FOLDER
AYOMIDE AKINSULIRE GCSE ICT
Thursday, 24 January 2013
Wednesday, 9 January 2013
TASK 2.5
Make a list of the different ways that Satya and Simon could:
a) send messages to tell their friends what they are doing
Satya and Simon colud send messages to their friends through:
Phone calls
Text messages (SMS) and (MMS)
Emails
Social networking e.g Facebook and Twitter
Blogs
b) take photos and display them for their friends
They could post ohotos for their friends through
MMS
Attaching Emails
Upload to online album
Upload to social networking site
Upload to blog
TASK 2.7
Use etask 2.7 to identify the features of a notebook that make it suitable for travellers
TASK 2.8
Look at the ways of sending messages asnd photos/videos shown in Figure 2.3 Which of these could be carried out using a netbook
messages and photos/videos can be sent through Bluetooth; Usb cable; Flash memory card. With both the netbook and the phone.
TASK 2.9
Research the three main methods of transferring photos.
a) which can be used with standard mobile phones and basic digital cameras?
There are not huge differences between the transferring methods because they
are all of high speed
c) which one should Satya and Simon use?
All methods are good for transfer because they are not huge differences of speed between them all
Make a list of the different ways that Satya and Simon could:
a) send messages to tell their friends what they are doing
Satya and Simon colud send messages to their friends through:
Phone calls
Text messages (SMS) and (MMS)
Emails
Social networking e.g Facebook and Twitter
Blogs
b) take photos and display them for their friends
They could post ohotos for their friends through
MMS
Attaching Emails
Upload to online album
Upload to social networking site
Upload to blog
TASK 2.7
Use etask 2.7 to identify the features of a notebook that make it suitable for travellers
- Light, robust and easily portable
- Small 10 inch monitor
- Large keyboard
- Microphone and speakers
- Wifi connection for the Internet
- USB connection
TASK 2.8
Look at the ways of sending messages asnd photos/videos shown in Figure 2.3 Which of these could be carried out using a netbook
messages and photos/videos can be sent through Bluetooth; Usb cable; Flash memory card. With both the netbook and the phone.
TASK 2.9
Research the three main methods of transferring photos.
a) which can be used with standard mobile phones and basic digital cameras?
- Bluetooth transfer to a PC
- Transfer via a USB cable
- Phones with SD cards
There are not huge differences between the transferring methods because they
are all of high speed
c) which one should Satya and Simon use?
All methods are good for transfer because they are not huge differences of speed between them all
TASK 2.3 & 2.4
How could they have immediately recognised that the IPS website was the government's official site and the other wasn't
http://www.passports-office.co.uk/
https://passports.ips.gov.uk This is a site that is secured because it S at the end of the https while the first one isn't because it doesnt have the "S".
Why was the official passport site only fourth in the list? Why did the other sites, those trying to make money from the advice they give,get to the top of the list?
The reasons why the official passport office was fourth on the list is because they were not able to pay an amount that would allow them to be untop of the list. While the other sites paid the sum and allowed them to be untop
.
Carry out some research to find out how you can get a URL to the top of the list
It is an entire science to get to the top of the search results. Its known as Search Engine Optimization.
Google ranks websites based on the number of links. For example if 100,000 websites have a link to your URL and all those websites deal with "jewelry" this way or another - your website will be considered an authority and will be ranked high in search results for terms related to jewelry niche.
How could they have immediately recognised that the IPS website was the government's official site and the other wasn't
http://www.passports-office.co.uk/
https://passports.ips.gov.uk This is a site that is secured because it S at the end of the https while the first one isn't because it doesnt have the "S".
Why was the official passport site only fourth in the list? Why did the other sites, those trying to make money from the advice they give,get to the top of the list?
The reasons why the official passport office was fourth on the list is because they were not able to pay an amount that would allow them to be untop of the list. While the other sites paid the sum and allowed them to be untop
.
Carry out some research to find out how you can get a URL to the top of the list
It is an entire science to get to the top of the search results. Its known as Search Engine Optimization.
Google ranks websites based on the number of links. For example if 100,000 websites have a link to your URL and all those websites deal with "jewelry" this way or another - your website will be considered an authority and will be ranked high in search results for terms related to jewelry niche.
