SlideShare a Scribd company logo
1 of 6
Problem – Solution
Essay
Problem - Solution
consider the problems of a particular
situation, and give solutions to those
problems
2 https://www.eapfoundation.com/writing/essays/problemsolution/
When is it usually used ?
1. “Real Life” Situations
2. Fiction Responses
3
Don’t Be a Target
by: Mayomi Mori
Problem: possibility of a bank account’s money being stolen
using Online Banking system
Solution:
1. refrain from accessing in Internet Café
2. change password from time to time
3. avoid using password for any request
4. check account history regularly
4
5
Don’t Be a Target
“If so, how can we protect money from crime? First, the most
basic thing is don't access your bank account from the computers in
an Internet cafe or other public places. The computers in public places
have a much greater possibility to be a target of the "Key Logger" program.
If the program is set up on a computer, the program will memorize every
key operation which you type. Furthermore, the program has an automatic
function itself to send the collected information, such as your password or
ID number, to the criminal.”
http://spot.pcc.edu/~dramirez/262Writing8/Handouts/Handbook_ProbSolnEssay.pdf
Thanks!
6

More Related Content

Similar to Problem Solution Essay

Some basics of computer security
Some basics of computer securitySome basics of computer security
Some basics of computer securityshivam paswan
 
Web security ppt sniper corporation
Web security ppt   sniper corporationWeb security ppt   sniper corporation
Web security ppt sniper corporationsharmaakash1881
 
computer and society impact of Computer in society
computer and society  impact of Computer in society computer and society  impact of Computer in society
computer and society impact of Computer in society Sumama Shakir
 
Cybersecurity awareness session.pptx
Cybersecurity awareness session.pptxCybersecurity awareness session.pptx
Cybersecurity awareness session.pptxUmaraZahidLecturer
 
Ransomware and email security ver - 1.3
Ransomware and email security   ver - 1.3Ransomware and email security   ver - 1.3
Ransomware and email security ver - 1.3Denise Bailey
 
La1 information and communication technology and society
La1   information and communication technology and societyLa1   information and communication technology and society
La1 information and communication technology and societyAzmiah Mahmud
 
Learning area 1_-_information_and_communication_technology_and_society
Learning area 1_-_information_and_communication_technology_and_societyLearning area 1_-_information_and_communication_technology_and_society
Learning area 1_-_information_and_communication_technology_and_societySaktis Kesavan
 
Learning area 1 information and communication technology and society
Learning area 1   information and communication technology and societyLearning area 1   information and communication technology and society
Learning area 1 information and communication technology and societyShuren Lew
 
Five habits that might be a cyber security risk
Five habits that might be a cyber security riskFive habits that might be a cyber security risk
Five habits that might be a cyber security riskK. A. M Lutfullah
 
Phishing attack, with SSL Encryption and HTTPS Working
Phishing attack, with SSL Encryption and HTTPS WorkingPhishing attack, with SSL Encryption and HTTPS Working
Phishing attack, with SSL Encryption and HTTPS WorkingSachin Saini
 
Empowerment Technologies - Module 2
Empowerment Technologies - Module 2Empowerment Technologies - Module 2
Empowerment Technologies - Module 2Jesus Rances
 
Online access and computer security.pptx_S.Gautham
Online access and computer security.pptx_S.GauthamOnline access and computer security.pptx_S.Gautham
Online access and computer security.pptx_S.GauthamJoelGautham
 
Computer Security Guide to Pc Security
Computer Security Guide to Pc SecurityComputer Security Guide to Pc Security
Computer Security Guide to Pc SecurityMallTake
 
The Attentions to Protect your Privacy on Internet
The Attentions to Protect your Privacy on InternetThe Attentions to Protect your Privacy on Internet
The Attentions to Protect your Privacy on InternetFord King
 

Similar to Problem Solution Essay (20)

