Assessment Task 3 - Theory
1. Core: Issues, Past Current and Emerging Technologies and Careers and people in IT
Past Current and Emerging Technologies
1. Use the web to explore the emerging technology of AR, by finding five online working examples of AR.YouTube has many video examples of AR. Your computers must have a camera to use AR. Take screenshots to illustrate.
Augmented Reality is the integration of real world video with computer generated images to deliver an interactive 3D environment. AR add computer generated imagery (CGI) to live video. It locks this 3D CGI onto a live in real time and so expands the real-world view. It blends these virtual and real life images and adds features to the real world that are imagery.
The increasing popularity of AR is due to the development of tools which allow the average computer user to create their own examples, using Adobe Flash.
Augmented Reality Baseball Card Game
“Topps BUNT is the only real-time, real world Major League Baseball digital trading card game where the cards you own and collect earn points based on how your players perform on the field each day. Download BUNT for your iPhone, iPad or iPod touch on the App Store.” - http://www.topps.com/topps-apps
Augmented reality trading cards that literally bring players to life right on top of the card!
1. Use the web to explore the emerging technology of AR, by finding five online working examples of AR.YouTube has many video examples of AR. Your computers must have a camera to use AR. Take screenshots to illustrate.
Augmented Reality is the integration of real world video with computer generated images to deliver an interactive 3D environment. AR add computer generated imagery (CGI) to live video. It locks this 3D CGI onto a live in real time and so expands the real-world view. It blends these virtual and real life images and adds features to the real world that are imagery.
The increasing popularity of AR is due to the development of tools which allow the average computer user to create their own examples, using Adobe Flash.
Augmented Reality Baseball Card Game
“Topps BUNT is the only real-time, real world Major League Baseball digital trading card game where the cards you own and collect earn points based on how your players perform on the field each day. Download BUNT for your iPhone, iPad or iPod touch on the App Store.” - http://www.topps.com/topps-apps
Augmented reality trading cards that literally bring players to life right on top of the card!
Augmented Reality Drum Kit
Augmented Reality can recognise multiple symbols at once and we thought.
“TableDrum is a new app for the iPhone, iPad and iPod Touch that lets you turn virtually anything into a drum kit, the app synchronises the sound of any real object and then triggers a response in real time with drum sounds.” - http://www.geeky-gadgets.com/
Augmented Reality can recognise multiple symbols at once and we thought.
“TableDrum is a new app for the iPhone, iPad and iPod Touch that lets you turn virtually anything into a drum kit, the app synchronises the sound of any real object and then triggers a response in real time with drum sounds.” - http://www.geeky-gadgets.com/
GE Smart Grid
A digital hologram of smart grid technology come to life in your hands.
“GE’s Plug Into The Smart Grid campaign is a fantastic example of how augmented reality can be used to engage viewers and encourage them to interact directly with the message.” - http://thefutureofads.com/
A digital hologram of smart grid technology come to life in your hands.
“GE’s Plug Into The Smart Grid campaign is a fantastic example of how augmented reality can be used to engage viewers and encourage them to interact directly with the message.” - http://thefutureofads.com/
Earth Hour Globe
The Earth Hour world in you hands.
“Visit earthhour.org/earthinyourhands to create your own video of yourself holding the Earth, save a snapshot and pass it on. Using Augmented Reality the site also allows you to personalise your name on the 3D Earth and see everybody else in the world who has done it.” - earthhour.org/earthinyourhands
The Earth Hour world in you hands.
“Visit earthhour.org/earthinyourhands to create your own video of yourself holding the Earth, save a snapshot and pass it on. Using Augmented Reality the site also allows you to personalise your name on the 3D Earth and see everybody else in the world who has done it.” - earthhour.org/earthinyourhands
Doritos - Sweet Chilli
“Today we have another example from Brazil, as Doritos launch a special edition for their Sweet Chilli flavoured chips and have used AR technology on each package of this new product.” - http://www.digitalbuzzblog.com/doritos-sweet-chili-website/
“Today we have another example from Brazil, as Doritos launch a special edition for their Sweet Chilli flavoured chips and have used AR technology on each package of this new product.” - http://www.digitalbuzzblog.com/doritos-sweet-chili-website/
2. Write a report which summarises your research and invent for yourself a future use for AR technology.
My research reveals that the countries that Augmented Reality is most commonly used in are (in order) USA, UK, Germany, Australia and in India. AR is used in many industries such as retails, commerce, educating, learning, automotive, tourism, health and recreation. According to my research on Augmented Reality recent AR apps have generated over 300 million dollars and approximately 5.7 billion dollars by 2017. The most popular Augments are used to buy products, used as a video player, a photo carousel, used to save and share and web link. Research has also uncovered that AR has a positive impacts on on value perception as well as increasing likelihood of a consumer buying once seen an AR version of a product.
The future for AR applications is only moving forward and upwards. Possible future applications include advertisements on mobile phones based on a persons location. In the marketing industry we would be able to model clothes at home, making internet purchasing easier and quicker than entering the shop outlet. Generation of 3D model of rooms and furniture. Marketing can use AR for bringing campaigns to life, a replacement for standard print literature. AR plays many beneficial roles to brands and organisations. Research proves that AR increases the perceived value of products and brands. AR is mobile and hugely accessible to a rapidly growing smartphone market. Professionals from across the globe – from marketers to advertisers, publishers, retailers, luxury brands and more – are taking advantage of AR to attract, retain and engage with consumers through immersive mobile experiences.
My research reveals that the countries that Augmented Reality is most commonly used in are (in order) USA, UK, Germany, Australia and in India. AR is used in many industries such as retails, commerce, educating, learning, automotive, tourism, health and recreation. According to my research on Augmented Reality recent AR apps have generated over 300 million dollars and approximately 5.7 billion dollars by 2017. The most popular Augments are used to buy products, used as a video player, a photo carousel, used to save and share and web link. Research has also uncovered that AR has a positive impacts on on value perception as well as increasing likelihood of a consumer buying once seen an AR version of a product.
The future for AR applications is only moving forward and upwards. Possible future applications include advertisements on mobile phones based on a persons location. In the marketing industry we would be able to model clothes at home, making internet purchasing easier and quicker than entering the shop outlet. Generation of 3D model of rooms and furniture. Marketing can use AR for bringing campaigns to life, a replacement for standard print literature. AR plays many beneficial roles to brands and organisations. Research proves that AR increases the perceived value of products and brands. AR is mobile and hugely accessible to a rapidly growing smartphone market. Professionals from across the globe – from marketers to advertisers, publishers, retailers, luxury brands and more – are taking advantage of AR to attract, retain and engage with consumers through immersive mobile experiences.
