SlideShare a Scribd company logo
Donald Hester
October 7, 2009
For audio call Toll Free 1-888-886-3951
and use PIN/code 857641
Getting the Most from OneNote 2007
• Maximize your CCC Confer window.
• Mute your phone (*6) if you have visitors or noise in your office.
• Please note phone audio may be in presenter-only mode.
• Ask questions over the phone when the presenter prompts.
• Ask questions throughout presentation via the chat window.
Housekeeping
Adjusting your computer audio
1) To listen on your computer, adjust your speaker volume
2) If you’re using a phone, click on phone headset.
3) To speak you’ll need a microphone or USB headset.
a) First, run the audio wizard Tools/Audio/Audio Setup Wizard.
b) Second, press on the mic icon when it’s available (release
when finished speaking)
Saving Files & Open/close Captions
1. Save chat window with floppy disc icon
2. Open/close captioning window with CC icon
Emoticons and Polling
1. Raise hand and Emoticons
2. Polling options
Microsoft Office OneNote 2007
Office OneNote 2007 is a digital
notebook that provides people one
place to gather their notes and
information, powerful search to find
what they are looking for quickly, and
easy-to-use shared notebooks so that
they can manage information overload
and work together more effectively.
What is OneNote?
1. Gather your notes and information in one place.
2. Back up your valuable information.
3. Find information more quickly.
4. Work together more effectively.
5. Avoid duplicate work.
6. Organize your way.
7. Prioritize and manage tasks and your to-do list more
efficiently.
8. Make meetings more productive.
9. Get up to speed quickly.
10. Improve productivity away from the office.
10 Benefits
OneNote Setup
OneNote Setup
OneNote Setup
Send to OneNote
Easy Reference
What Else?
Insert audio, pictures,
documents, tables,
graphs, etc…
Win. Mobile & Tablet PC
Share Notebooks
Protect Notebooks
 With Office OneNote 2007, finding information is easy
and fast.
 Office OneNote 2007 eliminates the guesswork of
figuring out where you stored critical information
because everything is kept in the same program.
 No more clicking through file folders and sorting through
pages of paper notebooks to find the information you're
looking for.
 Powerful search features give you the ability to locate
information quickly.
Search made easy
Syllabus Example
Meeting Example
To Do List Example
Annotation Example
Office Online
http://office.microsoft.com/onenote
Online Demo
http://office.microsoft.com/en-
us/onenote/HA102342001033.aspx
Live Demo
Donald E. Hester
CISSP, CISA, CAP, PSP, MCT, MCITP, MCTS, MCSE Security, MCSA Security, MCDST, Security+, CTT+
Maze & Associates / San Diego City College
Email
DonaldH@MazeAssociates.com
Security Blog
www.LearnSecurity.org
LinkedIn Profile
http://www.linkedin.com/in/donaldehester
FaceBook
http://www.facebook.com/sobca
Q&A
Evaluation Survey Link
Help us improve our seminars by filing
out a short online evaluation survey at:
http://tinyurl.com/ONEeval-09F-OneNote
Thanks for Attending
For upcoming desktop seminars and links to
recently archived seminars, check the @ONE
Web site at:
http://onefortraining.org/seminars/

More Related Content

Viewers also liked

Maze & Associates QualysGuard Enterprise Vulnerability Management Training
Maze & Associates QualysGuard Enterprise Vulnerability Management TrainingMaze & Associates QualysGuard Enterprise Vulnerability Management Training
Maze & Associates QualysGuard Enterprise Vulnerability Management Training
Donald E. Hester
 
MS Word part 1
MS Word part 1MS Word part 1
MS Word part 1
Donald E. Hester
 
Security Awareness Training for Community Colleges 2009
Security Awareness Training for Community Colleges 2009Security Awareness Training for Community Colleges 2009
Security Awareness Training for Community Colleges 2009
Donald E. Hester
 
Microsoft Exchange Server 2007
Microsoft Exchange Server 2007Microsoft Exchange Server 2007
Microsoft Exchange Server 2007
Donald E. Hester
 
Care of Laptops 2002
Care of Laptops 2002Care of Laptops 2002
Care of Laptops 2002
Donald E. Hester
 
Information Assurance for Accountant 2007
Information Assurance for Accountant 2007Information Assurance for Accountant 2007
Information Assurance for Accountant 2007
Donald E. Hester
 
IT Best Practices for Community Colleges Part 2: Business Continuity 2010
IT Best Practices for Community Colleges Part 2: Business Continuity 2010IT Best Practices for Community Colleges Part 2: Business Continuity 2010
IT Best Practices for Community Colleges Part 2: Business Continuity 2010
Donald E. Hester
 