Online spying tools
Online spying toolsOnline spying tools
Online spying tools
 
Online spying tools
Online spying toolsOnline spying tools
Online spying tools
 
Some basics of computer security
Some basics of computer securitySome basics of computer security
Some basics of computer security
 
Web security ppt sniper corporation
Web security ppt   sniper corporationWeb security ppt   sniper corporation
Web security ppt sniper corporation
 
computer and society impact of Computer in society
computer and society  impact of Computer in society computer and society  impact of Computer in society
computer and society impact of Computer in society
 
Cybersecurity awareness session.pptx
Cybersecurity awareness session.pptxCybersecurity awareness session.pptx
Cybersecurity awareness session.pptx
 
Ransomware and email security ver - 1.3
Ransomware and email security   ver - 1.3Ransomware and email security   ver - 1.3
Ransomware and email security ver - 1.3
 
La1 information and communication technology and society
La1   information and communication technology and societyLa1   information and communication technology and society
La1 information and communication technology and society
 
Learning area 1_-_information_and_communication_technology_and_society
Learning area 1_-_information_and_communication_technology_and_societyLearning area 1_-_information_and_communication_technology_and_society
Learning area 1_-_information_and_communication_technology_and_society
 
Learning area 1 information and communication technology and society
Learning area 1   information and communication technology and societyLearning area 1   information and communication technology and society
Learning area 1 information and communication technology and society
 
Web Security
Web SecurityWeb Security
Web Security
 
Viruses
VirusesViruses
Viruses
 
Five habits that might be a cyber security risk
Five habits that might be a cyber security riskFive habits that might be a cyber security risk
Five habits that might be a cyber security risk
 
Phishing attack, with SSL Encryption and HTTPS Working
Phishing attack, with SSL Encryption and HTTPS WorkingPhishing attack, with SSL Encryption and HTTPS Working
Phishing attack, with SSL Encryption and HTTPS Working
 
Empowerment Technologies - Module 2
Empowerment Technologies - Module 2Empowerment Technologies - Module 2
Empowerment Technologies - Module 2
 
Online access and computer security.pptx_S.Gautham
Online access and computer security.pptx_S.GauthamOnline access and computer security.pptx_S.Gautham
Online access and computer security.pptx_S.Gautham
 
Cyber crime ethics and un ethics
Cyber crime ethics and un ethicsCyber crime ethics and un ethics
Cyber crime ethics and un ethics
 
Computer Security Guide to Pc Security
Computer Security Guide to Pc SecurityComputer Security Guide to Pc Security
Computer Security Guide to Pc Security
 
Cyber security awareness presentation nepal
Cyber security awareness presentation nepalCyber security awareness presentation nepal
Cyber security awareness presentation nepal
 
The Attentions to Protect your Privacy on Internet
The Attentions to Protect your Privacy on InternetThe Attentions to Protect your Privacy on Internet
The Attentions to Protect your Privacy on Internet
 

More from Padme Amidala

Kasanayan sa Pagsulat
Kasanayan  sa PagsulatKasanayan  sa Pagsulat
Kasanayan sa PagsulatPadme Amidala
 
Akademikong Pagsulat Abstrak
Akademikong Pagsulat AbstrakAkademikong Pagsulat Abstrak
Akademikong Pagsulat AbstrakPadme Amidala
 
Life of Saint John Baptist De La Salle and the Forms of Prayer
Life of Saint John Baptist De La Salle and the Forms of PrayerLife of Saint John Baptist De La Salle and the Forms of Prayer
Life of Saint John Baptist De La Salle and the Forms of PrayerPadme Amidala
 
The Life of Saint John Baptist De La Salle
The Life of Saint John Baptist De La SalleThe Life of Saint John Baptist De La Salle
The Life of Saint John Baptist De La SallePadme Amidala
 
Features and barriers of communication
Features and barriers of communicationFeatures and barriers of communication
Features and barriers of communicationPadme Amidala
 
Math linear equations
Math linear equationsMath linear equations
Math linear equationsPadme Amidala
 
