Diploma in Information Technology
Assignment – Enhancing Productivity with MS Office
Student Name
Student ID
Branch
Batch No
Lecturer
Date Submitted
List which assessment criteria Pass Merit Distinction
the Lecturer has awarded.
(To be filled by the Lecturer)
Covered Assessment Criteria – (To be filled by the Lecturer)
LO1: Demonstrating a comprehensive understanding of the major features and tools of
Microsoft Word.
P1 P2 M1 D1
LO2: Understanding of basic spreadsheet concepts and advanced Excel functions and formulas.
P3 P4 M2 D2
LO3: Using MS PowerPoint application to effectively communicate and present information to
a variety of audiences
P5 P5 M3 D3
Lecturer signature Date
Student Signature Date
TASK 01
Definition of the Internet
The Internet is a global network connecting millions of computers and devices, enabling them to
communicate and exchange information. It operates through standardized protocols such as TCP/IP,
allowing seamless data transfer across different networks. Essentially, the Internet serves as a vast
digital ecosystem where information is shared, businesses operate, and individuals interact in real time.
Advantages of the Internet
The Internet has revolutionized modern life, offering numerous benefits across different sectors:
1. For Individuals:
o Access to Information: Provides instant access to knowledge, educational resources,
and entertainment.
o Communication: Enables instant messaging, emails, social media, and video calls
across the world.
o Convenience: Facilitates online shopping, banking, and service accessibility.
2. For Businesses:
o Global Reach: Allows businesses to expand beyond geographic boundaries.
o E-commerce and Marketing: Digital platforms offer cost-effective advertising and
sales strategies.
o Efficiency and Automation: Streamlines operations through data management, cloud
computing, and AI-driven analytics.
3. For Society:
o Education and Innovation: Strengthens academic research, technological
advancements, and global collaboration.
o Economic Growth: Boosts industries, job creation, and digital entrepreneurship.
o Cultural Exchange: Bridges cultural gaps by enabling interactions between people of
different backgrounds.
Historical Development of the Internet
The Internet's evolution can be traced through several key milestones:
1960s: The concept of a decentralized communication network emerges with ARPANET,
funded by the U.S. Department of Defense.
1970s: The development of TCP/IP protocol allows different networks to interconnect, forming
the early foundation of the Internet.
1980s: Universities and research institutions begin widely adopting Internet technologies. The
introduction of domain names makes navigation easier.
1990s: The birth of the World Wide Web (WWW) transforms the Internet into a user-friendly
platform, fostering exponential growth in websites and online services.
2000s to Present: Advancements such as high-speed broadband, wireless connectivity, social
media, e-commerce, and cloud computing make the Internet indispensable in daily life.
The Internet’s Essential Role in Everyday Life
The Internet has seamlessly integrated into society, shaping communication, information-sharing, and
economic activities:
Communication: Social media, email, and video conferencing keep people connected
worldwide.
Information Exchange: Online platforms, digital libraries, and news websites provide instant
knowledge access.
Economic Impact: Online banking, e-commerce, and gig economy platforms contribute to
economic prosperity.
Future Role of the Internet
Looking ahead, emerging technologies will further expand the Internet’s capabilities:
Artificial Intelligence: AI-driven automation and personalization will enhance digital
experiences.
Internet of Things (IoT): Connected devices will make homes, cities, and industries more
intelligent.
5G and Beyond: High-speed connectivity will enable advancements in remote work, healthcare,
and entertainment.
Blockchain Technology: Secure decentralized transactions will reshape industries like finance
and cybersecurity.
Metaverse & Virtual Reality: The Internet will evolve into immersive environments for social
interaction and business applications.
The Internet has reshaped human interaction, economic structures, and global connectivity, and as
technology advances, its influence will continue to expand. It is an ever-evolving force that bridges the
world in ways previously unimaginable.
Task 02
Part 01 :
Negative Impacts of the Internet on Students
While the Internet offers students immense opportunities for learning, communication, and
entertainment, excessive or improper use can have adverse effects on various aspects of their lives. The
impact extends to general well-being, social interactions, mental health, and academic
performance.
1. Effects on General Well-being
Excessive use of the Internet can lead to physical health concerns, including:
Sedentary Lifestyle: Students often spend long hours online, leading to reduced physical
activity and an increased risk of obesity.
Sleep Disruptions: Late-night browsing or gaming can interfere with sleep schedules, resulting
in poor cognitive function and fatigue.
