SlideShare a Scribd company logo
MAKING ACTIVITIES
PROTOTYPE

   A first or preliminary form from which other
    forms are developed or copied.




The prototype device presented has a pair of unusual controllers.
BATCH (UNIX)

   A command to queue jobs for later execution
3D MODELING

  Is the process of
        developing a
       mathematical
  representation of
           any three-
         dimensional
  surface of object
     via specialized
            software.
SKETCH (DRAWING)

   A drawing or other composition that is not
    intended as a finished work, but a preliminary
    exploration
OUTLINE (SUMMARY)
     A document
         summary,
              in list
            format.
        A general
               plan
           showing
          essential
      features but
          no detail.
MOCK-UP
   Is a scale or full-size
    model of a design or
    device, used for teaching,
    demonstration,       design
    evaluation,      promotion,
    and other purposes.
   A mockup is a prototype if
    it provides at least part of
    the functionality of a
    system      and     enables
    testing of a design.

More Related Content

Viewers also liked

MMstrategy
MMstrategyMMstrategy
MMstrategy
Margarita Araque
 
Module 4 information_attributes
Module 4 information_attributesModule 4 information_attributes
Module 4 information_attributes
Margarita Araque
 
Consejos para un buen diseño RED
Consejos para un buen diseño REDConsejos para un buen diseño RED
Consejos para un buen diseño RED
Margarita Araque
 
Fce, profe Mariano M (adults)
Fce, profe Mariano M (adults)Fce, profe Mariano M (adults)
Fce, profe Mariano M (adults)
Maria Segato
 
First Certificate in English
First Certificate in EnglishFirst Certificate in English
First Certificate in English
Susan Dreger
 
PET guidelines
PET guidelinesPET guidelines
PET guidelines
Margarita Araque
 
Fce Exam Overview
Fce Exam OverviewFce Exam Overview
Fce Exam Overview
Inma Alcázar
 

Viewers also liked (9)

MMstrategy
MMstrategyMMstrategy
MMstrategy
 
Module 4 information_attributes
Module 4 information_attributesModule 4 information_attributes
Module 4 information_attributes
 
Consejos para un buen diseño RED
Consejos para un buen diseño REDConsejos para un buen diseño RED
Consejos para un buen diseño RED
 
Fce
FceFce
Fce
 
Fce, profe Mariano M (adults)
Fce, profe Mariano M (adults)Fce, profe Mariano M (adults)
Fce, profe Mariano M (adults)
 
First Certificate in English
First Certificate in EnglishFirst Certificate in English
First Certificate in English
 
PET guidelines
PET guidelinesPET guidelines
PET guidelines
 
Fce Exam Overview
Fce Exam OverviewFce Exam Overview
Fce Exam Overview
 
FCE Exam Cambridge
FCE Exam CambridgeFCE Exam Cambridge
FCE Exam Cambridge
 

More from Margarita Araque

The writing process
The writing processThe writing process
The writing process
Margarita Araque
 
El signo-Repaso Saussure y Pierce
El signo-Repaso Saussure y PierceEl signo-Repaso Saussure y Pierce
El signo-Repaso Saussure y Pierce
Margarita Araque
 
Week9 group-23-24
Week9  group-23-24Week9  group-23-24
Week9 group-23-24
Margarita Araque
 
Biofuels video transcription
Biofuels video transcriptionBiofuels video transcription
Biofuels video transcription
Margarita Araque
 
Neweskweek5
Neweskweek5Neweskweek5
Neweskweek5
Margarita Araque
 
Francisco javier garcia uscategui
Francisco javier garcia uscategui Francisco javier garcia uscategui
Francisco javier garcia uscategui
Margarita Araque
 
Technology Basics Module 5
Technology Basics Module 5Technology Basics Module 5
Technology Basics Module 5
Margarita Araque
 
TECNOLOGY-FUNDAMENTALS-MODULE-4
TECNOLOGY-FUNDAMENTALS-MODULE-4TECNOLOGY-FUNDAMENTALS-MODULE-4
TECNOLOGY-FUNDAMENTALS-MODULE-4
Margarita Araque
 

More from Margarita Araque (8)

The writing process
The writing processThe writing process
The writing process
 
El signo-Repaso Saussure y Pierce
El signo-Repaso Saussure y PierceEl signo-Repaso Saussure y Pierce
El signo-Repaso Saussure y Pierce
 
