SlideShare a Scribd company logo
Group 4 Ancillaries
      Draft 5



Karolina Fryckowska
        5101

  Donnielle Carino
       5057

Michelle Asafu-Adjaye
         5011

Jayde Marie Jackson
       5130
Group 4 Newspaper Advert - Draft 4


                   Is
        Technology develping too
                quickly ?




                       Evolution of Technology
                       Tuesday 9pm
Group 4 Double Page Spread - Draft 4




                                                       “
                                                                                      Are We
                                                                                  Technomaniacs?
                                                           Th
                                                        abo ose co
                                                     sho ut te ncer
                                                         uld     c         n
                                                     is n     rea hnolog ed
                                                          ow     lise       y
                                                              ess      tha
                                                                  ent      t it
                                                                      ial.
                                                                          ”       From phones to games, the evolution of
                                                                                          technology has it all.


                                                                                  “   S ociety about been con-
                                                                                        cerned
                                                                                               has
                                                                                                      technology
                                                                                                                    cluding facebook.

                                                                                  for many years, it’s nothing      “We explore the changes of
                                                                                  new.                              technology from when they
                                                                                                                    were first developed to the
                                                                                  I’ve spoken to many people,       modern day. Those con-
                                                                                   and most of their problems       cerned about technology
                                                                                  are privacy and security is-      should realise that it is now
                                                                                  sues such as banking infor-       essential. People are often
                                                                                  mation being stolen, private      asked for mobile numbers
                                                                                  details being published and       and email addresses, espe-
                                                                                  security problems within the      cially when applying for jobs.
                                                                                  government.” This is under-       This just goes to show how
                                                                                  standable as many scams are       crucial technology is.”
                                                                                  online and there have been
                                                                                  issues about phishing sites
                                                                                  which gather information, in-


   20 www.timeout.com/london February 22 - 29 2012                                                            February 22 - 29 2012 www.timeout.com/london 20

More Related Content

Viewers also liked

Assignment 9 better part 1
Assignment 9 better part 1Assignment 9 better part 1
Assignment 9 better part 1mich_angel
 
Group 4 final_draft_ancillary
Group 4 final_draft_ancillaryGroup 4 final_draft_ancillary
Group 4 final_draft_ancillarymich_angel
 
Group 4 ancillaries draft 3
Group 4 ancillaries draft 3Group 4 ancillaries draft 3
Group 4 ancillaries draft 3mich_angel
 
Evaluation powerpiont
Evaluation powerpiontEvaluation powerpiont
Evaluation powerpiontmich_angel
 
Analysis of year 13
Analysis of year 13Analysis of year 13
Analysis of year 13mich_angel
 
Assignment 9 better part 2
Assignment 9 better part 2Assignment 9 better part 2
Assignment 9 better part 2mich_angel
 
Assignment 9 better part 3
Assignment 9 better part 3Assignment 9 better part 3
Assignment 9 better part 3mich_angel
 
Group 4 ancillaries_-_draft_1
Group 4 ancillaries_-_draft_1Group 4 ancillaries_-_draft_1
Group 4 ancillaries_-_draft_1mich_angel
 
Newspaper dblpgspread-inhere
Newspaper dblpgspread-inhereNewspaper dblpgspread-inhere
Newspaper dblpgspread-inheremich_angel
 
Christmas2011
Christmas2011Christmas2011
Christmas2011
Tallmark
 
Tv channel research
Tv channel research Tv channel research
Tv channel research mich_angel
 
Tv channel research
Tv channel research Tv channel research
Tv channel research mich_angel
 
Documentary ideas
Documentary ideasDocumentary ideas
Documentary ideasmich_angel
 
Conventions of documentaries
Conventions of documentariesConventions of documentaries
Conventions of documentaries
mich_angel
 

Viewers also liked (18)

Assignment 9 better part 1
Assignment 9 better part 1Assignment 9 better part 1
Assignment 9 better part 1
 
Part 4
Part 4 Part 4
Part 4
 
Group 4 final_draft_ancillary
Group 4 final_draft_ancillaryGroup 4 final_draft_ancillary
Group 4 final_draft_ancillary
 