Past Current and Emerging Technologies
1. Research Ada Lovelace, using the internet, and outline the role she played in the work of Charles Babbage. Charles Babbage, known as the father of modern computing, designed Difference Engine for calculating - first digital computer - assisted by Ada Lovelace.
“1822 - Charles Babbage, known as the father of modern computing, designs Difference Engine for calculating - first digital computer - assisted by Ada Lovelace”
Ada Lovelace (1815-1852), like her mother, had been privately tutored in the study of mathematics since she was a child. Charles Babbage (1791-1871), was also a mathematician and an inventor. Ada and Charles met in 1833 when she was seventeen and was captivated when Babbage demonstrated the small working section of the Engine to her. Charles Babbage had been working on an engine called the Difference Engine, a calculating machine.
Years later an Italian mathematician, Luigi Menabrea, published a memoir on the subject of the Analytical Engine. The memoir was in French, therefore enlisting Ada Lovelace as a translator. From 1842-43 Ada Lovelace worked intently on the article and derived a set of her own extensive notes.
The article contained statements by Ada that from a modern perspective are visionary. She had speculated that the Engine 'might act upon other things besides number… the Engine might compose elaborate and scientific pieces of music of any degree of complexity or extent’. Ada Lovelace is referred to as a 'prophet of the computer age'. Certainly she was the first to express the potential for computers outside mathematics.
1. Research Ada Lovelace, using the internet, and outline the role she played in the work of Charles Babbage. Charles Babbage, known as the father of modern computing, designed Difference Engine for calculating - first digital computer - assisted by Ada Lovelace.
“1822 - Charles Babbage, known as the father of modern computing, designs Difference Engine for calculating - first digital computer - assisted by Ada Lovelace”
Ada Lovelace (1815-1852), like her mother, had been privately tutored in the study of mathematics since she was a child. Charles Babbage (1791-1871), was also a mathematician and an inventor. Ada and Charles met in 1833 when she was seventeen and was captivated when Babbage demonstrated the small working section of the Engine to her. Charles Babbage had been working on an engine called the Difference Engine, a calculating machine.
Years later an Italian mathematician, Luigi Menabrea, published a memoir on the subject of the Analytical Engine. The memoir was in French, therefore enlisting Ada Lovelace as a translator. From 1842-43 Ada Lovelace worked intently on the article and derived a set of her own extensive notes.
The article contained statements by Ada that from a modern perspective are visionary. She had speculated that the Engine 'might act upon other things besides number… the Engine might compose elaborate and scientific pieces of music of any degree of complexity or extent’. Ada Lovelace is referred to as a 'prophet of the computer age'. Certainly she was the first to express the potential for computers outside mathematics.
2. Use the internet to list the important achievements of Bletchley Park during WW2.
Bletchley Park was Britain’s best kept secret during World War 2. It was there that an organisation called the Government Code and Cypher School (GC&CS) studied and devised methods to enable the Allied forces to decipher the military codes. The result of which was the production of vital intelligence in advance of military operations.
Bletchley Park was one of the strangest military establishments in the world. The code breakers team was made up of crossword puzzle fanatics, chess champions, mathematicians, linguists, specialists in Egyptian hieroglyphics, and even an occasional lawyer. The code breakers at Bletchley Park were able to quickly decode tens of thousands of intercepted messages and made a huge contribution to the Allied victory. They also gave the Allies a vital edge in the U-boat war, the tank battles against Rommel, and the D-Day invasion
The code breakers' many successes also included the North Africa Campaign, when they enabled the Royal Navy to cut Rommel's supply lines and kept Montgomery informed of the Desert Fox's every move. Early 1942 brought serious difficulties with the German Navy’s introduction of a more complex Enigma cipher. But by the end of 1942 they had mastered it as well.
Bletchley Park was the birthplace of the information age with the industrialisation of the codebreaking processes enabled by machines such as the Turing/Welchman Bombe, and the world’s first electronic computer, Colossus.
Bletchley Park was Britain’s best kept secret during World War 2. It was there that an organisation called the Government Code and Cypher School (GC&CS) studied and devised methods to enable the Allied forces to decipher the military codes. The result of which was the production of vital intelligence in advance of military operations.
Bletchley Park was one of the strangest military establishments in the world. The code breakers team was made up of crossword puzzle fanatics, chess champions, mathematicians, linguists, specialists in Egyptian hieroglyphics, and even an occasional lawyer. The code breakers at Bletchley Park were able to quickly decode tens of thousands of intercepted messages and made a huge contribution to the Allied victory. They also gave the Allies a vital edge in the U-boat war, the tank battles against Rommel, and the D-Day invasion
The code breakers' many successes also included the North Africa Campaign, when they enabled the Royal Navy to cut Rommel's supply lines and kept Montgomery informed of the Desert Fox's every move. Early 1942 brought serious difficulties with the German Navy’s introduction of a more complex Enigma cipher. But by the end of 1942 they had mastered it as well.
Bletchley Park was the birthplace of the information age with the industrialisation of the codebreaking processes enabled by machines such as the Turing/Welchman Bombe, and the world’s first electronic computer, Colossus.
Impact of technology on the Environment
1. Identify the problems associated with the disposal of old computers
Technology is constantly evolving, newer, bigger and better things are always coming our way. At this day in age the life expectancy of a computer is three-four years. Although this may be viewed as a good thing, all of this new technology rolling in, on the other hand we have all of this old technology nobody is using. For example, once an updated and more efficient computer comes along, there is no use for the old one so it is disposed of. But old computers never die, they just pollute our environment. Every year millions of computers, monitors and printers are buried in landfill and immediately start to pollute our soil. These pieces of technology contain hazardous metals such as lead.
Companies offer recycling services and facilities but research has shown that rather than doing so, it would be safer for the environment if we kept old computers and monitors in boxes stored in our garage. The recycling process means to remove the leaded glass from the monitors and melted down as the rest of the equipment is sent overseas so that the parts with value can be striped. Overseas the job of removing wiring and separating plastic from metal, all of which is done by hand, is tedious work which can potentially be very dangerous for the worker who is exposed to toxic components of the hardware daily. Electronic equipment contains many materials, many of which are highly toxic. Materials include: brominated substances, toxic gases and metals, acids, plastics, lead and lead oxide and mercury.
The valueless parts are often carelessly dumped in ditches and chemical leaked into rivers. Insulation of the computer is removed by burning, a harmful ash filled with dioxins releases toxic compounds into the air we breathe. All computer contain dangerous materials, which are not so easily jettisoned. Which is why we should hold on to our old parts until new and better methods of recycling e-waste are put into place.
