Learning to do more with your computer.
Intermediate Computer Skills
 Ctrl+Alt+Del
 Using External Devices
 Creating, organizing and moving files
 Installing and uninstalling programs
 Running updates
 Understanding Microsoft Application Basics
 Protecting your computer
Ctrl + Alt + Del
 Opens Task Manager or Windows Securities
depending on the operating system
 Allows you to manage your computer if problems with
programs or malware arise.
 Safely restarts or shuts off your computer.
 Closes programs that are locked or are experiencing
problems without having to restart the entire
computer.
 Use Ctrl+Alt+Del instead of just turning off the
computer with the Power button.
Using External Devices
 Any component that is
used in conjunction
with the main
processing unit.
 Also referred to as
peripheral hardware
 Connects via USB cord
or wireless signal
Using External Devices
 When first connected, a device driver (software) is
installed on the computer, either manually or
automatically.
 If you are not prompted to install a driver or it does not
automatically download, they can usually be found via
the internet. Only download from trusted sites.
 Devices can be accessed via the Start menu, usually
from Computer or Devices and Printers.
 Drivers can be accessed via Start -> Control Panel ->
Programs or by searching drivers at the Start menu.
Using External Devices
Types of external devices:
 Removable storage (flash
drives, disk drives, iPod, etc.)
 Non-removable storage
(external hard drives)
 Input
(mouse, keyboard, touch
screen, scanner, etc.)
 Output
(monitor, speakers, TV, print
er)
Managing Files
 A File is a resource for storing
and sharing information and
is used in conjunction with a
Computer Program.
 Codes are used to determine
the file type.
 A list of common file types is
available at:
http://mistupid.com/comput
ers/filetypes.htm
Managing Files
 Common File types include
 Microsoft files: doc, ppt, xls, pub
 Audio files: mp3, wma, wva
 Picture files:
jpg, tiff, bmp, gif, png, pic, etc.
 Adobe files: pdf, ePub
 Video files: asf, avi, swf, mov
 Rich text files: rtf
 Html files: htm
 Compressed files: zip
Managing Files
 Files are created when info that has been entered into
a program or peripheral is saved either to the computer
or to a device.
 Some files are temporarily stored on the computer, and
will later disappear or become unavailable.
 The destination of the saved file and the file type are
determined when the file is created.
 Multiple file types can be created from the original.
Managing Files
 Each file type requires a specific kind of program to
read it.
 In some cases, files can be converted to allow for
program compatibility or to fit the intended use.
 Free file converters are available online:
 www.file-convert.com
 www.freefileconvert.com
 http://www.zamzar.com/
Managing Files
 Files can be moved, copied, and organized.
 To move a file, drag and drop it from one location to
another.
 To copy a file, right click the file and Copy, then paste it
to the desired location.
 To send a file to another location, right click the file and
Send to the desired destination.
 To create a folder, right click in the window and
New->Folder.
 To name your file, right click the file and Rename file.
Managing files
 Files can be deleted from devices and computers.
 Right click the file and Delete. If prompted, confirm by
clicking Yes.
 Files stored on a computer are sent to the recycle bin. To
permanently delete the file, you must delete it from the
recycle bin.
 Files on flash drives, etc., are permanently deleted.
 When files on a computer are deleted, they are
inaccessible, yet the info still technically exists until it
is overwritten with new information. This is where
computer forensics comes into play.
Managing Programs
 Computer Programs are a set of instructions provided
to a computer, which then executes the instructions.
 Computer Programs are made up of Source
Code, which are analyzed and developed by
programmers.
 There are two main types of programs
 System Software – operates and controls a computer
(i.e.: operating systems, drivers, utilities)
 Application Software (apps)– performs useful tasks (i.e.:
Microsoft office, media players, games)
 System Software is to necessary as Application Software
is to useful.
Managing Programs
 All programs written for
Windows can be found on your
computer via Start->Control
Panel -> Programs
 Programs can be obtained via
the internet or through disks.
 Only download programs from
trusted sources.
 Research new programs and
read reviews before
downloading.
Managing Programs
 Your computer comes equipped with a program to
manage installation.
