SlideShare uma empresa Scribd logo
1 de 51
Nashville Technology Gurus Presents The Computer Need-to-Knows Seminar
Nashville Technology Gurus Intro and welcome Who I am? Why are you here?
What we’ll cover today… The basics of what you need to know about computers but no one tells you Shopping for and buying a computer Knowing your computer Maintaining your computer Keeping your computer secure
The couch vs. car principle The couch principle – many people like to think of buying a computer like buying a couch.  Once you buy a couch it’s always a couch.  You don’t upgrade it, you don’t have to worry about losing things on it in general unless they’re under the cushions (kind of like being somewhere else on the hard disk drive), it doesn’t get slower, it gets outdated only after about 10 years or so, you may have to clean it now and then but it’s basically always there functioning as a couch whenever you need to crash on it instead of it crashing on you.
The couch vs. car principle The computer principle– The computer is very much like having the responsibility of a car.  You have to go through the process of shopping for one, buying it with just the right options including a warranty, maintaining it, being careful with it even gentle, replacing parts eventually, and eventually deciding to keep it or replace it.  Also, backups of your files are like spare parts for your car especially when the ‘parts’ are important, hard to find, or expensive.
Buying a computer Buying and maintaining a computer is very much the same with your car Shop around with very little surety of what is best for you Coupons available through email, mail, and websites Websites listing promotions and deals www.slickdeals.net www.techbargains.com Holiday bargains are worth looking for 20-40% off typical with bundles Having a computer seller rep. will help get good deals especially for businesses
Buying a computer No interest APR often available for 12 months or more In-person vs. online (CompUSA/Costco vs. Dell/HP) You may want to get a literal feel for a new computer.  Going to a retail store or outlet may better for those who are more visual in what they’re looking for.  However, be wary of refurbished models, used computers, and computers selling for cheap but without essential software or a good warranty.
Buying a computer Online configuration and ordering is very easy now and often leads to deep discounts especially around big holidays or special promotions and also year-end models.  However, online ‘deals’ can have hidden after purchase costs like extended warranties from buying one that is too short, not getting enough memory or the right software.
Components of a desktop system Hardware Desktop system Case Power supply Adequate space for components Fans and good airflow Drive bays
Components of a desktop computer system USB The more the better 1.1 vs. 2.0 vs. 3.0 Firewire (400 – 800 Mb/s) CD/DVD drives (700 MB/4.7 GB) Media +R vs. –R +RW vs. –RW Single vs. double-layer Multiple Speed Blue-Ray (25GB)
Components of a desktop computer system Processor Intel AMD Speed Cache (or memory) Core Duo (2) Multiple or Quad Core
Components of a desktop computer system Memory Capacity (you never can have too much with any OS) Speed # of memory slots
Components of a desktop computer system Internal hard drives - bottle neck and most likely part to fail the soonest 1-6 per personal computer (depending on design of case) PATA (300 Mb/s) – old type SATA (1.5 Mb/s – 3.0 Mb/s) Capacity (20 GB – 1.5 TB) Speed (5400 rpm – 10,000 rpm)
Components of a desktop computer system Video card Built-in PCI card Memory Speed Analog vs. digital ports Dual ports Multiple video cards
Components of a desktop computer system Modem Speed (28kb/s – 128kb/s) Fax feature Network card Built-in wired (100Mb/s – 1Gb/s) Wireless PCI card or USB Monitor/display CRT LCD flat panel Plasma HD
Components of a portable computer system Portable Laptop types Standard Notepad Case Power supply Fans and good airflow USB 2-6 ports available normally 1.1 vs. 2.0 Firewire (400 – 800 Mb/s) CD/DVD drives (700 MB/4.7 GB) Media +R vs. –R +RW vs. –RW Single vs. double-layer Speed Blue-Ray (25 GB)
Components of a portable computer system Processor Intel AMD Speed Cache (or memory) Core duo
Components of a portable computer system Memory Capacity (you never can have too much memory with any OS) Speed # of memory slots
Components of a portable computer system Internal hard drives – currently a computer’s “bottle neck” and most likely part to fail the soonest Capacity (20 GB – 500 GB) Speed (5400 rpm – 7200 rpm)
Components of a portable computer system Video card Built-in Memory Speed Analog vs. digital secondary port
Components of a portable computer system Screen Resolution Brightness Size (12” – 17”) Modem Speed (28 kb/s – 128 kb/s) Fax feature
Components of a portable computer system Network card Built-in wired (100Mb – 1Gb) Wireless B, G, A and N PC card USB Built-in
Components of a portable computer system PC card slot vs. Express card slot Complete Care extra protection – well worth it; covers drops, spills, power surges, etc.
Components of a portable computer system PDA With phone Without phone iPhone Windows Mobile 6.x – 7.0 Blackberry Symbian Palm OS Droid (Android)
Components of a computer system Printer Laser Multi-function DeskJet
Components of a computer system Backup drive – if you don’t have one, you’ll wish you had at some point Internal – spare vs. redundant External Memory stick MS Synctoy data sync Bluetooth  Printers, keyboard, mouse PDAs, cell phones, headphones
Components of a computer system Hardware Support Warranty service Local service Warranty (think of it as insurance) Length of contract (90 days – 5 years) Provider of service (Dell, IBM, HP, GE) Type (Onsite vs. take in vs. send in) Support escalation
Components of a computer system Software Operating System Microsoft Windows 95/98/ME Windows NT4 Windows 2000 Windows XP Windows Vista Windows 7 Apple – Mac OS X  Linux (SuSE, Ubuntu, Red Hat)
Components of a computer system Software Applications Internet Browser IE (6 vs. 7/8) Security issues almost constantly Memory pig Very hard to uninstall Must be updated even though you don’t use it Firefox Tabs Plug-ins Themes Smaller memory footprint, stable,secure Safari (Mac OS X) Opera Google Chrome
Components of a computer system Software Applications MS Office 97 – XP – still exist around the world 2003 – dominant version in the U.S.A. Word Excel PowerPoint Publisher Access Outlook (see below) 2007 – new look; will render older files even previous versions somewhat changed and not necessarily for the better 2010 – more features (of course), 64-bit, Web 2.0
