SlideShare a Scribd company logo
Plagiarism can chaos. If 
you plagiarize, you are 
considered a copy-cat. 
DON’T BE A COPY-CAT!
Charts are Important 
• Charts are visually appealing and make it easy 
for you to see comparisons, patterns, and 
trends in data. 
• Instead of analyzing columns of numbers, you 
can see at a glance whether your typing speed 
is falling or rising.
40 
35 
30 
25 
20 
15 
10 
5 
0 
Traking My Success 
Sam Litchfield 
1 2 3 4 5 6 7 
Speed 
Goal
Why We Like Cloud Computing
Advantages 
• You would be able to have more storage
5 Rules 
1)Keep your identity a secret 
2)Be extra carful with strangers 
3)Tell somebody
5 Rules 
4)Protect your password 
5)Be nice
Use Clipart
Malware 
Malware is 
dangerous to 
computers. Your 
money could go 
down the drain!
Advantages of the Cloud 
• There is more space on your device. 
• You could share ideas 
• If one file is erased than there is always 
another one
Disadvantages of the Cloud 
• Privacy. 
• You have to pay for storage. 
• Poor internet connection.
Netiquette 
• Set of rules for how 
to travel online 
• Treat others as you 
would like to be 
treated:
Social Networking 
helps you connect 
with your friends 
and family!
Sources 
You can find many more free templates on Presentation 
Magazine website
• Favorite Food: Shrimp 
• Favorite Movie: Rise of the Planet of the Apes 
• Favorite Sport: Basketball and Baseball 
• Favorite Music: Animals 
• Favorite Books: Harry Potter

More Related Content

Similar to Sam Litchfield Technology

Caroline's technology powerpoint
Caroline's technology powerpointCaroline's technology powerpoint
Caroline's technology powerpoint
Marq2014
 
Morgan Markus
Morgan Markus Morgan Markus
Morgan Markus
Marq2014
 
Libby naylor tech 2k14
Libby naylor tech 2k14Libby naylor tech 2k14
Libby naylor tech 2k14
Marq2014
 
Saige S. ☀😊😃
Saige S. ☀😊😃Saige S. ☀😊😃
Saige S. ☀😊😃
Marq2014
 
Defcon Crypto Village - OPSEC Concerns in Using Crypto
Defcon Crypto Village - OPSEC Concerns in Using CryptoDefcon Crypto Village - OPSEC Concerns in Using Crypto
Defcon Crypto Village - OPSEC Concerns in Using Crypto
John Bambenek
 
A Technical Dive into Defensive Trickery
A Technical Dive into Defensive TrickeryA Technical Dive into Defensive Trickery
A Technical Dive into Defensive Trickery
Dan Kaminsky
 
Ellie
Ellie Ellie
Ellie
Marq2014
 
Digital Leadership 2015-2016
Digital Leadership 2015-2016Digital Leadership 2015-2016
Digital Leadership 2015-2016
katienedved
 
Digital Leadership 2015 2016
Digital Leadership 2015 2016Digital Leadership 2015 2016
Digital Leadership 2015 2016
katienedved
 
Ava Technology
Ava TechnologyAva Technology
Ava Technology
Marq2014
 
Computer ethics
Computer ethicsComputer ethics
Computer ethics
Benjamin Sangalang
 
Technology Today By:Anna Marie
Technology Today By:Anna MarieTechnology Today By:Anna Marie
Technology Today By:Anna Marie
Marq2014
 
Technology - Elizah
Technology - Elizah Technology - Elizah
Technology - Elizah
Marq2014
 
Netiquette do’s & don’ts
Netiquette do’s & don’tsNetiquette do’s & don’ts
Netiquette do’s & don’ts
Amy Whitener, Ed.S
 
Civilian OPSEC in cyberspace
Civilian OPSEC  in cyberspaceCivilian OPSEC  in cyberspace
Civilian OPSEC in cyberspace
zapp0
 
00762 4
00762 400762 4
00762 4
Marq2014
 
Technology Repot by Cameron Major
Technology Repot by Cameron MajorTechnology Repot by Cameron Major
Technology Repot by Cameron Major
Marq2014
 
