SlideShare a Scribd company logo
1 of 22
Ben tubbs
Mouse
Keyboard
   The mouse will be used to click on stuff you
    want to open or do with the computer.
   The keyboard will be used to type in programs
    where you can type letters, e-mail ect.
   This is the main program you have on your
    computer. Today windows 7 is the newest so
    you will want to make sure it has windows 7
    or vista. These are the newest an can be
    upgraded as the older ones they don’t make
    upgrades for as this will be a monthly thing
    you will need to do.
   This is where you turn your computer on at it.
    It will depend weather or not you have a
    laptop or a desk top. Lap tops are movable to
    where u can take easly from place to place.
    Desk tops are to be kept on a desk as you can’t
    take them just anywhere or use them
    anywhere. (see next 2 slides)
Monitor

                     Computer
                     “brain”
                        Power button
Speakers

                        Mouse




  Keyboard
Screen




Power button

keyboard




Left click button
   Software is programs that are installed or can
    be installed on your computer. Some of the
    software are Microsoft word, power point or
    any kind of messenger program such as yahoo
    or aim messenger.
PowerPoint
            view         Yahoo
Word view
                         messenger
                         view
This is what you save your files that you create to.
  This can be done either in your computer or a
  external hard drive or disk. It is better to save
  them to a external one just in case your
  computer crashes.
This is another kind
This is an example of an   called a flash drive
external hard drive that   that plugs into your
plugs into you usb port    usb port.
   This is important because. When you delet a
    file an send it to the recyling bin an then empty
    it it asked you “ are you sure you wnt to
    peremilty deleat this files yes or no. you would
    think you click yes there gone right? wrong.
    Files need to be deleated by somene that knows
    wht there doing I say this because it is illagal
    for someone to go thought your files while you
    own the computer however (next slide)
   Once you sell or give away your computer
    away they are no longer yours an they are legal
    for someone to go though. And they can do a
    lot of damage if they get any personal
    information like bank accounts passwords that
    u had saved in a file.
   You will want to get an anti virus program.
    There are a lot of them out there. There is trend
    micro, avg, and Norton. These will tell you if
    you go to open a file if it has a virus or not an
    will get rid of it before it attacks your
    computer. If you try to run a program it will
    automatically shut it down. Norton is the best
    there is right now it comes down to you get
    what you pay for. Countines on next slide
   This will also need updated once a week if not
    daily. You can set them to update daily an most
    wont slow down your computer like Norton, it
    will run an you won’t be able to tell its
    downloading updates. This will save your
    computer as there are new virus made
    everyday.
Bad sign


Good sign
   Yes if you try to do something bad on the
    internet you will get caught. They all have
    there own ip address. This is an id tag of your
    computer. If you send virus o purpose or try to
    hack into someone’s computer an they have a
    ip address catcher and they get it there is a
    program that you can put it into an it will tell
    them your name address what internet
    provider you have.
   Hyper links are links that can be clicked an
    takes you to a web page. These are usually in
    blue. They can come in an e-mail or if your on a
    web site like (staples.com) and you click on
    laptop computers it will take you to a page
    with just them. This is also a hyper link. They
    are basically a short cut to another site.
   Email is pretty simple. This is how people talk to
    each other if they can’t call them. This is almost
    like a chat program but you usually don’t get a
    respond right away. You can email companies
    about products or family that don’t live in the
    same state there are a lot of free sites that offer it
    free just like the chat windows. Yahoo, aol, hotmail
    are just a few of them. You will need to create a
    name. then you will need to make a password with
    at least 8-10 letters. A good password will contain
    letters and numbers. This make it harder for
    someone to hack into.
Computer class final

More Related Content

What's hot

Unit 9 - Remote Desktop Assistance - Babeli
Unit 9 - Remote Desktop Assistance - BabeliUnit 9 - Remote Desktop Assistance - Babeli
Unit 9 - Remote Desktop Assistance - Babeli
Lianna Babeli
 
Cs seminar 20071207
Cs seminar 20071207Cs seminar 20071207
Cs seminar 20071207
Todd Deshane
 

What's hot (6)

Get rid of results hub virus
Get rid of results hub virusGet rid of results hub virus
Get rid of results hub virus
 
Restore From Trash Mac are Now Possible
Restore From Trash Mac are Now PossibleRestore From Trash Mac are Now Possible
Restore From Trash Mac are Now Possible
 
Free mac data recovery
Free mac data recoveryFree mac data recovery
Free mac data recovery
 
Unit 9 - Remote Desktop Assistance - Babeli
Unit 9 - Remote Desktop Assistance - BabeliUnit 9 - Remote Desktop Assistance - Babeli
Unit 9 - Remote Desktop Assistance - Babeli
 
