1 The software needed to create individual graphics for animated

Revision – 11 topics
1 The software needed to create individual graphics for animated cartoons:




Vector graphics
Bitmap/raster graphics
File types needed- proprietary and open
Image manipulation techniques
Photo editing and graphic manipulation software
This software has a range of tools and features that are used to create or edit images.
Photographs can




Be edited to remove red eye or other unwanted blemishes
Be cropped to remove unwanted parts of the image
Have elements cut off or out of the image
Be to size to fit frames in documents or for use in different devices
Have extra layers created to add new elements to the image
Magnetic media
Magnetic media uses magnetic patterns to represent information. They are still used in computer hard
drives to store data but no one really uses them for films or music anymore.
Vector Graphics
Vector graphics are created in graphics packages and consist of shapes called objects.
It is possible to edit each object separately, for example, change the shape, colour, size and position.
Even if an object in a vector graphic is quite large, it doesn't need a lot of computer memory. Therefore
the file size of a vector graphic is often very small.
Vector graphics are scalable - when you resize them, they do not lose quality.
Use the red slider to zoom into the vector graphic below. Notice how as you zoom further in, the image
scales perfectly and does not lose quality.
Bitmap graphics
When you take a photograph using a digital camera or scan an image from a magazine, you are creating
a bitmap graphic. A bitmap graphic is composed of many tiny parts, called pixels, which are often many
different colours. It is possible to edit each individual pixel.
Since the computer has to store information about every single pixel in the image, the file size of a
bitmap graphic is often quite large.
When you resize a bitmap graphic, it tends to lose quality.
Raster graphics
Raster graphics are digital images created or captured (for example, by scanning in a photo) as a set of samples
of a given space. A raster is a grid of x and y coordinates on a display space. (And for three-dimensional images,
a z coordinate.)
Image manipulation definition
Photo manipulation is a process performed by a digital artist using image-editing software to transform a
photograph into a desired image.
File Format
A file format defines the structure and type of data stored in a file. The structure of a typical file may include a
header, metadata, saved content, and an end-of-file (EOF) marker. The data stored in the file depends on the
purpose of the file format. Some files, such as XML files, are used to store lists of items, while others, such as
JPEG image files simply contain a block of data.
Revision – 11 topics
2. The uses of range of input and output devices.
Types of input devices




Keyboard- used to enter characters set out in a pattern
Mouse- used to move the pointer on the screen
Microphone- converts sound to electrical signals which can be digitised.
Camera- used for taking photos or videos, cameras use light sensitive receptors to convert light into
electrical signals that are then digitised and stored as still or moving images


Graphics table- used to draw on a computer screen makes the drawing higher quality.
Touch pad- responds to fingers can be used instead of a mouse to move pointer.
Types of Output devices

Touchscreen- both input and output has a dual function. Same purpose as any other monitor user
of a smart phone will use a touch screen

Printers-produce hard copies of the results of processing. Could be used for printing membership
cards passes or receipts

Laser printers- can print large quantities of high quality copies in a short time also lower running
cost in offices.

