SlideShare a Scribd company logo
Ben tubbs
Mouse
Keyboard
   The mouse will be used to click on stuff you
    want to open or do with the computer.
   The keyboard will be used to type in programs
    where you can type letters, e-mail ect.
   This is the main program you have on your
    computer. Today windows 7 is the newest so
    you will want to make sure it has windows 7
    or vista. These are the newest an can be
    upgraded as the older ones they don’t make
    upgrades for as this will be a monthly thing
    you will need to do.
   This is where you turn your computer on at it.
    It will depend weather or not you have a
    laptop or a desk top. Lap tops are movable to
    where u can take easly from place to place.
    Desk tops are to be kept on a desk as you can’t
    take them just anywhere or use them
    anywhere. (see next 2 slides)
Monitor

                     Computer
                     “brain”
                        Power button
Speakers

                        Mouse




  Keyboard
Screen




Power button

keyboard




Left click button
   Software is programs that are installed or can
    be installed on your computer. Some of the
    software are Microsoft word, power point or
    any kind of messenger program such as yahoo
    or aim messenger.
PowerPoint
            view         Yahoo
Word view
                         messenger
                         view
This is what you save your files that you create to.
  This can be done either in your computer or a
  external hard drive or disk. It is better to save
  them to a external one just in case your
  computer crashes.
This is another kind
This is an example of an   called a flash drive
external hard drive that   that plugs into your
plugs into you usb port    usb port.
   This is important because. When you delet a
    file an send it to the recyling bin an then empty
    it it asked you “ are you sure you wnt to
    peremilty deleat this files yes or no. you would
    think you click yes there gone right? wrong.
    Files need to be deleated by somene that knows
    wht there doing I say this because it is illagal
    for someone to go thought your files while you
    own the computer however (next slide)
   Once you sell or give away your computer
    away they are no longer yours an they are legal
    for someone to go though. And they can do a
    lot of damage if they get any personal
    information like bank accounts passwords that
    u had saved in a file.
   You will want to get an anti virus program.
    There are a lot of them out there. There is trend
    micro, avg, and Norton. These will tell you if
    you go to open a file if it has a virus or not an
    will get rid of it before it attacks your
    computer. If you try to run a program it will
    automatically shut it down. Norton is the best
    there is right now it comes down to you get
    what you pay for. Countines on next slide
   This will also need updated once a week if not
    daily. You can set them to update daily an most
    wont slow down your computer like Norton, it
    will run an you won’t be able to tell its
    downloading updates. This will save your
    computer as there are new virus made
    everyday.
Bad sign


Good sign
   Yes if you try to do something bad on the
    internet you will get caught. They all have
    there own ip address. This is an id tag of your
    computer. If you send virus o purpose or try to
    hack into someone’s computer an they have a
    ip address catcher and they get it there is a
    program that you can put it into an it will tell
    them your name address what internet
    provider you have.
   Hyper links are links that can be clicked an
    takes you to a web page. These are usually in
    blue. They can come in an e-mail or if your on a
    web site like (staples.com) and you click on
    laptop computers it will take you to a page
    with just them. This is also a hyper link. They
    are basically a short cut to another site.
   Email is pretty simple. This is how people talk to
    each other if they can’t call them. This is almost
    like a chat program but you usually don’t get a
    respond right away. You can email companies
    about products or family that don’t live in the
    same state there are a lot of free sites that offer it
    free just like the chat windows. Yahoo, aol, hotmail
    are just a few of them. You will need to create a
    name. then you will need to make a password with
    at least 8-10 letters. A good password will contain
    letters and numbers. This make it harder for
    someone to hack into.
Computer class final

More Related Content

What's hot

Get rid of results hub virus
Get rid of results hub virusGet rid of results hub virus
Get rid of results hub virus
haroNaroum
 
Restore From Trash Mac are Now Possible
Restore From Trash Mac are Now PossibleRestore From Trash Mac are Now Possible
Restore From Trash Mac are Now Possible
restorefromtrash-mac
 
Free mac data recovery
Free mac data recoveryFree mac data recovery
Free mac data recovery
celenscotch
 
