Wednesday, 9 January 2013

TASK 2.5

Make a list of the different ways that Satya and Simon could:

a) send messages to tell their friends what they are doing
 
Satya and Simon colud send messages to their friends through:

Phone calls
Text messages (SMS) and (MMS)
Emails
Social networking e.g Facebook and Twitter
Blogs

b) take photos and display them for their friends

They could  post ohotos for their friends through

MMS
Attaching Emails
Upload to online album
Upload to social networking site
Upload to blog

 TASK 2.7
 
Use etask 2.7 to identify the features of a notebook that make it suitable for travellers
  • Light, robust and easily portable
  • Small 10 inch monitor
  • Large keyboard
  • Microphone and speakers
  • Wifi connection for the Internet
  • USB connection

TASK 2.8

Look at the ways of sending messages asnd photos/videos shown in Figure 2.3 Which of these could be carried out using a netbook

messages and photos/videos can be sent through Bluetooth; Usb cable; Flash memory card. With both the netbook and the phone.


TASK 2.9

Research the three main methods of transferring photos.


a) which can be used with standard mobile phones and basic digital cameras?

  • Bluetooth transfer to a PC
  • Transfer via a USB  cable
  • Phones with SD cards
b) which would provide the fastest transfer speed

There are not huge differences between the transferring methods because they
are all of high speed

c) which one should Satya and Simon use?

All methods are good for transfer because they are not huge differences of speed between them all
TASK 2.3 & 2.4

How could they have immediately recognised that the IPS website was the government's official site and the other wasn't

 http://www.passports-office.co.uk/
https://passports.ips.gov.uk   This is a site that is secured because it S at the end of the https while the first one isn't because it doesnt have the "S".

Why was the official passport site only fourth in the list? Why did the other sites, those trying to make money from the advice they give,get to the top of the list?

The reasons why the official passport office was fourth on the list is because they were not able to pay an amount that would allow them to be untop of the list. While the other sites paid the sum and allowed them to be untop
.

Carry out some research to find out how you can get a URL to the top of the list



It is an entire science to get to the top of the search results. Its known as Search Engine Optimization.
Google ranks websites based on the number of links. For example if 100,000 websites have a link to your URL and all those websites deal with "jewelry" this way or another - your website will be considered an authority and will be ranked high in search results for terms related to jewelry niche.

Thursday, 13 December 2012



Trip to PARIS with different methods of transport


Travel to Paris by Train

One of the most legendary capitals in Europe, Paris is a must-see, with its long traditions of history art and culture. Paris is one of the most popular & enduring tourist destinations in the world what is it about this city that appeals to us all? It is the beauty of a city with more parks, gardens & squares than any other in Europe? 
Could it be those romantic bridges over the Seinr that street lamps reflected in the ancient river?                        


From an average of £79,50 per person
                                                    Tuesday 11 Decemeber 2012            DURATION 2h37m  
 Google MapOUTBOUND
      Departing 05:40 London st Pancras
      Arriving 09:17   Paris Nord

                                                    Wednesday 12 December 2012         DURATION 2h36m
Return_arrowINBOUND
     Departing 16:13 Paris Nord
     Arriving    17:39 London st Pancras






 Travel By Ferry

Image depicting Brittany Ferries Homepage From an average of  £358 per person

                                                   Tuesday 11 December  2012                  DURATION 6h45m
    Google Map OUTBOUND
          Departing  08:15 Portsmouth
           Arriving   15:00 Caen
                     

                                                    Wednesday 12 December 2012             DURATION6h45m        
Return_arrowINBOUND
     Departing 16:30 Caen
     Arriving    21:15 Portsmouth
 https://www.brittany-ferries.co.uk/303?st=f2







Travel by Coach

From an average of £52 per person + 2 nights in Les Etangs de Corot Hotel in paris for only £157

Monday 17 December 2012           DURATION 8h30m


Google MapOUTBOUND
     Departing 08:00 London Victoria coach station
     Arriving   16:30  Paris ( Gallieni) France



                                                     Wednesday 19 December 2012              DURATION 7h
Return_arrowINBOUND
     Departing 08:30 Paris (Gallieni) France
     Arriving    15:30 London Victoria coach station
http://www.eurolines.co.uk/




Travel by plane


Travel from London to Paris only with £165 with maximum guarantee of being treated well with the highest attention of the staff and the best products you could ever be served with.

