Channel Avatar

Rosebank College Academic TV @UCDbKE2JWmBTmKr97RHI4RvQ@youtube.com

5.4K subscribers - no pronouns :c

More from this channel (soon)


01:17
Crop Images and Layers (LU3/LO11)
01:14
Apply the Quick Mask Mode to make and Edit a Selection (LU3/LO10)
01:11
Turn a Selection into a Layer Mask (LU3/LO9)
01:11
Save and Load a Selection (LU3/LO8)
01:11
Modify and Adjust Selections (LU3/LO7)
01:16
Differentiate between Appropriation, Plagiarism, and Copyright Infringement (LU3/LO6)
01:18
Differentiate between Selecting Whole Layers and Selecting only an Area of a Layer (LU3/LO5)
01:05
Apply Fills to Layers (LU3/LO4)
01:24
Transform Layers and Selections (LU3/LO3)
01:18
Manage Canvas Size, Layers, and Art Boards in Photos (LU3/LO2)
01:21
Explain the Role of Layers in a Composition (LU3/LO1)
01:29
Apply Helper Tools for a more Efficient Workflow (LU2/LO10)
01:16
Explain the Functions of the Various Helper Tools in Adobe Photoshop (LU2/LO9)
01:10
Differentiate between Key File Formats for Print, Interactive, and Online use (LU2/LO8)
01:20
Differentiate between Downsampling Images for Print and Digital use (LU2/LO7)
01:13
Explain the Relationship between Image Size and Resolution (LU2/LO6)
01:13
Resize and Crop Images (LU2/LO5)
01:22
Use Rulers, Guides, and Grids to Control Precision (LU2/LO4)
01:21
Differentiate between Appropriation, Plagiarism, and Copyright Infringement (LU2/LO3)
01:13
Open, Save, and Close Documents in Photoshop (LU2/LO2)
01:13
Identify the Main Components of the Interface (tools and panels) (LU2/LO1)
01:24
Describe the Basic Features of a Firewall (LU8/LO10)
01:12
Explain how a Digital Signature Works (LU8/LO9)
01:17
Discuss the Role of Hashing in Data Encryption (LU8/LO8)
01:25
Distinguish between Symmetric Key Encryption and Public Key Encryption (LU8/LO7)
01:06
Discuss the Impact of Internet Security Breaches (LU8/LO6)
01:11
Describe the Protocols Applied in Internet Security (LU8/LO5)
01:09
Discuss Email Phishing (LU8/LO4)
01:15
Explain how a Message Digest Works (LU8/LO3)
01:07
Differentiate between Symmetric and Asymmetric Encryption (LU8/LO2)
01:15
Describe Various Categories of Internet Security Threats (LU8/LO1)
01:23
Explain the Purpose of Hypertext Pre-Processor (PHP) Language (LU7/LO7)
01:19
Discuss the Role of JavaScript in the Programming of Web Pages (LU7/LO6)
01:22
Describe the Key Features and Characteristics of JavaScript (LU7/LO5)
01:24
Differentiate Between the Functions of Cascading Style Sheets (CSS) and JavaScript (LU7/LO4)
01:08
Discuss the Uses of Cascading Style Sheets (CSS) (LU7/LO3)
01:13
Discuss the Functions of Various Hypertext Mark-up Language Tags (LU7/LO2)
00:56
Explain the Role of Hypertext Mark-up Language (HTML) in the World Wide Web (LU7/LO1)
01:10
Discuss the Common Uses of the Internet of Things (LU6/LO6)
01:16
Describe the Various Technologies that Support Connectivity in the Internet of Things (LU6/LO5)
01:20
Differentiate Between the Hardware and Software Used in the Internet of Things (LU6/LO4)
01:03
Discuss the Role of the Internet of Things in Society (LU6/LO3)
01:10
Discuss the Advantages and Disadvantages of the Internet of Things (LU6/LO2)
01:04
Describe the Key Features of the Internet of Things (LU6/LO1)
00:59
Analyse the use of Social Networking in Online Collaboration (LU5/LO6)
01:09
Discuss the Benefits of Online Training (LU5/LO5)
01:16
Explain how Newsgroups Work (LU5/LO4)
01:25
Discuss the Role of Mailing Lists in Online Collaboration (LU5/LO3)
01:12
Differentiate between different Types of Online Collaboration (LU5/LO2)
01:22
Explain the Importance of Online Collaboration in Business (LU5/LO1)
01:21
Differentiate between IPv4 and IPv6 Headers (LU4/LO15)
01:16
Explain how the Domain Name System Works (LU4/LO14)
01:12
Discuss the Hierarchy of the Domain Name System (DNS) (LU4/LO13)
01:20
Explain how Virtual Private Networks contribute to the Security of an Extranet (LU4/LO12)
01:15
Discuss the Advantages and Disadvantages of Intranets and Extranets (LU4/LO11)
01:15
Differentiate between Intranets and Extranets (LU4/LO10)
01:16
Describe the Services Offered by a Computer Network (LU4/LO9)
01:17
Describe the Technologies used to Support the Transition from IPv4 to IPv6 Addresses (LU4/LO8)
01:31
Differentiate between IPv4 and IPv6 Addresses (LU4/LO7)
01:14
Discuss the Key Features of Internet Protocol Version 6 Addressing (LU4/LO6)