Computer Literacy

Computer literacy means the ability to effectively operate computers and its allied technology, with the utilization of various skills ranging from elementary to advanced problem-solving. It involves learning to access information and perform various operations within a computer network. This includes having technical and cognitive knowledge and skills to understand computer visuals and texts and accessing operating systems via menus. This is simply an individualís level of ease in using computers and understanding how they work.

Computer algorithm

An algorithm is a process (usually step-by-step) that is aimed at achieving a specific outcome. Consequently, it can mean definite provisions to perform various tasks like automated reasoning, data processing, and calculations. 

It is of significance in computer science as it ensures that computers can execute tasks in the best possible way. This applies in cases where efficient task completion is needed. To effectively do tasks, an algorithm will optimize a computer based on the available resources.   

Technologies that have enhanced the Growth of the Internet and World Wide Web (WWW)

            Sethi (2018) indicates that despite still being considered to be in its infancy stage, the internet and the World Wide Web have experienced rapid technological growth in the last few years. There are various technological advances that facilitated this growth. These include;


This technological innovation in data transmission used Control Protocol (CP) to transmit information. The earliest packet-switching networks emerged in Europe and then America through the Advanced Research Projects Agency (ARPA), which created a set of large interconnected military computers.

  1. Rise of USENET

This technological system enhanced the idea of sharing information and discussion. The restriction of various societal norms like usage of drugs led independent people to create their servers for discussions. This led to the evolution of the internet to incorporate new transmission methods like the Net News Transfer Protocol (NNTP).

  • Local Area Networks

Increased demand in internet usage led to the need for high-speed computer interconnection. This led to the introduction of Local Area Networks, which evolved from cabled Ethernet to wireless LAN.

Software Development in Respect to the Systems Development Life Cycle (SDLC)

            Software development is the series of actions including the outset of a required software through software manifestation. The procedures for the creation of a software product, on the other hand, is known as the Software Development Life Cycle (SDLC). SDLC is of higher significance in developing quality software as it provides the development process and the level of care utilized in software development (Habib, 2014). An effective SDLC will lower the total time required for software development through rework minimization as well as in improving software development estimation capabilities. This means that an effective and mature SDLC will ultimately improve software development and thus enhancing the production of quality software.              

Security Concerns of the Internet and Computer Use

            Increased usage of the internet and computers in the last few decades has seen an influx of threats and vulnerabilities (Abomhara, 2015). Using these tools exposes the user to various security gaps that are targeted by various irresponsible individuals. Many attempts have been put in place to counter the increasing threat of using the internet and computers, though increased negative sophistication in the cyberspace continues to outweigh security measures adopted. Some of the risks associated with the usage of these technological advances include;

  1. Phishing

A social engineering technique that aims to obtain personal data such as passwords and credit card information. It is mainly orchestrated through instant messages that appear legitimate. Opening these messages in many cases automatically installs malware to the userís computer. It basically targets personal data information.

  1. Computer Viruses

These are software pieces that are spread between computers via the internet. Their main mode of delivery is through downloadable links or email attachments that specifically aim to infect computers. They are aimed at sending spam messages, deleting user files, and even disabling security settings of the user.

  1. Spyware and adware

An individual browsing data is collected by adware, which in turn shows the user targeted pop-ups and advertisements. Characteristically, adware collects data from a computer via an individualís consent before displaying the advertisements. This slows down the computer and internet speed thus affecting the efficiency of using the internet and computers. Spywares too work like adware, though they are in many cases installed into an individualís computer without their consent. They can record personal information of the user and thus exposing one to risks of identity theft.


Abomhara, M. (2015). Cyber security and the internet of things: vulnerabilities, threats, intruders and attacks. Journal of Cyber Security and Mobility, 4(1), 65-88.

Habib, B. (2014). Relationship between the System Development Life Cycle and Software Quality Criterions for Achieving a Quality Software Product. International Journal of Computer Applications, 104(10).

Sethi, A. (2018). The Age of the Internet: A Tech Savvy World and New Diplomacy. In Media Diplomacy and Its Evolving Role in the Current Geopolitical Climate (pp. 138-153). IGI Global.