                                              Monday 17 December 2012               DURATION 2h20m  

OUTBOUND FLIGHT
    Departure 18:40 London
    Arriving 20:50 Paris Charles de Gaulle


                                           Wednesday 19 December 2012               DURATION 10m

 INBOUND FLIGHT
     Departure  21:50 Paris Charles de Gaullr
             Arriving     22:00 London
http://www.easyjet.com/EN/Booking.mvc





Travel to Paris with EASYJET  and you would never regret it with only £105

                                           Monday 17 December 2012                DURATION 2h20m


OUTBOUND FLIGHT
 Departure 18:50 London Luton
          Arriving    21:10 Paris Charles de Gaulle

            
                                            Wednesday 17 December 2012              DURATION  15m     

 

INBOUND FLIGHT
Departure 10:05 Paris Charles de Gaulle
         Arriving   10:20 London Luton
http://www.easyjet.com/EN/Booking.mvc
 






    

Thursday, 15 November 2012

INTERNET AND IT'S SAFETY
The internet is a global network connecting millions of computers. More than 100 countries are linked into exchanges of data, news and opinions. Accoding to Internet World Stats, as of December 31,2011 there was estimated 2,267,233,742 internet users worldwide. This represents 32.7% of the world's population.

This are problems you might have when using the internet:
VIRUS:
A computer virus is a program or piece of code that is loaded onto your computer without your knowlede and runs against you wishes. Viruses can also replicate themselves. All computer viruses are man-made. a simple virus that can make a copy of itself over and over again is relatively easy to produce. Even such a simple virus is dangerous because it will quickly use all avaible memory and bring the systemto a halt. An even more dangerous type of virus is one capable of transmitting itself across netwrok and bypassing security systems.
Viruses can get on to your computer through
  • Visiting certain websites
  • Opening emails downloading attachements or content from the Internet
  • using infected protable storage devices such as memory sticks, CDs, DVDs
  • Connecting to an infected hard disk.
SPYWARE:
A Spyware is any software that covertly gathers user information through the user's Internet connection without his or her knowledge, usually for advertising purposes. Spyware applications are typically bundled as a hidden component of freeware or shareware programs that can be download from the internet howeve it should be noted that the majority of shareware and freeware applications do not come with spyware. Once installed, the spyware  monitors user activity on the Internet and transmits that information in the background to someone else. Spyware can also gather information about e-mail addresses and even password and credit numbers.

COOKIES:
A cookie is a small file which stores information related to your internet activity and then reports this back to the website server.
Cookies are used legimately by website creators to enable websites to be customised for individual users.
For example, if you go on the BBC website, you can customise the hompage, and the next time you visit the site the layout will appear as you have set it.
However, cookies can ucause problems such as pop-ups being generated or details like passwords stored which could be used by hackers.

PHISHING:
The act of sending an e-mail to a user falsely claiming to be an established legitimate enterprise in an attempt to scam the user into surrendering private information that will be used for identity theft. The email directs the user to visit a Web site where they are asked to update personal information, such as passwords and credit card, social security, and bank account numbers, that the legitimate organization already has. The Web site, however, is bogus and set up only to steal the user information.

SPAM:
Spam is flooding the Internet with many copies of the same message, in an attempt to force the message on people who would not otherwise choose to receive it. Most spam is commercial advertising, often for dubious products, get-rich-quick schemes, or quasi-legal services. Spam costs the sender very little to send -- most of the costs are paid for by the recipient or the carriers rather than by the sender.

HACKERS:
It is important to keep the information that is stored on your computer secure. Hackers are people who try to get access to your computer withouth your permission in order to steal information which they could use for malicious or criminal purposes.
Using peer-to-peer software could increase the risk of hackers accessing data stored on your computer.

IDENTITY THEFT:
Identity Theft is a crime whereby criminals impersonate individuals, usually for financial gain. In todays;s society, you often neeg to reveal personal bits of information about yourself, such as social security numbers, a signature, name, address, phone numbers, and even banking and credit card information. If a thief is able to access this personal information, he or she can use it to commit fraud in  your name. With this information the thief could do things such as apply for loans or new credit card accounts. They can then request a billing address chnage and run up your existing credit card without you knowledge. They can also use counterfeit checks and debit cards, or authorize electronic transfer in your name, to wipe out your bank account.


