Tuesday, December 13, 2011

Reflection# 4 Photoshop

               The vector tools are very different from the brushes. One, the vector tools only lets you create shapes like a custom shape, circle, or even a rectangle. Two, while using vector tools and you choose a color, the color automatically fills in the shape. Now with brushes, you manually paint inside the object you drew. To re-create my drawing, I used all different shapes. I used the rectangle tool, the sphere tool, and the custom shape tool. Although, I used the rectangle and custom shape tool the most.
                I think the shapes were more effective on my drawing. Don't get me wrong, the brushes were useful but the shapes made the outcome of my project much more professional. Using the brushes, made my drawing look like a child drew it. Now with the shapes I was able to choose from a variety of effects in order to add them to all my layers. I must admit, with these effects "project 4" looked really good.
                The most difficult thing about working with vector images is getting the size of the shape, just right. That's pretty much what made me slow down during this whole project. Luckily, I quickly got the hang of transforming the shapes. Once I mastered this, I was easily able to scale shapes and rotate them in order to make the drawing look more professional.
                Overall (strength-wise), both my images were pretty strong. I believe that even though my picture from Project 3 was strong, Project 4 came out on top due to its great effects and colors. At the end, both of the pictures worked great together to make my final image.          

Friday, December 2, 2011

Task 2 Reflection # 3

             I chose this person/celebrity because I'm just simply a fan. Music is everything to me, and Tyga (the rapper I did the lab on) is om my list of favorite rappers. I just have a lot of respect for Tyga and that he's doing his thing in the music industry.

             I didn't finish putting all the images in the cutout. But I did get to put 4. I remember choosing 2 pictures which were mixtapes of his. I chose those because they were 2 mixtapes which I thought were great. The other picture I used was of his clothing brand, "Last Kings". I chose that picture simply because the clothes is what's in style right now and is something I definitely wouldn't mind wearing. Especially because he's an excellent artist and i support him.

             I was able to make the silhouette work by making a pretty good selection. I tried my best to make it look perfect. One word I used to trace "Tyga" was YMCMB. This is sort of like the clique Tyga is under. Another word I used was tatted. I picked this because almost his entire body is covered in tattoos. The other word I used was "Last Kings" since that's his clothing brand. The last word I used was SWAG. I used this word because that's exactly what Tyga has, swag. It's the way he dresses, the way he carries himself.

             Everything worked for me. The only thing that probably caused me a little trouble was remembering to choose 8 pictures. I think we had enough time in class to finish it, it's just that I got stuck on a step and it took some valuable time away.

Thursday, October 20, 2011

Reflection 1 - Scripts and Storyboards

           While writing my script it only took a couple of steps. To make a script, first I watched a video called "Tony vs Paul". Using the computer, I took screenshots of scenes of the video. After this I wrote about what happened (specifically) in every scene. I think I did well in writing what happened in every scene. I do think I could've worked harder on being more specific about what went on in each scene. Therefore, my script wasn't detailed enough. I thought it was pretty easy writing a script based on a video.
            When creating my storyboard I took more screenshots of the different scenes and and camera views. Using these screenshots I wrote about what was happening in each screenshot. I did take pictures first and then put the text in. I selected my images every time the camera view changed or the protagonists moved on to a different setting. I had about 40 images since I didn't get to finish in class. Since I think I should've had more images then I don't think it was an accurate storyboard for the video.
             My strengths during this project would have to be the way I was specific about every screenshot I took. Even though, I could've had more images, with the few i had I was very specific. I learned I need to improve at spending my time wisely since I did the exact opposite. The only question I have is, How would I know a scene just ended or began?

Saturday, January 22, 2011

How technology will impact our future?

Dear Journal Entry,
In Computer Fundamentals (this semester) I learned a lot. I learned from creating tables and power point presentations to placing posts on my blog. These skills will definitely help me towards achieving my long term goals. In order for my dreams of careers to come true, I need to know these basics of computers.
     Technology is important when you're an FBI agent which is the career I want to pursue, because it's hard to investigate without a computer. A computer can hold a huge amount of data which is necessary. To be a Forensic Scientist you need to store digital fingerprints in a computer. Therefore, Computer Fundamentals is truly helpful.
      In the future I would like to learn about photoshop. I have always been intrigued by this subject. I also want to learn about taking apart a computer and putting it back together. For the rest of my high school years I would like to follow the apple academy. I'd like to know more about apple and I think the apple academy would be helpful.

