Documenti di Didattica
Documenti di Professioni
Documenti di Cultura
your 1st PC
By Lynda Ward
6. Any problems?
● Memory stick = These have basically replaced floppy's. You can store your
documents on these easily. They are quite cheap and they make use of a USB port.
With PC's there is a lot to consider. With PC's there is so much jargon used, I hope this is of some help in
you getting a suitable laptop/PC for all of your requirements. It will be best to take this document with you
when shopping around for a laptop/PC, you will be able to query anything with a member of staff at
whichever place you buy from.
Security is essential when getting a Windows machine. 99% of computer owners would have PC's, so
therefore most hackers create viruses etc to attack these. Firefox has benefits over Internet Explorer.
OpenOffice is miles better than MS Software that you have to pay for (it's best to get a freebie that is heaps
more reliable).
Storage
You won't need any more than 40GB (Gigabytes).
Pop Up Stopper
These are easily available on the Internet. You will need a pop up stopper, just as an extra
precaution. You can get these as free downloads.
Anti Virus
This is a must, especially with PC's. You will also need to update your anti virus software and
always run checks. AVG is the best to go for. This is again a free download.
AV Port
This would enable you to view presentations with sound or watch DVD's, assuming you also go for
a CD / DVD drive.
PCMCIA
A PC Card slot accepts devices that are roughly the length and width of a credit card, although
somewhat thicker. At some time or another, there’s a good chance you’ll buy a PC Card device. For
example, you might decide later you made a mistake not getting a built-in FireWire port. You can
add one via your PC Card slot. Ditto for wireless networking. (This again is a bit beyond me, so
definitely ask on this too).
Parallel Port
This would be used to connect a printer. But since USB have become more common you don't
really have to have a parallel port. Although it might be beneficial to have one anyway.
Celeron Processor
This is another term for CPU (Central Processing Unit). This is the brains of your computer. I had
AMD on my desktop PC, this would be quite adequate for your requirements. (This again is a bit
beyond me, so definitely ask on this too).
* CD-R - has all the features of a CD drive; can also create, or burn, CD-ROMs and music CDs
* CD-RW - has all the features of a CD-R drive; can also write data to CD-RW discs, which are
rewritable, thus making them similar in function to a giant floppy disk
* DVD - has all the features of a CD drive; can also read DVD-ROMs and play DVD movies
* DVD-R - has all the features of a DVD drive, can also burn CDs, CR-ROMs, DVDs and DVD-
ROMs
* DVD-RW - one of two competing drive technologies that has all the features of a DVD-R drive;
can also burn rewritable DVD-based discs
* DVD+RW - the other of two competing drive technologies that has all the features of a DVD-R
drive; can also burn rewritable DVD-based discs
* DVD±RW - utilizes both DVD-RW and DVD+RW technologies so you can burn either format.
Chapter 2: What you need installed and why?
Firefox Browser – This has features that are not available in Internet Explorer.
AVG Anti virus – This is the best to go for, also it's free.
Open Office – This is also freeware. It features spreadsheet, drawing package etc.
Every PC that I have used (with Norton installed) has run so slow. When I got a new
Windows Vista laptop it had Norton pre-installed, it just needed registering. It took about
25-30 minutes for my laptop to boot up. I had Norton on there for 3 days – the laptop was
just so slow at doing anything. I uninstalled Norton and immediately I had a faster laptop.
From then on it's booted up in about 2-3 minutes.
My foster sister had Norton installed on her PC, as well as toolbars. Since I uninstalled
these, her laptop has also sped up loads.
Disposable emails: It's always wise to create a disposable email address. One you can then
forget about and ignore. As over time you will get SPAM emails. A good site for creating a
disposable email is www.temporaryinbox.com, in check inbox box just type anything in. This
creates a disposable email. It's dead easy.
Over time your files will become fragmented, you need to Defrag often. As part of your general PC
maintenance.
A: For disk defrag - You will find this on most Windows PC's via the 'System Tools' folder.
Start - Programs - Accessories - System Tools – Disk Defrag (Then just click
'Defragment', wait till done).
For disk cleanup - You will find this on most Windows PC's via the 'System Tools' folder.
Start - Programs - Accessories - System Tools - Disk Cleanup (Select drive, tick all
checkboxes and clean).
If your laptop/PC freezes: Ctrl+Alt+Delete and select Task Manager. You can then 'End'
non responsive tasks.