1. Identify the problems associated with the disposal of old computers
Technology is constantly evolving, newer, bigger and better things are always coming our way. At this day in age the life expectancy of a computer is three-four years. Although this may be viewed as a good thing, all of this new technology rolling in, on the other hand we have all of this old technology nobody is using. For example, once an updated and more efficient computer comes along, there is no use for the old one so it is disposed of. But old computers never die, they just pollute our environment. Every year millions of computers, monitors and printers are buried in landfill and immediately start to pollute our soil. These pieces of technology contain hazardous metals such as lead.
Companies offer recycling services and facilities but research has shown that rather than doing so, it would be safer for the environment if we kept old computers and monitors in boxes stored in our garage. The recycling process means to remove the leaded glass from the monitors and melted down as the rest of the equipment is sent overseas so that the parts with value can be striped. Overseas the job of removing wiring and separating plastic from metal, all of which is done by hand, is tedious work which can potentially be very dangerous for the worker who is exposed to toxic components of the hardware daily. Electronic equipment contains many materials, many of which are highly toxic. Materials include: brominated substances, toxic gases and metals, acids, plastics, lead and lead oxide and mercury.
The valueless parts are often carelessly dumped in ditches and chemical leaked into rivers. Insulation of the computer is removed by burning, a harmful ash filled with dioxins releases toxic compounds into the air we breathe. All computer contain dangerous materials, which are not so easily jettisoned. Which is why we should hold on to our old parts until new and better methods of recycling e-waste are put into place.
2. Find companies on the Internet which are offering recycling of old toner cartridges. How many times can an average cartridge be recycled?
“You can now drop off your used or empty laser and inkjet cartridges at all Officeworks and JB HiFi stores and participating Australia Post, Harvey Norman, Dick Smith, The Good Guys, Office National and Office Products Depot outlets.” - http://recyclingnearyou.com.au/cartridges/
Most cartridges can be recycled up to six times - they are refurbished, refilled and then resold to consumers at a lower price than brand name cartridges.
3. Identify an environmental issue from the past where disposal was a difficulty. Was it able to be solved?
In Switzerland, the first electronic waste recycling system was established in 1991. The non-profit organisation SWICO began first with the collection of old refrigerators. Before then e-waste recycling was virtually non existent. Over the years, all other electric and electronic devices were gradually been included in the system.
Yes, the problem of not having e-waste recycling systems was resolved.
Current and emerging technologies
1. Watch the video of Apple’s Knowledge Navigator on YouTube
2. Predict two information and software technology change that you expect to see in your lifetime
- Some sort of technological chip created and inserted to us humans that contain knowledge/information on a particular subject area. So that instead of sitting down in a classroom having to learn and memorise things, we will have it already programmed into our brains.
- Technology wired up to our minds so that if we open the internet and think question or something to research the search engine will have picked up our thoughts and already come up with an answer/ page we’re looking for.
3. Describe Moore’s law. Can it continue indefinitely?
Gordon Moore predicted that the circuit densities of processing chips, since the integrated circuit was invented, have doubled and will double every one and a half to two years. Moore predicted that this trend would continue for the foreseeable future.
“You can now drop off your used or empty laser and inkjet cartridges at all Officeworks and JB HiFi stores and participating Australia Post, Harvey Norman, Dick Smith, The Good Guys, Office National and Office Products Depot outlets.” - http://recyclingnearyou.com.au/cartridges/
Most cartridges can be recycled up to six times - they are refurbished, refilled and then resold to consumers at a lower price than brand name cartridges.
3. Identify an environmental issue from the past where disposal was a difficulty. Was it able to be solved?
In Switzerland, the first electronic waste recycling system was established in 1991. The non-profit organisation SWICO began first with the collection of old refrigerators. Before then e-waste recycling was virtually non existent. Over the years, all other electric and electronic devices were gradually been included in the system.
Yes, the problem of not having e-waste recycling systems was resolved.
Current and emerging technologies
1. Watch the video of Apple’s Knowledge Navigator on YouTube
2. Predict two information and software technology change that you expect to see in your lifetime
- Some sort of technological chip created and inserted to us humans that contain knowledge/information on a particular subject area. So that instead of sitting down in a classroom having to learn and memorise things, we will have it already programmed into our brains.
- Technology wired up to our minds so that if we open the internet and think question or something to research the search engine will have picked up our thoughts and already come up with an answer/ page we’re looking for.
3. Describe Moore’s law. Can it continue indefinitely?
Gordon Moore predicted that the circuit densities of processing chips, since the integrated circuit was invented, have doubled and will double every one and a half to two years. Moore predicted that this trend would continue for the foreseeable future.
4. Outline three equity issues in information and software technology
1. Children at school or people at work who do not have as much technological experience than others are already at a disadvantage
2. Teachers who have little software knowledge will result in their students lacking in vital knowledge
3. In this day in age people who do not own a computer at a disadvantage socially, by not staying connected and financially by not having the skills required for job opportunities/promotions
5. What is convergence? Identify a product which displays convergence
Convergence in Information and Software Technology is when technologies and technological devices become smaller, cheaper and more powerful.
Smartphones are a prime example of convergence, these mobile devices transmit audio, video and SMS text messaging. Nowadays your mobile device has become your TV, radio, computer, music player, web browser, email, personal organiser and photo gallery all in one.
6. Identify one way in which the nature of work has changed for one member of your family since you were born
My mother runs a business 100% online. She has a gone from a job in a time where people didn’t rely on computers, to now running a career completely online.
7. Exercise your imagination and draw a picture of, as well as describe in words, the computer classroom you will visit if you are a parent of high-school-aged children in about 25 years.
1. Children at school or people at work who do not have as much technological experience than others are already at a disadvantage
2. Teachers who have little software knowledge will result in their students lacking in vital knowledge
3. In this day in age people who do not own a computer at a disadvantage socially, by not staying connected and financially by not having the skills required for job opportunities/promotions
5. What is convergence? Identify a product which displays convergence
Convergence in Information and Software Technology is when technologies and technological devices become smaller, cheaper and more powerful.
Smartphones are a prime example of convergence, these mobile devices transmit audio, video and SMS text messaging. Nowadays your mobile device has become your TV, radio, computer, music player, web browser, email, personal organiser and photo gallery all in one.
6. Identify one way in which the nature of work has changed for one member of your family since you were born
My mother runs a business 100% online. She has a gone from a job in a time where people didn’t rely on computers, to now running a career completely online.
7. Exercise your imagination and draw a picture of, as well as describe in words, the computer classroom you will visit if you are a parent of high-school-aged children in about 25 years.
In the next 25 years, just as technology has advanced so will our way of life and learning, in my drawing I have taken this into consideration.