Components of a computer system Software Applications Outlook Same basic design as always Never been as stable as it should be Export *.pst file periodically MS Office database backup utility available for download Separate email, calendar, and contacts for backup purposes for restoration ease Auto PST backup upon exit option (free from MS)
Components of a computer system Software Applications Other email applications Eudora Mozilla Thunderbird Pegasus
Components of a computer system Software Applications MS Works (Office ‘lite’) – not recommended Plug-ins – Quicktime, Acrobat Reader, Flashplayer, Java OpenOffice (Windows, OS X, Linux) – has Word, PowerPoint, Publisher, and Access basic equivalents Google Apps, Google Sync Windows Live, Office Live, Office Sync
Security Anti-virus Threat analysis Zero-day Trojans Worms SARC (www.sarc.com) – info source Symantec McAfee Frequency of scans – at least monthly
Security Spyware Threat analysis Spyware Adware Dialers Hack tools Joke programs Remote access Hoaxes Trackware Others Anti-spyware software Webroot Spysweeper Spybot Ad-aware Windows Defender – HAH!
Security Email that can steal - examples Threat analysis (see email PDFs) Spam/Junk email Scams Bots Root kits If it’s too good to be true, it probably is Alternate web-based email address for sign-ups Complex passwords and IDs Anti-spam software Symantec McAfee
Security ID Theft Phishing Online – never send personal or account info through regular email (e.g. SS#, financial accounts #s, etc.) Phone calls – be suspicious of anyone asking for account, username, user ID or password info Contact your bank or credit card company immediately if you have replied to fraudulent email or by phone with sensitive information Pharming – redirecting online users from a legitimate website to a false one and collecting user info for identity and financial theft Online Predators (buddy lists, social networks)
Security Firewall Symantec Internet Security McAfee firewall Windows XP SP3, Windows Vista SP2, Windows 7 Privacy service Purpose – to house IDs and passwords securely Symantec McAfee Internet Security Suites Symantec McAfee
Security Operating System updates – be aware Windows Critical vs. recommended vs. optional/hardware IE, OE and OS patches are all connected Mac OS X Linux (SuSE, Red Hat/Fedora, Ubuntu) CERT email list (www.cert.org) Frequency to check for updates - monthly
Security Internet browser usage Secure transaction safety Close browser with after secure transactions such as purchases or on-line banking Logout of sites you’ve signed into before closing the browser Make sure there is an SSL (https://) link with secure transactions Look for the ‘padlock’ on the bottom of the browser Always download the latest version of your internet browsers whenever possible
Security OS need-to-knows Default access is administrator or equivalent (Windows and OS X) which gives total access to hardware and software – consider creating user only account to cut down on scripts, installing fluff software and others unnecessary that can harm a computer over time ‘Power-user’ can still have most of the same problems that come with admin Outlook Express is most vulnerable program on the planet – don’t use if you have email alternative To help stop spread of viruses, you need at least Windows 2000 and be using Outlook 2000 as opposed to Outlook Express Creating a profile for each user on a workstation can really help for simplification reasons for computer health Sync-toy available from MS for individual profiles
Computer Utilities Backup Registry Windows System Restore utility (built-in) – should be performed manually occasionally even though recovery points are supposed to be created automatically Regedit.exe export and store (for experts only) Disk Image Norton Ghost – multiple recovery points can be made and also while using computer; incremental backups available Files or Folders Manual – only for those who know where everything is MS Sync Toy Symantec IS 4 or 360 has built-in backup software
Computer Utilities Maintenance Defragmentation & Optimization (Diskeeper vs. Symantec built-in) File cleanup (e.g. Webroot Window Washer) Deletes temp files and other junk May need a ‘bleach’ feature to shred files Power Protect system hardware with UPS Available for desktop systems, laptops and servers
Purchasing software Know what you’re buying and from who Be aware of rebates and discounted bundles Educational, government, non-profit discounts ‘OEM’ usually OK – beware of non-USA origin Very cheap overseas software – most likely bootlegged and purchase may benefit terrorist groups, black market, or international mafias
Software support Computer manufacturer Limited time from purchase Extended time via purchase Software vendor Warranty service – at least 1 year, 3-4 years much better especially with ‘complete care’
Computer Physical Maintenance Laptop Keyboard Screen – water & cotton Desktop Screen Keyboard Mouse Case Dust problems Vacuum occasionally Avoid leaving case on carpet for extended periods Fans – replace fans when they burn out to avoid anything overheating (power supply fans usually require replacing the whole unit)
Internet connection Internet provider router Cable (6 Mb/s – 24 Mb/s) DSL (256 kb/s – 4.5 Mb/s) Satellite (2.5 Mb/s – 5.5 Mb/s) PC Card or My-Fi (384 kb/s – 1.5 Mb/s) 3G WiMax (1.5 Mb/s – 3.0 Mb/s) (e.g. Clearwire) Wireless router Types B (2.4 GHz, 150’ range, 11 Mb/s) G (2.4 GHz, 100’range, 54 Mb/s) A (5.0 GHz, 75’range, 54 Mb/s) N (2.4 GHz, 160’range, 200+ Mb/s) Frequency – changing from default channel to one higher or lower may help with 2.4 GHz broadcast or reception
Basic security for wireless routers Change admin password Rename default SSID Enable highest encryption WEP (or shared) WPA-PSK or WPA-PSK2 (best) Some wireless devices configuration come with a simple but secure “one button” setup with ‘key’ on bottom of router Disable broadcast of SSID Update firmware at least yearly Don’t assume public “hot spots” are secure Save login ID and password, SSID name, and passkey Consider MAC control Consider disabling DHCP for small networks Turn off wireless router when you know you won’t use it for long periods such as vacation
Wireless internet etiquette Is it illegal to use another’s wireless broadcast? ‘War-driving’ War-chalking – represented by )(  Peer-to-peer – unless you’re sure you need it disable it
Other Internet connections Dial-up (28 kb/s – 128 kb/s) PC/Express Card (450 kb/s – 1.5 Mb/s) PDA (500 kb/s – 1.5 Mb/s) on 3G
Closing Consulting and support available from Nashville Technology Gurus (NTG) Phone – (615) 852-6470 Email – nashtechgreen@gmail.com Website – www.nashtechgurus.com Future seminars Dates Subjects Email list Thank-you for coming!