Eye Strain and Posture Issues: Extended screen time contributes to digital eye strain and
musculoskeletal problems from poor posture.
Example: Studies have shown that children who spend excessive time on screens are more likely to
develop health issues such as headaches, back pain, and difficulty concentrating.
2. Impact on Social Interactions
While the Internet connects people globally, overuse can harm real-world social development:
Reduced Face-to-Face Communication: Overreliance on online communication can make
students less comfortable in personal interactions.
Social Isolation: Excessive engagement with virtual worlds may lead to detachment from
family and friends.
Cyberbullying: The anonymity of the Internet fosters cyberbullying, negatively affecting
students' confidence and emotional health.
Example: According to research, over 30% of teens have experienced online harassment, which often
leads to social withdrawal and emotional distress.
3. Mental Health Challenges
Overexposure to online content can have significant psychological effects:
Anxiety & Depression: The pressure to portray a “perfect” life on social media can cause
anxiety, low self-esteem, and depression.
Addiction to Digital Platforms: Gaming and social media addiction can create dependency,
disrupting daily activities.
Exposure to Harmful Content: Unmonitored access to misinformation, violent content, or
inappropriate material can negatively affect mental health.
Example: Many students feel distress when comparing their lives to influencers or celebrities online,
leading to body image issues and self-doubt.
4. Decline in Academic Performance
Unregulated Internet usage can affect educational success through:
Distractions & Reduced Focus: Constant notifications and social media scrolling lower
concentration levels.
Plagiarism & Overreliance on AI Tools: Easy access to online resources may lead to unethical
academic practices.
Neglecting Studies: Hours spent on online entertainment, gaming, or browsing may reduce
study time.
Example: Research indicates that students who spend excessive time on social media perform worse in
exams compared to those who balance their digital and academic life.
Countermeasures to Promote a Safer Online Environment
To mitigate these negative effects, students, parents, and educators can adopt the following strategies:
Set Screen Time Limits: Encourage regulated use of the Internet to maintain balance.
Promote Digital Detox: Allocate offline activities such as sports, hobbies, or reading to reduce
dependence on screens.
Cyber Safety Education: Teach students about online dangers, privacy settings, and
responsible Internet use.
Encourage Healthy Social Interactions: Foster real-life communication skills by limiting
excessive virtual interactions.
Monitor Content Exposure: Use parental controls and content filters to shield children from
harmful online material.
Prioritize Mental Health: Provide counseling and support for students struggling with Internet-
related stress or cyberbullying.
Conclusion
While the Internet remains a vital tool in modern education, its unregulated use can lead to severe
consequences for students’ well-being, mental health, social life, and academic achievements. Through
awareness and proactive steps, students can benefit from digital advancements while avoiding
harmful effects, ensuring a balanced and productive lifestyle.
Part 02:
Differences Between the Internet and the World Wide Web (WWW)
While the terms Internet and World Wide Web (WWW) are often used interchangeably, they refer to
distinct concepts. The Internet is the global network infrastructure that connects computers and
devices, whereas the WWW is a service that operates on top of the Internet, providing access to web
pages and online content.
1. Definition and Core Differences
Feature Internet World Wide Web (WWW)
A global network of interconnected A collection of web pages and online
Nature
computers content
Facilitates communication, data transfer, Provides access to websites, multimedia, and
Function
and networking hyperlinked documents
Uses protocols like TCP/IP for data
Technology Uses HTTP/HTTPS for accessing web pages
transmission
Dependency Independent of the WWW Requires the Internet to function
Includes servers, routers, fiber-optic cables, Includes websites, web browsers,
Components
and wireless networks hyperlinks, and multimedia
2. Historical Evolution
Internet:
o Originated in the 1960s with ARPANET, a U.S. Department of Defense project.
oExpanded in the 1970s with the development of TCP/IP protocols, enabling global
connectivity.
o Became widely accessible in the 1980s with commercial and academic adoption.
World Wide Web:
o Invented by Tim Berners-Lee in 1989 as a way to organize and access information
online.
o Introduced HTML, URLs, and HTTP, forming the foundation of web browsing.
o Rapidly grew in the 1990s with the rise of websites, search engines, and multimedia
content.
3. Primary Technologies and Features
Internet Technologies:
o TCP/IP Protocols: Enable data transmission across networks.
o IP Addresses: Identify devices connected to the Internet.
o Fiber-optic Cables & Wireless Networks: Facilitate global connectivity.
