Thursday, 4 July 2013

what i have learnt this year

What I Have Learnt In This Year..

In this year of year 9 I.T i learnt a number of things which included -


  1. How to make an signature on blogger
  2. How to post a number of post on blogger
  3. How to make folders to keep your post organised
  4. How to keep safe on the internet and how to keep my passwords safe
  5. Learnt the advantages and disadvantages of gmail and blogger
  6. How to send emails and make an account on gmail
  7. To understand all the protocols and all the different ones that there is
  8. The risks and advantages of the internet
  9. Advantages and Disadvantages of I.T communication skills
  10. Different qualitys of mobile technology etc

I really enjoyed the year 9 course in I.T and i liked sitting next to my twin :) 

Thursday, 13 June 2013

D2 - UNIT 14

You can use a number of protocol transmission which include...
  1. Email
  2. Text Messages




Email - 

The good things about this protocol transmission is you can send things from all over the world and it the matter of seconds. However the bad things about email protocol transmission is sometimes the file might not open or it wont transfer all the information depending where you are.Also if you want to send alot of pictures you have to do it in separate emails which could cause some problems


Text Messages -

Text Messages is also a good protocol because its a easier way and it is very fast but the disadvantages is sometimes depending on what you are sending it may cost your more and if you don't know you could get carried away and your phone bill will be alot higher.
                                                                                                                                                                                                                                                                                                                                                                                                                          

Thursday, 6 June 2013

M1 UNIT 14

M1
How do protocols and devices keep data safe?

To keep your devices safe you must set a password which only you will remember.Also you must change it on a regular bases so you have no risk of someone hacking you.

Furthermore you should always log out! Even if it is email or Facebook you must because the person using the computer/laptop after could access your messages because you are already logged in.

With WiFi you have to but a password/code so someone can not access it. However if you don't have a password its so much easier for someone to use your WiFi without you realising.



Thursday, 23 May 2013

p7 - unit 14


P7 – UNIT 14 

A customer wants to know if they can send a contact from one device to another.  With a partner demonstrate how to wirelessly send one contact from your device to your partners.  You need to fill in the witness statement (or print scree) describing how you done it and the protocol you used. Copy this witness statement or print screens to blogger

You can send it by a number of ways which include

   Email

 Bluetooth

 Text Message



You can send contact information in many different ways. One being is that you can send it by Bluetooth if you’re close enough.


Another way of sending contact information over devices is you can hold the button down for a number of seconds on the information then a tab should come up saying ‘send to contact’ or ‘send by email’ if you click on this the information will send just by a easy text or email.





              








Thursday, 16 May 2013

P5 - UNIT 14

                   Iphone 5 - black/white






This phone is £529.00. It is £29 over budget, however the Iphone is the most recent and updated phone today. You can get it in a range of two colours which include black or white.
This phone will help to improve the delivery service because it includes alot of apps which can help you.

The apps which can improve your work are..



  • Satnav - This can help you because if you are lost or you don't know how to get to your next delivery place, this apps gives you instruction and tells you what roads to take and what roundabouts to cross etc.
  • Signing Pad - If you download this app it will let the person you delivery to can sign the pad on the Iphone to prove that you have delivered their parcel and they got it safe without any hassle.
  • Tracking System - This will help because it can see if the driver is doing his job properly. Also if he gets lost or has an accident he can ring the company up so they can track him down and give him help or instruction on where to go.



Thursday, 9 May 2013

P6 UNIT 14

Social and Legal implications of using mobile technologies.





Legal Implications -

Phone Driving -
If you are on the phone either having a phone call or texting someone or even on social network you are breaking the law. Whilst you are on your phone you loose all your concentration on the road and you forget what you doing as you are not paying attention. Not paying attention to the road can cause accidents -
For example if you looking down on your phone and not on the road you could end up in the back of the car in front of you.
To stop causing accidents and to stop breaking the law you could either turn your phone off or keep it somewhere you can see it so it don't cause temptation staring at it.



Phone Theft -
Phone theft is also against the law. If you put your phone in your back pocket or somewhere where it is visible to see you are in the risk of getting your phone stolen.
To prevent your phone being stolen you have to put it somewhere safe - for example in a zipped pocket, bag etc where no one knows where it is expect from you.


