Keynote address (Feb, 2016) to the educators in the Fort Nelson school district. We all know that we cannot teach a child without a concection... without a relationship. In the hustle and bustle of our jobs as educators, we often forget our why, the reason we got into education, of trying to make a difference with kids. In this talk, 6 Keys to Connecting are shared and discussed with the challenge of creating a more positive climate and better connections with kids in our classrooms, schools, and organizations.
This document provides an introduction to multimedia, covering key concepts such as types of images (bitmap, vector), fonts, audio, animation, and interactive objects. It discusses how multimedia can be used for purposes like education, training, entertainment and advertisements. Interactive multimedia allows users to control presentations, while non-interactive multimedia does not.
1) A bit is the smallest unit of computer data and can have a value of 0 or 1. 8 bits form a byte.
2) Common units of computer data storage are the kilobyte (KB), megabyte (MB), gigabyte (GB), terabyte (TB), petabyte (PB), exabyte (EB), zettabyte (ZB), and yottabyte (YB), with each being 1024 times larger than the previous unit.
3) These units are used to measure and describe computer memory, storage, and data transmission speeds in bytes, kilobytes, megabytes etc. depending on the size of the data or storage being referred to
Satellites orbit planets due to a balance between gravitational and centrifugal forces. They move at high speeds, around 17,000 mph, to maintain stable orbits. Satellites can be polar, geosynchronous, or geostationary depending on their orbit and purpose. Polar satellites hover over the poles to monitor the entire planet, while geosynchronous/geostationary satellites remain fixed over one location to communicate with receivers below. Satellites have transmitters to send signals, receivers to receive signals, and transponders that handle communication functions.
RFID is a Radio Frequency Identification Device that is used in shopping malls to help prevent theft. If a customer leaves the store without paying for an item that has an RFID tag, the tag will set off an alarm at the exit to alert staff. RFID tags allow items to be tracked wirelessly using radio waves rather than physically scanning each item like a barcode.
This document discusses ways to promote a business through advertisements, guided tours, creative ice breakers, packing products for shipping, and uses in education. It also briefly mentions the circulatory system and how students are often on devices where QR code readers can save searches.
QR codes were first created in 1994 by Denso Wave to track vehicle parts during manufacturing. While initially used for logistics and production tracking, QR codes are now commonly used for mobile ticketing and marketing to provide extra information to viewers. However, QR codes often fail because the content is not optimized for mobile use and there is no way to track metrics like number of scans and viewer location. The document discusses the history of QR codes and barcodes, actual uses of QR codes, limitations of QR codes, examples of QR code use, alternatives to QR codes, and poses questions about improving QR codes.
Barcodes and QR codes are machine-readable codes that contain information about an object. Barcodes use a pattern of bars and spaces that are scanned by light, while QR codes use a two-dimensional matrix that can be scanned by smartphones. Common barcode types include Code 39 for non-retail uses and Code 128 for shipping and retail, while QR codes are most commonly used with mobile devices to link to websites or send SMS messages. Both barcodes and QR codes require a quiet zone around the code and are interpreted by scanners or smartphone apps that convert the light reflection or image into readable digital information.
Keynote address (Feb, 2016) to the educators in the Fort Nelson school district. We all know that we cannot teach a child without a concection... without a relationship. In the hustle and bustle of our jobs as educators, we often forget our why, the reason we got into education, of trying to make a difference with kids. In this talk, 6 Keys to Connecting are shared and discussed with the challenge of creating a more positive climate and better connections with kids in our classrooms, schools, and organizations.
This document provides an introduction to multimedia, covering key concepts such as types of images (bitmap, vector), fonts, audio, animation, and interactive objects. It discusses how multimedia can be used for purposes like education, training, entertainment and advertisements. Interactive multimedia allows users to control presentations, while non-interactive multimedia does not.
1) A bit is the smallest unit of computer data and can have a value of 0 or 1. 8 bits form a byte.
