SlideShare a Scribd company logo
1 of 4
Download to read offline
Essay about Computer Hackers
Computer Hackers
Hackers are popularly defined as computer experts who spend enormous amounts of time trying to
breach the security of networks, web servers and email servers. Usually they use a selection of
specialist software to identify any weaknesses, which they are then able to exploit. There are
basically two main types of hackers, the first type is mainly consistent of intelligent adolescents who
acquire their hacking knowledge by reading, by talking to people and by spending an excessive
amount of time on their computer, learning the various programs, the source code and the
commands. They are then able to solve puzzles that people with computer engineering backgrounds
can't solve. vast...show more content...
Some, however, may cause random damage to data files (sometimes insidiously, over a long period)
or attempt to destroy files and disks. Others cause unintended damage. Even benign viruses
(apparently non–destructive viruses) cause significant damage by occupying disk space and/or main
memory, by using up CPU processing time, and by the time and expense wasted in detecting and
removing them.
There are several main types of viruses out there that hackers may use:
v File Viruses – A file virus is a virus that attaches itself to a file, usually an executable application
like a word–processing program and in general file viruses don't infect data files. However, data
files can contain embedded executable code such as macros, which may be used by hackers, as a
file virus infects other files when the program to which it is attached is run, it can spread across a
network (often very quickly).
v Boot–sector Viruses– Boot sector viruses alter the program that is in the first sector of every disk.
This is the space in the computer that automatically runs each time the machine is turned on.
Generally, a boot–sector infector executes its own code (which usually infects the boot sector or
partition sector of the hard disk), then continues the PC start–up process. In most cases, all
write–enabled floppies used on that PC from then on will become infected. A PC is infected with
Get more content on HelpWriting.net
Essay on Cyber Attacks
On April 27, 2007 cyber–attacks began crippling key infrastructures of banks, ministries, and
newspapers. These attacks took place, in part, because of a statue. This statue is not just a two–meter
tall man holding a helmet; this individual represents and symbolizes the lives lost in the Second
World War. The statue has been under a lot of speculation and has torn the population of the
country in half. Some believe the status is a symbol of Soviet, formerly Nazi, while some see this
statue as symbol of Soviet victory over the Nazis and Russian claims Estonia. When the government
decided to relocate the statue to Estonia's capital, the worst riots the country has ever seen took place
and this started vicious cyber–attacks (Jenik). One may...show more content...
These attacks did not target one organization either, as the attacks focused on parliaments, banks,
ministries, newspapers, and broadcasters.
The next characteristic of cyber war is anonymity. With the Estonia case nobody was sure who did
the attacking and who to blame. At first Estonian Foreign Minister Urmas Paet accused Kremlin of
the attacks but then retracted this statement because of lack of evidence. NATO nor European
Commission experts were able to find any involvement of the Russian government in these attacks.
These attacks were determined to be one of the "zombie" computers used in the attack. The only
person ever arrested for the attacks was an ethnic Russian "hacketivist" living in Estonia
(Denial–of–Service).
Fast –15 minutes to breakdown a society is another factor of cyber war. In such a short amount of
time the infrastructure of Estonia went down. The internet played a crucial part of their country
because of how people use the internet to pay for street parking and banking transactions. By
shutting down these key components of their country society is broken down and halted.
International web traffic was also blocked to assist in stopping these attacks.
By looking at the characteristics of cyber war from our lecture slides we can see that since all these
components satisfy the definition, we can view the Estonia case as a cyber–war. The broader
definition is that the use of computers
Get more content on HelpWriting.net
Cyber Crime Speech
Hello everyone. First of all I would like to thank Madam Munirah for giving me the opportunity to
be here today. So, before I proceed with my speech, let me introduce myself first. The name's
given is Nur Syifa and I am 20 years old. The topic of today's speech is "Internet: how wild can it
be?" As all of us aware, internet is one of the best inventions for us and importance of the internet is
huge in our lives. It has become the best source to get information about everything. With internet we
can stay updated with the latest happenings in the world, stay connected with people and many
more. But as you know, nothing comes with "benefit". Everything has its negative points as well as
the internet. The question might have hit your mind that what are the bad sides of the internet,
right? The first point that we're going to discuss is about how easily inappropriate materials can be
found on the internet. There are many things available on the...show more content...
The dependency over internet has led to increase in cyber crime. Some criminals use the internet for
spreading computer viruses and also fraud. Cyber crime is a new type of crime that occurs in this
Science and Technology years. There are a lot of definitions for cyber crime. According to
Wikipedia.com cyber crime is known as computer crime that refers to any crime that involves a
computer and a network. Besides that, cyber crime is also defined as crimes committed on the
internet using the computer as either a tool or a targeted victim. One of the cyber crime is the
internet fraud. The most severe form of internet fraud involves identity theft, which is illegally
getting a hold of someone's personal information in some way that uses fraud or deception and is
used for financial gain. One method of getting people's bank account details is the money transfer
email scam. People receive emails requesting help with transferring funds from another
Get more content on HelpWriting.net
Cyber Bullying Essay example
Social Networking has taken bullying to the extreme. Before advanced technology, children and
teenagers were troubled by school bullies. Today, they are targeted by bullies via internet. Most
people undergo some form of bullying in life. Growing up, I experienced the typical name calling
and spiteful comments. I also dealt with minor cases of virtual bullies. These bullies are known as
cyber bullies. I find this topic compelling because it's a matter that has spiraled out of control. "Cyber
bullying is defined as using the computer or other electronic devices to intimidate, threaten or
humiliate another individual," Admin October 13th, 2008. As the
Hartman 2 internet continues growing more popular with the youth, so do potential...show more
content...
This makes the bully feel more powerful.
Hartman 3
There's not a legitimate reason for cyber bullying. Many perpetrators bully just to get a reaction. It's
common for them to bully another just to boost their ego. It makes the tormentor feel in charge.
Some may think it's humorous to tease and make fun of others and that it's not harmful in any way.
The reality is being bullied can cause many problems for children and teenagers.
Many negative effects are outcomes of cyber bullies. The impact cyber bullying has on kids is
detrimental. Victims can develop psychological problems. For example, victims begin having
anxiety, lower self–esteem, and frustration. They may also be diagnosed with depression. It's tough
to ignore cyber bullying. Compared to school bullies, internet bullies cause their victim more
emotional pain. Children and teenagers are able to escape school bullies when they return home.
However targets of cyber bullying don't have that advantage.
There is no argument as to if cyber bullying is good or bad. However is social networking to
blame? Or is lack of parent monitoring the problem? It's true that adolescents are often given too
much technology independence. I believe parents should fully acknowledge what websites their
children are visiting and what they are posting. On the contrary, I feel there is no excuse for child or
teenager to feel the urge to emotionally attack
Get more content on HelpWriting.net

