SlideShare a Scribd company logo
7 Habits




  Name: Naveen Sihag
  Course:B.Tech
Common Problems

 Slow Performance
 Unable to Print
 Unable to Get Online
 Unable to Find/Launch Programs
 Unfamiliar Home Page/Search Engine
 Slow Startup/Shutdown
 I Can’t ________ Anymore
7 Habits

1. Use a Firewall
2. Backup Your Files
3. Install Windows Updates
4. Remove/Prevent Viruses
5. Remove/Prevent Spyware
6. Keep Your Computer Clean
7. Defragment Your Hard Drive
8.   Bonus: Secret 8th Habit
1: Use a Firewall
 What
   Software that prevents unauthorized access to your
    computer.
   Built into Windows.
 How
   Start > Control Panel > Windows Firewall > “On”
 Frequency
   Once
     (but check in on it)
2: Backup Your Files
 What
   Hard Drives have 100% failure rate.
   Photos, photos, photos.
 How
   Online Backup – secure, safe, reliable, cheap
     carbonite.com, xdrive.com, allmydata.com, mozy.com
   Otherwise Copy to CD/DVD’s
   Avoid “Backup/Restore” programs – iffy at best.
 Frequency
   Install Once
     Check on it weekly
3: Install Windows Updates
 What
   Windows requires updates to stay healthy
   Not always “Automatic”
 How
   Start > All Programs > Windows Update
       Or try www.update.microsoft.com
       Choose “Express”, wait for results
       Select everything, restart when prompted
       Repeat
 Frequency
   Weekly
4: Remove/Prevent Viruses
 What
   Internet Connectivity + People = Slow Computer
   Internet Connectivity + Children = Very Slow Computer
 How
   Install Anti-Virus Program
     windowsonecare.com, symantec.com, mcafee.com
   Keep Anti-Virus Program Updated
     Only as good as latest “signature”
 Frequency
   Install Once
     Check for updates Weekly
5: Remove/Prevent Spyware
 What
   Unwanted, invisible rogue software that
    changes the behavior of your computer
   Symptoms:
      Unfamiliar homepages, slow performance, pop-ups,
       strange browser toolbars
 How
   If not addressed by WindowsOneCare, Norton, etc.
      Install Ad-Aware (www.lavasoftusa.com)
      Download latest “definitions”
      Scan your system
      Remove what the scan finds
 Frequency
   Weekly
6: Keep Your Computer Clean
 What
   Bits & Pieces of unused programs, websites, etc. that
    remain on your computer and slow it down
 How
   Download CCLEANER
       www.ccleaner.com
       Install (de-select Yahoo toolbar)
       Cleaner, Issues, Tools
       Check what runs at System Startup
 Frequency
   Weekly (Check for updates)
7: Defragment Your Hard Drive
 What
   Hard Drives – like all of us - are busy and become
    fragmented (used & un-used space become entangled
    over time)
   A Fragmented Drive Slows Performance
 How
   Start > All Programs > Accessories > System Tools > Disk
    Defragmenter
     Choose “Defragment”
 Frequency
   Monthly (or more)
8: Bonus Habit
 1. Update Your Computer’s Hardware
   What
     Your computer is a collection of parts that interact with each
      other via “drivers”, “firmware”, “BIOS” etc.
     Display Drivers, Sound Cards, Printers, Monitor, etc.
   How
     dell.com, sony.com, hp.com, gateway.com, etc.
     Search for Downloads specific to your system
        Have the site determine your system # if unsure
     Compare dates of available downloads with your system –
      download individually and check performance
   Frequency
     Monthly
Questions?
Thank You

More Related Content

What's hot

Viruses novice
Viruses noviceViruses novice
Viruses novice
Sheikh Amjad Zia
 
Remove Windows Foolproof Protector Automatically From Your System
Remove Windows Foolproof Protector Automatically From Your SystemRemove Windows Foolproof Protector Automatically From Your System
Remove Windows Foolproof Protector Automatically From Your System
costamary
 
Troubleshooting Fundamentals
Troubleshooting FundamentalsTroubleshooting Fundamentals
Troubleshooting Fundamentalsisma ishak
 
Steps to fix remote desktop connection has stopped working in windows 10
Steps to fix remote desktop connection has stopped working in windows 10Steps to fix remote desktop connection has stopped working in windows 10
Steps to fix remote desktop connection has stopped working in windows 10
scarlet christer
 
Steps to fix remote desktop connection has stopped working in windows 10
Steps to fix remote desktop connection has stopped working in windows 10Steps to fix remote desktop connection has stopped working in windows 10
Steps to fix remote desktop connection has stopped working in windows 10
scarlet christer
 
