We all can benefit from a few tips or suggestions. Throughout your textbook you will find numerous Tips ranging from the basics of keeping your computer system running smoothly to how to protect your privacy while surfing the Web. These Tips also appear below. Getting the most out of your web browserAre you getting the most out of your web browser? Here area few suggestions to make you faster and more efficient. Bookmarks/Favorites Bar: Most browsers have a bookmarks or favorites bar just below the address bar. Add your top 5 or 10 most-often-visited websites here. The next time you want to visit one of these sites, select it from the bookmarks/favorites list rather than entering the sites URL. Shortcuts: Keyboard shortcuts are often faster than using a mouse. Use the following: F5 (refresh); Alt 1 left arrow (back); Ctrl 1 T (new tab); Ctrl 1 W (close tab); Ctrl 1 Enter (adds www and .com to any domain name you type in the address bar). Extensions/Add-Ons: Many browsers, such as Chrome and Firefox, allow users to install small, third-party programs that extend, or add to, the capabilities of the browser. These programs can perform a variety of tasks, from providing easy access to your cloud services to making it easier to capture information on a web page. Configure Settings: All browsers have a settings or options page that provides many time-saving options. For example, you can set all the web pages that should open when you start your browser, or you can configure autocomplete options that help you to quickly fill out web forms.
Back to top Reducing spamAre you tired of sorting through an inbox full of spam? Here are a few spam-reducing suggestions: Keep a low profile. Many spammers collect e-mail addresses from personal web pages, social networking sites, and message boards. Be cautious when posting your address. Use caution when giving out your address. Many companies collect and sell e-mail addresses to spammers. Be sure to read the privacy policy of a site before providing your address. Dont ever respond to spam. Many are a trick to validate active e-mail addresses. These addresses are worth more to spammers, who then sell the addresses to other spammers. Use antispam and filter options. Most e-mail programs and web-based e-mail services have antispam and filter options that can be configured. Use them.
Back to top Creating professional-looking presentationsAre you getting ready for a classroom or a boardroom presentation and need some help? Did you know that both Apple and Microsoft provide expert guidance on creating professional-looking presentations? Heres how to access that guidance. For Apple, connect to www.apple.com/iwork/keynote/#easy and play the videos Choose a theme, Add and edit graphics with ease, Add stunning effects, 3D charts and chart animations, and Benefit from helpful tools. For Microsoft, connect to www.microsoft.com/atwork/skills and select 3 Ways to simplify your PowerPoint presentations.
Back to top Using the System Restore utilityHave you ever experienced problems after installing a new program or changing system settings? If so, the System Restore utility can help by reversing the changes and bringing your computer to a previous point in time. For Windows 8: Go to the Windows 8 start screen and then type recovery in the search box. Click on Open System Restore from the Advanced recovery tools list. Follow the prompts, and choose a restore point. Click the Finish button to start the process.
Back to top Taking care of your laptop batteryDoes your laptop seem to be losing its charge sooner than it used to? These batteries do lose power over time; however, you can take some steps to slow down the aging process. Balance adapter and battery use. The best practice is to use the laptop on battery power for a little while without draining it completely (50 percent charge, for example), followed by charging it back to 100 percent. Modern batteries should not be drained to 0 percent each day. Calibrate it. Your laptops manufacturer will recommend that you calibrate, or reset, your battery every few months. Follow its guidelines on the web or in your instruction manual, as it will ensure that the battery meter in your operating system is accurate and that you are getting the expected charge time. Avoid excessive heat. High temperatures can accelerate the deterioration of modern batteries. Therefore, avoid exposure to excessive heat and consider purchasing a laptop cooler or fan. Proper storage. If you are not going to use your laptop for a few weeks, most manufacturers recommend that you remove the battery.
Back to top Using Google Translate to communicateHave you ever had trouble communicating with someone who does not speak English? If so, Google Translate may be just what you need. Go to translate.google.com. Using the buttons at the top, select the language you will be speaking, followed by the language you want your words translated to. Click the microphone icon in the box on the left, and begin speaking clearly into your microphone. In a few seconds, you will see the translated text in the box on the right. Click the speaker icon in the box on the right to hear the translation.
If you own a smartphone, consider installing the free Google Translate app. Back to top Recovering accidentally deleted filesHave you ever accidentally deleted or lost important files from your flash drive? Do you have a USB flash drive that is no longer being recognized by your computer? Here are a few suggestions that might help. Recovery/undelete software. If you accidentally deleted files from a USB drive, it is unlikely that you can recover them using your operating system or searching through your recycle bin. Fortunately, there are several recovery (or undelete) programs that might help, and some are even free. For example, two free programs are Undelete 360 and Recuva. These programs will scan your flash drives for deleted files and offer you a chance to recover the ones you want back. Testing USB ports. If your computer does not recognize your USB flash drive, there could be a problem with your USB port. Try plugging another device into that same port to see if it works. If this device does not work, then your computers USB is most likely defective and needs to be replaced. If the device works, then most likely your USB flash drive is damaged and you should try the professional recovery services discussed in the next step. Professional recovery services. For damaged flash drives, there is a possibility that your data could be recovered by several companies that are dedicated to data recovery. Although the fees are high, they can rescue data from the actual memory chip, even if the drive or supporting circuits are damaged.
Back to top Wireless network safetyDo you use your laptop to connect to wireless networks at school or in public places such as coffee shops, airports, or hotels? If so, it is important to use caution to protect your computer and your privacy. Here are a few suggestions: Use a firewall. A personal firewall is essential when connecting your computer directly to public networks. Some firewalls, such as the one built into Windows 7 and Windows 8, will ask whether a new network should be treated as home, work, or a public network. Avoid fake hotspots. Thieves are known to set up rogue (or fake) hotspots in popular areas where users expect free Wi-Fi, such as coffee shops and airports. Since many operating systems automatically connect to the access point with the strongest signal, you could be connecting to the one set up by the thief. Always confirm that you are connecting to the access point of that establishment. Ask an employee if you are unsure. Turn off file sharing. Turning off file-sharing features in your operating system will ensure that no one can access or modify your files. Check if connection is encrypted. If the hotspot you are using is protected with a password, then it is likely encrypted. If it is not, then be very careful with websites you visit and the information you provide.
Back to top Protecting your identityIdentity theft is a growing problem, and can be financially devastating if you are a victim. Thieves are after anything that can help them steal your identity, from your Social Security number and date of birth to account information and passwords. Here are some steps to help protect your identity. Be careful what you write on the Internet. Never post personal information on forums or social networking areas that are public or in response to an e-mail from someone you do not know or trust. Only do business on the Internet with companies you know to be legitimate. When selling a computer, be sure to completely remove all personal information from the hard drive. Monitor your credit. Each year, you are entitled to a free personal credit report from each of the three major credit reporting agencies. Monitor your credit by requesting a report every four months from a different reporting agency. The official site for this service is www.annualcreditreport.com.
Back to top |