 Prior to installing/purchase, you should check the
system requirements for compatibility (Start ->
Control Panel -> System and Security -> System).
 Usually you will be prompted to Install the
program, and then to Run the installation process.
 After installation, you may be asked to configure
program defaults, to verify product activation using a
license key, or to Finalize/Close.
Managing Programs
 Most common types of
installation processes:
 Attended – requires a user who
attends to the process and makes
choices.
 Silent – occurs without any
notification or windows.
Malware almost always installs
this way.
 Scheduled/Automated – runs
when scheduled (i.e.: updates) or
automatically (i.e.: device
drives).
Managing Programs
 You may uninstall programs if they are no longer used
or you want to free up space.
 To access programs written for Windows, go to Start ->
Control Panel -> Programs -> Programs and Features
-> Uninstall
 If the program is not listed, see the creator’s
instructions or search the computer for the program
files via Start.
 Select the program, click Uninstall and follow
prompts.
Managing Programs
 Some programs provide the option to Change or Repair:
 Change will allow you uninstall portions of the program or set
program defaults.
 Repair will diagnose and attempt to fix problems with
corrupted programs.
 If a program is behaving badly or experiencing
problems, and Repair is not an option, you may try
uninstalling and reinstalling to correct the issue.
 Corruption occurs when unintended changes are made to
the program during one of the program’s various processes.
Updating
 Changes and enhancements
that are intended to make
programs run better and
defend against malware and
attacks.
 Can be done manually or
automatically.
 Available for operating
systems and software.
Updating
 Automatic: system
updates will install as they
become available.
 Start -> Control Panel ->
System and Security ->
Windows Update ->
Change Settings
 You can configure when
the updates take place.
You must be logged on to
your computer. Usually
requires a restart.
Updating
 Manual: updates that are
initiated directly by you.
 For Windows updates:
go to Start -> All
Programs -> Windows
Update -> Check
Computer for Updates
(install update software
if needed)
 Select updates to install
 Restart computer
Updating
 Programs: most often need
to be initiated by you or
through pop-up reminders.
 Program updates can
usually be found at the
company’s website. (i.e.:
Adobe products via
http://www.adobe.com/do
wnloads/updates.html)
 Utilize search engines to
find program updates, but
make sure you are using a
trusted source.
Microsoft Apps
 Most commonly used:
 WORD – Word processing
software
 EXCEL – Spreadsheet software
 POWER POINT –
Presentation software
 PUBLISHER – Publication
software
Microsoft Apps - Word
Use for writing reports, sending letters, creating resumes
printing labels and envelopes, mass mailings, etc…
 Home: Basic formatting such as font and size, text
alignment, automatic formatting, text color…
 Insert: Inserts new
pages, tables, pictures, links, footers &
headers, equations, symbols…
 Page Layout: Set themes, margins, page size, add
watermarks, change colors, insert columns…
 References: Add table of
contents, footnote, captions, endnotes, bibliography…
Microsoft Apps - Word
 Mailings: print envelopes, labels, and mail merge
(mass mailings created using excel spreadsheet).
 Review: check for errors, use the thesaurus, translate
text, make comments, protect document…
 View: change the page view via zoom, splitting
windows, view two pages at once…
 Acrobat: Convert files using Adobe…
 Windows button: Save, print, open, create new…
Microsoft Apps - Excel
Use for creating spreadsheets and analyzing numbers.
 Home: Basic formatting including text, merge cells, format
cells, define numbers, insert auto sum…
 Insert: Add tables, illustrations, charts, links and text…
 Page layout: Manage the layout of your information
 Formulas: Adds formulas to your spreadsheet that will
automatically configure data
 Data: Allows external information to be inserted into the
spreadsheet
 Review, View and Acrobat tabs are nearly identical to those
in Word.
Microsoft Apps - Publisher
Use for creating newsletters, brochures, signs, etc…
 Select the type of document you wish to create
(formatted styles are available.)
 The tabs are very similar to Word, except each part of
the document exists on it’s own. This allows for
layering and layout manipulation that is not possible
in Word.