How to remove malware from pc?
How to remove malware from pc?How to remove malware from pc?
How to remove malware from pc?
Patrick Presley
 
Viruses novice
Viruses noviceViruses novice
Viruses novice
Anthony Alinsod
 
How to uninstall mypc backup
How to uninstall mypc backupHow to uninstall mypc backup
How to uninstall mypc backup
coseanonans
 
Remove Windows Efficiency Accelerator - Guideline To Automatic Removal
Remove Windows Efficiency Accelerator - Guideline To Automatic RemovalRemove Windows Efficiency Accelerator - Guideline To Automatic Removal
Remove Windows Efficiency Accelerator - Guideline To Automatic Removal
costamary
 
Adware and Browser Hijacker - Symptoms and Prevention
Adware and Browser Hijacker - Symptoms and PreventionAdware and Browser Hijacker - Symptoms and Prevention
Adware and Browser Hijacker - Symptoms and Prevention
Carol Witson
 
Remove Coup alert
 Remove Coup alert Remove Coup alert
Remove Coup alert
kingh05
 
Remove Windows Antivirus PatchIn Few Simple Automtatic Steps
Remove Windows Antivirus PatchIn Few Simple Automtatic StepsRemove Windows Antivirus PatchIn Few Simple Automtatic Steps
Remove Windows Antivirus PatchIn Few Simple Automtatic Steps
costamary
 
Optimize Your Pc
Optimize Your PcOptimize Your Pc
Optimize Your Pc
Shan Sachwani
 
Error,Failure and Risk
Error,Failure and RiskError,Failure and Risk
Error,Failure and Risk
Nazrul Islam
 
4 a module virus and spyware
4 a module virus and spyware4 a module virus and spyware
4 a module virus and spywareRozell Sneede
 
glary utilities pra que serve
glary utilities pra que serveglary utilities pra que serve
glary utilities pra que serveHelbo46Helbo
 
How to prevent a laptop crash
How to prevent a laptop crashHow to prevent a laptop crash
How to prevent a laptop crash
Shae
 
How to Delete plus network.com
How to Delete plus network.comHow to Delete plus network.com
How to Delete plus network.com
mariagoel7
 

What's hot (20)

Viruses novice
Viruses noviceViruses novice
Viruses novice
 
Remove Windows Foolproof Protector Automatically From Your System
Remove Windows Foolproof Protector Automatically From Your SystemRemove Windows Foolproof Protector Automatically From Your System
Remove Windows Foolproof Protector Automatically From Your System
 
Troubleshooting Fundamentals
Troubleshooting FundamentalsTroubleshooting Fundamentals
Troubleshooting Fundamentals
 
Steps to fix remote desktop connection has stopped working in windows 10
Steps to fix remote desktop connection has stopped working in windows 10Steps to fix remote desktop connection has stopped working in windows 10
Steps to fix remote desktop connection has stopped working in windows 10
 
Steps to fix remote desktop connection has stopped working in windows 10
Steps to fix remote desktop connection has stopped working in windows 10Steps to fix remote desktop connection has stopped working in windows 10
Steps to fix remote desktop connection has stopped working in windows 10
 
How to remove malware from pc?
How to remove malware from pc?How to remove malware from pc?
How to remove malware from pc?
 
Viruses novice
Viruses noviceViruses novice
Viruses novice
 
How to uninstall mypc backup
How to uninstall mypc backupHow to uninstall mypc backup
How to uninstall mypc backup
 
Remove Windows Efficiency Accelerator - Guideline To Automatic Removal
Remove Windows Efficiency Accelerator - Guideline To Automatic RemovalRemove Windows Efficiency Accelerator - Guideline To Automatic Removal
Remove Windows Efficiency Accelerator - Guideline To Automatic Removal
 
Adware and Browser Hijacker - Symptoms and Prevention
Adware and Browser Hijacker - Symptoms and PreventionAdware and Browser Hijacker - Symptoms and Prevention
Adware and Browser Hijacker - Symptoms and Prevention
 
Remove Coup alert
 Remove Coup alert Remove Coup alert
Remove Coup alert
 
Remove Windows Antivirus PatchIn Few Simple Automtatic Steps
Remove Windows Antivirus PatchIn Few Simple Automtatic StepsRemove Windows Antivirus PatchIn Few Simple Automtatic Steps
Remove Windows Antivirus PatchIn Few Simple Automtatic Steps
 
Optimize Your Pc
Optimize Your PcOptimize Your Pc
Optimize Your Pc
 
Error,Failure and Risk
Error,Failure and RiskError,Failure and Risk
Error,Failure and Risk
 