WWW Technologies:
o Hypertext Markup Language (HTML): Structures web pages.
o Hyperlinks: Connect different web pages and resources.
o Web Browsers (Chrome, Firefox, Edge): Allow users to navigate the WWW.
4. Key Comparisons and Real-World Examples
The Internet is like a highway system, while the WWW is like the vehicles and destinations
that use the roads.
Email, cloud storage, and online gaming use the Internet but are not part of the WWW.
Websites, blogs, and social media platforms exist within the WWW and rely on the Internet
for accessibility.
Conclusion
The Internet and the World Wide Web are closely related but distinct. The Internet provides the
infrastructure, while the WWW offers content and services. Understanding their differences helps
clarify how digital communication and online interactions function.
Activity 02
Task 01 :
Websites and Search Engines on the World Wide Web (WWW)
Understanding Websites
A website is a collection of web pages hosted on a server and accessible via the Internet. Websites serve
various purposes, including information sharing, entertainment, business operations, and social
interactions. They are built using HTML, CSS, and JavaScript, and can be static (fixed content) or
dynamic (interactive and frequently updated).
How Search Engines Work on the WWW
Search engines like Google, Bing, and Yahoo help users find relevant information on the WWW. They
operate through three primary functions:
1. Crawling: Search engines use bots (crawlers) to scan and collect data from web pages.
2. Indexing: The collected data is stored in a massive database, allowing search engines to retrieve
relevant results.
3. Ranking: Search engines rank web pages based on relevance, keywords, and user engagement.
These processes ensure that users receive the most accurate and useful results when searching for
information online.
Classification of Internet-Based Services
Internet services enhance online experiences by providing various functionalities. They can be
categorized into the following types:
1. Communication Services
Email (Gmail, Outlook): Enables digital correspondence.
Instant Messaging (WhatsApp, Telegram): Facilitates real-time conversations.
Video Conferencing (Zoom, Microsoft Teams): Supports virtual meetings and collaboration.
2. Information Retrieval Services
Search Engines (Google, Bing): Help users find relevant content.
Online Encyclopedias (Wikipedia): Provide educational resources.
News Websites (BBC, CNN): Deliver global updates and reports.
3. E-Commerce and Financial Services
Online Shopping (Amazon, eBay): Enables digital transactions.
Banking & Payment Systems (PayPal, Stripe): Facilitate secure financial operations.
Cryptocurrency Platforms (Coinbase, Binance): Support digital asset trading.
4. Entertainment Services
Streaming Platforms (Netflix, YouTube): Offer movies, music, and videos.
Gaming Services (Steam, PlayStation Network): Provide interactive gaming experiences.
Social Media (Facebook, Instagram): Enable content sharing and networking.
5. Cloud Computing & Storage
Cloud Storage (Google Drive, Dropbox): Allows secure file storage.
Web Hosting (AWS, GoDaddy): Supports website deployment.
Software as a Service (SaaS) (Microsoft 365, Adobe Creative Cloud): Provides online
software solutions.
Evolution of Internet Services
Internet services have evolved significantly over time, influenced by technological advancements:
Early 2000s: Basic websites and email services dominated.
2010s: Social media, cloud computing, and mobile applications gained popularity.
2020s & Beyond: AI-driven personalization, blockchain security, and immersive experiences
(Metaverse, VR) are shaping the future.
The Internet continues to revolutionize how we communicate, shop, entertain, and work, making digital
interactions more seamless and efficient.
Task 02 :
Overview of Computer Virus Attacks
Computer viruses are malicious programs designed to disrupt, damage, or gain unauthorized access
to systems. They spread through various means, including infected files, email attachments, and
compromised websites. Below are three major types of virus attacks, their characteristics, transmission
methods, and impact on systems.
1. Trojan Horse Virus
Characteristics:
Disguised as legitimate software to trick users into installing it.
Does not replicate itself but can create backdoors for hackers.
Transmission Methods:
Downloading fake software or attachments from untrusted sources.
Clicking on malicious links in emails or websites.
Impact on Systems:
Steals sensitive data such as passwords and financial information.
Allows remote control of infected devices, leading to cyberattacks.
Can disable security software, making systems vulnerable.
2. Worms
Characteristics:
Self-replicating malware that spreads without user interaction.
