Wednesday, 21 May 2014

          What does make a Good PowerPoint Presentation

  •        Here are 5 pointers on how to make a good power point presentation perfect!
  1. No more than six words on a slide. EVER. There is no presentation so complex that this rule needs to be broken. [Also recommended in another post: No bullets. Use a separate slide for each sentence or idea.]
  2. No cheesy images. Use professional stock photo images.
  3. No dissolves, spins or other transitions.
  4. Sound effects can be used a few times per presentation, but never use the sound effects that are built into the program. Instead, rip sounds and music from CDs and leverage the Proustian effect this can have. If people start bouncing up and down to the Grateful Dead, you’ve kept them from falling asleep, and you’ve reminded them that this isn’t a typical meeting you’re running.
  5. Don’t hand out print-outs of your slides. They don’t work without you there.
Power Points are an easy and fun way to make a presentation. And help the presentation look good! I enjoyed using this program it was fun and creative. :D

Tuesday, 13 May 2014

Computer Viruses’

1.a)  A computer virus also known as a computer worm is a standalone malware computer program that replicates itself in order to spread to other computers. It often uses a computer network to spread itself, relying on security failures on the target computer to access it. Unlike a computer virus, it doesn't need to attach itself to another program. Worms will almost always cause at least some harm to the network, even if only by consuming bandwidth, whereas viruses almost always corrupt or modify files on a targeted computer. http://en.wikipedia.org/wiki/Computer_worm
b)  A Trojan horse virus or Trojan, in computing is a generally non-self-replicating type of malware program, containing malicious code that, when executed, carries out actions determined by the nature of the Trojan, typically causing theft or loss of data, and maybe possible system harm. The term is derived from the story of the wooden horse used to trick defenders of Troy into taking concealed warriors into their city in ancient Anatolia, because computer Trojans often employ a form of social engineering, presenting themselves as routine, useful, or interesting in order to persuade victims to install them on their computers.
http://en.wikipedia.org/wiki/Trojan_horse_(computing)
c)  Spyware is software that aids in gathering information about a person or organization without their knowledge and that may send such information to another entity without the consumer's consent, or that asserts control over a computer without the consumer's knowledge.
http://en.wikipedia.org/wiki/Spyware
d)  Rogue-AV or rogue security software is a rogue (a form of Internet fraud using computer malware) that deceives or misleads users into paying money for fake or simulated removal of malware (so is a form of ransomware) — or it claims to get rid of, but instead introduces malware to the computer. Rogue security software has become a growing and serious security threat in desktop computing in recent years (from 2008 on).  http://en.wikipedia.org/wiki/Rogue_security_software

2.  These are a couple ways that you may get a computer virus
~E-Mail Attachments
~Network Shared Resources
~Removable Media
~Internet Downloads
~Document Files

3. These are a couple ways to tell if your computer has a virus
~Is your computer running very slowly?
~Are you getting unexpected messages, or are programs starting automatically?
~Is your modem or hard disk working overtime?

4. These are a couple ways to avoid computer viruses
~Install quality antivirus
~Install real-time anti-spyware protection
~Keep anti-malware applications current
~Perform daily scans
~Disable autorun

5. An e-mail virus is computer code sent to you as an e-mail note attachment which, if activated, will cause some unexpected and usually harmful effect, such as destroying certain files on your hard disk and causing the attachment to be remailed to everyone in your address book. Although not the only kind of computer virus, e-mail viruses are the best known and undoubtedly cause the greatest loss of time and money overall. http://us.wow.com/search?s_pt=aolsem&s_it=aolsem&s_chn=9&q=what%20is%20an%20email%20virus
Most spam is irritating and time-consuming, but some spam is positively dangerous to handle. Usually email scams are trying to get you to give up your bank details so that the fraudsters can either withdraw money, or steal your identity.

6.There are hundreds of thousands of viruses out there (if not millions) and they often designed for different objectives. Most of them fall under the following categories:

* To take control of a computer and use it for specific tasks
* To generate money
* To steal sensitive information (credit card numbers, passwords, personal details, data etc.)
* To prove a point, to prove it can be done, to prove ones skill or for revenge purposes
* To cripple a computer or network
7.
~http://us.wow.com/search?s_it=topsearchbox.search&s_chn=9&s_pt=aolsem&v_t=aolsem&q=Who+creates+computer+viruses+and+why%3F
https://www.barracuda.com/products/emailsecurityservice?&a=google-na_EmailSecurityServiceNA_hostedantivirus&kw=antivirus%20cloud&gclid=CPbN_K_yqb4CFZRcfgodUyAAsA
~http://www.webroot.com/us/en/home/sem/antivirus?gclid=CMjLrL3yqb4CFVGVfgodrToAMg
~http://www.symantec.com/pages.jsp?id=campaign-endpoint-protection&om_sem_cid=biz_sem_s100000000001052%7Cpcrid%7C35307578449%7Cpmt%7Cb%7Cplc%7C%7Cpdv%7Cc

Monday, 5 May 2014


I used a site called "Ribbet" to crop this picture. The top one is the after and the bottom is the before. I cropped the picture and then I used plastic surgery and made all three of our nose's a little smaller I changed the lighting a little bit and got rid of some shadows. That is all I did.
I went on line and downloaded a site called "Picasa" then i went into pictures that were already saved to my computer and made a collage out of the pictures and downloaded it to gmail.