 Click or double on specific elements (text
box, picture, table) to select the item, move the item
and make changes. Right click on the selected element
to access a menu of options specific to that item.
Microsoft Apps – Power Point
Use to create presentations and slide shows. Can
incorporate music, animations and more!
 Tabs are once again very similar to Word.
 A happy mix between Word and Publisher.
For Microsoft Office Online Tutorials visit
http://office.microsoft.com/en-us/training/
Protecting Your Computer
 Hardware Security –
protection against physical
theft of a computer or
information on a computer
 Software Security – protection
against threats to the
computer’s operations and
programs
 Data Security – protection
against data theft and data
corruption
Protecting Your Computer
 Hardware Security Threat
 Information stored on your hard
drive is vulnerable to
physical/digital theft
 Info can be
stolen, misused, damaged or
destroyed
 If computer hardware is
disassembled, warranty coverage
will likely be voided
 When discarding computer or
wiping it clean, some info may
still be accessible to professionals
Protecting Your Computer
 Hardware Security Protection
 Keep your computer physically secure and under surveillance
and maybe invest in a locking system for your computer or
your drives. Specialized locks are available.
 Lock you house when you leave or keep your computer in a
safe during extended vacations. Use good passwords!
 When discarding an old computer, use a certified refurbisher
(a professional who will wipe your hard drives of all
information) or do it yourself using overwrite software. More
info is available at
http://www.microsoft.com/security/online-privacy/safely-
dispose-computers-and-devices.aspx
Protecting Your Computer
 Software Security Threat
 Denial of Service – disables use of a computer or a
service by flooding the network with too much
traffic, interrupt communication between devices, or to
disable use of a service (such as email) by the intended
user.
 Trojan Horse – malicious programs that are disguised to
be read as safe by the security software. Gives hackers
total access to the computer and/or network.
 Viruses and Worms – bad pieces of programming that
can infect and damage computer software and files. Can
replicate themselves.
Protecting Your Computer
 Software Security Threat (continued)
 Sniffing – the interception of information that is passed
between users (hacker eavesdropping)
 Spyware – malware that spies on user activity such as
searches and websites visited.
 Scareware – tries to scare the user into buying services
that are not needed, such as antivirus software
 Adware – produces a constant barrage of pop-up ads
Protecting Your Computer
 Software Security Protection
 Firewall – a filter used to prevent
malicious websites from gaining
access to your computer.
 Firewall settings can be adjusted in
Windows via Start -> Control Panel
-> Search: Firewall (upper right
hand corner) -> Windows Firewall
 http://windows.microsoft.com/en-
us/windows7/understanding-
windows-firewall-settings
Protecting Your Computer
 Software Security Protection
 Security Software – anti-virus
and security software will help
to protect your computer
 Only install one anti-virus
program otherwise they will create
problems and not work properly
 i.e.: Norton, McAfee and AVG Free
 Start -> All Programs -> Windows
Security Essentials to scan your
computer.
Protecting Your Computer
 Data Security Threat
 Hardware
malfunction results
in the loss of
important data and
files (luckily this
doesn’t happen
often.)
Protecting Your Computer
 Data Security Protection
 Backup your computer!
 Use an external hard drive to backup important files and a
full image copy of your system in the event of a crash or
complete hardware failure.
http://windows.microsoft.com/en-us/windows7/back-up-
your-programs-system-settings-and-files
 Backup using Windows via Start -> Control Panel ->
System and Maintenance -> Backup and Restore
 Setup Backup if it is your first time using Windows Backup
 Backup Now to manually backup outside of a schedule
Protecting Your Computer
 Data Security Protection
(continued)
 Run security and software updates
regularly
 Save all tech support
documents, manuals, and discs
 Use Clean-up Software to get rid of
unused files and programs.
http://www.pcworld.com/article/2
029460/panacea-or-pariah-five-
pc-cleanup-utilities-put-to-the-
test.html
This presentation can be found
online at:
Tiffany Hickox
Technical Services Librarian
thickox@cityofalliance.net

Intermediate computer skills

  • 1.
    Learning to domore with your computer.
  • 2.
