210 likes | 389 Views
GPS Tracking Collars. By Carter Page. Scenario: The Environment Theme: GPS Topic: Mapping and Virtual Globes. IT Systems. Hardware Software Personal and Public Communications Databases Internet. IT Device. Hardware. Satellites – Input/output Device.
E N D
GPS Tracking Collars By Carter Page
Scenario: The Environment • Theme: GPS • Topic: Mapping and Virtual Globes
IT Systems • Hardware • Software • Personal and Public Communications • Databases • Internet
Works cited • Storm, Darlene. "Cyber-poaching: Hacking GPS Collar Data to Track and Kill Endangered Tigers." Computerworld. Computer World, 15 Oct. 2013. Web. 21 Oct. 2013. • Picture of tiger with collar: http://goodnature.nathab.com/poachers-hack-into-a-tigers-gps-collar-are-wildlife-tracking-devices-helping-criminals/ • GPS Flowchart: http://www.britishcouncil.org/professionals-exams-ielts-academic-5a.htm • Picture of Satellites: http://en.wikipedia.org/wiki/GPS_(satellite) • Picture of Radar: http://pt.wikipedia.org/wiki/Radar_(desambigua%C3%A7%C3%A3o) • Picture of Radio Tower: http://www.modestoradiomuseum.org/wooden%20tower%20closeup.html • Picture of GPS Collar: http://www.dusupply.com/tek-series-1-0-gps-tracking-collar.html • Picture of Computer: http://www.rkinfotechplp.in/hp-desktop-pc.htm • Picture of PathAway: http://pathaway.com/forum/ • Picture of Conservationists: http://indiatoday.intoday.in/story/mp-kanha-tiger-reserve-gifts-panna-tiger-reserve-a-tigress/1/159763.html • Picture of Poachers: http://www.ecotravellerguide.com/2012/07/indian-government-okays-shoot-on-sight-orders-to-prevent-tiger-poaching/ • Picture for security: http://www.ikeepsafe.org/be-a-pro/online-security/ • Picture for surveillance: http://www.papagoinvestigations.com/electronic_surveillance.html • Picture for authenticity: http://infed.org/mobi/seeking-out-the-gift-of-authenticity/