SlideShare uma empresa Scribd logo
1 de 42
Computing with
Confidence
DigiSeniors
Welcome!
Meet Ed
Oh my!
Steep Learning Curve
It’s a little
like learning
to use a cell
phone
Today’s goal: Confidence
•Learn the parts of a computer
•Set up, send and receive email
•Learn how to contact the Disability Answer
Desk
•Explore the internet
•Find the ? for help
Ready, set, go!
Windows
Settings
1.Type settings in
the search box.
2.Select Ease of
Access.
Shortcut:
Press Windows
Logo key + U to
quickly open Ease
of Access
• Start Magnifier and
Zoom in, press Windows
Logo key and + (plus
sign).
• Zoom out, press
Windows Logo key and
– (minus sign).
• Exit Magnifier, press
Windows Logo key +
Esc.
Magnifier Demo
Another Option
•Open Settings
•Select System
Change
the size
of text
Disability Answer Desk
Thank
you,
Anita!
Send a Thank-you email
1.Open email
2.Select new message
3.Open a browser
4.Type “funny computer meme” in the
search box
Choose something that makes
you laugh
1. Select an image
2. Right click the image
and choose copy
3. Go to the open email
4. Place your curser in the
body of the email, right
click, and choose paste
May
wants to
give it a
try
May loves
to cook
What
about
Internet
scams?
May
investigates
using the
internet
Criminals have a few contact methods:
1. Calling to alert you about an “infected PC”
2. Annoying pop-up windows
3. “Phishing” emails
They may try to take control of your PC, get
you to pay for fake tech support, steal
information, etc.
Popular Scams:
Tech Support Scam
Phishing:
Don’t take the bait
•Never reply to e-mail
messages that request
your personal information
•Don't click links in
suspicious e-mail
•Do business only with
companies that you know
and trust
Learn how to spot scams:
1. Suspicious email address
2. Generic salutations
3. Alarmist messages
4. Grammatical errors
5. Account verification
Signs of a Scam
Email Example
Email Example
Suspicious email address (email
address is not from @Microsoft)
Strange characters
Alarmist messages / Threats
Low-res images
Check the hyperlinks
• Hover over with the pointer to see the link
Grammatical errors
When in
doubt,
throw it out.
There is no difference
It’s good to have a
computer buddy!
Getting Started is Challenging
How would you teach a friend?
•Get online
•Set up, send and receive email
•Magnify the screen so that you can
read it more easily, if needed
•Contact the Disability Answer Desk
•+1 (800) 936-5900
What else do you want to find on
the internet?
•Here are some places to visit:
•News
•How to videos
•Online Shopping
Disability Answer Desk
Questions?
To learn more:
• Microsoft Digital Literacy Tools,
https://www.microsoft.com/en-us/digitalliteracy/overview.aspx
• Microsoft Accessibility, http://www.microsoft.com/accessibility
• Microsoft Disability Answer Desk,
http://aka.ms/accessibilitysupport
• GCF.org, http://www.gcflearnfree.org/
• Tech Boomers, https://techboomers.com/
• Chicago Public Library, https://chipublib.digitallearn.org/
Next Steps
•Learn to Skype:
https://support.office.com/en-
us/article/Get-started-with-Skype-for-
Business
Find a video on any topic:
https://www.youtube.com/
This is
going to
be fun!
Microsoft DigiSeniors Module: Computing with Confidence

Mais conteúdo relacionado

Semelhante a Microsoft DigiSeniors Module: Computing with Confidence

Creating a digital toolkit for users: How to teach our users how to limit the...
Creating a digital toolkit for users: How to teach our users how to limit the...Creating a digital toolkit for users: How to teach our users how to limit the...
Creating a digital toolkit for users: How to teach our users how to limit the...Justin Denton
 
Communication PPT.pptx
Communication PPT.pptxCommunication PPT.pptx
Communication PPT.pptxLyndaWillett
 
How to Recognize a Fake Email.pptx
How to Recognize a Fake Email.pptxHow to Recognize a Fake Email.pptx
How to Recognize a Fake Email.pptxSultan593473
 
Tech Training - Session 8
Tech Training - Session 8Tech Training - Session 8
Tech Training - Session 8William Mann
 
Online Safety Data Privacy and Email Basics Digital Literacy Fundamentals.pptx
Online Safety Data Privacy and Email Basics Digital Literacy Fundamentals.pptxOnline Safety Data Privacy and Email Basics Digital Literacy Fundamentals.pptx
Online Safety Data Privacy and Email Basics Digital Literacy Fundamentals.pptxExcellence Foundation for South Sudan
 
Internet Security
Internet SecurityInternet Security
Internet Securitymjelson
 
Social groups for awareness
Social groups for awarenessSocial groups for awareness
Social groups for awarenessKaran Veer Singh
 
Why Do Some People Fall for Phishing Scams and What Do I Do About it?
Why Do Some People Fall for Phishing Scams and What Do I Do About it?Why Do Some People Fall for Phishing Scams and What Do I Do About it?
Why Do Some People Fall for Phishing Scams and What Do I Do About it?Beth Sallay
 
Internet and Email 101 v1
Internet and Email 101 v1Internet and Email 101 v1
Internet and Email 101 v1Adam Ripsam
 
It security in healthcare
It security in healthcareIt security in healthcare
It security in healthcareNicholas Davis
 
Building Trust in the Digital Age
Building Trust in the Digital AgeBuilding Trust in the Digital Age
Building Trust in the Digital AgeMarian Merritt
 
