tailieunhanh - Lecture Business driven technology (Technology plug-in): Chapter 1 - Paige Baltzan, Amy Phillips

Chapter 1 of technology plug-in provides knowledge of personal productivity using IT. When you finish this chapter, you should: Describe the four steps you can use to create a strong password, identify three tips you can use to manage your files, explain why you would use microsoft’s backup and recovery utility, describe the six common email mistakes,. | TECHNOLOGY PLUG-IN T1 Personal Productivity Using IT LEARNING OUTCOMES Describe the four steps you can use to create a strong password Identify three tips you can use to manage your files Explain why you would use Microsoft’s backup and recovery utility Describe the six common email mistakes Explain spam and phishing and identify three ways that you can prevent each LEARNING OUTCOMES Explain the primary uses of spyware and adware Identify three things you can do to maintain your computer and keep it running smoothly Explain why you would install anti-virus protection software Describe the need for a personal firewall INTRODUCTION A number of things can be done to keep a personal computer running smoothly: Creating strong passwords Performing good file management Implementing effective backup and recovery strategies Using Zip files Writing professional emails Stopping spam INTRODUCTION A number of things can be done to keep a personal computer running smoothly (cont ): Preventing . | TECHNOLOGY PLUG-IN T1 Personal Productivity Using IT LEARNING OUTCOMES Describe the four steps you can use to create a strong password Identify three tips you can use to manage your files Explain why you would use Microsoft’s backup and recovery utility Describe the six common email mistakes Explain spam and phishing and identify three ways that you can prevent each LEARNING OUTCOMES Explain the primary uses of spyware and adware Identify three things you can do to maintain your computer and keep it running smoothly Explain why you would install anti-virus protection software Describe the need for a personal firewall INTRODUCTION A number of things can be done to keep a personal computer running smoothly: Creating strong passwords Performing good file management Implementing effective backup and recovery strategies Using Zip files Writing professional emails Stopping spam INTRODUCTION A number of things can be done to keep a personal computer running smoothly (cont ): Preventing phishing Detecting spyware Restricting instant messaging Increasing PC performance Using anti-virus software Installing a personal firewall INTRODUCTION CREATING STRONG PASSWORDS Four steps you can use to create strong passwords: Create strong passwords that you can remember Keep your passwords a secret Manage your passwords Monitor your accounts Create Strong Passwords That You Can Remember To create a strong password come up with a passphrase A passphrase is a sentence that you can remember Example: “My favorite group is Cold Play and my favorite song is Arches” You can make a strong password by using the first letter of each word of the sentence Example: mfgicpamfsia Make this password even stronger by using a combination of upper and lowercase letters, numbers, and special characters that look like letters Example: MfGicp&mfsi@ Keep Your Passwords A Secret Keeping your passwords safe means keeping them a secret Do not give them to friends, and do not write them down and keep them at .

crossorigin="anonymous">
Đã phát hiện trình chặn quảng cáo AdBlock
Trang web này phụ thuộc vào doanh thu từ số lần hiển thị quảng cáo để tồn tại. Vui lòng tắt trình chặn quảng cáo của bạn hoặc tạm dừng tính năng chặn quảng cáo cho trang web này.