Revision – 11 topics 1 The software needed to create individual graphics for animated cartoons: Vector graphics Bitmap/raster graphics File types needed- proprietary and open Image manipulation techniques Photo editing and graphic manipulation software This software has a range of tools and features that are used to create or edit images. Photographs can Be edited to remove red eye or other unwanted blemishes Be cropped to remove unwanted parts of the image Have elements cut off or out of the image Be to size to fit frames in documents or for use in different devices Have extra layers created to add new elements to the image Magnetic media Magnetic media uses magnetic patterns to represent information. They are still used in computer hard drives to store data but no one really uses them for films or music anymore. Vector Graphics Vector graphics are created in graphics packages and consist of shapes called objects. It is possible to edit each object separately, for example, change the shape, colour, size and position. Even if an object in a vector graphic is quite large, it doesn't need a lot of computer memory. Therefore the file size of a vector graphic is often very small. Vector graphics are scalable - when you resize them, they do not lose quality. Use the red slider to zoom into the vector graphic below. Notice how as you zoom further in, the image scales perfectly and does not lose quality. Bitmap graphics When you take a photograph using a digital camera or scan an image from a magazine, you are creating a bitmap graphic. A bitmap graphic is composed of many tiny parts, called pixels, which are often many different colours. It is possible to edit each individual pixel. Since the computer has to store information about every single pixel in the image, the file size of a bitmap graphic is often quite large. When you resize a bitmap graphic, it tends to lose quality. Raster graphics Raster graphics are digital images created or captured (for example, by scanning in a photo) as a set of samples of a given space. A raster is a grid of x and y coordinates on a display space. (And for three-dimensional images, a z coordinate.) Image manipulation definition Photo manipulation is a process performed by a digital artist using image-editing software to transform a photograph into a desired image. File Format A file format defines the structure and type of data stored in a file. The structure of a typical file may include a header, metadata, saved content, and an end-of-file (EOF) marker. The data stored in the file depends on the purpose of the file format. Some files, such as XML files, are used to store lists of items, while others, such as JPEG image files simply contain a block of data. Revision – 11 topics 2. The uses of range of input and output devices. Types of input devices Keyboard- used to enter characters set out in a pattern Mouse- used to move the pointer on the screen Microphone- converts sound to electrical signals which can be digitised. Camera- used for taking photos or videos, cameras use light sensitive receptors to convert light into electrical signals that are then digitised and stored as still or moving images Graphics table- used to draw on a computer screen makes the drawing higher quality. Touch pad- responds to fingers can be used instead of a mouse to move pointer. Types of Output devices Touchscreen- both input and output has a dual function. Same purpose as any other monitor user of a smart phone will use a touch screen Printers-produce hard copies of the results of processing. Could be used for printing membership cards passes or receipts Laser printers- can print large quantities of high quality copies in a short time also lower running cost in offices. Inkjet printers- can also produce a high quality colour prints however are slower to print with higher running cost. Storage devices Hard disk drive (HDD) using magnetic disks. Hard disk drives use magnetic disks for storing software and data in files. Disks are circular spinning at high speed. Drive heads read and write the data making the hard disks susceptible to dirt and damage if moved suddenly. Can also store huge amounts of data. Solid state drive (SSD) Uses flash memory to store software and data in files. There are no moving parts in SSDs making them faster and more reliable. However more expensive. Files can be read, edited, re written or deleted Optical device Such as CD/DVDs to store software data stored on CD-ROMS and DVD-ROMS can be read but cannot be altered. Revision – 11 topics Flash memory USB sticks contain flash memory and are used in USB port. Used to store data and files for transfer to other computers making transport to different devices much easier e.g. home to work Cloud storage Provides very large data storage capacity facilities online for remote access using the web can be used to easily share files. Laptop computer Desktop computer Smartphone internet online file servers Revision – 11 topics 4. Methods of protecting files from theft -Password It is important to have a ‘strong ‘secure passwords which isn’t easy to guess so no one can steal our private files. Secure password protects the files from thefts by not letting anyone access them until that person types in correct password. Security password is effective if it’s hard to guess and uses the mix of numbers and letters in it. -Encryption (means to scramble data in such a way that only someone with the secret code or key can read it) Encryption is extremely important for e-commerce as it allows confidential information such as your credit card details to be sent safely to the online shop you are visiting. How does encryption work? It works by scrambling the original message with a very large digital number (key). This is done using advanced mathematics. Commercial-level