Wednesday, January 25, 2017

Basic Principles of Graphics and Layout

 Basic Principles of Graphics and Layout

  1. 1. BASIC PRINCIPLES of GRAPHICS and LAYOUT By:
  2. 2. All About Infographic Infographic  Is the short term for information graphic. Infographic refers to:  An image that combines information, storytelling, and perceptions. Advantage  People rely on their sense of sight.
  3. 3. Basic Elements of Layout and Design Lines The first and most basic element of design is that of the line. Basic elements, and it define the characteristics of an infographic.
  4. 4. Color  Powerful and influential elements. Using the right combination of colors can catch the attention of a passerby or even glancing viewers.  It can stand alone, as a background, or be applied to other elements, like lines, shapes, textures or typography.
  5. 5. Shapes  Define by the enclosure created by a combination of multiple lines.  Shapes, geometric or organic, add interest. Shapes are defined by boundaries, such as a lines or color, and they are often used to emphasize a portion of the page.
Piktochart- is a web-based infographic application which allows users without intensive experience as graphic designers to easily create professional-grade infographics using themed templates.
PhotoScape- is a graphics editing program, developed by MOOII Tech, Korea. The basic concept of PhotoScape is 'easy and fun', allowing users to easily edit photographs taken from their digital cameras or even mobile phones.
Photobucket- is an American image hosting  and video hosting website, web services suite, and online community dedicated to preserving and sharing the entire photo and video lifecycle. 

Wednesday, January 4, 2017

EXCEL FUNCTION

Useful Excel Formulas You Must Know




DATEVALUE = Converts a date in the form of text to a serial number
DAY = Converts a serial number to a day of the month
MONTH = Converts a serial number to a month
YEAR = Converts a serial number to a year
LEFT = Returns the leftmost characters from a text value
LEN = Returns the number of characters in a text string
RIGHT = Returns the rightmost characters from a text value
AVERAGE = Returns the average of its arguments
COUNT = Counts how many numbers are in the list of arguments
COUNTIF = Counts the number of nonblank cells within a range that meet the given criteria
MAX = Returns the maximum value in a list of arguments
AND = Returns TRUE if all its arguments are TRUE
IF = Specifies a logical test to perform
ROUNDDOWN = Rounds a number down, toward zero
ROUNDUP = Rounds a number up, away from zero
SUM = Adds its arguments
SUMIF = Adds the cells specified by a given criteria
OFFSET = Returns a reference offset from a given reference
VLOOKUP = Looks in the first column of an array and moves across the row to return the value of a cell
ISERROR = Returns TRUE if the value is any error value

Tuesday, November 29, 2016

HOW TO USE THE MAIL MERGE OF MICROSOFT OFFICE

part 1
















































































1

Understand what the Mail Merge function allows you to accomplish. Mail Merge is a feature designed for creating mass mailing and emails, as well as envelopes and labels with different information on each one. You can load a database of recipients or manually enter them, and then use placeholders, or "Fields", to automatically fill in each recipient's information in their own copy. This allows you to create one document that you can send to hundreds or even thousands of people.

2
Create a recipient spreadsheet (optional). You can manually enter each recipient during the Mail Merge process, which is fine if you have just a handful of people you're messaging, but you'll find things a lot easier if you have a spreadsheet or database of your recipients before you start.



3
Click the "Mailings" tab to open the Mail Merge tools. If you are using Word 2003 or older, click the "Tools" menu and select "Letters and Mailings" → "Show Mail Merge Toolbar".



4
Click the "Start Mail Merge" button and select your format. You can use Mail Merge to create emails, letters, envelopes, labels, and directories. You can also select "Normal Word Document" if you're not sure.
  • If you select "Envelopes", the Envelope Options window will appear, allowing you to choose how your envelopes will be formatted as well as the physical envelope size.
  • If you select "Labels", the Label Options will appear, allowing you to choose the type of label paper as well as the size of each label.

5
Click "Select Recipients" and select how you want to add recipients to the Mail Merge. Recipients are the most powerful part of Mail Merge, as they allow you to replace placeholders, or "Fields", in the letter with each recipient's personal information. You can manually enter your recipients, load a database or spreadsheet file, or load your Outlook contacts.
  • If you select "Type a New List", a new window will open which will allow you to manually enter each recipient's information. This is useful if you don't have access to a spreadsheet with your recipients' information in it, but it is also the slowest way to enter the data. You can click Customize Columns... to create custom fields for the data you are entering.
  • If you select "Use an Existing List", you can browse your computer for a variety of different spreadsheet and database files, including Excel and Access. You can also click the New Source... button and connect to an SQL server online.
  • If you select "Choose from Outlook Contacts", your Outlook contacts will be loaded, and you can deselect all of the contacts you don't want to include.
Part 2



























1

Start creating your document as you normally would. Once you have your recipients entered, you can begin creating your document. You can make it from scratch or use any template. It's important to enter your recipients first so that you can use the appropriate fields while creating the document.

2

Click the "Greeting Line" button to create a custom greeting. You can use the preview in the window that appears to see how it will appear on each copy of the Mail Merge.