Piggybacking -
Piggybacking is when you use someones wireless network. This is against the law because you using it for free and without their permission on using the wireless network.




Social Implications -

Cyber bulling -
Cyber bulling is when you bully someone by calling them names or threatening them over social network. This is why we use 'cyber' because it is online.
To stop this we can either block the people who are bulling or dont add them as a friend or even report them.




Thursday, 25 April 2013

P4 & M2 UNIT 14

P4-


The technology that can be used to send pictures are 



FACEBOOK-

With Facebook you can upload photos and onto your own albums. However if you don't want people to see your photos you can change your privacy settings to 'only friends'. If you don't do this the whole Facebook can see your photos even if you don't have them as a friend. There is 5 settings - 'Friends' 'Friends of friends' 'Only me' and 'Custom' which allows you to hide your photos from certain people.



INSTAGRAM-

Instagram is also a site you can use for uploading photos. However Instagram has its disadvantages which included you have to crop your photo so its a certain size which could cause some problems  Also you cant save photos on Instagram the only way you could do it is screenshot it depending how what type device you have. However Twitter does not crop photos but Twitter AND Instagram are very public.


EMAIL-

Email is one of the most popular ways you could use to send photos to people. Its a good idea to send photos to people if your on holiday and you would like to show them where you are and what is your surroundings. The disadvantages are you can only send a limited amount of photos so if you would like to send alot you would have to do it in a number of emails. However its a quick easy way if you only have a couple of photos.


TWITTER-

Twitter is a difficult way to send photos because the only way you could do it is by uploading it to your profile. This is bad because everyone following you on twitter can see the photo you just uploading. It depends how who you want to show and what the photo is. However comparing Facebook to it is that Facebook and Instagram is alot more private than twitter.


PICTURE MESSAGES-

Picture message is also quite difficult because it cost to send a photo even though your on contract but just say your on pay as you go it will cost alot more than 10/15p because your added an extra file. Also the picture quality is quite poor. However its a quick easy way to save it to your mobile. On the other hand other social networking like Facebook would be easier because you can send a picture through inbox.

Thursday, 21 February 2013

Unit 14 P1 & P2





  • Student who needs a mobile phone with internet access.
  • Self employed builder who is new to technology and has £600 to spend on a laptop for invoicing.
  • Journalist who needs a electronic tablet when on location.
  • A factory worker who wants to listen to an MP3 player on the bus.


Blackberry Bold 9790







  • Optical track-pad.
  • Marvell Tavour MG 11 1GHz processor with 768mb RAM.
  • Up to 432 hours standby time.
  • Up to 310 mins talk time.
  • Messaging: SMS, MMS, Email, IM, BBM.
  • WAP compatible.
  • 32GB microSD memory card (not included).
  • Built-in 5MP camera.
  • Video capture and playback.
  • Colour screen.
  • Bluetooth.
  • Vibration alert.
  • MP3 player.
  • Size of handset H110, W60, D11.4mm.
  • Weight 107g.







more details on iPad Mini Wi-Fi 16GB.iPad Mini Wi-Fi 16GB









Display:
  • 7.9in.
  • LED backlit display.
  • Multi-touch screen.
Product specifications:
  • 16GB.
  • B/g/n wireless/WiFi enabled.
  • Bluetooth.
  • 3.5mm stereo headphone.
  • Built-in speaker.
  • Microphone.
  • 5MP iSight camera with 1080p HD video recording.
  • iOS 6 and iCloud.
  • Mobile data service on Wi-Fi and Cellular models (data plan sold separately).
General features:
  • Up to 10 hours battery life (depending on usage).
  • 0.72cm thin.








more details on New Apple iPod Shuffle 2GB - Purple.                     iPod Shuffle 8GB


  • Small and wearable with a polished anodised alumiunium finish.
  • Play your music, audiobook or podcast.
  • The VoiceOver button enables you to hear the song title, playlist menu and battery status.
  • Supports multiple playslists and Genius Mixes.
  • Clip, volume controls.
  • 2GB storage.
  • Compatible with MAC and PC.
  • Recharge through USB port.
  • 15 hours battery life or provides up to 15 hours music playback.
  • Includes earphones.
       






