Wednesday, December 3, 2025

Flags

 SWEDISH FLAG


EUROPEAN FLAG



UNITED STATES FLAG






To make the flags, I used the application Inkscape, which is a vector design program. With this app, I used geometric shapes, lines, and colors to create the flags as accurately as possible.
The flag I chose was the United States flag because it is very recognizable with its red and white stripes and stars. I also chose it because it helped me practice repeating elements, like the stars, and working with alignment and proportions.
Overall, Inkscape is a useful tool because it allows you to create precise designs and is easy to use.


Wednesday, November 12, 2025

Chart digital image

 




Digital Image- problems

PROBLEMS

41.- Think you want to print out a photograph with a size of DIN A4: 210 × 297 mm

maintaining a printing quality of 200 dpi. Which resolution would the image need? 

 DIN A4 Size:210 x 297=8.27x 11.69 inches

Quality of 200 dpi

Wide:1654 px
Height:2338 px

The image should have a resolution of 1654 × 2338 pixels to be printed at A4 size (210 × 297 mm) with a quality of 200 dpi.

42.- Which resolution would the same picture need to have a 300 dpi picture?

DIN A4 size: 210 × 297 mm = 8.27 × 11.69 inches.
Quality of 300 dpi:

Width  = 2481 pixels
Height  = 3507 pixels

Therefore, the image should have a resolution of 2481 × 3507 pixels (approximately 8.7 MP) to be printed in A4 size at 300 dpi quality.

Wednesday, October 22, 2025

Digital security

 Problem 2: Phishing Attacks

1.Definition

Phishing is a type of cyber attack where attackers trick you into giving up personal information like usernames, passwords, or bank details by pretending to be someone trustworthy (e.g., your bank, a friend, or a company).

Phishing usually comes in the form of:

  • Emails

  • Text messages (SMS phishing or "smishing")

  • Instant messages

  • Fake websites that look real

2.Good Links for Information

Here are some trusted sources where you can learn more:

  1. Cybersecurity & Infrastructure Security Agency (CISA)

  2. National Cyber Security Centre (UK)

  3. Google - How to identify phishing

  4. Norton - Guide to phishing

  5. Microsoft Security

3.Five Good Tips to Avoid or Solve Phishing Attacks

  1. Never click on suspicious links or attachments

    • Always double-check the sender's email address and hover over links to see where they go before clicking.

  2. Use Two-Factor Authentication (2FA)

    • Adds an extra layer of protection even if your password is stolen.

  3. Keep your software and antivirus updated

    • Security updates help protect against the latest phishing tactics and malware.

  4. Use unique, strong passwords for every account

    • A password manager can help you remember them.

  5. Report phishing attempts

4. Feedback Form: What’s the Best Tip?

Please vote the tip you think is the most helpful:

5.Chart Online Form Results

Below is a mock-up chart showing results from 200 users who voted for the best anti-phishing tip:

TipVotesPercentage
Tip 16532.5%
Tip 24020%
Tip 33517.5%
Tip 43015%
Tip 53015%

Most popular tip: Tip 1: Avoid suspicious links and attachments

Tuesday, October 21, 2025

Digital Security

 

Problem 1: Opening Suspicious Emails That Install Malware

1. Problem Description

Many cyberattacks start when people open emails that appear legitimate but are actually fake or dangerous. These emails might come from what looks like a friend, bank, delivery company, or tech service. They often contain links or attachments that, when clicked or opened, download malware onto your computer or mobile device.

Once malware is installed, it can:

  • Steal your passwords, photos, and files

  • Spy on your activities

  • Lock your data (ransomware)

  • Use your computer to attack others

This type of attack is extremely common and is often called a phishing attack.

2. Name and Definition of the Item

 Item Name: Malware

Definition:
Malware (short for malicious software) is software specifically designed to:

  • Damage, disrupt, or take control of a device

  • Spy on the user

  • Steal personal or financial data

  • Secretly run in the background without permission

Common types of malware include:

  • Viruses

  • Trojans

  • Spyware

  • Ransomware

  • Keyloggers

3. Good Links to Learn More

Here are some reliable sources to understand malware and how to prevent it:

  1. CISA
  2. Norton – What is Malware?

  3. Malwarebytes – Malware Guide

  4. Kaspersky – 10 Signs of Malware Infection

  5. National Cybersecurity Alliance – Stay Safe Online

4. Five Good Tips to Avoid or Solve the Problem

Tips:
1️⃣Think before you click : If an email looks suspicious, don't open attachments or click links, even if it appears to come from someone you know.
2️⃣Use antivirus software :Install and regularly update trusted antivirus software to detect and remove threats.
3️⃣Keep your system updated : Regular updates fix security holes that hackers try to exploit.
4️⃣Don’t download unknown files :Never download attachments from unknown or unexpected sources.
5️⃣Check the sender's email address : A fake email might look real, but the sender's address may be slightly different or suspicious (e.g. @paypa1.com instead of @paypal.com).

5. Form: Vote for the Best Cybersecurity Tip

Click here to vote the best option☝

6. Chart: Online Results of the Form

Below is an example of how to show the results in a chart format (can be created using Excel or Google Sheets):

 Sample Chart (Bar Chart or Table View)

Tip NumberCybersecurity Tip DescriptionVotes
Tip #1Think before you click37
Tip #2Use antivirus software25
Tip #3Keep your system updated19
Tip #4Don’t download unknown files22
Tip #5Check the sender’s email address31

Most Voted Tip: Tip 1 - Think before you click

 Summary

Opening suspicious emails can lead to malware infections that harm your computer, steal your personal information, and even cost you money. The good news is that simple steps, like staying alert, using antivirus tools, and avoiding unknown links or files, can help you stay safe.

Tuesday, October 14, 2025

MY BLOG:

 REQUIMENTS I COMPLETE ON MY BLOG

I published my blog and made sure everything is working properly.
I shared the blog link with my teacher for review.
I chose a template that matches my personal style and fits the blog's theme.

MY BLOG
THE THEME

I went into the settings and switched the language to English.
I have written and published several blog posts.






I used tags (labels) in my posts to help organize the content.



I customized the blog by adding a unique favicon and a stylish header with a photo.



I created a post that includes images and useful links.








I published an entry that contains both an embedded video and an audio file.


I made three static pages with important content:
I added these pages to the main menu for easy access.
I disabled the comments on all static pages.
I checked all the settings to ensure everything is properly configured.

I reviewed and improved the design and layout to make my blog look polished and function smoothly.


Flags

 SWEDISH FLAG EUROPEAN FLAG UNITED STATES FLAG To make the flags, I used the application Inkscape , which is a vector design program. With t...