Things You Can Do to Make Your Computer Happy! 1. Update Your Virus Definitions! I Am Regularly Dumbfounded to Find People Who H

Total Page:16

File Type:pdf, Size:1020Kb

Things You Can Do to Make Your Computer Happy! 1. Update Your Virus Definitions! I Am Regularly Dumbfounded to Find People Who H Things You Can Do To Make Your Computer Happy! 1. Update your virus definitions! I am regularly dumbfounded to find people who have never updated their virus definitions. Between 10 and 15 new viruses are released to the Internet every day! At any given time there are approximately 250 active viruses being passed from computer to computer on the Internet. Most viruses are easy to detect and eliminate before they do any damage, but only if you have an antivirus program using the latest virus definitions. The virus definitions list on your computer is the only means your antivirus program has available to it to recognize all known viruses. If you don't have the most recent virus definitions your antivirus program will not be able to identify any viruses released since your virus definitions list was created, putting your computer and files in danger. Fortunately, updating your virus definitions is easy. How? That depends on the antivirus program you use. Norton antivirus has a "live update" button built into it; click on the button, and Norton automatically downloads and installs the latest virus definitions from the Internet. Mcafee VirusScan has a similar update utility. If you are uncertain how to update your virus definitions, go to your antivirus software manufacturer’s website and look for their "download," "update," or "technical support" section. 2. Run Windows’ update! Windows is appropriately named because it is full of holes. Microsoft left numerous, unintentional “doors” into the Windows operating system (all versions) that could possibly make your computer defenseless to external attack. Specifically, a devious hacker could remotely 'walk through' one of these open doors on your Windows PC and take full control of your computer without you even being aware they are “there”. When security experts discover a security hole in Windows (or any of the Office applications) the folks at Microsoft will generally release a software “patch” to fix it. Without the patch, and Microsoft has released many, many patches, your computer will remain open to outside attack. Fortunately, like updating your virus definitions, downloading these patches couldn't be simpler. Included with Windows 98 and Internet Explorer version 4.0 and later is a feature called "Windows update". Windows update is an easy-to-use tool that makes sure that your computer is running the latest patches and drivers. Depending on what version you are running you can launch Windows Update by going to Start, Settings, Windows Update (or Automatic Updates). You can also launch Windows Update by going to the tools menu and click Windows Update in Internet Explorer. (Sometimes it is in the upper pane of the Start Menu as an option as well.) Then, in the left-hand pane click on the "Product Updates" link (or the Scan for Updates button in the right hand pane). Windows will tell you to wait while your computer downloads a list of updates for your operating system. Click the “Review and Install Updates” button. When Microsoft releases a crucial update or patch to fix a security hole in Windows, they call it a "critical update". Select everything in the "critical updates" section (with a check mark) and then click on the "download" arrow in the top right hand corner of the page. Follow the on-screen prompts. Expect to see a LOT of critical updates the first time you run Windows update. If you have Microsoft Office installed you will need to patch it as well. There is a “Office Update” link on the Windows Update page or just go to: http://office.microsoft.com/productupdates/ and follow the onscreen prompts and instructions. 3. Run Disk Clean Up Left to it self, Windows will turn a neat and tidy hard disk into a massive, cluttered mess in no time. Windows uses your hard disk to store vital information along with all sorts of temporary files as it processes data. Most of the time it does not toss these temp files when they are no longer needed. If your hard disk becomes too full, your computer will not have any room to work and will slow to a crawl and or crash. Prevent this slowdown by doing a little housecleaning. Microsoft has included a disk cleanup utility that does a pretty fair job. Go to the Start menu; choose Programs, Accessories, System Tools, and then Disk Cleanup. Choose the drive you want to scan from the drop-down menu. You will see a screen that displays exactly which files are no longer needed and approximately how much room you will gain by deleting them. Click on what you want to delete, and Windows will remove those items when you click on OK. You can safely delete files in the Recycle Bin, Temporary files, Cached Web pages, and downloaded program files temporarily stored on your hard disk. 4. Run “Disk Defragmenter”. A disk defragmenter simply speeds up your once speedy but now sluggish computer by rearranging files on the hard disk. Most files are too big to store in a single location on a hard disk. Pieces of the file will be stored in multiple locations that may or may not be adjacent to each other. When they are not adjacent they are referred to as fragments. Your computer accumulates more and more fragmented files as you create and delete files over time. This fragmentation is 'visible' to the user only as a general slow down in how fast the computer responds to requests. There is nothing you can do to prevent fragmentation, but a “defrag” can cure it. Disk Defragmenter is a Windows utility that rearranges your fragmented files and the free space on your hard drive so that files are stored in contiguous units and free space is consolidated in one contiguous block. To run the Windows’ built-in disk defragmenter utility, go to Start, Programs, Accessories, System Tools, and Disk Defragmenter. Or, in Windows 2000, right-click your C drive icon, Properties, Tools, Defragment Now. Be sure to exit all other programs first, especially screen savers, as they will interfere with the defragmenting process. These four maintenance tasks will go a long way in keeping your PC fit and healthy. .
