SlideShare ist ein Scribd-Unternehmen logo
1 von 34
Downloaden Sie, um offline zu lesen
Set-up Check List
1. Closer projection screen
2. Check for automatic updates
3. Disable extra protection software
4. Disable scans during presentation
5. Turn Off auto-defrag
6. Test Wi-Fi connection speed
7. Set out textbooks
8. Send around attendance sheet
9. Pass out evaluation forms
10. Setup webcam for re-take of class picture
                                                1
                                 ComputerTLC
WELCOME TO THE
VICKSBURG COMPUTER CLASS
         2009
 Beginner Series -7
           by
 Jim Froemke Instructor

  FINAL CLASS!                2
                ComputerTLC
Today’s Agenda
 Seventh (FINAL!) Weekly Beginner Class:
  1. Using the Vicksburg Class BLOG
  2. Questions from last week
  3. Chapter 10 (9)
   “E-mail, Your Electronic Mailbox”
   “Internet and E-mail for Seniors” text – 2 available
  4. Homework Assignments
  5. Class Feedback Survey
  6. Questions and Extra Help after Class
                                                     3
                                ComputerTLC
Using Internet Blogs
 Just left-click on these links:
  CLASS BLOG LINK
   Download Class Presentations

  Vicksburg Village Voice Blog Link
    Checking the latest village news

                                        4
                          ComputerTLC
Questions From Last Week
 How to Change Desktop Icon Sizes?
  Windows XP?
    Desktop Menu, Properties, Appearance,
     Effects, Check: Use large icons
  Windows VISTA?
    Desktop Menu, View, Select:
     Large/Medium or Classic Icons
    Click on an icon, press “Ctrl” key while you
     turn the mouse “Scroll” wheel
                                                5
                             ComputerTLC
Questions From Last Week
 How to Change Taskbar Icon Sizes?
 Windows XP:
  Right-click to view taskbar menu, properties,
  Start Menu, Customize, General select: Large
  icons, OK, Apply and reboot computer.
 Windows VISTA:
  Right-click to view taskbar menu, properties, Start
  Menu, Customize, scroll down to place a check in:
  Use large icons, OK, Apply and reboot computer.
                                                   6
                               ComputerTLC
Questions From Last Week
 What are Internet Search Engines?
  A way to have computers search the
   Internet indexes for your query.
  Open any Internet Browser
  Select an Internet Search Engine
    Google, Yahoo, Lycos, Ask.com, etc.
    Specialized Search Engines?
  Key in your question, press search and
  wait for your answers.                   7
                           ComputerTLC
8
ComputerTLC
New Material
Chapter 10 (9 )
“E-mail”
Why learn about this?
  So you can communicate
   with someone else!
                              9
                ComputerTLC
Early Snail-Mail Connections




                              10
                ComputerTLC
Early Wired Connections




                            11
              ComputerTLC
Green Communications




                          12
            ComputerTLC
Internet E-mail Q&As
 What is it? – The transfer of files
 over communications networks.
 What do I need? – An E-mail address
  and access to a computer with
  Internet access.
 What does E-mail cost? – NOTHING!
 What does Internet access cost?
    FREE or up to $60 per month         13
                       ComputerTLC
Internet Access Costs
 Portable FREE - Wireless Wi-Fi Access: Coffee
    shops, Restaurants, Motels, Airports, RV
    Campgrounds, etc.
   Portable FEE - Some Wireless Wi-Fi Access:
    Starbucks, McDonalds, etc.
   Mobile FEE – Cellular Broadband Access
   Fixed Dedicated FEE: DSL, Cable, etc. Access
   Fixed Shared FEE - Sharing a fixed dedicated
    connection with a neighborhood router access

                                              14
                             ComputerTLC
Basic E-mail Types
  Client Mail               Web Mail
 Messages and address  Messages and address
  book reside on your          book reside on an
  personal computer.           Internet server.
 Limited service             Full services available
  available from other         from any computer.
  computers.                  Usually FREE (advertising):
 Incl. w/Internet Access:      Google - Gmail
   Windstream, Juno,           Yahoo - Mail
    Roadrunner, AOL, etc.       MSN - Hotmail          15
                                  ComputerTLC
XP Outlook Express and VISTA
 Windows Mail Read Mail Example
 Chapter 10 (9); pages 254 (288)
 Open client e-mail application
 Manually enter User name and Password
   Not necessary of automatic
 Dial-up Internet connection
   Not necessary for continuously on broadband
    (Windstream, Roadrunner, etc.)
 Select (left-click) on Inbox
   Not necessary if Inbox is default
 Select and read new (or old) e-mail messages
                                                  16
                                   ComputerTLC
XP Outlook Express and VISTA
 Windows Mail Send Mail Example
 Chapter 10 (9); pages 254 (288)
 Open client e-mail application
 Manually enter User name and Password
   Not necessary of automatic
 Dial-up Internet connection
   Not necessary for continuously on broadband
    (Windstream, Roadrunner, etc.)
 Select (left-click) on Inbox
   Not necessary if Inbox is default
 Select and read new (or old) e-mail messages
                                                  17
                                   ComputerTLC
What Are All The Boxes For?
 Inbox – for New and read messages
 Outbox – for messages being sent
 Sent Item – for messages sent
 Deleted Items – discarded messages
 Draft – saved messages not sent
 Junk E-mail – *suspicious messages
 Archive – older saved messages
                                   18
                     ComputerTLC
Three Ways to Send a Message
 Click on “Send” message – normal way
   New message goes to whoever you address


