Customer’s Choice Presented by: Keystone Computer Concepts.

Slides:



Advertisements
Similar presentations
Tips and tools to keep you and your information safe on-line. We will go over a lot of information today, so it is important to pay attention and follow.
Advertisements

The Easy Way to Call Landlines, Cell Phones, Video Chat or IM from Computer to Computer. Conference calls and voic too.
Case Franchise Support & Training. Case Support Who? Who do I call for support? What? What types of questions can be answered by the corporate support.
Getting Back Into The Swing Of Things – At The Computer! Presented by Keystone Computer Concepts
If The Pilgrims Had The Internet Presented by Keystone Computer Concepts
To Err Is Human Presented by. Before We Get Started Please turn your cell phones to stun. Restrooms are down the hall and on the right We’ll take a 5.
Christmas Is Coming: How Your Computer Can Help Presented by Keystone Computer Concepts Inc.
Attachments Presented by Keystone Computer Concepts.
Tips and tools to keep you and your information safe on-line. We will go over a lot of information today, so it is important to pay attention and follow.
Customer Choice Presented by Keystone Computer Concepts.
May All Your Computer Abilities Blossom Presented by: Keystone Computer Concepts.
Scary s. Before We Get Started Please turn your cell phones to stun. Restrooms are down the hall and on the right We’ll take a 5 minute break around.
Facebook Presented by: Keystone Computer Concepts.
Perimeter Church Perimeter Network Introduction 2005.
1 of 2 Going on vacation requires careful preparation and there are a number of things you should do at the office before taking extended time off. This.
1 University of York Department of Health Sciences Computer Skills Review By Ian Cole Lecturer in C&IT.
1 of 2 This document is for informational purposes only. MICROSOFT MAKES NO WARRANTIES, EXPRESS OR IMPLIED, IN THIS DOCUMENT. © 2007 Microsoft Corporation.
We are partners in learning.. Note: Office 365 works best in Internet Explorer V 9 or above. Some features do not work in PWCS’s Chrome Browser or in.
 Please turn your cell phones to silent. Thank you!
You Want Me To Do What? Part 2 Presented by Keystone Computer Concepts
1 of 13 Back to Start Working Remotely Your company’s Windows SBS computer network makes it easy for you and your coworkers to work remotely—and to stay.
How does it work? Why does it matter to you and AFA?
"Computer Resolutions For The New Year” Part 2 Presented by Keystone Computer Concepts
By: Amy Simon  What happened to my student’s project?  Why can’t I access my lesson in the computer lab?  I know I saved it… somewhere…  WHERE DID.
Internet safety By Lydia Snowden.
MACPA’s 2009 Small Practitioners Conference Technology tools – How does your firm stack up? Presented By: Peggy Feltner ZenaComp Incorporated Executive.
McGraw-Hill/Irwin Copyright © 2013 by The McGraw-Hill Companies, Inc. All rights reserved. Extended Learning Module E Network Basics.
For CCRI Students.
Networking I Chapter II The Internet. How does one Connect? Dial-Up Connection – Modem ISDN – Integrated Services Digital Network DSL – Digital Subscriber.
ITIS 1210 Introduction to Web-Based Information Systems Chapter 15 How VoIP and Skype Work.
Using Technology in Ministry Edward Braithwaite Seminary Student, NOBTS.
Learning In A Techno World How Safe is Your Cyberspace?
Stay Safe & Secure Online. Outline Passwords Everyday Security Security Physical Security Protecting Personal Information.
Connecting Businesses and Staff Tools for the Virtual Office  Microsoft Groove Office Collaboration Software  Skype VOIP Telephone  Transferring Files.
Move Pictures From Your Mobile Phone to Your PC.  You never know when a photo opportunity is going to arise, which is why having a camera phone can be.
Before We Get Started… Please turn your cell phone to stun! Rest rooms are down the hall, on the right. We’ll take a 5 minute break at 11:00 a.m. Please.
IT Introduction to Information Technology. The Internet & World Wide Web Began in 1969 with the ARPANET (Advanced Research Project Agency Network)
A secure internet site that allows posts access to their Legion and SAL membership.
AOL SELF-HELP Built into the AOL program are the answers to nearly any problem you might encounter when using AOL.
User Training for Meals on Wheels Programs June 2014.
IT Services Getting Started on your iPad Created by Michael Mackenzie.
 Introduction – Consumer Market  Benefits – Operational Cost & Flexibility  Challenges – Quality of Service & Securing VOIP  Legal Issuers  Risk.
Computer Safety Sid Holder 8k Viruses Hacking Backing Up.
Merging: When To Yield And When To Speed Up Presented by Keystone Computer Concepts.
TCP/IP (Transmission Control Protocol / Internet Protocol)
Jeopardy ProtocolsPartsPrograms General Internet HTML Q $100 Q $200 Q $300 Q $400 Q $500 Q $100 Q $200 Q $300 Q $400 Q $500 Final Jeopardy.
Internet Guidelines. Cyberspace Cyberspace is like a big city. libraries, universities, museums, places to have fun, Places to meet people. But, like.
Please do not use your Thanksgiving Napkin. We’ll use it later on in the seminar. Thanks!
Don’t Log in!. Recap on the previous units I’ve tried to make it as concise as possible but there is a bit of writing, to ensure that you have some notes.
ITS Lunch & Learn November 13, What is Office 365? Office 365 is Microsoft’s software as a service offering. It includes hosted and calendaring.
Copyright © 2008 AusCERT 1 Practical Computer Security See the notes section throughout the slide presentation for additional information.
SAP – our anti-hacking software. Banking customers can do most transactions, payments and transfer online, through very secure encrypted connections.
Avoiding Frauds and Scams Barbara Martin-Worley Director, Consumer Fraud Protection 18 th Judicial District Attorney’s Office Serving Arapahoe, Douglas,
How to Make Yourself More Secure Using Public Computers and Free Public Wi-Fi.
Protecting Against Cyber Attacks PLEASE TAKE A MINUTE TO LOOK AT THIS IMPORTANT MESSAGE. THIS IS HAPPENING HERE AND NOW! LET US SAVE YOU AND YOUR INFORMATION.
Welcome to Mr. Cripps’ Social Sciences Informational Site.
Dynamic Domain Name System
How to build a good reputation online
Call Outlook customer support toll free number Ireland.
Using Advanced Features
Looking for Gmail customer service?Gmail customer service TROUBLESHOOT PROBLEMS  FORGOT GMAIL PASSWORD YOUR OR USERNAME FORGOT GMAIL PASSWORD  CAN'T.
Chief Information Officer
The “Internet”.
Student Discount on Microsoft Office 2010 Products!
Hearts and Flowers Laptops and Towers
Internet Safety and Security Curtis Shaw nwtel.ca November 2012
9 ways to avoid viruses and spyware
Presented by: Keystone Computer Concepts
You Want Me To Do What? – Part 3
Presentation transcript:

Customer’s Choice Presented by: Keystone Computer Concepts

Please turn your cell phone to stun! Before We Get Started

Restrooms are down the hall on the right!

We’ll take a 5 minute break around 11:00 a.m. Before We Get Started

Please hold individual questions about your own computer until the end.

Customer’s Choice Presented by: Keystone Computer Concepts

Going on vacation this summer? What mode of transportation will you take?

Customer’s Choice Presented by: Keystone Computer Concepts

Question #1 I would like to know how to safeguard the information on my thumb drive.

Answer #1 1) Purchase a USB drive with encryption built- in

SanDisk

Answer #1 2) Purchase a separate software program to encrypt a USB drive.

Keynesis

Demo

Question #2 Can I send an encrypted to someone and how do they unencrypt it?

Answer #2 There are a number of ways to send encrypted s:

Answer #2 1) You can use a service like Hush Mail. There are free and paid accounts. DEMO

Answer #2 2) If you use Outlook, you can purchase a certificate. DEMO

Question #3 3) What is Voice over IP?

Answer #3 3) VoIP simply means voice communication using the Internet Protocol.

Question #4 4) Should I change my router’s password and how often?

Answer #4 4) The Microsoft Answer.

Handout

Cable Modem

DSL Modem

Router

Modem/Router Combo

Question #5 5) How often should I change passwords? (Banking, etc.)

Answer #5 5) Every 90 days. However, the passwords need to be secure.

Question #6 6) What are tabs?

Answer #6 6) Download the PowerPoint from our webinar.

Question #7 7) What “tricks” should we watch for in ?

Answer #7 7) a) Scare tactics b) Requests for PIN c) Vague greetings d) Update attachments

Question #8 8) How do I build my own website?

Answer #8 8) Use a free web building site.

Question #9 9) What things should I do to keep my computer running smoothly?

Answer #9 9) a) Don’t turn it off more than once a day b)Keep it clean and cool c)Come into RTS for updates, etc.

Question #10 10) How do I get a picture to come up when there is only a red X?

Answer #10 10) In most cases, you can’t.

Saturday, June 25, :00 a.m. OneNote Intro Webinar Mon., Aug. 1st-Sat., Aug. 6th KCC will be closed for vacation! In September, we will have our regular seminar and a Word seminar. Upcoming Events