Week9 group-23-24
Week9  group-23-24Week9  group-23-24
Week9 group-23-24
 
Biofuels video transcription
Biofuels video transcriptionBiofuels video transcription
Biofuels video transcription
 
Neweskweek5
Neweskweek5Neweskweek5
Neweskweek5
 
Francisco javier garcia uscategui
Francisco javier garcia uscategui Francisco javier garcia uscategui
Francisco javier garcia uscategui
 
Technology Basics Module 5
Technology Basics Module 5Technology Basics Module 5
Technology Basics Module 5
 
TECNOLOGY-FUNDAMENTALS-MODULE-4
TECNOLOGY-FUNDAMENTALS-MODULE-4TECNOLOGY-FUNDAMENTALS-MODULE-4
TECNOLOGY-FUNDAMENTALS-MODULE-4
 

Recently uploaded

Generative AI Deep Dive: Advancing from Proof of Concept to Production
Generative AI Deep Dive: Advancing from Proof of Concept to ProductionGenerative AI Deep Dive: Advancing from Proof of Concept to Production
Generative AI Deep Dive: Advancing from Proof of Concept to Production
Aggregage
 
Video Streaming: Then, Now, and in the Future
Video Streaming: Then, Now, and in the FutureVideo Streaming: Then, Now, and in the Future
Video Streaming: Then, Now, and in the Future
Alpen-Adria-Universität
 
FIDO Alliance Osaka Seminar: The WebAuthn API and Discoverable Credentials.pdf
FIDO Alliance Osaka Seminar: The WebAuthn API and Discoverable Credentials.pdfFIDO Alliance Osaka Seminar: The WebAuthn API and Discoverable Credentials.pdf
FIDO Alliance Osaka Seminar: The WebAuthn API and Discoverable Credentials.pdf
FIDO Alliance
 
How to Get CNIC Information System with Paksim Ga.pptx
How to Get CNIC Information System with Paksim Ga.pptxHow to Get CNIC Information System with Paksim Ga.pptx
How to Get CNIC Information System with Paksim Ga.pptx
danishmna97
 
Monitoring Java Application Security with JDK Tools and JFR Events
Monitoring Java Application Security with JDK Tools and JFR EventsMonitoring Java Application Security with JDK Tools and JFR Events
Monitoring Java Application Security with JDK Tools and JFR Events
Ana-Maria Mihalceanu
 
RESUME BUILDER APPLICATION Project for students
RESUME BUILDER APPLICATION Project for studentsRESUME BUILDER APPLICATION Project for students
RESUME BUILDER APPLICATION Project for students
KAMESHS29
 
Climate Impact of Software Testing at Nordic Testing Days
Climate Impact of Software Testing at Nordic Testing DaysClimate Impact of Software Testing at Nordic Testing Days
Climate Impact of Software Testing at Nordic Testing Days
Kari Kakkonen
 
PCI PIN Basics Webinar from the Controlcase Team
PCI PIN Basics Webinar from the Controlcase TeamPCI PIN Basics Webinar from the Controlcase Team
PCI PIN Basics Webinar from the Controlcase Team
ControlCase
 
20240607 QFM018 Elixir Reading List May 2024
20240607 QFM018 Elixir Reading List May 202420240607 QFM018 Elixir Reading List May 2024
20240607 QFM018 Elixir Reading List May 2024
Matthew Sinclair
 
Large Language Model (LLM) and it’s Geospatial Applications
Large Language Model (LLM) and it’s Geospatial ApplicationsLarge Language Model (LLM) and it’s Geospatial Applications
Large Language Model (LLM) and it’s Geospatial Applications
Rohit Gautam
 
Building RAG with self-deployed Milvus vector database and Snowpark Container...
Building RAG with self-deployed Milvus vector database and Snowpark Container...Building RAG with self-deployed Milvus vector database and Snowpark Container...
Building RAG with self-deployed Milvus vector database and Snowpark Container...
Zilliz
 
Why You Should Replace Windows 11 with Nitrux Linux 3.5.0 for enhanced perfor...
Why You Should Replace Windows 11 with Nitrux Linux 3.5.0 for enhanced perfor...Why You Should Replace Windows 11 with Nitrux Linux 3.5.0 for enhanced perfor...
Why You Should Replace Windows 11 with Nitrux Linux 3.5.0 for enhanced perfor...
SOFTTECHHUB
 
