Reviewer for IT Midterms
Reviewer for IT Midterms
files.
Computing Device
❖ A computing device is an electronic Internal Computer Components
machine that uses binary data to ❖ The motherboard is the personal
automatically perform calculations. computer component that acts as the
❖ A personal computer - run commercial backbone for the entire computer system.
software applications, access the Internet, Sometimes called the system board or
communicate with other people over email, mainboard.
create new applications in any one of a ❖ The central processing unit (CPU) is a
number of programming languages, play computer chip where most of the
games, do research, and much more. computing calculations take place.
❖ A desktop computer is a computing ❖ A power supply is an internal computer
device designed to be placed on or near a component that converts line voltage AC
user's desk. power from an electrical outlet to the
❖ Peripherals are the computer components low-voltage direct current (DC) power
that can be attached to a computer. needed by system components.
❖ A laptop is a complete computer system ❖ Memory is the component that provides
that is small, compact, lightweight, and the workspace for a processor. Random
portable. access memory (RAM) is volatile memory.
❖ Tablets look like a traditional laptop but Read only memory (ROM) is nonvolatile
have a touchscreen to small memory
notebook-sized mobile devices that operate
similarly to a smartphone but are a bit Common Computer Connector Types
larger and have more computing power. ❖ A port is a hardware interface that you
❖ Smartphones are high-end mobile devices can use to connect devices to a
that provide users with a wide range of computer. The port transfers electronic
functions, such as portable media players, signals between the device and the
video cameras, GPS, high- resolution system unit.
touchscreens ❖ A serial connection is a personal
computer connection that transfers data
Other Computing Devices one bit at a time over a single wire.
❖ A supercomputer is the fastest and the Serial ports are typically called COM1,
most expensive computer among all types COM2, COM3, and COM4, where
of computers. “COM” is short for communications port.
❖ A mainframe is a large computer that ❖ A parallel connection is a computer
might serve a large organization. connection that transfers data eight or
❖ An eBook reader is a device used to read more bits at a time over eight or more
electronic books, or eBooks. Some of these wires. The standard parallel port has
devices do nothing besides allow you to been phased out in favor of USB
download and read eBooks. ❖ A universal serial bus (USB)
❖ A personal digital assistant (PDA) is a connection is a computer connection
mobile hand-held device that provides that enables you to connect multiple
computing, information storage, and peripherals to a single port with high
information retrieval capabilities for performance and minimal device
personal or business use. configuration.
❖ A multimedia player is a handheld device ❖ RJ-45 connector is used on twisted pair
that enables you to play digitally recorded cable.
❖ RJ-11 connector is used with Category A software license is a legal document used to
1 cables in telephone system control the distribution and use of software.
connections and is not suitable for
network connectivity. LICENSE TYPE
❖ Open Source – enable users to access
Common Peripheral Devices source code and gives them the right to
❖ Peripheral is a device that connects to a modify it.
computer to expand the computer's ❖ Freeware – can be downloaded from the
functionality. This includes devices that Internet directly and used without any
enable the user to input, output, store, and restrictions.
share data. ❖ Commercial – sold to users
- Keyboards and pointing devices are the ❖ Copyleft – opposite of copyright, software
standard input devices for personal can be freely used, modified, and copied by
computers these days others.
- A mouse is a small object that runs ❖ Shareware – free for a specific period (trial
across a flat surface and has at least basis)
one, but typically two or three, buttons
that send electronic signals to the Types of Operating Systems for Workstations
graphical user interface (GUI). 1. Microsoft Windows is the single most
- A printer is a device that produces text popular as well as widely deployed
and images from electronic content onto operating system on both desktop
physical media such as paper, photo computers and server systems in the world
paper, and labels. today. The various versions of Windows all
- Speakers can be attached to the device feature a graphical user interface (GUI);
to play the audio out loud, without the support for a wide range of applications and
need for headphones devices; a minimum of 32-bit processing;
- Fax device functionality device that native networking support; and a large suite
sends and receives printed pages or of built-in applications and accessories such
images over telephone lines. as the Internet Explorer® browser.
