Basic PC Maintenance


Published on

  • Be the first to comment

No Downloads
Total Views
On Slideshare
From Embeds
Number of Embeds
Embeds 0
No embeds

No notes for slide

Basic PC Maintenance

  1. 1. Basic PC Maintenance Presented on August 12, 2009
  2. 2. What is PC Maintenance? PC Troubleshooting can be broken into 3 Primary Categories: • Maintenance – keeping your system running its best (our topic for today) • Repair – fixing what is broken • Security – keeping bad things from happening; keeping bad people out.
  3. 3. Prerequisites For This Course • Basic PC Knowledge  know how to navigate a Windows OS  know how to navigate directories  know how to navigate the Internet The Library offers introductory level courses: • Computer Basics • Internet 101 & 201 • Film Management • Office Suites (Word Processing, Spreadsheet, Presentations) • 1-on-1 Computer Training Sign-up at our Reference Desk
  4. 4. Covered Topics • Part 1 – Basic Preparation • Part 2 – Basic Software Maintenance (Backup, Temp Files, Fragmentation, Registry, Updates) • Part 3 – Basic PC Security (the 3-pronged approach; Security vs. Usability) • Part 4 – Basic Performance Enhancement (OS customization, hardware components, memory) • Part 5 – Basic Hardware Updates (Finding what you need; where to get what you need) • Conclusion: Pointers to More Info / Questions
  5. 5. 1. Basic Preparation Part 1 – Things You Need Before Beginning Tools: • Hardware • Software
  6. 6. 1.1 Troubleshooting Methodology A good PC technician will follow some sort of formalized troubleshooting methodology Example 1: Basic 3-Step Plan • Step 1: Assemble the proper tools • Step 2: Backup everything before making changes • Step 3: Analyze, test, and document
  7. 7. 1.1 (Cont’) Example 2: Basic 5-Step Plan Step 1: Information Gathering • Identify what you want to accomplish (Maintenance, Upgrade, Repair) • Identify the component to work on. • For repairs: Identify any symptoms, determine if anything has changed, and establish probable cause Step 2: Create an action plan • For maintenance and upgrades: tool gathering, backup, parts identification, and action • For repairs: there is an step at the begging: “try a quick fix” Step 3: Implement and Test the Solution • Again, if you are performing a repair, try a quick fix and then try the most likely solutions first. Step 4: Identify the results and effects of the solution • Did the upgrade work? Did the maintenance work as expected? Did the repair fix the problem? Step 5: Document the solution and process Point of a Plan: 1) Don’t forget anything, 2) Can recover if you do, and 3) Can repeat the process
  8. 8. 1.2 Backup, Backup, Backup • The most important PC component is… DATA! So backup before BEFORE you begin. Keep the data safe.
  9. 9. 1.3 Tools – Hardware/Software • Tool Kits: A computer tool kit; possible non-standard “security” bit set • USB devices: USB-to-HD adapter; USB flash or hard drives; USB Floppy Drive • Bootable repair CDs: Operating Systems; Emergency Recovery Disks (ERDs); Universal Boot CDs • Software Programs: Burned to CD, Executable from a Flash Drive: ex. • FRUs (Field Replaceable Units): KB, Mouse, Spare HD, Spare Memory • ESD (Electro-Static Discharge) protection
  10. 10. 2. Basic Software Maintenance Part 2 – Contents: 2.1 Backup 2.2 Temp Files and System “Cruft” 2.3 Fragmentation 2.4 Windows Registry 2.5 System Updates
  11. 11. 2.1 Backup – What to Backup • Personal Files (My Documents, …) • Registry • System State • Any special drivers or software
  12. 12. 2.1 Backup – Where to Backup Backup anywhere EXCEPT for the Primary Hard Drive: • Second Hard Drive • External Drive (USB Drive, Flash Drive, NAS Device) • DVD or CD Media (Gold Archival for important files) • Tape Drive • Online Storage Service
  13. 13. 2.1 Backup – Types of Backup • Manual: external or On-line storage (E-mail, Google Docs, Picasa, flickr, • Manual: Disk Imaging (Symantec Ghost, Acronis True Image, Clonezilla) • Automated Off-line (Windows Integrated, CD Burning Software, Acronis TrueImage, Symantec (Norton 360)) • Automated On-line (Carbonite, IDrive, MozyHome, SOS Online Backup, Norton OnLine Backup)
