In P6 I present mobile technology and how big impact it have in a social life.
In these days mobile technology have a big impact in a teenagers life and how people needing things such as facebook ,twitter, instagram and other social networking. This is needed as people need contact to each other, especially teenagers. People dont need to have phone if they have a contact with a people by using social networking. But there are many dangerous things that they might meet such as :persecution, pedophilia, naked pictures, threats. They also can stay for victims of psychological violence through the using a services like that. They can prevent it by not using too much internet by contacting with other people. On things such as facebook, twitter people can go on theirs accounts and make it private to prevent other people looking on their walls before adding them to their friends. People also can make go to their setting and block people that they want to chatting or don't want that person for looking on their profile.
Monday, 3 June 2013
M1 UNIT 2
This job of data base administrator is responsible for
different programs which you must be able to install different programs or to
work out any problem which is happening with the computer.
The things that the worker should need to do is to be able to install anything you are asked for and you need
to have the skills for it.
Make sure when someone tells you of a problem they are having that you
listen and show them sympathy for the problem they are having. Even if you
can't fix the problem right away (need to order part for example) they will not
feel like there being ignored.
The worker must never stop learning about new computer technology , train Customers, partners and company staff or Commitment-begin a course of action and work
through it until finished.
The attributes of it are :
- Ability to deal
with pressure
-Adaptability-you
have to be adapted to a different situation
- Personal
presentation
-Common sense
also it is important to be honesty person and integrity-be honest if you cant/able do
something ,enthusiasm-show that you can help and be always
happy to help or the reliability when people should be able to rely on you
and know you can do your job , and also to produce such a hard work
As a database
administrator you'll be in charge of computerized information systems - you
could think of yourself as a kind of high tech librarian. You are responsible
for the performance, integrity and security of a database and your job includes
updating existing databases and building new systems for fresh information. So the worker should know how these characteristics are very important
for this job because without them you
are not able to get this job you have to be hard working person this means you
have to work with a high standard and
get your best effect out of it this means that if you will start working
with your best ability you will have more work and you are able to earn more
money.You must have common sense and knowing that you must do something and be responsible, it will be needed when it comes to health and safety. Your personal presentation is very important if you go to work or visit
your customer because the way you look is how the people will see you.
People should be able to rely on you and know you can do your job good to
something be working again so you need to be reliable.
Monday, 13 May 2013
D1 UNIT2 - a SYSTEM ADMINISTRATOR
• is a person employed to maintain
and operate a computer system and/or network. System administrators may be
members of an information technology (IT) or Electronics and Communication
Engineering department.
The duties of a system administrator are wide-ranging, and vary widely from one organization to another. Other duties may include scripting or light programming, project management for systems-related projects, supervising or training computer operators, and being the consultant for computer problems beyond the knowledge of technical support staff.
The duties of a system administrator are wide-ranging, and vary widely from one organization to another. Other duties may include scripting or light programming, project management for systems-related projects, supervising or training computer operators, and being the consultant for computer problems beyond the knowledge of technical support staff.
• To perform his or her job well, a system
administrator must demonstrate a blend of technical skills and
responsibility.
I think this is suitable job for those characteristics that I suggest in P1 .
That person should be chill when she came to job , always be organised, she/he should know what she/he suppose to do
Motivation – Motivation is the force that makes us do things , this is a result of our individual needs being satisfied so that we have inspiration to complete the task. These needs vary from person to person as everybody has their individual needs to motivate themselves
Adability- Adaptability is a sought-after job skill as employers increasingly rely on flexible job descriptions and rotate employees into different roles. The ability to adapt to changing situations and expectations makes the wrokers more valuable to a current or prospective employer.
Loyalty- Loyalty is important in the workplace as your employer have to believe you in the work that you been doing. The worker have to giving much as he/she can to make the employer trusting you.
communication skills - good communcation skills at workplace is imporstant in workers life . An organization may consist of employees from different parts of the society. In order to unite the activities of all employees, communication is crucial. Effective workplace communication ensures that all the organizational objectives are achieved. Communicating necessary information to the entire workforce becomes necessary.
I think this is suitable job for those characteristics that I suggest in P1 .
