This document provides an overview of intermediate computer skills, including:
- Using keyboard shortcuts like Ctrl+Alt+Del to manage programs and restart the computer.
- Connecting and using external devices like printers, scanners, and storage drives.
- Creating, organizing, moving, and deleting files on the computer and connected devices.
- Installing, uninstalling, and updating programs on the computer.
- Understanding the basics of Microsoft applications like Word, Excel, PowerPoint, and Publisher.
- Protecting the computer from malware and unauthorized access through software and physical security measures.
This document provides an overview of a basic computer skills seminar presented by Meridian Career Institute. The seminar covers identifying basic computer hardware parts, operating systems, software, input devices, mouse skills including clicking, dragging and right clicking. It also covers what the internet and world wide web are, how to surf the web using search engines like Google, and introduces some common Microsoft office programs like Word, Excel, Publisher and PowerPoint.
I have given the explanation simply in a way that any one can understand on how to approach to a computer and to obtain it's basic skills on using windows 7 platform.
MS-DOS was an early operating system owned by Microsoft that was based on 86-DOS, which was owned by Seattle Computer Products. Microsoft needed an operating system for Intel's 8086 processor and licensed 86-DOS from Seattle Computer Products. MS-DOS 1.0 was then released with the IBM PC in 1982. There were internal commands that were loaded with the operating system and external commands that had to be loaded from disk before use. MS-DOS featured text files, batch files, and supported file names with extensions organized in directories with relative and absolute paths.
This document provides an overview of the key elements of the Windows 7 desktop and how to navigate, organize, and work with files and folders. It explains the desktop background, icons, taskbar, start button, windows explorer, and notifications area. It also demonstrates how to create and move files and folders, find recent files, copy and paste content, enlarge screen elements, customize the desktop, and burn a CD. The document is intended to accompany a class on Windows 7 basics.
The document discusses operating systems and Windows. It defines an operating system as the most important program that runs a computer and manages other programs. It describes operating system functions like recognizing input/output, tracking files, and controlling devices. It outlines four main types of operating systems and provides examples like Windows and MacOS. It explains how operating systems provide platforms for applications and manage memory, hardware, and resources. It provides details on the boot process, graphical user interfaces, desktop components like the taskbar and windows, and basic window features.
This document discusses various types of computer operations including real-time processing, batch processing, multiprogramming, multitasking, transaction processing, interactive processing, timesharing, and multi-access. Real-time processing automatically updates the system when changes occur. Batch processing collects all inputs together and processes them at once without user interaction. Multiprogramming and multitasking allow a computer to run multiple processes simultaneously. Transaction processing handles individual data items as they occur. Interactive and timesharing systems allow multiple users to access the system simultaneously through terminals.
This document provides an overview of fundamentals of computers and information systems. It defines key concepts like data, information, and computer components. The document outlines the history of calculating devices from ancient abacuses to modern computers. It describes the basic units of a computer including input, output, storage, and processing units. Finally, it discusses computer software and operating systems, defining important terms and classifying different types of operating systems.
This document provides an overview of a basic computer skills seminar presented by Meridian Career Institute. The seminar covers identifying basic computer hardware parts, operating systems, software, input devices, mouse skills including clicking, dragging and right clicking. It also covers what the internet and world wide web are, how to surf the web using search engines like Google, and introduces some common Microsoft office programs like Word, Excel, Publisher and PowerPoint.
I have given the explanation simply in a way that any one can understand on how to approach to a computer and to obtain it's basic skills on using windows 7 platform.
MS-DOS was an early operating system owned by Microsoft that was based on 86-DOS, which was owned by Seattle Computer Products. Microsoft needed an operating system for Intel's 8086 processor and licensed 86-DOS from Seattle Computer Products. MS-DOS 1.0 was then released with the IBM PC in 1982. There were internal commands that were loaded with the operating system and external commands that had to be loaded from disk before use. MS-DOS featured text files, batch files, and supported file names with extensions organized in directories with relative and absolute paths.
This document provides an overview of the key elements of the Windows 7 desktop and how to navigate, organize, and work with files and folders. It explains the desktop background, icons, taskbar, start button, windows explorer, and notifications area. It also demonstrates how to create and move files and folders, find recent files, copy and paste content, enlarge screen elements, customize the desktop, and burn a CD. The document is intended to accompany a class on Windows 7 basics.
The document discusses operating systems and Windows. It defines an operating system as the most important program that runs a computer and manages other programs. It describes operating system functions like recognizing input/output, tracking files, and controlling devices. It outlines four main types of operating systems and provides examples like Windows and MacOS. It explains how operating systems provide platforms for applications and manage memory, hardware, and resources. It provides details on the boot process, graphical user interfaces, desktop components like the taskbar and windows, and basic window features.
This document discusses various types of computer operations including real-time processing, batch processing, multiprogramming, multitasking, transaction processing, interactive processing, timesharing, and multi-access. Real-time processing automatically updates the system when changes occur. Batch processing collects all inputs together and processes them at once without user interaction. Multiprogramming and multitasking allow a computer to run multiple processes simultaneously. Transaction processing handles individual data items as they occur. Interactive and timesharing systems allow multiple users to access the system simultaneously through terminals.
This document provides an overview of fundamentals of computers and information systems. It defines key concepts like data, information, and computer components. The document outlines the history of calculating devices from ancient abacuses to modern computers. It describes the basic units of a computer including input, output, storage, and processing units. Finally, it discusses computer software and operating systems, defining important terms and classifying different types of operating systems.
it's about an educational programming language which was designed for children learning through entertainment. The logo was created in 1967 at Bolt, Beranek and Newman, a Cambridge, Massachusetts research firm, by Wally Feurzeig, Cynthia Solomon, and Seymour Papert. Its intellectual roots are in artificial intelligence, mathematical logic, and developmental psychology.Logo's most-known feature is the turtle, an on-screen "cursor" that showed output from commands for movement and small retractable pen, together producing line graphics. There are 197 variations of the Logo Language and 130 existing implementations but broadly used and prevalent early implementation of Logo is the logo of Apple Inc. It was a primary influence on the Smalltalk programming language. For easily coding in Logo Language Stephane Norte & Fernando G. Lobo from UAlg informatics Laboratory at the University of Algarve, Portugal implemented an on-screen keyboard name Virtual Logo Keyboard. you can download the keyboard from http://w3.ualg.pt/~snorte/LogoKeyboard.htm
This document provides information about computers and their components. It discusses that computers are electronic devices that can store, process, and manipulate data. It then outlines the three main components of a computer: hardware, software, and peopleware. Under hardware, it describes the physical parts of a computer like the system unit, monitors, keyboards, and other input/output devices. It explains software types like system software and application software. It also provides details on computer components, peripherals, and how to troubleshoot common issues.
