SlideShare ist ein Scribd-Unternehmen logo
1 von 22
Ben tubbs
Mouse
Keyboard
   The mouse will be used to click on stuff you
    want to open or do with the computer.
   The keyboard will be used to type in programs
    where you can type letters, e-mail ect.
   This is the main program you have on your
    computer. Today windows 7 is the newest so
    you will want to make sure it has windows 7
    or vista. These are the newest an can be
    upgraded as the older ones they don’t make
    upgrades for as this will be a monthly thing
    you will need to do.
   This is where you turn your computer on at it.
    It will depend weather or not you have a
    laptop or a desk top. Lap tops are movable to
    where u can take easly from place to place.
    Desk tops are to be kept on a desk as you can’t
    take them just anywhere or use them
    anywhere. (see next 2 slides)
Monitor

                     Computer
                     “brain”
                        Power button
Speakers

                        Mouse




  Keyboard
Screen




Power button

keyboard




Left click button
   Software is programs that are installed or can
    be installed on your computer. Some of the
    software are Microsoft word, power point or
    any kind of messenger program such as yahoo
    or aim messenger.
PowerPoint
            view         Yahoo
Word view
                         messenger
                         view
This is what you save your files that you create to.
  This can be done either in your computer or a
  external hard drive or disk. It is better to save
  them to a external one just in case your
  computer crashes.
This is another kind
This is an example of an   called a flash drive
external hard drive that   that plugs into your
plugs into you usb port    usb port.
   This is important because. When you delet a
    file an send it to the recyling bin an then empty
    it it asked you “ are you sure you wnt to
    peremilty deleat this files yes or no. you would
    think you click yes there gone right? wrong.
    Files need to be deleated by somene that knows
    wht there doing I say this because it is illagal
    for someone to go thought your files while you
    own the computer however (next slide)
   Once you sell or give away your computer
    away they are no longer yours an they are legal
    for someone to go though. And they can do a
    lot of damage if they get any personal
    information like bank accounts passwords that
    u had saved in a file.
   You will want to get an anti virus program.
    There are a lot of them out there. There is trend
    micro, avg, and Norton. These will tell you if
    you go to open a file if it has a virus or not an
    will get rid of it before it attacks your
    computer. If you try to run a program it will
    automatically shut it down. Norton is the best
    there is right now it comes down to you get
    what you pay for. Countines on next slide
   This will also need updated once a week if not
    daily. You can set them to update daily an most
    wont slow down your computer like Norton, it
    will run an you won’t be able to tell its
    downloading updates. This will save your
    computer as there are new virus made
    everyday.
Bad sign


Good sign
   Yes if you try to do something bad on the
    internet you will get caught. They all have
    there own ip address. This is an id tag of your
    computer. If you send virus o purpose or try to
    hack into someone’s computer an they have a
    ip address catcher and they get it there is a
    program that you can put it into an it will tell
    them your name address what internet
    provider you have.
   Hyper links are links that can be clicked an
    takes you to a web page. These are usually in
    blue. They can come in an e-mail or if your on a
    web site like (staples.com) and you click on
    laptop computers it will take you to a page
    with just them. This is also a hyper link. They
    are basically a short cut to another site.
   Email is pretty simple. This is how people talk to
    each other if they can’t call them. This is almost
    like a chat program but you usually don’t get a
    respond right away. You can email companies
    about products or family that don’t live in the
    same state there are a lot of free sites that offer it
    free just like the chat windows. Yahoo, aol, hotmail
    are just a few of them. You will need to create a
    name. then you will need to make a password with
    at least 8-10 letters. A good password will contain
    letters and numbers. This make it harder for
    someone to hack into.
Computer class final

Weitere ähnliche Inhalte

Was ist angesagt?

