Download presentation
Presentation is loading. Please wait.
1
CIS 251 – Lesson 4 File Management and The Internet Rod Rodrigues
2
File Organization
3
Exploring Folders and Files 3 ways to copy/move/delete files or folders
4
Deleting a File or Folder Options for deleting a file or folder –Delete its icon in My Computer –Click on the file icon and press the Delete button –Drag its icon to the Recycle Bin on the desktop –Right-click, then click Delete Where does the file go?
5
Other Copying and Moving Techniques Other techniques for moving and copying files –Cut, copy and paste –Drag and drop –Right-click, drag and drop –Move to folder and copy to folder –Compressed data
6
File Types Files in a Windows system usually end the a dot (“.”) followed by 2, 3, or 4 letters. Examples:.com,.exe,.htm, doc, wpd These are called “extensions” Sometimes it is crucial to SEE the extensions.
7
Proprietary Extensions Software companies often register their standard extensions as proprietary. In this way you can identify which piece of software was used to create the file by inspecting the extension. Underneath the hood, the SYSTEM uses the extensions to “know” which program to launch in order to edit a file. This will become more important when downloading files.
8
Viewing Extensions Use My Computer and click on drive c: In the menu bar, choose Tools > Options Uncheck “Hide extensions…”
9
My Documents on Campus When you are signed on with your username, everything you place in My Documents follows you from computer to computer BACKUP your work to another medium –All lab computers have USB ports –Use Thumb Drives and lanyards
10
The Internet
11
World Wide Web HTML Browser www.w3.org
12
Internet Explorer Comes with Windows Interfaces to System Registry, creating problems Alternate Browser: Firefox Integrated into Windows –Comes with the OS
13
Current Internet problems Hijacking software Popups Multiple programs running, using up system resources, slowing you down. Remedy: Spybot Search and Destroy Spybot Search and DestroySpybot Search and Destroy –Free for the download Remedy: Use Firefox –Lose some features
14
Current problems Viruses – common to all systems, all platforms BUT Windows provides a wider target for hackers to become well known. Need Virus checkers –Norton Anti-Virus –McAfee
15
Internet Terms dial-up / Baud Rate Domain Name FAQHTMLNetiquetteSpammingEmoticons Phishing – super dangerous hijacking
16
Browser Basics
17
The server/client structure A client makes a request for data or services and a server processes the request.
18
Identify a hyperlink on a Web page Hyperlinks are usually underlined and in a different color. Clicking a hyperlink will instantly transfer you to that page.
19
Hyperlink to a downloadable file Sometimes the hyperlink leads NOT to another web page, but rather to a photograph, a graphic, a movie, etc. The file extension on the file being downloaded tells your computer which software to use to open it. What if your system does not HAVE the software to open the file?
20
Example You have clicked on a hyperlink to a PDF file. Your system has no software to load such a thing. You get an error message from your computer. What do you do?
21
Domain Name Example Every machine on the internet has a unique numerical address such as 192.133.12.38 (that is the address for Microsoft) The DNS Registrar maps that numerical address to their alphabetic name which is microsoft.com –Rhode Island College = 192.133.12.38 –http://192.133.12.38 = www.ric.edu http://192.133.12.38www.ric.eduhttp://192.133.12.38www.ric.edu
22
Favorite Web sites can be saved and organized The URL’s of sites you want to revisit can be saved and organized into folders using the Favorites Explorer Bar.
23
Navigate the Web To navigate to a linked page without leaving the current page –Right click on the link and choose Open in new window or –Press Ctrl+N and then click on the link in the duplicate window that is displayed
24
Use the History Bar
25
Change your home page
26
Cookies Cookies are harmless text files stored on your computer that are intended to make life easier for you. You can delete them
27
Temporary Internet Files Also called the “cache” All things viewed using a browser are actually viewed AFTER they have bee downloaded to your computer. Without telling you, the browser downloads all necessary files to view a page into a temporary folder.
28
Use A Search Engine Many browser home pages have a search engine (or multiple search engines) that is available directly from that page. One example can be seen in this figure, where the Google search engine is accessible for quick and easy searches. Google has new features that block popups and fill out forms for you…
29
Identify the Explorer’s interface components
30
Change Security Options
31
Use the Address Bar You can go to a specific Web site by entering the URL into the Address bar and pressing the Enter key, or clicking the Go button.
32
Printing Pages from the ‘Net’ Bring up the page to be printed in your browser –Click on the Print icon on the toolbar –Click on File > Print from the menu bar –If you only want a portion of the information on the page, select it by dragging over it. Then when you bring up the Print dialogue box, choose “ Selection ” instead of “ All ” and just the selected material will be printed.
33
Caveat If you print a “web page” you may be on a poorly formatted web page that is 50 pages long or more. Printing a web page is not advisable.
34
Saving a web page on disk Bring up the page to be saved in your browser –Click on File > Save As Caveat: If the owner of the page changes it, your saved version will be inaccurate.
35
Copying Information from the ‘Net’ Text –Information you want to use in a document of your own Graphics –Pictures you want to use in your own document Careful about Copyright Infringement
36
Saving a Graphic Bring up the web page in your browser that has the graphic you wish to save –Right Click on the graphic –Select “ Save picture as …”
37
File Save Caveat You are the only one who can “know” where you saved a document. If you save it and can’t find it what do you do? Plan A – Repeat the File/Save and observe where the SYSTEM wants to place it. Plan B – Use System Search and specify the date.
38
Email Basics
39
How Email works This figure illustrates the path an e-mail message takes from creation to reception.
40
Email address components An email address consists of: –A user name or login ID –The “at” symbol (@) –The name of the email server Free email accounts at hotmail, yahoo, juno, and others
41
WebCT Email
42
WebCT – Sending Attachments Attachments - Issues
43
WebCT Email continued
45
Attaching a File to Email The method depends on your email software: –AOL –Hotmail –Yahoo –Outlook –WebCT –And more…
46
The End http://www.ric.edu/mrodrigues
Similar presentations
© 2025 SlidePlayer.com. Inc.
All rights reserved.