Today our communications, medicine and transport systems all depend on computer technology. Our reliance on computer technology in these fields has created a dangerous situation. To what extent do you agree or disagree with this statement?

Nowadays, world
systems
such
as communication, medicine, and transportation can not work unless using computer technology. Looking closer,
humans
has
Change the verb form
have
show examples
relied on
computers
more actively than ages ago which could cause detrimental impacts.
This
essay will discuss the pros and cons
about
Change preposition
of
show examples
this
statement. Despite the dependence,
computers
indeed make the
life
Fix the agreement mistake
lives
show examples
of
humans
more
Change the word
apply
show examples
easier. All
systems
data
were
build
Wrong verb form
built
show examples
since the discovery of
computers
,
for instance
, the railway network for trains, medicine saving database for
hospital
Fix the agreement mistake
hospitals
show examples
, and the disclosure of email which
one
Add a missing verb
is one
show examples
of many communication forms that
used
Add a missing verb
are used
show examples
worldwide.
Computers
create a tracking system that
convenient
Add a missing verb
is convenient
show examples
for
the
Correct article usage
a
show examples
wide range of
data
, actively reducing the work time for employees to do trivial tasks
while
they can focus on a greater deal ahead. In spite of all the advantages,
cyber
security is one thing that people should be aware of. In
this
Correct determiner usage
the
show examples
present
days
Fix the agreement mistake
day
show examples
,
cyber
attack
Change the noun form
attacks
show examples
such
as hacking, network hijacking, and
cyber
terrorism are common to occur. Not only these crimes will cause
the
Correct article usage
apply
show examples
disruptions
of
Change preposition
in
show examples
systems
,
Add the word(s)
, but
show examples
there are
also
the
consequence
Fix the agreement mistake
consequences
show examples
of the loss of sensitive
informations
Change the wording
information
pieces of information
show examples
or
data
. Commonly,
cyber
attack
Fix the agreement mistake
attacks
show examples
would
Verb problem
apply
show examples
expose
the
Correct article usage
apply
show examples
computers
with
Change preposition
to
show examples
virus
Fix the agreement mistake
viruses
show examples
and
makes
Correct subject-verb agreement
make
show examples
it
Correct pronoun usage
them
show examples
stop working. With the
shut down
Correct your spelling
shutdown
show examples
of the main
computers
, crucial
systems
such
as public trams, health tracking for medicines, and communication between
humans
can not continue.
Thus
, the downsides of
the
Correct article usage
apply
show examples
computers
Fix the agreement mistake
computer
show examples
dependence befall.
This
threat actually
happen
Change the verb form
happens
show examples
in Indonesia, when a group of hackers succeed in hacking the main database program of the
cyber
security authority.
Accordingly
, all the flight checking
in
Change preposition
at
show examples
the airports
were
Correct subject-verb agreement
was
show examples
delayed and all the sensitive
data
of Indonesia's residents
were
Correct subject-verb agreement
was
show examples
stolen. The catastrophe intensity reached to
nation
Replace the word
national
show examples
level. In conclusion,
although
computers
Change the noun form
computer
show examples
technology
have
Change the verb form
has
show examples
the upper hand
for
Change preposition
on
show examples
the globe's
systems
,
humans
can not just depend on it without caring about its possible drawbacks.
Hence
, it is vital to establish a tight security system to protect the
computers
Change the noun form
computer
show examples
network from
cyber
threats.
Submitted by annisaseptidwiyanti on

Unauthorized use and/or duplication of this material without express and written permission from this site’s author and/or owner is strictly prohibited. Excerpts and links may be used, provided that full and clear credit is given to Writing9 with appropriate and specific direction to the original content.

task achievement
The essay presents a clear position on the topic and provides relevant arguments and examples. However, more comprehensive and clear ideas should be elaborated to strengthen the argumentation.
task achievement
Pay attention to grammar and syntax errors, such as subject-verb agreement and singular/plural forms. For example, 'humans has relied' should be 'humans have relied.'
coherence cohesion
Enhance the logical structure by ensuring that paragraphs clearly flow from one to the next. The essay should transition smoothly, and each point should build logically on the previous one. Consider using more linking phrases.
introduction conclusion present
The introduction clearly outlines the subject of the essay and sets up the discussion effectively.
introduction conclusion present
The conclusion effectively summarizes the main points and reinforces the essay's stance.
relevant specific examples
Relevant examples, such as the hacking incident in Indonesia, effectively illustrate the points made in the essay.

Fully explain your ideas

To get an excellent score in the IELTS Task 2 writing section, one of the easiest and most effective tips is structuring your writing in the most solid format. A great argument essay structure may be divided to four paragraphs, in which comprises of four sentences (excluding the conclusion paragraph, which comprises of three sentences).

For we to consider an essay structure a great one, it should be looking like this:

  • Paragraph 1 - Introduction
    • Sentence 1 - Background statement
    • Sentence 2 - Detailed background statement
    • Sentence 3 - Thesis
    • Sentence 4 - Outline sentence
  • Paragraph 2 - First supporting paragraph
    • Sentence 1 - Topic sentence
    • Sentence 2 - Example
    • Sentence 3 - Discussion
    • Sentence 4 - Conclusion
  • Paragraph 3 - Second supporting paragraph
    • Sentence 1 - Topic sentence
    • Sentence 2 - Example
    • Sentence 3 - Discussion
    • Sentence 4 - Conclusion
  • Paragraph 4 - Conclusion
    • Sentence 1 - Summary
    • Sentence 2 - Restatement of thesis
    • Sentence 3 - Prediction or recommendation

Our recommended essay structure above comprises of fifteen (15) sentences, which will make your essay approximately 250 to 275 words.

Discover more tips in The Ultimate Guide to Get a Target Band Score of 7+ »— a book that's free for 🚀 Premium users.

Essentional vocabulary list for IELTS Writing 7+

Learn how to write high-scoring essays with powerful words.
Download Free PDF and start improving you writing skills today!
Topic Vocabulary:
  • reliance
  • cybersecurity
  • over-reliance
  • digital divide
  • data breach
  • cyberbullying
  • diagnostic machines
  • electronic health records
  • automated vehicles
  • predictive maintenance
  • real-time monitoring
  • vulnerability
  • misinformation
  • hacking
  • efficiency
  • navigation systems
  • traditional skills
  • system failures
What to do next:
Look at other essays: