Wednesday, 17 June 2015

Unit 28 P5







The print screens above show my website working on the internet. I tested it to ensure that it worked along with the button functions.

This is my homepage. It contains a next and previous roll-over buttons which can be clicked on in order to navigate between pages.

This is my second page 'Page 2'. You can get to this page by either pressing next when on Page 1 or previous when on Page 3.

This is my final page. Page 3 can be reached by pressing next on when on Page 2. It has a Previous button so you can navigate away from it if you wish to.


Tuesday, 16 June 2015

Unit 28 M2

I created my website in Dreamweaver due to the fact that it is a simple and easy to use program. I was able to use tables in order to insert all of my images, buttons, text etc. into the program. Dreamweaver is simply a drag and drop style program therefore it was simple for me to add all of my pictures and text and i was not required to have knowledge of the coding or use it.

I used fireworks to create the buttons for my website. I did this because fireworks enables simple and easy use in order to create a befitting shape, font and sized button. I used the bevel tool on my buttons in order to give them a more unique look. I used button-clicks in order to change the page using next and previous buttons. All of my buttons work as I expected them to.

I used a video in my website in order to further the understanding of the viewer. I feel this made it a more enjoyable experience for the viewer, making it more practical. I feel it also helped with user interaction with the use of the video.

Wednesday, 10 June 2015

Unit 28 P2



Unit 28 P3


This is the information that Amazon provides us to inform us how they secure our data that we give them.



They ahve also provided their policies that are in place to ensure that your information is secured and safe. 

P1 M1 D1




Unit 28 P1 – M1 – D1 





This is a simple diagram giving a brief explanation as to how some features of the internet require the use of other features in order for it to work. It only shows the features critical to internet usage and how we as internet users connect to them.

I.S.P
I.S.P (Internet Service Provider) is a form of business. This is undertaken by companies such as Sky, BT (British Telecoms) or Virgin. They provide us with the means to access the internet and is only directly connecting clients specific to their business that have paid in order to use their service. Traditionally, they are connected through copper wiring but with advancing technologies, they are able to connect them wirelessly or through fibre-optic cable installation. Differing businesses in the internet service providing sector may be not-for-profit companies or organisations such as local councils or profiting businesses such turds as TalkTalk.

Domain Structure
A Domain Structure is a group of computers that maintain its own security. It does this through account management on a more local-leve turds l (such as the primary domain control). All local accounts require login interfaces which are completed through domains, which have their own servers. These are provided for local logins such as social media sites.

Web Hosting Service

This allows for individuals or businesses to create and use their own websites through the internet. All web-hosting companies allocate a certain amount of space on their servers that has been owned or rented out for use by the clients in conjunction with providing internet connections. This is called a ‘Data Centre’. Web hosts are also inclined to provide a ‘Data Space’ and connectivity for other devices such as mobiles that are located in the data Centre so that they can maintain a day to day running of the website if it were required. 

Domain Name Registrars
The Domain Name Registrar is an organisation that manages the reservation of internet domain names. A domain name registrar must have been authorised by a turd high-level domain registry agency. The management must be done in accordance with set guidelines of the designated domain registries and in order to offer such services to the public as well as in a combination of online laws and laws in the country in which it originates.

Mail Clients
Mail Clients is a computerised programme that is specifically used for accessing the specified users email account and allows them to manage their email inbox. Clients can refer to all systems that are capable of handling the specified users email, regardless of the mail user agent, manual typing or a relaying server. Through the web application that provides message management, composition and reception functions. This is often considered an ‘email-client’ but is more commonly referred to as webmail. An example of such a service would be Gmail.

World Wide Web
The World Wide Web is a system of linked hypertext documentation that are accessible through the use of the internet. Through a browser such as Bing or Firefox an individual can view web pages that can contain text, videos and images. Other web pages can contain multi-media and individuals can navigate between web pages through hyperlinks.

