Chrome Sign In

For students having trouble signing into Chrome with their DSBN account, enter this address directly into the Chrome address bar and you should be able to sign in properly:

chrome://chrome-signin

Why sign into Chrome?

It will sync your bookmarks and Chrome extensions so wherever you are logged into Chrome (other classes, at home, on your laptop) everything will be sync’d.

The Design Process

Design Process

This design process model is based on the Ontario 2008 Technological Education curriculum.

From the curriculum:

“Although processes such as this involve a framework of sequential steps, they are typically iterative processes that may require a retracing of steps, diversions to solve specific problems along the way, or even a return to the start of the process if it becomes clear that the situation needs to be clarified and the problem redefined. Problem solvers soon discover that the process calls for an open mind, the freedom to be creative, and a great deal of patience and persistence.”

The graphic above is based on one created by Jackie Griffith. Thanks to Jackie for allowing me to adapt it.

Click here to take a comical look at the design process!

Affinity Designer Tutorials

This is a work in progress…

  1. Affinity Designer 1.5 Overview (marketing video) (difficulty: n/a)
  2. The A to Z of Affinity Designer (“This A to Z list breaks down all the tools and panels, including some useful functions and features. It includes links to Affinity’s official short video tips and descriptions of what each tool can do to help you become acquainted with this program.”)
  3. Affinity Designer Tutorial: The Basics (overview video) (difficulty: 0)
  4. Basic Eyes (very basic) (video tutorial) (difficulty: 1)
  5. 3D Cube (very basic) (video tutorial) (difficulty: 1)
  6. Ketchup for Blood Book Cover (blog w/ video tutorial) (difficulty: 1)
  7. Fish in a Bubble  (video tutorial) (difficulty: 1)
  8. Shopping Logo (video tutorial) (difficulty: 1)
  9. Gear Head Logo (video tutorial) (difficulty: 2)
  10. Artistic Text (video tutorial) (difficulty: 2)
  11. Metal Text (video tutorial) (difficulty: 2)
  12. Glossy Sphere (video tutorial) (difficulty: 2)
  13. Flat Clock Design (video tutorial) (difficulty: 2)
  14. Fire Text Effect (video tutorial) (difficulty: 2)
  15. Wood Text with Reflection and Shadow (video tutorial) (difficulty: 2)
  16. Pumpkin Carriage (text tutorial) (difficulty: 2)
  17. Water Drops (video tutorial) (difficulty: 3)
  18. Water Dispersion Effect (video tutorial) (difficulty: 3)
  19. Flat Design Birthday Cake (text tutorial) (difficulty: 3)
  20. Captain America Shield (video tutorial) (difficulty: 4)
  21. Festive Christmas Fireplace (video tutorial) (difficulty: 4)
  22. Bunny Cupcake (speed art) (difficulty: 4)
  23. Cute Rooster (text tutorial) (difficulty: 5)
  24. Python Trace (video tutorial) (difficulty: 5)
  25. Let’s make BB8 (video tutorial) (difficulty: TBD)
  26. Making Galaxy (video tutorial) (difficulty: TBD)
  27. Dog Sketch Tracing | Part 2 (video tutorial) (difficulty: TBD)
  28. Lighthouse (text tutorial) (difficulty: TBD)

For the 2016-2017 BTT1O students, you must do a minimum of 8 tutorials, with no more than one “very basic” tutorial. The two that are mandatory are:

  1. Python Trace
  2. Cute Rooster

There are many additional AD tutorials at tutsplus.com and frankentoon.com.

Email Assignment

Awkward!
Picture source unknown.

What is a “Professional Use” Email Account?

A professional use email account is one that you would not be embarrassed to use with your employer or with the public. It must also be an accurate representation of your full name, not a nickname. Also, it must be an email address that is not related to your ISP (Internet Service Provider). Good, permanent email hosts are Gmail, Hotmail, or Yahoo. My own preference is Gmail because it integrates with tools like Picasa, Google Drive and Docs, the Google Group we may be using in this class, Google Keep, and other products.

Class Email Protocol

Be sure to include the course code in the subject line as well as some indication of what the subject is. Do not leave the subject line blank. An appropriate subject for this assignment would be:

TGJ2O Email Assignment

When replying, please include any previous dialog we have already had.

Assignment Overview

Send me (pbeens@gmail.com) an email from your “permanent and professional use” email account. In it, please tell me:

  • why you took this course,
  • what you are hoping to do in this course,
  • whether or not you are pursuing a career related to this course,
  • what background you have in this subject (hobbies, previous courses), and
  • what mark you hope to get.

(It might help to copy-and-paste the questions into your email.)

Note: be sure to read the Class Email Protocol above so you know what is expected in the subject line.

After I receive your email, I will send a quick reply so you are added to my address book.

BTT1O Mark Breakdown

Practical 50%
Tests (and/or quizzes) 10%
Assignments 10%
Culminating Project, Report, and/or ePortfolio 30%

BTT1O Expectations

Digital Literacy

Overall Expectations

By the end of this course, students will:

  1. demonstrate an understanding of the terminology associated with information and communication technology;
  2. demonstrate an understanding of the computer workstation environment;
  3. manage electronic files and folders;
  4. analyse options for accessing the Internet;
  5. apply effective techniques when conducting electronic research.

Continue reading “BTT1O Expectations”

Let’s Go Phishing!

In the spirit of yesterday’s Safer Internet Day

I often get asked which is better — Gmail or Hotmail (or its derivative outlook). The answer for me is so easy: Gmail, and one of the reasons is because it handles phishing attempts so much better than Hotmail.

I only log into my Hotmail account once a month or so, just to keep it alive. This time, there were approximately 20 emails in my inbox. A few were legitimate security alerts created by my Google account, a few were from Microsoft trying to sell me something or other, but the rest (over half) were phishing attempts — bogus emails attempting to get me to click a link where they would prompt me to reveal private details such as account numbers or passwords. Continue reading “Let’s Go Phishing!”