Computer Software Hardware - Michigan State University
Computer Hardware Software 1. Introduction 2. Internet research and security Email Basic online protection 3. Use PC safely and efficiently
4. Purchase decisions Email / Phishing, SPAM Phishing (use of e-mail messages that appear to be sent from a trusted source.) Spam (you get spam is because the person sending spam has your email address.) Phishing examples?
How can we tell they are fake? Spelling Mistakes Incorrect Graphics Personal Information The URL
Internet research and security Browse Internet safely Set your browser security to medium/medium-high Add safe sites to trusted sites Read e-mail messages in plain text Block pop-up windows in your browser Secure sites; Secure Data; online transaction; MSU web credit store
Instant messenger, chatting, and Voice over IP programs IE 7 popup blocker phishing filter File management
Manage by folders Save on the server (\\edshare.educ.msu.edu) Name files properly (do not use space or #, $, ~, !) View files with different layout Keep a backup copy yourself Stop using floppy disks; use thumb drive
Email management Basic PC protection
Strong password Windows Security Essential program Check for Windows updates automatically Firewalls (turn on Windows built-in firewall) Set the Internet browser security medium-high Do not download free programs from internet Use computer efficiently Reduce printing; convert documents into
PDF files. Hard disk de-fragmentation Empty Internet browsers cached files Use MSU wireless Basic troubleshooting techniques My computer does not work. Be specific when report error. PC Restore and Recover Computer Screen Care
Keyboard / Mouse Things to consider when you purchase a computer CPU speed Hard Drive size Memory/RAM CD/DVD Drive Video Card External Connectors
Things to consider when you purchase a computer Who is going to use it? What is the priority? Weight Screen size CPU power Pricing Timeline
Connect laptop to projector Connect the video cable to the projector. 1. Turn on projector. 2. Turn on your laptop. Resources
College computer support website MSU computer store room 101 MSU computer repair: room 120
Data conversion tools and templates. Database conversion utilities. Data validation reports. Data realignment templates. Data load tools. Easy On-Boarding. Process Maps. Configuration Data. Workshops. Conversion Tools and Methodologies. The Path to On Demand
Identify theme and strategies of finding theme within a story. Identify central idea and main idea . What are similarities and differences between the two? What strategy do I want to use to find central/main idea? How are theme, main...
- when the palm is moved to face posteriorly. Supination - when the palm is moved to face anteriorly (Hint: you can hold a bowl of soup) ... Loss of bone mass has been noted in bed-ridden patients, inactive senior...
Erection , Lubrication, and Orgasm Where is erectile tissue located? Once these tissues are stimulated, parasympathetic nerve impulses release nitric oxide (a vasodilator). What effect would a vasodilator have? If stimulation is sufficient, vestibular glands secrete mucus into the vagina....
Hier erzählt Opa in NMM über den Ehgraben im Mittelalter. Oma ist aus der welschen Schweiz und parliert mit uns französisch! Da wird für ein französisches Theaterstück geübt! Josha hat mit Opa ein einfaches Treibhaus gebastelt für die Pflanzen.
Our DNA is the blueprint of who we are. Not only can it predict basic physical traits such as height and weight, it can also tell us about our ancestry, about our propensity to develop disease and even information about...
Ready to download the document? Go ahead and hit continue!