When making a Power Point, there are a few things you must take into consideration. Will your presentation hold your audience's interest? Is it fun and appealing to look at? Is your information relevant, and does it make sense to the crowd you are addressing. I looked up some tips on how to make a good Power Point.
-Use the right type faces.
-Put pictures and graphics that are relevant, yet fun to look at.
-Keep your writing content short and to the Point!
-Pick professional fonts.
-Don't use more than three different fonts in your presentation.
-Stunning visuals will make your presentations more readable.
-Never ever use Word Art, it looks tacky.
I found these tips really helped me to open my eyes to all the errors I have been making in my previous Power Points. You can find more tips for effective Power Points and a wonderful example here!
Tuesday, 13 May 2014
Tuesday, 6 May 2014
Computer Viruses
Cite for my Pics!
1. Summarize the definition of the following types of computer viruses in one sentence:
a) Worm
b) Trojan horse
c) Spyware
d) Rogue Security Software
-Worm, Trojan horse, Spyware, and Rogue security software are all small software programs that spread from one computer to another and interfere with the operation of your computer, they are nasty awful things that often use an email programs to spread. Cite!2. How do computer viruses get onto your computer?
-Viruses get onto your computer by you clicking on what seems to be funny attachments such as funny pictures, or videos. They are also often spread through the internet and the things that you get off there like software programs and pirated content you may have downloaded. Cite!
3. How do you know you have a computer virus?
-You can recognize that your computer has a virus if it is running more slowly than usual, if you are getting unexpected messages, your programs are starting up automatically, and if your hard disk is working overtime. Cite!
4. How do you avoid computer viruses?
-Never open an email attachment unless you are expecting it and know who it is from.
-Do not open any unsolicited executable files, documents, or spreadsheets.
-Avoid downloading documents from the internet (they are usually used to spread viruses).
-Never open files that have a double file extension, they often have titles like filename.txt.vbs.
-Do not send any files or links that you haven't first virus-checked. Cite!
5. What is an email virus and why is it dangerous?
-An email virus is a self-replicating computer program written to alter the way a computer operates, without the knowledge of the computer's user.
-The reason why they are so dangerous is because it can replace your existing files with corrupt ones. They may also delete data. Cite!
6. Who creates computer viruses and why?
-Computer viruses are created by a variety of teenagers, beginner programmers, graduated programmers, and shrewd researchers. Also hooligans, swindlers, blackmailers...
-They create viruses for their own personal gain and satisfaction at the misfortune of others.
-Some people create viruses for fun or for money. Cite!
7. Name three respectable anti-virus computer software programs that you could use to help protect you against computer viruses?
-Three anti-virus programs that help protect you computer are-AVG, Symantec, and Kapersky. Cite!
Monday, 5 May 2014
Picasa Editing
Unedited Picture
Edited Picture
Things about Pic that I Edited:
-Cropped
-Straightened and aligned
-Changed lighting and Shadow effect
-Switched it to Pencil sketch
-Strengthened sketch lines
-Increased Radius
-Darkened the fade
For the photo-editing I did today, I used Picasa and downloaded this truck from google images into my computer library.
Picasa part 1.
For todays assignment, we used the photo-editing program Picasa. To download it, we typed Picasa google.ca and clicked the download button. To make my collage, I went into my computer's library and uploaded a few pictures. I then rearranged them to my liking and gave it a nice coloured background. I saved it to Export and loaded it to my blog. I found this program very enjoyable and highly recommend it.
Tuesday, 15 April 2014
Use Cubes is a program that is mostly for fun. By dragging and stopping your mouse you can make pictures, word captions and cool structures that resemble Lego products. All the pictures of usecubes designs reminded me of Lego building blocks because everything has straight lines and corners, not curved anything to be exact. You can create your own account and hook it to gmail, facebook, or twitter so that you can save and share your creations. To download usecubes you must first click on google chrome, and up in the left corner it has a bunch of little coloured squares that are the app icon. Click on there and then type in usecubes to download it as an app. This program is free and the link is...