Get rid of results hub virus
Get rid of results hub virusGet rid of results hub virus
Get rid of results hub virusharoNaroum
 
Restore From Trash Mac are Now Possible
Restore From Trash Mac are Now PossibleRestore From Trash Mac are Now Possible
Restore From Trash Mac are Now Possiblerestorefromtrash-mac
 
Free mac data recovery
Free mac data recoveryFree mac data recovery
Free mac data recoverycelenscotch
 
Unit 9 - Remote Desktop Assistance - Babeli
Unit 9 - Remote Desktop Assistance - BabeliUnit 9 - Remote Desktop Assistance - Babeli
Unit 9 - Remote Desktop Assistance - BabeliLianna Babeli
 
Cs seminar 20071207
Cs seminar 20071207Cs seminar 20071207
Cs seminar 20071207Todd Deshane
 
June 2010 Cis Workshop Class
June 2010 Cis Workshop ClassJune 2010 Cis Workshop Class
June 2010 Cis Workshop ClassDaMotivator
 

Was ist angesagt? (6)

Get rid of results hub virus
Get rid of results hub virusGet rid of results hub virus
Get rid of results hub virus
 
Restore From Trash Mac are Now Possible
Restore From Trash Mac are Now PossibleRestore From Trash Mac are Now Possible
Restore From Trash Mac are Now Possible
 
Free mac data recovery
Free mac data recoveryFree mac data recovery
Free mac data recovery
 
Unit 9 - Remote Desktop Assistance - Babeli
Unit 9 - Remote Desktop Assistance - BabeliUnit 9 - Remote Desktop Assistance - Babeli
Unit 9 - Remote Desktop Assistance - Babeli
 
Cs seminar 20071207
Cs seminar 20071207Cs seminar 20071207
Cs seminar 20071207
 
June 2010 Cis Workshop Class
June 2010 Cis Workshop ClassJune 2010 Cis Workshop Class
June 2010 Cis Workshop Class
 

Andere mochten auch (7)

Cyto Monster Protein Guide
Cyto Monster Protein GuideCyto Monster Protein Guide
Cyto Monster Protein Guide
 
Josevp6asmat
Josevp6asmatJosevp6asmat
Josevp6asmat
 
Group 7 third_party
Group 7 third_partyGroup 7 third_party
Group 7 third_party
 
http://chiropractor.inuplandlocalarea.com
http://chiropractor.inuplandlocalarea.comhttp://chiropractor.inuplandlocalarea.com
http://chiropractor.inuplandlocalarea.com
 
Vazquez
VazquezVazquez
Vazquez
 
Profile on amino acids for body building
Profile on amino acids for body buildingProfile on amino acids for body building
Profile on amino acids for body building
 
Vazquezodf
VazquezodfVazquezodf
Vazquezodf
 

Ähnlich wie Computer class final

How to protect your computer from viruses.
How to protect your computer from viruses.How to protect your computer from viruses.
How to protect your computer from viruses.Acageron
 
How to prevent a laptop crash
How to prevent a laptop crashHow to prevent a laptop crash
How to prevent a laptop crashShae
 
Computer Security
Computer SecurityComputer Security
Computer Securitysecrettub
 
Training Computer
Training ComputerTraining Computer
Training Computercmonasmith
 
14 household ways to protect your computer from viruses
14 household ways to protect your computer from viruses14 household ways to protect your computer from viruses
14 household ways to protect your computer from virusesar-rifke.com
 
How Computer Viruses Work
How Computer Viruses WorkHow Computer Viruses Work
How Computer Viruses WorkCerise Anderson
 
Malware and malicious programs
Malware and malicious programsMalware and malicious programs
Malware and malicious programsAmmar Hasayen
 
Take Care of Your Computer Part 1 -- Disinfection Jan-19-2012
Take Care of Your Computer Part 1 -- Disinfection Jan-19-2012Take Care of Your Computer Part 1 -- Disinfection Jan-19-2012
Take Care of Your Computer Part 1 -- Disinfection Jan-19-2012Ted Whittemore
 
virus 2014 more design 2014
virus 2014 more design 2014virus 2014 more design 2014
virus 2014 more design 2014Shwana M
 
maintaning your computer systems
maintaning your computer systemsmaintaning your computer systems
maintaning your computer systemsGener Luis Morada
 
Unit III - Basics of Computer Science
Unit III - Basics of Computer ScienceUnit III - Basics of Computer Science
Unit III - Basics of Computer ScienceHepsijeba
 
How to fix some common laptop problems
How to fix some common laptop problemsHow to fix some common laptop problems
How to fix some common laptop problemsAbie Anarna
 
Operating systems
Operating systemsOperating systems
Operating systemssandrahezro
 
The Veterans' Guide to Protecting Your Privacy and Staying Safe Online
The Veterans' Guide to Protecting Your Privacy and Staying Safe OnlineThe Veterans' Guide to Protecting Your Privacy and Staying Safe Online
The Veterans' Guide to Protecting Your Privacy and Staying Safe OnlineJinger Jarrett
 
June 2010 Cis Workshop Class
June 2010 Cis Workshop ClassJune 2010 Cis Workshop Class
June 2010 Cis Workshop ClassDaMotivator
 
avast 7.0.1474 license key
avast 7.0.1474 license keyavast 7.0.1474 license key
avast 7.0.1474 license keyHayWhitfield72
 

Ähnlich wie Computer class final (20)

How to protect your computer from viruses.
How to protect your computer from viruses.How to protect your computer from viruses.
How to protect your computer from viruses.
 