    Intermediate Computer Skills Ctrl+Alt+Del  Using External Devices  Creating, organizing and moving files  Installing and uninstalling programs  Running updates  Understanding Microsoft Application Basics  Protecting your computer
  • 3.
    Ctrl + Alt+ Del  Opens Task Manager or Windows Securities depending on the operating system  Allows you to manage your computer if problems with programs or malware arise.  Safely restarts or shuts off your computer.  Closes programs that are locked or are experiencing problems without having to restart the entire computer.  Use Ctrl+Alt+Del instead of just turning off the computer with the Power button.
  • 4.
    Using External Devices Any component that is used in conjunction with the main processing unit.  Also referred to as peripheral hardware  Connects via USB cord or wireless signal
  • 5.
    Using External Devices When first connected, a device driver (software) is installed on the computer, either manually or automatically.  If you are not prompted to install a driver or it does not automatically download, they can usually be found via the internet. Only download from trusted sites.  Devices can be accessed via the Start menu, usually from Computer or Devices and Printers.  Drivers can be accessed via Start -> Control Panel -> Programs or by searching drivers at the Start menu.
  • 6.
    Using External Devices Typesof external devices:  Removable storage (flash drives, disk drives, iPod, etc.)  Non-removable storage (external hard drives)  Input (mouse, keyboard, touch screen, scanner, etc.)  Output (monitor, speakers, TV, print er)
  • 7.
    Managing Files  AFile is a resource for storing and sharing information and is used in conjunction with a Computer Program.  Codes are used to determine the file type.  A list of common file types is available at: http://mistupid.com/comput ers/filetypes.htm
  • 8.
    Managing Files  CommonFile types include  Microsoft files: doc, ppt, xls, pub  Audio files: mp3, wma, wva  Picture files: jpg, tiff, bmp, gif, png, pic, etc.  Adobe files: pdf, ePub  Video files: asf, avi, swf, mov  Rich text files: rtf  Html files: htm  Compressed files: zip
  • 9.
    Managing Files  Filesare created when info that has been entered into a program or peripheral is saved either to the computer or to a device.  Some files are temporarily stored on the computer, and will later disappear or become unavailable.  The destination of the saved file and the file type are determined when the file is created.  Multiple file types can be created from the original.
  • 10.
    Managing Files  Eachfile type requires a specific kind of program to read it.  In some cases, files can be converted to allow for program compatibility or to fit the intended use.  Free file converters are available online:  www.file-convert.com  www.freefileconvert.com  http://www.zamzar.com/
  • 11.
    Managing Files  Filescan be moved, copied, and organized.  To move a file, drag and drop it from one location to another.  To copy a file, right click the file and Copy, then paste it to the desired location.  To send a file to another location, right click the file and Send to the desired destination.  To create a folder, right click in the window and New->Folder.  To name your file, right click the file and Rename file.
  • 12.
    Managing files  Filescan be deleted from devices and computers.  Right click the file and Delete. If prompted, confirm by clicking Yes.  Files stored on a computer are sent to the recycle bin. To permanently delete the file, you must delete it from the recycle bin.  Files on flash drives, etc., are permanently deleted.  When files on a computer are deleted, they are inaccessible, yet the info still technically exists until it is overwritten with new information. This is where computer forensics comes into play.
  • 13.
    Managing Programs  ComputerPrograms are a set of instructions provided to a computer, which then executes the instructions.  Computer Programs are made up of Source Code, which are analyzed and developed by programmers.  There are two main types of programs  System Software – operates and controls a computer (i.e.: operating systems, drivers, utilities)  Application Software (apps)– performs useful tasks (i.e.: Microsoft office, media players, games)  System Software is to necessary as Application Software is to useful.
  • 14.
    Managing Programs  Allprograms written for Windows can be found on your computer via Start->Control Panel -> Programs  Programs can be obtained via the internet or through disks.  Only download programs from trusted sources.  Research new programs and read reviews before downloading.
  • 15.
    Managing Programs  Yourcomputer comes equipped with a program to manage installation.  Prior to installing/purchase, you should check the system requirements for compatibility (Start -> Control Panel -> System and Security -> System).  Usually you will be prompted to Install the program, and then to Run the installation process.  After installation, you may be asked to configure program defaults, to verify product activation using a license key, or to Finalize/Close.