Thursday, 13 December 2012
Trip to PARIS with different methods of transport
Travel to Paris by Train
One of the most legendary capitals in Europe, Paris is a must-see, with its long traditions of history art and culture. Paris is one of the most popular & enduring tourist destinations in the world what is it about this city that appeals to us all? It is the beauty of a city with more parks, gardens & squares than any other in Europe?
Could it be those romantic bridges over the Seinr that street lamps reflected in the ancient river?
From an average of £79,50 per person
Tuesday 11 Decemeber 2012 DURATION 2h37m
OUTBOUND
Departing 05:40 London st Pancras
Arriving 09:17 Paris Nord
Wednesday 12 December 2012 DURATION 2h36m
INBOUND
Departing 16:13 Paris Nord
Arriving 17:39 London st Pancras
Travel By Ferry
From an average of £358 per person
Tuesday 11 December 2012 DURATION 6h45m
OUTBOUND
Departing 08:15 Portsmouth
Arriving 15:00 Caen
Wednesday 12 December 2012 DURATION6h45m
INBOUND
Departing 16:30 Caen
Arriving 21:15 Portsmouth
https://www.brittany-ferries.co.uk/303?st=f2
Travel by Coach
From an average of £52 per person + 2 nights in Les Etangs de Corot Hotel in paris for only £157
Monday 17 December 2012 DURATION 8h30m
OUTBOUND
Departing 08:00 London Victoria coach station
Arriving 16:30 Paris ( Gallieni) France
Wednesday 19 December 2012 DURATION 7h
INBOUND
Departing 08:30 Paris (Gallieni) France
Arriving 15:30 London Victoria coach station
http://www.eurolines.co.uk/
Travel by plane
Travel from London to Paris only with £165 with maximum guarantee of being treated well with the highest attention of the staff and the best products you could ever be served with.
Monday 17 December 2012 DURATION 2h20m
OUTBOUND FLIGHT
Departure 18:40 London
Arriving 20:50 Paris Charles de Gaulle
Wednesday 19 December 2012 DURATION 10m
INBOUND FLIGHT
Departure 21:50 Paris Charles de Gaullr
Arriving 22:00 London
http://www.easyjet.com/EN/Booking.mvc
Travel to Paris with EASYJET and you would never regret it with only £105
Monday 17 December 2012 DURATION 2h20m
OUTBOUND FLIGHT
Departure 18:50 London Luton
Arriving 21:10 Paris Charles de Gaulle
Wednesday 17 December 2012 DURATION 15m
INBOUND FLIGHT
Departure 10:05 Paris Charles de Gaulle
Arriving 10:20 London Luton
http://www.easyjet.com/EN/Booking.mvc
Thursday, 15 November 2012
INTERNET AND IT'S SAFETY
The internet is a global network connecting millions of computers. More than 100 countries are linked into exchanges of data, news and opinions. Accoding to Internet World Stats, as of December 31,2011 there was estimated 2,267,233,742 internet users worldwide. This represents 32.7% of the world's population.
This are problems you might have when using the internet:
VIRUS:
A computer virus is a program or piece of code that is loaded onto your computer without your knowlede and runs against you wishes. Viruses can also replicate themselves. All computer viruses are man-made. a simple virus that can make a copy of itself over and over again is relatively easy to produce. Even such a simple virus is dangerous because it will quickly use all avaible memory and bring the systemto a halt. An even more dangerous type of virus is one capable of transmitting itself across netwrok and bypassing security systems.
Viruses can get on to your computer through
A Spyware is any software that covertly gathers user information through the user's Internet connection without his or her knowledge, usually for advertising purposes. Spyware applications are typically bundled as a hidden component of freeware or shareware programs that can be download from the internet howeve it should be noted that the majority of shareware and freeware applications do not come with spyware. Once installed, the spyware monitors user activity on the Internet and transmits that information in the background to someone else. Spyware can also gather information about e-mail addresses and even password and credit numbers.
COOKIES:
A cookie is a small file which stores information related to your internet activity and then reports this back to the website server.
Cookies are used legimately by website creators to enable websites to be customised for individual users.
