Have you ever seen a family sitting at a restaurant and every member is texting or reading on their cell phone? Computer Technology has advanced over the past few years. We have a phone that is portable and able to go anywhere with us. Every member of the family has their own cell phone. These cell phones have multiple applications that are able to be done simultaneously. This advance in technology has also created a generation that is unable to spell correctly or even write correctly because of the abbreviations associated with texting. This generation isn't able to sit together and have a family dinner without holding their cell phone. It is very easy to respond to an email in text language but it isn't proper etiquette. It is becoming harder and harder for English teachers to teach the English language and proper spelling, grammar and sentence rules because students are exposed to abbreviations and texting from the time they are old enough to write and spell. Our generation is losing the ability to be able to write a paragraph or story in complete sentences. Our generation is losing the family values that come along with sitting down for dinner at night and talking about their day.
Tuesday, October 28, 2014
Advances in Technology. Is it harmful or helpful?
Sunday, October 12, 2014
Protect Your Personal Information
There seems to be a new article or news release daily that reveals that our personal information has been stolen. JP Morgan Chase Bank was among the most recent to have a hacker steal personal information. The article noted that although only the names of the bank's past and present members were noted, it was a place for hackers to begin their search for more information. to contact members. The article gave some good hints for attempting how to protect your your information. It's always a good idea to watch your bank accounts. Be aware of money going in and how much money is going out. Watch your email carefully. Be mindful of suspicious emails asking for your address, social security number, retirement information. Report suspicious activity to the credit bureaus. They have the ability to hold information requested and report activity to the customer before responding. I think this article had some great ways to help monitor for the possible hacking of our personal information. I plan to use some of these ways to protect my credit and myself from identity theft.
Article courtesy of http://www.nytimes.com/2014/10/04/your-money/jpmorgan-chase-hack-ways-to-protect-yourself.html?_r=0
Picture courtesy of http://virscent.com/blog/wp-content/uploads/2012/08/Information-Security-and-Ethical-Hacking.jpg
Article courtesy of http://www.nytimes.com/2014/10/04/your-money/jpmorgan-chase-hack-ways-to-protect-yourself.html?_r=0
Picture courtesy of http://virscent.com/blog/wp-content/uploads/2012/08/Information-Security-and-Ethical-Hacking.jpg
Subscribe to:
Posts (Atom)