Copyrighted Material

Total Page:16

File Type:pdf, Size:1020Kb

Copyrighted Material 11_783269 bindex.qxp 11/10/06 11:15 AM Page 209 Index applications (defined), 205. See also programs Numerics arranging windows, 43–44 100% button (Internet Explorer 7), 99–100 assigning sounds to program events, 24 audio visualizations, 186 A Windows Media Player 11, 183, 185–186 accessibility options, 156 audio CDs. See CDs accessories, 205 Audio Description feature, 157 account types, 169 AutoComplete feature (Internet Explorer 7), 101 accounts (administrative), 169 automatic updates with Windows Update, 161–162, 167 accounts (e-mail), 124 AutoPlay, 13, 148, 151 accounts (user) Autosearching feature (Internet Explorer 7), 113 account types, 169 adding, 169 creating, 169 B deleting, 170 backgrounds for desktop, 24 managing, 168, 170 Backup and Restore Center, 140–143, 146 names, 169 Backup Files dialog box, 141 Parental Controls, 170 backups passwords, 169 CompletePC Backup utility, 140–142 pictures, 169–170 DVD discs, 142 switching, 74 File and Folder Backup utility, 140–142 User Account Control (UAC), 170 Send To shortcut menu command, 64–65 activity reporting, 165 stopping, 141 activity reports, 166 BitLocker drive encryption, 163–164 Add Printer Wizard, 149–151 blocking Add to Library dialog box, 187 computer use, 165 adding Web sites, 165 bookmarks to Favorites Center, 102 blog, 208 gadgets, 31–32 bookmarks (Internet Explorer 7) icons, 35 adding to Favorites Center, 102 languages, 155–156 deleting, 104 music, 187 importing, 101 printers, 149–151 moving, 103–105 user accounts, 169 organizing, 103–105 address bar, 15–16 renaming, 104 address book, 128–130 selecting, 103 Address toolbar, 41 browser (defined), 208. See also Internet Explorer 7 adjusting volume, 152 browsing offline. See work offline Administrative Tools, 147 browsing with Internet Explorer 7 administrator accounts, 169COPYRIGHTED offlineMATERIAL browsing, 111–112, 208 Aero Glass, 2–5, 205 online browsing, 98–99 alerts, 168 tabbed browsing, 105–106 AntiSpyware, 163 Burn button, 13 appearance Burn to Disc button, 14 Appearance and Personalization category (Control Panel), 145 Burn to Disc Wizard, 14 Appearance and Settings dialog box, 23 burning folders, 56 CDs, 13–14, 188–189 taskbar, 2–3, 38 DVDs, 13–14, 182 windows, 23–24 11_783269 bindex.qxp 11/10/06 11:15 AM Page 210 210 Index Control Panel C Appearance and Personalization category, 145 cameras, 148, 152–153 Category view, 143–144 Cancel button, 75 Classic view, 21, 143–144 canceling print jobs, 151 Clock, Language, and Region category, 145, 153–156 captions for pictures, 201–202 defined, 205 capturing video clips, 193 Ease of Access category, 145, 156–158 Category view (Control Panel), 143–144 features of, 139 CDs Hardware and Sound category, 145, 147–153 burning, 13–14, 188–189 icon, 34 ripping, 188–189 Mobile PC category, 144–145 checking for updates, 147 Network and Internet category, 145 Classic Windows features opening, 143 Control Panel, 21, 143–144 Programs category, 145 pull-down menus, 19 Security category, 145 Start menu, 19–20 settings, 144 Clipboard, 63, 205 System and Maintenance category, 139, 144, 146–147 Clock gadget, 29–30 User Accounts and Family Safety category, 145 Clock, Language, and Region category (Control Panel), views, 21, 143–144 145, 153–156 Windows Explorer, 76 Collaboration feature, 135–137 copying colors files, 61–64 high contrast color schemes, 157 folders, 61–64 pictures, 203 Create Fax Account dialog box, 122 windows, 23–24 creating Compact mode (Windows Media Player 11), 184 compressed folders, 58–59 CompletePC Backup utility, 140–142 desktop shortcuts, 35–36 composing e-mail messages, 125–128 e-mail account, 124 compressed folders, 58–59 files, 55–56 computer folders, 55–56 