For example, if you go on the BBC website, you can customise the hompage, and the next time you visit the site the layout will appear as you have set it.
However, cookies can ucause problems such as pop-ups being generated or details like passwords stored which could be used by hackers.
PHISHING:
The act of sending an e-mail to a user falsely claiming to be an established legitimate enterprise in an attempt to scam the user into surrendering private information that will be used for identity theft. The email directs the user to visit a Web site where they are asked to update personal information, such as passwords and credit card, social security, and bank account numbers, that the legitimate organization already has. The Web site, however, is bogus and set up only to steal the user information.
SPAM:
Spam is flooding the Internet with many copies of the same message, in an attempt to force the message on people who would not otherwise choose to receive it. Most spam is commercial advertising, often for dubious products, get-rich-quick schemes, or quasi-legal services. Spam costs the sender very little to send -- most of the costs are paid for by the recipient or the carriers rather than by the sender.
HACKERS:
It is important to keep the information that is stored on your computer secure. Hackers are people who try to get access to your computer withouth your permission in order to steal information which they could use for malicious or criminal purposes.
Using peer-to-peer software could increase the risk of hackers accessing data stored on your computer.
IDENTITY THEFT:
Identity Theft is a crime whereby criminals impersonate individuals, usually for financial gain. In todays;s society, you often neeg to reveal personal bits of information about yourself, such as social security numbers, a signature, name, address, phone numbers, and even banking and credit card information. If a thief is able to access this personal information, he or she can use it to commit fraud in your name. With this information the thief could do things such as apply for loans or new credit card accounts. They can then request a billing address chnage and run up your existing credit card without you knowledge. They can also use counterfeit checks and debit cards, or authorize electronic transfer in your name, to wipe out your bank account.
This is a list of how we can protect ourselves from this risks:
Copyright
Patents
Trade Marks
Other
protection
COPYRIGHT:
A Copyright protects the form of expression of a creator against copyin. literary, dramatic, musical and artistic works are included within the protection of U.S copyright law. The USPTO does not register copyrights, are the copyrights office does not.
Copyright protection is given to the authors of "original works of authorship, " including literary, dramatic, musical, artistic and certan other intellectual works. This protection is available for both published and unpublished works.
The owner of copyright has the exclusive right to do and to authorize others to do the following:
PATENT:
A patent is a set of exclusive rights granted by a government to an invento or applicant for a limited amount of time (normally 20 years from filing date). It is a legal document defining ownership of a particular area of new technology.
Patents are Granted in over 150 countries and are predicted on the theory that inventors are more likely to invent and disclose that knowledge to the public in exchange for a limited period of exclusivity. the right granted by a patent excludes all other from making, using or selling an invention or products made by an invented process.
TRADEMARK:
Trademarks is a distinctive sign or indicator used by an individual, business organization, or ohter legal entity to identify for consumers that the products or services on or with wich the trademark appears orignate from a unique source, designated for a specific market, and to distinguish its products or services from those of ohter entities.
The internet is a global network connecting millions of computers. More than 100 countries are linked into exchanges of data, news and opinions. Accoding to Internet World Stats, as of December 31,2011 there was estimated 2,267,233,742 internet users worldwide. This represents 32.7% of the world's population.
This are problems you might have when using the internet:
VIRUS:
A computer virus is a program or piece of code that is loaded onto your computer without your knowlede and runs against you wishes. Viruses can also replicate themselves. All computer viruses are man-made. a simple virus that can make a copy of itself over and over again is relatively easy to produce. Even such a simple virus is dangerous because it will quickly use all avaible memory and bring the systemto a halt. An even more dangerous type of virus is one capable of transmitting itself across netwrok and bypassing security systems.
Viruses can get on to your computer through
- Visiting certain websites
- Opening emails downloading attachements or content from the Internet
- using infected protable storage devices such as memory sticks, CDs, DVDs
- Connecting to an infected hard disk.
A Spyware is any software that covertly gathers user information through the user's Internet connection without his or her knowledge, usually for advertising purposes. Spyware applications are typically bundled as a hidden component of freeware or shareware programs that can be download from the internet howeve it should be noted that the majority of shareware and freeware applications do not come with spyware. Once installed, the spyware monitors user activity on the Internet and transmits that information in the background to someone else. Spyware can also gather information about e-mail addresses and even password and credit numbers.
