SlideShare ist ein Scribd-Unternehmen logo
1 von 29
Computer Technology 
By: Meaghan Cyr
GGuueessss WWhhaatt…….... 
This report will broaden your view of the technology that is at 
your fingertips. 
This report will broaden your view of the technology that is at 
your fingertips.
Using Online 
Templates
The Advantages of using Online 
Templates
Plagiarism
WWhhaatt’’ss TThhee PPrroobblleemm 
The problem with 
plagiarism is it can 
ruin your career 
and get you kicked 
out of school. 
The problem with 
plagiarism is it can 
ruin your career 
and get you kicked 
out of school.
TThhee SSoolluuttiioonn 
• The solution is simple give 
credit to sources. 
• Add footnotes at the end of 
each 
slide 
.
Charts
Why Charts are important 
• Charts are visually appealing 
and make it easy for you to see 
comparisons, patterns, and trends 
in the data 
• Instead of analyzing columns of 
numbers, you can see at a glance 
whether your typing speed is falling 
or rising.
Cloud Computing
AAddvvaannttaaggeess ooff tthhee iiCClloouudd 
Some advantages of the iCloud are: 
•The fact that all of our files are at our fingertips. 
iWork documents, iTunes purchases, Safari tabs, 
iBooks, and your email will sync to any apple 
device. 
•The simplicity of the iCloud also makes it user 
friendly. 
Some advantages of the iCloud are: 
•The fact that all of our files are at our fingertips. 
iWork documents, iTunes purchases, Safari tabs, 
iBooks, and your email will sync to any apple 
device. 
•The simplicity of the iCloud also makes it user 
friendly.
Advantages Of iCloud 
Continued 
•iCloud also automatically customizes all of 
your devices with all your apps, photos, and 
media. With this feature the transition from one 
device to another is made as smooth as 
possible.
DDiissaaddvvaannttaaggeess OOff tthhee iiCClloouudd 
• One disadvantage of the iCloud is: as technology develops 
people 
• One disadvantage of the iCloud is: as technology develops 
people 
can hack into the iCloud and steal your identity and much 
more. 
• If some kind of system beat the iOS then it would be very 
hard to get all 
can hack into the iCloud and steal your identity and much 
more. 
• If some kind of system beat the iOS then it would be very 
hard to get all 
your personal off the iCloud. 
your personal off the iCloud. 
• Another problem is privacy, Apple knows our names, credit 
cards, likes, 
• Another problem is privacy, Apple knows our names, credit 
cards, likes, 
dislikes, emails, passwords, friends, family, trips, guilty 
online pleasures, etc… 
dislikes, emails, passwords, friends, family, trips, guilty 
online pleasures, etc…
5 Rules 
• Keep identity a secret. Don’t give up personal information. 
Ex. name, 
home address, or phone number for usernames don’t 
use your real name 
use a fake name. 
• Be carful with strangers. Let your parents know about 
online friends. 
• Tell somebody. Tell someone if a person is making you 
feel uncomfortable
5 Rules Continued 
• Keep your passwords safe. No one needs to know your 
passwords 
• Be nice. People will return the favor.
Clipart 
Clipart is important because it really makes the report pop. 
Clipart makes the report look fun and it helps the viewer get 
more interaction 
with the report. 
Clipart makes the report look neat and nice to look at.
Malware 
• Malware is short for malicious viruses. Criminals use 
malware to steal your maney 
a identity 
• Prevention is easy download security software from a 
trusted web site. 
• One sign of malware is if your computer runs slowly.
Netiquette Tips 
• Don’t write in all CAPS it looks like you are yelling. 
• Internet isn’t a private place so be careful what you 
post. 
• Always ask permission when posting things about 
your friends
Netiquette 
• Netiquette is a set of rules for how to act online 
• A good way to avoid trouble is to treat others like 
you want to be treated!
What I Think Of Texting 
I think that when texting is 
overused it can be dangerous. 
There is a time a place for it. 
I think that when texting is 
overused it can be dangerous. 
There is a time a place for it.
Social Networking
All About Social Media 
Meet others with the same interests . 
Keep friends updated on activities 
Share only what you wouldn’t mind being made 
into a banner ad
My Profile 
My fav Movie: Mockingjay 
My fav flavor of cupcakes is: red 
velvet 
My fav food is: pizza
TThhee EEnndd 
HHooppee yyoouu eennjojoyyeedd mmyy rreeppoorrtt
Sources 
• http://www.plagiarism.org/plagiarism-101/what-is-plagiarism 
/ 
www.princexml.com/doc/footnotes 
Brain pop 
Dafont 
Google 
Wikipedia

Weitere ähnliche Inhalte

Was ist angesagt?