- The student: the big eyes and glasses due to the extensive amount of time being exposed to technological screens, enlarged thumbs due to humans adapting to texting and typing
- The desk: chair will have been re-modelled to straighten up the students hunched over back
- The technology: there is a whole cabinet dedicated to laptops, computers, phones, iPod's, headphones and all their chargers, technology will have become such a big part of our learning we cannot do without
- The computer wall: instead of whiteboards, whole interactive computer screens will fill up walls so that multiple things can be searched and viewed at once
- The teacher: teachers will be able to teach even if they're sick or away through a computer screen and pointer to direct the students
Legal Issues.
1. Name the types of information social networks allow us to share.
Personal details: name, age - date of birth, hometown, school, workplace, your location, contact numbers, email address, personal interests and sports you play. As well as who our family and friends are, what you look like (photographs), ideologies, organisations you support/ are apart of, your religion, future ambitions and achievements.
2. Identify the advantages and disadvantages of social networkings.
Advantages: keeping connected with your friends and family, being updated on social events as well as world news, sharing your thoughts and photos with your friends, promoting your ideas, social networking allow users to create networks of like-minded people, it’s free, a range of technical skills is not required
Disadvantages: cyber bullying, sexual harassment, peer pressure, loss of privacy, fake profiles (stalkers, pedofiles), distraction (time waster), hackers who use your account inappropriately, false images are created, excessive time spent can cause retreat from actual interaction
- The student: the big eyes and glasses due to the extensive amount of time being exposed to technological screens, enlarged thumbs due to humans adapting to texting and typing
- The desk: chair will have been re-modelled to straighten up the students hunched over back
- The technology: there is a whole cabinet dedicated to laptops, computers, phones, iPod's, headphones and all their chargers, technology will have become such a big part of our learning we cannot do without
- The computer wall: instead of whiteboards, whole interactive computer screens will fill up walls so that multiple things can be searched and viewed at once
- The teacher: teachers will be able to teach even if they're sick or away through a computer screen and pointer to direct the students
Legal Issues.
1. Name the types of information social networks allow us to share.
Personal details: name, age - date of birth, hometown, school, workplace, your location, contact numbers, email address, personal interests and sports you play. As well as who our family and friends are, what you look like (photographs), ideologies, organisations you support/ are apart of, your religion, future ambitions and achievements.
2. Identify the advantages and disadvantages of social networkings.
Advantages: keeping connected with your friends and family, being updated on social events as well as world news, sharing your thoughts and photos with your friends, promoting your ideas, social networking allow users to create networks of like-minded people, it’s free, a range of technical skills is not required
Disadvantages: cyber bullying, sexual harassment, peer pressure, loss of privacy, fake profiles (stalkers, pedofiles), distraction (time waster), hackers who use your account inappropriately, false images are created, excessive time spent can cause retreat from actual interaction
3. Businesses and advertisers can already access enormous amounts of personal data on social media websites. The next step is settlement analysis, where online conversations are mined for words and thoughts to be sold to advertisers. Discuss whether or not you consider this to be and ethical practise.
Conversations via social media are between two or more people, generally friends, and no body else. Sentences containing thoughts, ideas and opinions are meant for the person on the receiving end of the conversation, not advertisers searching through conversations for their own companies benefits. The businesses are not consenting the people in the conversation therefore these advertisers are assuming ownership of the conversation which is not their in the first place. I believe strongly that this is an unethical practise.
Legal Issues
1. List four legal issues associated with developments in information and software technology.
Unauthorised copyright, piracy, selling of unauthorised copying, stealing intellectual property
2. Outline the licensing arrangements that apply to most software programs.
Copyright Protection - copyright laws are used to legally license a rang of software programs. This protects the intellectual property of the creators.
Piracy - Purchasing software automatically entails that the buyer becomes a licensed user. For example if I went to the video shop and bought a DVD, it would be against the law for me to distribute copies to friends. Selling copies without authorisation would mean that I considered to be selling stolen goods.
3. Identify five computer crimes related to security and protection of data.
1. Denial of service attacks
2. Shopping and auction site fraud
3. Credit card fraud
4. Spamming
5. Phishing
Conversations via social media are between two or more people, generally friends, and no body else. Sentences containing thoughts, ideas and opinions are meant for the person on the receiving end of the conversation, not advertisers searching through conversations for their own companies benefits. The businesses are not consenting the people in the conversation therefore these advertisers are assuming ownership of the conversation which is not their in the first place. I believe strongly that this is an unethical practise.
Legal Issues
1. List four legal issues associated with developments in information and software technology.
Unauthorised copyright, piracy, selling of unauthorised copying, stealing intellectual property
2. Outline the licensing arrangements that apply to most software programs.
Copyright Protection - copyright laws are used to legally license a rang of software programs. This protects the intellectual property of the creators.
Piracy - Purchasing software automatically entails that the buyer becomes a licensed user. For example if I went to the video shop and bought a DVD, it would be against the law for me to distribute copies to friends. Selling copies without authorisation would mean that I considered to be selling stolen goods.
3. Identify five computer crimes related to security and protection of data.
1. Denial of service attacks
2. Shopping and auction site fraud
3. Credit card fraud
4. Spamming
5. Phishing
4. Discuss the importance of equal employment opportunity legislation
The EEO legislation is important because it gives all people the same rights and the same opportunities as everyone else. This means that no matter your age, gender, ability or race, you are treated the same as everybody else in the workplace.
5. Research the Digital Agenda Act 2000 and explain its purpose and significance
On 17 August 2000 the Copyright Amendment (Digital Agenda) Bill 2000 passed the Senate and the House of Representatives. The Digital Agenda Bill received Royal Assent on 4 September 2000, and became the Copyright Amendment (Digital Agenda) Act 2000, Act No. 110 of 2000. The Digital Agenda Act is intended to commence on 4 March 2001.
The object of this Act is to amend the Copyright Act 1968. The objectives introduced by the Copyright Amendment Act 2000 include;
- Ensure the efficient operation of copyright industries in the online environment through promoting financial rewards for creators and investors, providing a practical enforcement regime, and providing access to copyright material online.
- providing reasonable access and certainty for the end users of copyright material online;
- Ensuring cultural and educational institutions can access copyright 1.4 material online on reasonable terms including the provision of adequate remuneration to creators and investors
- Ensuring that the technical processes which form the basis of the operation of the Internet are not jeopardised.
This Act is significant because with it updates Australia’s copyright regime by acknowledging that technology constantly evolving and the constant development of computer software. Concerns about being able to maintain reasonable access to copyright material in a digital environment were a contributing factor causing the Act to be reformed. This Act is beneficial in information and software technology because it is updates and appropriately extends to the digital environment.
The EEO legislation is important because it gives all people the same rights and the same opportunities as everyone else. This means that no matter your age, gender, ability or race, you are treated the same as everybody else in the workplace.
