Fortunately, I survived another grading period...
And thankfully,
CHRISTMAS BREAK IS HERE!!!!! =D
12.20.2013
ComSci1 - 11
We had different activities (group and individual). The one I enjoyed most is the activity where we were told to make a game in MS Excel. It was a little hard but it was fun. Fortunately, I managed to pass it on time ^.^
Charts and Graphs in MS Excel
By following these steps you can add a chart/graph in your MS Excel
Instructions
- 1Type "Month" in cell A1, and type the months January through June in cell A2 through A7. In cell B1, type "Applications." For each month, increase the "Applications" by 100. In cell B2, type "100," in cell B3 type "200" and so on. The last month in the "Month" column should be in cell A7 and the last figure in the "Applications" column should be in cell B7.
- 2Place the cursor on a cell in the "Month" and "Applications" data table. If the cursor is not on an item in the table, the chart will not know where to access the data. Press the "Insert" tab. Click the down arrow under the "Column" option in the "Charts" panel.
- 3Click "Bar" from the "Charts" section, and then select the first column chart option under "3-D Bar." To change the bar graph to a pie chart, right-click the graph itself and select "Change Chart Type." Click "Pie" in the "Change Chart Type" dialog box and select the first option under the "Pie" row, then press "OK."
- 4Click the border of the chart and drag it to the desired location. You can change the size of the chart by grabbing a border of the chart and dragging it.
Macros in MS Excel
An Excel macro is a recording of each command and action performed to complete a task. Macros are recorded in Visual Basic, a programming language.
- Macros can be run by custom buttons on the toolbar, the menu bar, from a shape, from another macro or from a triggered event.
- A macro can automate a complex or often repeated task; this includes the entering, editing, moving and deleting of spreadsheet data. Macros created in one workbook can be copied to another.
Conditional Formulas in MS Excel
Create conditional formulas
Testing whether conditions are true or false and making logical comparisons between expressions are common to many tasks. You can use the AND, OR, NOT, and IF function to create conditional formulas.
The IF function uses the following arguments.
Formula with the IF function
Microsoft Excel
|main topic for the 3rd quarter...|
=> is a spreadsheet application developed by Microsoft for Microsoft Windows and Mac OS. It features calculation, graphing tools, pivot tables, and a macro programming language called Visual Basic for Applications. It has been a very widely applied spreadsheet for these platforms, especially since version 5 in 1993, and it has replaced Lotus 1-2-3 as the industry standard for spreadsheets. Excel forms part of Microsoft Office.
Source: hen.wikipedia.org/wiki/Microsoft_Excel
Start of the Second Semester: Third Grading Period
WAAAHHHHH!!!!! START OF A NEW HEADACHE! XD
BUT...
STILL EXCITED TO LEARN NEW LESSONS ^.^
BUT...
STILL EXCITED TO LEARN NEW LESSONS ^.^
10.13.2013
ComSci1 - 7
Protocol
Sir Tom taught us all about Protocols. Here is some of the things he taught us.
In information technology, a protocol is the special set of rules that end points in a telecommunication connection use when they communicate. Protocols specify interactions between the communicating entities.
Protocols exist at several levels in a telecommunication connection. For example, there are protocols for the data interchange at the hardware device level and protocols for data interchange at the application program level. In the standard model known as Open Systems Interconnection (OSI), there are one or more protocols at each layer in the telecommunication exchange that both ends of the exchange must recognize and observe. Protocols are often described in an industry or international standard.
The TCP/IP Internet protocols, a common example, consist of:
- Transmission Control Protocol (TCP), which uses a set of rules to exchange messages with other Internet points at the information packet level
- Internet Protocol (IP), which uses a set of rules to send and receive messages at the Internet address level
- Additional protocols that include the Hypertext Transfer Protocol (HTTP) and File Transfer Protocol (FTP), each with defined sets of rules to use with corresponding programs elsewhere on the Internet
There are many other Internet protocols, such as the Border Gateway Protocol (BGP) and the Dynamic Host Configuration Protocol (DHCP).
The word protocol comes from the Greek protocollon, meaning a leaf of paper glued to a manuscript volume that describes the contents.
PowerPoint
PowerPoint
Is the name of a proprietary commercial presentation program developed by Microsoft.
It was officially launched on May 22, 1990, as a part of the Microsoft Office suite, and runs on Microsoft Windows and Apple's Mac OS X operating system.
Source: http://en.wikipedia.org/wiki/Powerpoint
Is the name of a proprietary commercial presentation program developed by Microsoft.
It was officially launched on May 22, 1990, as a part of the Microsoft Office suite, and runs on Microsoft Windows and Apple's Mac OS X operating system.
Source: http://en.wikipedia.org/wiki/Powerpoint
DNS
DNS
Is a hierarchical distributed naming system for computers, services, or any resource connected to the Internet or a private network.
It associates various information with domain names assigned to each of the participating entities.
Source: http://en.wikipedia.org/wiki/Domain_Name_System
Is a hierarchical distributed naming system for computers, services, or any resource connected to the Internet or a private network.
It associates various information with domain names assigned to each of the participating entities.
Source: http://en.wikipedia.org/wiki/Domain_Name_System
Protocols
Protocols
Is a system of digital rules for message exchange within or between computers.
Must define the syntax, semantics, and synchronization of communication; the specified behavior is typically independent of how it is to be implemented.