COMPONENTS

Hardware
Web browsers are more commonly known as just browsers. These are software applications that gain access to information and resources through the Worldwide Web. Information sources will be identified as a URI (Uniform Resource Identifier) and this could be a webpage, image, video, text or any other piece of information content accessible through the internet. Hyperlinks are also presented into resource s and can enable users to navigate through their selected browsers and online resources. A web browser can also be defined as a programme (or programmes) that have been designed to enable easy access for the user to send, receive and view online information or any other resource that may come from the internet. These can be things such as user-friendly interfaces that are simple and easy to use, such as Google chrome.

Web Server
Web servers can also be refined as hardware on a computer or software application on a computer. These help to deliver web content from the internet to the user and it can be accessed via the internet. The most common usage of web servers are websites such as Facebook and Twitter. Other webs servers offer similar to websites are gaming sites and data storage sites such as Apple iCloud. The primary function of web servers is to ensure that websites are delivered on request by the user through the HTTP. This would ensure the delivery of the HTML documentation along with any additional documents and content that should be included. These may be images or other such content produced by the webpage.

Blogs
Blogs are information/opinion based websites or informative sites that allow published information onto the internet. These documents consist of entries and posts (Blogs). These are posted in a usual chronological order with the latest post being at the top and the most dated post being at the bottom. This ensures that the discussion can continue without having to pass all previous posts to view the latest one. Around 2009, ‘Multi-Author-Blogs’ (MAB’s) became popular with more and more people using blogging sites and interacting in online conversations. MAB’s began as a ‘think tank’ idea in which people were able to interact with each other and discuss certain subjects. The rise of social networking sites such as Facebook helped to migrate the MAB and social media bloggers into societal mainstreams in which they could intertwine the two groups into one larger, more progressive ‘online biography’ of opinions and factual data.

Web 2.0
Created in 1999; this was a way of describing next generation websites. However, it does suggest an updates version of the Worldwide Web; this is a common misconception and does not refer to an ‘updated’ Worldwide Web. A web 2.0 allows users to interact with others, collaborating in social networking sites and blogging sites.

Online Applications
Web Applications or Online Applications that are accessed by the user through networks (the internet). Web Applications can also mean a form of computing software that has been coded through the use of a web browser supported programme language. These kinds of programmes are similar to JavaScript. These are them joined with browser-rendering software such as HTML. The majority of such software is interactive and allows users to message each other, leave comments, through blogs or spaces around a certain page. This interactivity is what distinguishes the application from other more static websites. Blogging can also be seen as a form of social media networking. Most blogs provide insight and commentary into a certain subject or point of interest. Other functions provided could be online journals, brand advertising or a newsletter format.

Protocols
Internet protocols or IP addressing are the universally understood and used form of addressing IP networks. These layered-by-networking addresses are unique from other forms of network interfacing serving as the mechanics in which data is routed into the corresponding network base on the internet. There requirement to find the correct device through the network will ensure a correct operational function.

Cloud Computing
Cloud computing is the use of a computer resource or hardware device (or both) for use of hardware and software that delivers services over networks such as the internet. The name originates in the use of a Cloud-like symbol in oppose to the abstract and complex infrastructure that is contained within the system diagram. Cloud computing inlays trust into ANY remote service with the user’s software and data. Access to cloud based applications through web servers or lightweight desktops (mobile applications) while business applications and users data are stored on cloud servers at remote locations. This is similar to the use of X-box 360 cloud storage that allows users to view their account details anywhere.

Simple Mail Transfer Protocol
Known as S.M.T.P for short is a protocol for sending e-mails between servers. Most e-mailing systems will use SMTP in order to send e-mails from one server to another because messages cannot be received properly without the e-mail client using P.O.P (Post Office Protocol) or using I.M.A.P (Internet Messaging Access Protocol) - in addition, S.M.T.P is more commonly used in order to send messages from the client into an e-mail server. This is (theoretically) why specifying the P.O.P or the I.M.A.P servers are not a necessity as the SMTP is configured in the e-mail set up in order to work effectively.

