SlideShare ist ein Scribd-Unternehmen logo
1 von 13
Laptop features.
Page 2
Instructor, PACE-IT Program – Edmonds Community College
Areas of Expertise Industry Certifications
 PC Hardware
 Network Administration
 IT Project Management
 Network Design
 User Training
 IT Troubleshooting
Qualifications Summary
Education
 M.B.A., IT Management, Western Governor’s University
 B.S., IT Security, Western Governor’s University
Entrepreneur, executive leader, and proven manger
with 10+ years of experience turning complex issues
into efficient and effective solutions.
Strengths include developing and mentoring diverse
workforces, improving processes, analyzing
business needs and creating the solutions
required— with a focus on technology.
Page 3
– Special function keys.
– Docking stations vs. port replicators.
– Portability issues.
PACE-IT.
Page 4
Laptop features.
Page 5
Laptops are a type of mobile
device that allow the user to
take a significant amount of
computing power to almost
any place.
This does come with some tradeoffs though. The
smaller form factor and portability mean that some
concessions and adaptations occur. Most often, the
laptop doesn’t have the same number of ports for
connecting devices as the desktop. Additionally, the
monitors and keyboards tend to be smaller.
On the plus side, many laptops have features built
into them that are not present in most desktop
computers.
Laptop features.
Page 6
– Additional keyboard features.
» Laptop manufacturers have added some capabilities and
options to laptops that are commonly accessed through the
keyboard.
» These features are typically engaged through using a special
function (Fn) key. Depressing the Fn key and then another key
will access the desired action. Some of these include the ability
to:
• Output the display to another monitor or projector.
• Turn up or down the volume.
• Adjust the screen brightness (which can result in either a
longer or shorter battery time).
• Turn on or off a keyboard backlight (useful for when working
in a dimly lit environment).
• Turn on or off Bluetooth connectivity.
• Turn on or off wireless networking capability.
» The Fn keys that are present, their placement, and their actual
function is determined by the manufacturer.
Laptop features.
Page 7
Laptop features.
Page 8
– Purpose.
» To extend or expand the functionality and capabilities of the
laptop.
• Because of the form factor, laptops often have less ports
available for peripheral devices to connect to and they tend to
have smaller displays.
– Docking stations.
» Transforming the laptop experience into more of a desktop
experience.
• Designed and built for a specific laptop. The laptop is placed
in the docking station, which offers a dedicated connection to
external peripherals (like a full size monitor, keyboard, and
mouse). Plugging the laptop into the docking station
automatically engages the desired peripherals.
– Port replicators.
» May be designed for the specific laptop or be more generic in
nature.
» Adds more available ports and options to the laptop.
Laptop features.
Page 9
Laptop features.
Page 10
– The problem.
» Laptops are very portable (almost the whole reason for their
existence), which makes them easy for a thief to steal.
– The solutions.
» Many laptop manufacturers have built lock slots into their
laptops.
• A cable (like a bicycle lock cable) is placed around a secure
object and then the special lock is inserted into the laptop’s
lock slot. This will not stop the determined thief, but it will
reduce the risk of loss.
» There are also add-on cable lock options.
• Work almost exactly the same as the built in lock slot.
» A tracking service (like LoJack).
• Tracking services will not stop the loss of a laptop; however,
they may help in the recovery of a stolen or lost laptop.
• Many tracking services offer more than just tracking. They
may also offer the ability to remote lock or wipe the device.
Laptop features.
Page 11
Laptop features.
Laptops offer special Fn keys with options that are not present in the
desktop. Examples include: the ability to output to different displays,
volume control, screen brightness control, keyboard backlight control, and
the ability to turn Bluetooth and wireless networking connectivity on and off.
Topic
Special function keys.
Summary
The docking station is built with a specific laptop in mind. The goal is to
make the laptop experience into more of a desktop computer experience.
The port replicator may be built for a specific laptop or it may be more
generic. The goal of the replicator is to offer more ports for connectivity than
are available on the laptop.
Docking stations vs. port
replicators.
Laptops are portable and tend to make easy targets for thieves.
Manufacturers often build in lock slots to be used with cable locks to help
deter theft. Add-on cable locks are also available. A tracking service may
not prevent a loss, but it can aid in the recovery of a lost laptop. Some
tracking services also offer the ability to remote lock or wipe the lost laptop.
Portability issues.
Page 12
THANK YOU!
This workforce solution was 100 percent funded by a $3 million grant awarded by the
U.S. Department of Labor's Employment and Training Administration. The solution was
created by the grantee and does not necessarily reflect the official position of the U.S.
Department of Labor. The Department of Labor makes no guarantees, warranties, or
assurances of any kind, express or implied, with respect to such information, including
any information on linked sites and including, but not limited to, accuracy of the
information or its completeness, timeliness, usefulness, adequacy, continued availability
or ownership. Funded by the Department of Labor, Employment and Training
Administration, Grant #TC-23745-12-60-A-53.
PACE-IT is an equal opportunity employer/program and auxiliary aids and services are
available upon request to individuals with disabilities. For those that are hearing
impaired, a video phone is available at the Services for Students with Disabilities (SSD)
office in Mountlake Terrace Hall 159. Check www.edcc.edu/ssd for office hours. Call
425.354.3113 on a video phone for more information about the PACE-IT program. For
any additional special accommodations needed, call the SSD office at 425.640.1814.
Edmonds Community College does not discriminate on the basis of race; color; religion;
national origin; sex; disability; sexual orientation; age; citizenship, marital, or veteran
status; or genetic information in its programs and activities.

Weitere ähnliche Inhalte

Was ist angesagt?

