Monday, 3 June 2013

M3 UNIT 14

In P6 I present mobile technology and how big impact it have in a social life.
In these days mobile technology have a big impact in a teenagers life and how people needing things such as facebook ,twitter, instagram and other social networking. This is needed as people need contact to each other, especially teenagers. People dont need to have phone if they have a contact with a people by using social networking. But there are many dangerous things that they might meet such as :persecution, pedophilia, naked pictures, threats. They also can stay for victims of psychological violence through the using a services like that. They can prevent it by not using too much internet by contacting with other people. On things such as facebook, twitter people can go on theirs accounts and make it private to prevent other people looking on their walls before adding them to their friends. People also can make go to their setting and block people that they want to chatting or don't want that person for looking on their profile.

M1 UNIT 2

This job of data base administrator is responsible for different programs which you must be able to install different programs or to work out any problem which is happening with the computer.


 The things that the worker should need to do is to be able to install anything you are asked for and you need to have the skills for  it.

  Make sure when someone tells you of a problem they are having that you listen and show them sympathy for the problem they are having. Even if you can't fix the problem right away (need to order part for example) they will not feel like there being ignored.
The worker must never stop learning about new computer technology , train Customers, partners and company staff or Commitment-begin a course of action and work through it until finished.

    The attributes of it are :

 - Ability to deal with pressure
  -Adaptability-you have to be adapted to a different situation
 - Personal presentation
 -Common sense

also it is important to be  honesty person and integrity-be honest if you cant/able do something ,enthusiasm-show that you can help and be always happy to help or the reliability when people should be able to rely on you and know you can do your job , and also to produce such a hard work


 As a database administrator you'll be in charge of computerized information systems - you could think of yourself as a kind of high tech librarian. You are responsible for the performance, integrity and security of a database and your job includes updating existing databases and building new systems for fresh information. So the worker should know how these characteristics are very important for this job because  without them you are not able to get this job you have to be hard working person this means you have to work with a high standard and  get your best effect out of it this means that if you will start working with your best ability you will have more work and you are able to earn more money.You must have common sense and knowing that you must do something and be responsible, it will be needed when it comes to health and safety. Your personal presentation is very important if you go to work or visit your customer because the way you look is how the people will see you. 
People should be able to rely on  you and know you can do your job good to something be working again so you need to be reliable.




Monday, 13 May 2013

D1 UNIT2 - a SYSTEM ADMINISTRATOR


 is a person employed to maintain and operate a computer system and/or network. System administrators may be members of an information technology (IT) or Electronics and Communication Engineering department.
The duties of a system administrator are wide-ranging, and vary widely from one organization to another. Other duties may include scripting or light programming, project management for systems-related projects, supervising or training computer operators, and being the consultant for computer problems beyond the knowledge of technical support staff.
To perform his or her job well, a system administrator must demonstrate a blend of technical skills and responsibility.
I think this is suitable job for those characteristics  that I suggest in P1 .

That person should be chill when she came to job , always be organised,  she/he should know what she/he suppose to do

Motivation – Motivation is the force that makes us do things , this is a result of our individual needs being satisfied so that we have inspiration to complete the task. These needs vary from person to person as everybody has their individual needs to motivate themselves

Adability- Adaptability is a sought-after job skill as employers increasingly rely on flexible job descriptions and rotate employees into different roles. The ability to adapt to changing situations and expectations makes the wrokers  more valuable to a current or prospective employer.
Loyalty- Loyalty is important in the workplace as your employer have to believe you in the work that you been doing. The worker have to giving much as he/she can to make the employer trusting you.

communication skills - good communcation skills at workplace is imporstant in workers life . An organization may consist of employees from different parts of the society. In order to unite the activities of all employees, communication is crucial. Effective workplace communication ensures that all the organizational objectives are achieved. Communicating necessary information to the entire workforce becomes necessary. 

Friday, 10 May 2013

D2 UNIT 14


D2


Bluetooth transmission to sending contact by connecting with another person via Bluetooth then you have to select the option to send you a contact to a person.

Disadvantages of using Bluetooth ;

Problem for Bluetooth is when there are a number of mobile devices in the same room and possibly attempting the same operation also It may happen by accident so that you connect to the person you did not want to.

Advantages of using Bluetooth ;

The technology of Bluetooth is cheap for companies to implement which results in lower costs for the company. These savings are then passed down from the company on to you. Bluetooth is free because in those days almost everyone has already mobile phones have Bluetooth built where everyone can share files with one another.