Higher Order Deriavatives
Higher Order DeriavativesHigher Order Deriavatives
Higher Order DeriavativesPadme Amidala
 
Higher order derivatives
Higher order derivativesHigher order derivatives
Higher order derivativesPadme Amidala
 
Sinaunang kabihasnan sa asya
Sinaunang kabihasnan sa asyaSinaunang kabihasnan sa asya
Sinaunang kabihasnan sa asyaPadme Amidala
 
Relihiyon at pilosopiya sa asya
Relihiyon at pilosopiya sa asyaRelihiyon at pilosopiya sa asya
Relihiyon at pilosopiya sa asyaPadme Amidala
 
Kolonyalismo at imperyalismo sa kanlurang asya at timog
Kolonyalismo at imperyalismo sa kanlurang asya at timogKolonyalismo at imperyalismo sa kanlurang asya at timog
Kolonyalismo at imperyalismo sa kanlurang asya at timogPadme Amidala
 

More from Padme Amidala (20)

Democracy Lesson
Democracy LessonDemocracy Lesson
Democracy Lesson
 
Kasanayan sa Pagsulat
Kasanayan  sa PagsulatKasanayan  sa Pagsulat
Kasanayan sa Pagsulat
 
Akademikong Pagsulat Abstrak
Akademikong Pagsulat AbstrakAkademikong Pagsulat Abstrak
Akademikong Pagsulat Abstrak
 
Life of Saint John Baptist De La Salle and the Forms of Prayer
Life of Saint John Baptist De La Salle and the Forms of PrayerLife of Saint John Baptist De La Salle and the Forms of Prayer
Life of Saint John Baptist De La Salle and the Forms of Prayer
 
The Holy bible
The Holy bibleThe Holy bible
The Holy bible
 
The Life of Saint John Baptist De La Salle
The Life of Saint John Baptist De La SalleThe Life of Saint John Baptist De La Salle
The Life of Saint John Baptist De La Salle
 
Introduction to ICT
Introduction to ICTIntroduction to ICT
Introduction to ICT
 
Features and barriers of communication
Features and barriers of communicationFeatures and barriers of communication
Features and barriers of communication
 
Math linear equations
Math linear equationsMath linear equations
Math linear equations
 
Higher Order Deriavatives
Higher Order DeriavativesHigher Order Deriavatives
Higher Order Deriavatives
 
Pagpili ng paksa
Pagpili ng paksaPagpili ng paksa
Pagpili ng paksa
 
Punctuation Marks
Punctuation MarksPunctuation Marks
Punctuation Marks
 
Higher order derivatives
Higher order derivativesHigher order derivatives
Higher order derivatives
 
Brainstorming
BrainstormingBrainstorming
Brainstorming
 
Sinaunang kabihasnan sa asya
Sinaunang kabihasnan sa asyaSinaunang kabihasnan sa asya
Sinaunang kabihasnan sa asya
 
Relihiyon at pilosopiya sa asya
Relihiyon at pilosopiya sa asyaRelihiyon at pilosopiya sa asya
Relihiyon at pilosopiya sa asya
 
Kolonyalismo
KolonyalismoKolonyalismo
Kolonyalismo
 
Kolonyalismo at imperyalismo sa kanlurang asya at timog
Kolonyalismo at imperyalismo sa kanlurang asya at timogKolonyalismo at imperyalismo sa kanlurang asya at timog
Kolonyalismo at imperyalismo sa kanlurang asya at timog
 
Mga Asyano
Mga AsyanoMga Asyano
Mga Asyano
 
Kontinente ng Asya
Kontinente ng AsyaKontinente ng Asya
Kontinente ng Asya
 

Recently uploaded

Interactive Powerpoint_How to Master effective communication
Interactive Powerpoint_How to Master effective communicationInteractive Powerpoint_How to Master effective communication
Interactive Powerpoint_How to Master effective communicationnomboosow
 
mini mental status format.docx
mini    mental       status     format.docxmini    mental       status     format.docx
mini mental status format.docxPoojaSen20
 