 Click on “Respond” – while reading a message
   Previous message goes to message author


 Click on “Forward” – while reading a message
   Previous message goes to whoever you address


                                                   19
                              ComputerTLC
E-mail Elements
 To: primary recipient(s)

 CC: & BCC: additional recipient(s)

 Subject: topic of message

 Attachments: link to additional files

 Message: actual text of message

 Signature: your name, title, etc.
                                           20
                             ComputerTLC
VISTA E-mail
Windows XP                           Windows VISTA
 Outlook Express                     *Windows Mail

 Outlook                             *Outlook

 Web-mail                            Web-mail
 •Migration of messages, address book and settings
 required for Outlook Express and Outlook users
 •No migration required for Web Mail users
                            Produced by Jim Froemke
                                                                  21
                                                      3/18/2009
What’s New with VISTA’s
          Windows Mail?
 Preloaded (FREE) with VISTA
 Successor to Outlook Express
  Improved appearance
  Supported by Microsoft (sort of)
 Requires migration of your Outlook
 Express address book, mail and settings

                                                            22
                      Produced by Jim Froemke   3/18/2009
VISTA? E-mail Alternatives
 Outlook Express is history!
   Not supported by Microsoft!
   Doesn’t include spell checker (download)
   Replaced with “Windows Mail”
 Outlook will continue to run as long as you
  install Microsoft Office Suite
 You can continue to run your favorite Web-Mail
  in your browser unchanged
   Hotmail, G-mail, Yahoo mail, etc.
 VISTA versions of other client e-mails available:
   E.g., Juno, AOL, EarthLink, etc.
                                                       23
                             Produced by Jim Froemke
24
ComputerTLC
E-mail Attachments – 263 (298)
 Sending E-mail Attachments – 263 (298):
   Either “attach” the file from your e-mail or “Send
    To” Mail Recipient from the file menu
   Your ISP may limit the maximum size of any file
    attachment to < 10 MB.
   Limit file attachments to picture and documents.
 Receiving E-mail Attachments – 267 (303):
   NEVER open unknown e-mail attachments.
   Always save the attachment, scan it for infections
    and then if safe, open it.
   Turn OFF automatic display of picture attachments.
                                                         25
                                 ComputerTLC
What’s SPAM!
 SPAM is unsolicited, bulk e-mail.
 It’s often sent from your own or your
 neighbor’s hijacked computer.




                                     26
                       ComputerTLC
How to Minimize SPAM!
1. NEVER open an unsolicited e-mail. Delete it!
2. NEVER respond to a SPAM e-mail!
3. NEVER click on a hot-link within a SPAM e-mail!
4. Protect your “personal” e-mail address from
   discovery. If discovered, change it.
 1. Open a 2nd “throw-away” address for public use.
5. Chose a non-trivial e-mail address, for example:
  1. name.address@yourISP.com jim.430@gmail.com
6. Use an ISP who has a good SPAM filter (Gmail).
7. Protect your computer from infections!
                                                      27
                                ComputerTLC
What’s E-mail Phishing?
 When you give up personal
 information in response to an E-mail.




                                     28
                      ComputerTLC
Why Protect Your Computer?
 What’s wrong with this point of view?
   “I don’t need protection because I only use my
   computer for e-mail; not banking or credit cards.”

 You may be sending infections to everyone
 you send an e-mail to from your computer!

 Your computer can become a “Zombie” when
 hijacked into a network of SPAM servers.
   All SPAM is sent from vast networks of hijacked
   computers without the owners knowledge!
                                                      29
                                ComputerTLC
E-mail Etiquette
1. DON’T USE ALL CAPITALIZED LETTERS!
  1. Your message looks like you’re yelling at someone.

2. Minimize your use of punctuation!!!!!!!!!!!!!!!!!!

3. Use “plain text” for most emails. It’s safer.

4. Try not to forward “junk”.

5. Limit your use of “Reply to all”
  1. You generate unnecessary e-mail traffic.


                                                          30
                                  ComputerTLC
E-mail Etiquette
1. Limit attachments as they can clog up e-mail.

2. Use a spelling and if possible grammar checker.

3. Read your e-mail before you send it.

4. Save a tree (and ink); don’t print everything out!

5. Remember that most e-mail is not secure.




                                                   31
                               ComputerTLC
Homework Assignment

 Exercises from chapter 10 (9)
  Pages: 270-271 (306-307)