How to prevent a laptop crash
How to prevent a laptop crashHow to prevent a laptop crash
How to prevent a laptop crash
 
Thou shalt not
Thou shalt notThou shalt not
Thou shalt not
 
COMPUTERS ( types of viruses)
COMPUTERS ( types of viruses)COMPUTERS ( types of viruses)
COMPUTERS ( types of viruses)
 
Computer Security
Computer SecurityComputer Security
Computer Security
 
Training Computer
Training ComputerTraining Computer
Training Computer
 
14 household ways to protect your computer from viruses
14 household ways to protect your computer from viruses14 household ways to protect your computer from viruses
14 household ways to protect your computer from viruses
 
How Computer Viruses Work
How Computer Viruses WorkHow Computer Viruses Work
How Computer Viruses Work
 
Malware and malicious programs
Malware and malicious programsMalware and malicious programs
Malware and malicious programs
 
Spyware
SpywareSpyware
Spyware
 
Take Care of Your Computer Part 1 -- Disinfection Jan-19-2012
Take Care of Your Computer Part 1 -- Disinfection Jan-19-2012Take Care of Your Computer Part 1 -- Disinfection Jan-19-2012
Take Care of Your Computer Part 1 -- Disinfection Jan-19-2012
 
virus 2014 more design 2014
virus 2014 more design 2014virus 2014 more design 2014
virus 2014 more design 2014
 
maintaning your computer systems
maintaning your computer systemsmaintaning your computer systems
maintaning your computer systems
 
Sowmya
SowmyaSowmya
Sowmya
 
Unit III - Basics of Computer Science
Unit III - Basics of Computer ScienceUnit III - Basics of Computer Science
Unit III - Basics of Computer Science
 
How to fix some common laptop problems
How to fix some common laptop problemsHow to fix some common laptop problems
How to fix some common laptop problems
 
Operating systems
Operating systemsOperating systems
Operating systems
 
The Veterans' Guide to Protecting Your Privacy and Staying Safe Online
The Veterans' Guide to Protecting Your Privacy and Staying Safe OnlineThe Veterans' Guide to Protecting Your Privacy and Staying Safe Online
The Veterans' Guide to Protecting Your Privacy and Staying Safe Online
 
June 2010 Cis Workshop Class
June 2010 Cis Workshop ClassJune 2010 Cis Workshop Class
June 2010 Cis Workshop Class
 
avast 7.0.1474 license key
avast 7.0.1474 license keyavast 7.0.1474 license key
avast 7.0.1474 license key
 

Kürzlich hochgeladen

DSPy a system for AI to Write Prompts and Do Fine Tuning
DSPy a system for AI to Write Prompts and Do Fine TuningDSPy a system for AI to Write Prompts and Do Fine Tuning
DSPy a system for AI to Write Prompts and Do Fine TuningLars Bell
 
DevEX - reference for building teams, processes, and platforms
DevEX - reference for building teams, processes, and platformsDevEX - reference for building teams, processes, and platforms
DevEX - reference for building teams, processes, and platformsSergiu Bodiu
 
Sample pptx for embedding into website for demo
Sample pptx for embedding into website for demoSample pptx for embedding into website for demo
Sample pptx for embedding into website for demoHarshalMandlekar2
 
(How to Program) Paul Deitel, Harvey Deitel-Java How to Program, Early Object...
(How to Program) Paul Deitel, Harvey Deitel-Java How to Program, Early Object...(How to Program) Paul Deitel, Harvey Deitel-Java How to Program, Early Object...
(How to Program) Paul Deitel, Harvey Deitel-Java How to Program, Early Object...AliaaTarek5
 
Testing tools and AI - ideas what to try with some tool examples
Testing tools and AI - ideas what to try with some tool examplesTesting tools and AI - ideas what to try with some tool examples
Testing tools and AI - ideas what to try with some tool examplesKari Kakkonen
 
