study guideslamboca.enschool.org/.../44108520/key-studyguide...aug 15, 2019  · malware (short for...

20
Study Guide For PowerPoint, Internet Safety and Email using Outlook365.

Upload: others

Post on 20-Sep-2020

0 views

Category:

Documents


0 download

TRANSCRIPT

Page 1: Study Guideslamboca.enschool.org/.../44108520/KEY-StudyGuide...Aug 15, 2019  · Malware (short for MAL icious Soft WARE) “is specifically designed to gain access to or damage a

Study GuideFor PowerPoint, Internet Safety and Email using Outlook365.

Page 2: Study Guideslamboca.enschool.org/.../44108520/KEY-StudyGuide...Aug 15, 2019  · Malware (short for MAL icious Soft WARE) “is specifically designed to gain access to or damage a

PowerPoint…is Microsoft’s popular presentation software to create visual aids

that help speakers deliver their message to their audience.Some of the controls and functions are similar to what we have

learned to use with Word but there are many new tools to explore.

Let’s review some of the different toolbar options to help us create great presentations!

Page 3: Study Guideslamboca.enschool.org/.../44108520/KEY-StudyGuide...Aug 15, 2019  · Malware (short for MAL icious Soft WARE) “is specifically designed to gain access to or damage a

HOME: add slides (either blank, choosing from pre-formatted templates, re-using or duplicating existing slides), control how our text will appear in the font section, format our text in the paragraph section, add/edit/fill shapes, change how text boxes or shapes appear (alignment, bullet points, fills, etc.)

INSERT: another option to add slides to the presentation along with many options for things you can put within the slide. This includes pictures (images you have saved or you can search for new images from Microsoft’s search engine “Bing” using the Online Pictures tool), shapes such as arrows, additional text boxes, links and many other choices as we get more advanced

DESIGN: control how the backgrounds of the slides appear, using a pre-formatted template theme or customize by using Format Background tool on the right side (one slide at a time unless you duplicate)

TRANSITIONS: determines the visual effects when going to the selected slide during our slideshow

ANIMATIONS: allows us to make our text and/or images move within a slide (remember to utilize the Animation Pane to control or change the order you want things to happen)

Remember: On Word, we typed on pages and the files were known as Documents…With PowerPoint, we create “slides” and our files are called “Presentations”

What does each tab on the ribbon toolbar control?

Page 4: Study Guideslamboca.enschool.org/.../44108520/KEY-StudyGuide...Aug 15, 2019  · Malware (short for MAL icious Soft WARE) “is specifically designed to gain access to or damage a

TIPS AND BEST PRACTICES

Whether editing an image or a text box, remember the tools available with your cursor:

Basic cursor

“Click and Drag” to move text boxes and images around the slide (keeps the same size)Usually appears when cursor is over the dotted lines on the perimeter of text box/image

“Resize” allows you to shrink or grow the text box or image you selectUsually appears when cursor is over the circles at the corners and sides of the text box/image

“Rotate” allows you to change the angle which the text box/image appears

Page 5: Study Guideslamboca.enschool.org/.../44108520/KEY-StudyGuide...Aug 15, 2019  · Malware (short for MAL icious Soft WARE) “is specifically designed to gain access to or damage a

TIPS AND BEST PRACTICES

• Consider contrast when formatting backgrounds, adding images and changing text colors• Remember the “transparency” selector in the design tab to lighten your background• Know the difference between resizing an image (which keeps everything from the original

image but makes it larger or smaller) and cropping an image (which allows you to trim off certain parts of the image you want while keeping the section you want in its original size)

• Remember that the “Format” tab will not show initially on the ribbon toolbar. It appears once you have selected a text box or image to edit

• The format tab is useful to remove the background of an image to help it fit in our slide (whatever is shaded in magenta/pink color will be removed after you hit Keep Changes).

• Search for PNG (Portable Network Graphics) files to find images with the checkerboard background that becomes much easier to remove. Don’t forget the zoom tool below!

• The format tab will also allow you to utilize additional editing features, especially for images including borders, shadow, reflection, 3-D effects plus many more to pick from and play with

Page 6: Study Guideslamboca.enschool.org/.../44108520/KEY-StudyGuide...Aug 15, 2019  · Malware (short for MAL icious Soft WARE) “is specifically designed to gain access to or damage a

TIPS AND BEST PRACTICES

• Slides are “landscape” oriented meaning they are wider than they are taller. Generally, pages we type on Microsoft Word are “portrait” oriented (taller than they are wider) but it can be changed. However, on PowerPoint, we use landscape orientation so that we fill the screens on monitors or ClearTouch screens, which are rectangular and also wider than taller

• It will help, especially when designing backgrounds, to find images with that same landscape orientation. Also factor in the resolution of the images so they do not look blurry when PowerPoint tries to stretch the image as your background. The higher the number of pixels is for an image, the clearer it will be when resized.