 Extra Credit: Appendices “A”
 “Playing Solitaire”
   Pages: 317-323 (375-381)
                                   32
                     ComputerTLC
FINAL Class Feedback
   Do you receive my class related e-mails? Yes____, No____ e-mail: ____________________
   Are you able to view the class blog on your computer? Yes____, No____
   Your computer experience level? Non-user____, Beginner____, Intermediate____
   Was the class material level: Too simple?____, About right?____, Too complex?____
   Did you understand the material today? Yes____, No____, Sometimes____
   Were you able to complete the previous homework assignments? Yes____, No____
   What topics could have been eliminated? ______________________________________
   What topics should have been included? _______________________________________
   Was this class series helpful to you? Yes____, Somewhat_____, No _____
   Would you recommend the beginner class series to your friends? Yes_____ , No______
   Suggestions for improvement? ______________________________________________
   Are you having computer problems and require a house call? Yes____, No____

       Name:___________________________________________, Phone: _________________________________

       Nature of problem: ________________________________________________________________________



                                                                                                      33
                                                                    ComputerTLC
Are there any Questions?




  Thanks for Your Attention!

                                  34
                    ComputerTLC

Weitere ähnliche Inhalte

Andere mochten auch

Groove Pitch Linked In
Groove Pitch Linked InGroove Pitch Linked In
Groove Pitch Linked InSean Dunn
 
Beginner Series 5 2009 Final
Beginner Series  5 2009 FinalBeginner Series  5 2009 Final
Beginner Series 5 2009 FinalFroemke
 
Value The Life Blood Of Capitalism
Value The Life Blood Of CapitalismValue The Life Blood Of Capitalism
Value The Life Blood Of CapitalismEfrain Rivera
 
Designing Archives Space Presentation
Designing Archives Space PresentationDesigning Archives Space Presentation
Designing Archives Space PresentationDavid Ryan
 
ILL-SBN Presentazione 12 Dic 2007
ILL-SBN Presentazione 12 Dic 2007ILL-SBN Presentazione 12 Dic 2007
ILL-SBN Presentazione 12 Dic 2007ICCU
 

Andere mochten auch (6)

Groove Pitch Linked In
Groove Pitch Linked InGroove Pitch Linked In
Groove Pitch Linked In
 
Beginner Series 5 2009 Final
Beginner Series  5 2009 FinalBeginner Series  5 2009 Final
Beginner Series 5 2009 Final
 
Value The Life Blood Of Capitalism
Value The Life Blood Of CapitalismValue The Life Blood Of Capitalism
Value The Life Blood Of Capitalism
 
Designing Archives Space Presentation
Designing Archives Space PresentationDesigning Archives Space Presentation
Designing Archives Space Presentation
 
Focus On Learning
Focus On LearningFocus On Learning
Focus On Learning
 
ILL-SBN Presentazione 12 Dic 2007
ILL-SBN Presentazione 12 Dic 2007ILL-SBN Presentazione 12 Dic 2007
ILL-SBN Presentazione 12 Dic 2007
 

Ähnlich wie Beginner Series 7 2009 Final

Howtochooseane Mailsolution
Howtochooseane MailsolutionHowtochooseane Mailsolution
Howtochooseane Mailsolutionbizet
 
MarvelSoft email hosting guide
MarvelSoft email hosting guideMarvelSoft email hosting guide
MarvelSoft email hosting guideRanganath Shivaram
 
Internet Explorer and Outlook Express
Internet  Explorer and Outlook ExpressInternet  Explorer and Outlook Express
Internet Explorer and Outlook ExpressLove Steven
 
Mail System By Aggarat Jaisook
Mail System By Aggarat JaisookMail System By Aggarat Jaisook
Mail System By Aggarat JaisookAggarat Jaisook
 
Computing at SC&I
Computing at SC&IComputing at SC&I
Computing at SC&IRU asis&t
 
RU MLIS Computing
RU MLIS ComputingRU MLIS Computing
RU MLIS ComputingRU asis&t
 
FOSDEM 2009 Thunderbird 3 talk
FOSDEM 2009 Thunderbird 3 talkFOSDEM 2009 Thunderbird 3 talk
FOSDEM 2009 Thunderbird 3 talkdavidascher
 
How IT works - Joomladay Germany 2014
How IT works - Joomladay Germany 2014How IT works - Joomladay Germany 2014
How IT works - Joomladay Germany 2014Peter Martin
 
Lm presentation generic blue
Lm   presentation generic blueLm   presentation generic blue
Lm presentation generic blueshanaking
 
10+ Tech Tips for Small Business
10+ Tech Tips for Small Business10+ Tech Tips for Small Business
10+ Tech Tips for Small Businesssageserver
 
ILUG 2008 Templates, Templates Everywhere
ILUG 2008 Templates, Templates EverywhereILUG 2008 Templates, Templates Everywhere
ILUG 2008 Templates, Templates EverywhereKevin Pettitt
 
Web mail vs Desktop
Web mail vs Desktop Web mail vs Desktop
Web mail vs Desktop Ericka jolley
 
