Sunday, April 26, 2015

Graphics and Multimedia

Activity 1 10 mins

What makes the image above true?
What makes the image above false?
Is the above image true or fiction?

Activity 2 15 Mins
Select any one image from the link below and try to answer the following questions

  • What do you think was done to achieve that?
  • List down as many IT concepts and terms that may be necessary in this field of study.
  • What issues can arise from manipulating images as shown
  • What benefits or negatives arise by doing these?
Activity 3 10 Mins.
Read at least one article from the link below. Do you think image manipulation is blessing or a curse in print journalism. Support that with evidence from one article read.


Activity 4 10 mins
There must be a reason for manipulating the images in the link below. Describe the reason for any of the image examples shown below

Activity 5 10 Mins
Read the article " How fake images change or memory and behaviour"


Other resources

Saturday, April 18, 2015

Information Technology Systems (Work for Tuesday 21st 1st Lesson)

You have been assigned an IT system for your in-depth investigation and understanding. Obtained summary notes / relevant illustrations and post your findings in OneNote notebooks. Be prepared to present your findings

a) Describe how the IT System/technology works
b) Its application of the technology i.e where it used or can be used
b) It's impact to the stakeholders
c) Social/ethical issues arising from using the system
d) Some main problems arising from using the IT System and some possible solutions.

Husnah- NGI biometric system
Aliasger- Robotic Insects
Jhanvi- Vein Identification Systems
Joshua- Oculus Rift System
Ann- Smart Sneakers 
Paul- Virtual Reality System
Khaleel- Thumbnail Track pads
Barbara- SecuOS Trafficsanner system
Dinar- BluePoint Alert System
Ashiqa- Wocket Smart Wallet
Sharleen- Smart homes

Monday, April 13, 2015

Internet Notes

Use your notebook page in OneNote to post all your notes below.
  • Distinguish between IP address and Mac address
  • What are domain names and DNS?
  • Most websites will have Hyperlinks, Metags, tags. Describe each one of them.

Internet Website Tools.
Distinguish between the following tools as used in websites
  • Search engines
  • Keyword density
  • Keyword prominence
  • Page ranking
Social Networking
What is a social networking site?
What are the most common and recent social networking site?


https://www.youtube.com/watch?v=g9p1ji4EFLc

SEO -Search engine optimization
Search engine optimization is a methodology of strategies, techniques and tactics used to increase the amount of visitors to a website by obtaining a high-ranking placement in the search results page of a search engine

Web 1.0, Web 2.0, web 3.0 and Web 4.0 and web 5.0
Distinguish between each of the about briefly.
http://www.slideshare.net/mstrickland/the-evolution-of-web-30

http://flatworldbusiness.wordpress.com/flat-education/previously/web-1-0-vs-web-2-0-vs-web-3-0-a-bird-eye-on-the-definition/

http://www.slideshare.net/joh5700/web-40-and-beyond-18806151

Write short notes on the following;
 Define each term listed here: wikis, blogs, micro-blogs, RDF(resource description framework), RSS (really simple syndication) feeds, mashups, forums, social bookmarking, online collaborative applications, podcasts, photocasts, vidcasts, social networking sites, templates, tagging, viral marketing, webcasts, widgets, virtual worlds and learning environments.


Internet Services

- What are web database? Give examples of web database you know.
- Describe the different online marketing technologies available
- Describe what a content management system is. an examples is Moodle
- Distinguish with examples between push and pull technologies
- Describe the following E-commerce technologies; B2B, B2C and C2C
- Describe the different online payment services; e.g Paypall


Internet Security
 Internet security can be provided by using Firewalls, Proxy servers, Encryprions, and Digital signatures
  • Using diagrams explain how firewalls work
  • Describe the role of proxy server in the management of Internet security.
  • Describe what SSL is
  • What is encryption and how is Public key different from Private key encryption. Use diagrams where possible.
  •  Describe what digital signatures are and explain how they function.
  • Describe other internet security measures in place and describe how each of the works.
Internet Threat
Describe each of the internet threat below and suggest the several solutions with examples where possible for each of the threats.
  • Viruses
  • hackers
  • Phishing
  • Spaminng
  • Pharming
  • Spyware
  • Adware