Ensuring Technical Readiness For Copilot in Microsoft 365
Ensuring Technical Readiness For Copilot in Microsoft 365Ensuring Technical Readiness For Copilot in Microsoft 365
Ensuring Technical Readiness For Copilot in Microsoft 3652toLead Limited
 
Visualising and forecasting stocks using Dash
Visualising and forecasting stocks using DashVisualising and forecasting stocks using Dash
Visualising and forecasting stocks using Dashnarutouzumaki53779
 
Emixa Mendix Meetup 11 April 2024 about Mendix Native development
Emixa Mendix Meetup 11 April 2024 about Mendix Native developmentEmixa Mendix Meetup 11 April 2024 about Mendix Native development
Emixa Mendix Meetup 11 April 2024 about Mendix Native developmentPim van der Noll
 
The Ultimate Guide to Choosing WordPress Pros and Cons
The Ultimate Guide to Choosing WordPress Pros and ConsThe Ultimate Guide to Choosing WordPress Pros and Cons
The Ultimate Guide to Choosing WordPress Pros and ConsPixlogix Infotech
 
How AI, OpenAI, and ChatGPT impact business and software.
How AI, OpenAI, and ChatGPT impact business and software.How AI, OpenAI, and ChatGPT impact business and software.
How AI, OpenAI, and ChatGPT impact business and software.Curtis Poe
 
From Family Reminiscence to Scholarly Archive .
From Family Reminiscence to Scholarly Archive .From Family Reminiscence to Scholarly Archive .
From Family Reminiscence to Scholarly Archive .Alan Dix
 
Merck Moving Beyond Passwords: FIDO Paris Seminar.pptx
Merck Moving Beyond Passwords: FIDO Paris Seminar.pptxMerck Moving Beyond Passwords: FIDO Paris Seminar.pptx
Merck Moving Beyond Passwords: FIDO Paris Seminar.pptxLoriGlavin3
 
The Fit for Passkeys for Employee and Consumer Sign-ins: FIDO Paris Seminar.pptx
The Fit for Passkeys for Employee and Consumer Sign-ins: FIDO Paris Seminar.pptxThe Fit for Passkeys for Employee and Consumer Sign-ins: FIDO Paris Seminar.pptx
The Fit for Passkeys for Employee and Consumer Sign-ins: FIDO Paris Seminar.pptxLoriGlavin3
 
Digital Identity is Under Attack: FIDO Paris Seminar.pptx
Digital Identity is Under Attack: FIDO Paris Seminar.pptxDigital Identity is Under Attack: FIDO Paris Seminar.pptx
Digital Identity is Under Attack: FIDO Paris Seminar.pptxLoriGlavin3
 
Modern Roaming for Notes and Nomad – Cheaper Faster Better Stronger
Modern Roaming for Notes and Nomad – Cheaper Faster Better StrongerModern Roaming for Notes and Nomad – Cheaper Faster Better Stronger
Modern Roaming for Notes and Nomad – Cheaper Faster Better Strongerpanagenda
 
New from BookNet Canada for 2024: Loan Stars - Tech Forum 2024
New from BookNet Canada for 2024: Loan Stars - Tech Forum 2024New from BookNet Canada for 2024: Loan Stars - Tech Forum 2024
New from BookNet Canada for 2024: Loan Stars - Tech Forum 2024BookNet Canada
 
A Deep Dive on Passkeys: FIDO Paris Seminar.pptx
A Deep Dive on Passkeys: FIDO Paris Seminar.pptxA Deep Dive on Passkeys: FIDO Paris Seminar.pptx
A Deep Dive on Passkeys: FIDO Paris Seminar.pptxLoriGlavin3
 
A Framework for Development in the AI Age
A Framework for Development in the AI AgeA Framework for Development in the AI Age
A Framework for Development in the AI AgeCprime
 
Fact vs. Fiction: Autodetecting Hallucinations in LLMs
Fact vs. Fiction: Autodetecting Hallucinations in LLMsFact vs. Fiction: Autodetecting Hallucinations in LLMs
Fact vs. Fiction: Autodetecting Hallucinations in LLMsZilliz
 
DevoxxFR 2024 Reproducible Builds with Apache Maven
DevoxxFR 2024 Reproducible Builds with Apache MavenDevoxxFR 2024 Reproducible Builds with Apache Maven
DevoxxFR 2024 Reproducible Builds with Apache MavenHervé Boutemy
 