Chris Wilson @ FOWA Feb 07
Chris Wilson @ FOWA Feb 07Chris Wilson @ FOWA Feb 07
Chris Wilson @ FOWA Feb 07carsonsystems
 
Common email display issues - a guide for email marketers
Common email display issues - a guide for email marketersCommon email display issues - a guide for email marketers
Common email display issues - a guide for email marketersVRAMP Employee Engagement
 
How to deploy Exchange Online Protection
How to deploy Exchange Online ProtectionHow to deploy Exchange Online Protection
How to deploy Exchange Online ProtectionPeter Schmidt
 
Be Afraid. Be Very Afraid. Javascript security, XSS & CSRF
Be Afraid. Be Very Afraid. Javascript security, XSS & CSRFBe Afraid. Be Very Afraid. Javascript security, XSS & CSRF
Be Afraid. Be Very Afraid. Javascript security, XSS & CSRFMark Stanton
 
Browser and e mail basics
Browser and e mail basicsBrowser and e mail basics
Browser and e mail basicsshabersham
 
Whats New In Silverlight 3
Whats New In Silverlight 3Whats New In Silverlight 3
Whats New In Silverlight 3Bruce Johnson
 

Ähnlich wie Beginner Series 7 2009 Final (20)

Desk Maintenance
Desk MaintenanceDesk Maintenance
Desk Maintenance
 
Howtochooseane Mailsolution
Howtochooseane MailsolutionHowtochooseane Mailsolution
Howtochooseane Mailsolution
 
MarvelSoft email hosting guide
MarvelSoft email hosting guideMarvelSoft email hosting guide
MarvelSoft email hosting guide
 
Internet Explorer and Outlook Express
Internet  Explorer and Outlook ExpressInternet  Explorer and Outlook Express
Internet Explorer and Outlook Express
 
Mail System By Aggarat Jaisook
Mail System By Aggarat JaisookMail System By Aggarat Jaisook
Mail System By Aggarat Jaisook
 
Computing at SC&I
Computing at SC&IComputing at SC&I
Computing at SC&I
 
RU MLIS Computing
RU MLIS ComputingRU MLIS Computing
RU MLIS Computing
 
FOSDEM 2009 Thunderbird 3 talk
FOSDEM 2009 Thunderbird 3 talkFOSDEM 2009 Thunderbird 3 talk
FOSDEM 2009 Thunderbird 3 talk
 
How IT works - Joomladay Germany 2014
How IT works - Joomladay Germany 2014How IT works - Joomladay Germany 2014
How IT works - Joomladay Germany 2014
 
Lm presentation generic blue
Lm   presentation generic blueLm   presentation generic blue
Lm presentation generic blue
 
10+ Tech Tips for Small Business
10+ Tech Tips for Small Business10+ Tech Tips for Small Business
10+ Tech Tips for Small Business
 
ILUG 2008 Templates, Templates Everywhere
ILUG 2008 Templates, Templates EverywhereILUG 2008 Templates, Templates Everywhere
ILUG 2008 Templates, Templates Everywhere
 
Web mail vs Desktop
Web mail vs Desktop Web mail vs Desktop
Web mail vs Desktop
 
Chris Wilson @ FOWA Feb 07
Chris Wilson @ FOWA Feb 07Chris Wilson @ FOWA Feb 07
Chris Wilson @ FOWA Feb 07
 
Common email display issues - a guide for email marketers
Common email display issues - a guide for email marketersCommon email display issues - a guide for email marketers
Common email display issues - a guide for email marketers
 
LetterMark
LetterMarkLetterMark
LetterMark
 
How to deploy Exchange Online Protection
How to deploy Exchange Online ProtectionHow to deploy Exchange Online Protection
How to deploy Exchange Online Protection
 
Be Afraid. Be Very Afraid. Javascript security, XSS & CSRF
Be Afraid. Be Very Afraid. Javascript security, XSS & CSRFBe Afraid. Be Very Afraid. Javascript security, XSS & CSRF
Be Afraid. Be Very Afraid. Javascript security, XSS & CSRF
 
Browser and e mail basics
Browser and e mail basicsBrowser and e mail basics
Browser and e mail basics
 
Whats New In Silverlight 3
Whats New In Silverlight 3Whats New In Silverlight 3
Whats New In Silverlight 3
 

Kürzlich hochgeladen

H2O.ai CEO/Founder: Sri Ambati Keynote at Wells Fargo Day
H2O.ai CEO/Founder: Sri Ambati Keynote at Wells Fargo DayH2O.ai CEO/Founder: Sri Ambati Keynote at Wells Fargo Day
H2O.ai CEO/Founder: Sri Ambati Keynote at Wells Fargo DaySri Ambati
 
Artificial intelligence in cctv survelliance.pptx
Artificial intelligence in cctv survelliance.pptxArtificial intelligence in cctv survelliance.pptx
Artificial intelligence in cctv survelliance.pptxhariprasad279825
 