That person should be chill when she came to job , always be organised, she/he should know what she/he suppose to do
Motivation – Motivation is the force that makes us do things , this is a result of our individual needs being satisfied so that we have inspiration to complete the task. These needs vary from person to person as everybody has their individual needs to motivate themselves
Adability- Adaptability is a sought-after job skill as employers increasingly rely on flexible job descriptions and rotate employees into different roles. The ability to adapt to changing situations and expectations makes the wrokers more valuable to a current or prospective employer.
Loyalty- Loyalty is important in the workplace as your employer have to believe you in the work that you been doing. The worker have to giving much as he/she can to make the employer trusting you.
communication skills - good communcation skills at workplace is imporstant in workers life . An organization may consist of employees from different parts of the society. In order to unite the activities of all employees, communication is crucial. Effective workplace communication ensures that all the organizational objectives are achieved. Communicating necessary information to the entire workforce becomes necessary.
Friday, 10 May 2013
D2 UNIT 14
D2
Bluetooth transmission to sending contact by connecting with another person via Bluetooth then you have to select the option to send you a contact to a person.
Bluetooth transmission to sending contact by connecting with another person via Bluetooth then you have to select the option to send you a contact to a person.
Disadvantages
of using Bluetooth ;
Problem for
Bluetooth is when there are a number of mobile devices in the same room and
possibly attempting the same operation also It may happen by accident so that you connect to the
person you did not want to.
Advantages
of using Bluetooth ;
The
technology of Bluetooth is cheap for companies to implement which results in
lower costs for the company. These savings are then passed down
from the company on to you. Bluetooth is free because in those days almost
everyone has already mobile phones have Bluetooth built where everyone can
share files with one another.
I also choose SMS to send contact to another person because its easy way to do it but we also can use Bluetooth to sending this contact by connect to web. Bluetooth is the easy way to send this contact because you just need to connect with person you want to send this contact. Bluetooth is also for free so you can send everything what you want, so if you do not top up your phone or are not on a contract phone then you
Sending sms is good because its easy way to contact with people. Its easy to use , everyone can use it . Quick communiaction to everyone around the world.
Negative aspects:
-If I want to sent SMS message I need credit on my phone.
-Unreliable
-Immeasurable
-Subject to high levels of message loss and delay
-Insecure transmission routes
Positive aspects:
-Contact gets there quickly to my friend
-My phone is with me all the time so; I can send message fast and when I want.
-My friend knows who sent this message.
-If I want to sent SMS message I need credit on my phone.
-Unreliable
-Immeasurable
-Subject to high levels of message loss and delay
-Insecure transmission routes
Positive aspects:
-Contact gets there quickly to my friend
-My phone is with me all the time so; I can send message fast and when I want.
-My friend knows who sent this message.
D1 UNIT 1
Safety issues and how to keep data safe
On blog sites is
anyone could see any information you put up
so you cant giving them your private information. You can also put some security stuff when you using social network websites. This people that sitting in ICT area and they changing facebook and websites like that , they provide us security of our profile . You shouldn’t accept everyone that just add you to friends or you do not know as a friend also as soon as you put pictures and stuff up they are classed as facebook property and they could do what they wish with them so don’t put any photos you do not wish for strangers to see.
so you cant giving them your private information. You can also put some security stuff when you using social network websites. This people that sitting in ICT area and they changing facebook and websites like that , they provide us security of our profile . You shouldn’t accept everyone that just add you to friends or you do not know as a friend also as soon as you put pictures and stuff up they are classed as facebook property and they could do what they wish with them so don’t put any photos you do not wish for strangers to see.
Blog sites like
facebook have a privacy mode which only friends can see your posts, details or
your photos and also think of a password. You need to put password that no one
know and no one would guess. You need to see if the line of passwords go to
green line and that provide you the strong password , also don’t put private
information or information you would not want strangers to get hold of and
don’t put spam or junk on blog sites and only have people like your colleagues
or people you know to subcribe to your page or add you as a friend.
10 ways to keep
your data safe ;
1. Share nothing
Hacker and scammers can find out all sorts of information
about you from social networking sites, so you should put more privacy as you
can to provide your profile safe.
2.
Use a strong password
3.
Encrypt sensitive data
4.
Develop good computing habits/instincts
5.
Get good security software
6.
Control your credit card
7.
Use the best Wireless security available
8.