blocking use of, 165 playlists, 188 hibernate, 75 sounds, 152 locking, 37, 74 toolbars, 41–42 logging off, 37, 74 user accounts, 169 Power button, 74–75 credits (for movies), 195–196 restarting, 74 cropping pictures, 203 shutting down, 75 Custom Zoom dialog box, 100 sleep, 37, 74 Customize Icons dialog box, 43 Windows Explorer, 76 customizing Computer icon, 34 folders, 56–58 computer resources, sharing, 137 gadgets, 32–33 configuring Notification area, 42–43 Internet connections, 96 Start menu, 38–40 programs, 72–73 system tray, 42–43 Connect to a Network dialog box, 82–83 taskbar, 38 Connect to a Workplace dialog box, 93 cut-and-paste, 63–64 Connect to the Internet dialog box, 93 connecting to Internet, 93, 96 D to networks, 82–83 date, 153–155 Contacts List, 128–130 Date and Time Properties dialog box, 153–154 context menu. See shortcut menus date stamp on video clips, 193 continuation button on toolbar, 14 decompressing folders, 59–60 contrasting color schemes, 157 11_783269 bindex.qxp 11/10/06 11:15 AM Page 211 Index 211 defaults mapping a network folder as a drive, 22, 52–53, 90 printers, 151 opening, 51 programs, 72–73 statistics, 50 Delete File dialog box, 66 DVDs deleting. See also removing backup discs, 142 bookmarks, 104 burning, 13–14, 182 e-mail messages, 133–134 playing, 180 files, 65–66 Windows DVD Maker program, 181–183 folders, 65–66 user accounts, 170 desktop. See also graphical user interface (GUI) E assigning sounds to program events, 24 Ease of Access button, 75 background, 24 Ease of Access category (Control Panel), 145, 156–158 defined, 205 editing display settings, 25 pictures, 202–203 icons, 34–35 playlists, 188 mouse pointers, 24 sounds, 152 personalizing, 21, 23 Eject This Disk button, 14 screen savers, 24 e-mail shortcuts, 22, 35–36 composing messages, 125–128 Sidebar, 29–34, 207 Contact List, 128–130 taskbar, 2–3, 34, 36, 38, 207 creating a new e-mail account, 124 themes, 25 defined, 205 Welcome Center, 45–46 deleting messages, 133–134 Desktop toolbar, 41 forwarding messages, 132 Details pane, 16–18 launching Windows Mail, 123–124 Details pane (Windows Explorer), 16–18, 76 marking messages, 132 detecting networks, 82 organizing messages, 132–133 Device Manager, 147 reading messages, 130–131 dialog box (defined), 205 replying to messages, 131–132 dialup network, 82 saving messages, 131 dictation, 118–121 security features, 132 digital cameras, 148, 152–153 sending messages, 125–128 directories. See folders E-mail button, 13 disabling programs, 171 E-mail Server Names dialog box, 124 disconnecting from a network, 83 emptying Recycle Bin, 66 disk operating system (DOS), 205 encryption, 163–164 disks ending programs, 44 formatting, 51–52 Explore button, 12 managing, 50 Explorer. See Internet Explorer 7; Windows Explorer opening, 51 Extensible Markup Language (XML), 208 display settings, 25 extensions (filenames), 54–55 Display Settings dialog box, 25 Extra Large Icons, 4–5, 77 documents extracting files from compressed folders, 59–60 handouts, 138 scanning, 123 Windows Explorer, 75 F DOS (disk operating system), 205 downloading gadgets, 31–32 Favorites Center (Internet Explorer 7), 101–105 drag-and-drop, 61–63 faxes, 122–123 drives Feed Headlines gadget, 29–30, 118 encryption, 163–164 File and Folder Backup utility, 140–142 formatting, 51–52 file extension, 54–55 File Sharing dialog box, 70–71 11_783269 bindex.qxp 11/10/06 11:15 AM Page 212 212 Index files organizing, 12 backups, 64–65, 140–141 paths, 53–54 BitLocker drive encryption, 163–164 permissions, 69–70 contents of, 53 Public folder, 68–70 copying, 61–64 renaming, 66–67 creating, 55–56 restoring, 142–143 cut-and-paste, 63–64 search, 56 deleting, 65–66 selecting, 60–61 drag-and-drop, 61–63 views, 12, 56–58 extracting files from compressed