2) Common units of computer data storage are the kilobyte (KB), megabyte (MB), gigabyte (GB), terabyte (TB), petabyte (PB), exabyte (EB), zettabyte (ZB), and yottabyte (YB), with each being 1024 times larger than the previous unit.
3) These units are used to measure and describe computer memory, storage, and data transmission speeds in bytes, kilobytes, megabytes etc. depending on the size of the data or storage being referred to
Satellites orbit planets due to a balance between gravitational and centrifugal forces. They move at high speeds, around 17,000 mph, to maintain stable orbits. Satellites can be polar, geosynchronous, or geostationary depending on their orbit and purpose. Polar satellites hover over the poles to monitor the entire planet, while geosynchronous/geostationary satellites remain fixed over one location to communicate with receivers below. Satellites have transmitters to send signals, receivers to receive signals, and transponders that handle communication functions.
RFID is a Radio Frequency Identification Device that is used in shopping malls to help prevent theft. If a customer leaves the store without paying for an item that has an RFID tag, the tag will set off an alarm at the exit to alert staff. RFID tags allow items to be tracked wirelessly using radio waves rather than physically scanning each item like a barcode.
This document discusses ways to promote a business through advertisements, guided tours, creative ice breakers, packing products for shipping, and uses in education. It also briefly mentions the circulatory system and how students are often on devices where QR code readers can save searches.
QR codes were first created in 1994 by Denso Wave to track vehicle parts during manufacturing. While initially used for logistics and production tracking, QR codes are now commonly used for mobile ticketing and marketing to provide extra information to viewers. However, QR codes often fail because the content is not optimized for mobile use and there is no way to track metrics like number of scans and viewer location. The document discusses the history of QR codes and barcodes, actual uses of QR codes, limitations of QR codes, examples of QR code use, alternatives to QR codes, and poses questions about improving QR codes.
Barcodes and QR codes are machine-readable codes that contain information about an object. Barcodes use a pattern of bars and spaces that are scanned by light, while QR codes use a two-dimensional matrix that can be scanned by smartphones. Common barcode types include Code 39 for non-retail uses and Code 128 for shipping and retail, while QR codes are most commonly used with mobile devices to link to websites or send SMS messages. Both barcodes and QR codes require a quiet zone around the code and are interpreted by scanners or smartphone apps that convert the light reflection or image into readable digital information.
TeamViewer is a proprietary computer software package for remote control, desktop sharing, online meetings, web conferencing and file transfer between computers. It allows users to remotely access and control another personal computer with a graphical user interface over the Internet. TeamViewer is cross-platform, running on Microsoft Windows, macOS, Linux, iOS and Android.
How does TeamViewer work?
TeamViewer uses peer-to-peer technology to establish a secure connection between two computers running the TeamViewer software. Once installed, the software generates a randomly assigned ID number and password to identify the local computer. This information is then used by another TeamViewer user to remotely access the computer. The remote control feature allows the user to view and control the desktop of
Malware comes in various forms and can infect computers through many sources such as malicious websites, pirated software/media, and emails. There are three main types of malware: viruses, trojans, and worms, which operate differently to disrupt computers. Users can protect themselves by only visiting trusted sites, avoiding suspicious ads and emails, and using antivirus and firewall software to block unauthorized access and programs. Malware aims to access personal information and systems without permission.
Google+ is a social network from Google that allows users to share messages or links with circles of contacts, similar to groups on Facebook. It offers features like video chatting, sharing documents and broadcasting live videos. Businesses can create Google+ pages for a public presence on Google. The service was initially opened to a small group in 2011 before being made publicly available in 2012. Java and JavaScript are programming languages used in Google+.
Pixel is the smallest unit of a digital image. Pictures are made up of many pixels arranged in a grid, with each pixel supporting red, green, and blue color values. The document provides an example screen resolution of 1024 x 768 pixels, which equals a total of 786432 pixels. It then calculates the pixel density of a 4.5 inch screen with that resolution to be 6.1 pixels per inch (PPI).
