Tuesday, 2 July 2013
Tuesday, 21 May 2013
Unit 14 M3
A mechanism that has been put in place to stop your human interaction is Skype. Skype excludes you from going out more, but if you own a webcam, you can actually speak face-to-face with people! If you have a microphone and a webcam then you can speak normally without typing, it's just like going out, but really you're not, as you can still see face-to-face!
A mechanism that has been put in place to improve data security is passwords and locating devices. If a thief managed to get hold of your phone and you have a password it will be very difficult for them to get in especially as with some phones it locks after a certain amount of tries this happens on blackberries and iPhones, you will then have too get it unlocked at a phone shop, which costs extra money. On the Iphone you can download tracking devices so if your phone gets lost you can track it from another phone and get it back!
To stop people using their phones whilst driving you have bluetooth so people can talk and answer the phone using voice activation.
To stop people downloading from dodgy sites, these sites have been blocked.
A mechanism that has been put in place to improve data security is passwords and locating devices. If a thief managed to get hold of your phone and you have a password it will be very difficult for them to get in especially as with some phones it locks after a certain amount of tries this happens on blackberries and iPhones, you will then have too get it unlocked at a phone shop, which costs extra money. On the Iphone you can download tracking devices so if your phone gets lost you can track it from another phone and get it back!
To stop people using their phones whilst driving you have bluetooth so people can talk and answer the phone using voice activation.
To stop people downloading from dodgy sites, these sites have been blocked.
Tuesday, 7 May 2013
UNIT 14 P6
P6
A way that technology has affected human life is communication, you no longer need too go and find the person you need too speak too, a simple text and they know. This affects your social life as some people live over technology and don't go out.
A way that technology has affected law is data security. Pictures and videos get leaked. Texts get leaked your phone can easily get stolen without you noticing, and your data can get accessed. The thief can do what he likes with the phone and it can be very tricky too obtain again. People use there phones in cars which is illegal and also download illegal music and games with it.
A way that technology has affected human life is communication, you no longer need too go and find the person you need too speak too, a simple text and they know. This affects your social life as some people live over technology and don't go out.
A way that technology has affected law is data security. Pictures and videos get leaked. Texts get leaked your phone can easily get stolen without you noticing, and your data can get accessed. The thief can do what he likes with the phone and it can be very tricky too obtain again. People use there phones in cars which is illegal and also download illegal music and games with it.
D2 UNIT 14
Personally my most favored method is too send it too someone through a text or message it too someone using a secure website privately. This could be something like Direct Messaging on twitter. Or inboxing someone on facebook. If i had the decision i would send it too someone through a text message simply because its easier and more simple. It's quick and you need too make sure that you trust this person as they will have that text, once you send it, you cannot get it back. Make sure this is the correct number aswell! - You do not want your details being sent too the wrong person!
P7 UNIT 14
There are many ways of sending a contact from our perspective too anothers.
You could send it too someone through an email, which is easy and simple too do, you don't need too be good at IT too do this.
You could put the contact details onto word and then print screen it or save it and send it too your friend.
You could send the contact details over mobile phone or over social networking like facebook or twitter. You could send it through a text message, there are many different social networking sites you can send it through, skype facebook twitter, text messages etc!
Tuesday, 30 April 2013
Unit 14 #P5
P5
A local delivery company have been allocated money to improve their service. Some of the money has been put aside for mobile technology approx. £500 per driver. Make suggestions to the director of how he can spend the money, to make the delivery service more efficient. Give examples how the mobile technology will help the business.
I think the company could put the money towards purchasing a phone specified for work. For example possibly an IPhone, this is so the driver could use the built-in GPS/Satnav, this could help the van-driver with his deliveries and directions to the destination. The Owner of the company, or whoever is in charge, could use the GPS to track the van-drivers to make sure that they are doing their deliveries and not slacking on the job.
Unit 14 M1
M1
How do devices and protocols keep data safe?
Most up to date devices can keep the majority of data safe, as they are very clever and they don't take a genius too work.
You can set your own password for security/protection.
On an iPhone you need a 4 digit code too unlock it that the owner can set. This can be very awkward and hard too guess as there are thousands of possibilities and the phone locks for 10+ minutes after ten wrong attempts.
On the iPhone you can download tracking devices and has a built in Satnav, this could be used too track your stolen phone.
On other phones like blackberries, you can set the password too whatever you like, including letters, so there will literally be billions upon billions of possibilities too keep your data safe.
You can also download tracking data and Satnav type apps on your blackberry too track a stolen phone etc!
Most Smartphones now-a-days can do things like this as they are clever devices!
There is also something called encryption; this is the process of sending a message privately so hackers and eavesdroppers cannot read it.
Unit 14 P4
If a photographer went out and wanted too transfer a picture, you would need too locate a hotspot. If you connect too the hotspot you can send it by email. If you have 3G or 4G on your phone that's very helpful. 3G is third generation of mobile standards, this allows you too go on the internet where-ever you are. You can also send the photo's through a social networking system for example, tumblr or facebook/twitter.
You could also send it through SMS with the disadvantage of it costing.
You could also send it through SMS with the disadvantage of it costing.
Unit 14 P3
All up to date protocols
Wifi - This is what you need too connect too internet, mainly found in a household or restaurant maybe. -fairly good range of 30m+
Texting - You need to have somebodies phone number too text them, a form of communication, this can be done across the world, so it has a large range.
Calling - This also involves having another persons phone number, same range as texting. Yet this is a form of VOICE communication.
Bluetooth - This is what you use too send things via phone for free, also a bluetooth could be an earpiece too take calls. -Short range of around 10m. 3G - This is what allows you too connect to the internet without being connected too wifi. This has an almost unlimited range but costs extra money. Infrared - This is an electromagnetic radiation with longer wave lengths than those of visible light. Files can be sent over this but only at a VERY short range.
All protocols on an up to date laptop
Wifi can be used on a laptop, used too surf the internet freely.
Using the internet; A wide range of things too do on the internet, need to be connected too wifi or something similar.
Tuesday, 22 January 2013
Subscribe to:
Comments (Atom)