This document provides information about cleaning and maintaining computer equipment. It discusses why dust needs to be removed, common cleaning tools and their uses, precautions that should be taken when cleaning electrical equipment, how to clean different peripherals like printers and scanners, and the importance of maintenance logs. Cleaning helps components run cooler and prevents short circuits, while maintenance promotes reliable equipment operation and reduces unnecessary repairs.
MS-DOS was first released in 1981 and was the dominant operating system for personal computers until the mid-1990s. It provided basic file management and program execution capabilities through command line commands. Some key commands included DIR to list files, COPY to copy files, DEL to delete files, EDIT to edit text files, and CD to change directories. MS-DOS also supported wildcards, file attributes, path names, and other features to help users organize and manage files and folders through the command prompt.
New to computers? Our presentation will help you get oriented to your PC - learn about key mouse functions, the components of your desktop, and the features of program windows.
Learn to identify parts of a computer, hardware and software, operate the mouse and keyboard and become familiar with the MS Windows X/P Operating System.
The document discusses various computer input and output devices. It describes keyboards, mice, trackpads, trackballs, microphones, scanners, digital cameras, styluses, joysticks, and light pens as common input devices. Monitors, speakers, and printers are outlined as main output devices, with CRT and flat panel displays discussed for monitors. Impact and non-impact printers are also summarized.
This is a simple tutorial about windows 10. This includes basic operations of windows 10 OS. This includes how to open start, visual Desktop, Microsoft edge and so many features of windows 10.
This document provides an overview of Microsoft Office, including Word, Excel, and PowerPoint. It discusses the basic functions and features of these applications, such as inserting tables, formatting text, adding headers and footers in Word, and setting up page layout options. The document is intended as a tutorial or instruction material for using MS Office.
Basic_Computer_Skills, A_seminar_by_Mohan_Kumar_G_LecturerMohan Kumar G
This document provides an introduction to basic computer skills. It defines a computer as an electronic device that can be programmed to perform high-speed mathematical and logical operations. The document then discusses the key characteristics of computers, including their speed, accuracy, diligence, versatility, and ability to perform multiple tasks simultaneously. It also covers the history of computing devices from early calculating machines to modern electronic computers and summarizes the five generations of computers from the first generation that used vacuum tubes to today's fifth generation computers.
This document provides an agenda for a computer workshop on Microsoft PowerPoint. It outlines topics that will be covered including getting started, working with content, formatting slides, adding different types of content like video and audio, slide effects and animations, setting up slide shows, printing options, and packaging a presentation for CD.
This document contains 20 multiple choice questions about Microsoft Word. It tests knowledge of keyboard shortcuts and commands for selecting text, formatting text, inserting tables and columns, opening and saving documents, and other basic Word functions. The questions cover topics like versions of Word, formatting tools, page layout options, and default file extensions.
The document summarizes the basic functional units and operations of a computer system. It describes how a computer contains a central processing unit (CPU) that includes an arithmetic logic unit (ALU) and control unit to execute instructions. A computer also has memory to store programs and data, and input/output (I/O) devices to accept and output information. The CPU fetches instructions from memory, retrieves operands from memory or registers, performs operations in the ALU, and stores results back to memory or registers. The control unit coordinates the flow of data and execution of instructions. Performance can be improved by increasing clock speed, reducing the number of steps per instruction through pipelining and superscalar techniques, and optimizing compilers
The document summarizes the basic components inside a computer. It discusses that all computers have a CPU, input devices, storage, and output devices. The CPU controls all internal and external devices and performs arithmetic and logic operations. Input devices translate human-readable data into electrical signals, and output devices are used for data output. Storage includes temporary RAM, which is erased when powered off, and permanent ROM that stores basic instructions. Various storage devices like hard drives also hold information not in active use.
The CPU, or central processing unit, is the brain of the computer that performs all data processing and controls other parts. It contains at least one processor chip that can have multiple processing cores and operates at a clock speed measured in megahertz or gigahertz. The CPU fetches instructions from memory, decodes and executes them by performing calculations in its arithmetic logic unit and control unit, and stores results back in memory. It has registers for temporary storage and a memory unit for primary storage.
This document discusses word processing and the Microsoft Word word processor. It defines word processing as using application software to create, edit, and format text-based documents. It then provides an introduction to MS Word, describing its history and file format. The document lists some advantages and disadvantages of word processors. It also outlines some basic MS Word functions, including creating, saving, printing, and editing documents, as well as formatting text and checking spelling/grammar. It provides keyboard shortcuts for many of these functions.
A computer is a programmable machine that can execute a prerecorded list of instructions. It has four basic functions: accepting input, processing data, producing output, and storing results. A computer system includes the computer hardware, peripheral devices, and software. Software provides instructions that tell the computer what tasks to perform. There are two main types of software: system software which includes operating systems and utilities, and applications software for tasks like word processing.
The document discusses how computers represent and store data. Computers use binary digits (bits) represented as electrical voltages to store all types of data. Bits are grouped into bytes of 8 bits to represent characters, numbers, images, sound etc. Memory is measured in bytes, kilobytes and megabytes. RAM is volatile memory that temporarily stores active data and programs, while ROM permanently stores basic startup instructions. Caches improve performance by storing frequently used data closer to the CPU.
This document provides an introduction to basic computer hardware and software components. It begins with a brief history of computers, including early computers like ENIAC and key developments like the Apple II and IBM PC. It then defines hardware as the physical parts of a computer like the monitor, keyboard, mouse, CPU, printer, and modem. Software is defined as the instructions that make hardware work, like operating systems and applications. The document provides tutorials on using a mouse, starting programs, working with windows, and the start menu. It teaches mouse techniques, how to minimize, maximize and close windows.
Here are the key advantages of electronic spreadsheets over traditional manual methods:
- Speed and accuracy - Calculations can be performed instantly in a spreadsheet, with no risk of manual errors in calculations or copying of formulas. This allows "what-if" scenarios to be modeled quickly.
- Flexibility - Data and formulas can easily be edited, added or removed in a spreadsheet. Dependencies between cells are automatically tracked. It's easy to restructure and analyze data in different ways.
- Formatting - Cell formatting like currency, percentages etc. can be applied uniformly. Charts and graphs can be generated from the data automatically.
- Storage and sharing - Workbooks can be stored electronically and shared easily between users.