  14. 14. 2.1 Backup - DEMOS Manual Backups Default Personal Folder Locations: Windows XP: C:Documents and Settings<USERNAME>My Documents Windows Vista: C:Users<USERNAME>Documents Windows Backup Utilties (XP/Vista) Programs  Accessories  System Tools  Backup
  15. 15. 2.2 Temp Files and “Cruft” Common Temp File Locations Windows XP: C:Documents and Settings<USER NAME>Local SettingsTemp C:Documents and Settings<USER NAME>Local SettingsTemporary Internet Files (Hidden, Protected) C:Documents and Settings<USER NAME>Local SettingsHistory (Hidden, Protected) C:Documents and Settings<USER NAME>Cookies Windows Vista: C:Users<USER NAME>AppDataLocalTemp C:Users<USER NAME>AppDataLocalMicrosoftWindowsTemporary Internet FilesLow (Hidden, Protected) C:Users<USER NAME>AppDataLocalMicrosoftWindowsHistoryLow (Hidden, Protected) C:Users<USER NAME>AppDataRoamingMicrosoftWindowsCookiesLow (Hidden, Protected) Older Temp Locations • C:TEMP • C:WindowsTEMP • Uninstaller References: • C:Windows$NtUninstall<PatchName> (Hidden)
  16. 16. 2.2 Temp Files and “Cruft” Cleaning Temp Files • Manually • With Software – Free Utilities: CCleaner, Glary Utilities, etc. – Commercial: Norton (Utilities, 360, SystemWorks), Avanquest Software (Fix-It Utilties, SystemSuite), Webroot Windows Washer, etc.
  17. 17. 2.2 Temp Files - DEMOS Cleaning Temp Files • Part 1 – Internet Browser Cleaning (From your favorite browser: Tools  Options) • Part 2 – Disk Cleanup (Programs  Accessories  System Tools) • Part 3 – CCleaner
  18. 18. 2.3 Fragmentation What is D i s k F r a g m e n t a t i o n? DEMO: White-board Session Hard drives store files in pieces, sometimes called blocks or allocation units. Fragmentation occurs when the operating system cannot or will not allocate enough contiguous space to store a complete file as a unit, but instead puts parts of it in gaps between other files (usually those gaps exist because they formerly held a file that the operating system has subsequently deleted or because the operating system allocated excess space for the file in the first place). Larger files and greater numbers of files also contribute to fragmentation and consequent performance loss. (Source: Wikipedia)
  19. 19. 2.3 (Cont’) Defrag Defragmentation (and disk optimization) attempts to: • Rearrange files so that all their parts, or blocks, are contiguous (sequential) • Rearrange programs, so that the most commonly used programs are at the front of the drive and launch quicker Tools to Defrag: • Windows Built-in (“Disk Defragmenter”) • 3rd Party (Defraggler, Norton SpeedDisk, JkDefrag)
  20. 20. 2.3 Fragmentation - Demos DEMO Windows Defrag program Tip: Run a CHKDSK or SCANDISK before performing a Defrag Accessing Disk Tools: • Right Click on the Drive (from Explorer or “My Computer”), select Properties, click on the Tools Tab. • Defrag: Start  Programs  Accessories  System Tools  Disk Defragmenter
  21. 21. 2.4 Windows Registry What is the Windows Registry? A centralized database that stores all the settings for Windows, including: – Hardware Information and Settings – Software Information and Settings – User account settings, – Security settings The registry replaces the old flat or text files of yesteryear: *.INI, AUTOEXEC.BAT, CONFIG.SYS
  22. 22. 2.4 Windows Registry - Hives Registry settings are split into sections called “Hives” Common Hives: • HKEY_CLASSES_ROOT – stores information about registered applications, such as file associations • HKEY_CURRENT_USER – setting of the currently logged in user • HKEY_LOCAL_MACHINE – local computer settings • HKEY_USERS – subkeys of HKEY_CURRENT_USER • HKEY_CURRENT_CONFIG – information gathered at runtime (when you boot)
  23. 23. 2.4 Registry - Pros and Cons Advantages: • Centralized. If there is a setting in windows, chances are it is referenced in the registry. • Keeps configuration details largely transparent from users • Standardized method for how program storm data in the registry. • Easy to backup • Read in faster than a text file* Disadvantages: • Hard to backup individual application settings • If it gets too big, it will slow down boot times and increase a system’s memory needs • Complex to navigate. • Hard to keep clean, easy to corrupt, hard to repair.