Mais conteúdo relacionado

Mais procurados

How Does a Computer Work?
How Does a Computer Work?How Does a Computer Work?
How Does a Computer Work?Paula Perkovic
 
Basic computer concepts
Basic computer conceptsBasic computer concepts
Basic computer conceptsjhayish
 
Memory cards
Memory cardsMemory cards
Memory cardsGoa App
 
2.3 people and ict systems
2.3 people and ict systems2.3 people and ict systems
2.3 people and ict systemsmrmwood
 
Chapter 7 the ways-in_which_is_ict_is_used[1]
Chapter 7   the ways-in_which_is_ict_is_used[1]Chapter 7   the ways-in_which_is_ict_is_used[1]
Chapter 7 the ways-in_which_is_ict_is_used[1]Pratik Gupta
 
Java Software Solution Chapter 1: Computer Systems Chapter 1: Computer Systems
Java Software Solution Chapter 1:  Computer Systems Chapter 1:  Computer SystemsJava Software Solution Chapter 1:  Computer Systems Chapter 1:  Computer Systems
Java Software Solution Chapter 1: Computer Systems Chapter 1: Computer SystemsNirviVashishtha
 
Understanding Computers: Today and Tomorrow, 13th Edition Chapter 11 - E-Comm...
Understanding Computers: Today and Tomorrow, 13th Edition Chapter 11 - E-Comm...Understanding Computers: Today and Tomorrow, 13th Edition Chapter 11 - E-Comm...
Understanding Computers: Today and Tomorrow, 13th Edition Chapter 11 - E-Comm...yaminohime
 
Desktop, laptop, tablet or smartphone
Desktop, laptop, tablet or smartphoneDesktop, laptop, tablet or smartphone
Desktop, laptop, tablet or smartphoneDr. Jan Vanderpool
 
Prepare to use a personal computer
 Prepare to use a personal computer Prepare to use a personal computer
Prepare to use a personal computerlynettecallaghan
 
Computer and electronic shopping guide
Computer and electronic shopping guideComputer and electronic shopping guide
Computer and electronic shopping guideAldo Vasquez
 
Chapter 1 Introduction To Computers
Chapter 1 Introduction To ComputersChapter 1 Introduction To Computers
Chapter 1 Introduction To Computersnorzaini
 
Hospitality Information Systems
Hospitality Information SystemsHospitality Information Systems
Hospitality Information SystemsAnil Bilgihan
 
Chapter 6 effects of ict on society
Chapter 6   effects of ict on societyChapter 6   effects of ict on society
Chapter 6 effects of ict on societyPratik Gupta
 
Chapter 06 Inside Computers and Mobile Devices
Chapter 06 Inside Computers and Mobile DevicesChapter 06 Inside Computers and Mobile Devices
Chapter 06 Inside Computers and Mobile Devicesxtin101
 
Lesson1 What Is A Computer
Lesson1 What Is A ComputerLesson1 What Is A Computer
Lesson1 What Is A Computerguevarra_2000
 

Mais procurados (19)

How Does a Computer Work?
How Does a Computer Work?How Does a Computer Work?
How Does a Computer Work?
 
LS 6 Computers
LS 6 ComputersLS 6 Computers
LS 6 Computers
 
Computer Basics
Computer BasicsComputer Basics
Computer Basics
 
Basic computer concepts
Basic computer conceptsBasic computer concepts
Basic computer concepts
 
Memory cards
Memory cardsMemory cards
Memory cards
 
Computer Basics
Computer BasicsComputer Basics
Computer Basics
 
2.3 people and ict systems
2.3 people and ict systems2.3 people and ict systems
2.3 people and ict systems
 
Chapter 7 the ways-in_which_is_ict_is_used[1]
Chapter 7   the ways-in_which_is_ict_is_used[1]Chapter 7   the ways-in_which_is_ict_is_used[1]
Chapter 7 the ways-in_which_is_ict_is_used[1]
 
Java Software Solution Chapter 1: Computer Systems Chapter 1: Computer Systems
Java Software Solution Chapter 1:  Computer Systems Chapter 1:  Computer SystemsJava Software Solution Chapter 1:  Computer Systems Chapter 1:  Computer Systems
Java Software Solution Chapter 1: Computer Systems Chapter 1: Computer Systems
 
Understanding Computers: Today and Tomorrow, 13th Edition Chapter 11 - E-Comm...
Understanding Computers: Today and Tomorrow, 13th Edition Chapter 11 - E-Comm...Understanding Computers: Today and Tomorrow, 13th Edition Chapter 11 - E-Comm...
Understanding Computers: Today and Tomorrow, 13th Edition Chapter 11 - E-Comm...
 
Desktop, laptop, tablet or smartphone
Desktop, laptop, tablet or smartphoneDesktop, laptop, tablet or smartphone
Desktop, laptop, tablet or smartphone
 
Prepare to use a personal computer
 Prepare to use a personal computer Prepare to use a personal computer
Prepare to use a personal computer
 
Computer and electronic shopping guide
Computer and electronic shopping guideComputer and electronic shopping guide
Computer and electronic shopping guide
 
Lec#1 (1)
Lec#1 (1)Lec#1 (1)
Lec#1 (1)
 
Chapter 1 Introduction To Computers
Chapter 1 Introduction To ComputersChapter 1 Introduction To Computers
Chapter 1 Introduction To Computers
 
Hospitality Information Systems
Hospitality Information SystemsHospitality Information Systems
Hospitality Information Systems
 
Chapter 6 effects of ict on society
Chapter 6   effects of ict on societyChapter 6   effects of ict on society
Chapter 6 effects of ict on society
 
Chapter 06 Inside Computers and Mobile Devices
Chapter 06 Inside Computers and Mobile DevicesChapter 06 Inside Computers and Mobile Devices
Chapter 06 Inside Computers and Mobile Devices
 
Lesson1 What Is A Computer
Lesson1 What Is A ComputerLesson1 What Is A Computer
Lesson1 What Is A Computer
 

Destaque

Phone Systems Brisbane - 16 questions a 27 year telco veteran would ask befor...
Phone Systems Brisbane - 16 questions a 27 year telco veteran would ask befor...Phone Systems Brisbane - 16 questions a 27 year telco veteran would ask befor...
Phone Systems Brisbane - 16 questions a 27 year telco veteran would ask befor...Greg Eicke
 