Computer Problems
Computer ProblemsComputer Problems
Computer Problems
 
4 a module virus and spyware
4 a module virus and spyware4 a module virus and spyware
4 a module virus and spyware
 
glary utilities pra que serve
glary utilities pra que serveglary utilities pra que serve
glary utilities pra que serve
 
How to prevent a laptop crash
How to prevent a laptop crashHow to prevent a laptop crash
How to prevent a laptop crash
 
Sowmya
SowmyaSowmya
Sowmya
 
How to Delete plus network.com
How to Delete plus network.comHow to Delete plus network.com
How to Delete plus network.com
 

Viewers also liked

Handling data and probability
Handling data and probabilityHandling data and probability
Handling data and probability
Alberto Pardo Milanés
 
Администрирование сайта
Администрирование сайтаАдминистрирование сайта
Администрирование сайта
Олександр Мілютін
 
Heartbox
HeartboxHeartbox
creer je eigen social media identiteit
creer je eigen social media identiteit creer je eigen social media identiteit
creer je eigen social media identiteit
Trigger - social media marketing & training
 
20120922 social media tips & trics voor mycoachday lovendegem
20120922 social media tips & trics voor mycoachday lovendegem20120922 social media tips & trics voor mycoachday lovendegem
20120922 social media tips & trics voor mycoachday lovendegem
Trigger - social media marketing & training
 
20120927 voordracht bij marnixring waregem
20120927 voordracht bij marnixring waregem20120927 voordracht bij marnixring waregem
20120927 voordracht bij marnixring waregem
Trigger - social media marketing & training
 
16 april 2011
16 april 201116 april 2011
16 april 2011
Bussinchen
 
Unit9: Angles and Lines
Unit9: Angles and LinesUnit9: Angles and Lines
Unit9: Angles and Lines
Alberto Pardo Milanés
 

Viewers also liked (20)

Automobiles
AutomobilesAutomobiles
Automobiles
 
Handling data and probability
Handling data and probabilityHandling data and probability
Handling data and probability
 
Администрирование сайта
Администрирование сайтаАдминистрирование сайта
Администрирование сайта
 
Heartbox
HeartboxHeartbox
Heartbox
 
creer je eigen social media identiteit
creer je eigen social media identiteit creer je eigen social media identiteit
creer je eigen social media identiteit
 
20120922 social media tips & trics voor mycoachday lovendegem
20120922 social media tips & trics voor mycoachday lovendegem20120922 social media tips & trics voor mycoachday lovendegem
20120922 social media tips & trics voor mycoachday lovendegem
 
Integers
IntegersIntegers
Integers
 
Workshop linkedin
Workshop linkedinWorkshop linkedin
Workshop linkedin
 
Fuel cells
Fuel cellsFuel cells
Fuel cells
 
Nokia
NokiaNokia
Nokia
 
A 12
A 12A 12
A 12
 
Biodiesel
BiodieselBiodiesel
Biodiesel
 
Lesson1
Lesson1Lesson1
Lesson1
 
Black holes
Black holesBlack holes
Black holes
 
20120927 voordracht bij marnixring waregem
20120927 voordracht bij marnixring waregem20120927 voordracht bij marnixring waregem
20120927 voordracht bij marnixring waregem
 
The Race, INTEGERS MATHS GAME
The Race, INTEGERS MATHS GAMEThe Race, INTEGERS MATHS GAME
The Race, INTEGERS MATHS GAME
 
T4 u social media for jci trainers
T4 u   social media for jci trainersT4 u   social media for jci trainers
T4 u social media for jci trainers
 
16 april 2011
16 april 201116 april 2011
16 april 2011
 
Unit9: Angles and Lines
Unit9: Angles and LinesUnit9: Angles and Lines
Unit9: Angles and Lines
 
Marketing Portfolio
Marketing PortfolioMarketing Portfolio
Marketing Portfolio
 

Similar to Efective computing

Seven steps to great PC health (Windows)
Seven steps to great PC health (Windows)Seven steps to great PC health (Windows)
Seven steps to great PC health (Windows)
Ralf Schwoebel
 
Malware 10 minute presentation
Malware 10 minute presentationMalware 10 minute presentation
Malware 10 minute presentation
David Lombrozo
 
De-Gunking Your Computer
De-Gunking Your ComputerDe-Gunking Your Computer
De-Gunking Your Computer
JimWhite
 
Trouble shooting a computer
Trouble shooting a computerTrouble shooting a computer
Trouble shooting a computer
heidirobison
 
Computer maintenance
Computer maintenanceComputer maintenance
Computer maintenance
Danladi Gambo
 
