You are on page 1of 1

REVIEWER EMPOTECH Formula - feature of MS Excel that can contain up to

1024 characters and must always start with an equal sign


(=).
The web is software while the internet is the hardware. Currency - number format that puts a dollar symbol
Convergent Technologies – can perform multiple like before each value by default
watching videos, typing documents, editing images and Math Operators - symbols that tell Excel exactly what
much more. type of calculations to perform.
ICT refers to hardware or software that allow access, SUM - function that adds a range cells
storage, transmission and
Absolute Referencing - cells that do not change
manipulation of information
ICT - Information and Communication Technology.
Structuring Your Presentation - Creating an Effective
Processing the input of the user based on other data best Presentation
describes the web 3.0 being executable.
Social Media - These are platforms that allow users to • Minimize the number of slides and ensure that
communicate in an online social communities. most information come from the speaker.
Leaving a like on picture on a social media site
demonstrates web 2.0 capability • Use a font style that is easy to read or are big
enough to be read by the audience in a distance.
Internet - It is the interconnection of computers,
hardware and networks. • Summarize the information and apply the 6 x 7
Blackberry phones – blackberry OS rule. This means limiting the content to six lines
and seven words per line. Use bullets or short
Pinterest – bookmarking site sentences to have your audience focus on what
the speaker is saying.
Google Drive- online platform where you can store your
files online
• Use suitable graphics and images to capture your
Adware - displays unwanted ads when a user is surfing audience attention.
the internet
• Make your slides uniform and avoid using
Rogue security software - form of malicious software different font styles and backgrounds.
and internet fraud that misleads users into believing
there is a virus on their computer and convince them to • use light font on dark background and vice versa
pay for a fake malware removal tool.
Trojan - They present themselves as harmless computer • Use bullets to simplify your message.
programs so that hackers can penetrate your computer
without being detected • A powerpoint presentation is a form of printed
aid.
Spyware - It can monitor your keystrokes, read and
delete your files, reformat your hard drive, and access • . To insert a hyperlink, go to Page Layout then
your applications. click Link or Hyperlink.
Spam - These are unwanted emails
Worm - They usually make their way on to a computer
via a malicious email attachment or USB stick.
The three components of mail merge are the following:
• Main document
• Data Source
• Merge Document
Mail merge - feature of Microsoft Word allows you to
efficiency create documents that have the same general
content but may have different recipients or purpose
you can find the Start Mail Merge button in Mailing tab
Letters - type of document can you create using mail
merge
Steps in creating a simple mail merge
• Create data source; insert place holders;
preview; print
Microsoft Excel - application program designed to create
spreadsheets which can later be used to analyze
statistical data

You might also like