encryption uses 128 bit key that is very, very hard to crack. The computer receiving the message knows the digital key and so is able to work out the original message, but encryption is slower than normal browsing. -User rights (specific access and ability permissions that can be assigned to customizable user groups.): - include logon rights and privileges (it means the rights control who is authorized to log on to a computer and how they can log on) -control access to computer Revision – 11 topics 5. Methods of collaboration between colleagues working in different geographical areas Collaborative Communication is Tools that could be used for working together with other people on the same piece of work. Collaboration working tools: Instant messenger – MSN, Facebook, Yahoo Video Chat - Skype, Face Time, google + Chat Rooms Blogs - YouTube, Tumblr, Facebook, Instagram Emails - Hotmail, Gmail Social Networking - YouTube, Tumblr, Facebook, Instagram Forums What are they Instant Messenger – Instant messaging (IM) is a type of online chat which offers real-time text transmission over the Internet. Video Chat – a face-to-face conversation held over the Internet by means of webcam Chat Rooms – an area on the Internet or other computer network where users can communicate, typically one dedicated to a particular topic. Blogs – a regularly updated website or web page, typically one run by an individual or small group, that is written in an informal or conversational style. Emails – messages distributed by electronic means from one computer user to one or more recipients via a network. Social Networking - a dedicated website or other application which enables users to communicate with each other by posting information, comments, messages, images, etc. Forums - An Internet forum, or message board, is an online discussion site where people can hold conversations in the form of posted messages. They differ from chat rooms in that messages are often longer than one line of text, and are at least temporarily archived.) Collaborative working tools in Office Comments Track Changes Compare/Combine documents Revision – 11 topics Comments Track Changes Compare/Combine Documents Revision – 11 topics Revision – 11 topics 7. Legal implications of using websites and social media. Copyright, to start with is a difficult thing it is the protection of images or information which if you’re the one taking the image and maybe forget to get the copyright, or if there isn’t one you try and contact and it doesn’t work out (or if you’re just trying to claim work which isn’t yours) you could end up in trouble with the law. If the law is brought into action then you could face fines from up to £50,000 or 6 months in prison this was passed 1988 which is the law which oversees all Copyright, Design and Patents in the UK. The way you could get away with this on social media, such as twitter you could use the quote button to copy and paste what you are trying to share to your folders by mentioning who you got the image or information from. But this could go the other way such as if you publish an image or web link to information, you could have this stolen from you without getting a link that allows you to get mentioned. But what else can be placed in to protect your data is private setting such as in Facebook you can make your profile limited so people who don’t have you as a friend or people who you don’t want to see your profile cannot see what you post. This can also be implemented in so friends that you do want to see your posts can do so, this can be put into many different forms of social media such as Revision – 11 topics Instagram were you have to get a follow till you can see the person you want to see’s account but that is if you’ve got the specific settings in place. The Computer misuse act was passed in 1990 after hacking became more frequent but what this did it gave legalisation if they could trace back the hacker that they would be brought to justice. But before this it would be a major social impacts for people as they would have their items hacked and they wouldn’t be able to do anything about it, but this brought more problems in itself as people will feel insecure when using their computers just in case the hackers come back which creates a sense of paranoia but also the chance of having the identity stolen and details such as credit card details, home numbers, passport papers you name it they would try and steal it. But if this was in a company sense, if the company was hacked and the information of all people subscribed and registered was hacked, it would create a major sense of doubt between all the people that they don’t believe that the people holding this data are safe and secure which will bring down the confidence of the buyer of their product which again will bring back the chance of a lot of people getting tricked and a major chance of identity theft. But the balance of ‘freedom of speech’ comes into question as if you believe that it’s your liberty that you can take information as it comes at your due…its wrong as people that create the information work hard at that and if you just come in and take it with no copyright or permission of the data creator you deserve the consequences. But a way to do this is to get the information and commit to copyright. 