Posts

ACTIVITY 8: PAYROLL

Image
  ACTIVITY 8: PAYROLL LAGO, JADE ARBIE R. BSED 1 MAJOR IN ENGLISH

ACTIVITY 7: CHARTS, FILTER, SORT, SUBTOTAL

Image
 LAGO, JADE ARBIE R.  BSED 1 MAJOR IN ENGLISH (THE LABEL OF THE ACTIVITY IS PLACED ON THE RIGHT SIDE OF THE PICTURE.)

ACTIVITY 6: Budget and Supplies , Customer Invoice

Image
 LAGO, JADE ARBIE R.  BSED 1 MAJOR IN ENGLISH Sorry for submitting my activity this late. I just don't have device to create the assigned activity. I am hoping for your consideration, Than you so much. 

ACTIVITY 5: MIDTERM

LAGO, JADE ARBIE R. BSED 1   what is information security ? Information security protects confidential information from unauthorized access, change, recording, disturbance, or destruction. The goal is to safeguard and maintain the privacy of sensitive information such customer account information, financial data, and intellectual property. Physical or electronic information exist. Information can be anything from your personal information to your social media profile, cell phone data, biometrics, and so on.   2)       what are the  cybersecurity threats ?  cyber or cybersecurity threat is a harmful act aimed at destroying, stealing, or disrupting digital life in general. Computer viruses, data breaches, Denial of Service (DoS) attacks, and other attack vectors are examples of cyber dangers. Ransomware   – attackers encrypt an organisation’s data and require payment to restore access Cryptojacking  – when cybercriminals secre...

EXERCISE 4: MS WORD MANUAL

Image
 LAGO, JADE ARBIE R. BSED 1 MAJOR IN ENGLISH

EXERCISE 3: SMART ART GRAPHICS

Image
 LAGO, JADE ARBIE R.   BSED 1