Cs seminar 20071207
Cs seminar 20071207Cs seminar 20071207
Cs seminar 20071207
 
June 2010 Cis Workshop Class
June 2010 Cis Workshop ClassJune 2010 Cis Workshop Class
June 2010 Cis Workshop Class
 

Viewers also liked (7)

Cyto Monster Protein Guide
Cyto Monster Protein GuideCyto Monster Protein Guide
Cyto Monster Protein Guide
 
Josevp6asmat
Josevp6asmatJosevp6asmat
Josevp6asmat
 
Group 7 third_party
Group 7 third_partyGroup 7 third_party
Group 7 third_party
 
http://chiropractor.inuplandlocalarea.com
http://chiropractor.inuplandlocalarea.comhttp://chiropractor.inuplandlocalarea.com
http://chiropractor.inuplandlocalarea.com
 
Vazquez
VazquezVazquez
Vazquez
 
Profile on amino acids for body building
Profile on amino acids for body buildingProfile on amino acids for body building
Profile on amino acids for body building
 
Vazquezodf
VazquezodfVazquezodf
Vazquezodf
 

Similar to Computer class final

Training Computer
Training ComputerTraining Computer
Training Computer
cmonasmith
 
14 household ways to protect your computer from viruses
14 household ways to protect your computer from viruses14 household ways to protect your computer from viruses
14 household ways to protect your computer from viruses
ar-rifke.com
 
How Computer Viruses Work
How Computer Viruses WorkHow Computer Viruses Work
How Computer Viruses Work
Cerise Anderson
 
maintaning your computer systems
maintaning your computer systemsmaintaning your computer systems
maintaning your computer systems
Gener Luis Morada
 
Unit III - Basics of Computer Science
Unit III - Basics of Computer ScienceUnit III - Basics of Computer Science
Unit III - Basics of Computer Science
Hepsijeba
 
avast 7.0.1474 license key
avast 7.0.1474 license keyavast 7.0.1474 license key
avast 7.0.1474 license key
HayWhitfield72
 

Similar to Computer class final (20)

How to protect your computer from viruses.
How to protect your computer from viruses.How to protect your computer from viruses.
How to protect your computer from viruses.
 
How to prevent a laptop crash
How to prevent a laptop crashHow to prevent a laptop crash
How to prevent a laptop crash
 
Thou shalt not
Thou shalt notThou shalt not
Thou shalt not
 
COMPUTERS ( types of viruses)
COMPUTERS ( types of viruses)COMPUTERS ( types of viruses)
COMPUTERS ( types of viruses)
 
Computer Security
Computer SecurityComputer Security
Computer Security
 
Training Computer
Training ComputerTraining Computer
Training Computer
 
14 household ways to protect your computer from viruses
14 household ways to protect your computer from viruses14 household ways to protect your computer from viruses
14 household ways to protect your computer from viruses
 
How Computer Viruses Work
How Computer Viruses WorkHow Computer Viruses Work
How Computer Viruses Work
 
Malware and malicious programs
Malware and malicious programsMalware and malicious programs
Malware and malicious programs
 
Spyware
SpywareSpyware
Spyware
 
Take Care of Your Computer Part 1 -- Disinfection Jan-19-2012
Take Care of Your Computer Part 1 -- Disinfection Jan-19-2012Take Care of Your Computer Part 1 -- Disinfection Jan-19-2012
Take Care of Your Computer Part 1 -- Disinfection Jan-19-2012
 
virus 2014 more design 2014
virus 2014 more design 2014virus 2014 more design 2014
virus 2014 more design 2014
 
maintaning your computer systems
maintaning your computer systemsmaintaning your computer systems
maintaning your computer systems
 
Sowmya
SowmyaSowmya
Sowmya
 
Unit III - Basics of Computer Science
Unit III - Basics of Computer ScienceUnit III - Basics of Computer Science
Unit III - Basics of Computer Science
 
How to fix some common laptop problems
How to fix some common laptop problemsHow to fix some common laptop problems
How to fix some common laptop problems
 
Operating systems
Operating systemsOperating systems
Operating systems
 
The Veterans' Guide to Protecting Your Privacy and Staying Safe Online
The Veterans' Guide to Protecting Your Privacy and Staying Safe OnlineThe Veterans' Guide to Protecting Your Privacy and Staying Safe Online
The Veterans' Guide to Protecting Your Privacy and Staying Safe Online
 
June 2010 Cis Workshop Class
June 2010 Cis Workshop ClassJune 2010 Cis Workshop Class
June 2010 Cis Workshop Class
 
avast 7.0.1474 license key
avast 7.0.1474 license keyavast 7.0.1474 license key
avast 7.0.1474 license key
 

Recently uploaded

Cloud Frontiers: A Deep Dive into Serverless Spatial Data and FME
Cloud Frontiers:  A Deep Dive into Serverless Spatial Data and FMECloud Frontiers:  A Deep Dive into Serverless Spatial Data and FME
Cloud Frontiers: A Deep Dive into Serverless Spatial Data and FME
Safe Software
 
