File explorer email and password CSCI 104 Essentials

  • Slides: 43
Download presentation
File explorer, email and password CSCI 104 Essentials of Computing I Fall 2019 Lecture

File explorer, email and password CSCI 104 Essentials of Computing I Fall 2019 Lecture note Dr. Sajedul Talukder 14 February

Knowing how to Purchase a PC

Knowing how to Purchase a PC

Purchase of a PC (1) • What to Consider • How much can you

Purchase of a PC (1) • What to Consider • How much can you spend? • Desktop or Laptop? • What will it be used for? • Hardware • Processor (speed and type) • RAM • Hard Disk (size and type) • Input/Output (e. g. display size)

Purchase of a PC (2) • Connectivity • • • USB 3. 0 ports

Purchase of a PC (2) • Connectivity • • • USB 3. 0 ports or USB 2. 0 ports? Any SD card slot? HDMI? Thunderbolt 3 ports? Ethernet ports (especially if you're a gamer) • Battery Life • Platform (Mac, Windows or Chrome OS? )

Computer Malware Viruses: a type of malware that propagates by inserting a copy of

Computer Malware Viruses: a type of malware that propagates by inserting a copy of itself into and becoming part of another program Worms: standalone software and do not require a host program or human help to propagate Trojans: Legitimate looking software but irritates the user (popping up windows or changing desktops) to damages the host (deleting files, stealing data, or activating and spreading other malware) Ransomware: malicious software that threatens to publish the victim's data or perpetually block access to it unless a ransom is paid

Antivirus Software n n n A computer virus is an actively infectious program that

Antivirus Software n n n A computer virus is an actively infectious program that can erase data and/or alter the way your computer works Worms and Trojan horses are other types of infectious programs, but all are bad Computer viruses are spread through email, and/or infected floppy disks Windows does not include an antivirus program; i. e. , you must buy it separately and update it frequently Should you get antivirus software?

Components Specifications Processor Intel dual core, quad core, i 5, i 7 or i

Components Specifications Processor Intel dual core, quad core, i 5, i 7 or i 9 AMD 64; AMD Turion Memory 4 GB at least Hard Drive HDD SSD Ports USB 3. 0 ports or USB 2. 0 ports SD card slot HDMI Thunderbolt 3 ports Ethernet ports Networking Wired – Ethernet Card Wireless – 802. 11 g Warranty ? Software Operating System Anti-Virus Display LCD Retina 4 k Antivirus ?

File Management • Work with folders and files • Select, copy, and move multiple

File Management • Work with folders and files • Select, copy, and move multiple files and folders • Identify common interface components • Open a file • Close a file and application • File compression • Use the Clipboard group commands

File and Folder • A file is a set of instructions or data •

File and Folder • A file is a set of instructions or data • Program file: Microsoft Word or Microsoft Excel • Data File: Document or workbook • Copy, move, rename or delete a file • A folder allows us to organize our files • May contain files and/or other folders

File Explorer Interface Back, Forward, and Up buttons Ribbon Search box Address bar Content

File Explorer Interface Back, Forward, and Up buttons Ribbon Search box Address bar Content pane Preview pane Navigation Pane Details pane

File Explorer Interface (cont. )

File Explorer Interface (cont. )

Using the Navigation pane Clicking a link or folder name selects an area and

Using the Navigation pane Clicking a link or folder name selects an area and shows content in the right pane No changes in the Content pane Clicking this arrow expands content beneath a link without selecting an area

Creating a folder Click here to create a new folder

Creating a folder Click here to create a new folder

Copy/Move and Paste

Copy/Move and Paste

File Compression • Use Win. Zip (or compatible) program to create a compressed file

File Compression • Use Win. Zip (or compatible) program to create a compressed file or folder

File Extraction • Use Win. Zip (or compatible) program to create a decompress a

File Extraction • Use Win. Zip (or compatible) program to create a decompress a file or folder

How to Take a Screenshot • Click Start button, type snipping tool • Select

How to Take a Screenshot • Click Start button, type snipping tool • Select Mode (Free-form, Rectangular, Window, or Full-screen Snip)

Passwords 14 February

Passwords 14 February

It is important to make a good password • Stops others from stealing your

It is important to make a good password • Stops others from stealing your information • Stops others from stealing your identity • Stops others from getting you in trouble

What is Identity Theft? • It is when someone impersonates another person • Physical

What is Identity Theft? • It is when someone impersonates another person • Physical identity theft is a minor problem • Electronic identity theft is a major problem

What identifies you Electronically? • Identification numbers (social security number, student id, . .

What identifies you Electronically? • Identification numbers (social security number, student id, . . . ) • Usernames or account names • Passwords or pin numbers

Where could identity theft occur • Anywhere you have personal information • Accounts (School,

Where could identity theft occur • Anywhere you have personal information • Accounts (School, Facebook, Bank, Amazon, Credit Card etc. ) • Emailing personal information

You should NEVER… • Give your password to anyone • A friend or family

You should NEVER… • Give your password to anyone • A friend or family • An IT person • An anonymous email • Be careful when unexpected requests for passwords appear

Also, be careful about social engineering • • People just flat out asking you

Also, be careful about social engineering • • People just flat out asking you to sign in so they can "test" the system People using personal information to "guess" your password Someone watching over your shoulder to see what you type Do NOT write down your information and tape it to your keyboard, desk drawer, etc.