More Related Content

More from Paper Writer Service (20)

Reflective Personal Essay
Reflective Personal EssayReflective Personal Essay
Reflective Personal Essay
 
Eveline Essay
Eveline EssayEveline Essay
Eveline Essay
 
Greek Mythology Essay
Greek Mythology EssayGreek Mythology Essay
Greek Mythology Essay
 
Ccot Essays
Ccot EssaysCcot Essays
Ccot Essays
 
Journey In Life Essay
Journey In Life EssayJourney In Life Essay
Journey In Life Essay
 
Essay Cinema
Essay CinemaEssay Cinema
Essay Cinema
 
Graduate Entrance Essay
Graduate Entrance EssayGraduate Entrance Essay
Graduate Entrance Essay
 
Research Essay Proposal Sample
Research Essay Proposal SampleResearch Essay Proposal Sample
Research Essay Proposal Sample
 
The World Is Flat Essay
The World Is Flat EssayThe World Is Flat Essay
The World Is Flat Essay
 
Essay Perfume
Essay PerfumeEssay Perfume
Essay Perfume
 
Montaigne Essays Summary
Montaigne Essays SummaryMontaigne Essays Summary
Montaigne Essays Summary
 
Tips On Writing A Good Narrative Essay
Tips On Writing A Good Narrative EssayTips On Writing A Good Narrative Essay
Tips On Writing A Good Narrative Essay
 
Essay On Jealousy
Essay On JealousyEssay On Jealousy
Essay On Jealousy
 
Essay On Einstein
Essay On EinsteinEssay On Einstein
Essay On Einstein
 
Sample Admission Essays
Sample Admission EssaysSample Admission Essays
Sample Admission Essays
 
Julius Caesar Essay Questions
Julius Caesar Essay QuestionsJulius Caesar Essay Questions
Julius Caesar Essay Questions
 
Good Leadership Essay
Good Leadership EssayGood Leadership Essay
Good Leadership Essay
 
I Need Help With My Essay
I Need Help With My EssayI Need Help With My Essay
I Need Help With My Essay
 
