Skip to main content

Home/ Globaltech/ Group items tagged video

Rss Feed Group items tagged

Jang Han

Are Facebook posts hurting your career? - 7 views

  •  
    How are Facebook posts hurting your career? Identify two types of posts that can hurt you.
  • ...4 more comments...
  •  
    Employment Internet
  •  
    May 23
  •  
    Cant watch the video
  •  
    can't watch either.
  •  
    try to find the video clip on the list below the site
  •  
    i can't either
anonymous

Google Declines To Remove Police Brutality Videos, Still Complies With 63% Of Gov't Tak... - 10 views

  • lethal to the YouTube brand
  • legitimate takedown requests
  • Transparency Report
  •  
    Explain the meaning of the following: -lethal to the YouTube brand -legitimate takedown requests -Transparency Report all oct 31 soo
  •  
    Q1. Explain the meaning of the following: - Lethal to the YouTube brand The Lethal to the YouTube brand means that making less valuable of YouTube site. They are forcing YouTube to erase videos, which makes brand YouTube will feel shameful of. - Legitimate takedown requests The Legitimate takedown requests are from government. The government asks to erase all the post that are illegal in YouTube. - Transparency report The Transparency report is showing that why government and other agencies are requesting YouTube to remove all the reports that are inappropriate.
anonymous

ITGS Project.m4v - YouTube - 4 views

  •  
    Video project from M12 after the IB exams. That's all.
Alex Lenk

BBC NEWS | Technology | Supermarket of the future - 2 views

  •  
    Jean October 10th  Describe the IT system by watching the video Answer here
  •  
    Basically just watch the video... ok lets start 1. The apps used in the supermarket needs to be downloaded by the clients before use. 2. Enter the store and open your apps from your mobile. 3. Pick the goods you want and scan the code off the bar code (using your cell phone) 4. The list of goods you buy will be store into your cell phone. 5. After scanning click the finish shopping button on your apps and the cell phone will generate a big bar-code which mix all the code you scan into one master-code. (like mixing salad after you put vegetables in) 6. Go to the paying counter and insert the master-code into the paying machine. 7. The machine will tell you how much to pay and client pay by cash, credit card and etc, Extra ( you can play stepping on fish in the supermarket for fun) Oh and there is a useless robot roaming around also.
anonymous

Bangkok Post : Easing the healthcare burden with technology - 3 views

  •  
    article analysis march 29 soo
  •  
    1. Identify the area of impact the scenario relates to. This article is related to Heath problems 2. Identify all the ITGS terminology and phrases (IT and Social/Ethical) Video conferencing system=A form of synchronous learning in which two or more locations are connected through live video to facilitate collaboration and information sharing, unified communications, Wi-Fi, Mobile IP, RFID, translator, smart phones, Telemedicine, electronic, portable camera 3. Describe one ITGS social/ethical concern in the article. Internet access and privacy problems, digital divide and internet access equality 4. Describe the relationship of the main stakeholders to the IT system. Main stakeholders : doctors, patients Doctors can now look at each patient over the system, without physically being there with their patient. What this basically means that it can input the symptoms of the patient through a computer, rather than writing it up on paper. The advantage of the system is that doctors and patients don't need to travel to each others' place just to get looked at, because it can all be done via video conferencing. 5. Explain the relationship between the IT system and the social/ethical issue identified in question 3. The issue of reliability is related to the IT System (software and internet) in which the software relies on the internet connection. Therefore, if the internet connection fails to work properly, the software would not be efficient, and thus not reliable. 6. Discuss at least one problem that relates to the impacts of the social/ethical issue. The major problem that will arise from the impact of the reliability concern are the patients' lives. The patients lives would be in danger if the doctor diagnoses the illness incorrectly, and prescribes medication incorrectly. Wrong doses of certain medical treatments would be a threat to the patients' lives. 7. Evaluate one solution that addresses the problem identified. A solution that has been done is
anonymous

