Empowerment Technologies

Solve your problems or get new ideas with basic brainstorming

Get Started. It's Free
or sign up with your email address
Rocket clouds
Empowerment Technologies by Mind Map: Empowerment Technologies

1. GIMP

1.1. GIMP is a cross-platform image editor available for GNU/Linux, OS X, Windows and more operating systems. It is free, open source image manipulation program for photo retouching, image composition and image authoring.

1.2. Image manipulation programs allow you to create and customize graphics from preexisting images, or make one from scratch. Programs like these provide a wealth of tools designed to manipulate and tweak images, allowing you to position and transform them, and add text and effects

1.3. Share — copy and redistribute the material in any medium or format

1.4. Adapt — remix, transform, and build upon the material for any purpose, even commercially

1.5. Creating a New File

1.5.1. Ctrl+N

1.5.2. empty canvass

1.6. Open an Existing File

1.6.1. Ctrl+O

1.7. Format

1.7.1. JPEG (Joint Photographic Experts Group)

1.7.2. PNG (Portable Network Graphics)

1.7.3. GIF (Graphics Interchange Format)

1.8. LAYERS

1.8.1. Layer as a transparent piece of film with an image on it. You can stack these pieces of film on top of each other to form a new image!

1.8.2. Layer Mask that acts like a filter, allowing you to modify or add an effect to only a small region of the Layer

1.8.3. Shift+Ctrl+N

2. MS Word

2.1. MS Word is the word processing program of the Microsoft Office suite that allows you to create documents and reports.

2.2. Ribbon Tabs Click any tab on the ribbon to display a set of tools grouped together related to that task.

2.3. Hide the Ribbon Click this icon to minimize the ribbon and provide more work space

2.4. Ribbon Groups Each ribbon tab contains groups, and each group contains a set of related tools. Here, the Paragraph group on the Home tab contains tools for how text should be aligned within the document.

2.5. Quick Access Toolbar Tools shown here are always visible. You can add your favorite tools to this toolbar, allowing for a set of commands independent of the tab on the Ribbon currently displayed.

3. Common Computer Problems and Trouble Shooting

3.1. COMPUTER SECURITY RISK

3.1.1. CYBERCRIME

3.1.1.1. Refers to an online or Internet based illegal acts.

3.1.2. HACKER Some one who accesses a computer or network illegally. Hackers often claim the intent of their security breach is to “improve security”

3.1.3. SCRIPT KIDDIE Often are teenagers who use pre-written hacking and cracking programs to break into computers

3.1.4. CYBER EXTORTIONIST Uses e-mail as a medium for extortion. They send e-mail messages indicating they will expose confidential information, exploit a security flaw or launch an attach if not paid a sum of money

3.1.5. CYBER TERRORISM Someone who uses the Internet to destroy or damage computers for political reasons (eg. Destroy the traffic system, telecommunications infrastructure, etc.)

3.2. INTERNET ATTACKS

3.2.1. •VIRUS- altering the computer works without user’s knowledge or permission

3.2.2. •WORM- program that copies itself repeatedly

3.2.3. •TROJAN HORSE- program that hides within a legitimate program and is triggered by an action

3.3. PROTECT YOURSELF

3.3.1. Never open an email attachment that is not from a trusted source

3.3.2. Install an Anti-Virus Program for ALL your computers and update on a regular basis

3.4. COMPUTER PROBLEMS

4. Mind Mapping

4.1. “A mind map is a type of spider diagramor concept map that consists of a centralized subject and related topics or ideas branching off from it in all directions. From each topic subtopics can again branch off, resulting in a radiant structure.”

4.2. If you want them to be read in a certain order, start at about one o’clock and go clockwise around the center - this is the direction mind maps are generally read.

5. CORPORATE SPIES

5.1. Hired to break into a specific computer and steal its proprietary data and information to gain competitive advantage