Presentation is loading. Please wait.

Presentation is loading. Please wait.

Copyright © 2012 by The McGraw-Hill Companies, Inc. All rights reserved. McGraw-Hill/Irwin PERSONAL PRODUCTIVITY USING IT TECHNOLOGY PLUG-IN T1.

Similar presentations


Presentation on theme: "Copyright © 2012 by The McGraw-Hill Companies, Inc. All rights reserved. McGraw-Hill/Irwin PERSONAL PRODUCTIVITY USING IT TECHNOLOGY PLUG-IN T1."— Presentation transcript:

1 Copyright © 2012 by The McGraw-Hill Companies, Inc. All rights reserved. McGraw-Hill/Irwin PERSONAL PRODUCTIVITY USING IT TECHNOLOGY PLUG-IN T1

2 T1-2 LEARNING OUTCOMES 1.Describe the four steps you can use to create a strong password 2.Identify three tips you can use to manage your files 3.Explain why you would use Microsoft’s backup and recovery utility 4.Describe the six common e-mail mistakes 5.Explain spam and phishing and identify three ways that you can prevent each

3 T1-3 LEARNING OUTCOMES 6.Explain the primary uses of spyware and adware 7.Identify three things you can do to maintain your computer and keep it running smoothly 8.Explain why you would install anti-virus protection software 9.Describe the need for a personal firewall

4 T1-4 INTRODUCTION A number of things can be done to keep a personal computer running smoothly: –Creating strong passwords –Performing good file management –Implementing effective backup and recovery strategies –Using Zip files –Writing professional e-mails –Stopping spam

5 T1-5 INTRODUCTION A number of things can be done to keep a personal computer running smoothly (cont…): –Preventing phishing –Detecting spyware –Restricting instant messaging –Increasing PC performance –Using anti-virus software –Installing a personal firewall

6 T1-6 INTRODUCTION

7 T1-7 CREATING STRONG PASSWORDS Four steps you can use to create strong passwords: 1.Create strong passwords that you can remember 2.Keep your passwords a secret 3.Manage your passwords 4.Monitor your accounts

8 T1-8 Create Strong Passwords That You Can Remember To create a strong password come up with a passphrase –A passphrase is a sentence that you can remember Example: “My favorite group is Cold Play and my favorite song is Arches” –You can make a strong password by using the first letter of each word of the sentence Example: mfgicpamfsia –Make this password even stronger by using a combination of upper and lowercase letters, numbers, and special characters that look like letters Example: MfGicp&mfsi@

9 T1-9 Keep Your Passwords A Secret Keeping your passwords safe means keeping them a secret Do not give them to friends, and do not write them down and keep them at your desk or in an unprotected file on your computer Be wary when giving them to the Web site where you created the password in the first place

10 T1-10 Manage Your Passwords The safest password technique is to create a new, strong password for every Web site or log-in Create a handful of strong passwords and use those at sites you want to keep most secure, such as bank account, brokerage, or bill paying company Create another small set of easier to remember passwords that you can use everywhere else

11 T1-11 Monitor Your Accounts Monitor all your monthly financial statements, and call the appropriate company or bank immediately to report issues Review your credit report each year

12 T1-12 PERFORMING GOOD FILE MANAGEMENT The best way to manage files is to organize them into folders and then store in specific locations Tips for managing your files: –Use My Documents –Limit file name length –Archive completed work –Use shortcuts –Use abbreviations –Use thumbnails –Do not save unnecessary files –Use My Recent Documents

13 T1-13 IMPLEMENTING EFFECTIVE BACKUP AN RECOVERY STRATEGIES You can unintentionally lose information on a computer in many ways –A child playing the keyboard like a piano –A power surge, lightning, flood, and even equipment failure Regularly make backup copies of your files and keep them in a separate place, you can get some, if not all, of your information back

14 T1-14 Determining What To Back Up Deciding what to back up is highly personal Some suggestions: –Bank records and other financial information –Digital photographs –Software purchased and downloaded from the Internet –Music purchased and downloaded from the Internet –Personal documents –E-mail address book