I also choose SMS to send contact to another person because its easy way to do it but we also can use Bluetooth to sending this contact by connect to web. Bluetooth is the easy way to send this contact because you just need to connect with person you want to send this contact. Bluetooth is also for free so you can send everything what you want,
so if you do not top up your phone or are not on a contract phone then you

Sending sms is good because its easy way to contact with people. Its easy to use , everyone can use it . Quick communiaction to everyone around the world.

Negative aspects:
-If I want to sent SMS message I need credit on my phone.
-Unreliable
-Immeasurable 
-Subject to high levels of message loss and delay 
-Insecure transmission routes
Positive aspects:
-Contact gets there quickly to my friend 
-My phone is with me all the time so; I can send message fast and when I want.
-My friend knows who sent this message.



D1 UNIT 1


 Safety issues and how to keep data safe

On blog sites is anyone could see any information you put up
 so you cant giving them your private information. You can also put some security stuff when you using social network websites. This people that sitting in ICT area and they changing facebook and websites like that , they provide us security of our profile . You shouldn’t accept everyone that just add you to friends or you do not know as a friend also as soon as you put pictures and stuff up they are classed as facebook property and they could do what they wish with them so don’t put any photos you do not wish for strangers to see.

Blog sites like facebook have a privacy mode which only friends can see your posts, details or your photos and also think of a password. You need to put password that no one know and no one would guess. You need to see if the line of passwords go to green line and that provide you the strong password , also don’t put private information or information you would not want strangers to get hold of and don’t put spam or junk on blog sites and only have people like your colleagues or people you know to subcribe to your page or add you as a friend.



10 ways to keep your data safe ;

1. Share nothing

Hacker and scammers can find out all sorts of information about you from social networking sites, so you should put more privacy as you can to provide your profile safe.

2. Use a strong password

3. Encrypt sensitive data

4. Develop good computing habits/instincts

5. Get good security software

6. Control your credit card

7. Use the best Wireless security available

8. Back up your data securely

Thursday, 9 May 2013

M2 UNIT 1


M2
          The risk of using a computer

Computers are fixtures in people's personal and professional lives, providing essential productivity and communication services. Networking capabilities and Internet access are invaluable resources, but they also expose computer users to threats from other users connected to these networks, requiring people to take precautions to protect the data stored on their computers. Risk awareness and responsible behavior oftenminimizes the risk. But you must remember the many aspects and be prepared to face many threats.
 The first is a better example, Microsoft Internet Explorer - the most widely used browser in Europe. In many of its versions, there were errors so large that it was a gate for hackers and spyware. Therefore, do not always believe the software, even manufactured in the large corporations.

-When we use computer viruses can be up to the parties whether you're viewing with some games.
-Children on the Internet forget a grammar and spelling.
-Someone can sneak in to our example, some computer hacker, and then all our data and materials are at risk of your own computer.
-Sometimes the use of social networks and give anyone have any information anyone can use them against us.
-As long as we use the computer away from him, we can make.
-The Internet to the greatest danger faced by children because they may have contact with content in whose violence is.
-The internet is also a lot of cheats.
-Now, rather than read books, play with or go outside kids are playing computer games and this is very bad.
-Financial implications (the use of dialers, or computer programs linking to the Internet through 0-700 numbers).
-Unconscious sharing of information (credit card numbers, addresses, passwords).


-Instead of homework yourself looking for every finished work on the Internet
-Another thing we must remember is that many Internet applications to facilitate movement within the network, containscountless mass of minor errors.




Thursday, 7 March 2013

M


Monitor screenMonitors, otherwise known as displays or screens, currently come in two formats: they are matte screens and glossy screens. There are may advantages and disadvantages about them.
because matte screens don't get glare or reflections on them and however, the same rough surface (polarizer) that reduces the intensity of reflected light results in less contrast and brightness since the light from the LCD screen has to pass through it , on the other hand type of glossy screens have vibrant colors and high contrast and brightness because they have a smooth, high-gloss surface as a result it is often the choice for movies or gaming.


Mouse- They are different types of mouses. They are divided on wire and wireless . The wireless mouses 

 are getting better and better, so people don't have to worry about issues like slower response time or bad signal however there's no getting around the fact that this still need to recharge the batteries every now and then just as there's no getting around the fact that wired mice are limited by the cable.


Keyboard- there are two different types of keyboards. They are divide on wirelles and wire.  In Wirelles keyborads people dont have to tolerate the mess of wiring and inconvenience. 
Can maintain required distance between the screen and the seating , people dont need to keep it placed on the working table always saving a lot of space when not using the system. 