Part two
Part twoPart two
Part two
 
Group 4 ancillaries draft 3
Group 4 ancillaries draft 3Group 4 ancillaries draft 3
Group 4 ancillaries draft 3
 
Evaluation powerpiont
Evaluation powerpiontEvaluation powerpiont
Evaluation powerpiont
 
Analysis of year 13
Analysis of year 13Analysis of year 13
Analysis of year 13
 
Documentaries
DocumentariesDocumentaries
Documentaries
 
Assignment 9 better part 2
Assignment 9 better part 2Assignment 9 better part 2
Assignment 9 better part 2
 
Assignment 9 better part 3
Assignment 9 better part 3Assignment 9 better part 3
Assignment 9 better part 3
 
Group 4 ancillaries_-_draft_1
Group 4 ancillaries_-_draft_1Group 4 ancillaries_-_draft_1
Group 4 ancillaries_-_draft_1
 
Newspaper dblpgspread-inhere
Newspaper dblpgspread-inhereNewspaper dblpgspread-inhere
Newspaper dblpgspread-inhere
 
Christmas2011
Christmas2011Christmas2011
Christmas2011
 
Evaluation
EvaluationEvaluation
Evaluation
 
Tv channel research
Tv channel research Tv channel research
Tv channel research
 
Tv channel research
Tv channel research Tv channel research
Tv channel research
 
Documentary ideas
Documentary ideasDocumentary ideas
Documentary ideas
 
Conventions of documentaries
Conventions of documentariesConventions of documentaries
Conventions of documentaries
 

Similar to Group 4 ancillary draft 4

Group 4 final_draft_ancillary
Group 4 final_draft_ancillaryGroup 4 final_draft_ancillary
Group 4 final_draft_ancillaryJayde-Marie
 
Ancillaries draft 2
Ancillaries draft 2Ancillaries draft 2
Ancillaries draft 2Jayde-Marie
 
Group 4 ancillaries_-_draft_2
Group 4 ancillaries_-_draft_2Group 4 ancillaries_-_draft_2
Group 4 ancillaries_-_draft_2Jayde-Marie
 
Group 4 ancillaries draft 2
Group 4 ancillaries   draft 2Group 4 ancillaries   draft 2
Group 4 ancillaries draft 2mich_angel
 
Romero technology
Romero technologyRomero technology
Romero technology
PrincessRaquiza
 
Romero technology
Romero technologyRomero technology
Romero technology
PrincessRaquiza
 
negative aspects of I.T.
negative aspects of I.T.negative aspects of I.T.
negative aspects of I.T.
Hriday Vittal
 
EMPOWERMENT TECHNOLOGY (INTRODUCTION TO INFORMATION COMMUNICATION TECHNOLOGY)
EMPOWERMENT TECHNOLOGY (INTRODUCTION TO INFORMATION COMMUNICATION TECHNOLOGY)EMPOWERMENT TECHNOLOGY (INTRODUCTION TO INFORMATION COMMUNICATION TECHNOLOGY)
EMPOWERMENT TECHNOLOGY (INTRODUCTION TO INFORMATION COMMUNICATION TECHNOLOGY)
bloodyblade06
 
Martin Geddes Hypervoice Keynote
Martin Geddes Hypervoice KeynoteMartin Geddes Hypervoice Keynote
Martin Geddes Hypervoice Keynote
Metaswitch
 
Technology conversion- Interconnection of digital technologies
Technology conversion- Interconnection of digital technologiesTechnology conversion- Interconnection of digital technologies
Technology conversion- Interconnection of digital technologies
Deepika Ojha
 
Martin Geddes - Hypervoice keynote
Martin Geddes - Hypervoice keynoteMartin Geddes - Hypervoice keynote
Martin Geddes - Hypervoice keynoteMartin Geddes
 
Future Agenda Future Of Authenticity
Future Agenda   Future Of AuthenticityFuture Agenda   Future Of Authenticity
Future Agenda Future Of Authenticity
Future Agenda
 
The ‘M Age’ And Beyond
The ‘M Age’ And BeyondThe ‘M Age’ And Beyond
The ‘M Age’ And Beyond
hudsonpd
 