Mobile Execution Env
Mobile Execution EnvMobile Execution Env
Mobile Execution EnvRohit Joshi
 
Buying A Computer
Buying A ComputerBuying A Computer
Buying A Computerkkdiener
 
Prepare to use a personal computer
 Prepare to use a personal computer Prepare to use a personal computer
Prepare to use a personal computerlynettecallaghan
 
Importance of computer name anand agrawal
Importance of computer name anand agrawalImportance of computer name anand agrawal
Importance of computer name anand agrawalanand agrawal
 
Can A PC Make A Good Phone
Can A PC Make A Good PhoneCan A PC Make A Good Phone
Can A PC Make A Good Phoneekrapf
 
Future Evolution of New Media
Future Evolution of New MediaFuture Evolution of New Media
Future Evolution of New Mediamzucca36
 
Dell Web PC - Case Study
Dell Web PC - Case StudyDell Web PC - Case Study
Dell Web PC - Case StudyYousuf Rafi
 
In Brief - Technology and Teaching: Tablet devices presentation
In Brief -  Technology and Teaching: Tablet devices presentationIn Brief -  Technology and Teaching: Tablet devices presentation
In Brief - Technology and Teaching: Tablet devices presentationJisc RSC East Midlands
 
Realistic computes Methods Described
Realistic computes Methods DescribedRealistic computes Methods Described
Realistic computes Methods Describedsuccinctdome5314
 
Disruption And VoIp
Disruption And VoIpDisruption And VoIp
Disruption And VoIpUrian1983
 
2.3 people and ict systems
2.3 people and ict systems2.3 people and ict systems
2.3 people and ict systemsmrmwood
 
Rsc east midlands in brief series tablet devices
Rsc east midlands in brief series tablet devicesRsc east midlands in brief series tablet devices
Rsc east midlands in brief series tablet devicesben.williams
 
Shoppers guide presentation
Shoppers guide presentationShoppers guide presentation
Shoppers guide presentationwerlocka
 

Was ist angesagt? (15)

Mobile Execution Env
Mobile Execution EnvMobile Execution Env
Mobile Execution Env
 
Buying A Computer
Buying A ComputerBuying A Computer
Buying A Computer
 
Prepare to use a personal computer
 Prepare to use a personal computer Prepare to use a personal computer
Prepare to use a personal computer
 
Laptops of 2018 ppt
Laptops of 2018 pptLaptops of 2018 ppt
Laptops of 2018 ppt
 
Importance of computer name anand agrawal
Importance of computer name anand agrawalImportance of computer name anand agrawal
Importance of computer name anand agrawal
 
P2 unit 3
P2 unit 3P2 unit 3
P2 unit 3
 
Can A PC Make A Good Phone
Can A PC Make A Good PhoneCan A PC Make A Good Phone
Can A PC Make A Good Phone
 
Future Evolution of New Media
Future Evolution of New MediaFuture Evolution of New Media
Future Evolution of New Media
 
Dell Web PC - Case Study
Dell Web PC - Case StudyDell Web PC - Case Study
Dell Web PC - Case Study
 
In Brief - Technology and Teaching: Tablet devices presentation
In Brief -  Technology and Teaching: Tablet devices presentationIn Brief -  Technology and Teaching: Tablet devices presentation
In Brief - Technology and Teaching: Tablet devices presentation
 
Realistic computes Methods Described
Realistic computes Methods DescribedRealistic computes Methods Described
Realistic computes Methods Described
 
Disruption And VoIp
Disruption And VoIpDisruption And VoIp
Disruption And VoIp
 
2.3 people and ict systems
2.3 people and ict systems2.3 people and ict systems
2.3 people and ict systems
 
Rsc east midlands in brief series tablet devices
Rsc east midlands in brief series tablet devicesRsc east midlands in brief series tablet devices
Rsc east midlands in brief series tablet devices
 
Shoppers guide presentation
Shoppers guide presentationShoppers guide presentation
Shoppers guide presentation
 

Andere mochten auch

Five features of a good laptop
Five features of a good laptopFive features of a good laptop
Five features of a good laptopKay JJ
 
I-Lappy- the Future Laptop
I-Lappy- the Future LaptopI-Lappy- the Future Laptop
I-Lappy- the Future LaptopSukumar Perneti
 
Blog ppt
Blog pptBlog ppt
Blog pptsneha_v
 
COMPUTERS
COMPUTERSCOMPUTERS
COMPUTERSaimanjaved
 
Shapes of computers
Shapes of computersShapes of computers
Shapes of computersSABurki
 
Hitesh ppt
Hitesh pptHitesh ppt
Hitesh ppthitesh_g
 
Helpful Features Of A Smartphone
Helpful Features Of A SmartphoneHelpful Features Of A Smartphone
Helpful Features Of A SmartphoneMehroosa Hasan
 
Smartphone and its features
Smartphone and its features Smartphone and its features
Smartphone and its features Liton Ahmed
 
The IPO Model of Evaluation (Input-Process-Output)
The IPO Model of Evaluation (Input-Process-Output)The IPO Model of Evaluation (Input-Process-Output)
The IPO Model of Evaluation (Input-Process-Output)Janilo Sarmiento
 
Data and Information - Input, Process and Output
Data and Information - Input, Process and OutputData and Information - Input, Process and Output
Data and Information - Input, Process and Outputshiplakeict
 

Andere mochten auch (20)

Five features of a good laptop
Five features of a good laptopFive features of a good laptop
Five features of a good laptop
 
I-Lappy- the Future Laptop
I-Lappy- the Future LaptopI-Lappy- the Future Laptop
I-Lappy- the Future Laptop
 
Transparent LCD Display Catalogue-InnoGlass
Transparent LCD Display Catalogue-InnoGlassTransparent LCD Display Catalogue-InnoGlass
Transparent LCD Display Catalogue-InnoGlass
 
Blog ppt
Blog pptBlog ppt
Blog ppt
 
Presentation1
Presentation1Presentation1
Presentation1
 
COMPUTERS
COMPUTERSCOMPUTERS
COMPUTERS
 
Shapes of computers
Shapes of computersShapes of computers
Shapes of computers
 
Hitesh ppt
Hitesh pptHitesh ppt
Hitesh ppt
 
Helpful Features Of A Smartphone
Helpful Features Of A SmartphoneHelpful Features Of A Smartphone
Helpful Features Of A Smartphone
 
