Copyright © 2012 by The McGraw-Hill Companies, Inc. All rights reserved. McGraw-Hill/Irwin PERSONAL PRODUCTIVITY USING IT TECHNOLOGY PLUG-IN T1.

Slides:



Advertisements
Similar presentations
January is Clean Up Your Computer Month! Here are some tips to make your computer run faster!
Advertisements

Providing protection from potential security threats that exist for any internet-connected computer is termed e- security. It is important to be able to.
Tips and tools to keep you and your information safe on-line. We will go over a lot of information today, so it is important to pay attention and follow.
Tips and tools to keep you and your information safe on-line. We will go over a lot of information today, so it is important to pay attention and follow.
1 of 2 By observing the guidelines below and performing regular maintenance on your computer, you can help keep your computer safe and maintain optimum.
Online Safety. Introduction The Internet is a very public place Need to be cautious Minimize your personal risk while online Exposure to: viruses, worms,
COMPUTER BASICS METC 106. The Internet Global group of interconnected networks Originated in 1969 – Department of Defense ARPANet Only text, no graphics.
KEEPING YOUR COMPUTER RUNNING AND SAFE BUAD 6800 – SPRING 2011 MEAGAN FRANCES AYERS.
Computer Maintenance & Safety Spring Internet Safety Keeping your computer safe What is a computer virus? A computer program that can copy itself.
Online Banking Fraud Prevention Recommendations and Best Practices This document provides you with fraud prevention best practices that every employee.
Explanations Of Software Utilities By Tim Wong.
Tutorial 5 Downloading and Storing Data. XP Objectives Learn what FTP is and how it works Explore how to use a Web browser to transfer files Navigate.
What is spyware? Supervisor dr. lo’ay tawalbeh Search By Mahmoud al-ashram Soufyan al-qblawe.
1 Chapter Overview Managing Compression Managing Disk Quotas Increasing Security with EFS Using Disk Defragmenter, Check Disk, and Disk Cleanup.
Utility Programs and their Functions. Antivirus Software (Virus Checker) Keep the Computer software healthy and free of virus’ that can harm the function.
Format Scandisk Defragmentation Antivirus Compression Software
Computer Viruses. Where the name came from This is a phrase coined from biology to describe a piece of software that behaves very much like a real virus.
Title: The Internet LO: Security risks. Security risks Types of risks: 1.Phishing 2.Pharming 3.Spamming 4.Spyware 5.Cookies 6.Virus.
Using Anti-virus Software A SeniorNet Workshop SeniorNet is a service program of the Lutheran Service Society of Western Pennsylvania.
 Lesson 05: Computer Maintenance. Keep Software Up-To-Date Patches Security Holes Improves Software Stability Improves Software Performance Adds.
Lesson 46: Using Information From the Web copy and paste information from a Web site print a Web page download information from a Web site customize Web.
Lesson 46: Using Information From the Web copy and paste information from a Web site print a Web page download information from a Web site customize Web.
Basic Computer Maintenance Basic Computer Maintenance Clean and Cool Deleting Temporary Files Scandisk Backup Your Data How to.
COMPUTER FUNDAMENTALS David Samuel Bhatti
Utility Programs  A type of system software that is used to solve a particular problem is called utility program. Many operating system provides different.
Internet safety By Lydia Snowden.
Contents  Viruses Viruses  Computer Worms Computer Worms  Trojans Trojans  Spyware Spyware  Adware Adware  Spam Spam  Hoaxes and Scams Hoaxes and.
GOLD UNIT 4 - IT SECURITY FOR USERS (2 CREDITS) Cameron Simpson.
Information guide.
Get the best performance out of your PC By Matthew Pinch.
Operating Systems Concepts 1/e Ruth Watson Chapter 4 Chapter 4 Windows Utilities Ruth Watson.
Safe Computing. Computer Maintenance  Back up, Back up, Back up  External Hard Drive  CDs or DVDs  Disk Defragmenter  Reallocates files so they use.
Threat to I.T Security By Otis Powers. Hacking Hacking is a big threat to society because it could expose secrets of the I.T industry that perhaps should.
COMPUTER CARE & MAINTENANCE. Protecting Your Computer From Damage Like any kind of equipment, your computer requires care and maintenance to run smoothly.
COMPREHENSIVE Windows Tutorial 5 Protecting Your Computer.
PC Maintenance How to keep your computer healthy.
®® Microsoft Windows 7 Windows Tutorial 5 Protecting Your Computer.
GOLD UNIT 4 - IT SECURITY FOR USERS (2 CREDITS) Thomas Jenkins.
To proceed onto the next stage of the install please Agree to the terms and conditions and select next.
Gorman, Stubbs, & CEP Inc. 1 Introduction to Operating Systems Lesson 4 Microsoft Windows XP.
Your Interactive Guide to the Digital World Discovering Computers 2012.
Computing Fundamentals Module Lesson 3 — Changing Settings and Customizing the Desktop Computer Literacy BASICS.
Computing Fundamentals Module Lesson 10 — File Management with Windows Explorer Computer Literacy BASICS.
Company Guidelines and Basic Rules for …. No text words or slang, all s sent have to be polite and formal Use suitable, relevant subject lines.
XP Practical PC, 3e Chapter 6 1 Protecting Your Files.
3.05 Protect Your Computer and Information Unit 3 Internet Basics.
Copyright ©2005 CNET Networks, Inc. All rights reserved. Practice safety Learn how to protect yourself against common attacks.
Basic Computer Maintenance Clean and Cool Deleting Temporary Files Scandisk Backup Your Data How to run scandisk? Click on Start-Programs-Accessories-
IT1001 – Personal Computer Hardware & system Operations Week7- Introduction to backup & restore tools Introduction to user account with access rights.
Matthew Glenn AP2 Techno for Tanzania This presentation will cover the different utilities on a computer.
Cyber Safety Mohammad Abbas Alamdar Teacher of ICT STS Ajman – Boys School.
LESSON 5-2 Protecting Your Computer Lesson Contents Protecting Your Computer Best Practices for Securing Online and Network Transactions Measures for Securing.
W elcome to our Presentation. Presentation Topic Virus.
COMPUTER SYSTEM TOOLS. SCANDISK MICROSOFT UTILITY PURCHASED FROM NORTON, WHICH IS NOW SYMANTEC; INCLUDED WITH MS-DOS 6.2 AND ON AS WELL AS ALL VERSIONS.
Your Interactive Guide to the Digital World Discovering Computers 2012.
1 Maintaining the Windows O/S. 2 Introduction Virus protection Remove old and unused files Scan hard disk Defragment hard drive Back up and updated recovery.
Software - Utilities Objectives Understand what is meant by utility software and application software Look at common utilities – Security – Disk organisation.
Candidates should be able to:  describe the purpose and use of common utility programs for:  computer security (antivirus, spyware protection and firewalls)
Any criminal action perpetrated primarily through the use of a computer.
GCSE Computing: A451 Computer Systems & Programming Topic 3 Software System Software (2) Utility Software.
DEVICE MANAGEMENT AND SECURITY NTM 1700/1702. LEARNING OUTCOMES 1. Students will manipulate multiple platforms and troubleshoot problems when they arise.
STOP. THINK. CONNECT. Online Safety Quiz. Round 1: Safety and Security.
By the end of this lesson you will be able to: 1. Determine the preventive support measures that are in place at your school.
Computer Security Keeping you and your computer safe in the digital world.
Unit 4 IT Security.
Computer Literacy BASICS
Plug-In T1: Personal Productivity Using IT
Basic Computer Maintenance
HOW DO I KEEP MY COMPUTER SAFE?
Presentation transcript:

