SlideShare ist ein Scribd-Unternehmen logo
1 von 18
Control Panel
utilities II.
Page 2
Instructor, PACE-IT Program – Edmonds Community College
Areas of Expertise Industry Certification
 PC Hardware
 Network Administration
 IT Project Management
 Network Design
 User Training
 IT Troubleshooting
Qualifications Summary
Education
 M.B.A., IT Management, Western Governor’s University
 B.S., IT Security, Western Governor’s University
Entrepreneur, executive leader, and proven manger
with 10+ years of experience turning complex issues
into efficient and effective solutions.
Strengths include developing and mentoring diverse
workforces, improving processes, analyzing
business needs and creating the solutions
required— with a focus on technology.
Page 3
– Display/Display Settings.
– User Accounts.
– Folder Options.
– System.
– Windows Firewall.
– Power Options.
PACE-IT.
Page 4
Control Panel utilities II.
Page 5
The Display/Display
Settings utility can control
different display settings
that the user can adjust.
Adjust resolution, Calibrate color, Change display
settings, and Adjust Clear Type text are some of the
settings available in this utility. Caution: adjusting
the native resolution on a flat panel display may
result in a distorted display.
Control Panel utilities II.
Page 6
Control Panel utilities II.
Page 7
– Manage or add users to a PC.
» Manage your credentials.
» Manage your file encryption certificates.
» Configure advanced user profile properties.
» Change my environment variables.
– Add users or change account types.
Control Panel utilities II.
Page 8
Control Panel utilities II.
Page 9
– Manage the default behavior of folders
and files.
» Three tabs: General, View, and Search.
– General.
» Basic behavior of files and folders.
– View.
» Establishes how files and folders represent themselves.
» The user can unhide protected files and folders from
here.
– Search.
» Establishes how the operating system searches folders.
Control Panel utilities II.
Page 10
Control Panel utilities II.
Page 11
– Information about the system is available.
» Operating system.
» Processor.
» RAM.
– Provides access to additional sub-utilities.
» Performance: an extension of Task Manager; gives a more
detailed view of system performance.
» Remote settings: sets the options for remote access.
» System protection: gives access to System Restore.
Control Panel utilities II.
Page 12
Control Panel utilities II.
Page 13
– System protection.
» Software based firewall that protects against malicious code.
» Manages traffic control into and out of a PC.
– Windows Firewall should be active, unless
another firewall product is active.
Control Panel utilities II.
Page 14
Control Panel utilities II.
Page 15
– Utility used to adjust power usage.
» User or administrator can set the power profiles for a given
situation.
– Power Plans: set the PC’s power usage
profile for a given power scenario.
» Hibernate: sets the PC’s behavior when idle for a specified
amount of time; this saves more power than sleep, as the
content of RAM is placed on the disk drive.
» Sleep/suspend/standby: sets the PC’s behavior when idle for
a specified amount of time; faster recovery than hibernate, as
trickle power is kept to RAM.
Control panel utilities II.
Page 16
Control Panel utilities II.
This utility is used to adjust the display’s behavior.
Topic
Display/Display Settings.
Summary
This utility is used to manage or add user accounts to the PC.User Accounts.
This utility is used to manage how folders are represented on the PC.Folder Options.
This utility provides system information and access to sub-utilities for
control.System.
This utility is an on or off software-based firewall that is used to provide
security to the PC.Windows Firewall.
This utility allows you to set power usage profiles for given power outage
scenarios.Power Options
Page 17
THANK YOU!
This workforce solution was 100 percent funded by a $3 million grant awarded by the
U.S. Department of Labor's Employment and Training Administration. The solution was
created by the grantee and does not necessarily reflect the official position of the U.S.
Department of Labor. The Department of Labor makes no guarantees, warranties, or
assurances of any kind, express or implied, with respect to such information, including
any information on linked sites and including, but not limited to, accuracy of the
information or its completeness, timeliness, usefulness, adequacy, continued availability
or ownership. Funded by the Department of Labor, Employment and Training
Administration, Grant #TC-23745-12-60-A-53.
PACE-IT is an equal opportunity employer/program and auxiliary aids and services are
available upon request to individuals with disabilities. For those that are hearing
impaired, a video phone is available at the Services for Students with Disabilities (SSD)
office in Mountlake Terrace Hall 159. Check www.edcc.edu/ssd for office hours. Call
425.354.3113 on a video phone for more information about the PACE-IT program. For
any additional special accommodations needed, call the SSD office at 425.640.1814.
Edmonds Community College does not discriminate on the basis of race; color; religion;
national origin; sex; disability; sexual orientation; age; citizenship, marital, or veteran
status; or genetic information in its programs and activities.

Weitere ähnliche Inhalte

Was ist angesagt?