- A flash drive is portable, with most 2. Mac OS X is the operating system
being about 1/2-inch wide, 1/4- inch developed by Apple Computing, Inc. OS X is
deep, and 3-inches long. a Linux® derivative, and consists of
- Touchscreen monitors enable input by UNIX-based operating systems and GUIs.
touching images on the screen. The This proprietary operating system is
screen also acts as the display for the included on all Macintosh computer
computing device. systems.
3. Linux is an open-standards UNIX derivative
COMPUTER SOFTWARE originally developed and released by a
An operating system (OS) is a software package Finnish computer science student named
that enables a computer to function. Linus Torvalds. The Linux source code was
It performs basic tasks, such as: posted publicly on a computing newsgroup,
➔ recognizing the input from a keyboard, then the code was developed and tested
➔ sending the output to a display screen cooperatively all over the world. Due to the
or monitor, and source code being open, it can be
➔ controlling peripheral devices such as downloaded, modified, and installed freely.
disk drives and printers. 4. Chrome OS - Built on the open source
Chromium OS, the Chrome operating
system was developed by Google as its
commercial OS. With manufacturing 1. Word processing software is used to
partners, the Chrome OS is installed on create and work with typed documents.
laptop computers that are known as Examples include Microsoft Word and Apple
Chromebooks. iWork Pages.
2. Spreadsheet software is used to calculate
Types of Operating Systems for Mobile Devices and analyze tables of numbers. Examples
1. Apple iOS - iOS is the base software that include Microsoft Excel and Apple iWork
allows all other applications to run on an Numbers.
iPhone®, iPod touch®, or iPad®. The iOS 3. Email software is used to communicate with
user interface supports direct touch, others. Examples include Microsoft Outlook
multitouch, and using the accelerometer. and Gmail.
2. Android OS - Android™, on the other hand, 4. Basic database software is used to manage
is a layered environment built on the Linux large volumes of lists and records.
kernel foundation that includes not only the Examples include Microsoft Access and
operating system, but middleware, which FileMaker Pro.
provides additional software for the 5. PDF software is used to view, create, and
operating system and additional built-in work with PDF documents. Examples
applications. The Android OS was include Adobe Acrobat
developed by the Open Handset Alliance 6. Presentation software is used to create and
and is owned by Google. work with slide shows. Examples include
3. Blackberry OS - BlackBerry® phones are Microsoft PowerPoint and Apple iWork
primarily used by professionals to conduct Keynote.
business operations and tasks. The 7. Desktop publishing software is used to
BlackBerry OS directly supports corporate work with page layouts and typography in
business requirements with functions such documents and publications. Examples
as: synchronizing with Microsoft Exchange, include Adobe InDesign and Microsoft
IBM® Lotus® Domino®, or Novell® Publisher.
GroupWise® emails, contacts, and tasks by 8. Personal information managers (PIM) are
maintaining a high level of security. used to manage your contacts and
4. Firefox OS - Developed by Mozilla, the schedules. Examples include Windows
Firefox OS is an open source operating Contacts and Google Calendar.
system based on Linux. 9. Remote desktop software is used to access
5. Windows Phone OS - Windows another desktop to provide troubleshooting
smartphones run on the Windows Phone assistance. Examples include Windows
OS, which is maintained and developed by Remote Desktop Protocol (RDP) and Virtual
Microsoft. Features include a suite of Network Computing (VNC).
Microsoft® Office® applications, Outlook®
Mobile, web browsing, Windows Media®
Player, and other advanced features. Types File Descriptions
of Files Exte
APPLICATION SOFTWARE nsio
Types of productivity Software ns
Productivity software is a broad term that
Docum .txt plain text (Notepad)
describes applications that range from those ents
used to create documents to those used to .rtf Rich Text Format
manage your projects and organize your time. (Wordpad)
Some common examples include:
.doc/ data files (WORD)
.doc .com command file or compiled
x application file
Status The Status bar displays the number Create an Empty File In File Explorer
Bar of items in the selected location. If To create an empty file in File Explorer:
you have multiple items selected in
1. From the Windows Start screen, select the
the file list section, the number of
items selected is displayed along Desktop tile, if necessary.
with the total size of the selected 2. Navigate to the folder where the file will be
items. created.
