SlideShare a Scribd company logo
Learning to do more with your computer.
Intermediate Computer Skills
 Ctrl+Alt+Del
 Using External Devices
 Creating, organizing and moving files
 Installing and uninstalling programs
 Running updates
 Understanding Microsoft Application Basics
 Protecting your computer
Ctrl + Alt + Del
 Opens Task Manager or Windows Securities
depending on the operating system
 Allows you to manage your computer if problems with
programs or malware arise.
 Safely restarts or shuts off your computer.
 Closes programs that are locked or are experiencing
problems without having to restart the entire
computer.
 Use Ctrl+Alt+Del instead of just turning off the
computer with the Power button.
Using External Devices
 Any component that is
used in conjunction
with the main
processing unit.
 Also referred to as
peripheral hardware
 Connects via USB cord
or wireless signal
Using External Devices
 When first connected, a device driver (software) is
installed on the computer, either manually or
automatically.
 If you are not prompted to install a driver or it does not
automatically download, they can usually be found via
the internet. Only download from trusted sites.
 Devices can be accessed via the Start menu, usually
from Computer or Devices and Printers.
 Drivers can be accessed via Start -> Control Panel ->
Programs or by searching drivers at the Start menu.
Using External Devices
Types of external devices:
 Removable storage (flash
drives, disk drives, iPod, etc.)
 Non-removable storage
(external hard drives)
 Input
(mouse, keyboard, touch
screen, scanner, etc.)
 Output
(monitor, speakers, TV, print
er)
Managing Files
 A File is a resource for storing
and sharing information and
is used in conjunction with a
Computer Program.
 Codes are used to determine
the file type.
 A list of common file types is
available at:
http://mistupid.com/comput
ers/filetypes.htm
Managing Files
 Common File types include
 Microsoft files: doc, ppt, xls, pub
 Audio files: mp3, wma, wva
 Picture files:
jpg, tiff, bmp, gif, png, pic, etc.
 Adobe files: pdf, ePub
 Video files: asf, avi, swf, mov
 Rich text files: rtf
 Html files: htm
 Compressed files: zip
Managing Files
 Files are created when info that has been entered into
a program or peripheral is saved either to the computer
or to a device.
 Some files are temporarily stored on the computer, and
will later disappear or become unavailable.
 The destination of the saved file and the file type are
determined when the file is created.
 Multiple file types can be created from the original.
Managing Files
 Each file type requires a specific kind of program to
read it.
 In some cases, files can be converted to allow for
program compatibility or to fit the intended use.
 Free file converters are available online:
 www.file-convert.com
 www.freefileconvert.com
 http://www.zamzar.com/
Managing Files
 Files can be moved, copied, and organized.
 To move a file, drag and drop it from one location to
another.
 To copy a file, right click the file and Copy, then paste it
to the desired location.
 To send a file to another location, right click the file and
Send to the desired destination.
 To create a folder, right click in the window and
New->Folder.
 To name your file, right click the file and Rename file.
Managing files
 Files can be deleted from devices and computers.
 Right click the file and Delete. If prompted, confirm by
clicking Yes.
 Files stored on a computer are sent to the recycle bin. To
permanently delete the file, you must delete it from the
recycle bin.
 Files on flash drives, etc., are permanently deleted.
 When files on a computer are deleted, they are
inaccessible, yet the info still technically exists until it
is overwritten with new information. This is where
computer forensics comes into play.
Managing Programs
 Computer Programs are a set of instructions provided
to a computer, which then executes the instructions.
 Computer Programs are made up of Source
Code, which are analyzed and developed by
programmers.
 There are two main types of programs
 System Software – operates and controls a computer
(i.e.: operating systems, drivers, utilities)
 Application Software (apps)– performs useful tasks (i.e.:
Microsoft office, media players, games)
 System Software is to necessary as Application Software
is to useful.
Managing Programs
 All programs written for
Windows can be found on your
computer via Start->Control
Panel -> Programs
 Programs can be obtained via
the internet or through disks.
 Only download programs from
trusted sources.
 Research new programs and
read reviews before
downloading.
Managing Programs
 Your computer comes equipped with a program to
manage installation.
 Prior to installing/purchase, you should check the
system requirements for compatibility (Start ->
Control Panel -> System and Security -> System).
 Usually you will be prompted to Install the
program, and then to Run the installation process.
 After installation, you may be asked to configure
program defaults, to verify product activation using a
license key, or to Finalize/Close.
Managing Programs
 Most common types of
installation processes:
 Attended – requires a user who
attends to the process and makes
choices.
 Silent – occurs without any
notification or windows.
Malware almost always installs
this way.
 Scheduled/Automated – runs
when scheduled (i.e.: updates) or
automatically (i.e.: device
drives).
Managing Programs
 You may uninstall programs if they are no longer used
or you want to free up space.
 To access programs written for Windows, go to Start ->
Control Panel -> Programs -> Programs and Features
-> Uninstall
 If the program is not listed, see the creator’s
instructions or search the computer for the program
files via Start.
 Select the program, click Uninstall and follow
prompts.
Managing Programs
 Some programs provide the option to Change or Repair:
 Change will allow you uninstall portions of the program or set
program defaults.
 Repair will diagnose and attempt to fix problems with
corrupted programs.
 If a program is behaving badly or experiencing
problems, and Repair is not an option, you may try
uninstalling and reinstalling to correct the issue.
 Corruption occurs when unintended changes are made to
the program during one of the program’s various processes.
Updating
 Changes and enhancements
that are intended to make
programs run better and
defend against malware and
attacks.
 Can be done manually or
automatically.
 Available for operating
systems and software.
Updating
 Automatic: system
updates will install as they
become available.
 Start -> Control Panel ->
System and Security ->
Windows Update ->
Change Settings
 You can configure when
the updates take place.
You must be logged on to
your computer. Usually
requires a restart.
Updating
 Manual: updates that are
initiated directly by you.
 For Windows updates:
go to Start -> All