Kürzlich hochgeladen (20)

DSPy a system for AI to Write Prompts and Do Fine Tuning
DSPy a system for AI to Write Prompts and Do Fine TuningDSPy a system for AI to Write Prompts and Do Fine Tuning
DSPy a system for AI to Write Prompts and Do Fine Tuning
 
DevEX - reference for building teams, processes, and platforms
DevEX - reference for building teams, processes, and platformsDevEX - reference for building teams, processes, and platforms
DevEX - reference for building teams, processes, and platforms
 
Sample pptx for embedding into website for demo
Sample pptx for embedding into website for demoSample pptx for embedding into website for demo
Sample pptx for embedding into website for demo
 
(How to Program) Paul Deitel, Harvey Deitel-Java How to Program, Early Object...
(How to Program) Paul Deitel, Harvey Deitel-Java How to Program, Early Object...(How to Program) Paul Deitel, Harvey Deitel-Java How to Program, Early Object...
(How to Program) Paul Deitel, Harvey Deitel-Java How to Program, Early Object...
 
Testing tools and AI - ideas what to try with some tool examples
Testing tools and AI - ideas what to try with some tool examplesTesting tools and AI - ideas what to try with some tool examples
Testing tools and AI - ideas what to try with some tool examples
 
Ensuring Technical Readiness For Copilot in Microsoft 365
Ensuring Technical Readiness For Copilot in Microsoft 365Ensuring Technical Readiness For Copilot in Microsoft 365
Ensuring Technical Readiness For Copilot in Microsoft 365
 
Visualising and forecasting stocks using Dash
Visualising and forecasting stocks using DashVisualising and forecasting stocks using Dash
Visualising and forecasting stocks using Dash
 
Emixa Mendix Meetup 11 April 2024 about Mendix Native development
Emixa Mendix Meetup 11 April 2024 about Mendix Native developmentEmixa Mendix Meetup 11 April 2024 about Mendix Native development
Emixa Mendix Meetup 11 April 2024 about Mendix Native development
 
The Ultimate Guide to Choosing WordPress Pros and Cons
The Ultimate Guide to Choosing WordPress Pros and ConsThe Ultimate Guide to Choosing WordPress Pros and Cons
The Ultimate Guide to Choosing WordPress Pros and Cons
 
How AI, OpenAI, and ChatGPT impact business and software.
How AI, OpenAI, and ChatGPT impact business and software.How AI, OpenAI, and ChatGPT impact business and software.
How AI, OpenAI, and ChatGPT impact business and software.
 
From Family Reminiscence to Scholarly Archive .
From Family Reminiscence to Scholarly Archive .From Family Reminiscence to Scholarly Archive .
From Family Reminiscence to Scholarly Archive .
 
Merck Moving Beyond Passwords: FIDO Paris Seminar.pptx
Merck Moving Beyond Passwords: FIDO Paris Seminar.pptxMerck Moving Beyond Passwords: FIDO Paris Seminar.pptx
Merck Moving Beyond Passwords: FIDO Paris Seminar.pptx
 
The Fit for Passkeys for Employee and Consumer Sign-ins: FIDO Paris Seminar.pptx
The Fit for Passkeys for Employee and Consumer Sign-ins: FIDO Paris Seminar.pptxThe Fit for Passkeys for Employee and Consumer Sign-ins: FIDO Paris Seminar.pptx
The Fit for Passkeys for Employee and Consumer Sign-ins: FIDO Paris Seminar.pptx
 
Digital Identity is Under Attack: FIDO Paris Seminar.pptx
Digital Identity is Under Attack: FIDO Paris Seminar.pptxDigital Identity is Under Attack: FIDO Paris Seminar.pptx
Digital Identity is Under Attack: FIDO Paris Seminar.pptx
 
Modern Roaming for Notes and Nomad – Cheaper Faster Better Stronger
Modern Roaming for Notes and Nomad – Cheaper Faster Better StrongerModern Roaming for Notes and Nomad – Cheaper Faster Better Stronger
Modern Roaming for Notes and Nomad – Cheaper Faster Better Stronger
 
New from BookNet Canada for 2024: Loan Stars - Tech Forum 2024
New from BookNet Canada for 2024: Loan Stars - Tech Forum 2024New from BookNet Canada for 2024: Loan Stars - Tech Forum 2024
New from BookNet Canada for 2024: Loan Stars - Tech Forum 2024
 
