Presentation packages
Definition
Presentation software is an application software designed to help design layout and produce visual aids
to help further communication of ideas during presentation of information to an audience.
A presentation is a collection of slides, hand outs, speaker‘s notes and outlines in a single file. A slide
is an individual page in a presentation. Slide shows are normally employed during meetings or
seminars to enhance speaker‘s ideas graphically.
NATURE AND CHARACTERISTICS OF PRESENTATION SOFTWARE
1) They contain templates which define what the presentation will look like, where the slide and
other objects will appear and which foreground and background colors will be used
2) They contain wizards which lead the user step-by-step through creating different styles of
presentation (for quick editing and re-organizing of slides)
3) They have the ability to add sound, transitions, graphics and animation effects
a) Types of presentation packages
Examples of presentation software/packages
4. Microsoft PowerPoint
5. Harvard Graphics
6. Lotus Freelance
7. Macromedia Director
b) Functions of Presentation Software
i) It helps to organize and present information to an audience
ii) It provides tools that helps presenter to outline his thoughts using professionally designed
templates
iii) It is used to enhance presentations with pictures, charts, sound and video
c) Designing/Creating slides
In creating a presentation, it is important to have a clear understanding of the presentation
objectives and verbalize the information to be presented to the audience.
The following steps provide an overview of the process for creating a presentation using
Microsoft PowerPoint.
1) Select the starting point of the presentation
There are a number of ways which appear in the start-up dialog box when PowerPoint is
loaded. These are
Auto Content Wizard
Template
Blank Presentation
Using auto content wizard
A wizard is a special feature that displays a series of dialog boxes that ask questions on
design and content. The wizard uses the answers to create the design as per instructions.
When finished, there will be a standardized group of slides, all with similar look or feel,
for a particular situation.
2) The auto content wizard is launched and presents an initial Auto Content Wizard screen.
3) To proceed to next screen, click next button
4) Select the category of presentation – PowerPoint has seven categories, e.g. select
117 lincoln@gmail.com
DATA SECURITY AND CONTROL
Data exist is various forms- as numbers or texts on pieces of paper, as bits and bytes stored in
electronic memory or as facts stored in a person‘s mind.
Information security is the process of protecting information. It protects its availability, privacy
and integrity. Access to stored information on databases has increased greatly. More
companies store business and individual information on computer than ever before. Much of
the information stored is highly confidential and not for public viewing.
Data/information security means protecting information and from unauthorized access, use,
disclosure, disruption, modification, perusal, inspection, recording or destruction, disclosure or
transfer, whether accidental or intentional.
Data control is the measure taken to enforce the security of the program and data. Data may be
lost in various ways such as virus, user errors, computer crushes, hacking, etc.
Many businesses are solely based on information stored in computers. Personal staff details,
client lists, salaries, bank account details, marketing and sales information may all be stored on
a database. Without this information, it would often be very hard for a business to operate.
Information security systems need to be implemented to protect this information.
Effective information security systems incorporate a range of policies, security products,
technologies and procedures. Software applications which provide firewall information
security and virus scanners are not enough on their own to protect information. A set of
procedures and systems needs to be applied to effectively deter access to information.
The terms information security, and are frequently incorrectly used interchangeably. These
fields are interrelated often and share the common goals of protecting the , and of
information; however, there are some subtle differences between them.
These differences lie primarily in the approach to the subject, the methodologies used, and the
areas of concentration. Information security is concerned with the confidentiality, integrity and
availability of regardless of the form the data may take: electronic, print, or other forms.
Computer security can focus on ensuring the availability and correct operation of a without
concern for the information stored or processed by the computer.
a) Security and Privacy
Security is about well-being (integrity) and about protecting property or interests from
intrusions, stealing or wire-tapping (privacy - the right to keep a secret can also be stolen). In
order to do that, in a hostile environment, we need to restrict access to our assets. To grant
118 lincoln@gmail.com
access to a few, we need to know whom we can trust and we need to verify the credentials
(authenticate) of those we allow to come near us.
Security is thus based on the following independent issues:
Privacy - the ability to keep things private/confidential
Trust - do we trust data from an individual or a host? Could they be used against us?
Authenticity - are security credentials in order? Are we talking to whom we think we are
talking to, privately or not.
Integrity - has the system been compromised/altered already?
Environments can be hostile because of
Physical threats - weather, natural disaster, bombs, power failures, etc.
Human threats - stealing, trickery, bribery, spying, sabotage, accidents.
Software threats - viruses, Trojan horses, logic bombs, denial of service.
What are we afraid of?
Losing the ability to use the system.
Losing important data or files
Losing face/reputation
Losing money
Spreading private information about people.
b) Security threats and control measures
There are people who make a living from or breaking through information security systems.
They use their technological skills to break into computer systems and access private
information. Firewalls, which are designed to prevent access to a computer's network, can be
bypassed by a with the right hardware. This could result in the loss of vital information, or a
virus could be planted and erase all information. A computer hacker can gain access to a
network if a firewall is shut down for only a minute.
One of the biggest potential threats to information security is the people who operate the
computers. A workplace may have excellent information security systems in place, but security
can be easily compromised. If a worker gives out or resets passwords without verifying who
the information is for, then anyone can easily gain access to the system. Computer operators
should be made fully aware of the importance of security.
Simple security measures can be used by everyone to keep data secure. Changing passwords on
your computer, and using combinations of letters and numbers, makes it harder for to gain
access. Also, do not keep a note of your where it can be easily accessed. This is the same idea
as not keeping your and PIN number together. You would not want anyone to have access to the information or funds in your bank account, and it is the same with your computer.