Programs -> Windows
Update -> Check
Computer for Updates
(install update software
if needed)
 Select updates to install
 Restart computer
Updating
 Programs: most often need
to be initiated by you or
through pop-up reminders.
 Program updates can
usually be found at the
company’s website. (i.e.:
Adobe products via
http://www.adobe.com/do
wnloads/updates.html)
 Utilize search engines to
find program updates, but
make sure you are using a
trusted source.
Microsoft Apps
 Most commonly used:
 WORD – Word processing
software
 EXCEL – Spreadsheet software
 POWER POINT –
Presentation software
 PUBLISHER – Publication
software
Microsoft Apps - Word
Use for writing reports, sending letters, creating resumes
printing labels and envelopes, mass mailings, etc…
 Home: Basic formatting such as font and size, text
alignment, automatic formatting, text color…
 Insert: Inserts new
pages, tables, pictures, links, footers &
headers, equations, symbols…
 Page Layout: Set themes, margins, page size, add
watermarks, change colors, insert columns…
 References: Add table of
contents, footnote, captions, endnotes, bibliography…
Microsoft Apps - Word
 Mailings: print envelopes, labels, and mail merge
(mass mailings created using excel spreadsheet).
 Review: check for errors, use the thesaurus, translate
text, make comments, protect document…
 View: change the page view via zoom, splitting
windows, view two pages at once…
 Acrobat: Convert files using Adobe…
 Windows button: Save, print, open, create new…
Microsoft Apps - Excel
Use for creating spreadsheets and analyzing numbers.
 Home: Basic formatting including text, merge cells, format
cells, define numbers, insert auto sum…
 Insert: Add tables, illustrations, charts, links and text…
 Page layout: Manage the layout of your information
 Formulas: Adds formulas to your spreadsheet that will
automatically configure data
 Data: Allows external information to be inserted into the
spreadsheet
 Review, View and Acrobat tabs are nearly identical to those
in Word.
Microsoft Apps - Publisher
Use for creating newsletters, brochures, signs, etc…
 Select the type of document you wish to create
(formatted styles are available.)
 The tabs are very similar to Word, except each part of
the document exists on it’s own. This allows for
layering and layout manipulation that is not possible
in Word.
 Click or double on specific elements (text
box, picture, table) to select the item, move the item
and make changes. Right click on the selected element
to access a menu of options specific to that item.
Microsoft Apps – Power Point
Use to create presentations and slide shows. Can
incorporate music, animations and more!
 Tabs are once again very similar to Word.
 A happy mix between Word and Publisher.
For Microsoft Office Online Tutorials visit
http://office.microsoft.com/en-us/training/
Protecting Your Computer
 Hardware Security –
protection against physical
theft of a computer or
information on a computer
 Software Security – protection
against threats to the
computer’s operations and
programs
 Data Security – protection
against data theft and data
corruption
Protecting Your Computer
 Hardware Security Threat
 Information stored on your hard
drive is vulnerable to
physical/digital theft
 Info can be
stolen, misused, damaged or
destroyed
 If computer hardware is
disassembled, warranty coverage
will likely be voided
 When discarding computer or
wiping it clean, some info may
still be accessible to professionals
Protecting Your Computer
 Hardware Security Protection
 Keep your computer physically secure and under surveillance
and maybe invest in a locking system for your computer or
your drives. Specialized locks are available.
 Lock you house when you leave or keep your computer in a
safe during extended vacations. Use good passwords!
 When discarding an old computer, use a certified refurbisher
(a professional who will wipe your hard drives of all
information) or do it yourself using overwrite software. More
info is available at
http://www.microsoft.com/security/online-privacy/safely-
dispose-computers-and-devices.aspx
Protecting Your Computer
 Software Security Threat
 Denial of Service – disables use of a computer or a
service by flooding the network with too much
traffic, interrupt communication between devices, or to
disable use of a service (such as email) by the intended
user.
 Trojan Horse – malicious programs that are disguised to
be read as safe by the security software. Gives hackers
total access to the computer and/or network.
 Viruses and Worms – bad pieces of programming that
can infect and damage computer software and files. Can
replicate themselves.
Protecting Your Computer
 Software Security Threat (continued)
 Sniffing – the interception of information that is passed
between users (hacker eavesdropping)
 Spyware – malware that spies on user activity such as
searches and websites visited.
 Scareware – tries to scare the user into buying services
that are not needed, such as antivirus software
 Adware – produces a constant barrage of pop-up ads
Protecting Your Computer
 Software Security Protection
 Firewall – a filter used to prevent
malicious websites from gaining
access to your computer.
 Firewall settings can be adjusted in
Windows via Start -> Control Panel
-> Search: Firewall (upper right
hand corner) -> Windows Firewall
 http://windows.microsoft.com/en-
us/windows7/understanding-
windows-firewall-settings
Protecting Your Computer
 Software Security Protection
 Security Software – anti-virus
and security software will help
to protect your computer
 Only install one anti-virus
program otherwise they will create
problems and not work properly
 i.e.: Norton, McAfee and AVG Free
 Start -> All Programs -> Windows
Security Essentials to scan your
computer.
Protecting Your Computer
 Data Security Threat
 Hardware
malfunction results
in the loss of
important data and
files (luckily this
doesn’t happen
often.)
Protecting Your Computer
 Data Security Protection
 Backup your computer!
 Use an external hard drive to backup important files and a
full image copy of your system in the event of a crash or
complete hardware failure.
http://windows.microsoft.com/en-us/windows7/back-up-
your-programs-system-settings-and-files
 Backup using Windows via Start -> Control Panel ->
System and Maintenance -> Backup and Restore
 Setup Backup if it is your first time using Windows Backup
 Backup Now to manually backup outside of a schedule
Protecting Your Computer
 Data Security Protection
(continued)
 Run security and software updates
regularly
 Save all tech support
documents, manuals, and discs
 Use Clean-up Software to get rid of
unused files and programs.
http://www.pcworld.com/article/2
029460/panacea-or-pariah-five-
pc-cleanup-utilities-put-to-the-
test.html
This presentation can be found
online at:
Tiffany Hickox
Technical Services Librarian
thickox@cityofalliance.net

