“Computers” is a word that defines a broad selection of devices. While for some time the definition that came to most people’s mind was of an unshapely box that sat around a desk somewhere in the home or office, occasionally whirring, and quite useful for typing out documents, times have changed. The look, shape, and functionality of computers has also changed. Now, it’s impossible to find a new automobile for sale that doesn’t have a slew of computers beneath the hood. Wristwatches with altimeters and other extraneous features have become more computer and less a craftily assembled set of gears, as watches once were.
It’s not just in the consumer world that computers have become prevalent. Manufacturing industries have long made use of the “gee whiz” capabilities of accurate, non-tiring machines. From portion control “it’s” important to fill a 12 ounce bottle accurately with 12 ounces of fluid “ to auto part manufacture, the curves and sleek, aerodynamic designs of modern cars are enabled by intelligent machines. While a human programs the computers on the front end and takes care of any repair jobs, the computer takes it from there, and doesn’t complain when it gets no paid holiday. It’s easy to understand why a manufacturing plant operator would want to “employ” as many computers as possible: they’re accurate, non-tiring, never need a bathroom or lunch break, and will never ask for a pay raise.
As the new millennium gains age, computers will be found in ever more widespread use. Their accuracy and reliability will only increase, as will the viruses and bugs that are created with malicious intent to destroy or hard the performance that they offer. It’s easy to picture the punishments associated with computer hacking becoming far more serious as time goes on. Hacking one computer necessarily means that many integrated, linked machines will be affected by the malicious code, similar in criminal nature, to a string of burglaries.