SlideShare a Scribd company logo
Learning to do more with your computer.
Intermediate Computer Skills
 Ctrl+Alt+Del
 Using External Devices
 Creating, organizing and moving files
 Installing and uninstalling programs
 Running updates
 Understanding Microsoft Application Basics
 Protecting your computer
Ctrl + Alt + Del
 Opens Task Manager or Windows Securities
depending on the operating system
 Allows you to manage your computer if problems with
programs or malware arise.
 Safely restarts or shuts off your computer.
 Closes programs that are locked or are experiencing
problems without having to restart the entire
computer.
 Use Ctrl+Alt+Del instead of just turning off the
computer with the Power button.
Using External Devices
 Any component that is
used in conjunction
with the main
processing unit.
 Also referred to as
peripheral hardware
 Connects via USB cord
or wireless signal
Using External Devices
 When first connected, a device driver (software) is
installed on the computer, either manually or
automatically.
 If you are not prompted to install a driver or it does not
automatically download, they can usually be found via
the internet. Only download from trusted sites.
 Devices can be accessed via the Start menu, usually
from Computer or Devices and Printers.
 Drivers can be accessed via Start -> Control Panel ->
Programs or by searching drivers at the Start menu.
Using External Devices
Types of external devices:
 Removable storage (flash
drives, disk drives, iPod, etc.)
 Non-removable storage
(external hard drives)
 Input
(mouse, keyboard, touch
screen, scanner, etc.)
 Output
(monitor, speakers, TV, print
er)
Managing Files
 A File is a resource for storing
and sharing information and
is used in conjunction with a
Computer Program.
 Codes are used to determine
the file type.
 A list of common file types is
available at:
http://mistupid.com/comput
ers/filetypes.htm
Managing Files
 Common File types include
 Microsoft files: doc, ppt, xls, pub
 Audio files: mp3, wma, wva
 Picture files:
jpg, tiff, bmp, gif, png, pic, etc.
 Adobe files: pdf, ePub
 Video files: asf, avi, swf, mov
 Rich text files: rtf
 Html files: htm
 Compressed files: zip
Managing Files
 Files are created when info that has been entered into
a program or peripheral is saved either to the computer
or to a device.
 Some files are temporarily stored on the computer, and
will later disappear or become unavailable.
 The destination of the saved file and the file type are
determined when the file is created.
 Multiple file types can be created from the original.
Managing Files
 Each file type requires a specific kind of program to
read it.
 In some cases, files can be converted to allow for
program compatibility or to fit the intended use.
 Free file converters are available online:
 www.file-convert.com
 www.freefileconvert.com
 http://www.zamzar.com/
Managing Files
 Files can be moved, copied, and organized.
 To move a file, drag and drop it from one location to
another.
 To copy a file, right click the file and Copy, then paste it
to the desired location.
 To send a file to another location, right click the file and
Send to the desired destination.
 To create a folder, right click in the window and
New->Folder.
 To name your file, right click the file and Rename file.
Managing files
 Files can be deleted from devices and computers.
 Right click the file and Delete. If prompted, confirm by
clicking Yes.
 Files stored on a computer are sent to the recycle bin. To
permanently delete the file, you must delete it from the
recycle bin.
 Files on flash drives, etc., are permanently deleted.
 When files on a computer are deleted, they are
inaccessible, yet the info still technically exists until it
is overwritten with new information. This is where
computer forensics comes into play.
Managing Programs
 Computer Programs are a set of instructions provided
to a computer, which then executes the instructions.
 Computer Programs are made up of Source
Code, which are analyzed and developed by
programmers.
 There are two main types of programs
 System Software – operates and controls a computer
(i.e.: operating systems, drivers, utilities)
 Application Software (apps)– performs useful tasks (i.e.:
Microsoft office, media players, games)
 System Software is to necessary as Application Software
is to useful.