Safe and Responsible Use of ICT
Safe and Responsible Use of ICTSafe and Responsible Use of ICT
Safe and Responsible Use of ICTRolly Franco
 
Cloud Computing
Cloud ComputingCloud Computing
Cloud Computingsmoreland
 
Media etiquette 2021
Media etiquette 2021Media etiquette 2021
Media etiquette 2021Mark Kor
 
Your e image presentation 2
Your e image presentation 2Your e image presentation 2
Your e image presentation 2opiedog1
 
The Ten Commandments of Online Security and Privacy
The Ten Commandments of Online Security and PrivacyThe Ten Commandments of Online Security and Privacy
The Ten Commandments of Online Security and PrivacyJonathan Bacon
 
Computing and ethics
Computing and ethicsComputing and ethics
Computing and ethicsNikki Shree
 
Angelique s Do Something Project
Angelique s Do Something ProjectAngelique s Do Something Project
Angelique s Do Something Projectjtiggs
 
Internet Safety for Kids and Parents
Internet Safety for Kids and Parents Internet Safety for Kids and Parents
Internet Safety for Kids and Parents Rajesh Soundararajan
 
Student presentation
Student presentationStudent presentation
Student presentationsuzybelonga
 
Empowerment Technology Lesson 2
Empowerment Technology Lesson 2Empowerment Technology Lesson 2
Empowerment Technology Lesson 2alicelagajino
 
LinkedIn to Your Network - The Social Engineering Threat
LinkedIn to Your Network - The Social Engineering ThreatLinkedIn to Your Network - The Social Engineering Threat
LinkedIn to Your Network - The Social Engineering ThreatLancope, Inc.
 
Parent GuideBook Internet Safety (1)
Parent GuideBook Internet Safety (1)Parent GuideBook Internet Safety (1)
Parent GuideBook Internet Safety (1)Matt Forney
 
Cyber security-awareness-for-social-media-users - Devsena Mishra
Cyber security-awareness-for-social-media-users - Devsena MishraCyber security-awareness-for-social-media-users - Devsena Mishra
Cyber security-awareness-for-social-media-users - Devsena MishraDevsena Mishra
 

Was ist angesagt? (20)

Safe and Responsible Use of ICT
Safe and Responsible Use of ICTSafe and Responsible Use of ICT
Safe and Responsible Use of ICT
 
Lesson 2
Lesson 2Lesson 2
Lesson 2
 
Cloud Computing
Cloud ComputingCloud Computing
Cloud Computing
 
Marc Recommendations For Parents
Marc Recommendations For ParentsMarc Recommendations For Parents
Marc Recommendations For Parents
 
Media etiquette 2021
Media etiquette 2021Media etiquette 2021
Media etiquette 2021
 
Privacy Primer
Privacy PrimerPrivacy Primer
Privacy Primer
 
Your e image presentation 2
Your e image presentation 2Your e image presentation 2
Your e image presentation 2
 
The Ten Commandments of Online Security and Privacy
The Ten Commandments of Online Security and PrivacyThe Ten Commandments of Online Security and Privacy
The Ten Commandments of Online Security and Privacy
 
Computing and ethics
Computing and ethicsComputing and ethics
Computing and ethics
 
Angelique s Do Something Project
Angelique s Do Something ProjectAngelique s Do Something Project
Angelique s Do Something Project
 
Safe Computing
Safe ComputingSafe Computing
Safe Computing
 
Tech tips for non techies
Tech tips for non techiesTech tips for non techies
Tech tips for non techies
 
Internet Safety for Kids and Parents
Internet Safety for Kids and Parents Internet Safety for Kids and Parents
Internet Safety for Kids and Parents
 
Student presentation
Student presentationStudent presentation
Student presentation
 
Empowerment Technology Lesson 2
Empowerment Technology Lesson 2Empowerment Technology Lesson 2
Empowerment Technology Lesson 2
 
Internet security
Internet securityInternet security
Internet security
 
App Privacy
App PrivacyApp Privacy
App Privacy
 
LinkedIn to Your Network - The Social Engineering Threat
LinkedIn to Your Network - The Social Engineering ThreatLinkedIn to Your Network - The Social Engineering Threat
LinkedIn to Your Network - The Social Engineering Threat
 
Parent GuideBook Internet Safety (1)
Parent GuideBook Internet Safety (1)Parent GuideBook Internet Safety (1)
Parent GuideBook Internet Safety (1)
 
Cyber security-awareness-for-social-media-users - Devsena Mishra
Cyber security-awareness-for-social-media-users - Devsena MishraCyber security-awareness-for-social-media-users - Devsena Mishra
Cyber security-awareness-for-social-media-users - Devsena Mishra
 

Andere mochten auch

Presentation on binary search, quick sort, merge sort and problems
Presentation on binary search, quick sort, merge sort  and problemsPresentation on binary search, quick sort, merge sort  and problems
Presentation on binary search, quick sort, merge sort and problemsSumita Das
 
Im260 presentation
Im260 presentationIm260 presentation
Im260 presentationmojo0402
 
Difference b/w LED and LCD
Difference b/w LED and LCD Difference b/w LED and LCD
Difference b/w LED and LCD Infant Gopinath
 
Quicksort Presentation
Quicksort PresentationQuicksort Presentation
Quicksort Presentationirdginfo
 
