IT Training.

Slides:



Advertisements
Similar presentations
Using CrossCheck in Editorial Manager® Prepared by: Adam Nicely.
Advertisements

File Management Instruction by: Connie Hutchison & Christopher McCoy.
Google chrome operating system
Downloading, Installing, and Working with Dropbox.
Keeping You Connected Through Citrix Access your applications Access your network shares and documents Access your …and do it remotely!
SecureFX. Click on the button to Download Software (Get.SecureFX.302)
Advanced Last Updated: May Class Outline Part 1 - Review –Review of basics –Review of files and folders Part 2 - Attachments –Sending.
Microsoft Office 2013 ®® Appendix A Introduction to Cloud Computing.
Introduction to. What is Office 365 Office 365 is the same Office you already know and use every day. Office 365 is powered by “the cloud” which is a.
 Whether you are on or off campus, using a PC, Mac or mobile device, you can access UNCW software (including Microsoft Office) through TealWare in the.
Office 2013 From the START menu, select Microsoft Word. You should be prompted to log into your school Microsoft 365 account.
UNDERSTANDING THE RISKS & CHALLENGES OF Cyber Security DAVID NIMMO InDepth IT Solutions DAVID HIGGINS WatchGuard NEIL PARKER BridgePoint Group A BridgePoint.
 Whether you are on or off campus, using a PC, Mac or mobile device, you can access UNCW software (including Microsoft Office) through TealWare in the.
Download Dropbox Download should start immediately Save download file:
How to remove spyware from your PC using Spybot S&D? A SeniorNet Workshop SeniorNet is a service program of the Lutheran Service Society of Western Pennsylvania.
Move Pictures From Your Mobile Phone to Your PC.  You never know when a photo opportunity is going to arise, which is why having a camera phone can be.
1 Install FTP for Curriculum Development Professional Development Training.
Dayton Williams 19 September easy steps, in a step-by-step process, to add Dragonflies or Through the Grief eBooks to Play Books for the purpose.
WHY?. Accessing Google Drive Online Besides accessing Drive from your computer, you can access it online in Google Apps. Click the GOOGLE APP icon, then.
Introduction to Computers and Windows. Overview  What is a computer?  What is an operating system?  Starting and Shutting Down a computer  The mouse.
Mehdi Ghayoumi Kent State University Computer Science Department Summer 2015 Exposition on Cyber Infrastructure and Big Data.
Computer Security! Emma Campbell, 8K VirusesHackingBackups.
Diagnostic Pathfinder for Instructors. Diagnostic Pathfinder Local File vs. Database Normal operations Expert operations Admin operations.
Saving Work to Your School Server Click through this presentation at your own speed. Use it as a review or a guide while saving a project.
Choose a folder on the remote machine. For e.g. if there is a machine named comp1 in your network, please choose a folder in that machine which you will.
Internet Security and Your Computer Welcome to Boot Camp.
Computer security virus, hacking and backups. Computer viruses are small software programs that are designed to spread from one computer to another.
Backup. What to back up? Pictures Documents (include s if using Off Line Program) Video’s Music System Image – Programs – Registry – Operating System.
Final Essex Training TY What’s New In TaxWise Gary Blauth Module NJ 2.3.
What is it? CLOUD COMPUTING.  Connects to the cloud via the Internet  Does computing tasks, or  Runs applications, or  Stores Data THE AVERAGE CLOUD.
Emedia Training Created October 13, 2009 By Thomas Redd.
Common Computer Problems. Freezing Problem: My computer won't do anything. Solution: Make sure your computer is turned on, plugged in, and there is no.
Keeping Organized Managing your folders and files on your computer.
Operating Systems. An operating system (os) is a software program that enables the computer hardware to communicate and operate with the computer software.
Website 1. Username and Password: See your ITRT or Media Specialist 2. Click Login Created by: Carol Schreiber,
Managing Your Computer Staff Development Day January 14, 2008 Presenter: Jenny Wallskog.
Technology Training For New Teachers Beverly E. Horner ITRT Colonial Beach Public Schools.
ITS Lunch & Learn November 13, What is Office 365? Office 365 is Microsoft’s software as a service offering. It includes hosted and calendaring.
Goals Be able to identify the parts of a URL Determine the safeness of a link Know the best places to find the info you need Know how to deal with toolbars.
Welcome to Computer Solutions 1! Before we begin our nine weeks, it is important that you have some basic knowledge about using and maintaining your computer.
1. Setting up an account- technical
Keeping Organized How to set up and use your school work folder.
Ransomware BISD Technology Department. Ransomware Ransomware is a type of malicious software (malware) that infects a computer and/or mobile device and.
For more information on Rouge, visit:
Protecting Against Cyber Attacks PLEASE TAKE A MINUTE TO LOOK AT THIS IMPORTANT MESSAGE. THIS IS HAPPENING HERE AND NOW! LET US SAVE YOU AND YOUR INFORMATION.
Intro to Digital Technology Review for Final Introduction to Digital Technology Finals Seniors Monday, 5/16 – 2 nd Tuesday 5/17 – 1 st,3 rd Underclassmen.
How To Make The Backup Of AVG Antivirus 2017 Definitions.
1.5 File Management.
Socorro Independent School District
WikID installation/training
Unit 4 IT Security.
Cyber Security Awareness Workshop
Creating a Windows 10 Virtual machine
Chromebook Training.
Chromebook Training.
How to Uninstall Bitdefender Software from MAC?. Bitdefender offers system with full protection from a good of deadly viruses, Malwares and different.
Technical expert studying and writing helpful articles on antivirus and other security products.
Things To Avoid: 1-Never your password to anyone.
How to Solve Hard-Drive Failure in Laptop? by I FIX PC.
QuickBooks Error Support for QuickBooks Errors
Norton technical support Norton.com/Setup | Norton Setup and Install with Product Key Norton Antvirus Activation For protection against.
Using OneDrive.
Discovery Streaming Downloads
What Is Google File Stream
MICROSOFT OFFICE 365 & ONE DRIVE TO SAVE YOUR DOCUMENTS!
Vocab Steps Race (Guess the word)
Getting to Know Your Computer
NSC IT Services’ Handy onedrivemapper Tool
Computer File Management Howard Weiss
GenCyber Day Website Security.
Presentation transcript:

IT Training

IT Procedures Something is wrong with my computer. Something popped up that I don’t recognize. My computer is freezing up. I forget my password.

Computer Storage and Speed My computer runs slow. I don’t know how to use Dropbox. I save everything on my desktop. Dropbox: Online vs. Selective Sync vs. Smart Sync

Dropox Selective Sync Click Dropbox icon on the bottom right of your menu bar. Click the settings gear icon in the top right corner, followed by preferences. 3. Click Sync, followed by Selective Sync. 4. Select within the TMF Team Folder, only the files you need to save on your hard drive for immediate access.

Dropbox Smart Sync Click the Folder icon on your desktop or in your menu bar. Click TMF Team Folder. 4. Right click on the folder you want to Smart Sync, and choose Smart Sync to store on your hard drive, or Online Only to store in the cloud. 3. Click your Program/Department folder

Computer Updates Manufacturer Updates Windows Updates Agents installed Updates “Reboot Now” Shut down

IT Security +Businesses are seeing more ransomware attacks, more often The number of ransomware attacks on businesses tripled in 2017, jumping to one attack every 40 seconds. +NPO Example: Last year, the Indiana based non-profit organization Little Red Door, which provides diagnostics, treatment, and supplies to under-served cancer patients, was a victim of cyber attacks. Their entire staff received text messages followed by an ominous email with “Cancer Sucks, But We Suck More!” as the subject line, and the hackers accessed the nonprofit's server after a staffer inadvertently downloaded malware from that email.  Hackers blocked access to the client files and financial data of the organization. They reported that the culprits infected their central server, stripped and encrypted data, and demanded a steep 50 Bitcoin (US$44,000) payment.

IT Security How can we watch our network and keep the bad guys out? Firewall 2 Step Verification Email Dropbox Staff Computers What not to click Installed Malware and Antivirus agent Moving forward

Any Questions