Innovative-Consulting Technology Capabilities. Statement
Innovative-Consulting Technology Capabilities. StatementInnovative-Consulting Technology Capabilities. Statement
Innovative-Consulting Technology Capabilities. StatementDiontealley
 
Implementing whole disk encryption State Wide, the good, the bad and the encr...
Implementing whole disk encryption State Wide, the good, the bad and the encr...Implementing whole disk encryption State Wide, the good, the bad and the encr...
Implementing whole disk encryption State Wide, the good, the bad and the encr...Duane Rigsby
 
Resume for James D.Hall (Jr Systems Admin-Senior Desktop Admin v3)
Resume for James D.Hall (Jr Systems Admin-Senior Desktop Admin v3)Resume for James D.Hall (Jr Systems Admin-Senior Desktop Admin v3)
Resume for James D.Hall (Jr Systems Admin-Senior Desktop Admin v3)James Hall
 

Was ist angesagt? (19)

Pace IT - Basic OS Security Settings (Part 1)
Pace IT - Basic OS Security Settings (Part 1)Pace IT - Basic OS Security Settings (Part 1)
Pace IT - Basic OS Security Settings (Part 1)
 
Pace IT - Client Networking (Part 2)
Pace IT - Client Networking (Part 2)Pace IT - Client Networking (Part 2)
Pace IT - Client Networking (Part 2)
 
Pace IT - Client Networking (Part 1)
Pace IT - Client Networking (Part 1)Pace IT - Client Networking (Part 1)
Pace IT - Client Networking (Part 1)
 
PACE-IT: Supporting Configuration Management (part 2)
PACE-IT: Supporting Configuration Management (part 2)PACE-IT: Supporting Configuration Management (part 2)
PACE-IT: Supporting Configuration Management (part 2)
 
Pace IT - Introduction to the Bios
Pace IT - Introduction to the BiosPace IT - Introduction to the Bios
Pace IT - Introduction to the Bios
 
PACE-IT: Applying Patches and Upgrades
PACE-IT: Applying Patches and UpgradesPACE-IT: Applying Patches and Upgrades
PACE-IT: Applying Patches and Upgrades
 
Pace IT - Command Line Networking
Pace IT - Command Line NetworkingPace IT - Command Line Networking
Pace IT - Command Line Networking
 
Pace IT - Command Line OS (Part 2)
Pace IT - Command Line OS (Part 2)Pace IT - Command Line OS (Part 2)
Pace IT - Command Line OS (Part 2)
 
Pace IT - Command Line OS (Part 1)
Pace IT - Command Line OS (Part 1)Pace IT - Command Line OS (Part 1)
Pace IT - Command Line OS (Part 1)
 
PACE-IT: The Importance of Network Segmentation
PACE-IT: The Importance of Network SegmentationPACE-IT: The Importance of Network Segmentation
PACE-IT: The Importance of Network Segmentation
 
Innovative-Consulting Technology Capabilities. Statement
Innovative-Consulting Technology Capabilities. StatementInnovative-Consulting Technology Capabilities. Statement
Innovative-Consulting Technology Capabilities. Statement
 
PACE-IT: Configuring Switches (part 2)
PACE-IT: Configuring Switches (part 2)PACE-IT: Configuring Switches (part 2)
PACE-IT: Configuring Switches (part 2)
 
PACE-IT: Wireless LAN Infrastructure (part 2)
PACE-IT: Wireless LAN Infrastructure (part 2)PACE-IT: Wireless LAN Infrastructure (part 2)
PACE-IT: Wireless LAN Infrastructure (part 2)
 
Implementing whole disk encryption State Wide, the good, the bad and the encr...
Implementing whole disk encryption State Wide, the good, the bad and the encr...Implementing whole disk encryption State Wide, the good, the bad and the encr...
Implementing whole disk encryption State Wide, the good, the bad and the encr...
 
PACE-IT: Configuring Switches (part 1)
PACE-IT: Configuring Switches (part 1)PACE-IT: Configuring Switches (part 1)
PACE-IT: Configuring Switches (part 1)
 
L1
L1L1
L1
 
Resume for James D.Hall (Jr Systems Admin-Senior Desktop Admin v3)
Resume for James D.Hall (Jr Systems Admin-Senior Desktop Admin v3)Resume for James D.Hall (Jr Systems Admin-Senior Desktop Admin v3)
Resume for James D.Hall (Jr Systems Admin-Senior Desktop Admin v3)
 
PACE-IT: Operation System Features
PACE-IT: Operation System FeaturesPACE-IT: Operation System Features
PACE-IT: Operation System Features
 
Pace IT - Microsoft OS and Requirements
Pace IT - Microsoft OS and RequirementsPace IT - Microsoft OS and Requirements
Pace IT - Microsoft OS and Requirements
 

Andere mochten auch

Andere mochten auch (8)

Control Panel - By Sandeep Mahey
Control Panel - By Sandeep MaheyControl Panel - By Sandeep Mahey
Control Panel - By Sandeep Mahey
 
Current transformers
Current transformersCurrent transformers
Current transformers
 
Current transformer
Current transformerCurrent transformer
Current transformer
 
Busbar Design
Busbar DesignBusbar Design
Busbar Design
 
Control Panel
Control PanelControl Panel
Control Panel
 
Ppt of current transformer
Ppt of current transformerPpt of current transformer
Ppt of current transformer
 