Creating a budget allows you to take control of your finances by understanding where your money comes from and where it goes. It also helps you save for financial goals. The Beehive website provides tools to build a budget in three steps: track expenses, build the budget by comparing income to expenses, and stick to the budget. Users can track expenses, use templates to build a balanced budget, and get tips to stay on track with their budget.
it's about an educational programming language which was designed for children learning through entertainment. The logo was created in 1967 at Bolt, Beranek and Newman, a Cambridge, Massachusetts research firm, by Wally Feurzeig, Cynthia Solomon, and Seymour Papert. Its intellectual roots are in artificial intelligence, mathematical logic, and developmental psychology.Logo's most-known feature is the turtle, an on-screen "cursor" that showed output from commands for movement and small retractable pen, together producing line graphics. There are 197 variations of the Logo Language and 130 existing implementations but broadly used and prevalent early implementation of Logo is the logo of Apple Inc. It was a primary influence on the Smalltalk programming language. For easily coding in Logo Language Stephane Norte & Fernando G. Lobo from UAlg informatics Laboratory at the University of Algarve, Portugal implemented an on-screen keyboard name Virtual Logo Keyboard. you can download the keyboard from http://w3.ualg.pt/~snorte/LogoKeyboard.htm
This document provides information about computers and their components. It discusses that computers are electronic devices that can store, process, and manipulate data. It then outlines the three main components of a computer: hardware, software, and peopleware. Under hardware, it describes the physical parts of a computer like the system unit, monitors, keyboards, and other input/output devices. It explains software types like system software and application software. It also provides details on computer components, peripherals, and how to troubleshoot common issues.
This document provides information about cleaning and maintaining computer equipment. It discusses why dust needs to be removed, common cleaning tools and their uses, precautions that should be taken when cleaning electrical equipment, how to clean different peripherals like printers and scanners, and the importance of maintenance logs. Cleaning helps components run cooler and prevents short circuits, while maintenance promotes reliable equipment operation and reduces unnecessary repairs.
MS-DOS was first released in 1981 and was the dominant operating system for personal computers until the mid-1990s. It provided basic file management and program execution capabilities through command line commands. Some key commands included DIR to list files, COPY to copy files, DEL to delete files, EDIT to edit text files, and CD to change directories. MS-DOS also supported wildcards, file attributes, path names, and other features to help users organize and manage files and folders through the command prompt.
New to computers? Our presentation will help you get oriented to your PC - learn about key mouse functions, the components of your desktop, and the features of program windows.
Learn to identify parts of a computer, hardware and software, operate the mouse and keyboard and become familiar with the MS Windows X/P Operating System.
The document discusses various computer input and output devices. It describes keyboards, mice, trackpads, trackballs, microphones, scanners, digital cameras, styluses, joysticks, and light pens as common input devices. Monitors, speakers, and printers are outlined as main output devices, with CRT and flat panel displays discussed for monitors. Impact and non-impact printers are also summarized.
This is a simple tutorial about windows 10. This includes basic operations of windows 10 OS. This includes how to open start, visual Desktop, Microsoft edge and so many features of windows 10.
This document provides an overview of Microsoft Office, including Word, Excel, and PowerPoint. It discusses the basic functions and features of these applications, such as inserting tables, formatting text, adding headers and footers in Word, and setting up page layout options. The document is intended as a tutorial or instruction material for using MS Office.
Basic_Computer_Skills, A_seminar_by_Mohan_Kumar_G_LecturerMohan Kumar G
This document provides an introduction to basic computer skills. It defines a computer as an electronic device that can be programmed to perform high-speed mathematical and logical operations. The document then discusses the key characteristics of computers, including their speed, accuracy, diligence, versatility, and ability to perform multiple tasks simultaneously. It also covers the history of computing devices from early calculating machines to modern electronic computers and summarizes the five generations of computers from the first generation that used vacuum tubes to today's fifth generation computers.
This document provides an agenda for a computer workshop on Microsoft PowerPoint. It outlines topics that will be covered including getting started, working with content, formatting slides, adding different types of content like video and audio, slide effects and animations, setting up slide shows, printing options, and packaging a presentation for CD.
This document contains 20 multiple choice questions about Microsoft Word. It tests knowledge of keyboard shortcuts and commands for selecting text, formatting text, inserting tables and columns, opening and saving documents, and other basic Word functions. The questions cover topics like versions of Word, formatting tools, page layout options, and default file extensions.
The document summarizes the basic functional units and operations of a computer system. It describes how a computer contains a central processing unit (CPU) that includes an arithmetic logic unit (ALU) and control unit to execute instructions. A computer also has memory to store programs and data, and input/output (I/O) devices to accept and output information. The CPU fetches instructions from memory, retrieves operands from memory or registers, performs operations in the ALU, and stores results back to memory or registers. The control unit coordinates the flow of data and execution of instructions. Performance can be improved by increasing clock speed, reducing the number of steps per instruction through pipelining and superscalar techniques, and optimizing compilers
The document summarizes the basic components inside a computer. It discusses that all computers have a CPU, input devices, storage, and output devices. The CPU controls all internal and external devices and performs arithmetic and logic operations. Input devices translate human-readable data into electrical signals, and output devices are used for data output. Storage includes temporary RAM, which is erased when powered off, and permanent ROM that stores basic instructions. Various storage devices like hard drives also hold information not in active use.
The CPU, or central processing unit, is the brain of the computer that performs all data processing and controls other parts. It contains at least one processor chip that can have multiple processing cores and operates at a clock speed measured in megahertz or gigahertz. The CPU fetches instructions from memory, decodes and executes them by performing calculations in its arithmetic logic unit and control unit, and stores results back in memory. It has registers for temporary storage and a memory unit for primary storage.
This document discusses word processing and the Microsoft Word word processor. It defines word processing as using application software to create, edit, and format text-based documents. It then provides an introduction to MS Word, describing its history and file format. The document lists some advantages and disadvantages of word processors. It also outlines some basic MS Word functions, including creating, saving, printing, and editing documents, as well as formatting text and checking spelling/grammar. It provides keyboard shortcuts for many of these functions.
A computer is a programmable machine that can execute a prerecorded list of instructions. It has four basic functions: accepting input, processing data, producing output, and storing results. A computer system includes the computer hardware, peripheral devices, and software. Software provides instructions that tell the computer what tasks to perform. There are two main types of software: system software which includes operating systems and utilities, and applications software for tasks like word processing.
The document discusses how computers represent and store data. Computers use binary digits (bits) represented as electrical voltages to store all types of data. Bits are grouped into bytes of 8 bits to represent characters, numbers, images, sound etc. Memory is measured in bytes, kilobytes and megabytes. RAM is volatile memory that temporarily stores active data and programs, while ROM permanently stores basic startup instructions. Caches improve performance by storing frequently used data closer to the CPU.