Supercomputer final
Supercomputer finalSupercomputer final
Supercomputer final
 
Lecture 3
Lecture 3Lecture 3
Lecture 3
 
Smartphone and its features
Smartphone and its features Smartphone and its features
Smartphone and its features
 
Tablet pc
Tablet pcTablet pc
Tablet pc
 
Super computer
Super computerSuper computer
Super computer
 
supercomputer
supercomputersupercomputer
supercomputer
 
Classification of computers
Classification of computers Classification of computers
Classification of computers
 
The IPO Model of Evaluation (Input-Process-Output)
The IPO Model of Evaluation (Input-Process-Output)The IPO Model of Evaluation (Input-Process-Output)
The IPO Model of Evaluation (Input-Process-Output)
 
Types of Computer
Types of ComputerTypes of Computer
Types of Computer
 
Data and Information - Input, Process and Output
Data and Information - Input, Process and OutputData and Information - Input, Process and Output
Data and Information - Input, Process and Output
 
Classification of computers
Classification of computersClassification of computers
Classification of computers
 

Ă„hnlich wie Pace IT - Laptop Features

Pace it common-laptop_components_sw_nm
Pace it common-laptop_components_sw_nmPace it common-laptop_components_sw_nm
Pace it common-laptop_components_sw_nmEdward Sargent
 
Computers and Technology.
Computers and Technology.Computers and Technology.
Computers and Technology.Nathan999531
 
Feasibility study of setting up a computer store chapter 1-5
Feasibility study of setting up a computer store chapter 1-5Feasibility study of setting up a computer store chapter 1-5
Feasibility study of setting up a computer store chapter 1-5Christofer De Los Reyes
 
Tablet PC AMATYC 2009
Tablet PC AMATYC 2009Tablet PC AMATYC 2009
Tablet PC AMATYC 2009Fred Feldon
 
Webinar - How to Select the Right Computer Hardware for YOUR Organization - 2...
Webinar - How to Select the Right Computer Hardware for YOUR Organization - 2...Webinar - How to Select the Right Computer Hardware for YOUR Organization - 2...
Webinar - How to Select the Right Computer Hardware for YOUR Organization - 2...TechSoup
 
Benefits of computer training
Benefits  of computer  trainingBenefits  of computer  training
Benefits of computer trainingjatin batra
 
Pace it custom-configurations_sw_nm
Pace it custom-configurations_sw_nmPace it custom-configurations_sw_nm
Pace it custom-configurations_sw_nmEdward Sargent
 

Ă„hnlich wie Pace IT - Laptop Features (20)

Pace it common-laptop_components_sw_nm
Pace it common-laptop_components_sw_nmPace it common-laptop_components_sw_nm
Pace it common-laptop_components_sw_nm
 
Pace IT - Troubleshooting Laptops
Pace IT - Troubleshooting LaptopsPace IT - Troubleshooting Laptops
Pace IT - Troubleshooting Laptops
 
Pace IT - Basic Mobile Device
Pace IT - Basic Mobile DevicePace IT - Basic Mobile Device
Pace IT - Basic Mobile Device
 
Pace IT - Peripheral Devices
Pace IT - Peripheral DevicesPace IT - Peripheral Devices
Pace IT - Peripheral Devices
 
Pace IT - Client Networking (Part 3)
Pace IT - Client Networking (Part 3)Pace IT - Client Networking (Part 3)
Pace IT - Client Networking (Part 3)
 
Computers and Technology.
Computers and Technology.Computers and Technology.
Computers and Technology.
 
Feasibility study of setting up a computer store chapter 1-5
Feasibility study of setting up a computer store chapter 1-5Feasibility study of setting up a computer store chapter 1-5
Feasibility study of setting up a computer store chapter 1-5
 
Pace IT - Expansion Cards
Pace IT - Expansion CardsPace IT - Expansion Cards
Pace IT - Expansion Cards
 
Pace IT - Control Panel (Part 3)
Pace IT - Control Panel (Part 3)Pace IT - Control Panel (Part 3)
Pace IT - Control Panel (Part 3)
 
Tablet PC AMATYC 2009
Tablet PC AMATYC 2009Tablet PC AMATYC 2009
Tablet PC AMATYC 2009
 
Webinar - How to Select the Right Computer Hardware for YOUR Organization - 2...
Webinar - How to Select the Right Computer Hardware for YOUR Organization - 2...Webinar - How to Select the Right Computer Hardware for YOUR Organization - 2...
Webinar - How to Select the Right Computer Hardware for YOUR Organization - 2...
 
Benefits of computer training
Benefits  of computer  trainingBenefits  of computer  training
Benefits of computer training
 
Pace IT - Introduction to_the_Motherboard
Pace IT - Introduction to_the_MotherboardPace IT - Introduction to_the_Motherboard
Pace IT - Introduction to_the_Motherboard
 
PACE-IT: Network Infrastructure Implementations - N10 006
PACE-IT: Network Infrastructure Implementations - N10 006 PACE-IT: Network Infrastructure Implementations - N10 006
PACE-IT: Network Infrastructure Implementations - N10 006
 
Pano Logic Quick Start 100709
Pano Logic Quick Start 100709Pano Logic Quick Start 100709
Pano Logic Quick Start 100709
 
PACE-IT: Analyzing Monitoring Reports
PACE-IT: Analyzing Monitoring ReportsPACE-IT: Analyzing Monitoring Reports
PACE-IT: Analyzing Monitoring Reports
 
Pace IT - Admin Tools (Part 1)
Pace IT - Admin Tools (Part 1)Pace IT - Admin Tools (Part 1)
Pace IT - Admin Tools (Part 1)
 
Pace IT - Control Panel (Part 2)
Pace IT - Control Panel (Part 2)Pace IT - Control Panel (Part 2)
Pace IT - Control Panel (Part 2)
 