Unit 9 - Remote Desktop Assistance - Babeli
Unit 9 - Remote Desktop Assistance - BabeliUnit 9 - Remote Desktop Assistance - Babeli
Unit 9 - Remote Desktop Assistance - BabeliLianna Babeli
 
Cs seminar 20071207
Cs seminar 20071207Cs seminar 20071207
Cs seminar 20071207Todd Deshane
 
June 2010 Cis Workshop Class
June 2010 Cis Workshop ClassJune 2010 Cis Workshop Class
June 2010 Cis Workshop Class
DaMotivator
 

What's hot (6)

Get rid of results hub virus
Get rid of results hub virusGet rid of results hub virus
Get rid of results hub virus
 
Restore From Trash Mac are Now Possible
Restore From Trash Mac are Now PossibleRestore From Trash Mac are Now Possible
Restore From Trash Mac are Now Possible
 
Free mac data recovery
Free mac data recoveryFree mac data recovery
Free mac data recovery
 
Unit 9 - Remote Desktop Assistance - Babeli
Unit 9 - Remote Desktop Assistance - BabeliUnit 9 - Remote Desktop Assistance - Babeli
Unit 9 - Remote Desktop Assistance - Babeli
 
Cs seminar 20071207
Cs seminar 20071207Cs seminar 20071207
Cs seminar 20071207
 
June 2010 Cis Workshop Class
June 2010 Cis Workshop ClassJune 2010 Cis Workshop Class
June 2010 Cis Workshop Class
 

Viewers also liked

Cyto Monster Protein Guide
Cyto Monster Protein GuideCyto Monster Protein Guide
Cyto Monster Protein Guide
X-Factor Supplements and Nutrition
 
Group 7 third_party
Group 7 third_partyGroup 7 third_party
Group 7 third_party
rjwhite023
 
http://chiropractor.inuplandlocalarea.com
http://chiropractor.inuplandlocalarea.comhttp://chiropractor.inuplandlocalarea.com
http://chiropractor.inuplandlocalarea.com
uplandchiropractor
 
Vazquez
VazquezVazquez
Vazquez
jvazquez018
 

Viewers also liked (7)

Cyto Monster Protein Guide
Cyto Monster Protein GuideCyto Monster Protein Guide
Cyto Monster Protein Guide
 
Josevp6asmat
Josevp6asmatJosevp6asmat
Josevp6asmat
 
Group 7 third_party
Group 7 third_partyGroup 7 third_party
Group 7 third_party
 
http://chiropractor.inuplandlocalarea.com
http://chiropractor.inuplandlocalarea.comhttp://chiropractor.inuplandlocalarea.com
http://chiropractor.inuplandlocalarea.com
 
Vazquez
VazquezVazquez
Vazquez
 
Profile on amino acids for body building
Profile on amino acids for body buildingProfile on amino acids for body building
Profile on amino acids for body building
 
Vazquezodf
VazquezodfVazquezodf
Vazquezodf
 

Similar to Computer class final

How to protect your computer from viruses.
How to protect your computer from viruses.How to protect your computer from viruses.
How to protect your computer from viruses.
Acageron
 
How to prevent a laptop crash
How to prevent a laptop crashHow to prevent a laptop crash
How to prevent a laptop crash
Shae
 
Thou shalt not
Thou shalt notThou shalt not
Thou shalt not
taftosterone
 
COMPUTERS ( types of viruses)
COMPUTERS ( types of viruses)COMPUTERS ( types of viruses)
COMPUTERS ( types of viruses)
Sowjanya Sampathkumar
 
Computer Security
Computer SecurityComputer Security
Computer Security
secrettub
 
Training Computer
Training ComputerTraining Computer
Training Computercmonasmith
 
14 household ways to protect your computer from viruses
14 household ways to protect your computer from viruses14 household ways to protect your computer from viruses
14 household ways to protect your computer from virusesar-rifke.com
 
How Computer Viruses Work
How Computer Viruses WorkHow Computer Viruses Work
How Computer Viruses WorkCerise Anderson
 