Mandala Essay Examples
Mandala Essay ExamplesMandala Essay Examples
Mandala Essay Examples
 
Essay On Disaster Management
Essay On Disaster ManagementEssay On Disaster Management
Essay On Disaster Management
 

Recently uploaded

Crayon Activity Handout For the Crayon A
Crayon Activity Handout For the Crayon ACrayon Activity Handout For the Crayon A
Crayon Activity Handout For the Crayon AUnboundStockton
 
ECONOMIC CONTEXT - LONG FORM TV DRAMA - PPT
ECONOMIC CONTEXT - LONG FORM TV DRAMA - PPTECONOMIC CONTEXT - LONG FORM TV DRAMA - PPT
ECONOMIC CONTEXT - LONG FORM TV DRAMA - PPTiammrhaywood
 
Roles & Responsibilities in Pharmacovigilance
Roles & Responsibilities in PharmacovigilanceRoles & Responsibilities in Pharmacovigilance
Roles & Responsibilities in PharmacovigilanceSamikshaHamane
 
KSHARA STURA .pptx---KSHARA KARMA THERAPY (CAUSTIC THERAPY)————IMP.OF KSHARA ...
KSHARA STURA .pptx---KSHARA KARMA THERAPY (CAUSTIC THERAPY)————IMP.OF KSHARA ...KSHARA STURA .pptx---KSHARA KARMA THERAPY (CAUSTIC THERAPY)————IMP.OF KSHARA ...
KSHARA STURA .pptx---KSHARA KARMA THERAPY (CAUSTIC THERAPY)————IMP.OF KSHARA ...M56BOOKSTORE PRODUCT/SERVICE
 
Capitol Tech U Doctoral Presentation - April 2024.pptx
Capitol Tech U Doctoral Presentation - April 2024.pptxCapitol Tech U Doctoral Presentation - April 2024.pptx
Capitol Tech U Doctoral Presentation - April 2024.pptxCapitolTechU
 
Hierarchy of management that covers different levels of management
Hierarchy of management that covers different levels of managementHierarchy of management that covers different levels of management
Hierarchy of management that covers different levels of managementmkooblal
 
History Class XII Ch. 3 Kinship, Caste and Class (1).pptx
History Class XII Ch. 3 Kinship, Caste and Class (1).pptxHistory Class XII Ch. 3 Kinship, Caste and Class (1).pptx
History Class XII Ch. 3 Kinship, Caste and Class (1).pptxsocialsciencegdgrohi
 
call girls in Kamla Market (DELHI) 🔝 >༒9953330565🔝 genuine Escort Service 🔝✔️✔️
call girls in Kamla Market (DELHI) 🔝 >༒9953330565🔝 genuine Escort Service 🔝✔️✔️call girls in Kamla Market (DELHI) 🔝 >༒9953330565🔝 genuine Escort Service 🔝✔️✔️
call girls in Kamla Market (DELHI) 🔝 >༒9953330565🔝 genuine Escort Service 🔝✔️✔️9953056974 Low Rate Call Girls In Saket, Delhi NCR
 
EPANDING THE CONTENT OF AN OUTLINE using notes.pptx
EPANDING THE CONTENT OF AN OUTLINE using notes.pptxEPANDING THE CONTENT OF AN OUTLINE using notes.pptx
EPANDING THE CONTENT OF AN OUTLINE using notes.pptxRaymartEstabillo3
 
Solving Puzzles Benefits Everyone (English).pptx
Solving Puzzles Benefits Everyone (English).pptxSolving Puzzles Benefits Everyone (English).pptx
Solving Puzzles Benefits Everyone (English).pptxOH TEIK BIN
 
Final demo Grade 9 for demo Plan dessert.pptx
Final demo Grade 9 for demo Plan dessert.pptxFinal demo Grade 9 for demo Plan dessert.pptx
Final demo Grade 9 for demo Plan dessert.pptxAvyJaneVismanos
 
Meghan Sutherland In Media Res Media Component
Meghan Sutherland In Media Res Media ComponentMeghan Sutherland In Media Res Media Component
Meghan Sutherland In Media Res Media ComponentInMediaRes1
 
How to Make a Pirate ship Primary Education.pptx
How to Make a Pirate ship Primary Education.pptxHow to Make a Pirate ship Primary Education.pptx
How to Make a Pirate ship Primary Education.pptxmanuelaromero2013
 
