SlideShare a Scribd company logo
1 of 3
REPORT
Presentado a:
Lina, Jhon, Selene
Presentado por:
Yesenia Sánchez
Natalia Cardona
Juliana Patiño
Tania Sánchez
Grado 10*4
I.E Gabo
Report
The glosary is a good way to improve our vocabulary. We were the vocabulary
agree with the information of the guide. The words of our glosary are computer
terms and those are very specifics. Some examples that are there are:
Modem
Short for modulator-demodulator is an electronic device that converts
a computer’s digital signals into specific frequencies over telephone or cable
television lines.
Publisher
You can create materials for print, email and Web use in the same user
interface known from other Microsoft Office System programs. Rises to a higher
level creating and publishing marketing materials.
Our glosary has many terms of computer programs and the glosary explains the
easy way the use of this programs.
The advertising programs for pc is really nice because we can learn about new
programs, also those programs are very useful. The information was found
easily in internet. Some advertising programs for pc are:
Chris PC-Lock
It is a useful Windows application with keyboard locking functions. Now you can
enjoy your spare time without any worry that somebody unauthorized will
access your computer. More than that, you can ensure that your work remains
unaltered and meanwhile benefit of your children joy when playing around your
laptop or desktop PC.
BIOS CMOS Memory
The BIOS settings that you use to control how your PC works must be saved in
non-volatile memory so that they are preserved even when the machine is off.
This is as opposed to regular system memory, which is cleared each time you
turn off the PC. A special type of memory is used to store this information,
called CMOS memory, and a very small battery is used to trickle a small charge
to it to make sure that the data it holds is always preserved. These memories
are very small, typically 64 bytes, and the batteries that they use typically last
for years. This non-volatile memory is sometimes called NVRAM.
The poster was a funny job because thinking and technological product is easy
end it get we imagine the future and draw it.

More Related Content

Viewers also liked

Dct routes
Dct routesDct routes
Dct routes70674
 
Uk culture for turkish learners
Uk culture for turkish learnersUk culture for turkish learners
Uk culture for turkish learnersTC Fulya Hoca
 
Bipolair en verslaafd
Bipolair en verslaafdBipolair en verslaafd
Bipolair en verslaafdMaxKnaapen
 
Presales Consultant Roles&Responsibilities
Presales Consultant Roles&ResponsibilitiesPresales Consultant Roles&Responsibilities
Presales Consultant Roles&Responsibilitiesvarshnnh
 
English 2 sena
English 2 senaEnglish 2 sena
English 2 senaaxiologia
 
Sync rep aurora_2016
Sync rep aurora_2016Sync rep aurora_2016
Sync rep aurora_2016Marco Tusa
 

Viewers also liked (8)

Ingles sena
Ingles senaIngles sena
Ingles sena
 
Dct routes
Dct routesDct routes
Dct routes
 
Uk culture for turkish learners
Uk culture for turkish learnersUk culture for turkish learners
Uk culture for turkish learners
 
Bipolair en verslaafd
Bipolair en verslaafdBipolair en verslaafd
Bipolair en verslaafd
 
Presales Consultant Roles&Responsibilities
Presales Consultant Roles&ResponsibilitiesPresales Consultant Roles&Responsibilities
Presales Consultant Roles&Responsibilities
 
English 2 sena
English 2 senaEnglish 2 sena
English 2 sena
 
Sync rep aurora_2016
Sync rep aurora_2016Sync rep aurora_2016
Sync rep aurora_2016
 
Escuela para padres valores
Escuela para padres valoresEscuela para padres valores
Escuela para padres valores
 

Similar to Ingles.

Computer Hardware
Computer HardwareComputer Hardware
Computer Hardwarenitinmote
 
Computers and Technology.
Computers and Technology.Computers and Technology.
Computers and Technology.Nathan999531
 
Computer basics--computer basics2
Computer basics--computer basics2Computer basics--computer basics2
Computer basics--computer basics2Zo Sangpy
 
Computer basics--computer basics2
Computer basics--computer basics2Computer basics--computer basics2
Computer basics--computer basics2Makk Quak
 
Unit 1 (lo1) revision help
Unit 1 (lo1) revision helpUnit 1 (lo1) revision help
Unit 1 (lo1) revision helpMr_S_Young
 