Pace IT - Custom Configurations
Pace IT - Custom ConfigurationsPace IT - Custom Configurations
Pace IT - Custom Configurations
 
Pace it custom-configurations_sw_nm
Pace it custom-configurations_sw_nmPace it custom-configurations_sw_nm
Pace it custom-configurations_sw_nm
 

Mehr von Pace IT at Edmonds Community College

PACE-IT, Security+ 6.3: Introduction to Public Key Infrastructure (part 2)
PACE-IT, Security+ 6.3: Introduction to Public Key Infrastructure (part 2)PACE-IT, Security+ 6.3: Introduction to Public Key Infrastructure (part 2)
PACE-IT, Security+ 6.3: Introduction to Public Key Infrastructure (part 2)Pace IT at Edmonds Community College
 
PACE-IT, Security+ 6.3: Introduction to Public Key Infrastructure (part 1)
PACE-IT, Security+ 6.3: Introduction to Public Key Infrastructure (part 1)PACE-IT, Security+ 6.3: Introduction to Public Key Infrastructure (part 1)
PACE-IT, Security+ 6.3: Introduction to Public Key Infrastructure (part 1)Pace IT at Edmonds Community College
 
PACE-IT, Security+ 6.1: Introduction to Cryptography (part 1)
PACE-IT, Security+ 6.1: Introduction to Cryptography (part 1)PACE-IT, Security+ 6.1: Introduction to Cryptography (part 1)
PACE-IT, Security+ 6.1: Introduction to Cryptography (part 1)Pace IT at Edmonds Community College
 
PACE-IT, Security+ 6.1: Introduction to Cryptography (part 2)
PACE-IT, Security+ 6.1: Introduction to Cryptography (part 2)PACE-IT, Security+ 6.1: Introduction to Cryptography (part 2)
PACE-IT, Security+ 6.1: Introduction to Cryptography (part 2)Pace IT at Edmonds Community College
 
PACE-IT, Security + 5.3: Security Controls for Account Management
PACE-IT, Security + 5.3: Security Controls for Account ManagementPACE-IT, Security + 5.3: Security Controls for Account Management
PACE-IT, Security + 5.3: Security Controls for Account ManagementPace IT at Edmonds Community College
 
PACE-IT, Security + 5.2: Authentication and Authorization Basics (part 2)
PACE-IT, Security + 5.2: Authentication and Authorization Basics (part 2)PACE-IT, Security + 5.2: Authentication and Authorization Basics (part 2)
PACE-IT, Security + 5.2: Authentication and Authorization Basics (part 2)Pace IT at Edmonds Community College
 
PACE-IT, Security + 5.2: Authentication and Authorization Basics (part 1)
PACE-IT, Security + 5.2: Authentication and Authorization Basics (part 1)PACE-IT, Security + 5.2: Authentication and Authorization Basics (part 1)
PACE-IT, Security + 5.2: Authentication and Authorization Basics (part 1)Pace IT at Edmonds Community College
 
PACE-IT, Security+ 4.2: Mobile Security Concepts and Technologies (part 1)
PACE-IT, Security+ 4.2: Mobile Security Concepts and Technologies (part 1)PACE-IT, Security+ 4.2: Mobile Security Concepts and Technologies (part 1)
PACE-IT, Security+ 4.2: Mobile Security Concepts and Technologies (part 1)Pace IT at Edmonds Community College
 
PACE-IT, Security+ 4.1: Application Security Controls and Techniques
PACE-IT, Security+ 4.1: Application Security Controls and TechniquesPACE-IT, Security+ 4.1: Application Security Controls and Techniques
PACE-IT, Security+ 4.1: Application Security Controls and TechniquesPace IT at Edmonds Community College
 
PACE-IT, Security+ 4.5: Mitigating Risks in Alternative Environments
PACE-IT, Security+ 4.5: Mitigating Risks in Alternative EnvironmentsPACE-IT, Security+ 4.5: Mitigating Risks in Alternative Environments
PACE-IT, Security+ 4.5: Mitigating Risks in Alternative EnvironmentsPace IT at Edmonds Community College
 
PACE-IT, Security+ 4.3: Solutions to Establish Host Security
PACE-IT, Security+ 4.3: Solutions to Establish Host SecurityPACE-IT, Security+ 4.3: Solutions to Establish Host Security
PACE-IT, Security+ 4.3: Solutions to Establish Host SecurityPace IT at Edmonds Community College
 
PACE-IT, Security+ 4.2: Mobile Security Concepts and Technologies (part 2)
PACE-IT, Security+ 4.2: Mobile Security Concepts and Technologies (part 2)PACE-IT, Security+ 4.2: Mobile Security Concepts and Technologies (part 2)
PACE-IT, Security+ 4.2: Mobile Security Concepts and Technologies (part 2)Pace IT at Edmonds Community College
 
PACE-IT, Security+3.7: Overview of Security Assessment Tools
PACE-IT, Security+3.7: Overview of Security Assessment ToolsPACE-IT, Security+3.7: Overview of Security Assessment Tools
PACE-IT, Security+3.7: Overview of Security Assessment ToolsPace IT at Edmonds Community College
 
PACE-IT, Security+3.5: Types of Application Attacks (part 2)
PACE-IT, Security+3.5: Types of Application Attacks (part 2)PACE-IT, Security+3.5: Types of Application Attacks (part 2)
PACE-IT, Security+3.5: Types of Application Attacks (part 2)Pace IT at Edmonds Community College
 
PACE-IT, Security+3.5: Types of Application Attacks (part 1)
PACE-IT, Security+3.5: Types of Application Attacks (part 1)PACE-IT, Security+3.5: Types of Application Attacks (part 1)
PACE-IT, Security+3.5: Types of Application Attacks (part 1)Pace IT at Edmonds Community College
 

Mehr von Pace IT at Edmonds Community College (20)