This document provides an introduction to basic computer hardware and software components. It begins with a brief history of computers, including early computers like ENIAC and key developments like the Apple II and IBM PC. It then defines hardware as the physical parts of a computer like the monitor, keyboard, mouse, CPU, printer, and modem. Software is defined as the instructions that make hardware work, like operating systems and applications. The document provides tutorials on using a mouse, starting programs, working with windows, and the start menu. It teaches mouse techniques, how to minimize, maximize and close windows.
Here are the key advantages of electronic spreadsheets over traditional manual methods:
- Speed and accuracy - Calculations can be performed instantly in a spreadsheet, with no risk of manual errors in calculations or copying of formulas. This allows "what-if" scenarios to be modeled quickly.
- Flexibility - Data and formulas can easily be edited, added or removed in a spreadsheet. Dependencies between cells are automatically tracked. It's easy to restructure and analyze data in different ways.
- Formatting - Cell formatting like currency, percentages etc. can be applied uniformly. Charts and graphs can be generated from the data automatically.
- Storage and sharing - Workbooks can be stored electronically and shared easily between users.
Creating a budget allows you to take control of your finances by understanding where your money comes from and where it goes. It also helps you save for financial goals. The Beehive website provides tools to build a budget in three steps: track expenses, build the budget by comparing income to expenses, and stick to the budget. Users can track expenses, use templates to build a balanced budget, and get tips to stay on track with their budget.
Christopher Hope took the Computer Literacy - Basic assessment test on September 9, 2015. He answered 39 out of 40 questions correctly, earning a 98% score. This score was above the global average of 75% and at the 90th percentile. The test covered basic computer troubleshooting, maintenance, hardware, software, safety, the Internet, and Windows.
Solving Shared Drives: 10 Tips for Cleaning Up, Organizing, and Migrating Con...Barclay T. Blair
The sexy Information Governance problems today are (in rough order of sex appeal):
Social Media
Big Data
Cloud Computing
Somewhere waaaay down at the bottom of this list comes, “Governing shared network drives.”
However, in real life – outside of the hype cycle – solving the shared drive problem is right near the top of the list for most organizations. The massive growth of SharePoint has been driven in large part by enterprises (or at least, departments within enterprises) looking for an incremental and easy replacement for shared drives.
However, most project teams tend to underestimate just how “incremental” the shift from shared drives to SharePoint or ECM is. In fact, in my experience, the problem is vexing enough that many project teams effectively throw up their hands and end up moving the big pile of unstructured manure from one unmanaged, fragrant corral to another (albeit a less fragrant, more attractive corral).
In this presentation we outline the Shared Drive problem, and provide tern practical tips for addressing it.
This document provides an introduction to basic computer skills, including identifying computer parts like the monitor, keyboard, and mouse. It describes how to use the mouse for common functions like clicking, dragging and dropping, and right-clicking. Keyboard functions like typing letters, numbers, and special keys are explained. The desktop and icons are introduced, as well as how to open and use windows. An overview of the internet is given along with methods for navigating it, including the address bar, search engines, hyperlinks, and tabs. Useful internet features like email are described. The document concludes with safety tips for using the internet.
The document provides an overview of basic computer systems. It discusses the main types of computers including personal computers, mainframes, minicomputers, and supercomputers. It then describes the typical components of a computer system including the central processing unit, memory, control unit, arithmetic logic unit, and input/output devices. Finally, it discusses operating systems and how they control the hardware and allow users to interact with applications and the computer.
The document provides information about the Windows 2000 operating system, including its features and how to boot and use Windows. It discusses how Windows 2000 supports over 4000 printers and other devices. It has features like IntelliMirror, smart cards, internet connection sharing, and plug and play capabilities. The document also explains how to set screen savers, change desktop wallpaper, create folders and shortcuts, and cut, copy and paste files and folders. It provides information on computer viruses, how they spread, and how to prevent virus damage.
This document discusses two main types of computer software: system software and application software. System software includes operating systems, compilers, and device drivers. It is close to the hardware, difficult to design, and written in low-level languages. Application software satisfies specific user needs and includes programs like spreadsheets, presentations, and databases. It is closer to the user, easier to design, and written in high-level languages. The document provides details on common examples of each type of software.
The document discusses computer hardware and software. It defines computer hardware as the physical parts of a computer like input, output, storage, and processing devices. It also defines computer software as programs that enable users to interact with the computer and its hardware. The document then describes different types of both system software like operating systems and application software like word processors and spreadsheets. It provides examples and definitions for many common computer hardware components and software programs.
This document discusses different types of computer software. It describes system software, which includes operating systems, compilers, interpreters, assemblers, and device drivers that interface directly with hardware. It also describes application software, such as word processors, spreadsheets, and presentations, which are designed for end users. The document provides details on common system software components like operating system functions, device drivers, compilers, and system utilities. It also explains different types of application software like presentations, spreadsheets, and databases.
The document provides an overview of object-oriented programming basics and the C++ language. It discusses the basic components of a computer system including input, processing, and output. It also defines different types of software such as system software, operating systems, application software, utilities, and translators. The document then discusses the evolution and timeline of C++ and the three step process of translating a C++ program which includes writing source code, compiling to an object file, and linking to create an executable file.
The document provides an introduction to C programming, including:
- C is a general-purpose programming language used widely for operating systems and software. It allows for maximum control and efficiency.
- The document outlines the basic elements of C like data types, variables, decision making, loops, functions, and file input/output.
- It also discusses compilers, text editors, and the benefits of understanding C programming at a low level. Understanding C provides insight into how computers work at their basic level.
This document discusses two main types of computer software: system software and application software. System software includes operating systems, compilers, and device drivers. It interacts directly with hardware and is often written in low-level languages. Application software satisfies specific user needs and includes programs like word processors, spreadsheets, and games. Common examples of system software are discussed like operating systems, which manage computer resources and act as an interface between users and hardware.
Software utilities, Windows Task Manager, and virus protection software are used to optimize computer performance, monitor system resources, and protect the system from viruses and malware. Backup and restore points allow users to save system configurations and data in case of corruption or issues with updates. Firewalls control which programs can access the system and install software to enhance security. Cleanup tools such as disk defragmenter and disk cleanup help free up disk space and improve system speed.
The document provides information about various Windows tools and computer networks. It begins by explaining how to access system tools in Windows XP, including Security Center, Disk Defragmenter, Character Map, Disk Cleanup, and System Restore. Instructions are provided for how to use each tool. It then discusses computer networks, listing the necessary hardware components and how they are connected. It also covers network software settings like naming computers and configuring IP addresses. Basic DOS commands like ping and ipconfig are demonstrated. Finally, potential issues like a slow computer and Windows Genuine Advantage notifications are described along with solutions.