  • 16.
    Managing Programs  Mostcommon types of installation processes:  Attended – requires a user who attends to the process and makes choices.  Silent – occurs without any notification or windows. Malware almost always installs this way.  Scheduled/Automated – runs when scheduled (i.e.: updates) or automatically (i.e.: device drives).
  • 17.
    Managing Programs  Youmay uninstall programs if they are no longer used or you want to free up space.  To access programs written for Windows, go to Start -> Control Panel -> Programs -> Programs and Features -> Uninstall  If the program is not listed, see the creator’s instructions or search the computer for the program files via Start.  Select the program, click Uninstall and follow prompts.
  • 18.
    Managing Programs  Someprograms provide the option to Change or Repair:  Change will allow you uninstall portions of the program or set program defaults.  Repair will diagnose and attempt to fix problems with corrupted programs.  If a program is behaving badly or experiencing problems, and Repair is not an option, you may try uninstalling and reinstalling to correct the issue.  Corruption occurs when unintended changes are made to the program during one of the program’s various processes.
  • 19.
    Updating  Changes andenhancements that are intended to make programs run better and defend against malware and attacks.  Can be done manually or automatically.  Available for operating systems and software.
  • 20.
    Updating  Automatic: system updateswill install as they become available.  Start -> Control Panel -> System and Security -> Windows Update -> Change Settings  You can configure when the updates take place. You must be logged on to your computer. Usually requires a restart.
  • 21.
    Updating  Manual: updatesthat are initiated directly by you.  For Windows updates: go to Start -> All Programs -> Windows Update -> Check Computer for Updates (install update software if needed)  Select updates to install  Restart computer
  • 22.
    Updating  Programs: mostoften need to be initiated by you or through pop-up reminders.  Program updates can usually be found at the company’s website. (i.e.: Adobe products via http://www.adobe.com/do wnloads/updates.html)  Utilize search engines to find program updates, but make sure you are using a trusted source.
  • 23.
    Microsoft Apps  Mostcommonly used:  WORD – Word processing software  EXCEL – Spreadsheet software  POWER POINT – Presentation software  PUBLISHER – Publication software
  • 24.
    Microsoft Apps -Word Use for writing reports, sending letters, creating resumes printing labels and envelopes, mass mailings, etc…  Home: Basic formatting such as font and size, text alignment, automatic formatting, text color…  Insert: Inserts new pages, tables, pictures, links, footers & headers, equations, symbols…  Page Layout: Set themes, margins, page size, add watermarks, change colors, insert columns…  References: Add table of contents, footnote, captions, endnotes, bibliography…
  • 25.
    Microsoft Apps -Word  Mailings: print envelopes, labels, and mail merge (mass mailings created using excel spreadsheet).  Review: check for errors, use the thesaurus, translate text, make comments, protect document…  View: change the page view via zoom, splitting windows, view two pages at once…  Acrobat: Convert files using Adobe…  Windows button: Save, print, open, create new…
  • 26.
    Microsoft Apps -Excel Use for creating spreadsheets and analyzing numbers.  Home: Basic formatting including text, merge cells, format cells, define numbers, insert auto sum…  Insert: Add tables, illustrations, charts, links and text…  Page layout: Manage the layout of your information  Formulas: Adds formulas to your spreadsheet that will automatically configure data  Data: Allows external information to be inserted into the spreadsheet  Review, View and Acrobat tabs are nearly identical to those in Word.
  • 27.
    Microsoft Apps -Publisher Use for creating newsletters, brochures, signs, etc…  Select the type of document you wish to create (formatted styles are available.)  The tabs are very similar to Word, except each part of the document exists on it’s own. This allows for layering and layout manipulation that is not possible in Word.  Click or double on specific elements (text box, picture, table) to select the item, move the item and make changes. Right click on the selected element to access a menu of options specific to that item.
  • 28.