Blitzing with your defense bea con
Blitzing with your defense bea conBlitzing with your defense bea con
Blitzing with your defense bea con
Innismir
 
Hacker Halted 2018: From CTF to CVE – How Application of Concepts and Persist...
Hacker Halted 2018: From CTF to CVE – How Application of Concepts and Persist...Hacker Halted 2018: From CTF to CVE – How Application of Concepts and Persist...
Hacker Halted 2018: From CTF to CVE – How Application of Concepts and Persist...
EC-Council
 
ITCamp 2018 - Tudor Damian - The cybersecurity landscape is changing. Are you...
ITCamp 2018 - Tudor Damian - The cybersecurity landscape is changing. Are you...ITCamp 2018 - Tudor Damian - The cybersecurity landscape is changing. Are you...
ITCamp 2018 - Tudor Damian - The cybersecurity landscape is changing. Are you...
ITCamp
 

Similar to Sam Litchfield Technology (20)

Caroline's technology powerpoint
Caroline's technology powerpointCaroline's technology powerpoint
Caroline's technology powerpoint
 
Morgan Markus
Morgan Markus Morgan Markus
Morgan Markus
 
Libby naylor tech 2k14
Libby naylor tech 2k14Libby naylor tech 2k14
Libby naylor tech 2k14
 
Saige S. ☀😊😃
Saige S. ☀😊😃Saige S. ☀😊😃
Saige S. ☀😊😃
 
Defcon Crypto Village - OPSEC Concerns in Using Crypto
Defcon Crypto Village - OPSEC Concerns in Using CryptoDefcon Crypto Village - OPSEC Concerns in Using Crypto
Defcon Crypto Village - OPSEC Concerns in Using Crypto
 
A Technical Dive into Defensive Trickery
A Technical Dive into Defensive TrickeryA Technical Dive into Defensive Trickery
A Technical Dive into Defensive Trickery
 
Ellie
Ellie Ellie
Ellie
 
Digital Leadership 2015-2016
Digital Leadership 2015-2016Digital Leadership 2015-2016
Digital Leadership 2015-2016
 
Digital Leadership 2015 2016
Digital Leadership 2015 2016Digital Leadership 2015 2016
Digital Leadership 2015 2016
 
Ava Technology
Ava TechnologyAva Technology
Ava Technology
 
Computer ethics
Computer ethicsComputer ethics
Computer ethics
 
Technology Today By:Anna Marie
Technology Today By:Anna MarieTechnology Today By:Anna Marie
Technology Today By:Anna Marie
 
Technology - Elizah
Technology - Elizah Technology - Elizah
Technology - Elizah
 
Netiquette do’s & don’ts
Netiquette do’s & don’tsNetiquette do’s & don’ts
Netiquette do’s & don’ts
 
Civilian OPSEC in cyberspace
Civilian OPSEC  in cyberspaceCivilian OPSEC  in cyberspace
Civilian OPSEC in cyberspace
 
00762 4
00762 400762 4
00762 4
 
Technology Repot by Cameron Major
Technology Repot by Cameron MajorTechnology Repot by Cameron Major
Technology Repot by Cameron Major
 
Blitzing with your defense bea con
Blitzing with your defense bea conBlitzing with your defense bea con
Blitzing with your defense bea con
 
Hacker Halted 2018: From CTF to CVE – How Application of Concepts and Persist...
Hacker Halted 2018: From CTF to CVE – How Application of Concepts and Persist...Hacker Halted 2018: From CTF to CVE – How Application of Concepts and Persist...
Hacker Halted 2018: From CTF to CVE – How Application of Concepts and Persist...
 
ITCamp 2018 - Tudor Damian - The cybersecurity landscape is changing. Are you...
ITCamp 2018 - Tudor Damian - The cybersecurity landscape is changing. Are you...ITCamp 2018 - Tudor Damian - The cybersecurity landscape is changing. Are you...
ITCamp 2018 - Tudor Damian - The cybersecurity landscape is changing. Are you...
 

