Thursday, 19 February 2015

BBT 9- Journal Entry #1: Computer Use Policy

        The role play my group did hacking and posting pictures without permission. My group choose this topic because it could be a real life situation and happen to anyone. My grouped worked very well together, we all got along. Another policy statement that I found interesting was the one about using other any instant messaging or chat sites. They can all lead to viruses on the school computers and not letting them not work.

Wednesday, 18 February 2015

BBT 9- Wed 2.0/Cloud Computing

Cloud Computing;
-Computing Power allows her to back everything up on to a data base computer and not worry about anything.
-You only have to pay for what you use.
-Your storage is unlimited, computers or business can grow without worry.

Cloud Computing-How it Works

-All your stored data is backed up into a huge Data Centres, they are located all over the world so you never know where your pictures are going to end up.
-Inside these Data Centres, there are huge rows of refrigerator size computers that are more powerful then your computer at home
-There are more then one Data Centre that your pictures are sent to so therefore you will never lose it.

Web 2.0-The Machine Is Using Us

-Hypertext can link virtually anywhere.
-Most early websites were written in HTML, HTML was designed to define the structure of the web document.
-As HTML expanded more elements were added like stylistic elements including <b> for bold and <i> for italics

This is a video of Tips & Tricks for the iPhone 6