Recommended publications
  • Where Does My Downloaded File Go Find & Delete Files on a Google Pixel Phone
    where does my downloaded file go Find & delete files on a Google Pixel phone. You can usually find your downloaded files in the Files app on your Pixel phone. Find & open files on a Pixel phone. Open your phone's Files app . Learn where to find your apps. Your downloaded files will show. To find other files, tap Menu . To sort by name, date, type, or size, tap More Sort by . To open a file, tap it. Delete files from your Pixel phone. Open your phone's Files app . Tap a file. Tap Delet e Delete . Share, print, save to Drive & more. Share your files from your Pixel phone. Touch and hold the file. Tap Share . Do other actions, like printing or adding to Google Drive. To open a file, tap it. At the top right, look for more options. If needed, tap More . Find music, movies & other content. You can download files like music, movies, or books in various apps. To find that content, go to the app where you downloaded it. For example, learn how to find videos downloaded in the Google Play Movies & TV app. Transfer files to a computer. When you connect your phone to a computer by USB cab l e, open the computer's "Downloads" folder to find the files that are on your phone. Learn how to move files between your computer and your phone. Where can I find downloaded files on my Samsung Galaxy smartphone? The location of your downloaded files will depend on the type of file you have downloaded and the app that you used to download it.
    [Show full text]
  • Windows - Run/Kör Kommando
    Windows - Run/Kör kommando Accessibility Controls - access.cpl Network Connections - ncpa.cpl Add Hardware Wizard - hdwwiz.cpl Network Setup Wizard - netsetup.cpl Add/Remove Programs - appwiz.cpl Notepad - notepad Administrative Tools - control admintools Nview Desktop Manager - nvtuicpl.cpl Automatic Updates - wuaucpl.cpl Object Packager - packager Bluetooth Transfer Wizard - fsquirt ODBC Data Source Administrator - odbccp32.cpl Calculator - calc On Screen Keyboard - osk Certificate Manager - certmgr.msc Opens AC3 Filter - ac3filter.cpl Character Map - charmap Password Properties - password.cpl Check Disk Utility - chkdsk Performance Monitor - perfmon.msc Clipboard Viewer - clipbrd Performance Monitor - perfmon Command Prompt - cmd Phone and Modem Options - telephon.cpl Component Services - dcomcnfg Power Configuration - powercfg.cpl Computer Management - compmgmt.msc Printers and Faxes - control printers Control Panel - control panel Printers Folder - printers Date and Time Properties - timedate.cpl Private Character Editor - eudcedit DDE Share - ddeshare Quicktime (If Installed) - QuickTime.cpl Device Manager - devmgmt.msc Regional Settings - intl.cpl Direct X Control Panel -directx.cpl Registry Editor - regedit Direct X Troubleshooter - dxdiag Registry Editor - regedit32 Disk Cleanup Utility - cleanmgr Remote Desktop - mstsc Disk Defragment - dfrg.msc Removable Storage - ntmsmgr.msc Disk Management - diskmgmt.msc Removable Storage Operator Requests - ntmsoprq.msc Disk Partition Manager - diskpart Resultant Set of Policy (XP Prof)