The document discusses different types of computer software. It defines software as a set of instructions that tell a computer how to perform tasks. It describes system software, such as operating systems and utilities, which provide a platform for other software to run. It also discusses application software, such as word processors and spreadsheets, which help users perform tasks. The document provides examples of different categories of software like proprietary, open-source, and free software. It explains key system software concepts like compilers, interpreters, boot processes, and device drivers.
The document provides information about operating systems including:
- An operating system is software that controls the overall operations of a computer and provides an interface between applications and hardware.
- The main functions of an operating system include memory management, device management, process management, and information management.
- Operating systems are categorized as single-user or multi-user and examples are given such as Windows, MacOS, Linux, Android, and iOS.
- Information about Windows operating systems from Windows 1.0 through Windows 8 is outlined, including system requirements for Windows 7.
Software consists of instructions that tell a computer's hardware what to do. There are two main types of software: system software that controls computer operations, and application software that performs specific tasks for users. An operating system is system software that coordinates hardware, manages memory and files, and provides a user interface. Application software includes programs for word processing, spreadsheets, presentations, graphics editing, and more. Utility programs allow users to perform maintenance tasks like file compression. Software can be proprietary, where users pay for a closed source, or open source, where users can freely modify free software.
This document defines software and describes different types of software. It begins by defining software as a series of instructions that direct a computer's hardware. There are two main types of software: system software and application software. System software includes operating systems and utility programs. Operating systems control hardware, manage memory and files, and provide a user interface. Utility programs perform maintenance tasks like formatting disks. Application software performs specific tasks for users like word processing, spreadsheets, presentations and graphics editing. Common examples of each software type are provided.
The document provides information on computer software and operating systems. It defines software as organized collections of data and instructions that are categorized into system software and application software. System software provides basic computer functions while application software is used by users to accomplish tasks. An operating system is described as system software that manages hardware components, resources, and user interaction. It discusses operating system functions like memory management, processor management, and file management. The document also covers operating system types, user interfaces, and basic windows concepts.
The document provides an overview of basic computer components, operations, and functions. It discusses hardware and software, the major operations computers perform, types of memory, input/output devices, operating systems, application software, and basic security concepts. The summary covers the key topics and components discussed in the document at a high level in 3 sentences:
Computer hardware and software work together, with hardware being the physical components and software being programs. The document defines the major components of a computer system and how they work together, including memory, processors, input/output devices, operating systems, and common software applications. It also provides a basic introduction to computer security concepts and threats.
What is Operating System, Utility program,virus and anti_virusmudasserakram
in this slides, we learn what is operating system and utility program. how to make a window in computer trough USB and DVD/CD. We also learn all type of virus.
Ivanti’s Patch Tuesday breakdown goes beyond patching your applications and brings you the intelligence and guidance needed to prioritize where to focus your attention first. Catch early analysis on our Ivanti blog, then join industry expert Chris Goettl for the Patch Tuesday Webinar Event. There we’ll do a deep dive into each of the bulletins and give guidance on the risks associated with the newly-identified vulnerabilities.
Monitoring and Managing Anomaly Detection on OpenShift.pdfTosin Akinosho
Monitoring and Managing Anomaly Detection on OpenShift
Overview
Dive into the world of anomaly detection on edge devices with our comprehensive hands-on tutorial. This SlideShare presentation will guide you through the entire process, from data collection and model training to edge deployment and real-time monitoring. Perfect for those looking to implement robust anomaly detection systems on resource-constrained IoT/edge devices.
Key Topics Covered
1. Introduction to Anomaly Detection
- Understand the fundamentals of anomaly detection and its importance in identifying unusual behavior or failures in systems.
2. Understanding Edge (IoT)
- Learn about edge computing and IoT, and how they enable real-time data processing and decision-making at the source.
3. What is ArgoCD?
- Discover ArgoCD, a declarative, GitOps continuous delivery tool for Kubernetes, and its role in deploying applications on edge devices.
4. Deployment Using ArgoCD for Edge Devices
- Step-by-step guide on deploying anomaly detection models on edge devices using ArgoCD.
5. Introduction to Apache Kafka and S3
- Explore Apache Kafka for real-time data streaming and Amazon S3 for scalable storage solutions.
6. Viewing Kafka Messages in the Data Lake
- Learn how to view and analyze Kafka messages stored in a data lake for better insights.
7. What is Prometheus?
- Get to know Prometheus, an open-source monitoring and alerting toolkit, and its application in monitoring edge devices.
8. Monitoring Application Metrics with Prometheus
- Detailed instructions on setting up Prometheus to monitor the performance and health of your anomaly detection system.
9. What is Camel K?
- Introduction to Camel K, a lightweight integration framework built on Apache Camel, designed for Kubernetes.
10. Configuring Camel K Integrations for Data Pipelines
- Learn how to configure Camel K for seamless data pipeline integrations in your anomaly detection workflow.
11. What is a Jupyter Notebook?
- Overview of Jupyter Notebooks, an open-source web application for creating and sharing documents with live code, equations, visualizations, and narrative text.
12. Jupyter Notebooks with Code Examples
- Hands-on examples and code snippets in Jupyter Notebooks to help you implement and test anomaly detection models.
HCL Notes und Domino Lizenzkostenreduzierung in der Welt von DLAUpanagenda
Webinar Recording: https://www.panagenda.com/webinars/hcl-notes-und-domino-lizenzkostenreduzierung-in-der-welt-von-dlau/
DLAU und die Lizenzen nach dem CCB- und CCX-Modell sind für viele in der HCL-Community seit letztem Jahr ein heißes Thema. Als Notes- oder Domino-Kunde haben Sie vielleicht mit unerwartet hohen Benutzerzahlen und Lizenzgebühren zu kämpfen. Sie fragen sich vielleicht, wie diese neue Art der Lizenzierung funktioniert und welchen Nutzen sie Ihnen bringt. Vor allem wollen Sie sicherlich Ihr Budget einhalten und Kosten sparen, wo immer möglich. Das verstehen wir und wir möchten Ihnen dabei helfen!
Wir erklären Ihnen, wie Sie häufige Konfigurationsprobleme lösen können, die dazu führen können, dass mehr Benutzer gezählt werden als nötig, und wie Sie überflüssige oder ungenutzte Konten identifizieren und entfernen können, um Geld zu sparen. Es gibt auch einige Ansätze, die zu unnötigen Ausgaben führen können, z. B. wenn ein Personendokument anstelle eines Mail-Ins für geteilte Mailboxen verwendet wird. Wir zeigen Ihnen solche Fälle und deren Lösungen. Und natürlich erklären wir Ihnen das neue Lizenzmodell.
Nehmen Sie an diesem Webinar teil, bei dem HCL-Ambassador Marc Thomas und Gastredner Franz Walder Ihnen diese neue Welt näherbringen. Es vermittelt Ihnen die Tools und das Know-how, um den Überblick zu bewahren. Sie werden in der Lage sein, Ihre Kosten durch eine optimierte Domino-Konfiguration zu reduzieren und auch in Zukunft gering zu halten.