More Related Content

What's hot

Logo Programming language
Logo Programming languageLogo Programming language
Logo Programming language
Joy Protim
 
Windows Basic Computer Skills
Windows Basic Computer SkillsWindows Basic Computer Skills
Windows Basic Computer Skills
Marvin Nurse
 
Coc 1 basic computer parts
Coc 1 basic computer partsCoc 1 basic computer parts
Coc 1 basic computer parts
Sonnie Bars
 
maintain IT equipment full note.pdf
maintain IT equipment full note.pdfmaintain IT equipment full note.pdf
maintain IT equipment full note.pdf
Hailsh
 
Introduction to ms dos
Introduction to ms dosIntroduction to ms dos
Introduction to ms dos
Indika Rathninda
 
Computer Basics
Computer BasicsComputer Basics
Computer Basics 101 Slide Show Presentation
Computer Basics 101 Slide Show PresentationComputer Basics 101 Slide Show Presentation
Computer Basics 101 Slide Show Presentation
sluget
 
Computer Input and Output Devices
Computer Input and Output DevicesComputer Input and Output Devices
Computer Input and Output Devices
gtrbs123
 
Windows 10 user guide
Windows 10 user guideWindows 10 user guide
Windows 10 user guide
Abhilash Bhima
 
MS-OFFICE
MS-OFFICEMS-OFFICE
MS-OFFICE
MSND Prasad
 
Basic_Computer_Skills, A_seminar_by_Mohan_Kumar_G_Lecturer
Basic_Computer_Skills, A_seminar_by_Mohan_Kumar_G_LecturerBasic_Computer_Skills, A_seminar_by_Mohan_Kumar_G_Lecturer
Basic_Computer_Skills, A_seminar_by_Mohan_Kumar_G_Lecturer
Mohan Kumar G
 
Ms Office Powerpoint Tutorial
Ms Office Powerpoint TutorialMs Office Powerpoint Tutorial
Ms Office Powerpoint Tutorial
virtualMaryam
 
word mcq.pdf
word mcq.pdfword mcq.pdf
word mcq.pdf
Roshani Shahi
 
Basic structure of computers
Basic structure of computersBasic structure of computers
Basic structure of computers
Kumar
 
Inside The Computer
Inside The ComputerInside The Computer
Inside The Computer
Johnston Middle School
 
Central Processing Unit(CPU)
Central Processing Unit(CPU)Central Processing Unit(CPU)
Central Processing Unit(CPU)
ANSANS8
 
Word Processing
Word ProcessingWord Processing
Word Processing
hamid126
 
Basic computer fundamentals
Basic computer fundamentalsBasic computer fundamentals
Basic computer fundamentals
James Macalalad
 
ICT - Lecture Notes 3.pdf
ICT - Lecture Notes 3.pdfICT - Lecture Notes 3.pdf
ICT - Lecture Notes 3.pdf
HonKencyTress
 
Basic computer class 1
Basic computer class 1Basic computer class 1
Basic computer class 1
Carlstadt Public Library
 

What's hot (20)

Logo Programming language
Logo Programming languageLogo Programming language
Logo Programming language
 
Windows Basic Computer Skills
Windows Basic Computer SkillsWindows Basic Computer Skills
Windows Basic Computer Skills
 
Coc 1 basic computer parts
Coc 1 basic computer partsCoc 1 basic computer parts
Coc 1 basic computer parts
 
maintain IT equipment full note.pdf
maintain IT equipment full note.pdfmaintain IT equipment full note.pdf
maintain IT equipment full note.pdf
 
Introduction to ms dos
Introduction to ms dosIntroduction to ms dos
Introduction to ms dos
 
Computer Basics
Computer BasicsComputer Basics
Computer Basics
 
Computer Basics 101 Slide Show Presentation
Computer Basics 101 Slide Show PresentationComputer Basics 101 Slide Show Presentation
Computer Basics 101 Slide Show Presentation
 
Computer Input and Output Devices
Computer Input and Output DevicesComputer Input and Output Devices
Computer Input and Output Devices
 
Windows 10 user guide
Windows 10 user guideWindows 10 user guide
Windows 10 user guide
 
MS-OFFICE
MS-OFFICEMS-OFFICE
MS-OFFICE
 
Basic_Computer_Skills, A_seminar_by_Mohan_Kumar_G_Lecturer
Basic_Computer_Skills, A_seminar_by_Mohan_Kumar_G_LecturerBasic_Computer_Skills, A_seminar_by_Mohan_Kumar_G_Lecturer
Basic_Computer_Skills, A_seminar_by_Mohan_Kumar_G_Lecturer
 
Ms Office Powerpoint Tutorial
Ms Office Powerpoint TutorialMs Office Powerpoint Tutorial
Ms Office Powerpoint Tutorial
 
word mcq.pdf
word mcq.pdfword mcq.pdf
word mcq.pdf
 
Basic structure of computers
Basic structure of computersBasic structure of computers
Basic structure of computers
 
Inside The Computer
Inside The ComputerInside The Computer
Inside The Computer
 
Central Processing Unit(CPU)
Central Processing Unit(CPU)Central Processing Unit(CPU)
Central Processing Unit(CPU)
 
Word Processing
Word ProcessingWord Processing
Word Processing
 
Basic computer fundamentals
Basic computer fundamentalsBasic computer fundamentals
Basic computer fundamentals
 
ICT - Lecture Notes 3.pdf
ICT - Lecture Notes 3.pdfICT - Lecture Notes 3.pdf
ICT - Lecture Notes 3.pdf
 
Basic computer class 1
Basic computer class 1Basic computer class 1
Basic computer class 1
 