folders, 59–60 virtual folders, 9–10 File and Folder Backup utility, 140–142 zipped, 58–59 filenames, 54–55, 205 formatting disks or drives, 51–52 Indexing Options, 147 forwarding e-mail messages, 132 moving, 61–64 Full mode (Windows Media Player 11), 184–186 naming, 55 opening, 12 organizing, 12 G paths, 53–54 gadgets permissions, 69–70 adding, 31–32 renaming, 66–67 Clock, 29–30 restoring, 142–143 customizing, 32–33 selecting, 60–61 defined, 206 sharing, 13, 67–71, 87–90, 137 downloading, 31–32 tags, 27 Feed Headlines, 29–30, 118 views, 12 moving, 33–34 filtering items in Windows Explorer, 77–80 opacity of, 33 finding programs, 37 removing, 32 firewall SideShow, 207 defined, 205 Slide Show, 29–30 settings, 167 games Flip feature, 4, 22 graphics, 147 Flip 3D feature, 4, 22 help, 174 Folder Options dialog box, 56–58 online games, 176 folders opening, 174 address bar, 15–16 Parental Controls, 164–166 appearance, 56 playing, 174 backups, 64–65, 140–141 ratings, 174 compressed, 58–59 saving, 174 contents of, 53 Windows Explorer, 76 copying, 61–64 graphical user interface (GUI). See also desktop creating, 55–56 Aero Glass, 2–5, 205 customizing, 56–58 Extra Large Icons, 4–5 cut-and-paste, 63–64 Flip feature, 4, 22 decompressing, 59–60 Flip 3D feature, 4, 22 defined, 206 Large Icons, 4–5 deleting, 65–66 live taskbar thumbnails, 4 drag-and-drop, 61–63 live visual previews, 3–5 extracting files from compressed folders, 59–60 Notification area, 42 File and Folder Backup utility, 140–142 opaque view, 20–21 mapping as drives, 22, 52–53, 90 Start button, 2, 6 moving, 61–64 Start menu, 3, 6–8, 19–20, 37–40 naming, 55 system tray, 42 opening, 12 taskbar, 2–3 11_783269 bindex.qxp 11/10/06 11:15 AM Page 213 Index 213 transparency of screen elements, 3 Install Printer Software dialog box, 149–150 Welcome Center, 45–46 installing graphics printers, 149–151 Performance Rating and Tools, 147 updates, 160–161 scanning, 123 Internet Web graphics, 106–107 blocking Web sites, 165 GUI (graphical user interface). See graphical user configuring connections, 96 interface (GUI) connecting to, 93, 96 defined,
Recommended publications
  • MTS4CC Elementary Stream Compliance Checker Tutorials 001-1415-00
    MTS4CC Elementary Stream Compliance Checker Tutorials 001-1415-00 This document applies to software version 1.0 and above. www.tektronix.com Copyright © Tektronix. All rights reserved. Licensed software products are owned by Tektronix or its subsidiaries or suppliers, and are protected by national copyright laws and international treaty provisions. Tektronix products are covered by U.S. and foreign patents, issued and pending. Information in this publication supercedes that in all previously published material. Specifications and price change privileges reserved. TEKTRONIX and TEK are registered trademarks of Tektronix, Inc. Contacting Tektronix Tektronix, Inc. 14200 SW Karl Braun Drive P.O. Box 500 Beaverton, OR 97077 USA For product information, sales, service, and technical support: H In North America, call 1-800-833-9200. H Worldwide, visit www.tektronix.com to find contacts in your area. Table of Contents Getting Started............................................ 1 Basic Functions.................................................. 2 How to Begin a Tutorial........................................... 2 Tutorial 1: H.263 Standards Compliance and Motion Vectors..... 3 Procedure...................................................... 3 Conclusion..................................................... 8 Tutorial 2: MPEG-4 Compliance............................. 9 Procedure...................................................... 9 Conclusions..................................................... 15 Tutorial 3: MP4 Compliance Basics..........................