GDG Cloud Southlake #33: Boule & Rebala: Effective AppSec in SDLC using Deplo...
GDG Cloud Southlake #33: Boule & Rebala: Effective AppSec in SDLC using Deplo...GDG Cloud Southlake #33: Boule & Rebala: Effective AppSec in SDLC using Deplo...
GDG Cloud Southlake #33: Boule & Rebala: Effective AppSec in SDLC using Deplo...
James Anderson
 
Introduction to CHERI technology - Cybersecurity
Introduction to CHERI technology - CybersecurityIntroduction to CHERI technology - Cybersecurity
Introduction to CHERI technology - Cybersecurity
mikeeftimakis1
 
20240609 QFM020 Irresponsible AI Reading List May 2024
20240609 QFM020 Irresponsible AI Reading List May 202420240609 QFM020 Irresponsible AI Reading List May 2024
20240609 QFM020 Irresponsible AI Reading List May 2024
Matthew Sinclair
 
GraphSummit Singapore | The Art of the Possible with Graph - Q2 2024
GraphSummit Singapore | The Art of the  Possible with Graph - Q2 2024GraphSummit Singapore | The Art of the  Possible with Graph - Q2 2024
GraphSummit Singapore | The Art of the Possible with Graph - Q2 2024
Neo4j
 
National Security Agency - NSA mobile device best practices
National Security Agency - NSA mobile device best practicesNational Security Agency - NSA mobile device best practices
National Security Agency - NSA mobile device best practices
Quotidiano Piemontese
 
Removing Uninteresting Bytes in Software Fuzzing
Removing Uninteresting Bytes in Software FuzzingRemoving Uninteresting Bytes in Software Fuzzing
Removing Uninteresting Bytes in Software Fuzzing
Aftab Hussain
 
GraphSummit Singapore | Neo4j Product Vision & Roadmap - Q2 2024
GraphSummit Singapore | Neo4j Product Vision & Roadmap - Q2 2024GraphSummit Singapore | Neo4j Product Vision & Roadmap - Q2 2024
GraphSummit Singapore | Neo4j Product Vision & Roadmap - Q2 2024
Neo4j
 
LF Energy Webinar: Electrical Grid Modelling and Simulation Through PowSyBl -...
LF Energy Webinar: Electrical Grid Modelling and Simulation Through PowSyBl -...LF Energy Webinar: Electrical Grid Modelling and Simulation Through PowSyBl -...
LF Energy Webinar: Electrical Grid Modelling and Simulation Through PowSyBl -...
DanBrown980551
 

Recently uploaded (20)

Generative AI Deep Dive: Advancing from Proof of Concept to Production
Generative AI Deep Dive: Advancing from Proof of Concept to ProductionGenerative AI Deep Dive: Advancing from Proof of Concept to Production
Generative AI Deep Dive: Advancing from Proof of Concept to Production
 
Video Streaming: Then, Now, and in the Future
Video Streaming: Then, Now, and in the FutureVideo Streaming: Then, Now, and in the Future
Video Streaming: Then, Now, and in the Future
 
FIDO Alliance Osaka Seminar: The WebAuthn API and Discoverable Credentials.pdf
FIDO Alliance Osaka Seminar: The WebAuthn API and Discoverable Credentials.pdfFIDO Alliance Osaka Seminar: The WebAuthn API and Discoverable Credentials.pdf
FIDO Alliance Osaka Seminar: The WebAuthn API and Discoverable Credentials.pdf
 
How to Get CNIC Information System with Paksim Ga.pptx
How to Get CNIC Information System with Paksim Ga.pptxHow to Get CNIC Information System with Paksim Ga.pptx
How to Get CNIC Information System with Paksim Ga.pptx
 
Monitoring Java Application Security with JDK Tools and JFR Events
Monitoring Java Application Security with JDK Tools and JFR EventsMonitoring Java Application Security with JDK Tools and JFR Events
Monitoring Java Application Security with JDK Tools and JFR Events
 
RESUME BUILDER APPLICATION Project for students
RESUME BUILDER APPLICATION Project for studentsRESUME BUILDER APPLICATION Project for students
RESUME BUILDER APPLICATION Project for students
 
Climate Impact of Software Testing at Nordic Testing Days
Climate Impact of Software Testing at Nordic Testing DaysClimate Impact of Software Testing at Nordic Testing Days
Climate Impact of Software Testing at Nordic Testing Days
 
PCI PIN Basics Webinar from the Controlcase Team
PCI PIN Basics Webinar from the Controlcase TeamPCI PIN Basics Webinar from the Controlcase Team
PCI PIN Basics Webinar from the Controlcase Team
 