"Debugging python applications inside k8s environment", Andrii Soldatenko
"Debugging python applications inside k8s environment", Andrii Soldatenko"Debugging python applications inside k8s environment", Andrii Soldatenko
"Debugging python applications inside k8s environment", Andrii SoldatenkoFwdays
 
Dev Dives: Streamline document processing with UiPath Studio Web
Dev Dives: Streamline document processing with UiPath Studio WebDev Dives: Streamline document processing with UiPath Studio Web
Dev Dives: Streamline document processing with UiPath Studio WebUiPathCommunity
 
Ensuring Technical Readiness For Copilot in Microsoft 365
Ensuring Technical Readiness For Copilot in Microsoft 365Ensuring Technical Readiness For Copilot in Microsoft 365
Ensuring Technical Readiness For Copilot in Microsoft 3652toLead Limited
 
WordPress Websites for Engineers: Elevate Your Brand
WordPress Websites for Engineers: Elevate Your BrandWordPress Websites for Engineers: Elevate Your Brand
WordPress Websites for Engineers: Elevate Your Brandgvaughan
 
TeamStation AI System Report LATAM IT Salaries 2024
TeamStation AI System Report LATAM IT Salaries 2024TeamStation AI System Report LATAM IT Salaries 2024
TeamStation AI System Report LATAM IT Salaries 2024Lonnie McRorey
 
Anypoint Exchange: It’s Not Just a Repo!
Anypoint Exchange: It’s Not Just a Repo!Anypoint Exchange: It’s Not Just a Repo!
Anypoint Exchange: It’s Not Just a Repo!Manik S Magar
 
Are Multi-Cloud and Serverless Good or Bad?
Are Multi-Cloud and Serverless Good or Bad?Are Multi-Cloud and Serverless Good or Bad?
Are Multi-Cloud and Serverless Good or Bad?Mattias Andersson
 
SAP Build Work Zone - Overview L2-L3.pptx
SAP Build Work Zone - Overview L2-L3.pptxSAP Build Work Zone - Overview L2-L3.pptx
SAP Build Work Zone - Overview L2-L3.pptxNavinnSomaal
 
Search Engine Optimization SEO PDF for 2024.pdf
Search Engine Optimization SEO PDF for 2024.pdfSearch Engine Optimization SEO PDF for 2024.pdf
Search Engine Optimization SEO PDF for 2024.pdfRankYa
 
DSPy a system for AI to Write Prompts and Do Fine Tuning
DSPy a system for AI to Write Prompts and Do Fine TuningDSPy a system for AI to Write Prompts and Do Fine Tuning
DSPy a system for AI to Write Prompts and Do Fine TuningLars Bell
 
How to write a Business Continuity Plan
How to write a Business Continuity PlanHow to write a Business Continuity Plan
How to write a Business Continuity PlanDatabarracks
 
DevoxxFR 2024 Reproducible Builds with Apache Maven
DevoxxFR 2024 Reproducible Builds with Apache MavenDevoxxFR 2024 Reproducible Builds with Apache Maven
DevoxxFR 2024 Reproducible Builds with Apache MavenHervé Boutemy
 
Tampa BSides - Chef's Tour of Microsoft Security Adoption Framework (SAF)
Tampa BSides - Chef's Tour of Microsoft Security Adoption Framework (SAF)Tampa BSides - Chef's Tour of Microsoft Security Adoption Framework (SAF)
Tampa BSides - Chef's Tour of Microsoft Security Adoption Framework (SAF)Mark Simos
 
TrustArc Webinar - How to Build Consumer Trust Through Data Privacy
TrustArc Webinar - How to Build Consumer Trust Through Data PrivacyTrustArc Webinar - How to Build Consumer Trust Through Data Privacy
TrustArc Webinar - How to Build Consumer Trust Through Data PrivacyTrustArc
 
Commit 2024 - Secret Management made easy
Commit 2024 - Secret Management made easyCommit 2024 - Secret Management made easy
Commit 2024 - Secret Management made easyAlfredo García Lavilla
 
Designing IA for AI - Information Architecture Conference 2024
Designing IA for AI - Information Architecture Conference 2024Designing IA for AI - Information Architecture Conference 2024
Designing IA for AI - Information Architecture Conference 2024Enterprise Knowledge
 
The Ultimate Guide to Choosing WordPress Pros and Cons
The Ultimate Guide to Choosing WordPress Pros and ConsThe Ultimate Guide to Choosing WordPress Pros and Cons
The Ultimate Guide to Choosing WordPress Pros and ConsPixlogix Infotech
 

Kürzlich hochgeladen (20)

H2O.ai CEO/Founder: Sri Ambati Keynote at Wells Fargo Day
H2O.ai CEO/Founder: Sri Ambati Keynote at Wells Fargo DayH2O.ai CEO/Founder: Sri Ambati Keynote at Wells Fargo Day
H2O.ai CEO/Founder: Sri Ambati Keynote at Wells Fargo Day
 