NFC allows for short-range wireless data transfer between devices when they are touched or brought within close proximity. It can be used for transferring contacts, photos, videos and files between devices, pairing devices like Bluetooth headphones, making mobile payments at checkouts, and storing information on NFC tags like business cards that can be read by other devices.
This document discusses different types of computer networks. It defines a computer network as a collection of computers and devices connected to each other to communicate and share resources. The key points made are:
- Computer networks can be classified by connection method (wired vs wireless), scale (LAN, WAN, etc.), functional relationship (client-server, peer-to-peer), and topology.
- Common network types include personal area networks (PANs), local area networks (LANs), campus area networks (CANs), metropolitan area networks (MANs), wide area networks (WANs), virtual private networks (VPNs), and global area networks.
- Internetworking involves connecting distinct networks using common routing
A mobile processor is found in mobile computers and cell phones. The main companies that produce mobile processors are Qualcomm, Samsung, Mediatek, and NVIDIA. Key aspects of mobile processor technology include transistor size, number of cores, and processing frequency, with newer processors having smaller transistors, more cores, and higher frequencies.
LASIK eye surgery uses lasers to improve vision by reshaping the cornea. A laser is a device that emits light through stimulated emission of radiation, and was first developed in 1960 based on theoretical work. Among other uses, lasers are used in laser eye surgery procedures like LASIK. In a LASIK procedure, a doctor first cuts a small window in the cornea using a laser, then uses another laser to reshape the cornea which improves the patient's vision.
1. The document discusses different biometric identification methods including iris scanning, fingerprint analysis, and DNA testing.
2. Iris scanning involves using mathematical pattern recognition techniques to analyze unique patterns in a person's irises. Over 250 points are scanned in iris recognition compared to only 30 points for fingerprint analysis.
3. Iris scanning has been implemented for security purposes in border control systems, ATMs, airports, and smartphones. It provides a contactless way to identify individuals.
The document defines and compares Internet, intranet, and extranet. The Internet is a global network of interconnected computers accessible to anyone. An intranet is a private internal network, similar to the Internet, contained within an organization. An extranet extends an organization's intranet to allow access to selected external partners and customers while maintaining security. Types of extranets include public, private, and virtual private networks (VPNs) which use encryption tunnels for secure transmission over public networks.
Ingestible robots are being developed that can be swallowed to capture health data inside the body. These robots can change shape once inside and swim through the bloodstream to gather information. Some prototypes include swimming robots that could collect data from within the bloodstream.
This document compares Intel i3, i5, and i7 processors. i3 processors are dual-core with hyperthreading and cache memory, making them best for basic tasks. i5 processors are dual-core in laptops and quad-core in desktops, performing better than i3s. i7 processors have the largest cache memory at 8MB and are best for intensive tasks like 3D animation and software development. Generations refer to the transistor size, with newer generations having smaller transistors.
Wireless inductive charging uses an electromagnetic field to transfer energy between two coils - a transmitting coil in the charging device and a receiving coil in the device being charged. When the coils are aligned close to each other, an alternating current flowing through the transmitting coil produces an alternating electromagnetic field that induces a current in the receiving coil through electromagnetic induction. This allows devices like smartphones to charge without plugging in a cable by placing them on a charging pad.
This document provides a brief history of computers from early calculating devices like the abacus to modern computers. It discusses early pioneers like Blaise Pascal who invented the first mechanical calculator. It then outlines the development of Charles Babbage's analytical engine, considered the first general-purpose computer. Finally, it summarizes the evolution of computers from vacuum tubes to integrated circuits and the development of operating systems, programming languages, and commercial applications.
GPS stands for Global Positioning System, a satellite-based navigation system. A-GPS uses cellular networks to help GPS locate a device faster. GLONASS is Russia's global navigation satellite system that works similarly to GPS.
Google announced Daydream VR, an updated version of Google Cardboard VR. Daydream VR will include new software and dedicated hardware. The new Daydream VR is aimed to provide an improved virtual reality experience for users.