Tech Term Defination
Tech Term DefinationTech Term Defination
Tech Term DefinationMuneeb Ahmad
 
Ite 101 presentation
Ite 101 presentationIte 101 presentation
Ite 101 presentationvanthorn
 
Marquee13 presentation it_essentials
Marquee13 presentation it_essentialsMarquee13 presentation it_essentials
Marquee13 presentation it_essentialsSherri Jackson
 
Computer and its application
Computer and its applicationComputer and its application
Computer and its applicationABUL HASAN
 
Web design and_hosting
Web design and_hostingWeb design and_hosting
Web design and_hostingxmgkklglt1991
 
June 2010 Cis Workshop Class
June 2010 Cis Workshop ClassJune 2010 Cis Workshop Class
June 2010 Cis Workshop ClassDaMotivator
 
June 2010 Cis Workshop Class
June 2010 Cis Workshop ClassJune 2010 Cis Workshop Class
June 2010 Cis Workshop ClassDaMotivator
 
Parts of Computer
Parts of ComputerParts of Computer
Parts of Computermegaurab
 
Benefits of computer training
Benefits  of computer  trainingBenefits  of computer  training
Benefits of computer trainingjatin batra
 
10 steps to protecting your computer to the world of internet.
10 steps to protecting your computer to the world of internet.10 steps to protecting your computer to the world of internet.
10 steps to protecting your computer to the world of internet.Khalil Jubran
 
InfoSignz Is Easy To Use
InfoSignz Is Easy To UseInfoSignz Is Easy To Use
InfoSignz Is Easy To Useinfosignz
 

Similar to Ingles. (20)

Computer Hardware
Computer HardwareComputer Hardware
Computer Hardware
 
Computers and Technology.
Computers and Technology.Computers and Technology.
Computers and Technology.
 
Computer basics--computer basics2
Computer basics--computer basics2Computer basics--computer basics2
Computer basics--computer basics2
 
Computer basics--computer basics2
Computer basics--computer basics2Computer basics--computer basics2
Computer basics--computer basics2
 
Unit 1 (lo1) revision help
Unit 1 (lo1) revision helpUnit 1 (lo1) revision help
Unit 1 (lo1) revision help
 
Tech Term Defination
Tech Term DefinationTech Term Defination
Tech Term Defination
 
Ite 101 presentation
Ite 101 presentationIte 101 presentation
Ite 101 presentation
 
Marquee13 presentation it_essentials
Marquee13 presentation it_essentialsMarquee13 presentation it_essentials
Marquee13 presentation it_essentials
 
Computer and its application
Computer and its applicationComputer and its application
Computer and its application
 
Computer basics
Computer basicsComputer basics
Computer basics
 
What is a computer
What is a computerWhat is a computer
What is a computer
 
Computer architecture
Computer architectureComputer architecture
Computer architecture
 
Web design and_hosting
Web design and_hostingWeb design and_hosting
Web design and_hosting
 
June 2010 Cis Workshop Class
June 2010 Cis Workshop ClassJune 2010 Cis Workshop Class
June 2010 Cis Workshop Class
 
June 2010 Cis Workshop Class
June 2010 Cis Workshop ClassJune 2010 Cis Workshop Class
June 2010 Cis Workshop Class
 
Parts of Computer
Parts of ComputerParts of Computer
Parts of Computer
 
ICT.pptx
ICT.pptxICT.pptx
ICT.pptx
 
Benefits of computer training
Benefits  of computer  trainingBenefits  of computer  training
Benefits of computer training
 
10 steps to protecting your computer to the world of internet.
10 steps to protecting your computer to the world of internet.10 steps to protecting your computer to the world of internet.
10 steps to protecting your computer to the world of internet.
 
InfoSignz Is Easy To Use
InfoSignz Is Easy To UseInfoSignz Is Easy To Use
InfoSignz Is Easy To Use
 

More from axiologia

Las variedades de la lengua resumen
Las variedades de la lengua  resumenLas variedades de la lengua  resumen
Las variedades de la lengua resumenaxiologia
 
Ensayo-El limite es tu mente.
Ensayo-El limite es tu mente.Ensayo-El limite es tu mente.
Ensayo-El limite es tu mente.axiologia
 
Descripción De Mi computador
Descripción De Mi computador Descripción De Mi computador
Descripción De Mi computador axiologia
 