More from Marq2014

Robots (updated)
Robots (updated)Robots (updated)
Robots (updated)
Marq2014
 
The 3 D printer
The 3 D printerThe 3 D printer
The 3 D printer
Marq2014
 
Tommy project pp
Tommy project ppTommy project pp
Tommy project pp
Marq2014
 
Information Privacy
Information Privacy Information Privacy
Information Privacy
Marq2014
 
Finn delgado 3 d printing report
Finn delgado 3 d printing reportFinn delgado 3 d printing report
Finn delgado 3 d printing report
Marq2014
 
Adapting to technology by Emily !
Adapting to technology by Emily !Adapting to technology by Emily !
Adapting to technology by Emily !
Marq2014
 
Joshua Coffman and David Bryan's Computer History Project
Joshua Coffman and David Bryan's Computer History ProjectJoshua Coffman and David Bryan's Computer History Project
Joshua Coffman and David Bryan's Computer History Project
Marq2014
 
computer history
computer historycomputer history
computer history
Marq2014
 
Emoji katherine
Emoji katherineEmoji katherine
Emoji katherine
Marq2014
 
Wilburn pp4
Wilburn pp4Wilburn pp4
Wilburn pp4
Marq2014
 
Brian nguyen
Brian nguyenBrian nguyen
Brian nguyen
Marq2014
 
Plagiarism -Jadyn
Plagiarism -JadynPlagiarism -Jadyn
Plagiarism -Jadyn
Marq2014
 
mia mcpeek project in school for a grade
mia mcpeek project in school for a grademia mcpeek project in school for a grade
mia mcpeek project in school for a grade
Marq2014
 
Cyberbullying 3.0
Cyberbullying 3.0Cyberbullying 3.0
Cyberbullying 3.0
Marq2014
 
The Evolution of T.V.
The Evolution of T.V.The Evolution of T.V.
The Evolution of T.V.
Marq2014
 
Kennedy 3d printers
Kennedy  3d printers Kennedy  3d printers
Kennedy 3d printers
Marq2014
 
Quinn 3D printing project
Quinn 3D printing project Quinn 3D printing project
Quinn 3D printing project
Marq2014
 
Cyberbullying by Mia
Cyberbullying by MiaCyberbullying by Mia
Cyberbullying by Mia
Marq2014
 
Robots in Space
Robots in SpaceRobots in Space
Robots in Space
Marq2014
 
Emily emerging technology
Emily emerging technology Emily emerging technology
Emily emerging technology
Marq2014
 

More from Marq2014 (20)

Robots (updated)
Robots (updated)Robots (updated)
Robots (updated)
 
The 3 D printer
The 3 D printerThe 3 D printer
The 3 D printer
 
Tommy project pp
Tommy project ppTommy project pp
Tommy project pp
 
Information Privacy
Information Privacy Information Privacy
Information Privacy
 
Finn delgado 3 d printing report
Finn delgado 3 d printing reportFinn delgado 3 d printing report
Finn delgado 3 d printing report
 
Adapting to technology by Emily !
Adapting to technology by Emily !Adapting to technology by Emily !
Adapting to technology by Emily !
 
Joshua Coffman and David Bryan's Computer History Project
Joshua Coffman and David Bryan's Computer History ProjectJoshua Coffman and David Bryan's Computer History Project
Joshua Coffman and David Bryan's Computer History Project
 
computer history
computer historycomputer history
computer history
 
Emoji katherine
Emoji katherineEmoji katherine
Emoji katherine
 
Wilburn pp4
Wilburn pp4Wilburn pp4
Wilburn pp4
 
Brian nguyen
Brian nguyenBrian nguyen
Brian nguyen
 
Plagiarism -Jadyn
Plagiarism -JadynPlagiarism -Jadyn
Plagiarism -Jadyn
 
mia mcpeek project in school for a grade
mia mcpeek project in school for a grademia mcpeek project in school for a grade
mia mcpeek project in school for a grade
 
Cyberbullying 3.0
Cyberbullying 3.0Cyberbullying 3.0
Cyberbullying 3.0
 
The Evolution of T.V.
The Evolution of T.V.The Evolution of T.V.
The Evolution of T.V.
 
