Read the passage given below and answer the questions that follow: Every day, we put our trust in computing technology in the financial networks that drive the global economy, the aircraft control systems that guide thousands of flights safely to their destinations, the computers that store our documents at work and at home. Yet most people still do not count on computing the way they rely on electricity or the telephone. Individuals and businesses alike are concerned about the privacy, security and availability of their data, about upgrading their hardware, about how new applications might affect their systems. Until these concerns are addressed, computing‘s potential to enrich our daily lives will not be fully realized. Right now, we are only scratching the surface of what computing technology can do. Already, networks of smart, connected devices make it possible for us to do business, communicate, learn and be entertained using everything from fullfeatured PCs to smart, handheld devices. And in the years ahead, a combination of inexpensive microchips and smart software will weave computing into almost every part of our lives. The advance of computing technology has in many ways, tracked the growth of electric power more than a century ago. Manufacturing companies were among the first to use electricity, mostly to improve the productivity. However, in the home, it remained a novel luxury. Many people were reluctant to use the new electrical appliances, unsure of their safety and reliability. By the 1930s, however, technology advanced industry safety initiatives and gradual public acceptance led to a rapid increase in electricity use in many countries- the technology was still not fully trustworthy, but it was safe and reliable enough. Today, the developed world takes electricity for granted. For computers to be taken for granted they must always be available wherever and whenever people need them, they must reliably protect personal information from misuse, give people control over how their data is used and they must be unfailingly secure. We call this concept Trustworthy Computing. Making Trustworthy Computing a reality is both an immediate challenge and a long-term research goal. Trustworthy Computing technology is far more advanced and used in vastly different ways than, it was in the mid-20th century. Yet the way we build computers and the way we largely design software and services around those computers, has not really changed much. Based on your understanding of the passage, answer the questions by choosing the correct option:
The examples of computing technology that are put to everyday use do not include
Answers
Answered by
0
The advance of computing technology has in many ways, tracked the growth of electric power more than a century ago. Manufacturing companies were among the first to use electricity, mostly to improve the productivity. However, in the home, it remained a novel luxury. Many people were reluctant to use the new electrical appliances, unsure of their safety and reliability. By the 1930s, however, technology advanced industry safety initiatives and gradual public acceptance led to a rapid increase in electricity use in many countries- the technology was still not fully trustworthy, but it was safe and reliable enough. Today, the developed world takes electricity for granted.
Similar questions