Sketchup
The program we used for this assignment was called Google Sketchup 8.http://www.sketchup.com/?gclid=CNvJlMLXzb0CFUqUfgod2m4AVA Is the link to get to this program. Google Sketchup is a designing program where you can make the plans and models for structures such as houses. You can use your imagination to decorate and furnish your structure in many different colors, stone types, wooden sidings, brick, and shingles. My first impression of the program was that it was a little difficult to understand, but as I worked with it, it became easier and quite fun. I learned that it is very important to save your work at each stage you finish. I really enjoyed how you could completely decorate your house and its surroundings, when I design my own house in the future I think it would be very useful and I look forward to using it. Sketchup can be found on the internet and is free to download. I highly recommend trying it out whether you are looking for a fun time or making plans and designs for a building or other type of structure.
Wednesday, 19 March 2014
Difference between CC and BCC
CC and BCC are both ways of sending copies of an email to additional people. However, you can also send copies of an email to additional people by specifying multiple addresses in the To field.
CC- The abbreviation CC comes from “carbon copy.” By placing a sheet of carbon paper between two pieces of paper, the pressure from writing on the first piece of paper will push the ink from the carbon paper down onto the second piece of paper, producing an additional copy of the document. Like a physical carbon copy, a CC is a way of sending additional copies of an email to other people. Some people refer to CC as “courtesy copy,” which better describes what a CC actually is. CC is often used as a verb, as in “I CC’d him on the email.”
BCC- BCC stands for “blind carbon copy.” Unlike with CC, no one can see the list of recipients on the BCC list. Someone on the BCC list can see everything else, including the CC list and the contents of the email. However, the BCC list is secret – no one can see this list. (If a person is on the BCC list, they’ll see only their own email on the BCC list.
CC is useful when:You want someone else to receive a copy of an email, but they aren’t one of the primary recipients.
BCC is useful when:You want someone else to receive an email, but you don’t want the primary recipients of the email to see you’ve sent this other person a copy. My references for this assignment.
CC- The abbreviation CC comes from “carbon copy.” By placing a sheet of carbon paper between two pieces of paper, the pressure from writing on the first piece of paper will push the ink from the carbon paper down onto the second piece of paper, producing an additional copy of the document. Like a physical carbon copy, a CC is a way of sending additional copies of an email to other people. Some people refer to CC as “courtesy copy,” which better describes what a CC actually is. CC is often used as a verb, as in “I CC’d him on the email.”
BCC- BCC stands for “blind carbon copy.” Unlike with CC, no one can see the list of recipients on the BCC list. Someone on the BCC list can see everything else, including the CC list and the contents of the email. However, the BCC list is secret – no one can see this list. (If a person is on the BCC list, they’ll see only their own email on the BCC list.
CC is useful when:You want someone else to receive a copy of an email, but they aren’t one of the primary recipients.
BCC is useful when:You want someone else to receive an email, but you don’t want the primary recipients of the email to see you’ve sent this other person a copy. My references for this assignment.
Tuesday, 11 March 2014
Internet Plagiarism
Plagiarism is using the work of others without acknowledging them. So basically STEALING! The problem with people practicing plagiarism is that it is a very bad habit. Internet plagiarism is a term used to describe the illegal use of written work, photographs, or graphics on a website. It is usually taken from another website without giving credit to the creator of the original content. The laws governing online content are the same as for printed materials. Activities such as this not only hurt the person who wrote or created it, but also the student who plagiarised the work, because they are abusing the system, being unfair to others who actually put in the work to do an honest job, and cheating themselves out of a proper education.
Citing Pictures-Label an inserted graphic Figure, Table, Chart, etc. and give it a number along with a caption (Author's Last name, First initial, and a brief description). Place the label and caption underneath your graphic.1
Photo credit: Lamphear C.
Citing Videos-Lastname, Firstname. "Title of Video." Online video clip. Publisher of video. Source, (date uploaded). Web. (date viewed).2
James Clay "Internet Plagiarism is a serious problem" says 58% of teachers.Uploaded on Jan 18, 2008 3 Citing Information-Always post the name of the sites that you got your information from.
Citing Pictures-Label an inserted graphic Figure, Table, Chart, etc. and give it a number along with a caption (Author's Last name, First initial, and a brief description). Place the label and caption underneath your graphic.1
Photo credit: Lamphear C.
Citing Videos-Lastname, Firstname. "Title of Video." Online video clip. Publisher of video. Source, (date uploaded). Web. (date viewed).2
Tuesday, 4 March 2014
Monday, 24 February 2014
Assignment S3.