Artificial intelligence in cctv survelliance.pptx
Artificial intelligence in cctv survelliance.pptxArtificial intelligence in cctv survelliance.pptx
Artificial intelligence in cctv survelliance.pptx
 
"Debugging python applications inside k8s environment", Andrii Soldatenko
"Debugging python applications inside k8s environment", Andrii Soldatenko"Debugging python applications inside k8s environment", Andrii Soldatenko
"Debugging python applications inside k8s environment", Andrii Soldatenko
 
E-Vehicle_Hacking_by_Parul Sharma_null_owasp.pptx
E-Vehicle_Hacking_by_Parul Sharma_null_owasp.pptxE-Vehicle_Hacking_by_Parul Sharma_null_owasp.pptx
E-Vehicle_Hacking_by_Parul Sharma_null_owasp.pptx
 
Dev Dives: Streamline document processing with UiPath Studio Web
Dev Dives: Streamline document processing with UiPath Studio WebDev Dives: Streamline document processing with UiPath Studio Web
Dev Dives: Streamline document processing with UiPath Studio Web
 
Ensuring Technical Readiness For Copilot in Microsoft 365
Ensuring Technical Readiness For Copilot in Microsoft 365Ensuring Technical Readiness For Copilot in Microsoft 365
Ensuring Technical Readiness For Copilot in Microsoft 365
 
WordPress Websites for Engineers: Elevate Your Brand
WordPress Websites for Engineers: Elevate Your BrandWordPress Websites for Engineers: Elevate Your Brand
WordPress Websites for Engineers: Elevate Your Brand
 
TeamStation AI System Report LATAM IT Salaries 2024
TeamStation AI System Report LATAM IT Salaries 2024TeamStation AI System Report LATAM IT Salaries 2024
TeamStation AI System Report LATAM IT Salaries 2024
 
Anypoint Exchange: It’s Not Just a Repo!
Anypoint Exchange: It’s Not Just a Repo!Anypoint Exchange: It’s Not Just a Repo!
Anypoint Exchange: It’s Not Just a Repo!
 
Are Multi-Cloud and Serverless Good or Bad?
Are Multi-Cloud and Serverless Good or Bad?Are Multi-Cloud and Serverless Good or Bad?
Are Multi-Cloud and Serverless Good or Bad?
 
SAP Build Work Zone - Overview L2-L3.pptx
SAP Build Work Zone - Overview L2-L3.pptxSAP Build Work Zone - Overview L2-L3.pptx
SAP Build Work Zone - Overview L2-L3.pptx
 
Search Engine Optimization SEO PDF for 2024.pdf
Search Engine Optimization SEO PDF for 2024.pdfSearch Engine Optimization SEO PDF for 2024.pdf
Search Engine Optimization SEO PDF for 2024.pdf
 
DSPy a system for AI to Write Prompts and Do Fine Tuning
DSPy a system for AI to Write Prompts and Do Fine TuningDSPy a system for AI to Write Prompts and Do Fine Tuning
DSPy a system for AI to Write Prompts and Do Fine Tuning
 
How to write a Business Continuity Plan
How to write a Business Continuity PlanHow to write a Business Continuity Plan
How to write a Business Continuity Plan
 
DevoxxFR 2024 Reproducible Builds with Apache Maven
DevoxxFR 2024 Reproducible Builds with Apache MavenDevoxxFR 2024 Reproducible Builds with Apache Maven
DevoxxFR 2024 Reproducible Builds with Apache Maven
 
Tampa BSides - Chef's Tour of Microsoft Security Adoption Framework (SAF)
Tampa BSides - Chef's Tour of Microsoft Security Adoption Framework (SAF)Tampa BSides - Chef's Tour of Microsoft Security Adoption Framework (SAF)
Tampa BSides - Chef's Tour of Microsoft Security Adoption Framework (SAF)
 
TrustArc Webinar - How to Build Consumer Trust Through Data Privacy
TrustArc Webinar - How to Build Consumer Trust Through Data PrivacyTrustArc Webinar - How to Build Consumer Trust Through Data Privacy
TrustArc Webinar - How to Build Consumer Trust Through Data Privacy
 
Commit 2024 - Secret Management made easy
Commit 2024 - Secret Management made easyCommit 2024 - Secret Management made easy
Commit 2024 - Secret Management made easy
 
Designing IA for AI - Information Architecture Conference 2024
Designing IA for AI - Information Architecture Conference 2024Designing IA for AI - Information Architecture Conference 2024
Designing IA for AI - Information Architecture Conference 2024
 
The Ultimate Guide to Choosing WordPress Pros and Cons
The Ultimate Guide to Choosing WordPress Pros and ConsThe Ultimate Guide to Choosing WordPress Pros and Cons
The Ultimate Guide to Choosing WordPress Pros and Cons
 