Chá com Livros
Chá com LivrosChá com Livros
Chá com LivrosLucca
 
Gacetilla Municipal 18 De Junio
Gacetilla Municipal 18 De JunioGacetilla Municipal 18 De Junio
Gacetilla Municipal 18 De Junioguestd2e9a9
 
April 13 Elevating Narrative Writing through Poetry Workshop
April 13 Elevating Narrative Writing through Poetry WorkshopApril 13 Elevating Narrative Writing through Poetry Workshop
April 13 Elevating Narrative Writing through Poetry WorkshopLesley Roessing
 
IWON BUSINESS PRESENTATIONS - ENGLISH
IWON BUSINESS PRESENTATIONS - ENGLISHIWON BUSINESS PRESENTATIONS - ENGLISH
IWON BUSINESS PRESENTATIONS - ENGLISHVice-Dennis Villarosa
 
Presentación Advinci
Presentación AdvinciPresentación Advinci
Presentación AdvinciADVINCI
 
comunicado-MARIO SOLINAS
comunicado-MARIO SOLINAScomunicado-MARIO SOLINAS
comunicado-MARIO SOLINASRui Silva
 
ING BANK - SUCCESS STORY - VIDEO INTERVIEWING
ING BANK - SUCCESS STORY - VIDEO INTERVIEWINGING BANK - SUCCESS STORY - VIDEO INTERVIEWING
ING BANK - SUCCESS STORY - VIDEO INTERVIEWINGEASYRECRUE UK
 
Bring Back the Funny: Humor in the Library
Bring Back the Funny: Humor in the LibraryBring Back the Funny: Humor in the Library
Bring Back the Funny: Humor in the LibraryJennifer Koerber
 
Eltren de la vida gr-
Eltren de la vida    gr-Eltren de la vida    gr-
Eltren de la vida gr-casdepin
 
Brookings Pre-mitigation Plan
Brookings Pre-mitigation PlanBrookings Pre-mitigation Plan
Brookings Pre-mitigation PlanKyle Dalsted
 
Ferrovial Investors Presentation Jan Mar 2014 | Presentación Inversores Ene M...
Ferrovial Investors Presentation Jan Mar 2014 | Presentación Inversores Ene M...Ferrovial Investors Presentation Jan Mar 2014 | Presentación Inversores Ene M...
Ferrovial Investors Presentation Jan Mar 2014 | Presentación Inversores Ene M...Ferrovial
 
Appunti di diritto parlamentare
Appunti di diritto parlamentareAppunti di diritto parlamentare
Appunti di diritto parlamentareReti
 
Star forest at thrissur
Star forest at thrissurStar forest at thrissur
Star forest at thrissurVIDYASAGAR G
 
Gestionando empresas familiares[1]
Gestionando empresas familiares[1]Gestionando empresas familiares[1]
Gestionando empresas familiares[1]zuleimaizamar
 

Destaque (20)

Phone Systems Brisbane - 16 questions a 27 year telco veteran would ask befor...
Phone Systems Brisbane - 16 questions a 27 year telco veteran would ask befor...Phone Systems Brisbane - 16 questions a 27 year telco veteran would ask befor...
Phone Systems Brisbane - 16 questions a 27 year telco veteran would ask befor...
 
Chá com Livros
Chá com LivrosChá com Livros
Chá com Livros
 
Gacetilla Municipal 18 De Junio
Gacetilla Municipal 18 De JunioGacetilla Municipal 18 De Junio
Gacetilla Municipal 18 De Junio
 
April 13 Elevating Narrative Writing through Poetry Workshop
April 13 Elevating Narrative Writing through Poetry WorkshopApril 13 Elevating Narrative Writing through Poetry Workshop
April 13 Elevating Narrative Writing through Poetry Workshop
 
IWON BUSINESS PRESENTATIONS - ENGLISH
IWON BUSINESS PRESENTATIONS - ENGLISHIWON BUSINESS PRESENTATIONS - ENGLISH
IWON BUSINESS PRESENTATIONS - ENGLISH
 
Presentación Advinci
Presentación AdvinciPresentación Advinci
Presentación Advinci
 
Presentación Geobuzón
Presentación GeobuzónPresentación Geobuzón
Presentación Geobuzón
 
Lo que me anima
Lo que me animaLo que me anima
Lo que me anima
 
comunicado-MARIO SOLINAS
comunicado-MARIO SOLINAScomunicado-MARIO SOLINAS
comunicado-MARIO SOLINAS
 
ING BANK - SUCCESS STORY - VIDEO INTERVIEWING
ING BANK - SUCCESS STORY - VIDEO INTERVIEWINGING BANK - SUCCESS STORY - VIDEO INTERVIEWING
ING BANK - SUCCESS STORY - VIDEO INTERVIEWING
 
Bring Back the Funny: Humor in the Library
Bring Back the Funny: Humor in the LibraryBring Back the Funny: Humor in the Library
Bring Back the Funny: Humor in the Library
 
Eltren de la vida gr-
Eltren de la vida    gr-Eltren de la vida    gr-
Eltren de la vida gr-
 
Brookings Pre-mitigation Plan
Brookings Pre-mitigation PlanBrookings Pre-mitigation Plan
Brookings Pre-mitigation Plan
 
Informe voip
Informe voipInforme voip
Informe voip
 
Ferrovial Investors Presentation Jan Mar 2014 | Presentación Inversores Ene M...
Ferrovial Investors Presentation Jan Mar 2014 | Presentación Inversores Ene M...Ferrovial Investors Presentation Jan Mar 2014 | Presentación Inversores Ene M...
Ferrovial Investors Presentation Jan Mar 2014 | Presentación Inversores Ene M...
 