MS Word part 2
MS Word part 2MS Word part 2
MS Word part 2
Donald E. Hester
 
Information Technology Security A Brief Overview 2001
Information Technology Security A Brief Overview 2001Information Technology Security A Brief Overview 2001
Information Technology Security A Brief Overview 2001
Donald E. Hester
 
Information Systems Audit & CISA Prep 2010
Information Systems Audit & CISA Prep 2010Information Systems Audit & CISA Prep 2010
Information Systems Audit & CISA Prep 2010
Donald E. Hester
 
Information Systems Security Review 2004
Information Systems Security Review 2004Information Systems Security Review 2004
Information Systems Security Review 2004
Donald E. Hester
 
Social Media Security 2011
Social Media Security 2011Social Media Security 2011
Social Media Security 2011
Donald E. Hester
 

Viewers also liked (12)

Maze & Associates QualysGuard Enterprise Vulnerability Management Training
Maze & Associates QualysGuard Enterprise Vulnerability Management TrainingMaze & Associates QualysGuard Enterprise Vulnerability Management Training
Maze & Associates QualysGuard Enterprise Vulnerability Management Training
 
MS Word part 1
MS Word part 1MS Word part 1
MS Word part 1
 
Security Awareness Training for Community Colleges 2009
Security Awareness Training for Community Colleges 2009Security Awareness Training for Community Colleges 2009
Security Awareness Training for Community Colleges 2009
 
Microsoft Exchange Server 2007
Microsoft Exchange Server 2007Microsoft Exchange Server 2007
Microsoft Exchange Server 2007
 
Care of Laptops 2002
Care of Laptops 2002Care of Laptops 2002
Care of Laptops 2002
 
Information Assurance for Accountant 2007
Information Assurance for Accountant 2007Information Assurance for Accountant 2007
Information Assurance for Accountant 2007
 
IT Best Practices for Community Colleges Part 2: Business Continuity 2010
IT Best Practices for Community Colleges Part 2: Business Continuity 2010IT Best Practices for Community Colleges Part 2: Business Continuity 2010
IT Best Practices for Community Colleges Part 2: Business Continuity 2010
 
MS Word part 2
MS Word part 2MS Word part 2
MS Word part 2
 
Information Technology Security A Brief Overview 2001
Information Technology Security A Brief Overview 2001Information Technology Security A Brief Overview 2001
Information Technology Security A Brief Overview 2001
 
Information Systems Audit & CISA Prep 2010
Information Systems Audit & CISA Prep 2010Information Systems Audit & CISA Prep 2010
Information Systems Audit & CISA Prep 2010
 
Information Systems Security Review 2004
Information Systems Security Review 2004Information Systems Security Review 2004
Information Systems Security Review 2004
 
Social Media Security 2011
Social Media Security 2011Social Media Security 2011
Social Media Security 2011
 

Similar to MS One Note 2007

MS Word Part 1 (2009)
MS Word Part 1 (2009)MS Word Part 1 (2009)
MS Word Part 1 (2009)
Donald E. Hester
 
Office 2007 Word Intro 2009
Office 2007 Word Intro 2009Office 2007 Word Intro 2009
Office 2007 Word Intro 2009
Donald E. Hester
 
Word, Excel, OneNote, 2007
Word, Excel, OneNote, 2007Word, Excel, OneNote, 2007
Word, Excel, OneNote, 2007
Donald E. Hester
 
Office 2007 part 1
Office 2007 part 1Office 2007 part 1
Office 2007 part 1
Donald E. Hester
 
Part 2 Word 2007
Part 2 Word 2007Part 2 Word 2007
Part 2 Word 2007
Donald E. Hester
 
916-1586267918952-Unit_1.5_Windows10.pdf
916-1586267918952-Unit_1.5_Windows10.pdf916-1586267918952-Unit_1.5_Windows10.pdf
916-1586267918952-Unit_1.5_Windows10.pdf
jayasankabandara20
 
07 su 2007office1
07 su 2007office107 su 2007office1
07 su 2007office1
Donald E. Hester
 
Intro Windows 7
Intro Windows 7Intro Windows 7
Intro Windows 7
Donald E. Hester
 
Officegetstarted
OfficegetstartedOfficegetstarted
Officegetstarted
TAMALA MANDA
 
Bn1009 demo ppt basic msoffice
Bn1009 demo ppt basic msofficeBn1009 demo ppt basic msoffice
Bn1009 demo ppt basic msoffice
conline training
 
5 Free Tech Tools to Make you More Productive
5 Free Tech Tools to Make you More Productive5 Free Tech Tools to Make you More Productive
5 Free Tech Tools to Make you More Productive
D2L Barry
 