  24. 24. 2.4 Registry – Corruption Causes The most common reason for registry corruption: Invalid references/entries in the registry. Including, but not limited to: • Added/removed programs (Uninstaller References) • Temporary file references • Deleted files • Invalid file formats
  25. 25. 2.4 Registry – Repair Methods Manual: • regedit.exe, • *.REG files (also called a “REG bomb”), • Command Line Automatic: • Registry Cleaners (CCleaner, Glary, Symantec/Norton 360, Fix-It, etc.) Disadvantages of Registry Cleaners: • They can remove things they are not supposed to • There are a LOT of fake registry cleaners out there that simply deliver viruses, malware, spyware, “scareware” to your system.
  26. 26. 2.4 Windows Registry - Demos DEMOS RegEdit CCleaner
  27. 27. 2.5 System Software Updates Software Update Best Practices and Tips • Windows Update / Microsoft Update – Just Use It. • Keep Microsoft Automatic Updates turned on. • Check Monthly for “Optional” Microsoft Updates • Do not install drivers from Microsoft (unless you are having issues with a specific piece of hardware) • Let your security software check daily for updates • For non-Microsoft products, check at least monthly (or based on your system power)
  28. 28. 2.5 System Updates - Demos • Automatic Updates • “Optional” Window Updates
  29. 29. 3. Basic PC Security Part 3 – The “3-Pronged” Approach 1. A Firewall (Hardware or Software) – Section 3.1 2. Anti-Virus Software – Section 3.2 3. Anti-Spyware Software – Section 3.2 Additional Considerations: • Internet Browser Security – Section 3.3 • Security vs. Usability – Section 3.4
  30. 30. 3.1 Firewalls What does a firewall do? Blocks unauthorized access to a system, while permitting authorized communications. Two typical actions on data:  Permit  Deny • Hardware firewall = (typically) mean better performance than software • Software firewall = may be more configurable than hardware firewall. A Software firewall is essential for a mobile computer. • Free Products: Windows Firewall (at the very least), ZoneAlarm Free • Commercial Products: Anything bundled with an A/V suite (Norton 360, McAfee I.S., ZoneAlarm I.S., etc.)
  31. 31. 3.2 Anti-Virus and Anti-Spyware What is the difference? • Viruses can (typically) reproduce. • Viruses are designed to cause problems, and spread. • Spyware/Adware (typically) cannot reproduce. • Spyware/Adware programs are more for tracking. Tips: • Choose a reputable vendor. • Don’t believe Internet ads and Pop-up (“Scareware”)
  32. 32. 3.2 Anti-Virus and Anti-Spyware List of Reputable Vendors (FREE FOR HOME USE): Anti-Virus: Anti-Spyware: •Avast! Home Edition •Comodo Anti-Malware •AVG Anti-Virus Free* •Lavasoft Adware •Avira AntiVir Free Edition* •MalwareBTYES •BitDefender Free Edition (on-demand)* •Microsoft Windows Defender •ClamWin (on-demand scanner; portable) •SpyBot Search & Destroy •Comodo AntiVirus •Microsoft Security Essentials (BETA) •(Panda) Cloud Antivirus •PC Tools AntiVirus Free Edition Commercial Options: CA AntiVirus, F-Prot, F-Secure, Kaspersky Anti-Virus, McAfee VirusScan, NOD32 (by ESET), Panda Antivirus, Sophos Anti-Virus, Symantec/Norton (Endpoint/AntiVirus/360), Trend Micro AntiVirus + AntiSpyware, SunBelt VIPRE, Webroot AntiVirus with AntiSpyware (Spy Sweeper), ZoneAlarm AntiVirus
  33. 33. 3.2 Anti-Virus and Anti-Spyware Examples of Fake or “Rogue” Anti-Virus/Spyware Software: * AntiVirus 360 * Spydawn * Antivirus 2008 * Spylocked * Antivirus 2009 * Spysheriff * AntiVirus Gold * SpyShredder * ContraVirus * Spyware Quake * Errorsafe (AKA system doctor) * SpywareStrike * MacSweeper * UltimateCleaner * PAL Spyware Remover * WinAntiVirus Pro 2006 * Pest Trap * WinFixer * PSGuard * WorldAntiSpy * Spy Wiper Source (and larger list):
  34. 34. 3.2 Anti-Virus and Anti-Spyware Example of a Browser Hi-Jack
  35. 35. 3.2 Anti-Virus and Anti-Spyware TANGENT: 3rd-party Toolbars for Internet Browsers. Does your browser look like this?
