You have been asked to write an advert for a job in the IT industry. Choose a specific job ( perhaps from P2) and write an advert that could be used on job websites or in newspapers.You should include detailed descriptions of the characteristics required for this job. Refer to your work from P1 for help. Make sure that you cover job-related and general attributes and attitudes.
Wednesday, 24 October 2012
Unit 2: Task 3: P3
P3
You have been asked to write an advert for a job in the IT industry. Choose a specific job ( perhaps from P2) and write an advert that could be used on job websites or in newspapers.You should include detailed descriptions of the characteristics required for this job. Refer to your work from P1 for help. Make sure that you cover job-related and general attributes and attitudes.
You have been asked to write an advert for a job in the IT industry. Choose a specific job ( perhaps from P2) and write an advert that could be used on job websites or in newspapers.You should include detailed descriptions of the characteristics required for this job. Refer to your work from P1 for help. Make sure that you cover job-related and general attributes and attitudes.
Tuesday, 16 October 2012
Unit 14: Task 1: D2
D2
Justify the protocol transmission type you used. Ensure you find positive and negative aspects for the protocol and suggest a second way you could have sent the contact.
Talisha:
Larissa clicked on her contacts and then onto a specific contact name i.e Talisha; then held down on the contact and clicked 'send contact as V card as Talisha has a HTC Phone, once that had appeared she clicked 'send contact_mail'. Once that's done the email showed up with the contact attached once done filling in wanted details she sent them. Once it had been sent to Gmail it appeared with a sent email addressed to 09southt@gmail.com having the email and attached contact file, Also this was sent directly from an Iphone so at the end of the Email it mentions Sent from Larissa's Iphone.
The positive aspects for this way of sending a contact this:
It is cheaper for the user due to it being free to send via email.
You are able to send more than 1 contact at a time or individually.
Very fast in sending files in large quantities.
The negative aspect for this way of sending is:
Some people are not in possession of the device or email address.
Sometimes there are issues with the device not receiving the files.
Another way you could have sent this was by sending them directly from an email via computer to another computer so they are able to access it easier.
Monday, 15 October 2012
Unit 14: M3 + P6
What mechanisms have been put in place to prevent or control
the implications described for P6? P6:-The Legal issues that involve using a
mobile technology device are as follows:
1. Many people use their phones whilst they are driving,
this can put points on peoples licences or much worse and cause a collision
whilst on the road. (This can be sorted if the driver uses a hands free or
Bluetooth)
2. Some people get there phones stolen, theft is a great
issue in the legal department.
3. If your phone is stolen and you don't have a pass code or
security then someone can easily delete all of your details, also you can lose
all of your contacts if you don't back your phone up.
4. Also the greatest legal issue is illegal downloading as
many people are able to use their phones like a computer so they can easily
download anything.
These are just a few of the legal issues that are due to
mobile technology.
M3
They have controlled the first issue I mentioned of texting
or calling whilst inside a vehicle that is currently moving, this causes a
great threat not only to those in the vehicle but to those that are near the
vehicle. Many parents take the initiative to pull over in some cases to answer
their phones so that they keep others as well as themselves safe. Also major
companies have created built in Bluetooth into cars so that you don't have to
answer and are able to talk without worry of crashing. There is also hands free
headsets that are like headphones except you can interact with them and your
safety is still ensured.
The issue of stolen phones has been drastically controlled
as companies like Apple have an app that can help located your stolen or
misplaced phone. This helps create less of an issue for legal departments.
Many new phones have pass codes and can allow their contacts
to sync with Gmail and many others this way your phones information has been
backed up and secured so there isn't a great threat with syncing your contacts
and having a pass code.
The issue with illegal downloading is slowly being resolved
by deleting and banning certain website that allow you to download illegal
material. Those who oppose this are taken to court as well as fined.
These are some of the ways that mechanisms have been used to
help prevent and control issue that you may face.
Wednesday, 10 October 2012
Monday, 8 October 2012
Unit 14: Task 1: D1 + P2
D1 + P2
Evaluate the effectiveness of the features described in P2.
Learners should compare similar features on a range of
devices and present conclusions in a clear and logical manner.
Ensure you find positives and negatives for each feature.
P2:-
I recommend students these types of phones as they have
complete access to the internet as well as many other features that can benefit
any student.
This phone known as the HTC Sensation XL has many valuable
and liable features e.g.
1- Connectivity this meaning being able to connect with any
internet Wi-Fi near the phone or in range of the box.