    [Show full text]
  • Protecting Miscrosoft® Hyper-V Environments
    Protecting Miscrosoft® Hyper-V Environments Who should read this paper Technical White Papers are designed to introduce Veritas partners and end users to key technologies and technical concepts that are associated with the Veritas™ Backup and Recovery product family. The information within a Technical White Paper will assist partners and end users as they design and implement data protection solutions based on Veritas Backup and Recovery products. Technical White Papers are authored and maintained by the Veritas Backup and Recovery Technical Services group. Veritas Backup Exec™ 15 Technical White Paper Protecting Hyper-V Environments Contents Introduction.......................................................................................3 Business Value....................................................................................3 Underlying Backup Principles.........................................................................7 Virtualized Application Protection .....................................................................10 Virtual Machine Recovery Options ....................................................................12 Improved Usability for Virtual Environments.............................................................15 Example Hyper-V Configurations .....................................................................16 Performance Recommendations .....................................................................17 Notes and Best Practices ...........................................................................18
    [Show full text]
  • Security Assessment Security Policy Assessment
    Security Assessment Security Policy Assessment Prepared for: Jonathan Doe Prepared by: Austin Archer 3/23/2018 CONFIDENTIALITY NOTE: The information contained in this report is for the exclusive use of the client specified above and may contain confidential, privileged and non-disclosable information. If the recipient of this report is not the client or addressee, such recipient is strictly prohibited from reading, photocopying, distributing or otherwise using this report or its contents in any way. Scan Date: 4/1/2014 Security Policy Assessment SECURITY ASSESSMENT Table of Contents 1 - Summary 1.1 - Sampled Systems 2 - Local Security Settings (Sampled Systems) 2.1 - Account Policies 2.1.1 - Password Policy 2.1.2 - Account Lockout Policy 2.2 - Local Policies 2.2.1 - Audit Policy 2.2.2 - User Rights Assignment 2.2.3 - Security Options PROPRIETARY & CONFIDENTIAL Page 2 of 14 Security Policy Assessment SECURITY ASSESSMENT 1 - Summary 1.1 - Sampled Systems IP Addresses Computer Name Operating System 10.0.7.28 tandem Windows 7 Enterprise 172.20.1.3, 10.0.1.3 DC01 Windows Server 2012 Standard PROPRIETARY & CONFIDENTIAL Page 3 of 14 Security Policy Assessment SECURITY ASSESSMENT 2 - Local Security Settings (Sampled Systems) 2.1 - Account Policies 2.1.1 - Password Policy Policy Setting Computers Enforce password history 0 passwords remembered TANDEM 24 passwords remembered DC01 Maximum password age 42 days All Sampled Minimum password age 1 days All Sampled Minimum password length 7 characters All Sampled Password must meet complexity requirements
    [Show full text]
  • Run-Commands-Windows-10.Pdf
    Run Commands Windows 10 by Bettertechtips.com Command Action Command Action documents Open Documents Folder devicepairingwizard Device Pairing Wizard videos Open Videos Folder msdt Diagnostics Troubleshooting Wizard downloads Open Downloads Folder tabcal Digitizer Calibration Tool favorites Open Favorites Folder dxdiag DirectX Diagnostic Tool recent Open Recent Folder cleanmgr Disk Cleanup pictures Open Pictures Folder dfrgui Optimie Drive devicepairingwizard Add a new Device diskmgmt.msc Disk Management winver About Windows dialog dpiscaling Display Setting hdwwiz Add Hardware Wizard dccw Display Color Calibration netplwiz User Accounts verifier Driver Verifier Manager azman.msc Authorization Manager utilman Ease of Access Center sdclt Backup and Restore rekeywiz Encryption File System Wizard fsquirt fsquirt eventvwr.msc Event Viewer calc Calculator fxscover Fax Cover Page Editor certmgr.msc Certificates sigverif File Signature Verification systempropertiesperformance Performance Options joy.cpl Game Controllers printui Printer User Interface iexpress IExpress Wizard charmap Character Map iexplore Internet Explorer cttune ClearType text Tuner inetcpl.cpl Internet Properties colorcpl Color Management iscsicpl iSCSI Initiator Configuration Tool cmd Command Prompt lpksetup Language Pack Installer comexp.msc Component Services gpedit.msc Local Group Policy Editor compmgmt.msc Computer Management secpol.msc Local Security Policy: displayswitch Connect to a Projector lusrmgr.msc Local Users and Groups control Control Panel magnify Magnifier
    [Show full text]
  • Princeton University COS 217: Introduction to Programming Systems a Minimal COS 217 Computing Environment
