SlideShare a Scribd company logo
1 of 4
By: Renee Vernon
Taking a screen shot allows you to turn any part of
your computer screen into a PDF.
This is a screenshot of the desktop of my computer.
WHY SCREENSHOT?
HOW TO TAKE A SCREENSHOT
In this order…
Push…
Command
Shift
4
Your mouse will turn
into crosshairs. Then,
you are able to make a
box around whatever it is
you want to turn into a
PDF.
VIDEO EXAMPLE OF TAKING A
SCREENSHOT

More Related Content

Viewers also liked

How to Lead a Listening Session
How to Lead a Listening SessionHow to Lead a Listening Session
How to Lead a Listening SessionAudrey Krumbach
 
Presentation - 2011 - Reconciling Ministries
Presentation - 2011 - Reconciling MinistriesPresentation - 2011 - Reconciling Ministries
Presentation - 2011 - Reconciling MinistriesAudrey Krumbach
 
CORPORATE IMMIGRATION MANUAL BY PAA KWESI HAGAN (GLOBETROTTERS LEGAL)
CORPORATE IMMIGRATION MANUAL BY PAA KWESI HAGAN (GLOBETROTTERS LEGAL)CORPORATE IMMIGRATION MANUAL BY PAA KWESI HAGAN (GLOBETROTTERS LEGAL)
CORPORATE IMMIGRATION MANUAL BY PAA KWESI HAGAN (GLOBETROTTERS LEGAL)Globetrotters Legal
 
GT LEGAL NEWSLETTER ISSUE 2 (Globetrotters Legal)
GT LEGAL NEWSLETTER ISSUE 2 (Globetrotters Legal)GT LEGAL NEWSLETTER ISSUE 2 (Globetrotters Legal)
GT LEGAL NEWSLETTER ISSUE 2 (Globetrotters Legal)Globetrotters Legal
 
Training Manual - 2011 - Reconciling Ministries
Training Manual - 2011 - Reconciling MinistriesTraining Manual - 2011 - Reconciling Ministries
Training Manual - 2011 - Reconciling MinistriesAudrey Krumbach
 
The Corporate Immigration Review - Ghana (chapter 14) by Mr Paa Kwesi Hagan
The Corporate Immigration Review - Ghana (chapter 14) by Mr Paa Kwesi HaganThe Corporate Immigration Review - Ghana (chapter 14) by Mr Paa Kwesi Hagan
The Corporate Immigration Review - Ghana (chapter 14) by Mr Paa Kwesi HaganGlobetrotters Legal
 

Viewers also liked (11)

Bvr based title (1)
Bvr  based title (1)Bvr  based title (1)
Bvr based title (1)
 
How to Lead a Listening Session
How to Lead a Listening SessionHow to Lead a Listening Session
How to Lead a Listening Session
 
BOLT4web
BOLT4webBOLT4web
BOLT4web
 
Bible Study Relayout
Bible Study RelayoutBible Study Relayout
Bible Study Relayout
 
Presentation - 2011 - Reconciling Ministries
Presentation - 2011 - Reconciling MinistriesPresentation - 2011 - Reconciling Ministries
Presentation - 2011 - Reconciling Ministries
 
RMN - CTW - Report
RMN - CTW - ReportRMN - CTW - Report
RMN - CTW - Report
 
CORPORATE IMMIGRATION MANUAL BY PAA KWESI HAGAN (GLOBETROTTERS LEGAL)
CORPORATE IMMIGRATION MANUAL BY PAA KWESI HAGAN (GLOBETROTTERS LEGAL)CORPORATE IMMIGRATION MANUAL BY PAA KWESI HAGAN (GLOBETROTTERS LEGAL)
CORPORATE IMMIGRATION MANUAL BY PAA KWESI HAGAN (GLOBETROTTERS LEGAL)
 
GT LEGAL NEWSLETTER ISSUE 2 (Globetrotters Legal)
GT LEGAL NEWSLETTER ISSUE 2 (Globetrotters Legal)GT LEGAL NEWSLETTER ISSUE 2 (Globetrotters Legal)
GT LEGAL NEWSLETTER ISSUE 2 (Globetrotters Legal)
 
Training Manual
Training ManualTraining Manual
Training Manual
 
Training Manual - 2011 - Reconciling Ministries
Training Manual - 2011 - Reconciling MinistriesTraining Manual - 2011 - Reconciling Ministries
Training Manual - 2011 - Reconciling Ministries
 
The Corporate Immigration Review - Ghana (chapter 14) by Mr Paa Kwesi Hagan
The Corporate Immigration Review - Ghana (chapter 14) by Mr Paa Kwesi HaganThe Corporate Immigration Review - Ghana (chapter 14) by Mr Paa Kwesi Hagan
The Corporate Immigration Review - Ghana (chapter 14) by Mr Paa Kwesi Hagan
 

Recently uploaded

TrustArc Webinar - How to Build Consumer Trust Through Data Privacy
TrustArc Webinar - How to Build Consumer Trust Through Data PrivacyTrustArc Webinar - How to Build Consumer Trust Through Data Privacy
TrustArc Webinar - How to Build Consumer Trust Through Data PrivacyTrustArc
 