Rayane hazimeh building trust in the digital age teenagers and students
Rayane hazimeh  building trust in the digital age teenagers and studentsRayane hazimeh  building trust in the digital age teenagers and students
Rayane hazimeh building trust in the digital age teenagers and studentsRayane Hazimeh
 
Rayane hazimeh building trust in the digital age teenagers and students
Rayane hazimeh  building trust in the digital age teenagers and studentsRayane hazimeh  building trust in the digital age teenagers and students
Rayane hazimeh building trust in the digital age teenagers and studentsRayane Hazimeh
 
increase your impact with e-newsletters
increase your impact with e-newslettersincrease your impact with e-newsletters
increase your impact with e-newsletterscathpadfield
 
phishing facts be aware and do not take the bait
phishing facts be aware and do not take the baitphishing facts be aware and do not take the bait
phishing facts be aware and do not take the baitssuser64f8f8
 
the best file here.ppt
the best file here.pptthe best file here.ppt
the best file here.pptssuser929d7c
 

Semelhante a Microsoft DigiSeniors Module: Computing with Confidence (20)

Creating a digital toolkit for users: How to teach our users how to limit the...
Creating a digital toolkit for users: How to teach our users how to limit the...Creating a digital toolkit for users: How to teach our users how to limit the...
Creating a digital toolkit for users: How to teach our users how to limit the...
 
Internet security
Internet securityInternet security
Internet security
 
Communication PPT.pptx
Communication PPT.pptxCommunication PPT.pptx
Communication PPT.pptx
 
How to Recognize a Fake Email.pptx
How to Recognize a Fake Email.pptxHow to Recognize a Fake Email.pptx
How to Recognize a Fake Email.pptx
 
Tech Training - Session 8
Tech Training - Session 8Tech Training - Session 8
Tech Training - Session 8
 
Online Safety Data Privacy and Email Basics Digital Literacy Fundamentals.pptx
Online Safety Data Privacy and Email Basics Digital Literacy Fundamentals.pptxOnline Safety Data Privacy and Email Basics Digital Literacy Fundamentals.pptx
Online Safety Data Privacy and Email Basics Digital Literacy Fundamentals.pptx
 
cyber safety.pdf
cyber safety.pdfcyber safety.pdf
cyber safety.pdf
 
Internet Security
Internet SecurityInternet Security
Internet Security
 
Social groups for awareness
Social groups for awarenessSocial groups for awareness
Social groups for awareness
 
Why Do Some People Fall for Phishing Scams and What Do I Do About it?
Why Do Some People Fall for Phishing Scams and What Do I Do About it?Why Do Some People Fall for Phishing Scams and What Do I Do About it?
Why Do Some People Fall for Phishing Scams and What Do I Do About it?
 
Internet and Email 101 v1
Internet and Email 101 v1Internet and Email 101 v1
Internet and Email 101 v1
 
It security in healthcare
It security in healthcareIt security in healthcare
It security in healthcare
 
Building Trust in the Digital Age
Building Trust in the Digital AgeBuilding Trust in the Digital Age
Building Trust in the Digital Age
 
Rayane hazimeh building trust in the digital age teenagers and students
Rayane hazimeh  building trust in the digital age teenagers and studentsRayane hazimeh  building trust in the digital age teenagers and students
Rayane hazimeh building trust in the digital age teenagers and students
 
Rayane hazimeh building trust in the digital age teenagers and students
Rayane hazimeh  building trust in the digital age teenagers and studentsRayane hazimeh  building trust in the digital age teenagers and students
Rayane hazimeh building trust in the digital age teenagers and students
 
Email newsletters
Email newslettersEmail newsletters
Email newsletters
 
increase your impact with e-newsletters
increase your impact with e-newslettersincrease your impact with e-newsletters
increase your impact with e-newsletters
 
phishing facts be aware and do not take the bait
phishing facts be aware and do not take the baitphishing facts be aware and do not take the bait
phishing facts be aware and do not take the bait
 
l1email.ppt
l1email.pptl1email.ppt
l1email.ppt
 
the best file here.ppt
the best file here.pptthe best file here.ppt
the best file here.ppt
 

Mais de Smart Chicago Collaborative

Inclusive Smart Cities - Net Inclusion 2017 Presentation
Inclusive Smart Cities - Net Inclusion 2017 PresentationInclusive Smart Cities - Net Inclusion 2017 Presentation
Inclusive Smart Cities - Net Inclusion 2017 PresentationSmart Chicago Collaborative
 
5.20.17 Community Technology Forum at Windsor Park Lutheran Evangelical Church
5.20.17 Community Technology Forum at Windsor Park Lutheran Evangelical Church5.20.17 Community Technology Forum at Windsor Park Lutheran Evangelical Church
5.20.17 Community Technology Forum at Windsor Park Lutheran Evangelical ChurchSmart Chicago Collaborative
 
Final Report for CUTGroup #28 - City of Chicago Open Data Portal Homepage
Final Report for CUTGroup #28 - City of Chicago Open Data Portal HomepageFinal Report for CUTGroup #28 - City of Chicago Open Data Portal Homepage
Final Report for CUTGroup #28 - City of Chicago Open Data Portal HomepageSmart Chicago Collaborative
 
Juvenile Expungement Presentation to The Chicago Community Trust
Juvenile Expungement Presentation to The Chicago Community TrustJuvenile Expungement Presentation to The Chicago Community Trust
Juvenile Expungement Presentation to The Chicago Community TrustSmart Chicago Collaborative
 