Architecting Cloud Native Applications
Architecting Cloud Native ApplicationsArchitecting Cloud Native Applications
Architecting Cloud Native Applications
WSO2
 
Cloud Frontiers: A Deep Dive into Serverless Spatial Data and FME
Cloud Frontiers:  A Deep Dive into Serverless Spatial Data and FMECloud Frontiers:  A Deep Dive into Serverless Spatial Data and FME
Cloud Frontiers: A Deep Dive into Serverless Spatial Data and FME
Safe Software
 
Modular Monolith - a Practical Alternative to Microservices @ Devoxx UK 2024
Modular Monolith - a Practical Alternative to Microservices @ Devoxx UK 2024Modular Monolith - a Practical Alternative to Microservices @ Devoxx UK 2024
Modular Monolith - a Practical Alternative to Microservices @ Devoxx UK 2024
Victor Rentea
 

Recently uploaded (20)

Understanding the FAA Part 107 License ..
Understanding the FAA Part 107 License ..Understanding the FAA Part 107 License ..
Understanding the FAA Part 107 License ..
 
Polkadot JAM Slides - Token2049 - By Dr. Gavin Wood
Polkadot JAM Slides - Token2049 - By Dr. Gavin WoodPolkadot JAM Slides - Token2049 - By Dr. Gavin Wood
Polkadot JAM Slides - Token2049 - By Dr. Gavin Wood
 
Navigating the Deluge_ Dubai Floods and the Resilience of Dubai International...
Navigating the Deluge_ Dubai Floods and the Resilience of Dubai International...Navigating the Deluge_ Dubai Floods and the Resilience of Dubai International...
Navigating the Deluge_ Dubai Floods and the Resilience of Dubai International...
 
Choreo: Empowering the Future of Enterprise Software Engineering
Choreo: Empowering the Future of Enterprise Software EngineeringChoreo: Empowering the Future of Enterprise Software Engineering
Choreo: Empowering the Future of Enterprise Software Engineering
 
TrustArc Webinar - Unlock the Power of AI-Driven Data Discovery
TrustArc Webinar - Unlock the Power of AI-Driven Data DiscoveryTrustArc Webinar - Unlock the Power of AI-Driven Data Discovery
TrustArc Webinar - Unlock the Power of AI-Driven Data Discovery
 
Exploring Multimodal Embeddings with Milvus
Exploring Multimodal Embeddings with MilvusExploring Multimodal Embeddings with Milvus
Exploring Multimodal Embeddings with Milvus
 
Corporate and higher education May webinar.pptx
Corporate and higher education May webinar.pptxCorporate and higher education May webinar.pptx
Corporate and higher education May webinar.pptx
 
Connector Corner: Accelerate revenue generation using UiPath API-centric busi...
Connector Corner: Accelerate revenue generation using UiPath API-centric busi...Connector Corner: Accelerate revenue generation using UiPath API-centric busi...
Connector Corner: Accelerate revenue generation using UiPath API-centric busi...
 
Vector Search -An Introduction in Oracle Database 23ai.pptx
Vector Search -An Introduction in Oracle Database 23ai.pptxVector Search -An Introduction in Oracle Database 23ai.pptx
Vector Search -An Introduction in Oracle Database 23ai.pptx
 
DEV meet-up UiPath Document Understanding May 7 2024 Amsterdam
DEV meet-up UiPath Document Understanding May 7 2024 AmsterdamDEV meet-up UiPath Document Understanding May 7 2024 Amsterdam
DEV meet-up UiPath Document Understanding May 7 2024 Amsterdam
 
JavaScript Usage Statistics 2024 - The Ultimate Guide
JavaScript Usage Statistics 2024 - The Ultimate GuideJavaScript Usage Statistics 2024 - The Ultimate Guide
JavaScript Usage Statistics 2024 - The Ultimate Guide
 
[BuildWithAI] Introduction to Gemini.pdf
[BuildWithAI] Introduction to Gemini.pdf[BuildWithAI] Introduction to Gemini.pdf
[BuildWithAI] Introduction to Gemini.pdf
 
Cloud Frontiers: A Deep Dive into Serverless Spatial Data and FME
Cloud Frontiers:  A Deep Dive into Serverless Spatial Data and FMECloud Frontiers:  A Deep Dive into Serverless Spatial Data and FME
Cloud Frontiers: A Deep Dive into Serverless Spatial Data and FME
 
Rising Above_ Dubai Floods and the Fortitude of Dubai International Airport.pdf
Rising Above_ Dubai Floods and the Fortitude of Dubai International Airport.pdfRising Above_ Dubai Floods and the Fortitude of Dubai International Airport.pdf
Rising Above_ Dubai Floods and the Fortitude of Dubai International Airport.pdf
 