Managing Programs
 All programs written for
Windows can be found on your
computer via Start->Control
Panel -> Programs
 Programs can be obtained via
the internet or through disks.
 Only download programs from
trusted sources.
 Research new programs and
read reviews before
downloading.
Managing Programs
 Your computer comes equipped with a program to
manage installation.
 Prior to installing/purchase, you should check the
system requirements for compatibility (Start ->
Control Panel -> System and Security -> System).
 Usually you will be prompted to Install the
program, and then to Run the installation process.
 After installation, you may be asked to configure
program defaults, to verify product activation using a
license key, or to Finalize/Close.
Managing Programs
 Most common types of
installation processes:
 Attended – requires a user who
attends to the process and makes
choices.
 Silent – occurs without any
notification or windows.
Malware almost always installs
this way.
 Scheduled/Automated – runs
when scheduled (i.e.: updates) or
automatically (i.e.: device
drives).
Managing Programs
 You may uninstall programs if they are no longer used
or you want to free up space.
 To access programs written for Windows, go to Start ->
Control Panel -> Programs -> Programs and Features
-> Uninstall
 If the program is not listed, see the creator’s
instructions or search the computer for the program
files via Start.
 Select the program, click Uninstall and follow
prompts.
Managing Programs
 Some programs provide the option to Change or Repair:
 Change will allow you uninstall portions of the program or set
program defaults.
 Repair will diagnose and attempt to fix problems with
corrupted programs.
 If a program is behaving badly or experiencing
problems, and Repair is not an option, you may try
uninstalling and reinstalling to correct the issue.
 Corruption occurs when unintended changes are made to
the program during one of the program’s various processes.
Updating
 Changes and enhancements
that are intended to make
programs run better and
defend against malware and
attacks.
 Can be done manually or
automatically.
 Available for operating
systems and software.
Updating
 Automatic: system
updates will install as they
become available.
 Start -> Control Panel ->
System and Security ->
Windows Update ->
Change Settings
 You can configure when
the updates take place.
You must be logged on to
your computer. Usually
requires a restart.
Updating
 Manual: updates that are
initiated directly by you.
 For Windows updates:
go to Start -> All
Programs -> Windows
Update -> Check
Computer for Updates
(install update software
if needed)
 Select updates to install
 Restart computer
Updating
 Programs: most often need
to be initiated by you or
through pop-up reminders.
 Program updates can
usually be found at the
company’s website. (i.e.:
Adobe products via
http://www.adobe.com/do
wnloads/updates.html)
 Utilize search engines to
find program updates, but
make sure you are using a
trusted source.
Microsoft Apps
 Most commonly used:
 WORD – Word processing
software
 EXCEL – Spreadsheet software
 POWER POINT –
Presentation software
 PUBLISHER – Publication
software
Microsoft Apps - Word
Use for writing reports, sending letters, creating resumes
printing labels and envelopes, mass mailings, etc…
 Home: Basic formatting such as font and size, text
alignment, automatic formatting, text color…
 Insert: Inserts new
pages, tables, pictures, links, footers &
headers, equations, symbols…
 Page Layout: Set themes, margins, page size, add
watermarks, change colors, insert columns…
 References: Add table of
contents, footnote, captions, endnotes, bibliography…
Microsoft Apps - Word
 Mailings: print envelopes, labels, and mail merge
(mass mailings created using excel spreadsheet).
 Review: check for errors, use the thesaurus, translate
text, make comments, protect document…
 View: change the page view via zoom, splitting
windows, view two pages at once…
 Acrobat: Convert files using Adobe…
 Windows button: Save, print, open, create new…
Microsoft Apps - Excel
Use for creating spreadsheets and analyzing numbers.
 Home: Basic formatting including text, merge cells, format
cells, define numbers, insert auto sum…
 Insert: Add tables, illustrations, charts, links and text…
 Page layout: Manage the layout of your information
 Formulas: Adds formulas to your spreadsheet that will
automatically configure data
 Data: Allows external information to be inserted into the
spreadsheet
 Review, View and Acrobat tabs are nearly identical to those
in Word.