Using a Windows machine you will find that you get quite a few pop up notifications from
the 'System Tray' (bottom right of your desktop). These are normal, just click on the 'X'
in the corner to get rid of them.
After a Windows update you may find your machine has 'a few funnies'. This is quite
normal, just run your anti virus etc.
This includes a multiple choice quiz, abbreviations, shortcuts etc. But is definitely for the more advanced
PC user.
A: With printers, the only thing you really need to learn how to do is to change the toner cartridge. This is normally quite
simple and straightforward and is usually mentioned in the manual. You will know if the toner cartridge is low on ink, as
some text / diagrams etc will come out faded compared with the rest of the document. To replace a toner cartridge you just
need to open up the printer, take out old cartridge and replace it. Sometimes all you need to do is shake the cartridge, in
order to get it going again. To make the toner cartridge last a little longer, you might also want to set your printer
preferences to print at 300 dpi (dots per inch) instead of 600 dpi. Sometimes a printer won't work properly; this can
normally be fixed by unplugging printer for a few minutes. Or press Cancel / Reprint (if it has one) or switch the power off,
then this might sort it out.
Risk Assessment:
Q: How would you prevent risks when using a PC on a daily basis?
A: In order to try and prevent viruses etc infecting your machine, it is important to keep up with good PC maintenance. In
the 'Start-up' folder you can have shortcuts to your various anti-virus / anti-spyware etc. These would then load every time
you booted up. If you regularly download, it's best to run scans daily. As you can easily get infected by downloading from
the Internet. It's also wise to run regular disk defrag / disk cleanup of your hard disk. Files on Windows machines can easily
get fragmented.
Maintenance:
Q: Why is it important to keep up with PC maintenance?
A: It is important to keep up with your PC maintenance because Windows PC's are everywhere. Hackers tend to therefore
target Windows machines when creating viruses etc. PC's do need to be defragged, cleaned and scanned for
viruses/spyware/malware etc on a regular basis. If your PC becomes infected with anything nasty, it can slow down your
PC, cause error messages or crash your machine etc. If you often download from the Internet, you should ideally check for
problems daily.
A: Your PC may slow down a little while you are running scans, cleaning and defragging. Therefore it's quite often best to
do it when you are not very busy. For example - If you are at work then it's probably best to do it during your lunch break.
A: For disk defrag - You will find this on most Windows PC's via the 'System Tools' folder.
Start - Programs - Accessories - System Tools – Disk Defrag (Then just click 'Defragment', wait till done).
For disk cleanup - You will find this on most Windows PC's via the 'System Tools' folder.
Start - Programs - Accessories - System Tools - Disk Cleanup (Select drive, tick all checkboxes and clean).
Upgrading:
Q: Why upgrade?
A: Upgrading is important. If in 2007 you still have Windows 95 / 98 etc then they might not be compatible with newer
software for PC maintenance etc. Also 'Microsoft' would consider these obsolete and therefore wouldn't be able to provide
assistance for that OS. The PC will be more likely to fail and only useful for spare parts. They would be considered to be a
lot slower too.
Compatibility:
Q: Why check for compatibility?
A: Some software isn't yet compatible with the new Windows OS Vista. There is no point buying software for a Windows
2000 machine and trying to make it work with Vista. The chances are it isn't compatible. On the back of the software case
(for Windows software products) it mentions what OS it would work with, the OS it is compatible with.
A: If your PC for example powers off on it's own, this could be cause it's overheating. Some of the parts on the motherboard
may have been destroyed and would need to be replaced. This did happen once to me, luckily my brother is a computer
whiz and he told me what was wrong and what I would need to buy in order to get it working again. Mine needed a few
more internal fans, a new tower and a new motherboard. He then reassembled the tower and got my PC working again. If
you don't have a computer whiz in the family then you would need to get this problem checked by a professional. But this
would add extra cost to you.
A: You would need to call in a professional if you are uncertain how to fix a major fault. If you don't know anyone that can
fix a PC, you would see a professional.
A: You always need to be careful when downloading anything from the Internet. You don’t know the direct origin of a
downloaded file. There is also no guarantee that your PC won’t get infected with spyware and adware etc. Most sites do say
that a download is spyware and adware free, but you won’t know for sure. You might experience PC problems after
downloading. Quite often after downloading and installing Windows updates, most PC’s that I have used, crash and have a
few problems with spyware etc. Vista OS always comes up with a dialogue box asking whether you trust the site or not
when downloading or installing.