COOKIES:
A cookie is a small file which stores information related to your internet activity and then reports this back to the website server.
Cookies are used legimately by website creators to enable websites to be customised for individual users.
For example, if you go on the BBC website, you can customise the hompage, and the next time you visit the site the layout will appear as you have set it.
However, cookies can ucause problems such as pop-ups being generated or details like passwords stored which could be used by hackers.
PHISHING:
The act of sending an e-mail to a user falsely claiming to be an established legitimate enterprise in an attempt to scam the user into surrendering private information that will be used for identity theft. The email directs the user to visit a Web site where they are asked to update personal information, such as passwords and credit card, social security, and bank account numbers, that the legitimate organization already has. The Web site, however, is bogus and set up only to steal the user information.
SPAM:
Spam is flooding the Internet with many copies of the same message, in an attempt to force the message on people who would not otherwise choose to receive it. Most spam is commercial advertising, often for dubious products, get-rich-quick schemes, or quasi-legal services. Spam costs the sender very little to send -- most of the costs are paid for by the recipient or the carriers rather than by the sender.
HACKERS:
It is important to keep the information that is stored on your computer secure. Hackers are people who try to get access to your computer withouth your permission in order to steal information which they could use for malicious or criminal purposes.
Using peer-to-peer software could increase the risk of hackers accessing data stored on your computer.
IDENTITY THEFT:
Identity Theft is a crime whereby criminals impersonate individuals, usually for financial gain. In todays;s society, you often neeg to reveal personal bits of information about yourself, such as social security numbers, a signature, name, address, phone numbers, and even banking and credit card information. If a thief is able to access this personal information, he or she can use it to commit fraud in your name. With this information the thief could do things such as apply for loans or new credit card accounts. They can then request a billing address chnage and run up your existing credit card without you knowledge. They can also use counterfeit checks and debit cards, or authorize electronic transfer in your name, to wipe out your bank account.
This is a list of how we can protect ourselves from this risks:
COPYRIGHT:
A Copyright protects the form of expression of a creator against copyin. literary, dramatic, musical and artistic works are included within the protection of U.S copyright law. The USPTO does not register copyrights, are the copyrights office does not.
Copyright protection is given to the authors of "original works of authorship, " including literary, dramatic, musical, artistic and certan other intellectual works. This protection is available for both published and unpublished works.
The owner of copyright has the exclusive right to do and to authorize others to do the following:
- Reproduce the work in copies or sound recordings.
- Make derivative works based upon the original.
- Distribute copies or sound recordings of the original to the public by sales, rentals, leasing, lending or licensing.
- Perform the original publicly: and that would include the use of digital audio.
- Display the original publicly.
PATENT:
A patent is a set of exclusive rights granted by a government to an invento or applicant for a limited amount of time (normally 20 years from filing date). It is a legal document defining ownership of a particular area of new technology.
Patents are Granted in over 150 countries and are predicted on the theory that inventors are more likely to invent and disclose that knowledge to the public in exchange for a limited period of exclusivity. the right granted by a patent excludes all other from making, using or selling an invention or products made by an invented process.
TRADEMARK:
Trademarks is a distinctive sign or indicator used by an individual, business organization, or ohter legal entity to identify for consumers that the products or services on or with wich the trademark appears orignate from a unique source, designated for a specific market, and to distinguish its products or services from those of ohter entities.
Wednesday, 14 November 2012
HISTORY OF MOBILE PHONES
Although most of us feel like we couldn't live without our mobile phones, they've not really been in existence for long. In fact, mobile phones as we know them today have only been around in the last 10 to 15 years.
THE FIRST MOBILE PHONES
Mobile phones particularly the smatrphones that have become our inseperable companions today, are relatively new. However, the origin of the mobile phone goes bakck to 1908 when a US Patent was issued in Kentucky for a wireless telephone.
The story of the modern mobile phone really begins in the 1940s when engineers working at AT&T developed cells for mobile phone based stations.