Digital marketing overview bl
Digital marketing overview blDigital marketing overview bl
Digital marketing overview blManish Chaudhary
 
Quick sort-Data Structure
Quick sort-Data StructureQuick sort-Data Structure
Quick sort-Data StructureJeanie Arnoco
 
Algorithm: Quick-Sort
Algorithm: Quick-SortAlgorithm: Quick-Sort
Algorithm: Quick-SortTareq Hasan
 
Quick Sort , Merge Sort , Heap Sort
Quick Sort , Merge Sort ,  Heap SortQuick Sort , Merge Sort ,  Heap Sort
Quick Sort , Merge Sort , Heap SortMohammed Hussein
 
Top 10 inventions that changed the world (elenka maam)
Top 10 inventions that changed the world (elenka maam)Top 10 inventions that changed the world (elenka maam)
Top 10 inventions that changed the world (elenka maam)sheldon pereira
 
Internet banking - College Project
Internet banking - College ProjectInternet banking - College Project
Internet banking - College ProjectSheril Daniel
 
Coeducation
CoeducationCoeducation
Coeducationskmaken
 
Ecommerce final ppt
Ecommerce final pptEcommerce final ppt
Ecommerce final pptreemalmarri
 
Newspapers vs internet news
Newspapers vs internet newsNewspapers vs internet news
Newspapers vs internet newsgreatnewsupdate
 

Andere mochten auch (20)

Presentation on binary search, quick sort, merge sort and problems
Presentation on binary search, quick sort, merge sort  and problemsPresentation on binary search, quick sort, merge sort  and problems
Presentation on binary search, quick sort, merge sort and problems
 
Im260 presentation
Im260 presentationIm260 presentation
Im260 presentation
 
eCommerce Report 2016
eCommerce Report 2016eCommerce Report 2016
eCommerce Report 2016
 
Difference b/w LED and LCD
Difference b/w LED and LCD Difference b/w LED and LCD
Difference b/w LED and LCD
 
Quicksort Presentation
Quicksort PresentationQuicksort Presentation
Quicksort Presentation
 
Digital marketing overview bl
Digital marketing overview blDigital marketing overview bl
Digital marketing overview bl
 
Quick sort-Data Structure
Quick sort-Data StructureQuick sort-Data Structure
Quick sort-Data Structure
 
Ecommerce
EcommerceEcommerce
Ecommerce
 
Merge sort and quick sort
Merge sort and quick sortMerge sort and quick sort
Merge sort and quick sort
 
Algorithm: Quick-Sort
Algorithm: Quick-SortAlgorithm: Quick-Sort
Algorithm: Quick-Sort
 
Quick Sort , Merge Sort , Heap Sort
Quick Sort , Merge Sort ,  Heap SortQuick Sort , Merge Sort ,  Heap Sort
Quick Sort , Merge Sort , Heap Sort
 
Top 10 inventions that changed the world (elenka maam)
Top 10 inventions that changed the world (elenka maam)Top 10 inventions that changed the world (elenka maam)
Top 10 inventions that changed the world (elenka maam)
 
Internet banking - College Project
Internet banking - College ProjectInternet banking - College Project
Internet banking - College Project
 
Quick Sort
Quick SortQuick Sort
Quick Sort
 
Newspaper vs internet
Newspaper vs internetNewspaper vs internet
Newspaper vs internet
 
Co education
Co educationCo education
Co education
 
Coeducation
CoeducationCoeducation
Coeducation
 
Social Network Analysis
Social Network AnalysisSocial Network Analysis
Social Network Analysis
 
Ecommerce final ppt
Ecommerce final pptEcommerce final ppt
Ecommerce final ppt
 
Newspapers vs internet news
Newspapers vs internet newsNewspapers vs internet news
Newspapers vs internet news
 

Ähnlich wie Meaghan technology report

Technology Report By Noah Coffman
Technology Report By Noah CoffmanTechnology Report By Noah Coffman
Technology Report By Noah CoffmanMarq2014
 
An Introduction To IT Security And Privacy In Libraries & Anywhere
An Introduction To IT Security And Privacy In Libraries & AnywhereAn Introduction To IT Security And Privacy In Libraries & Anywhere
An Introduction To IT Security And Privacy In Libraries & AnywhereBlake Carver
 
Caroline's technology powerpoint
Caroline's technology powerpointCaroline's technology powerpoint
Caroline's technology powerpointMarq2014
 
Corp Web Risks and Concerns
Corp Web Risks and ConcernsCorp Web Risks and Concerns
Corp Web Risks and ConcernsPINT Inc
 
Griffin Been technology Report
Griffin Been technology ReportGriffin Been technology Report
Griffin Been technology ReportMarq2014
 
Ava Technology
Ava TechnologyAva Technology
Ava TechnologyMarq2014
 
Technology Today By:Anna Marie
Technology Today By:Anna MarieTechnology Today By:Anna Marie
Technology Today By:Anna MarieMarq2014
 
Users awarness programme for Online Privacy
Users awarness programme for Online PrivacyUsers awarness programme for Online Privacy
Users awarness programme for Online PrivacyKazi Sarwar Hossain
 