The future of technology final project
The future of technology final projectThe future of technology final project
The future of technology final project
gmsalv02
 
Inria - 2011 annual report
Inria - 2011 annual reportInria - 2011 annual report
Inria - 2011 annual report
Inria
 
Saiful Hidayat Santri Indigo Pondok Gontor Ponorogo Internet Dan It Sebagai...
Saiful Hidayat Santri Indigo Pondok Gontor Ponorogo   Internet Dan It Sebagai...Saiful Hidayat Santri Indigo Pondok Gontor Ponorogo   Internet Dan It Sebagai...
Saiful Hidayat Santri Indigo Pondok Gontor Ponorogo Internet Dan It Sebagai...
Saiful Hidayat
 
Future Internet Enterprise Systems
Future Internet Enterprise Systems Future Internet Enterprise Systems
Future Internet Enterprise Systems
ictseserv
 
New technologies
New technologiesNew technologies
New technologies
Chandrakantha11
 
Lesson-1-Technological-Compentency (TECHNOLOGY 200)
Lesson-1-Technological-Compentency (TECHNOLOGY 200)Lesson-1-Technological-Compentency (TECHNOLOGY 200)
Lesson-1-Technological-Compentency (TECHNOLOGY 200)
CiaraAbila
 
DEMO Teaching COT2 JUNE 23, 2021 TRENDS.pptx
DEMO Teaching COT2 JUNE 23, 2021 TRENDS.pptxDEMO Teaching COT2 JUNE 23, 2021 TRENDS.pptx
DEMO Teaching COT2 JUNE 23, 2021 TRENDS.pptx
MariahJezzaClaireDap
 

Similar to Group 4 ancillary draft 4 (20)

Group 4 final_draft_ancillary
Group 4 final_draft_ancillaryGroup 4 final_draft_ancillary
Group 4 final_draft_ancillary
 
Ancillaries draft 2
Ancillaries draft 2Ancillaries draft 2
Ancillaries draft 2
 
Group 4 ancillaries_-_draft_2
Group 4 ancillaries_-_draft_2Group 4 ancillaries_-_draft_2
Group 4 ancillaries_-_draft_2
 
Group 4 ancillaries draft 2
Group 4 ancillaries   draft 2Group 4 ancillaries   draft 2
Group 4 ancillaries draft 2
 
Romero technology
Romero technologyRomero technology
Romero technology
 
Romero technology
Romero technologyRomero technology
Romero technology
 
negative aspects of I.T.
negative aspects of I.T.negative aspects of I.T.
negative aspects of I.T.
 
EMPOWERMENT TECHNOLOGY (INTRODUCTION TO INFORMATION COMMUNICATION TECHNOLOGY)
EMPOWERMENT TECHNOLOGY (INTRODUCTION TO INFORMATION COMMUNICATION TECHNOLOGY)EMPOWERMENT TECHNOLOGY (INTRODUCTION TO INFORMATION COMMUNICATION TECHNOLOGY)
EMPOWERMENT TECHNOLOGY (INTRODUCTION TO INFORMATION COMMUNICATION TECHNOLOGY)
 
Martin Geddes Hypervoice Keynote
Martin Geddes Hypervoice KeynoteMartin Geddes Hypervoice Keynote
Martin Geddes Hypervoice Keynote
 
Technology conversion- Interconnection of digital technologies
Technology conversion- Interconnection of digital technologiesTechnology conversion- Interconnection of digital technologies
Technology conversion- Interconnection of digital technologies
 
Martin Geddes - Hypervoice keynote
Martin Geddes - Hypervoice keynoteMartin Geddes - Hypervoice keynote
Martin Geddes - Hypervoice keynote
 
Future Agenda Future Of Authenticity
Future Agenda   Future Of AuthenticityFuture Agenda   Future Of Authenticity
Future Agenda Future Of Authenticity
 
The ‘M Age’ And Beyond
The ‘M Age’ And BeyondThe ‘M Age’ And Beyond
The ‘M Age’ And Beyond
 
The future of technology final project
The future of technology final projectThe future of technology final project
The future of technology final project
 
Inria - 2011 annual report
Inria - 2011 annual reportInria - 2011 annual report
Inria - 2011 annual report
 
Saiful Hidayat Santri Indigo Pondok Gontor Ponorogo Internet Dan It Sebagai...
Saiful Hidayat Santri Indigo Pondok Gontor Ponorogo   Internet Dan It Sebagai...Saiful Hidayat Santri Indigo Pondok Gontor Ponorogo   Internet Dan It Sebagai...
Saiful Hidayat Santri Indigo Pondok Gontor Ponorogo Internet Dan It Sebagai...
 