Componentes del computador sena
Componentes del computador senaComponentes del computador sena
Componentes del computador senaaxiologia
 
9 elementos de proteccion sena
9 elementos de proteccion sena9 elementos de proteccion sena
9 elementos de proteccion senaaxiologia
 
11 mantenimiento preventivo sena
11 mantenimiento preventivo sena11 mantenimiento preventivo sena
11 mantenimiento preventivo senaaxiologia
 
Mantenimiento de software
Mantenimiento de softwareMantenimiento de software
Mantenimiento de softwareaxiologia
 
Electricidad estatica sena! fisk
Electricidad estatica sena! fiskElectricidad estatica sena! fisk
Electricidad estatica sena! fiskaxiologia
 
Electricidad estatica sena! fisk
Electricidad estatica sena! fiskElectricidad estatica sena! fisk
Electricidad estatica sena! fiskaxiologia
 
Mantenimiento de software
Mantenimiento de softwareMantenimiento de software
Mantenimiento de softwareaxiologia
 
Etica senaa!!!!
Etica senaa!!!!Etica senaa!!!!
Etica senaa!!!!axiologia
 
Etica senaa!!!!
Etica senaa!!!!Etica senaa!!!!
Etica senaa!!!!axiologia
 
Quimica senaaa!
Quimica senaaa!Quimica senaaa!
Quimica senaaa!axiologia
 
Etica senaa!!!!
Etica senaa!!!!Etica senaa!!!!
Etica senaa!!!!axiologia
 
Sena fisikaa!!!!
Sena fisikaa!!!!Sena fisikaa!!!!
Sena fisikaa!!!!axiologia
 
Ed.fisica senaa!!
Ed.fisica senaa!!Ed.fisica senaa!!
Ed.fisica senaa!!axiologia
 

More from axiologia (20)

Doc1
Doc1Doc1
Doc1
 
Las variedades de la lengua resumen
Las variedades de la lengua  resumenLas variedades de la lengua  resumen
Las variedades de la lengua resumen
 
Ensayo-El limite es tu mente.
Ensayo-El limite es tu mente.Ensayo-El limite es tu mente.
Ensayo-El limite es tu mente.
 
Redes 1 3
Redes 1 3Redes 1 3
Redes 1 3
 
Redes 1 3
Redes 1 3Redes 1 3
Redes 1 3
 
Descripción De Mi computador
Descripción De Mi computador Descripción De Mi computador
Descripción De Mi computador
 
Componentes del computador sena
Componentes del computador senaComponentes del computador sena
Componentes del computador sena
 
9 elementos de proteccion sena
9 elementos de proteccion sena9 elementos de proteccion sena
9 elementos de proteccion sena
 
11 mantenimiento preventivo sena
11 mantenimiento preventivo sena11 mantenimiento preventivo sena
11 mantenimiento preventivo sena
 
Mantenimiento de software
Mantenimiento de softwareMantenimiento de software
Mantenimiento de software
 
Electricidad estatica sena! fisk
Electricidad estatica sena! fiskElectricidad estatica sena! fisk
Electricidad estatica sena! fisk
 
Electricidad estatica sena! fisk
Electricidad estatica sena! fiskElectricidad estatica sena! fisk
Electricidad estatica sena! fisk
 
Mantenimiento de software
Mantenimiento de softwareMantenimiento de software
Mantenimiento de software
 
Etica senaa!!!!
Etica senaa!!!!Etica senaa!!!!
Etica senaa!!!!
 
Etica senaa!!!!
Etica senaa!!!!Etica senaa!!!!
Etica senaa!!!!
 
Quimica senaaa!
Quimica senaaa!Quimica senaaa!
Quimica senaaa!
 
Etica senaa!!!!
Etica senaa!!!!Etica senaa!!!!
Etica senaa!!!!
 
Redes sena!
Redes sena!Redes sena!
Redes sena!
 
Sena fisikaa!!!!
Sena fisikaa!!!!Sena fisikaa!!!!
Sena fisikaa!!!!
 
Ed.fisica senaa!!
Ed.fisica senaa!!Ed.fisica senaa!!
Ed.fisica senaa!!
 