Creating a digital toolkit for users: How to teach our users how to limit the...
Creating a digital toolkit for users: How to teach our users how to limit the...Creating a digital toolkit for users: How to teach our users how to limit the...
Creating a digital toolkit for users: How to teach our users how to limit the...Justin Denton
 
chris harter
chris harterchris harter
chris harterMarq2014
 
Cybercrime and the Developer Java2Days 2016 Sofia
Cybercrime and the Developer Java2Days 2016 SofiaCybercrime and the Developer Java2Days 2016 Sofia
Cybercrime and the Developer Java2Days 2016 SofiaSteve Poole
 
The cyber security hype cycle is upon us
The cyber security hype cycle is upon usThe cyber security hype cycle is upon us
The cyber security hype cycle is upon usJonathan Sinclair
 
Building Trust in the Digital Age
Building Trust in the Digital AgeBuilding Trust in the Digital Age
Building Trust in the Digital AgeMarian Merritt
 
Rayane hazimeh building trust in the digital age teenagers and students
Rayane hazimeh  building trust in the digital age teenagers and studentsRayane hazimeh  building trust in the digital age teenagers and students
Rayane hazimeh building trust in the digital age teenagers and studentsRayane Hazimeh
 
Rayane hazimeh building trust in the digital age teenagers and students
Rayane hazimeh  building trust in the digital age teenagers and studentsRayane hazimeh  building trust in the digital age teenagers and students
Rayane hazimeh building trust in the digital age teenagers and studentsRayane Hazimeh
 
Killing the golden calf of coding - We are Developers keynote
Killing the golden calf of coding - We are Developers keynoteKilling the golden calf of coding - We are Developers keynote
Killing the golden calf of coding - We are Developers keynoteChristian Heilmann
 

Ähnlich wie Meaghan technology report (20)

Technology Report By Noah Coffman
Technology Report By Noah CoffmanTechnology Report By Noah Coffman
Technology Report By Noah Coffman
 
An Introduction To IT Security And Privacy In Libraries & Anywhere
An Introduction To IT Security And Privacy In Libraries & AnywhereAn Introduction To IT Security And Privacy In Libraries & Anywhere
An Introduction To IT Security And Privacy In Libraries & Anywhere
 
Caroline's technology powerpoint
Caroline's technology powerpointCaroline's technology powerpoint
Caroline's technology powerpoint
 
Corp Web Risks and Concerns
Corp Web Risks and ConcernsCorp Web Risks and Concerns
Corp Web Risks and Concerns
 
Ellie
Ellie Ellie
Ellie
 
Cate tech
Cate techCate tech
Cate tech
 
Griffin Been technology Report
Griffin Been technology ReportGriffin Been technology Report
Griffin Been technology Report
 
Ava Technology
Ava TechnologyAva Technology
Ava Technology
 
Technology Today By:Anna Marie
Technology Today By:Anna MarieTechnology Today By:Anna Marie
Technology Today By:Anna Marie
 
Users awarness programme for Online Privacy
Users awarness programme for Online PrivacyUsers awarness programme for Online Privacy
Users awarness programme for Online Privacy
 
Creating a digital toolkit for users: How to teach our users how to limit the...
Creating a digital toolkit for users: How to teach our users how to limit the...Creating a digital toolkit for users: How to teach our users how to limit the...
Creating a digital toolkit for users: How to teach our users how to limit the...
 
chris harter
chris harterchris harter
chris harter
 
Tot edu eng.
Tot edu eng.Tot edu eng.
Tot edu eng.
 
Cybercrime and the Developer Java2Days 2016 Sofia
Cybercrime and the Developer Java2Days 2016 SofiaCybercrime and the Developer Java2Days 2016 Sofia
Cybercrime and the Developer Java2Days 2016 Sofia
 
The cyber security hype cycle is upon us
The cyber security hype cycle is upon usThe cyber security hype cycle is upon us
The cyber security hype cycle is upon us
 
Building Trust in the Digital Age
Building Trust in the Digital AgeBuilding Trust in the Digital Age
Building Trust in the Digital Age
 
Rayane hazimeh building trust in the digital age teenagers and students
Rayane hazimeh  building trust in the digital age teenagers and studentsRayane hazimeh  building trust in the digital age teenagers and students
Rayane hazimeh building trust in the digital age teenagers and students
 
Rayane hazimeh building trust in the digital age teenagers and students
Rayane hazimeh  building trust in the digital age teenagers and studentsRayane hazimeh  building trust in the digital age teenagers and students
Rayane hazimeh building trust in the digital age teenagers and students
 
Staying safe-on-internet
Staying safe-on-internetStaying safe-on-internet
Staying safe-on-internet
 
Killing the golden calf of coding - We are Developers keynote
Killing the golden calf of coding - We are Developers keynoteKilling the golden calf of coding - We are Developers keynote
Killing the golden calf of coding - We are Developers keynote
 

