Skip to main content

How-To: Make Certificates Using Microsoft PowerPoint

It is actually very easy to make certificates using Microsoft PowerPoint. There are plenty of templates you can choose and modify.

1. Choose Design and Orientation, either you want it to be Portrait or Landscape.

2. Choose Font/s and Size/s, you can BOLD to highlight name, certificate name, etc. Design the certificate, e.g. text alignment, you may as well insert your logo, etc.

* Save a master copy, so you can re-use it for other names and certificates. Save as PDF if it is an e-certificate. Avoid full-color background so certificates can be easily printed out by holders.



 

Samples:




 

Popular posts from this blog

Share: Money Game

Money game schemes, also known as 'Skim Cepat Kaya', are schemes dressed up as an investment-platform. They look legitimate but in fact they are illegal. Often, they falsely promise much higher interest rates, returns or profits to attract potential victims. They have no intention to uphold their promises. They seek to lure new victims. They use the new depositors' money to repay the earlier depositors. Eventually, these money game schemes will collapse and the depositors will lose their investments and money. Members of these money game schemes will approach the victims at various locations. They normally come with luxury cars to convince the victims. During sharing, they will emphasize someone to be successful after joining the investment scheme. Remember: * Only deposit and invest with parties licensed by the authorities. * When in doubt, check with Bank Negara Malaysia, the Securities Commission or other relevant authorities about a company before making any decision.

Share: DDoS

Distributed denial of service (DDoS), happens when attackers send requests to a target’s IP address, causing the server or network to become overwhelmed, resulting in a denial-of-service to normal traffic. Symptoms of a DDoS attack: - a site or service is suddenly very slow or unavailable - suspicious amounts of traffic from a single IP or IP range - suspicious amounts of traffic from users who share the same profile, device, etc - odd traffic patterns, spikes at odd hours, etc Some methods to reduce or even to prevent DDoS: - monitor web traffic - restriction (for example country) - use cloud - increase bandwidth - have plans (for example security plans)

Share: A.I. Chat

Artificial Intelligence (AI) chat, often referred to as A.I. chat or chatbots, represents a revolutionary approach to human-computer interaction. It involves the use of advanced algorithms and machine learning techniques to enable computers to engage in natural language conversations with users. A.I. chat systems have become increasingly prevalent in various applications, ranging from customer support and virtual assistants to educational tools and entertainment platforms. Evolution of A.I. Chat: The roots of A.I. chat can be traced back to early attempts at creating conversational agents, such as ELIZA in the 1960s. These early systems relied on rule-based approaches and predefined scripts to simulate conversations. Over the years, advancements in natural language processing (NLP) and machine learning have transformed A.I. chat into more sophisticated and context-aware systems. Key Components of A.I. Chat: * Natural Language Processing (NLP): NLP is a critical component ...