Introduce some problems with social media

Assignment Help Basic Computer Science
Reference no: EM13916769

Intro

Introduce some problems with social media that have negatively impacted the academic performance of college students.  Social media has created several social problems that have changed the way college students live.

Thesis: With the introduction of social media, the way college students spend their time and study has changed drastically and in doing so, it has had a negative impact on their academic performance which has led to reduced learning and research capabilities, time wastage, and declining of health.

Body 1: Reduced Learning and Research Capabilities

Students have now started to rely more and more on the information that is more easily accessible on the social media sites.  This reduces actual learning and researching time and increases the dependency of information on social media.

Body 2: Time Wastage

While students are studying online or researching for information, they tend to check in on their social media sites and they get sidetracked and before long they forget what they were doing in the first place.  This is a waste of their time and leads to late assignments.

Body 3: Declining of Health

College students that are excessively using the social media sites are so caught up in their online activities that they do not eat their meals on a regular basis and they do not get enough sleep at night.  They rely on energy drinks and highly caffeinated drinks to stay away which eventually starts to negatively affect their health.

Conclusion: 

Restate thesis and draw a conclusion from what was discussed in the body paragraphs.

https://www.columbiachronicle.com/health_and_tech/article_aa2daa9a-d7e4-11e3-9286-001a4bcf6878.html

Reference no: EM13916769

Questions Cloud

Does the video sound as if webex would work for your team : Watch the video tour. Take notes and report what you learn. Does it sound as if WebEx would work for your team? In class discussion or in a memo, describe how WebEx works.
What are the five generic competitive strategies : What are the five generic competitive strategies? Briefly describe each one and identify the type of competitive advantage that each strategy is aimed at achieving.
Investment expenses : Rich and Shauna Nielson file a joint tax return, and they itemize deductions. Assume their marginal tax rate on ordinary income is 25 percent. The Nielsons incur $2,400 in miscellaneous itemized deductions, excluding investment expenses.
Describe how relational databases are used in olap analysis : Describe how relational databases are used in OLAP analysis, data mining, and E-commerce website applications.
Introduce some problems with social media : Introduce some problems with social media that have negatively impacted the academic performance of college students.  Social media has created several social problems that have changed the way college students live.
Calculate the mean of this frequency distribution : What percentage of the checkout times was at least 4 minutes? Calculate the mean of this frequency  distribution. Calculate the standard deviation of this frequency distribution
What industry conditions of perfectly competitive industry : What industry meets the conditions of a perfectly competitive industry and how the individual firms would respond to an increase in the market demand for the product.
What makes that person a good listener : Who is the best listener you know? What makes that person a good listener? Be prepared to discuss your responses in class, with your team, or in a memo to your instructor.
What amount of goodwill should be reported : Samson is a separate cash-generating unit and reporting unit. At the end of Year 1, Bartholomew compiles the following information for Samson.

Reviews

Write a Review

Basic Computer Science Questions & Answers

  Find the sum of the squares of the integers

Find the sum of the squares of the integers from 1 to My Square, where My Square is input by the user.be sure to check that the user enters a positive integer.

  Discuss and explain web browser vulnerabilities

Discuss and explain Web browser vulnerabilities. Include at least two different Web browsers in your discussion.

  How is file management utilized and managed

How is file management utilized and managed? What tools can you use? For those of you who work, how is file management managed in your place of business

  Derive expression for the effective mips rate

Derive an expression for the effective MIPS rate when using this system for the execution of this program in terms of x, n and α.

  Explain utilitarian theory tells us about the morality

What do you believe utilitarian theory tells us about morality of such questions as abortion, capital punishment, or euthenasia? Is utilitarian theory helpful in deciding these questions?

  Analyzing the detailed requirements of your prototype data

Design a database prototype that includes diagrams, data dictionary, design decisions, limitations, etc. The database should consist of at least four tables, two different user roles, and two reports.

  Find a simplified expression for function

find a simplified expression for F = A?BC?D + A?B?D + A?CD + ABD + ABC - Assuming that the inputs ABCD = 0101, BCD = 1001, ABCD = 1011 never occur,

  People must be in a group in order to guarantee

How many people must be in a group in order to guarantee that two people in the group have the same birthday (don't forget leap year)?

  Performs encryption

Performs encryption

  Methods for communication

You will submit a two-part document. In the first part, you will submit a written report in which you select the methods for communication and collaboration that best fit your area of focus and implement them as a training tool for your new Techni..

  Imagine a new file system structure

Imagine a new file system structure, describe it (and how it would work), give examples of its advantages and disadvantages.

  Discusses six reasons why proper forensics protocols

Using at least 500 words - summarize the article. The author discusses six reasons why proper forensics protocols must be followed when collecting computer evidence - can you think of any other reasons

Free Assignment Quote

Assured A++ Grade

Get guaranteed satisfaction & time on delivery in every assignment order you paid with us! We ensure premium quality solution document along with free turntin report!

All rights reserved! Copyrights ©2019-2020 ExpertsMind IT Educational Pvt Ltd