Copyright © 2012 by The McGraw-Hill Companies, Inc. All rights reserved. McGraw-Hill/Irwin PERSONAL PRODUCTIVITY USING IT TECHNOLOGY PLUG-IN T1

T1-2 LEARNING OUTCOMES 1.Describe the four steps you can use to create a strong password 2.Identify three tips you can use to manage your files 3.Explain why you would use Microsoft’s backup and recovery utility 4.Describe the six common mistakes 5.Explain spam and phishing and identify three ways that you can prevent each

T1-3 LEARNING OUTCOMES 6.Explain the primary uses of spyware and adware 7.Identify three things you can do to maintain your computer and keep it running smoothly 8.Explain why you would install anti-virus protection software 9.Describe the need for a personal firewall

T1-4 INTRODUCTION A number of things can be done to keep a personal computer running smoothly: –Creating strong passwords –Performing good file management –Implementing effective backup and recovery strategies –Using Zip files –Writing professional s –Stopping spam

T1-5 INTRODUCTION A number of things can be done to keep a personal computer running smoothly (cont…): –Preventing phishing –Detecting spyware –Restricting instant messaging –Increasing PC performance –Using anti-virus software –Installing a personal firewall

T1-6 INTRODUCTION

T1-7 CREATING STRONG PASSWORDS Four steps you can use to create strong passwords: 1.Create strong passwords that you can remember 2.Keep your passwords a secret 3.Manage your passwords 4.Monitor your accounts