Pcmaintenance2
Pcmaintenance2Pcmaintenance2
Pcmaintenance2
Saifuladli Yusoff
 
Top 10 PC Maintenance Tasks That You Need To Remember
Top 10 PC Maintenance Tasks That You Need To RememberTop 10 PC Maintenance Tasks That You Need To Remember
Top 10 PC Maintenance Tasks That You Need To Remember
sherireid89
 
Care & Feeding Of Your Computer
Care & Feeding Of Your ComputerCare & Feeding Of Your Computer
Care & Feeding Of Your Computer
Don Hazelwood
 
Basic Computer Skills.pptx
Basic Computer Skills.pptxBasic Computer Skills.pptx
Basic Computer Skills.pptx
ChandniK7
 
Habits for computer
Habits for computerHabits for computer
Habits for computer
Mayank Garg
 
Spyware Adware1
Spyware Adware1Spyware Adware1
Spyware Adware1
rubal_9
 
PC Maintenance Security and Troubleshooting
PC Maintenance Security and TroubleshootingPC Maintenance Security and Troubleshooting
PC Maintenance Security and Troubleshooting
The Toolbox, Inc.
 
How to Recover Files
How to Recover FilesHow to Recover Files
How to Recover Files
charlesdarvin
 
Optimize your computer for peak performance
Optimize your computer for peak performanceOptimize your computer for peak performance
Optimize your computer for peak performancepacampbell
 
DIAGNOSE AND and Troubleshoot.pptx
DIAGNOSE AND and Troubleshoot.pptxDIAGNOSE AND and Troubleshoot.pptx
DIAGNOSE AND and Troubleshoot.pptx
VincentAcapen
 
Operating System and Virus (Introduction).pptx
Operating System and Virus (Introduction).pptxOperating System and Virus (Introduction).pptx
Operating System and Virus (Introduction).pptx
DondonGoles
 
Anti-virus software and spyware
Anti-virus software and spywareAnti-virus software and spyware
Anti-virus software and spyware
dragaunus14
 

Similar to Efective computing (20)

Seven steps to great PC health (Windows)
Seven steps to great PC health (Windows)Seven steps to great PC health (Windows)
Seven steps to great PC health (Windows)
 
Computer maintenance
Computer maintenanceComputer maintenance
Computer maintenance
 
Malware 10 minute presentation
Malware 10 minute presentationMalware 10 minute presentation
Malware 10 minute presentation
 
Computer maintenance
Computer maintenanceComputer maintenance
Computer maintenance
 
De-Gunking Your Computer
De-Gunking Your ComputerDe-Gunking Your Computer
De-Gunking Your Computer
 
Trouble shooting a computer
Trouble shooting a computerTrouble shooting a computer
Trouble shooting a computer
 
Computer maintenance
Computer maintenanceComputer maintenance
Computer maintenance
 
Pcmaintenance2
Pcmaintenance2Pcmaintenance2
Pcmaintenance2
 
Top 10 PC Maintenance Tasks That You Need To Remember
Top 10 PC Maintenance Tasks That You Need To RememberTop 10 PC Maintenance Tasks That You Need To Remember
Top 10 PC Maintenance Tasks That You Need To Remember
 
Care & Feeding Of Your Computer
Care & Feeding Of Your ComputerCare & Feeding Of Your Computer
Care & Feeding Of Your Computer
 
Basic Computer Skills.pptx
Basic Computer Skills.pptxBasic Computer Skills.pptx
Basic Computer Skills.pptx
 
Habits for computer
Habits for computerHabits for computer
Habits for computer
 
Spyware Adware1
Spyware Adware1Spyware Adware1
Spyware Adware1
 
PC Maintenance Security and Troubleshooting
PC Maintenance Security and TroubleshootingPC Maintenance Security and Troubleshooting
PC Maintenance Security and Troubleshooting
 
How to Recover Files
How to Recover FilesHow to Recover Files
How to Recover Files
 
Optimize your computer for peak performance
Optimize your computer for peak performanceOptimize your computer for peak performance
Optimize your computer for peak performance
 
DIAGNOSE AND and Troubleshoot.pptx
DIAGNOSE AND and Troubleshoot.pptxDIAGNOSE AND and Troubleshoot.pptx
DIAGNOSE AND and Troubleshoot.pptx
 
Operating System and Virus (Introduction).pptx
Operating System and Virus (Introduction).pptxOperating System and Virus (Introduction).pptx
Operating System and Virus (Introduction).pptx
 
Anti-virus software and spyware
Anti-virus software and spywareAnti-virus software and spyware
Anti-virus software and spyware
 