Can exploit vulnerabilities in networks and operating systems.
Transmission Methods:
Spreads through network connections, emails, and file-sharing platforms.
Exploits security flaws in outdated software.
Impact on Systems:
Consumes system resources, slowing down performance.
Can delete files or install additional malware.
Causes network congestion, disrupting business operations.
3. Ransomware
Characteristics:
Encrypts files and demands payment for decryption.
Often spreads through phishing emails or compromised websites.
Transmission Methods:
Clicking on malicious email attachments or links.
Downloading infected software from unverified sources.
Impact on Systems:
Prevents access to important files, disrupting personal and business activities.
Can lead to financial loss if ransom is paid.
Weakens cybersecurity by exposing vulnerabilities.
Preventive Measures
To protect against virus attacks, users should:
Install antivirus software and keep it updated.
Avoid clicking on suspicious links or downloading unknown files.
Regularly update software to patch security vulnerabilities.
Use strong passwords and enable multi-factor authentication.
Understanding these virus types and their effects helps users stay vigilant and safeguard their systems
from cyber threats.
Internet Security Protocols: Protection Against Cyber Threats
Internet security protocols are essential for safeguarding networks from cyberattacks. These protocols
ensure data integrity, confidentiality, and authentication during online communication. Below is an
evaluation of key security mechanisms, considering ease of use, scalability, and effectiveness.
1. Transport Layer Security (TLS)
Overview: TLS is an encryption protocol that secures data transmission over the Internet, commonly
used in HTTPS websites, emails, and messaging apps.
Ease of Use:
Widely implemented in web browsers and applications.
Requires minimal user interaction.
Scalability:
Works efficiently across different platforms and devices.
Supports large-scale enterprise security.
Effectiveness:
Provides strong encryption, preventing data interception.
Protects against man-in-the-middle attacks.
Pros:
Ensures secure communication over the web.
Supports authentication and data integrity.
Cons:
slow down performance due to encryption overhead.
Vulnerable to outdated versions if not regularly updated.
2. Internet Protocol Security (IPsec)
Overview: IPsec secures network traffic by encrypting and authenticating IP packets, commonly used
in VPNs and corporate networks.
Ease of Use:
Requires configuration, making it complex for non-technical users.
Works at the network layer, securing all traffic.
Scalability:
Suitable for large organizations and secure remote access.
Can be integrated into enterprise security frameworks.
Effectiveness:
Provides end-to-end encryption for network communications.
Prevents unauthorized access and data tampering.
Pros:
Strong encryption for secure VPN connections.
Protects against IP spoofing and replay attacks.
Cons:
Complex setup and maintenance.
Can cause network latency due to encryption processing.
3. Secure Sockets Layer (SSL)
Overview: SSL was the predecessor of TLS, used for encrypting web traffic. Though largely replaced
by TLS, some legacy systems still use SSL.
Ease of Use:
Simple implementation but outdated.
Requires certificates for authentication.
Scalability:
Limited scalability due to security vulnerabilities.
Not recommended for modern applications.
Effectiveness:
Provides encryption but weaker than TLS.
Susceptible to security flaws like SSL vulnerabilities.
Pros:
Basic encryption for older systems.
Easy to implement in legacy applications.
Cons:
No longer considered secure.
Vulnerable to attacks like POODLE and BEAST.
Choosing the Right Security Protocol
The selection of an internet security protocol depends on the network environment and security
needs:
For Websites & Online Services: TLS is the best choice for securing web traffic.
For Corporate Networks & VPNs: IPsec provides robust security for enterprise
communication.
For Legacy Systems: SSL may still be used but should be replaced with TLS.
Conclusion
Internet security protocols play a crucial role in protecting data, preventing cyber threats, and
ensuring secure communication. Organizations should adopt modern encryption standards and
regularly update security mechanisms to stay ahead of cyber risks.
Activity 03
Task 01:
Understanding B2C, B2B, C2C, and C2B E-Commerce
E-commerce operates through various models, each catering to different types of transactions. The four
primary types are Business-to-Consumer (B2C), Business-to-Business (B2B), Consumer-to-
Consumer (C2C), and Consumer-to-Business (C2B).
1. Business-to-Consumer (B2C)
Definition: B2C e-commerce involves businesses selling products or services directly to individual
consumers.
Characteristics:
Transactions are straightforward and involve end-users.
Focuses on convenience, competitive pricing, and customer experience.
