Computer Hardware Software 1.Introduction 2.Internet research and security Email Basic online protection 3.Use PC safely and efficiently 4.Purchase decisions.

Slides:



Advertisements
Similar presentations
Tips and tools to keep you and your information safe on-line. We will go over a lot of information today, so it is important to pay attention and follow.
Advertisements

Computer Basics I Course Outline 1: What is a computer? 2: What is an operating system? Using a Desktop Computer 3: What are the basic parts of a desktop.
Tips and tools to keep you and your information safe on-line. We will go over a lot of information today, so it is important to pay attention and follow.
1 of 2 By observing the guidelines below and performing regular maintenance on your computer, you can help keep your computer safe and maintain optimum.
How to Keep Your PC Running Like New Bryan Nowak.
Welcome to Keyboarding Pro DELUXE ® Get Started Get Started Create Your Student Record Create Your Student Record The Main Menu The Main Menu Send Files.
Internet Safety Basics Never share names, schools, ages, phone numbers, or addresses. Never open an from a stranger – it may contain viruses that.
Your New Laptop Toshiba 2430 Specifications Layout How to Use.
Copyright © 2006 by The McGraw-Hill Companies, Inc. All rights reserved. McGraw-Hill Technology Education Copyright © 2006 by The McGraw-Hill Companies,
Tutorial 5 Downloading and Storing Data. XP Objectives Learn what FTP is and how it works Explore how to use a Web browser to transfer files Navigate.
Use computer and internet safely Dave Dai Computer security Malware Virus: a program that copies itself and infect a computer without permission.
Sensitive Data Accessibility Financial Management College of Education Michigan State University.
Utility Programs and their Functions. Antivirus Software (Virus Checker) Keep the Computer software healthy and free of virus’ that can harm the function.
 Contents 1.Introduction about operating system. 2. What is 32 bit and 64 bit operating system. 3. File systems. 4. Minimum requirement for Windows 7.
KEEP YOUR COMPUTE SAFE AND HOW TO FIX IT 1. OBJECTIVE Keep your computer safe. -Not about spam, phishing or browser hijacks Designed for the non-geek.
BASIC COMPUTER OPERATION. OUTLINE Computer Hardware Computer Hardware Operating systems Operating systems Terms Terms Disk capacities Disk capacities.
1 Computer Security: Protect your PC and Protect Yourself.
Lesson 46: Using Information From the Web copy and paste information from a Web site print a Web page download information from a Web site customize Web.
Lesson 46: Using Information From the Web copy and paste information from a Web site print a Web page download information from a Web site customize Web.
Internet safety By Lydia Snowden.
Internet Safety Basics Being responsible -- and safer -- online Visit age-appropriate sites Minimize chatting with strangers. Think critically about.
eScan Total Security Suite with Cloud Security
Introduction to. What is Office 365 Office 365 is the same Office you already know and use every day. Office 365 is powered by “the cloud” which is a.
Internet Standard Grade Computing. Internet a wide area network spanning the globe. consists of many smaller networks linked together. Service a way of.
CHC DI Group. What We Will Cover Securing your devices and computers. Passwords. s. Safe browsing for shopping and online banks. Social media.
UNDERSTANDING YOUR COMPUTER
Computer Technology 1 st Term Correct Keyboarding Technique Eyes on copy Fingers curved Correct fingers Key smooth Proper sitting posture.
BASIC COMPUTER OPERATION Gülçin Sağdıçoğlu Celep Department of Mathematics METU 2003.
Acrobat - A product of Adobe Systems that helps create, view, and print documents. 3.5” Floppy –A disk that has a magnetic storage for data 5.25” Floppy.
Operating System Utility Programs & Stand-alone utility Programs.
The Internet = A World of Opportunities Look what’s at your fingertips A way to communicate with friends, family, colleagues Access to information and.
Safe Computing. Computer Maintenance  Back up, Back up, Back up  External Hard Drive  CDs or DVDs  Disk Defragmenter  Reallocates files so they use.
BASIC COMPUTER CONCEPTS What is a computer? An electronic device, operating under the control of instructions stored in its own memory unit, that can.
PURCHASING, INSTALLING, AND MAINTAINING A PERSONAL COMPUTER
Course ILT Internet transactions and security Unit objectives Learn how to purchase goods online by using credit cards and Web-based forms Describe the.
COMPREHENSIVE Windows Tutorial 5 Protecting Your Computer.
PC Maintenance How to keep your computer healthy.
GOLD UNIT 4 - IT SECURITY FOR USERS (2 CREDITS) Thomas Jenkins.
Internet Safety By Adam T Introduction  This PowerPoint will show give you advice on how to stay safe on the internet.  You will be told how to stay.
Staying Safe Online Aberdeen Grammar School. Things to do online Keep in touch with friends and family using , twitter and social networking sites.
What is system software and what are its parts? Programs that control operation of computer Two parts are operating systems utility programs.
© CCI Learning Solutions Inc. 1 Lesson 5: Basic Troubleshooting Techniques Computer performance Care of the computer Working with hardware Basic maintenance.
Section 2 Section 2.1 Identify hardware Describe processing components Compare and contrast input and output devices Compare and contrast storage devices.
Computer and Information Science Ch1.3 Computer Networking Ch1.3 Computer Networking Chapter 1.
Computer Security By Rachel Gaines. Computers are used for work, play, and everything in between. So here’s how to keep it fun and protected.
Computer Security! By Bailey Hoover. Opening: “Computer viruses are an urban legend.” -Peter Norton Actually: Virus: software reproduces itself; causes.
Phishing scams Phishing is the fraudulent practice of sending s purporting to be from reputable companies in order to induce individuals to reveal.
Protecting Students on the School Computer Network Enfield High School.
Basic Skills Foundation Computing The early bird may get the worm, but the second mouse gets the cheese.
بسم الله الرحمن الرحيم The Internet and the World Wide Web.
UNDERSTANDING YOUR COMPUTER
3.05 Protect Your Computer and Information Unit 3 Internet Basics.
1 After completing this lesson, you will know: What computers need to operate—basic hardware and peripheral devices Why and how to protect your computer.
Minding your business on the internet Kelly Trevino Regional Director October 6,2015.
NetTech Solutions Protecting the Computer Lesson 10.
GOLD UNIT 4 - IT SECURITY FOR USERS (2 CREDITS) Cameron Simpson.
Cyber Safety Mohammad Abbas Alamdar Teacher of ICT STS Ajman – Boys School.
Return to the PC Security web page Lesson 4: Increasing Web Browser Security.
The Internet = A World of Opportunities Look what’s at your fingertips A way to communicate with friends, family, colleagues Access to information and.
By the end of this lesson you will be able to explain: 1. Identify the support categories for reported computer problems 2. Use Remote Assistance to connect.
Staff Induction Log On Credentials & Security Resources Web Applications / Software LanSchool Projectors / Cameras / Printing Laptops / WiFi.
ICT Laptops Passwords Encryption Back-ups Data Protection and the Internet Viruses Social Networking / Professional Conduct.
Windows Vista Configuration MCTS : Internet Explorer 7.0.
Protecting Against Cyber Attacks PLEASE TAKE A MINUTE TO LOOK AT THIS IMPORTANT MESSAGE. THIS IS HAPPENING HERE AND NOW! LET US SAVE YOU AND YOUR INFORMATION.
Computer Technology. HardwareSoftware  Hardware ◦ Monitor ◦ Keyboard ◦ Hard disk drive ◦ Mouse ◦ CPU (Central Processing Unit) ◦ Graphic and sound cards.
Intro to Digital Technology Review for Final Introduction to Digital Technology Finals Seniors Monday, 5/16 – 2 nd Tuesday 5/17 – 1 st,3 rd Underclassmen.
Unit 4 IT Security.
Unit 12 Using the Internet & Browsing the Web
Online software and backups
Introduction To Computing BBA & MBA
Presentation transcript:

Computer Hardware Software 1.Introduction 2.Internet research and security Basic online protection 3.Use PC safely and efficiently 4.Purchase decisions

/ Phishing, SPAM Phishing (use of messages that appear to be sent from a trusted source.)Phishing Spam (you get spam is because the person sending spam has your address.)Spam

Phishing examples? How can we tell they are fake? Spelling Mistakes Incorrect Graphics Personal Information The URL

Internet research and security Browse Internet safely –Set your browser security to medium/medium-high –Add safe sites to trusted sites –Read messages in plain text –Block pop-up windows in your browser Secure sites; Secure Data; online transaction; MSU web credit store Instant messenger, chatting, and Voice over IP programs

IE 7 popup blocker phishing filter

File management Manage by folders Save on the server (\\edshare.educ.msu.edu) Name files properly (do not use space or #, $, ~, !) View files with different layout Keep a backup copy yourself Stop using floppy disks; use thumb drive management

Basic PC protection Strong password Windows Security Essential program Check for Windows updates automatically Firewalls (turn on Windows built-in firewall)turn on Windows built-in firewall Set the Internet browser security medium-high Do not download free programs from internet

Use computer efficiently –Reduce printing; convert documents into PDF files. –Hard disk de-fragmentationHard disk de-fragmentation –Empty Internet browsers cached files –Use MSU wirelessUse MSU wireless

Basic troubleshooting techniques –“My computer does not work”. Be specific when report error. –PC Restore and RecoverPC Restore and Recover –Computer Screen Care –Keyboard / Mouse

Things to consider when you purchase a computer CPU speed Hard Drive size Memory/RAMMemoryRAM CD/DVD Drive Video Card External Connectors

Things to consider when you purchase a computer Who is going to use it? What is the priority? Weight Screen size CPU power Pricing Timeline

Connect laptop to projector Connect the video cable to the projector. 1.Turn on projector. 2.Turn on your laptop.

Resources College computer support websitewebsite MSU computer store room 101store MSU computer repair: room 120