Introduction to ArtificiaI Intelligence in Higher Education
Introduction to ArtificiaI Intelligence in Higher EducationIntroduction to ArtificiaI Intelligence in Higher Education
Introduction to ArtificiaI Intelligence in Higher Educationpboyjonauth
 
DATA STRUCTURE AND ALGORITHM for beginners
DATA STRUCTURE AND ALGORITHM for beginnersDATA STRUCTURE AND ALGORITHM for beginners
DATA STRUCTURE AND ALGORITHM for beginnersSabitha Banu
 
Incoming and Outgoing Shipments in 1 STEP Using Odoo 17
Incoming and Outgoing Shipments in 1 STEP Using Odoo 17Incoming and Outgoing Shipments in 1 STEP Using Odoo 17
Incoming and Outgoing Shipments in 1 STEP Using Odoo 17Celine George
 
Computed Fields and api Depends in the Odoo 17
Computed Fields and api Depends in the Odoo 17Computed Fields and api Depends in the Odoo 17
Computed Fields and api Depends in the Odoo 17Celine George
 
Employee wellbeing at the workplace.pptx
Employee wellbeing at the workplace.pptxEmployee wellbeing at the workplace.pptx
Employee wellbeing at the workplace.pptxNirmalaLoungPoorunde1
 

Recently uploaded (20)

Crayon Activity Handout For the Crayon A
Crayon Activity Handout For the Crayon ACrayon Activity Handout For the Crayon A
Crayon Activity Handout For the Crayon A
 
ECONOMIC CONTEXT - LONG FORM TV DRAMA - PPT
ECONOMIC CONTEXT - LONG FORM TV DRAMA - PPTECONOMIC CONTEXT - LONG FORM TV DRAMA - PPT
ECONOMIC CONTEXT - LONG FORM TV DRAMA - PPT
 
Roles & Responsibilities in Pharmacovigilance
Roles & Responsibilities in PharmacovigilanceRoles & Responsibilities in Pharmacovigilance
Roles & Responsibilities in Pharmacovigilance
 
KSHARA STURA .pptx---KSHARA KARMA THERAPY (CAUSTIC THERAPY)————IMP.OF KSHARA ...
KSHARA STURA .pptx---KSHARA KARMA THERAPY (CAUSTIC THERAPY)————IMP.OF KSHARA ...KSHARA STURA .pptx---KSHARA KARMA THERAPY (CAUSTIC THERAPY)————IMP.OF KSHARA ...
KSHARA STURA .pptx---KSHARA KARMA THERAPY (CAUSTIC THERAPY)————IMP.OF KSHARA ...
 
Capitol Tech U Doctoral Presentation - April 2024.pptx
Capitol Tech U Doctoral Presentation - April 2024.pptxCapitol Tech U Doctoral Presentation - April 2024.pptx
Capitol Tech U Doctoral Presentation - April 2024.pptx
 
Hierarchy of management that covers different levels of management
Hierarchy of management that covers different levels of managementHierarchy of management that covers different levels of management
Hierarchy of management that covers different levels of management
 
History Class XII Ch. 3 Kinship, Caste and Class (1).pptx
History Class XII Ch. 3 Kinship, Caste and Class (1).pptxHistory Class XII Ch. 3 Kinship, Caste and Class (1).pptx
History Class XII Ch. 3 Kinship, Caste and Class (1).pptx
 
call girls in Kamla Market (DELHI) 🔝 >༒9953330565🔝 genuine Escort Service 🔝✔️✔️
call girls in Kamla Market (DELHI) 🔝 >༒9953330565🔝 genuine Escort Service 🔝✔️✔️call girls in Kamla Market (DELHI) 🔝 >༒9953330565🔝 genuine Escort Service 🔝✔️✔️
call girls in Kamla Market (DELHI) 🔝 >༒9953330565🔝 genuine Escort Service 🔝✔️✔️
 
9953330565 Low Rate Call Girls In Rohini Delhi NCR
9953330565 Low Rate Call Girls In Rohini  Delhi NCR9953330565 Low Rate Call Girls In Rohini  Delhi NCR
9953330565 Low Rate Call Girls In Rohini Delhi NCR
 
EPANDING THE CONTENT OF AN OUTLINE using notes.pptx
EPANDING THE CONTENT OF AN OUTLINE using notes.pptxEPANDING THE CONTENT OF AN OUTLINE using notes.pptx
EPANDING THE CONTENT OF AN OUTLINE using notes.pptx
 