Source: http://en.wikipedia.org/wiki/Communications_protocol
Is a system of digital rules for message exchange within or between computers.
Must define the syntax, semantics, and synchronization of communication; the specified behavior is typically independent of how it is to be implemented.
Source: http://en.wikipedia.org/wiki/Communications_protocol
CSS
CSS
Is a style sheet language used for describing the presentation semantics (the look and formatting) of a document written in a markup language. Its most common application is to style web pages written in HTML and XHTML, but the language can also be applied to any kind of XML document, including plain XML, SVG and XUL.
Source: http://en.wikipedia.org/wiki/Cascading_Style_Sheets
Is a style sheet language used for describing the presentation semantics (the look and formatting) of a document written in a markup language. Its most common application is to style web pages written in HTML and XHTML, but the language can also be applied to any kind of XML document, including plain XML, SVG and XUL.
Source: http://en.wikipedia.org/wiki/Cascading_Style_Sheets
HTML
HTML
Is the main markup language for creating web pages and other information that can be displayed in a web browser.
Is written in the form of HTML elements consisting of tags enclosed in angle brackets (like
Source: en.wikipedia.org/wiki/HTML
Is the main markup language for creating web pages and other information that can be displayed in a web browser.
Is written in the form of HTML elements consisting of tags enclosed in angle brackets (like
<html>), within the web page content.Source: en.wikipedia.org/wiki/HTML
8.11.2013
ComSci1 - 6
Hands On
Hands on activities, for MS Word, were given to us after our lesons were taught. It's a little hard but I managed to finish all the activities in time.
Hands on activities, for MS Word, were given to us after our lesons were taught. It's a little hard but I managed to finish all the activities in time.
8.10.2013
ComSci1 - 5
DOS Command Prompt
In the practical test I got a score of 9/10... My mistake was making a folder named 08 instead of 008... -_-
In the practical test I got a score of 9/10... My mistake was making a folder named 08 instead of 008... -_-
ComSci1 - 4
Lessons
The lessons were a little hard but because of a great teacher, I understand it. (The lessons were posted first. Credits to Wikipedia, Whatls.com, Wisegeek.org and others.)
Some of the lessons are new to me so...
The lessons were a little hard but because of a great teacher, I understand it. (The lessons were posted first. Credits to Wikipedia, Whatls.com, Wisegeek.org and others.)
Some of the lessons are new to me so...
ComSci1 - 3
Quizzes/Long Tests
The quizzes were neither hard nor easy but one test, I can never forget, destroyed my brain..... DEFINE!
It happened because of information leak from the other sections... Anyway I thank God I survived that test...
The quizzes were neither hard nor easy but one test, I can never forget, destroyed my brain..... DEFINE!
It happened because of information leak from the other sections... Anyway I thank God I survived that test...
ComSci1 - 2
Sir Tom Secundo
For me, Sir Tom is a cool teacher. He is nice but he is strict. For me, he is also one of the best teachers I've known.
For me, Sir Tom is a cool teacher. He is nice but he is strict. For me, he is also one of the best teachers I've known.
ComSci 1 - 1
In our first meeting our teacher, Sir Tom Secundo, oriented us. He told us what is he's rules. He also discussed with us what are the things we are going to discuss. And the best part is when he announce that we don't have a periodical test!
DOS
Is an operating system for x86 -based personal computers
(Wikipedia)
DOS Commands (some):
CD - changes directories
CLS - clears the screen
DEL - delete
FC - compare files
(Wikipedia)
DOS Commands (some):
CD - changes directories
CLS - clears the screen
DEL - delete
FC - compare files
Decryption
The process of converting encrypted data back into its original form, so it can be understood (Whatls.com)
Encryption
The conversion of data into a form, called a ciphertext, that
cannot be easily understood by unauthorized people
(Whatls.com)
The encoding of a message using an algorithmic scheme
(Wisegeek.org)
cannot be easily understood by unauthorized people
(Whatls.com)
The encoding of a message using an algorithmic scheme
(Wisegeek.org)
File Compression
Commonly used when sending a file from one computer to
another over a connection that has limited bandwidth
(Computer Knowledge)
Allows users to make one or more files into a smaller zip file
(HowStuffWorks)
another over a connection that has limited bandwidth
(Computer Knowledge)
Allows users to make one or more files into a smaller zip file
(HowStuffWorks)
File Format
Standard way that information is encoded for storage in a
computer file (Wikipedia)
The layout of a file in terms of how the information contained
in the file is organized (Whatls.com)
Examples:
.wav
.mp3
.av
.raw
.zip
computer file (Wikipedia)
The layout of a file in terms of how the information contained
in the file is organized (Whatls.com)
Examples:
.wav
.mp3
.av
.raw
.zip
ICT Software
A computer program
Programs and related information used to run a computer
Any application or readable instruction most often in the form of a computer program that directs a computer processor to perform specific operations
Programs and related information used to run a computer
Any application or readable instruction most often in the form of a computer program that directs a computer processor to perform specific operations
ICT System
Units that function together that relays a proven study
A Set-up consisting hardware, software, data and the people who use them
Commonly includes communications device
A Set-up consisting hardware, software, data and the people who use them
Commonly includes communications device
Computer Science
applications (Wikipedia)
The science of how to treat information (Simple English
Wikipedia)
Mag-subscribe sa:
Mga Komento (Atom)