PACE-IT, Security+ 6.3: Introduction to Public Key Infrastructure (part 2)
PACE-IT, Security+ 6.3: Introduction to Public Key Infrastructure (part 2)PACE-IT, Security+ 6.3: Introduction to Public Key Infrastructure (part 2)
PACE-IT, Security+ 6.3: Introduction to Public Key Infrastructure (part 2)
 
PACE-IT, Security+ 6.3: Introduction to Public Key Infrastructure (part 1)
PACE-IT, Security+ 6.3: Introduction to Public Key Infrastructure (part 1)PACE-IT, Security+ 6.3: Introduction to Public Key Infrastructure (part 1)
PACE-IT, Security+ 6.3: Introduction to Public Key Infrastructure (part 1)
 
PACE-IT, Security+ 6.2: Cryptographic Methods (part 2)
PACE-IT, Security+ 6.2: Cryptographic Methods (part 2)PACE-IT, Security+ 6.2: Cryptographic Methods (part 2)
PACE-IT, Security+ 6.2: Cryptographic Methods (part 2)
 
PACE-IT, Security+ 6.2: Cryptographic Methods (part 1)
PACE-IT, Security+ 6.2: Cryptographic Methods (part 1)PACE-IT, Security+ 6.2: Cryptographic Methods (part 1)
PACE-IT, Security+ 6.2: Cryptographic Methods (part 1)
 
PACE-IT, Security+ 6.1: Introduction to Cryptography (part 1)
PACE-IT, Security+ 6.1: Introduction to Cryptography (part 1)PACE-IT, Security+ 6.1: Introduction to Cryptography (part 1)
PACE-IT, Security+ 6.1: Introduction to Cryptography (part 1)
 
PACE-IT, Security+ 6.1: Introduction to Cryptography (part 2)
PACE-IT, Security+ 6.1: Introduction to Cryptography (part 2)PACE-IT, Security+ 6.1: Introduction to Cryptography (part 2)
PACE-IT, Security+ 6.1: Introduction to Cryptography (part 2)
 
PACE-IT, Security + 5.3: Security Controls for Account Management
PACE-IT, Security + 5.3: Security Controls for Account ManagementPACE-IT, Security + 5.3: Security Controls for Account Management
PACE-IT, Security + 5.3: Security Controls for Account Management
 
PACE-IT, Security + 5.2: Authentication and Authorization Basics (part 2)
PACE-IT, Security + 5.2: Authentication and Authorization Basics (part 2)PACE-IT, Security + 5.2: Authentication and Authorization Basics (part 2)
PACE-IT, Security + 5.2: Authentication and Authorization Basics (part 2)
 
PACE-IT, Security + 5.2: Authentication and Authorization Basics (part 1)
PACE-IT, Security + 5.2: Authentication and Authorization Basics (part 1)PACE-IT, Security + 5.2: Authentication and Authorization Basics (part 1)
PACE-IT, Security + 5.2: Authentication and Authorization Basics (part 1)
 
PACE-IT, Security + 5.1: Summary of Authentication Services
PACE-IT, Security + 5.1: Summary of Authentication ServicesPACE-IT, Security + 5.1: Summary of Authentication Services
PACE-IT, Security + 5.1: Summary of Authentication Services
 
PACE-IT, Security+ 4.2: Mobile Security Concepts and Technologies (part 1)
PACE-IT, Security+ 4.2: Mobile Security Concepts and Technologies (part 1)PACE-IT, Security+ 4.2: Mobile Security Concepts and Technologies (part 1)
PACE-IT, Security+ 4.2: Mobile Security Concepts and Technologies (part 1)
 
PACE-IT, Security+ 4.1: Application Security Controls and Techniques
PACE-IT, Security+ 4.1: Application Security Controls and TechniquesPACE-IT, Security+ 4.1: Application Security Controls and Techniques
PACE-IT, Security+ 4.1: Application Security Controls and Techniques
 
PACE-IT, Security+ 4.5: Mitigating Risks in Alternative Environments
PACE-IT, Security+ 4.5: Mitigating Risks in Alternative EnvironmentsPACE-IT, Security+ 4.5: Mitigating Risks in Alternative Environments
PACE-IT, Security+ 4.5: Mitigating Risks in Alternative Environments
 
PACE-IT, Security+ 4.4: Controls to Ensure Data Security
PACE-IT, Security+ 4.4: Controls to Ensure Data SecurityPACE-IT, Security+ 4.4: Controls to Ensure Data Security
PACE-IT, Security+ 4.4: Controls to Ensure Data Security
 
PACE-IT, Security+ 4.3: Solutions to Establish Host Security
PACE-IT, Security+ 4.3: Solutions to Establish Host SecurityPACE-IT, Security+ 4.3: Solutions to Establish Host Security
PACE-IT, Security+ 4.3: Solutions to Establish Host Security
 
PACE-IT, Security+ 4.2: Mobile Security Concepts and Technologies (part 2)
PACE-IT, Security+ 4.2: Mobile Security Concepts and Technologies (part 2)PACE-IT, Security+ 4.2: Mobile Security Concepts and Technologies (part 2)
PACE-IT, Security+ 4.2: Mobile Security Concepts and Technologies (part 2)
 
PACE-IT, Security+3.7: Overview of Security Assessment Tools
PACE-IT, Security+3.7: Overview of Security Assessment ToolsPACE-IT, Security+3.7: Overview of Security Assessment Tools
PACE-IT, Security+3.7: Overview of Security Assessment Tools
 
PACE-IT, Security+3.6: Security Enhancement Techniques
PACE-IT, Security+3.6: Security Enhancement TechniquesPACE-IT, Security+3.6: Security Enhancement Techniques
PACE-IT, Security+3.6: Security Enhancement Techniques
 
PACE-IT, Security+3.5: Types of Application Attacks (part 2)
PACE-IT, Security+3.5: Types of Application Attacks (part 2)PACE-IT, Security+3.5: Types of Application Attacks (part 2)
PACE-IT, Security+3.5: Types of Application Attacks (part 2)
 