Spywareguide1
Spywareguide1Spywareguide1
Spywareguide1
 

More from Naveen Sihag

A P J Abdul Kalam
A P J Abdul KalamA P J Abdul Kalam
A P J Abdul Kalam
Naveen Sihag
 
Rise to power adolf hitler
Rise to power adolf hitlerRise to power adolf hitler
Rise to power adolf hitler
Naveen Sihag
 
Visible light communication
Visible light communicationVisible light communication
Visible light communicationNaveen Sihag
 
Variable frequency drives
Variable frequency drivesVariable frequency drives
Variable frequency drivesNaveen Sihag
 
Touch screen technology
Touch screen technologyTouch screen technology
Touch screen technologyNaveen Sihag
 
Solids and semiconductors
Solids and semiconductorsSolids and semiconductors
Solids and semiconductorsNaveen Sihag
 
Robotics and collision detection
Robotics and   collision detectionRobotics and   collision detection
Robotics and collision detectionNaveen Sihag
 
Pulse code modulation
Pulse code modulationPulse code modulation
Pulse code modulationNaveen Sihag
 

More from Naveen Sihag (20)

A P J Abdul Kalam
A P J Abdul KalamA P J Abdul Kalam
A P J Abdul Kalam
 
Rise to power adolf hitler
Rise to power adolf hitlerRise to power adolf hitler
Rise to power adolf hitler
 
Networking
NetworkingNetworking
Networking
 
Bluetooth 1
Bluetooth 1Bluetooth 1
Bluetooth 1
 
Black holes
Black holesBlack holes
Black holes
 
Bluetooth 1
Bluetooth 1Bluetooth 1
Bluetooth 1
 
Visible light communication
Visible light communicationVisible light communication
Visible light communication
 
Variable frequency drives
Variable frequency drivesVariable frequency drives
Variable frequency drives
 
Usb
UsbUsb
Usb
 
Transducers
TransducersTransducers
Transducers
 
Touch screen technology
Touch screen technologyTouch screen technology
Touch screen technology
 
Solids and semiconductors
Solids and semiconductorsSolids and semiconductors
Solids and semiconductors
 
Sms &mms
Sms &mmsSms &mms
Sms &mms
 
Robotics and collision detection
Robotics and   collision detectionRobotics and   collision detection
Robotics and collision detection
 
Renewable energy
Renewable energyRenewable energy
Renewable energy
 
Red tacton
Red tactonRed tacton
Red tacton
 
Pulse code modulation
Pulse code modulationPulse code modulation
Pulse code modulation
 
Paper battery
Paper batteryPaper battery
Paper battery
 
Osi
OsiOsi
Osi
 
Multiplexing
MultiplexingMultiplexing
Multiplexing
 

Recently uploaded

Securing your Kubernetes cluster_ a step-by-step guide to success !
Securing your Kubernetes cluster_ a step-by-step guide to success !Securing your Kubernetes cluster_ a step-by-step guide to success !
Securing your Kubernetes cluster_ a step-by-step guide to success !
KatiaHIMEUR1
 
Connector Corner: Automate dynamic content and events by pushing a button
Connector Corner: Automate dynamic content and events by pushing a buttonConnector Corner: Automate dynamic content and events by pushing a button
Connector Corner: Automate dynamic content and events by pushing a button
DianaGray10
 
Knowledge engineering: from people to machines and back
Knowledge engineering: from people to machines and backKnowledge engineering: from people to machines and back
Knowledge engineering: from people to machines and back
Elena Simperl
 
The Future of Platform Engineering
The Future of Platform EngineeringThe Future of Platform Engineering
The Future of Platform Engineering
Jemma Hussein Allen
 
Encryption in Microsoft 365 - ExpertsLive Netherlands 2024
Encryption in Microsoft 365 - ExpertsLive Netherlands 2024Encryption in Microsoft 365 - ExpertsLive Netherlands 2024
Encryption in Microsoft 365 - ExpertsLive Netherlands 2024
Albert Hoitingh
 
Elevating Tactical DDD Patterns Through Object Calisthenics
Elevating Tactical DDD Patterns Through Object CalisthenicsElevating Tactical DDD Patterns Through Object Calisthenics
Elevating Tactical DDD Patterns Through Object Calisthenics
Dorra BARTAGUIZ
 
Monitoring Java Application Security with JDK Tools and JFR Events
Monitoring Java Application Security with JDK Tools and JFR EventsMonitoring Java Application Security with JDK Tools and JFR Events
Monitoring Java Application Security with JDK Tools and JFR Events
Ana-Maria Mihalceanu
 