Recently uploaded

Breaking Down the Flutterwave Scandal What You Need to Know.pdf
Breaking Down the Flutterwave Scandal What You Need to Know.pdfBreaking Down the Flutterwave Scandal What You Need to Know.pdf
Breaking Down the Flutterwave Scandal What You Need to Know.pdfUK Journal
 
Enterprise Knowledge Graphs - Data Summit 2024
Enterprise Knowledge Graphs - Data Summit 2024Enterprise Knowledge Graphs - Data Summit 2024
Enterprise Knowledge Graphs - Data Summit 2024Enterprise Knowledge
 
Intro in Product Management - Коротко про професію продакт менеджера
Intro in Product Management - Коротко про професію продакт менеджераIntro in Product Management - Коротко про професію продакт менеджера
Intro in Product Management - Коротко про професію продакт менеджераMark Opanasiuk
 
How Red Hat Uses FDO in Device Lifecycle _ Costin and Vitaliy at Red Hat.pdf
How Red Hat Uses FDO in Device Lifecycle _ Costin and Vitaliy at Red Hat.pdfHow Red Hat Uses FDO in Device Lifecycle _ Costin and Vitaliy at Red Hat.pdf
How Red Hat Uses FDO in Device Lifecycle _ Costin and Vitaliy at Red Hat.pdfFIDO Alliance
 
Using IESVE for Room Loads Analysis - UK & Ireland
Using IESVE for Room Loads Analysis - UK & IrelandUsing IESVE for Room Loads Analysis - UK & Ireland
Using IESVE for Room Loads Analysis - UK & IrelandIES VE
 
Integrating Telephony Systems with Salesforce: Insights and Considerations, B...
Integrating Telephony Systems with Salesforce: Insights and Considerations, B...Integrating Telephony Systems with Salesforce: Insights and Considerations, B...
Integrating Telephony Systems with Salesforce: Insights and Considerations, B...CzechDreamin
 
ECS 2024 Teams Premium - Pretty Secure
ECS 2024   Teams Premium - Pretty SecureECS 2024   Teams Premium - Pretty Secure
ECS 2024 Teams Premium - Pretty SecureFemke de Vroome
 
Your enemies use GenAI too - staying ahead of fraud with Neo4j
Your enemies use GenAI too - staying ahead of fraud with Neo4jYour enemies use GenAI too - staying ahead of fraud with Neo4j
Your enemies use GenAI too - staying ahead of fraud with Neo4jNeo4j
 
Oauth 2.0 Introduction and Flows with MuleSoft
Oauth 2.0 Introduction and Flows with MuleSoftOauth 2.0 Introduction and Flows with MuleSoft
Oauth 2.0 Introduction and Flows with MuleSoftshyamraj55
 
Long journey of Ruby Standard library at RubyKaigi 2024
Long journey of Ruby Standard library at RubyKaigi 2024Long journey of Ruby Standard library at RubyKaigi 2024
Long journey of Ruby Standard library at RubyKaigi 2024Hiroshi SHIBATA
 
Introduction to FDO and How It works Applications _ Richard at FIDO Alliance.pdf
Introduction to FDO and How It works Applications _ Richard at FIDO Alliance.pdfIntroduction to FDO and How It works Applications _ Richard at FIDO Alliance.pdf
Introduction to FDO and How It works Applications _ Richard at FIDO Alliance.pdfFIDO Alliance
 
A Business-Centric Approach to Design System Strategy
A Business-Centric Approach to Design System StrategyA Business-Centric Approach to Design System Strategy
A Business-Centric Approach to Design System StrategyUXDXConf
 
Working together SRE & Platform Engineering
Working together SRE & Platform EngineeringWorking together SRE & Platform Engineering
Working together SRE & Platform EngineeringMarcus Vechiato
 
How we scaled to 80K users by doing nothing!.pdf
How we scaled to 80K users by doing nothing!.pdfHow we scaled to 80K users by doing nothing!.pdf
How we scaled to 80K users by doing nothing!.pdfSrushith Repakula
 
The Value of Certifying Products for FDO _ Paul at FIDO Alliance.pdf
The Value of Certifying Products for FDO _ Paul at FIDO Alliance.pdfThe Value of Certifying Products for FDO _ Paul at FIDO Alliance.pdf
The Value of Certifying Products for FDO _ Paul at FIDO Alliance.pdfFIDO Alliance
 