PANEL DISCUSSION
PANEL  DISCUSSIONPANEL  DISCUSSION
PANEL DISCUSSION
 
Control panel
Control panelControl panel
Control panel
 

Ähnlich wie Pace IT - Control Panel (Part 2)

PowerPro Flyer English
PowerPro Flyer EnglishPowerPro Flyer English
PowerPro Flyer Englishcynapspro GmbH
 
IRJET- Image Steganography using Pixel Pattern Matching in Cloud Data Sto...
IRJET-  	  Image Steganography using Pixel Pattern Matching in Cloud Data Sto...IRJET-  	  Image Steganography using Pixel Pattern Matching in Cloud Data Sto...
IRJET- Image Steganography using Pixel Pattern Matching in Cloud Data Sto...IRJET Journal
 
IBM Endpoint Manger for Power Management (Overview)
IBM Endpoint Manger for Power Management (Overview)IBM Endpoint Manger for Power Management (Overview)
IBM Endpoint Manger for Power Management (Overview)Kimber Spradlin
 
Owny IT Desktop Monitoring Featurelist
Owny IT Desktop Monitoring FeaturelistOwny IT Desktop Monitoring Featurelist
Owny IT Desktop Monitoring FeaturelistNCS Computech Ltd.
 
HMI/SCADA 리스크 감소
HMI/SCADA 리스크 감소HMI/SCADA 리스크 감소
HMI/SCADA 리스크 감소GE코리아
 
Securing and Greening Your IT
Securing and Greening Your ITSecuring and Greening Your IT
Securing and Greening Your ITLumension
 
CNS599NLEN_RiskAssessment
CNS599NLEN_RiskAssessmentCNS599NLEN_RiskAssessment
CNS599NLEN_RiskAssessmentTaishaun Owens
 

Ähnlich wie Pace IT - Control Panel (Part 2) (20)

Pace IT - Client Networking (Part 3)
Pace IT - Client Networking (Part 3)Pace IT - Client Networking (Part 3)
Pace IT - Client Networking (Part 3)
 
Pace IT - Install and Configure OS (Part 2)
Pace IT - Install and Configure OS (Part 2)Pace IT - Install and Configure OS (Part 2)
Pace IT - Install and Configure OS (Part 2)
 
Pace IT - Peripheral Devices
Pace IT - Peripheral DevicesPace IT - Peripheral Devices
Pace IT - Peripheral Devices
 
Pace IT - Troubleshooting OS part 2
Pace IT - Troubleshooting OS part 2Pace IT - Troubleshooting OS part 2
Pace IT - Troubleshooting OS part 2
 
PowerPro Flyer English
PowerPro Flyer EnglishPowerPro Flyer English
PowerPro Flyer English
 
PACE-IT: Securing the Workstation
PACE-IT: Securing the WorkstationPACE-IT: Securing the Workstation
PACE-IT: Securing the Workstation
 
IRJET- Image Steganography using Pixel Pattern Matching in Cloud Data Sto...
IRJET-  	  Image Steganography using Pixel Pattern Matching in Cloud Data Sto...IRJET-  	  Image Steganography using Pixel Pattern Matching in Cloud Data Sto...
IRJET- Image Steganography using Pixel Pattern Matching in Cloud Data Sto...
 
Pace IT - Maintenance Procedures Best Practices
Pace IT - Maintenance Procedures Best PracticesPace IT - Maintenance Procedures Best Practices
Pace IT - Maintenance Procedures Best Practices
 
Pace IT - Network Devices (part 2)
Pace IT - Network Devices (part 2)Pace IT - Network Devices (part 2)
Pace IT - Network Devices (part 2)
 
Wizard intro
Wizard introWizard intro
Wizard intro
 
Pace IT - Maintainance Tools
Pace IT - Maintainance ToolsPace IT - Maintainance Tools
Pace IT - Maintainance Tools
 
IBM Endpoint Manger for Power Management (Overview)
IBM Endpoint Manger for Power Management (Overview)IBM Endpoint Manger for Power Management (Overview)
IBM Endpoint Manger for Power Management (Overview)
 
Owny IT Desktop Monitoring Featurelist
Owny IT Desktop Monitoring FeaturelistOwny IT Desktop Monitoring Featurelist
Owny IT Desktop Monitoring Featurelist
 
Pace IT - Expansion Cards
Pace IT - Expansion CardsPace IT - Expansion Cards
Pace IT - Expansion Cards
 
HMI/SCADA 리스크 감소
HMI/SCADA 리스크 감소HMI/SCADA 리스크 감소
HMI/SCADA 리스크 감소
 
PACE-IT: IT Security Measures
PACE-IT: IT Security MeasuresPACE-IT: IT Security Measures
PACE-IT: IT Security Measures
 
Securing and Greening Your IT
Securing and Greening Your ITSecuring and Greening Your IT
Securing and Greening Your IT
 
Pace IT - Introduction to_the_Motherboard
Pace IT - Introduction to_the_MotherboardPace IT - Introduction to_the_Motherboard
Pace IT - Introduction to_the_Motherboard
 