• When inserting a text box, it helps to add some text immediately so you can keep your place, then worry about resizing the box to fit everything as you would like. Also, if you click within a text box, the “Select All” function (CTRL+A) will only select—and allow you to change—what is in that particular box, others will not change.

F5=begin slideshow from the first slide Shift+F5=begin slideshow from current slide

Page 7: Study Guideslamboca.enschool.org/.../44108520/KEY-StudyGuide...Aug 15, 2019  · Malware (short for MAL icious Soft WARE) “is specifically designed to gain access to or damage a

INTERNET SAFETY TERMS AND TIPS• REMEMBER THE INTERNET IS A TWO-WAY CONNECTION… you get info

from websites but people on the other end can get info from you too!

• Malware (short for MALicious SoftWARE) “is specifically designed to gain access to or damage a computer, usually without the knowledge of the owner. There are various types of malware, including spyware, ransomware, viruses, worms, Trojan horses, adware, or any type of malicious code that infiltrates a computer,” according to Norton.com

• “Mal” in Latin means “bad” or “evil” as in the words malady, malice or maleficent. So while there are many good things to find on the internet, there are also some bad people who make money by doing bad things which includes creating and spreading malware. We need to be careful!

Page 8: Study Guideslamboca.enschool.org/.../44108520/KEY-StudyGuide...Aug 15, 2019  · Malware (short for MAL icious Soft WARE) “is specifically designed to gain access to or damage a

Just like the Everglades, or other places in the wild……there are a lot of things on the internet which look cool and interesting.However, there are many dangerous things out there which can harm us!

If you aren’t already familiar with something, whether it is a strange animal or a website/messenger that you have not come across before and built trust with, you should assume it is dangerous and stay away.

Page 9: Study Guideslamboca.enschool.org/.../44108520/KEY-StudyGuide...Aug 15, 2019  · Malware (short for MAL icious Soft WARE) “is specifically designed to gain access to or damage a

INTERNET SAFETY TERMS AND TIPS• Phishing “is a cybercrime in which a

target or targets are contacted by email, telephone or text message by someone posing as a legitimate institution to lure individuals into providing sensitive data such as personally identifiable information, banking and credit card details, and passwords. The information is then used to access important accounts and can result in identity theft and financial loss.” (phishing.org)

Page 10: Study Guideslamboca.enschool.org/.../44108520/KEY-StudyGuide...Aug 15, 2019  · Malware (short for MAL icious Soft WARE) “is specifically designed to gain access to or damage a

INTERNET SAFETY TERMS AND TIPSSPAM (just like the canned meat) is stuff that not many people really want but is still put out there by bad people on the internet in order to help their phishing attacks and spread malware. It can also be used for advertising but popular and successful companies do not need to use this method to promote their brands.

Page 11: Study Guideslamboca.enschool.org/.../44108520/KEY-StudyGuide...Aug 15, 2019  · Malware (short for MAL icious Soft WARE) “is specifically designed to gain access to or damage a

INTERNET SAFETY TERMS AND TIPS• Protect your passwords! Make sure they are something you can remember

but no one else can easily guess • The best passwords have a mix of letters (upper and lower case), numbers

and symbols if you are allowed to use.• “baseball” is an easy password to guess or hack but it can be improved• If you add/change some characters, “Baseb@11” is a stronger password• Do NOT give out personal info to strangers: including passwords as well as

your home address, social security number, bank info, even your birthday!

• New versions of Operating Systems and web browsers help protect against the latest threats (just like teams adjust their defenses)

Page 12: Study Guideslamboca.enschool.org/.../44108520/KEY-StudyGuide...Aug 15, 2019  · Malware (short for MAL icious Soft WARE) “is specifically designed to gain access to or damage a

INTERNET SAFETY TERMS AND TIPSCookies: small files “created by a website that is stored in the user's computer either temporarily for that session only or permanently on the hard disk (persistent cookie). Cookies provide a way for the website to recognize you and keep track of your preferences” (from PCmag.com)

Cookies by themselves are not harmful. However, if you open your computer up to a malware attack, then the personal information stored on those cookies could be used in a harmful way, such as stealing passwords or credit card info which were saved on your computer.

Just like going into a stadium, arena or airport, we have to balance security and convenience. Many times what is easier leaves us less safe.

