In today’s modern world, computers are very essential part of everyday life. Children often use computer from very young age for computer games and internet. Computers are developing their computer skills. Although, this can also be seen that children are too much dependent on computer games. It has got both pros and cons which will be discussed in the following paragraphs. On the one hand, some types of games can be very intelligent and may contain huge educational potential which can encourage their skill, concentration and inspire them to learn new things. If children use computer game from their childhood age, they are familiar with most of the function of computer; this will be very helpful for their future career. Another advantage is that there are lots of interesting features in computer, no child feel bore and alone using computer. On the other hand because of interesting features and different types of games in computer, firstly children become too much dependent on it. They spend their most of the time using computer games as a result they lose their interest on daily activities like their school homework and also forget to meet with their friend and colleagues. Secondly, some video games can be very aggressive in nature so these video games are usually highly addictive and easily available on internet. Moreover continuous use of computer game can be damaged both eyes and physical posture of the children. To sum up, there are lots of merits of using computer game however in my opinion; children don’t spend their whole time on computer. Parents should also care about their schedule for computer game. Computer games are indisputably popular among teenagers. Because of their widespread use, many studies provide data on the short- and long-term effects of regularly playing computer games. Some studies conclude there is a link between playing violent video games and tendencies towards violent behavior. Increasingly, the social element to playing computer games affects how teenagers interact with peers. Playing computer games has also been shown to improve problem-solving skills and increase adeptness at using technology overall. But an addictive aspect to many games suggests that playing in moderation is critical. Related Studies An online game is a game played over some form of computer network. This almost always means the Internet or equivalent technology, but games have always used whatever technology was current: modems before the Internet, and hard wired terminals before modems. The expansion of online gaming has reflected the overall expansion of computer networks from small local networks to the Internet and the growth of Internet access itself. Online games can range from simple text based games to games incorporating complex graphics and virtual worlds populated by many players simultaneously. Many online games have associated online communities, making online games a form of social activity beyond single player games. The rising popularity of Flash and Java led to an Internet revolution where websites could utilize streaming video, audio, and a whole new set of user interactivity. When Microsoft began packaging Flash as a pre-installed component of IE, the Internet began to shift from a data/information spectrum to also offer on-demand entertainment. This revolution paved the way for sites to offer games to web surfers. Some online multiplayer games like World of Warcraft, Final Fantasy XI and Lineage II charge a monthly fee to subscribe to their services, while games such as Guild Wars offer an alternative no monthly fee scheme.
Related Essay Examples
Paragon information systems
IMPLEMENTATION The First thing Paragon needs to do is to meet with their employees and inform them that excellent customer service is how the company plans to differentiate themselves. Implications: Paragon's strategy, to differentiate themselves in Atlantic Canada with excellent ...
Running head: how cellular phones has evolved
Internet Lee Rannals for redOrbit.com completed a survey and the results be evidence for over half of all cell phone owners' use their device to surf the Internet. The Internet is the most important function for the cell phone.
Ethics, privacy, and security sides of computer spammer issue
The interests of ordinary users are of no threat to anyone else especially their privacy and flow of information across the network. There are multiple legal issues faced in the usage and application of Spamhaus.
Describe the meaning of the terms in the selected standard form essay sample
Their website layout and elegant colours make the page look more welcoming to the customers and their aim is also to keep the customers coming and buying regularly from their website. Marks and Spencer's have different features that can help ...
Etiquette and rule
The seventh rule of the code is to be conservative in the emails you send. Lastly the tenth rule of this code is to always be discreet with what you do online.
Online therapy
A number of patients believe that online therapy works for them and that the service was worth the cost. On the other hand, the strongest disadvantage of this therapy is the absence of body language, visual and verbal cues that ...
Blood brothers – development task
We used the stage directions to produce movement and facial expressions which were the main content of the scene, including the dialog. We did this to give the effect of emphasising Mrs Lyons' frustration and madness and to add more ...
Economic transformation of ethiopia: causes and challenges ahead essay examples
Drought, pooled with underprivileged farming practices - with almost total reliance on rain fed cultivation - has definitely contributed to off-putting economic growth in Ethiopia in the past, but government policy restricting access to food and the extreme reliance of ...
Addiction research paper
Majority of the thieves and fraudsters are also gambling addicts and this is as a result to the persistent urge of having money. Gambling impacts on development in the sense that most working gamblers are under-performers and they also take ...
The effect of the internet on social interaction
Although some people claim that the possibilities of more convenient communication benefit chiefly from the Internet, others argue that this technology breakthrough may Isolate communication further regarding face- to- face interaction. It can be argued that this type of technology-internet ...
Internet history 3453
This was called the Internetting project and the system of networks which emerged from the research was known as the " Internet". The Internet Activities Board was created in 1983 to guide the evolution of the TCP/IP Protocol Suite and ...
Influenza is the main cause for not
Every year emergence of new strain of Influenza is the main cause for not the development of a permanent Vaccine for Influenza.a) Conservedepitopes from different viral strain of influenza can open up many waysfor the production of recombinant DNA vaccine ...
Reflection essay on nosql
Nouns can be a great asset when It pertains to dealing with large amounts of data and Its ability to be able to provide a better scalability and availability than the traditional READS can make It a plus. As mentioned ...
Free research paper on empathy and equality
This is an appropriate and defensible position, particularly given the strength of Gilligan's contention that care is a distinctive agent of moral development for females and the extent to which gender identity hinges on separation and individuation. The debate over ...
History of computers in us
First Generation Computers The Electronic Numerical Integrator and Computer, was developed as a collaborative approach between the University of Pennsylvania and the US government. Second Generation Computers Transistor replaced vacuum tubes around 1956 shrinking the size of computers and with ...
Heritage planning case study
The Name of the School The City and State where it is located Background of the Report The NSW government introduced the Heritage Act in 1977. The introduction of the Act was in response to the community concern about the ...
Application for masters degree in information technology
Chair's Name, It is my great pleasure that I submit my application for the Master's degree in Information Technology at the University of Florida Tech specializing in Enterprise Resource Planning. I believe that Master degree from Florida Tech specialized in ...
Cybersecurity and cyberwarfare critical thinking examples
Measures need to be put in place to separate any device that is compromised and ensure their interactions with the rest of the cyberspace system are stopped. Never settle to the level of technology that is in use.
Research paper on a matter of compliance
Psychology refers to punishment as the introduction of an aversive stimulus or the removal of the reinforcing stimulus after an action takes place, resulting to the weakening or the suppression of the action itself. This leads to the second point ...
Artificial intelligence for games
The history of games, the challenges of technology change, and the trends in gaming are discussed In the literature review. Introduction: The field of game AAA has existed since the creation of the earliest video games In the sass's.
A assessing the feasibility of different techniques for providing fresh water report example
It is for this reason that a water program be launched in arid and water scarce areas in Africa that seeks to develop a prospective management of water resources to safeguard water scarce regions in Liberia that are fragile. Ideally, ...
Essay on criminology
This increase in cases of theft can be attributed to the fact that many people in both developed and developing nations are now able to purchase vehicles. These car items are also in the high demand in the consumer market ...
Make and recieve telephone calls
Before making a phone call it's a good idea to identify the purpose of the call as it would make me the caller sound more professional as I know exactly what I want and would waste no time with anything ...
The components of an information system
These five components make up every information system from the smallest system to the most complex system. These five components together make up the Five Component framework, which are the five fundamental components of an information system.
What machines can’t do by david brooks
According to the author, humans will depend more on technology to perform their daily tasks but such dependence does not prove that machines will have a high margin over humans as humans design those machines for their own convenience. Above ...