Future Internet Enterprise Systems
Future Internet Enterprise Systems Future Internet Enterprise Systems
Future Internet Enterprise Systems
 
New technologies
New technologiesNew technologies
New technologies
 
Lesson-1-Technological-Compentency (TECHNOLOGY 200)
Lesson-1-Technological-Compentency (TECHNOLOGY 200)Lesson-1-Technological-Compentency (TECHNOLOGY 200)
Lesson-1-Technological-Compentency (TECHNOLOGY 200)
 
DEMO Teaching COT2 JUNE 23, 2021 TRENDS.pptx
DEMO Teaching COT2 JUNE 23, 2021 TRENDS.pptxDEMO Teaching COT2 JUNE 23, 2021 TRENDS.pptx
DEMO Teaching COT2 JUNE 23, 2021 TRENDS.pptx
 

More from mich_angel

Evaluation part two
Evaluation part twoEvaluation part two
Evaluation part twomich_angel
 
Ancillaries inspirations
Ancillaries inspirationsAncillaries inspirations
Ancillaries inspirationsmich_angel
 
assignment 9 draft two
assignment 9 draft twoassignment 9 draft two
assignment 9 draft twomich_angel
 
Script draft one
Script draft oneScript draft one
Script draft onemich_angel
 
Script draft three
Script draft threeScript draft three
Script draft threemich_angel
 
Script draft two (1)
Script draft two (1)Script draft two (1)
Script draft two (1)mich_angel
 
Ancillaries for advert kjmd
Ancillaries for advert kjmdAncillaries for advert kjmd
Ancillaries for advert kjmdmich_angel
 

More from mich_angel (10)

Evaluation part two
Evaluation part twoEvaluation part two
Evaluation part two
 
Ancillaries inspirations
Ancillaries inspirationsAncillaries inspirations
Ancillaries inspirations
 
Question 2
Question 2 Question 2
Question 2
 
Part five
Part fivePart five
Part five
 
Part three
Part three Part three
Part three
 
assignment 9 draft two
assignment 9 draft twoassignment 9 draft two
assignment 9 draft two
 
Script draft one
Script draft oneScript draft one
Script draft one
 
Script draft three
Script draft threeScript draft three
Script draft three
 
Script draft two (1)
Script draft two (1)Script draft two (1)
Script draft two (1)
 
Ancillaries for advert kjmd
Ancillaries for advert kjmdAncillaries for advert kjmd
Ancillaries for advert kjmd
 

Recently uploaded

Introduction to CHERI technology - Cybersecurity
Introduction to CHERI technology - CybersecurityIntroduction to CHERI technology - Cybersecurity
Introduction to CHERI technology - Cybersecurity
mikeeftimakis1
 
Pushing the limits of ePRTC: 100ns holdover for 100 days
Pushing the limits of ePRTC: 100ns holdover for 100 daysPushing the limits of ePRTC: 100ns holdover for 100 days
Pushing the limits of ePRTC: 100ns holdover for 100 days
Adtran
 
zkStudyClub - Reef: Fast Succinct Non-Interactive Zero-Knowledge Regex Proofs
zkStudyClub - Reef: Fast Succinct Non-Interactive Zero-Knowledge Regex ProofszkStudyClub - Reef: Fast Succinct Non-Interactive Zero-Knowledge Regex Proofs
zkStudyClub - Reef: Fast Succinct Non-Interactive Zero-Knowledge Regex Proofs
Alex Pruden
 