Organic Name Reactions for the students and aspirants of Chemistry12th.pptx
Organic Name Reactions  for the students and aspirants of Chemistry12th.pptxOrganic Name Reactions  for the students and aspirants of Chemistry12th.pptx
Organic Name Reactions for the students and aspirants of Chemistry12th.pptxVS Mahajan Coaching Centre
 
Mastering the Unannounced Regulatory Inspection
Mastering the Unannounced Regulatory InspectionMastering the Unannounced Regulatory Inspection
Mastering the Unannounced Regulatory InspectionSafetyChain Software
 
Introduction to AI in Higher Education_draft.pptx
Introduction to AI in Higher Education_draft.pptxIntroduction to AI in Higher Education_draft.pptx
Introduction to AI in Higher Education_draft.pptxpboyjonauth
 
Contemporary philippine arts from the regions_PPT_Module_12 [Autosaved] (1).pptx
Contemporary philippine arts from the regions_PPT_Module_12 [Autosaved] (1).pptxContemporary philippine arts from the regions_PPT_Module_12 [Autosaved] (1).pptx
Contemporary philippine arts from the regions_PPT_Module_12 [Autosaved] (1).pptxRoyAbrique
 
Enzyme, Pharmaceutical Aids, Miscellaneous Last Part of Chapter no 5th.pdf
Enzyme, Pharmaceutical Aids, Miscellaneous Last Part of Chapter no 5th.pdfEnzyme, Pharmaceutical Aids, Miscellaneous Last Part of Chapter no 5th.pdf
Enzyme, Pharmaceutical Aids, Miscellaneous Last Part of Chapter no 5th.pdfSumit Tiwari
 
Sanyam Choudhary Chemistry practical.pdf
Sanyam Choudhary Chemistry practical.pdfSanyam Choudhary Chemistry practical.pdf
Sanyam Choudhary Chemistry practical.pdfsanyamsingh5019
 
How to Make a Pirate ship Primary Education.pptx
How to Make a Pirate ship Primary Education.pptxHow to Make a Pirate ship Primary Education.pptx
How to Make a Pirate ship Primary Education.pptxmanuelaromero2013
 
18-04-UA_REPORT_MEDIALITERAСY_INDEX-DM_23-1-final-eng.pdf
18-04-UA_REPORT_MEDIALITERAСY_INDEX-DM_23-1-final-eng.pdf18-04-UA_REPORT_MEDIALITERAСY_INDEX-DM_23-1-final-eng.pdf
18-04-UA_REPORT_MEDIALITERAСY_INDEX-DM_23-1-final-eng.pdfssuser54595a
 
Employee wellbeing at the workplace.pptx
Employee wellbeing at the workplace.pptxEmployee wellbeing at the workplace.pptx
Employee wellbeing at the workplace.pptxNirmalaLoungPoorunde1
 
Science 7 - LAND and SEA BREEZE and its Characteristics
Science 7 - LAND and SEA BREEZE and its CharacteristicsScience 7 - LAND and SEA BREEZE and its Characteristics
Science 7 - LAND and SEA BREEZE and its CharacteristicsKarinaGenton
 
POINT- BIOCHEMISTRY SEM 2 ENZYMES UNIT 5.pptx
POINT- BIOCHEMISTRY SEM 2 ENZYMES UNIT 5.pptxPOINT- BIOCHEMISTRY SEM 2 ENZYMES UNIT 5.pptx
POINT- BIOCHEMISTRY SEM 2 ENZYMES UNIT 5.pptxSayali Powar
 
Class 11 Legal Studies Ch-1 Concept of State .pdf
Class 11 Legal Studies Ch-1 Concept of State .pdfClass 11 Legal Studies Ch-1 Concept of State .pdf
Class 11 Legal Studies Ch-1 Concept of State .pdfakmcokerachita
 