15 T1-15 How To Back Up Your Computer Files A simple backup in Windows XP requires no special software or skills To copy a file or folder, right-click on the file or folder and select Copy Choose the disk or drive where you want to store the duplicate copy, right-click again and then select Paste

16 T1-16 Perform Regular Backups How often should you back up your data? –If you use your computer occasionally, a weekly backup might be enough –If you use your computer every day, a daily backup is a good idea

17 T1-17 Microsoft’s Backup And Recover Utility Backup Utility –The Backup Utility in Windows XP helps you protect your data if your hard disk fails or files are accidentally erased due to hardware or storage media failure Recovery Console –The Recovery Console performs many tasks without starting Windows XP, including starting and stopping services, reading and writing information on a local disk drive, and formatting drives

18 T1-18 Using Zip Files Compressing files, folders, and programs decreases their size and reduces the amount of space Folders that are compressed using the Compressed (zipped) Folders feature use less drive space

19 T1-19 WRITING PROFESSIONAL E-MAILS Six common e-mail mistakes to avoid: 1.Failing to follow e-mail etiquette 2.Attempting anonymity 3.Sending e-mail to the wrong person 4.Using one email for everything 5.Clicking “Send” too fast 6.Forgetting the attachment

20 T1-20 STOPPING SPAM Spam is junk e-mail Spim is unwanted instant messages –Delete junk e-mail without opening them –Do not reply to spam unless you are certain that the message comes from a legitimate resource –Think twice before opening attachments –Do not buy anything or give to any charity promoted through spam –Do not forward chain e-mail messages

21 T1-21 PREVENTING PHISHING Thieves use a method known as phishing to send e-mail or instant message spam that meticulously imitates messages from reputable, well-known companies The forged message capitalizes on your trust of the respected brand

22 T1-22 How Does Phishing Work? A phishing scam sent by e-mail may start with con artists who send millions of e- mail messages that appear to come from popular Web sites or sites that you trust The e-mail messages, pop-up windows, and Web sites they link to appear official Unsuspecting people respond to these requests for their credit card numbers, passwords, account information, or other personal data

23 T1-23 How Does Phishing Work?

24 T1-24 Help Prevent Identity Theft From Phishing Scams Some guidelines to help protect yourself from these phishing scams: –Report suspicious e-mail –Be wary of clicking on links in e-mail messages –Type addresses directly into your browser or use your personal bookmarks –Check the security certificate –Do not enter personal or financial information into pop-up windows

25 T1-25 DETECTING SPYWARE Spyware is a general term used for software that performs certain behaviors without appropriately obtaining your consent You might have spyware if: –You see pop-up advertisements even when you are not on the Web –The page your Web browser first opens to or your browser search settings have changed without your knowledge –You notice a new toolbar in your browser that you didn’t want, and find it difficult to get rid of –Your computer takes longer than usual to complete certain tasks –You experience a sudden rise in computer crashes

26 T1-26 How To Get Rid Of Spyware To remove spyware: 1.Download a spyware removal tool (such as Microsoft Windows AntiSpyware) 2.Run the tool to scan your computer for spyware and other unwanted software 3.Review the files discovered by the tool for spyware and other unwanted software 4.Select suspicious files for removal by following the tool’s instructions

27 T1-27 RESTRICTING INSTANT MESSAGES A computer infected by a virus may continue to spread the infection by sending copies to everyone on your IM contact list Steps to help avoid IM viruses –Be careful downloading files in IM –Update Windows software –Make sure you are using an updated version of IM software –Use anti-virus software and keep it updated –Use anti-spyware software and keep it update

28 T1-28 RESTRICTING INSTANT MESSAGES

29 T1-29 INCREASING PC PERFORMANCE To maintain your computer and keep it running smoothly, follow these guidelines: –Free disk space –Speed up access to data –Detect and repair disk errors

30 T1-30 Free Disk Space By freeing disk space, you can improve the performance of your computer Use the Disk Cleanup Utility to: –Remove temporary Internet files –Remove downloaded program files –Empty the Recycle Bin –Remove Windows temporary files –Remove optional Windows components that you do not use –Remove installed programs that you no longer use