Appunti di diritto parlamentare
Appunti di diritto parlamentareAppunti di diritto parlamentare
Appunti di diritto parlamentare
 
Lg47la6200 manual
Lg47la6200 manualLg47la6200 manual
Lg47la6200 manual
 
Star forest at thrissur
Star forest at thrissurStar forest at thrissur
Star forest at thrissur
 
Gestionando empresas familiares[1]
Gestionando empresas familiares[1]Gestionando empresas familiares[1]
Gestionando empresas familiares[1]
 
Cindy
CindyCindy
Cindy
 

Semelhante a NTG computer basics seminar

Semelhante a NTG computer basics seminar (20)

Computer basics
Computer basicsComputer basics
Computer basics
 
Wk 2 - computers
Wk 2 - computersWk 2 - computers
Wk 2 - computers
 
Computer basics--computer basics2
Computer basics--computer basics2Computer basics--computer basics2
Computer basics--computer basics2
 
Buying Your Next Computer
Buying Your Next ComputerBuying Your Next Computer
Buying Your Next Computer
 
Tech Essentials July 2008
Tech Essentials July 2008Tech Essentials July 2008
Tech Essentials July 2008
 
Computer basics--computer basics2
Computer basics--computer basics2Computer basics--computer basics2
Computer basics--computer basics2
 
Technology Update: The More Things Change, the More Fun It Gets
Technology Update: The More Things Change, the More Fun It GetsTechnology Update: The More Things Change, the More Fun It Gets
Technology Update: The More Things Change, the More Fun It Gets
 
Tech Essentials October 2008
Tech Essentials October 2008Tech Essentials October 2008
Tech Essentials October 2008
 
General Information About Information Technologies
General Information About Information TechnologiesGeneral Information About Information Technologies
General Information About Information Technologies
 
Computer basics
Computer basicsComputer basics
Computer basics
 
Icdl Medual 1
Icdl Medual 1Icdl Medual 1
Icdl Medual 1
 
Network
NetworkNetwork
Network
 
Hardware
HardwareHardware
Hardware
 
Hardware and Software Basics With Dr. Poirot
Hardware and Software Basics With Dr. PoirotHardware and Software Basics With Dr. Poirot
Hardware and Software Basics With Dr. Poirot
 
Hwswb
HwswbHwswb
Hwswb
 
Cat info mgt
Cat info mgtCat info mgt
Cat info mgt
 
GCSE ICT Revision
GCSE ICT RevisionGCSE ICT Revision
GCSE ICT Revision
 
BASIC COMPUTER ELEMENTS.pptx
BASIC COMPUTER ELEMENTS.pptxBASIC COMPUTER ELEMENTS.pptx
BASIC COMPUTER ELEMENTS.pptx
 
Basic computer
Basic computerBasic computer
Basic computer
 
Basic computer
Basic computerBasic computer
Basic computer
 

Último

From Family Reminiscence to Scholarly Archive .
From Family Reminiscence to Scholarly Archive .From Family Reminiscence to Scholarly Archive .
From Family Reminiscence to Scholarly Archive .Alan Dix
 
Connect Wave/ connectwave Pitch Deck Presentation
Connect Wave/ connectwave Pitch Deck PresentationConnect Wave/ connectwave Pitch Deck Presentation
Connect Wave/ connectwave Pitch Deck PresentationSlibray Presentation
 
DSPy a system for AI to Write Prompts and Do Fine Tuning
DSPy a system for AI to Write Prompts and Do Fine TuningDSPy a system for AI to Write Prompts and Do Fine Tuning
DSPy a system for AI to Write Prompts and Do Fine TuningLars Bell
 
DevEX - reference for building teams, processes, and platforms
DevEX - reference for building teams, processes, and platformsDevEX - reference for building teams, processes, and platforms
DevEX - reference for building teams, processes, and platformsSergiu Bodiu
 
The Ultimate Guide to Choosing WordPress Pros and Cons
The Ultimate Guide to Choosing WordPress Pros and ConsThe Ultimate Guide to Choosing WordPress Pros and Cons
The Ultimate Guide to Choosing WordPress Pros and ConsPixlogix Infotech
 
Hyperautomation and AI/ML: A Strategy for Digital Transformation Success.pdf
Hyperautomation and AI/ML: A Strategy for Digital Transformation Success.pdfHyperautomation and AI/ML: A Strategy for Digital Transformation Success.pdf
Hyperautomation and AI/ML: A Strategy for Digital Transformation Success.pdfPrecisely
 
Search Engine Optimization SEO PDF for 2024.pdf
Search Engine Optimization SEO PDF for 2024.pdfSearch Engine Optimization SEO PDF for 2024.pdf
Search Engine Optimization SEO PDF for 2024.pdfRankYa
 
Scanning the Internet for External Cloud Exposures via SSL Certs
Scanning the Internet for External Cloud Exposures via SSL CertsScanning the Internet for External Cloud Exposures via SSL Certs
Scanning the Internet for External Cloud Exposures via SSL CertsRizwan Syed
 
Story boards and shot lists for my a level piece
Story boards and shot lists for my a level pieceStory boards and shot lists for my a level piece
Story boards and shot lists for my a level piececharlottematthew16
 
How to write a Business Continuity Plan
How to write a Business Continuity PlanHow to write a Business Continuity Plan
How to write a Business Continuity PlanDatabarracks
 
Unraveling Multimodality with Large Language Models.pdf
Unraveling Multimodality with Large Language Models.pdfUnraveling Multimodality with Large Language Models.pdf
Unraveling Multimodality with Large Language Models.pdfAlex Barbosa Coqueiro
 
Streamlining Python Development: A Guide to a Modern Project Setup
Streamlining Python Development: A Guide to a Modern Project SetupStreamlining Python Development: A Guide to a Modern Project Setup
Streamlining Python Development: A Guide to a Modern Project SetupFlorian Wilhelm
 
H2O.ai CEO/Founder: Sri Ambati Keynote at Wells Fargo Day
H2O.ai CEO/Founder: Sri Ambati Keynote at Wells Fargo DayH2O.ai CEO/Founder: Sri Ambati Keynote at Wells Fargo Day
H2O.ai CEO/Founder: Sri Ambati Keynote at Wells Fargo DaySri Ambati
 
WordPress Websites for Engineers: Elevate Your Brand
WordPress Websites for Engineers: Elevate Your BrandWordPress Websites for Engineers: Elevate Your Brand
WordPress Websites for Engineers: Elevate Your Brandgvaughan
 
Are Multi-Cloud and Serverless Good or Bad?
Are Multi-Cloud and Serverless Good or Bad?Are Multi-Cloud and Serverless Good or Bad?
Are Multi-Cloud and Serverless Good or Bad?Mattias Andersson
 
