Skip to main content

How-To: Make Certificates Using Microsoft PowerPoint

It is actually very easy to make certificates using Microsoft PowerPoint. There are plenty of templates you can choose and modify.

1. Choose Design and Orientation, either you want it to be Portrait or Landscape.

2. Choose Font/s and Size/s, you can BOLD to highlight name, certificate name, etc. Design the certificate, e.g. text alignment, you may as well insert your logo, etc.

* Save a master copy, so you can re-use it for other names and certificates. Save as PDF if it is an e-certificate. Avoid full-color background so certificates can be easily printed out by holders.



 

Samples:




 

Popular posts from this blog

Share: PHP

PHP is a widely-used, open-source scripting language especially suited for web development. Here's a breakdown of key aspects: 1. Core Concepts: Server-Side Scripting: PHP code is executed on the server, generating HTML (or other output) that is then sent to the user's browser. This distinguishes it from client-side languages like JavaScript, which run in the browser. Embedding in HTML: PHP code can be directly embedded within HTML, making it easy to create dynamic web pages. Dynamic Content: PHP allows you to generate content that changes based on user input, database information, or other factors. Database Interaction: PHP readily connects to various databases (like MySQL, PostgreSQL), enabling you to store and retrieve data. 2. Key Features and Characteristics: Open Source: PHP is free to use and distribute. Cross-Platform: It runs on various operating systems (Windows, Linux, macOS). Large Community: A vast community provides support, resources, and libraries. Web Framework...

Share: API

An API (Application Programming Interface) is a set of rules and protocols that allow one software application to interact with another. It defines the methods and data formats that applications use to request and exchange information. APIs are used to allow different systems, services, or components to communicate with each other. APIs typically work by defining endpoints (URLs) where one system can send requests, and the system receiving the request processes it and sends a response back. Here's a basic overview of how the process works: 1. Client (Requester): The system (or program) that initiates the request. This could be a user interacting with an app, or a program that needs to fetch data from another service. 2. API Endpoint: An endpoint is a specific URL or URI (Uniform Resource Identifier) on the server that defines where the request should be sent. 3. Request: The client sends an HTTP request to the API endpoint. This can be one of several types: GET: Retrie...

How-To: Be More Secure Online

1. Use unique passwords for your accounts - e.g. emails, Facebook, etc. Lets say your Facebook account has been hacked, at least your email account is still safe because you are using different passwords for your email and Facebook accounts, and you are able to try to recover your Facebook account. Unique password also means difficult for people to guess, e.g. G89?klz01?8955hjk instead of password123, qwerty, etc. 2. Turn on Two-Factor Authentication (2FA) - this adds another layer of security to access to your  accounts. 2FA verifies your identity by another factor: something you own, something you are or something you know, e.g. using your mobile phone number - get a SMS with a special code to enter. By enabling 2FA, you will get a text message every time you or someones try to log into your account. 3. Enable passcodes - this adds another step when you are about to perform something, e.g. you will need to unlock your banking app by keying in your passcode before you can do or vi...