Why You Should Replace Windows 11 with Nitrux Linux 3.5.0 for enhanced perfor...
Why You Should Replace Windows 11 with Nitrux Linux 3.5.0 for enhanced perfor...Why You Should Replace Windows 11 with Nitrux Linux 3.5.0 for enhanced perfor...
Why You Should Replace Windows 11 with Nitrux Linux 3.5.0 for enhanced perfor...
SOFTTECHHUB
 
GridMate - End to end testing is a critical piece to ensure quality and avoid...
GridMate - End to end testing is a critical piece to ensure quality and avoid...GridMate - End to end testing is a critical piece to ensure quality and avoid...
GridMate - End to end testing is a critical piece to ensure quality and avoid...
ThomasParaiso2
 
20 Comprehensive Checklist of Designing and Developing a Website
20 Comprehensive Checklist of Designing and Developing a Website20 Comprehensive Checklist of Designing and Developing a Website
20 Comprehensive Checklist of Designing and Developing a Website
Pixlogix Infotech
 
Microsoft - Power Platform_G.Aspiotis.pdf
Microsoft - Power Platform_G.Aspiotis.pdfMicrosoft - Power Platform_G.Aspiotis.pdf
Microsoft - Power Platform_G.Aspiotis.pdf
Uni Systems S.M.S.A.
 
PCI PIN Basics Webinar from the Controlcase Team
PCI PIN Basics Webinar from the Controlcase TeamPCI PIN Basics Webinar from the Controlcase Team
PCI PIN Basics Webinar from the Controlcase Team
ControlCase
 
Encryption in Microsoft 365 - ExpertsLive Netherlands 2024
Encryption in Microsoft 365 - ExpertsLive Netherlands 2024Encryption in Microsoft 365 - ExpertsLive Netherlands 2024
Encryption in Microsoft 365 - ExpertsLive Netherlands 2024
Albert Hoitingh
 
20240607 QFM018 Elixir Reading List May 2024
20240607 QFM018 Elixir Reading List May 202420240607 QFM018 Elixir Reading List May 2024
20240607 QFM018 Elixir Reading List May 2024
Matthew Sinclair
 
How to Get CNIC Information System with Paksim Ga.pptx
How to Get CNIC Information System with Paksim Ga.pptxHow to Get CNIC Information System with Paksim Ga.pptx
How to Get CNIC Information System with Paksim Ga.pptx
danishmna97
 
GraphSummit Singapore | The Art of the Possible with Graph - Q2 2024
GraphSummit Singapore | The Art of the  Possible with Graph - Q2 2024GraphSummit Singapore | The Art of the  Possible with Graph - Q2 2024
GraphSummit Singapore | The Art of the Possible with Graph - Q2 2024
Neo4j
 
Alt. GDG Cloud Southlake #33: Boule & Rebala: Effective AppSec in SDLC using ...
Alt. GDG Cloud Southlake #33: Boule & Rebala: Effective AppSec in SDLC using ...Alt. GDG Cloud Southlake #33: Boule & Rebala: Effective AppSec in SDLC using ...
Alt. GDG Cloud Southlake #33: Boule & Rebala: Effective AppSec in SDLC using ...
James Anderson
 
LF Energy Webinar: Electrical Grid Modelling and Simulation Through PowSyBl -...
LF Energy Webinar: Electrical Grid Modelling and Simulation Through PowSyBl -...LF Energy Webinar: Electrical Grid Modelling and Simulation Through PowSyBl -...
LF Energy Webinar: Electrical Grid Modelling and Simulation Through PowSyBl -...
DanBrown980551
 
Communications Mining Series - Zero to Hero - Session 1
Communications Mining Series - Zero to Hero - Session 1Communications Mining Series - Zero to Hero - Session 1
Communications Mining Series - Zero to Hero - Session 1
DianaGray10
 
GraphSummit Singapore | Graphing Success: Revolutionising Organisational Stru...
GraphSummit Singapore | Graphing Success: Revolutionising Organisational Stru...GraphSummit Singapore | Graphing Success: Revolutionising Organisational Stru...
GraphSummit Singapore | Graphing Success: Revolutionising Organisational Stru...
Neo4j
 
Enchancing adoption of Open Source Libraries. A case study on Albumentations.AI
Enchancing adoption of Open Source Libraries. A case study on Albumentations.AIEnchancing adoption of Open Source Libraries. A case study on Albumentations.AI
Enchancing adoption of Open Source Libraries. A case study on Albumentations.AI
Vladimir Iglovikov, Ph.D.
 