Malware and malicious programs
Malware and malicious programsMalware and malicious programs
Malware and malicious programs
Ammar Hasayen
 
Take Care of Your Computer Part 1 -- Disinfection Jan-19-2012
Take Care of Your Computer Part 1 -- Disinfection Jan-19-2012Take Care of Your Computer Part 1 -- Disinfection Jan-19-2012
Take Care of Your Computer Part 1 -- Disinfection Jan-19-2012
Ted Whittemore
 
virus 2014 more design 2014
virus 2014 more design 2014virus 2014 more design 2014
virus 2014 more design 2014
Shwana M
 
maintaning your computer systems
maintaning your computer systemsmaintaning your computer systems
maintaning your computer systemsGener Luis Morada
 
Unit III - Basics of Computer Science
Unit III - Basics of Computer ScienceUnit III - Basics of Computer Science
Unit III - Basics of Computer ScienceHepsijeba
 
How to fix some common laptop problems
How to fix some common laptop problemsHow to fix some common laptop problems
How to fix some common laptop problems
Abie Anarna
 
Operating systems
Operating systemsOperating systems
Operating systems
sandrahezro
 
The Veterans' Guide to Protecting Your Privacy and Staying Safe Online
The Veterans' Guide to Protecting Your Privacy and Staying Safe OnlineThe Veterans' Guide to Protecting Your Privacy and Staying Safe Online
The Veterans' Guide to Protecting Your Privacy and Staying Safe Online
Jinger Jarrett
 
June 2010 Cis Workshop Class
June 2010 Cis Workshop ClassJune 2010 Cis Workshop Class
June 2010 Cis Workshop Class
DaMotivator
 
avast 7.0.1474 license key
avast 7.0.1474 license keyavast 7.0.1474 license key
avast 7.0.1474 license keyHayWhitfield72
 

Similar to Computer class final (20)

How to protect your computer from viruses.
How to protect your computer from viruses.How to protect your computer from viruses.
How to protect your computer from viruses.
 
How to prevent a laptop crash
How to prevent a laptop crashHow to prevent a laptop crash
How to prevent a laptop crash
 
Thou shalt not
Thou shalt notThou shalt not
Thou shalt not
 
COMPUTERS ( types of viruses)
COMPUTERS ( types of viruses)COMPUTERS ( types of viruses)
COMPUTERS ( types of viruses)
 
Computer Security
Computer SecurityComputer Security
Computer Security
 
Training Computer
Training ComputerTraining Computer
Training Computer
 
14 household ways to protect your computer from viruses
14 household ways to protect your computer from viruses14 household ways to protect your computer from viruses
14 household ways to protect your computer from viruses
 
How Computer Viruses Work
How Computer Viruses WorkHow Computer Viruses Work
How Computer Viruses Work
 
Malware and malicious programs
Malware and malicious programsMalware and malicious programs
Malware and malicious programs
 
Spyware
SpywareSpyware
Spyware
 
Take Care of Your Computer Part 1 -- Disinfection Jan-19-2012
Take Care of Your Computer Part 1 -- Disinfection Jan-19-2012Take Care of Your Computer Part 1 -- Disinfection Jan-19-2012
Take Care of Your Computer Part 1 -- Disinfection Jan-19-2012
 
virus 2014 more design 2014
virus 2014 more design 2014virus 2014 more design 2014
virus 2014 more design 2014
 
maintaning your computer systems
maintaning your computer systemsmaintaning your computer systems
maintaning your computer systems
 
Sowmya
SowmyaSowmya
Sowmya
 
Unit III - Basics of Computer Science
Unit III - Basics of Computer ScienceUnit III - Basics of Computer Science
Unit III - Basics of Computer Science
 
How to fix some common laptop problems
How to fix some common laptop problemsHow to fix some common laptop problems
How to fix some common laptop problems
 
Operating systems
Operating systemsOperating systems
Operating systems
 
The Veterans' Guide to Protecting Your Privacy and Staying Safe Online
The Veterans' Guide to Protecting Your Privacy and Staying Safe OnlineThe Veterans' Guide to Protecting Your Privacy and Staying Safe Online
The Veterans' Guide to Protecting Your Privacy and Staying Safe Online
 