Page 13: Study Guideslamboca.enschool.org/.../44108520/KEY-StudyGuide...Aug 15, 2019  · Malware (short for MAL icious Soft WARE) “is specifically designed to gain access to or damage a

INTERNET SAFETY TERMS AND TIPSBe smart on social media

Do not assume that someone who contacts you online (who you haven’t already spoken to in person) is who they claim to be.

Watch out for cyberbullying. Do not engage and respond to them. It is better to screenshot their comments to show an adult, then block them

If you see anything that looks like it is even close to being a threat that could harm you, your friends, or even the person who posts the message themselves, report it (to site and adult)! It is better to be safe than sorry!

Page 14: Study Guideslamboca.enschool.org/.../44108520/KEY-StudyGuide...Aug 15, 2019  · Malware (short for MAL icious Soft WARE) “is specifically designed to gain access to or damage a

When in doubt…• …ASK AN ADULT!

• If a website you think is safe is asking you to provide personal or payment information, check with your parents if at home or a teacher/admin at SLAM

• If someone is looking to get your personal contact info or trying to meet you, even if they seem safe at first, double check with an adult

• Get your friends contact info, including social media account names in person first before assuming someone is telling the truth online.

• Always be on the lookout for “Stranger Danger”

Page 15: Study Guideslamboca.enschool.org/.../44108520/KEY-StudyGuide...Aug 15, 2019  · Malware (short for MAL icious Soft WARE) “is specifically designed to gain access to or damage a

Using Outlook for E-Mail

with your SLAM! Boca accounts on Office365*

*This is the name of Microsoft’s cloud-based versions of Office software applications which allows us to use Outlook, Word, PowerPoint, OneDrive and more from anywhere, as long as

we can connect to the host servers over the internet (from any device, even your phone)

Page 16: Study Guideslamboca.enschool.org/.../44108520/KEY-StudyGuide...Aug 15, 2019  · Malware (short for MAL icious Soft WARE) “is specifically designed to gain access to or damage a

SLAM Student Accounts on Office365

USERNAME• First three letters of your first name• First three letters of your last name

• The four numbers in the year you should graduate 12th grade• @ (SHIFT+2)

• stu.slamboca.com• For example: If Bruce Wayne is in 7th grade at SLAM, his email address and

Office365 log in would be: [email protected]

PASSWORD: • Student ID number (eight digits) first initial (capital) last initial (lower case)

• For example: 12345678Az

Page 17: Study Guideslamboca.enschool.org/.../44108520/KEY-StudyGuide...Aug 15, 2019  · Malware (short for MAL icious Soft WARE) “is specifically designed to gain access to or damage a

When you open Outlook…

…you will see your message folders on the left

• Inbox: messages you have received from others• Sent items: messages you have sent out to others• Drafts: messages you have begun but not sent yet• Deleted items: messages removed from your

inbox but still available

Page 18: Study Guideslamboca.enschool.org/.../44108520/KEY-StudyGuide...Aug 15, 2019  · Malware (short for MAL icious Soft WARE) “is specifically designed to gain access to or damage a

When you open Outlook…

…in the middle, you will find your message list (based on the folder you select, inbox is the default)

Notice the search bar up top which allows you to find messages involving certain words or involving particular email addresses (make sure to enter exact search terms)

You can also utilize the Filter dropdown list to sort messages if you only want to see certain ones in the list

Page 19: Study Guideslamboca.enschool.org/.../44108520/KEY-StudyGuide...Aug 15, 2019  · Malware (short for MAL icious Soft WARE) “is specifically designed to gain access to or damage a

When you select a message from the list…… it will display on the right side of your screen

Notice how it shows the subject up top, who it is from, who the recipients are and the date and time it was sent.

1 2 3 4 5

1-Like message 2-Reply (only to sender)* 3-Reply All (everyone who received original)* 4-Forward on to others (will include original message) 5-More options

*=you can add additional recipients to your reply or reply all

Page 20: Study Guideslamboca.enschool.org/.../44108520/KEY-StudyGuide...Aug 15, 2019  · Malware (short for MAL icious Soft WARE) “is specifically designed to gain access to or damage a

Composing A New Message

Who your message is intended for—make sure their address is entered exactly right!

Carbon Copy—people entered here will get the same message as anyone in the To field

Short “title” for message—should only be a few words and should be capitalized

***Remember that emails on Outlook are intended to look more formal than text messages or social media posts. Spelling and grammar are important!Make sure to be clear and polite, especially if you are asking for help or a favor!

Hi Mr. Gordon, (Capitalized greeting ends with a comma, no punctuation before name)(hit enter again to leave a line space before your message)I wanted to make sure I did the right assignment. Can you remind me which lessons I should do?(hit enter again to leave space before your closing)Thank you, (Closing should be a nice indicator that your note is done, end with a comma)Bruce (Your name)