Wednesday, 21 May 2014

          What does make a Good PowerPoint Presentation

  •        Here are 5 pointers on how to make a good power point presentation perfect!
  1. No more than six words on a slide. EVER. There is no presentation so complex that this rule needs to be broken. [Also recommended in another post: No bullets. Use a separate slide for each sentence or idea.]
  2. No cheesy images. Use professional stock photo images.
  3. No dissolves, spins or other transitions.
  4. Sound effects can be used a few times per presentation, but never use the sound effects that are built into the program. Instead, rip sounds and music from CDs and leverage the Proustian effect this can have. If people start bouncing up and down to the Grateful Dead, you’ve kept them from falling asleep, and you’ve reminded them that this isn’t a typical meeting you’re running.
  5. Don’t hand out print-outs of your slides. They don’t work without you there.
Power Points are an easy and fun way to make a presentation. And help the presentation look good! I enjoyed using this program it was fun and creative. :D

Tuesday, 13 May 2014

Computer Viruses’

1.a)  A computer virus also known as a computer worm is a standalone malware computer program that replicates itself in order to spread to other computers. It often uses a computer network to spread itself, relying on security failures on the target computer to access it. Unlike a computer virus, it doesn't need to attach itself to another program. Worms will almost always cause at least some harm to the network, even if only by consuming bandwidth, whereas viruses almost always corrupt or modify files on a targeted computer. http://en.wikipedia.org/wiki/Computer_worm
b)  A Trojan horse virus or Trojan, in computing is a generally non-self-replicating type of malware program, containing malicious code that, when executed, carries out actions determined by the nature of the Trojan, typically causing theft or loss of data, and maybe possible system harm. The term is derived from the story of the wooden horse used to trick defenders of Troy into taking concealed warriors into their city in ancient Anatolia, because computer Trojans often employ a form of social engineering, presenting themselves as routine, useful, or interesting in order to persuade victims to install them on their computers.
http://en.wikipedia.org/wiki/Trojan_horse_(computing)
c)  Spyware is software that aids in gathering information about a person or organization without their knowledge and that may send such information to another entity without the consumer's consent, or that asserts control over a computer without the consumer's knowledge.
http://en.wikipedia.org/wiki/Spyware
d)  Rogue-AV or rogue security software is a rogue (a form of Internet fraud using computer malware) that deceives or misleads users into paying money for fake or simulated removal of malware (so is a form of ransomware) — or it claims to get rid of, but instead introduces malware to the computer. Rogue security software has become a growing and serious security threat in desktop computing in recent years (from 2008 on).  http://en.wikipedia.org/wiki/Rogue_security_software

2.  These are a couple ways that you may get a computer virus
~E-Mail Attachments
~Network Shared Resources
~Removable Media
~Internet Downloads
~Document Files

3. These are a couple ways to tell if your computer has a virus
~Is your computer running very slowly?
~Are you getting unexpected messages, or are programs starting automatically?
~Is your modem or hard disk working overtime?

4. These are a couple ways to avoid computer viruses
~Install quality antivirus
~Install real-time anti-spyware protection
~Keep anti-malware applications current
~Perform daily scans
~Disable autorun

5. An e-mail virus is computer code sent to you as an e-mail note attachment which, if activated, will cause some unexpected and usually harmful effect, such as destroying certain files on your hard disk and causing the attachment to be remailed to everyone in your address book. Although not the only kind of computer virus, e-mail viruses are the best known and undoubtedly cause the greatest loss of time and money overall. http://us.wow.com/search?s_pt=aolsem&s_it=aolsem&s_chn=9&q=what%20is%20an%20email%20virus
Most spam is irritating and time-consuming, but some spam is positively dangerous to handle. Usually email scams are trying to get you to give up your bank details so that the fraudsters can either withdraw money, or steal your identity.

6.There are hundreds of thousands of viruses out there (if not millions) and they often designed for different objectives. Most of them fall under the following categories:

* To take control of a computer and use it for specific tasks
* To generate money
* To steal sensitive information (credit card numbers, passwords, personal details, data etc.)
* To prove a point, to prove it can be done, to prove ones skill or for revenge purposes
* To cripple a computer or network
7.
~http://us.wow.com/search?s_it=topsearchbox.search&s_chn=9&s_pt=aolsem&v_t=aolsem&q=Who+creates+computer+viruses+and+why%3F
https://www.barracuda.com/products/emailsecurityservice?&a=google-na_EmailSecurityServiceNA_hostedantivirus&kw=antivirus%20cloud&gclid=CPbN_K_yqb4CFZRcfgodUyAAsA
~http://www.webroot.com/us/en/home/sem/antivirus?gclid=CMjLrL3yqb4CFVGVfgodrToAMg
~http://www.symantec.com/pages.jsp?id=campaign-endpoint-protection&om_sem_cid=biz_sem_s100000000001052%7Cpcrid%7C35307578449%7Cpmt%7Cb%7Cplc%7C%7Cpdv%7Cc

Monday, 5 May 2014


I used a site called "Ribbet" to crop this picture. The top one is the after and the bottom is the before. I cropped the picture and then I used plastic surgery and made all three of our nose's a little smaller I changed the lighting a little bit and got rid of some shadows. That is all I did.
I went on line and downloaded a site called "Picasa" then i went into pictures that were already saved to my computer and made a collage out of the pictures and downloaded it to gmail.