Viewers also liked

Intermediate 1 Computing studies Course Slides
Intermediate 1 Computing studies Course SlidesIntermediate 1 Computing studies Course Slides
Intermediate 1 Computing studies Course Slides
scaddell11
 
Online Budgeting
Online BudgetingOnline Budgeting
Online Budgeting
ttechlab
 
Basic computer skills test
Basic computer skills testBasic computer skills test
Basic computer skills test
Christopher Shaun Hope
 
Solving Shared Drives: 10 Tips for Cleaning Up, Organizing, and Migrating Con...
Solving Shared Drives: 10 Tips for Cleaning Up, Organizing, and Migrating Con...Solving Shared Drives: 10 Tips for Cleaning Up, Organizing, and Migrating Con...
Solving Shared Drives: 10 Tips for Cleaning Up, Organizing, and Migrating Con...
Barclay T. Blair
 
Basic computer skills
Basic computer skillsBasic computer skills
Basic computer skills
THickox
 
basics of computer system ppt
basics of computer system pptbasics of computer system ppt
basics of computer system ppt
Suaj
 

Viewers also liked (6)

Intermediate 1 Computing studies Course Slides
Intermediate 1 Computing studies Course SlidesIntermediate 1 Computing studies Course Slides
Intermediate 1 Computing studies Course Slides
 
Online Budgeting
Online BudgetingOnline Budgeting
Online Budgeting
 
Basic computer skills test
Basic computer skills testBasic computer skills test
Basic computer skills test
 
Solving Shared Drives: 10 Tips for Cleaning Up, Organizing, and Migrating Con...
Solving Shared Drives: 10 Tips for Cleaning Up, Organizing, and Migrating Con...Solving Shared Drives: 10 Tips for Cleaning Up, Organizing, and Migrating Con...
Solving Shared Drives: 10 Tips for Cleaning Up, Organizing, and Migrating Con...
 
Basic computer skills
Basic computer skillsBasic computer skills
Basic computer skills
 
basics of computer system ppt
basics of computer system pptbasics of computer system ppt
basics of computer system ppt
 

Similar to Intermediate computer skills

Care & Feeding Of Your Computer
Care & Feeding Of Your ComputerCare & Feeding Of Your Computer
Care & Feeding Of Your Computer
Don Hazelwood
 
Unit III - Basics of Computer Science
Unit III - Basics of Computer ScienceUnit III - Basics of Computer Science
Unit III - Basics of Computer Science
Hepsijeba
 
unit 3.ppt
unit 3.pptunit 3.ppt
unit 3.ppt
prakashvs7
 
Computer Notes
Computer NotesComputer Notes
Computer Notes
EHSAN KHAN
 
unit 3.pptx
unit 3.pptxunit 3.pptx
unit 3.pptx
DivyaKS12
 
Vskills c++ developer sample material
Vskills c++ developer sample materialVskills c++ developer sample material
Vskills c++ developer sample material
Vskills
 
Vskills c developer sample material
Vskills c developer sample materialVskills c developer sample material
Vskills c developer sample material
Vskills
 
SOFTWARE PARADIGM
SOFTWARE PARADIGMSOFTWARE PARADIGM
SOFTWARE PARADIGM
DrThenmozhiKarunanit
 
Software utilities p3 - unit 2
Software utilities   p3 - unit 2Software utilities   p3 - unit 2
Software utilities p3 - unit 2
Jack Bishop
 
Operating systems 2
Operating systems 2Operating systems 2
Operating systems 2
mariacalji
 
Presentation it
Presentation itPresentation it
Presentation it
nabelas
 
Operating systems
Operating systemsOperating systems
Operating systems
Tapan Khilar
 
Computer software form 4
Computer software form 4Computer software form 4
Computer software form 4
norhaslinamj
 
As media studies software and systems presentation
As media studies software and systems presentationAs media studies software and systems presentation
As media studies software and systems presentation
paddy249
 
Software.pptx
Software.pptxSoftware.pptx
Software.pptx
RabiaAsif31
 
LESSON-2.pptx
LESSON-2.pptxLESSON-2.pptx
LESSON-2.pptx
ARDEN16
 
Basic computer tutorial
Basic computer tutorialBasic computer tutorial
Basic computer tutorial
SayeedAsghar
 
Windows Security
Windows Security Windows Security
Windows Security
Pooja Talreja
 
Security
SecuritySecurity
Security
Pooja Talreja
 
What is Operating System, Utility program,virus and anti_virus
What is Operating System, Utility program,virus and anti_virusWhat is Operating System, Utility program,virus and anti_virus
What is Operating System, Utility program,virus and anti_virus
mudasserakram
 

Similar to Intermediate computer skills (20)

Care & Feeding Of Your Computer
Care & Feeding Of Your ComputerCare & Feeding Of Your Computer
Care & Feeding Of Your Computer
 
Unit III - Basics of Computer Science
Unit III - Basics of Computer ScienceUnit III - Basics of Computer Science
Unit III - Basics of Computer Science
 
unit 3.ppt
unit 3.pptunit 3.ppt
unit 3.ppt
 
Computer Notes
Computer NotesComputer Notes
Computer Notes
 
unit 3.pptx
unit 3.pptxunit 3.pptx
unit 3.pptx
 
Vskills c++ developer sample material
Vskills c++ developer sample materialVskills c++ developer sample material
Vskills c++ developer sample material
 
Vskills c developer sample material
Vskills c developer sample materialVskills c developer sample material
Vskills c developer sample material
 
SOFTWARE PARADIGM
SOFTWARE PARADIGMSOFTWARE PARADIGM
SOFTWARE PARADIGM
 
Software utilities p3 - unit 2
Software utilities   p3 - unit 2Software utilities   p3 - unit 2
Software utilities p3 - unit 2
 