    [Show full text]
  • Arithmetic and Logic Unit (ALU)
    Computer Arithmetic: Arithmetic and Logic Unit (ALU) Arithmetic & Logic Unit (ALU) • Part of the computer that actually performs arithmetic and logical operations on data • All of the other elements of the computer system are there mainly to bring data into the ALU for it to process and then to take the results back out • Based on the use of simple digital logic devices that can store binary digits and perform simple Boolean logic operations ALU Inputs and Outputs Integer Representations • In the binary number system arbitrary numbers can be represented with: – The digits zero and one – The minus sign (for negative numbers) – The period, or radix point (for numbers with a fractional component) – For purposes of computer storage and processing we do not have the benefit of special symbols for the minus sign and radix point – Only binary digits (0,1) may be used to represent numbers Integer Representations • There are 4 commonly known (1 not common) integer representations. • All have been used at various times for various reasons. 1. Unsigned 2. Sign Magnitude 3. One’s Complement 4. Two’s Complement 5. Biased (not commonly known) 1. Unsigned • The standard binary encoding already given. • Only positive value. • Range: 0 to ((2 to the power of N bits) – 1) • Example: 4 bits; (2ˆ4)-1 = 16-1 = values 0 to 15 Semester II 2014/2015 8 1. Unsigned (Cont’d.) Semester II 2014/2015 9 2. Sign-Magnitude • All of these alternatives involve treating the There are several alternative most significant (leftmost) bit in the word as conventions used to
    [Show full text]
  • Laptop Service Guide
    Windows Operating System 3 Turn off visual effects 3 Turn off Windows Search Indexing Feature 4 Defragging Hard Drive 5 Step 1: Locating the Defragment Wizard 5 Step 2: Using Defragment Wizard 6 Checking your hard drive 8 Checking your memory 8 Ensure Windows Defender is enabled 9 Perform Disk cleanup to remove clutter 12 Disable Programs that you do not use frequently from starting when system boots 14 14 Perform regular Windows Defender scans on system 15 Uninstall programs that you do not use anymore 17 Regularly turn off your system when not in use 18 How to shut down your windows machine 19 Perform check disk on hard drive regularly 21 Turn Off Windows Tips and Tricks 23 Turn Off Search Indexing 24 Regularly perform backups as well as create restore points 27 Use Powershell to fix corrupt files: 32 Enable fast start-up: 34 Effect of ram on the system 35 2 Windows Operating System Turn off visual effects I. Open the start menu by pressing the Windows key on your keyboard or by clicking on the icon shown below. a. Type “Advanced System Settings” and click on it when it appears in the Menu. b. Navigate to the “Advanced” tab at the top. c. Click on “Settings” in the “Performance” block d. Select “Adjust for best performance”. e. Click “Ok” to finish the setup. 3 Turn off Windows Search Indexing Feature I. Open the start menu by pressing the Windows key on your keyboard or by clicking on the icon shown below. II. Search for “Index” and choose “Indexing Options” when it appears.