Net Cetera - OnGuard Online - 0 views

  •  
    Read Heads-up. Describe two guidelines from each section that you think are relevant advice. May 9 kuni
  •  
    Share with care Your online actions can have real-world consequences. The pictures you post and the words and the words you write can affect the people in your life. Think before you post and share. The advice, mainly for children, is that before you click to send email or when you're ready to post or send a message or a photo, download a file, game or program, or shop for something-stop for a second. Think about things like: Do you know and trust who you're dealing with-or what you're sharing or downloading? How will you feel if your information ends up somewhere you didn't intend? Get someone's okay before you share photos or videos they're in. Online photo albums are great for storing and sharing pictures of special events, and camera phones make it easy to capture every moment. Stop and think about your own privacy-and other people's-before you share photos and videos online. It can be embarrassing, unfair and even unsafe to send or post photos and videos without getting permission from the people in them. Interact With Tact Avatars are people too. When you're playing a game or exploring an online world where you can create a character and interact with others, remember real people are behind those characters on the screen. Respect their feelings just INTERACT WITH TACT like you would in person. Remember that your character or avatar is a virtual version of you-what does it tell people about you and your interests? Speak up. If you see something inappropriate on a social networking site or in a game or chat room, let the website know and tell an adult you trust. Using Report Abuse links can help keep sites fun for everyone. The Protection Connection Learn about social mapping. Many mobile phones have GPS technology, and there are applications that allow you to find your friends-and allow them to find you. Use GPS and social mapping apps only with people you know personally and trust. Take advantage of privacy features in
anonymous

Mobile Cell Phone Number Tracking Tracing - YouTube - 9 views

  •  
    Describe one ITGS social/ethical concern. Describe one way of tracking by looking at the suggested videos on the right-hand side of the youtube page. test nov 28
anonymous

Funny money: Louis CK earns $1 million in 12 days with $5 video - 6 views

  •  
    Explain how DRM works and what Louis did. Ohm presentation nov 30 test dec 4
anonymous

Music Lessons on Webcams Grow in Popularity - NYTimes.com - 7 views

  •  
    Describe the technology. Explain the advantages and disadvantages. all jan 17 Tik
  •  
    - this technology is that the normal video communicate that by the internet to connect to each other. For example, Skype, or Facetime etc. Advantages and disadvantages. - The advantage is that when children want to learn some music but parents don't have time to drive them to the music school, they could have lessons at home which is easy to do. - The disadvantage is that we need many thing to learn via computer, for example, webcam or video camera, good quality speaker, good quality microphone etc.
anonymous

BBC News - Trendnet security cam flaw exposes video feeds on net - 6 views

  •  
    How was the system hacked? Describe possible solutions. all feb 13 hyojeon
  •  
    How was the system hacked? - Shodan search engine which specializes in finding online devices that could be used to discover cameras vulnerable to the flaw. - People set the camera with an own password, it video stream became accessible to anyone who typed in the correct net address. This consisted of the user's IP address followed by an identical sequence of 15 characters. The camera captures people password and IP address. This will invade camera users' privacy. Describe possible solutions. - The Trednet has to foster its network system and try to do their security system that they have to make new firmware and update which resolves the vulnerability of its cameras.
anonymous

