False Myths Persuasive Speech

1129 Words5 Pages

Topic: consequences of believing in false myths about technology
Purpose: To Inform my audience about the consequences of believing in false myths about technology.
Introduction
I. Attention Getter: Have you ever heard myths concerning your phone or maybe your tablet or even your laptop? If you have, did you ever believe them? Did you ever think of the consequences if they were wrong? Well today I will be taking about some of the most common myths that are actually false about our gadgets and their possible consequences.
II. Credibility Statement: I constantly come across different myths concerning my gadgets and I am always skeptical about them at first. So I always research about them and I even experienced some of the effects of believing …show more content…

These myths are great time wasters.
1. For example, the myth that “if you don’t properly dismount your USB it will corrupt the data”
a. This is true, but only if you remove the USB while you are in the middle of transferring data.
b. If you aren’t using the USB at all, you can just detach it form your PC without any problems. This is extremely helpful if windows insists that your drive is in use even when it’s not.
2. Another one is “you shouldn’t use your phone while it’s charging”.
a. The truth is, no matter what we do if your phone is not off it will always be running different apps in the background. So using your phone while its charging is fine.
b. Although if you’re using a really heavy app, the battery would probably heat up and as with most electronics long term exposure to excessive heat will degrade the item.
B. They make you needlessly spend money.
1. The more megapixels the better the camera.
a. This is true to a certain extent but at one point the human eye would not be able to distinguish the difference between the higher resolutions.
b. The most important aspect of the camera is not the resolution but the size of the sensor which is responsible for capturing the …show more content…

They can expose you to security risks.
1. One of the most common beliefs is that mac books don’t get viruses.
a. This is absolutely wrong. Mac books being an electronic device that uses software just like windows PCs can also get viruses.
b. Although the chances of getting one are much lower than PCs running windows. The most common reason is that there is less chance for profit for hackers because there are more people who use windows.
2. Wi-Fi networks with a passcode are safe.
a. This is true at times, like with your home Wi-Fi but public Wi-Fis like those in coffee shops and airports are not safe even though their password protected.
b. Since anyone with a password to this network can connect to it and because it is very easy to just ask for the password you would still be connected to a possible hacker who would like to look into what you’re doing or steal you’re information. This makes the password almost useless for protection.
c. Another thing you might want to take note of is that there are two main kinds of Wi-Fi passwords. Namely the WEP and WPA types of encryptions, If you wish to actually make a secure password or encryption, use the WPA encryptions because they are extremely hard to crack. The WEP encryption on the other hand, can be cracked in mere seconds or