    [Show full text]
  • FUNDAMENTALS of COMPUTING (2019-20) COURSE CODE: 5023 502800CH (Grade 7 for ½ High School Credit) 502900CH (Grade 8 for ½ High School Credit)
    EXPLORING COMPUTER SCIENCE NEW NAME: FUNDAMENTALS OF COMPUTING (2019-20) COURSE CODE: 5023 502800CH (grade 7 for ½ high school credit) 502900CH (grade 8 for ½ high school credit) COURSE DESCRIPTION: Fundamentals of Computing is designed to introduce students to the field of computer science through an exploration of engaging and accessible topics. Through creativity and innovation, students will use critical thinking and problem solving skills to implement projects that are relevant to students’ lives. They will create a variety of computing artifacts while collaborating in teams. Students will gain a fundamental understanding of the history and operation of computers, programming, and web design. Students will also be introduced to computing careers and will examine societal and ethical issues of computing. OBJECTIVE: Given the necessary equipment, software, supplies, and facilities, the student will be able to successfully complete the following core standards for courses that grant one unit of credit. RECOMMENDED GRADE LEVELS: 9-12 (Preference 9-10) COURSE CREDIT: 1 unit (120 hours) COMPUTER REQUIREMENTS: One computer per student with Internet access RESOURCES: See attached Resource List A. SAFETY Effective professionals know the academic subject matter, including safety as required for proficiency within their area. They will use this knowledge as needed in their role. The following accountability criteria are considered essential for students in any program of study. 1. Review school safety policies and procedures. 2. Review classroom safety rules and procedures. 3. Review safety procedures for using equipment in the classroom. 4. Identify major causes of work-related accidents in office environments. 5. Demonstrate safety skills in an office/work environment.
    [Show full text]
  • The Central Processing Unit(CPU). the Brain of Any Computer System Is the CPU
    Computer Fundamentals 1'stage Lec. (8 ) College of Computer Technology Dept.Information Networks The central processing unit(CPU). The brain of any computer system is the CPU. It controls the functioning of the other units and process the data. The CPU is sometimes called the processor, or in the personal computer field called “microprocessor”. It is a single integrated circuit that contains all the electronics needed to execute a program. The processor calculates (add, multiplies and so on), performs logical operations (compares numbers and make decisions), and controls the transfer of data among devices. The processor acts as the controller of all actions or services provided by the system. Processor actions are synchronized to its clock input. A clock signal consists of clock cycles. The time to complete a clock cycle is called the clock period. Normally, we use the clock frequency, which is the inverse of the clock period, to specify the clock. The clock frequency is measured in Hertz, which represents one cycle/second. Hertz is abbreviated as Hz. Usually, we use mega Hertz (MHz) and giga Hertz (GHz) as in 1.8 GHz Pentium. The processor can be thought of as executing the following cycle forever: 1. Fetch an instruction from the memory, 2. Decode the instruction (i.e., determine the instruction type), 3. Execute the instruction (i.e., perform the action specified by the instruction). Execution of an instruction involves fetching any required operands, performing the specified operation, and writing the results back. This process is often referred to as the fetch- execute cycle, or simply the execution cycle.
    [Show full text]
  • Copyrighted Material
    09_574647 bindex.qxd 9/10/04 11:47 AM Page 191 Index A Address Bar described, 85–87 Accessibility accessories, 148, 173–174 illustrated, BP-4 accessories searching Web, 132 accessing, 148–149 Web, navigating, 119 Address Book, 149 Address Book Backup, 161 accessories, 149 Calculator, 149–151 finding someone in, 76 Character Map, 161, 162–163 recipients, adding, 136–138 Command Prompt, 151 addresses, Web defined, 187 adding, 110–117 Disk Cleanup, 161 automatic completion of, 120 Disk Defragmenter, 161, bookmark, adding, 110–112 Entertainment, 156–158 folders, 110 File and Settings Transfer Wizard, 161 offline, 112–114 Magnifier, 148 opening, 112 Microsoft Interactive Training, 158 organizing, 114–116 Narrator, 148 synchronizing, 116–117 Network Connections, 