Overview of today's technologies, computer devices and the web
Computing components
Computer Operating systems, programs and applications
Digital Security, Ethics and Privacy
- What is Cyberterrorism?
- Types of Cybercrime
- Malware: Difference Between Computer Viruses, Worms and Trojans
- Difference between Hacker and Cracker
- Cyber Espionage: The Chinese Threat
- How To Manage Unethical Employees
- What is botnet and how does it spread?
- Denial of Service (DoS)
- What's a Backdoor?
- What is Spoofing?
- What is a Firewall?
- What is Phishing?
- What is Spyware?
- What is Adware?
- Software Theft
- Overview of Digital Forensics
- Content Filtering and Policy
Emerging Trends in IT
- Cloud Computing Services Models
- Public Cloud vs Private Cloud vs Hybrid Cloud
- What is fintech? | CNBC Explains
- The FinTech Revolution
- How Big Data is Changing Business (and Our Lives)
- TOP 10 FinTech Predictions for 2019
- Bank 4.0 and the Future of Financial Services
- Inside The Cryptocurrency Revolution
- How the blockchain is changing money and business
- What is Social Engineering?
- Digital Transformation | The AirAsia Experience
- What is NFT?
MS Word
- Tips to Generate Random Text in Microsoft Word
- Tips - Double click and triple click
- Tips to create and format sections
- Tips to create and format columns
- Tips to format table
- Tips to apply Styles and Building Blocks
- Tips to work with Headers, footers & adding page numbers
- Tips to work with graphics
- Tips to use and create templates
- Tips to fix template problem
- Mail Merge
- How to create fillable forms in Word
- Microsoft Word Master & Subdocuments
MS Excel
MS PowerPoint
MS Access
No comments:
Post a Comment