MIL

Subdecks (3)

Cards (87)

  • Text media and information design elements
  • Importance of learning text media and information design elements
  • Types of texts and common file formats
  • Linking different electronic documents and enabling nonlinear navigation
  • Proximity refers to how the text is positioned in the page (left, center, right, or justified).
  • Organization refers to a conscious effort to organize the different text elements in a page.
  • Contrast creates visual interest to text elements by making them different from each other.
  • Repetition concerns consistency of elements and the unity of the entire design.
  • Plain text: Fixed sized characters having essentially the same type of appearance.
  • Common file formats: TXT (Text) - unformatted text document by an editor such as Notepad on Windows platform, DOC (Document) - storing documents created by MS Word package.
  • Typeface: Also called font, font type, or typeface, usually compromised alphabets, numbers, punctuation marks, symbols, and other special characters.
  • Formatted text: Appearance can be changed using font parameters (bold, underline, italic, font size, font color, etc).
  • PS (PostScript): Page description language used mainly for desktop publishing.
  • Design Elements: Contrast, repetition, alignment, and proximity.
  • RTF (Rich Text Format): Document exchange format, default format for MAC OS X's default editor TextEdit.
  • Appropriateness: Refers to how fitting or suitable the text is used for a specific audience, purpose, or event.
  • Proximity: Refers to how near or how far the text elements are from each other.
  • PDF (Portable Document Format): Developed by Adobe, used for cross-platform exchange of documents, supports image and graphics.
  • Design Principles: Line, shape, color, value, texture, size, and space.
  • Emphasis: Special attention or importance given to something.
  • Phishing is when someone tries to trick you into revealing personal information like your password, credit card numbers, or social security number.
  • Common red flags in phishing attempts include urgent or threatening language, suspicious sender information, requests for personal information, misspellings or grammatical errors, suspicious links or attachments, generic greetings, and offers that seem too good to be true.
  • Email phishing involves scammers sending fake emails pretending to be a trustworthy organization.
  • SMS phishing involves scammers sending text messages with fake links or requests for personal information.
  • Social media phishing involves scammers creating fake profiles or posts to trick you into clicking on links or sharing personal information.
  • Vishing (voice phishing) involves attackers using phone calls to impersonate trusted organizations to extract sensitive information.
  • Clone phishing involves attackers taking a legitimate email and creating an almost identical copy, but with a malicious attachment or link.
  • Smishing involves using text messages to deceive recipients into clicking on malicious links or providing personal information.
  • Phishing attempts often create a sense of urgency or use threatening language to prompt immediate action.
  • Phishing emails or messages often use generic or suspicious email addresses that do not match the legitimate entity they claim to represent.
  • Legitimate organizations do not request personal information, such as usernames, passwords, or credit card numbers, via email, social media, or other online means.
  • Phishing emails or messages may contain misspellings, grammatical errors, or awkward phrasing.