Includes online retail stores, digital marketplaces, and subscription services.
Examples:
Amazon: Sells products directly to consumers.
Netflix: Provides streaming services to individual users.
Nike: Operates an online store for direct sales to customers.
Benefits:
✔ Easy access to products and services.
✔ Personalized shopping experiences.
✔ Fast transactions and delivery options.
2. Business-to-Business (B2B)
Definition: B2B e-commerce involves transactions between businesses, such as manufacturers,
wholesalers, and suppliers.
Characteristics:
Bulk transactions with negotiated pricing.
Requires long-term business relationships.
Often involves supply chain management and procurement.
Examples:
Alibaba: Connects businesses with suppliers worldwide.
Salesforce: Provides cloud-based CRM solutions for companies.
Intel: Sells processors and components to computer manufacturers.
Benefits:
✔ Cost-effective bulk purchasing.
✔ Streamlined supply chain operations.
✔ Enhanced business efficiency through automation.
3. Consumer-to-Consumer (C2C)
Definition: C2C e-commerce enables individuals to sell products or services directly to other
consumers through online platforms.
Characteristics:
Peer-to-peer transactions.
Often facilitated by third-party platforms.
Includes resale, auctions, and rental services.
Examples:
eBay: Allows users to buy and sell items.
Etsy: Supports handmade and vintage product sales.
Airbnb: Enables individuals to rent out properties.
Benefits:
✔ Expands opportunities for individuals to earn income.
✔ Encourages sustainable consumption through resale.
✔ Provides a wide variety of unique and niche products.
4. Consumer-to-Business (C2B)
Definition: C2B e-commerce involves individuals offering products or services to businesses.
Characteristics:
Consumers dictate pricing and service terms.
Businesses benefit from user-generated content and freelance services.
Includes influencer marketing, freelance work, and crowdsourcing.
Examples:
Upwork: Connects freelancers with businesses.
YouTube: Allows content creators to monetize videos through ads.
Shutterstock: Enables photographers to sell images to companies.
Benefits:
✔ Empowers individuals to monetize skills and creativity.
✔ Provides businesses with cost-effective services.
✔ Encourages innovation through crowdsourcing.
Conclusion
Each e-commerce model serves a unique purpose, shaping the digital marketplace. B2C focuses on
direct consumer sales, B2B supports business transactions, C2C enables peer-to-peer commerce, and
C2B allows individuals to offer services to businesses. Understanding these models helps businesses
and consumers navigate the evolving e-commerce landscape effectively.
Task 02:
Understanding Online Gateways in E-Commerce
An online payment gateway is a technology that securely processes transactions between buyers and
sellers in e-commerce. It acts as a bridge between an online store and financial institutions, ensuring that
payments are authorized and completed safely.
Key Procedures in the Registration Process
When setting up an online payment gateway, businesses must follow several steps:
1. Choosing a Payment Gateway Provider
o Select a provider that aligns with business needs (e.g., PayPal, Stripe, Razorpay).
o Consider transaction fees, security features, and integration options.
2. Business Verification & Compliance
o Provide business registration documents.
o Ensure compliance with financial regulations and anti-fraud measures.
3. Bank Account & Merchant Setup
o Link the payment gateway to a business bank account.
o Configure merchant settings for transaction processing.
4. Integration with E-Commerce Platform
o Implement API or plugin-based integration with the website.
o Test payment processing to ensure smooth transactions.
5. Security & Fraud Prevention Measures
o Enable encryption and fraud detection tools.
o Set up multi-factor authentication for secure transactions.
Factors to Consider When Selecting a Payment Gateway
Choosing the right payment gateway depends on several factors:
Regional Availability: Ensure the gateway supports transactions in the target country.
Currency Support: Select a gateway that processes payments in local currency.
Transaction Fees: Compare costs for domestic and international payments.
Security Standards: Look for gateways with encryption and fraud protection.
User Experience: Opt for gateways with seamless checkout processes.
Importance of Selecting the Right Gateway for a Country or Region
Different countries have unique financial regulations and preferred payment methods. Selecting an
appropriate gateway ensures:
Compliance with Local Laws: Adheres to financial regulations and tax policies.
Better Customer Experience: Supports preferred payment methods (e.g., UPI in India, Alipay
in China).
Reduced Transaction Costs: Minimizes currency conversion fees and processing charges.