'App Economy' credited with creating 466,000 jobs - latimes.com - 7 views

  •  
    Why is the app economy growing so quickly? List the kinds of jobs app companies create. all feb 13 Palm
  •  
    The Piracy Problem: How Broad? Why are copyright violations are a serious problem? Copyright violations are a serious problem because it is equivalent to stealing. A person who watches from free online movies doesn't realize that all the people behind the movie used their time, labor and energy to create that movie, not to mention the amount of money that was used to produce the movie. So, to broadcast it to as free movie is truly unfair for all the industries concerned. Describe two advantages and two issues with illegitimate downloading. Advantages: (1) People around the world who can't afford to have it have the option of having for free. (2) It is available anytime, anywhere in the world. Issues: (1) Million of dollars as revenues and earnings are stolen from industries (movie, music, TV, etc.). (2) It will cause the affected industries to increase the price of their "product" when purchasing it legitimately. Explain two possible solutions to this kind of piracy. Possible solutions: (1) If people around the world really see stealing as a morally corrupt practice, then let us all shun away from the use of the internet. (2) If we can't afford to avoid the disadvantages of the Internet, let us all practice, encourage and teach honesty. This golden virtue is the only potent cure against SOPA and PIPA. Not enough is being done to tackle cyberbullying, according to the NSPCC. Give examples of cyberbullying. Some examples of cyberbullying are the following: receiving nasty text messages or e-emails 24/7. Describe possible solutions. Some possible solutions are the following: students must not give their mobile number to acquaintances or other students who are their close friends; never chat to anyone whom you don't know; when you received nasty text messages from your mobile phone, change your mobile phone number right away; and lastly be very selective in choosing whom to friend in FB or in other social networks. Trendnet securit
anonymous

BBC News - Why going online on smartphones can be costly - 15 views

  •  
    Why might smart phones be costly? Explain two possible solutions. all Nov 23 Tik
  •  
    Smart phones could be costly because it's download, upload and connect to the network almost all the time. People that use smart phones and don't have good deals or promotions,and people use data more than they think, so the phone company can cost the data that we download, upload with the network, and smart phones can do many thing that use a lot of data and it will cost a lot of money, for example sending 10 photos it's take 10MBand watch video on youtube it will take 15MB per video, etc. In this case the solutions are that users should make sure that they get the right deal or promotion, that they won't get a big bill in the end of the month. Secondly, there are people that use unlimit promotion, but every deal have a gap, so the phone company should tell their customers, or send the users a messages to warning them that they used data more than the deal they got.
anonymous

How to Check if a Web Site Is Safe Video - 5min.com - 7 views

  •  
    Describe the steps for checking the safety of a site. All September 2 Tick
  •  
    - Always check the URL to see that where it take place is logic. - Use site: google.com/safebrowsing/diagnotis?site= then type the name of the site you want to go on after type =. - Use the site: hosts-file.net then type the name of the site you want to go on into the seach box, then it will show you hat is that site is safe. - Use safeweb.norton.com, then type the name of the site you want to go on into the seach box, then it will show you hat is that site is safe. - Also you can use unmaskparasites.com - If you use Mac os or ios you dan't have to care about it because you are safe.
anonymous

Remove Malware from Your Computer Video - 5min.com - 7 views

  •  
    Describe the steps for removing malware. All September 2 Champ
  •  
    - First, you must know that your computer is really having malware. If your computer slow down, maybe it just doesn't have enough RAM. You can check by using system cleaning tool called CCleaner, it is a best known for cleaning out files, cookies, and also can clean your hard drive. After using CCleaner, you should restart your computer. - run the Anti-Virus scan and try to restore your system. By doing so, you will need system backup, to save your important documents. If you did not back up, you can use Malwarebyte's Anti- Malware and try deep scan. If the scan still doen't work, you might have to spend sometime uninstalling things that you doesn't want but it is not so affective because most of them are not able to uninstall. It is more effective to use free virus scan. - Use Virus Scanning Tools 1. Kaspersky- it will tell you the infection. It takes about two hour depending on your software. 2. Norton Power Eraser- It will scan and clean your computer for free. 3.Trend Micro HijackThis- It can generate log and you can post these log in forum such as Bleepingcomputer.com or Geekstogo.com where experts can view your post and they might give you some advices you.
anonymous