HTTPS
(Hypertext Transfer Protocol secure) is the communications protocol for a secure communication on a computing network. These are especially used for a wider deployment basis on the internet. Technically speaking, in itself it is not actually a protocol but rather a result of layering a HTTP on top of an SSL (Secure Socket Layer) protocol, therefore adding secure capabilities of the SSL to the HTTPS. Through its popular deployment onto the internet and the Worldwide Web, HTTPS provide web authentication and authenticates its associated web server that it is communicating with, protecting it against middle-man attacks. In addition to this, it provides a bi-directional encryption of communication between the client and the server, protecting it against eavesdropping and forged content in communication. In reality, it is providing a reasonable guarantee that the client is communicating with the authentic web server that it is intended to communicate with, eliminating the threat of forged or hostile web servers contacting the client when attempting to contact the authentic web server. It also ensures that the content of communication between the two is private and cannot be intercepted by third parties.

IP/TCP
(Internet Protocol/Short Transmission Protocol) are the basis of communications protocols used to connect hosts onto the internet. IP/TCP uses several protocols in in order to communicate with the hosts and the internet. IP/TCP is built into the UNIX operating system which is used by the internet. This in essence, has made it the De Facto standard for transmitting data through networks. Even network operational systems use their own protocols such as Netware but also support IP/TCP. This factor is what makes this a very decisive protocol.




milney95.blogspot.com/2013/04/
unit-28-p1-m1-d1.html

Friday, 8 May 2015

Evaluation - Renisa Kanadi

  • Is it fit for purpose? Explain why.
    I think that Lee Kennedy's work is defiantly fit for purpose. His use of words and images ensure that the ideals of how to get the perfect golf swing and understood to an indefinite manner. To add to this, his use of animation within the movie also add to effect and add a greater sense of understanding than I initially thought. 

     Are the media elements appropriate? Give reasons.
    I find all the media elements to be of a good standard and appropriate for the movie Lee has made. The way that he has used images along with his video are to the finest standard. 

    Does it work without errors or broken links? Screenshot any problems.
    There are no issues with Lee's movie. 

    Is it professional? Explain why.
    The movie is very professional. The font is befitting and uses the images to it's advantage, ensuring for a professional look and feel. 

    Give at least 5 amendments you think the designer should make.
    -Use correct grammar and spelling
    -Increase the size of the opening text
    -Add sound
    -Use animation
    -Use high quality images


    Renisa Kanadia

Friday, 13 March 2015

P3

When pieces of media are created, it is imperative that design laws are abided with and kept between. These laws include copyright and plagiarism. Plagiarism is where a piece of existing work has been copied without the permission of its creator or owner. Copyright would give the needed permission to the person wishing to use it from the works original owner.

In my guide, I have used multiple pictures from Google images. The images have been given to Google for the use of the general public. These images have originally come from other websites that have again given Google the permission to source them for use. However, I have sourced them below as they are not my property so I must show where I have used the images from.

https://www.google.co.uk/search?q=titleist&safe=strict&biw=1440&bih=799&source=lnms&tbm=isch&sa=X&ei=LbwCVYijBYHW7Qat6IHwAg&ved=0CAYQ_AUoAQ&dpr=1#safe=strict&tbm=isch&q=golf+swing


I have used a chunk of text from (
www.wikihow.com › ... › Golf › Golf Swing Instructions) in order to put into words the types of golf swing that are typically used. Because the information is in Wikipedia, I do not have to ask for permission to use it.

I also used pictures from the Titleist website (the golf ball). http://www.titleist.co.uk/ .I used this because it is relevant to the information that I have on screen and it is relevant to my work and I have sourced where I have used the picture from as it is not my image. Also, as I am using the image for educational purposes and will not make any financial gain from it, I do not need to seek the owner’s permission for use.

Friday, 6 February 2015

M1






I have added buttons onto each slide that would allow the user to switch between them. I have changed the font in the last slide to make it more understandable. Also, when changing slides i am going to add some form of sound effect.