31 T1-31 To Use Disk Cleanup 1.Click Start, point to All Programs, point to Accessories, point to System Tools, and then click Disk Cleanup 2.If several drives are available, you might be prompted to specify which drive you want to clean 3.Disk Cleanup calculates the amount of space you will be able to free 4.In the Disk Cleanup for dialog box, scroll through the content of the Files to delete list

32 T1-32 To Use Disk Cleanup 5.Choose the files that you want to delete, 6.Clear the check boxes for files that you do not want to delete, and then click OK 7.When prompted to confirm that you want to delete the specified files, click Yes 8.After a few minutes, the process completes and the Disk Cleanup dialog box closes

33 T1-33 To Use Disk Cleanup

34 T1-34 Speed Up Access To Data Disk fragmentation slows the overall performance of your system When files are fragmented, the computer must search the hard disk when the file is opened to piece it back together The response time can be significantly longer

35 T1-35 To Use Disk Defragmenter 1.Click Start, point to All Programs, point to Accessories, point to System Tools, and then click Disk Defragmenter. 2.Click Analyze to start the Disk Defragmenter 3.In the Disk Defragmenter dialog box, click the drives that you want to defragment, and then click the Analyze button 4.To defragment the selected drive or drives, click the Defragment button

36 T1-36 To Use Disk Defragmenter 5.After the defragmentation is complete, Disk Defragmenter displays the results 6.To display detailed information about the defragmented disk or partition, click View Report 7.To close the View Report dialog box, click Close 8.To close the Disk Defragmenter utility, click the Close button on the title bar of the window

37 T1-37 To Use Disk Defragmenter

38 T1-38 Detect and Repair Disk Errors The Error Checking utility scans the hard drive for bad sectors, and scans for file system errors to see whether certain files or folders are misplaced To Run the Error Checking Utility 1.Important: Be sure to close all files before running the Error Checking utility 2.Click Start, and then click My Computer 3.In the My Computer window, right-click the hard disk you want to search for bad sectors, and then click Properties

39 T1-39 Detect and Repair Disk Errors 4.In the Properties dialog box, click the Tools tab 5.Click the Check Now button 6.In the Check Disk dialog box, select the Scan for and attempt recovery of bad sectors check box, and then click Start 7.If bad sectors are found, you will be prompted to fix them

40 T1-40 Detect and Repair Disk Errors

41 T1-41 USING ANTI-VIRUS SOFTWARE A virus is basically a malicious computer program –The effects of viruses differ, some either modify, delete, or steal data, and others may give control of your PC over to their creators via the Internet A worm refers to a virus that can replicate and spread by itself over a network (the Internet for instance)

42 T1-42 Anti-Virus Software There are three main types of viruses in circulation: 1.Boot sector viruses 2.Macro viruses 3.File infecting viruses

43 T1-43 Virus Definition Files Anti-virus software usually works by checking a file for certain patterns of binary code The patterns used to identify viruses are stored in what is known as a virus definition file Anti-virus products : –McAfee VirusScan (www.mcafee.com) –Norton Anti-virus (www.symantec.com)

44 T1-44 Virus Definition Files

45 T1-45 Cell Phone Viruses Cell phone viruses are at the threshold of their effectiveness At present, they cannot spread very far and they don’t do much damage, but the future might see cell phone bugs that are as debilitating as computer viruses

46 T1-46 INSTALLING A PERSONAL FIREWALL A firewall is simply a program or hardware device that filters the information coming through the Internet connection into a computer If an incoming packet of information is flagged by the filters, it is not allowed through

47 T1-47 To Open Windows Firewall 1.Click Start and then click Control Panel 2.Click Windows Firewall


Download ppt "Copyright © 2012 by The McGraw-Hill Companies, Inc. All rights reserved. McGraw-Hill/Irwin PERSONAL PRODUCTIVITY USING IT TECHNOLOGY PLUG-IN T1."

Similar presentations


Ads by Google