Mehr von Marq2014

Robots (updated)
Robots (updated)Robots (updated)
Robots (updated)Marq2014
 
The 3 D printer
The 3 D printerThe 3 D printer
The 3 D printerMarq2014
 
Tommy project pp
Tommy project ppTommy project pp
Tommy project ppMarq2014
 
Information Privacy
Information Privacy Information Privacy
Information Privacy Marq2014
 
Finn delgado 3 d printing report
Finn delgado 3 d printing reportFinn delgado 3 d printing report
Finn delgado 3 d printing reportMarq2014
 
Adapting to technology by Emily !
Adapting to technology by Emily !Adapting to technology by Emily !
Adapting to technology by Emily !Marq2014
 
Joshua Coffman and David Bryan's Computer History Project
Joshua Coffman and David Bryan's Computer History ProjectJoshua Coffman and David Bryan's Computer History Project
Joshua Coffman and David Bryan's Computer History ProjectMarq2014
 
computer history
computer historycomputer history
computer historyMarq2014
 
Emoji katherine
Emoji katherineEmoji katherine
Emoji katherineMarq2014
 
Wilburn pp4
Wilburn pp4Wilburn pp4
Wilburn pp4Marq2014
 
Brian nguyen
Brian nguyenBrian nguyen
Brian nguyenMarq2014
 
Plagiarism -Jadyn
Plagiarism -JadynPlagiarism -Jadyn
Plagiarism -JadynMarq2014
 
mia mcpeek project in school for a grade
mia mcpeek project in school for a grademia mcpeek project in school for a grade
mia mcpeek project in school for a gradeMarq2014
 
Cyberbullying 3.0
Cyberbullying 3.0Cyberbullying 3.0
Cyberbullying 3.0Marq2014
 
The Evolution of T.V.
The Evolution of T.V.The Evolution of T.V.
The Evolution of T.V.Marq2014
 
Kennedy 3d printers
Kennedy  3d printers Kennedy  3d printers
Kennedy 3d printers Marq2014
 
Quinn 3D printing project
Quinn 3D printing project Quinn 3D printing project
Quinn 3D printing project Marq2014
 
Cyberbullying by Mia
Cyberbullying by MiaCyberbullying by Mia
Cyberbullying by MiaMarq2014
 
Robots in Space
Robots in SpaceRobots in Space
Robots in SpaceMarq2014
 
Emily emerging technology
Emily emerging technology Emily emerging technology
Emily emerging technology Marq2014
 

Mehr von Marq2014 (20)

Robots (updated)
Robots (updated)Robots (updated)
Robots (updated)
 
The 3 D printer
The 3 D printerThe 3 D printer
The 3 D printer
 
Tommy project pp
Tommy project ppTommy project pp
Tommy project pp
 
Information Privacy
Information Privacy Information Privacy
Information Privacy
 
Finn delgado 3 d printing report
Finn delgado 3 d printing reportFinn delgado 3 d printing report
Finn delgado 3 d printing report
 
Adapting to technology by Emily !
Adapting to technology by Emily !Adapting to technology by Emily !
Adapting to technology by Emily !
 
Joshua Coffman and David Bryan's Computer History Project
Joshua Coffman and David Bryan's Computer History ProjectJoshua Coffman and David Bryan's Computer History Project
Joshua Coffman and David Bryan's Computer History Project
 
computer history
computer historycomputer history
computer history
 
Emoji katherine
Emoji katherineEmoji katherine
Emoji katherine
 
Wilburn pp4
Wilburn pp4Wilburn pp4
Wilburn pp4
 
Brian nguyen
Brian nguyenBrian nguyen
Brian nguyen
 
Plagiarism -Jadyn
Plagiarism -JadynPlagiarism -Jadyn
Plagiarism -Jadyn
 
mia mcpeek project in school for a grade
mia mcpeek project in school for a grademia mcpeek project in school for a grade
mia mcpeek project in school for a grade
 
Cyberbullying 3.0
Cyberbullying 3.0Cyberbullying 3.0
Cyberbullying 3.0
 
The Evolution of T.V.
The Evolution of T.V.The Evolution of T.V.
The Evolution of T.V.
 
Kennedy 3d printers
Kennedy  3d printers Kennedy  3d printers
Kennedy 3d printers
 
Quinn 3D printing project
Quinn 3D printing project Quinn 3D printing project
Quinn 3D printing project
 
Cyberbullying by Mia
Cyberbullying by MiaCyberbullying by Mia
Cyberbullying by Mia
 
Robots in Space
Robots in SpaceRobots in Space
Robots in Space
 
Emily emerging technology
Emily emerging technology Emily emerging technology
Emily emerging technology
 

Kürzlich hochgeladen

Platformless Horizons for Digital Adaptability
Platformless Horizons for Digital AdaptabilityPlatformless Horizons for Digital Adaptability
Platformless Horizons for Digital AdaptabilityWSO2
 
Exploring Multimodal Embeddings with Milvus
Exploring Multimodal Embeddings with MilvusExploring Multimodal Embeddings with Milvus
Exploring Multimodal Embeddings with MilvusZilliz
 