Inkjet printers-
can also produce a high quality colour prints however are slower to print with
higher running cost.
Storage devices
Hard disk drive (HDD) using magnetic disks.
Hard disk drives use magnetic disks for storing software and data in files. Disks are circular spinning at high
speed. Drive heads read and write the data making the hard disks susceptible to dirt and damage if moved
suddenly. Can also store huge amounts of data.
Solid state drive (SSD)
Uses flash memory to store software and data in files. There are no moving parts in SSDs making them faster
and more reliable. However more expensive. Files can be read, edited, re written or deleted
Optical device
Such as CD/DVDs to store software data stored on CD-ROMS and DVD-ROMS can be read but cannot be altered.
Revision – 11 topics
Flash memory
USB sticks contain flash memory and are used in USB port. Used to store data and files for transfer to other
computers making transport to different devices much easier e.g. home to work
Cloud storage
Provides very large data storage capacity facilities online for remote access using the web can be used to easily
share files.
Laptop computer
Desktop computer
Smartphone
internet
online file servers
Revision – 11 topics
4. Methods of protecting files from theft
-Password
It is important to have a ‘strong ‘secure passwords which isn’t easy to guess so no one
can steal our private files.
Secure password protects the files from thefts by not letting anyone access them until
that person types in correct password.
Security password is effective if it’s hard to guess and uses the mix of numbers and
letters in it.
-Encryption (means to scramble data in such a way that only someone with the secret
code or key can read it)
Encryption is extremely important for e-commerce as it allows confidential information such as
your credit card details to be sent safely to the online shop you are visiting.
How does encryption work?
It works by scrambling the original message with a very large digital number (key). This
is done using advanced mathematics. Commercial-level encryption uses 128 bit key that is
very, very hard to crack. The computer receiving the message knows the digital key and
so is able to work out the original message, but encryption is slower than normal
browsing.
-User rights (specific access and ability permissions that can be assigned to
customizable user groups.):
- include logon rights and privileges (it means the rights control who is authorized to log
on to a computer and how they can log on)
-control access to computer
Revision – 11 topics
5. Methods of collaboration between colleagues working in different
geographical areas
Collaborative Communication is Tools that could be used for working together with other people on
the same piece of work.
Collaboration working tools:







Instant messenger – MSN, Facebook, Yahoo
Video Chat - Skype, Face Time, google +
Chat Rooms
Blogs - YouTube, Tumblr, Facebook, Instagram
Emails - Hotmail, Gmail
Social Networking - YouTube, Tumblr, Facebook, Instagram
Forums
What are they
Instant Messenger – Instant messaging (IM) is a type of online chat which offers real-time text
transmission over the Internet.
Video Chat – a face-to-face conversation held over the Internet by means of webcam
Chat Rooms – an area on the Internet or other computer network where users can communicate,
typically one dedicated to a particular topic.
Blogs – a regularly updated website or web page, typically one run by an individual or small group, that
is written in an informal or conversational style.
Emails – messages distributed by electronic means from one computer user to one or more recipients via a
network.
Social Networking - a dedicated website or other application which enables users to communicate with
each other by posting information, comments, messages, images, etc.
Forums - An Internet forum, or message board, is an online discussion site where people can hold
conversations in the form of posted messages. They differ from chat rooms in that messages are often
longer than one line of text, and are at least temporarily archived.)
Collaborative working tools in Office



