In P6 I present mobile technology and how big impact it have in a social life.
In these days mobile technology have a big impact in a teenagers life and how people needing things such as facebook ,twitter, instagram and other social networking. This is needed as people need contact to each other, especially teenagers. People dont need to have phone if they have a contact with a people by using social networking. But there are many dangerous things that they might meet such as :persecution, pedophilia, naked pictures, threats. They also can stay for victims of psychological violence through the using a services like that. They can prevent it by not using too much internet by contacting with other people. On things such as facebook, twitter people can go on theirs accounts and make it private to prevent other people looking on their walls before adding them to their friends. People also can make go to their setting and block people that they want to chatting or don't want that person for looking on their profile.
Patrycja ; d
Monday, 3 June 2013
M1 UNIT 2
This job of data base administrator is responsible for
different programs which you must be able to install different programs or to
work out any problem which is happening with the computer.
The things that the worker should need to do is to be able to install anything you are asked for and you need
to have the skills for it.
Make sure when someone tells you of a problem they are having that you
listen and show them sympathy for the problem they are having. Even if you
can't fix the problem right away (need to order part for example) they will not
feel like there being ignored.
The worker must never stop learning about new computer technology , train Customers, partners and company staff or Commitment-begin a course of action and work
through it until finished.
The attributes of it are :
- Ability to deal
with pressure
-Adaptability-you
have to be adapted to a different situation
- Personal
presentation
-Common sense
also it is important to be honesty person and integrity-be honest if you cant/able do
something ,enthusiasm-show that you can help and be always
happy to help or the reliability when people should be able to rely on you
and know you can do your job , and also to produce such a hard work
As a database
administrator you'll be in charge of computerized information systems - you
could think of yourself as a kind of high tech librarian. You are responsible
for the performance, integrity and security of a database and your job includes
updating existing databases and building new systems for fresh information. So the worker should know how these characteristics are very important
for this job because without them you
are not able to get this job you have to be hard working person this means you
have to work with a high standard and
get your best effect out of it this means that if you will start working
with your best ability you will have more work and you are able to earn more
money.You must have common sense and knowing that you must do something and be responsible, it will be needed when it comes to health and safety. Your personal presentation is very important if you go to work or visit
your customer because the way you look is how the people will see you.
People should be able to rely on you and know you can do your job good to
something be working again so you need to be reliable.
Monday, 13 May 2013
D1 UNIT2 - a SYSTEM ADMINISTRATOR
• is a person employed to maintain
and operate a computer system and/or network. System administrators may be
members of an information technology (IT) or Electronics and Communication
Engineering department.
The duties of a system administrator are wide-ranging, and vary widely from one organization to another. Other duties may include scripting or light programming, project management for systems-related projects, supervising or training computer operators, and being the consultant for computer problems beyond the knowledge of technical support staff.
The duties of a system administrator are wide-ranging, and vary widely from one organization to another. Other duties may include scripting or light programming, project management for systems-related projects, supervising or training computer operators, and being the consultant for computer problems beyond the knowledge of technical support staff.
• To perform his or her job well, a system
administrator must demonstrate a blend of technical skills and
responsibility.
I think this is suitable job for those characteristics that I suggest in P1 .
That person should be chill when she came to job , always be organised, she/he should know what she/he suppose to do
Motivation – Motivation is the force that makes us do things , this is a result of our individual needs being satisfied so that we have inspiration to complete the task. These needs vary from person to person as everybody has their individual needs to motivate themselves
Adability- Adaptability is a sought-after job skill as employers increasingly rely on flexible job descriptions and rotate employees into different roles. The ability to adapt to changing situations and expectations makes the wrokers more valuable to a current or prospective employer.
Loyalty- Loyalty is important in the workplace as your employer have to believe you in the work that you been doing. The worker have to giving much as he/she can to make the employer trusting you.
communication skills - good communcation skills at workplace is imporstant in workers life . An organization may consist of employees from different parts of the society. In order to unite the activities of all employees, communication is crucial. Effective workplace communication ensures that all the organizational objectives are achieved. Communicating necessary information to the entire workforce becomes necessary.
I think this is suitable job for those characteristics that I suggest in P1 .
That person should be chill when she came to job , always be organised, she/he should know what she/he suppose to do
Motivation – Motivation is the force that makes us do things , this is a result of our individual needs being satisfied so that we have inspiration to complete the task. These needs vary from person to person as everybody has their individual needs to motivate themselves
Adability- Adaptability is a sought-after job skill as employers increasingly rely on flexible job descriptions and rotate employees into different roles. The ability to adapt to changing situations and expectations makes the wrokers more valuable to a current or prospective employer.
Loyalty- Loyalty is important in the workplace as your employer have to believe you in the work that you been doing. The worker have to giving much as he/she can to make the employer trusting you.
communication skills - good communcation skills at workplace is imporstant in workers life . An organization may consist of employees from different parts of the society. In order to unite the activities of all employees, communication is crucial. Effective workplace communication ensures that all the organizational objectives are achieved. Communicating necessary information to the entire workforce becomes necessary.
Friday, 10 May 2013
D2 UNIT 14
D2
Bluetooth transmission to sending contact by connecting with another person via Bluetooth then you have to select the option to send you a contact to a person.