What doesn't make a good password? • The default password, whatever it is •

What doesn't make a good password? • The default password, whatever it is • A word spelled backwards, in any language • Your name, your boy/girl friend's name • A word with a number tacked onto the end • ANY word in English • Standard number for letter • ANY word in ANY language replacements 3=E, 0=O • Non words that have cultural • Short passwords meaning (R 2 D 2, C 3 PO)

https: //password. kaspersky. com/

https: //password. kaspersky. com/

What makes a good password? http: //www. hughcalc. org/pwgen. cgi http: //preshing. com/20110811/xkcd-password-generator/ •

What makes a good password? http: //www. hughcalc. org/pwgen. cgi http: //preshing. com/20110811/xkcd-password-generator/ • Random – upper and lower case letters, numbers, symbols • Length – the greater the better (minimum 8) • Fresh – try not to repeat characters • Unique – different passwords for different systems • Secret – never share with anyone • Memorable – passphrases you can remember

Some Rules: • Keep your password to yourself • You should never have to

Some Rules: • Keep your password to yourself • You should never have to give your password to a person • Keep a secure password • Keep separate passwords for different systems • Always be careful with your password

Why these rules for passwords? • Identity Theft has become a major problem •

Why these rules for passwords? • Identity Theft has become a major problem • In most systems, your account name or number along with your password are your identity on that system • Most account names are public information

Changing your Password 14 February

Changing your Password 14 February

Changing your Password • Open a web browser • Connect to My. Edinboro Home

Changing your Password • Open a web browser • Connect to My. Edinboro Home page: https: //my. edinboro. edu/ • Select: Forgot / Expired / Change Password

EUP Student Email 14 February

EUP Student Email 14 February

Connect to Email • Login to My. Edinboro • Select icon for student email

Connect to Email • Login to My. Edinboro • Select icon for student email

Communicating through Email • Most official correspondences are handled through your campus email account

Communicating through Email • Most official correspondences are handled through your campus email account • It is one form of information release (alerts can be sent to email) • Most official announcements are handled through email • Distribution lists are established for classes, majors, departments, etc.

Parts of an Email Message

Parts of an Email Message

Parts of an Email Message • TO: email address(es) of primary persons • CC:

Parts of an Email Message • TO: email address(es) of primary persons • CC: (carbon copy) email address(es) of other people who may be involved/interested in the contents of the message (Think FYI) • BCC: (blind carbon copy) email address(es) of other people who will receive a copy, but the fact that they have received a copy is concealed from other recipient(s) • Use this when sending an email to a group of people where you don't want to share membership/emails with the group • Use it when you don't want the person bcc'd to be forced to acknowledge that they received a copy • It also stops "reply all" • Subject: short summary of contents • Body: message

Email Attachments • A file sent along with an email message • File format

Email Attachments • A file sent along with an email message • File format is maintained • Size is usually limited • In most email clients: • Find the attach button • Select the file you want to attach • Be careful of attachments • Don't open attachments from people you don't know/trust • Zip or self-extracting zip files (. zip or. exe)

Email Etiquette • First and foremost THINK about what you are sending • Would

Email Etiquette • First and foremost THINK about what you are sending • Would you put it on paper? • Someone might print it out • Would you want it to last forever? • Most systems are backed up, and most people are capable of saving email messages • Would you want it used in court? • System records are subject to subpoena • Would you want it published? • Some records are subject to the laws

Email Etiquette • Don't "e-mail angry" • Be careful with confidential information • Keep

Email Etiquette • Don't "e-mail angry" • Be careful with confidential information • Keep it clean • Organize your message - you don't want to read something that is a mess • Content – be clear in your message • Be clear in your subject line • You want the recipient to read it • People receive tens to hundreds of email messages a day • You don't want it caught in a spam filter

Email Etiquette • Beware of the "reply all" • Briefly introduce yourself • Your

Email Etiquette • Beware of the "reply all" • Briefly introduce yourself • Your e-mail is a reflection of you • Be concise and to the point • Answer all questions and preempt further questions • Use proper spelling, grammar & punctuation • Pay attention to the TO and CC fields

Final Tips • Be careful when you don’t recognize the sender • Notice the

Final Tips • Be careful when you don’t recognize the sender • Notice the actual email address • Don’t respond to threats – “send us your password and email before you lose all your contacts” • Notice phishing emails - poor grammar or misspelled words can be an indicator • Keep passwords private and update them every 90 days

Homework 1: Purchase a Laptop

Homework 1: Purchase a Laptop

Windows Explorer Exercise (In Class Exercise 1) • • • Run the program Make

Windows Explorer Exercise (In Class Exercise 1) • • • Run the program Make folders Make sub-folders Good naming Zipping