June 2010 Cis Workshop Class
June 2010 Cis Workshop ClassJune 2010 Cis Workshop Class
June 2010 Cis Workshop Class
 
avast 7.0.1474 license key
avast 7.0.1474 license keyavast 7.0.1474 license key
avast 7.0.1474 license key
 

Recently uploaded

State of ICS and IoT Cyber Threat Landscape Report 2024 preview
State of ICS and IoT Cyber Threat Landscape Report 2024 previewState of ICS and IoT Cyber Threat Landscape Report 2024 preview
State of ICS and IoT Cyber Threat Landscape Report 2024 preview
Prayukth K V
 
Securing your Kubernetes cluster_ a step-by-step guide to success !
Securing your Kubernetes cluster_ a step-by-step guide to success !Securing your Kubernetes cluster_ a step-by-step guide to success !
Securing your Kubernetes cluster_ a step-by-step guide to success !
KatiaHIMEUR1
 
GDG Cloud Southlake #33: Boule & Rebala: Effective AppSec in SDLC using Deplo...
GDG Cloud Southlake #33: Boule & Rebala: Effective AppSec in SDLC using Deplo...GDG Cloud Southlake #33: Boule & Rebala: Effective AppSec in SDLC using Deplo...
GDG Cloud Southlake #33: Boule & Rebala: Effective AppSec in SDLC using Deplo...
James Anderson
 
Monitoring Java Application Security with JDK Tools and JFR Events
Monitoring Java Application Security with JDK Tools and JFR EventsMonitoring Java Application Security with JDK Tools and JFR Events
Monitoring Java Application Security with JDK Tools and JFR Events
Ana-Maria Mihalceanu
 
Leading Change strategies and insights for effective change management pdf 1.pdf
Leading Change strategies and insights for effective change management pdf 1.pdfLeading Change strategies and insights for effective change management pdf 1.pdf
Leading Change strategies and insights for effective change management pdf 1.pdf
OnBoard
 
Generating a custom Ruby SDK for your web service or Rails API using Smithy
Generating a custom Ruby SDK for your web service or Rails API using SmithyGenerating a custom Ruby SDK for your web service or Rails API using Smithy
Generating a custom Ruby SDK for your web service or Rails API using Smithy
g2nightmarescribd
 
Dev Dives: Train smarter, not harder – active learning and UiPath LLMs for do...
Dev Dives: Train smarter, not harder – active learning and UiPath LLMs for do...Dev Dives: Train smarter, not harder – active learning and UiPath LLMs for do...
Dev Dives: Train smarter, not harder – active learning and UiPath LLMs for do...
UiPathCommunity
 
Unsubscribed: Combat Subscription Fatigue With a Membership Mentality by Head...
Unsubscribed: Combat Subscription Fatigue With a Membership Mentality by Head...Unsubscribed: Combat Subscription Fatigue With a Membership Mentality by Head...
Unsubscribed: Combat Subscription Fatigue With a Membership Mentality by Head...
Product School
 
De-mystifying Zero to One: Design Informed Techniques for Greenfield Innovati...
De-mystifying Zero to One: Design Informed Techniques for Greenfield Innovati...De-mystifying Zero to One: Design Informed Techniques for Greenfield Innovati...
De-mystifying Zero to One: Design Informed Techniques for Greenfield Innovati...
Product School
 
GraphRAG is All You need? LLM & Knowledge Graph
GraphRAG is All You need? LLM & Knowledge GraphGraphRAG is All You need? LLM & Knowledge Graph
GraphRAG is All You need? LLM & Knowledge Graph
Guy Korland
 
FIDO Alliance Osaka Seminar: Passkeys at Amazon.pdf
FIDO Alliance Osaka Seminar: Passkeys at Amazon.pdfFIDO Alliance Osaka Seminar: Passkeys at Amazon.pdf
FIDO Alliance Osaka Seminar: Passkeys at Amazon.pdf
FIDO Alliance
 