  36. 36. 3.2 Anti-Virus and Anti-Spyware Examples of Fake Pop-up Messages Pop-up run from JavaScript Fake System Message (implying possible infection):
  37. 37. 3.3 Internet Browser Security Adding on to information from Section 2.2 (Browser Temp Files) Firefox 3.x: Tools  Options (Relevant Tabs: Content, Privacy, Security) Internet Explorer 8: Tools  Internet Options (Relevant Tabs: General, Privacy, Advanced) Tips: • Use the Private Browsing Features (IE8, FF 3.5) • Never let the Browser save Cookies, Passwords, History, etc. • Use Bookmarks/Favorites instead
  38. 38. 3.4 Security versus Usability Finding the Right Balance… SECURITY USABILITY
  39. 39. Section 3 - DEMOS Basic PC Security Software Demos • Windows Firewall • ZoneAlarm • Lavasoft Ad-aware • Browser Settings (Part II)
  40. 40. 4. Basic Peformance Enhancement Part 4 – Additional Performance Topics These already coved topics can affect performance: • Temporary Files (Section 2.2) • Hard drive Fragmentation (Section 2.3) • Registry Settings (Section 2.4) • Firewalls (Section 3.1) • Viruses or Spyware (Section 3.2) • Security over Usability (Section 3.4) There are also a few other places you can look for “basic” performance boosts: • 4.1 Display Settings • 4.2 System Update Frequency • 4.3 Virtual Memory • 4.4 Physical Memory Note: there are many, many, more advanced performance hacks for Windows. This section shows a tiny subset of system tweaks, just some “Basics”.
  41. 41. 4.1 Display Settings Pretty Graphics = More System Resources You can make your Windows interface more responsive by turning off all the animated interface features (ex. Vista’s Aero) This called Windows Classic mode. You can make any XP or Vista PC’s interface similar to the classic menu and theme that started with Windows 95 and WindowsNT 4.0. Right Click “Computer” or “My Computer” select “Properties” Tabs: Advanced  Performance (Settings)  Visual Effects You also adjust many of these settings in the Start Menu and under Display Settings (Note: Demo after section 4.3)
  42. 42. 4.2 System Update Frequency Automatic Updates: • XP: Automatic Updates is under System Properties • Vista: Control Panel  Security  Windows Update Other Software to Check: • Security software* • Any 3rd Application under “Programs” • Internet Browser Plug-ins: Big Offenders: Sun, Adobe, Apple, Real (Note: Demo after section 4.3)
  43. 43. 4.3 Virtual Memory Virtual Memory (sometimes called “Swap Space”) is a method to give programs additional memory (or sequential memory) after physical memory resources have been exhausted. Recommendations: • Let the system manage the virtual memory, or • Use minimum setting of double your physical RAM Accessing Virtual Memory: Right Click “Computer” or “My Computer” select “Properties” Advanced  Performance (Settings)  Advanced  Virtual Memory (Settings)
  44. 44. 4.x Basic Peformance Demos DEMOS • Display Settings • System Update Frequency • Virtual Memory
  45. 45. 4.4 Physical Memory DEMO: Whiteboard Session “Basic PC Components” Best Bang for Your Hardware Bucks = Physical Memory (RAM) Suggested Minimum RAM for Windows Operating Systems: • Windows XP SP3: 1 GB • Windows Vista SP2: 2 GB (and a dual-core processor) • Windows 7 2 GB
  46. 46. 5. Basic Hardware Updates Part 5 – Drivers and Hardware 5.1 System Information 5.2 Device Manager 5.3 Manufacturer Websites
  47. 47. 5.1 System Information MSINFO32.EXE (Accessories  System Tools) System Information gives you a categorical overview of your computer system, including drivers used and status of each.
  48. 48. 5.2 Device Manager Device Manager provides an interface for viewing the configuration of hardware devices. You can update the device drivers for hardware installed, modify hardware settings, and troubleshoot problems.
