You are on page 1of 4

A) 3 functions of presentation software available for use on multimedia projector but not

overhead projector transparencies


1. Transition animations
2. Audio/sound on slides
3. Images/video on slides

B) 3 factors that should be considered when designing effective multimedia presentation

1. Audience

Attention to audience’s age, gender, prior knowledge, interests, skills, abilities and experience is
necessary to make any decision in relation to pedagogical goals and selection of presentation
techniques. The presenter needs to understand the audience’s ―perceptual, cognitive, and
emotional capabilities, expectations, and habits and to explore the relationships between the
audience and ―visual technology and ―manipulations of that technology in a better fashion.

2. Environment/Venue

The location where the presentation will be made is an important factor to consider. What will
the room be like? What atmosphere will the physical conditions create? A large lecture theatre
might create a formal atmosphere. Similarly, a seminar room might create a less formal tone.
Depending on the arrangement of the room and your objectives, various audio-visual aids can be
selected.
 what kind of atmosphere do you wish to create?
 how might the room arrangement affect your relationship with the audience
C) Macro - a single instruction given to a computer that produces a set of instructions for the
computer to perform a particular piece of work
Select (Tools > Macro > Record New Macro)
Give the macro the name "ChangingTitle"
Start recording
Select title on a slide (text should be highlighted)
Delete text in title
Stop recording
Information Assets

An information asset is a body of knowledge that is organized and managed as a single entity.

Like any other corporate asset, an organization's information assets have financial value. That
value of the asset increases in direct relationship to the number of people who are able to make
use of the information.

Because information can have a short lifecycle, it tends to depreciate over time as do many other
types of corporate assets. The speed at which information loses its value depends upon the type
of information the asset represents and how accurate the information can remain over time. In
some organizations, information that cannot be used is considered to be a liability.

An information asset can be classified according to any criteria, not only by its relative
importance or frequency of use. For example, data can be broken down according to topic, when
it was created, where it was created or which personnel or departments use it the most. A data
classification system can be implemented to make the organization's information assets easy to
find, share and maintain.

Examples:
 Strategies, plans, goals and objectives that have been developed to improve an
organization's future.
 Products & Services - Information that is directly sold to customers as a product or
service such as a book or research tool.
 Intellectual Property
 Trade Secrets - Techniques, methods, processes, procedures, formulas and designs that
contribute to your competitive advantage.
 Projects - Information about inflight projects such as requirements, plans and designs.
 Marketing Media - Marketing media such as an advertising poster or video that is used to
generate demand or brand awareness.
 Sales Collaterals - Information tools that are useful for selling such as a sales
presentation.
 Customer Lists - Data about customers and prospective customers.
 Financial information such as accounting data and financial reports.
 Research & Development - Information about current and historical innovation
initiatives. For example, market research for a new product design.
How to protect information assets from unauthourized users
 Logical access controls are the primary means used to manage and protect information
assets.
 Logon ID’s and passwords
 Biometrics
 Single sign-on (SSO) - The process for the consolidating all organization platform-based
administration, authentication and authorization functions into a single centralized
administrative function
 Access restrictions at the file level
o Read, inquiry or copy only
o Write, create, update or delete only
o Execute only
o A combination of the above
 Access control lists (ACLs) refer to a register of:
o Users who have permission to use a particular system resource
o The types of access permitted
 Auditing remote access
 Physical access controls
o Bolting door locks
o Combination door locks (cipher locks)
o Electronic door locks
o Biometric door locks
o Manual logging
o Electronic logging
o Identification badges (photo IDs)
o Video cameras
o Security guards
o Controlled visitor access
o Bonded personnel
o Deadman doors

You might also like