- Blue tooth being that you are able to send information to
another phone or console for example an Ipad or computer depending on where it
needs to go.
–Stereo Bluetooth
4- Wi-Fi this is what the students needed access to the
internet via the phone.
5- 3G
6- Email capability this meaning you are able to access emails
safely and properly without worry or troubles.
7- Recommended for businesses this meaning business can
benefit from them so then students are able to.
I would recommend this laptop to a self-employed builder who
is new to technology this certain laptop as it is easy to understand and
control.
Toshiba Satellite C660-1G2 15.6-Inch Laptop will be of great
use to the self-employed as it’s easy use and he would be able to make use of
this even though he is a builder as it has:-
1- Wi-Fi support meaning that it is welcome to any Wi-Fi
type for example BT.
2- Cost is only £499.00 so it’s in his price range cheaper
than well-known others.
3- Micro-soft sites that allow you to make documents.
4- Security settings.
5- Wireless internet so you don’t need cables.
6- Connects to printers so you are able to print well.
For Journalist who needs an electronic tablet when on
location I would recommend this tablet the Samsung Galaxy as it has:-
1- Android Operating system.
2- Memory 1GB
3- Wi-Fi BT= 3.0
4- GPS
For a factory worker who wants to listen to an MP3 player on
the bus I would recommend this Mp3 player The IPod Nano as it has:-
1- 2GB of memory.
2- Holds over 100 songs.
3- Clickable buttons.
4- Only £40.00
5- Comes with apple head phones.
D1: The effectiveness of the HTC is extremely good as it
allows you to do a wide range of things and gather information ect for those
who are students. It is great for interaction with others and is more
accessible than other devices like Laptops and Computers. It has similar
features to mobile phones like IPhones and Galaxy phones but this is in a
better price range for a student and it has flawless software to access and is
reliable and helpful to anyone. It has everything a phone needs and more.
The effectiveness of the Toshiba Satellite Laptop is as good
as a Mac and Acer, it has all the best functions you could need and works
extremely well. I recommended this Laptop to a self-employed builder as it was
in his price range and functioned correctly to assist him with his work. It has
great Security software and has wireless as well as many other things. This is
very effective as he can take it where ever when he is on a job.
The effectiveness of the Samsung Galaxy Tablet is due to it
having everything a computer has except its portable. It is good for being used
by a student due to it being portable and is easy to use. It has good amount of
memory and can be used where ever due to it being used in any location with its
own hot spot for internet. Very effective as any other Samsung product and has
been very productive with holding data and completing basic things.
The effectiveness of the IPod Nano being used by a builder
is very good as it is a piece of new technology but works at a better and
faster rate. Easier to access and easily portable. It can hold more songs and
can be used whenever; it has a lot of battery life.
Wednesday, 3 October 2012
Unit 14: Task 3: M2
M2What are the main differences when comparing the two technologies described for P4? Think about the speed of the transmission, costs and coverage.
For P4 I had mentioned that the photographer would find it more easier using a phone rather than upgrading his laptop in order to send his photos to other electrical devices that are in his household was due to the differences in the devices. A phone has different applications and is easier to access rather than a laptop, also connecting to Wi-Fi is also a lot easier for phones to help send important information that can be sent straight to the other device rather than sending the images to the laptop to then send it to another device. The speed is a lot quicker when using a phone to send images and the transmission is a lot smoother as you don't have issues with losing connection and it is cheaper to afford and you pay half of what you would for a laptop in coverage. Also with a phone you can use the Protocol Bluetooth that helps send information easier and there is no risk of cookies.
Unit 14: Task 2: M1
How do Protocols keep data safe? This is
the answer we have all been looking for:-
Without Protocols your confidential financial
data and personal data can be easily hacked if the data is sent wrong, this can
also cause a huge hole in your firewall as they are vulnerable so that’s why we
like to keep files safe.
Also Protocols like passwords ensure that no-one can
access your personal data or hack your computer.
Data dissemination protocol safe establishes data delivery paths this makes data delivery safe to send and
securely be sent to the correct contact through an email.
A Protocol like
Security and Privacy is a very valuable aspect to keeping every document safe
this ensures that no one is able to steal any personal information like emails
and helps prevent the risk of being hacked.
There is no known protection for
Bluetooth sadly so it’s best to always turn it off if not being used.
Things like
Wi-Fi can easily be protected as if you lock any access to it only those with a
Product/Nework key for that specific router can use it. SMS messages are not
able to be kept safe.
Subscribe to:
Comments (Atom)