8: Data Transfer Technologies Definition: Moving information onto or from a device or devices. As well you must also concerned the speed of the connection. The word bandwidth will be mentioned. This just determines how quickly your data reaches its destination (where it was sent to) . Wireless: Is one method to transfer data. Transporting information onto different devices wirelessly with requiring a capable. The wireless methods would be Bluetooth, wifi and 3G/mobile. Wired: Is another one which is just the opposite of wireless. Transporting information onto different devices with a capable or some form of material . Examples of wired methods would be USB, Ethernet and DSL/broadband. File sharing or cloud storage is a method of giving out access of digital media information to people. Examples of this would be computer programs , images , videos and audios and documents like Microsoft Word documents. An example of cloud storage that you would properly know is ICloud for apple. Like ICloud, cloud storage just stores information, sometimes its your own private info it store. When considering factors for data transfer technologies you must consider the bandwidth and latency. What this basically means is the time it takes to transfer the information from one place to another and the quality of the data. Like how its effected, say if you transfer a document from one computer by cable or wifi onto a other computer will the document stay the same. Will it change to some extent like there’s some missing information. That’s what latency means. What bandwidth means is how long the time to transfer one piece of data from one computer to another will take. Like sending a word document from your house to your friends house. What you must also consider it your situation. Say in your area you have bad mobile connect and internet connection you have no choice but to rely on wired connection. You will face all different obstacle then what you would if you had wireless. A factor you must consider would be that you would when saving a document then transferring it onto another device would be to save it on a piece of hardware then physical delivering that [piece of hardware onto another device. Revision – 11 topics This could also be said for wireless connection. A factor to consider would be that it might not be 100 percent reliable. For example you will need a dongle, and there is a possible chance of interference. So if you would like to transfer a document onto a device it might be quite difficult. Or in some cases in possible. A factor to consider when affecting transfer speed would be that the higher the bandwidth the more information that can be passed through a network at once. So for example if I had a high bandwidth and I sent my word document that had hundreds of slide with writing it would reach my computer quicker. 9 Possible negative impacts that may be caused by overuse of ICT equipment and methods of reducing, negating and avoiding these impacts. The main law covering the use of computer equipment is the health and safety (display screen equipment) regulations. To comply with these employers have to: 1) Look at the workstation and assess and reduce risk. The computer equipment and the area around it should be safe. If the risks are found then they must be removed to make the area safe. 2) Make sure the workstation meets the minimum requirements. A workstation should include a tilt and swivel screen with enough space for the key board, monitor and paperwork. Adjustable chairs and suitable lighting should also be provided for employees 3) Make sure you have regular breaks. Employees should not be expected to work at a computer all day. Regular breaks or a change in activity that the employees are carrying out should be scheduled into the working day 4) Arrange for eye test and glasses (if special ones are needed) employees who work on computers can get eyes tested for free. Employee will only have to pay for the glasses if the special ones are required. 5) Provide health and safety training and info. Training should be provided to make sure employees can use the computer equipment correctly. The training should include how to use the equipment to minimise the risk to their health and the steps that have been taken to minimise risk. Dependency on devices is for example getting addicted to a game (call of duty) this can be a problem because they won’t be very social and may hurt their eyes. Revision – 11 topics 10. Best Apps for Graphic Design Freelancers October 6th, 2014 by Tara Hornor 2 One of the best ways to improve your workflow and time management as a graphic design freelancer is to use apps. Not just any app will do, however. You need ones that won’t waste your time by crashing and that help you both on the go and when around your computer. Our collection of the best apps for graphic design freelancers below are divided into design and photography apps and business management apps. As a graphic designer, you never know when inspiration might hit, which is why you want something in place to record your idea before you lose it. And we all hate the annoying business tasks, especially when they take too much time away from designing. The apps below should help solve both of these problems that can occur for graphic design freelancers. In the list below, iOS, Android, and desktop apps are all included. Some of the apps are surprisingly free, others come with a small one-time fee, others come with a monthly or yearly subscription. I have tried to include lots of variety so that designers can find the perfect fit for their budgets and needs. Enjoy! Revision – 11 topics Design and Photography Apps FX Photo Studio by MacPhun LLC £1.99; for iPhone, iPad, iPod Touch This incredible photo editing app comes with over 190 filters that allow anyone to create stunning or stylistic photos. It comes with standard editing tools, text labels, textures, and sharing features to make showing off your work easy. Layers by Gotow.net $4.99/£2.99; for iPhone, iPad, iPod Touch This media painting app is completely compatible with Photoshop so that you can finish and touch up your designs on your computer. It comes with plenty of tools, such as brushes, full color, paint, erase, smudge tools, and more. It even allows up to five