Did you find the context self suffiecient?

Sunday, 29 April 2012

Agenda Cover

During the past week, both classes of Ms. Bey's period 2 and 4 were assigned to create a mind blowing cover of the new agenda cover of 2012-2013. In doing this, the winning classroom will win a pizza party given by Ms. Bey. In making my first Agenda cover I had worked for several hours and had received bad criticism, so I had work continuously to make a better version. As a result of my HARD WORK i have this to show.

Final Copy

Computerized Art

Painting and art has been around for thousands of years, some including ocher-based mixtures used to create cave paintings, many of the fathers of art like Leonardo da Vinci, well known for his world re-noun painting of Mona Lisa. Furthermore, Many forms of art have shown how the artist feels, in wanting to make their style known art has altered to many forms.  

My Copy
In the past week, Ms. Bey's fourth period was asked to re-create a painting of our choosing. On the other hand, before the time of advanced computers, it was known that paintings took years to complete. With doing this the artist and the object/person had to stay in a uncomfortable position for many months, But as time progressed ideas were constructed in making it easier for both sides. Some involving the artist to make a sketch and do everything without the object or by photographic memory. Giving them a sense of every detail on what was to be. On the one hand, Moving to the 21st century, computers are now the solution to making art with ease. Some applications that involve art are Paint, Slimber,Sketchbook pro for the i pad and etc. These tools revolutionized the ways of art significantly, in creating new things I had made a replica of the original painting made by Klee.

Tuesday, 24 April 2012

Discussion of Privacy

With having a discussion about Invasion of Privacy we displayed in depth ideas of our point of view. Mine
involving with, mankind needing it as a very important tool to have it in our everyday life. In having the internet grow with more users, we are creating a weakness for all of humanity. Following that idea, we display our every day activities upon facebook, twitter, myspace and much more. In doing this, we do not put consideration to who might be watching. In having millions of people use the internet, their is a portion of who are in within the profession of hacking. And many of whom are working to get the following; address, name, social security number  and more. In collecting this, it is likely to be sold with the black market for the price of $3000 to $7000. After being sold, it is likely that the buyer would be using the information to legally travel to other countries while purchasing product under the person's name. Even though people do take precaution of predators, you are still be heard or watched through satellite, security footage and inside listening of phone calls. With concluding, you are no longer alone without someone watching you.

As a good example of Invasion of Privacy please 
watch the below link/video:

Although, if you are one who is constant contact with the internet some tips to keep you computer secure are by:
  • locking your profile interfaces (facebook, twitter and etc), letting only you friends see your posts.
  • having your be updated continuously
  • acquire both a antivirus application 
  • keeping vigilante of who you add on facebook  

Monday, 23 April 2012

Invasion of Privacy

Nothing is Private
Through our weeks of acknowledging more about invasion of privacy, we have accumulated a hefty amount of information. Information was shown that we must use it with care in handing it, with having personal details about you like your social security number, address, name, birth of date, height, bank account's should not be handed to just anyone. In receiving a legitimate letter from your government re-guarding to your updates or anything of the sort is likely to be granted. Following that issue, it is likely that your employer would be in need of your personal information for a back round check so it is best to provide.

A perspective of how the internet grew.
In a class of ours, we had taken part of watching the "net" in having better grasp of what we are to protect and why. It starts with the Undersecretary of Defense receiving a letter in re guards of his medical history stating that he had tested positive for aids, which had led Micheal Bergstrum to suicide for the fear of judgement of being homosexual. This and much more was downloaded onto a floppy disk that was accidentally fell upon an employee(Dale) of Cathedral software. In being confused, Dale had sent it to her co-worker(Angela Bennett) at Los Angelas. With finding much more, Dale's personal plane crashes because of GPS malfunctions and continues the adrenaline all the way to the end. Furthermore, The "net" had touched upon many issues that are key aspect of protection,  by who might be watching your computer conversations, how technology can be manipulated from miles away.
The cover of the movie to when it was released