20240607 QFM018 Elixir Reading List May 2024
20240607 QFM018 Elixir Reading List May 202420240607 QFM018 Elixir Reading List May 2024
20240607 QFM018 Elixir Reading List May 2024
 
Large Language Model (LLM) and it’s Geospatial Applications
Large Language Model (LLM) and it’s Geospatial ApplicationsLarge Language Model (LLM) and it’s Geospatial Applications
Large Language Model (LLM) and it’s Geospatial Applications
 
Building RAG with self-deployed Milvus vector database and Snowpark Container...
Building RAG with self-deployed Milvus vector database and Snowpark Container...Building RAG with self-deployed Milvus vector database and Snowpark Container...
Building RAG with self-deployed Milvus vector database and Snowpark Container...
 
Why You Should Replace Windows 11 with Nitrux Linux 3.5.0 for enhanced perfor...
Why You Should Replace Windows 11 with Nitrux Linux 3.5.0 for enhanced perfor...Why You Should Replace Windows 11 with Nitrux Linux 3.5.0 for enhanced perfor...
Why You Should Replace Windows 11 with Nitrux Linux 3.5.0 for enhanced perfor...
 
GDG Cloud Southlake #33: Boule & Rebala: Effective AppSec in SDLC using Deplo...
GDG Cloud Southlake #33: Boule & Rebala: Effective AppSec in SDLC using Deplo...GDG Cloud Southlake #33: Boule & Rebala: Effective AppSec in SDLC using Deplo...
GDG Cloud Southlake #33: Boule & Rebala: Effective AppSec in SDLC using Deplo...
 
Introduction to CHERI technology - Cybersecurity
Introduction to CHERI technology - CybersecurityIntroduction to CHERI technology - Cybersecurity
Introduction to CHERI technology - Cybersecurity
 
20240609 QFM020 Irresponsible AI Reading List May 2024
20240609 QFM020 Irresponsible AI Reading List May 202420240609 QFM020 Irresponsible AI Reading List May 2024
20240609 QFM020 Irresponsible AI Reading List May 2024
 
GraphSummit Singapore | The Art of the Possible with Graph - Q2 2024
GraphSummit Singapore | The Art of the  Possible with Graph - Q2 2024GraphSummit Singapore | The Art of the  Possible with Graph - Q2 2024
GraphSummit Singapore | The Art of the Possible with Graph - Q2 2024
 
National Security Agency - NSA mobile device best practices
National Security Agency - NSA mobile device best practicesNational Security Agency - NSA mobile device best practices
National Security Agency - NSA mobile device best practices
 
Removing Uninteresting Bytes in Software Fuzzing
Removing Uninteresting Bytes in Software FuzzingRemoving Uninteresting Bytes in Software Fuzzing
Removing Uninteresting Bytes in Software Fuzzing
 
GraphSummit Singapore | Neo4j Product Vision & Roadmap - Q2 2024
GraphSummit Singapore | Neo4j Product Vision & Roadmap - Q2 2024GraphSummit Singapore | Neo4j Product Vision & Roadmap - Q2 2024
GraphSummit Singapore | Neo4j Product Vision & Roadmap - Q2 2024
 
LF Energy Webinar: Electrical Grid Modelling and Simulation Through PowSyBl -...
LF Energy Webinar: Electrical Grid Modelling and Simulation Through PowSyBl -...LF Energy Webinar: Electrical Grid Modelling and Simulation Through PowSyBl -...
LF Energy Webinar: Electrical Grid Modelling and Simulation Through PowSyBl -...
 

Making activities mod1

  • 2. PROTOTYPE  A first or preliminary form from which other forms are developed or copied. The prototype device presented has a pair of unusual controllers.
  • 3. BATCH (UNIX)  A command to queue jobs for later execution
  • 4. 3D MODELING  Is the process of developing a mathematical representation of any three- dimensional surface of object via specialized software.
  • 5. SKETCH (DRAWING)  A drawing or other composition that is not intended as a finished work, but a preliminary exploration
  • 6. OUTLINE (SUMMARY)  A document summary, in list format.  A general plan showing essential features but no detail.
  • 7. MOCK-UP  Is a scale or full-size model of a design or device, used for teaching, demonstration, design evaluation, promotion, and other purposes.  A mockup is a prototype if it provides at least part of the functionality of a system and enables testing of a design.