Operating systems 2
Operating systems 2Operating systems 2
Operating systems 2
 
Presentation it
Presentation itPresentation it
Presentation it
 
Operating systems
Operating systemsOperating systems
Operating systems
 
Computer software form 4
Computer software form 4Computer software form 4
Computer software form 4
 
As media studies software and systems presentation
As media studies software and systems presentationAs media studies software and systems presentation
As media studies software and systems presentation
 
Software.pptx
Software.pptxSoftware.pptx
Software.pptx
 
LESSON-2.pptx
LESSON-2.pptxLESSON-2.pptx
LESSON-2.pptx
 
Basic computer tutorial
Basic computer tutorialBasic computer tutorial
Basic computer tutorial
 
Windows Security
Windows Security Windows Security
Windows Security
 
Security
SecuritySecurity
Security
 
What is Operating System, Utility program,virus and anti_virus
What is Operating System, Utility program,virus and anti_virusWhat is Operating System, Utility program,virus and anti_virus
What is Operating System, Utility program,virus and anti_virus
 

Recently uploaded

June Patch Tuesday
June Patch TuesdayJune Patch Tuesday
June Patch Tuesday
Ivanti
 
Monitoring and Managing Anomaly Detection on OpenShift.pdf
Monitoring and Managing Anomaly Detection on OpenShift.pdfMonitoring and Managing Anomaly Detection on OpenShift.pdf
Monitoring and Managing Anomaly Detection on OpenShift.pdf
Tosin Akinosho
 
20240607 QFM018 Elixir Reading List May 2024
20240607 QFM018 Elixir Reading List May 202420240607 QFM018 Elixir Reading List May 2024
20240607 QFM018 Elixir Reading List May 2024
Matthew Sinclair
 
HCL Notes und Domino Lizenzkostenreduzierung in der Welt von DLAU
HCL Notes und Domino Lizenzkostenreduzierung in der Welt von DLAUHCL Notes und Domino Lizenzkostenreduzierung in der Welt von DLAU
HCL Notes und Domino Lizenzkostenreduzierung in der Welt von DLAU
panagenda
 
Salesforce Integration for Bonterra Impact Management (fka Social Solutions A...
Salesforce Integration for Bonterra Impact Management (fka Social Solutions A...Salesforce Integration for Bonterra Impact Management (fka Social Solutions A...
Salesforce Integration for Bonterra Impact Management (fka Social Solutions A...
Jeffrey Haguewood
 
20240609 QFM020 Irresponsible AI Reading List May 2024
20240609 QFM020 Irresponsible AI Reading List May 202420240609 QFM020 Irresponsible AI Reading List May 2024
20240609 QFM020 Irresponsible AI Reading List May 2024
Matthew Sinclair
 
AI 101: An Introduction to the Basics and Impact of Artificial Intelligence
AI 101: An Introduction to the Basics and Impact of Artificial IntelligenceAI 101: An Introduction to the Basics and Impact of Artificial Intelligence
AI 101: An Introduction to the Basics and Impact of Artificial Intelligence
IndexBug
 
Recommendation System using RAG Architecture
Recommendation System using RAG ArchitectureRecommendation System using RAG Architecture
Recommendation System using RAG Architecture
fredae14
 
5th LF Energy Power Grid Model Meet-up Slides
5th LF Energy Power Grid Model Meet-up Slides5th LF Energy Power Grid Model Meet-up Slides
5th LF Energy Power Grid Model Meet-up Slides
DanBrown980551
 
Mariano G Tinti - Decoding SpaceX
Mariano G Tinti - Decoding SpaceXMariano G Tinti - Decoding SpaceX
Mariano G Tinti - Decoding SpaceX
Mariano Tinti
 
Cosa hanno in comune un mattoncino Lego e la backdoor XZ?
Cosa hanno in comune un mattoncino Lego e la backdoor XZ?Cosa hanno in comune un mattoncino Lego e la backdoor XZ?
Cosa hanno in comune un mattoncino Lego e la backdoor XZ?
Speck&Tech
 
Unlock the Future of Search with MongoDB Atlas_ Vector Search Unleashed.pdf
Unlock the Future of Search with MongoDB Atlas_ Vector Search Unleashed.pdfUnlock the Future of Search with MongoDB Atlas_ Vector Search Unleashed.pdf
Unlock the Future of Search with MongoDB Atlas_ Vector Search Unleashed.pdf
Malak Abu Hammad
 
Building Production Ready Search Pipelines with Spark and Milvus
Building Production Ready Search Pipelines with Spark and MilvusBuilding Production Ready Search Pipelines with Spark and Milvus
Building Production Ready Search Pipelines with Spark and Milvus
Zilliz
 
GraphRAG for Life Science to increase LLM accuracy
GraphRAG for Life Science to increase LLM accuracyGraphRAG for Life Science to increase LLM accuracy
GraphRAG for Life Science to increase LLM accuracy
Tomaz Bratanic
 
Ocean lotus Threat actors project by John Sitima 2024 (1).pptx
Ocean lotus Threat actors project by John Sitima 2024 (1).pptxOcean lotus Threat actors project by John Sitima 2024 (1).pptx
Ocean lotus Threat actors project by John Sitima 2024 (1).pptx
SitimaJohn
 
Programming Foundation Models with DSPy - Meetup Slides
Programming Foundation Models with DSPy - Meetup SlidesProgramming Foundation Models with DSPy - Meetup Slides
Programming Foundation Models with DSPy - Meetup Slides
Zilliz
 
Main news related to the CCS TSI 2023 (2023/1695)
Main news related to the CCS TSI 2023 (2023/1695)Main news related to the CCS TSI 2023 (2023/1695)
Main news related to the CCS TSI 2023 (2023/1695)
Jakub Marek
 
Columbus Data & Analytics Wednesdays - June 2024
Columbus Data & Analytics Wednesdays - June 2024Columbus Data & Analytics Wednesdays - June 2024
Columbus Data & Analytics Wednesdays - June 2024
Jason Packer
 