Back up your data securely
Thursday, 9 May 2013
M2 UNIT 1
M2
The risk of using a computer
Computers are fixtures in people's personal and professional lives, providing essential productivity and communication services. Networking capabilities and Internet access are invaluable resources, but they also expose computer users to threats from other users connected to these networks, requiring people to take precautions to protect the data stored on their computers. Risk awareness and responsible behavior oftenminimizes the risk. But you must remember the many aspects and be prepared to face many threats.
The first is a better example, Microsoft Internet Explorer - the most widely used browser in Europe. In many of its versions, there were errors so large that it was a gate for hackers and spyware. Therefore, do not always believe the software, even manufactured in the large corporations.
The first is a better example, Microsoft Internet Explorer - the most widely used browser in Europe. In many of its versions, there were errors so large that it was a gate for hackers and spyware. Therefore, do not always believe the software, even manufactured in the large corporations.
-When we use computer viruses can be up to the parties whether you're viewing with some games.
-Children on the Internet forget a grammar and spelling.
-Children on the Internet forget a grammar and spelling.
-Someone can sneak in to our example, some computer hacker, and then all our data and materials are at risk of your own computer.
-Sometimes the use of social networks and give anyone have any information anyone can use them against us.
-As long as we use the computer away from him, we can make.
-The Internet to the greatest danger faced by children because they may have contact with content in whose violence is.
-The internet is also a lot of cheats.
-Now, rather than read books, play with or go outside kids are playing computer games and this is very bad.
-Now, rather than read books, play with or go outside kids are playing computer games and this is very bad.
-Financial implications (the use of dialers, or computer programs linking to the Internet through 0-700 numbers).
-Unconscious sharing of information (credit card numbers, addresses, passwords).
-Instead of homework yourself looking for every finished work on the Internet
-Another thing we must remember is that many Internet applications to facilitate movement within the network, containscountless mass of minor errors.
Thursday, 18 April 2013
Thursday, 7 March 2013
M
Monitor screen - Monitors, otherwise known as displays or screens, currently come in two formats: they are matte screens and glossy screens. There are may advantages and disadvantages about them.
because matte screens don't get glare or reflections on them and however, the same rough surface (polarizer) that reduces the intensity of reflected light results in less contrast and brightness since the light from the LCD screen has to pass through it , on the other hand type of glossy screens have vibrant colors and high contrast and brightness because they have a smooth, high-gloss surface as a result it is often the choice for movies or gaming.
Mouse- They are different types of mouses. They are divided on wire and wireless . The wireless mouses
are getting better and better, so people don't have to worry about issues like slower response time or bad signal however there's no getting around the fact that this still need to recharge the batteries every now and then just as there's no getting around the fact that wired mice are limited by the cable.
Keyboard- there are two different types of keyboards. They are divide on wirelles and wire. In Wirelles keyborads people dont have to tolerate the mess of wiring and inconvenience.
Can maintain required distance between the screen and the seating , people dont need to keep it placed on the working table always saving a lot of space when not using the system.
Scanner - is a device that optically scans
images, printed text, handwriting, or an object and converts it to a digital image
Digital camera- is digital camera, scanners, which are based on the concept of repographics cameras. Due to increasing resolution and new features such as
anti-shake, digital cameras have become an attractive alternative to regular
scanners
Projector - Projector, overhead projector - an
optical device for viewing on the projection screen fixed or moving image.
The projector comprises a light source and an optical system forming a beam of light. Modern overhead projector, display images using a parallel beam of light as an image carrier,with the beam divergence and placing the object close to the light source, a considerable increase on the screen.
The projector comprises a light source and an optical system forming a beam of light. Modern overhead projector, display images using a parallel beam of light as an image carrier,with the beam divergence and placing the object close to the light source, a considerable increase on the screen.
Printers - cooperating
with the computer device, used to move the text, the image in various print
media type paper, foil, canvas and the like. Some printers can also work without a computer, for example
to print photos taken on a digital camera (when connected to a printer or
insert a memory card with recorded images into a slot built into the printer)
Input devices –
It is equipment that you can
put to your computer and you can use it as input device which might be keyboard , microphone,
speakers, mouse, camera and other pieces of computer
hardware equipment
used to provide data and control signals to an information processing system such as a computer or other information appliance. Input and output
devices make up
the hardware interface between a computer and a scanner.