PACE-IT: Risk and Security Related Concepts
PACE-IT: Risk and Security Related ConceptsPACE-IT: Risk and Security Related Concepts
PACE-IT: Risk and Security Related Concepts
 
CNS599NLEN_RiskAssessment
CNS599NLEN_RiskAssessmentCNS599NLEN_RiskAssessment
CNS599NLEN_RiskAssessment
 

Mehr von Pace IT at Edmonds Community College

PACE-IT, Security+ 6.3: Introduction to Public Key Infrastructure (part 2)
PACE-IT, Security+ 6.3: Introduction to Public Key Infrastructure (part 2)PACE-IT, Security+ 6.3: Introduction to Public Key Infrastructure (part 2)
PACE-IT, Security+ 6.3: Introduction to Public Key Infrastructure (part 2)Pace IT at Edmonds Community College
 
PACE-IT, Security+ 6.3: Introduction to Public Key Infrastructure (part 1)
PACE-IT, Security+ 6.3: Introduction to Public Key Infrastructure (part 1)PACE-IT, Security+ 6.3: Introduction to Public Key Infrastructure (part 1)
PACE-IT, Security+ 6.3: Introduction to Public Key Infrastructure (part 1)Pace IT at Edmonds Community College
 
PACE-IT, Security + 5.2: Authentication and Authorization Basics (part 2)
PACE-IT, Security + 5.2: Authentication and Authorization Basics (part 2)PACE-IT, Security + 5.2: Authentication and Authorization Basics (part 2)
PACE-IT, Security + 5.2: Authentication and Authorization Basics (part 2)Pace IT at Edmonds Community College
 
PACE-IT, Security + 5.2: Authentication and Authorization Basics (part 1)
PACE-IT, Security + 5.2: Authentication and Authorization Basics (part 1)PACE-IT, Security + 5.2: Authentication and Authorization Basics (part 1)
PACE-IT, Security + 5.2: Authentication and Authorization Basics (part 1)Pace IT at Edmonds Community College
 
PACE-IT, Security+ 4.2: Mobile Security Concepts and Technologies (part 1)
PACE-IT, Security+ 4.2: Mobile Security Concepts and Technologies (part 1)PACE-IT, Security+ 4.2: Mobile Security Concepts and Technologies (part 1)
PACE-IT, Security+ 4.2: Mobile Security Concepts and Technologies (part 1)Pace IT at Edmonds Community College
 
PACE-IT, Security+ 4.1: Application Security Controls and Techniques
PACE-IT, Security+ 4.1: Application Security Controls and TechniquesPACE-IT, Security+ 4.1: Application Security Controls and Techniques
PACE-IT, Security+ 4.1: Application Security Controls and TechniquesPace IT at Edmonds Community College
 
PACE-IT, Security+ 4.5: Mitigating Risks in Alternative Environments
PACE-IT, Security+ 4.5: Mitigating Risks in Alternative EnvironmentsPACE-IT, Security+ 4.5: Mitigating Risks in Alternative Environments
PACE-IT, Security+ 4.5: Mitigating Risks in Alternative EnvironmentsPace IT at Edmonds Community College
 
PACE-IT, Security+ 4.2: Mobile Security Concepts and Technologies (part 2)
PACE-IT, Security+ 4.2: Mobile Security Concepts and Technologies (part 2)PACE-IT, Security+ 4.2: Mobile Security Concepts and Technologies (part 2)
PACE-IT, Security+ 4.2: Mobile Security Concepts and Technologies (part 2)Pace IT at Edmonds Community College
 

Mehr von Pace IT at Edmonds Community College (20)

PACE-IT, Security+ 6.3: Introduction to Public Key Infrastructure (part 2)
PACE-IT, Security+ 6.3: Introduction to Public Key Infrastructure (part 2)PACE-IT, Security+ 6.3: Introduction to Public Key Infrastructure (part 2)
PACE-IT, Security+ 6.3: Introduction to Public Key Infrastructure (part 2)
 
PACE-IT, Security+ 6.3: Introduction to Public Key Infrastructure (part 1)
PACE-IT, Security+ 6.3: Introduction to Public Key Infrastructure (part 1)PACE-IT, Security+ 6.3: Introduction to Public Key Infrastructure (part 1)
PACE-IT, Security+ 6.3: Introduction to Public Key Infrastructure (part 1)
 
PACE-IT, Security+ 6.2: Cryptographic Methods (part 2)
PACE-IT, Security+ 6.2: Cryptographic Methods (part 2)PACE-IT, Security+ 6.2: Cryptographic Methods (part 2)
PACE-IT, Security+ 6.2: Cryptographic Methods (part 2)
 
PACE-IT, Security+ 6.2: Cryptographic Methods (part 1)
PACE-IT, Security+ 6.2: Cryptographic Methods (part 1)PACE-IT, Security+ 6.2: Cryptographic Methods (part 1)
PACE-IT, Security+ 6.2: Cryptographic Methods (part 1)
 
PACE-IT, Security+ 6.1: Introduction to Cryptography (part 1)
PACE-IT, Security+ 6.1: Introduction to Cryptography (part 1)PACE-IT, Security+ 6.1: Introduction to Cryptography (part 1)
PACE-IT, Security+ 6.1: Introduction to Cryptography (part 1)
 