Comments
Track Changes
Compare/Combine documents
Revision – 11 topics
Comments
Track Changes
Compare/Combine Documents
Revision – 11 topics
Revision – 11 topics
7. Legal implications of using websites and social media.
Copyright, to start with is a difficult thing it is the protection of images or information which if you’re the one
taking the image and maybe forget to get the copyright, or if there isn’t one you try and contact and it doesn’t
work out (or if you’re just trying to claim work which isn’t yours) you could end up in trouble with the law. If the
law is brought into action then you could face fines from up to £50,000 or 6 months in prison this was passed
1988 which is the law which oversees all Copyright, Design and Patents in the UK.
The way you could get away with this on social media, such as twitter you could use the quote button to
copy and paste what you are trying to share to your folders by mentioning who you got the image or
information from. But this could go the other way such as if you publish an image or web link to
information, you could have this stolen from you without getting a link that allows you to get
mentioned. But what else can be placed in to protect your data is private setting such as in Facebook
you can make your profile limited so people who don’t have you as a friend or people who you don’t
want to see your profile cannot see what you post. This can also be implemented in so friends that you
do want to see your posts can do so, this can be put into many different forms of social media such as
Revision – 11 topics
Instagram were you have to get a follow till you can see the person you want to see’s account but that
is if you’ve got the specific settings in place.
The Computer misuse act was passed in 1990 after hacking became more frequent but what this did it
gave legalisation if they could trace back the hacker that they would be brought to justice. But before
this it would be a major social impacts for people as they would have their items hacked and they
wouldn’t be able to do anything about it, but this brought more problems in itself as people will feel
insecure when using their computers just in case the hackers come back which creates a sense of
paranoia but also the chance of having the identity stolen and details such as credit card details, home
numbers, passport papers you name it they would try and steal it.
But if this was in a company sense, if the company was hacked and the information of all people
subscribed and registered was hacked, it would create a major sense of doubt between all the people
that they don’t believe that the people holding this data are safe and secure which will bring down the
confidence of the buyer of their product which again will bring back the chance of a lot of people getting
tricked and a major chance of identity theft.
But the balance of ‘freedom of speech’ comes into question as if you believe that it’s your liberty that
you can take information as it comes at your due…its wrong as people that create the information work
hard at that and if you just come in and take it with no copyright or permission of the data creator you
deserve the consequences. But a way to do this is to get the information and commit to copyright.
8:
Data Transfer Technologies
Definition: Moving information onto or from a device or devices.
As well you must also concerned the speed of the connection. The word bandwidth will be mentioned. This just
determines how quickly your data reaches its destination (where it was sent to) .
Wireless:
Is one method to transfer data. Transporting information onto different devices wirelessly with requiring a
capable.
The wireless methods would be Bluetooth, wifi and 3G/mobile.
Wired:
Is another one which is just the opposite of wireless. Transporting information onto different devices with a
capable or some form of material .
Examples of wired methods would be USB, Ethernet and DSL/broadband.
File sharing or cloud storage is a method of giving out access of digital media information to people. Examples
of this would be computer programs , images , videos and audios and documents like Microsoft Word
documents. An example of cloud storage that you would properly know is ICloud for apple. Like ICloud, cloud
storage just stores information, sometimes its your own private info it store.
When considering factors for data transfer technologies you must consider the bandwidth and latency. What
this basically means is the time it takes to transfer the information from one place to another and the quality of
the data. Like how its effected, say if you transfer a document from one computer by cable or wifi onto a other
computer will the document stay the same. Will it change to some extent like there’s some missing information.
That’s what latency means. What bandwidth means is how long the time to transfer one piece of data from one
computer to another will take. Like sending a word document from your house to your friends house.
What you must also consider it your situation. Say in your area you have bad mobile connect and internet
connection you have no choice but to rely on wired connection. You will face all different obstacle then what
you would if you had wireless. A factor you must consider would be that you would when saving a document