  49. 49. 5.3 HW Manufacturers Websites The BEST place to find information about a system, a component within that system, or a driver is typically the manufacturer. Examples:
  50. 50. 5.x Hardware Updates - Demos DEMO TIME!!! • System Information • Device Manager • Manufacturer Websites
  51. 51. Conclusion and Wrap Up Knowledge Can End Maintenance Frustration 1. Preparation, 2. Software, 3. Security, 4. Performance, and 5. Hardware Need to Know More? • Maintenance Scheduling • Additional Reading • Certification • Web Resources
  52. 52. Maintenance Schedule Make Time for Maintenance It is a good practice to physically clean your system once in a while, and develop a schedule for routine cleaning. With software, you can automate a lot of maintenance tasks. Physical maintenance requires scheduled time. To Physically Clean: • Clean the outside components with dry or lightly damp cloth (do not use chemicals, unless specifically specified for computers) • If you have components you no longer use, consider removing them (for example, an old printer) • For Desktops, open up and vacuum out the case and/or blow out all dust. For Laptops, vacuum out all exhaust fans.
  53. 53. Maintenance Schedule (cont’) Sample Schedule Recommended Recommended Preventive Maintenance Activity Auto? Preventive Maintenance Activity Auto? Frequency Frequency Scan hard disk file systems for errors Daily Yes Update emergency boot floppies Quarterly No Scan for viruses Daily Yes Quarterly Back up data Daily No Clean floppy disk drive internals (depending on No and read/write heads Clean CRT screen Weekly No use) Defragment hard disks Weekly Yes Check processor temperature, Annually (or Scan for hard disk read errors Weekly Yes inspect heat sink and fan to whenever case is No ensure they are working opened) Clean mouse Monthly No Check for full hard disk volumes and Annually (or Monthly No Check hard disk for temperature remove unnecessary files whenever case is No and vibration opened) Update virus definition files Monthly Sometimes Clean exterior of case Annually No Check power protection devices to Clean exterior of monitor Annually No ensure they are still protecting the Quarterly No system Check and clean interior, motherboard and expansion Annually No Check power supply fan for cards if necessary ventilation and dirt buildup and clean Quarterly No if necessary Check internal connections and Annually No cables Back up CMOS information Quarterly No Clean keyboard Annually No
  54. 54. Additional Reading • Troubleshooting Your PC for Dummies, 3rd Ed., Dan Goodkin • Upgrading and Repairing PCs, 18th Ed., Scott Mueller • Fix Your Own PC, 8th Ed., Corey Sandler • Computer Repair w/Diagnostic Flowcharts, Morris Rosenthal O’Reilly Books: “Hacks” , “Nutshell”, “Cookbook, “Pocket Reference” “Annoyances” Series; also “Backup and Recovery”
  55. 55. Certification If you are interesting in a career in Systems Troubleshooting, the industry standard cerfication is CompTIA’s A+ CompTIA: 2 Exams: 90-100 questions / 90 minutes 220-601 A+ Essentials (Required) 3 Career Tracks 220-602 for IT Technician 220-603 for Remote Support Technician 220-604 for Depot Technician
  56. 56. Web Resources 1. Preparation 1.1 Troubleshooting Methods • Cicso: • Cicso: • Microsoft: • Network+: • PCGuide – Troubleshooting Guide (also see System Care) 1.2 Backup • Automated System Recovery: • O’Reilly: • System State Date: • Types of Backups: • Windows Server: 1.3 Tools: • Anytime Tools (Specialty Security Bits): • BartPE: • ERD Commander 2005: (discontinued/replaced, see Sysinternals) • Hiren’s Boot CD:
  57. 57. Web Resources – continued • KNOPPIX: • • (R)ecovery (I)s (P)ossible Linux: • SLAX: • System Rescue CD: • Trinity Rescure Kit: • Ubuntu / Kubuntu / Xubuntu: , • Utilmate Boot CD: (UBCD4Win: • VistaPE: • Windows Sysinternals: • ZenLive (“Zenwalk Live”, based on SLAX): 2 Software Maintenance 2.1 Backup Software (Cloning / Standard): Cloning:,, • Acronis True Image: • Clonezilla (open source): • R-Drive Image:
