Friends,
in keeping with the multimedia design theme of Chapter 6, please attempt the Flash animation assignment on pg.203 of the text. Be creative!! There are myriad sources for video tutorials; below is a link that will get you started.
Friends,
in keeping with the multimedia design theme of Chapter 6, please attempt the Flash animation assignment on pg.203 of the text. Be creative!! There are myriad sources for video tutorials; below is a link that will get you started.
Friends,
please read Chapter 6 of the text, so that on Monday we can begin a fun animation assignment on Monday! Thanks!
Friends,
please regard this second sample project. Please see me with any questions. Also, at bottom is a link to a recommendation document for project 1. I hope this helps.
ITGS_mark_justification_form_Project_2_Read_Posters
https://docs.google.com/document/d/1Q77Hdn4Y6CftnhYwI3ZMYYzYOi3mLmELZFFQGMNOIzA/edit?hl=en_US&pli=1
let’s move on to Chapter 10 of the text. First, let’s watch this creepy Facebook security video!! After you have read Chapter 10, please cut and paste the url below to complete the online study guide. Thanks!
http://wps.prenhall.com/bp_beekman_tomtech_8/58/14910/3816984.cw/index.html
Friends,
You will work in groups to create a short informative video on a topic relating to Strand 2: Application to specified scenarios. For your topic, you will tie it to the relevant Social and Ethical Issues, IT, and the key terms. This video is supposed to make the issues seem simple and clear, so pick the most appropriate terms to include. Leave a comment below informing me of your group, your topic, and your progression. Thanking you!!!!
Here is an example of a topic and key terms involved:
Topic: CONTROVERSY SURROUNDING E-HEALTH Ontario debacle
Key terms: e-Health, Health records online, databases, field, key field, record, search, query, sort, database management system, mail merge, Flat-file database versus relational database, Data mining/data matching, Paper files versus electronic files, Data redundancy and data integrity, Updating data, access, access permissions, login, password, firewall, sysadmin, types of intrusion, for example, viruses, hacking, security measures, network types, for example, Intranet, Internet, VPN, encryption.
Here is an example of an In Plain English video. There are many more!