Tablet PC Workshop 2010
Tablet PC Workshop 2010Tablet PC Workshop 2010
Tablet PC Workshop 2010
Stephanie Moore
 
Grade 4-MT 1.pptx
Grade 4-MT 1.pptxGrade 4-MT 1.pptx
Grade 4-MT 1.pptx
MjMj96
 
MS Word 2007
MS Word 2007MS Word 2007
MS Word 2007
Donald E. Hester
 
Microsoft teams original
Microsoft teams originalMicrosoft teams original
Microsoft teams original
Titan4work
 
OCR_Nationals_Lesson 1
OCR_Nationals_Lesson 1OCR_Nationals_Lesson 1
OCR_Nationals_Lesson 1
Pete Lee
 
Office 2007 part 1
Office 2007 part 1Office 2007 part 1
Office 2007 part 1
Donald E. Hester
 
13 easy tech tricks to make you more productive
13 easy tech tricks to make you more productive13 easy tech tricks to make you more productive
13 easy tech tricks to make you more productive
ProofHub
 
PowerPoint, Outlook, Access, Visio 2007
PowerPoint, Outlook, Access, Visio 2007PowerPoint, Outlook, Access, Visio 2007
PowerPoint, Outlook, Access, Visio 2007
Donald E. Hester
 
The Road Warrior: 15 Tips for the Mobile Salesperson
The Road Warrior: 15 Tips for the Mobile SalespersonThe Road Warrior: 15 Tips for the Mobile Salesperson
The Road Warrior: 15 Tips for the Mobile Salesperson
Derek Massey
 

Similar to MS One Note 2007 (20)

MS Word Part 1 (2009)
MS Word Part 1 (2009)MS Word Part 1 (2009)
MS Word Part 1 (2009)
 
Office 2007 Word Intro 2009
Office 2007 Word Intro 2009Office 2007 Word Intro 2009
Office 2007 Word Intro 2009
 
Word, Excel, OneNote, 2007
Word, Excel, OneNote, 2007Word, Excel, OneNote, 2007
Word, Excel, OneNote, 2007
 
Office 2007 part 1
Office 2007 part 1Office 2007 part 1
Office 2007 part 1
 
Part 2 Word 2007
Part 2 Word 2007Part 2 Word 2007
Part 2 Word 2007
 
916-1586267918952-Unit_1.5_Windows10.pdf
916-1586267918952-Unit_1.5_Windows10.pdf916-1586267918952-Unit_1.5_Windows10.pdf
916-1586267918952-Unit_1.5_Windows10.pdf
 
07 su 2007office1
07 su 2007office107 su 2007office1
07 su 2007office1
 
Intro Windows 7
Intro Windows 7Intro Windows 7
Intro Windows 7
 
Officegetstarted
OfficegetstartedOfficegetstarted
Officegetstarted
 
Bn1009 demo ppt basic msoffice
Bn1009 demo ppt basic msofficeBn1009 demo ppt basic msoffice
Bn1009 demo ppt basic msoffice
 
5 Free Tech Tools to Make you More Productive
5 Free Tech Tools to Make you More Productive5 Free Tech Tools to Make you More Productive
5 Free Tech Tools to Make you More Productive
 
Tablet PC Workshop 2010
Tablet PC Workshop 2010Tablet PC Workshop 2010
Tablet PC Workshop 2010
 
Grade 4-MT 1.pptx
Grade 4-MT 1.pptxGrade 4-MT 1.pptx
Grade 4-MT 1.pptx
 
MS Word 2007
MS Word 2007MS Word 2007
MS Word 2007
 
Microsoft teams original
Microsoft teams originalMicrosoft teams original
Microsoft teams original
 
OCR_Nationals_Lesson 1
OCR_Nationals_Lesson 1OCR_Nationals_Lesson 1
OCR_Nationals_Lesson 1
 
Office 2007 part 1
Office 2007 part 1Office 2007 part 1
Office 2007 part 1
 
13 easy tech tricks to make you more productive
13 easy tech tricks to make you more productive13 easy tech tricks to make you more productive
13 easy tech tricks to make you more productive
 
PowerPoint, Outlook, Access, Visio 2007
PowerPoint, Outlook, Access, Visio 2007PowerPoint, Outlook, Access, Visio 2007
PowerPoint, Outlook, Access, Visio 2007
 
The Road Warrior: 15 Tips for the Mobile Salesperson
The Road Warrior: 15 Tips for the Mobile SalespersonThe Road Warrior: 15 Tips for the Mobile Salesperson
The Road Warrior: 15 Tips for the Mobile Salesperson
 