then transferring it onto another device would be to save it on a piece of hardware then physical delivering that
[piece of hardware onto another device.
Revision – 11 topics
This could also be said for wireless connection. A factor to consider would be that it might not be 100 percent
reliable. For example you will need a dongle, and there is a possible chance of interference. So if you would like
to transfer a document onto a device it might be quite difficult. Or in some cases in possible.
A factor to consider when affecting transfer speed would be that the higher the bandwidth the more
information that can be passed through a network at once. So for example if I had a high bandwidth and I sent
my word document that had hundreds of slide with writing it would reach my computer quicker.
9 Possible negative impacts that may be caused by overuse of ICT equipment and methods of reducing, negating
and avoiding these impacts.
The main law covering the use of computer equipment is the health and safety (display screen equipment)
regulations. To comply with these employers have to:
1) Look at the workstation and assess and reduce risk.
The computer equipment and the area around it should be safe. If the risks are found then they must be
removed to make the area safe.
2) Make sure the workstation meets the minimum requirements.
A workstation should include a tilt and swivel screen with enough space for the key board, monitor
and paperwork. Adjustable chairs and suitable lighting should also be provided for employees
3) Make sure you have regular breaks.
Employees should not be expected to work at a computer all day.
Regular breaks or a change in activity that the employees are carrying out should be scheduled into
the working day
4) Arrange for eye test and glasses (if special ones are needed) employees who work on computers can get
eyes tested for free. Employee will only have to pay for the glasses if the special ones are required.
5) Provide health and safety training and info.
Training should be provided to make sure employees can use the computer equipment correctly. The
training should include how to use the equipment to minimise the risk to their health and the steps that have
been taken to minimise risk.
Dependency on devices is for example getting addicted to a game (call of duty) this can be a problem because
they won’t be very social and may hurt their eyes.
Revision – 11 topics
10. Best Apps for Graphic Design
Freelancers
October 6th, 2014
by Tara Hornor
2
One of the best ways to improve your workflow and time management as a graphic design
freelancer is to use apps. Not just any app will do, however. You need ones that won’t waste your
time by crashing and that help you both on the go and when around your computer. Our collection
of the best apps for graphic design freelancers below are divided into design and photography apps
and business management apps. As a graphic designer, you never know when inspiration might hit,
which is why you want something in place to record your idea before you lose it. And we all hate the
annoying business tasks, especially when they take too much time away from designing. The apps
below should help solve both of these problems that can occur for graphic design freelancers.
In the list below, iOS, Android, and desktop apps are all included. Some of the apps are surprisingly free,
others come with a small one-time fee, others come with a monthly or yearly subscription. I have tried to
include lots of variety so that designers can find the perfect fit for their budgets and needs. Enjoy!
Revision – 11 topics
Design and Photography Apps
FX Photo Studio by MacPhun LLC
£1.99; for iPhone, iPad, iPod Touch
This incredible photo editing app comes with over 190 filters that allow anyone to create stunning or stylistic
photos. It comes with standard editing tools, text labels, textures, and sharing features to make showing off
your work easy.
Layers by Gotow.net
$4.99/£2.99; for iPhone, iPad, iPod Touch
This media painting app is completely compatible with Photoshop so that you can finish and touch up your
designs on your computer. It comes with plenty of tools, such as brushes, full color, paint, erase, smudge
tools, and more. It even allows up to five layers!
Revision – 11 topics
Filmic Pro by Cinegenix, LLC
$4.99/£2.99; for iPhone, iPad, iPod Touch
This mobile HD video camera allows you to set the focus and exposure individually, unlike Apple’s default
camera app, allowing you to take stunning videos while on the go. You can also lock focus, exposure, and
white balance individually. With different frame rates, motion FX, audio support, and professional grade 50
mbps image quality setting, Filmic Pro comes with a lot of features for such a low price!
Adobe Kuler by Adobe
Free; iPhone, iPad, iPod Touch
Adobe Kuler actually has a free app for iPhone, iPad, and iPod Touch. See a color you like while out and
about? Take a picture and use the Kuler app to extract the colors. Save your color themes for future use.
Adobe Ideas by Adobe
Revision – 11 topics
Free; iPhone, iPad, iPod Touch
Another amazing app made completely free by Adobe, this is the iPhone companion to Illustrator. If you
have a Creative Cloud membership with Adobe, you can sync your ideas with your Illustrator program for