Bluetooth transmission to sending contact by connecting with another person via Bluetooth then you have to select the option to send you a contact to a person.
Disadvantages
of using Bluetooth ;
Problem for
Bluetooth is when there are a number of mobile devices in the same room and
possibly attempting the same operation also It may happen by accident so that you connect to the
person you did not want to.
Advantages
of using Bluetooth ;
The
technology of Bluetooth is cheap for companies to implement which results in
lower costs for the company. These savings are then passed down
from the company on to you. Bluetooth is free because in those days almost
everyone has already mobile phones have Bluetooth built where everyone can
share files with one another.
I also choose SMS to send contact to another person because its easy way to do it but we also can use Bluetooth to sending this contact by connect to web. Bluetooth is the easy way to send this contact because you just need to connect with person you want to send this contact. Bluetooth is also for free so you can send everything what you want, so if you do not top up your phone or are not on a contract phone then you
Sending sms is good because its easy way to contact with people. Its easy to use , everyone can use it . Quick communiaction to everyone around the world.
Negative aspects:
-If I want to sent SMS message I need credit on my phone.
-Unreliable
-Immeasurable
-Subject to high levels of message loss and delay
-Insecure transmission routes
Positive aspects:
-Contact gets there quickly to my friend
-My phone is with me all the time so; I can send message fast and when I want.
-My friend knows who sent this message.
-If I want to sent SMS message I need credit on my phone.
-Unreliable
-Immeasurable
-Subject to high levels of message loss and delay
-Insecure transmission routes
Positive aspects:
-Contact gets there quickly to my friend
-My phone is with me all the time so; I can send message fast and when I want.
-My friend knows who sent this message.
D1 UNIT 1
Safety issues and how to keep data safe
On blog sites is
anyone could see any information you put up
so you cant giving them your private information. You can also put some security stuff when you using social network websites. This people that sitting in ICT area and they changing facebook and websites like that , they provide us security of our profile . You shouldn’t accept everyone that just add you to friends or you do not know as a friend also as soon as you put pictures and stuff up they are classed as facebook property and they could do what they wish with them so don’t put any photos you do not wish for strangers to see.
so you cant giving them your private information. You can also put some security stuff when you using social network websites. This people that sitting in ICT area and they changing facebook and websites like that , they provide us security of our profile . You shouldn’t accept everyone that just add you to friends or you do not know as a friend also as soon as you put pictures and stuff up they are classed as facebook property and they could do what they wish with them so don’t put any photos you do not wish for strangers to see.
Blog sites like
facebook have a privacy mode which only friends can see your posts, details or
your photos and also think of a password. You need to put password that no one
know and no one would guess. You need to see if the line of passwords go to
green line and that provide you the strong password , also don’t put private
information or information you would not want strangers to get hold of and
don’t put spam or junk on blog sites and only have people like your colleagues
or people you know to subcribe to your page or add you as a friend.
10 ways to keep
your data safe ;
1. Share nothing
Hacker and scammers can find out all sorts of information
about you from social networking sites, so you should put more privacy as you
can to provide your profile safe.
2.
Use a strong password
3.
Encrypt sensitive data
4.
Develop good computing habits/instincts
5.
Get good security software
6.
Control your credit card
7.
Use the best Wireless security available
8.
Back up your data securely
Thursday, 9 May 2013
M2 UNIT 1
M2
The risk of using a computer
Computers are fixtures in people's personal and professional lives, providing essential productivity and communication services. Networking capabilities and Internet access are invaluable resources, but they also expose computer users to threats from other users connected to these networks, requiring people to take precautions to protect the data stored on their computers. Risk awareness and responsible behavior oftenminimizes the risk. But you must remember the many aspects and be prepared to face many threats.
The first is a better example, Microsoft Internet Explorer - the most widely used browser in Europe. In many of its versions, there were errors so large that it was a gate for hackers and spyware. Therefore, do not always believe the software, even manufactured in the large corporations.
The first is a better example, Microsoft Internet Explorer - the most widely used browser in Europe. In many of its versions, there were errors so large that it was a gate for hackers and spyware. Therefore, do not always believe the software, even manufactured in the large corporations.
-When we use computer viruses can be up to the parties whether you're viewing with some games.
-Children on the Internet forget a grammar and spelling.
-Children on the Internet forget a grammar and spelling.
-Someone can sneak in to our example, some computer hacker, and then all our data and materials are at risk of your own computer.
-Sometimes the use of social networks and give anyone have any information anyone can use them against us.
-As long as we use the computer away from him, we can make.
-The Internet to the greatest danger faced by children because they may have contact with content in whose violence is.
-The internet is also a lot of cheats.
-Now, rather than read books, play with or go outside kids are playing computer games and this is very bad.
-Now, rather than read books, play with or go outside kids are playing computer games and this is very bad.
-Financial implications (the use of dialers, or computer programs linking to the Internet through 0-700 numbers).
-Unconscious sharing of information (credit card numbers, addresses, passwords).
-Instead of homework yourself looking for every finished work on the Internet
-Another thing we must remember is that many Internet applications to facilitate movement within the network, containscountless mass of minor errors.
Thursday, 18 April 2013
Subscribe to:
Comments (Atom)
