Computer Literacy

2053 Words9 Pages
Virtual Reality Or Virtual Renegade? INF103 Computer Literacy Instructor: Lameika Gupton August 19, 2013 Outline * Introduction * Question: Is virtual reality another tactic organized by the government to control society? * Thesis: Due to the invasion of privacy from tapping into phones to trying to censor the Internet, it is most probable to conclude that virtual reality, which includes altering the mindsets of humans to believe they are in a stable world except they are not, is another allure transpired by governmental forces to control society. * Caution or Control? * Wiretapping * Internet Censorship * Allure * Virtual Reality Tactics * Cons of Artificial…show more content…
Smart phones allow us to not only talk and text on the phone, but also various other duties that a computer would such as check emails, send documents, browse the Internet, and find locations. With the allure of smart phones comes the catch of now transmitting personal and confidential information into our phones, allowing unwanted users or hackers to view our data without our consent. In addition, there was a time when the typewriter was the only machine used for data entry, but in present day, we have laptops, desktop computers, and also netbooks. With these fancy gadgets, Web 2.0 had also been created. In our text, we read that “Web 1.0 was the ability to perform read-only but with the creation of Web 2.0, we are able to read and write” (Bowles, 2010). This notion is shown on our social networks as we post statuses of how we feel or where we are going, or what we are doing. Little do we know, that with every pro comes a con. By inputting our information on such sites as Facebook, Twitter, or Blogger, we subject ourselves to a lifetime of invasion of privacy. No matter how many letters or words we type, edit or delete on these sites, they are stamped in the World Wide Web indefinitely. Lastly, with the allure of virtual reality and being able to “plug in and experience what it’s like to be someone else” (Kurzweil, 2005), we set ourselves up for yet another
Open Document