Wednesday 9 December 2015

Self Evaluation

My final project was not what i had expected it to be, it went completely against my design specification, at first I tried to stick to my design specification, but I underwent problems with my sprites because they were not doing what I wanted them to do, for example if tried to hide a sprite it wouldnt hide almost as. So I decided to come up with new ideas and other possible sprites and backgrounds for my project. I had completely remodeled my scratch project and i was quite happy with the result, however i experienced a few technical issues and sometimes i would forget to save my project on my email and it would get deleted, so it took longer then expected for my project to finallly reach success.

I thought that instead of making it a normal story and bully attack I decided to make it more supernatural. The story is set in a school for monsters, monsters who conceal themselves from the public by posing as humans. The scratch project begins with a boy(SquareGuy) and a bully(Sam''s body, my head) both in the same area after school. The boy is cornered, the bully is his senior and has better control over his powers, and can easily overpower the boy.

The two transform and so begins the hunt. Another boy nearby notices what is going on and wishes to join the bully in pursueing the boy. Although he says no, the boy joins in anyway. He then transforms and follows the the two. (not in the project)They both managed to catch the boy. The killing intent can be seen clearly in their eyes as they tear the boy to pieces.

Methods of Evaluation

Method 1: Complete a self evaluation of your project against the design specification created in criteria B. Document any problems that you encountered with the different actions in scratch, such as not being able to add the appropriate background for your project, or difficulty adding music to my project, and malfunctioning sprites


Method 2: Complete the peer evaluation document that has been uploaded on Managebac with one of your peers. Email the document to each other, snip the document, and then upload it onto your blog.


Method 3: Prepare a questionaire about your project. Ask two of your peers to view your project and complete the questionaire. Post the results on your blog and reflect on what your peers have said about your project.

Wednesday 4 November 2015

Design Specification


  • Background:
  • Sprite used:
  • Music:
  • Speech:
  • Color:
  • Action taking place:

Tuesday 27 October 2015

SWAT Analysis

Threats
Strengths
If the information falls into the wrong hands people will know that Cyber Bullying victims will now be able to counteract Cyber Bullying, and find others means to abuse  those people.
People will now be aware that not everybody is who they seem, and will take care when communicating online with someone they do not know.

 People will know what to do when they are in a situation in which they are being abused online.

People will know to be secure around those who try to make friends with them online, and know how to ensure that the person they are talking to is who he/she claims to be.


Tuesday 20 October 2015

Research Plan


What will I research?
How will I gather this research? (Primary)
How will I gather this research(Secondary)
Why will I research this information?
When will I do this?
Pictures of Cyber Bullying
By taking pictures from the internet
By taking pictures from the internet
To find examples of what Cyber Bullying looks like
I will start this on the 25th of October
 Information on Cyber Bullying
I will search Cyber Bullying up on the internet, and gather the facts I need
I will search Cyber Bullying up on the internet, and gather the facts I need
To fully understand the concept of Cyber Bullying
I will start this on the 27th of October

Questionaire

1. What is Cyber Bullying?

2. What causes Cyber Bullying?

3. Have you ever known a victim of Cyber Bullying?

4. I

Tuesday 13 October 2015

Design Situation

My name is Saif Khan, I study at Emirates International School Meadows. It has come to my attention that in year 7 and above that there have been many incidents of cyber bullying and people making friends online with people that may not be who they seem. So i have decided to make a Story that shows the dangers of Cyber Bullying and how insecure the internet really is. This story is for all audiences who are unaware of the dangers of social media and other applications on the internet, but is mainly targeting teenagers because of their constant use of the internet.(Not that all of them do) Also in this story i will describe how one can deal with the situation of Cyber Bullying and abuse on social media.

Tuesday 29 September 2015

Inquiry and Analysing

Creative Computing
Creative computing is a highly interdisciplinary major that combines theory and methodology from computer science and engineering with aesthetic principles and creative practice from the arts. In addition, the program requires a capstone project and either a minor concentration or a second major. Study abroad is also highly recommended.
The major in creative computing crosses traditional disciplinary boundaries in response to technological innovation, contemporary arts practices and demands of the global marketplace. An underlying principle at the philosophical core of the major is the integration of creative and analytical study and practice – championing an integrated “whole brain” approach. The major in creative computing enables students to consider problems from many angles and conceptual frameworks, integrating widely disparate approaches and practices.
The program’s breadth enables students to target many different segments and professional opportunities within the digital economy, including software engineering, Web design, interactive design/development, mobile application development, 3-D modeling and animation, scientific visualization, and social media. It is anticipated that opportunities will continue to increase as the application of computation and digital processes continues to proliferate across all segments of the global economy.