CUTGroup Detroit Slides for CUTGroup Collective Call
CUTGroup Detroit Slides for CUTGroup Collective CallCUTGroup Detroit Slides for CUTGroup Collective Call
CUTGroup Detroit Slides for CUTGroup Collective CallSmart Chicago Collaborative
 
Connect Chicago Digital Skills Road Map Working Group #1
Connect Chicago Digital Skills Road Map Working Group #1Connect Chicago Digital Skills Road Map Working Group #1
Connect Chicago Digital Skills Road Map Working Group #1Smart Chicago Collaborative
 
2016 Smart Chicago Collaborative Youth-Led Tech Instructors
2016 Smart Chicago Collaborative Youth-Led Tech Instructors2016 Smart Chicago Collaborative Youth-Led Tech Instructors
2016 Smart Chicago Collaborative Youth-Led Tech InstructorsSmart Chicago Collaborative
 

Mais de Smart Chicago Collaborative (20)

Chicago School of Data Book
Chicago School of Data BookChicago School of Data Book
Chicago School of Data Book
 
10/18/17 Array of Things Public Meeting Flyer
10/18/17 Array of Things Public Meeting Flyer10/18/17 Array of Things Public Meeting Flyer
10/18/17 Array of Things Public Meeting Flyer
 
DigiSeniors Curriculum - Leaders Guide
DigiSeniors Curriculum - Leaders GuideDigiSeniors Curriculum - Leaders Guide
DigiSeniors Curriculum - Leaders Guide
 
Inclusive Smart Cities - Net Inclusion 2017 Presentation
Inclusive Smart Cities - Net Inclusion 2017 PresentationInclusive Smart Cities - Net Inclusion 2017 Presentation
Inclusive Smart Cities - Net Inclusion 2017 Presentation
 
5.20.17 Community Technology Forum at Windsor Park Lutheran Evangelical Church
5.20.17 Community Technology Forum at Windsor Park Lutheran Evangelical Church5.20.17 Community Technology Forum at Windsor Park Lutheran Evangelical Church
5.20.17 Community Technology Forum at Windsor Park Lutheran Evangelical Church
 
Juvenile Expungement Help Desk Presentation
Juvenile Expungement Help Desk PresentationJuvenile Expungement Help Desk Presentation
Juvenile Expungement Help Desk Presentation
 
Quick facts about Juvenile Expungement
Quick facts about Juvenile ExpungementQuick facts about Juvenile Expungement
Quick facts about Juvenile Expungement
 
LAF Chicago Juvenile Expungement Clinics
LAF Chicago Juvenile Expungement ClinicsLAF Chicago Juvenile Expungement Clinics
LAF Chicago Juvenile Expungement Clinics
 
Juvenile Expungement Help Desk Flyer
Juvenile Expungement Help Desk FlyerJuvenile Expungement Help Desk Flyer
Juvenile Expungement Help Desk Flyer
 
Final Report for CUTGroup #28 - City of Chicago Open Data Portal Homepage
Final Report for CUTGroup #28 - City of Chicago Open Data Portal HomepageFinal Report for CUTGroup #28 - City of Chicago Open Data Portal Homepage
Final Report for CUTGroup #28 - City of Chicago Open Data Portal Homepage
 
Juvenile Expungement Presentation to The Chicago Community Trust
Juvenile Expungement Presentation to The Chicago Community TrustJuvenile Expungement Presentation to The Chicago Community Trust
Juvenile Expungement Presentation to The Chicago Community Trust
 
CUTGroup Detroit Slides for CUTGroup Collective Call
CUTGroup Detroit Slides for CUTGroup Collective CallCUTGroup Detroit Slides for CUTGroup Collective Call
CUTGroup Detroit Slides for CUTGroup Collective Call
 
Final Report for CUTGroup #24 - OpenGrid
Final Report for CUTGroup #24 - OpenGridFinal Report for CUTGroup #24 - OpenGrid
Final Report for CUTGroup #24 - OpenGrid
 
Connect Chicago Digital Skills Road Map Working Group #1
Connect Chicago Digital Skills Road Map Working Group #1Connect Chicago Digital Skills Road Map Working Group #1
Connect Chicago Digital Skills Road Map Working Group #1
 
2016 Smart Chicago Collaborative Youth-Led Tech Instructors
2016 Smart Chicago Collaborative Youth-Led Tech Instructors2016 Smart Chicago Collaborative Youth-Led Tech Instructors
2016 Smart Chicago Collaborative Youth-Led Tech Instructors
 
Interview template
Interview templateInterview template
Interview template
 
Component type
Component typeComponent type
Component type
 
App template
App templateApp template
App template
 
App inventor basics
App inventor basicsApp inventor basics
App inventor basics
 
Goal setting
Goal settingGoal setting
Goal setting
 

Último

Handwritten Text Recognition for manuscripts and early printed texts
Handwritten Text Recognition for manuscripts and early printed textsHandwritten Text Recognition for manuscripts and early printed texts
Handwritten Text Recognition for manuscripts and early printed textsMaria Levchenko
 
Finology Group – Insurtech Innovation Award 2024
Finology Group – Insurtech Innovation Award 2024Finology Group – Insurtech Innovation Award 2024
Finology Group – Insurtech Innovation Award 2024The Digital Insurer
 
Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...
Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...
Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...Drew Madelung
 
CNv6 Instructor Chapter 6 Quality of Service
CNv6 Instructor Chapter 6 Quality of ServiceCNv6 Instructor Chapter 6 Quality of Service
CNv6 Instructor Chapter 6 Quality of Servicegiselly40
 