3. Right-click an empty area of the Documents
Naviga Above the Navigation pane are four pane in File Explorer.
tion buttons. The Back button returns 4. Select New and then select the desired file
Button you to the last location you viewed
type.
s or the last search results you
viewed. The Forward buttons 5. Replace the default file name with the
returns you to the next location or desired file name and press Enter.
search results you viewed. The 6. Open the file in the desired application to
Recent locations button shows a list add content to the file.
of the most recent locations you 7. Save the changes to the file by using File
visited. The Up button opens the
Save or the Save icon.
location one level up from the
current folder. 8. Close the application by using the File Exit
command or the Close button in the
search The Search bar enables you to application window.
bar locate documents within the file
structure. You can search from the Create and Save a File in a Windows
current location, including any Application
folders contained in the current
To create and save a file by using a Windows
folder. As you begin to type the
search, any files matching what you application:
type will be displayed in the search 1. Open the desired application.
results list. 2. Enter the data. For example, in a word
processing application, click or tap to place
the insertion point, and then type text. It you
Types of Views in the Address Bar
need to end a paragraph, press Enter to
In the Address bar, the path of a folder or file
move to the next line,
can be displayed in Breadcrumbs view or
3. When you have finished entering text, save
Address Path view.
the document by selecting File-Save As.
4. It you have not previously saved the file, the
Address Path view enables you to type an
Save As dialog box will open. In the Save As
object’s address to access it. You can switch
dialog box, navigate to the location where
from Breadcrumbs view to Address Path view by
you want to save the file,
selecting the Address bar.
5. In the File Name text box, type the name
you would like to give the file,
6. Select Save, operating system with important information
7. If necessary, on the Menu bar, select about the file or folder and how it is intended to
File-Save As to save the file with a different be used by system users.
name.
8. When you are done, close the application
File Description
window.
Attribute
Navigate a file structure Archive (A) Indicates that a file has not
Shortcut keys are keys are sometimes referred
been backed up. Windows
to as hot keys or hot key combinations.
automatically sets the Archive
attribute on any file you create
Common windows shortcut keys or modify. When you back up
Key Used to perform data, you can choose to back
combination up only the files on which the
Archive attribute is set.
Ctrl+C Copy the selected file or folder.
CtrI+XCut the selected file or Hidden (H) Hides a file from view in file
folder. management tools such as
File Explorer, Computer in
Ctrl+V Paste the selected file or folder. Windows 8, or My Computer
In Windows XP.
Ctrl+D Delete and send object to the
Recycle Bin. Read-Only Enables users to read the
(R) contents of a file or execute it
Ctrl+S Save the file from within a (if a program file), but prevents
Windows application. users from changing the
contents of a file.
F1 Display the application's Help
window. System (S) Indicates that a file is used by
the operating system. Some
F2 Rename the selected file or applications use this attribute
folder. to restrict user access to these
files. The System attribute in
Alt+Enter Display properties for the
Windows automatically hides
selected file or folder.
the file or folder.
Ctrl+A Select all of the contents of the
Index (I) This Windows-specific
current folder or all of the text
attribute enables the Windows
within a document.
Indexing Service to create an
index of the file to speed up
Manage files and folders the Search function.
The Recycle Bin is a container object located
on the desktop that temporarily stores deleted
How to manage files and folders
files. It is called the Recycle Bin because you
One of the things you will probably need to do
can restore deleted files and folders from it.
quite frequently is manage files and folders
through File Explorer.
File attributes
File attributes are characteristics that can be
associated with a file or folder that provide the
Create a Folder or File Within File Explorer - In the desired location, press CtrI+V.
To create a folder or file within File Explorer:
1. Open File Explorer and navigate to the Move a Folder or File
container in which you want to create the To move a folder or file:
new folder or file. 1. Locate and select the object you want to
2. Create the object. move.
- Select Home-New→New Item and select 2. Move the object to its new location.
the object type from the submenu. - Drag the object from its old location and
- Select Home-New-New folder. drop it in the new location.