Enhanced Security: Meets regional cybersecurity standards for fraud prevention.
For example, Stripe and PayPal are widely used in the U.S., while PayU and Razorpay are popular in
India. Businesses must evaluate their target market to choose the most efficient gateway.
Task 03:
Thorough Analysis of E-Commerce: Advantages and Disadvantages
E-commerce has transformed the way businesses operate, offering convenience, cost-effectiveness,
and global market reach. However, it also presents challenges such as security risks, technological
dependence, and legal concerns.
Advantages of E-Commerce
1. Convenience
24/7 Accessibility: Customers can shop anytime, eliminating the constraints of physical store
hours.
Easy Comparison: Online platforms allow users to compare products, prices, and reviews
effortlessly.
Home Delivery: Reduces the need for travel, making shopping more efficient.
2. Cost-Effectiveness
Lower Operational Costs: Businesses save on rent, utilities, and staffing compared to physical
stores.
Automated Processes: Inventory management, payment processing, and customer service can
be streamlined.
Discounts & Offers: Online retailers often provide competitive pricing due to reduced overhead
costs.
3. Wider Market Reach
Global Accessibility: Businesses can sell products internationally without geographical
limitations.
Targeted Marketing: Digital advertising enables precise audience targeting, increasing sales
potential.
Scalability: E-commerce platforms allow businesses to expand without significant infrastructure
investments.
Disadvantages of Online Shopping
1. Security Concerns
Cyber Threats: Online transactions are vulnerable to hacking, fraud, and data breaches.
Identity Theft: Customers risk exposure to phishing scams and unauthorized access to personal
information.
Payment Fraud: Fake websites and unreliable payment gateways can lead to financial losses.
2. Dependence on Technology
Website Downtime: Technical failures can disrupt sales and customer access.
Digital Literacy: Some users struggle with navigating online platforms, limiting accessibility.
Logistics Challenges: Delivery delays, damaged goods, and inventory errors can affect
customer satisfaction.
3. Potential Legal Issues
Consumer Protection Laws: Businesses must comply with regulations regarding refunds,
warranties, and data privacy.
Taxation Complexities: International e-commerce requires adherence to varying tax policies.
Intellectual Property Risks: Unauthorized use of brand names, counterfeit products, and
copyright violations are common concerns.
Comparison of Advantages and Disadvantages Across E-Commerce Models
E-Commerce Model Advantages Disadvantages
B2C (Business-to- Direct sales, personalized marketing, High competition, customer trust issues,
Consumer) fast transactions return policies
B2B (Business-to- Bulk transactions, long-term Complex negotiations, longer sales
Business) partnerships, efficient supply chains cycles, dependency on contracts
C2C (Consumer-to- Peer-to-peer sales, lower costs, niche Fraud risks, lack of regulation,
Consumer) product availability unreliable transactions
C2B (Consumer-to- Flexible pricing, consumer-driven Limited scalability, inconsistent
Business) services, freelance opportunities demand, pricing challenges
Each model has unique benefits and drawbacks, influencing how businesses and consumers engage in
digital commerce.
ASSIGNMENT - PERFORMANCE CRITERIA AND FEEDBACK
Learning Outcome 01:
LO1: Demonstrating a comprehensive understanding of the major features and tools of
Microsoft Word.
Performance criteria: Feedback:
P1: Prepare a report with proper formatting
to present in a meeting.
P2: Generate a macro to record common
formatting used frequently.
M1: Create a mail merge email to send for
a large audience.
D1: Implement "Track Changes" feature in
MS Word to protect a document.
Learning Outcome 02:
LO2: Understanding of basic spreadsheet concepts and advanced Excel functions and
formulas.
Performance criteria: Feedback:
P3: Apply number and text formatting for
an existing data set.
P4: Use basic formulas such as SUM,
AVERAGE, MAX, and MIN, and
functions like IF, COUNTIF to the same
data set.
M2: Apply data analysis for the existing
data set.
D2: Apply collaboration feature in excel
based on an organizational context.
Learning Outcome 03:
LO3: Using MS PowerPoint application to effectively communicate and present
information to a variety of audiences
Performance criteria: Feedback:
P5: Design a presentation to reflect basic
features in PowerPoint.
P6: Create a content for a presentation
using a chosen topic.
M3: Apply Slide transitions and animations
for the created presentation.
D3: Evaluate benefits and drawbacks of
PowerPoint.