Posts

Exercise 9 and 10 PowerPoint Presentation Report BSEd English - 1 (Group 2)

Image
 

Activity 3 - Hyperlink and Action Buttons - BSEd English - 1 (Group 2)

  https://docs.google.com/presentation/d/1F6QGz_XvdUyyToNiAENrplpEUjk94A1l/edit?usp=sharing&ouid=113958144627878056057&rtpof=true&sd=true

Activity 2 - Video Tutorial BSEd English - 1 (Group 2)

Video Tutorial 

Exercise 8: Payroll

 Renee Sarah L. Pumida Exercise 8: Payroll  Printscreen Output of Exercise 8   

Exercise 5, Exercise 6, and Income Statement

 Renee Sarah L. Pumida Exercise 5, Exercise 6, and Income Statement Printscreen Output of Exercise 5, 6, and Income Statement

Activity 5 (Midterms)

  Renee Sarah L. Pumida Activity 5 (Midterms) 1. What is Information Security? 2. What are the Cybersecurity Threats? 3. How to keep your data and computer secure? Indicate your reference ebook. Information Security Information Security is used to protect information or data from threats. It is made to prevent the operating system from viruses by implementing network security system, the Firewall. It controls the virus that can be detected which can affect the information of a system or affect the whole system. The computer system can be well-protected if the Information Security is turned on, aside from protecting the system the confidentiality of the information is also applied to monitor every network around the system.   Cybersecurity Threats In a system, a Cybersecurity Threats are mostly the threats that intentionally want to hack or access the data of others, by hacking and destroying the security to have the control of the system. These are the Cybers...