The very first mobile phones were not really mobilephones at all. They were two- way radios that allowed people like taxi drivers and emergency services to communicate. Instead of relying on base stations with seo=perate cells (and the signal being passed from one cell to another), the first mobile phone netwroks are often referred to as 0G mobile phones, or Zero Generation mobile phones. Most phones roday rely on 3G or third-generation mobile technology.
THE DEVELOPMENT OF MOBILE PHONE TECHNOLOGY
A Motorola employee called Martin Cooper is widely considere to be a key player in the history of mobile phones, inventing the first mobile phone that was for practical use. Handsets that could bet used in a vehicle had been developed prior to Martin Cooper's phone, but his was the first usable truly portable mobile telephone. Cooper made mobile phone history in April 1973 when he made the first ever call on a handheld mobile phone
LANDMARK IN MOBILE PHONE HISTORY
MODERN MOBILE PHONES
Mobile telephony developed on lieaps and bounds over the next decade, particularly with the arrival of handover technology. This allowed users to keep their connections as they travelled between base stations- so as a user walked from one mobile phones mast to another, the conversation woul not drop or be interrupted.
The birth of the Second Generation (2G) mobile phones was in Finland in 1993. It was also the year that the first SMS text messages were sent and that data services began to appear on mobile phones.
Mobiles that we use today are 3g mobiles or third generation mobiles. 3G launched in 2001 and allowed operators to offer a huge range of advanced services such as video calling and HSPA data transmission.
Now the UK market has matured there are several network providers competing for business. These include:
Although most of us feel like we couldn't live without our mobile phones, they've not really been in existence for long. In fact, mobile phones as we know them today have only been around in the last 10 to 15 years.
THE FIRST MOBILE PHONES
Mobile phones particularly the smatrphones that have become our inseperable companions today, are relatively new. However, the origin of the mobile phone goes bakck to 1908 when a US Patent was issued in Kentucky for a wireless telephone.
The story of the modern mobile phone really begins in the 1940s when engineers working at AT&T developed cells for mobile phone based stations.
The very first mobile phones were not really mobilephones at all. They were two- way radios that allowed people like taxi drivers and emergency services to communicate. Instead of relying on base stations with seo=perate cells (and the signal being passed from one cell to another), the first mobile phone netwroks are often referred to as 0G mobile phones, or Zero Generation mobile phones. Most phones roday rely on 3G or third-generation mobile technology.
THE DEVELOPMENT OF MOBILE PHONE TECHNOLOGY
A Motorola employee called Martin Cooper is widely considere to be a key player in the history of mobile phones, inventing the first mobile phone that was for practical use. Handsets that could bet used in a vehicle had been developed prior to Martin Cooper's phone, but his was the first usable truly portable mobile telephone. Cooper made mobile phone history in April 1973 when he made the first ever call on a handheld mobile phone
LANDMARK IN MOBILE PHONE HISTORY
- Japan became first country to have a city-wide commercial cellular mobile phone network in 1979
- The Nordic Mobile Telephone (NMT) system launched in Denmark, Norway, Sweden and finland in 1981.
- The next major step in mobile phone history was in the mid eighties with the First Generation (1G) filly automatic cellular networks were introduced.
- The first ever mobile phone to be approved by the FCC ( Federal Communications Commission) in the USA was the Motorola DynaTac in 1983.
MODERN MOBILE PHONES
Mobile telephony developed on lieaps and bounds over the next decade, particularly with the arrival of handover technology. This allowed users to keep their connections as they travelled between base stations- so as a user walked from one mobile phones mast to another, the conversation woul not drop or be interrupted.
The birth of the Second Generation (2G) mobile phones was in Finland in 1993. It was also the year that the first SMS text messages were sent and that data services began to appear on mobile phones.
Mobiles that we use today are 3g mobiles or third generation mobiles. 3G launched in 2001 and allowed operators to offer a huge range of advanced services such as video calling and HSPA data transmission.
Now the UK market has matured there are several network providers competing for business. These include:
- Three
- O2
- Orange
- Tesco Mobile
- T Mobile
- Virgin Mobile
- Vodafone
Subscribe to:
Posts (Atom)