Climate Impact of Software Testing at Nordic Testing Days
Climate Impact of Software Testing at Nordic Testing DaysClimate Impact of Software Testing at Nordic Testing Days
Climate Impact of Software Testing at Nordic Testing Days
Kari Kakkonen
 
National Security Agency - NSA mobile device best practices
National Security Agency - NSA mobile device best practicesNational Security Agency - NSA mobile device best practices
National Security Agency - NSA mobile device best practices
Quotidiano Piemontese
 
Large Language Model (LLM) and it’s Geospatial Applications
Large Language Model (LLM) and it’s Geospatial ApplicationsLarge Language Model (LLM) and it’s Geospatial Applications
Large Language Model (LLM) and it’s Geospatial Applications
Rohit Gautam
 

Recently uploaded (20)

Introduction to CHERI technology - Cybersecurity
Introduction to CHERI technology - CybersecurityIntroduction to CHERI technology - Cybersecurity
Introduction to CHERI technology - Cybersecurity
 
Pushing the limits of ePRTC: 100ns holdover for 100 days
Pushing the limits of ePRTC: 100ns holdover for 100 daysPushing the limits of ePRTC: 100ns holdover for 100 days
Pushing the limits of ePRTC: 100ns holdover for 100 days
 
zkStudyClub - Reef: Fast Succinct Non-Interactive Zero-Knowledge Regex Proofs
zkStudyClub - Reef: Fast Succinct Non-Interactive Zero-Knowledge Regex ProofszkStudyClub - Reef: Fast Succinct Non-Interactive Zero-Knowledge Regex Proofs
zkStudyClub - Reef: Fast Succinct Non-Interactive Zero-Knowledge Regex Proofs
 
Why You Should Replace Windows 11 with Nitrux Linux 3.5.0 for enhanced perfor...
Why You Should Replace Windows 11 with Nitrux Linux 3.5.0 for enhanced perfor...Why You Should Replace Windows 11 with Nitrux Linux 3.5.0 for enhanced perfor...
Why You Should Replace Windows 11 with Nitrux Linux 3.5.0 for enhanced perfor...
 
GridMate - End to end testing is a critical piece to ensure quality and avoid...
GridMate - End to end testing is a critical piece to ensure quality and avoid...GridMate - End to end testing is a critical piece to ensure quality and avoid...
GridMate - End to end testing is a critical piece to ensure quality and avoid...
 
20 Comprehensive Checklist of Designing and Developing a Website
20 Comprehensive Checklist of Designing and Developing a Website20 Comprehensive Checklist of Designing and Developing a Website
20 Comprehensive Checklist of Designing and Developing a Website
 
Microsoft - Power Platform_G.Aspiotis.pdf
Microsoft - Power Platform_G.Aspiotis.pdfMicrosoft - Power Platform_G.Aspiotis.pdf
Microsoft - Power Platform_G.Aspiotis.pdf
 
PCI PIN Basics Webinar from the Controlcase Team
PCI PIN Basics Webinar from the Controlcase TeamPCI PIN Basics Webinar from the Controlcase Team
PCI PIN Basics Webinar from the Controlcase Team
 
Encryption in Microsoft 365 - ExpertsLive Netherlands 2024
Encryption in Microsoft 365 - ExpertsLive Netherlands 2024Encryption in Microsoft 365 - ExpertsLive Netherlands 2024
Encryption in Microsoft 365 - ExpertsLive Netherlands 2024
 
20240607 QFM018 Elixir Reading List May 2024
20240607 QFM018 Elixir Reading List May 202420240607 QFM018 Elixir Reading List May 2024
20240607 QFM018 Elixir Reading List May 2024
 