layers! Revision – 11 topics Filmic Pro by Cinegenix, LLC $4.99/£2.99; for iPhone, iPad, iPod Touch This mobile HD video camera allows you to set the focus and exposure individually, unlike Apple’s default camera app, allowing you to take stunning videos while on the go. You can also lock focus, exposure, and white balance individually. With different frame rates, motion FX, audio support, and professional grade 50 mbps image quality setting, Filmic Pro comes with a lot of features for such a low price! Adobe Kuler by Adobe Free; iPhone, iPad, iPod Touch Adobe Kuler actually has a free app for iPhone, iPad, and iPod Touch. See a color you like while out and about? Take a picture and use the Kuler app to extract the colors. Save your color themes for future use. Adobe Ideas by Adobe Revision – 11 topics Free; iPhone, iPad, iPod Touch Another amazing app made completely free by Adobe, this is the iPhone companion to Illustrator. If you have a Creative Cloud membership with Adobe, you can sync your ideas with your Illustrator program for further refinement. You can even sync with Kuler and use your saved color themes. This app includes multiple brushes, color sliders, and up to 10 layers, along with the ability to move or resize each layer. Design Duet by Forging Destiny Studios LLC $1.99/£1.69; iPhone, iPad, iPod Touch Using Photoshop Remote Connections, this app allows you to see how your Photoshop designs will appear on an actual iPhone. Once you enable the remote connection in Photoshop, you simply enter your password and changes you make in the software automatically are updated in the app. You can save the preview to your camera roll or share a flattened version of the image. Revision – 11 topics Adobe Photoshop Touch by Adobe $4.99/£2.99; for iPhone and iPod Touch The Photoshop app is finally available for iPhone and comes with core features found in the desktop version, such as layers, adjustments, selection tools, filters, graphical text, and even some extras like the ability to combine photos and use Refine Edge. Plus, Camera Fill works with your phone camera! Your free membership with Creative Cloud stores up to 2GB data, has automatic syncing between devices, and comes with the ability to share designs. More features are available on the iPad andAndroid versions for $9.99 each. Marksta by Marksta $1.99; for iPhone, iPad, iPod Touch Marksta is a handy little app that helps you add watermarks to photos before uploading to the web. It comes with lots of features for customizing your watermarks, including adding multiple lines of text, including your logo, customizing the borders, adding effects to layers, adding or removing GPS geo tags, and much more. Even multiple typefaces are available. Revision – 11 topics Cinamatic by Hipstamatic Free; for iPhone, iPad, iPod Touch This app allows you to record lots of short clips to make a short 3 to 15 second film. You can even add filters for a unique look and share your film on Instagram, Vine, or Facebook. And if you find yourself wanting more, upgrade to Pro for soundtracks, clip merging, segment rearranging, and other advanced controls. You may also want to try the Classic Hipstamatic app, $1.99, a camera app for iOS that allows you to switch lenses, flashes, and films for giving photographs an analog look. Check out Hipstamatic for more awesome apps they’ve created for iOS. Revision – 11 topics Photo Editor by Avery Free; for Android Just so Android users don’t think I’ve forgotten them, I’ve included a photo editor for Android. It comes with all the basic photo editing abilities, including sharpen, blur, and adjustments for brightness/ saturation/ contrast/ color temperature. Plus, it also comes with stickers, the ability to draw and add text, photo effects, and frames. If you want more, just pay for the extra effects and frame packs you need. Vector Snap by Andreas Borg Free; iPhone, iPad, iPod Touch This app could save a lot of time for designers working with vectors. Need a specific vector shaped like, say, that plant in the corner of your office? Simply snap a photo and use Vector Snap to quickly turn the photo into a nice, unique vector image, instantly! This app works by tracing images to SVG, which you can then save as SVG or PNG. Modify the design using the app’s pixel and vector filters, text tool, or advanced color lab, or save it and fine tune it on your desktop. Revision – 11 topics Revision – 11 topics 11 Revision – 11 topics 11 Social media Social media platforms Social networking websites allow individuals to interact with one another and build relationships. When companies join these social channels, consumers can interact with them directly. That interaction can be more personal to users than traditional methods of outbound marketing & advertising. Social networking sites act as word of mouth. Social networking sites and blogs allow followers to “retweet” or “repost” comments made by others about a product being promoted. By repeating the message, the user's connections are able to see the message, therefore reaching more people. Because the information about the product is being put out there and is getting repeated, more traffic is brought to the product/company. Through social networking sites, companies can interact with individual followers. This personal interaction can install a feeling of loyalty into followers and potential customers. Also, by choosing whom to follow on these sites, products can reach a very narrow target audience. Social networking sites also include a vast amount of information about what products and services prospective clients might be interested in. Through the use of new Semantic Analysis technologies, marketers can detect buying signals, such as content shared by people and questions posted online. Understanding of buying