Norma Blackmore Comp. 12
Tuesday, 13 May 2014
As a blog assignment my teacher had me look up how to make a great interesting Power Point. I found that some of the suggestions to make your Power Point creative is to avoid writing too many words on each slides don't have more than six words. Avoid using bullets, use a slide for every sentence. To make a great Power Point make sure your font is big and bold. A little words go a long way when it comes to Power Points. Put pictures in the presentation that are not dull. This is all information that I found on making a great Power Point look here to find this information.
Tuesday, 6 May 2014
Computer Viruses
1. a) Worm = A worm is a type of computer bug that travels through other computers, that have some sort of breakdown in their software, by reproducing itself it can easily transfer from one susceptible computer to another.
b)Trojan = Trojan horse is another computer bug that pops up on your screen telling you to click on it or access it in some way, when you access it Trojan quickly takes hold of whatever it can in your computer, usually resulting in loss of files or other important information.
c) Spyware =Spyware is a program that takes over a persons computer without them knowing and collects their information and sends it to wherever the program pleases.
d)Rogue Security Software = It's a computer bug that basically convinces people to spend money to remove another bug, but instead of removing anything it adds more problems and gets away with stealing.
2. One way of getting a virus is when you are down loading movies or music, the virus is most likely in that program and once downloaded it appears on your computer.
3. One can tell if they have a virus if their computer is slow and programs pop up without you clicking on them.
4. To avoid getting a virus you must take precautions, when searching the internet be careful, don't click on pop ups.
5. An email virus is a bug that is usually sent in an attachment that is linked to harmful sites. It is dangerous because it could be asking you to give out personal information.
6. Lots of viruses are made to make money and they may be made by people that want to hurt some one.
7. Three programs that protect us are, Trend Micro, Titanium, and Maximum Security.
b)Trojan = Trojan horse is another computer bug that pops up on your screen telling you to click on it or access it in some way, when you access it Trojan quickly takes hold of whatever it can in your computer, usually resulting in loss of files or other important information.
c) Spyware =Spyware is a program that takes over a persons computer without them knowing and collects their information and sends it to wherever the program pleases.
d)Rogue Security Software = It's a computer bug that basically convinces people to spend money to remove another bug, but instead of removing anything it adds more problems and gets away with stealing.
2. One way of getting a virus is when you are down loading movies or music, the virus is most likely in that program and once downloaded it appears on your computer.
3. One can tell if they have a virus if their computer is slow and programs pop up without you clicking on them.
4. To avoid getting a virus you must take precautions, when searching the internet be careful, don't click on pop ups.
5. An email virus is a bug that is usually sent in an attachment that is linked to harmful sites. It is dangerous because it could be asking you to give out personal information.
6. Lots of viruses are made to make money and they may be made by people that want to hurt some one.
7. Three programs that protect us are, Trend Micro, Titanium, and Maximum Security.
Monday, 5 May 2014
Tuesday, 15 April 2014
These pictures are of a house that I built on a program called Google Sketchup 8. If you would like to find this program you can click here. The program is great and completely free. When I first started using Sketchup I thought I would never get it, but it turns out that it is lots of fun. I can most definitely see my self using this program for both recreation and maybe even designing my own home.
Monday, 14 April 2014
Check out my UseCube's picture here
Usecebes is a Google Chrome app that can be used to create fun creative pictures out of cubes. In order to download Usecubes you have to have Google Chrome, if you don't have it then it can be easily downloaded. Once you have Google Chrome you just need to type in Usecubes. Once you have found it then you can click the free button. Yes it is true it's free! Sign into Usecubes with your Google account, then click free again, and it is that easy.
Usecebes is a Google Chrome app that can be used to create fun creative pictures out of cubes. In order to download Usecubes you have to have Google Chrome, if you don't have it then it can be easily downloaded. Once you have Google Chrome you just need to type in Usecubes. Once you have found it then you can click the free button. Yes it is true it's free! Sign into Usecubes with your Google account, then click free again, and it is that easy.
Tuesday, 18 March 2014
Cc: stands for "carbon copy." Anyone listed in the Cc: field of a message receives a copy of that message when you send it. All other recipients of that message can see that the person you designated as a Cc: recipient has received a copy of the message.
Bcc: stands for "blind carbon copy." This is similar to the Cc: feature, except that Bcc: recipients are invisible to all the other recipients of the message (including other Bcc: recipients). For example, if you send a message To: johndoe@yahoo.com and Bcc: janedoe@yahoo.com, then johndoe sees himself as the message's only recipient. Janedoe, on the other hand, is "in the know"—she can see that you sent the message To: johndoe, and that you blind-copied her. To add an entry in the Bcc: field, click the "Show BCC" link to the right of the "To:" field.
Note: To send a message, you must always specify at least one recipient in the "To:" field. If you don't, an error message appears when you attempt to send the message.
http://answers.yahoo.com/question/index?qid=20080324164129AAnN9ZC
Bcc: stands for "blind carbon copy." This is similar to the Cc: feature, except that Bcc: recipients are invisible to all the other recipients of the message (including other Bcc: recipients). For example, if you send a message To: johndoe@yahoo.com and Bcc: janedoe@yahoo.com, then johndoe sees himself as the message's only recipient. Janedoe, on the other hand, is "in the know"—she can see that you sent the message To: johndoe, and that you blind-copied her. To add an entry in the Bcc: field, click the "Show BCC" link to the right of the "To:" field.
Note: To send a message, you must always specify at least one recipient in the "To:" field. If you don't, an error message appears when you attempt to send the message.
http://answers.yahoo.com/question/index?qid=20080324164129AAnN9ZC
Subscribe to:
Posts (Atom)






