SlideShare a Scribd company logo
1 of 1
Authoring Tools<br />TFCTime Frame ConceptICIcon ConceptCCCard ConceptMultimedia elements & events organizingAlong a time lineAs iconAs page of book / stack of cardsSoftware NameFlash, DirectorAuthorware, IconAuthorHyperCard, SuperCard, Toolbook<br />

More Related Content

Viewers also liked

Introduction to Linux Exploit Development
Introduction to Linux Exploit DevelopmentIntroduction to Linux Exploit Development
Introduction to Linux Exploit Developmentjohndegruyter
 
Exploit techniques and mitigation
Exploit techniques and mitigationExploit techniques and mitigation
Exploit techniques and mitigationYaniv Shani
 
Introduction to pointers and memory management in C
Introduction to pointers and memory management in CIntroduction to pointers and memory management in C
Introduction to pointers and memory management in CUri Dekel
 
Reversing & Malware Analysis Training Part 4 - Assembly Programming Basics
Reversing & Malware Analysis Training Part 4 - Assembly Programming BasicsReversing & Malware Analysis Training Part 4 - Assembly Programming Basics
Reversing & Malware Analysis Training Part 4 - Assembly Programming Basicssecurityxploded
 
Low Level Exploits
Low Level ExploitsLow Level Exploits
Low Level Exploitshughpearse
 
Debugging Applications with GNU Debugger
Debugging Applications with GNU DebuggerDebugging Applications with GNU Debugger
Debugging Applications with GNU DebuggerPriyank Kapadia
 
Advanced exploit development
Advanced exploit developmentAdvanced exploit development
Advanced exploit developmentDan H
 
Stacks & subroutines 1
Stacks & subroutines 1Stacks & subroutines 1
Stacks & subroutines 1deval patel
 
Flags
FlagsFlags
FlagsCME
 
How Functions Work
How Functions WorkHow Functions Work
How Functions WorkSaumil Shah
 
Introduction to 8086 microprocessor
Introduction to 8086 microprocessorIntroduction to 8086 microprocessor
Introduction to 8086 microprocessorShreyans Pathak
 
Stack and subroutine
Stack and subroutineStack and subroutine
Stack and subroutineAshim Saha
 
Insecure coding in C (and C++)
Insecure coding in C (and C++)Insecure coding in C (and C++)
Insecure coding in C (and C++)Olve Maudal
 
Sigreturn Oriented Programming
Sigreturn Oriented ProgrammingSigreturn Oriented Programming
Sigreturn Oriented ProgrammingAngel Boy
 
How to Configure QinQ?
How to Configure QinQ?How to Configure QinQ?
How to Configure QinQ?Huanetwork
 

Viewers also liked (20)

Smashing The Stack
Smashing The StackSmashing The Stack
Smashing The Stack
 
Introduction to Linux Exploit Development
Introduction to Linux Exploit DevelopmentIntroduction to Linux Exploit Development
Introduction to Linux Exploit Development
 
Exploit techniques and mitigation
Exploit techniques and mitigationExploit techniques and mitigation
Exploit techniques and mitigation
 
Introduction to pointers and memory management in C
Introduction to pointers and memory management in CIntroduction to pointers and memory management in C
Introduction to pointers and memory management in C
 
Addressing
Addressing Addressing
Addressing
 
Reversing & Malware Analysis Training Part 4 - Assembly Programming Basics
Reversing & Malware Analysis Training Part 4 - Assembly Programming BasicsReversing & Malware Analysis Training Part 4 - Assembly Programming Basics
Reversing & Malware Analysis Training Part 4 - Assembly Programming Basics
 
Low Level Exploits
Low Level ExploitsLow Level Exploits
Low Level Exploits
 
Debugging Applications with GNU Debugger
Debugging Applications with GNU DebuggerDebugging Applications with GNU Debugger
Debugging Applications with GNU Debugger
 
The Stack Frame
The Stack FrameThe Stack Frame
The Stack Frame
 
Virtual Machine Constructions for Dummies
Virtual Machine Constructions for DummiesVirtual Machine Constructions for Dummies
Virtual Machine Constructions for Dummies
 
Advanced exploit development
Advanced exploit developmentAdvanced exploit development
Advanced exploit development
 
Stacks & subroutines 1
Stacks & subroutines 1Stacks & subroutines 1
Stacks & subroutines 1
 