The document discusses Google Assistant and Google Home. Google Assistant allows users to search Google or ask questions using voice commands. Google Home is a smart speaker hardware device that allows users to ask questions and get answers through voice commands in their home, similar to Amazon Echo. Google Home can also control smart home devices like thermostats and appliances.
This document discusses sodium-ion batteries and their potential future use. It also mentions lithium batteries and compares sodium batteries to lithium batteries. Finally, it suggests sodium batteries may be rechargeable using the human body.
The first 64-bit processor was made by AMD in 2003, allowing support for more than 4GB of RAM. Ten years later in 2013, Apple launched the iPhone 5S with a 64-bit processor, providing increased memory and performance capabilities compared to 32-bit processors which can only support up to 4GB of RAM. 64-bit processors allow devices to access more than 4GB of memory.
The document summarizes the evolution of wireless technologies from 1G to 5G. It discusses the key features and limitations of each generation including 1G, 2G, 2.5G, 3G, 4G and the emerging 5G technology. The document explains that 5G will provide higher bandwidth, lower latency and support more connected devices compared to previous generations, enabling applications like virtual reality and autonomous driving.
TeamViewer is a proprietary computer software package for remote control, desktop sharing, online meetings, web conferencing and file transfer between computers. It allows users to remotely access and control another personal computer with a graphical user interface over the Internet. TeamViewer is cross-platform, running on Microsoft Windows, macOS, Linux, iOS and Android.
How does TeamViewer work?
TeamViewer uses peer-to-peer technology to establish a secure connection between two computers running the TeamViewer software. Once installed, the software generates a randomly assigned ID number and password to identify the local computer. This information is then used by another TeamViewer user to remotely access the computer. The remote control feature allows the user to view and control the desktop of
Malware comes in various forms and can infect computers through many sources such as malicious websites, pirated software/media, and emails. There are three main types of malware: viruses, trojans, and worms, which operate differently to disrupt computers. Users can protect themselves by only visiting trusted sites, avoiding suspicious ads and emails, and using antivirus and firewall software to block unauthorized access and programs. Malware aims to access personal information and systems without permission.
Google+ is a social network from Google that allows users to share messages or links with circles of contacts, similar to groups on Facebook. It offers features like video chatting, sharing documents and broadcasting live videos. Businesses can create Google+ pages for a public presence on Google. The service was initially opened to a small group in 2011 before being made publicly available in 2012. Java and JavaScript are programming languages used in Google+.
Pixel is the smallest unit of a digital image. Pictures are made up of many pixels arranged in a grid, with each pixel supporting red, green, and blue color values. The document provides an example screen resolution of 1024 x 768 pixels, which equals a total of 786432 pixels. It then calculates the pixel density of a 4.5 inch screen with that resolution to be 6.1 pixels per inch (PPI).
NFC allows for short-range wireless data transfer between devices when they are touched or brought within close proximity. It can be used for transferring contacts, photos, videos and files between devices, pairing devices like Bluetooth headphones, making mobile payments at checkouts, and storing information on NFC tags like business cards that can be read by other devices.
This document discusses different types of computer networks. It defines a computer network as a collection of computers and devices connected to each other to communicate and share resources. The key points made are:
- Computer networks can be classified by connection method (wired vs wireless), scale (LAN, WAN, etc.), functional relationship (client-server, peer-to-peer), and topology.
- Common network types include personal area networks (PANs), local area networks (LANs), campus area networks (CANs), metropolitan area networks (MANs), wide area networks (WANs), virtual private networks (VPNs), and global area networks.
- Internetworking involves connecting distinct networks using common routing
A mobile processor is found in mobile computers and cell phones. The main companies that produce mobile processors are Qualcomm, Samsung, Mediatek, and NVIDIA. Key aspects of mobile processor technology include transistor size, number of cores, and processing frequency, with newer processors having smaller transistors, more cores, and higher frequencies.