Empowering NextGen Mobility via Large Action Model Infrastructure (LAMI): pav...
Empowering NextGen Mobility via Large Action Model Infrastructure (LAMI): pav...Empowering NextGen Mobility via Large Action Model Infrastructure (LAMI): pav...
Empowering NextGen Mobility via Large Action Model Infrastructure (LAMI): pav...
Thierry Lestable
 
UiPath Test Automation using UiPath Test Suite series, part 3
UiPath Test Automation using UiPath Test Suite series, part 3UiPath Test Automation using UiPath Test Suite series, part 3
UiPath Test Automation using UiPath Test Suite series, part 3
DianaGray10
 
Dev Dives: Train smarter, not harder – active learning and UiPath LLMs for do...
Dev Dives: Train smarter, not harder – active learning and UiPath LLMs for do...Dev Dives: Train smarter, not harder – active learning and UiPath LLMs for do...
Dev Dives: Train smarter, not harder – active learning and UiPath LLMs for do...
UiPathCommunity
 
FIDO Alliance Osaka Seminar: Overview.pdf
FIDO Alliance Osaka Seminar: Overview.pdfFIDO Alliance Osaka Seminar: Overview.pdf
FIDO Alliance Osaka Seminar: Overview.pdf
FIDO Alliance
 
From Siloed Products to Connected Ecosystem: Building a Sustainable and Scala...
From Siloed Products to Connected Ecosystem: Building a Sustainable and Scala...From Siloed Products to Connected Ecosystem: Building a Sustainable and Scala...
From Siloed Products to Connected Ecosystem: Building a Sustainable and Scala...
Product School
 
Neuro-symbolic is not enough, we need neuro-*semantic*
Neuro-symbolic is not enough, we need neuro-*semantic*Neuro-symbolic is not enough, we need neuro-*semantic*
Neuro-symbolic is not enough, we need neuro-*semantic*
Frank van Harmelen
 
Assuring Contact Center Experiences for Your Customers With ThousandEyes
Assuring Contact Center Experiences for Your Customers With ThousandEyesAssuring Contact Center Experiences for Your Customers With ThousandEyes
Assuring Contact Center Experiences for Your Customers With ThousandEyes
ThousandEyes
 
Smart TV Buyer Insights Survey 2024 by 91mobiles.pdf
Smart TV Buyer Insights Survey 2024 by 91mobiles.pdfSmart TV Buyer Insights Survey 2024 by 91mobiles.pdf
Smart TV Buyer Insights Survey 2024 by 91mobiles.pdf
91mobiles
 
AI for Every Business: Unlocking Your Product's Universal Potential by VP of ...
AI for Every Business: Unlocking Your Product's Universal Potential by VP of ...AI for Every Business: Unlocking Your Product's Universal Potential by VP of ...
AI for Every Business: Unlocking Your Product's Universal Potential by VP of ...
Product School
 
Epistemic Interaction - tuning interfaces to provide information for AI support
Epistemic Interaction - tuning interfaces to provide information for AI supportEpistemic Interaction - tuning interfaces to provide information for AI support
Epistemic Interaction - tuning interfaces to provide information for AI support
Alan Dix
 
GDG Cloud Southlake #33: Boule & Rebala: Effective AppSec in SDLC using Deplo...
GDG Cloud Southlake #33: Boule & Rebala: Effective AppSec in SDLC using Deplo...GDG Cloud Southlake #33: Boule & Rebala: Effective AppSec in SDLC using Deplo...
GDG Cloud Southlake #33: Boule & Rebala: Effective AppSec in SDLC using Deplo...
James Anderson
 
FIDO Alliance Osaka Seminar: The WebAuthn API and Discoverable Credentials.pdf
FIDO Alliance Osaka Seminar: The WebAuthn API and Discoverable Credentials.pdfFIDO Alliance Osaka Seminar: The WebAuthn API and Discoverable Credentials.pdf
FIDO Alliance Osaka Seminar: The WebAuthn API and Discoverable Credentials.pdf
FIDO Alliance
 
Designing Great Products: The Power of Design and Leadership by Chief Designe...
Designing Great Products: The Power of Design and Leadership by Chief Designe...Designing Great Products: The Power of Design and Leadership by Chief Designe...
Designing Great Products: The Power of Design and Leadership by Chief Designe...
Product School
 

Recently uploaded (20)

Securing your Kubernetes cluster_ a step-by-step guide to success !
Securing your Kubernetes cluster_ a step-by-step guide to success !Securing your Kubernetes cluster_ a step-by-step guide to success !
Securing your Kubernetes cluster_ a step-by-step guide to success !
 