Microsoft Apps - Publisher
Use for creating newsletters, brochures, signs, etc…
 Select the type of document you wish to create
(formatted styles are available.)
 The tabs are very similar to Word, except each part of
the document exists on it’s own. This allows for
layering and layout manipulation that is not possible
in Word.
 Click or double on specific elements (text
box, picture, table) to select the item, move the item
and make changes. Right click on the selected element
to access a menu of options specific to that item.
Microsoft Apps – Power Point
Use to create presentations and slide shows. Can
incorporate music, animations and more!
 Tabs are once again very similar to Word.
 A happy mix between Word and Publisher.
For Microsoft Office Online Tutorials visit
http://office.microsoft.com/en-us/training/
Protecting Your Computer
 Hardware Security –
protection against physical
theft of a computer or
information on a computer
 Software Security – protection
against threats to the
computer’s operations and
programs
 Data Security – protection
against data theft and data
corruption
Protecting Your Computer
 Hardware Security Threat
 Information stored on your hard
drive is vulnerable to
physical/digital theft
 Info can be
stolen, misused, damaged or
destroyed
 If computer hardware is
disassembled, warranty coverage
will likely be voided
 When discarding computer or
wiping it clean, some info may
still be accessible to professionals
Protecting Your Computer
 Hardware Security Protection
 Keep your computer physically secure and under surveillance
and maybe invest in a locking system for your computer or
your drives. Specialized locks are available.
 Lock you house when you leave or keep your computer in a
safe during extended vacations. Use good passwords!
 When discarding an old computer, use a certified refurbisher
(a professional who will wipe your hard drives of all
information) or do it yourself using overwrite software. More
info is available at
http://www.microsoft.com/security/online-privacy/safely-
dispose-computers-and-devices.aspx
Protecting Your Computer
 Software Security Threat
 Denial of Service – disables use of a computer or a
service by flooding the network with too much
traffic, interrupt communication between devices, or to
disable use of a service (such as email) by the intended
user.
 Trojan Horse – malicious programs that are disguised to
be read as safe by the security software. Gives hackers
total access to the computer and/or network.
 Viruses and Worms – bad pieces of programming that
can infect and damage computer software and files. Can
replicate themselves.
Protecting Your Computer
 Software Security Threat (continued)
 Sniffing – the interception of information that is passed
between users (hacker eavesdropping)
 Spyware – malware that spies on user activity such as
searches and websites visited.
 Scareware – tries to scare the user into buying services
that are not needed, such as antivirus software
 Adware – produces a constant barrage of pop-up ads
Protecting Your Computer
 Software Security Protection
 Firewall – a filter used to prevent
malicious websites from gaining
access to your computer.
 Firewall settings can be adjusted in
Windows via Start -> Control Panel
-> Search: Firewall (upper right
hand corner) -> Windows Firewall
 http://windows.microsoft.com/en-
us/windows7/understanding-
windows-firewall-settings
Protecting Your Computer
 Software Security Protection
 Security Software – anti-virus
and security software will help
to protect your computer
 Only install one anti-virus
program otherwise they will create
problems and not work properly
 i.e.: Norton, McAfee and AVG Free
 Start -> All Programs -> Windows
Security Essentials to scan your
computer.
Protecting Your Computer
 Data Security Threat
 Hardware
malfunction results
in the loss of
important data and
files (luckily this
doesn’t happen
often.)
Protecting Your Computer
 Data Security Protection
 Backup your computer!
