Purpose of the Computer Information Science Course Essay

Exclusively available on IvyPanda Available only on IvyPanda

Computer Information Sciences Competencies

The Computer Information Sciences course is intended to explore the latest technological development and their influence on communication and knowledge. It explains the functioning of various devices that are involved in most people’s everyday lives, teaches students essential competencies in various aspects of their use, and talks about ethics. During this course, I have improved my ability to create documents and spreadsheets, learned the fundamentals of database management, and created complex multimedia presentations. I have also learned about Web design tools and increased my awareness of the uses of various hardware and software.

We will write a custom essay on your topic a custom Essay on Purpose of the Computer Information Science Course
808 writers online

In my opinion, the Computer Information Sciences course should not only be an elective one can choose, but a general requirement for all students. The world of technology is becoming increasingly complex, and progress enables various opportunities. People in most professions could benefit from an awareness of digital tools that assist with their works. Furthermore, malicious behavior is also becoming easier, particularly about people’s data. The course includes explanations of the risks of the online environment and may help students avoid becoming victims of harmful activities. It may also help to increase awareness of current issues in the field.

Net Neutrality

In 2017, the Federal Communications Commission reviewed a set of laws known as “net neutrality.” According to Kang, the regulations were repealed despite the campaign to retain them, a move that favored Internet providers over consumers. Kang notes that the FCC chairman, Ajit Pai, expected the measure to promote competition among various providers and thus to benefit consumers. However, the opposition to the decision stated that with the new freedoms given to providers, they could arbitrarily restrict access to websites or applications for monetary or political gains.

Net neutrality regulation fundamentally forces providers to treat the Internet as a monolithic entity instead of a collection of nodes that represents it more accurately. According to Kang, it “prohibited broadband providers from blocking websites or charging for higher-quality service or certain content” and regulated high-speed Internet delivery like a utility (par. 2). I believe that the repeal was not the right choice for consumers, as it provided them with no benefits while potentially damaging their freedoms. I would tell my United States Senator to reinstate the legislation, possibly along with some other programs that have been shut down by the FCC.

Computers and Public Harm

There are numerous dangers associated with the use of computers, with some stemming from malicious intent and others being more challenging to identify. Baig describes a recent data breach that exposed the personal information of 80 million U.S. families (par.1). Such incidents have been becoming more frequent recently, and while the one in Baig’s article did not leak any critical data, Internet databases often contain essential data. A criminal agent could use credit card numbers or social security numbers to commit fraud. Since I started the course, I have been more careful to keep my personal information safe.

Other dangers are more subtle and associated with the increasing domination of the Internet by a handful of gigantic companies. Dorman describes the recent banning of Michael Morrison, who was maintaining an Alexandria Ocasio-Cortez parody account, from Twitter for unclear reasons. The creator’s page, which had a significant follower count, was also permanently suspended. According to Dorman, many people claim that the banning was political and a continuation of a trend where right-wing people keep getting banned from large social networks. As a social media account is among the best and easiest ways to obtain public reach, one could argue that the platforms are engaging in political censorship, endangering freedom of speech.

Works Cited

  1. Baig, Edward C. “Massive Data Breach Exposes Ages, Addresses, Income on 80 Million U.S. Families.” USA Today, 2019.
  2. Dorman, Sam. “” Fox News, 2019. Web.
  3. Kang, Cecilia. “” The New York Times, 2017.
Print
Need an custom research paper on Purpose of the Computer Information Science Course written from scratch by a professional specifically for you?
808 writers online
Cite This paper
Select a referencing style:

Reference

IvyPanda. (2022, January 16). Purpose of the Computer Information Science Course. https://ivypanda.com/essays/purpose-of-the-computer-information-science-course/

Work Cited

"Purpose of the Computer Information Science Course." IvyPanda, 16 Jan. 2022, ivypanda.com/essays/purpose-of-the-computer-information-science-course/.

References

IvyPanda. (2022) 'Purpose of the Computer Information Science Course'. 16 January.

References

IvyPanda. 2022. "Purpose of the Computer Information Science Course." January 16, 2022. https://ivypanda.com/essays/purpose-of-the-computer-information-science-course/.

1. IvyPanda. "Purpose of the Computer Information Science Course." January 16, 2022. https://ivypanda.com/essays/purpose-of-the-computer-information-science-course/.


Bibliography


IvyPanda. "Purpose of the Computer Information Science Course." January 16, 2022. https://ivypanda.com/essays/purpose-of-the-computer-information-science-course/.

Powered by CiteTotal, free referencing tool
If you are the copyright owner of this paper and no longer wish to have your work published on IvyPanda. Request the removal
More related papers
Cite
Print
1 / 1