Injustice - Developers Among Us (SciFiDevCon 2024)
Injustice - Developers Among Us (SciFiDevCon 2024)Injustice - Developers Among Us (SciFiDevCon 2024)
Injustice - Developers Among Us (SciFiDevCon 2024)Allon Mureinik
 
Histor y of HAM Radio presentation slide
Histor y of HAM Radio presentation slideHistor y of HAM Radio presentation slide
Histor y of HAM Radio presentation slidevu2urc
 
Enhancing Worker Digital Experience: A Hands-on Workshop for Partners
Enhancing Worker Digital Experience: A Hands-on Workshop for PartnersEnhancing Worker Digital Experience: A Hands-on Workshop for Partners
Enhancing Worker Digital Experience: A Hands-on Workshop for PartnersThousandEyes
 
How to convert PDF to text with Nanonets
How to convert PDF to text with NanonetsHow to convert PDF to text with Nanonets
How to convert PDF to text with Nanonetsnaman860154
 
IAC 2024 - IA Fast Track to Search Focused AI Solutions
IAC 2024 - IA Fast Track to Search Focused AI SolutionsIAC 2024 - IA Fast Track to Search Focused AI Solutions
IAC 2024 - IA Fast Track to Search Focused AI SolutionsEnterprise Knowledge
 
Transforming Data Streams with Kafka Connect: An Introduction to Single Messa...
Transforming Data Streams with Kafka Connect: An Introduction to Single Messa...Transforming Data Streams with Kafka Connect: An Introduction to Single Messa...
Transforming Data Streams with Kafka Connect: An Introduction to Single Messa...HostedbyConfluent
 
Transcript: #StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024
Transcript: #StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024Transcript: #StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024
Transcript: #StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024BookNet Canada
 
Raspberry Pi 5: Challenges and Solutions in Bringing up an OpenGL/Vulkan Driv...
Raspberry Pi 5: Challenges and Solutions in Bringing up an OpenGL/Vulkan Driv...Raspberry Pi 5: Challenges and Solutions in Bringing up an OpenGL/Vulkan Driv...
Raspberry Pi 5: Challenges and Solutions in Bringing up an OpenGL/Vulkan Driv...Igalia
 
Presentation on how to chat with PDF using ChatGPT code interpreter
Presentation on how to chat with PDF using ChatGPT code interpreterPresentation on how to chat with PDF using ChatGPT code interpreter
Presentation on how to chat with PDF using ChatGPT code interpreternaman860154
 
Tech-Forward - Achieving Business Readiness For Copilot in Microsoft 365
Tech-Forward - Achieving Business Readiness For Copilot in Microsoft 365Tech-Forward - Achieving Business Readiness For Copilot in Microsoft 365
Tech-Forward - Achieving Business Readiness For Copilot in Microsoft 3652toLead Limited
 
08448380779 Call Girls In Greater Kailash - I Women Seeking Men
08448380779 Call Girls In Greater Kailash - I Women Seeking Men08448380779 Call Girls In Greater Kailash - I Women Seeking Men
08448380779 Call Girls In Greater Kailash - I Women Seeking MenDelhi Call girls
 
Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...
Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...
Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...Miguel Araújo
 
Scaling API-first – The story of a global engineering organization
Scaling API-first – The story of a global engineering organizationScaling API-first – The story of a global engineering organization
Scaling API-first – The story of a global engineering organizationRadu Cotescu
 
SQL Database Design For Developers at php[tek] 2024
SQL Database Design For Developers at php[tek] 2024SQL Database Design For Developers at php[tek] 2024
SQL Database Design For Developers at php[tek] 2024Scott Keck-Warren
 
Neo4j - How KGs are shaping the future of Generative AI at AWS Summit London ...
Neo4j - How KGs are shaping the future of Generative AI at AWS Summit London ...Neo4j - How KGs are shaping the future of Generative AI at AWS Summit London ...
Neo4j - How KGs are shaping the future of Generative AI at AWS Summit London ...Neo4j
 
08448380779 Call Girls In Friends Colony Women Seeking Men
08448380779 Call Girls In Friends Colony Women Seeking Men08448380779 Call Girls In Friends Colony Women Seeking Men
08448380779 Call Girls In Friends Colony Women Seeking MenDelhi Call girls
 

Último (20)

Handwritten Text Recognition for manuscripts and early printed texts
Handwritten Text Recognition for manuscripts and early printed textsHandwritten Text Recognition for manuscripts and early printed texts
Handwritten Text Recognition for manuscripts and early printed texts
 
Finology Group – Insurtech Innovation Award 2024
Finology Group – Insurtech Innovation Award 2024Finology Group – Insurtech Innovation Award 2024
Finology Group – Insurtech Innovation Award 2024
 
Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...
Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...
Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...
 
