+ All Categories
Home > Technology > Intermediate computer skills

Intermediate computer skills

Date post: 30-Nov-2014
Category:
Upload: thickox
View: 939 times
Download: 2 times
Share this document with a friend
Description:
 
Popular Tags:
39
Intermediate Computer Skills Learning to do more with your computer.
Transcript
  • 1. Learning to do more with your computer.

2. Intermediate Computer Skills Ctrl+Alt+Del Using External Devices Creating, organizing and moving files Installing and uninstalling programs Running updates Understanding Microsoft Application Basics Protecting your computer 3. Ctrl + Alt + Del Opens Task Manager or Windows Securities depending on the operating system Allows you to manage your computer if problems with programs or malware arise. Safely restarts or shuts off your computer. Closes programs that are locked or are experiencing problems without having to restart the entire computer. Use Ctrl+Alt+Del instead of just turning off the computer with the Power button. 4. Using External Devices Any component that is used in conjunction with the main processing unit. Also referred to as peripheral hardware Connects via USB cord or wireless signal 5. Using External Devices When first connected, a device driver (software) is installed on the computer, either manually or automatically. If you are not prompted to install a driver or it does not automatically download, they can usually be found via the internet. Only download from trusted sites. Devices can be accessed via the Start menu, usually from Computer or Devices and Printers. Drivers can be accessed via Start -> Control Panel -> Programs or by searching drivers at the Start menu. 6. Using External Devices Types of external devices: Removable storage (flash drives, disk drives, iPod, etc.) Non-removable storage (external hard drives) Input (mouse, keyboard, touch screen, scanner, etc.) Output (monitor, speakers, TV, print er) 7. Managing Files A File is a resource for storing and sharing information and is used in conjunction with a Computer Program. Codes are used to determine the file type. A list of common file types is available at: http://mistupid.com/comput ers/filetypes.htm 8. Managing Files Common File types include Microsoft files: doc, ppt, xls, pub Audio files: mp3, wma, wva Picture files: jpg, tiff, bmp, gif, png, pic, etc. Adobe files: pdf, ePub Video files: asf, avi, swf, mov Rich text files: rtf Html files: htm Compressed files: zip 9. Managing Files Files are created when info that has been entered into a program or peripheral is saved either to the computer or to a device. Some files are temporarily stored on the computer, and will later disappear or become unavailable. The destination of the saved file and the file type are determined when the file is created. Multiple file types can be created from the original. 10. Managing Files Each file type requires a specific kind of program to read it. In some cases, files can be converted to allow for program compatibility or to fit the intended use. Free file converters are available online: www.file-convert.com www.freefileconvert.com http://www.zamzar.com/ 11. Managing Files Files can be moved, copied, and organized. To move a file, drag and drop it from one location to another. To copy a file, right click the file and Copy, then paste it to the desired location. To send a file to another location, right click the file and Send to the desired destination. To create a folder, right click in the window and New->Folder. To name your file, right click the file and Rename file. 12. Managing files Files can be deleted from devices and computers. Right click the file and Delete. If prompted, confirm by clicking Yes. Files stored on a computer are sent to the recycle bin. To permanently delete the file, you must delete it from the recycle bin. Files on flash drives, etc., are permanently deleted. When files on a computer are deleted, they are inaccessible, yet the info still technically exists until it is overwritten with new information. This is where computer forensics comes into play. 13. Managing Programs Computer Programs are a set of instructions provided to a computer, which then executes the instructions. Computer Programs are made up of Source Code, which are analyzed and developed by programmers. There are two main types of programs System Software operates and controls a computer (i.e.: operating systems, drivers, utilities) Application Software (apps) performs useful tasks (i.e.: Microsoft office, media players, games) System Software is to necessary as Application Software is to useful. 14. Managing Programs All programs written for Windows can be found on your computer via Start->Control Panel -> Programs Programs can be obtained via the internet or through disks. Only download programs from trusted sources. Research new programs and read reviews before downloading. 15. Managing Programs Your computer comes equipped with a program to manage installation. Prior to installing/purchase, you should check the system requirements for compatibility (Start -> Control Panel -> System and Security -> System). Usually you will be prompted to Install the program, and then to Run the installation process. After installation, you may be asked to configure program defaults, to verify product activation using a license key, or to Finalize/Close. 16. Managing Programs Most common types of installation processes: Attended requires a user who attends to the process and makes choices. Silent occurs without any notification or windows. Malware almost always installs this way. Scheduled/Automated runs when scheduled (i.e.: updates) or automatically (i.e.: device drives). 17. Managing Programs You may uninstall programs if they are no longer used or you want to free up space. To access programs written for Windows, go to Start -> Control Panel -> Programs -> Programs and Features -> Uninstall If the program is not listed, see the creators instructions or search the computer for the program files via Start. Select the program, click Uninstall and follow prompts. 18. Managing Programs Some programs provide the option to Change or Repair: Change will allow you uninstall portions of the program or set program defaults. Repair will diagnose and attempt to fix problems with corrupted programs. If a program is behaving badly or experiencing problems, and Repair is not an option, you may try uninstalling and reinstalling to correct the issue. Corruption occurs when unintended changes are made to the program during one of the programs various processes. 19. Updating Changes and enhancements that are intended to make programs run better and defend against malware and attacks. Can be done manually or automatically. Available for operating systems and software. 20. Updating Automatic: system updates will install as they become available. Start -> Control Panel -> System and Security -> Windows Update -> Change Settings You can configure when the updates take place. You must be logged on to your computer. Usually requires a restart. 