Diese Themen werden behandelt
- Reduzierung der Lizenzkosten durch Auffinden und Beheben von Fehlkonfigurationen und überflüssigen Konten
- Wie funktionieren CCB- und CCX-Lizenzen wirklich?
- Verstehen des DLAU-Tools und wie man es am besten nutzt
- Tipps für häufige Problembereiche, wie z. B. Team-Postfächer, Funktions-/Testbenutzer usw.
- Praxisbeispiele und Best Practices zum sofortigen Umsetzen
Salesforce Integration for Bonterra Impact Management (fka Social Solutions A...Jeffrey Haguewood
Sidekick Solutions uses Bonterra Impact Management (fka Social Solutions Apricot) and automation solutions to integrate data for business workflows.
We believe integration and automation are essential to user experience and the promise of efficient work through technology. Automation is the critical ingredient to realizing that full vision. We develop integration products and services for Bonterra Case Management software to support the deployment of automations for a variety of use cases.
This video focuses on integration of Salesforce with Bonterra Impact Management.
Interested in deploying an integration with Salesforce for Bonterra Impact Management? Contact us at sales@sidekicksolutionsllc.com to discuss next steps.
AI 101: An Introduction to the Basics and Impact of Artificial IntelligenceIndexBug
Imagine a world where machines not only perform tasks but also learn, adapt, and make decisions. This is the promise of Artificial Intelligence (AI), a technology that's not just enhancing our lives but revolutionizing entire industries.
5th LF Energy Power Grid Model Meet-up SlidesDanBrown980551
5th Power Grid Model Meet-up
It is with great pleasure that we extend to you an invitation to the 5th Power Grid Model Meet-up, scheduled for 6th June 2024. This event will adopt a hybrid format, allowing participants to join us either through an online Mircosoft Teams session or in person at TU/e located at Den Dolech 2, Eindhoven, Netherlands. The meet-up will be hosted by Eindhoven University of Technology (TU/e), a research university specializing in engineering science & technology.
Power Grid Model
The global energy transition is placing new and unprecedented demands on Distribution System Operators (DSOs). Alongside upgrades to grid capacity, processes such as digitization, capacity optimization, and congestion management are becoming vital for delivering reliable services.
Power Grid Model is an open source project from Linux Foundation Energy and provides a calculation engine that is increasingly essential for DSOs. It offers a standards-based foundation enabling real-time power systems analysis, simulations of electrical power grids, and sophisticated what-if analysis. In addition, it enables in-depth studies and analysis of the electrical power grid’s behavior and performance. This comprehensive model incorporates essential factors such as power generation capacity, electrical losses, voltage levels, power flows, and system stability.
Power Grid Model is currently being applied in a wide variety of use cases, including grid planning, expansion, reliability, and congestion studies. It can also help in analyzing the impact of renewable energy integration, assessing the effects of disturbances or faults, and developing strategies for grid control and optimization.
What to expect
For the upcoming meetup we are organizing, we have an exciting lineup of activities planned:
-Insightful presentations covering two practical applications of the Power Grid Model.
-An update on the latest advancements in Power Grid -Model technology during the first and second quarters of 2024.
-An interactive brainstorming session to discuss and propose new feature requests.
-An opportunity to connect with fellow Power Grid Model enthusiasts and users.
Cosa hanno in comune un mattoncino Lego e la backdoor XZ?Speck&Tech
ABSTRACT: A prima vista, un mattoncino Lego e la backdoor XZ potrebbero avere in comune il fatto di essere entrambi blocchi di costruzione, o dipendenze di progetti creativi e software. La realtà è che un mattoncino Lego e il caso della backdoor XZ hanno molto di più di tutto ciò in comune.
Partecipate alla presentazione per immergervi in una storia di interoperabilità, standard e formati aperti, per poi discutere del ruolo importante che i contributori hanno in una comunità open source sostenibile.
BIO: Sostenitrice del software libero e dei formati standard e aperti. È stata un membro attivo dei progetti Fedora e openSUSE e ha co-fondato l'Associazione LibreItalia dove è stata coinvolta in diversi eventi, migrazioni e formazione relativi a LibreOffice. In precedenza ha lavorato a migrazioni e corsi di formazione su LibreOffice per diverse amministrazioni pubbliche e privati. Da gennaio 2020 lavora in SUSE come Software Release Engineer per Uyuni e SUSE Manager e quando non segue la sua passione per i computer e per Geeko coltiva la sua curiosità per l'astronomia (da cui deriva il suo nickname deneb_alpha).
Unlock the Future of Search with MongoDB Atlas_ Vector Search Unleashed.pdfMalak Abu Hammad
Discover how MongoDB Atlas and vector search technology can revolutionize your application's search capabilities. This comprehensive presentation covers:
* What is Vector Search?
* Importance and benefits of vector search
* Practical use cases across various industries
* Step-by-step implementation guide
* Live demos with code snippets
* Enhancing LLM capabilities with vector search
* Best practices and optimization strategies
Perfect for developers, AI enthusiasts, and tech leaders. Learn how to leverage MongoDB Atlas to deliver highly relevant, context-aware search results, transforming your data retrieval process. Stay ahead in tech innovation and maximize the potential of your applications.
#MongoDB #VectorSearch #AI #SemanticSearch #TechInnovation #DataScience #LLM #MachineLearning #SearchTechnology
Building Production Ready Search Pipelines with Spark and MilvusZilliz
Spark is the widely used ETL tool for processing, indexing and ingesting data to serving stack for search. Milvus is the production-ready open-source vector database. In this talk we will show how to use Spark to process unstructured data to extract vector representations, and push the vectors to Milvus vector database for search serving.
GraphRAG for Life Science to increase LLM accuracyTomaz Bratanic
GraphRAG for life science domain, where you retriever information from biomedical knowledge graphs using LLMs to increase the accuracy and performance of generated answers
Ocean lotus Threat actors project by John Sitima 2024 (1).pptxSitimaJohn
Ocean Lotus cyber threat actors represent a sophisticated, persistent, and politically motivated group that poses a significant risk to organizations and individuals in the Southeast Asian region. Their continuous evolution and adaptability underscore the need for robust cybersecurity measures and international cooperation to identify and mitigate the threats posed by such advanced persistent threat groups.
Programming Foundation Models with DSPy - Meetup SlidesZilliz
Prompting language models is hard, while programming language models is easy. In this talk, I will discuss the state-of-the-art framework DSPy for programming foundation models with its powerful optimizers and runtime constraint system.