 Use an external hard drive to backup important files and a
full image copy of your system in the event of a crash or
complete hardware failure.
http://windows.microsoft.com/en-us/windows7/back-up-
your-programs-system-settings-and-files
 Backup using Windows via Start -> Control Panel ->
System and Maintenance -> Backup and Restore
 Setup Backup if it is your first time using Windows Backup
 Backup Now to manually backup outside of a schedule
Protecting Your Computer
 Data Security Protection
(continued)
 Run security and software updates
regularly
 Save all tech support
documents, manuals, and discs
 Use Clean-up Software to get rid of
unused files and programs.
http://www.pcworld.com/article/2
029460/panacea-or-pariah-five-
pc-cleanup-utilities-put-to-the-
test.html
This presentation can be found
online at:
Tiffany Hickox
Technical Services Librarian
thickox@cityofalliance.net

More Related Content

PPTX
Operating system
PPTX
Fundamentals of information technology
PPT
Computer Basics 101 Slide Show Presentation
PPT
Windows Basic Computer Skills
PPTX
Types of User interface
PPTX
operating system
PPTX
Os ppt
PPT
Basic computer for small business
Operating system
Fundamentals of information technology
Computer Basics 101 Slide Show Presentation
Windows Basic Computer Skills
Types of User interface
operating system
Os ppt
Basic computer for small business

What's hot (20)

PPTX
Basic Computer Application Skills
PPS
Functions Of Operating System
PPT
Operating Systems
PPT
Input devices_(Mouse and Keyboard)
PPT
Basic computer class 1
PPTX
COMPUTER APPLICATION
PPTX
Introduction to Computer Virus
PPTX
Operating systems
PPTX
Future operating system
PPTX
Computer fundamentals
PPTX
Computer ports
PPTX
Function of Operating system
PPT
Basic Computer Course
PPT
Presentation about computer hardware
PPTX
Word processing
PPT
INTRODUCTION TO COMPUTERS
PPT
Operating Systems
PPT
Storage devices
PPTX
Windows 10-ppt
Basic Computer Application Skills
Functions Of Operating System
Operating Systems
Input devices_(Mouse and Keyboard)
Basic computer class 1
COMPUTER APPLICATION
Introduction to Computer Virus
Operating systems
Future operating system
Computer fundamentals
Computer ports
Function of Operating system
Basic Computer Course
Presentation about computer hardware
Word processing
INTRODUCTION TO COMPUTERS
Operating Systems
Storage devices
Windows 10-ppt
Ad

Viewers also liked (7)

PDF
Intermediate 1 Computing studies Course Slides
PPT
Basic Computer Skills Seminar
PPTX
Online Budgeting
PDF
Basic computer skills test
PPTX
Solving Shared Drives: 10 Tips for Cleaning Up, Organizing, and Migrating Con...
PPTX
Basic computer skills
PPT
basics of computer system ppt
Intermediate 1 Computing studies Course Slides
Basic Computer Skills Seminar
Online Budgeting
Basic computer skills test
Solving Shared Drives: 10 Tips for Cleaning Up, Organizing, and Migrating Con...
Basic computer skills
basics of computer system ppt
Ad

Similar to Intermediate computer skills (20)

PPTX
1.0 QuickBooks Fundementals : Day 02 Windows :2.1 windows
PDF
ICDL Module 2 - Using Computers & Managing Files (Windows XP) - Presentation ...
PPT
Getting Started with Computers
PPTX
Managing Desktop & Files With Windows 7
PPT
Windows xp basics army greent
PDF
Ecdl v5 module 2 print
PPTX
CHAP 2 - FILE MANAGEMENT
PPTX
1 5 system software and computer management
PPT
Computers For Beginners: What's on your Desktop?
PPTX
Common tasks oct 2012
DOCX
BASIC ICT SKILLS.docx
PPTX
Computer class final
PPT
Windows operating system
PDF
Green hectares rural tech factsheet computer basics
PPTX
Computer Application in Business & itsHistory
PPTX
Basic computing
PPTX
Computer basics
PPT
Computer maintenance
PPTX
The basics- getting started with computers-slide share
PPTX
windows and its components
1.0 QuickBooks Fundementals : Day 02 Windows :2.1 windows
ICDL Module 2 - Using Computers & Managing Files (Windows XP) - Presentation ...