Due to my short attention span and lack of computer skills I am most likely going to have great difficulty while learning to use Microsoft office throughout this course. There is a whole bunch of functions on the program that look like they will be quite challenging. I don't necessarily enjoy being in front of the computer for more than an hour and start to feel very anxious and get overwhelmed really easy when I have to do so. Gaining the self patience and mind endurance will be something I must do so that I might excel at this assignment. Though this time with you (Ms. Adams) will be a bit discouraging at times, because I ask so many questions and you will get really annoyed with me, I am thankful that you don't give up easily and have the determination to help our grade 11 class to become more computer savvy. I realize that it is very important for me to be able to operate Microsoft word efficiently for helping me to further my education in being a program where I can complete my assignments.
How to take a Screen Shot.
-First you hold down the Fn key, so that you will be able to press the PrtScn key that is located on the top line of the key board. This will make so Windows will capture the entire screen and copies it to the invisible clipboard.
- To save this as a document, hold down Ctrl and press V. Windows will now paste the screenshot into a document or image that you are currently editing.
- To paste this as an image, you need to go into Paint and open a graphics file, paste it and save it.
-Then click the insert image key on blogger to upload your picture to a blog post.
- To save this as a document, hold down Ctrl and press V. Windows will now paste the screenshot into a document or image that you are currently editing.
- To paste this as an image, you need to go into Paint and open a graphics file, paste it and save it.
-Then click the insert image key on blogger to upload your picture to a blog post.
- Never give out personal information, such as your name, home address, phone number, the name of your school, pictures, credit card numbers, or the names of your parents without permission from your parents.
- Never meet in person with someone you met online.
- Never give out your password to anyone.
- Use a gender neutral username in chat rooms so you are less likely to receive pornographic material or other forms of harassment. If you do receive pornographic material, report it to your local police department.
-I have posted on my Word Cloud encouraging words and safety tips for online users. This was a very influential lesson and gives me a lot to consider before I will add friend on Facebook and email from this time forward.
Monday, 17 February 2014
Microsoft Office
Due to my short attention span and lack of computer skills I am most likely going to have great difficulty while learning to use Microsoft office throughout this course. There is a whole bunch of functions on the program that look like they will be quite challenging. I don't necessarily enjoy being in front of the computer for more than an hour and start to feel very anxious and get overwhelmed really easy when I have to do so. Gaining the self patience and mind endurance will be something I must do so that I might excel at this assignment. Though this time with you (Ms. Adams) will be a bit discouraging at times, because I ask so many questions and you will get really annoyed with me, I am thankful that you don't give up easily and have the determination to help our grade 11 class to become more computer savvy. I realize that it is very important for me to be able to operate Microsoft word efficiently for helping me to further my education in being a program where I can complete my assignments.
Tuesday, 11 February 2014
Blog Basics
A blog is a type of website that is updated regularly with new content. Most blog's contain articles, feelings, views or ideas of the blogger called blog posts. These posts display a variety of media sources such as pictures, videos, and music. The majority of blogs are written by one person and are quite personal. Some of the most read blogs are written by a team of people who are paid to update the blog a few times a day and are set up very similar to magazines. Altogether, a blog is just a place where you can record and share your experiences, opinions, and interests. There's not a specific type of person who writes blogs. Anyone and everyone who wishes can and does blog. Most people however, blog for a hobby. The statistics of bloggers are 2 in 5 women, one third are over 45, 27% are 35-44, 31% are 25-34, 7% are under 24, 11% are 55-64, 3% are over 64, and 20% are 45-54. There are many reasons people blog. Some blog for their career, to express their opinions, keep others updated about their life, and to share fun ideas, stories and pictures.
Tuesday, 28 January 2014
1. I currently use computers for school projects. I have no home computer right now, so I type all my school assignments at the school computer lab.
-I do have Facebook and a Hotmail account, but I use my phone for those purposes.
2. I would rate my knowledge of computers probably intermediate. My typing is alright I guess, but I look down at my fingers quite a bit and would like to get better throughout the duration of this course.
-I do have Facebook and a Hotmail account, but I use my phone for those purposes.
2. I would rate my knowledge of computers probably intermediate. My typing is alright I guess, but I look down at my fingers quite a bit and would like to get better throughout the duration of this course.
Subscribe to:
Posts (Atom)