PACE-IT, Security+3.5: Types of Application Attacks (part 1)
PACE-IT, Security+3.5: Types of Application Attacks (part 1)PACE-IT, Security+3.5: Types of Application Attacks (part 1)
PACE-IT, Security+3.5: Types of Application Attacks (part 1)
 

KĂĽrzlich hochgeladen

Influencing policy (training slides from Fast Track Impact)
Influencing policy (training slides from Fast Track Impact)Influencing policy (training slides from Fast Track Impact)
Influencing policy (training slides from Fast Track Impact)Mark Reed
 
MULTIDISCIPLINRY NATURE OF THE ENVIRONMENTAL STUDIES.pptx
MULTIDISCIPLINRY NATURE OF THE ENVIRONMENTAL STUDIES.pptxMULTIDISCIPLINRY NATURE OF THE ENVIRONMENTAL STUDIES.pptx
MULTIDISCIPLINRY NATURE OF THE ENVIRONMENTAL STUDIES.pptxAnupkumar Sharma
 
Visit to a blind student's school🧑‍🦯🧑‍🦯(community medicine)
Visit to a blind student's school🧑‍🦯🧑‍🦯(community medicine)Visit to a blind student's school🧑‍🦯🧑‍🦯(community medicine)
Visit to a blind student's school🧑‍🦯🧑‍🦯(community medicine)lakshayb543
 
Earth Day Presentation wow hello nice great
Earth Day Presentation wow hello nice greatEarth Day Presentation wow hello nice great
Earth Day Presentation wow hello nice greatYousafMalik24
 
THEORIES OF ORGANIZATION-PUBLIC ADMINISTRATION
THEORIES OF ORGANIZATION-PUBLIC ADMINISTRATIONTHEORIES OF ORGANIZATION-PUBLIC ADMINISTRATION
THEORIES OF ORGANIZATION-PUBLIC ADMINISTRATIONHumphrey A Beña
 
How to Add Barcode on PDF Report in Odoo 17
How to Add Barcode on PDF Report in Odoo 17How to Add Barcode on PDF Report in Odoo 17
How to Add Barcode on PDF Report in Odoo 17Celine George
 
Incoming and Outgoing Shipments in 3 STEPS Using Odoo 17
Incoming and Outgoing Shipments in 3 STEPS Using Odoo 17Incoming and Outgoing Shipments in 3 STEPS Using Odoo 17
Incoming and Outgoing Shipments in 3 STEPS Using Odoo 17Celine George
 
call girls in Kamla Market (DELHI) 🔝 >༒9953330565🔝 genuine Escort Service 🔝✔️✔️
call girls in Kamla Market (DELHI) 🔝 >༒9953330565🔝 genuine Escort Service 🔝✔️✔️call girls in Kamla Market (DELHI) 🔝 >༒9953330565🔝 genuine Escort Service 🔝✔️✔️
call girls in Kamla Market (DELHI) 🔝 >༒9953330565🔝 genuine Escort Service 🔝✔️✔️9953056974 Low Rate Call Girls In Saket, Delhi NCR
 
Proudly South Africa powerpoint Thorisha.pptx
Proudly South Africa powerpoint Thorisha.pptxProudly South Africa powerpoint Thorisha.pptx
Proudly South Africa powerpoint Thorisha.pptxthorishapillay1
 
ISYU TUNGKOL SA SEKSWLADIDA (ISSUE ABOUT SEXUALITY
ISYU TUNGKOL SA SEKSWLADIDA (ISSUE ABOUT SEXUALITYISYU TUNGKOL SA SEKSWLADIDA (ISSUE ABOUT SEXUALITY
ISYU TUNGKOL SA SEKSWLADIDA (ISSUE ABOUT SEXUALITYKayeClaireEstoconing
 
USPS® Forced Meter Migration - How to Know if Your Postage Meter Will Soon be...
USPS® Forced Meter Migration - How to Know if Your Postage Meter Will Soon be...USPS® Forced Meter Migration - How to Know if Your Postage Meter Will Soon be...
USPS® Forced Meter Migration - How to Know if Your Postage Meter Will Soon be...Postal Advocate Inc.
 
Inclusivity Essentials_ Creating Accessible Websites for Nonprofits .pdf
Inclusivity Essentials_ Creating Accessible Websites for Nonprofits .pdfInclusivity Essentials_ Creating Accessible Websites for Nonprofits .pdf
Inclusivity Essentials_ Creating Accessible Websites for Nonprofits .pdfTechSoup
 
ANG SEKTOR NG agrikultura.pptx QUARTER 4
ANG SEKTOR NG agrikultura.pptx QUARTER 4ANG SEKTOR NG agrikultura.pptx QUARTER 4
ANG SEKTOR NG agrikultura.pptx QUARTER 4MiaBumagat1
 
ACC 2024 Chronicles. Cardiology. Exam.pdf
ACC 2024 Chronicles. Cardiology. Exam.pdfACC 2024 Chronicles. Cardiology. Exam.pdf
ACC 2024 Chronicles. Cardiology. Exam.pdfSpandanaRallapalli
 
Grade 9 Q4-MELC1-Active and Passive Voice.pptx
Grade 9 Q4-MELC1-Active and Passive Voice.pptxGrade 9 Q4-MELC1-Active and Passive Voice.pptx
Grade 9 Q4-MELC1-Active and Passive Voice.pptxChelloAnnAsuncion2
 
Gas measurement O2,Co2,& ph) 04/2024.pptx
Gas measurement O2,Co2,& ph) 04/2024.pptxGas measurement O2,Co2,& ph) 04/2024.pptx
Gas measurement O2,Co2,& ph) 04/2024.pptxDr.Ibrahim Hassaan
 
ECONOMIC CONTEXT - LONG FORM TV DRAMA - PPT
ECONOMIC CONTEXT - LONG FORM TV DRAMA - PPTECONOMIC CONTEXT - LONG FORM TV DRAMA - PPT
ECONOMIC CONTEXT - LONG FORM TV DRAMA - PPTiammrhaywood
 