5. Research the Digital Agenda Act 2000 and explain its purpose and significance
On 17 August 2000 the Copyright Amendment (Digital Agenda) Bill 2000 passed the Senate and the House of Representatives. The Digital Agenda Bill received Royal Assent on 4 September 2000, and became the Copyright Amendment (Digital Agenda) Act 2000, Act No. 110 of 2000. The Digital Agenda Act is intended to commence on 4 March 2001.
The object of this Act is to amend the Copyright Act 1968. The objectives introduced by the Copyright Amendment Act 2000 include;
- Ensure the efficient operation of copyright industries in the online environment through promoting financial rewards for creators and investors, providing a practical enforcement regime, and providing access to copyright material online.
- providing reasonable access and certainty for the end users of copyright material online;
- Ensuring cultural and educational institutions can access copyright 1.4 material online on reasonable terms including the provision of adequate remuneration to creators and investors
- Ensuring that the technical processes which form the basis of the operation of the Internet are not jeopardised.
This Act is significant because with it updates Australia’s copyright regime by acknowledging that technology constantly evolving and the constant development of computer software. Concerns about being able to maintain reasonable access to copyright material in a digital environment were a contributing factor causing the Act to be reformed. This Act is beneficial in information and software technology because it is updates and appropriately extends to the digital environment.
Legal Issues
1. Discuss the importance of industry codes of conduct
Industry codes of conduct are important because in this day of age we often find companies and businesses lacking in honesty and fairness. A code of conduct is a set of standards of service that are to be followed at all costs, it also comes with what happens if standards are not met. A code of conduct is not usually legally enforced but are put into place by an industry as a means of self-regulation. Codes of conduct are significant because they cover many important ares such as animal welfare, advertising, journalism and banking. Industry codes of conduct is necessary in ensuring integrity and truthfulness when dealing with clients.
2. Explain the difference between data security and privacy
Privacy - the right of the individual or group to keep their lives/ business personal
Data Security - the protection of data from loss or modification
Privacy is the persons personal happenings kept private, whereas data security is the means of protecting the information from damage.
3. Describe three ways in which data may be lost
Accidental loss, computer malfunctions, hackers
4. Identify two examples of inappropriate use of software
Using social networking to harass others and distributing offensive material.
5. Define cyber bullying and suggest a strategy which could make it less of a common or harmful occurrence among teenagers.
Cyber bullying is the action of intentionally attacking another person via social media. This is usually done by a person who is just trying to make someone else just as unhappy as they are. Cyber bullying is often triggered by jealousy and stupidity. Cyber bullying is easily avoided if you have common sense, e.g the block button is there to be used in these situations, if you feel like you are being bullied via the internet you should never hesitate to block the bully. ‘If you don’t want to get bit by a lion, don’t go to the zoo’, to stop the risk of being tormented it would be a good idea to take a break from the said social network or even delete it all together. It may not seem like it but internet bullies and trolls are easily avoided, one often needs to step back and look at the big picture, by doing this you realise how petty and insignificant these people are. Always remember, if you aren’t coping, seek help in parents or teachers.
1. Discuss the importance of industry codes of conduct
Industry codes of conduct are important because in this day of age we often find companies and businesses lacking in honesty and fairness. A code of conduct is a set of standards of service that are to be followed at all costs, it also comes with what happens if standards are not met. A code of conduct is not usually legally enforced but are put into place by an industry as a means of self-regulation. Codes of conduct are significant because they cover many important ares such as animal welfare, advertising, journalism and banking. Industry codes of conduct is necessary in ensuring integrity and truthfulness when dealing with clients.
2. Explain the difference between data security and privacy
Privacy - the right of the individual or group to keep their lives/ business personal
Data Security - the protection of data from loss or modification
Privacy is the persons personal happenings kept private, whereas data security is the means of protecting the information from damage.
3. Describe three ways in which data may be lost
Accidental loss, computer malfunctions, hackers
4. Identify two examples of inappropriate use of software
Using social networking to harass others and distributing offensive material.
5. Define cyber bullying and suggest a strategy which could make it less of a common or harmful occurrence among teenagers.
Cyber bullying is the action of intentionally attacking another person via social media. This is usually done by a person who is just trying to make someone else just as unhappy as they are. Cyber bullying is often triggered by jealousy and stupidity. Cyber bullying is easily avoided if you have common sense, e.g the block button is there to be used in these situations, if you feel like you are being bullied via the internet you should never hesitate to block the bully. ‘If you don’t want to get bit by a lion, don’t go to the zoo’, to stop the risk of being tormented it would be a good idea to take a break from the said social network or even delete it all together. It may not seem like it but internet bullies and trolls are easily avoided, one often needs to step back and look at the big picture, by doing this you realise how petty and insignificant these people are. Always remember, if you aren’t coping, seek help in parents or teachers.
1. Summarise the positive and negative changes to the nature of work and enterprise which have been brought about by information and software technology.
The introduction of computers in the workplace in the developed world could be seen as both a negative and positive. If you don’t have the proper computing skills you may be left behind, but on the other hand being taught new computing skills opens up doors for further employment opportunities. Technology these days often disconnects us from the world, workplace interaction is almost eliminated due to being constantly switched on. But perhaps, for example in an office job, not spending as much time with your co-workers might be a positive as the most important thing to do is get your work completed. Technology provides jobs to lots of people but can also cause many people to loose their jobs due to their position not being required anymore because a computer can now do it for them.
2. Information and Software technology is more likely to have changed someone’s work rather than eliminating it completely. List three occupations which have been affected by technology.
Travel agencies - with booking flights and accommodation so easily online, there seems to be no need to have to geo into a flight agency.
Teachers - instead of use old traditional methods of students hand writing in books what the teacher has copied onto the blackboard, they can now simply direct students to web pages for information
Retailers - with everything online now, especially clothes shopping, going into stores now appears to be a thing of the past
3. Increasingly, those who have regular access to information and software technology in ways that expand their connections are more likely to advance, while those who do not may find themselves marginalised. Discuss whether or not you agree with this statement.
I agree with this statement, especially in terms of education. Poorer schools in 2014 who cannot afford for their students to have internet and technological access are at a significant disadvantage to those of whom can afford such privileges. A few years ago being connected online was not so important but nowadays have access to technology is vital for education.
4. Constant computer use may cause us to place more emotional value on events taking place online as opposed to what is actually happening in our real lives. Discuss whether or not you agree with this statement.
Just looking at the proliferation of online bullying is enough to see that this statement is true. Before the rise of the internet cyber bullying was non-existent. For example problems, specifically in teenagers, such as anorexia and image issues where not as apparent 10-20 years ago when teenagers did not have instant access to millions of pictures of stick thin photoshopped celebrities.