Solving Puzzles Benefits Everyone (English).pptx
Solving Puzzles Benefits Everyone (English).pptxSolving Puzzles Benefits Everyone (English).pptx
Solving Puzzles Benefits Everyone (English).pptx
 
TataKelola dan KamSiber Kecerdasan Buatan v022.pdf
TataKelola dan KamSiber Kecerdasan Buatan v022.pdfTataKelola dan KamSiber Kecerdasan Buatan v022.pdf
TataKelola dan KamSiber Kecerdasan Buatan v022.pdf
 
Final demo Grade 9 for demo Plan dessert.pptx
Final demo Grade 9 for demo Plan dessert.pptxFinal demo Grade 9 for demo Plan dessert.pptx
Final demo Grade 9 for demo Plan dessert.pptx
 
Meghan Sutherland In Media Res Media Component
Meghan Sutherland In Media Res Media ComponentMeghan Sutherland In Media Res Media Component
Meghan Sutherland In Media Res Media Component
 
How to Make a Pirate ship Primary Education.pptx
How to Make a Pirate ship Primary Education.pptxHow to Make a Pirate ship Primary Education.pptx
How to Make a Pirate ship Primary Education.pptx
 
Introduction to ArtificiaI Intelligence in Higher Education
Introduction to ArtificiaI Intelligence in Higher EducationIntroduction to ArtificiaI Intelligence in Higher Education
Introduction to ArtificiaI Intelligence in Higher Education
 
DATA STRUCTURE AND ALGORITHM for beginners
DATA STRUCTURE AND ALGORITHM for beginnersDATA STRUCTURE AND ALGORITHM for beginners
DATA STRUCTURE AND ALGORITHM for beginners
 
Incoming and Outgoing Shipments in 1 STEP Using Odoo 17
Incoming and Outgoing Shipments in 1 STEP Using Odoo 17Incoming and Outgoing Shipments in 1 STEP Using Odoo 17
Incoming and Outgoing Shipments in 1 STEP Using Odoo 17
 
Computed Fields and api Depends in the Odoo 17
Computed Fields and api Depends in the Odoo 17Computed Fields and api Depends in the Odoo 17
Computed Fields and api Depends in the Odoo 17
 
Employee wellbeing at the workplace.pptx
Employee wellbeing at the workplace.pptxEmployee wellbeing at the workplace.pptx
Employee wellbeing at the workplace.pptx
 