CNv6 Instructor Chapter 6 Quality of Service
CNv6 Instructor Chapter 6 Quality of ServiceCNv6 Instructor Chapter 6 Quality of Service
CNv6 Instructor Chapter 6 Quality of Service
 
Injustice - Developers Among Us (SciFiDevCon 2024)
Injustice - Developers Among Us (SciFiDevCon 2024)Injustice - Developers Among Us (SciFiDevCon 2024)
Injustice - Developers Among Us (SciFiDevCon 2024)
 
Histor y of HAM Radio presentation slide
Histor y of HAM Radio presentation slideHistor y of HAM Radio presentation slide
Histor y of HAM Radio presentation slide
 
Enhancing Worker Digital Experience: A Hands-on Workshop for Partners
Enhancing Worker Digital Experience: A Hands-on Workshop for PartnersEnhancing Worker Digital Experience: A Hands-on Workshop for Partners
Enhancing Worker Digital Experience: A Hands-on Workshop for Partners
 
How to convert PDF to text with Nanonets
How to convert PDF to text with NanonetsHow to convert PDF to text with Nanonets
How to convert PDF to text with Nanonets
 
IAC 2024 - IA Fast Track to Search Focused AI Solutions
IAC 2024 - IA Fast Track to Search Focused AI SolutionsIAC 2024 - IA Fast Track to Search Focused AI Solutions
IAC 2024 - IA Fast Track to Search Focused AI Solutions
 
Transforming Data Streams with Kafka Connect: An Introduction to Single Messa...
Transforming Data Streams with Kafka Connect: An Introduction to Single Messa...Transforming Data Streams with Kafka Connect: An Introduction to Single Messa...
Transforming Data Streams with Kafka Connect: An Introduction to Single Messa...
 
Transcript: #StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024
Transcript: #StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024Transcript: #StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024
Transcript: #StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024
 
Raspberry Pi 5: Challenges and Solutions in Bringing up an OpenGL/Vulkan Driv...
Raspberry Pi 5: Challenges and Solutions in Bringing up an OpenGL/Vulkan Driv...Raspberry Pi 5: Challenges and Solutions in Bringing up an OpenGL/Vulkan Driv...
Raspberry Pi 5: Challenges and Solutions in Bringing up an OpenGL/Vulkan Driv...
 
Presentation on how to chat with PDF using ChatGPT code interpreter
Presentation on how to chat with PDF using ChatGPT code interpreterPresentation on how to chat with PDF using ChatGPT code interpreter
Presentation on how to chat with PDF using ChatGPT code interpreter
 
Tech-Forward - Achieving Business Readiness For Copilot in Microsoft 365
Tech-Forward - Achieving Business Readiness For Copilot in Microsoft 365Tech-Forward - Achieving Business Readiness For Copilot in Microsoft 365
Tech-Forward - Achieving Business Readiness For Copilot in Microsoft 365
 
08448380779 Call Girls In Greater Kailash - I Women Seeking Men
08448380779 Call Girls In Greater Kailash - I Women Seeking Men08448380779 Call Girls In Greater Kailash - I Women Seeking Men
08448380779 Call Girls In Greater Kailash - I Women Seeking Men
 
Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...
Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...
Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...
 
Scaling API-first – The story of a global engineering organization
Scaling API-first – The story of a global engineering organizationScaling API-first – The story of a global engineering organization
Scaling API-first – The story of a global engineering organization
 
SQL Database Design For Developers at php[tek] 2024
SQL Database Design For Developers at php[tek] 2024SQL Database Design For Developers at php[tek] 2024
SQL Database Design For Developers at php[tek] 2024
 
Neo4j - How KGs are shaping the future of Generative AI at AWS Summit London ...
Neo4j - How KGs are shaping the future of Generative AI at AWS Summit London ...Neo4j - How KGs are shaping the future of Generative AI at AWS Summit London ...
Neo4j - How KGs are shaping the future of Generative AI at AWS Summit London ...
 
08448380779 Call Girls In Friends Colony Women Seeking Men
08448380779 Call Girls In Friends Colony Women Seeking Men08448380779 Call Girls In Friends Colony Women Seeking Men
08448380779 Call Girls In Friends Colony Women Seeking Men
 