Assuring Contact Center Experiences for Your Customers With ThousandEyes
Assuring Contact Center Experiences for Your Customers With ThousandEyesAssuring Contact Center Experiences for Your Customers With ThousandEyes
Assuring Contact Center Experiences for Your Customers With ThousandEyes
ThousandEyes
 
AI for Every Business: Unlocking Your Product's Universal Potential by VP of ...
AI for Every Business: Unlocking Your Product's Universal Potential by VP of ...AI for Every Business: Unlocking Your Product's Universal Potential by VP of ...
AI for Every Business: Unlocking Your Product's Universal Potential by VP of ...
Product School
 
To Graph or Not to Graph Knowledge Graph Architectures and LLMs
To Graph or Not to Graph Knowledge Graph Architectures and LLMsTo Graph or Not to Graph Knowledge Graph Architectures and LLMs
To Graph or Not to Graph Knowledge Graph Architectures and LLMs
Paul Groth
 
Builder.ai Founder Sachin Dev Duggal's Strategic Approach to Create an Innova...
Builder.ai Founder Sachin Dev Duggal's Strategic Approach to Create an Innova...Builder.ai Founder Sachin Dev Duggal's Strategic Approach to Create an Innova...
Builder.ai Founder Sachin Dev Duggal's Strategic Approach to Create an Innova...
Ramesh Iyer
 
Kubernetes & AI - Beauty and the Beast !?! @KCD Istanbul 2024
Kubernetes & AI - Beauty and the Beast !?! @KCD Istanbul 2024Kubernetes & AI - Beauty and the Beast !?! @KCD Istanbul 2024
Kubernetes & AI - Beauty and the Beast !?! @KCD Istanbul 2024
Tobias Schneck
 
Software Delivery At the Speed of AI: Inflectra Invests In AI-Powered Quality
Software Delivery At the Speed of AI: Inflectra Invests In AI-Powered QualitySoftware Delivery At the Speed of AI: Inflectra Invests In AI-Powered Quality
Software Delivery At the Speed of AI: Inflectra Invests In AI-Powered Quality
Inflectra
 
UiPath Test Automation using UiPath Test Suite series, part 4
UiPath Test Automation using UiPath Test Suite series, part 4UiPath Test Automation using UiPath Test Suite series, part 4
UiPath Test Automation using UiPath Test Suite series, part 4
DianaGray10
 
Transcript: Selling digital books in 2024: Insights from industry leaders - T...
Transcript: Selling digital books in 2024: Insights from industry leaders - T...Transcript: Selling digital books in 2024: Insights from industry leaders - T...
Transcript: Selling digital books in 2024: Insights from industry leaders - T...
BookNet Canada
 
When stars align: studies in data quality, knowledge graphs, and machine lear...
When stars align: studies in data quality, knowledge graphs, and machine lear...When stars align: studies in data quality, knowledge graphs, and machine lear...
When stars align: studies in data quality, knowledge graphs, and machine lear...
Elena Simperl
 

Recently uploaded (20)

State of ICS and IoT Cyber Threat Landscape Report 2024 preview
State of ICS and IoT Cyber Threat Landscape Report 2024 previewState of ICS and IoT Cyber Threat Landscape Report 2024 preview
State of ICS and IoT Cyber Threat Landscape Report 2024 preview
 
Securing your Kubernetes cluster_ a step-by-step guide to success !
Securing your Kubernetes cluster_ a step-by-step guide to success !Securing your Kubernetes cluster_ a step-by-step guide to success !
Securing your Kubernetes cluster_ a step-by-step guide to success !
 
GDG Cloud Southlake #33: Boule & Rebala: Effective AppSec in SDLC using Deplo...
GDG Cloud Southlake #33: Boule & Rebala: Effective AppSec in SDLC using Deplo...GDG Cloud Southlake #33: Boule & Rebala: Effective AppSec in SDLC using Deplo...
GDG Cloud Southlake #33: Boule & Rebala: Effective AppSec in SDLC using Deplo...
 