T1-8 Create Strong Passwords That You Can Remember To create a strong password come up with a passphrase –A passphrase is a sentence that you can remember Example: “My favorite group is Cold Play and my favorite song is Arches” –You can make a strong password by using the first letter of each word of the sentence Example: mfgicpamfsia –Make this password even stronger by using a combination of upper and lowercase letters, numbers, and special characters that look like letters Example:

T1-9 Keep Your Passwords A Secret Keeping your passwords safe means keeping them a secret Do not give them to friends, and do not write them down and keep them at your desk or in an unprotected file on your computer Be wary when giving them to the Web site where you created the password in the first place

T1-10 Manage Your Passwords The safest password technique is to create a new, strong password for every Web site or log-in Create a handful of strong passwords and use those at sites you want to keep most secure, such as bank account, brokerage, or bill paying company Create another small set of easier to remember passwords that you can use everywhere else

T1-11 Monitor Your Accounts Monitor all your monthly financial statements, and call the appropriate company or bank immediately to report issues Review your credit report each year

T1-12 PERFORMING GOOD FILE MANAGEMENT The best way to manage files is to organize them into folders and then store in specific locations Tips for managing your files: –Use My Documents –Limit file name length –Archive completed work –Use shortcuts –Use abbreviations –Use thumbnails –Do not save unnecessary files –Use My Recent Documents

T1-13 IMPLEMENTING EFFECTIVE BACKUP AN RECOVERY STRATEGIES You can unintentionally lose information on a computer in many ways –A child playing the keyboard like a piano –A power surge, lightning, flood, and even equipment failure Regularly make backup copies of your files and keep them in a separate place, you can get some, if not all, of your information back

T1-14 Determining What To Back Up Deciding what to back up is highly personal Some suggestions: –Bank records and other financial information –Digital photographs –Software purchased and downloaded from the Internet –Music purchased and downloaded from the Internet –Personal documents – address book

T1-15 How To Back Up Your Computer Files A simple backup in Windows XP requires no special software or skills To copy a file or folder, right-click on the file or folder and select Copy Choose the disk or drive where you want to store the duplicate copy, right-click again and then select Paste

T1-16 Perform Regular Backups How often should you back up your data? –If you use your computer occasionally, a weekly backup might be enough –If you use your computer every day, a daily backup is a good idea

T1-17 Microsoft’s Backup And Recover Utility Backup Utility –The Backup Utility in Windows XP helps you protect your data if your hard disk fails or files are accidentally erased due to hardware or storage media failure Recovery Console –The Recovery Console performs many tasks without starting Windows XP, including starting and stopping services, reading and writing information on a local disk drive, and formatting drives

T1-18 Using Zip Files Compressing files, folders, and programs decreases their size and reduces the amount of space Folders that are compressed using the Compressed (zipped) Folders feature use less drive space

T1-19 WRITING PROFESSIONAL S Six common mistakes to avoid: 1.Failing to follow etiquette 2.Attempting anonymity 3.Sending to the wrong person 4.Using one for everything 5.Clicking “Send” too fast 6.Forgetting the attachment

T1-20 STOPPING SPAM Spam is junk Spim is unwanted instant messages –Delete junk without opening them –Do not reply to spam unless you are certain that the message comes from a legitimate resource –Think twice before opening attachments –Do not buy anything or give to any charity promoted through spam –Do not forward chain messages

T1-21 PREVENTING PHISHING Thieves use a method known as phishing to send or instant message spam that meticulously imitates messages from reputable, well-known companies The forged message capitalizes on your trust of the respected brand

T1-22 How Does Phishing Work? A phishing scam sent by may start with con artists who send millions of e- mail messages that appear to come from popular Web sites or sites that you trust The messages, pop-up windows, and Web sites they link to appear official Unsuspecting people respond to these requests for their credit card numbers, passwords, account information, or other personal data

T1-23 How Does Phishing Work?

T1-24 Help Prevent Identity Theft From Phishing Scams Some guidelines to help protect yourself from these phishing scams: –Report suspicious –Be wary of clicking on links in messages –Type addresses directly into your browser or use your personal bookmarks –Check the security certificate –Do not enter personal or financial information into pop-up windows

T1-25 DETECTING SPYWARE Spyware is a general term used for software that performs certain behaviors without appropriately obtaining your consent You might have spyware if: –You see pop-up advertisements even when you are not on the Web –The page your Web browser first opens to or your browser search settings have changed without your knowledge –You notice a new toolbar in your browser that you didn’t want, and find it difficult to get rid of –Your computer takes longer than usual to complete certain tasks –You experience a sudden rise in computer crashes