Digital Marketing Trends in 2024 | Guide for Staying Ahead
Digital Marketing Trends in 2024 | Guide for Staying AheadDigital Marketing Trends in 2024 | Guide for Staying Ahead
Digital Marketing Trends in 2024 | Guide for Staying Ahead
Wask
 
WeTestAthens: Postman's AI & Automation Techniques
WeTestAthens: Postman's AI & Automation TechniquesWeTestAthens: Postman's AI & Automation Techniques
WeTestAthens: Postman's AI & Automation Techniques
Postman
 

Recently uploaded (20)

June Patch Tuesday
June Patch TuesdayJune Patch Tuesday
June Patch Tuesday
 
Monitoring and Managing Anomaly Detection on OpenShift.pdf
Monitoring and Managing Anomaly Detection on OpenShift.pdfMonitoring and Managing Anomaly Detection on OpenShift.pdf
Monitoring and Managing Anomaly Detection on OpenShift.pdf
 
20240607 QFM018 Elixir Reading List May 2024
20240607 QFM018 Elixir Reading List May 202420240607 QFM018 Elixir Reading List May 2024
20240607 QFM018 Elixir Reading List May 2024
 
HCL Notes und Domino Lizenzkostenreduzierung in der Welt von DLAU
HCL Notes und Domino Lizenzkostenreduzierung in der Welt von DLAUHCL Notes und Domino Lizenzkostenreduzierung in der Welt von DLAU
HCL Notes und Domino Lizenzkostenreduzierung in der Welt von DLAU
 
Salesforce Integration for Bonterra Impact Management (fka Social Solutions A...
Salesforce Integration for Bonterra Impact Management (fka Social Solutions A...Salesforce Integration for Bonterra Impact Management (fka Social Solutions A...
Salesforce Integration for Bonterra Impact Management (fka Social Solutions A...
 
20240609 QFM020 Irresponsible AI Reading List May 2024
20240609 QFM020 Irresponsible AI Reading List May 202420240609 QFM020 Irresponsible AI Reading List May 2024
20240609 QFM020 Irresponsible AI Reading List May 2024
 
AI 101: An Introduction to the Basics and Impact of Artificial Intelligence
AI 101: An Introduction to the Basics and Impact of Artificial IntelligenceAI 101: An Introduction to the Basics and Impact of Artificial Intelligence
AI 101: An Introduction to the Basics and Impact of Artificial Intelligence
 
Recommendation System using RAG Architecture
Recommendation System using RAG ArchitectureRecommendation System using RAG Architecture
Recommendation System using RAG Architecture
 
5th LF Energy Power Grid Model Meet-up Slides
5th LF Energy Power Grid Model Meet-up Slides5th LF Energy Power Grid Model Meet-up Slides
5th LF Energy Power Grid Model Meet-up Slides
 
Mariano G Tinti - Decoding SpaceX
Mariano G Tinti - Decoding SpaceXMariano G Tinti - Decoding SpaceX
Mariano G Tinti - Decoding SpaceX
 
Cosa hanno in comune un mattoncino Lego e la backdoor XZ?
Cosa hanno in comune un mattoncino Lego e la backdoor XZ?Cosa hanno in comune un mattoncino Lego e la backdoor XZ?
Cosa hanno in comune un mattoncino Lego e la backdoor XZ?
 
Unlock the Future of Search with MongoDB Atlas_ Vector Search Unleashed.pdf
Unlock the Future of Search with MongoDB Atlas_ Vector Search Unleashed.pdfUnlock the Future of Search with MongoDB Atlas_ Vector Search Unleashed.pdf
Unlock the Future of Search with MongoDB Atlas_ Vector Search Unleashed.pdf
 
Building Production Ready Search Pipelines with Spark and Milvus
Building Production Ready Search Pipelines with Spark and MilvusBuilding Production Ready Search Pipelines with Spark and Milvus
Building Production Ready Search Pipelines with Spark and Milvus
 
GraphRAG for Life Science to increase LLM accuracy
GraphRAG for Life Science to increase LLM accuracyGraphRAG for Life Science to increase LLM accuracy
GraphRAG for Life Science to increase LLM accuracy
 
Ocean lotus Threat actors project by John Sitima 2024 (1).pptx
Ocean lotus Threat actors project by John Sitima 2024 (1).pptxOcean lotus Threat actors project by John Sitima 2024 (1).pptx
Ocean lotus Threat actors project by John Sitima 2024 (1).pptx
 
Programming Foundation Models with DSPy - Meetup Slides
Programming Foundation Models with DSPy - Meetup SlidesProgramming Foundation Models with DSPy - Meetup Slides
Programming Foundation Models with DSPy - Meetup Slides
 
Main news related to the CCS TSI 2023 (2023/1695)
Main news related to the CCS TSI 2023 (2023/1695)Main news related to the CCS TSI 2023 (2023/1695)
Main news related to the CCS TSI 2023 (2023/1695)
 
Columbus Data & Analytics Wednesdays - June 2024
Columbus Data & Analytics Wednesdays - June 2024Columbus Data & Analytics Wednesdays - June 2024
Columbus Data & Analytics Wednesdays - June 2024
 
Digital Marketing Trends in 2024 | Guide for Staying Ahead
Digital Marketing Trends in 2024 | Guide for Staying AheadDigital Marketing Trends in 2024 | Guide for Staying Ahead
Digital Marketing Trends in 2024 | Guide for Staying Ahead
 
WeTestAthens: Postman's AI & Automation Techniques
WeTestAthens: Postman's AI & Automation TechniquesWeTestAthens: Postman's AI & Automation Techniques
WeTestAthens: Postman's AI & Automation Techniques
 

