Search This Blog

Tuesday, June 4, 2013

Topic 5

Most people using social networks don't realise the mark they make when creating new posts or uploading new pictures. For those you who don't know, did you know that when companies do background searches on you they don't only search your police records but they also check every social imprint you leave on the internet which means they check all your Facebook pictures, all your posts and comments on every social network you own to research your characteristics, and don't get angry because this is legal! so next time you post something or upload a vulgar picture , remember that this picture will be viewed by your future employer. So just keep it clean and avoid posting pictures that could harm your future!

Topic 4

 
 
Ever wondered what ecommerce is? well I have found a perfect diagram to explain.
 
 
 
1.A consumer visits your website and uses your online store to make a purchase. The transaction is conducted over a secure connection (SSL) to your web hosting server.
2.Payment Processing Gateway handles the secure, real time encrypted credit card information and co-ordinates the transaction
3.Merchant account processes the movement of funds
4.Funds are debited from the consumers credit card account
5.Funds are deposited into your designated bank account
 
Author: Paul Ciszewski (2013-06-04). How eCommerce Works. http://www.findmyhosting.com/how-ecommerce-works/


Sunday, June 2, 2013

Topic 1


1. Learning through the internet is so much simpler. The E-Learning route is provided by colleges and allows you to apply to an online college which will then provide all study material, Lectures and exams all at the comfort of your PC.

 Creative commons license is a license that allows companies or individuals to grant copyright permissions to their work these common license practices should be introduced into training institutions to give an advantage to young entrepreneurs once finished with their training.

Here are 5 suggestions training institutions could incorporate this practice.

1.Training institutions could incorporate them into their modules as a single module that would be compulsory to every field of study in their institution.

2.Institutions could offer workshops on the Common License practice to educate their students

3. Institutions could also offer it as a completely different course that is paid for separately by students at their own will.

4.Institutions could offer the course independently as a primary learning objective to their institution.
5. Institutions could offer part time courses on the subject that would not be compulsory but would also be free to students which would attract them

Topic 1
2. I visted the Microsft Learning Website And i came across 5 Improvements they could make:

1.Improve the layout of the website. The original layout is too boring
2. They should add more tabs to let the visitor understand what the site is about
3.They should provide links for each country instead of having a preferances form that people have to fill out
4.They need to provide a list of courses that students can be attracted to from the home page
5. They need to provide a link that shows testimonials that would encourage students

Visited on 14/06/2013 from: http://www.microsoft.com/learning/en/us/default.aspx

Topic 3

Most of you know how important it is to back up all information stored on your computer, but for those of you who don't let me explain why this is crucial.

Everything on your computer is at risk think of your computer as a vulnerable little girl walking down a dark alley when you're on the internet anything can happen. There are thieves and rapist that could assault this little girl and these thieves are called viruses. These viruses are not human neither are you able to see them but they do creep up into your computer and no these viruses will not rape you but they will take over your hard-drive and clean everything on it which means every program, every picture and every important document you had saved could be wiped out, You must be saying aah well I have that software that prevents things like that, well I'm telling you these hard drive munching monsters mutate every second and can beat your current anti-virus so to prevent all this heart breaking news you need to back up all your important information!

There's a lot of ways of backing up your hard drive.
1. Buy an external hard drive and every now and then store your work onto it and leave it unplugged from your PC.
2. Most Anti Virus companies offer a sky drive type system this means you can store all your information on a virtual hard drive its not in the sky so don't go outside looking for it but it is out there and its perfectly safe from the mean viruses.

These are the two main ways of backing up your hard drive if you need any help just drop a post or use a respective search engine to find many ways of backing up your hard drive.

So back your hard drive people because you never know what vulgar viruses could infect your precious computer. 

Topic 2

Hay bloggers most of you reading this wouldn't understand how important is to reference online material for whatever project you're doing, so in this post il tell you about in text referencing online material. Firstly the most basic format is like this: Author Last, First Initial. (Year of Publication). Article title. Journal Title, volume #(issue number), start page-end page. Retrieved from URL.

Most of the time this information is located at the bottom of the article if all the information isn't provided then put as much information you can find in this format

 Provided by: Publication Manual of the American Psychological Association, 6th edition  and the APA Style for Electronic Sources (2008) From http://lib.trinity.edu/research/citing/apaelectronicsources.pdf

Saturday, May 4, 2013

1.8

Would I use twitter as a credible source of information? My answer is NO! Twitter is a social network site that anyone can comment on there is no credibility to it and a credible source is information that is factual and true and can be backed up by research, which means Twitter is just random comments from un-credible sources from around the world there is nothing credible about "comments" is there?. Would any of you use Twitter as a credible source of information? Comment your views.

1.7

I just visited this site http://www.facebook.com/about/privacy/minors it talks about the priority of minors on Facebook and what Facebook is doing to protect these minors and from what I've read I can see Facebook has done everything they can to secure Facebook for minors it is really the parents of these minors that have to be controlled. Check this site out and post your views tell me what you think.