3

Click the "Insert Merge Field" button and select the field that you want to insert in the document. These fields will then be replaced with the data from the recipient database when the documents are generated.
  • For example, if you want the document to display the recipient's first and last name, you would select "First", push Space, then click the "Insert Merge Field" button again and select "Last".
  • For another example, you can use the "Address Block" button to create envelopes with each recipient's address printed on it. Type your own address into the return address area of the envelope template, and then add the "Address Block" to the recipient area of the template.
  • You can select any field that contains recipient data. Make sure that it applies to all of the recipients on the list, as blank fields will be very obvious when reading the document.

4
Click the "Highlight Merge Fields" button to make the inserted fields stand out.This make it easier to tell how the fields look while editing.


5

Click the "Preview Results" button to see how the final product will look. The display will toggle to show the Mail Merge document filled out with your first recipient's information.

Part 3


1

Check for errors. Click the "Check for errors" button to have Word scan each document in the Mail Merge to ensure that all recipients have valid data for each of the fields. Any invalid results will be reported, allowing you to fix them before proceeding.

2

Finish the merge process. Once you have finished checking for errors, you can finish the merge process and create the individual documents. You have three options when you click the "Finish & Merge" button:[1]
  • "Edit Individual Documents" - You will be able to choose which entries you want to perform this action on. Once you do, a new document will be created, with each entry as a new page. You can then go through and make manual edits to each one.
  • "Print Documents" - You will be able to choose which entries you want to perform this action on. Once you do, the documents will be sent to your printer, where each individual one will print.
  • "Email Documents" - You will be able to define the Subject line as well as select the Field that contains the recipients' email addresses. You will then be able to send the bulk email message off using Outlook. Note that this will immediately send the message, so make sure everything looks good!

Tuesday, November 22, 2016

 
01. Disable the Auto-Run feature in Windows.  This built-in Windows component allows silent programs to execute without your knowledge because auto-run grants them permission to initiate without obtaining active consent.
02. Always have an anti-virus program on your computer and keep it updated.  There are plenty of free or very inexpensive anti-virus programs available, so you have no excuse for not having one.  Make sure you set the program up to do a full scan at least once a week.
03.Do not turn off the Firewall options on your computer, even if a program claims the Firewall needs to be disabled for the program to work.  Firewall settings allow you set program-specific exceptions without disabling the protection altogether.
04.When choosing passwords for online sites or online accounts (bank accounts, Pay Pal, etc.), make sure you never use the same password for multiple sites, use a mixture of upper and lower case letters and numbers (and symbols if they are allowed), avoid using personal information (birth date, maiden name, social security number), never use a password of less than 10 characters, and combine words or create nonsensical ones.  The harder your password is for you to remember, the more difficult it will be for someone else to guess it!
05.Update the core components of your computer’s software regularly, or set the system to automatically find and download updates.  The most common example of this is Windows Update for Microsoft operating systems.
06.While it is tempting to download free movies, music, and software from torrent sites, it can also be very harmful to your computer.  Torrent content is generally unverified and frequently contains viruses or other harmful malware.
07.E-mail has become a common way for viruses, scams, and phishing activities to obtain information or compromise your computer.  When reading your e-mails, never click on an embedded link in the message unless you know the destination (you can find this out by hovering your mouse over the link).  This applies to messages from people you know, also, because most web-based e-mail accounts (Yahoo!, Gmail, etc.) can be compromised.
08.Disable Java (not JavaScript) in your internet browser.  Exploits through Java occur frequently, even though Java itself it almost never needed when using the internet.
09.While Internet Explorer is very popular, it lacks a feature included in Mozilla Firefox that makes Firefox a safer browser to use, particularly if you are susceptible to JavaScript threats.  Firefox has a NoScript add-on that blocks all JavaScript programs from sites that you have not approved.
10. Back up important data on your computer to an external drive or storage location (an online “cloud” or flash drive) regularly to prevent total loss in the event your computer is stricken with a virus or other harmful malware.
11. System recovery questions ask for basic information like your mother’s maiden name, the name of your hometown, or your pet’s name.  This information is also likely contained somewhere on your Facebook page.  When providing recovery responses, treat them like passwords and never provide actual information that can be freely found elsewhere on the internet.
12. Never open or run executable files directly from the internet.  Download them to your computer’s hard drive or an external storage device and perform a virus scan first.
13. Establish more than one e-mail address for multiple purposes.  For example, you could have one e-mail address known only to close friends and family members, another for online banking and financial transactions, and another for online gaming purposes.  This reduces the amount of potential spam, malware threats, and phishing risks you are exposed to.
14. If you have a supplemental firewall program such as Comodo or ZoneAlarm that asks for permission when an unknown program is attempting to download a file, connect to your computer, or execute a program, never allow the action unless you know what the program or file is first and are sure it is from a trusted source.
15. When using social media such as Facebook, be cautious about what personal information you share.  What you post on the internet is visible to everyone and can be used in a harmful or damaging way.  Another Facebook tip is to avoid accepting friend requests from people you don’t know personally.  While it may be “cool” to have 10,000 friends, how many of them are you positive you can trust with your personal information?
Protecting your sensitive or confidential information and keeping your computer or internet-enabled mobile device safe from unwanted intrusions is essential in our internet-driven society.  Follow the tips provided here and continue to educate yourself further about ways to stay secure while using the internet, regardless of what your online activities consist of or how you access the online world.  When it comes to internet security, an ounce of prevention truly is worth a pound of cure.

2 Social networking site and the site's privacy policy