish list of physical and emotional maladies, is depression. Since all problems are so deeply linked with one another and with the Internet, it isn't uncommon for people to be afflicted with multiple issues. Recent studies and research have gone deep enough to actually differentiate between compulsive Internet use and excessive Internet use. Furthermore, thanks to smartphones, holding a simple face-to-face conversation seems out of the ordinary as compared to chatting online.

Thus, even though the Internet has the potential to make our lives simple and convenient, it also holds the power to wreak havoc. Its influence on us is mostly dictated by the choices we make while being online. With prudent use, we can manage to harness its unlimited potential and steer clear of its adverse effects.

Comments

Popular posts from this blog

The First Generation of Computer

The history of computing hardware covers the developments from simple devices to aid calculation, to mechanical calculators, punched card data processing and on to modern stored-program computers . Before the 20th century, most calculations were done by humans. Early mechanical tools to help humans with digital calculations were called "calculating machines", by proprietary names, or even as they are now, calculators . The machine operator was called the computer. The first aids to computation were purely mechanical devices which required the operator to set up the initial values of an elementary arithmetic operation, then manipulate the device to obtain the result. The slide rule and, later, analog computers represented numbers in a continuous form, for instance distance along a scale, rotation of a shaft, or a voltage. Numbers could also be represented in the form of digits, automatically manipulated by a mechanical mechanism. Although this approach generall

Top 9 MARVELOUS Features of SAMSUNG GALAXY NOTE 8

Welcome Back Guys, I'm here with a new video, in this video I am going to discuss some features of Samsung Galaxy note 8, but before getting started there are some things that we should know about note 8.The Note 8 has already released and it is available in market from 15-Sep-2017, the same day on which IPhone 8 pre-orders are tipped to begin. Note 8 is available on Samsung store online with the price tag of £869.00, if you order it online then it is available in two different colors Midnight Black & Maple Gold, other than these are Orchid Grey, Deep Sea Blue, Star Pink (Taiwan only) .Let’s get back to our main topic and find out top 10 features of Samsung Note 8.  The video is also available on  YouTube: https://www.youtube.com/channel/UCZrxKw-Qv9uzbQTKJf0o-Dw

About Write Only Memory

In information technology, a write-only memory ( WOM ) is a memory location or register that can be written to but not read. In addition to its literal meaning, the term may be applied to a situation when the data written by one circuit can be read only by other circuitry. The most common occurrence of the latter situation is when a processor writes data to a write-only register of hardware the processor is controlling. The hardware can read the instruction but the processor cannot. This can lead to problems in producing device drivers for the hardware. Write-only memories also find applications in security and cryptography as a means of preventing data being intercepted as it is being decrypted. Hardware uses In 1972, WOM, an antithesis of read-only memory (ROM), was introduced as an inside practical joke perpetrated by Signetics. [ 1 ] However it was soon recognized that this concept actually describes certain functionalities in microprocessor systems. [ 2 ] The