This essay has been submitted by a student. This is not an example of the work written by professional essay writers.
Theatre

alexWar Games blockbuster film

Pssst… we can write an original essay just for you.

Any subject. Any type of essay. We’ll even meet a 3-hour deadline.

GET YOUR PRICE

writers online

alexWar Games blockbuster film

alexWar Games blockbuster is a film that presents a scene where two gentlemen who believed in the technological missile control are indulging in the cold war to determine their superiority in the field of technology. The movie is presented at the residency, and the two characters are Michael Madison and John Spencer. 1983 was the year when the scene of this film started, and nobody was ready to conceal defeat in this war. The two individuals received an order directing each one of them to introduce the atomic attack and make them weigh their strength over who could do it better. Neither Michael Madison nor John Spencer was ready to accept their incapability on this test. Whoever was able to develop the right procedures for the nuclear attack was to be considered as the winner because that was the standard measure. The cold war portrayed between these two persons makes the film one of the remarkable movies of its time. The scene depicts a competition of minds whereby the smartest person should outshine the other by introducing the correct procedure for developing a nuclear attack.

Additionally, the emergence of computer technology contributed a lot to the success of this task, and the human race had to be up to date in computer wise. However, computer knowledge is currently considered to be more essential compared to the error of this film when it was not fully explored. Most people were still computer illiterate during this time; thus, its demand could not be that high. Today, the computer is the key solution to most activities in the world, contradicting the report done by National security computer control during the error of this film. According to the scene, the report had it that computer technology progress was quite insignificant. Computer operation is based on the availability of the poser, and any default to power renders the computer operational. Comparing the past and the current situations, lack of power in the past could be seen as a global nuisance, and today, it is worst and can be declared as a worldwide disaster. With this regard, the story depicted by was a game blockbuster is significant for global coexistence.

Review

Internet crime has increased significantly following the technological advancement in computers and other internet devices. The internet criminal takes advantage of the high rate of improvement in technology by developing their tactics from the new ideas.  From the film, there was no much experience on the internet and computer from people who lived in the error of the scene. People were ignorant of the several technological changes that are present today; thus, internet crime was not an issue by then. Internet usage was shallow, and the hackers could not cause insecurity because the accounts were restricted. Nobody could be allowed to access one’s internet account, and security was maintained to the peak. They only had one option, which was to reach the phone lines that were provided by dialing directly. Password was only revealed to the internet user and the modem alone. One disadvantage of the password by then was that the security could be minimized because the password was prone to cracking. The infiltration idea suggested in the film in 1983 became noticeable in the year 2009 when penetrance was positively reflected in a mirror.

Don't use plagiarised sources.Get your custom essay just from $11/page

Computer operation is increasing at a tremendous rate, and there is a section of the experts who are of a different idea about the same issue. The computer is used to plan, analyze, and respond to nuclear attacks whenever necessary. Breaking it down, there is an electronic called NORAD, and John Mckittrick tends to differ in opinion over the rate at which people depend on the computer for their daily activities. John Mickittri used to value a supercomputer call WORP alias, and he considered it as the source of his joy. He used to take a lot of his time operating the computer, and he was so addicted that an hour couldn’t pass without him playing his favorite war games. He could also access the finding g about the crisis of real-life using the supercomputer. There are two hackers David and Jennifer, who tried to access the supercomputer using David’s home computer secretly. From the film tails, the two hackers were interested in setting the out coming procedures used by Joshua while playing war games in real-time. The computer responded by developing stove-pipping and could involve in a strike at any time. The objective of the two hackers was now failing, and they thought of reaching Dr.Stephene Falken alias John Wood, the Dad to Joshua, after realizing that they were running out of time. However, the older man did not respond to them as he seems not to worry much about his son’s moves. The most probable results were DefCon I as well as the Armageddon, and the older man was so determined to overcome them; that is why he seems to be less concerned. The credibility of the war game decreases highly when it is substantially deep into fiction science, and it is only recommended when played in the real tale. The keystone army’s move changes the aspect of the film when they include a kid who is more smatter in their troop and overmatch together, yet they are the top government employees. Two men are noticed fighting David and Goliath. The issue is to determine who will lose in favor of the other during the fight. The significance of David and Goliath was to represent the film in the role of a stepping stone. Finally, Mathew Broderick’s efforts I this film are recognizable and his excellent representation on the theatres, thus providing a second film within three months. He worked effortlessly for Mathew’s film production.

Conclusion

From my point of view, the youths are playing a critical part in the film. They are noticed interacting with the computer system with a lot of willingness. They are very ready to go hand in hand with technological advancements. It was so pleasing to realize the capability of the young generation when a young boy was recognized operating an old character computer. The boys’ capacity to operate a computer system was seen as something to do with art. The significance of the mixed sec high school is seen to be diminishing at the beginning of the scene due to the picture portrayed by Sheedy and Broderick. The rapport between female and male learners causes a lot of distress following their actions where the first time kiss tends to be more valued than the last time kiss. War game provides time for payoff rant to determine that place of an argument.