CloudStudio User manual (basic edition):
CloudStudio User manual (basic edition):CloudStudio User manual (basic edition):
CloudStudio User manual (basic edition):comworks
 
Vertex AI Gemini Prompt Engineering Tips
Vertex AI Gemini Prompt Engineering TipsVertex AI Gemini Prompt Engineering Tips
Vertex AI Gemini Prompt Engineering TipsMiki Katsuragi
 
Powerpoint exploring the locations used in television show Time Clash
Powerpoint exploring the locations used in television show Time ClashPowerpoint exploring the locations used in television show Time Clash
Powerpoint exploring the locations used in television show Time Clashcharlottematthew16
 
What's New in Teams Calling, Meetings and Devices March 2024
What's New in Teams Calling, Meetings and Devices March 2024What's New in Teams Calling, Meetings and Devices March 2024
What's New in Teams Calling, Meetings and Devices March 2024Stephanie Beckett
 

Último (20)

From Family Reminiscence to Scholarly Archive .
From Family Reminiscence to Scholarly Archive .From Family Reminiscence to Scholarly Archive .
From Family Reminiscence to Scholarly Archive .
 
Connect Wave/ connectwave Pitch Deck Presentation
Connect Wave/ connectwave Pitch Deck PresentationConnect Wave/ connectwave Pitch Deck Presentation
Connect Wave/ connectwave Pitch Deck Presentation
 
DSPy a system for AI to Write Prompts and Do Fine Tuning
DSPy a system for AI to Write Prompts and Do Fine TuningDSPy a system for AI to Write Prompts and Do Fine Tuning
DSPy a system for AI to Write Prompts and Do Fine Tuning
 
DevEX - reference for building teams, processes, and platforms
DevEX - reference for building teams, processes, and platformsDevEX - reference for building teams, processes, and platforms
DevEX - reference for building teams, processes, and platforms
 
The Ultimate Guide to Choosing WordPress Pros and Cons
The Ultimate Guide to Choosing WordPress Pros and ConsThe Ultimate Guide to Choosing WordPress Pros and Cons
The Ultimate Guide to Choosing WordPress Pros and Cons
 
Hyperautomation and AI/ML: A Strategy for Digital Transformation Success.pdf
Hyperautomation and AI/ML: A Strategy for Digital Transformation Success.pdfHyperautomation and AI/ML: A Strategy for Digital Transformation Success.pdf
Hyperautomation and AI/ML: A Strategy for Digital Transformation Success.pdf
 
Search Engine Optimization SEO PDF for 2024.pdf
Search Engine Optimization SEO PDF for 2024.pdfSearch Engine Optimization SEO PDF for 2024.pdf
Search Engine Optimization SEO PDF for 2024.pdf
 
Scanning the Internet for External Cloud Exposures via SSL Certs
Scanning the Internet for External Cloud Exposures via SSL CertsScanning the Internet for External Cloud Exposures via SSL Certs
Scanning the Internet for External Cloud Exposures via SSL Certs
 
Story boards and shot lists for my a level piece
Story boards and shot lists for my a level pieceStory boards and shot lists for my a level piece
Story boards and shot lists for my a level piece
 
How to write a Business Continuity Plan
How to write a Business Continuity PlanHow to write a Business Continuity Plan
How to write a Business Continuity Plan
 
Unraveling Multimodality with Large Language Models.pdf
Unraveling Multimodality with Large Language Models.pdfUnraveling Multimodality with Large Language Models.pdf
Unraveling Multimodality with Large Language Models.pdf
 
Streamlining Python Development: A Guide to a Modern Project Setup
Streamlining Python Development: A Guide to a Modern Project SetupStreamlining Python Development: A Guide to a Modern Project Setup
Streamlining Python Development: A Guide to a Modern Project Setup
 
H2O.ai CEO/Founder: Sri Ambati Keynote at Wells Fargo Day
H2O.ai CEO/Founder: Sri Ambati Keynote at Wells Fargo DayH2O.ai CEO/Founder: Sri Ambati Keynote at Wells Fargo Day
H2O.ai CEO/Founder: Sri Ambati Keynote at Wells Fargo Day
 
WordPress Websites for Engineers: Elevate Your Brand
WordPress Websites for Engineers: Elevate Your BrandWordPress Websites for Engineers: Elevate Your Brand
WordPress Websites for Engineers: Elevate Your Brand
 
Are Multi-Cloud and Serverless Good or Bad?
Are Multi-Cloud and Serverless Good or Bad?Are Multi-Cloud and Serverless Good or Bad?
Are Multi-Cloud and Serverless Good or Bad?
 
CloudStudio User manual (basic edition):
CloudStudio User manual (basic edition):CloudStudio User manual (basic edition):
CloudStudio User manual (basic edition):
 
Vertex AI Gemini Prompt Engineering Tips
Vertex AI Gemini Prompt Engineering TipsVertex AI Gemini Prompt Engineering Tips
Vertex AI Gemini Prompt Engineering Tips
 
Powerpoint exploring the locations used in television show Time Clash
Powerpoint exploring the locations used in television show Time ClashPowerpoint exploring the locations used in television show Time Clash
Powerpoint exploring the locations used in television show Time Clash
 
DMCC Future of Trade Web3 - Special Edition
DMCC Future of Trade Web3 - Special EditionDMCC Future of Trade Web3 - Special Edition
DMCC Future of Trade Web3 - Special Edition
 
What's New in Teams Calling, Meetings and Devices March 2024
What's New in Teams Calling, Meetings and Devices March 2024What's New in Teams Calling, Meetings and Devices March 2024
What's New in Teams Calling, Meetings and Devices March 2024
 