152–153 album information, 57 Notepad, 159 alert dialog boxes, 82 On-Screen Keyboard, 148 Alt key, pull-down menus, 78 Paint, 160–161 Alt+Tab keystroke, Windows version Program Compatibility Wizard, 159 difference, 102–103 Remote Desktop Connection, 153–155 appearance Scanner and Camera Wizard, 160 Control Panel, 175–178 Scheduled Tasks, 162, 163–164 folder, 44–45 Security Center, 162 Windows Media Player, 55 System Information, 162 applications System Restore, 162, 165–166 adding or removing, 2–6 Windows Explorer, 166 in compressed folders, 29–30 Windows Movie Maker, 167–169 default, setting, 5–6 WordPad, 170 defined, 187 accounts files, saving to specific folder, 8 multiple e-mail, 135 frozen, 104 user in Control Panel, 184–186 normally used, opening menu with, BP-6 adding opening,
    [Show full text]
  • Computer Monitor and Television Recycling
    Computer Monitor and Television Recycling What is the problem? Televisions and computer monitors can no longer be discarded in the normal household containers or commercial dumpsters, effective April 10, 2001. Televisions and computer monitors may contain picture tubes called cathode ray tubes (CRT’s). CRT’s can contain lead, cadmium and/or mercury. When disposed of in a landfill, these metals contaminate soil and groundwater. Some larger television sets may contain as much as 15 pounds of lead. A typical 15‐inch CRT computer monitor contains 1.5 pounds of lead. The State Department of Toxic Substances Control has determined that televisions and computer monitors can no longer be disposed with typical household trash, or recycled with typical household recyclables. They are considered universal waste that needs to be disposed of through alternate ways. CRTs should be stored in a safe manner that prevents the CRT from being broken and the subsequent release of hazardous waste into the environment. Locations that will accept televisions, computers, and other electronic waste (e‐waste): If the product still works, trying to find someone that can still use it (donating) is the best option before properly disposing of an electronic product. Non‐profit organizations, foster homes, schools, and places like St. Vincent de Paul may be possible examples of places that will accept usable products. Or view the E‐waste Recycling List at http://www.mercedrecycles.com/pdf's/EwasteRecycling.pdf Where can businesses take computer monitors, televisions, and other electronics? Businesses located within Merced County must register as a Conditionally Exempt Small Quantity Generator (CESQG) prior to the delivery of monitors and televisions to the Highway 59 Landfill.
    [Show full text]
  • Console Games in the Age of Convergence
    Console Games in the Age of Convergence Mark Finn Swinburne University of Technology John Street, Melbourne, Victoria, 3122 Australia +61 3 9214 5254 mfi [email protected] Abstract In this paper, I discuss the development of the games console as a converged form, focusing on the industrial and technical dimensions of convergence. Starting with the decline of hybrid devices like the Commodore 64, the paper traces the way in which notions of convergence and divergence have infl uenced the console gaming market. Special attention is given to the convergence strategies employed by key players such as Sega, Nintendo, Sony and Microsoft, and the success or failure of these strategies is evaluated. Keywords Convergence, Games histories, Nintendo, Sega, Sony, Microsoft INTRODUCTION Although largely ignored by the academic community for most of their existence, recent years have seen video games attain at least some degree of legitimacy as an object of scholarly inquiry. Much of this work has focused on what could be called the textual dimension of the game form, with works such as Finn [17], Ryan [42], and Juul [23] investigating aspects such as narrative and character construction in game texts. Another large body of work focuses on the cultural dimension of games, with issues such as gender representation and the always-controversial theme of violence being of central importance here. Examples of this approach include Jenkins [22], Cassell and Jenkins [10] and Schleiner [43]. 45 Proceedings of Computer Games and Digital Cultures Conference, ed. Frans Mäyrä. Tampere: Tampere University Press, 2002. Copyright: authors and Tampere University Press. Little attention, however, has been given to the industrial dimension of the games phenomenon.
    [Show full text]
  • What Is a Microprocessor?