Scanner - is a device that optically scans images, printed text, handwriting, or an object and converts it to a digital image

Digital camera-  is digital camera, scanners, which are based on the concept of repographics cameras. Due to increasing resolution and new features such as anti-shake, digital cameras have become an attractive alternative to regular scanners

Projector - Projector, overhead projector - an optical device for viewing on the projection screen fixed or moving image. 
The projector comprises a light source and an optical system forming a beam of light. 
Modern overhead projector, display images using a parallel beam of light as an image carrier,with the beam divergence and placing the object close to the light source, a considerable increase on the screen.

Printers - cooperating with the computer device, used to move the text, the image in various print media type paper, foil, canvas and the like. Some printers can also work without a computer, for example to print photos taken on a digital camera (when connected to a printer or insert a memory card with recorded images into a slot built into the printer)

Input devices –
It is equipment that you can put to your computer and you can use it as input device which might be keyboard , microphone, speakers, mouse, camera and other pieces of computer hardware equipment used to provide data and control signals to an information processing system such as a computer or other information appliance. Input and output devices make up the hardware interface between a computer and a scanner.

Monday, 4 March 2013

P6


COPYRIGHT

 is a legal concept enacted by most governments, giving the creator of an original work exclusive rights to it. Usually for a limited time for generally, it is the right to copy but also gives the copyright holder the right to be credited for the work, to determine who may adapt the work to other forms, who may perform the work or  who may financially benefit from it and other related rights
·          Someone is not allowed to copy your work or you cant copy work of someone else as they have special security all the work produce by any type of graphics designer has the protection of copyrights sign which looks like this  ‘’  © ‘’ .

TRADE MARK
is a recognizable sign and is design or expression which identifies products or services of a particular source from those of others. The trademark owner can be an individual, business organization, or any legal intenity. A trademark may be located on a package , a label , a voucher or on the product itself.
Trade mark is recognize as  ‘’  ® ‘’ symbol.         
                        
INTELLECTUAL PROPERTY'
is a legal concept which refers to creations of the mind for which exclusive rights are recognized. Owners are granted certain exclusive rights to a variety of  intangible  assets, such as musical, literary, and artistic works , discoveries and inventions and also words, phrases, symbols, and designs.



There’s list of all intellectual property symbols, short-forms, etc.

Patent Pending:
The ™ sign:
  • flags an unregistered trademark
  • usually superscripted or subscripted
  • expresses owner's belief and/or intention
  • (trademarks are brand names for products

The ® symbol:
  • flags a federally registered trademark or service mark
  • cannot be used unless the mark is federally registered
  • indicates USPTO validation of mark
  • usually superscripted or subscripted
  • replaces either the TM or SM sign when the mark is registered

The © symbol:
  • first element of copyright notice
  • word Copyright can be used instead
  • followed by year date of publication and owner's name
  • used whether or not work has a copyright registration
  • copyright notice not required, but highly recommended.

Monday, 28 January 2013

P2

A local band would like a logo designed for their website this needs to be combined with their band photo ; For this type design , a local band should use Adobe Illustrator. This is type of program that they need for make that type of logo . Another type of software that they might use is GIMP . By using GIMP for photo editing , and basic graphics like using text on images. Also using gimp they might change image retouching and editing tool. This is free and open-source software were the band can will make the best logo wiith the best quality , GIMP has tools used for image retouching and editing, free-form drawing, resizing, cropping, photo-montages, converting between different image formats, and more specialised tasks. Animated images such as GIF and MPEG files can be created using an animation plugin. When it will be done a band should save that as a png, gif or jpeg files A builder wants some eye catching text for the side of his van to improve business opportunities ; In this type of thing , a builder should use Adobe Illustrator as well. A builder will need type of graphic GIF and the trade-off is between file size and quantization artefacts. A customer if he using Photoshop , should save it as a JPEGs and save for web dialog, but there are lots of other programs that he can also use — including Web-specific graphics applications like Fireworks where he should save as a JPEGs. Each has its own vagaries. Be aware that the JPEG “quality” in these programs have no universal meaning and are not standard across programs; they’re only meaningful for comparisons within the same program. The nursery on your estate would like a flyer designed to promote the facility; For a nursery flyer I will need type of graphic GIF or SVG . The best software for nursery flyer will be Publisher. Microsoft Publisher is an entry-level desktop publishing application from Microsoft, differing from Microsoft Word in that the emphasis is placed on page layout and design rather than text composition and proofing which take a good quality for this nursery flyer. By saving this as a SVG is a royalty-free vendor-neutral open standard developed under the W3C Process. It has strong industry support; Authors of the SVG specification include Adobe, Agfa, Apple, Canon, Corel, Ericsson, HP, IBM, Kodak, Macromedia, Microsoft, Nokia, Sharp and Sun Microsystems. SVG viewers are deployed to over 100 million desktops, and there is a broad range of support in many authoring tools.

P3