    Princeton University COS 217: Introduction to Programming Systems A Minimal COS 217 Computing Environment 1. Access the Fall 2020 COS 217 Account on Ed 1.1. You can access Ed through Canvas. 1.2 Post questions and comments (that comply with the course communication policies) to Ed. Posts will be available to all other students and instructors. Remember to check Ed often, especially while working on assignments and preparing for exams. 2. Activating Your University Computing Account One time only… 2.1. (If you're working off-campus) Perform the instructions on this web page to use SRA (secure remote access): http://helpdesk.princeton.edu/kb/display.plx?ID=6023 2.2. Use a Web browser to visit the OIT Account Activation Page at http://helpdesk.princeton.edu/kb/display.plx?ID=9973 2.3. Perform the five steps listed in the Set Your Security Profile section of the page to set your security profile. 2.4. In the After You Have Activated Your Account section of the page, click on the Enable your Unix account link. If you do not see these options on the page, then from the webpage in Step 2.2, in the gray box on the right, click on “How to activate your Princeton University Account and manage personal information." On that new page, scroll down to "Enable your Unix account." 2.5. In the resulting Unix: How do I enable/change the default Unix shell on my account? page, click on the Enable Unix Account link. 2.6. In the resulting dialog box, type your Princeton netid and password, and click the OK button.
    [Show full text]
  • Corpsystem Workpaper Manager
    CorpSystem Workpaper Manager Networking Best Practices Guide Version 6.5 Summer 2010 Copyright: 2010, CCH, a Wolters Kluwer business. All rights reserved. Material in this publication may not be reproduced or transmitted in any form or by any means, without prior written permission. Requests for that permission should be directed to: CCH INCORPORATED 21250 Hawthorne Blvd. Torrance, CA 90503 The contents of this publication are believed to be accurate. However, responsibility cannot be assumed for the information contained herein, and the consequences resulting from the use thereof. Material in this publication is subject to change without notice. This Networking Best Practices Guide and the computer software it describes are designed to provide accurate and authoritative information in regard to the subject matter covered. They are distributed with the understanding that the publisher is not engaged in rendering legal, accounting or other professional service. If legal advice or other expert assistance is required, the services of a competent professional person should be sought. “ProSystem fx” is a registered trademark of CCH, a Wolters Kluwer business. “Windows” is a registered trademark of Microsoft Corporation. All other brand, product, or company names are trademarks or registered trademarks of their respective owners. Printed in U.S.A Table of Contents Overview ........................................................................................................................................................................ 2
    [Show full text]
  • Manage Backup and Restore Introduction Learning Outcomes
    CompTIA IT Fundamentals+ Manage Backup and Restore Introduction Lab Topology Exercise 1 - Create System Image Backup Exercise 2 - Schedule a Server Backup Review Introduction Backups System Image Server Backup Restore Welcome to the Manage Backup and Restore Practice Lab. In this module, you will be provided with the instructions and devices needed to develop your hands-on skills. Learning Outcomes In this module, you will complete the following exercises: Exercise 1 - Create a System Image Backup Exercise 2 - Schedule a Server Backup After completing this lab, you will be able to: Add an additional virtual hard disk Initialize and create a new simple volume Create a system image backup Change the virtual machine start-up settings Perform system image restore Install Windows Server Backup Allow File and Printer Sharing feature Schedule a backup Exam Objectives The following exam objective is covered in this lab: 6.7 Explain business continuity concepts. Note: Our main focus is to cover the practical, hands-on aspects of the exam objectives. We recommend referring to course material or a search engine to research theoretical topics in more detail. Lab Duration It will take approximately 1 hour to complete this lab. Help and Support For more information on using Practice Labs, please see our Help and Support page. You can also raise a technical support ticket from this page. Click Next to view the Lab topology used in this module. Lab Topology During your session, you will have access to the following lab configuration. Depending on the exercises you may or may not use all of the devices, but they are shown here in the layout to get an overall understanding of the topology of the lab.