More from Donald E. Hester

Cybersecurity for Local Gov for SAMFOG
Cybersecurity for Local Gov for SAMFOGCybersecurity for Local Gov for SAMFOG
Cybersecurity for Local Gov for SAMFOG
Donald E. Hester
 
2017 IT Control Environment for Local Gov
2017 IT Control Environment for Local Gov2017 IT Control Environment for Local Gov
2017 IT Control Environment for Local Gov
Donald E. Hester
 
What you Need To Know About Ransomware
What you Need To Know About RansomwareWhat you Need To Know About Ransomware
What you Need To Know About Ransomware
Donald E. Hester
 
CNT 54 Administering Windows Client
CNT 54 Administering Windows ClientCNT 54 Administering Windows Client
CNT 54 Administering Windows Client
Donald E. Hester
 
2016 Maze Live Fraud Environment
2016 Maze Live Fraud Environment2016 Maze Live Fraud Environment
2016 Maze Live Fraud Environment
Donald E. Hester
 
2016 Maze Live Changes in Grant Management and How to Prepare for the Single ...
2016 Maze Live Changes in Grant Management and How to Prepare for the Single ...2016 Maze Live Changes in Grant Management and How to Prepare for the Single ...
2016 Maze Live Changes in Grant Management and How to Prepare for the Single ...
Donald E. Hester
 
2016 Maze Live Cyber-security for Local Governments
2016 Maze Live Cyber-security for Local Governments2016 Maze Live Cyber-security for Local Governments
2016 Maze Live Cyber-security for Local Governments
Donald E. Hester
 
GASB 68 and 71 Planning for the Second Year
GASB 68 and 71 Planning for the Second YearGASB 68 and 71 Planning for the Second Year
GASB 68 and 71 Planning for the Second Year
Donald E. Hester
 
Implementing GASB 72: Fair Value Measurement and Application
Implementing GASB 72: Fair Value Measurement and ApplicationImplementing GASB 72: Fair Value Measurement and Application
Implementing GASB 72: Fair Value Measurement and Application
Donald E. Hester
 
2016 Maze Live 1 GASB update
2016 Maze Live 1 GASB update2016 Maze Live 1 GASB update
2016 Maze Live 1 GASB update
Donald E. Hester
 
Cyber Security for Local Gov SAMFOG
Cyber Security for Local Gov SAMFOGCyber Security for Local Gov SAMFOG
Cyber Security for Local Gov SAMFOG
Donald E. Hester
 
Annual Maze Live Event 2016 – GASB Updates & Best Practices
Annual Maze Live Event 2016 – GASB Updates & Best Practices Annual Maze Live Event 2016 – GASB Updates & Best Practices
Annual Maze Live Event 2016 – GASB Updates & Best Practices
Donald E. Hester
 
Payment Card Cashiering for Local Governments 2016
Payment Card Cashiering for Local Governments 2016Payment Card Cashiering for Local Governments 2016
Payment Card Cashiering for Local Governments 2016
Donald E. Hester
 
Understanding the Risk Management Framework & (ISC)2 CAP Module 10: Authorize
Understanding the Risk Management Framework & (ISC)2 CAP Module 10: Authorize Understanding the Risk Management Framework & (ISC)2 CAP Module 10: Authorize
Understanding the Risk Management Framework & (ISC)2 CAP Module 10: Authorize
Donald E. Hester
 
Understanding the Risk Management Framework & (ISC)2 CAP Module 15: Incident ...
Understanding the Risk Management Framework & (ISC)2 CAP Module 15: Incident ...Understanding the Risk Management Framework & (ISC)2 CAP Module 15: Incident ...
Understanding the Risk Management Framework & (ISC)2 CAP Module 15: Incident ...
Donald E. Hester
 
Understanding the Risk Management Framework & (ISC)2 CAP Module 14: Security ...
Understanding the Risk Management Framework & (ISC)2 CAP Module 14: Security ...Understanding the Risk Management Framework & (ISC)2 CAP Module 14: Security ...
Understanding the Risk Management Framework & (ISC)2 CAP Module 14: Security ...
Donald E. Hester
 
Understanding the Risk Management Framework & (ISC)2 CAP Module 13: Contingen...
Understanding the Risk Management Framework & (ISC)2 CAP Module 13: Contingen...Understanding the Risk Management Framework & (ISC)2 CAP Module 13: Contingen...
Understanding the Risk Management Framework & (ISC)2 CAP Module 13: Contingen...
Donald E. Hester
 
Understanding the Risk Management Framework & (ISC)2 CAP Module 11: Monitor
Understanding the Risk Management Framework & (ISC)2 CAP Module 11: MonitorUnderstanding the Risk Management Framework & (ISC)2 CAP Module 11: Monitor
Understanding the Risk Management Framework & (ISC)2 CAP Module 11: Monitor
Donald E. Hester
 