A: These are also known as updates and or service packs. You can download various patches etc from
(http://www.softwarepatch.com/windows/index.html). It’s always a good idea also to keep up to date with ‘Windows
Updates’ – although these do sometimes mess your PC up for a while afterwards.
A: Email is very useful for communication, but it does have it cons. Your PC can get infected after downloading an
attachment. They may have worms, trojans etc. The attachment could also be an executable file (exe). Windows PC’s are
highly susceptible to many nasties i.e. trojans, worms, spyware, adware, malware, viruses etc. The main causes for these are
downloading/installing software or opening email attachments. Most email attachments are okay, especially if you know the
sender of the email. But if, and when you receive spam emails or emails with ‘no subject’, then you have to be a lot more
careful. You should therefore have an anti-virus program that can scan and block suspicious emails.
Passwords:
Q: Why are passwords important to use?
A: Passwords are important as they prevent unauthorised access to files/directories etc. A good password is usually 8
characters long using both numbers and letters. People can still found out your passwords though, and they can basically
steal your identity. If you use Internet banking and someone else discovers your password, then they would have full access
to your accounts. For this reason, I don’t use Internet banking and probably never will. You should also use different
passwords for each site. If you use just one password for your email, Internet banking etc, and someone has cracked your
password, then they could make purchases under your name etc.
SPAM emails:
Q: What counts as SPAM email and how do you report it?
A: Definition of SPAM (via www.google.co.uk): Junk email, usually unsolicited. Unsolicited e-mail. There are two common
usages: 1) mass e-mailings by commercial sites to recipients who have not requested any contact, and 2) e-mail sent to
intentionally annoy or harass the recipient, including crashing his or her computer by overloading its e-mail capacity.
You can report SPAM, using various sites. For links, go to http://spamlinks.net/track-report-addresses.htm, this is a full list
of addresses that you can use to report SPAM. If and when you receive SPAM emails, you must not reply to them. This is
the ‘Golden Rule’. They may have an unsubscribe link, but this is just a way to confirm your email address.
Create A New Folder
Folders are the basic organizational building blocks of any computer system. Without folders it would be virtually
impossible to keep track of all the files that are found on even the smallest system. New folders can be created just
about anywhere, but three methods are shown below.
New Folder On Desktop - Right click anywhere on an open area of the desktop. Select New and then
click Folder. A new folder with the default name New Folder will be created on the desktop. Either
accept the default name New Folder (bad idea) by hitting the enter key or type a new name for the
folder (good idea) and then hit enter on the keyboard.
New Folder Using Windows Explorer in Hierarchical View - There are two easy methods for
creating a new folder in this view.
• On the Menu bar select File > New > Folder and the folder will be created in the right hand
pane. The trick is to make sure that prior to making the selections from the Menu that you are
located at the proper place in the hierarchical view in the left pane. The new folder will always
be created as a subfolder of whatever location you have selected
• Once again, make sure you're in the location where the new folder is to be created. In this case
I'm using the same location that was used in the previous example; the root of the C drive as
shown in the Address bar. In the File and Folder Tasks section, click the Make a New Folder
selection. The New Folder is created in the right hand pane as shown in the second screen
capture. Note that the File and Folder Tasks section also expands to include new entries relative
to what can be done with the folder just created.
------------------------------------------------------------------------------------------------------------------------------------------
Click your Start button once with your Left hand mouse button. What you will see is a menu popping up. This one
below:
Notice the name "KC" next to the image. Yours will show the name you typed when setting up Windows XP.
The menu bar is split into three sections. The first section, the white one on the left, has seven items in it. The first
three are shortcuts to a web browser, email software, and easyPHP. The four items under this are shortcuts to
recently used programmes. These will change as you start up and close down software packages. Yours will
probably be different items. One Single click with the Left mouse button on any of these items will launch some
software.
The second section has just one item in it: All Programs. There is a green arrow next to this text. Clicking on the
green arrow will bring up menu where you can find all the software installed on your computer. And this is the one
we're interested in. We'll explain it in more detail in a moment.
The section on the right of the Start menu, the one in pale blue, is for special areas of your computer, and shortcuts
to folders and files that are used frequently. You can also get help here, and search your computer for files and
folders (we'll see how to do this shortly.)
At the bottom of the start menu are two buttons, one for logging off and one for closing down your computer.