Architecting Cloud Native Applications
Architecting Cloud Native ApplicationsArchitecting Cloud Native Applications
Architecting Cloud Native Applications
 
Cloud Frontiers: A Deep Dive into Serverless Spatial Data and FME
Cloud Frontiers:  A Deep Dive into Serverless Spatial Data and FMECloud Frontiers:  A Deep Dive into Serverless Spatial Data and FME
Cloud Frontiers: A Deep Dive into Serverless Spatial Data and FME
 
Simplifying Mobile A11y Presentation.pptx
Simplifying Mobile A11y Presentation.pptxSimplifying Mobile A11y Presentation.pptx
Simplifying Mobile A11y Presentation.pptx
 
CNIC Information System with Pakdata Cf In Pakistan
CNIC Information System with Pakdata Cf In PakistanCNIC Information System with Pakdata Cf In Pakistan
CNIC Information System with Pakdata Cf In Pakistan
 
Modular Monolith - a Practical Alternative to Microservices @ Devoxx UK 2024
Modular Monolith - a Practical Alternative to Microservices @ Devoxx UK 2024Modular Monolith - a Practical Alternative to Microservices @ Devoxx UK 2024
Modular Monolith - a Practical Alternative to Microservices @ Devoxx UK 2024
 
How to Check CNIC Information Online with Pakdata cf
How to Check CNIC Information Online with Pakdata cfHow to Check CNIC Information Online with Pakdata cf
How to Check CNIC Information Online with Pakdata cf
 

Computer class final

  • 3. The mouse will be used to click on stuff you want to open or do with the computer.  The keyboard will be used to type in programs where you can type letters, e-mail ect.
  • 4. This is the main program you have on your computer. Today windows 7 is the newest so you will want to make sure it has windows 7 or vista. These are the newest an can be upgraded as the older ones they don’t make upgrades for as this will be a monthly thing you will need to do.
  • 5. This is where you turn your computer on at it. It will depend weather or not you have a laptop or a desk top. Lap tops are movable to where u can take easly from place to place. Desk tops are to be kept on a desk as you can’t take them just anywhere or use them anywhere. (see next 2 slides)
  • 6. Monitor Computer “brain” Power button Speakers Mouse Keyboard
  • 8. Software is programs that are installed or can be installed on your computer. Some of the software are Microsoft word, power point or any kind of messenger program such as yahoo or aim messenger.
  • 9. PowerPoint view Yahoo Word view messenger view
  • 10. This is what you save your files that you create to. This can be done either in your computer or a external hard drive or disk. It is better to save them to a external one just in case your computer crashes.
  • 11. This is another kind This is an example of an called a flash drive external hard drive that that plugs into your plugs into you usb port usb port.
  • 12. This is important because. When you delet a file an send it to the recyling bin an then empty it it asked you “ are you sure you wnt to peremilty deleat this files yes or no. you would think you click yes there gone right? wrong. Files need to be deleated by somene that knows wht there doing I say this because it is illagal for someone to go thought your files while you own the computer however (next slide)
  • 13. Once you sell or give away your computer away they are no longer yours an they are legal for someone to go though. And they can do a lot of damage if they get any personal information like bank accounts passwords that u had saved in a file.
  • 14.
  • 15. You will want to get an anti virus program. There are a lot of them out there. There is trend micro, avg, and Norton. These will tell you if you go to open a file if it has a virus or not an will get rid of it before it attacks your computer. If you try to run a program it will automatically shut it down. Norton is the best there is right now it comes down to you get what you pay for. Countines on next slide
  • 16. This will also need updated once a week if not daily. You can set them to update daily an most wont slow down your computer like Norton, it will run an you won’t be able to tell its downloading updates. This will save your computer as there are new virus made everyday.
  • 18. Yes if you try to do something bad on the internet you will get caught. They all have there own ip address. This is an id tag of your computer. If you send virus o purpose or try to hack into someone’s computer an they have a ip address catcher and they get it there is a program that you can put it into an it will tell them your name address what internet provider you have.
  • 19.
  • 20. Hyper links are links that can be clicked an takes you to a web page. These are usually in blue. They can come in an e-mail or if your on a web site like (staples.com) and you click on laptop computers it will take you to a page with just them. This is also a hyper link. They are basically a short cut to another site.
  • 21. Email is pretty simple. This is how people talk to each other if they can’t call them. This is almost like a chat program but you usually don’t get a respond right away. You can email companies about products or family that don’t live in the same state there are a lot of free sites that offer it free just like the chat windows. Yahoo, aol, hotmail are just a few of them. You will need to create a name. then you will need to make a password with at least 8-10 letters. A good password will contain letters and numbers. This make it harder for someone to hack into.