- Right-click in an empty space in the - From the ribbon, select Home
container, select New, and then select the OrganIze→Move To. Select a location
object type from the submenu. where you want to move the object.
3. Type a name for the object. - Select the original object, hold down the
4. Press Enter or click the mouse anywhere in right mouse button, and drag the mouse
the empty space in the File Explorer window pointer over the new location. When you
to confirm the object name release the mouse button, select Move
Here.
Rename a Folder or File - Cut the object by selecting
To rename a folder or file: Home→Clipboard-Cut or pressing CtrI+X,
1. Locate and select the folder or file that you and paste it into the new location by
want to rename. selectin Home-Clipboard→Paste or
2. Select the existing name to be overwritten. pressing CtrI+V.
- Select Home→OrganIze→ Rename. 3. If necessary, rename the object.
- Right-click the object and select Rename.
- Press F2. Use the Recycle Bin
3. Type the new name. To use the Recycle Bin to delete or restore files
4. Press Enter or click the mouse anywhere in or folders:
the empty space in the File Explorer window 1. Locate and seléct the objects) you want to
to confirm the new name. delete.
2. Move the object(s) to the Recycle Bin.
Copy and Paste a Folder or File - Press Delete and select Yes to send the
To copy and paste a folder or file: objects) to the Recycle Bin.
1. Locate and select the object that you want to - Right-click the objects), select Delete, and
copy. select Yes to send the objects) to the
2. Copy the object. Recycle BIn.
- From the ribbon, select Home-Clipboard - Drag the objects) and drop it/them onto
Copy. the Recycle Bin icon.
- From the ribbon, select 3. To restore a deleted object, open the
Home-Organize→Copy To, and then Recycle Bin, select the object, and select
select a location where you want to place Recycle Bin Tools-Manage-Restore→
the copy. Restore the selected items, or right-click the
- Right-click the object and select Copy. object and select Restore. You can also
- Press Ctrl+C drag the object to the desired location. You
3. Paste the object in a new location. can also use the Undo command to restore
- Navigate to the desired location and select deleted objects.
Home-Cilpboard-›Paste. 4. Delete objects from the Recycle Bin
- Navigate to the desired location in the File permanently.
List, right-click an empty location, and - Right-click the Recycle Bin and select
select Paste. Empty Recycle Bin.
- Open the Recycle Bin and select Recycle available in Windows 8/8.1/RT. You can use
Bin Tools Manage-Manage-Empty Recycle it to capture anything on the Desktop. To
Bin. capture Windows 8 apps, it’s
- Open the Recycle Bin, right-click an empty recommended to use Windows + Print
location in the right pane, and from the Screen.
shortcut menu, and select Empty Recycle
BIn. HOW TO CREATE SCREEN CAPTURES
5. Select Yes to confirm the deletion. You can capture screens by using Windows key
Print a File combinations or with the Desktop app, the
1. In File Explorer, select the file that you want Snipping Tool.
to print.
2. Right-click the file and select Print. Capturing the Full Screen by Using Windows
3. Depending on the file that you are printing, Key Combination
the application might open, or you might be To create a full screen capture of a Windows 8
presented with a dialog box in which you store app by using a key combination:
can specify printing options. 1. Open the desired Windows 8 store app or
4. Select Print to print the file. the Windows Start screen.
2. Press Windows+Print Screen. On some
COMPRESS AND EXTRACT FILES keyboards, you will need to also press a Fn
Compressing a file is the process of reducing key to access Print Screen. The Print
the size of a file. Screen button might have a different
To Compress Files and Folders abbreviation as well.
1. Select the items you want to compress. 3. Open your Pictures folder and then open the
2. Right-click the selected items and select Screenshots folder. Each screen capture is
Send To →Compressed(zipped) Folder. saved here with (#) appended to the file
3. Type a new name for the compressed file name. The files are saved as PNG files.
and press Enter. Capturing the Active Window by Using
Windows Key Combination
To extract compressed files: To create a screen capture of the active window
1. Double-click the compressed item. by using a key combination:
2. In the Windows Explorer window, on the 1. Open the desired application or the
command bar, select Extract files. Windows Start screen.