Getting Started with Computers
Managing Desktop & Files With Windows 7
Windows xp basics army greent
Ecdl v5 module 2 print
CHAP 2 - FILE MANAGEMENT
1 5 system software and computer management
Computers For Beginners: What's on your Desktop?
Common tasks oct 2012
BASIC ICT SKILLS.docx
Computer class final
Windows operating system
Green hectares rural tech factsheet computer basics
Computer Application in Business & itsHistory
Basic computing
Computer basics
Computer maintenance
The basics- getting started with computers-slide share
windows and its components

Recently uploaded (20)

PDF
Dropbox Q2 2025 Financial Results & Investor Presentation
PDF
Optimiser vos workloads AI/ML sur Amazon EC2 et AWS Graviton
PDF
Empathic Computing: Creating Shared Understanding
PPTX
KOM of Painting work and Equipment Insulation REV00 update 25-dec.pptx
PDF
Chapter 3 Spatial Domain Image Processing.pdf
PDF
Network Security Unit 5.pdf for BCA BBA.
PDF
How UI/UX Design Impacts User Retention in Mobile Apps.pdf
PPTX
Big Data Technologies - Introduction.pptx
PDF
Approach and Philosophy of On baking technology
PDF
Peak of Data & AI Encore- AI for Metadata and Smarter Workflows
PDF
Review of recent advances in non-invasive hemoglobin estimation
PDF
Unlocking AI with Model Context Protocol (MCP)
PDF
Building Integrated photovoltaic BIPV_UPV.pdf
PDF
Spectral efficient network and resource selection model in 5G networks
PDF
7 ChatGPT Prompts to Help You Define Your Ideal Customer Profile.pdf
PPTX
MYSQL Presentation for SQL database connectivity
PDF
Encapsulation theory and applications.pdf
PDF
Per capita expenditure prediction using model stacking based on satellite ima...
PPTX
Detection-First SIEM: Rule Types, Dashboards, and Threat-Informed Strategy
PDF
Electronic commerce courselecture one. Pdf
Dropbox Q2 2025 Financial Results & Investor Presentation
Optimiser vos workloads AI/ML sur Amazon EC2 et AWS Graviton
Empathic Computing: Creating Shared Understanding
KOM of Painting work and Equipment Insulation REV00 update 25-dec.pptx
Chapter 3 Spatial Domain Image Processing.pdf
Network Security Unit 5.pdf for BCA BBA.
How UI/UX Design Impacts User Retention in Mobile Apps.pdf
Big Data Technologies - Introduction.pptx
Approach and Philosophy of On baking technology
Peak of Data & AI Encore- AI for Metadata and Smarter Workflows
Review of recent advances in non-invasive hemoglobin estimation
Unlocking AI with Model Context Protocol (MCP)
Building Integrated photovoltaic BIPV_UPV.pdf
Spectral efficient network and resource selection model in 5G networks
7 ChatGPT Prompts to Help You Define Your Ideal Customer Profile.pdf
MYSQL Presentation for SQL database connectivity
Encapsulation theory and applications.pdf
Per capita expenditure prediction using model stacking based on satellite ima...
Detection-First SIEM: Rule Types, Dashboards, and Threat-Informed Strategy
Electronic commerce courselecture one. Pdf

Intermediate computer skills

  • 1. Learning to do more with your computer.
  • 2. Intermediate Computer Skills  Ctrl+Alt+Del  Using External Devices  Creating, organizing and moving files  Installing and uninstalling programs  Running updates  Understanding Microsoft Application Basics  Protecting your computer
  • 3. Ctrl + Alt + Del  Opens Task Manager or Windows Securities depending on the operating system  Allows you to manage your computer if problems with programs or malware arise.  Safely restarts or shuts off your computer.  Closes programs that are locked or are experiencing problems without having to restart the entire computer.  Use Ctrl+Alt+Del instead of just turning off the computer with the Power button.
