Thursday, 18 April 2013
Thursday, 7 March 2013
Unit 35 P6
The copyright law is when the OWNER of the work gets their work copied. This IS WHEN THE WORK GETS copIED, distURBED, alterED and displayED. However you can state that it is someone else's work and you have taken it that will be fine. The work has to be original and it cannot be protected by copyright. It is the physical use of the work that makes it safe under the copy right law Intellectual property is a term referring to a number of distinct types of creations of the mind for which property lights are.....Intellectual property is a property right that can be protected under federal and state law, including copyright able works. It pretty much means that the building where you work is safe and all of the work is safe.
Unit 14 M3
THERE ARE MANY THINGS THAT CAN BE PUT IN PLACE TO PREVENT AND CONTROL THE ILLEGAL OCCOURENCES IN P6 HAPPENING
SOME OF THE THINGS PUT IN PLACE, IS THAT THE WIFI'S ARE EQUIPPED WITH THERE OWN INDIVIDUAL PASSWORDS SO THE CHANCES OF PIGGY BACKING IS BARELY ANYTHING. THE ONLY WAY IS IF YOU HACKED THE PASSWORD. IF YOU HAVE A PASSWORD YOU CAN ALSO HELP PREVENT WAR DRIVING.
THE WAY TO STOP PHONE HACKING IS TO CHANGE THE PASSWORD. THIS IS HOW this OCCURRED AS SOME OF THE PASSWORDS WHERE 0000 OR 1234 SO IF YOU CHANGE IT THEN THERE IS LESS OF A CHANCE OF BEING HACKED.
IF YOU CHECK YOUR PHONES AND RUN REGULAR SCANS AND MAKE SURE NO ONE CAN HACK INTO YOUR PHONE YOUR DATA WILL ALSO NOT BE STOLEN.
Unit 14 D2
IN P7 I USED BLUETOOTH BECAUSE ALTHOUGH IT IS SLOWER, IT IS MORE EFFECTIVE AND ALWAYS GOES THROUGH AS LONG AS YOU GIVE IT THE TIME IT NEEDS. ANOTHER GOOD POINT IS THAT ITS FREE. ALTHOUGH THERE ARE A FEW NEGATIVE POINT SUCH AS YOU CANNOT BE FAR AWAY FROM EACH OTHERS PHONES SO YOU ARE LIMITED TO WHAT YOU CAN DO, UNTIL IT EVENTUALLY SENDS. HOWEVER IT IS THE EASIEST WAY FOR BEGGINERS BECAUSE IT IS SIMPLE AND YOU DON'T HAVE TO DO TOO MUCH,.AND DOESN'T HAVE MUCH HASTE TO IT.
Wednesday, 6 March 2013
Unit 14 D1
Htc Specs:
4.7inch screen
highly responsive touch screen
8mp camera
6 hour battery life
I also think that the HTC sensation xl is a very good phone and it could also be used by the student but I chose the Samsung galaxy s2 as the battery last longer so the student can access the internet while he has long days at school but otherwise they are very similar.
nokia tablet specs:
3 hour battery life
width 3inches
bluetooth
I think the nokia tablet could also be used by the reporter because it is small light and would take photographs and he could just simply send them but the only problem is that the iPod 2 has a better camera and seeing how this is so important to the photographer I chose the ipad 2
Ipod touch specs:
highly responsive touch screen
apple aplications
8gb memory
internet acssesable
camera
The ipod touch is a very good choice and I would have chosen this over the Sony walkman but I had to take the owner into consideration and the factory worker could be not very good with technology and the walkman has a larger memory
Apple laptop specs:
camera
quick internet
you can link with other apple products
video calls
I chose the hp pavilion over the apple laptop as the pavilion its easier to work and it has a better camera for video calls this is overall better for the builder as he does not know a lot about technology
Wednesday, 27 February 2013
Thursday, 21 February 2013
Unit 1 D1
On social networking sites you need to be careful what links you go on to or what requests you reply to. A prime example is Facebook you can find links on certain group pages that include viruses/malware, if you get an invite of a game that you have never heard of and none of your friends have been its probably got key loggers on it who if you are giving personal/valuable information someone on a different computer can see what you are typing. You can avoid that though by being cautious about links you don’t recognize invites to certain games/apps etc. These are a big risk because they can find out your pins and other important personal information. Social networking sites are a classic place for cyber bullying and it could happen to anyone so you need to know for positive who you add on social network sites it could be someone trying to start a fight or even a dodgy 50 year old pretending to be someone he’s/she’s not, the only way you can avoid this is to just double check that you know who your talking to and if you insist on talking to someone you don’t know don’t give personal information away.
Thursday, 7 February 2013
Unit 14 M2
The main differences are with a mobile is you cannot connect if you were in the middle of a countryside. You could send a picture message through 3G but it will cost and it isn't that big, it comes out small. The best method is too send it through email and making your phone the hot spot because sending it through email does not cost and it comes out bigger than your phone. The final way of doing it is uploading it to your computer then transferring it through email.
Unit 14 M1
A way to keep protocols and devices safe could be by changing your password frequently, perhaps every week or month. Also it is just common sense but don't let anyone know what your password is for your personal things like emails and Facebo.ok. Another thing is while your computer is turned on do not leave yourself logged on for one very very simple reason you could get hacked by someone.You could also encrypt your things because its a way of concealing your things. So nobody can see it
Thursday, 24 January 2013
Wednesday, 23 January 2013
Subscribe to:
Comments (Atom)