  58. 58. Web Resources – continued Symantec (Norton):, 2.1 Backup Software (On-Line Backup): Remote Backup List: • • Carbonite: • IDrive: • Mozy Home: • Norton OnLine Backup: • SOS Online Backup: 2.2 Temporary Files: Definition: • Avanquest (Fix-It, SystemSuite): • Ccleaner (free): • Glary Utilities (free): • Symantac (Norton SystemWorks, 360): • Weboot:
  59. 59. Web Resources – continued 2.3 Fragmentation: Definition: Defragmenting: Defrag Software List: • Contig (free): • Defraggler (free): • JkDefrag MyDefrag (open source): • Norton SpeedDisk: 2.4 Registry: Overview: Registry Cleaner Overview: Information for Advanced Users: • Avanquest (Fix-It, SystemSuite): • Ccleaner (free): • Glary Utilities (free): • Norton (Utilties, SystemWorks, 360):
  60. 60. Web Resources – continued 2.5 System Updates: Overviews: / Windows Update Explained: 4143-a3f8-77004f7c2fd3/Windows%20Update%20Explained.docx • Windows Update: • Microsoft Update: 2.6 BONUS TOPIC – File Recovery / Secure File Deletion Overviews (Erasing):, /File_deletion, /Sanitization Overviews (Recovery):, /Undeletion • Eraser (open source): • PhotoRec and TestDisk (open source): • Recuva (free): • Restoration (free): • SpinRite:
  61. 61. Web Resources – continued 3 PC Security 3.1 Firewalls Overview: Windows Firewall: Overview: • Understanding: • Using: • Customizing: • TechNet Articles: 3rd Party “Personal” Firewalls: Overview: List of Firewalls: • Comodo Firewall: • Outpost Firewall Free: • PC Tools Firewall Plus (Free): • ZoneAlarm:
  62. 62. Web Resources – continued 3.2 Anti-Virus and Anti-Spyware Overviews: , /Spyware, /Adware Notable Antivirus Software: Rogue (or Fake) Software and Hoaxes:, /Virus Hoax Virus Databases: Symantec Threat Explorer, ThreatExpert, McAfee DB, Trend Micro DB Notable Free Anti-Virus and Anti-Spyware (too many to list all): • Avast! Home Edition: • Clamwin (on-demand only): • Comodo AntiVirus: • Lavasoft Ad-aware Free: • Malwarebtyes’ Anti-Malware: • Microsoft Security Essentials (BETA): • (Panda) Cloud Antivirus: • PC Tools Anti-Virus: • Spybot Search & Destroy: • Win. Defender: A Couple Notable Commercial Options (again, too many to list all): • Norton (bundled): • Webroot Spy Sweeper (bundled):
  63. 63. Web Resources – continued 3.3 Internet Browser Security Internet Explorer 8 Security Guide: f0341b13fcde&displaylang=en Increasing Your Organization’s Security and Privacy with Internet Explorer 8: C151E9797634&displaylang=en Firefox Overviews: • • • Firefox Tweak Guide: 3.4 Security versus Usability • When Security Gets In the Way: • Security and Usability: Designing Systems that People Can Use: • The Myths of Security: What the Computer Security Industry Doesn't Want You to Know:
  64. 64. Web Resources – continued 4 Performance Enhancement 4.1 Display Settings and Other Tweaks: Windows XP and Vista Tweaks (Advanced): • Tweak XP: • Black Viper’s XP Super Tweaks: • Tweak Vista: • Black Viper’s Vista Super Tweaks: • PCGuide System Enhancement: Recommended Books: O’Reilly’s Windows (XP/Vista) Hacks, Windows (XP/Vista) Annoyances 4.3 Virtual Memory Overviews:, 4.4 Physical Memory (and PC Components) PCGuide – Introduction to the PC: PGGuide – Systems and Component Reference:
  65. 65. Web Resources – continued 4.5 BONUS TOPIC – Boot/Startup Optimization Microsoft System Configuration Utility (MSCONFIG.EXE) • Overview: • How Troubleshoot Using: • “Purge the Startup Files”:,2845,1840082,00.asp Software to Optimize Startup: • CCleaner: • Glary Utilities: • Startup Cop Pro:,2817,2346165,00.asp BONUS TOPIC Physical Maintenance • Keeping Your PC Healthy:,2845,1840074,00.asp • PCGuide System Care: • PGGuide Maintenance Schedule:
  66. 66. Thank You for Attending! Feedback: If you liked what you saw today, please drop us a note at: administration AT Tell us what you liked, disliked, and if you would like to see additional computer classes like this at the Public Library of Westland. (If you would like to see more, then please kindly let us know the topics you would like to see in the future)
  1. A particular slide catching your eye?

    Clipping is a handy way to collect important slides you want to go back to later.