Flags
FlagsFlags
Flags
 
How Functions Work
How Functions WorkHow Functions Work
How Functions Work
 
Introduction to 8086 microprocessor
Introduction to 8086 microprocessorIntroduction to 8086 microprocessor
Introduction to 8086 microprocessor
 
Stack and subroutine
Stack and subroutineStack and subroutine
Stack and subroutine
 
Insecure coding in C (and C++)
Insecure coding in C (and C++)Insecure coding in C (and C++)
Insecure coding in C (and C++)
 
Sigreturn Oriented Programming
Sigreturn Oriented ProgrammingSigreturn Oriented Programming
Sigreturn Oriented Programming
 
How to Configure QinQ?
How to Configure QinQ?How to Configure QinQ?
How to Configure QinQ?
 
Ctf hello,world!
Ctf hello,world! Ctf hello,world!
Ctf hello,world!
 

More from Farid Diah

Copy of module private sub calculate
Copy of module private sub calculateCopy of module private sub calculate
Copy of module private sub calculateFarid Diah
 
Beza sistem komp n w o komp
Beza sistem komp n w o kompBeza sistem komp n w o komp
Beza sistem komp n w o kompFarid Diah
 
18 EXAMPLES of IMMERSIVE MULTIMEDIA
18 EXAMPLES of IMMERSIVE MULTIMEDIA18 EXAMPLES of IMMERSIVE MULTIMEDIA
18 EXAMPLES of IMMERSIVE MULTIMEDIAFarid Diah
 
Cara kerja input/proses/output, flowchart, pseudo
Cara kerja input/proses/output, flowchart, pseudoCara kerja input/proses/output, flowchart, pseudo
Cara kerja input/proses/output, flowchart, pseudoFarid Diah
 
PErisian Sumber Terbuka vs. Perisian Sumber Tertutup
PErisian Sumber Terbuka vs. Perisian Sumber TertutupPErisian Sumber Terbuka vs. Perisian Sumber Tertutup
PErisian Sumber Terbuka vs. Perisian Sumber TertutupFarid Diah
 
Interactivity linear non
Interactivity linear nonInteractivity linear non
Interactivity linear nonFarid Diah
 
We bbased cdbased
We bbased cdbasedWe bbased cdbased
We bbased cdbasedFarid Diah
 
Hardware requirement for multimedia
Hardware requirement for multimediaHardware requirement for multimedia
Hardware requirement for multimediaFarid Diah
 
Web editor worksheet
Web editor worksheetWeb editor worksheet
Web editor worksheetFarid Diah
 

More from Farid Diah (10)

Copy of module private sub calculate
Copy of module private sub calculateCopy of module private sub calculate
Copy of module private sub calculate
 
Beza sistem komp n w o komp
Beza sistem komp n w o kompBeza sistem komp n w o komp
Beza sistem komp n w o komp
 
18 EXAMPLES of IMMERSIVE MULTIMEDIA
18 EXAMPLES of IMMERSIVE MULTIMEDIA18 EXAMPLES of IMMERSIVE MULTIMEDIA
18 EXAMPLES of IMMERSIVE MULTIMEDIA
 
Cara kerja input/proses/output, flowchart, pseudo
Cara kerja input/proses/output, flowchart, pseudoCara kerja input/proses/output, flowchart, pseudo
Cara kerja input/proses/output, flowchart, pseudo
 
PErisian Sumber Terbuka vs. Perisian Sumber Tertutup
PErisian Sumber Terbuka vs. Perisian Sumber TertutupPErisian Sumber Terbuka vs. Perisian Sumber Tertutup
PErisian Sumber Terbuka vs. Perisian Sumber Tertutup
 
Interactivity linear non
Interactivity linear nonInteractivity linear non
Interactivity linear non
 
We bbased cdbased
We bbased cdbasedWe bbased cdbased
We bbased cdbased
 
Hardware requirement for multimedia
Hardware requirement for multimediaHardware requirement for multimedia
Hardware requirement for multimedia
 
Web editor worksheet
Web editor worksheetWeb editor worksheet
Web editor worksheet
 
Cth PPT
Cth PPTCth PPT
Cth PPT
 

Authoring tools worksheet

  • 1. Authoring Tools<br />TFCTime Frame ConceptICIcon ConceptCCCard ConceptMultimedia elements & events organizingAlong a time lineAs iconAs page of book / stack of cardsSoftware NameFlash, DirectorAuthorware, IconAuthorHyperCard, SuperCard, Toolbook<br />