Q4 English4 Week3 PPT Melcnmg-based.pptx
Q4 English4 Week3 PPT Melcnmg-based.pptxQ4 English4 Week3 PPT Melcnmg-based.pptx
Q4 English4 Week3 PPT Melcnmg-based.pptxnelietumpap1
 

KĂĽrzlich hochgeladen (20)

Influencing policy (training slides from Fast Track Impact)
Influencing policy (training slides from Fast Track Impact)Influencing policy (training slides from Fast Track Impact)
Influencing policy (training slides from Fast Track Impact)
 
MULTIDISCIPLINRY NATURE OF THE ENVIRONMENTAL STUDIES.pptx
MULTIDISCIPLINRY NATURE OF THE ENVIRONMENTAL STUDIES.pptxMULTIDISCIPLINRY NATURE OF THE ENVIRONMENTAL STUDIES.pptx
MULTIDISCIPLINRY NATURE OF THE ENVIRONMENTAL STUDIES.pptx
 
Visit to a blind student's school🧑‍🦯🧑‍🦯(community medicine)
Visit to a blind student's school🧑‍🦯🧑‍🦯(community medicine)Visit to a blind student's school🧑‍🦯🧑‍🦯(community medicine)
Visit to a blind student's school🧑‍🦯🧑‍🦯(community medicine)
 
LEFT_ON_C'N_ PRELIMS_EL_DORADO_2024.pptx
LEFT_ON_C'N_ PRELIMS_EL_DORADO_2024.pptxLEFT_ON_C'N_ PRELIMS_EL_DORADO_2024.pptx
LEFT_ON_C'N_ PRELIMS_EL_DORADO_2024.pptx
 
Earth Day Presentation wow hello nice great
Earth Day Presentation wow hello nice greatEarth Day Presentation wow hello nice great
Earth Day Presentation wow hello nice great
 
THEORIES OF ORGANIZATION-PUBLIC ADMINISTRATION
THEORIES OF ORGANIZATION-PUBLIC ADMINISTRATIONTHEORIES OF ORGANIZATION-PUBLIC ADMINISTRATION
THEORIES OF ORGANIZATION-PUBLIC ADMINISTRATION
 
How to Add Barcode on PDF Report in Odoo 17
How to Add Barcode on PDF Report in Odoo 17How to Add Barcode on PDF Report in Odoo 17
How to Add Barcode on PDF Report in Odoo 17
 
Incoming and Outgoing Shipments in 3 STEPS Using Odoo 17
Incoming and Outgoing Shipments in 3 STEPS Using Odoo 17Incoming and Outgoing Shipments in 3 STEPS Using Odoo 17
Incoming and Outgoing Shipments in 3 STEPS Using Odoo 17
 
call girls in Kamla Market (DELHI) 🔝 >༒9953330565🔝 genuine Escort Service 🔝✔️✔️
call girls in Kamla Market (DELHI) 🔝 >༒9953330565🔝 genuine Escort Service 🔝✔️✔️call girls in Kamla Market (DELHI) 🔝 >༒9953330565🔝 genuine Escort Service 🔝✔️✔️
call girls in Kamla Market (DELHI) 🔝 >༒9953330565🔝 genuine Escort Service 🔝✔️✔️
 
Proudly South Africa powerpoint Thorisha.pptx
Proudly South Africa powerpoint Thorisha.pptxProudly South Africa powerpoint Thorisha.pptx
Proudly South Africa powerpoint Thorisha.pptx
 
ISYU TUNGKOL SA SEKSWLADIDA (ISSUE ABOUT SEXUALITY
ISYU TUNGKOL SA SEKSWLADIDA (ISSUE ABOUT SEXUALITYISYU TUNGKOL SA SEKSWLADIDA (ISSUE ABOUT SEXUALITY
ISYU TUNGKOL SA SEKSWLADIDA (ISSUE ABOUT SEXUALITY
 
USPS® Forced Meter Migration - How to Know if Your Postage Meter Will Soon be...
USPS® Forced Meter Migration - How to Know if Your Postage Meter Will Soon be...USPS® Forced Meter Migration - How to Know if Your Postage Meter Will Soon be...
USPS® Forced Meter Migration - How to Know if Your Postage Meter Will Soon be...
 
Inclusivity Essentials_ Creating Accessible Websites for Nonprofits .pdf
Inclusivity Essentials_ Creating Accessible Websites for Nonprofits .pdfInclusivity Essentials_ Creating Accessible Websites for Nonprofits .pdf
Inclusivity Essentials_ Creating Accessible Websites for Nonprofits .pdf
 
ANG SEKTOR NG agrikultura.pptx QUARTER 4
ANG SEKTOR NG agrikultura.pptx QUARTER 4ANG SEKTOR NG agrikultura.pptx QUARTER 4
ANG SEKTOR NG agrikultura.pptx QUARTER 4
 
ACC 2024 Chronicles. Cardiology. Exam.pdf
ACC 2024 Chronicles. Cardiology. Exam.pdfACC 2024 Chronicles. Cardiology. Exam.pdf
ACC 2024 Chronicles. Cardiology. Exam.pdf
 
Grade 9 Q4-MELC1-Active and Passive Voice.pptx
Grade 9 Q4-MELC1-Active and Passive Voice.pptxGrade 9 Q4-MELC1-Active and Passive Voice.pptx
Grade 9 Q4-MELC1-Active and Passive Voice.pptx
 
TataKelola dan KamSiber Kecerdasan Buatan v022.pdf
TataKelola dan KamSiber Kecerdasan Buatan v022.pdfTataKelola dan KamSiber Kecerdasan Buatan v022.pdf
TataKelola dan KamSiber Kecerdasan Buatan v022.pdf
 