BT & Neo4j _ How Knowledge Graphs help BT deliver Digital Transformation.pptx
BT & Neo4j _ How Knowledge Graphs help BT deliver Digital Transformation.pptxBT & Neo4j _ How Knowledge Graphs help BT deliver Digital Transformation.pptx
BT & Neo4j _ How Knowledge Graphs help BT deliver Digital Transformation.pptxNeo4j
 
Behind the Scenes From the Manager's Chair: Decoding the Secrets of Successfu...
Behind the Scenes From the Manager's Chair: Decoding the Secrets of Successfu...Behind the Scenes From the Manager's Chair: Decoding the Secrets of Successfu...
Behind the Scenes From the Manager's Chair: Decoding the Secrets of Successfu...CzechDreamin
 
AI mind or machine power point presentation
AI mind or machine power point presentationAI mind or machine power point presentation
AI mind or machine power point presentationyogeshlabana357357
 
Choosing the Right FDO Deployment Model for Your Application _ Geoffrey at In...
Choosing the Right FDO Deployment Model for Your Application _ Geoffrey at In...Choosing the Right FDO Deployment Model for Your Application _ Geoffrey at In...
Choosing the Right FDO Deployment Model for Your Application _ Geoffrey at In...FIDO Alliance
 
TopCryptoSupers 12thReport OrionX May2024
TopCryptoSupers 12thReport OrionX May2024TopCryptoSupers 12thReport OrionX May2024
TopCryptoSupers 12thReport OrionX May2024Stephen Perrenod
 

Recently uploaded (20)

Breaking Down the Flutterwave Scandal What You Need to Know.pdf
Breaking Down the Flutterwave Scandal What You Need to Know.pdfBreaking Down the Flutterwave Scandal What You Need to Know.pdf
Breaking Down the Flutterwave Scandal What You Need to Know.pdf
 
Enterprise Knowledge Graphs - Data Summit 2024
Enterprise Knowledge Graphs - Data Summit 2024Enterprise Knowledge Graphs - Data Summit 2024
Enterprise Knowledge Graphs - Data Summit 2024
 
Intro in Product Management - Коротко про професію продакт менеджера
Intro in Product Management - Коротко про професію продакт менеджераIntro in Product Management - Коротко про професію продакт менеджера
Intro in Product Management - Коротко про професію продакт менеджера
 
How Red Hat Uses FDO in Device Lifecycle _ Costin and Vitaliy at Red Hat.pdf
How Red Hat Uses FDO in Device Lifecycle _ Costin and Vitaliy at Red Hat.pdfHow Red Hat Uses FDO in Device Lifecycle _ Costin and Vitaliy at Red Hat.pdf
How Red Hat Uses FDO in Device Lifecycle _ Costin and Vitaliy at Red Hat.pdf
 
Using IESVE for Room Loads Analysis - UK & Ireland
Using IESVE for Room Loads Analysis - UK & IrelandUsing IESVE for Room Loads Analysis - UK & Ireland
Using IESVE for Room Loads Analysis - UK & Ireland
 
Integrating Telephony Systems with Salesforce: Insights and Considerations, B...
Integrating Telephony Systems with Salesforce: Insights and Considerations, B...Integrating Telephony Systems with Salesforce: Insights and Considerations, B...
Integrating Telephony Systems with Salesforce: Insights and Considerations, B...
 
ECS 2024 Teams Premium - Pretty Secure
ECS 2024   Teams Premium - Pretty SecureECS 2024   Teams Premium - Pretty Secure
ECS 2024 Teams Premium - Pretty Secure
 
Your enemies use GenAI too - staying ahead of fraud with Neo4j
Your enemies use GenAI too - staying ahead of fraud with Neo4jYour enemies use GenAI too - staying ahead of fraud with Neo4j
Your enemies use GenAI too - staying ahead of fraud with Neo4j
 
Oauth 2.0 Introduction and Flows with MuleSoft
Oauth 2.0 Introduction and Flows with MuleSoftOauth 2.0 Introduction and Flows with MuleSoft
Oauth 2.0 Introduction and Flows with MuleSoft
 
Long journey of Ruby Standard library at RubyKaigi 2024
Long journey of Ruby Standard library at RubyKaigi 2024Long journey of Ruby Standard library at RubyKaigi 2024
Long journey of Ruby Standard library at RubyKaigi 2024
 