  • 4. Using External Devices  Any component that is used in conjunction with the main processing unit.  Also referred to as peripheral hardware  Connects via USB cord or wireless signal
  • 5. Using External Devices  When first connected, a device driver (software) is installed on the computer, either manually or automatically.  If you are not prompted to install a driver or it does not automatically download, they can usually be found via the internet. Only download from trusted sites.  Devices can be accessed via the Start menu, usually from Computer or Devices and Printers.  Drivers can be accessed via Start -> Control Panel -> Programs or by searching drivers at the Start menu.
  • 6. Using External Devices Types of external devices:  Removable storage (flash drives, disk drives, iPod, etc.)  Non-removable storage (external hard drives)  Input (mouse, keyboard, touch screen, scanner, etc.)  Output (monitor, speakers, TV, print er)
  • 7. Managing Files  A File is a resource for storing and sharing information and is used in conjunction with a Computer Program.  Codes are used to determine the file type.  A list of common file types is available at: http://mistupid.com/comput ers/filetypes.htm
  • 8. Managing Files  Common File types include  Microsoft files: doc, ppt, xls, pub  Audio files: mp3, wma, wva  Picture files: jpg, tiff, bmp, gif, png, pic, etc.  Adobe files: pdf, ePub  Video files: asf, avi, swf, mov  Rich text files: rtf  Html files: htm  Compressed files: zip
  • 9. Managing Files  Files are created when info that has been entered into a program or peripheral is saved either to the computer or to a device.  Some files are temporarily stored on the computer, and will later disappear or become unavailable.  The destination of the saved file and the file type are determined when the file is created.  Multiple file types can be created from the original.
  • 10. Managing Files  Each file type requires a specific kind of program to read it.  In some cases, files can be converted to allow for program compatibility or to fit the intended use.  Free file converters are available online:  www.file-convert.com  www.freefileconvert.com  http://www.zamzar.com/
  • 11. Managing Files  Files can be moved, copied, and organized.  To move a file, drag and drop it from one location to another.  To copy a file, right click the file and Copy, then paste it to the desired location.  To send a file to another location, right click the file and Send to the desired destination.  To create a folder, right click in the window and New->Folder.  To name your file, right click the file and Rename file.
  • 12. Managing files  Files can be deleted from devices and computers.  Right click the file and Delete. If prompted, confirm by clicking Yes.  Files stored on a computer are sent to the recycle bin. To permanently delete the file, you must delete it from the recycle bin.  Files on flash drives, etc., are permanently deleted.  When files on a computer are deleted, they are inaccessible, yet the info still technically exists until it is overwritten with new information. This is where computer forensics comes into play.
  • 13. Managing Programs  Computer Programs are a set of instructions provided to a computer, which then executes the instructions.  Computer Programs are made up of Source Code, which are analyzed and developed by programmers.  There are two main types of programs  System Software – operates and controls a computer (i.e.: operating systems, drivers, utilities)  Application Software (apps)– performs useful tasks (i.e.: Microsoft office, media players, games)  System Software is to necessary as Application Software is to useful.
  • 14. Managing Programs  All programs written for Windows can be found on your computer via Start->Control Panel -> Programs  Programs can be obtained via the internet or through disks.  Only download programs from trusted sources.  Research new programs and read reviews before downloading.
  • 15. Managing Programs  Your computer comes equipped with a program to manage installation.  Prior to installing/purchase, you should check the system requirements for compatibility (Start -> Control Panel -> System and Security -> System).  Usually you will be prompted to Install the program, and then to Run the installation process.  After installation, you may be asked to configure program defaults, to verify product activation using a license key, or to Finalize/Close.
  • 16. Managing Programs  Most common types of installation processes:  Attended – requires a user who attends to the process and makes choices.  Silent – occurs without any notification or windows. Malware almost always installs this way.  Scheduled/Automated – runs when scheduled (i.e.: updates) or automatically (i.e.: device drives).