21. Updating Manual: updates that are initiated directly by you. For Windows updates: go to Start -> All Programs -> Windows Update -> Check Computer for Updates (install update software if needed) Select updates to install Restart computer 22. Updating Programs: most often need to be initiated by you or through pop-up reminders. Program updates can usually be found at the companys website. (i.e.: Adobe products via http://www.adobe.com/do wnloads/updates.html) Utilize search engines to find program updates, but make sure you are using a trusted source. 23. Microsoft Apps Most commonly used: WORD Word processing software EXCEL Spreadsheet software POWER POINT Presentation software PUBLISHER Publication software 24. Microsoft Apps - Word Use for writing reports, sending letters, creating resumes printing labels and envelopes, mass mailings, etc Home: Basic formatting such as font and size, text alignment, automatic formatting, text color Insert: Inserts new pages, tables, pictures, links, footers & headers, equations, symbols Page Layout: Set themes, margins, page size, add watermarks, change colors, insert columns References: Add table of contents, footnote, captions, endnotes, bibliography 25. Microsoft Apps - Word Mailings: print envelopes, labels, and mail merge (mass mailings created using excel spreadsheet). Review: check for errors, use the thesaurus, translate text, make comments, protect document View: change the page view via zoom, splitting windows, view two pages at once Acrobat: Convert files using Adobe Windows button: Save, print, open, create new 26. Microsoft Apps - Excel Use for creating spreadsheets and analyzing numbers. Home: Basic formatting including text, merge cells, format cells, define numbers, insert auto sum Insert: Add tables, illustrations, charts, links and text Page layout: Manage the layout of your information Formulas: Adds formulas to your spreadsheet that will automatically configure data Data: Allows external information to be inserted into the spreadsheet Review, View and Acrobat tabs are nearly identical to those in Word. 27. Microsoft Apps - Publisher Use for creating newsletters, brochures, signs, etc Select the type of document you wish to create (formatted styles are available.) The tabs are very similar to Word, except each part of the document exists on its own. This allows for layering and layout manipulation that is not possible in Word. Click or double on specific elements (text box, picture, table) to select the item, move the item and make changes. Right click on the selected element to access a menu of options specific to that item. 28. Microsoft Apps Power Point Use to create presentations and slide shows. Can incorporate music, animations and more! Tabs are once again very similar to Word. A happy mix between Word and Publisher. For Microsoft Office Online Tutorials visit http://office.microsoft.com/en-us/training/ 29. Protecting Your Computer Hardware Security protection against physical theft of a computer or information on a computer Software Security protection against threats to the computers operations and programs Data Security protection against data theft and data corruption 30. Protecting Your Computer Hardware Security Threat Information stored on your hard drive is vulnerable to physical/digital theft Info can be stolen, misused, damaged or destroyed If computer hardware is disassembled, warranty coverage will likely be voided When discarding computer or wiping it clean, some info may still be accessible to professionals 31. Protecting Your Computer Hardware Security Protection Keep your computer physically secure and under surveillance and maybe invest in a locking system for your computer or your drives. Specialized locks are available. Lock you house when you leave or keep your computer in a safe during extended vacations. Use good passwords! When discarding an old computer, use a certified refurbisher (a professional who will wipe your hard drives of all information) or do it yourself using overwrite software. More info is available at http://www.microsoft.com/security/online-privacy/safely- dispose-computers-and-devices.aspx 32. Protecting Your Computer Software Security Threat Denial of Service disables use of a computer or a service by flooding the network with too much traffic, interrupt communication between devices, or to disable use of a service (such as email) by the intended user. Trojan Horse malicious programs that are disguised to be read as safe by the security software. Gives hackers total access to the computer and/or network. Viruses and Worms bad pieces of programming that can infect and damage computer software and files. Can replicate themselves. 33. Protecting Your Computer Software Security Threat (continued) Sniffing the interception of information that is passed between users (hacker eavesdropping) Spyware malware that spies on user activity such as searches and websites visited. Scareware tries to scare the user into buying services that are not needed, such as antivirus software Adware produces a constant barrage of pop-up ads 34. Protecting Your Computer Software Security Protection Firewall a filter used to prevent malicious websites from gaining access to your computer. Firewall settings can be adjusted in Windows via Start -> Control Panel -> Search: Firewall (upper right hand corner) -> Windows Firewall http://windows.microsoft.com/en- us/windows7/understanding- windows-firewall-settings 35. Protecting Your Computer Software Security Protection Security Software anti-virus and security software will help to protect your computer Only install one anti-virus program otherwise they will create problems and not work properly i.e.: Norton, McAfee and AVG Free Start -> All Programs -> Windows Security Essentials to scan your computer. 36. Protecting Your Computer Data Security Threat Hardware malfunction results in the loss of important data and files (luckily this doesnt happen often.) 37. Protecting Your Computer Data Security Protection Backup your computer! Use an external hard drive to backup important files and a full image copy of your system in the event of a crash or complete hardware failure. http://windows.microsoft.com/en-us/windows7/back-up- your-programs-system-settings-and-files Backup using Windows via Start -> Control Panel -> System and Maintenance -> Backup and Restore Setup Backup if it is your first time using Windows Backup Backup Now to manually backup outside of a schedule 38. Protecting Your Computer Data Security Protection (continued) Run security and software updates regularly Save all tech support documents, manuals, and discs Use Clean-up Software to get rid of unused files and programs. http://www.pcworld.com/article/2 029460/panacea-or-pariah-five- pc-cleanup-utilities-put-to-the- test.html 39. This presentation can be found online at: Tiffany Hickox Technical Services Librarian [email protected]


Recommended