NTG computer basics seminar

  • 1. Nashville Technology Gurus Presents The Computer Need-to-Knows Seminar
  • 2. Nashville Technology Gurus Intro and welcome Who I am? Why are you here?
  • 3. What we’ll cover today… The basics of what you need to know about computers but no one tells you Shopping for and buying a computer Knowing your computer Maintaining your computer Keeping your computer secure
  • 4. The couch vs. car principle The couch principle – many people like to think of buying a computer like buying a couch. Once you buy a couch it’s always a couch. You don’t upgrade it, you don’t have to worry about losing things on it in general unless they’re under the cushions (kind of like being somewhere else on the hard disk drive), it doesn’t get slower, it gets outdated only after about 10 years or so, you may have to clean it now and then but it’s basically always there functioning as a couch whenever you need to crash on it instead of it crashing on you.
  • 5. The couch vs. car principle The computer principle– The computer is very much like having the responsibility of a car. You have to go through the process of shopping for one, buying it with just the right options including a warranty, maintaining it, being careful with it even gentle, replacing parts eventually, and eventually deciding to keep it or replace it. Also, backups of your files are like spare parts for your car especially when the ‘parts’ are important, hard to find, or expensive.
  • 6. Buying a computer Buying and maintaining a computer is very much the same with your car Shop around with very little surety of what is best for you Coupons available through email, mail, and websites Websites listing promotions and deals www.slickdeals.net www.techbargains.com Holiday bargains are worth looking for 20-40% off typical with bundles Having a computer seller rep. will help get good deals especially for businesses
  • 7. Buying a computer No interest APR often available for 12 months or more In-person vs. online (CompUSA/Costco vs. Dell/HP) You may want to get a literal feel for a new computer. Going to a retail store or outlet may better for those who are more visual in what they’re looking for. However, be wary of refurbished models, used computers, and computers selling for cheap but without essential software or a good warranty.
  • 8. Buying a computer Online configuration and ordering is very easy now and often leads to deep discounts especially around big holidays or special promotions and also year-end models. However, online ‘deals’ can have hidden after purchase costs like extended warranties from buying one that is too short, not getting enough memory or the right software.
  • 9. Components of a desktop system Hardware Desktop system Case Power supply Adequate space for components Fans and good airflow Drive bays
  • 10. Components of a desktop computer system USB The more the better 1.1 vs. 2.0 vs. 3.0 Firewire (400 – 800 Mb/s) CD/DVD drives (700 MB/4.7 GB) Media +R vs. –R +RW vs. –RW Single vs. double-layer Multiple Speed Blue-Ray (25GB)
  • 11. Components of a desktop computer system Processor Intel AMD Speed Cache (or memory) Core Duo (2) Multiple or Quad Core
  • 12. Components of a desktop computer system Memory Capacity (you never can have too much with any OS) Speed # of memory slots
  • 13. Components of a desktop computer system Internal hard drives - bottle neck and most likely part to fail the soonest 1-6 per personal computer (depending on design of case) PATA (300 Mb/s) – old type SATA (1.5 Mb/s – 3.0 Mb/s) Capacity (20 GB – 1.5 TB) Speed (5400 rpm – 10,000 rpm)
  • 14. Components of a desktop computer system Video card Built-in PCI card Memory Speed Analog vs. digital ports Dual ports Multiple video cards
  • 15. Components of a desktop computer system Modem Speed (28kb/s – 128kb/s) Fax feature Network card Built-in wired (100Mb/s – 1Gb/s) Wireless PCI card or USB Monitor/display CRT LCD flat panel Plasma HD
  • 16. Components of a portable computer system Portable Laptop types Standard Notepad Case Power supply Fans and good airflow USB 2-6 ports available normally 1.1 vs. 2.0 Firewire (400 – 800 Mb/s) CD/DVD drives (700 MB/4.7 GB) Media +R vs. –R +RW vs. –RW Single vs. double-layer Speed Blue-Ray (25 GB)
  • 17. Components of a portable computer system Processor Intel AMD Speed Cache (or memory) Core duo
  • 18. Components of a portable computer system Memory Capacity (you never can have too much memory with any OS) Speed # of memory slots
  • 19. Components of a portable computer system Internal hard drives – currently a computer’s “bottle neck” and most likely part to fail the soonest Capacity (20 GB – 500 GB) Speed (5400 rpm – 7200 rpm)
  • 20. Components of a portable computer system Video card Built-in Memory Speed Analog vs. digital secondary port
  • 21. Components of a portable computer system Screen Resolution Brightness Size (12” – 17”) Modem Speed (28 kb/s – 128 kb/s) Fax feature
  • 22. Components of a portable computer system Network card Built-in wired (100Mb – 1Gb) Wireless B, G, A and N PC card USB Built-in
  • 23. Components of a portable computer system PC card slot vs. Express card slot Complete Care extra protection – well worth it; covers drops, spills, power surges, etc.
  • 24. Components of a portable computer system PDA With phone Without phone iPhone Windows Mobile 6.x – 7.0 Blackberry Symbian Palm OS Droid (Android)
  • 25. Components of a computer system Printer Laser Multi-function DeskJet
  • 26. Components of a computer system Backup drive – if you don’t have one, you’ll wish you had at some point Internal – spare vs. redundant External Memory stick MS Synctoy data sync Bluetooth Printers, keyboard, mouse PDAs, cell phones, headphones
  • 27. Components of a computer system Hardware Support Warranty service Local service Warranty (think of it as insurance) Length of contract (90 days – 5 years) Provider of service (Dell, IBM, HP, GE) Type (Onsite vs. take in vs. send in) Support escalation
  • 28. Components of a computer system Software Operating System Microsoft Windows 95/98/ME Windows NT4 Windows 2000 Windows XP Windows Vista Windows 7 Apple – Mac OS X Linux (SuSE, Ubuntu, Red Hat)
  • 29. Components of a computer system Software Applications Internet Browser IE (6 vs. 7/8) Security issues almost constantly Memory pig Very hard to uninstall Must be updated even though you don’t use it Firefox Tabs Plug-ins Themes Smaller memory footprint, stable,secure Safari (Mac OS X) Opera Google Chrome
  • 30. Components of a computer system Software Applications MS Office 97 – XP – still exist around the world 2003 – dominant version in the U.S.A. Word Excel PowerPoint Publisher Access Outlook (see below) 2007 – new look; will render older files even previous versions somewhat changed and not necessarily for the better 2010 – more features (of course), 64-bit, Web 2.0