Monitoring Java Application Security with JDK Tools and JFR Events
Monitoring Java Application Security with JDK Tools and JFR EventsMonitoring Java Application Security with JDK Tools and JFR Events
Monitoring Java Application Security with JDK Tools and JFR Events
 
Leading Change strategies and insights for effective change management pdf 1.pdf
Leading Change strategies and insights for effective change management pdf 1.pdfLeading Change strategies and insights for effective change management pdf 1.pdf
Leading Change strategies and insights for effective change management pdf 1.pdf
 
Generating a custom Ruby SDK for your web service or Rails API using Smithy
Generating a custom Ruby SDK for your web service or Rails API using SmithyGenerating a custom Ruby SDK for your web service or Rails API using Smithy
Generating a custom Ruby SDK for your web service or Rails API using Smithy
 
Dev Dives: Train smarter, not harder – active learning and UiPath LLMs for do...
Dev Dives: Train smarter, not harder – active learning and UiPath LLMs for do...Dev Dives: Train smarter, not harder – active learning and UiPath LLMs for do...
Dev Dives: Train smarter, not harder – active learning and UiPath LLMs for do...
 
Unsubscribed: Combat Subscription Fatigue With a Membership Mentality by Head...
Unsubscribed: Combat Subscription Fatigue With a Membership Mentality by Head...Unsubscribed: Combat Subscription Fatigue With a Membership Mentality by Head...
Unsubscribed: Combat Subscription Fatigue With a Membership Mentality by Head...
 
De-mystifying Zero to One: Design Informed Techniques for Greenfield Innovati...
De-mystifying Zero to One: Design Informed Techniques for Greenfield Innovati...De-mystifying Zero to One: Design Informed Techniques for Greenfield Innovati...
De-mystifying Zero to One: Design Informed Techniques for Greenfield Innovati...
 
GraphRAG is All You need? LLM & Knowledge Graph
GraphRAG is All You need? LLM & Knowledge GraphGraphRAG is All You need? LLM & Knowledge Graph
GraphRAG is All You need? LLM & Knowledge Graph
 
FIDO Alliance Osaka Seminar: Passkeys at Amazon.pdf
FIDO Alliance Osaka Seminar: Passkeys at Amazon.pdfFIDO Alliance Osaka Seminar: Passkeys at Amazon.pdf
FIDO Alliance Osaka Seminar: Passkeys at Amazon.pdf
 
Assuring Contact Center Experiences for Your Customers With ThousandEyes
Assuring Contact Center Experiences for Your Customers With ThousandEyesAssuring Contact Center Experiences for Your Customers With ThousandEyes
Assuring Contact Center Experiences for Your Customers With ThousandEyes
 
AI for Every Business: Unlocking Your Product's Universal Potential by VP of ...
AI for Every Business: Unlocking Your Product's Universal Potential by VP of ...AI for Every Business: Unlocking Your Product's Universal Potential by VP of ...
AI for Every Business: Unlocking Your Product's Universal Potential by VP of ...
 
To Graph or Not to Graph Knowledge Graph Architectures and LLMs
To Graph or Not to Graph Knowledge Graph Architectures and LLMsTo Graph or Not to Graph Knowledge Graph Architectures and LLMs
To Graph or Not to Graph Knowledge Graph Architectures and LLMs
 
Builder.ai Founder Sachin Dev Duggal's Strategic Approach to Create an Innova...
Builder.ai Founder Sachin Dev Duggal's Strategic Approach to Create an Innova...Builder.ai Founder Sachin Dev Duggal's Strategic Approach to Create an Innova...
Builder.ai Founder Sachin Dev Duggal's Strategic Approach to Create an Innova...
 
Kubernetes & AI - Beauty and the Beast !?! @KCD Istanbul 2024
Kubernetes & AI - Beauty and the Beast !?! @KCD Istanbul 2024Kubernetes & AI - Beauty and the Beast !?! @KCD Istanbul 2024
Kubernetes & AI - Beauty and the Beast !?! @KCD Istanbul 2024
 
Software Delivery At the Speed of AI: Inflectra Invests In AI-Powered Quality
Software Delivery At the Speed of AI: Inflectra Invests In AI-Powered QualitySoftware Delivery At the Speed of AI: Inflectra Invests In AI-Powered Quality
Software Delivery At the Speed of AI: Inflectra Invests In AI-Powered Quality
 
UiPath Test Automation using UiPath Test Suite series, part 4
UiPath Test Automation using UiPath Test Suite series, part 4UiPath Test Automation using UiPath Test Suite series, part 4
UiPath Test Automation using UiPath Test Suite series, part 4
 
Transcript: Selling digital books in 2024: Insights from industry leaders - T...
Transcript: Selling digital books in 2024: Insights from industry leaders - T...Transcript: Selling digital books in 2024: Insights from industry leaders - T...
Transcript: Selling digital books in 2024: Insights from industry leaders - T...
 
