Ask Question, Ask an Expert


Ask Computer Engineering Expert



•    Developing a PowerPoint presentation.
•    Linking between Office applications.
•    Creating accounts for cloud computing.
•    Using a public folder in either Windows SkyDrive or Dropbox.
•    Create a basic website using Google Sites presentation using Prezi.


You will create presentations in both Microsoft PowerPoint and Prezi, and use a cloud storage service to upload a publically viewable version of your PowerPoint presentation.


In this assignment you will submit your assignment using the online submission form. This assignment requires you to submit three items:

• A PowerPoint presentation (pptx) file: You will create a PowerPoint presentation that fulfils the requirements listed.

• A URL to an online version of your presentation.

• A URL for a presentation in Prezi.

Steps to complete the assignment:

1. Create a presentation using MS PowerPoint:
Follow the requirements as described below.

2. Create another presentation using Prezi: You will create and host a presentation using Prezi.

STEP 1: CREATE A POWERPOINT PRESENTATION Create a PowerPoint presentation  on one of the topics listed below:


Create a PowerPoint presentation on one of the topics listed below:

• Alan Turing (A-­-C)
• Cyber bullying (D-­-G)
• Privacy and Facebook (H-­-L)
• Securing your System (M-­-N)
• Spreadsheet Errors (O-­-R)
• Failures and Risks in Computing (S-­-T)
• Therac-­-25 (U-­-Z)

The presentation should be between 4 and 6 slides long.  All slides should comply with the organization rules out-­- lined in class


• Choose a theme. Then, modify the theme by choosing a different colour scheme
• Make a change to one of the Slide Master layouts. For ex, you might delete a graphic, add a graphic, or change one of the fonts.
• Insert a footer which contains the text, "Created by<> <>". The Slide Master will specify the footer location—you can keep it inthis location. Include the slide number in the footer. Do NOT place the footer (or slide number) on the title slide. The second slide should have thes lide number
• Select a transition. Use the same transition on all slides.


• Add a title for your presentation. Also add your name.
• Add an image to your title slide. Use xPert (see text box) to find an image for your presentation. Use “Get Image with Attribution" (either size). Then copy and paste this image into your first  slide. Resize the image so it fits in with your template design.


• Include two or three content slides. Add a title for each slide, and at least two bullet points.
• Animate the content so the main points enter individu-­- ally, upon a click. (Note the custom animations below.)
• Add a solid shape (such as a callout) to at least one con-­- tent slide. Modify the shape to include text.
• Customize the animation so the slide title appears first, then the shape. Then each bullet of text should appear individually.
• Add a graphic to one of the content slides. Then add a hyperlink to the image. For ex, you could add an image of the University of Manitoba, and then hyperlink the image so it opens to the U of M Homepage. • Customize the animation so the hyperlinked image appears immediately after the last main point. Note: Add the attribution for the graphic in a textbox.


• Create (or use an existing chart) in Excel. Use Paste Special -­- Paste Link to insert the chart into the presentation. Hint: Try changing the data in your spreadsheet. The linked chart should be updated with the new data.
•  Add a title to this slide. See Figure 3 for an ex of the Chart slide. Animate this slide so the chart appears after the title.


CREATE A LINK TO YOUR PRESENTATION USINGA CLOUD STORAGE SERVICE (E.G. GOOGLE DRIVE, WINDOWS SKYDRIVE OR DROPBOX) Which option should you choose? That answer might be more obvious to you after you’ve created your Prezi. Why? The topic of your Prezi is to contrast at least two different cloud-­-storage systems. CLOUD STORAGE Research the pros and cons of Cloud Storage Systems. Three popular Cloud Storage Systems are Google Drive, Dropbox, and Microsoft SkyDrive. Other cloud storage systems include iCloud and Amazon. You may also choose a service not listed in the assignment.

• Research Cloud Storage systems. Keep track of the strengths and weakness of each option. Choose a service to use for this assignment.
• Create an account on a cloud storage system. Note: you may use an existing account.
• Store your PowerPoint file on the cloud.