    MSI Laptop Purple











Display features:
  • 10.1in widescreen display.
  • Resolution 1024 x 600 pixels.
Graphics:
  • Shared graphics.
  • Intel GMA Intel GMA 3600 graphics card.
  • Graphics card memory 256MB.
Interfaces and connectivity:
  • 2-in-1 media card reader.
  • Secure Digital (SD), Multi-Media Card (MMC) compatible.
  • 2 USB ports.
  • 1 Ethernet port.
  • 1 HDMI port.
Multi-media features:
  • 0.3MP built-in webcam.
  • Built-in mic.
Operating system and software:
  • Microsoft Windows 7 Starter.
  • Anti-virus and security (trial).
  • Adobe Reader.
General features:
  • Up to 4 hours battery life.
  • Size H2.13, W26.3, D18.6cm.
  • Weight 1.1kg.


                                                     

Thursday, 7 February 2013

p1

 

d1

D1


You can make your information and data safe by 
using privacy settings.
You can find your privacy settings on your settings on most internet sides for example Facebook Twitter etc.

If you change your settings to only 'friends' then only the friends you have can only see what you post for example your pictures and status updates.

But if you change your settings to 'everyone' then anyone can see your what your doing.


 Also you will need to make a secure password. Don't make one obvious for example your name 'alexure123' because anyone could guess that.

Make sure you log out when you have finished on your social network site and clear all your history so people cant hack they way into your account.

Thursday, 24 January 2013

p6


P6
Advantages and disadvantages of IT

Firstly using IT does have loads of good advantages but on the other hand it has loads of disadvantages.
I’m going to start off by saying some of the advantages which included-
Use less paper and write on word for example for homework.
A lot easier and quicker
Use the internet for research
Communicate with people around the world e.g- Facebook/Skype
Use a wide range of websites which include-
Facebook YouTube Blogger Gmail Twitter..
Also it is environmentally friendly

But the IT does have a lot of disadvantages as  well. For example if you buy something online like ebay someone could easily hack your bank account because you will have to enter your card details because that is the only way you can pay money online.
Also people have been ‘cyber bullied’ in the past which is wrong.
Cyber bulling is when you bully someone online for example Facebook chat. You say all these things to them behind a computer screen sometimes you could not be caught but if you have your name and who you are on your profile the police could get involved which is getting serious.
One last disadvantage is getting scammed. You could get a pop up which is saying you have won a prize you click on it which then could give your computer a virus and your computer will then no longer work.
The social disadvantages when using IT is people can get distracted really easily, for example when your doing your homework/ at work and Facebook is on your computer you more tempted to go on it. Also there is a lack of human contact for example you text but dont see face to face. 


M2- Risks 

There are many threats and risks when using an it based communication system.
These risks and threats include:

  • Cyber-bulling
  • Spam
  • Uploading digital contact 
  • Privacy of information  

Cyber- bulling-
This is a threat because people get bullied online and the risk is that the people who are the victim could use this evidence and hand it over to the police which will create bigger and worse issues.

Spam-
You could a email saying that you have won something like a car for only £10 so that means you have to enter you card details. This is a threat because it is fake and they will hack into your bank and take all your money.


Uploading digital contact-
This is a risk for using it communication because if you upload a photo of you or something that you own someone can easily save this photo and it will go further  This is why Facebook has privacy settings so you can only share your digital contact with who you want to.

Privacy of information-
This is also a threat to it communication because if you put where you live or your mobile number o popular social sites including Facebook/Twitter people can easily find out who you are and find out where you are.




p4 spell check


Thursday, 17 January 2013

M2

M2 - THREATS AND RISKS.


  • If you add to much information about yourself people can find out very personal details, for example where you live.

  • It could be a scam and if you put details in about your credit card number someone could end up taking all your money out of your bank account.


Thursday, 10 January 2013

m1




  • Advantages of using BlogSpot

    ·      You can use it anywhere and anytime you wish.
    ·      You can add authors to comment on your work even your friends!
    ·      You can personalise your blogger homepage
    ·      It’s free!! No cost what so ever
    ·      Your teacher can view your work and comment what you have done well and what you can approve on in future OR if you need to change a certain slide
    ·      You can also use blogger on your mobile phone, you can edit and do everything that you do online on your phone.
    ·      Using blogger on your phone also saves a lot of time and it’s a lot quicker especially if you’re not at home or school