    Behavior Research Methods & Instrumentation 1978, Vol. 10 (2),238-240 SESSION VII MICROPROCESSORS IN PSYCHOLOGY: A SYMPOSIUM MISRA PAVEL, New York University, Presider What is a microprocessor? MISRA PAVEL New York University, New York, New York 10003 A general introduction to microcomputer terminology and concepts is provided. The purpose of this introduction is to provide an overview of this session and to introduce the termi­ MICROPROCESSOR SYSTEM nology and some of the concepts that will be discussed in greater detail by the rest of the session papers. PERIPNERILS EIPERI MENT II A block diagram of a typical small computer system USS PRINIER KErBOARD INIERfICE is shown in Figure 1. Four distinct blocks can be STDRIGE distinguished: (1) the central processing unit (CPU); (2) external memory; (3) peripherals-mass storage, CONTROL standard input/output, and man-machine interface; 0111 BUS (4) special purpose (experimental) interface. IODiISS The different functional units in the system shown here are connected, more or less in parallel, by a number CENTKll ElIEBUL of lines commonly referred to as a bus. The bus mediates PROCESSING ME MOil transfer of information among the units by carrying UN IT address information, data, and control signals. For example, when the CPU transfers data to memory, it activates appropriate control lines, asserts the desired Figure 1. Block diagram of a smaIl computer system. destination memory address, and then outputs data on the bus. Traditionally, the entire system was built from a CU multitude of relatively simple components mounted on interconnected printed circuit cards. With the advances of integrated circuit technology, large amounts of circuitry were squeezed into a single chip.
    [Show full text]
  • CIS 100 Competencies 1. Individual Windows A. Minimize B. Maximize
    CIS 100 Competencies 1. Individual Windows A. Minimize B. Maximize C. Restore D. Close E. Size F. Move 2. Multitasking A. Minimize all open windows in one operation B. Undo the minimize C. Stack open windows or show them side by side 3. Taskbar and Start Menu A. Move it B. Change its width C. Hide it D. Access and change Taskbar properties E. Access and change the Date/Time properties F. Pin an application to the taskbar G. Pin an application to the Start Menu 4. Desktop A. Change the background color or image B. Create a desktop shortcut C. Change the name of a desktop icon or shortcut D. Return the desktop to default values E. Remove a desktop shortcut F. Show desktop G. Restore items from the Recycle Bin H. Empty the Recycle Bin I. Change screen resolution J. Adjust sound levels and mute speaker output 5. Windows Explorer and Computer Window A. Create a new folder B. Find a specific file using the search feature C. Identify file name extensions D. Select (highlight) files in contiguous order and non-contiguous order E. Delete files F. Rename files G. Copy selected files from one drive to another drive or folder H. Move selected files from one drive to another drive or folder I. Change the display order of files by name, date, size, and type 6. Word Processing Using WordPad and Word A. Change margins and orientation B. Turn Ruler on and off C. Change tabs and indentation 5/21/2013 D. Change font E. Change horizontal alignment F.
    [Show full text]
  • Class of 2023 Required Laptop Computer Specifications
    Class of 2023 Required Laptop Computer Specifications Computer Component Mandatory Minimum Additional Information Computer’s Operating System Windows 10 Professional Edition Windows OS required by IMSA OS Computer Science Department Apple/Macintosh OS Not Recommended Linux OS Not Recommended Computer’s processing power Intel or AMD i5, 8th Generation i7 – 8th Generation Chip Processor Chip recommended for students interested in graphic design, animation, CAD/CAM, high processing demand applications Computer’s Memory 8GB 16GB recommended for students interested in graphic design, animation, CAD/CAM, high processing demand applications Computer’s Video Capabilities Intel HD (High Definition) AMD or Nvidia Independent Integrated Graphics Processor Graphics Processors recommended for students interested in graphic design, animation, CAD/CAM, high processing demand applications Computers Internal Storage – 256GB Hard Drive SSD type drive recommended Hard Drive for processing power and reliability Computer’s Wired Ethernet Strongly recommended. May Wired network connections are Connection require the purchase of an 10x faster than wireless additional adapter or “Dongle” network connections Computer’s WiFi – Internet Intel Brand – Dual Band Wireless We do not recommend other Access Card Card capable of 802.11ac wireless network card brands, 2.4/5.0GHz Dual Band Wireless Intel is the only one that works Network Card reliably in the IMSA environment Computer’s WebCam Required, to support eLearning as necessary Computer’s USB Ports 3- USB Ports
    [Show full text]