  • 17. Managing Programs  You may uninstall programs if they are no longer used or you want to free up space.  To access programs written for Windows, go to Start -> Control Panel -> Programs -> Programs and Features -> Uninstall  If the program is not listed, see the creator’s instructions or search the computer for the program files via Start.  Select the program, click Uninstall and follow prompts.
  • 18. Managing Programs  Some programs provide the option to Change or Repair:  Change will allow you uninstall portions of the program or set program defaults.  Repair will diagnose and attempt to fix problems with corrupted programs.  If a program is behaving badly or experiencing problems, and Repair is not an option, you may try uninstalling and reinstalling to correct the issue.  Corruption occurs when unintended changes are made to the program during one of the program’s various processes.
  • 19. Updating  Changes and enhancements that are intended to make programs run better and defend against malware and attacks.  Can be done manually or automatically.  Available for operating systems and software.
  • 20. Updating  Automatic: system updates will install as they become available.  Start -> Control Panel -> System and Security -> Windows Update -> Change Settings  You can configure when the updates take place. You must be logged on to your computer. Usually requires a restart.
  • 21. Updating  Manual: updates that are initiated directly by you.  For Windows updates: go to Start -> All Programs -> Windows Update -> Check Computer for Updates (install update software if needed)  Select updates to install  Restart computer
  • 22. Updating  Programs: most often need to be initiated by you or through pop-up reminders.  Program updates can usually be found at the company’s website. (i.e.: Adobe products via http://www.adobe.com/do wnloads/updates.html)  Utilize search engines to find program updates, but make sure you are using a trusted source.
  • 23. Microsoft Apps  Most commonly used:  WORD – Word processing software  EXCEL – Spreadsheet software  POWER POINT – Presentation software  PUBLISHER – Publication software
  • 24. Microsoft Apps - Word Use for writing reports, sending letters, creating resumes printing labels and envelopes, mass mailings, etc…  Home: Basic formatting such as font and size, text alignment, automatic formatting, text color…  Insert: Inserts new pages, tables, pictures, links, footers & headers, equations, symbols…  Page Layout: Set themes, margins, page size, add watermarks, change colors, insert columns…  References: Add table of contents, footnote, captions, endnotes, bibliography…
  • 25. Microsoft Apps - Word  Mailings: print envelopes, labels, and mail merge (mass mailings created using excel spreadsheet).  Review: check for errors, use the thesaurus, translate text, make comments, protect document…  View: change the page view via zoom, splitting windows, view two pages at once…  Acrobat: Convert files using Adobe…  Windows button: Save, print, open, create new…
  • 26. Microsoft Apps - Excel Use for creating spreadsheets and analyzing numbers.  Home: Basic formatting including text, merge cells, format cells, define numbers, insert auto sum…  Insert: Add tables, illustrations, charts, links and text…  Page layout: Manage the layout of your information  Formulas: Adds formulas to your spreadsheet that will automatically configure data  Data: Allows external information to be inserted into the spreadsheet  Review, View and Acrobat tabs are nearly identical to those in Word.
  • 27. Microsoft Apps - Publisher Use for creating newsletters, brochures, signs, etc…  Select the type of document you wish to create (formatted styles are available.)  The tabs are very similar to Word, except each part of the document exists on it’s own. This allows for layering and layout manipulation that is not possible in Word.  Click or double on specific elements (text box, picture, table) to select the item, move the item and make changes. Right click on the selected element to access a menu of options specific to that item.
