When making a Power Point, there are a few things you must take into consideration. Will your presentation hold your audience's interest? Is it fun and appealing to look at? Is your information relevant, and does it make sense to the crowd you are addressing. I looked up some tips on how to make a good Power Point.
-Use the right type faces.
-Put pictures and graphics that are relevant, yet fun to look at.
-Keep your writing content short and to the Point!
-Pick professional fonts.
-Don't use more than three different fonts in your presentation.
-Stunning visuals will make your presentations more readable.
-Never ever use Word Art, it looks tacky.
I found these tips really helped me to open my eyes to all the errors I have been making in my previous Power Points. You can find more tips for effective Power Points and a wonderful example here!
Kristi Computer Class
Tuesday, 13 May 2014
Tuesday, 6 May 2014
Computer Viruses
Cite for my Pics!
1. Summarize the definition of the following types of computer viruses in one sentence:
a) Worm
b) Trojan horse
c) Spyware
d) Rogue Security Software
-Worm, Trojan horse, Spyware, and Rogue security software are all small software programs that spread from one computer to another and interfere with the operation of your computer, they are nasty awful things that often use an email programs to spread. Cite!2. How do computer viruses get onto your computer?
-Viruses get onto your computer by you clicking on what seems to be funny attachments such as funny pictures, or videos. They are also often spread through the internet and the things that you get off there like software programs and pirated content you may have downloaded. Cite!
3. How do you know you have a computer virus?
-You can recognize that your computer has a virus if it is running more slowly than usual, if you are getting unexpected messages, your programs are starting up automatically, and if your hard disk is working overtime. Cite!
4. How do you avoid computer viruses?
-Never open an email attachment unless you are expecting it and know who it is from.
-Do not open any unsolicited executable files, documents, or spreadsheets.
-Avoid downloading documents from the internet (they are usually used to spread viruses).
-Never open files that have a double file extension, they often have titles like filename.txt.vbs.
-Do not send any files or links that you haven't first virus-checked. Cite!
5. What is an email virus and why is it dangerous?
-An email virus is a self-replicating computer program written to alter the way a computer operates, without the knowledge of the computer's user.
-The reason why they are so dangerous is because it can replace your existing files with corrupt ones. They may also delete data. Cite!
6. Who creates computer viruses and why?
-Computer viruses are created by a variety of teenagers, beginner programmers, graduated programmers, and shrewd researchers. Also hooligans, swindlers, blackmailers...
-They create viruses for their own personal gain and satisfaction at the misfortune of others.
-Some people create viruses for fun or for money. Cite!
7. Name three respectable anti-virus computer software programs that you could use to help protect you against computer viruses?
-Three anti-virus programs that help protect you computer are-AVG, Symantec, and Kapersky. Cite!
Monday, 5 May 2014
Picasa Editing
Unedited Picture
Edited Picture
Things about Pic that I Edited:
-Cropped
-Straightened and aligned
-Changed lighting and Shadow effect
-Switched it to Pencil sketch
-Strengthened sketch lines
-Increased Radius
-Darkened the fade
For the photo-editing I did today, I used Picasa and downloaded this truck from google images into my computer library.
Picasa part 1.
For todays assignment, we used the photo-editing program Picasa. To download it, we typed Picasa google.ca and clicked the download button. To make my collage, I went into my computer's library and uploaded a few pictures. I then rearranged them to my liking and gave it a nice coloured background. I saved it to Export and loaded it to my blog. I found this program very enjoyable and highly recommend it.
Tuesday, 15 April 2014
Use Cubes is a program that is mostly for fun. By dragging and stopping your mouse you can make pictures, word captions and cool structures that resemble Lego products. All the pictures of usecubes designs reminded me of Lego building blocks because everything has straight lines and corners, not curved anything to be exact. You can create your own account and hook it to gmail, facebook, or twitter so that you can save and share your creations. To download usecubes you must first click on google chrome, and up in the left corner it has a bunch of little coloured squares that are the app icon. Click on there and then type in usecubes to download it as an app. This program is free and the link is...
Sketchup
The program we used for this assignment was called Google Sketchup 8.http://www.sketchup.com/?gclid=CNvJlMLXzb0CFUqUfgod2m4AVA Is the link to get to this program. Google Sketchup is a designing program where you can make the plans and models for structures such as houses. You can use your imagination to decorate and furnish your structure in many different colors, stone types, wooden sidings, brick, and shingles. My first impression of the program was that it was a little difficult to understand, but as I worked with it, it became easier and quite fun. I learned that it is very important to save your work at each stage you finish. I really enjoyed how you could completely decorate your house and its surroundings, when I design my own house in the future I think it would be very useful and I look forward to using it. Sketchup can be found on the internet and is free to download. I highly recommend trying it out whether you are looking for a fun time or making plans and designs for a building or other type of structure.
Wednesday, 19 March 2014
Difference between CC and BCC
CC and BCC are both ways of sending copies of an email to additional people. However, you can also send copies of an email to additional people by specifying multiple addresses in the To field.
CC- The abbreviation CC comes from “carbon copy.” By placing a sheet of carbon paper between two pieces of paper, the pressure from writing on the first piece of paper will push the ink from the carbon paper down onto the second piece of paper, producing an additional copy of the document. Like a physical carbon copy, a CC is a way of sending additional copies of an email to other people. Some people refer to CC as “courtesy copy,” which better describes what a CC actually is. CC is often used as a verb, as in “I CC’d him on the email.”
BCC- BCC stands for “blind carbon copy.” Unlike with CC, no one can see the list of recipients on the BCC list. Someone on the BCC list can see everything else, including the CC list and the contents of the email. However, the BCC list is secret – no one can see this list. (If a person is on the BCC list, they’ll see only their own email on the BCC list.
CC is useful when:You want someone else to receive a copy of an email, but they aren’t one of the primary recipients.
BCC is useful when:You want someone else to receive an email, but you don’t want the primary recipients of the email to see you’ve sent this other person a copy. My references for this assignment.
CC- The abbreviation CC comes from “carbon copy.” By placing a sheet of carbon paper between two pieces of paper, the pressure from writing on the first piece of paper will push the ink from the carbon paper down onto the second piece of paper, producing an additional copy of the document. Like a physical carbon copy, a CC is a way of sending additional copies of an email to other people. Some people refer to CC as “courtesy copy,” which better describes what a CC actually is. CC is often used as a verb, as in “I CC’d him on the email.”
BCC- BCC stands for “blind carbon copy.” Unlike with CC, no one can see the list of recipients on the BCC list. Someone on the BCC list can see everything else, including the CC list and the contents of the email. However, the BCC list is secret – no one can see this list. (If a person is on the BCC list, they’ll see only their own email on the BCC list.
CC is useful when:You want someone else to receive a copy of an email, but they aren’t one of the primary recipients.
BCC is useful when:You want someone else to receive an email, but you don’t want the primary recipients of the email to see you’ve sent this other person a copy. My references for this assignment.
Subscribe to:
Posts (Atom)