Main news related to the CCS TSI 2023 (2023/1695)Jakub Marek
An English 🇬🇧 translation of a presentation to the speech I gave about the main changes brought by CCS TSI 2023 at the biggest Czech conference on Communications and signalling systems on Railways, which was held in Clarion Hotel Olomouc from 7th to 9th November 2023 (konferenceszt.cz). Attended by around 500 participants and 200 on-line followers.
The original Czech 🇨🇿 version of the presentation can be found here: https://www.slideshare.net/slideshow/hlavni-novinky-souvisejici-s-ccs-tsi-2023-2023-1695/269688092 .
The videorecording (in Czech) from the presentation is available here: https://youtu.be/WzjJWm4IyPk?si=SImb06tuXGb30BEH .
Digital Marketing Trends in 2024 | Guide for Staying AheadWask
https://www.wask.co/ebooks/digital-marketing-trends-in-2024
Feeling lost in the digital marketing whirlwind of 2024? Technology is changing, consumer habits are evolving, and staying ahead of the curve feels like a never-ending pursuit. This e-book is your compass. Dive into actionable insights to handle the complexities of modern marketing. From hyper-personalization to the power of user-generated content, learn how to build long-term relationships with your audience and unlock the secrets to success in the ever-shifting digital landscape.
2. Intermediate Computer Skills
Ctrl+Alt+Del
Using External Devices
Creating, organizing and moving files
Installing and uninstalling programs
Running updates
Understanding Microsoft Application Basics
Protecting your computer
3. Ctrl + Alt + Del
Opens Task Manager or Windows Securities
depending on the operating system
Allows you to manage your computer if problems with
programs or malware arise.
Safely restarts or shuts off your computer.
Closes programs that are locked or are experiencing
problems without having to restart the entire
computer.
Use Ctrl+Alt+Del instead of just turning off the
computer with the Power button.
4. Using External Devices
Any component that is
used in conjunction
with the main
processing unit.
Also referred to as
peripheral hardware
Connects via USB cord
or wireless signal
5. Using External Devices
When first connected, a device driver (software) is
installed on the computer, either manually or
automatically.
If you are not prompted to install a driver or it does not
automatically download, they can usually be found via
the internet. Only download from trusted sites.
Devices can be accessed via the Start menu, usually
from Computer or Devices and Printers.
Drivers can be accessed via Start -> Control Panel ->
Programs or by searching drivers at the Start menu.
6. Using External Devices
Types of external devices:
Removable storage (flash
drives, disk drives, iPod, etc.)
Non-removable storage
(external hard drives)
Input
(mouse, keyboard, touch
screen, scanner, etc.)
Output
(monitor, speakers, TV, print
er)
7. Managing Files
A File is a resource for storing
and sharing information and
is used in conjunction with a
Computer Program.
Codes are used to determine
the file type.
A list of common file types is
available at:
http://mistupid.com/comput
ers/filetypes.htm
8. Managing Files
Common File types include
Microsoft files: doc, ppt, xls, pub
Audio files: mp3, wma, wva
Picture files:
jpg, tiff, bmp, gif, png, pic, etc.
Adobe files: pdf, ePub
Video files: asf, avi, swf, mov
Rich text files: rtf
Html files: htm
Compressed files: zip
9. Managing Files
Files are created when info that has been entered into
a program or peripheral is saved either to the computer
or to a device.
Some files are temporarily stored on the computer, and
will later disappear or become unavailable.
The destination of the saved file and the file type are
determined when the file is created.
Multiple file types can be created from the original.
10. Managing Files
Each file type requires a specific kind of program to
read it.
In some cases, files can be converted to allow for
program compatibility or to fit the intended use.
Free file converters are available online:
www.file-convert.com
www.freefileconvert.com
http://www.zamzar.com/
11. Managing Files
Files can be moved, copied, and organized.
To move a file, drag and drop it from one location to
another.
To copy a file, right click the file and Copy, then paste it
to the desired location.
To send a file to another location, right click the file and
Send to the desired destination.
To create a folder, right click in the window and
New->Folder.
To name your file, right click the file and Rename file.
12. Managing files
Files can be deleted from devices and computers.
Right click the file and Delete. If prompted, confirm by
clicking Yes.
Files stored on a computer are sent to the recycle bin. To
permanently delete the file, you must delete it from the
recycle bin.
Files on flash drives, etc., are permanently deleted.
When files on a computer are deleted, they are
inaccessible, yet the info still technically exists until it
is overwritten with new information. This is where
computer forensics comes into play.
13. Managing Programs
Computer Programs are a set of instructions provided
to a computer, which then executes the instructions.
Computer Programs are made up of Source
Code, which are analyzed and developed by
programmers.
There are two main types of programs
System Software – operates and controls a computer
(i.e.: operating systems, drivers, utilities)
Application Software (apps)– performs useful tasks (i.e.:
Microsoft office, media players, games)
System Software is to necessary as Application Software
is to useful.
14. Managing Programs
All programs written for
Windows can be found on your
computer via Start->Control
Panel -> Programs
Programs can be obtained via
the internet or through disks.
Only download programs from
trusted sources.
Research new programs and
read reviews before
downloading.
15. Managing Programs
Your computer comes equipped with a program to
manage installation.
Prior to installing/purchase, you should check the
system requirements for compatibility (Start ->
Control Panel -> System and Security -> System).
Usually you will be prompted to Install the
program, and then to Run the installation process.
After installation, you may be asked to configure
program defaults, to verify product activation using a
license key, or to Finalize/Close.
16. Managing Programs
Most common types of
installation processes:
Attended – requires a user who
attends to the process and makes
choices.
Silent – occurs without any
notification or windows.
Malware almost always installs
this way.
Scheduled/Automated – runs
when scheduled (i.e.: updates) or
automatically (i.e.: device
drives).
17. Managing Programs
You may uninstall programs if they are no longer used
or you want to free up space.
To access programs written for Windows, go to Start ->
Control Panel -> Programs -> Programs and Features
-> Uninstall
If the program is not listed, see the creator’s
instructions or search the computer for the program
files via Start.
Select the program, click Uninstall and follow
prompts.
18. Managing Programs
Some programs provide the option to Change or Repair:
Change will allow you uninstall portions of the program or set
program defaults.
Repair will diagnose and attempt to fix problems with
corrupted programs.
If a program is behaving badly or experiencing
problems, and Repair is not an option, you may try
uninstalling and reinstalling to correct the issue.
Corruption occurs when unintended changes are made to
the program during one of the program’s various processes.
19. Updating
Changes and enhancements
that are intended to make
programs run better and
defend against malware and
attacks.
Can be done manually or
automatically.
Available for operating
systems and software.