  • 28. Microsoft Apps – Power Point Use to create presentations and slide shows. Can incorporate music, animations and more!  Tabs are once again very similar to Word.  A happy mix between Word and Publisher. For Microsoft Office Online Tutorials visit http://office.microsoft.com/en-us/training/
  • 29. Protecting Your Computer  Hardware Security – protection against physical theft of a computer or information on a computer  Software Security – protection against threats to the computer’s operations and programs  Data Security – protection against data theft and data corruption
  • 30. Protecting Your Computer  Hardware Security Threat  Information stored on your hard drive is vulnerable to physical/digital theft  Info can be stolen, misused, damaged or destroyed  If computer hardware is disassembled, warranty coverage will likely be voided  When discarding computer or wiping it clean, some info may still be accessible to professionals
  • 31. Protecting Your Computer  Hardware Security Protection  Keep your computer physically secure and under surveillance and maybe invest in a locking system for your computer or your drives. Specialized locks are available.  Lock you house when you leave or keep your computer in a safe during extended vacations. Use good passwords!  When discarding an old computer, use a certified refurbisher (a professional who will wipe your hard drives of all information) or do it yourself using overwrite software. More info is available at http://www.microsoft.com/security/online-privacy/safely- dispose-computers-and-devices.aspx
  • 32. Protecting Your Computer  Software Security Threat  Denial of Service – disables use of a computer or a service by flooding the network with too much traffic, interrupt communication between devices, or to disable use of a service (such as email) by the intended user.  Trojan Horse – malicious programs that are disguised to be read as safe by the security software. Gives hackers total access to the computer and/or network.  Viruses and Worms – bad pieces of programming that can infect and damage computer software and files. Can replicate themselves.
  • 33. Protecting Your Computer  Software Security Threat (continued)  Sniffing – the interception of information that is passed between users (hacker eavesdropping)  Spyware – malware that spies on user activity such as searches and websites visited.  Scareware – tries to scare the user into buying services that are not needed, such as antivirus software  Adware – produces a constant barrage of pop-up ads
  • 34. Protecting Your Computer  Software Security Protection  Firewall – a filter used to prevent malicious websites from gaining access to your computer.  Firewall settings can be adjusted in Windows via Start -> Control Panel -> Search: Firewall (upper right hand corner) -> Windows Firewall  http://windows.microsoft.com/en- us/windows7/understanding- windows-firewall-settings
  • 35. Protecting Your Computer  Software Security Protection  Security Software – anti-virus and security software will help to protect your computer  Only install one anti-virus program otherwise they will create problems and not work properly  i.e.: Norton, McAfee and AVG Free  Start -> All Programs -> Windows Security Essentials to scan your computer.
  • 36. Protecting Your Computer  Data Security Threat  Hardware malfunction results in the loss of important data and files (luckily this doesn’t happen often.)
  • 37. Protecting Your Computer  Data Security Protection  Backup your computer!  Use an external hard drive to backup important files and a full image copy of your system in the event of a crash or complete hardware failure. http://windows.microsoft.com/en-us/windows7/back-up- your-programs-system-settings-and-files  Backup using Windows via Start -> Control Panel -> System and Maintenance -> Backup and Restore  Setup Backup if it is your first time using Windows Backup  Backup Now to manually backup outside of a schedule
  • 38. Protecting Your Computer  Data Security Protection (continued)  Run security and software updates regularly  Save all tech support documents, manuals, and discs  Use Clean-up Software to get rid of unused files and programs. http://www.pcworld.com/article/2 029460/panacea-or-pariah-five- pc-cleanup-utilities-put-to-the- test.html
  • 39. This presentation can be found online at: Tiffany Hickox Technical Services Librarian thickox@cityofalliance.net

Editor's Notes

  • #4: The only time a computer should be turned off via the Power button is if there is no other option!!!
  • #6: Demonstrate printer installation at end of slide
  • #7: Have the class insert and access the flash drive.
  • #9: Download a file from email as zip and then extract files.
  • #10: Temp files can include Microsoft recovery documents and internet temporary downloads.
  • #11: Convert a doc into an Epub using www.file-convert.com
  • #12: Use a camera to demonstrate the above.
  • #28: Show them the survey example.