Microsoft DigiSeniors Module: Computing with Confidence

Notas do Editor

  1. Speaker Notes: Set a tone of welcome, get everyone seated, have them fill out nametags, etc. Instructions: Welcome each person as they enter the room, introduce yourself and ask them their name. If possible, have name tags for them to fill out, or table tents that they can write their name on. Later they will introduce themselves to the group.
  2. Speaker notes: Ed just got a present from his favorite niece, Anita. When he takes it out of the bag, he is excited to see a laptop computer. He’s honored by her generosity, even though he thinks it’s too much. But he has never had one before. Instructions: This is the opening of the story about Ed getting a laptop from his niece, Anita. With a light-hearted tone, ask people to call out the thoughts that might be going through Ed’s mind. Repeat what each person says and ask for a show of hands if others feel that way too when faced with new technology, or learning new things. Speaker notes: The truth of the matter is most of us are, or have been, very intimidated by learning new things. Electronic technology can be particularly daunting. It’s doesn’t come naturally to many of us, because we can’t see what makes it work.
  3. Speaker notes: Anita turns the laptop on and begins showing Ed how things work. She is moving quickly and Ed can’t follow everything she says, but she reassures him that it will get easier, just like it did with learning to use a cell phone. Instructions: Continue the story quickly and move on.
  4. Speaker notes: It’s true! Some things are more difficult to learn than others. What can make learning about computers difficult is that it has a steep learning curve. Luckily, the ascent to being competent doesn’t take long. Keep in mind that you have learned many things that frustrated you at first. What was something that you had a hard time learning and now is easy for you? If you need to, prompt them with ideas. What about learning to drive or ride a bike? Learning to bake a cake from scratch? Etc. Instructions: Starting here, and throughout the course, reinforce the idea that everyone gets frustrated with computers, even the most advanced users and young people. People who learn it, just keep trying different things until they find the things that work, and/or they ask other people how they do it.
  5. Speaker notes: For many of us, learning to use a cell phone or learning to drive a car had a steep learning curve. Luckily, you don’t need to know exactly what’s going on under the cover or under the hood to be a good driver. You can leave that to the experts. Instructions: This is the time for participant introductions: Pass out slips of paper or note cards. Ask the participants to briefly introduce themselves to the person next to them and tell them about their first experience using a cell phone or driving a car. Ask the participants to make notes about their partner’s name and the experience they remember. Then, ask each person to introduce their partner to the group.
  6. Speaker Notes: Ed likes thinking about when he got his first cell phone. It took him awhile to learn which keys to press and remember to charge it. He still has it and Anita teases him about it being old fashioned. She says that’s why she got him the laptop. So that he has the most modern equipment that he can customize to make it easier to use. So the plan today, is to get you up and running on a computer. Before you know it, you will have learned the basics. Then you can successfully use this amazing tool to keep in touch with your friends and family, explore what is available on the internet, and learn to use features that will improve your experience. Instructions: Customize what you say, by linking it to things that the participants (please use their names) called out about when they learned to use a cell phone or drive. This will help keep them engaged and valued.
  7. Speaker Notes: Our goal today is to help you be confident. By the end of the class, you should be able to do all the things on this list: Learn the parts of a computer Magnify the screen so that you can read it more easily Contact the Disability Answer Desk Explore the internet Set up, send and receive email Use built in Help, sometimes by finding the ? Sometimes by finding the lightbulb icon. “Tell me what you want to do“ Instructions: Go over the learning objectives stressing that while they learn to do these essentials, they will also learn that computers aren’t as “breakable” as they used to be. And that there is help available to them if they don’t remember how to do something that they learned today. Just like learning to drive a car, or learn a foreign language, getting comfortable on a computer takes practice. Ask what questions they have before you proceed. Wait a several seconds before proceeding to give them an opportunity to formulate a question. Keep the questions centered around what they will learn and logistics. For content questions, let them know they will be answered in a later section, or that it won’t be covered in this workshop.
  8. Speaker notes: Let’s get started. This is the symbol for power on most computers. It’s pretty much universal, (like putting a key in the ignition) although not always easy to find. Find it on your computer and push it. What do you see and hear happening? This might take a couple of minutes. Instructions: If they are in a library setting with computers all on, still have them locate the button. If possible, have them turn it off and on again.
  9. Speaker notes: Many of you know what these are called. Please call out what you see. Instructions: As people call out each one, describe them. Computer—Describe what devices are computers and which are called computers. For example, many things have computers in them, like phones, or other electronic devices, but generally laptops, tablets, and desktop computers are called computers. Mouse—Describe and demonstrate the 3 essential parts, left click, right click, and scroll wheel while you describe what they are used for. Encourage participants to experiment with them. Keyboard—This is the most common way to enter information. You can also get special keyboards, like those designed to keep your hands from getting too tired, or, cooler still, you can use your voice to do a lot of navigation. Monitor/screen—just like watching TV
  10. Speaker notes: Uh oh! Ed got online, but he is a little frustrated, because he can’t see the images and words clearly. It’s a little like going to a restaurant and trying to read a menu, when the type is ridiculously small. Some of us rely on reading glasses. Luckily, there is a built in magnifier in the Windows operating system. Have you ever gone to a restaurant and realize you can’t read the menu? Maybe you forgot your reading glasses, or the type is just ridiculously small. Instructions: This slide marks the beginning of the experiential learning where the participants will be working at their computers. It’s crucial, as you begin the hands-on work to be encouraging and patient. This is often when people will disengage, so pay close attention to what you see and intervene if someone seems lost or distant.
  11. Speaker notes: Lucky for Ed, there is a Windows Settings page. On it, there are all kinds of settings that you can customize to make your computer easier and more comfortable. We are going to spend some time here, so that you can become familiar with how change the settings. Instructions: For this exercise multi-slide exercise, you will share your desktop and show participants what you are doing as you direct them to follow your steps. Be sure to practice this ahead of time so that you can be smooth in your delivery. Identify the search bar and ask the group to type “settings” into the search box. Then, direct them to Ease of Access and ask them to select it. In Display, direct them to the magnifier.