The introduction of computers in the workplace in the developed world could be seen as both a negative and positive. If you don’t have the proper computing skills you may be left behind, but on the other hand being taught new computing skills opens up doors for further employment opportunities. Technology these days often disconnects us from the world, workplace interaction is almost eliminated due to being constantly switched on. But perhaps, for example in an office job, not spending as much time with your co-workers might be a positive as the most important thing to do is get your work completed. Technology provides jobs to lots of people but can also cause many people to loose their jobs due to their position not being required anymore because a computer can now do it for them.
2. Information and Software technology is more likely to have changed someone’s work rather than eliminating it completely. List three occupations which have been affected by technology.
Travel agencies - with booking flights and accommodation so easily online, there seems to be no need to have to geo into a flight agency.
Teachers - instead of use old traditional methods of students hand writing in books what the teacher has copied onto the blackboard, they can now simply direct students to web pages for information
Retailers - with everything online now, especially clothes shopping, going into stores now appears to be a thing of the past
3. Increasingly, those who have regular access to information and software technology in ways that expand their connections are more likely to advance, while those who do not may find themselves marginalised. Discuss whether or not you agree with this statement.
I agree with this statement, especially in terms of education. Poorer schools in 2014 who cannot afford for their students to have internet and technological access are at a significant disadvantage to those of whom can afford such privileges. A few years ago being connected online was not so important but nowadays have access to technology is vital for education.
4. Constant computer use may cause us to place more emotional value on events taking place online as opposed to what is actually happening in our real lives. Discuss whether or not you agree with this statement.
Just looking at the proliferation of online bullying is enough to see that this statement is true. Before the rise of the internet cyber bullying was non-existent. For example problems, specifically in teenagers, such as anorexia and image issues where not as apparent 10-20 years ago when teenagers did not have instant access to millions of pictures of stick thin photoshopped celebrities.
Careers and people in IT
1. Citing examples, explain how society has become more reliant to information and software technology.
Society has become dependant online, not only for socialising but for business purposes. Society have become reliant on the internet for purchasing goods as well as selling them, this was not the case years ago, but now that it is so easy to do so, it seems odd not to. We have the world at our fingertips, accessing endless information is a mere few clicks away, a very important tool for studying for school exams or just reading up for interest. Being online is virtually unavoidable for todays society.
2. Apart from technical ability, identify the skills information technology employers may seek in a potential employee
Knowledge of how to keep connected via social media to potentially promote the business, keeping up to date with technological advances such as new software and updates and the knowledge of a large range of applications on different computers from programs such as Photoshop to Flash.
3. Discuss the advantages and disadvantages of being a self-employed information and software technology worker.
Advantages: working on your own terms, more family time from working at home, being your own boss, acquiring the skills and knowledge of computers that run the twenty first century
Disadvantages: wouldn't have the ability to discuss and share information with colleagues face to face, not being able to develop social skills, spending long periods of time in from of a computer scree, health problems
1. Citing examples, explain how society has become more reliant to information and software technology.
Society has become dependant online, not only for socialising but for business purposes. Society have become reliant on the internet for purchasing goods as well as selling them, this was not the case years ago, but now that it is so easy to do so, it seems odd not to. We have the world at our fingertips, accessing endless information is a mere few clicks away, a very important tool for studying for school exams or just reading up for interest. Being online is virtually unavoidable for todays society.
2. Apart from technical ability, identify the skills information technology employers may seek in a potential employee
Knowledge of how to keep connected via social media to potentially promote the business, keeping up to date with technological advances such as new software and updates and the knowledge of a large range of applications on different computers from programs such as Photoshop to Flash.
3. Discuss the advantages and disadvantages of being a self-employed information and software technology worker.
Advantages: working on your own terms, more family time from working at home, being your own boss, acquiring the skills and knowledge of computers that run the twenty first century
Disadvantages: wouldn't have the ability to discuss and share information with colleagues face to face, not being able to develop social skills, spending long periods of time in from of a computer scree, health problems
2. Core: The Internet and Internet Software
Internet software
1. Surf the web to find a good copyright-free HTML tutorial.
2. Publish this on your website
A beginners tutorial starting with HTML coding basics:
http://www.quackit.com/html/tutorial/
4. HTML is described as being a markup language using tags. Describe how these tags work and give an example of how they would create text which is a centred heading
Markup languages used paired tags to describe how the content of a page should be displayed. Most elements are written with a start tag and an end tag, with the content in between. HTML tag is composed of the name of the element, surrounded by brackets. An end tag also has a slash after the opening angle bracket, to distinguish it from the start tag. Websites can be created by typing tags and coding entirely in HTML. Programmers can create their own definitions for tags for different purposes. A centred text tag would simply be “<centre>”
An example of HTML code: <h3>My first web page</h3>
Broken down, we know that ‘<‘ and ‘>’ are known as tags, the ‘<h3>’ tag indicates that the text style will be in h3.
1. Surf the web to find a good copyright-free HTML tutorial.
2. Publish this on your website
A beginners tutorial starting with HTML coding basics:
http://www.quackit.com/html/tutorial/
4. HTML is described as being a markup language using tags. Describe how these tags work and give an example of how they would create text which is a centred heading
Markup languages used paired tags to describe how the content of a page should be displayed. Most elements are written with a start tag and an end tag, with the content in between. HTML tag is composed of the name of the element, surrounded by brackets. An end tag also has a slash after the opening angle bracket, to distinguish it from the start tag. Websites can be created by typing tags and coding entirely in HTML. Programmers can create their own definitions for tags for different purposes. A centred text tag would simply be “<centre>”
An example of HTML code: <h3>My first web page</h3>
Broken down, we know that ‘<‘ and ‘>’ are known as tags, the ‘<h3>’ tag indicates that the text style will be in h3.
5. Load a fairly simple web page and find out how to view it in your browser as ‘source’ code (this is a choice available in the menu of most browsers). Print this code and identify at least five different paired tags by using a pen or highlighter to identify the text they surround.