Presentation by Andreas Schleicher Tackling the School Absenteeism Crisis 30 ...
Presentation by Andreas Schleicher Tackling the School Absenteeism Crisis 30 ...Presentation by Andreas Schleicher Tackling the School Absenteeism Crisis 30 ...
Presentation by Andreas Schleicher Tackling the School Absenteeism Crisis 30 ...EduSkills OECD
 
“Oh GOSH! Reflecting on Hackteria's Collaborative Practices in a Global Do-It...
“Oh GOSH! Reflecting on Hackteria's Collaborative Practices in a Global Do-It...“Oh GOSH! Reflecting on Hackteria's Collaborative Practices in a Global Do-It...
“Oh GOSH! Reflecting on Hackteria's Collaborative Practices in a Global Do-It...Marc Dusseiller Dusjagr
 

Recently uploaded (20)

Interactive Powerpoint_How to Master effective communication
Interactive Powerpoint_How to Master effective communicationInteractive Powerpoint_How to Master effective communication
Interactive Powerpoint_How to Master effective communication
 
mini mental status format.docx
mini    mental       status     format.docxmini    mental       status     format.docx
mini mental status format.docx
 
TataKelola dan KamSiber Kecerdasan Buatan v022.pdf
TataKelola dan KamSiber Kecerdasan Buatan v022.pdfTataKelola dan KamSiber Kecerdasan Buatan v022.pdf
TataKelola dan KamSiber Kecerdasan Buatan v022.pdf
 
Organic Name Reactions for the students and aspirants of Chemistry12th.pptx
Organic Name Reactions  for the students and aspirants of Chemistry12th.pptxOrganic Name Reactions  for the students and aspirants of Chemistry12th.pptx
Organic Name Reactions for the students and aspirants of Chemistry12th.pptx
 
Mastering the Unannounced Regulatory Inspection
Mastering the Unannounced Regulatory InspectionMastering the Unannounced Regulatory Inspection
Mastering the Unannounced Regulatory Inspection
 
Introduction to AI in Higher Education_draft.pptx
Introduction to AI in Higher Education_draft.pptxIntroduction to AI in Higher Education_draft.pptx
Introduction to AI in Higher Education_draft.pptx
 
Contemporary philippine arts from the regions_PPT_Module_12 [Autosaved] (1).pptx
Contemporary philippine arts from the regions_PPT_Module_12 [Autosaved] (1).pptxContemporary philippine arts from the regions_PPT_Module_12 [Autosaved] (1).pptx
Contemporary philippine arts from the regions_PPT_Module_12 [Autosaved] (1).pptx
 
Enzyme, Pharmaceutical Aids, Miscellaneous Last Part of Chapter no 5th.pdf
Enzyme, Pharmaceutical Aids, Miscellaneous Last Part of Chapter no 5th.pdfEnzyme, Pharmaceutical Aids, Miscellaneous Last Part of Chapter no 5th.pdf
Enzyme, Pharmaceutical Aids, Miscellaneous Last Part of Chapter no 5th.pdf
 
Sanyam Choudhary Chemistry practical.pdf
Sanyam Choudhary Chemistry practical.pdfSanyam Choudhary Chemistry practical.pdf
Sanyam Choudhary Chemistry practical.pdf
 
How to Make a Pirate ship Primary Education.pptx
How to Make a Pirate ship Primary Education.pptxHow to Make a Pirate ship Primary Education.pptx
How to Make a Pirate ship Primary Education.pptx
 
18-04-UA_REPORT_MEDIALITERAСY_INDEX-DM_23-1-final-eng.pdf
18-04-UA_REPORT_MEDIALITERAСY_INDEX-DM_23-1-final-eng.pdf18-04-UA_REPORT_MEDIALITERAСY_INDEX-DM_23-1-final-eng.pdf
18-04-UA_REPORT_MEDIALITERAСY_INDEX-DM_23-1-final-eng.pdf
 