Cyber Essays

  • 1. Essay about Computer Hackers Computer Hackers Hackers are popularly defined as computer experts who spend enormous amounts of time trying to breach the security of networks, web servers and email servers. Usually they use a selection of specialist software to identify any weaknesses, which they are then able to exploit. There are basically two main types of hackers, the first type is mainly consistent of intelligent adolescents who acquire their hacking knowledge by reading, by talking to people and by spending an excessive amount of time on their computer, learning the various programs, the source code and the commands. They are then able to solve puzzles that people with computer engineering backgrounds can't solve. vast...show more content... Some, however, may cause random damage to data files (sometimes insidiously, over a long period) or attempt to destroy files and disks. Others cause unintended damage. Even benign viruses (apparently non–destructive viruses) cause significant damage by occupying disk space and/or main memory, by using up CPU processing time, and by the time and expense wasted in detecting and removing them. There are several main types of viruses out there that hackers may use: v File Viruses – A file virus is a virus that attaches itself to a file, usually an executable application like a word–processing program and in general file viruses don't infect data files. However, data files can contain embedded executable code such as macros, which may be used by hackers, as a file virus infects other files when the program to which it is attached is run, it can spread across a network (often very quickly). v Boot–sector Viruses– Boot sector viruses alter the program that is in the first sector of every disk. This is the space in the computer that automatically runs each time the machine is turned on. Generally, a boot–sector infector executes its own code (which usually infects the boot sector or partition sector of the hard disk), then continues the PC start–up process. In most cases, all write–enabled floppies used on that PC from then on will become infected. A PC is infected with Get more content on HelpWriting.net
  • 2. Essay on Cyber Attacks On April 27, 2007 cyber–attacks began crippling key infrastructures of banks, ministries, and newspapers. These attacks took place, in part, because of a statue. This statue is not just a two–meter tall man holding a helmet; this individual represents and symbolizes the lives lost in the Second World War. The statue has been under a lot of speculation and has torn the population of the country in half. Some believe the status is a symbol of Soviet, formerly Nazi, while some see this statue as symbol of Soviet victory over the Nazis and Russian claims Estonia. When the government decided to relocate the statue to Estonia's capital, the worst riots the country has ever seen took place and this started vicious cyber–attacks (Jenik). One may...show more content... These attacks did not target one organization either, as the attacks focused on parliaments, banks, ministries, newspapers, and broadcasters. The next characteristic of cyber war is anonymity. With the Estonia case nobody was sure who did the attacking and who to blame. At first Estonian Foreign Minister Urmas Paet accused Kremlin of the attacks but then retracted this statement because of lack of evidence. NATO nor European Commission experts were able to find any involvement of the Russian government in these attacks. These attacks were determined to be one of the "zombie" computers used in the attack. The only person ever arrested for the attacks was an ethnic Russian "hacketivist" living in Estonia (Denial–of–Service). Fast –15 minutes to breakdown a society is another factor of cyber war. In such a short amount of time the infrastructure of Estonia went down. The internet played a crucial part of their country because of how people use the internet to pay for street parking and banking transactions. By shutting down these key components of their country society is broken down and halted. International web traffic was also blocked to assist in stopping these attacks. By looking at the characteristics of cyber war from our lecture slides we can see that since all these components satisfy the definition, we can view the Estonia case as a cyber–war. The broader definition is that the use of computers Get more content on HelpWriting.net
  • 3. Cyber Crime Speech Hello everyone. First of all I would like to thank Madam Munirah for giving me the opportunity to be here today. So, before I proceed with my speech, let me introduce myself first. The name's given is Nur Syifa and I am 20 years old. The topic of today's speech is "Internet: how wild can it be?" As all of us aware, internet is one of the best inventions for us and importance of the internet is huge in our lives. It has become the best source to get information about everything. With internet we can stay updated with the latest happenings in the world, stay connected with people and many more. But as you know, nothing comes with "benefit". Everything has its negative points as well as the internet. The question might have hit your mind that what are the bad sides of the internet, right? The first point that we're going to discuss is about how easily inappropriate materials can be found on the internet. There are many things available on the...show more content... The dependency over internet has led to increase in cyber crime. Some criminals use the internet for spreading computer viruses and also fraud. Cyber crime is a new type of crime that occurs in this Science and Technology years. There are a lot of definitions for cyber crime. According to Wikipedia.com cyber crime is known as computer crime that refers to any crime that involves a computer and a network. Besides that, cyber crime is also defined as crimes committed on the internet using the computer as either a tool or a targeted victim. One of the cyber crime is the internet fraud. The most severe form of internet fraud involves identity theft, which is illegally getting a hold of someone's personal information in some way that uses fraud or deception and is used for financial gain. One method of getting people's bank account details is the money transfer email scam. People receive emails requesting help with transferring funds from another Get more content on HelpWriting.net
  • 4. Cyber Bullying Essay example Social Networking has taken bullying to the extreme. Before advanced technology, children and teenagers were troubled by school bullies. Today, they are targeted by bullies via internet. Most people undergo some form of bullying in life. Growing up, I experienced the typical name calling and spiteful comments. I also dealt with minor cases of virtual bullies. These bullies are known as cyber bullies. I find this topic compelling because it's a matter that has spiraled out of control. "Cyber bullying is defined as using the computer or other electronic devices to intimidate, threaten or humiliate another individual," Admin October 13th, 2008. As the Hartman 2 internet continues growing more popular with the youth, so do potential...show more content... This makes the bully feel more powerful. Hartman 3 There's not a legitimate reason for cyber bullying. Many perpetrators bully just to get a reaction. It's common for them to bully another just to boost their ego. It makes the tormentor feel in charge. Some may think it's humorous to tease and make fun of others and that it's not harmful in any way. The reality is being bullied can cause many problems for children and teenagers. Many negative effects are outcomes of cyber bullies. The impact cyber bullying has on kids is detrimental. Victims can develop psychological problems. For example, victims begin having anxiety, lower self–esteem, and frustration. They may also be diagnosed with depression. It's tough to ignore cyber bullying. Compared to school bullies, internet bullies cause their victim more emotional pain. Children and teenagers are able to escape school bullies when they return home. However targets of cyber bullying don't have that advantage. There is no argument as to if cyber bullying is good or bad. However is social networking to blame? Or is lack of parent monitoring the problem? It's true that adolescents are often given too much technology independence. I believe parents should fully acknowledge what websites their children are visiting and what they are posting. On the contrary, I feel there is no excuse for child or teenager to feel the urge to emotionally attack Get more content on HelpWriting.net