T1-26 How To Get Rid Of Spyware To remove spyware: 1.Download a spyware removal tool (such as Microsoft Windows AntiSpyware) 2.Run the tool to scan your computer for spyware and other unwanted software 3.Review the files discovered by the tool for spyware and other unwanted software 4.Select suspicious files for removal by following the tool’s instructions

T1-27 RESTRICTING INSTANT MESSAGES A computer infected by a virus may continue to spread the infection by sending copies to everyone on your IM contact list Steps to help avoid IM viruses –Be careful downloading files in IM –Update Windows software –Make sure you are using an updated version of IM software –Use anti-virus software and keep it updated –Use anti-spyware software and keep it update

T1-28 RESTRICTING INSTANT MESSAGES

T1-29 INCREASING PC PERFORMANCE To maintain your computer and keep it running smoothly, follow these guidelines: –Free disk space –Speed up access to data –Detect and repair disk errors

T1-30 Free Disk Space By freeing disk space, you can improve the performance of your computer Use the Disk Cleanup Utility to: –Remove temporary Internet files –Remove downloaded program files –Empty the Recycle Bin –Remove Windows temporary files –Remove optional Windows components that you do not use –Remove installed programs that you no longer use

T1-31 To Use Disk Cleanup 1.Click Start, point to All Programs, point to Accessories, point to System Tools, and then click Disk Cleanup 2.If several drives are available, you might be prompted to specify which drive you want to clean 3.Disk Cleanup calculates the amount of space you will be able to free 4.In the Disk Cleanup for dialog box, scroll through the content of the Files to delete list

T1-32 To Use Disk Cleanup 5.Choose the files that you want to delete, 6.Clear the check boxes for files that you do not want to delete, and then click OK 7.When prompted to confirm that you want to delete the specified files, click Yes 8.After a few minutes, the process completes and the Disk Cleanup dialog box closes

T1-33 To Use Disk Cleanup

T1-34 Speed Up Access To Data Disk fragmentation slows the overall performance of your system When files are fragmented, the computer must search the hard disk when the file is opened to piece it back together The response time can be significantly longer

T1-35 To Use Disk Defragmenter 1.Click Start, point to All Programs, point to Accessories, point to System Tools, and then click Disk Defragmenter. 2.Click Analyze to start the Disk Defragmenter 3.In the Disk Defragmenter dialog box, click the drives that you want to defragment, and then click the Analyze button 4.To defragment the selected drive or drives, click the Defragment button

T1-36 To Use Disk Defragmenter 5.After the defragmentation is complete, Disk Defragmenter displays the results 6.To display detailed information about the defragmented disk or partition, click View Report 7.To close the View Report dialog box, click Close 8.To close the Disk Defragmenter utility, click the Close button on the title bar of the window

T1-37 To Use Disk Defragmenter

T1-38 Detect and Repair Disk Errors The Error Checking utility scans the hard drive for bad sectors, and scans for file system errors to see whether certain files or folders are misplaced To Run the Error Checking Utility 1.Important: Be sure to close all files before running the Error Checking utility 2.Click Start, and then click My Computer 3.In the My Computer window, right-click the hard disk you want to search for bad sectors, and then click Properties

T1-39 Detect and Repair Disk Errors 4.In the Properties dialog box, click the Tools tab 5.Click the Check Now button 6.In the Check Disk dialog box, select the Scan for and attempt recovery of bad sectors check box, and then click Start 7.If bad sectors are found, you will be prompted to fix them

T1-40 Detect and Repair Disk Errors

T1-41 USING ANTI-VIRUS SOFTWARE A virus is basically a malicious computer program –The effects of viruses differ, some either modify, delete, or steal data, and others may give control of your PC over to their creators via the Internet A worm refers to a virus that can replicate and spread by itself over a network (the Internet for instance)

T1-42 Anti-Virus Software There are three main types of viruses in circulation: 1.Boot sector viruses 2.Macro viruses 3.File infecting viruses

T1-43 Virus Definition Files Anti-virus software usually works by checking a file for certain patterns of binary code The patterns used to identify viruses are stored in what is known as a virus definition file Anti-virus products : –McAfee VirusScan ( –Norton Anti-virus (

T1-44 Virus Definition Files

T1-45 Cell Phone Viruses Cell phone viruses are at the threshold of their effectiveness At present, they cannot spread very far and they don’t do much damage, but the future might see cell phone bugs that are as debilitating as computer viruses

T1-46 INSTALLING A PERSONAL FIREWALL A firewall is simply a program or hardware device that filters the information coming through the Internet connection into a computer If an incoming packet of information is flagged by the filters, it is not allowed through

T1-47 To Open Windows Firewall 1.Click Start and then click Control Panel 2.Click Windows Firewall