There is a difference between the two, but the one you'll probably want when it comes to turning off your computer
is Shut Down. Clicking it once with your Left mouse button will give you this pop up box, called a dialogue box.
The dialogue box is giving you four options. Click the second option "Turn Off" with your left mouse button, a
Single Click, if you want to completely close down your computer. The other popular option is "Restart". If you
change your mind, click the Cancel button at the bottom. The dialogue box will disappear.
But let's concentrate on that green button on the Start Menu, the one to the right of "All Programs." Click the
button with your left mouse button. A menu will appear. Actually, it's a sub menu - a menu on a menu! It will look
something like the one below:
As you can see, the Programs Sub menu is fairly small, but it gets bigger the more software you install. Your
Programs menu may well be longer than this one. When you install some new software, a shortcut to it will
probably be added to this Programs Sub menu.
Notice the black arrows on the menu. This indicates that there is another submenu available. The menu will appear
when you move your mouse to an item that has a black arrow next to it.
Move your mouse over to the Programs Sub menu. Then move your mouse up and down it. You should see a light
coloured line moving with your mouse. This line is telling you which item of the menu you are currently on.
To launch one of your software programs, click an item on the list with your Left mouse button, a Single Click.
When you do, the software is launched.
To quickly close down the software you have launched, look in the right hand corner. Search for this, in the picture
below
Click the red X to close down your software. The one on the left of the three, with the single line, will make your
software disappear. But it will not have closed down. Look at the bottom of your Desktop. You'll see something
like this:
The two long rectangles indicate that two programmes are still open. In the image above, the Firefox web browser
is open, as well as the Home and Learn Web Editor.
What we'll do now is to create a Shortcut to your "My Documents" folder, which we will place on the Desktop.
You will then be able to open this folder by Double-Clicking its icon on the desktop.
------------------------------------------------------------------------------------------------------------------------------------------
Floppy Drive or A drive There will be a thin slot on the front of your computer. Into the gap, a disk is inserted.
This is your floppy drive, and the disk is called a floppy disk CD Rom Drive or D Drive Press a button on the
front of your computer and a tray will probably slide out. The tray will accept a circular disk - a CD Rom. DVD
Drive
A DVD disk is the same size and shape as a CD, but can hold more information. You can play a CD in a DVD
Drive, but you can't play a DVD disk in a CD Rom Drive
CD/DVD Writer These types of drives are for creating your own CD's or DVD's. They are becoming standard on a
new computer
A modern Hard Drive is measured in Gigabytes. To find out how big your Hard drive is, click the next part of this
lesson.
------------------------------------------------------------------------------------------------------------------------------------------
The "Details" section at the bottom is showing how much space is free on your hard drive. It also shows how big
the Hard drive is. GB stand for Gigabytes. So this Hard drive is just over 4 gigabytes. Not very big in today's
computer market, where Hard drive ten and twenty times this size are common!
There is another way to check how big your Hard drive is.
Click on the C icon from the My Computer screen. But click on it with your Right mouse button. You'll get a menu
similar to the one below.
Click on "Properties with your Left mouse button. You'll get the following dialogue box popping up.
Here, we get a pie chart showing us information about the hard drive: Used Space, Free Space and Capacity (How
big your hard drive is). The Capacity is showing 19.0 Gigabytes, Used space 17.9 Gigabytes, and Free space 1.01
Gigabytes.
Click the OK button to get rid of the dialogue box (One click with the left mouse button.)
Get rid of the "My Computer" screen by clicking the red X in the top right hand corner.
What we'll do now is create a folder on the hard drive. But we'll use the Windows Explorer to do it.
------------------------------------------------------------------------------------------------------------------------------------------
A New folder will be created on your C Drive. The new folder will appear right at the bottom of all of your other
folders and files, under the last one. So you might have to scroll across to see it. You can tell it's your new folder
because it says, quite helpfully, "New Folder".
When you clicked "Folder", a new folder was created. But it appears right at the end of your list folders and files,
in the right-hand pane of Windows Explorer. That's why you might need to scroll down or across in order to see it.
But it will look like the one in the picture below:
The words "New Folder" will be highlighted. It's highlighted so that you can rename it. After all, "New Folder" is
not very descriptive. So go ahead and type in a new name for your folder. Type "wpProjects". As in the image
below:
If nothing happens when you try to type a new name for your folder, do the following:
• Click on your new folder, but click on the folder with your right hand mouse button
• A menu appears
• From the menu, click once with your Left mouse button on the word Rename
• Type a new name for your folder
You have now created a new folder in the root folder of your C Drive. You can use this same technique to create a
new folder inside any of the folders on your C Drive. If you make a mistake and decide you don't want this new
folder, you can always choose the Delete options from the menu above, instead of Rename.