Beginner Series 7 2009 Final

  • 1. Set-up Check List 1. Closer projection screen 2. Check for automatic updates 3. Disable extra protection software 4. Disable scans during presentation 5. Turn Off auto-defrag 6. Test Wi-Fi connection speed 7. Set out textbooks 8. Send around attendance sheet 9. Pass out evaluation forms 10. Setup webcam for re-take of class picture 1 ComputerTLC
  • 2. WELCOME TO THE VICKSBURG COMPUTER CLASS 2009 Beginner Series -7 by Jim Froemke Instructor FINAL CLASS! 2 ComputerTLC
  • 3. Today’s Agenda  Seventh (FINAL!) Weekly Beginner Class: 1. Using the Vicksburg Class BLOG 2. Questions from last week 3. Chapter 10 (9) “E-mail, Your Electronic Mailbox” “Internet and E-mail for Seniors” text – 2 available 4. Homework Assignments 5. Class Feedback Survey 6. Questions and Extra Help after Class 3 ComputerTLC
  • 4. Using Internet Blogs  Just left-click on these links:  CLASS BLOG LINK Download Class Presentations  Vicksburg Village Voice Blog Link  Checking the latest village news 4 ComputerTLC
  • 5. Questions From Last Week  How to Change Desktop Icon Sizes?  Windows XP?  Desktop Menu, Properties, Appearance, Effects, Check: Use large icons  Windows VISTA?  Desktop Menu, View, Select: Large/Medium or Classic Icons  Click on an icon, press “Ctrl” key while you turn the mouse “Scroll” wheel 5 ComputerTLC
  • 6. Questions From Last Week  How to Change Taskbar Icon Sizes?  Windows XP:  Right-click to view taskbar menu, properties, Start Menu, Customize, General select: Large icons, OK, Apply and reboot computer.  Windows VISTA:  Right-click to view taskbar menu, properties, Start Menu, Customize, scroll down to place a check in: Use large icons, OK, Apply and reboot computer. 6 ComputerTLC
  • 7. Questions From Last Week  What are Internet Search Engines?  A way to have computers search the Internet indexes for your query.  Open any Internet Browser  Select an Internet Search Engine  Google, Yahoo, Lycos, Ask.com, etc.  Specialized Search Engines?  Key in your question, press search and wait for your answers. 7 ComputerTLC
  • 9. New Material Chapter 10 (9 ) “E-mail” Why learn about this?  So you can communicate with someone else! 9 ComputerTLC
  • 11. Early Wired Connections 11 ComputerTLC
  • 12. Green Communications 12 ComputerTLC
  • 13. Internet E-mail Q&As  What is it? – The transfer of files over communications networks.  What do I need? – An E-mail address and access to a computer with Internet access.  What does E-mail cost? – NOTHING!  What does Internet access cost? FREE or up to $60 per month 13 ComputerTLC
  • 14. Internet Access Costs  Portable FREE - Wireless Wi-Fi Access: Coffee shops, Restaurants, Motels, Airports, RV Campgrounds, etc.  Portable FEE - Some Wireless Wi-Fi Access: Starbucks, McDonalds, etc.  Mobile FEE – Cellular Broadband Access  Fixed Dedicated FEE: DSL, Cable, etc. Access  Fixed Shared FEE - Sharing a fixed dedicated connection with a neighborhood router access 14 ComputerTLC
  • 15. Basic E-mail Types Client Mail Web Mail  Messages and address  Messages and address book reside on your book reside on an personal computer. Internet server.  Limited service  Full services available available from other from any computer. computers.  Usually FREE (advertising):  Incl. w/Internet Access:  Google - Gmail  Windstream, Juno,  Yahoo - Mail Roadrunner, AOL, etc.  MSN - Hotmail 15 ComputerTLC
  • 16. XP Outlook Express and VISTA Windows Mail Read Mail Example  Chapter 10 (9); pages 254 (288)  Open client e-mail application  Manually enter User name and Password  Not necessary of automatic  Dial-up Internet connection  Not necessary for continuously on broadband (Windstream, Roadrunner, etc.)  Select (left-click) on Inbox  Not necessary if Inbox is default  Select and read new (or old) e-mail messages 16 ComputerTLC
  • 17. XP Outlook Express and VISTA Windows Mail Send Mail Example  Chapter 10 (9); pages 254 (288)  Open client e-mail application  Manually enter User name and Password  Not necessary of automatic  Dial-up Internet connection  Not necessary for continuously on broadband (Windstream, Roadrunner, etc.)  Select (left-click) on Inbox  Not necessary if Inbox is default  Select and read new (or old) e-mail messages 17 ComputerTLC
  • 18. What Are All The Boxes For?  Inbox – for New and read messages  Outbox – for messages being sent  Sent Item – for messages sent  Deleted Items – discarded messages  Draft – saved messages not sent  Junk E-mail – *suspicious messages  Archive – older saved messages 18 ComputerTLC
  • 19. Three Ways to Send a Message  Click on “Send” message – normal way  New message goes to whoever you address  Click on “Respond” – while reading a message  Previous message goes to message author  Click on “Forward” – while reading a message  Previous message goes to whoever you address 19 ComputerTLC