Intermediate computer skills

  • 1. Learning to do more with your computer.
  • 2. Intermediate Computer Skills  Ctrl+Alt+Del  Using External Devices  Creating, organizing and moving files  Installing and uninstalling programs  Running updates  Understanding Microsoft Application Basics  Protecting your computer
  • 3. Ctrl + Alt + Del  Opens Task Manager or Windows Securities depending on the operating system  Allows you to manage your computer if problems with programs or malware arise.  Safely restarts or shuts off your computer.  Closes programs that are locked or are experiencing problems without having to restart the entire computer.  Use Ctrl+Alt+Del instead of just turning off the computer with the Power button.
  • 4. Using External Devices  Any component that is used in conjunction with the main processing unit.  Also referred to as peripheral hardware  Connects via USB cord or wireless signal
  • 5. Using External Devices  When first connected, a device driver (software) is installed on the computer, either manually or automatically.  If you are not prompted to install a driver or it does not automatically download, they can usually be found via the internet. Only download from trusted sites.  Devices can be accessed via the Start menu, usually from Computer or Devices and Printers.  Drivers can be accessed via Start -> Control Panel -> Programs or by searching drivers at the Start menu.
  • 6. Using External Devices Types of external devices:  Removable storage (flash drives, disk drives, iPod, etc.)  Non-removable storage (external hard drives)  Input (mouse, keyboard, touch screen, scanner, etc.)  Output (monitor, speakers, TV, print er)
  • 7. Managing Files  A File is a resource for storing and sharing information and is used in conjunction with a Computer Program.  Codes are used to determine the file type.  A list of common file types is available at: http://mistupid.com/comput ers/filetypes.htm
  • 8. Managing Files  Common File types include  Microsoft files: doc, ppt, xls, pub  Audio files: mp3, wma, wva  Picture files: jpg, tiff, bmp, gif, png, pic, etc.  Adobe files: pdf, ePub  Video files: asf, avi, swf, mov  Rich text files: rtf  Html files: htm  Compressed files: zip
  • 9. Managing Files  Files are created when info that has been entered into a program or peripheral is saved either to the computer or to a device.  Some files are temporarily stored on the computer, and will later disappear or become unavailable.  The destination of the saved file and the file type are determined when the file is created.  Multiple file types can be created from the original.
  • 10. Managing Files  Each file type requires a specific kind of program to read it.  In some cases, files can be converted to allow for program compatibility or to fit the intended use.  Free file converters are available online:  www.file-convert.com  www.freefileconvert.com  http://www.zamzar.com/
  • 11. Managing Files  Files can be moved, copied, and organized.  To move a file, drag and drop it from one location to another.  To copy a file, right click the file and Copy, then paste it to the desired location.  To send a file to another location, right click the file and Send to the desired destination.  To create a folder, right click in the window and New->Folder.  To name your file, right click the file and Rename file.
  • 12. Managing files  Files can be deleted from devices and computers.  Right click the file and Delete. If prompted, confirm by clicking Yes.  Files stored on a computer are sent to the recycle bin. To permanently delete the file, you must delete it from the recycle bin.  Files on flash drives, etc., are permanently deleted.  When files on a computer are deleted, they are inaccessible, yet the info still technically exists until it is overwritten with new information. This is where computer forensics comes into play.
  • 13. Managing Programs  Computer Programs are a set of instructions provided to a computer, which then executes the instructions.  Computer Programs are made up of Source Code, which are analyzed and developed by programmers.  There are two main types of programs  System Software – operates and controls a computer (i.e.: operating systems, drivers, utilities)  Application Software (apps)– performs useful tasks (i.e.: Microsoft office, media players, games)  System Software is to necessary as Application Software is to useful.
  • 14. Managing Programs  All programs written for Windows can be found on your computer via Start->Control Panel -> Programs  Programs can be obtained via the internet or through disks.  Only download programs from trusted sources.  Research new programs and read reviews before downloading.
  • 15. Managing Programs  Your computer comes equipped with a program to manage installation.  Prior to installing/purchase, you should check the system requirements for compatibility (Start -> Control Panel -> System and Security -> System).  Usually you will be prompted to Install the program, and then to Run the installation process.  After installation, you may be asked to configure program defaults, to verify product activation using a license key, or to Finalize/Close.
  • 16. Managing Programs  Most common types of installation processes:  Attended – requires a user who attends to the process and makes choices.  Silent – occurs without any notification or windows. Malware almost always installs this way.  Scheduled/Automated – runs when scheduled (i.e.: updates) or automatically (i.e.: device drives).
  • 17. Managing Programs  You may uninstall programs if they are no longer used or you want to free up space.  To access programs written for Windows, go to Start -> Control Panel -> Programs -> Programs and Features -> Uninstall  If the program is not listed, see the creator’s instructions or search the computer for the program files via Start.  Select the program, click Uninstall and follow prompts.
  • 18. Managing Programs  Some programs provide the option to Change or Repair:  Change will allow you uninstall portions of the program or set program defaults.  Repair will diagnose and attempt to fix problems with corrupted programs.  If a program is behaving badly or experiencing problems, and Repair is not an option, you may try uninstalling and reinstalling to correct the issue.  Corruption occurs when unintended changes are made to the program during one of the program’s various processes.
  • 19. Updating  Changes and enhancements that are intended to make programs run better and defend against malware and attacks.  Can be done manually or automatically.  Available for operating systems and software.
  • 20. Updating  Automatic: system updates will install as they become available.  Start -> Control Panel -> System and Security -> Windows Update -> Change Settings  You can configure when the updates take place. You must be logged on to your computer. Usually requires a restart.
  • 21. Updating  Manual: updates that are initiated directly by you.  For Windows updates: go to Start -> All Programs -> Windows Update -> Check Computer for Updates (install update software if needed)  Select updates to install  Restart computer