Dev Dives: Streamline document processing with UiPath Studio Web
Dev Dives: Streamline document processing with UiPath Studio WebDev Dives: Streamline document processing with UiPath Studio Web
Dev Dives: Streamline document processing with UiPath Studio WebUiPathCommunity
 
Unleash Your Potential - Namagunga Girls Coding Club
Unleash Your Potential - Namagunga Girls Coding ClubUnleash Your Potential - Namagunga Girls Coding Club
Unleash Your Potential - Namagunga Girls Coding ClubKalema Edgar
 
How to write a Business Continuity Plan
How to write a Business Continuity PlanHow to write a Business Continuity Plan
How to write a Business Continuity PlanDatabarracks
 
From Family Reminiscence to Scholarly Archive .
From Family Reminiscence to Scholarly Archive .From Family Reminiscence to Scholarly Archive .
From Family Reminiscence to Scholarly Archive .Alan Dix
 
What is DBT - The Ultimate Data Build Tool.pdf
What is DBT - The Ultimate Data Build Tool.pdfWhat is DBT - The Ultimate Data Build Tool.pdf
What is DBT - The Ultimate Data Build Tool.pdfMounikaPolabathina
 
"Subclassing and Composition – A Pythonic Tour of Trade-Offs", Hynek Schlawack
"Subclassing and Composition – A Pythonic Tour of Trade-Offs", Hynek Schlawack"Subclassing and Composition – A Pythonic Tour of Trade-Offs", Hynek Schlawack
"Subclassing and Composition – A Pythonic Tour of Trade-Offs", Hynek SchlawackFwdays
 
Are Multi-Cloud and Serverless Good or Bad?
Are Multi-Cloud and Serverless Good or Bad?Are Multi-Cloud and Serverless Good or Bad?
Are Multi-Cloud and Serverless Good or Bad?Mattias Andersson
 
The Ultimate Guide to Choosing WordPress Pros and Cons
The Ultimate Guide to Choosing WordPress Pros and ConsThe Ultimate Guide to Choosing WordPress Pros and Cons
The Ultimate Guide to Choosing WordPress Pros and ConsPixlogix Infotech
 
Scanning the Internet for External Cloud Exposures via SSL Certs
Scanning the Internet for External Cloud Exposures via SSL CertsScanning the Internet for External Cloud Exposures via SSL Certs
Scanning the Internet for External Cloud Exposures via SSL CertsRizwan Syed
 
Merck Moving Beyond Passwords: FIDO Paris Seminar.pptx
Merck Moving Beyond Passwords: FIDO Paris Seminar.pptxMerck Moving Beyond Passwords: FIDO Paris Seminar.pptx
Merck Moving Beyond Passwords: FIDO Paris Seminar.pptxLoriGlavin3
 
DevEX - reference for building teams, processes, and platforms
DevEX - reference for building teams, processes, and platformsDevEX - reference for building teams, processes, and platforms
DevEX - reference for building teams, processes, and platformsSergiu Bodiu
 
SIP trunking in Janus @ Kamailio World 2024
SIP trunking in Janus @ Kamailio World 2024SIP trunking in Janus @ Kamailio World 2024
SIP trunking in Janus @ Kamailio World 2024Lorenzo Miniero
 
Commit 2024 - Secret Management made easy
Commit 2024 - Secret Management made easyCommit 2024 - Secret Management made easy
Commit 2024 - Secret Management made easyAlfredo García Lavilla
 
Advanced Computer Architecture – An Introduction
Advanced Computer Architecture – An IntroductionAdvanced Computer Architecture – An Introduction
Advanced Computer Architecture – An IntroductionDilum Bandara
 
SAP Build Work Zone - Overview L2-L3.pptx
SAP Build Work Zone - Overview L2-L3.pptxSAP Build Work Zone - Overview L2-L3.pptx
SAP Build Work Zone - Overview L2-L3.pptxNavinnSomaal
 
Digital Identity is Under Attack: FIDO Paris Seminar.pptx
Digital Identity is Under Attack: FIDO Paris Seminar.pptxDigital Identity is Under Attack: FIDO Paris Seminar.pptx
Digital Identity is Under Attack: FIDO Paris Seminar.pptxLoriGlavin3
 
"Debugging python applications inside k8s environment", Andrii Soldatenko
"Debugging python applications inside k8s environment", Andrii Soldatenko"Debugging python applications inside k8s environment", Andrii Soldatenko
"Debugging python applications inside k8s environment", Andrii SoldatenkoFwdays
 
The State of Passkeys with FIDO Alliance.pptx
The State of Passkeys with FIDO Alliance.pptxThe State of Passkeys with FIDO Alliance.pptx
The State of Passkeys with FIDO Alliance.pptxLoriGlavin3
 

Recently uploaded (20)

DMCC Future of Trade Web3 - Special Edition
DMCC Future of Trade Web3 - Special EditionDMCC Future of Trade Web3 - Special Edition
DMCC Future of Trade Web3 - Special Edition
 