  12. Speaker notes: When the Ease of Access opens, you can see “Magnifier” in the left column. Click on that word. Instructions: Demonstrate the actions and see if the participants are following. Walk around to help people, if need be. Or direct someone who has it figured out to help their neighbor.
  13. Speaker notes: After clicking the magnifier, you will see all these options for magnifying things on the screen. The one that most people find most useful is to turn the magnifier on. Another way to turn it on is to use a shortcut. Let’s try that way, too Instructions: Have them turn the magnifier on and off again. Have them go through the steps to use the keyboard shortcuts to start “Magnifier”.
  14. Speaker Notes: Now let’s just play around with it to see how it works. It takes a little getting used to, but it is a useful gadget. Instructions: Open the magnifier as they do, then describe what you are doing and how you are doing it. After a very brief tour, encourage the participants to play around with the magnifier. Ask them to share what they are finding out with the other people at their table. Ask them to close “Magnifier”. Direct them to reopen it by holding the windows key and selecting the + sign. Talk about how useful it is to learn keystrokes for the applications they will use often. Also demo using windows + and windows – to increase and decrease the magnification. Report out and ask questions about each of the following features to see who found it and what it is used for: Plus/minus symbols change the intensity of the magnification Percentage tells you how much you are magnified Views gives you different options of how to use the magnifier: full screen, lens, or docked Gear opens more settings that are free to be explored (invert colors, tracking, amount of zoom, etc.) Question mark icon gives you help. Point them to click here if they ever forget! See https://support.microsoft.com/en-us/help/11542/windows-use-magnifier for more information
  15. Speaker Notes: Most experienced computer users personalize their screen to make it easy and comfortable to use. The same personalization features can help if you are a person who has visual impairments. Let’s find a way that Ed can change his display permanently so that everything on the screen is easy to read, every time she logs on. Instructions: Continuing to share your screen, guide the students to “use these display settings”, as shown on the slide. Ask them to select it.
  16. Speaker Notes: Now this page opens and you can see the slider bar at the bottom. Instructions: Now, show them how to move the slider bar to increase the size of their font.
  17. Speaker notes: Ed loves this feature, but is a little worried that he’s not going to remember how to do it again. Not to worry, there is free customer support for everyone who needs it. You can call or chat with the Disability Answer Desk and they will kindly help you to get your computer set up to be optimal for you. These accessibility tools are a benefit for all of us. Instructions: Open a chat with the Disability Answer Desk. Tell who answers that you are showing a group how to use their service. Ask them to tell you the easiest way to turn up the volume on their speakers. Ask the participants to follow the instructions. Thank the Answer Desk helper and say good bye. Links and Numbers: - Visit the Disability Answer Desk for contact information or to talk to a representative. - Call the Disability Answer Desk: 1-800-936-5900 (United States only). - American Sign Language (by videophone): +1-503-427-1234 (United States only).
  18. Speaker notes: As Ed is thinking about new ways to communicate via the computer, he thinks it would be a fun way to thank Anita. How could he do that? Instructions: Ask participants to call out ways that Ed can use his computer to tell Anita thanks. When someone suggests email, tell them that is just what you planned on.
  19. Speaker Notes: The easiest way to send Anita a note online is by email. How many of you already have email set up on your computers? Instructions: As participants who have email set up to share their screen with someone who doesn’t have it set up. Share your screen and ask the participants to follow along on their computers. Open email Select new message Open a browser Type “funny computer meme” in the search box https://support.office.com/en-us/article/Create-read-and-respond-to-messages-in-Mail-for-Windows-10-8a301e64-10e2-46db-a03a-2e509e5ca93a?ui=en-US&rs=en-US&ad=US
  20. Speaker Notes: Some people think anything with a dog or cat on it is funny, so it’s almost always a good choice for a quick email. Instructions: Select an image. Right click the image and choose copy. Go to the open email. Place your curser in the body of the email, right click, and choose paste. Voila!
  21. Speaker notes: Right after Ed sent the email, he went out to go to the grocery store and ran into his neighbor May, who offered him something cool to drink on this hot day. He told her how much fun he is having with his new computer. May says she wants to give it a try and asked Ed to show her.
  22. Speaker Notes: May loves to cook, and watches all the cooking shows on TV. She and Ed decide to see what they can find on the internet that would be interesting for May. Let’s try it, too. Instructions: Ask the participants to follow as you: Project your screen. Ask the participants to call out something they’d like to know how to cook. What about a dressing for May’s salad? In the search box, type recipe for __________________ whatever gets called out. Click on one of the recipes that comes up in the search.
  23. Speaker Notes: One day when May’s grandson was showing her around his laptop, he talked a lot about internet scams. That worried May. For good reason. In fact, email and other internet scams are plentiful. They are a lot like regular mail or phone scams. Thinking of them that way will help you identify who to trust at your mailbox or house. Have you ever gotten mail that says you’ve won something? Or something that says you need help with a problem with the IRS? What kind of phone calls do you get that are confusing or worrisome? Instructions: Open a discussion about internet fraud. Set a tone of caution, but be careful about not making it sound too dangerous to be online. As you ask questions about what they see as fraud on the phone or in regular mail, give them a several seconds to start answering, and if no one speaks up, ask some probing questions.
  24. Speaker Notes: May’s grandson kept talking about phishing scams, which was very confusing. So May decided to use the internet to learn more about it. She searched for “fishing scams” and learned that it’s spelled phishing in computer-ease. She found a lot of useful information.
  25. Speaker Notes: May learned that there are several popular ways to get scammed online. Criminals have a few contact methods to be aware of. Let’s explore a few common types of phishing scams and how best to identify them.
  26. Speaker Notes: Phishing is the name of the most common internet scam. Phishing refers to when a con artist tries to lure you into entering your account and password information, so they can get into your account and steal. Instructions: Read over these four precautions and come up with your own way of talking about it. Consider making your own notes so that you don’t read the list, but are able to speak to it and maintain contact with the students. Here are the top four ways to prevent being taken advantage of: Never reply to e-mail messages that request your personal information     Be very suspicious of any e-mail message from a business or person who asks for your personal information — or one that sends you personal information and asks you to update or confirm it. Instead, use the phone number from one of your statements to call the business. Do not call a number listed in the e-mail message. Similarly, never volunteer any personal information to someone who places an unsolicited call to you. Don't click links in suspicious e-mail     Don't click a link in a suspicious message. The link might not be trustworthy. Instead, visit Web sites by typing their URL into your browser or by using your Favorites link. Do not copy and paste links from messages into your browser. Don't send personal information in regular e-mail messages     Regular e-mail messages are not encrypted and are like sending a post card. If you must use e-mail messages for personal transactions, use Outlook to digitally sign and encrypt messages by using S/MIME security. MSN, Microsoft Hotmail, Microsoft Outlook Express, Microsoft Office Outlook Web Access, Lotus Notes, Netscape, and Eudora all support S/MIME security. Do business only with companies that you know and trust     Use well-known, established companies with a reputation for quality service. A business Web site should always have a privacy statement that specifically states that the business won't pass your name and information to other people.