20. Updating
Automatic: system
updates will install as they
become available.
Start -> Control Panel ->
System and Security ->
Windows Update ->
Change Settings
You can configure when
the updates take place.
You must be logged on to
your computer. Usually
requires a restart.
21. Updating
Manual: updates that are
initiated directly by you.
For Windows updates:
go to Start -> All
Programs -> Windows
Update -> Check
Computer for Updates
(install update software
if needed)
Select updates to install
Restart computer
22. Updating
Programs: most often need
to be initiated by you or
through pop-up reminders.
Program updates can
usually be found at the
company’s website. (i.e.:
Adobe products via
http://www.adobe.com/do
wnloads/updates.html)
Utilize search engines to
find program updates, but
make sure you are using a
trusted source.
23. Microsoft Apps
Most commonly used:
WORD – Word processing
software
EXCEL – Spreadsheet software
POWER POINT –
Presentation software
PUBLISHER – Publication
software
24. Microsoft Apps - Word
Use for writing reports, sending letters, creating resumes
printing labels and envelopes, mass mailings, etc…
Home: Basic formatting such as font and size, text
alignment, automatic formatting, text color…
Insert: Inserts new
pages, tables, pictures, links, footers &
headers, equations, symbols…
Page Layout: Set themes, margins, page size, add
watermarks, change colors, insert columns…
References: Add table of
contents, footnote, captions, endnotes, bibliography…
25. Microsoft Apps - Word
Mailings: print envelopes, labels, and mail merge
(mass mailings created using excel spreadsheet).
Review: check for errors, use the thesaurus, translate
text, make comments, protect document…
View: change the page view via zoom, splitting
windows, view two pages at once…
Acrobat: Convert files using Adobe…
Windows button: Save, print, open, create new…
26. Microsoft Apps - Excel
Use for creating spreadsheets and analyzing numbers.
Home: Basic formatting including text, merge cells, format
cells, define numbers, insert auto sum…
Insert: Add tables, illustrations, charts, links and text…
Page layout: Manage the layout of your information
Formulas: Adds formulas to your spreadsheet that will
automatically configure data
Data: Allows external information to be inserted into the
spreadsheet
Review, View and Acrobat tabs are nearly identical to those
in Word.
27. Microsoft Apps - Publisher
Use for creating newsletters, brochures, signs, etc…
Select the type of document you wish to create
(formatted styles are available.)
The tabs are very similar to Word, except each part of
the document exists on it’s own. This allows for
layering and layout manipulation that is not possible
in Word.
Click or double on specific elements (text
box, picture, table) to select the item, move the item
and make changes. Right click on the selected element
to access a menu of options specific to that item.
28. Microsoft Apps – Power Point
Use to create presentations and slide shows. Can
incorporate music, animations and more!
Tabs are once again very similar to Word.
A happy mix between Word and Publisher.
For Microsoft Office Online Tutorials visit
http://office.microsoft.com/en-us/training/
29. Protecting Your Computer
Hardware Security –
protection against physical
theft of a computer or
information on a computer
Software Security – protection
against threats to the
computer’s operations and
programs
Data Security – protection
against data theft and data
corruption
30. Protecting Your Computer
Hardware Security Threat
Information stored on your hard
drive is vulnerable to
physical/digital theft
Info can be
stolen, misused, damaged or
destroyed
If computer hardware is
disassembled, warranty coverage
will likely be voided
When discarding computer or
wiping it clean, some info may
still be accessible to professionals
31. Protecting Your Computer
Hardware Security Protection
Keep your computer physically secure and under surveillance
and maybe invest in a locking system for your computer or
your drives. Specialized locks are available.
Lock you house when you leave or keep your computer in a
safe during extended vacations. Use good passwords!
When discarding an old computer, use a certified refurbisher
(a professional who will wipe your hard drives of all
information) or do it yourself using overwrite software. More
info is available at
http://www.microsoft.com/security/online-privacy/safely-
dispose-computers-and-devices.aspx
32. Protecting Your Computer
Software Security Threat
Denial of Service – disables use of a computer or a
service by flooding the network with too much
traffic, interrupt communication between devices, or to
disable use of a service (such as email) by the intended
user.
Trojan Horse – malicious programs that are disguised to
be read as safe by the security software. Gives hackers
total access to the computer and/or network.
Viruses and Worms – bad pieces of programming that
can infect and damage computer software and files. Can
replicate themselves.
33. Protecting Your Computer
Software Security Threat (continued)
Sniffing – the interception of information that is passed
between users (hacker eavesdropping)
Spyware – malware that spies on user activity such as
searches and websites visited.
Scareware – tries to scare the user into buying services
that are not needed, such as antivirus software
Adware – produces a constant barrage of pop-up ads
34. Protecting Your Computer
Software Security Protection
Firewall – a filter used to prevent
malicious websites from gaining
access to your computer.
Firewall settings can be adjusted in
Windows via Start -> Control Panel
-> Search: Firewall (upper right
hand corner) -> Windows Firewall
http://windows.microsoft.com/en-
us/windows7/understanding-
windows-firewall-settings
35. Protecting Your Computer
Software Security Protection
Security Software – anti-virus
and security software will help
to protect your computer
Only install one anti-virus
program otherwise they will create
problems and not work properly
i.e.: Norton, McAfee and AVG Free
Start -> All Programs -> Windows
Security Essentials to scan your
computer.
36. Protecting Your Computer
Data Security Threat
Hardware
malfunction results
in the loss of
important data and
files (luckily this
doesn’t happen
often.)
37. Protecting Your Computer
Data Security Protection
Backup your computer!
Use an external hard drive to backup important files and a
full image copy of your system in the event of a crash or
complete hardware failure.
http://windows.microsoft.com/en-us/windows7/back-up-
your-programs-system-settings-and-files
Backup using Windows via Start -> Control Panel ->
System and Maintenance -> Backup and Restore
Setup Backup if it is your first time using Windows Backup
Backup Now to manually backup outside of a schedule
38. Protecting Your Computer
Data Security Protection
(continued)
Run security and software updates
regularly
Save all tech support
documents, manuals, and discs
Use Clean-up Software to get rid of
unused files and programs.
http://www.pcworld.com/article/2
029460/panacea-or-pariah-five-
pc-cleanup-utilities-put-to-the-
test.html
39. This presentation can be found
online at:
Tiffany Hickox
Technical Services Librarian
thickox@cityofalliance.net
Editor's Notes
The only time a computer should be turned off via the Power button is if there is no other option!!!
Demonstrate printer installation at end of slide
Have the class insert and access the flash drive.
Download a file from email as zip and then extract files.
Temp files can include Microsoft recovery documents and internet temporary downloads.
Convert a doc into an Epub using www.file-convert.com