Gas measurement O2,Co2,& ph) 04/2024.pptx
Gas measurement O2,Co2,& ph) 04/2024.pptxGas measurement O2,Co2,& ph) 04/2024.pptx
Gas measurement O2,Co2,& ph) 04/2024.pptx
 
ECONOMIC CONTEXT - LONG FORM TV DRAMA - PPT
ECONOMIC CONTEXT - LONG FORM TV DRAMA - PPTECONOMIC CONTEXT - LONG FORM TV DRAMA - PPT
ECONOMIC CONTEXT - LONG FORM TV DRAMA - PPT
 
Q4 English4 Week3 PPT Melcnmg-based.pptx
Q4 English4 Week3 PPT Melcnmg-based.pptxQ4 English4 Week3 PPT Melcnmg-based.pptx
Q4 English4 Week3 PPT Melcnmg-based.pptx
 

Pace IT - Laptop Features

  • 2. Page 2 Instructor, PACE-IT Program – Edmonds Community College Areas of Expertise Industry Certifications  PC Hardware  Network Administration  IT Project Management  Network Design  User Training  IT Troubleshooting Qualifications Summary Education  M.B.A., IT Management, Western Governor’s University  B.S., IT Security, Western Governor’s University Entrepreneur, executive leader, and proven manger with 10+ years of experience turning complex issues into efficient and effective solutions. Strengths include developing and mentoring diverse workforces, improving processes, analyzing business needs and creating the solutions required— with a focus on technology.
  • 3. Page 3 – Special function keys. – Docking stations vs. port replicators. – Portability issues. PACE-IT.
  • 5. Page 5 Laptops are a type of mobile device that allow the user to take a significant amount of computing power to almost any place. This does come with some tradeoffs though. The smaller form factor and portability mean that some concessions and adaptations occur. Most often, the laptop doesn’t have the same number of ports for connecting devices as the desktop. Additionally, the monitors and keyboards tend to be smaller. On the plus side, many laptops have features built into them that are not present in most desktop computers. Laptop features.
  • 6. Page 6 – Additional keyboard features. » Laptop manufacturers have added some capabilities and options to laptops that are commonly accessed through the keyboard. » These features are typically engaged through using a special function (Fn) key. Depressing the Fn key and then another key will access the desired action. Some of these include the ability to: • Output the display to another monitor or projector. • Turn up or down the volume. • Adjust the screen brightness (which can result in either a longer or shorter battery time). • Turn on or off a keyboard backlight (useful for when working in a dimly lit environment). • Turn on or off Bluetooth connectivity. • Turn on or off wireless networking capability. » The Fn keys that are present, their placement, and their actual function is determined by the manufacturer. Laptop features.
  • 8. Page 8 – Purpose. » To extend or expand the functionality and capabilities of the laptop. • Because of the form factor, laptops often have less ports available for peripheral devices to connect to and they tend to have smaller displays. – Docking stations. » Transforming the laptop experience into more of a desktop experience. • Designed and built for a specific laptop. The laptop is placed in the docking station, which offers a dedicated connection to external peripherals (like a full size monitor, keyboard, and mouse). Plugging the laptop into the docking station automatically engages the desired peripherals. – Port replicators. » May be designed for the specific laptop or be more generic in nature. » Adds more available ports and options to the laptop. Laptop features.
  • 10. Page 10 – The problem. » Laptops are very portable (almost the whole reason for their existence), which makes them easy for a thief to steal. – The solutions. » Many laptop manufacturers have built lock slots into their laptops. • A cable (like a bicycle lock cable) is placed around a secure object and then the special lock is inserted into the laptop’s lock slot. This will not stop the determined thief, but it will reduce the risk of loss. » There are also add-on cable lock options. • Work almost exactly the same as the built in lock slot. » A tracking service (like LoJack). • Tracking services will not stop the loss of a laptop; however, they may help in the recovery of a stolen or lost laptop. • Many tracking services offer more than just tracking. They may also offer the ability to remote lock or wipe the device. Laptop features.
  • 11. Page 11 Laptop features. Laptops offer special Fn keys with options that are not present in the desktop. Examples include: the ability to output to different displays, volume control, screen brightness control, keyboard backlight control, and the ability to turn Bluetooth and wireless networking connectivity on and off. Topic Special function keys. Summary The docking station is built with a specific laptop in mind. The goal is to make the laptop experience into more of a desktop computer experience. The port replicator may be built for a specific laptop or it may be more generic. The goal of the replicator is to offer more ports for connectivity than are available on the laptop. Docking stations vs. port replicators. Laptops are portable and tend to make easy targets for thieves. Manufacturers often build in lock slots to be used with cable locks to help deter theft. Add-on cable locks are also available. A tracking service may not prevent a loss, but it can aid in the recovery of a lost laptop. Some tracking services also offer the ability to remote lock or wipe the lost laptop. Portability issues.
  • 13. This workforce solution was 100 percent funded by a $3 million grant awarded by the U.S. Department of Labor's Employment and Training Administration. The solution was created by the grantee and does not necessarily reflect the official position of the U.S. Department of Labor. The Department of Labor makes no guarantees, warranties, or assurances of any kind, express or implied, with respect to such information, including any information on linked sites and including, but not limited to, accuracy of the information or its completeness, timeliness, usefulness, adequacy, continued availability or ownership. Funded by the Department of Labor, Employment and Training Administration, Grant #TC-23745-12-60-A-53. PACE-IT is an equal opportunity employer/program and auxiliary aids and services are available upon request to individuals with disabilities. For those that are hearing impaired, a video phone is available at the Services for Students with Disabilities (SSD) office in Mountlake Terrace Hall 159. Check www.edcc.edu/ssd for office hours. Call 425.354.3113 on a video phone for more information about the PACE-IT program. For any additional special accommodations needed, call the SSD office at 425.640.1814. Edmonds Community College does not discriminate on the basis of race; color; religion; national origin; sex; disability; sexual orientation; age; citizenship, marital, or veteran status; or genetic information in its programs and activities.