<!DOCTYPE html>
<!--[if lt IE 7]> <html > <![endif]--><!--[if IE 7]> <html > <![endif]--><!--[if IE 8]> <html > <![endif]--><!--[if IE 9]> <html > <![endif]-->
<html lang="en" itemscope item>
<head>
<title>How do I view the source code of a web page?</title>
<link href="http://cdn.computerhope.com/site.css" rel="stylesheet"/>
<meta http-equiv="Content-Type" content="text/html;charset=utf-8"/>
<meta name="viewport" content="width=device-width, initial-scale=1.0"/>
<meta content="Steps on how to view the source code of any web page on the Internet." name="description"/>
<meta itemprop="name" content="How do I view the source code of a web page?"/>
<meta itemprop="description" content="Steps on how to view the source code of any web page on the Internet."/>
<meta property="og:description" content="Steps on how to view the source code of any web page on the Internet."/>
<meta property="og:title" content="How do I view the source code of a web page?"/>
<meta property="og:type" content="article"/>
<meta name="twitter:card" content="summary"/>
<meta name="twitter:title" content="How do I view the source code of a web page?"/>
<meta name="twitter:description" content="Steps on how to view the source code of any web page on the Internet."/>
<meta name="twitter:creator" content="@computerhope"/>
<!-- HTML5 fix -->
<!--[if lt IE 9]>
<script src="http://cdn.computerhope.com/html5shiv.js"></script>
<![endif]-->
<!DOCTYPE html>
<!--[if lt IE 7]> <html > <![endif]--><!--[if IE 7]> <html > <![endif]--><!--[if IE 8]> <html > <![endif]--><!--[if IE 9]> <html > <![endif]-->
<html lang="en" itemscope item>
<head>
<title>How do I view the source code of a web page?</title>
<link href="http://cdn.computerhope.com/site.css" rel="stylesheet"/>
<meta http-equiv="Content-Type" content="text/html;charset=utf-8"/>
<meta name="viewport" content="width=device-width, initial-scale=1.0"/>
<meta content="Steps on how to view the source code of any web page on the Internet." name="description"/>
<meta itemprop="name" content="How do I view the source code of a web page?"/>
<meta itemprop="description" content="Steps on how to view the source code of any web page on the Internet."/>
<meta property="og:description" content="Steps on how to view the source code of any web page on the Internet."/>
<meta property="og:title" content="How do I view the source code of a web page?"/>
<meta property="og:type" content="article"/>
<meta name="twitter:card" content="summary"/>
<meta name="twitter:title" content="How do I view the source code of a web page?"/>
<meta name="twitter:description" content="Steps on how to view the source code of any web page on the Internet."/>
<meta name="twitter:creator" content="@computerhope"/>
<!-- HTML5 fix -->
<!--[if lt IE 9]>
<script src="http://cdn.computerhope.com/html5shiv.js"></script>
<![endif]-->
Task 3 - E-commerce
With a partner, investigate the purchase of three very different products over the internet.
1. What is the most unusual product you can find for sale worldwide?
A booking for a seat on a rocket ship going into space - $250,000 each: http://www.virgingalactic.com/booking/
2. How will the payment be made?
Via credit card
3. Investigate the security and privacy policies for the sites chosen.
“This Privacy Policy applies only to information collected about you by or through the Site. This Privacy Policy does not cover any information collected through any other website or by third parties… We only use payment information as necessary to complete a particular transaction, fulfill a service, or as otherwise required by law.” - http://www.virgingalactic.com/privacy-policy/
4. Is it possible to return goods? Who pays for the return costs?
Deposits for the seats are refundable
With a partner, investigate the purchase of three very different products over the internet.
1. What is the most unusual product you can find for sale worldwide?
A booking for a seat on a rocket ship going into space - $250,000 each: http://www.virgingalactic.com/booking/
2. How will the payment be made?
Via credit card
3. Investigate the security and privacy policies for the sites chosen.
“This Privacy Policy applies only to information collected about you by or through the Site. This Privacy Policy does not cover any information collected through any other website or by third parties… We only use payment information as necessary to complete a particular transaction, fulfill a service, or as otherwise required by law.” - http://www.virgingalactic.com/privacy-policy/
4. Is it possible to return goods? Who pays for the return costs?
Deposits for the seats are refundable
Task 4 - Search engines
We will use Google, Yahoo and Bing to explore internet history.
1. Connect to the internet and go to the Google search engine.
2. Type ‘internet timeline’ and click search
3. Select wonder wheel from the left panel. Explore this graph.
4. Select timeline from the left panel
5. Select sites with images
6. Choose a topic you are interested in and know something about and comment on the quality and content using Google, Yahoo and Bing.
7. Create a table with three rows, one each for Google, Yahoo and Bing and with two columns: headed Strengths and Weaknesses, and use this to summarise the three sets of search results.
We will use Google, Yahoo and Bing to explore internet history.
1. Connect to the internet and go to the Google search engine.
2. Type ‘internet timeline’ and click search
3. Select wonder wheel from the left panel. Explore this graph.
4. Select timeline from the left panel
5. Select sites with images
6. Choose a topic you are interested in and know something about and comment on the quality and content using Google, Yahoo and Bing.
7. Create a table with three rows, one each for Google, Yahoo and Bing and with two columns: headed Strengths and Weaknesses, and use this to summarise the three sets of search results.
Activities
3. What is another name for advanced search on the internet?
Pro research
4. Chat (IRC) is a tool used on the internet for online keyboard conversations with other people. Name three other internet tools.
‘tile.net’ - Directory of email discussion lists
‘ipfinder.info’ - Displays your computer’s internet protocol address
‘Nslookup Def’ - Get internet protocol address or addresses based on a domain name
3. What is another name for advanced search on the internet?
Pro research
4. Chat (IRC) is a tool used on the internet for online keyboard conversations with other people. Name three other internet tools.
‘tile.net’ - Directory of email discussion lists
‘ipfinder.info’ - Displays your computer’s internet protocol address
‘Nslookup Def’ - Get internet protocol address or addresses based on a domain name
3. Option topic – Digital Media
The purpose of digital media
Identify five examples of digital media applications which have only existed in the past few years.
1. iTunes
2. Xbox Live
3. Shazam
4. Google Chrome
5. Instagram
3. State two examples of digital media products from each of the following areas
Arts and entertainment - Photoshop, iMovie
health - medical scanners, diagnostic equipment
commerce - online banking, ASX Stock Trading
5. Determine the current most popular game among your friends. Analyse what makes this popular compared to other games.
‘Piano Tiles’.
This game, that can be played on phones and tablets, is a piano keyboard simulator. Firstly I think the simplicity of the game attracts people to it, there are no fancy graphics or story lines. It is simply a game where the objective is to consecutively tap as many black square as you can before accidentally tapping a white tile. This game is popular among my friends because it is a very competitive game, the higher the score the better, it is a bit of healthy competition amongst your friends. I also think that this game is very popular because not only is it particularly addictive, it is not very hard, the more you play, the better you become at it.
Identify five examples of digital media applications which have only existed in the past few years.
1. iTunes
2. Xbox Live
3. Shazam
4. Google Chrome
5. Instagram
3. State two examples of digital media products from each of the following areas
Arts and entertainment - Photoshop, iMovie
health - medical scanners, diagnostic equipment
commerce - online banking, ASX Stock Trading
5. Determine the current most popular game among your friends. Analyse what makes this popular compared to other games.
‘Piano Tiles’.
This game, that can be played on phones and tablets, is a piano keyboard simulator. Firstly I think the simplicity of the game attracts people to it, there are no fancy graphics or story lines. It is simply a game where the objective is to consecutively tap as many black square as you can before accidentally tapping a white tile. This game is popular among my friends because it is a very competitive game, the higher the score the better, it is a bit of healthy competition amongst your friends. I also think that this game is very popular because not only is it particularly addictive, it is not very hard, the more you play, the better you become at it.