How to Get CNIC Information System with Paksim Ga.pptx
How to Get CNIC Information System with Paksim Ga.pptxHow to Get CNIC Information System with Paksim Ga.pptx
How to Get CNIC Information System with Paksim Ga.pptx
 
GraphSummit Singapore | The Art of the Possible with Graph - Q2 2024
GraphSummit Singapore | The Art of the  Possible with Graph - Q2 2024GraphSummit Singapore | The Art of the  Possible with Graph - Q2 2024
GraphSummit Singapore | The Art of the Possible with Graph - Q2 2024
 
Alt. GDG Cloud Southlake #33: Boule & Rebala: Effective AppSec in SDLC using ...
Alt. GDG Cloud Southlake #33: Boule & Rebala: Effective AppSec in SDLC using ...Alt. GDG Cloud Southlake #33: Boule & Rebala: Effective AppSec in SDLC using ...
Alt. GDG Cloud Southlake #33: Boule & Rebala: Effective AppSec in SDLC using ...
 
LF Energy Webinar: Electrical Grid Modelling and Simulation Through PowSyBl -...
LF Energy Webinar: Electrical Grid Modelling and Simulation Through PowSyBl -...LF Energy Webinar: Electrical Grid Modelling and Simulation Through PowSyBl -...
LF Energy Webinar: Electrical Grid Modelling and Simulation Through PowSyBl -...
 
Communications Mining Series - Zero to Hero - Session 1
Communications Mining Series - Zero to Hero - Session 1Communications Mining Series - Zero to Hero - Session 1
Communications Mining Series - Zero to Hero - Session 1
 
GraphSummit Singapore | Graphing Success: Revolutionising Organisational Stru...
GraphSummit Singapore | Graphing Success: Revolutionising Organisational Stru...GraphSummit Singapore | Graphing Success: Revolutionising Organisational Stru...
GraphSummit Singapore | Graphing Success: Revolutionising Organisational Stru...
 
Enchancing adoption of Open Source Libraries. A case study on Albumentations.AI
Enchancing adoption of Open Source Libraries. A case study on Albumentations.AIEnchancing adoption of Open Source Libraries. A case study on Albumentations.AI
Enchancing adoption of Open Source Libraries. A case study on Albumentations.AI
 
Climate Impact of Software Testing at Nordic Testing Days
Climate Impact of Software Testing at Nordic Testing DaysClimate Impact of Software Testing at Nordic Testing Days
Climate Impact of Software Testing at Nordic Testing Days
 
National Security Agency - NSA mobile device best practices
National Security Agency - NSA mobile device best practicesNational Security Agency - NSA mobile device best practices
National Security Agency - NSA mobile device best practices
 
Large Language Model (LLM) and it’s Geospatial Applications
Large Language Model (LLM) and it’s Geospatial ApplicationsLarge Language Model (LLM) and it’s Geospatial Applications
Large Language Model (LLM) and it’s Geospatial Applications
 

Group 4 ancillary draft 4

  • 1. Group 4 Ancillaries Draft 5 Karolina Fryckowska 5101 Donnielle Carino 5057 Michelle Asafu-Adjaye 5011 Jayde Marie Jackson 5130
  • 2. Group 4 Newspaper Advert - Draft 4 Is Technology develping too quickly ? Evolution of Technology Tuesday 9pm
  • 3. Group 4 Double Page Spread - Draft 4 “ Are We Technomaniacs? Th abo ose co sho ut te ncer uld c n is n rea hnolog ed ow lise y ess tha ent t it ial. ” From phones to games, the evolution of technology has it all. “ S ociety about been con- cerned has technology cluding facebook. for many years, it’s nothing “We explore the changes of new. technology from when they were first developed to the I’ve spoken to many people, modern day. Those con- and most of their problems cerned about technology are privacy and security is- should realise that it is now sues such as banking infor- essential. People are often mation being stolen, private asked for mobile numbers details being published and and email addresses, espe- security problems within the cially when applying for jobs. government.” This is under- This just goes to show how standable as many scams are crucial technology is.” online and there have been issues about phishing sites which gather information, in- 20 www.timeout.com/london February 22 - 29 2012 February 22 - 29 2012 www.timeout.com/london 20