Introduction to FDO and How It works Applications _ Richard at FIDO Alliance.pdf
Introduction to FDO and How It works Applications _ Richard at FIDO Alliance.pdfIntroduction to FDO and How It works Applications _ Richard at FIDO Alliance.pdf
Introduction to FDO and How It works Applications _ Richard at FIDO Alliance.pdf
 
A Business-Centric Approach to Design System Strategy
A Business-Centric Approach to Design System StrategyA Business-Centric Approach to Design System Strategy
A Business-Centric Approach to Design System Strategy
 
Working together SRE & Platform Engineering
Working together SRE & Platform EngineeringWorking together SRE & Platform Engineering
Working together SRE & Platform Engineering
 
How we scaled to 80K users by doing nothing!.pdf
How we scaled to 80K users by doing nothing!.pdfHow we scaled to 80K users by doing nothing!.pdf
How we scaled to 80K users by doing nothing!.pdf
 
The Value of Certifying Products for FDO _ Paul at FIDO Alliance.pdf
The Value of Certifying Products for FDO _ Paul at FIDO Alliance.pdfThe Value of Certifying Products for FDO _ Paul at FIDO Alliance.pdf
The Value of Certifying Products for FDO _ Paul at FIDO Alliance.pdf
 
BT & Neo4j _ How Knowledge Graphs help BT deliver Digital Transformation.pptx
BT & Neo4j _ How Knowledge Graphs help BT deliver Digital Transformation.pptxBT & Neo4j _ How Knowledge Graphs help BT deliver Digital Transformation.pptx
BT & Neo4j _ How Knowledge Graphs help BT deliver Digital Transformation.pptx
 
Behind the Scenes From the Manager's Chair: Decoding the Secrets of Successfu...
Behind the Scenes From the Manager's Chair: Decoding the Secrets of Successfu...Behind the Scenes From the Manager's Chair: Decoding the Secrets of Successfu...
Behind the Scenes From the Manager's Chair: Decoding the Secrets of Successfu...
 
AI mind or machine power point presentation
AI mind or machine power point presentationAI mind or machine power point presentation
AI mind or machine power point presentation
 
Choosing the Right FDO Deployment Model for Your Application _ Geoffrey at In...
Choosing the Right FDO Deployment Model for Your Application _ Geoffrey at In...Choosing the Right FDO Deployment Model for Your Application _ Geoffrey at In...
Choosing the Right FDO Deployment Model for Your Application _ Geoffrey at In...
 
TopCryptoSupers 12thReport OrionX May2024
TopCryptoSupers 12thReport OrionX May2024TopCryptoSupers 12thReport OrionX May2024
TopCryptoSupers 12thReport OrionX May2024
 

Ingles.

  • 1. REPORT Presentado a: Lina, Jhon, Selene Presentado por: Yesenia Sánchez Natalia Cardona Juliana Patiño Tania Sánchez Grado 10*4 I.E Gabo
  • 2. Report The glosary is a good way to improve our vocabulary. We were the vocabulary agree with the information of the guide. The words of our glosary are computer terms and those are very specifics. Some examples that are there are: Modem Short for modulator-demodulator is an electronic device that converts a computer’s digital signals into specific frequencies over telephone or cable television lines. Publisher You can create materials for print, email and Web use in the same user interface known from other Microsoft Office System programs. Rises to a higher level creating and publishing marketing materials. Our glosary has many terms of computer programs and the glosary explains the easy way the use of this programs. The advertising programs for pc is really nice because we can learn about new programs, also those programs are very useful. The information was found easily in internet. Some advertising programs for pc are: Chris PC-Lock It is a useful Windows application with keyboard locking functions. Now you can enjoy your spare time without any worry that somebody unauthorized will access your computer. More than that, you can ensure that your work remains unaltered and meanwhile benefit of your children joy when playing around your laptop or desktop PC. BIOS CMOS Memory The BIOS settings that you use to control how your PC works must be saved in non-volatile memory so that they are preserved even when the machine is off. This is as opposed to regular system memory, which is cleared each time you turn off the PC. A special type of memory is used to store this information, called CMOS memory, and a very small battery is used to trickle a small charge to it to make sure that the data it holds is always preserved. These memories are very small, typically 64 bytes, and the batteries that they use typically last for years. This non-volatile memory is sometimes called NVRAM.
  • 3. The poster was a funny job because thinking and technological product is easy end it get we imagine the future and draw it.