further refinement. You can even sync with Kuler and use your saved color themes. This app includes
multiple brushes, color sliders, and up to 10 layers, along with the ability to move or resize each layer.
Design Duet by Forging Destiny Studios LLC
$1.99/£1.69; iPhone, iPad, iPod Touch
Using Photoshop Remote Connections, this app allows you to see how your Photoshop designs will appear
on an actual iPhone. Once you enable the remote connection in Photoshop, you simply enter your password
and changes you make in the software automatically are updated in the app. You can save the preview to
your camera roll or share a flattened version of the image.
Revision – 11 topics
Adobe Photoshop Touch by Adobe
$4.99/£2.99; for iPhone and iPod Touch
The Photoshop app is finally available for iPhone and comes with core features found in the desktop
version, such as layers, adjustments, selection tools, filters, graphical text, and even some extras like the
ability to combine photos and use Refine Edge. Plus, Camera Fill works with your phone camera! Your free
membership with Creative Cloud stores up to 2GB data, has automatic syncing between devices, and
comes with the ability to share designs. More features are available on the iPad andAndroid versions for
$9.99 each.
Marksta by Marksta
$1.99; for iPhone, iPad, iPod Touch
Marksta is a handy little app that helps you add watermarks to photos before uploading to the web. It comes
with lots of features for customizing your watermarks, including adding multiple lines of text, including your
logo, customizing the borders, adding effects to layers, adding or removing GPS geo tags, and much more.
Even multiple typefaces are available.
Revision – 11 topics
Cinamatic by Hipstamatic
Free; for iPhone, iPad, iPod Touch
This app allows you to record lots of short clips to make a short 3 to 15 second film. You can even add filters
for a unique look and share your film on Instagram, Vine, or Facebook. And if you find yourself wanting
more, upgrade to Pro for soundtracks, clip merging, segment rearranging, and other advanced controls.
You may also want to try the Classic Hipstamatic app, $1.99, a camera app for iOS that allows you to switch
lenses, flashes, and films for giving photographs an analog look. Check out Hipstamatic for more awesome
apps they’ve created for iOS.
Revision – 11 topics
Photo Editor by Avery
Free; for Android
Just so Android users don’t think I’ve forgotten them, I’ve included a photo editor for Android. It comes with
all the basic photo editing abilities, including sharpen, blur, and adjustments for brightness/ saturation/
contrast/ color temperature. Plus, it also comes with stickers, the ability to draw and add text, photo effects,
and frames. If you want more, just pay for the extra effects and frame packs you need.
Vector Snap by Andreas Borg
Free; iPhone, iPad, iPod Touch
This app could save a lot of time for designers working with vectors. Need a specific vector shaped like, say,
that plant in the corner of your office? Simply snap a photo and use Vector Snap to quickly turn the photo
into a nice, unique vector image, instantly! This app works by tracing images to SVG, which you can then
save as SVG or PNG. Modify the design using the app’s pixel and vector filters, text tool, or advanced color
lab, or save it and fine tune it on your desktop.
Revision – 11 topics
Revision – 11 topics
11
Revision – 11 topics
11 Social media
Social media platforms
Social networking websites allow individuals to interact with one another and build relationships. When
companies join these social channels, consumers can interact with them directly. That interaction can be more
personal to users than traditional methods of outbound marketing & advertising.
Social networking sites act as word of mouth. Social networking sites and blogs allow followers to “retweet” or
“repost” comments made by others about a product being promoted. By repeating the message, the user's
connections are able to see the message, therefore reaching more people. Because the information about the
product is being put out there and is getting repeated, more traffic is brought to the product/company.
Through social networking sites, companies can interact with individual followers. This personal interaction can
install a feeling of loyalty into followers and potential customers. Also, by choosing whom to follow on these
sites, products can reach a very narrow target audience.
Social networking sites also include a vast amount of information about what products and services prospective
clients might be interested in. Through the use of new Semantic Analysis technologies, marketers can detect
buying signals, such as content shared by people and questions posted online. Understanding of buying signals
can help sales people target relevant prospects and marketers run micro-targeted campaigns.
The passive approach
Social media can be a useful source of market information and customer voice. Blogs, content communities and
forums are platforms where individuals share their reviews and recommendations of brands, products and
Revision – 11 topics
services. Businesses are able to tap and analyse the customer voice generated in social media for marketing
purposes.
The active approach