signals can help sales people target relevant prospects and marketers run micro-targeted campaigns. The passive approach Social media can be a useful source of market information and customer voice. Blogs, content communities and forums are platforms where individuals share their reviews and recommendations of brands, products and Revision – 11 topics services. Businesses are able to tap and analyse the customer voice generated in social media for marketing purposes. The active approach Social media can be used as a public relations and direct marketing tools but also as communication channels (targeting specific audiences with social media influencers) and as customer engagement tools. Campaigns Betty White Social networking sites can have a large impact on the outcome of events. In 2010, a Facebook campaign surfaced in the form of a petition. Users virtually signed a petition asking NBC Universal to have actress Betty White host Saturday Night Live. Once signed, users forwarded the petition to all of their followers. The petition went viral and on May 8, 2010, Betty White hosted SNL. Lay's-Do Us a Flavour In 2012, Lays created a social media campaign that allowed fans to create their own flavour for a $1 million prize for whatever flavour was voted the best. After 3.8 million submissions from fans who participated, the top three choices were Cheesy Garlic Bread, Chicken & Waffles, and Sriracha. The fans were now able to purchase the three flavours in stores then cast their vote on Facebook or Twitter for the best flavour. Lays gained a 12% increase in sales during the contest. Garlic Cheesy Bread was eventually named the winner of the contest. Purposes and Tactics One of the main purposes in employing Social Media in marketing is as a communications tool that makes the companies accessible to those interested in their product and make them visible to those who have no knowledge of their products. These companies use social media to create buzz, learn from and target customers. It's the only form of marketing that can finger consumers at each and every stage of the consumer decision journey. Twitter Twitter allows companies to promote their products in short messages limited to 140 characters which appear on followers’ home pages. Messages can link to the product’s website, Facebook profile, photos, videos, etc. Facebook Facebook pages are far more detailed than Twitter accounts. They allow a product to provide videos, photos, and longer descriptions, and testimonials as other followers can comment on the product pages for others to see. Facebook can link back to the product’s Twitter page as well as send out event reminders. A study from 2011 attributed 84% of "engagement" or clicks to Likes that link back to Facebook advertising. By 2014 Facebook had restricted the content published from businesses' and brands' pages. Adjustments in Facebook algorithms have reduced the audience for non-paying business pages (that have at least 500,000 "Likes") from 16 percent in 2012 down to 2 percent in February 2014. Revision – 11 topics YouTube YouTube is another popular avenue; advertisements are done in a way to suit the target audience. The type of language used in the commercials and the ideas used to promote the product reflect the audience's style and taste. Also, the ads on this platform are usually in sync with the content of the video requested, this is another advantage YouTube brings for advertisers. Certain ads are presented with certain videos since the content is relevant. Promotional opportunities such as sponsoring a video is also possible on YouTube, "for example, a user who searches for a YouTube video on dog training may be presented with a sponsored video from a dog toy company in results along with other videos." YouTube also enable publishers to earn money through its YouTube Partner Program. Marketing techniques Social media marketing involves the use of social networks, consumer’s online brand related activities (COBRA) and electronic word of mouth (eWOM) to successfully advertise online. Social networks such as Facebook and Twitter provide advertisers with information about the likes and dislikes of their consumers.[53] This technique is crucial, as it provides the businesses with a “target audience”.[53] With social networks, information relevant to the user’s likes is available to businesses; who then advertise accordingly. Activities such as uploading a picture of your “new Converse sneakers to Facebook” is an example of a COBRA. Electronic recommendations and appraisals are a convenient manner to have a product promoted via “consumer-to-consumer interactions. An example of eWOM would be an online hotel review; the hotel company can have two possible outcomes based on their service. A good service would result in a positive review which gets the hotel free advertising via social media, however a poor service will result in a negative consumer review which can potentially harm the company's reputation. Social media marketing mishaps Social media marketing provides organizations with a way to connect with their customers. However, organizations must protect their information as well as closely watch comments and concerns on the social media they use. A flash poll done on 1225 IT executives from 33 countries revealed that social media mishaps caused organizations a combined $4.3 million in damages in 2010.[71] The top three social media incidents an organization faced during the previous year included employees sharing too much information in public forums, loss or exposure of confidential information, and increased exposure to litigation. Due to the viral nature of the internet, a mistake by a single employee has in some cases shown to result in devastating consequences for organizations.
© Copyright 2026 Paperzz