Understanding the Risk Management Framework & (ISC)2 CAP Module 12: Cloud Com...
Understanding the Risk Management Framework & (ISC)2 CAP Module 12: Cloud Com...Understanding the Risk Management Framework & (ISC)2 CAP Module 12: Cloud Com...
Understanding the Risk Management Framework & (ISC)2 CAP Module 12: Cloud Com...
Donald E. Hester
 
Understanding the Risk Management Framework & (ISC)2 CAP Module 8: Implement ...
Understanding the Risk Management Framework & (ISC)2 CAP Module 8: Implement ...Understanding the Risk Management Framework & (ISC)2 CAP Module 8: Implement ...
Understanding the Risk Management Framework & (ISC)2 CAP Module 8: Implement ...
Donald E. Hester
 

More from Donald E. Hester (20)

Cybersecurity for Local Gov for SAMFOG
Cybersecurity for Local Gov for SAMFOGCybersecurity for Local Gov for SAMFOG
Cybersecurity for Local Gov for SAMFOG
 
2017 IT Control Environment for Local Gov
2017 IT Control Environment for Local Gov2017 IT Control Environment for Local Gov
2017 IT Control Environment for Local Gov
 
What you Need To Know About Ransomware
What you Need To Know About RansomwareWhat you Need To Know About Ransomware
What you Need To Know About Ransomware
 
CNT 54 Administering Windows Client
CNT 54 Administering Windows ClientCNT 54 Administering Windows Client
CNT 54 Administering Windows Client
 
2016 Maze Live Fraud Environment
2016 Maze Live Fraud Environment2016 Maze Live Fraud Environment
2016 Maze Live Fraud Environment
 
2016 Maze Live Changes in Grant Management and How to Prepare for the Single ...
2016 Maze Live Changes in Grant Management and How to Prepare for the Single ...2016 Maze Live Changes in Grant Management and How to Prepare for the Single ...
2016 Maze Live Changes in Grant Management and How to Prepare for the Single ...
 
2016 Maze Live Cyber-security for Local Governments
2016 Maze Live Cyber-security for Local Governments2016 Maze Live Cyber-security for Local Governments
2016 Maze Live Cyber-security for Local Governments
 
GASB 68 and 71 Planning for the Second Year
GASB 68 and 71 Planning for the Second YearGASB 68 and 71 Planning for the Second Year
GASB 68 and 71 Planning for the Second Year
 
Implementing GASB 72: Fair Value Measurement and Application
Implementing GASB 72: Fair Value Measurement and ApplicationImplementing GASB 72: Fair Value Measurement and Application
Implementing GASB 72: Fair Value Measurement and Application
 
2016 Maze Live 1 GASB update
2016 Maze Live 1 GASB update2016 Maze Live 1 GASB update
2016 Maze Live 1 GASB update
 
Cyber Security for Local Gov SAMFOG
Cyber Security for Local Gov SAMFOGCyber Security for Local Gov SAMFOG
Cyber Security for Local Gov SAMFOG
 
Annual Maze Live Event 2016 – GASB Updates & Best Practices
Annual Maze Live Event 2016 – GASB Updates & Best Practices Annual Maze Live Event 2016 – GASB Updates & Best Practices
Annual Maze Live Event 2016 – GASB Updates & Best Practices
 
Payment Card Cashiering for Local Governments 2016
Payment Card Cashiering for Local Governments 2016Payment Card Cashiering for Local Governments 2016
Payment Card Cashiering for Local Governments 2016
 
Understanding the Risk Management Framework & (ISC)2 CAP Module 10: Authorize
Understanding the Risk Management Framework & (ISC)2 CAP Module 10: Authorize Understanding the Risk Management Framework & (ISC)2 CAP Module 10: Authorize
Understanding the Risk Management Framework & (ISC)2 CAP Module 10: Authorize
 
Understanding the Risk Management Framework & (ISC)2 CAP Module 15: Incident ...
Understanding the Risk Management Framework & (ISC)2 CAP Module 15: Incident ...Understanding the Risk Management Framework & (ISC)2 CAP Module 15: Incident ...
Understanding the Risk Management Framework & (ISC)2 CAP Module 15: Incident ...
 
Understanding the Risk Management Framework & (ISC)2 CAP Module 14: Security ...
Understanding the Risk Management Framework & (ISC)2 CAP Module 14: Security ...Understanding the Risk Management Framework & (ISC)2 CAP Module 14: Security ...
Understanding the Risk Management Framework & (ISC)2 CAP Module 14: Security ...
 