 

 

 

 

 

 

 

 

War game 2

Introduction

Several movies were presented at the residency, and among them was a film called War Game blockbuster. The movie had a scene that traces back to 1983 as its starting point. There are two gents, john Spencer and Michael Madison, who are significantly recognized for the control of technology in a missile manner. The two individuals are of great minds, and none of them is ready to be defeated by the other in terms of their abilities in controlling technology. According to the film, there was an order that was meant to distinguish a better person between the two. The command stated that the two were to provide the right direction for the introduction of a nuclear attack. Whoever could be able to illustrate the correct procedures leading to the process was to be ranked higher than the other. Ideally, giving the right procedure that could lead to a high quality and standardized atomic attack was to be used as a principal measure for the two parties. This marked the beginning of a cold war involving two great minds who are never ready to see the other to rout them. Concurrently, there is an introduction and fast advancement in computer technology. It is rising so fast to catch up with the new technology and at the same pace with the developing knowledge of computers. During this time, uses of the computer were not significant, and a lot of people were computer illiterate but later on, things changed. The network is currently considered to be an essential element for running day to day activities. It even appeared on the national security computer control report that the advancement in computer technology was too insignificant, according to the film. When comparing the then progress in computerizing the world and the current situation, there’s a big difference, and the computer is currently used to run the world. The scene states that computers cannot operate in the absence of power; thus, the critical element for the operation of equipment is the availability of electricity. In case there was power default in  1983, people could only be annoyed a little bit unlike today when it can be described as a significant loss in several ways. It is therefore clear that the current world depends more on computer technology that days of the past, thus making the story relevant in giving a clear picture.

Review

Both the internet and computer have experienced a lot of technological advancement, which in return lead to cybercrime. Currently, the number of threats that internet user receives has increased tremendously following the rapid daily advancement in technology. As illustrated in the scene, back then, things were so smooth, and people did not have enough knowledge about computers and online technology. Most people could barely understand the language of the computer.

Interestingly, internet crimes were at their minimum level. The only way they could reach somebody’s account was through dialing the direct phones that were made available. The password was kept very confidential, a secret between the internet user and the modem only. Security was maintained to the latter, and hacking was the last thing that an individual could think of. Today, almost everybody has at least a rough idea about the computer, and the crimes are increasing day and night due to new advancements made in the internet sector. Everything has a drawback, and in this case, the password was said to may easily crack. 2009 marks the year where the idea of penetrance proposed in the movies became important

Uses of computers are increasing day by day with new advancements finding their ways into the market. The machine is demanded the performance of several activities like planning process, analysis as well as response to nuclear attacks. Some professionals have a different onion concerning the rate at which the computer is used for different activities. John Mckittrick, as experts, provides his argument on how much [people depend on computers for various operations vie NORAD electronics. This man operated one of the supercomputers by the name WORP alias and treasured it so much because that’s where he could find his excitement all the time. The computer served him so well in playing the war game, which he could spend his all-time practicing.

Moreover, the machine helped accelerate their feedback about occasions of real-life crisis. The well known high school hackers, Jennifer and David, decided to sneak into the computer’s firewall from the back door through the home computer at David’s place. The primary goal of the two students was to adjust the steps made by Joshua in war games taking place in real-time. The two did not succeed in their operation, and instead, the computer developed a striking mode. They then resolved into contacting the father to Joshua “Dad” by the name Dr. Stephen Falken alias John Wood who did seem not to take note of the action by the son. The older man knew what he was doing and did not want any defeat from both DefCon I and Armageddon. It is much suitable that war game is played on the real tale and should never be allowed to sink into science fiction. The movie’s dimensions take a different direction when the top government employees who are the keystone army are observed overmatching with a far much better kid. Goliath and David are noticed fighting, and they are eager to see who will surrender for the other. The responsibility of these two antagonists in the film was to be used as a stepping stone from the time it was never known to the time it got recognized. Mathew Broderick’s efforts are significant for the contribution of the film and even representing on theatres later on to produce a second film.

Conclusion

According to my point of view, I’m glad to realize the efforts of the young teenagers making efforts to suit in the advanced technology and particularly the operating computer system. When a teenager was noticed operating a computer system, I felt so good and motivated with every positive move that we make as young adults. I felt like it operating a computer system was an art on its own when a young boy managed to run a computer machine with an old character. The scene brings in something new about the relationship between male and female at the mixed sec school. Sheedy Broderick and Sheedy exhibit a rapport that is causing worries and fears among the upcoming adults. The film indicates that kisses are valued differently depending on time. Finally, the war game is one film that allows the expression of all kinds and aspects of arguments.

 

  Remember! This is just a sample.

Save time and get your custom paper from our expert writers

 Get started in just 3 minutes
 Sit back relax and leave the writing to us
 Sources and citations are provided
 100% Plagiarism free
error: Content is protected !!
×
Hi, my name is Jenn 👋

In case you can’t find a sample example, our professional writers are ready to help you with writing your own paper. All you need to do is fill out a short form and submit an order

Check Out the Form
Need Help?
Dont be shy to ask