Tuesday, 8 April 2014

The name of the program and version I am using is "Google Sketchup 8"       
here is the website link to help you find this program.
                         http://www.sketchup.com/?gclid=CNvJlMLXzb0CFUqUfgod2m4AVA
This is where to find the program in order to download it. It is free and easy to download. :D
http://www.sketchup.com/download/all

My first impression of the program was I thought it was pretty cool. It was fun to fool around on and gave me lots of ideas for a house. I would use it in the future to plan my house because it gives you a good vision of what could actually be. :D I recommend this program to all those who are in the process of building their homes. :D


These are the pictures of the house I built. :D

Monday, 31 March 2014

The Difference between CC and BCC
Cc is a carbon copy which means that whose address appears after the Cc: header would get a different copy of the message. And also, the Cc header would also appear inside the header of the message that was received by them.
Bcc is a blind carbon copy and it is similar to the Cc except that the Email address of the recipients specified in this field do not show up in the messages received by the header and the recipients in the To or Cc fields will not know that a copy sent to these address's.

http://email.cityu.edu.hk/faq/ccbcc.htm

Wednesday, 19 March 2014

It is really important that people understand plagiarism so they are able to better avoid it. This video I have chosen is all about understanding plagiarism, I got this video from youtube.
Here this photo shows some signs against plagiarism and how people use it everyday. Many people use plagiarism as an easy way out of doing homework, this isn't smart and if you are going to look off the internet then cite everything.
The idea to use this video and photo came from just searching what plagiarism was and information on it. As you can see I cited my stuff so you could know I did not make them myself and you could also know where I got them from.

Monday, 24 February 2014

1. Push the printscreen button at the top of your key board.
2. Hold Ctrl v to the paint site and save it to pictures jpeg
3. Then attach it to where ever you want.
Internet safety:
This video is a very good example of what could be at the other end of the chat room. If you don't know someone and meet them online there is no way to know that who you're talking to is who they say they really are.
This picture is made up of a bunch of word that should be followed to help you be wise on the internet. make sure you ask your parents before you talk to someone. Never put all real information on the internet. Make sure your parents are home if you decide to meet up with someone that you have never met. And if the person you are meeting says they have talked to your parents make sure you talk to your parents and be sure they really did. But all together it is just smarter to not give people personal information and be smart.

Tuesday, 18 February 2014

Microsoft word


The challenges I know I am going to face while learning how to use Microsoft word office is pretty much everything there is to learn. I don’t know even half the things that can be done on Microsoft.  I don’t know how to run all the things on it like coloring and bold facing things I don’t even know all things that can be done. However; I know learning how to use Microsoft word will be great help when I have to write reports and stories.  Also using it to copy and past things to it to relocate them to Gmail or other emailing sites. I know I will like using it better once I know how it works. I cant wait till I don’t have to have my hand held the whole time I am at the computer. I hope I can learn it all and in the end like what I’ve learned.

Tuesday, 11 February 2014

What is a blog?
A blog is a website that is updated regularly with new content. It can be all kinds of posts such as, pictures, videos, texts and other media. Writing a blog is a creative way to express your interests, experiences, and opinions. Blog writing can also be used for magazines, and movie scripts.

Who writes blogs?
You may think there is only a few people that blog. And that those few people all like the same things. Well they don't! All kinds of people blog for so many different reasons. Blogs are written by all ages of people all over the world.

Why do people Blog?
Most people that blog see it as a hobby. Blogging can be a very time consuming hobby and like I said before they do it for so many different reasons.
Such as:

  • To speak up about an issue I care about
  • To become more involved with my hobbies and passions
  • To be part of a community
  • To advance my career or start a career in writing
  • To keep my family and friends updated about my life\
  • To share my experiences

  • What do people blog about?
    A blog can be about anything in the world!
    People blog about most everything, think about anything, anything and it will most likely have been blogged about. People can write so dang much of just about anything. You can also learn a dang lot if you read peoples blogs.

    Tuesday, 28 January 2014

    1. I don't use computers at home or anywhere other than school. I only use them at school because my teacher makes me! I have learned how to sign onto Gmail and look up pictures on Google.
    2. I would rate myself beginner. I don't know how to do anything my teacher will most likely have to sit and hold my hand to help me understand how they work.