PACE-IT, Security+ 6.1: Introduction to Cryptography (part 2)
PACE-IT, Security+ 6.1: Introduction to Cryptography (part 2)PACE-IT, Security+ 6.1: Introduction to Cryptography (part 2)
PACE-IT, Security+ 6.1: Introduction to Cryptography (part 2)
 
PACE-IT, Security + 5.3: Security Controls for Account Management
PACE-IT, Security + 5.3: Security Controls for Account ManagementPACE-IT, Security + 5.3: Security Controls for Account Management
PACE-IT, Security + 5.3: Security Controls for Account Management
 
PACE-IT, Security + 5.2: Authentication and Authorization Basics (part 2)
PACE-IT, Security + 5.2: Authentication and Authorization Basics (part 2)PACE-IT, Security + 5.2: Authentication and Authorization Basics (part 2)
PACE-IT, Security + 5.2: Authentication and Authorization Basics (part 2)
 
PACE-IT, Security + 5.2: Authentication and Authorization Basics (part 1)
PACE-IT, Security + 5.2: Authentication and Authorization Basics (part 1)PACE-IT, Security + 5.2: Authentication and Authorization Basics (part 1)
PACE-IT, Security + 5.2: Authentication and Authorization Basics (part 1)
 
PACE-IT, Security + 5.1: Summary of Authentication Services
PACE-IT, Security + 5.1: Summary of Authentication ServicesPACE-IT, Security + 5.1: Summary of Authentication Services
PACE-IT, Security + 5.1: Summary of Authentication Services
 
PACE-IT, Security+ 4.2: Mobile Security Concepts and Technologies (part 1)
PACE-IT, Security+ 4.2: Mobile Security Concepts and Technologies (part 1)PACE-IT, Security+ 4.2: Mobile Security Concepts and Technologies (part 1)
PACE-IT, Security+ 4.2: Mobile Security Concepts and Technologies (part 1)
 
PACE-IT, Security+ 4.1: Application Security Controls and Techniques
PACE-IT, Security+ 4.1: Application Security Controls and TechniquesPACE-IT, Security+ 4.1: Application Security Controls and Techniques
PACE-IT, Security+ 4.1: Application Security Controls and Techniques
 
PACE-IT, Security+ 4.5: Mitigating Risks in Alternative Environments
PACE-IT, Security+ 4.5: Mitigating Risks in Alternative EnvironmentsPACE-IT, Security+ 4.5: Mitigating Risks in Alternative Environments
PACE-IT, Security+ 4.5: Mitigating Risks in Alternative Environments
 
PACE-IT, Security+ 4.4: Controls to Ensure Data Security
PACE-IT, Security+ 4.4: Controls to Ensure Data SecurityPACE-IT, Security+ 4.4: Controls to Ensure Data Security
PACE-IT, Security+ 4.4: Controls to Ensure Data Security
 
PACE-IT, Security+ 4.3: Solutions to Establish Host Security
PACE-IT, Security+ 4.3: Solutions to Establish Host SecurityPACE-IT, Security+ 4.3: Solutions to Establish Host Security
PACE-IT, Security+ 4.3: Solutions to Establish Host Security
 
PACE-IT, Security+ 4.2: Mobile Security Concepts and Technologies (part 2)
PACE-IT, Security+ 4.2: Mobile Security Concepts and Technologies (part 2)PACE-IT, Security+ 4.2: Mobile Security Concepts and Technologies (part 2)
PACE-IT, Security+ 4.2: Mobile Security Concepts and Technologies (part 2)
 
PACE-IT, Security+3.7: Overview of Security Assessment Tools
PACE-IT, Security+3.7: Overview of Security Assessment ToolsPACE-IT, Security+3.7: Overview of Security Assessment Tools
PACE-IT, Security+3.7: Overview of Security Assessment Tools
 
PACE-IT, Security+3.6: Security Enhancement Techniques
PACE-IT, Security+3.6: Security Enhancement TechniquesPACE-IT, Security+3.6: Security Enhancement Techniques
PACE-IT, Security+3.6: Security Enhancement Techniques
 
PACE-IT, Security+3.5: Types of Application Attacks (part 2)
PACE-IT, Security+3.5: Types of Application Attacks (part 2)PACE-IT, Security+3.5: Types of Application Attacks (part 2)
PACE-IT, Security+3.5: Types of Application Attacks (part 2)
 
PACE-IT, Security+3.5: Types of Application Attacks (part 1)
PACE-IT, Security+3.5: Types of Application Attacks (part 1)PACE-IT, Security+3.5: Types of Application Attacks (part 1)
PACE-IT, Security+3.5: Types of Application Attacks (part 1)
 

Kürzlich hochgeladen

Nutritional Needs Presentation - HLTH 104
Nutritional Needs Presentation - HLTH 104Nutritional Needs Presentation - HLTH 104
Nutritional Needs Presentation - HLTH 104misteraugie
 