PowerPoint is no longer the only option for presentation software. One upcoming option is Prezi. Prezi presents the user with a virtual canvas that you can add pictures and text to, and then zoom around the canvas. For this assignment you will create a Prezi that contrasts two or more cloud storage services. Technical requirements of your Prezi:

• Your Prezi must have at least four frames.
• Your Prezi must have enough bulleted points to effectively contrast at least two cloud storage systems.
• Your Prezi must contain at least two images. Hint: Put images inside a frame. Note: Be sure to use images that are licensed for reuse. Also, be sure to add attributions for all images.
• Your Prezi must have a path that effectively zooms through the parts of your presentation. Note: Try to avoid making your audience nauseous.
• Your Prezi should have at least two links to URLs.
• Your Prezi should be free from glaring errors or problems. Keep working until you have a site you are proud of.

Computer Engineering, Engineering

  • Category:- Computer Engineering
  • Reference No.:- M9878

Have any Question? 

Related Questions in Computer Engineering

1 what is an internet what is the internet2 why are

1. What is an internet? What is the Internet? 2. Why are protocols needed? 3. In a LAN with a link-layer switch (Figure 1.8b), Host 1 wants to send a message to Host 3. Since communication is through the link-layer switc ...

Powerpoint presentationnote the accepted microsoft office

PowerPoint Presentation Note: The accepted Microsoft Office versions for this assignment are Microsoft Office 2013 (for PC) and Microsoft Office for Mac 2011 (for Macintosh). Students may use a more recent version if ava ...

1 what is the difference between a threat agent and a

1. What is the difference between a threat agent and a threat? 2. What is the difference between vulnerability and exposure? 3. How is infrastructure protection (assuring the security of utility services) related to info ...

Design and implement an algorithm that will search a tree

Design and implement an algorithm that will search a tree structure that may have more than two nodes emanating from each node. As part of the design it will be necessary to construct a suitable data structure for storin ...

A click counter is a small hand-held device that contains a

A click counter is a small hand-held device that contains a push button and a count display. To increment the counter, the button is pushed and the new count shows in the display. Clicker counters also contain a button t ...

1 what are the types of password attacks what can a systems

1. What are the types of password attacks? What can a systems administrator do to protect against them? 2. What is the difference between a denial-of-service attack and a distributed denial-of-service attack? Which is mo ...

1 for a single-level page table how many page table entries

1. For a single-level page table, how many page table entries (PTEs) are needed? How much physical memory is needed for storing the page table? 2. Using a multilevel page table can reduce the physical memory consumption ...

1 describe the critical characteristics of information how

1. Describe the critical characteristics of information. How are they used in the study of computer security? 2. Identify the six components of an information system. Which are most directly affected by the study of comp ...

1 who is ultimately responsible for managing a technology

1. Who is ultimately responsible for managing a technology? Who is responsible for enforcing policy that affects the use of a technology? 2. What is contingency planning? How is it different from routine management plann ...

1 discuss several ways to prevent node capture in sensor

1. Discuss several ways to prevent node capture in sensor networks. 2. Encryption is very difficult to implement in sensor networks. However, there have been several papers exploring limited ways of doing this. Look for ...

  • 4,153,160 Questions Asked
  • 13,132 Experts
  • 2,558,936 Questions Answered

Ask Experts for help!!

Looking for Assignment Help?

Start excelling in your Courses, Get help with Assignment

Write us your full requirement for evaluation and you will receive response within 20 minutes turnaround time.

Ask Now Help with Problems, Get a Best Answer

WalMart Identification of theory and critical discussion

Drawing on the prescribed text and/or relevant academic literature, produce a paper which discusses the nature of group

Section onea in an atwood machine suppose two objects of

SECTION ONE (a) In an Atwood Machine, suppose two objects of unequal mass are hung vertically over a frictionless

Part 1you work in hr for a company that operates a factory

Part 1: You work in HR for a company that operates a factory manufacturing fiberglass. There are several hundred empl

Details on advanced accounting paperthis paper is intended

DETAILS ON ADVANCED ACCOUNTING PAPER This paper is intended for students to apply the theoretical knowledge around ac

Create a provider database and related reports and queries

Create a provider database and related reports and queries to capture contact information for potential PC component pro