Digital Media Products
Task 3 - Draw Software
Use a vector based (draw) software package such as CorelDraw or Illustrator to imitate the illustration in Figure 11.14
1. Create the basic shapes needed
2. Add graduated fills to give an illusion of depth to the fish
Save this file with the name ‘yourname_draw’. We will later compare the size of this file to one produced using paint package.
Task 3 - Draw Software
Use a vector based (draw) software package such as CorelDraw or Illustrator to imitate the illustration in Figure 11.14
1. Create the basic shapes needed
2. Add graduated fills to give an illusion of depth to the fish
Save this file with the name ‘yourname_draw’. We will later compare the size of this file to one produced using paint package.
Task 4 - Paint Software
Use a bitmap-based (paint) software package, such as the paint tools of Painter or Photoshop, to create the same illustration as in the draw Task above.
1. Repeat steps 1-3 as in the Task above, but use the paint tools to achieve the same result.
2. Save this file with the name ‘yourname_paint’
3. Which task produced the largest file size - Task 3 or 4
Use a bitmap-based (paint) software package, such as the paint tools of Painter or Photoshop, to create the same illustration as in the draw Task above.
1. Repeat steps 1-3 as in the Task above, but use the paint tools to achieve the same result.
2. Save this file with the name ‘yourname_paint’
3. Which task produced the largest file size - Task 3 or 4
Pg. 184 - 185
Digital Media Projects
Task 6 - Animation (cel-based)
Create a short stop-motion animation, using only digital camera and any software capable of opening an image sequence.
1. Anchor the digital camera on a tripod or stand to keep it very still. Take at least 30 photos of a scene without moving the camera. For each photo, make a small change, such as an object slowly moving along a surface, or a person talking small steps. The changes must be small and sequential.
2. Import the photos into QuickTime or other movie-editing software as an image sequence. The images will already be automatically numbered by a camera. Display each image on screen for about 0.1 seconds.
3. View the final movie.
Digital Media Projects
Task 6 - Animation (cel-based)
Create a short stop-motion animation, using only digital camera and any software capable of opening an image sequence.
1. Anchor the digital camera on a tripod or stand to keep it very still. Take at least 30 photos of a scene without moving the camera. For each photo, make a small change, such as an object slowly moving along a surface, or a person talking small steps. The changes must be small and sequential.
2. Import the photos into QuickTime or other movie-editing software as an image sequence. The images will already be automatically numbered by a camera. Display each image on screen for about 0.1 seconds.
3. View the final movie.
BIBLIOGRAPHY:
Websites:
Author unknown, 2014, Augmented Reality - Facts & Figures, Active Media Innovations, Place of publication unknown, Available from: http://visual.ly/augmented-reality-facts-figures (accessed on 1st October 2014)
Author unknown, 2009, Enigma and Bletchley Park Codebreakers, Publisher unknown, Place of publication unknown, Available from: http://www.funtrivia.com/en/subtopics/enigma-and-bletchley-park-codebreakers-55231.html (Accessed on 25th September 2014)
Author unknown, 2008, The Babbage Engine, Computer History Museum, Place of publication unknown, Available from: http://www.computerhistory.org/babbage/adalovelace/ (Accessed on 25th September 2014)
Author unknown, 2014, How To Recycle Empty Ink and Toner Cartridges, MediaWiki, Place of publication unknown, Available from: http://www.wikihow.com/Recycle-Empty-Ink-and-Toner-Cartridges (accessed on 1st October 2014)
Author unknown, 2005, Codebreaking Success, CommsBox, Place of publication unknown, Available from: http://www.bletchleypark.org.uk/content/hist/worldwartwo/impact.rhtm (Accessed on 2nd October 2014)
Author unknown, 2013, Swico Recycling, Escapenet, Zurich, Available from: http://www.swicorecycling.ch/en/home (Accessed on 2nd October 2014)
Author unknown, 2014, Computer Recycling, WikiMedia, Place of publication unknown, Available from: http://en.wikipedia.org/wiki/Computer_recycling (Accessed on 24th September 2014)
http://en.wikipedia.org/wiki/HTML_element (Accessed on 5th September 2014)
Author unknown, 2014, HTML Element, WikiMedia, Place of publication unknown, Available from: http://www.webopedia.com/TERM/M/Moores_Law.html (Accessed on 5th September 2014)
Author unknown, 2009, Booking - Virgin Galactic, Virgin Galactic, Place of publication unknown, Available from: http://www.virgingalactic.com/booking/ (Accessed on 25th September 2014)
Books:
Information and Software Technology, Second Edition
Websites:
Author unknown, 2014, Augmented Reality - Facts & Figures, Active Media Innovations, Place of publication unknown, Available from: http://visual.ly/augmented-reality-facts-figures (accessed on 1st October 2014)
Author unknown, 2009, Enigma and Bletchley Park Codebreakers, Publisher unknown, Place of publication unknown, Available from: http://www.funtrivia.com/en/subtopics/enigma-and-bletchley-park-codebreakers-55231.html (Accessed on 25th September 2014)
Author unknown, 2008, The Babbage Engine, Computer History Museum, Place of publication unknown, Available from: http://www.computerhistory.org/babbage/adalovelace/ (Accessed on 25th September 2014)
Author unknown, 2014, How To Recycle Empty Ink and Toner Cartridges, MediaWiki, Place of publication unknown, Available from: http://www.wikihow.com/Recycle-Empty-Ink-and-Toner-Cartridges (accessed on 1st October 2014)
Author unknown, 2005, Codebreaking Success, CommsBox, Place of publication unknown, Available from: http://www.bletchleypark.org.uk/content/hist/worldwartwo/impact.rhtm (Accessed on 2nd October 2014)
Author unknown, 2013, Swico Recycling, Escapenet, Zurich, Available from: http://www.swicorecycling.ch/en/home (Accessed on 2nd October 2014)
Author unknown, 2014, Computer Recycling, WikiMedia, Place of publication unknown, Available from: http://en.wikipedia.org/wiki/Computer_recycling (Accessed on 24th September 2014)
http://en.wikipedia.org/wiki/HTML_element (Accessed on 5th September 2014)
Author unknown, 2014, HTML Element, WikiMedia, Place of publication unknown, Available from: http://www.webopedia.com/TERM/M/Moores_Law.html (Accessed on 5th September 2014)
Author unknown, 2009, Booking - Virgin Galactic, Virgin Galactic, Place of publication unknown, Available from: http://www.virgingalactic.com/booking/ (Accessed on 25th September 2014)
Books:
Information and Software Technology, Second Edition