  • 22. Updating  Programs: most often need to be initiated by you or through pop-up reminders.  Program updates can usually be found at the company’s website. (i.e.: Adobe products via http://www.adobe.com/do wnloads/updates.html)  Utilize search engines to find program updates, but make sure you are using a trusted source.
  • 23. Microsoft Apps  Most commonly used:  WORD – Word processing software  EXCEL – Spreadsheet software  POWER POINT – Presentation software  PUBLISHER – Publication software
  • 24. Microsoft Apps - Word Use for writing reports, sending letters, creating resumes printing labels and envelopes, mass mailings, etc…  Home: Basic formatting such as font and size, text alignment, automatic formatting, text color…  Insert: Inserts new pages, tables, pictures, links, footers & headers, equations, symbols…  Page Layout: Set themes, margins, page size, add watermarks, change colors, insert columns…  References: Add table of contents, footnote, captions, endnotes, bibliography…
  • 25. Microsoft Apps - Word  Mailings: print envelopes, labels, and mail merge (mass mailings created using excel spreadsheet).  Review: check for errors, use the thesaurus, translate text, make comments, protect document…  View: change the page view via zoom, splitting windows, view two pages at once…  Acrobat: Convert files using Adobe…  Windows button: Save, print, open, create new…
  • 26. Microsoft Apps - Excel Use for creating spreadsheets and analyzing numbers.  Home: Basic formatting including text, merge cells, format cells, define numbers, insert auto sum…  Insert: Add tables, illustrations, charts, links and text…  Page layout: Manage the layout of your information  Formulas: Adds formulas to your spreadsheet that will automatically configure data  Data: Allows external information to be inserted into the spreadsheet  Review, View and Acrobat tabs are nearly identical to those in Word.
  • 27. Microsoft Apps - Publisher Use for creating newsletters, brochures, signs, etc…  Select the type of document you wish to create (formatted styles are available.)  The tabs are very similar to Word, except each part of the document exists on it’s own. This allows for layering and layout manipulation that is not possible in Word.  Click or double on specific elements (text box, picture, table) to select the item, move the item and make changes. Right click on the selected element to access a menu of options specific to that item.
  • 28. Microsoft Apps – Power Point Use to create presentations and slide shows. Can incorporate music, animations and more!  Tabs are once again very similar to Word.  A happy mix between Word and Publisher. For Microsoft Office Online Tutorials visit http://office.microsoft.com/en-us/training/
  • 29. Protecting Your Computer  Hardware Security – protection against physical theft of a computer or information on a computer  Software Security – protection against threats to the computer’s operations and programs  Data Security – protection against data theft and data corruption
  • 30. Protecting Your Computer  Hardware Security Threat  Information stored on your hard drive is vulnerable to physical/digital theft  Info can be stolen, misused, damaged or destroyed  If computer hardware is disassembled, warranty coverage will likely be voided  When discarding computer or wiping it clean, some info may still be accessible to professionals
  • 31. Protecting Your Computer  Hardware Security Protection  Keep your computer physically secure and under surveillance and maybe invest in a locking system for your computer or your drives. Specialized locks are available.  Lock you house when you leave or keep your computer in a safe during extended vacations. Use good passwords!  When discarding an old computer, use a certified refurbisher (a professional who will wipe your hard drives of all information) or do it yourself using overwrite software. More info is available at http://www.microsoft.com/security/online-privacy/safely- dispose-computers-and-devices.aspx
  • 32. Protecting Your Computer  Software Security Threat  Denial of Service – disables use of a computer or a service by flooding the network with too much traffic, interrupt communication between devices, or to disable use of a service (such as email) by the intended user.  Trojan Horse – malicious programs that are disguised to be read as safe by the security software. Gives hackers total access to the computer and/or network.  Viruses and Worms – bad pieces of programming that can infect and damage computer software and files. Can replicate themselves.
  • 33. Protecting Your Computer  Software Security Threat (continued)  Sniffing – the interception of information that is passed between users (hacker eavesdropping)  Spyware – malware that spies on user activity such as searches and websites visited.  Scareware – tries to scare the user into buying services that are not needed, such as antivirus software  Adware – produces a constant barrage of pop-up ads
  • 34. Protecting Your Computer  Software Security Protection  Firewall – a filter used to prevent malicious websites from gaining access to your computer.  Firewall settings can be adjusted in Windows via Start -> Control Panel -> Search: Firewall (upper right hand corner) -> Windows Firewall  http://windows.microsoft.com/en- us/windows7/understanding- windows-firewall-settings
  • 35. Protecting Your Computer  Software Security Protection  Security Software – anti-virus and security software will help to protect your computer  Only install one anti-virus program otherwise they will create problems and not work properly  i.e.: Norton, McAfee and AVG Free  Start -> All Programs -> Windows Security Essentials to scan your computer.
  • 36. Protecting Your Computer  Data Security Threat  Hardware malfunction results in the loss of important data and files (luckily this doesn’t happen often.)
  • 37. Protecting Your Computer  Data Security Protection  Backup your computer!  Use an external hard drive to backup important files and a full image copy of your system in the event of a crash or complete hardware failure. http://windows.microsoft.com/en-us/windows7/back-up- your-programs-system-settings-and-files  Backup using Windows via Start -> Control Panel -> System and Maintenance -> Backup and Restore  Setup Backup if it is your first time using Windows Backup  Backup Now to manually backup outside of a schedule
  • 38. Protecting Your Computer  Data Security Protection (continued)  Run security and software updates regularly  Save all tech support documents, manuals, and discs  Use Clean-up Software to get rid of unused files and programs. http://www.pcworld.com/article/2 029460/panacea-or-pariah-five- pc-cleanup-utilities-put-to-the- test.html
  • 39. This presentation can be found online at: Tiffany Hickox Technical Services Librarian thickox@cityofalliance.net

Editor's Notes

  1. The only time a computer should be turned off via the Power button is if there is no other option!!!
  2. Demonstrate printer installation at end of slide
  3. Have the class insert and access the flash drive.
  4. Download a file from email as zip and then extract files.
  5. Temp files can include Microsoft recovery documents and internet temporary downloads.
  6. Convert a doc into an Epub using www.file-convert.com
  7. Use a camera to demonstrate the above.
  8. Show them the survey example.