Wednesday, January 19, 2011

Careers for me

Forensic scientist-University of Central Florida,Michigan State University,Syracuse University.
  Requirements- Minimum have to have High school diploma, and a high GPA of perhaps 92 or higher.
FBI agent- University of Phoenix, Capella university, Concord law school
  Requirements- Minimum 23 years of age, citizen of this country, 4 year bachelor's degree
Private Investigator- CUNY John jay college, Detective Training Institute
 Requirements- have to have a high school diploma, knowledge of criminology, and Minimum of 2 years in college.

Saturday, January 15, 2011

40. IC3 Certification Exam

IC3 Certification Exam- the certificated exam one can take based on IC3.

39. Transport Layer Security (TLS)

Transport Layer Security (TLS)- A protocol that is used for establishing a secure connection between a client and a server.

38. Strong Password

Strong Password- A password that is hard to detect by humans and computer programs.

37. Spyware

Spyware- Computer software that obtains information from a user's computer without the user's knowledge or consent.

36. Sniffer

Sniffer- software that monitor activities over the network private or public.

35. Secure Sockets Layer (SSL)

Secure Sockets Layer (SSL)- a protocol developed by Netscape for transmitting private documents via the internet.

34. Repetitive strain Injury (RSI)

Repetitive strain Injury (RSI)- Any of a number of debilitating disorders caused by the stress of repeated movements.

33. Public Key

Public Key- A cryptographic approach which involves the use of asymmetric key algorithms instead of or in addition to symmetric key algorithms.

32. Private Key

Private Key- the unpublished key in a cryptographic system that uses two keys.

31. Keylogger

Keylogger- The practice of tracking the keys struck on a keyboard, typically in a covert manner so that the person using the keyboard is unaware that their actions are being monitored.

30. Hardware Firewall

Hardware Firewall- a system designed to prevent unauthorized access to or from a private network.

29. Hacking

Hacking- The process of breaking into computers, usually by gaining access to administrative controls. 

28. Brute Force Attacks

Brute Force Attacks- A strategy used to break the encryption of data.

27. Browser hijacking

Browser hijacking- The modification of a web browser's settings by malware.

26. Telecommuting

Telecommuting- Employment at home while communicating with the workplace by phone or fax or modem.

25. Online Learning

Online Learning- education that happens online via computer.

24. Keyless Entry System

Keyless Entry System- a system made to remotely permit or deny access to premises or cars.

23. Electronic Commerce (e-commerce)

Electronic Commerce (e-commerce)- The buying and selling of products or services over electronic systems such as the internet and other computer networks.

22. Digital Cash

Digital Cash- a system that permits a person to pay for goods or services by transmitting a number from one computer to another.

21. Critical Thinking

Critical Thinking- Mental skills employed in problem-solving and intellectual consideration and innovation.

20. Business-to-Goverment (B2G)

Business-to-Government (B2G)- symbolizes online communication between business entities and government.

19. Business-to-Consumer (B2C)

Business-to-Consumer (B2C)- Describes activities of businesses serving end consumers with products and services.

Thursday, January 13, 2011

17. Wildcard Character

Wildcard Character- A character that may be substituted for any of a defined subset of all possible characters.

16. Wiki

Wiki- A website that lets the easy creation and editing of any number of interlinked web pages via a web browser using a simplified markup language or a WYSIWYG text editor.

Wednesday, January 12, 2011

15. Trademark

Trademark- a word, symbol, or phrase used to identify a particular company's product and differentiate it from other companies' products.

14. Shared bookmark

Shared bookmark- a shared marked document.

13. Search Engine

Search Engine- A computer program that retrieves documents or files or data from a database or from a computer network.

12. Related Search

Related Search- Search related to your original search.

11. Public Domain

Public Domain- Property rights that are held by the public at large.

10. Podcatcher

Podcatcher- A computer program used to download various media via an rss or xml feed.

9. Plagiarism

Plagiarism- A piece of writing that has been copied from someone else and is presented as being your own work.

8. Phrase Searching

Phrase Searching- a search engine may provide an option to search a set of words as a phrase.

7. Peer-to- Peer (P2P)

Peer-to- Peer (P2P)- a system in which two or more nodes or processes can initiate communications with each other.

6. News Feed

News Feed- a data format used for providing users with frequently updated content.

5. Math Symbols

Math Symbols- symbols that represent mathematical equations.

4. Link List

Link List- a data structure that consists of a sequence of data records such that in each record there is a field that contains a reference to the next record in the sequence.

3. Libel

Libel- a false and malicious publication printed for the purpose of defaming a living person.

2. keywords

Keywords- a keyword is a word or identifier that has a particular meaning to the programming language.

1. Indexes

Indexes- a data structure that improves the speed of data retrieval operations on a database table at the cost of slower writes and increased storage space.