A Deep Dive on Passkeys: FIDO Paris Seminar.pptx
A Deep Dive on Passkeys: FIDO Paris Seminar.pptxA Deep Dive on Passkeys: FIDO Paris Seminar.pptx
A Deep Dive on Passkeys: FIDO Paris Seminar.pptx
 
A Framework for Development in the AI Age
A Framework for Development in the AI AgeA Framework for Development in the AI Age
A Framework for Development in the AI Age
 
Fact vs. Fiction: Autodetecting Hallucinations in LLMs
Fact vs. Fiction: Autodetecting Hallucinations in LLMsFact vs. Fiction: Autodetecting Hallucinations in LLMs
Fact vs. Fiction: Autodetecting Hallucinations in LLMs
 
DevoxxFR 2024 Reproducible Builds with Apache Maven
DevoxxFR 2024 Reproducible Builds with Apache MavenDevoxxFR 2024 Reproducible Builds with Apache Maven
DevoxxFR 2024 Reproducible Builds with Apache Maven
 

Computer class final

  • 3. The mouse will be used to click on stuff you want to open or do with the computer.  The keyboard will be used to type in programs where you can type letters, e-mail ect.
  • 4. This is the main program you have on your computer. Today windows 7 is the newest so you will want to make sure it has windows 7 or vista. These are the newest an can be upgraded as the older ones they don’t make upgrades for as this will be a monthly thing you will need to do.
  • 5. This is where you turn your computer on at it. It will depend weather or not you have a laptop or a desk top. Lap tops are movable to where u can take easly from place to place. Desk tops are to be kept on a desk as you can’t take them just anywhere or use them anywhere. (see next 2 slides)
  • 6. Monitor Computer “brain” Power button Speakers Mouse Keyboard
  • 8. Software is programs that are installed or can be installed on your computer. Some of the software are Microsoft word, power point or any kind of messenger program such as yahoo or aim messenger.
  • 9. PowerPoint view Yahoo Word view messenger view
  • 10. This is what you save your files that you create to. This can be done either in your computer or a external hard drive or disk. It is better to save them to a external one just in case your computer crashes.
  • 11. This is another kind This is an example of an called a flash drive external hard drive that that plugs into your plugs into you usb port usb port.
  • 12. This is important because. When you delet a file an send it to the recyling bin an then empty it it asked you “ are you sure you wnt to peremilty deleat this files yes or no. you would think you click yes there gone right? wrong. Files need to be deleated by somene that knows wht there doing I say this because it is illagal for someone to go thought your files while you own the computer however (next slide)
  • 13. Once you sell or give away your computer away they are no longer yours an they are legal for someone to go though. And they can do a lot of damage if they get any personal information like bank accounts passwords that u had saved in a file.
  • 14.
  • 15. You will want to get an anti virus program. There are a lot of them out there. There is trend micro, avg, and Norton. These will tell you if you go to open a file if it has a virus or not an will get rid of it before it attacks your computer. If you try to run a program it will automatically shut it down. Norton is the best there is right now it comes down to you get what you pay for. Countines on next slide
  • 16. This will also need updated once a week if not daily. You can set them to update daily an most wont slow down your computer like Norton, it will run an you won’t be able to tell its downloading updates. This will save your computer as there are new virus made everyday.
  • 18. Yes if you try to do something bad on the internet you will get caught. They all have there own ip address. This is an id tag of your computer. If you send virus o purpose or try to hack into someone’s computer an they have a ip address catcher and they get it there is a program that you can put it into an it will tell them your name address what internet provider you have.
  • 19.
  • 20. Hyper links are links that can be clicked an takes you to a web page. These are usually in blue. They can come in an e-mail or if your on a web site like (staples.com) and you click on laptop computers it will take you to a page with just them. This is also a hyper link. They are basically a short cut to another site.
  • 21. Email is pretty simple. This is how people talk to each other if they can’t call them. This is almost like a chat program but you usually don’t get a respond right away. You can email companies about products or family that don’t live in the same state there are a lot of free sites that offer it free just like the chat windows. Yahoo, aol, hotmail are just a few of them. You will need to create a name. then you will need to make a password with at least 8-10 letters. A good password will contain letters and numbers. This make it harder for someone to hack into.