Thursday, 4 July 2013

Sending a contact from one device to another

You can do this by-
Sending the details through email/texts/messaging
Using Bluetooth to send contact details
Write the details down for the other person to insert themselves
Telling the person the details
Using a memory card or USB stick to transfer data

Protocols

Protocols are simple rules and scripts that are created to run certain tasks.  For example, texting, photo sharing/uploading, Facebook messaging, phone calling and internet searching, these tasks are triggered/started/performed by protocols.

Thursday, 13 June 2013

How the Delivery Company Should Spend his Money

The head of the delivery company should sue the money to buy a phone that can be used hands-free so the drivers can use it on the road without breaking the law and/or causing any accidents.  I suggest an IPhone or any touch-screen phone with a relatively large screen, loudspeaker OR the capability to connect to a special earpiece used for talking on the phone to the phone using bluetooth.
This will make the business more efficient because it means the drivers can contact anyone they need to at any time, in case there is a change of delivery (e.g. the customer doesn't want it, the item was wrong or damaged or the customer wants to change the order) or in an emergency (e.g. accidents, weather)

Main Differences between Bluetooth WiFi 3G and Infrared

Bluetooth is a system that phones use to send files to other phones.  Much like Streetpass/Spotpass on the 3DS, if you have bluetooth turned on on your phone and another person has bluetooth on on their phone and is close enough to you, you can send them files wirelessly without the use of the internet.

WiFi means Wireless Fidelity, and it is where a wireless internet connection is emitted from a box that is connected to the internet by broadband.  People can use the WiFi by connecting to it using a password (but in some cases, none is needed)

3G is similar to Bluetooth, except that it connects to the internet rather than to other phones.  It works mainly on IPads and Ipods and other Apple products.

Infrared is used in TV remotes and other controllers.  The TV/Console sends signals to the remote/controller and then they send commands back, to change channel or to make Kitana unleash a Fatality on Sub-Zero.

P4

The photographer could either use his WiFi to send his images to the computer by exchanging email addresses with whoever is printing the newspaper through email so they can put it in the newspaper, or he could use his phone by exchanging phone numbers so he can send/text the other person the image (or he could use a bluetooth function to send images to them)

How Protocols Protect Data

They protect data by-
Installing anti-virus software
Making password-protected software
Asking you for secret details (e.g. an answer to a question only you know) to help keep data safe
Easily available contact details in case any problems arise
Contacting linked accounts to let you know if any suspicious activity has been going on in your account without your consent
Notifying various services in case any problems do arise (e.g. administrators)


Thursday, 16 May 2013

Impacts of mobile communication devices

Mobile communications could have an impact on one socially because it means people can contact long-lost relatives or friends/relations who live far away easily, however it can also cause accidents if you use them while driving or if you're about to cross the road but you're concentrating on your phone.  Also phones can be used to illegally download files and apps have been created so you can download youtube videos for free.  This could end the phone user in jail or with a heavy fine to pay.  Phones and laptops can also cause people to become unsocial or unhealthy as they would spend more time on their technology and less time outside, doing exercise.

Thursday, 28 February 2013

Safety Issues and Precautions to take on blogsites

Common safety issues on blog sites and how to prevent them-


  • Identity fraud, stealing and hacking- Don't give anyone your password, make it complicated with mixed numbers and letters and make sure only you know it and can remember it
  • Pedophilia, rape, kidnappings and any other crime- Don't give anyone you don't know your address or agree to meet anyone.  Don't accept friend requests of people who don't know, and if you do agree to meet someone you've met on the internet, make sure you arrange it so you meet in a public place with lots of people, and take a friend or two with you.  Avoid subways, train stations, dark alleyways and white vans.  Also, don't tell anyone your age unless you're sure you're older than the person.  (Don't always believe the person's age when they tell you)
  • Spam and viruses- Don't give your email to shady looking email addresses, e.g. company emails or emails suggested from ads or websites that claim that you'll win a free IPad! Don't sign up to anything you're unsure about, and don't download anything until you've done a virus scan or it's from a trusted source (e.g. DeviantArt, Mediafire).  Make sure you've got a firewall set up and any other virus protection systems (Careful-some programs that claim they're virus protection programs are actually viruses themselves)

Thursday, 7 February 2013

Threats and Risks of IT Based Communications in a Large Company

Risks + Threats-


  • Viruses can destroy work, leak it onto the internet and into other companies' databases
  • Viruses can also infect millions of pounds worth of equipment and render it worthless
  • People can hack into the computers and steal information (and download viruses)
  • Wastes a lot of money on electricity
  • Equipment is expensive
  • Internet connections are very expensive
  • Equipment can be stolen
  • Can be a distraction to workers
  • Repairs to broken equipment is expensive
  • Workers can use the net anonymously- cyber bullying and Phishing can take place between workers without them being identified

Thursday, 24 January 2013

Blog Sites in a Large Company


Blog sites-An Effective Means of Communication in a Large Company
The reason that a blog site is an effective in a large company is because no one will ever know the faces of every single person in one company, so a blogging site would help employees check on other’s work and help them get to know and remember one another.  Also, it would help the boss and whoever’s at the top of the company check their employer’s work and set them tasks without having to go and talk to them, send someone else to talk to them or waste paper sending them a message through another person.  It’s quick and easy, so they don’t have to waste time finding a worker’s phone number or spend an hour searching for them in a building packed with people you only barely know.  Also, on Blogspot, you can choose who views and comment on your work so that people from rival companies can’t steal your ideas, however, people in your company (or another) might be able to hack into your account, steal your work and claim it as theirs.