Purpose of the Computer Information Science Course Essay

Exclusively available on Available only on IvyPanda® Written by Human No AI

Computer Information Sciences Competencies

The Computer Information Sciences course is intended to explore the latest technological development and their influence on communication and knowledge. It explains the functioning of various devices that are involved in most people’s everyday lives, teaches students essential competencies in various aspects of their use, and talks about ethics. During this course, I have improved my ability to create documents and spreadsheets, learned the fundamentals of database management, and created complex multimedia presentations. I have also learned about Web design tools and increased my awareness of the uses of various hardware and software.

In my opinion, the Computer Information Sciences course should not only be an elective one can choose, but a general requirement for all students. The world of technology is becoming increasingly complex, and progress enables various opportunities. People in most professions could benefit from an awareness of digital tools that assist with their works. Furthermore, malicious behavior is also becoming easier, particularly about people’s data. The course includes explanations of the risks of the online environment and may help students avoid becoming victims of harmful activities. It may also help to increase awareness of current issues in the field.

Net Neutrality

In 2017, the Federal Communications Commission reviewed a set of laws known as “net neutrality.” According to Kang, the regulations were repealed despite the campaign to retain them, a move that favored Internet providers over consumers. Kang notes that the FCC chairman, Ajit Pai, expected the measure to promote competition among various providers and thus to benefit consumers. However, the opposition to the decision stated that with the new freedoms given to providers, they could arbitrarily restrict access to websites or applications for monetary or political gains.

Net neutrality regulation fundamentally forces providers to treat the Internet as a monolithic entity instead of a collection of nodes that represents it more accurately. According to Kang, it “prohibited broadband providers from blocking websites or charging for higher-quality service or certain content” and regulated high-speed Internet delivery like a utility (par. 2). I believe that the repeal was not the right choice for consumers, as it provided them with no benefits while potentially damaging their freedoms. I would tell my United States Senator to reinstate the legislation, possibly along with some other programs that have been shut down by the FCC.

Computers and Public Harm

There are numerous dangers associated with the use of computers, with some stemming from malicious intent and others being more challenging to identify. Baig describes a recent data breach that exposed the personal information of 80 million U.S. families (par.1). Such incidents have been becoming more frequent recently, and while the one in Baig’s article did not leak any critical data, Internet databases often contain essential data. A criminal agent could use credit card numbers or social security numbers to commit fraud. Since I started the course, I have been more careful to keep my personal information safe.

Other dangers are more subtle and associated with the increasing domination of the Internet by a handful of gigantic companies. Dorman describes the recent banning of Michael Morrison, who was maintaining an Alexandria Ocasio-Cortez parody account, from Twitter for unclear reasons. The creator’s page, which had a significant follower count, was also permanently suspended. According to Dorman, many people claim that the banning was political and a continuation of a trend where right-wing people keep getting banned from large social networks. As a social media account is among the best and easiest ways to obtain public reach, one could argue that the platforms are engaging in political censorship, endangering freedom of speech.

Works Cited

  1. Baig, Edward C. “Massive Data Breach Exposes Ages, Addresses, Income on 80 Million U.S. Families.” USA Today, 2019.
  2. Dorman, Sam. “Fox News, 2019. Web.
  3. Kang, Cecilia. “The New York Times, 2017.
Cite This paper
You're welcome to use this sample in your assignment. Be sure to cite it correctly

Reference

IvyPanda. (2022, January 16). Purpose of the Computer Information Science Course. https://ivypanda.com/essays/purpose-of-the-computer-information-science-course/

Work Cited

"Purpose of the Computer Information Science Course." IvyPanda, 16 Jan. 2022, ivypanda.com/essays/purpose-of-the-computer-information-science-course/.

References

IvyPanda. (2022) 'Purpose of the Computer Information Science Course'. 16 January.

References

IvyPanda. 2022. "Purpose of the Computer Information Science Course." January 16, 2022. https://ivypanda.com/essays/purpose-of-the-computer-information-science-course/.

1. IvyPanda. "Purpose of the Computer Information Science Course." January 16, 2022. https://ivypanda.com/essays/purpose-of-the-computer-information-science-course/.


Bibliography


IvyPanda. "Purpose of the Computer Information Science Course." January 16, 2022. https://ivypanda.com/essays/purpose-of-the-computer-information-science-course/.

More Essays on Computer Science
If, for any reason, you believe that this content should not be published on our website, you can request its removal.
Updated:
This academic paper example has been carefully picked, checked and refined by our editorial team.
No AI was involved: only quilified experts contributed.
You are free to use it for the following purposes:
  • To find inspiration for your paper and overcome writer’s block
  • As a source of information (ensure proper referencing)
  • As a template for you assignment
1 / 1