Monday, 24 June 2013
unit 14 d2
The whole copying and pasting contact thing is very efficient because you can get it done in a very short amount of time and will not take very long at all. That is a good thing about this method but it does have its downsides. For example you cant be sure that your mobile can even copy and paste this as you probably can guess is going to mess it all up and most likely you will not be able to get the contact from one place to the other.
unit 14 m2
Google cloud storage is a bit slower than sending a picture message. But the Google cloud storage option is efficient
and has good quality. The picture message has a small amount of pixels used so the image is not very good quality. Also the picture message only sends quickly because it has a smaller burden to carry. it get a big picture and converts it into a smaller image with less pixels. The Google cloud storage just simply get the iage and places into file form which does not alter its quality.
and has good quality. The picture message has a small amount of pixels used so the image is not very good quality. Also the picture message only sends quickly because it has a smaller burden to carry. it get a big picture and converts it into a smaller image with less pixels. The Google cloud storage just simply get the iage and places into file form which does not alter its quality.
Monday, 17 June 2013
unit 14 m1
How do protocols and devices keep data safe?
How do protocols and devices keep data safe?
The way to keep your devices safe is very simple you just need to follow very simple steps and be careful what you do, for example you should change your password regularly so if in a case that you do get hacked or someone discovers your password, you will still be safe and they can not do as much damage as they would have done if they knew it permanently. Also be wary if you give out your vital information that no one is around that could use against you or you do not trust.(i would recommend not telling anyone at all.) Be careful when you access your email or whatever you need to keep safe make sure you log out because some websites will leave you logged in for the future but someone else could access it.
Most Wi-Fi hubs are encrypted so that you will not be hacked and your information will not get stolen or seen.(Encrypting is a way on concealing information to keep you safe.)
Monday, 10 June 2013
Unit 14 p.7
Some ways that you can send a number from 1 contact to another is that you can highlight the number that you want to send and it will say send to and you find the contact that you want to send the number to and click send.
Monday, 3 June 2013
unit 14 p.6
Social
You can be cyber bullied and hacked. Solution: you can get better software and not talk to people! only add your friends block the rest of the world.
If you use your phone all the time it can harm you(radiation and all that) Solution: don't use it all the time
legal
The law says that you can not be on your phone while you are driving, the police can now stop you on the
spot and fine you if they see you. Solution: get a app so it plays throw the stereo hands free
It is also illegal to have indecent pictures of younger people under 18. Solution: DON'T TAKE THE PICTURES
your phone can get stolen. Solution: Tell the police
You can be cyber bullied and hacked. Solution: you can get better software and not talk to people! only add your friends block the rest of the world.
If you use your phone all the time it can harm you(radiation and all that) Solution: don't use it all the time
legal
The law says that you can not be on your phone while you are driving, the police can now stop you on the
spot and fine you if they see you. Solution: get a app so it plays throw the stereo hands free
It is also illegal to have indecent pictures of younger people under 18. Solution: DON'T TAKE THE PICTURES
your phone can get stolen. Solution: Tell the police
Subscribe to:
Comments (Atom)