9953330565 Low Rate Call Girls In Rohini Delhi NCR
9953330565 Low Rate Call Girls In Rohini  Delhi NCR9953330565 Low Rate Call Girls In Rohini  Delhi NCR
9953330565 Low Rate Call Girls In Rohini Delhi NCR
 
Código Creativo y Arte de Software | Unidad 1
Código Creativo y Arte de Software | Unidad 1Código Creativo y Arte de Software | Unidad 1
Código Creativo y Arte de Software | Unidad 1
 
Model Call Girl in Tilak Nagar Delhi reach out to us at 🔝9953056974🔝
Model Call Girl in Tilak Nagar Delhi reach out to us at 🔝9953056974🔝Model Call Girl in Tilak Nagar Delhi reach out to us at 🔝9953056974🔝
Model Call Girl in Tilak Nagar Delhi reach out to us at 🔝9953056974🔝
 
Employee wellbeing at the workplace.pptx
Employee wellbeing at the workplace.pptxEmployee wellbeing at the workplace.pptx
Employee wellbeing at the workplace.pptx
 
Science 7 - LAND and SEA BREEZE and its Characteristics
Science 7 - LAND and SEA BREEZE and its CharacteristicsScience 7 - LAND and SEA BREEZE and its Characteristics
Science 7 - LAND and SEA BREEZE and its Characteristics
 
POINT- BIOCHEMISTRY SEM 2 ENZYMES UNIT 5.pptx
POINT- BIOCHEMISTRY SEM 2 ENZYMES UNIT 5.pptxPOINT- BIOCHEMISTRY SEM 2 ENZYMES UNIT 5.pptx
POINT- BIOCHEMISTRY SEM 2 ENZYMES UNIT 5.pptx
 
Class 11 Legal Studies Ch-1 Concept of State .pdf
Class 11 Legal Studies Ch-1 Concept of State .pdfClass 11 Legal Studies Ch-1 Concept of State .pdf
Class 11 Legal Studies Ch-1 Concept of State .pdf
 
Presentation by Andreas Schleicher Tackling the School Absenteeism Crisis 30 ...
Presentation by Andreas Schleicher Tackling the School Absenteeism Crisis 30 ...Presentation by Andreas Schleicher Tackling the School Absenteeism Crisis 30 ...
Presentation by Andreas Schleicher Tackling the School Absenteeism Crisis 30 ...
 
“Oh GOSH! Reflecting on Hackteria's Collaborative Practices in a Global Do-It...
“Oh GOSH! Reflecting on Hackteria's Collaborative Practices in a Global Do-It...“Oh GOSH! Reflecting on Hackteria's Collaborative Practices in a Global Do-It...
“Oh GOSH! Reflecting on Hackteria's Collaborative Practices in a Global Do-It...
 

Problem Solution Essay

  • 2. Problem - Solution consider the problems of a particular situation, and give solutions to those problems 2 https://www.eapfoundation.com/writing/essays/problemsolution/
  • 3. When is it usually used ? 1. “Real Life” Situations 2. Fiction Responses 3
  • 4. Don’t Be a Target by: Mayomi Mori Problem: possibility of a bank account’s money being stolen using Online Banking system Solution: 1. refrain from accessing in Internet Café 2. change password from time to time 3. avoid using password for any request 4. check account history regularly 4
  • 5. 5 Don’t Be a Target “If so, how can we protect money from crime? First, the most basic thing is don't access your bank account from the computers in an Internet cafe or other public places. The computers in public places have a much greater possibility to be a target of the "Key Logger" program. If the program is set up on a computer, the program will memorize every key operation which you type. Furthermore, the program has an automatic function itself to send the collected information, such as your password or ID number, to the criminal.” http://spot.pcc.edu/~dramirez/262Writing8/Handouts/Handbook_ProbSolnEssay.pdf