Measures of Dispersion and Variability: Range, QD, AD and SD
Measures of Dispersion and Variability: Range, QD, AD and SDMeasures of Dispersion and Variability: Range, QD, AD and SD
Measures of Dispersion and Variability: Range, QD, AD and SDThiyagu K
 
Ecological Succession. ( ECOSYSTEM, B. Pharmacy, 1st Year, Sem-II, Environmen...
Ecological Succession. ( ECOSYSTEM, B. Pharmacy, 1st Year, Sem-II, Environmen...Ecological Succession. ( ECOSYSTEM, B. Pharmacy, 1st Year, Sem-II, Environmen...
Ecological Succession. ( ECOSYSTEM, B. Pharmacy, 1st Year, Sem-II, Environmen...Shubhangi Sonawane
 
Key note speaker Neum_Admir Softic_ENG.pdf
Key note speaker Neum_Admir Softic_ENG.pdfKey note speaker Neum_Admir Softic_ENG.pdf
Key note speaker Neum_Admir Softic_ENG.pdfAdmir Softic
 
Russian Escort Service in Delhi 11k Hotel Foreigner Russian Call Girls in Delhi
Russian Escort Service in Delhi 11k Hotel Foreigner Russian Call Girls in DelhiRussian Escort Service in Delhi 11k Hotel Foreigner Russian Call Girls in Delhi
Russian Escort Service in Delhi 11k Hotel Foreigner Russian Call Girls in Delhikauryashika82
 
Holdier Curriculum Vitae (April 2024).pdf
Holdier Curriculum Vitae (April 2024).pdfHoldier Curriculum Vitae (April 2024).pdf
Holdier Curriculum Vitae (April 2024).pdfagholdier
 
Seal of Good Local Governance (SGLG) 2024Final.pptx
Seal of Good Local Governance (SGLG) 2024Final.pptxSeal of Good Local Governance (SGLG) 2024Final.pptx
Seal of Good Local Governance (SGLG) 2024Final.pptxnegromaestrong
 
SECOND SEMESTER TOPIC COVERAGE SY 2023-2024 Trends, Networks, and Critical Th...
SECOND SEMESTER TOPIC COVERAGE SY 2023-2024 Trends, Networks, and Critical Th...SECOND SEMESTER TOPIC COVERAGE SY 2023-2024 Trends, Networks, and Critical Th...
SECOND SEMESTER TOPIC COVERAGE SY 2023-2024 Trends, Networks, and Critical Th...KokoStevan
 
The basics of sentences session 2pptx copy.pptx
The basics of sentences session 2pptx copy.pptxThe basics of sentences session 2pptx copy.pptx
The basics of sentences session 2pptx copy.pptxheathfieldcps1
 
Basic Civil Engineering first year Notes- Chapter 4 Building.pptx
Basic Civil Engineering first year Notes- Chapter 4 Building.pptxBasic Civil Engineering first year Notes- Chapter 4 Building.pptx
Basic Civil Engineering first year Notes- Chapter 4 Building.pptxDenish Jangid
 
Mixin Classes in Odoo 17 How to Extend Models Using Mixin Classes
Mixin Classes in Odoo 17  How to Extend Models Using Mixin ClassesMixin Classes in Odoo 17  How to Extend Models Using Mixin Classes
Mixin Classes in Odoo 17 How to Extend Models Using Mixin ClassesCeline George
 
Beyond the EU: DORA and NIS 2 Directive's Global Impact
Beyond the EU: DORA and NIS 2 Directive's Global ImpactBeyond the EU: DORA and NIS 2 Directive's Global Impact
Beyond the EU: DORA and NIS 2 Directive's Global ImpactPECB
 
Class 11th Physics NEET formula sheet pdf
Class 11th Physics NEET formula sheet pdfClass 11th Physics NEET formula sheet pdf
Class 11th Physics NEET formula sheet pdfAyushMahapatra5
 
Making and Justifying Mathematical Decisions.pdf
Making and Justifying Mathematical Decisions.pdfMaking and Justifying Mathematical Decisions.pdf
Making and Justifying Mathematical Decisions.pdfChris Hunter
 
Web & Social Media Analytics Previous Year Question Paper.pdf
Web & Social Media Analytics Previous Year Question Paper.pdfWeb & Social Media Analytics Previous Year Question Paper.pdf
Web & Social Media Analytics Previous Year Question Paper.pdfJayanti Pande
 
Activity 01 - Artificial Culture (1).pdf
Activity 01 - Artificial Culture (1).pdfActivity 01 - Artificial Culture (1).pdf
Activity 01 - Artificial Culture (1).pdfciinovamais
 
PROCESS RECORDING FORMAT.docx
PROCESS      RECORDING        FORMAT.docxPROCESS      RECORDING        FORMAT.docx
PROCESS RECORDING FORMAT.docxPoojaSen20
 
Introduction to Nonprofit Accounting: The Basics
Introduction to Nonprofit Accounting: The BasicsIntroduction to Nonprofit Accounting: The Basics
Introduction to Nonprofit Accounting: The BasicsTechSoup
 

Kürzlich hochgeladen (20)