Social media can be used as a public relations and direct marketing tools but also as communication channels
(targeting specific audiences with social media influencers) and as customer engagement tools.
Campaigns
Betty White
Social networking sites can have a large impact on the outcome of events. In 2010, a Facebook campaign
surfaced in the form of a petition. Users virtually signed a petition asking NBC Universal to have actress Betty
White host Saturday Night Live. Once signed, users forwarded the petition to all of their followers. The petition
went viral and on May 8, 2010, Betty White hosted SNL.
Lay's-Do Us a Flavour
In 2012, Lays created a social media campaign that allowed fans to create their own flavour for a $1 million prize
for whatever flavour was voted the best. After 3.8 million submissions from fans who participated, the top three
choices were Cheesy Garlic Bread, Chicken & Waffles, and Sriracha. The fans were now able to purchase the
three flavours in stores then cast their vote on Facebook or Twitter for the best flavour. Lays gained a 12%
increase in sales during the contest. Garlic Cheesy Bread was eventually named the winner of the contest.
Purposes and Tactics
One of the main purposes in employing Social Media in marketing is as a communications tool that makes the
companies accessible to those interested in their product and make them visible to those who have no
knowledge of their products. These companies use social media to create buzz, learn from and target
customers. It's the only form of marketing that can finger consumers at each and every stage of the consumer
decision journey.
Twitter
Twitter allows companies to promote their products in short messages limited to 140 characters which appear
on followers’ home pages. Messages can link to the product’s website, Facebook profile, photos, videos, etc.
Facebook
Facebook pages are far more detailed than Twitter accounts. They allow a product to provide videos, photos,
and longer descriptions, and testimonials as other followers can comment on the product pages for others to
see. Facebook can link back to the product’s Twitter page as well as send out event reminders.
A study from 2011 attributed 84% of "engagement" or clicks to Likes that link back to Facebook advertising. By
2014 Facebook had restricted the content published from businesses' and brands' pages. Adjustments in
Facebook algorithms have reduced the audience for non-paying business pages (that have at least 500,000
"Likes") from 16 percent in 2012 down to 2 percent in February 2014.
Revision – 11 topics
YouTube
YouTube is another popular avenue; advertisements are done in a way to suit the target audience. The type of
language used in the commercials and the ideas used to promote the product reflect the audience's style and
taste.
Also, the ads on this platform are usually in sync with the content of the video requested, this is another
advantage YouTube brings for advertisers. Certain ads are presented with certain videos since the content is
relevant. Promotional opportunities such as sponsoring a video is also possible on YouTube, "for example, a user
who searches for a YouTube video on dog training may be presented with a sponsored video from a dog toy
company in results along with other videos." YouTube also enable publishers to earn money through its
YouTube Partner Program.
Marketing techniques
Social media marketing involves the use of social networks, consumer’s online brand related activities (COBRA)
and electronic word of mouth (eWOM) to successfully advertise online. Social networks such as Facebook and
Twitter provide advertisers with information about the likes and dislikes of their consumers.[53] This technique
is crucial, as it provides the businesses with a “target audience”.[53] With social networks, information relevant
to the user’s likes is available to businesses; who then advertise accordingly.
Activities such as uploading a picture of your “new Converse sneakers to Facebook” is an example of a COBRA.
Electronic recommendations and appraisals are a convenient manner to have a product promoted via
“consumer-to-consumer interactions. An example of eWOM would be an online hotel review; the hotel
company can have two possible outcomes based on their service. A good service would result in a positive
review which gets the hotel free advertising via social media, however a poor service will result in a negative
consumer review which can potentially harm the company's reputation.
Social media marketing mishaps
Social media marketing provides organizations with a way to connect with their customers. However,
organizations must protect their information as well as closely watch comments and concerns on the social
media they use. A flash poll done on 1225 IT executives from 33 countries revealed that social media mishaps
caused organizations a combined $4.3 million in damages in 2010.[71] The top three social media incidents an
organization faced during the previous year included employees sharing too much information in public forums,
loss or exposure of confidential information, and increased exposure to litigation. Due to the viral nature of the
internet, a mistake by a single employee has in some cases shown to result in devastating consequences for
organizations.