wisemonkeys logo
FeedNotificationProfileManage Forms
FeedNotificationSearchSign in
wisemonkeys logo

Blogs

The Sunny Side of Instagram

profile
Taruna Yadav
Jun 21, 2022
3 Likes
2 Discussions
149 Reads

Instagram is the most used social media platform. It is said to be somewhat toxic for our mental health. As we tend to compare our lives with the ones that are accessible to us through Instagram. We might know these people in person or we might not. We know that most of the times people don't show or post the raw side of their lives. What we see online is mostly edited and altered. Still we fall for it and start comparing, not positively. 

Instagram for me was also the same. I used to compare people who had better access to things than me. Had the "perfect bodies", etc. But as it is said that a coin has two sides to it. We often overlook the positive side of Instagram. "You see what you seek", heard it then thought of implementing it. I had been insecure about my body a lot. Then one day randomly, an inlfunecer's profile came to my notice. 

She was quite similar to me bodywise. And I saw that not only she was embracing herself proudly but also she was inspiring many teenage girls like me who were insecure about themselves to do the same. I started accepting myself. Stopped seeing my features as flaws and eventually gained confidence.

So social media does has it's own pros and cons. But it indeed is rightly said that you seek what you see and you become what you see. So why not see the positive side.


Comments ()


Sign in

Read Next

CYBER SECURITY CHALLENGES

Blog banner

Fudgy Tahini Date Chocolate Bars

Blog banner

Interrupts - Types, Working & Importance

Blog banner

DMZ: Your Secret Weapon for Data Security

Blog banner

Privacy LAWs in IT

Blog banner

Is Social Media Marketing The Next Wave Of Digital Marketing?

Blog banner

Why Extreme Opinions Are Rising: Psychological Insights into Society’s Divides

Blog banner

Security in Cloud Computing

Blog banner

Virtual Memory

Blog banner

Culture Of Ladakh

Blog banner

Rain bow

Blog banner

Cache Memory(142)

Blog banner

The Right way of cooking

Blog banner

SNAPCHAT

Blog banner

Broken Authentication Attacks

Blog banner

A-B-C of Networking: Part-3 (Topology [Bus & Star])

Blog banner

The House ??of Patola Designs: Traditional Weaves with a Modern Twist

Blog banner

Interrupts

Blog banner

Animal’s have my heart

Blog banner

Cyber Forensics

Blog banner

City of Mumbai (Bombay):

Blog banner

Paging

Blog banner

Zomato's Secret Digital Marketing Techniques!

Blog banner

Europe Through My Lens

Blog banner

RAID

Blog banner

Scala - a programming tool

Blog banner

Data is an asset and it is your responsibility!

Blog banner

Evolution of Operating Sytems

Blog banner

Career v/s Job : Choose your passion

Blog banner

Types of email

Blog banner

MODERN OPERATING SYSTEM

Blog banner

Bots and Cyber Security

Blog banner

File management In Operating System

Blog banner

Love is in air.....

Blog banner

Use case of K-means clustering

Blog banner

memory managment

Blog banner

38_Network Sniffing Techniques_SBC

Blog banner

FAMILY WHERE LIFE BEGINS....

Blog banner

Threat management

Blog banner

Shoulders

Blog banner

Explain DBMS in Brief

Blog banner

Cryptanalysis tool

Blog banner