TrustArc Webinar - How to Build Consumer Trust Through Data Privacy
TrustArc Webinar - How to Build Consumer Trust Through Data PrivacyTrustArc Webinar - How to Build Consumer Trust Through Data Privacy
TrustArc Webinar - How to Build Consumer Trust Through Data Privacy
 
Dev Dives: Streamline document processing with UiPath Studio Web
Dev Dives: Streamline document processing with UiPath Studio WebDev Dives: Streamline document processing with UiPath Studio Web
Dev Dives: Streamline document processing with UiPath Studio Web
 
Unleash Your Potential - Namagunga Girls Coding Club
Unleash Your Potential - Namagunga Girls Coding ClubUnleash Your Potential - Namagunga Girls Coding Club
Unleash Your Potential - Namagunga Girls Coding Club
 
How to write a Business Continuity Plan
How to write a Business Continuity PlanHow to write a Business Continuity Plan
How to write a Business Continuity Plan
 
From Family Reminiscence to Scholarly Archive .
From Family Reminiscence to Scholarly Archive .From Family Reminiscence to Scholarly Archive .
From Family Reminiscence to Scholarly Archive .
 
What is DBT - The Ultimate Data Build Tool.pdf
What is DBT - The Ultimate Data Build Tool.pdfWhat is DBT - The Ultimate Data Build Tool.pdf
What is DBT - The Ultimate Data Build Tool.pdf
 
"Subclassing and Composition – A Pythonic Tour of Trade-Offs", Hynek Schlawack
"Subclassing and Composition – A Pythonic Tour of Trade-Offs", Hynek Schlawack"Subclassing and Composition – A Pythonic Tour of Trade-Offs", Hynek Schlawack
"Subclassing and Composition – A Pythonic Tour of Trade-Offs", Hynek Schlawack
 
Are Multi-Cloud and Serverless Good or Bad?
Are Multi-Cloud and Serverless Good or Bad?Are Multi-Cloud and Serverless Good or Bad?
Are Multi-Cloud and Serverless Good or Bad?
 
The Ultimate Guide to Choosing WordPress Pros and Cons
The Ultimate Guide to Choosing WordPress Pros and ConsThe Ultimate Guide to Choosing WordPress Pros and Cons
The Ultimate Guide to Choosing WordPress Pros and Cons
 
Scanning the Internet for External Cloud Exposures via SSL Certs
Scanning the Internet for External Cloud Exposures via SSL CertsScanning the Internet for External Cloud Exposures via SSL Certs
Scanning the Internet for External Cloud Exposures via SSL Certs
 
Merck Moving Beyond Passwords: FIDO Paris Seminar.pptx
Merck Moving Beyond Passwords: FIDO Paris Seminar.pptxMerck Moving Beyond Passwords: FIDO Paris Seminar.pptx
Merck Moving Beyond Passwords: FIDO Paris Seminar.pptx
 
DevEX - reference for building teams, processes, and platforms
DevEX - reference for building teams, processes, and platformsDevEX - reference for building teams, processes, and platforms
DevEX - reference for building teams, processes, and platforms
 
SIP trunking in Janus @ Kamailio World 2024
SIP trunking in Janus @ Kamailio World 2024SIP trunking in Janus @ Kamailio World 2024
SIP trunking in Janus @ Kamailio World 2024
 
Commit 2024 - Secret Management made easy
Commit 2024 - Secret Management made easyCommit 2024 - Secret Management made easy
Commit 2024 - Secret Management made easy
 
Advanced Computer Architecture – An Introduction
Advanced Computer Architecture – An IntroductionAdvanced Computer Architecture – An Introduction
Advanced Computer Architecture – An Introduction
 
SAP Build Work Zone - Overview L2-L3.pptx
SAP Build Work Zone - Overview L2-L3.pptxSAP Build Work Zone - Overview L2-L3.pptx
SAP Build Work Zone - Overview L2-L3.pptx
 
Digital Identity is Under Attack: FIDO Paris Seminar.pptx
Digital Identity is Under Attack: FIDO Paris Seminar.pptxDigital Identity is Under Attack: FIDO Paris Seminar.pptx
Digital Identity is Under Attack: FIDO Paris Seminar.pptx
 
"Debugging python applications inside k8s environment", Andrii Soldatenko
"Debugging python applications inside k8s environment", Andrii Soldatenko"Debugging python applications inside k8s environment", Andrii Soldatenko
"Debugging python applications inside k8s environment", Andrii Soldatenko
 
The State of Passkeys with FIDO Alliance.pptx
The State of Passkeys with FIDO Alliance.pptxThe State of Passkeys with FIDO Alliance.pptx
The State of Passkeys with FIDO Alliance.pptx
 

Presentation #1 design

  • 2. Taking a screen shot allows you to turn any part of your computer screen into a PDF. This is a screenshot of the desktop of my computer. WHY SCREENSHOT?
  • 3. HOW TO TAKE A SCREENSHOT In this order… Push… Command Shift 4 Your mouse will turn into crosshairs. Then, you are able to make a box around whatever it is you want to turn into a PDF.
  • 4. VIDEO EXAMPLE OF TAKING A SCREENSHOT