How to Keep Your Computer Secure Video - 5min.com - 9 views

  •  
    M13 List and describe the guidelines for PC security. M12 Describe additional guidelines that should be considered for PC security. August 31 Chut Jenny
  •  
    Additional Guidelines: Password locking/encrypting important, sensitive information containing files and folders. Using a proxy or a VPN, to access the internet through the tunnel that can also include encryption. A Proxy and a VPN can scramble your IP address so the website cannot track you.
  •  
    Types of Securities. Firewall is a program that protects against intrusions and it helps ensure privacy. Anti-virus protects against computer viruses. A computer virus is a program that can multiply itself and infect a computer without the owner of the computer knowing or permissions. Anti-whatever else, malware, adware, spyware, Trojans etc. Why do you need it? People should have security programs to protect their computer from viruses or hackers. If you don't have any type of protection for your computer for your computer, your valuable information maybe stolen by hackers or erased by viruses. If you get viruses on your computer, you may need to take it to shops to repair it and need to pay for it. When do I need to use security programs? It depends on the activities that you do on your computer. How can I get viruses? There are several ways that you can get viruses. Opening attachments from anonymous emails, downloading torrents, movies, pictures, music and porn can give you viruses. Where can I get the right programs for my computer? download.com sourceforge.net majorgeeks.com Computer forums
anonymous

Your smartphone: a new frontier for hackers - Technology & science - Security - msnbc.com - 15 views

  •  
    Describe the different ways that iphones and android phones are being hacked. all sept 5 soo
  •  
    Malicious Applications that log details about incoming/outgoing phone calls, as well as recording the calls. They can create unwanted service charges subscriptions to phone users. The users may or may not even receive the "service" that was subscribed, and paid for. They cab intercept text messages, compromise emails, photos and private content. Malicious applications that appear to be games, calculators, or pornographic photos and videos are downloaded to smartphones. Malware that replies incoming text messages with spam links. E-mail based phishing - because the phone screens are smaller than computers, it is harder to tell apart phishing links and scams in the url. iPhone's unencrypted file of location logs for iPhone users. Jailbroken iPhones that run unauthorized content is also a gap where malware can get through. Because these apps are unauthorized, they haven't gone through Apple's authorization process, and can contain malware, and can hack the user's phone. o By Malicious Application= The Applications which Apple and Android offers to customer, sometimes have malicious worms or viruses. Sometimes, malicious applications masquerade to games, calculators, or pornographic photos and videos. Hackers made their own malicious app and phishing people to download. The payment will charge to the victim's phone bills. o By Phishing Texting= Personal texting sometimes contain spam and malicious links which lead to the hacking site o By Advertisement link= Viruses might attach to the advertisement link o By Weak Security= Weak security of iPhone and Android phone therefore, find the weak part of the phone and hack. o By E-mail= Users tend to be less caring on phones, as the words and the screen itself are small
Chut Sanghiran

BBC News - The 'eye-tech' future of vision - 7 views

  •  
    What are the benefits of this technology? What are the disadvantages?
  •  
    We selected this Article, because it's essential to be up to date these centuries. This kind of technology would be useful in many types of ways. This future technology piece may be able to lead us to the next generation of technology.
  •  
    In case the video does not work. http://www.youtube.com/watch?v=pzLrRUuaMe4
anonymous

View: IPads Won't Make Textbooks More Affordable - Bloomberg - 7 views

  •  
    Discuss the advantages and problems with etextbooks. all feb 3 johnny
  •  
    Advantages: The advantage of using an electronic textbook is that you're not wasting tones of paper and inks that it been stamp or written on the textbook. This would be already a good sign of eco-friendly. The etextbook also give the option that another textbook couldn't do by adding music and videos to it. The idea of carrying an electronic device that is not so heavy like the thick books would relief you already. Disadvantages: The trouble of the etextbooks is that the prices of the textbooks dosent reduce extensively enough for the students. Another Issue is that student can't sell their textbooks anymore to others when they are not using anymore. To get these types of etextbooks you need to spend an amount of $500 iPad which is very expensive for some people.
Chut Sanghiran

Convert Youtube to MP3 & Download Youtube Videos - Free Downloader - 1 views

shared by Chut Sanghiran on 29 Feb 12 - Cached
  •  
    For Mr. Overacker
1 - 20 of 33 Next ›
Showing 20 items per page