Understanding the Risk Management Framework & (ISC)2 CAP Module 13: Contingen...
Understanding the Risk Management Framework & (ISC)2 CAP Module 13: Contingen...Understanding the Risk Management Framework & (ISC)2 CAP Module 13: Contingen...
Understanding the Risk Management Framework & (ISC)2 CAP Module 13: Contingen...
 
Understanding the Risk Management Framework & (ISC)2 CAP Module 11: Monitor
Understanding the Risk Management Framework & (ISC)2 CAP Module 11: MonitorUnderstanding the Risk Management Framework & (ISC)2 CAP Module 11: Monitor
Understanding the Risk Management Framework & (ISC)2 CAP Module 11: Monitor
 
Understanding the Risk Management Framework & (ISC)2 CAP Module 12: Cloud Com...
Understanding the Risk Management Framework & (ISC)2 CAP Module 12: Cloud Com...Understanding the Risk Management Framework & (ISC)2 CAP Module 12: Cloud Com...
Understanding the Risk Management Framework & (ISC)2 CAP Module 12: Cloud Com...
 
Understanding the Risk Management Framework & (ISC)2 CAP Module 8: Implement ...
Understanding the Risk Management Framework & (ISC)2 CAP Module 8: Implement ...Understanding the Risk Management Framework & (ISC)2 CAP Module 8: Implement ...
Understanding the Risk Management Framework & (ISC)2 CAP Module 8: Implement ...
 

Recently uploaded

Generating privacy-protected synthetic data using Secludy and Milvus
Generating privacy-protected synthetic data using Secludy and MilvusGenerating privacy-protected synthetic data using Secludy and Milvus
Generating privacy-protected synthetic data using Secludy and Milvus
Zilliz
 
Building Production Ready Search Pipelines with Spark and Milvus
Building Production Ready Search Pipelines with Spark and MilvusBuilding Production Ready Search Pipelines with Spark and Milvus
Building Production Ready Search Pipelines with Spark and Milvus
Zilliz
 
Presentation of the OECD Artificial Intelligence Review of Germany
Presentation of the OECD Artificial Intelligence Review of GermanyPresentation of the OECD Artificial Intelligence Review of Germany
Presentation of the OECD Artificial Intelligence Review of Germany
innovationoecd
 
GenAI Pilot Implementation in the organizations
GenAI Pilot Implementation in the organizationsGenAI Pilot Implementation in the organizations
GenAI Pilot Implementation in the organizations
kumardaparthi1024
 
TrustArc Webinar - 2024 Global Privacy Survey
TrustArc Webinar - 2024 Global Privacy SurveyTrustArc Webinar - 2024 Global Privacy Survey
TrustArc Webinar - 2024 Global Privacy Survey
TrustArc
 
Mind map of terminologies used in context of Generative AI
Mind map of terminologies used in context of Generative AIMind map of terminologies used in context of Generative AI
Mind map of terminologies used in context of Generative AI
Kumud Singh
 
Climate Impact of Software Testing at Nordic Testing Days
Climate Impact of Software Testing at Nordic Testing DaysClimate Impact of Software Testing at Nordic Testing Days
Climate Impact of Software Testing at Nordic Testing Days
Kari Kakkonen
 
Monitoring and Managing Anomaly Detection on OpenShift.pdf
Monitoring and Managing Anomaly Detection on OpenShift.pdfMonitoring and Managing Anomaly Detection on OpenShift.pdf
Monitoring and Managing Anomaly Detection on OpenShift.pdf
Tosin Akinosho
 
“I’m still / I’m still / Chaining from the Block”
“I’m still / I’m still / Chaining from the Block”“I’m still / I’m still / Chaining from the Block”
“I’m still / I’m still / Chaining from the Block”
Claudio Di Ciccio
 
“Building and Scaling AI Applications with the Nx AI Manager,” a Presentation...
“Building and Scaling AI Applications with the Nx AI Manager,” a Presentation...“Building and Scaling AI Applications with the Nx AI Manager,” a Presentation...
“Building and Scaling AI Applications with the Nx AI Manager,” a Presentation...
Edge AI and Vision Alliance
 
National Security Agency - NSA mobile device best practices
National Security Agency - NSA mobile device best practicesNational Security Agency - NSA mobile device best practices
National Security Agency - NSA mobile device best practices
Quotidiano Piemontese
 
Microsoft - Power Platform_G.Aspiotis.pdf
Microsoft - Power Platform_G.Aspiotis.pdfMicrosoft - Power Platform_G.Aspiotis.pdf
Microsoft - Power Platform_G.Aspiotis.pdf
Uni Systems S.M.S.A.
 