    [Show full text]
  • Setting up a New Ing up a New MLS Computer in Australia in Australia
    Setti ng Up a New MLS Computer in Australia Page 1 of 6 Australia Computer Setting Up a New MLS Computer in Australia Last Updated: 8 May 2013 When a Church unit receives a new computer, it will come preconfigured with tools that allow Church headquarters to remotely manage and secure the machine. It is therefore importa nt to use the image the computer ships with instead of bui lding one. It is recommended that each computer run for four to five hours a week so that it can receive Windo ws and antivirus updates and so Church headquarters can perform any other needed tasks. Each new computer ships with a USB thumb drive that can be used to transfer data from the old computer to the new one. It can then be used to back up MLS data. The steps below explain how to set up a new clerk computer. They should be followed in order and co mpleted under the direction of the stake or district technology speci alist. 1. Back up data and reset security token. a. Back up MLS data on the o ld computer. 1. Open MLS and log in. 2. Click File, and then click Backup to a F ile. 3. Save the file to the USB thumb drive that came with the new computer. b. Write down all dialer options from MLS to use later. 1. In MLS, click Edit and then System Options. 2. Click the System tab along the top-left side of the screen. 3. Write down all of the s ettings defined on the screen.
    [Show full text]
  • Microsoft Windows NT
    Microsoft Windows NT Securing Windows NT Installation October 23, 1997 Microsoft Corporation Contents Abstract Establishing Computer Security Levels of Security Off-the-Shelf vs. Custom Software Minimal Security Standard Security High-Level Security High-Level Software Security Considerations User Rights Protecting Files and Directories Protecting the Registry Secure EventLog Viewing Secure Print Driver Installation The Schedule Service (AT Command) Secure File Sharing FTP Service NetBios Access From Internet Hiding the Last User Name Restricting the Boot Process Allowing Only Logged-On Users to Shut Down the Computer Controlling Access to Removable Media Securing Base System Objects Enabling System Auditing Enhanced Protection for Security Accounts Manager Database Restricting Anonymous network access to Registry Restricting Anonymous network access to lookup account names and groups and network shares Enforcing strong user passwords Disabling LanManager Password Hash Support Wiping the System Page File during clean system shutdown Disable Caching of Logon Credentials during interactive logon. C2 Security Evaluation vs. Certification Setting up a C2-compliant System Abstract Microsoft® Windows NT® operating system provides a rich set of security features. However, the default out-of-the-box configuration is highly relaxed, especially on the Workstation product. This is because the operating system is sold as a shrink-wrapped product with an assumption that an average customer may not want to worry about a highly restrained but secure system on their desktop. This assumption has changed over the years as Windows NT gains popularity largely because of its security features. Microsoft is investigating a better secured default configuration for future releases. In the meantime, this white paper talks about various security issues with respect to configuring all Windows NT version 4.0 OS products for a highly secure computing environment.