  • 20. E-mail Elements  To: primary recipient(s)  CC: & BCC: additional recipient(s)  Subject: topic of message  Attachments: link to additional files  Message: actual text of message  Signature: your name, title, etc. 20 ComputerTLC
  • 21. VISTA E-mail Windows XP Windows VISTA  Outlook Express  *Windows Mail  Outlook  *Outlook  Web-mail  Web-mail •Migration of messages, address book and settings required for Outlook Express and Outlook users •No migration required for Web Mail users Produced by Jim Froemke 21 3/18/2009
  • 22. What’s New with VISTA’s Windows Mail?  Preloaded (FREE) with VISTA  Successor to Outlook Express  Improved appearance  Supported by Microsoft (sort of)  Requires migration of your Outlook Express address book, mail and settings 22 Produced by Jim Froemke 3/18/2009
  • 23. VISTA? E-mail Alternatives  Outlook Express is history!  Not supported by Microsoft!  Doesn’t include spell checker (download)  Replaced with “Windows Mail”  Outlook will continue to run as long as you install Microsoft Office Suite  You can continue to run your favorite Web-Mail in your browser unchanged  Hotmail, G-mail, Yahoo mail, etc.  VISTA versions of other client e-mails available:  E.g., Juno, AOL, EarthLink, etc. 23 Produced by Jim Froemke
  • 25. E-mail Attachments – 263 (298)  Sending E-mail Attachments – 263 (298):  Either “attach” the file from your e-mail or “Send To” Mail Recipient from the file menu  Your ISP may limit the maximum size of any file attachment to < 10 MB.  Limit file attachments to picture and documents.  Receiving E-mail Attachments – 267 (303):  NEVER open unknown e-mail attachments.  Always save the attachment, scan it for infections and then if safe, open it.  Turn OFF automatic display of picture attachments. 25 ComputerTLC
  • 26. What’s SPAM!  SPAM is unsolicited, bulk e-mail.  It’s often sent from your own or your neighbor’s hijacked computer. 26 ComputerTLC
  • 27. How to Minimize SPAM! 1. NEVER open an unsolicited e-mail. Delete it! 2. NEVER respond to a SPAM e-mail! 3. NEVER click on a hot-link within a SPAM e-mail! 4. Protect your “personal” e-mail address from discovery. If discovered, change it. 1. Open a 2nd “throw-away” address for public use. 5. Chose a non-trivial e-mail address, for example: 1. name.address@yourISP.com jim.430@gmail.com 6. Use an ISP who has a good SPAM filter (Gmail). 7. Protect your computer from infections! 27 ComputerTLC
  • 28. What’s E-mail Phishing?  When you give up personal information in response to an E-mail. 28 ComputerTLC
  • 29. Why Protect Your Computer?  What’s wrong with this point of view?  “I don’t need protection because I only use my computer for e-mail; not banking or credit cards.”  You may be sending infections to everyone you send an e-mail to from your computer!  Your computer can become a “Zombie” when hijacked into a network of SPAM servers.  All SPAM is sent from vast networks of hijacked computers without the owners knowledge! 29 ComputerTLC
  • 30. E-mail Etiquette 1. DON’T USE ALL CAPITALIZED LETTERS! 1. Your message looks like you’re yelling at someone. 2. Minimize your use of punctuation!!!!!!!!!!!!!!!!!! 3. Use “plain text” for most emails. It’s safer. 4. Try not to forward “junk”. 5. Limit your use of “Reply to all” 1. You generate unnecessary e-mail traffic. 30 ComputerTLC
  • 31. E-mail Etiquette 1. Limit attachments as they can clog up e-mail. 2. Use a spelling and if possible grammar checker. 3. Read your e-mail before you send it. 4. Save a tree (and ink); don’t print everything out! 5. Remember that most e-mail is not secure. 31 ComputerTLC
  • 32. Homework Assignment  Exercises from chapter 10 (9) Pages: 270-271 (306-307)  Extra Credit: Appendices “A” “Playing Solitaire”  Pages: 317-323 (375-381) 32 ComputerTLC
  • 33. FINAL Class Feedback  Do you receive my class related e-mails? Yes____, No____ e-mail: ____________________  Are you able to view the class blog on your computer? Yes____, No____  Your computer experience level? Non-user____, Beginner____, Intermediate____  Was the class material level: Too simple?____, About right?____, Too complex?____  Did you understand the material today? Yes____, No____, Sometimes____  Were you able to complete the previous homework assignments? Yes____, No____  What topics could have been eliminated? ______________________________________  What topics should have been included? _______________________________________  Was this class series helpful to you? Yes____, Somewhat_____, No _____  Would you recommend the beginner class series to your friends? Yes_____ , No______  Suggestions for improvement? ______________________________________________  Are you having computer problems and require a house call? Yes____, No____  Name:___________________________________________, Phone: _________________________________  Nature of problem: ________________________________________________________________________ 33 ComputerTLC
  • 34. Are there any Questions? Thanks for Your Attention! 34 ComputerTLC