CAKE: Sharing Slices of Confidential Data on Blockchain
CAKE: Sharing Slices of Confidential Data on BlockchainCAKE: Sharing Slices of Confidential Data on Blockchain
CAKE: Sharing Slices of Confidential Data on Blockchain
Claudio Di Ciccio
 
Best 20 SEO Techniques To Improve Website Visibility In SERP
Best 20 SEO Techniques To Improve Website Visibility In SERPBest 20 SEO Techniques To Improve Website Visibility In SERP
Best 20 SEO Techniques To Improve Website Visibility In SERP
Pixlogix Infotech
 
Serial Arm Control in Real Time Presentation
Serial Arm Control in Real Time PresentationSerial Arm Control in Real Time Presentation
Serial Arm Control in Real Time Presentation
tolgahangng
 
June Patch Tuesday
June Patch TuesdayJune Patch Tuesday
June Patch Tuesday
Ivanti
 
Artificial Intelligence for XMLDevelopment
Artificial Intelligence for XMLDevelopmentArtificial Intelligence for XMLDevelopment
Artificial Intelligence for XMLDevelopment
Octavian Nadolu
 
Full-RAG: A modern architecture for hyper-personalization
Full-RAG: A modern architecture for hyper-personalizationFull-RAG: A modern architecture for hyper-personalization
Full-RAG: A modern architecture for hyper-personalization
Zilliz
 
20240607 QFM018 Elixir Reading List May 2024
20240607 QFM018 Elixir Reading List May 202420240607 QFM018 Elixir Reading List May 2024
20240607 QFM018 Elixir Reading List May 2024
Matthew Sinclair
 
Essentials of Automations: The Art of Triggers and Actions in FME
Essentials of Automations: The Art of Triggers and Actions in FMEEssentials of Automations: The Art of Triggers and Actions in FME
Essentials of Automations: The Art of Triggers and Actions in FME
Safe Software
 

Recently uploaded (20)

Generating privacy-protected synthetic data using Secludy and Milvus
Generating privacy-protected synthetic data using Secludy and MilvusGenerating privacy-protected synthetic data using Secludy and Milvus
Generating privacy-protected synthetic data using Secludy and Milvus
 
Building Production Ready Search Pipelines with Spark and Milvus
Building Production Ready Search Pipelines with Spark and MilvusBuilding Production Ready Search Pipelines with Spark and Milvus
Building Production Ready Search Pipelines with Spark and Milvus
 
Presentation of the OECD Artificial Intelligence Review of Germany
Presentation of the OECD Artificial Intelligence Review of GermanyPresentation of the OECD Artificial Intelligence Review of Germany
Presentation of the OECD Artificial Intelligence Review of Germany
 
GenAI Pilot Implementation in the organizations
GenAI Pilot Implementation in the organizationsGenAI Pilot Implementation in the organizations
GenAI Pilot Implementation in the organizations
 
TrustArc Webinar - 2024 Global Privacy Survey
TrustArc Webinar - 2024 Global Privacy SurveyTrustArc Webinar - 2024 Global Privacy Survey
TrustArc Webinar - 2024 Global Privacy Survey
 
Mind map of terminologies used in context of Generative AI
Mind map of terminologies used in context of Generative AIMind map of terminologies used in context of Generative AI
Mind map of terminologies used in context of Generative AI
 
Climate Impact of Software Testing at Nordic Testing Days
Climate Impact of Software Testing at Nordic Testing DaysClimate Impact of Software Testing at Nordic Testing Days
Climate Impact of Software Testing at Nordic Testing Days
 
Monitoring and Managing Anomaly Detection on OpenShift.pdf
Monitoring and Managing Anomaly Detection on OpenShift.pdfMonitoring and Managing Anomaly Detection on OpenShift.pdf
Monitoring and Managing Anomaly Detection on OpenShift.pdf
 
“I’m still / I’m still / Chaining from the Block”
“I’m still / I’m still / Chaining from the Block”“I’m still / I’m still / Chaining from the Block”
“I’m still / I’m still / Chaining from the Block”
 
“Building and Scaling AI Applications with the Nx AI Manager,” a Presentation...
“Building and Scaling AI Applications with the Nx AI Manager,” a Presentation...“Building and Scaling AI Applications with the Nx AI Manager,” a Presentation...
“Building and Scaling AI Applications with the Nx AI Manager,” a Presentation...
 
