Wednesday, 17 April 2013
Wednesday, 13 March 2013
Thursday, 7 March 2013
Unit 14 M3
THERE ARE MANY things that can be PUT IN PLACE TO prevent AND CONTROL THE ILLEGAL OCCOURENCES IN P6 HAPPENING
SOME of the things PUT IN PLACE, is that the WIFI'S ARE EQUIPPED WITH THERE OWN INDIVIDUAL PASSWORDs SO THE chances OF PIGGY BACKING IS barely anything. THE ONLY WAY IS IF YOU HACKED THE PASSWORD. IF YOU HAVE A PASSWORD YOU CAN ALSO help PREVENT WAR DRIVING.
THE WAY TO STOP PHONE HACKING IS TO CHANGE THE PASSWORD. THIS IS HOW THE SCANDELED OCCOURED AS SOME OF THE PASSSWORDS WHERE 0000 OR 1234 SO IF YOU CHANGE IT THEN THERE IS LESS OF A CHANCE OF BEING HACKED.
IF YOU CHECK YOUR PHONES AND RUN REGULAR SCANS AND MAKE SURE NO ONE CAN HACK INTO YOUR PHONE YOUR DATA WILL ALSO NOT BE STOLEN.
Wednesday, 6 March 2013
Unit 14 D2
Unit 14 D2
In p7 i used bluetooth BECAUSE although IT IS SLOWER, IT IS MORE EFFECTIVE AND ALWAYS GOES THROUGH AS LONG AS YOU GIVE IT the time it needs. ANOTHER GOOD point IS THAT ITS FREE. Although THERE ARE A FEW NEGATIVE POINT SUCH AS YOU CANNOT be far AWAY FROM EACH OTHERs phones SO YOU ARE LIMITED TO WHAT YOU CAN DO, UNTIL IT eventually SENDS. However IT IS THE EASIEST WAY FOR BEGGINERS because IT IS SIMPLE AND YOU DON'T HAVE TO DO TOO MUCH,.and DOESN'T have much HASTE to it.
In p7 i used bluetooth BECAUSE although IT IS SLOWER, IT IS MORE EFFECTIVE AND ALWAYS GOES THROUGH AS LONG AS YOU GIVE IT the time it needs. ANOTHER GOOD point IS THAT ITS FREE. Although THERE ARE A FEW NEGATIVE POINT SUCH AS YOU CANNOT be far AWAY FROM EACH OTHERs phones SO YOU ARE LIMITED TO WHAT YOU CAN DO, UNTIL IT eventually SENDS. However IT IS THE EASIEST WAY FOR BEGGINERS because IT IS SIMPLE AND YOU DON'T HAVE TO DO TOO MUCH,.and DOESN'T have much HASTE to it.
Wednesday, 27 February 2013
Unit 14 M2
The main differences with a mobile is you can't connect if you were in the middle of a countryside. You could send a picture message through 3G but it will cost and it isn't that big, it comes out small. The best method is to send it through email and making your phone the hot spot because sending it through email doesn't cost anything and it comes out bigger than your phone. The final way of doing this is uploading it to your PC then transferring it through email.
Wednesday, 20 February 2013
unit 14 D1
Unit 14 D1
Htc:
4.7inch screen
high and quick responce touch screen
8mp camera
6 hour total battery life
I also think that the HTC sensation XL is a very good phone and it could also be used by the student giving easy internet access. Although despite all that I chose the Samsung galaxy s2 as the battery lasts a lot longer so the student can access the internet while he has long hours at at school. However apart from that they are very similar.
Nokia tablet:
3 hour total battery life
width is 3 inches
Bluetooth
I think the nokia tablet could also be used by the reporter because it is small light and would take photographs and he could just simply send them but the only problem is that the iPod 2 has a better camera and seeing how this is so important to the photographer I chose the ipad 2
Ipod touch specs:
very high responsive touch screen
all apple aplications
8gb memory
Can connect to internet
camera
The iPod touch is a very good choice and I would have chosen this over the Sony Walkman but I had to think about the owner in this because the factory worker could be not very good with technology and the Walkman has a larger memory.
Apple laptop specs:
camera
quick access to the internet
you can link with other apple products
has all other apple add ons
video calls
I chose the hp pavilion over the apple laptop as the pavilion its easier to work and it has a better camera for video calls this is overall better for the builder as he does not know a lot about technology and this is straight forward to work
unit 14 M1
Unit 14 M1
One way to keep protocols
and devices safe could be to change your password frequently, perhaps each/every week or month. Also it is just sense, but don't let anyone know what
your password is for your personal things like emails and Facebook. Another
thing is while your computer is turned on do not leave yourself logged on for
one very very simple reason you could get hacked by someone.You could also
encrypt your things because it is a way of concealing your things. So
nobody can see them. Encryptions keep your transmissions safe as no-one can hack in and nobody can understand it as it is only a load of different letters and numbers.
Thursday, 24 January 2013
Unit 35 P2
Unit
35:
Type of file used for a
band logo on their website: You would
use either a JPEG or a bitmap because when zoomed out in normal view the
picture looks fine and usually a medium or high quality image without any pixilation
or being burnt out. But this wouldn't be what you would use to put on the side
of a van as when you zoom in on the picture the edges and pictures become pixelated
and squared and the picture gets burnt out. The program you would use for
this type of file is adobe Photoshop and fireworks as they are mainly for
bitmap/ JPEG image editing.
The type of graphic you
would use for a picture and text on the side of a van: You would use a vector image because unlike bitmaps
or JPEG’s when a vector image has been blown out (size increased or zoomed in)
it doesn't lose quality and become pixelated where-as bitmaps do. So you could
spread out an image on the side of a van and it would be the same in quality as
it was normal size. You would use the programme illustrator for a vector image.
The type of graphic you
would use for a nursery school flyer promotion: You would use a PDF (portable document format); you
would use this because if you have a document saved as publisher etc. If you
send that document to someone else they have to have publisher downloaded to
open the document but with PDF you can open the document without having certain
program downloaded, you can open a PDF on anything from a computer to a
mobile phone.
Wednesday, 23 January 2013
Subscribe to:
Posts (Atom)