Kennedy 3d printers
Kennedy  3d printers Kennedy  3d printers
Kennedy 3d printers
 
Quinn 3D printing project
Quinn 3D printing project Quinn 3D printing project
Quinn 3D printing project
 
Cyberbullying by Mia
Cyberbullying by MiaCyberbullying by Mia
Cyberbullying by Mia
 
Robots in Space
Robots in SpaceRobots in Space
Robots in Space
 
Emily emerging technology
Emily emerging technology Emily emerging technology
Emily emerging technology
 

Recently uploaded

Energy Efficient Video Encoding for Cloud and Edge Computing Instances
Energy Efficient Video Encoding for Cloud and Edge Computing InstancesEnergy Efficient Video Encoding for Cloud and Edge Computing Instances
Energy Efficient Video Encoding for Cloud and Edge Computing Instances
Alpen-Adria-Universität
 
“Temporal Event Neural Networks: A More Efficient Alternative to the Transfor...
“Temporal Event Neural Networks: A More Efficient Alternative to the Transfor...“Temporal Event Neural Networks: A More Efficient Alternative to the Transfor...
“Temporal Event Neural Networks: A More Efficient Alternative to the Transfor...
Edge AI and Vision Alliance
 
Taking AI to the Next Level in Manufacturing.pdf
Taking AI to the Next Level in Manufacturing.pdfTaking AI to the Next Level in Manufacturing.pdf
Taking AI to the Next Level in Manufacturing.pdf
ssuserfac0301
 
HCL Notes und Domino Lizenzkostenreduzierung in der Welt von DLAU
HCL Notes und Domino Lizenzkostenreduzierung in der Welt von DLAUHCL Notes und Domino Lizenzkostenreduzierung in der Welt von DLAU
HCL Notes und Domino Lizenzkostenreduzierung in der Welt von DLAU
panagenda
 
Dandelion Hashtable: beyond billion requests per second on a commodity server
Dandelion Hashtable: beyond billion requests per second on a commodity serverDandelion Hashtable: beyond billion requests per second on a commodity server
Dandelion Hashtable: beyond billion requests per second on a commodity server
Antonios Katsarakis
 
Driving Business Innovation: Latest Generative AI Advancements & Success Story
Driving Business Innovation: Latest Generative AI Advancements & Success StoryDriving Business Innovation: Latest Generative AI Advancements & Success Story
Driving Business Innovation: Latest Generative AI Advancements & Success Story
Safe Software
 
Presentation of the OECD Artificial Intelligence Review of Germany
Presentation of the OECD Artificial Intelligence Review of GermanyPresentation of the OECD Artificial Intelligence Review of Germany
Presentation of the OECD Artificial Intelligence Review of Germany
innovationoecd
 
Public CyberSecurity Awareness Presentation 2024.pptx
Public CyberSecurity Awareness Presentation 2024.pptxPublic CyberSecurity Awareness Presentation 2024.pptx
Public CyberSecurity Awareness Presentation 2024.pptx
marufrahmanstratejm
 
dbms calicut university B. sc Cs 4th sem.pdf
dbms  calicut university B. sc Cs 4th sem.pdfdbms  calicut university B. sc Cs 4th sem.pdf
dbms calicut university B. sc Cs 4th sem.pdf
Shinana2
 
Choosing The Best AWS Service For Your Website + API.pptx
Choosing The Best AWS Service For Your Website + API.pptxChoosing The Best AWS Service For Your Website + API.pptx
Choosing The Best AWS Service For Your Website + API.pptx
Brandon Minnick, MBA
 
JavaLand 2024: Application Development Green Masterplan
JavaLand 2024: Application Development Green MasterplanJavaLand 2024: Application Development Green Masterplan
JavaLand 2024: Application Development Green Masterplan
Miro Wengner
 
TrustArc Webinar - 2024 Global Privacy Survey
TrustArc Webinar - 2024 Global Privacy SurveyTrustArc Webinar - 2024 Global Privacy Survey
TrustArc Webinar - 2024 Global Privacy Survey
TrustArc
 
SAP S/4 HANA sourcing and procurement to Public cloud
SAP S/4 HANA sourcing and procurement to Public cloudSAP S/4 HANA sourcing and procurement to Public cloud
SAP S/4 HANA sourcing and procurement to Public cloud
maazsz111
 
June Patch Tuesday
June Patch TuesdayJune Patch Tuesday
June Patch Tuesday
Ivanti
 
