Google -- Without an effective index, the internet would be as useless as a library full of randomly shelved books without covers. While early search engines like Alta Vista did an OK job of finding content, Google was a quantum leap forward. It's notion of using page popularity to rank search responses rightly dominated the market overnight.
Online gaming -- I don't have a dog in this hunt, but I'm aware that the leap from gaming on the home television to joining a worldwide gaming community via the xBox and other systems has enthralled whole generations. If it had existed when I was young, I'd have been addicted to it, I'm sure. I hope I would have had the sense to avoid internet gambling, though. That's an expensive addiction.
Instant messaging -- Before I began using instant messaging, or IM, I didn't understand how it differed from e-mail. Now I think I do. If e-mail is a postal letter, IM is a note passed from hand to hand behind the teacher's back. You e-mail your mom, IM your BFF. IM is social, e-mail is professional. IM is, well, instant. E-mail is like, whenever.
Advantages of having and using computers
A Computer is an electronic device that processes data according to a given list of instructions. It has many uses and advantages. Some of them are as follows:
- Easy processing of complex tasks.
- It saves time by quick manipulation of data as compared to when done manually.
- The errors in data processing are minimized when a computer is used.
- It has helped in making communication easier by using internet.
- It stores, retrieves, and processes a large amount of data.
- It helps in multitasking of various jobs.
- Data is more secure and easier to use.
Potential threat of using computers
If you connect to the Internet, allow other people to use your
computer, or share files with others, you should take steps to protect
your computer from harm. Why? Because there are computer criminals
(sometimes called hackers) who attack other
people's computers. These people can attack directly, by breaking into
your computer through the Internet and stealing your personal
information, or indirectly, by creating malicious software to harm your
computer.