National Security Agency - NSA mobile device best practices
National Security Agency - NSA mobile device best practicesNational Security Agency - NSA mobile device best practices
National Security Agency - NSA mobile device best practices
 
Microsoft - Power Platform_G.Aspiotis.pdf
Microsoft - Power Platform_G.Aspiotis.pdfMicrosoft - Power Platform_G.Aspiotis.pdf
Microsoft - Power Platform_G.Aspiotis.pdf
 
CAKE: Sharing Slices of Confidential Data on Blockchain
CAKE: Sharing Slices of Confidential Data on BlockchainCAKE: Sharing Slices of Confidential Data on Blockchain
CAKE: Sharing Slices of Confidential Data on Blockchain
 
Best 20 SEO Techniques To Improve Website Visibility In SERP
Best 20 SEO Techniques To Improve Website Visibility In SERPBest 20 SEO Techniques To Improve Website Visibility In SERP
Best 20 SEO Techniques To Improve Website Visibility In SERP
 
Serial Arm Control in Real Time Presentation
Serial Arm Control in Real Time PresentationSerial Arm Control in Real Time Presentation
Serial Arm Control in Real Time Presentation
 
June Patch Tuesday
June Patch TuesdayJune Patch Tuesday
June Patch Tuesday
 
Artificial Intelligence for XMLDevelopment
Artificial Intelligence for XMLDevelopmentArtificial Intelligence for XMLDevelopment
Artificial Intelligence for XMLDevelopment
 
Full-RAG: A modern architecture for hyper-personalization
Full-RAG: A modern architecture for hyper-personalizationFull-RAG: A modern architecture for hyper-personalization
Full-RAG: A modern architecture for hyper-personalization
 
20240607 QFM018 Elixir Reading List May 2024
20240607 QFM018 Elixir Reading List May 202420240607 QFM018 Elixir Reading List May 2024
20240607 QFM018 Elixir Reading List May 2024
 
Essentials of Automations: The Art of Triggers and Actions in FME
Essentials of Automations: The Art of Triggers and Actions in FMEEssentials of Automations: The Art of Triggers and Actions in FME
Essentials of Automations: The Art of Triggers and Actions in FME
 

MS One Note 2007

  • 1. Donald Hester October 7, 2009 For audio call Toll Free 1-888-886-3951 and use PIN/code 857641 Getting the Most from OneNote 2007
  • 2. • Maximize your CCC Confer window. • Mute your phone (*6) if you have visitors or noise in your office. • Please note phone audio may be in presenter-only mode. • Ask questions over the phone when the presenter prompts. • Ask questions throughout presentation via the chat window. Housekeeping
  • 3. Adjusting your computer audio 1) To listen on your computer, adjust your speaker volume 2) If you’re using a phone, click on phone headset. 3) To speak you’ll need a microphone or USB headset. a) First, run the audio wizard Tools/Audio/Audio Setup Wizard. b) Second, press on the mic icon when it’s available (release when finished speaking)
  • 4. Saving Files & Open/close Captions 1. Save chat window with floppy disc icon 2. Open/close captioning window with CC icon
  • 5. Emoticons and Polling 1. Raise hand and Emoticons 2. Polling options
  • 6. Microsoft Office OneNote 2007 Office OneNote 2007 is a digital notebook that provides people one place to gather their notes and information, powerful search to find what they are looking for quickly, and easy-to-use shared notebooks so that they can manage information overload and work together more effectively.
  • 8.
  • 9. 1. Gather your notes and information in one place. 2. Back up your valuable information. 3. Find information more quickly. 4. Work together more effectively. 5. Avoid duplicate work. 6. Organize your way. 7. Prioritize and manage tasks and your to-do list more efficiently. 8. Make meetings more productive. 9. Get up to speed quickly. 10. Improve productivity away from the office. 10 Benefits
  • 15. What Else? Insert audio, pictures, documents, tables, graphs, etc… Win. Mobile & Tablet PC Share Notebooks Protect Notebooks
  • 16.  With Office OneNote 2007, finding information is easy and fast.  Office OneNote 2007 eliminates the guesswork of figuring out where you stored critical information because everything is kept in the same program.  No more clicking through file folders and sorting through pages of paper notebooks to find the information you're looking for.  Powerful search features give you the ability to locate information quickly. Search made easy
  • 17.
  • 20. To Do List Example
  • 25. Donald E. Hester CISSP, CISA, CAP, PSP, MCT, MCITP, MCTS, MCSE Security, MCSA Security, MCDST, Security+, CTT+ Maze & Associates / San Diego City College Email DonaldH@MazeAssociates.com Security Blog www.LearnSecurity.org LinkedIn Profile http://www.linkedin.com/in/donaldehester FaceBook http://www.facebook.com/sobca Q&A
  • 26. Evaluation Survey Link Help us improve our seminars by filing out a short online evaluation survey at: http://tinyurl.com/ONEeval-09F-OneNote
  • 27. Thanks for Attending For upcoming desktop seminars and links to recently archived seminars, check the @ONE Web site at: http://onefortraining.org/seminars/