3. Select the folder for storing the extracted 2. Press Alt+Print Screen.
files.
3. Open paint or another application in which
4. Select Extract.
you want to paste the image.
4. Paste the image.
Create screen captures 5. Save the file.
1. A screen capture is a picture, or image, of
what is displayed on your computer
monitor. It is also known as a screenshot, Lesson 4 - Common Security Threats
screen grab, or screen dump.
Hackers and attackers
2. Full screen captures taken with the key
- are related terms for individuals who
combination Windows + Print Screen are
have the skills to gain access to
automatically saved to a Screenshots folder
computer systems through unauthorized
in your Pictures folder. The files are saved
or unapproved means.
as PNG files.
3. Snipping Tool desktop application was
introduced in Windows 7 and is still
Hacker was a neutral term for a user who
triggered by a specific event, such
excelled at computer programming and as a specific date. Once the code
computer system administration. is triggered, the logic bomb
Attacker is a term that always represents a detonates, and performs whatever
malicious system intruder. actions it was programed to do.
Often, this includes erasing and
White hat - hacker who discovers and exposes corrupting data on the target
system.
security flaws in applications and operating
systems so that manufacturers can fix them Spyware Surreptitiously installed malicious
before they become widespread problems. It is software that is intended to track
sometimes called an ethical hack. and report the usage of a target
system, or to collect other data the
Black hat - hacker who discovers and exposes author wishes to obtain. Data
collected can include web
security vulnerabilities for financial gain or for
browsing history; personal
some malicious purpose. information; banking and other
financial information; as well as
Malware usernames and passwords.
▪ any unwanted software that has the potential to
damage a system, impede performance, or Adware Software that automatically
create a nuisance condition. displays or downloads
advertisements when it is used.
Although not all adware is
Malware Description malicious, many adware programs
Type have been associated with
spyware and other types of
Virus A piece of code that spreads from malicious software. Also, it can
one computer to another by reduce user productivity by
attaching itself to other files. The slowing down systems and simply
code in a virus executes when the by
file it is attached to is opened. creating annoyances.
Frequently, viruses are intended to
enable further attacks, send data Rootkit Code that is intended to take full or
back to the attacker, or even partial control of a system at the
corrupt or destroy data. lowest levels. Rootkits often
attempt to hide themselves from
Worm A piece of code that spreads from monitoring or detection and modify
one computer to another on its low-level system files when
own, not by attaching itself to integrating themselves into a
another file. Like a virus, a worm system. Rootkits can be used for
can enable further attacks, non-malicious purposes such as
transmit data, corrupt or erase virtualization; however, most
files. rootkit infections install backdoors,
spyware, or other malicious code
Trojan An insidious type of malware that once they have control of the
Horse is itself a software attack and can target system.
pave the way for a number of other
types of attacks. There is a social SPAM Spam is an email-based threat that
engineering component to a Trojan presents various advertising
horse attack since the user has to materials, promotional content, or
be fooled into executing it. get- rich-quick schemes to users.
The messages can quickly fill a
Logic A piece of code that sits dormant user’s inbox and cause storage
Bomb on a target computer until it is issues. Spam can also carry
Protocol [VoIP]) as the communication
malicious code and other types of
malwares. medium. This is also called voice phishing.
7. Whaling - This is a form of phishing that
Ransom Ransomware is malicious software targets individuals who are known to
ware that prevents you from using your possess a good deal of wealth. It is also
computer. It usually displays a known as spear phishing.
message stating that you must pay 8. Spam and Spim - Spam is an email-based
a fee or face some other penalty
threat that presents various advertising
before you can access your files
and computer again. Paying the materials, promotional content, or
ransom doesn’t necessarily mean get-rich-quick schemes to users. Spim is an
that you will regain access to your Internet messaging (IM)-based attack
files or computer. similar to spam that is propagated through
IM instead of through email.