Introduction of Cybersecurity with OSS at Code Europe 2024
Introduction of Cybersecurity with OSS  at Code Europe 2024Introduction of Cybersecurity with OSS  at Code Europe 2024
Introduction of Cybersecurity with OSS at Code Europe 2024
Hiroshi SHIBATA
 
Azure API Management to expose backend services securely
Azure API Management to expose backend services securelyAzure API Management to expose backend services securely
Azure API Management to expose backend services securely
Dinusha Kumarasiri
 
GNSS spoofing via SDR (Criptored Talks 2024)
GNSS spoofing via SDR (Criptored Talks 2024)GNSS spoofing via SDR (Criptored Talks 2024)
GNSS spoofing via SDR (Criptored Talks 2024)
Javier Junquera
 
Skybuffer SAM4U tool for SAP license adoption
Skybuffer SAM4U tool for SAP license adoptionSkybuffer SAM4U tool for SAP license adoption
Skybuffer SAM4U tool for SAP license adoption
Tatiana Kojar
 
Monitoring and Managing Anomaly Detection on OpenShift.pdf
Monitoring and Managing Anomaly Detection on OpenShift.pdfMonitoring and Managing Anomaly Detection on OpenShift.pdf
Monitoring and Managing Anomaly Detection on OpenShift.pdf
Tosin Akinosho
 
FREE A4 Cyber Security Awareness Posters-Social Engineering part 3
FREE A4 Cyber Security Awareness  Posters-Social Engineering part 3FREE A4 Cyber Security Awareness  Posters-Social Engineering part 3
FREE A4 Cyber Security Awareness Posters-Social Engineering part 3
Data Hops
 

Recently uploaded (20)

Energy Efficient Video Encoding for Cloud and Edge Computing Instances
Energy Efficient Video Encoding for Cloud and Edge Computing InstancesEnergy Efficient Video Encoding for Cloud and Edge Computing Instances
Energy Efficient Video Encoding for Cloud and Edge Computing Instances
 
“Temporal Event Neural Networks: A More Efficient Alternative to the Transfor...
“Temporal Event Neural Networks: A More Efficient Alternative to the Transfor...“Temporal Event Neural Networks: A More Efficient Alternative to the Transfor...
“Temporal Event Neural Networks: A More Efficient Alternative to the Transfor...
 
Taking AI to the Next Level in Manufacturing.pdf
Taking AI to the Next Level in Manufacturing.pdfTaking AI to the Next Level in Manufacturing.pdf
Taking AI to the Next Level in Manufacturing.pdf
 
HCL Notes und Domino Lizenzkostenreduzierung in der Welt von DLAU
HCL Notes und Domino Lizenzkostenreduzierung in der Welt von DLAUHCL Notes und Domino Lizenzkostenreduzierung in der Welt von DLAU
HCL Notes und Domino Lizenzkostenreduzierung in der Welt von DLAU
 
Dandelion Hashtable: beyond billion requests per second on a commodity server
Dandelion Hashtable: beyond billion requests per second on a commodity serverDandelion Hashtable: beyond billion requests per second on a commodity server
Dandelion Hashtable: beyond billion requests per second on a commodity server
 
Driving Business Innovation: Latest Generative AI Advancements & Success Story
Driving Business Innovation: Latest Generative AI Advancements & Success StoryDriving Business Innovation: Latest Generative AI Advancements & Success Story
Driving Business Innovation: Latest Generative AI Advancements & Success Story
 
Presentation of the OECD Artificial Intelligence Review of Germany
Presentation of the OECD Artificial Intelligence Review of GermanyPresentation of the OECD Artificial Intelligence Review of Germany
Presentation of the OECD Artificial Intelligence Review of Germany
 
Public CyberSecurity Awareness Presentation 2024.pptx
Public CyberSecurity Awareness Presentation 2024.pptxPublic CyberSecurity Awareness Presentation 2024.pptx
Public CyberSecurity Awareness Presentation 2024.pptx
 
dbms calicut university B. sc Cs 4th sem.pdf
dbms  calicut university B. sc Cs 4th sem.pdfdbms  calicut university B. sc Cs 4th sem.pdf
dbms calicut university B. sc Cs 4th sem.pdf
 