Connector Corner: Automate dynamic content and events by pushing a button
Connector Corner: Automate dynamic content and events by pushing a buttonConnector Corner: Automate dynamic content and events by pushing a button
Connector Corner: Automate dynamic content and events by pushing a button
 
Knowledge engineering: from people to machines and back
Knowledge engineering: from people to machines and backKnowledge engineering: from people to machines and back
Knowledge engineering: from people to machines and back
 
The Future of Platform Engineering
The Future of Platform EngineeringThe Future of Platform Engineering
The Future of Platform Engineering
 
Encryption in Microsoft 365 - ExpertsLive Netherlands 2024
Encryption in Microsoft 365 - ExpertsLive Netherlands 2024Encryption in Microsoft 365 - ExpertsLive Netherlands 2024
Encryption in Microsoft 365 - ExpertsLive Netherlands 2024
 
Elevating Tactical DDD Patterns Through Object Calisthenics
Elevating Tactical DDD Patterns Through Object CalisthenicsElevating Tactical DDD Patterns Through Object Calisthenics
Elevating Tactical DDD Patterns Through Object Calisthenics
 
Monitoring Java Application Security with JDK Tools and JFR Events
Monitoring Java Application Security with JDK Tools and JFR EventsMonitoring Java Application Security with JDK Tools and JFR Events
Monitoring Java Application Security with JDK Tools and JFR Events
 
Empowering NextGen Mobility via Large Action Model Infrastructure (LAMI): pav...
Empowering NextGen Mobility via Large Action Model Infrastructure (LAMI): pav...Empowering NextGen Mobility via Large Action Model Infrastructure (LAMI): pav...
Empowering NextGen Mobility via Large Action Model Infrastructure (LAMI): pav...
 
UiPath Test Automation using UiPath Test Suite series, part 3
UiPath Test Automation using UiPath Test Suite series, part 3UiPath Test Automation using UiPath Test Suite series, part 3
UiPath Test Automation using UiPath Test Suite series, part 3
 
Dev Dives: Train smarter, not harder – active learning and UiPath LLMs for do...
Dev Dives: Train smarter, not harder – active learning and UiPath LLMs for do...Dev Dives: Train smarter, not harder – active learning and UiPath LLMs for do...
Dev Dives: Train smarter, not harder – active learning and UiPath LLMs for do...
 
FIDO Alliance Osaka Seminar: Overview.pdf
FIDO Alliance Osaka Seminar: Overview.pdfFIDO Alliance Osaka Seminar: Overview.pdf
FIDO Alliance Osaka Seminar: Overview.pdf
 
From Siloed Products to Connected Ecosystem: Building a Sustainable and Scala...
From Siloed Products to Connected Ecosystem: Building a Sustainable and Scala...From Siloed Products to Connected Ecosystem: Building a Sustainable and Scala...
From Siloed Products to Connected Ecosystem: Building a Sustainable and Scala...
 
Neuro-symbolic is not enough, we need neuro-*semantic*
Neuro-symbolic is not enough, we need neuro-*semantic*Neuro-symbolic is not enough, we need neuro-*semantic*
Neuro-symbolic is not enough, we need neuro-*semantic*
 
Assuring Contact Center Experiences for Your Customers With ThousandEyes
Assuring Contact Center Experiences for Your Customers With ThousandEyesAssuring Contact Center Experiences for Your Customers With ThousandEyes
Assuring Contact Center Experiences for Your Customers With ThousandEyes
 
Smart TV Buyer Insights Survey 2024 by 91mobiles.pdf
Smart TV Buyer Insights Survey 2024 by 91mobiles.pdfSmart TV Buyer Insights Survey 2024 by 91mobiles.pdf
Smart TV Buyer Insights Survey 2024 by 91mobiles.pdf
 
AI for Every Business: Unlocking Your Product's Universal Potential by VP of ...
AI for Every Business: Unlocking Your Product's Universal Potential by VP of ...AI for Every Business: Unlocking Your Product's Universal Potential by VP of ...
AI for Every Business: Unlocking Your Product's Universal Potential by VP of ...
 
Epistemic Interaction - tuning interfaces to provide information for AI support
Epistemic Interaction - tuning interfaces to provide information for AI supportEpistemic Interaction - tuning interfaces to provide information for AI support
Epistemic Interaction - tuning interfaces to provide information for AI support
 
GDG Cloud Southlake #33: Boule & Rebala: Effective AppSec in SDLC using Deplo...
GDG Cloud Southlake #33: Boule & Rebala: Effective AppSec in SDLC using Deplo...GDG Cloud Southlake #33: Boule & Rebala: Effective AppSec in SDLC using Deplo...
GDG Cloud Southlake #33: Boule & Rebala: Effective AppSec in SDLC using Deplo...
 