Mattingly "AI & Prompt Design: The Basics of Prompt Design"
Mattingly "AI & Prompt Design: The Basics of Prompt Design"Mattingly "AI & Prompt Design: The Basics of Prompt Design"
Mattingly "AI & Prompt Design: The Basics of Prompt Design"
 
Nutritional Needs Presentation - HLTH 104
Nutritional Needs Presentation - HLTH 104Nutritional Needs Presentation - HLTH 104
Nutritional Needs Presentation - HLTH 104
 
Measures of Dispersion and Variability: Range, QD, AD and SD
Measures of Dispersion and Variability: Range, QD, AD and SDMeasures of Dispersion and Variability: Range, QD, AD and SD
Measures of Dispersion and Variability: Range, QD, AD and SD
 
Ecological Succession. ( ECOSYSTEM, B. Pharmacy, 1st Year, Sem-II, Environmen...
Ecological Succession. ( ECOSYSTEM, B. Pharmacy, 1st Year, Sem-II, Environmen...Ecological Succession. ( ECOSYSTEM, B. Pharmacy, 1st Year, Sem-II, Environmen...
Ecological Succession. ( ECOSYSTEM, B. Pharmacy, 1st Year, Sem-II, Environmen...
 
Key note speaker Neum_Admir Softic_ENG.pdf
Key note speaker Neum_Admir Softic_ENG.pdfKey note speaker Neum_Admir Softic_ENG.pdf
Key note speaker Neum_Admir Softic_ENG.pdf
 
Russian Escort Service in Delhi 11k Hotel Foreigner Russian Call Girls in Delhi
Russian Escort Service in Delhi 11k Hotel Foreigner Russian Call Girls in DelhiRussian Escort Service in Delhi 11k Hotel Foreigner Russian Call Girls in Delhi
Russian Escort Service in Delhi 11k Hotel Foreigner Russian Call Girls in Delhi
 
Holdier Curriculum Vitae (April 2024).pdf
Holdier Curriculum Vitae (April 2024).pdfHoldier Curriculum Vitae (April 2024).pdf
Holdier Curriculum Vitae (April 2024).pdf
 
Seal of Good Local Governance (SGLG) 2024Final.pptx
Seal of Good Local Governance (SGLG) 2024Final.pptxSeal of Good Local Governance (SGLG) 2024Final.pptx
Seal of Good Local Governance (SGLG) 2024Final.pptx
 
SECOND SEMESTER TOPIC COVERAGE SY 2023-2024 Trends, Networks, and Critical Th...
SECOND SEMESTER TOPIC COVERAGE SY 2023-2024 Trends, Networks, and Critical Th...SECOND SEMESTER TOPIC COVERAGE SY 2023-2024 Trends, Networks, and Critical Th...
SECOND SEMESTER TOPIC COVERAGE SY 2023-2024 Trends, Networks, and Critical Th...
 
The basics of sentences session 2pptx copy.pptx
The basics of sentences session 2pptx copy.pptxThe basics of sentences session 2pptx copy.pptx
The basics of sentences session 2pptx copy.pptx
 
Basic Civil Engineering first year Notes- Chapter 4 Building.pptx
Basic Civil Engineering first year Notes- Chapter 4 Building.pptxBasic Civil Engineering first year Notes- Chapter 4 Building.pptx
Basic Civil Engineering first year Notes- Chapter 4 Building.pptx
 
Mixin Classes in Odoo 17 How to Extend Models Using Mixin Classes
Mixin Classes in Odoo 17  How to Extend Models Using Mixin ClassesMixin Classes in Odoo 17  How to Extend Models Using Mixin Classes
Mixin Classes in Odoo 17 How to Extend Models Using Mixin Classes
 
Beyond the EU: DORA and NIS 2 Directive's Global Impact
Beyond the EU: DORA and NIS 2 Directive's Global ImpactBeyond the EU: DORA and NIS 2 Directive's Global Impact
Beyond the EU: DORA and NIS 2 Directive's Global Impact
 
Class 11th Physics NEET formula sheet pdf
Class 11th Physics NEET formula sheet pdfClass 11th Physics NEET formula sheet pdf
Class 11th Physics NEET formula sheet pdf
 
Making and Justifying Mathematical Decisions.pdf
Making and Justifying Mathematical Decisions.pdfMaking and Justifying Mathematical Decisions.pdf
Making and Justifying Mathematical Decisions.pdf
 
INDIA QUIZ 2024 RLAC DELHI UNIVERSITY.pptx
INDIA QUIZ 2024 RLAC DELHI UNIVERSITY.pptxINDIA QUIZ 2024 RLAC DELHI UNIVERSITY.pptx
INDIA QUIZ 2024 RLAC DELHI UNIVERSITY.pptx
 
Web & Social Media Analytics Previous Year Question Paper.pdf
Web & Social Media Analytics Previous Year Question Paper.pdfWeb & Social Media Analytics Previous Year Question Paper.pdf
Web & Social Media Analytics Previous Year Question Paper.pdf
 