LASIK eye surgery uses lasers to improve vision by reshaping the cornea. A laser is a device that emits light through stimulated emission of radiation, and was first developed in 1960 based on theoretical work. Among other uses, lasers are used in laser eye surgery procedures like LASIK. In a LASIK procedure, a doctor first cuts a small window in the cornea using a laser, then uses another laser to reshape the cornea which improves the patient's vision.
1. The document discusses different biometric identification methods including iris scanning, fingerprint analysis, and DNA testing.
2. Iris scanning involves using mathematical pattern recognition techniques to analyze unique patterns in a person's irises. Over 250 points are scanned in iris recognition compared to only 30 points for fingerprint analysis.
3. Iris scanning has been implemented for security purposes in border control systems, ATMs, airports, and smartphones. It provides a contactless way to identify individuals.
The document defines and compares Internet, intranet, and extranet. The Internet is a global network of interconnected computers accessible to anyone. An intranet is a private internal network, similar to the Internet, contained within an organization. An extranet extends an organization's intranet to allow access to selected external partners and customers while maintaining security. Types of extranets include public, private, and virtual private networks (VPNs) which use encryption tunnels for secure transmission over public networks.
Ingestible robots are being developed that can be swallowed to capture health data inside the body. These robots can change shape once inside and swim through the bloodstream to gather information. Some prototypes include swimming robots that could collect data from within the bloodstream.
This document compares Intel i3, i5, and i7 processors. i3 processors are dual-core with hyperthreading and cache memory, making them best for basic tasks. i5 processors are dual-core in laptops and quad-core in desktops, performing better than i3s. i7 processors have the largest cache memory at 8MB and are best for intensive tasks like 3D animation and software development. Generations refer to the transistor size, with newer generations having smaller transistors.
Wireless inductive charging uses an electromagnetic field to transfer energy between two coils - a transmitting coil in the charging device and a receiving coil in the device being charged. When the coils are aligned close to each other, an alternating current flowing through the transmitting coil produces an alternating electromagnetic field that induces a current in the receiving coil through electromagnetic induction. This allows devices like smartphones to charge without plugging in a cable by placing them on a charging pad.
This document provides a brief history of computers from early calculating devices like the abacus to modern computers. It discusses early pioneers like Blaise Pascal who invented the first mechanical calculator. It then outlines the development of Charles Babbage's analytical engine, considered the first general-purpose computer. Finally, it summarizes the evolution of computers from vacuum tubes to integrated circuits and the development of operating systems, programming languages, and commercial applications.
GPS stands for Global Positioning System, a satellite-based navigation system. A-GPS uses cellular networks to help GPS locate a device faster. GLONASS is Russia's global navigation satellite system that works similarly to GPS.
Google announced Daydream VR, an updated version of Google Cardboard VR. Daydream VR will include new software and dedicated hardware. The new Daydream VR is aimed to provide an improved virtual reality experience for users.
The document discusses Google Assistant and Google Home. Google Assistant allows users to search Google or ask questions using voice commands. Google Home is a smart speaker hardware device that allows users to ask questions and get answers through voice commands in their home, similar to Amazon Echo. Google Home can also control smart home devices like thermostats and appliances.
This document discusses sodium-ion batteries and their potential future use. It also mentions lithium batteries and compares sodium batteries to lithium batteries. Finally, it suggests sodium batteries may be rechargeable using the human body.
The first 64-bit processor was made by AMD in 2003, allowing support for more than 4GB of RAM. Ten years later in 2013, Apple launched the iPhone 5S with a 64-bit processor, providing increased memory and performance capabilities compared to 32-bit processors which can only support up to 4GB of RAM. 64-bit processors allow devices to access more than 4GB of memory.
The document summarizes the evolution of wireless technologies from 1G to 5G. It discusses the key features and limitations of each generation including 1G, 2G, 2.5G, 3G, 4G and the emerging 5G technology. The document explains that 5G will provide higher bandwidth, lower latency and support more connected devices compared to previous generations, enabling applications like virtual reality and autonomous driving.