    [Show full text]
  • Biopharma Finder 3.2 Installation Instructions
    Thermo BioPharma Finder 3.2 Installation Instructions Follow the instructions in this document to install and license the Thermo BioPharma Finder™ software, version 3.2. You must be a system administrator on the installation computer to install the software. You may license the application as either an administrator or as a standard user. Contents • Checking the Language, Keyboard, and Location Settings • Database Backup Options • Retrieving the Backed-Up Database • Clearing the Security Setting to View the Installation Report • Installing the BioPharma Finder Software • Activating the License • Tra d e m ark s IMPORTANT If you currently have submitted jobs in the run queue, make sure to run and complete these experiments before you install the new software version. Checking the Before installing the software, check your language, keyboard, and location settings on your system and change them Language, as necessary. Keyboard, To check and change the settings and Location 1. Choose Start > Control Panel to open the Control Panel window. Settings 2. Under the Clock, Language, and Region area, click Change keyboards or other input methods (see Figure 1). Figure 1. Control Panel window Click here. Revision A, XCALI-98122 © 2019 Thermo Fisher Scientific Inc. All rights reserved. 3. In the Region and Language dialog box, click the Keyboards and Languages tab, and then click Change Keyboards (see Figure 2). Figure 2. Region and Language dialog box showing Keyboards and Languages tab Click here. 4. In the Text Services and Input Languages dialog box, click the General tab. Make sure that the Default Input Language area shows English (United States) - US (see Figure 3).
    [Show full text]
  • Overview of the Cisco UCS Central GUI
    Overview of the Cisco UCS Central GUI This chapter includes the following sections: • Overview of Cisco UCS Central GUI, page 1 • Logging into and out of the Cisco UCS Central GUI, page 2 • Launching Cisco UCS Manager for a UCS Domain, page 3 • Importing a Policy, page 4 • Configuring Identifier Policies, page 4 • Determining Where a Pool Is Used, page 5 Overview of Cisco UCS Central GUI The Cisco UCS Central GUI provides a graphical interface to Cisco UCS Central. You can access the GUI from any computer that meets the requirements listed in the System Requirements section of the Release Notes for Cisco UCS Central. The Cisco UCS Central GUI contains the following areas and panes: • The UCS Faults area that shows the number of aggregated faults for all Cisco UCS domains registered with Cisco UCS Central. • A menu bar across the top of the window that provides access to the main categories of information in Cisco UCS Central. • A Navigation pane on the left that provides an expandable tree view of the information available under each menu category. • A Work pane on the right that displays the tabs associated with the node selected in the Navigation pane. The menu bar contains the following items: • Equipment—Provides access to the Cisco UCS Central domain groups, domain group policies, registered Cisco UCS domains, and a fault summary for the Cisco UCS domains. • Servers—Provides access to the service profiles and service profile templates configured in the registered Cisco UCS domains, as well as the global UUID suffix pools configured in Cisco UCS Central.
    [Show full text]
  • Creating Investment Alerts in Morningstar Direct
    Creating Investment Alerts in Morningstar Direct Onboarding Guide Direct Copyright © 2020 Morningstar, Inc. All rights reserved. The information contained herein: (1) is proprietary to Morningstar and/or its content providers; (2) may not be copied or distributed; (3) is not warranted to be accurate, complete or timely; and (4) does not constitute advice of any kind. Neither Morningstar nor its content providers are responsible for any damages or losses arising from any use of this information. Any statements that are nonfactual in nature constitute opinions only, are subject to change without notice, and may not be consistent across Morningstar. Past performance is no guarantee of future results. Morningstar Direct January 2020 © 2020 Morningstar. All Rights Reserved. Contents Overview . 4 Exercise 1: Update the default settings for alerts . 5 Exercise 2: Create a price alert for a stock . 6 Exercise 3: Create a Morningstar Alert. 8 Exercise 4: Create a Filings Alert. 11 Exercise 5: Edit an alert rule . 12 Exercise 6: Delete an alert rule . 13 Morningstar Direct January 2020 3 © 2020 Morningstar. All Rights Reserved. Creating Investment Alerts in Morningstar DirectSM Morningstar DirectSM allows users to create alerts to be notified of any significant Overview changes – such as a manager change or a Morningstar Rating change – for an investment of your choice. The following types of alerts can be created: g Price alerts g Morningstar alerts, and g Filings alerts. This guide shows users how to create each alert type with the following exercises: g Exercise 1: Update the default settings for alerts (page 5) g Exercise 2: Create a price alert for a stock (page 6) g Exercise 3: Create a Morningstar Alert (page 8) g Exercise 4: Create a Filings Alert (page 11) g Exercise 5: Edit an alert rule (page 12) g Exercise 6: Delete an alert rule (page 13) Morningstar Direct January 2020 4 © 2020 Morningstar.
    [Show full text]