FIDO Alliance Osaka Seminar: The WebAuthn API and Discoverable Credentials.pdf
FIDO Alliance Osaka Seminar: The WebAuthn API and Discoverable Credentials.pdfFIDO Alliance Osaka Seminar: The WebAuthn API and Discoverable Credentials.pdf
FIDO Alliance Osaka Seminar: The WebAuthn API and Discoverable Credentials.pdf
 
Designing Great Products: The Power of Design and Leadership by Chief Designe...
Designing Great Products: The Power of Design and Leadership by Chief Designe...Designing Great Products: The Power of Design and Leadership by Chief Designe...
Designing Great Products: The Power of Design and Leadership by Chief Designe...
 

Efective computing

  • 1. 7 Habits Name: Naveen Sihag Course:B.Tech
  • 2. Common Problems  Slow Performance  Unable to Print  Unable to Get Online  Unable to Find/Launch Programs  Unfamiliar Home Page/Search Engine  Slow Startup/Shutdown  I Can’t ________ Anymore
  • 3. 7 Habits 1. Use a Firewall 2. Backup Your Files 3. Install Windows Updates 4. Remove/Prevent Viruses 5. Remove/Prevent Spyware 6. Keep Your Computer Clean 7. Defragment Your Hard Drive 8. Bonus: Secret 8th Habit
  • 4. 1: Use a Firewall  What  Software that prevents unauthorized access to your computer.  Built into Windows.  How  Start > Control Panel > Windows Firewall > “On”  Frequency  Once  (but check in on it)
  • 5. 2: Backup Your Files  What  Hard Drives have 100% failure rate.  Photos, photos, photos.  How  Online Backup – secure, safe, reliable, cheap  carbonite.com, xdrive.com, allmydata.com, mozy.com  Otherwise Copy to CD/DVD’s  Avoid “Backup/Restore” programs – iffy at best.  Frequency  Install Once  Check on it weekly
  • 6. 3: Install Windows Updates  What  Windows requires updates to stay healthy  Not always “Automatic”  How  Start > All Programs > Windows Update  Or try www.update.microsoft.com  Choose “Express”, wait for results  Select everything, restart when prompted  Repeat  Frequency  Weekly
  • 7. 4: Remove/Prevent Viruses  What  Internet Connectivity + People = Slow Computer  Internet Connectivity + Children = Very Slow Computer  How  Install Anti-Virus Program  windowsonecare.com, symantec.com, mcafee.com  Keep Anti-Virus Program Updated  Only as good as latest “signature”  Frequency  Install Once  Check for updates Weekly
  • 8. 5: Remove/Prevent Spyware  What  Unwanted, invisible rogue software that changes the behavior of your computer  Symptoms:  Unfamiliar homepages, slow performance, pop-ups, strange browser toolbars  How  If not addressed by WindowsOneCare, Norton, etc.  Install Ad-Aware (www.lavasoftusa.com)  Download latest “definitions”  Scan your system  Remove what the scan finds  Frequency  Weekly
  • 9. 6: Keep Your Computer Clean  What  Bits & Pieces of unused programs, websites, etc. that remain on your computer and slow it down  How  Download CCLEANER  www.ccleaner.com  Install (de-select Yahoo toolbar)  Cleaner, Issues, Tools  Check what runs at System Startup  Frequency  Weekly (Check for updates)
  • 10. 7: Defragment Your Hard Drive  What  Hard Drives – like all of us - are busy and become fragmented (used & un-used space become entangled over time)  A Fragmented Drive Slows Performance  How  Start > All Programs > Accessories > System Tools > Disk Defragmenter  Choose “Defragment”  Frequency  Monthly (or more)
  • 11. 8: Bonus Habit  1. Update Your Computer’s Hardware  What  Your computer is a collection of parts that interact with each other via “drivers”, “firmware”, “BIOS” etc.  Display Drivers, Sound Cards, Printers, Monitor, etc.  How  dell.com, sony.com, hp.com, gateway.com, etc.  Search for Downloads specific to your system  Have the site determine your system # if unsure  Compare dates of available downloads with your system – download individually and check performance  Frequency  Monthly

Editor's Notes

  1. 04/09/13
  2. 04/09/13
  3. 04/09/13
  4. 04/09/13
  5. 04/09/13
  6. 04/09/13
  7. 04/09/13
  8. 04/09/13
  9. 04/09/13
  10. 04/09/13
  11. 04/09/13
  12. 04/09/13
  13. 04/09/13