Choose a category. You will be given the answer. You must give the correct question. Click to begin.
Security ShortcutsUMToolsWildcard 10 Point 20 Points 30 Points 40 Points 50 Points 10 Point 20 Points 30 Points 40 Points 50 Points 30 Points 40 Points 50 Points Google Final Jeopar
These are folders where you can drag and store an
1)To a task folderTo a task folder 2)To a mail folderTo a mail folder 3)To any folder on your computerTo any folder on your computer
This is how to access your Outlook account from home
This Outlook keyboard maneuver will add a sender to the blocked senders list
Right click >Junk > Add to Blocked Senders List
This will automatically remove s from your inbox
Rules! Go to Tools > Rules and Alerts > New Rule > follow the instructions
This permanently deletes a message bypassing the Deleted Items folder in Outlook
Select the then Shift + Delete
These 2 rules define a strong password
Stick with passwords that are at least 8 characters in length. Stick with passwords that are at least 8 characters in length. At least 4 characters in your passwords should be each one of the following: At least 4 characters in your passwords should be each one of the following: Lower case alphabets Upper case alphabets Numbers Special Characters ( !~#&*)
These interactions with UNSOLICITED can get you in trouble!
Opening e-cards, photos or other attachments Opening e-cards, photos or other attachments Replying to messages offering quick fixes for viruses Replying to messages offering quick fixes for viruses Forwarding chain letters Replying to asking you to divulge personal information Replying to asking you to divulge personal information
This allows secure access to resources from home – i.e. Outlook client, m: drive, i: drive, Wolverine Access
VPN = Virtual Private Network You’ll find it at
This term describes a non- technical kind of intrusion that relies heavily on human interaction and often involves tricking people to break normal security procedures.
Social Engineering
This is what to do if you suspect someone has access to your account
Change your U-M password and contact the User Advocate at
This is a mathematical calculation or conversion Google search can perform
Quarter cup in teaspoons seconds in a year 65 mph in km/h *485 15% of 93.45
You will find this with the Google search term: intext: intitle:security -site:amazon.com OR -site:ebay.com
Pages whose titles contain the word “security,” with the word “ ” on the text of the page and not on amazon.com or ebay.com
This Google site is a good place to find FREE online tutorials
YouTube.com
This Google product allows you to: monitor a developing news story keep current on a competitor or industry keep current on a competitor or industry get the latest on a product or event keep tabs on your favorite technologies or sports teams keep tabs on your favorite technologies or sports teams
Google Alerts! and will point you to Alerts and more Google tools
This Google site compares search patterns across specific geographic regions, categories, time ranges and more.
Google Insights
These 4 keyboard shortcuts work across most applications!
PC: ctrl + c, ctrl + v, ctrl + s, ctrl + z, ctrl + p MAC: command + c, command + v, command + s, command + z, command + p
These 2 keystrokes allow you to instantly switch between programs
PC: Alt + Tab Mac: Command + Tab
This simple Windows keystroke combination will show the desktop
PC: Windows + D MAC: Shift + Command + D
This menu selection will a webpage from your browser
Firefox: File > Send Link Internet Explorer: File > Send > Link by
This is how to create a shortcut on your Desktop
Ways To Create Desktop Shortcuts: Right-click anywhere on your Desktop, select New, Shortcut Drag the Icon from the address bar in your browser to your desktop Go to start > all programs > then right click an application and select send to >Desktop MAC: highlight the program, click on File > Make Alias then drag the Alias to the desktop
This Tech Services site allows organizers to manage an event’s registration process
Workshop Builder
This UM tool allows Easy access to UM IFS file space
mfile.umich.edu
These two U of M online applications allow non- technical people to make highly customized websites
Sitemaker Drupal
2 U of M Tools found on the CIC homepage
Urooms UMEvents Acronyms Building Search Directions MaizePages Rolodex WebMail Wolverine Access
This Uof M website allows free remote access to dozens of commercial software applications
This keyboard combination will lock your computer when you leave your desk
PC: Alt + Ctrl + Del then hit Enter MAC: activate the screen saver using a hot corner
This item is as secure as a postcard
!
This online site can help you organize a meeting
Doodle.com Timebridge.com
These formats are used to save a Word document with maximum compatibility across operating systems and vendors
rich text format (.rtf) text file (.txt)
These are steps to automatically archive old
First, turn on Auto-Archive within Tools>Options>Other> Auto-archive Then, right click the folder and select Properties > Auto archive tab
This is a function key and a description of what it does
F1 Almost always used as the help key, almost every program will open the help screen when this key is pressed. F2 In Windows commonly used to rename a highlighted icon or file. F3 Often opens a search feature for many programs including Microsoft Windows. F4 Open find window. F5 In all modern Internet browsers pressing F5 will refresh or reload the page or document window. F6 Move the cursor to the Address bar in Internet Explorer and Mozilla Firefox. F7 Commonly used to spell check and grammar check a document in Microsoft programs such as Microsoft Word, Outlook, etc. F10 In Microsoft Windows activates the menu bar of an open application. F11 Full-screen mode in all modern Internet browsers. F12 Open the Save As window in Microsoft Word and Excel
Game Over! Thanks for playing! You will find the game on :