Apidays New York 2024 - The value of a flexible API Management solution for O...
Apidays New York 2024 - The value of a flexible API Management solution for O...Apidays New York 2024 - The value of a flexible API Management solution for O...
Apidays New York 2024 - The value of a flexible API Management solution for O...apidays
 
MS Copilot expands with MS Graph connectors
MS Copilot expands with MS Graph connectorsMS Copilot expands with MS Graph connectors
MS Copilot expands with MS Graph connectorsNanddeep Nachan
 
Architecting Cloud Native Applications
Architecting Cloud Native ApplicationsArchitecting Cloud Native Applications
Architecting Cloud Native ApplicationsWSO2
 
Polkadot JAM Slides - Token2049 - By Dr. Gavin Wood
Polkadot JAM Slides - Token2049 - By Dr. Gavin WoodPolkadot JAM Slides - Token2049 - By Dr. Gavin Wood
Polkadot JAM Slides - Token2049 - By Dr. Gavin WoodJuan lago vázquez
 
Apidays New York 2024 - Scaling API-first by Ian Reasor and Radu Cotescu, Adobe
Apidays New York 2024 - Scaling API-first by Ian Reasor and Radu Cotescu, AdobeApidays New York 2024 - Scaling API-first by Ian Reasor and Radu Cotescu, Adobe
Apidays New York 2024 - Scaling API-first by Ian Reasor and Radu Cotescu, Adobeapidays
 
Mcleodganj Call Girls 🥰 8617370543 Service Offer VIP Hot Model
Mcleodganj Call Girls 🥰 8617370543 Service Offer VIP Hot ModelMcleodganj Call Girls 🥰 8617370543 Service Offer VIP Hot Model
Mcleodganj Call Girls 🥰 8617370543 Service Offer VIP Hot ModelDeepika Singh
 
Biography Of Angeliki Cooney | Senior Vice President Life Sciences | Albany, ...
Biography Of Angeliki Cooney | Senior Vice President Life Sciences | Albany, ...Biography Of Angeliki Cooney | Senior Vice President Life Sciences | Albany, ...
Biography Of Angeliki Cooney | Senior Vice President Life Sciences | Albany, ...Angeliki Cooney
 
Corporate and higher education May webinar.pptx
Corporate and higher education May webinar.pptxCorporate and higher education May webinar.pptx
Corporate and higher education May webinar.pptxRustici Software
 
Finding Java's Hidden Performance Traps @ DevoxxUK 2024
Finding Java's Hidden Performance Traps @ DevoxxUK 2024Finding Java's Hidden Performance Traps @ DevoxxUK 2024
Finding Java's Hidden Performance Traps @ DevoxxUK 2024Victor Rentea
 
[BuildWithAI] Introduction to Gemini.pdf
[BuildWithAI] Introduction to Gemini.pdf[BuildWithAI] Introduction to Gemini.pdf
[BuildWithAI] Introduction to Gemini.pdfSandro Moreira
 
Apidays New York 2024 - Passkeys: Developing APIs to enable passwordless auth...
Apidays New York 2024 - Passkeys: Developing APIs to enable passwordless auth...Apidays New York 2024 - Passkeys: Developing APIs to enable passwordless auth...
Apidays New York 2024 - Passkeys: Developing APIs to enable passwordless auth...apidays
 
DBX First Quarter 2024 Investor Presentation
DBX First Quarter 2024 Investor PresentationDBX First Quarter 2024 Investor Presentation
DBX First Quarter 2024 Investor PresentationDropbox
 
Elevate Developer Efficiency & build GenAI Application with Amazon Q​
Elevate Developer Efficiency & build GenAI Application with Amazon Q​Elevate Developer Efficiency & build GenAI Application with Amazon Q​
Elevate Developer Efficiency & build GenAI Application with Amazon Q​Bhuvaneswari Subramani
 
Artificial Intelligence Chap.5 : Uncertainty
Artificial Intelligence Chap.5 : UncertaintyArtificial Intelligence Chap.5 : Uncertainty
Artificial Intelligence Chap.5 : UncertaintyKhushali Kathiriya
 
Cloud Frontiers: A Deep Dive into Serverless Spatial Data and FME
Cloud Frontiers:  A Deep Dive into Serverless Spatial Data and FMECloud Frontiers:  A Deep Dive into Serverless Spatial Data and FME
Cloud Frontiers: A Deep Dive into Serverless Spatial Data and FMESafe Software
 
Web Form Automation for Bonterra Impact Management (fka Social Solutions Apri...
Web Form Automation for Bonterra Impact Management (fka Social Solutions Apri...Web Form Automation for Bonterra Impact Management (fka Social Solutions Apri...
Web Form Automation for Bonterra Impact Management (fka Social Solutions Apri...Jeffrey Haguewood
 
Modular Monolith - a Practical Alternative to Microservices @ Devoxx UK 2024
Modular Monolith - a Practical Alternative to Microservices @ Devoxx UK 2024Modular Monolith - a Practical Alternative to Microservices @ Devoxx UK 2024
Modular Monolith - a Practical Alternative to Microservices @ Devoxx UK 2024Victor Rentea
 