Password cracking
SOCIAL ENGINEERING ATTACKS - Any type of attack in which the attacker
Type of attack that uses deception and trickery attempts to obtain and make use of
to convince unsuspecting users to provide passwords illegitimately.
sensitive data or to violate security
guidelines. It is often a precursor to another type Types of password attacks
of attack. 1. Guessing - simplest type of password
1. Shoulder surfing - This is a human-based attack and involves an individual making
attack where the goal is to look over the repeated attempts to guess a password by
shoulder of an individual as he or she entering different common password
enters password information or a PIN. values, such as the user’s name, a
2. Spoofing - This is a human-based or spouse’s name, or a significant date.
software-based attack where the goal is to 2. Stealing - Passwords can be stolen by
pretend to be someone else for the various means, including sniffing network
purpose of identity concealment. communications, reading handwritten
3. Impersonation - This is a human-based password notes, or observing a user in the
attack where an attacker pretends to be act of entering the password.
someone he is not. 3. Dictionary Attack - automates password
4. Hoax - This is an email-based or guessing by comparing encrypted
web-based attack that is intended to trick passwords against a predetermined list of
the user into performing undesired actions, possible password values.
such as deleting important system files in 4. Brute Force Attack - the attacker uses
an attempt to remove a virus. password-cracking software to attempt
5. Phishing - This is a common type of every possible alphanumeric password
email-based social engineering attack. In a combination.
phishing attack, the attacker sends an 5. Hybrid Password Attack - utilizes multiple
email that seems to come from a respected attack vectors including dictionary,
bank or other financial institution. brute-force, and other attack methodologies
6. Vishing - This is a human-based attack when trying to crack a password.
where the goal is to extract personal,
financial, or confidential information from Physical security issues
the victim by using services such as the 1. Internal - It is important to always consider
telephone system and IP-based voice what is happening inside an organization,
messaging services (Voice over Internet especially when physical security is
concerned.
2. External - It is impossible for any 3. Guest
organization to fully control external
security threats Authentication
3. Natural - Although natural threats are easy User authentication is a network security
to overlook, they can pose a significant risk measure in which a computer user or some
to the physical security of a facility. other network component proves its identity in
4. Man-made - Whether intentional or order to gain access to network resources.
accidental, people can cause a number of There are many possible authentication
physical threats. Man-made threats can be methods; one of the most common is a
internal or external. combination of a username and a password.
Data restoration
❖ a type of information protection scheme LESSON 6: APPLICATION
that enables you to recover stored copies
of critical files and folders from another
SOFTWARE
medium.
Software
SPREADSHEET
Spreadsheet
MS EXCEL
Web Browser
FEATURES OF MICROSOFT POWERPOINT
❖ A software application used to access
information on the World Wide Web.
1. Home ❖ When a user requests some information,
the web browser fetches the data from a
web server and then displays the webpage - Incognito mode is provided where
on the user’s screen. private searching is available where no
❖ The World Wide Web cookies or history is saved
- Also known as the web, WWW or W3 - It has the best user interface.
represents all the public websites or 5. Microsoft Edge
pages that users can access on their - Microsoft Edge is the default browser for
local computers and other devices all Windows 10 devices.
through the internet. - Microsoft Edge supports the Cortana
❖ In 1993, the “Mosaic” web browser was personal virtual productivity assistant in
released. Microsoft 365.
- It was the “the world’s first popular
browser”.
- It was created by Marc Andreessen. IMAGE EDITING SOFTWARE
- The second web browser which was
launched.
Image Editing Software
❖ WorldWideWeb (later renamed Nexus to
avoid confusion between the software
❖ Software that allows images to be edited
and the World Wide Web) is the first
and also converted to different graphics
web browser and web page editor.
formats.
❖ This was created by Tim Berners-Lee in
❖ Today's image editing tools aren't just
1990.
simple filters applied to your photos.
❖ The other names of WorldWideWeb(no
❖ They can help bring out the best in your
space) are Erwise, and Viola WWW.
pictures, whether you use a mobile phone
or a digital single-lens reflex (DSLR)
OTHER BROWSER camera.