    Microsoft Apps –Power Point Use to create presentations and slide shows. Can incorporate music, animations and more!  Tabs are once again very similar to Word.  A happy mix between Word and Publisher. For Microsoft Office Online Tutorials visit http://office.microsoft.com/en-us/training/
  • 29.
    Protecting Your Computer Hardware Security – protection against physical theft of a computer or information on a computer  Software Security – protection against threats to the computer’s operations and programs  Data Security – protection against data theft and data corruption
  • 30.
    Protecting Your Computer Hardware Security Threat  Information stored on your hard drive is vulnerable to physical/digital theft  Info can be stolen, misused, damaged or destroyed  If computer hardware is disassembled, warranty coverage will likely be voided  When discarding computer or wiping it clean, some info may still be accessible to professionals
  • 31.
    Protecting Your Computer Hardware Security Protection  Keep your computer physically secure and under surveillance and maybe invest in a locking system for your computer or your drives. Specialized locks are available.  Lock you house when you leave or keep your computer in a safe during extended vacations. Use good passwords!  When discarding an old computer, use a certified refurbisher (a professional who will wipe your hard drives of all information) or do it yourself using overwrite software. More info is available at http://www.microsoft.com/security/online-privacy/safely- dispose-computers-and-devices.aspx
  • 32.
    Protecting Your Computer Software Security Threat  Denial of Service – disables use of a computer or a service by flooding the network with too much traffic, interrupt communication between devices, or to disable use of a service (such as email) by the intended user.  Trojan Horse – malicious programs that are disguised to be read as safe by the security software. Gives hackers total access to the computer and/or network.  Viruses and Worms – bad pieces of programming that can infect and damage computer software and files. Can replicate themselves.
  • 33.
    Protecting Your Computer Software Security Threat (continued)  Sniffing – the interception of information that is passed between users (hacker eavesdropping)  Spyware – malware that spies on user activity such as searches and websites visited.  Scareware – tries to scare the user into buying services that are not needed, such as antivirus software  Adware – produces a constant barrage of pop-up ads
  • 34.
    Protecting Your Computer Software Security Protection  Firewall – a filter used to prevent malicious websites from gaining access to your computer.  Firewall settings can be adjusted in Windows via Start -> Control Panel -> Search: Firewall (upper right hand corner) -> Windows Firewall  http://windows.microsoft.com/en- us/windows7/understanding- windows-firewall-settings
  • 35.
    Protecting Your Computer Software Security Protection  Security Software – anti-virus and security software will help to protect your computer  Only install one anti-virus program otherwise they will create problems and not work properly  i.e.: Norton, McAfee and AVG Free  Start -> All Programs -> Windows Security Essentials to scan your computer.
  • 36.
    Protecting Your Computer Data Security Threat  Hardware malfunction results in the loss of important data and files (luckily this doesn’t happen often.)
  • 37.
    Protecting Your Computer Data Security Protection  Backup your computer!  Use an external hard drive to backup important files and a full image copy of your system in the event of a crash or complete hardware failure. http://windows.microsoft.com/en-us/windows7/back-up- your-programs-system-settings-and-files  Backup using Windows via Start -> Control Panel -> System and Maintenance -> Backup and Restore  Setup Backup if it is your first time using Windows Backup  Backup Now to manually backup outside of a schedule
  • 38.
    Protecting Your Computer Data Security Protection (continued)  Run security and software updates regularly  Save all tech support documents, manuals, and discs  Use Clean-up Software to get rid of unused files and programs. http://www.pcworld.com/article/2 029460/panacea-or-pariah-five- pc-cleanup-utilities-put-to-the- test.html
  • 39.
    This presentation canbe found online at: Tiffany Hickox Technical Services Librarian thickox@cityofalliance.net

Editor's Notes

  • #4 The only time a computer should be turned off via the Power button is if there is no other option!!!
  • #6 Demonstrate printer installation at end of slide
  • #7 Have the class insert and access the flash drive.
  • #9 Download a file from email as zip and then extract files.
  • #10 Temp files can include Microsoft recovery documents and internet temporary downloads.
  • #11 Convert a doc into an Epub using www.file-convert.com
  • #12 Use a camera to demonstrate the above.
  • #28 Show them the survey example.