Monday, 4 March 2013
P6
COPYRIGHT
is a legal concept enacted by most governments, giving the creator of an original work exclusive rights to it. Usually for a limited time for generally, it is the right to copy but also gives the copyright holder the right to be credited for the work, to determine who may adapt the work to other forms, who may perform the work or who may financially benefit from it and other related rights
is a legal concept enacted by most governments, giving the creator of an original work exclusive rights to it. Usually for a limited time for generally, it is the right to copy but also gives the copyright holder the right to be credited for the work, to determine who may adapt the work to other forms, who may perform the work or who may financially benefit from it and other related rights
·
Someone
is not allowed to copy your work or you cant copy work of someone else as they
have special security all the work produce by any type of graphics designer has
the protection of copyrights sign which looks like this ‘’ © ‘’ .
TRADE MARK
is a recognizable sign
and
is design or expression which identifies products or services of
a particular source from those of others. The trademark owner can be an
individual, business organization,
or any legal intenity.
A trademark may be located on a package , a label ,
a voucher or
on the product itself.
Trade mark is recognize as
‘’ ® ‘’ symbol.
INTELLECTUAL PROPERTY'
is a legal concept which refers to
creations of the mind for which exclusive rights are recognized. Owners are granted certain exclusive
rights to a variety of intangible assets, such as musical, literary,
and artistic works , discoveries and inventions and also words, phrases,
symbols, and designs. There’s list of all intellectual property symbols, short-forms, etc.
Patent Pending:
The ™ sign:
- flags an unregistered
trademark
- usually superscripted or
subscripted
- expresses owner's belief
and/or intention
- (trademarks are brand names for products
The ® symbol:
- flags a federally registered
trademark or service mark
- cannot be used unless the
mark is federally registered
- indicates USPTO validation
of mark
- usually superscripted or
subscripted
- replaces either the TM or SM
sign when the mark is registered
The © symbol:
- first element of copyright
notice
- word Copyright can be used
instead
- followed by year date of
publication and owner's name
- used whether or not work has
a copyright registration
- copyright notice not
required, but highly recommended.
Monday, 25 February 2013
Thursday, 21 February 2013
Monday, 4 February 2013
Monday, 28 January 2013
P2
A local band would like a logo designed for their website this needs to be combined with their band photo ;
For this type design , a local band should use Adobe Illustrator. This is type of program that they need for make that type of logo . Another type of software that they might use is GIMP . By using GIMP for photo editing , and basic graphics like using text on images.
Also using gimp they might change image retouching and editing tool. This is free and open-source software were the band can will make the best logo wiith the best quality , GIMP has tools used for image retouching and
editing, free-form drawing, resizing, cropping, photo-montages, converting between different image formats, and more specialised tasks. Animated images such as GIF and MPEG files can be created using an animation plugin. When it will be done a band should save that as a png, gif or jpeg files
A builder wants some eye catching text for the side of his van to improve business opportunities ;
In this type of thing , a builder should use Adobe Illustrator as well. A builder will need type of graphic GIF and the trade-off is between file size and quantization artefacts. A customer if he using Photoshop , should save it as a JPEGs and save for web dialog, but there are lots of other programs that he can also use — including Web-specific graphics applications like Fireworks where he should save as a JPEGs. Each has its own vagaries. Be aware that the JPEG “quality” in these programs have no universal meaning and are not standard across programs; they’re only meaningful for comparisons within the same program.
The nursery on your estate would like a flyer designed to promote the facility;
For a nursery flyer I will need type of graphic GIF or SVG . The best software for nursery flyer will be Publisher. Microsoft Publisher is an entry-level desktop publishing application from Microsoft, differing from Microsoft Word in that the emphasis is placed on page layout and design rather than text composition and proofing which take a good quality for this nursery flyer. By saving this as a SVG is a royalty-free vendor-neutral open standard developed under the W3C Process. It has strong industry support; Authors of the SVG specification include Adobe, Agfa, Apple, Canon, Corel, Ericsson, HP, IBM, Kodak, Macromedia, Microsoft, Nokia, Sharp and Sun Microsystems. SVG viewers are deployed to over 100 million desktops, and there is a broad range of support in many authoring tools.
Monday, 14 January 2013
Subscribe to:
Comments (Atom)