  • 31. Components of a computer system Software Applications Outlook Same basic design as always Never been as stable as it should be Export *.pst file periodically MS Office database backup utility available for download Separate email, calendar, and contacts for backup purposes for restoration ease Auto PST backup upon exit option (free from MS)
  • 32. Components of a computer system Software Applications Other email applications Eudora Mozilla Thunderbird Pegasus
  • 33. Components of a computer system Software Applications MS Works (Office ‘lite’) – not recommended Plug-ins – Quicktime, Acrobat Reader, Flashplayer, Java OpenOffice (Windows, OS X, Linux) – has Word, PowerPoint, Publisher, and Access basic equivalents Google Apps, Google Sync Windows Live, Office Live, Office Sync
  • 34. Security Anti-virus Threat analysis Zero-day Trojans Worms SARC (www.sarc.com) – info source Symantec McAfee Frequency of scans – at least monthly
  • 35. Security Spyware Threat analysis Spyware Adware Dialers Hack tools Joke programs Remote access Hoaxes Trackware Others Anti-spyware software Webroot Spysweeper Spybot Ad-aware Windows Defender – HAH!
  • 36. Security Email that can steal - examples Threat analysis (see email PDFs) Spam/Junk email Scams Bots Root kits If it’s too good to be true, it probably is Alternate web-based email address for sign-ups Complex passwords and IDs Anti-spam software Symantec McAfee
  • 37. Security ID Theft Phishing Online – never send personal or account info through regular email (e.g. SS#, financial accounts #s, etc.) Phone calls – be suspicious of anyone asking for account, username, user ID or password info Contact your bank or credit card company immediately if you have replied to fraudulent email or by phone with sensitive information Pharming – redirecting online users from a legitimate website to a false one and collecting user info for identity and financial theft Online Predators (buddy lists, social networks)
  • 38. Security Firewall Symantec Internet Security McAfee firewall Windows XP SP3, Windows Vista SP2, Windows 7 Privacy service Purpose – to house IDs and passwords securely Symantec McAfee Internet Security Suites Symantec McAfee
  • 39. Security Operating System updates – be aware Windows Critical vs. recommended vs. optional/hardware IE, OE and OS patches are all connected Mac OS X Linux (SuSE, Red Hat/Fedora, Ubuntu) CERT email list (www.cert.org) Frequency to check for updates - monthly
  • 40. Security Internet browser usage Secure transaction safety Close browser with after secure transactions such as purchases or on-line banking Logout of sites you’ve signed into before closing the browser Make sure there is an SSL (https://) link with secure transactions Look for the ‘padlock’ on the bottom of the browser Always download the latest version of your internet browsers whenever possible
  • 41. Security OS need-to-knows Default access is administrator or equivalent (Windows and OS X) which gives total access to hardware and software – consider creating user only account to cut down on scripts, installing fluff software and others unnecessary that can harm a computer over time ‘Power-user’ can still have most of the same problems that come with admin Outlook Express is most vulnerable program on the planet – don’t use if you have email alternative To help stop spread of viruses, you need at least Windows 2000 and be using Outlook 2000 as opposed to Outlook Express Creating a profile for each user on a workstation can really help for simplification reasons for computer health Sync-toy available from MS for individual profiles
  • 42. Computer Utilities Backup Registry Windows System Restore utility (built-in) – should be performed manually occasionally even though recovery points are supposed to be created automatically Regedit.exe export and store (for experts only) Disk Image Norton Ghost – multiple recovery points can be made and also while using computer; incremental backups available Files or Folders Manual – only for those who know where everything is MS Sync Toy Symantec IS 4 or 360 has built-in backup software
  • 43. Computer Utilities Maintenance Defragmentation & Optimization (Diskeeper vs. Symantec built-in) File cleanup (e.g. Webroot Window Washer) Deletes temp files and other junk May need a ‘bleach’ feature to shred files Power Protect system hardware with UPS Available for desktop systems, laptops and servers
  • 44. Purchasing software Know what you’re buying and from who Be aware of rebates and discounted bundles Educational, government, non-profit discounts ‘OEM’ usually OK – beware of non-USA origin Very cheap overseas software – most likely bootlegged and purchase may benefit terrorist groups, black market, or international mafias
  • 45. Software support Computer manufacturer Limited time from purchase Extended time via purchase Software vendor Warranty service – at least 1 year, 3-4 years much better especially with ‘complete care’
  • 46. Computer Physical Maintenance Laptop Keyboard Screen – water & cotton Desktop Screen Keyboard Mouse Case Dust problems Vacuum occasionally Avoid leaving case on carpet for extended periods Fans – replace fans when they burn out to avoid anything overheating (power supply fans usually require replacing the whole unit)
  • 47. Internet connection Internet provider router Cable (6 Mb/s – 24 Mb/s) DSL (256 kb/s – 4.5 Mb/s) Satellite (2.5 Mb/s – 5.5 Mb/s) PC Card or My-Fi (384 kb/s – 1.5 Mb/s) 3G WiMax (1.5 Mb/s – 3.0 Mb/s) (e.g. Clearwire) Wireless router Types B (2.4 GHz, 150’ range, 11 Mb/s) G (2.4 GHz, 100’range, 54 Mb/s) A (5.0 GHz, 75’range, 54 Mb/s) N (2.4 GHz, 160’range, 200+ Mb/s) Frequency – changing from default channel to one higher or lower may help with 2.4 GHz broadcast or reception
  • 48. Basic security for wireless routers Change admin password Rename default SSID Enable highest encryption WEP (or shared) WPA-PSK or WPA-PSK2 (best) Some wireless devices configuration come with a simple but secure “one button” setup with ‘key’ on bottom of router Disable broadcast of SSID Update firmware at least yearly Don’t assume public “hot spots” are secure Save login ID and password, SSID name, and passkey Consider MAC control Consider disabling DHCP for small networks Turn off wireless router when you know you won’t use it for long periods such as vacation
  • 49. Wireless internet etiquette Is it illegal to use another’s wireless broadcast? ‘War-driving’ War-chalking – represented by )( Peer-to-peer – unless you’re sure you need it disable it
  • 50. Other Internet connections Dial-up (28 kb/s – 128 kb/s) PC/Express Card (450 kb/s – 1.5 Mb/s) PDA (500 kb/s – 1.5 Mb/s) on 3G
  • 51. Closing Consulting and support available from Nashville Technology Gurus (NTG) Phone – (615) 852-6470 Email – nashtechgreen@gmail.com Website – www.nashtechgurus.com Future seminars Dates Subjects Email list Thank-you for coming!