  27. Instructions: Describe and point out each of the warning signs that indicate the email might be a scam.
  28. Speaker Notes: May found many useful examples that showed her what to look for in an email from someone you don’t know. Instructions: This and the next slide go together. Briefly talk about this email that May received, but wait until the next to point out all the warning signs.
  29. Instructions: Go over each numbered point, briefly and describe why it’s a warning and what to do about it. Have a story ready to describe the first thing that you do when you see an suspicious email.
  30. Speaker notes: No one wants to be the victim of a con-artist. But some common sense precautions will go a long way to protect you. Instructions: Have a short discussion about ways that participants can identify if an email message is safe. Ask the participants to call what precautions they should take. Use the list below as a reference and add to the discussion those things the participants didn’t name. Fake e-mail messages     The message appears to be from a company that you do business with, warning you that they need to verify your account information, and if they don't get the information, your account will be suspended. A combination of auction fraud and phony escrow sites     This occurs when items are put up for sale at a legitimate online auction to lure you into making payments to a fake escrow site. Fake online sales transactions     A criminal offers to buy something from you and requests that he or she pay you an amount well over the price of the item the criminal is buying. In return, the criminal asks you to send him or her a check for the difference. The payment to you is not sent, but your check is cashed, and the thief keeps the difference. Additionally, the check that you send has your bank account number, bank routing code, address, and phone number, which the criminal can continue to use and get your money. Fake charities     This type of phishing scheme poses as a charity and asks for direct monetary donations. Unfortunately, many people want to take advantage of your generous nature. Fake Web sites     The Web sites can be made to look similar to legitimate sites. When you inadvertently visit them, the sites can automatically download malicious software, such as a virus or spyware. The spyware can then record the keystrokes that you use to log into personal online accounts. That information is sent back to the phisher. You can protect against this particular kind of attack by downloading and installing anti-spyware software, such as Microsoft anti-spyware software.
  31. Speaker Notes: Discuss how home security and internet security are similar. Protecting from burglars is no different than protecting from internet criminals. Instructions: To reinforce the analogy of home security and internet security being similar.
  32. Speaker notes May shared what she learned about security and privacy with Ed. Now, they email back and forth when they learn new things. Sometimes their local library has computer classes and they go together to learn more about this exciting new tool. They’ve still got a lot to learn, but it is getting easier over time. Do you have a computer buddy? Can you find one here?
  33. Speaker Notes: Some things are harder to learn than others. Everybody learns a little, then slips back, then learns some more. It’s natural. The steeper the learning curve the more frustrating it can be. But the rewards are great. When you are confident about using your computer and getting online, a lot of new worlds are at your fingertips. Instructions: After revisiting the idea of learning being difficult, conduct a question and answer period about how they see that using a computer can make their life easier or more fun.
  34. Speaker Notes: If you were going to introduce a friend to a computer, how would you do it? What have you learned about so far? Instructions: Ask the participants to partner up with the person closest to them. Using their preferred note-taking system, computer, paper, etc. ask them to make a list of what they have learned so far. Ask them to put a star next to whatever they liked the best. Put a check next to what they need help with or they weren’t interested in.
  35. Speaker Notes: The internet is so full of information and experiences, it can quickly become consuming or overwhelming. As you are learning to get around, decide which things you are most interested in learning about and play with those to gain experience. Instructions: Most things that are very complicated, like the Internet, are best learned in small chunks. Assure the participants that they don’t have to know how to do or find everything for the internet to be useful to them. They can shut it off whenever it becomes annoying or too confusing.
  36. Speaker notes: And don’t forget that you can always get your questions about how to make your computer easier to work with by calling the Disability Answer Desk. Links and Numbers: - Visit the Disability Answer Desk for contact information or to talk to a representative. - Call the Disability Answer Desk: 1-800-936-5900 (United States only). - American Sign Language (by videophone): +1-503-427-1234 (United States only).
  37. Speaker Notes: What questions do you have? Instructions: For a variety of reasons, people are often reluctant to ask questions, or be the first to ask a question. Here are 2 things you can do to help with that. - Assume they have questions and ask “What are your questions” rather than “Do you have questions. - After you’ve asked, silently count to ten. Although it can feel like an eternity, usually someone will ask after 5 or 6 seconds. Be patient as participants think and formulate their questions. Check the time and be sure that you have 2 or 3 minutes left when you end the Q and A period to get the last couple of slides in and a comfortable closing. Then tell the participants how long you will be taking questions. “We’ve got about ten minutes to answer your questions”.
  38. Speaker notes: Here are some other places to get help. First and foremost is the Disability Answer Desk. They are specially trained to help you make your computer applications work well for you. If you’d like to stay in touch with people from the class, to practice or share new ideas, sign up and we will email the list to everyone who wants it. Instructions: Pass around a sign-up sheet that has places for name, email address, and/or phone number. After class, send the list to the students who signed up.
  39. Speaker notes: Here are a couple more things you might want to check out as you get comfortable on a computer. Skyping is a fun way to keep in touch with your loved ones, talking and seeing them at the same time.
  40. Speaker notes: Now, when Ed goes to the library, he can show his friends what he has learned since getting his new laptop. He is looking forward to finding other computer classes to take and there are lots to choose from. He knows, because he searched for free computer classes on the internet. We are so glad to have you with us today and hope you enjoyed touring around your computers.
  41. Instructions: Thank everyone for coming. Shake hands, say good bye using names as people prepare to leave.