This is a list of how we can protect ourselves from this risks:
  • Copyright
  • Patents
  • Trade Marks
  • Other protection


  • COPYRIGHT:
    A Copyright protects the form of expression of a creator against copyin. literary, dramatic, musical and artistic works are included within the protection of U.S copyright law. The USPTO does not register copyrights, are the copyrights office does not.
    Copyright protection is  given to the authors of "original works of authorship, " including literary, dramatic, musical, artistic and certan other intellectual works. This protection is available for both published and unpublished works.
    The owner of copyright has the exclusive right to do and to authorize others to do the following:
    • Reproduce the work in copies or sound recordings.
    •  Make derivative works based upon the original.
    • Distribute copies or sound recordings of the original to the public by sales, rentals, leasing, lending or licensing.
    • Perform the original publicly: and that would include the use of digital audio.
    • Display the original publicly.

    PATENT:
    A patent is a set of exclusive rights granted by a government to an invento or applicant for a limited amount of time (normally 20 years from filing date). It is a legal document defining ownership of a particular area of new technology.
    Patents are Granted in over 150 countries and are predicted on the theory that inventors are more likely to invent and disclose that knowledge to the public in exchange for a limited period of exclusivity. the right granted by a patent excludes all other from making, using or selling an invention or products made by an invented process.

    TRADEMARK:
    Trademarks is a distinctive sign or indicator used by an individual, business organization, or ohter legal entity to identify for consumers that the products or services on or with wich the trademark appears orignate from a  unique source, designated for a specific market, and to distinguish its products or services from those of ohter entities.

    Wednesday, 14 November 2012

    FROM BRICK TO SLICK

    HISTORY OF MOBILE PHONES

    Vintage mobile phones                                         
    Although most of us feel like we couldn't live without our mobile phones, they've not really been in existence for long. In fact, mobile phones as we know them today have only been around in the last 10 to 15 years.

    THE FIRST MOBILE PHONES

    Mobile phones particularly the smatrphones that have become our inseperable companions today, are relatively new. However, the origin of the mobile phone goes bakck to 1908 when a US Patent was issued in Kentucky for a wireless telephone.
    The story of the modern mobile phone really begins in the 1940s when engineers working at AT&T developed cells for mobile phone based stations.
    The very first mobile phones were not really mobilephones at all. They were two- way radios that allowed people like taxi drivers and emergency services to communicate. Instead of relying on base stations with seo=perate cells (and the signal being passed from one cell to another), the first mobile phone netwroks are often referred to as 0G mobile phones, or Zero Generation mobile phones. Most phones roday rely on 3G or third-generation mobile technology.

    THE DEVELOPMENT OF MOBILE PHONE TECHNOLOGY

    A Motorola employee called Martin Cooper is widely considere to be a key player in the history of mobile phones, inventing the first mobile phone that was for practical use. Handsets that could bet used in a vehicle had been developed prior to Martin Cooper's phone, but his was the first usable truly portable mobile telephone. Cooper made mobile phone history in April 1973 when he made the first ever call on a handheld mobile phone

    

    LANDMARK IN MOBILE PHONE HISTORY

    • Japan became first country to have a city-wide commercial cellular mobile phone network in 1979
    • The Nordic Mobile Telephone (NMT) system launched in Denmark, Norway, Sweden and finland in 1981.
    • The next major step in mobile phone history was in the mid eighties with the First Generation (1G) filly automatic cellular networks were introduced.
    • The first ever mobile phone to be approved by the FCC ( Federal Communications Commission) in the USA was the Motorola DynaTac in 1983.

    MODERN MOBILE PHONES
    Mobile telephony developed on lieaps and bounds over the next decade, particularly with the arrival of handover technology. This allowed users to keep their connections as they travelled between base stations- so as a user walked from one mobile phones mast to another, the conversation woul not drop or be interrupted.
    The birth of the Second Generation (2G)  mobile phones was in Finland in 1993. It was also the year that the first SMS text messages were sent and that data services began to appear on mobile phones.
    Mobiles that we use today are 3g mobiles or third generation mobiles. 3G launched in 2001 and allowed operators to offer a huge range of advanced services such as video calling and HSPA data transmission.
    Now the UK market has matured there are several network providers competing for business. These include:
    • Three
    • O2
    • Orange
    • Tesco Mobile
    • T Mobile
    • Virgin Mobile
    • Vodafone