Adobe Photoshop
1. Netscape Navigator
- It was released in 1994 ❖ Photoshop is an image creation, graphic
- It had an advanced licensing scheme design and photo editing software.
and allowed free usage for ❖ Developed by Adobe for both Windows and
non-commercial purposes. macOS.
2. Internet Explorer ❖ The software provides many image editing
- It was launched in 1995 by Microsoft features for pixel-based images, raster
- By 2003, it has attained almost 95% of graphics and vector graphics.
usage share and had become the most ❖ It was originally created in 1987 by Thomas
popular browsers of all Knoll and John Knoll.
- It was included in the Microsoft - Raster graphics (or bitmap graphics) is
Windows operating system a type of digital image that uses tiny
- In 2015, it was replaced with “Microsoft rectangular pixels, or picture elements,
Edge”, as it became the default browser arranged in a grid formation to
on Windows 10. represent an image.
3. Firefox ❖ Photoshop is essential if you require
- It was introduced in 2002 and was layered image manipulation, typography,
developed by Mozilla Foundation sketching, and a wide range of other
- This browser was also made available effects.
for mobile phones, tablets, etc. ❖ Professionals use Adobe Photoshop to
4. Google Chrome change image colors, eliminate minor
- It was launched in 2008 by Google imperfections, add monochromatic effects,
- Multiple features from old browsers were and deepen or brighten the grayvalues of
combined to form better and newer certain colors to improve image contrast.
features - Free trial and demo versions are
- To save computers from malware, available via Adobe Creative Cloud.
Google developed the ad-blocking
feature to keep the user data safe and FEATURES OF ADOBE PHOTOSHOP
secure
1.Brushes - An interview format which are
- used for various effects, such as discussions between one or more hosts
compositing, repainting, erasing, and and their guests, usually diving deep
retouching photographs. into the guests’ personal history or
2. Clone Stamp expert knowledge on a topic.
- copies pixels from one region of a 2. Conversational
photograph and puts them into another. 3. Solo/Monologue
This is handy for fixing damaged or - A simple narration from one person.
corrupt photos. - It’s ideal for anyone who is an expert on
3.Blur a specific subject.
- softens an image's pixels, making it 4. Narrative nonfiction
less distinguishable. This creates a - A long-form storytelling.
fuzzy, dreamlike effect and can smooth - Narrative nonfiction covers anything that
wrinkles and fine lines. covers a true event or topic in a
4. Sponge tool narrative style.
- absorbs or releases colorfrom a - These are episodes about real-life
picture. Use this when you want to events, such as a series of murders, a
adjust colors that are too bright or too chronicle of an expedition up Mount
dark. Everest, or a historical event.
5. Fictional Storytelling
- These are fictional stories told across
PODCAST multiple episodes, similar to dramatic
television.
Podcast - Other shows use teams of voice actors.
- Subscribers can tune in each week for a
❖ Podcast is a digital audio file you can new installment of anything from
experimental sci-fi fantasies.
download or listen to over the Internet.
6. Repurposed content
❖ The main purpose of Podcast is to entertain - This is when you take existing content
its audience. and translate it into audio form.
❖ Each podcast is a series created by a host - For instance, a church podcast might
and then published episode-by-episode record its weekly sermons and release
online, where subscribers can then them as podcast episodes.
download and listen to each episode when
it’s released.
POPULAR PODCAST DIRECTORY
HISTORY OF PODCAST
If you want to listen to podcasts, you’ll need to
choose a directory first.
❖ Podcasts are a form of media content that
was developed in 2004. 1. Apple Podcasts
❖ Former MTV video jockey Adam Curry and 2. Google Podcasts
software developer Dave Winer coded the 3. Spotify
“iPodder.” 4. Stitcher
❖ The iPodder was a program that let a user 5. Overcast
download internet radio broadcasts to their 6. Podcast Addict
Apple iPod.
❖ This is where the term and meaning
podcast was born, taking its name from a
blend of ‘iPod’ and ‘broadcasts’.
TYPES OF PODCAST
1. Interview
- The most common podcast format