Kürzlich hochgeladen (20)

Platformless Horizons for Digital Adaptability
Platformless Horizons for Digital AdaptabilityPlatformless Horizons for Digital Adaptability
Platformless Horizons for Digital Adaptability
 
Exploring Multimodal Embeddings with Milvus
Exploring Multimodal Embeddings with MilvusExploring Multimodal Embeddings with Milvus
Exploring Multimodal Embeddings with Milvus
 
+971581248768>> SAFE AND ORIGINAL ABORTION PILLS FOR SALE IN DUBAI AND ABUDHA...
+971581248768>> SAFE AND ORIGINAL ABORTION PILLS FOR SALE IN DUBAI AND ABUDHA...+971581248768>> SAFE AND ORIGINAL ABORTION PILLS FOR SALE IN DUBAI AND ABUDHA...
+971581248768>> SAFE AND ORIGINAL ABORTION PILLS FOR SALE IN DUBAI AND ABUDHA...
 
Apidays New York 2024 - The value of a flexible API Management solution for O...
Apidays New York 2024 - The value of a flexible API Management solution for O...Apidays New York 2024 - The value of a flexible API Management solution for O...
Apidays New York 2024 - The value of a flexible API Management solution for O...
 
MS Copilot expands with MS Graph connectors
MS Copilot expands with MS Graph connectorsMS Copilot expands with MS Graph connectors
MS Copilot expands with MS Graph connectors
 
Architecting Cloud Native Applications
Architecting Cloud Native ApplicationsArchitecting Cloud Native Applications
Architecting Cloud Native Applications
 
Polkadot JAM Slides - Token2049 - By Dr. Gavin Wood
Polkadot JAM Slides - Token2049 - By Dr. Gavin WoodPolkadot JAM Slides - Token2049 - By Dr. Gavin Wood
Polkadot JAM Slides - Token2049 - By Dr. Gavin Wood
 
Apidays New York 2024 - Scaling API-first by Ian Reasor and Radu Cotescu, Adobe
Apidays New York 2024 - Scaling API-first by Ian Reasor and Radu Cotescu, AdobeApidays New York 2024 - Scaling API-first by Ian Reasor and Radu Cotescu, Adobe
Apidays New York 2024 - Scaling API-first by Ian Reasor and Radu Cotescu, Adobe
 
Mcleodganj Call Girls 🥰 8617370543 Service Offer VIP Hot Model
Mcleodganj Call Girls 🥰 8617370543 Service Offer VIP Hot ModelMcleodganj Call Girls 🥰 8617370543 Service Offer VIP Hot Model
Mcleodganj Call Girls 🥰 8617370543 Service Offer VIP Hot Model
 
Biography Of Angeliki Cooney | Senior Vice President Life Sciences | Albany, ...
Biography Of Angeliki Cooney | Senior Vice President Life Sciences | Albany, ...Biography Of Angeliki Cooney | Senior Vice President Life Sciences | Albany, ...
Biography Of Angeliki Cooney | Senior Vice President Life Sciences | Albany, ...
 
Corporate and higher education May webinar.pptx
Corporate and higher education May webinar.pptxCorporate and higher education May webinar.pptx
Corporate and higher education May webinar.pptx
 
Finding Java's Hidden Performance Traps @ DevoxxUK 2024
Finding Java's Hidden Performance Traps @ DevoxxUK 2024Finding Java's Hidden Performance Traps @ DevoxxUK 2024
Finding Java's Hidden Performance Traps @ DevoxxUK 2024
 
[BuildWithAI] Introduction to Gemini.pdf
[BuildWithAI] Introduction to Gemini.pdf[BuildWithAI] Introduction to Gemini.pdf
[BuildWithAI] Introduction to Gemini.pdf
 
Apidays New York 2024 - Passkeys: Developing APIs to enable passwordless auth...
Apidays New York 2024 - Passkeys: Developing APIs to enable passwordless auth...Apidays New York 2024 - Passkeys: Developing APIs to enable passwordless auth...
Apidays New York 2024 - Passkeys: Developing APIs to enable passwordless auth...
 
DBX First Quarter 2024 Investor Presentation
DBX First Quarter 2024 Investor PresentationDBX First Quarter 2024 Investor Presentation
DBX First Quarter 2024 Investor Presentation
 
Elevate Developer Efficiency & build GenAI Application with Amazon Q​
Elevate Developer Efficiency & build GenAI Application with Amazon Q​Elevate Developer Efficiency & build GenAI Application with Amazon Q​
Elevate Developer Efficiency & build GenAI Application with Amazon Q​
 
Artificial Intelligence Chap.5 : Uncertainty
Artificial Intelligence Chap.5 : UncertaintyArtificial Intelligence Chap.5 : Uncertainty
Artificial Intelligence Chap.5 : Uncertainty
 
Cloud Frontiers: A Deep Dive into Serverless Spatial Data and FME
Cloud Frontiers:  A Deep Dive into Serverless Spatial Data and FMECloud Frontiers:  A Deep Dive into Serverless Spatial Data and FME
Cloud Frontiers: A Deep Dive into Serverless Spatial Data and FME
 
Web Form Automation for Bonterra Impact Management (fka Social Solutions Apri...
Web Form Automation for Bonterra Impact Management (fka Social Solutions Apri...Web Form Automation for Bonterra Impact Management (fka Social Solutions Apri...
Web Form Automation for Bonterra Impact Management (fka Social Solutions Apri...
 
