(and other interesting facts). My Computer is Slow Internet Active Directory Video Issues.

Slides:



Advertisements
Similar presentations
Hardware Lesson 3 Inside your computer.
Advertisements

Viruses. Viruses, Trojans, Worms Virus - a program that attaches itself to a host, and copies itself onto new files/disks Macro viruses - small program.
Providing protection from potential security threats that exist for any internet-connected computer is termed e- security. It is important to be able to.
June 2008 Surf Safely with a Clean Computer Roger Thornburn.
Unit 1 Living in the Digital WorldChapter 1 Lets Communicate Internet Safety.
Wichita Public Library Rex Cornelius Electronic Resources Webliography online at:
Ways to keep your PC running smoothly  Reboot at least once a week  Make sure fan is free of dust and debris  Defragment your PC once a month  Run.
Putting It All Together 1.  Maintaining a Hard Drive Ch 4 Lab  Hardware cleaning tips ▪ Microsoft Tips Microsoft Tips ▪ Computer Hope Tips Computer.
Tech Tip 1: Defragment your computer often to keep it from running slowly. Click “Start”, “Control Panel”, “Administrative Tools”, “Computer Management”,
Your Interactive Guide to the Digital World Discovering Computers 2012.
And how you can handle it.  Trojan horses  Spyware  Adware  Rootkits  Viruses  Worms Software that works without the victim’s permission.
Discovering Computers Fundamentals, 2011 Edition Living in a Digital World.
Content  Overview of Computer Networks (Wireless and Wired)  IP Address, MAC Address and Workgroups  LAN Setup and Creating Workgroup  Concept on.
Use computer and internet safely Dave Dai Computer security Malware Virus: a program that copies itself and infect a computer without permission.
FIRST COURSE Computer Concepts Internet and Microsoft Office Get to Know Your Computer.
 Lesson 05: Computer Maintenance. Keep Software Up-To-Date Patches Security Holes Improves Software Stability Improves Software Performance Adds.
Software utilities Gladys Nzita-Mak. Disk defragmentation Disk defragmentation makes computers run efficiently. When you save, change or delete files.
Computer Troubleshooting (and other interesting facts) Presented by: Kristi Manuel and Derwin Woodard.
Lesson 46: Using Information From the Web copy and paste information from a Web site print a Web page download information from a Web site customize Web.
Physical Cleaning Disconnect Power Open the Case.
Utility Programs  A type of system software that is used to solve a particular problem is called utility program. Many operating system provides different.
Chapter 5: System Software: Operating Systems and Utility Programs.
Internet safety By Lydia Snowden.
Internet safety Viruses A computer virus is a program or piece of code that is loaded onto your computer without your knowledge and runs against your.
1 Performance and Maintenance Tips for Your PC Getting the Most Work from that Expensive Tool called a Computer.
With Microsoft Windows 7© 2012 Pearson Education, Inc. Publishing as Prentice Hall1 PowerPoint Presentation to Accompany GO! with Microsoft ® Windows 7.
Adware, Spyware, and Malware Anand Dedhia Bharath Raj ECE 4112 Project 28 April 2005.
Data Security.
the protection of computer systerms and information from harm, theft, and unauthorized use. Computer hardware is typically protected by the same.
Essential Computer Concepts
Lecture 8: Files and Viruses Tonga Institute of Higher Education IT 141: Information Systems.
Spyware Sue Scott Technology Librarian. What is Spyware Malware – (Malicious Software) A general term to encompass unwanted software on a personal computer.
IT Security for Users By Matthew Moody.
Skills For Living Lori Wright Netbook Etiquette
PC Maintenance How to keep your computer healthy.
Software Utilities Pages 65 to 73 Looking After Your Computer Nick Sims.
Introduction to Computers
To proceed onto the next stage of the install please Agree to the terms and conditions and select next.
Computer Viruses.
A computer virus is a computer program that can replicate itself and spread from one computer to another. The term "virus" is also commonly, but erroneously.
Computer Maintenance. Clean up tools How I Defragmented the Hard Drive.
Your Interactive Guide to the Digital World Discovering Computers 2012.
IT internet security. The Internet The Internet - a physical collection of many networks worldwide which is referred to in two ways: The internet (lowercase.
System utility pieces of software. Antivirus Antivirus (or anti-virus) software is used to safeguard a computer from malware, including viruses, computer.
Inside your computer. Hardware Review Motherboard Processor / CPU Bus Bios chip Memory Hard drive Video Card Sound Card Monitor/printer Ports.
Computer Security! Emma Campbell, 8K VirusesHackingBackups.
INGOTs Computer Security Name: Elliot Haran. Introduction  Staying safe on the internet  Learning to deal with Cyber Bullying, Stalking and grooming.
1 Chapter 7 Operating Systems & Utility Programs.
Your Interactive Guide to the Digital World Discovering Computers Types of Utility Programs and Operating Systems Chapter Eight.
Living in a Digital World Discovering Computers 2011.
Discovering Computers & Microsoft Office 2010 Discovering Computers Chapter 4.
FILE MANAGEMENT Computer Basics 1.3. FILE EXTENSIONS.txt.pdf.jpg.bmp.png.zip.wav.mp3.doc.docx.xls.xlsx.ppt.pptx.accdb.
Your Interactive Guide to the Digital World Discovering Computers 2012.
Candidates should be able to:  describe the purpose and use of common utility programs for:  computer security (antivirus, spyware protection and firewalls)
Malware Fighting Spyware, Viruses, and Malware Ch 1 -3.
Living in a Digital World Discovering Computers 2011.
© 2007 Cisco Systems, Inc. All rights reserved.Cisco Public ITE PC v4.0 Chapter 1 1 Basic Security Networking for Home and Small Businesses – Chapter 8.
GCSE Computing: A451 Computer Systems & Programming Topic 3 Software System Software (2) Utility Software.
Sniper Corporation. Sniper Corporation is an IT security solution company that has introduced security products for the comprehensive protection related.
PCs ENVIRONMENT and PERIPHERALS Lecture 10. Computer Threats: - Computer threats: - It means anything that has the potential to cause serious harm to.
Threats To Data 30 Threats To Data 30. Threats To Data 30 We’re now going to look at a range of different threats to people’s data: Opportunity Threats.
Antivirus Software Technology By Mitchell Zell. Intro  Computers are vulnerable to attack  Most common type of attack is Malware  Short for malicious.
Windows Tutorial 5 Protecting Your Computer
Tonga Institute of Higher Education IT 141: Information Systems
Discovering Computers 2012: Chapter 8
Objectives Overview Define system software and identify the two types of system software Describe the functions of an operating system Summarize the features.
Computer Technology Notes 5
Utility Programs.
Computer Vocabulary Desktop
BASIC SOFTWARE MAINTENANCE
Presentation transcript:

(and other interesting facts)

My Computer is Slow Internet Active Directory Video Issues

Disk Cleanup CCleaner Defragmentation Temporary File Cleaner

Hard drive (local to machine) DVD/CD ROM drive Flash drive (External Drive) Network drives

CD (+/-)R; R/W Storage Size MB (How much is that? How many files?) DVD Storage Size 4.7 GB (How much is that? How many files?) Flash Drive Storage Size 1GB and up External Hard Drive Storage Size – Large GREAT for backing up My Documents Server Active Directory Google Drive 30GB

Right click on C: and choose Properties Select Disk Cleanup

This may take a while.

This will take a while. You may continue to work while this is running. Click Yes to delete the files you selected

Right click on C: and choose Properties Select Tools Tab Select Defragment Now

Select Analyze

Deleting Browsing History Setting Home Page Toolbars/Popup Blockers Favorites

Malware – Any program that causes harm to the computer and its user. Malware can be considered a virus, spyware, Trojan Horse, or worm. Viruses – Can be as serious as erasing data or as harmless as playing a tune or displaying a message. Spyware (adware) – Software used to collect user data without their knowledge (advertisers, hackers, and other interested parties) Spyware can be disguised as prize, offer, or cute games. Trojan Horse – Software that appears as a useful tool but contains harmful programs that can destroy data, deplete system resources causing the computer to run slowly. Worms – Self-replicating viruses that slows a computer down by utilizing system resources while leaving the Operating System and its files intact. Phishing – A form of fraud that uses legitimate looking forms and website references to lure users to disclose private information.

Saving to My Documents vs. Desktop Saving to Google Drive SCS Tech Tips

My Documents = your home folder (H: drive) on the server (network) Desktop = files stored locally on your machine’s hard drive Google Drive = files stored in the cloud

SCS Tech Tips