When stars align: studies in data quality, knowledge graphs, and machine lear...
When stars align: studies in data quality, knowledge graphs, and machine lear...When stars align: studies in data quality, knowledge graphs, and machine lear...
When stars align: studies in data quality, knowledge graphs, and machine lear...
 

Computer class final

  • 3. The mouse will be used to click on stuff you want to open or do with the computer.  The keyboard will be used to type in programs where you can type letters, e-mail ect.
  • 4. This is the main program you have on your computer. Today windows 7 is the newest so you will want to make sure it has windows 7 or vista. These are the newest an can be upgraded as the older ones they don’t make upgrades for as this will be a monthly thing you will need to do.
  • 5. This is where you turn your computer on at it. It will depend weather or not you have a laptop or a desk top. Lap tops are movable to where u can take easly from place to place. Desk tops are to be kept on a desk as you can’t take them just anywhere or use them anywhere. (see next 2 slides)
  • 6. Monitor Computer “brain” Power button Speakers Mouse Keyboard
  • 8. Software is programs that are installed or can be installed on your computer. Some of the software are Microsoft word, power point or any kind of messenger program such as yahoo or aim messenger.
  • 9. PowerPoint view Yahoo Word view messenger view
  • 10. This is what you save your files that you create to. This can be done either in your computer or a external hard drive or disk. It is better to save them to a external one just in case your computer crashes.
  • 11. This is another kind This is an example of an called a flash drive external hard drive that that plugs into your plugs into you usb port usb port.
  • 12. This is important because. When you delet a file an send it to the recyling bin an then empty it it asked you “ are you sure you wnt to peremilty deleat this files yes or no. you would think you click yes there gone right? wrong. Files need to be deleated by somene that knows wht there doing I say this because it is illagal for someone to go thought your files while you own the computer however (next slide)
  • 13. Once you sell or give away your computer away they are no longer yours an they are legal for someone to go though. And they can do a lot of damage if they get any personal information like bank accounts passwords that u had saved in a file.
  • 14.
  • 15. You will want to get an anti virus program. There are a lot of them out there. There is trend micro, avg, and Norton. These will tell you if you go to open a file if it has a virus or not an will get rid of it before it attacks your computer. If you try to run a program it will automatically shut it down. Norton is the best there is right now it comes down to you get what you pay for. Countines on next slide
  • 16. This will also need updated once a week if not daily. You can set them to update daily an most wont slow down your computer like Norton, it will run an you won’t be able to tell its downloading updates. This will save your computer as there are new virus made everyday.
  • 18. Yes if you try to do something bad on the internet you will get caught. They all have there own ip address. This is an id tag of your computer. If you send virus o purpose or try to hack into someone’s computer an they have a ip address catcher and they get it there is a program that you can put it into an it will tell them your name address what internet provider you have.
  • 19.
  • 20. Hyper links are links that can be clicked an takes you to a web page. These are usually in blue. They can come in an e-mail or if your on a web site like (staples.com) and you click on laptop computers it will take you to a page with just them. This is also a hyper link. They are basically a short cut to another site.
  • 21. Email is pretty simple. This is how people talk to each other if they can’t call them. This is almost like a chat program but you usually don’t get a respond right away. You can email companies about products or family that don’t live in the same state there are a lot of free sites that offer it free just like the chat windows. Yahoo, aol, hotmail are just a few of them. You will need to create a name. then you will need to make a password with at least 8-10 letters. A good password will contain letters and numbers. This make it harder for someone to hack into.