Modular Monolith - a Practical Alternative to Microservices @ Devoxx UK 2024
Modular Monolith - a Practical Alternative to Microservices @ Devoxx UK 2024Modular Monolith - a Practical Alternative to Microservices @ Devoxx UK 2024
Modular Monolith - a Practical Alternative to Microservices @ Devoxx UK 2024
 

Meaghan technology report

  • 2. GGuueessss WWhhaatt…….... This report will broaden your view of the technology that is at your fingertips. This report will broaden your view of the technology that is at your fingertips.
  • 4. The Advantages of using Online Templates
  • 6. WWhhaatt’’ss TThhee PPrroobblleemm The problem with plagiarism is it can ruin your career and get you kicked out of school. The problem with plagiarism is it can ruin your career and get you kicked out of school.
  • 7. TThhee SSoolluuttiioonn • The solution is simple give credit to sources. • Add footnotes at the end of each slide .
  • 9. Why Charts are important • Charts are visually appealing and make it easy for you to see comparisons, patterns, and trends in the data • Instead of analyzing columns of numbers, you can see at a glance whether your typing speed is falling or rising.
  • 11. AAddvvaannttaaggeess ooff tthhee iiCClloouudd Some advantages of the iCloud are: •The fact that all of our files are at our fingertips. iWork documents, iTunes purchases, Safari tabs, iBooks, and your email will sync to any apple device. •The simplicity of the iCloud also makes it user friendly. Some advantages of the iCloud are: •The fact that all of our files are at our fingertips. iWork documents, iTunes purchases, Safari tabs, iBooks, and your email will sync to any apple device. •The simplicity of the iCloud also makes it user friendly.
  • 12. Advantages Of iCloud Continued •iCloud also automatically customizes all of your devices with all your apps, photos, and media. With this feature the transition from one device to another is made as smooth as possible.
  • 13. DDiissaaddvvaannttaaggeess OOff tthhee iiCClloouudd • One disadvantage of the iCloud is: as technology develops people • One disadvantage of the iCloud is: as technology develops people can hack into the iCloud and steal your identity and much more. • If some kind of system beat the iOS then it would be very hard to get all can hack into the iCloud and steal your identity and much more. • If some kind of system beat the iOS then it would be very hard to get all your personal off the iCloud. your personal off the iCloud. • Another problem is privacy, Apple knows our names, credit cards, likes, • Another problem is privacy, Apple knows our names, credit cards, likes, dislikes, emails, passwords, friends, family, trips, guilty online pleasures, etc… dislikes, emails, passwords, friends, family, trips, guilty online pleasures, etc…
  • 14.
  • 15.
  • 16.
  • 17. 5 Rules • Keep identity a secret. Don’t give up personal information. Ex. name, home address, or phone number for usernames don’t use your real name use a fake name. • Be carful with strangers. Let your parents know about online friends. • Tell somebody. Tell someone if a person is making you feel uncomfortable
  • 18. 5 Rules Continued • Keep your passwords safe. No one needs to know your passwords • Be nice. People will return the favor.
  • 19. Clipart Clipart is important because it really makes the report pop. Clipart makes the report look fun and it helps the viewer get more interaction with the report. Clipart makes the report look neat and nice to look at.
  • 20. Malware • Malware is short for malicious viruses. Criminals use malware to steal your maney a identity • Prevention is easy download security software from a trusted web site. • One sign of malware is if your computer runs slowly.
  • 21.
  • 22. Netiquette Tips • Don’t write in all CAPS it looks like you are yelling. • Internet isn’t a private place so be careful what you post. • Always ask permission when posting things about your friends
  • 23. Netiquette • Netiquette is a set of rules for how to act online • A good way to avoid trouble is to treat others like you want to be treated!
  • 24. What I Think Of Texting I think that when texting is overused it can be dangerous. There is a time a place for it. I think that when texting is overused it can be dangerous. There is a time a place for it.
  • 26. All About Social Media Meet others with the same interests . Keep friends updated on activities Share only what you wouldn’t mind being made into a banner ad
  • 27. My Profile My fav Movie: Mockingjay My fav flavor of cupcakes is: red velvet My fav food is: pizza
  • 28. TThhee EEnndd HHooppee yyoouu eennjojoyyeedd mmyy rreeppoorrtt
  • 29. Sources • http://www.plagiarism.org/plagiarism-101/what-is-plagiarism / www.princexml.com/doc/footnotes Brain pop Dafont Google Wikipedia