Activity 01 - Artificial Culture (1).pdf
Activity 01 - Artificial Culture (1).pdfActivity 01 - Artificial Culture (1).pdf
Activity 01 - Artificial Culture (1).pdf
 
PROCESS RECORDING FORMAT.docx
PROCESS      RECORDING        FORMAT.docxPROCESS      RECORDING        FORMAT.docx
PROCESS RECORDING FORMAT.docx
 
Introduction to Nonprofit Accounting: The Basics
Introduction to Nonprofit Accounting: The BasicsIntroduction to Nonprofit Accounting: The Basics
Introduction to Nonprofit Accounting: The Basics
 

Pace IT - Control Panel (Part 2)

  • 2. Page 2 Instructor, PACE-IT Program – Edmonds Community College Areas of Expertise Industry Certification  PC Hardware  Network Administration  IT Project Management  Network Design  User Training  IT Troubleshooting Qualifications Summary Education  M.B.A., IT Management, Western Governor’s University  B.S., IT Security, Western Governor’s University Entrepreneur, executive leader, and proven manger with 10+ years of experience turning complex issues into efficient and effective solutions. Strengths include developing and mentoring diverse workforces, improving processes, analyzing business needs and creating the solutions required— with a focus on technology.
  • 3. Page 3 – Display/Display Settings. – User Accounts. – Folder Options. – System. – Windows Firewall. – Power Options. PACE-IT.
  • 4. Page 4 Control Panel utilities II.
  • 5. Page 5 The Display/Display Settings utility can control different display settings that the user can adjust. Adjust resolution, Calibrate color, Change display settings, and Adjust Clear Type text are some of the settings available in this utility. Caution: adjusting the native resolution on a flat panel display may result in a distorted display. Control Panel utilities II.
  • 6. Page 6 Control Panel utilities II.
  • 7. Page 7 – Manage or add users to a PC. » Manage your credentials. » Manage your file encryption certificates. » Configure advanced user profile properties. » Change my environment variables. – Add users or change account types. Control Panel utilities II.
  • 8. Page 8 Control Panel utilities II.
  • 9. Page 9 – Manage the default behavior of folders and files. » Three tabs: General, View, and Search. – General. » Basic behavior of files and folders. – View. » Establishes how files and folders represent themselves. » The user can unhide protected files and folders from here. – Search. » Establishes how the operating system searches folders. Control Panel utilities II.
  • 10. Page 10 Control Panel utilities II.
  • 11. Page 11 – Information about the system is available. » Operating system. » Processor. » RAM. – Provides access to additional sub-utilities. » Performance: an extension of Task Manager; gives a more detailed view of system performance. » Remote settings: sets the options for remote access. » System protection: gives access to System Restore. Control Panel utilities II.
  • 12. Page 12 Control Panel utilities II.
  • 13. Page 13 – System protection. » Software based firewall that protects against malicious code. » Manages traffic control into and out of a PC. – Windows Firewall should be active, unless another firewall product is active. Control Panel utilities II.
  • 14. Page 14 Control Panel utilities II.
  • 15. Page 15 – Utility used to adjust power usage. » User or administrator can set the power profiles for a given situation. – Power Plans: set the PC’s power usage profile for a given power scenario. » Hibernate: sets the PC’s behavior when idle for a specified amount of time; this saves more power than sleep, as the content of RAM is placed on the disk drive. » Sleep/suspend/standby: sets the PC’s behavior when idle for a specified amount of time; faster recovery than hibernate, as trickle power is kept to RAM. Control panel utilities II.
  • 16. Page 16 Control Panel utilities II. This utility is used to adjust the display’s behavior. Topic Display/Display Settings. Summary This utility is used to manage or add user accounts to the PC.User Accounts. This utility is used to manage how folders are represented on the PC.Folder Options. This utility provides system information and access to sub-utilities for control.System. This utility is an on or off software-based firewall that is used to provide security to the PC.Windows Firewall. This utility allows you to set power usage profiles for given power outage scenarios.Power Options
  • 18. This workforce solution was 100 percent funded by a $3 million grant awarded by the U.S. Department of Labor's Employment and Training Administration. The solution was created by the grantee and does not necessarily reflect the official position of the U.S. Department of Labor. The Department of Labor makes no guarantees, warranties, or assurances of any kind, express or implied, with respect to such information, including any information on linked sites and including, but not limited to, accuracy of the information or its completeness, timeliness, usefulness, adequacy, continued availability or ownership. Funded by the Department of Labor, Employment and Training Administration, Grant #TC-23745-12-60-A-53. PACE-IT is an equal opportunity employer/program and auxiliary aids and services are available upon request to individuals with disabilities. For those that are hearing impaired, a video phone is available at the Services for Students with Disabilities (SSD) office in Mountlake Terrace Hall 159. Check www.edcc.edu/ssd for office hours. Call 425.354.3113 on a video phone for more information about the PACE-IT program. For any additional special accommodations needed, call the SSD office at 425.640.1814. Edmonds Community College does not discriminate on the basis of race; color; religion; national origin; sex; disability; sexual orientation; age; citizenship, marital, or veteran status; or genetic information in its programs and activities.