Choosing The Best AWS Service For Your Website + API.pptx
Choosing The Best AWS Service For Your Website + API.pptxChoosing The Best AWS Service For Your Website + API.pptx
Choosing The Best AWS Service For Your Website + API.pptx
 
JavaLand 2024: Application Development Green Masterplan
JavaLand 2024: Application Development Green MasterplanJavaLand 2024: Application Development Green Masterplan
JavaLand 2024: Application Development Green Masterplan
 
TrustArc Webinar - 2024 Global Privacy Survey
TrustArc Webinar - 2024 Global Privacy SurveyTrustArc Webinar - 2024 Global Privacy Survey
TrustArc Webinar - 2024 Global Privacy Survey
 
SAP S/4 HANA sourcing and procurement to Public cloud
SAP S/4 HANA sourcing and procurement to Public cloudSAP S/4 HANA sourcing and procurement to Public cloud
SAP S/4 HANA sourcing and procurement to Public cloud
 
June Patch Tuesday
June Patch TuesdayJune Patch Tuesday
June Patch Tuesday
 
Introduction of Cybersecurity with OSS at Code Europe 2024
Introduction of Cybersecurity with OSS  at Code Europe 2024Introduction of Cybersecurity with OSS  at Code Europe 2024
Introduction of Cybersecurity with OSS at Code Europe 2024
 
Azure API Management to expose backend services securely
Azure API Management to expose backend services securelyAzure API Management to expose backend services securely
Azure API Management to expose backend services securely
 
GNSS spoofing via SDR (Criptored Talks 2024)
GNSS spoofing via SDR (Criptored Talks 2024)GNSS spoofing via SDR (Criptored Talks 2024)
GNSS spoofing via SDR (Criptored Talks 2024)
 
Skybuffer SAM4U tool for SAP license adoption
Skybuffer SAM4U tool for SAP license adoptionSkybuffer SAM4U tool for SAP license adoption
Skybuffer SAM4U tool for SAP license adoption
 
Monitoring and Managing Anomaly Detection on OpenShift.pdf
Monitoring and Managing Anomaly Detection on OpenShift.pdfMonitoring and Managing Anomaly Detection on OpenShift.pdf
Monitoring and Managing Anomaly Detection on OpenShift.pdf
 
FREE A4 Cyber Security Awareness Posters-Social Engineering part 3
FREE A4 Cyber Security Awareness  Posters-Social Engineering part 3FREE A4 Cyber Security Awareness  Posters-Social Engineering part 3
FREE A4 Cyber Security Awareness Posters-Social Engineering part 3
 

Sam Litchfield Technology

  • 1.
  • 2.
  • 3.
  • 4.
  • 5.
  • 6. Plagiarism can chaos. If you plagiarize, you are considered a copy-cat. DON’T BE A COPY-CAT!
  • 7.
  • 8.
  • 9. Charts are Important • Charts are visually appealing and make it easy for you to see comparisons, patterns, and trends in data. • Instead of analyzing columns of numbers, you can see at a glance whether your typing speed is falling or rising.
  • 10. 40 35 30 25 20 15 10 5 0 Traking My Success Sam Litchfield 1 2 3 4 5 6 7 Speed Goal
  • 11.
  • 12. Why We Like Cloud Computing
  • 13. Advantages • You would be able to have more storage
  • 14.
  • 15. 5 Rules 1)Keep your identity a secret 2)Be extra carful with strangers 3)Tell somebody
  • 16. 5 Rules 4)Protect your password 5)Be nice
  • 18. Malware Malware is dangerous to computers. Your money could go down the drain!
  • 19.
  • 20. Advantages of the Cloud • There is more space on your device. • You could share ideas • If one file is erased than there is always another one
  • 21. Disadvantages of the Cloud • Privacy. • You have to pay for storage. • Poor internet connection.
  • 22. Netiquette • Set of rules for how to travel online • Treat others as you would like to be treated:
  • 23.
  • 24. Social Networking helps you connect with your friends and family!
  • 25. Sources You can find many more free templates on Presentation Magazine website
  • 26.
  • 27. • Favorite Food: Shrimp • Favorite Movie: Rise of the Planet of the Apes • Favorite Sport: Basketball and Baseball • Favorite Music: Animals • Favorite Books: Harry Potter