But one more thing to notice about the Windows Explorer. In the left hand side, you see a lot of plus signs in a
square box.
Clicking one of these plus signs will expand your selection. The image on the left below show a plus sign before it
is clicked, and on the right afterwards.
The plus sign turns into a minus sign. But the plus sign indicates that there are more folders inside the one that has
the plus sign. When you click the plus sign, it will expand to show you all the folders inside a main folder. You can
click on any of these folders to see what is inside it.
As for the files inside the folders - try double clicking on one and see what happens. Don't worry: you won't do any
harm!
What we're going to do now is to move that new folder we just created, and put it inside our "My Documents"
folder.
------------------------------------------------------------------------------------------------------------------------------------------
In the Image above, the CD Rom Drive letter is D. Clicking on the Drive letter displays the contents of the Drive in
the right hand pane. The folder CD Rom Contents is displayed.
• Click once with the left hand mouse button on the folder "CD Rom Contents"
• The folder is selected
• From the menu bar at the top of Windows Explorer, click on Edit (once, left hand mouse button)
• From the drop down menu, click "Copy" with your left mouse button
• In the left hand pane of Windows Explorer, Click on your hard drive letter, which will probably be C (click
the letter C once with your left mouse button)
• When the folders and files from your hard drive are displayed in the right hand pane of the Windows
Explorer, click on Edit from the menu bar
• From the drop down menu, click on "Paste" (once with the left mouse button)
• The files will be copied from your CD Rom drive to your Hard drive
To check that all the folders have been copied over correctly, double click the "CD Rom Contents" folder on your
hard drive.
And that's it. Quite easy, once you get the hang of it! You can use the same method to transfer files from a floppy
disk in the Floppy Drive (which is the A drive) to your hard drive.
------------------------------------------------------------------------------------------------------------------------------------------
Setting a Screen Saver with Windows XP
A Screen Saver is something that kicks in when your computer has been idle for a set period of time. They are
usually some form of animation, or moving imagery. To pick a Screen Saver for your own computer, select the
Screen Saver tab strip from the Display Properties dialogue box by clicking on the word "Screen Saver" once with
your left mouse button. It looks like this:
Click the little black down-pointing arrow to see a list of available Screen Savers. This one is set to the Windows
XP Screen Saver.
You can see that it also says "Wait 10minutes". This means that the Screen Saver will kick in if the mouse has not
been moved for 10minutes. You can change this figure. The values go from 1 minute to 60 minutes. When you're
happy, click Apply then OK. But play about with the settings on the Screen Saver tab strip. The Energy saving
features of the monitor section is not available for all computer monitors, so you may or may not have the part
available to you.
There are lots and lots of Wallpaper and Screen Saver web sites out there internet. These sites will offer a wide
variety of wallpapers and Screen Savers that you can use to liven up your own computer. But be careful of files
sent to you by email that pretend to be a Screen Saver (Check for a file that ends in .SCR). There is a good change
it will be a computer virus! If the file has been sent to you from somebody you don't know - don't open the
attachment. Just delete the whole email.
------------------------------------------------------------------------------------------------------------------------------------------
How to Zip Files with WinZip
If you have one really big file, or lots of small files, it's better to squash them down in size.You do the squashing
with a zipping programme. The most popular is called WinZip. It's so popular that you may even have it on your
computer already. So popular that the Word spellchecker doesn't even give it a red wiggly line when you type it
out!
To check if it's on your machine, click the Start button in the bottom left of your computer screen with the left
mouse button. When the menu pops up, look for WinZip at the top. (But DON'T click it! You don't need to open
the software up.)
As you can see, this computer has WinZip installed. If you can't see it on the Start menu, click on All Programs,
and look for it there - again, don't open it!
If you don't have it, you can get it from the CD Rom of practically any computer magazine at your newsagents. Or
download a free trial version from the internet. Just type WinZip into any search engine.
• Click on the file you want to zip with your Right mouse button, and a menu will appear
• Look for the WinZip item on the menu
• From the sub menu, choose Add to ...
You may then get a box popping up asking you whether you agree or disagree. Click I agree, and Winzip goes to
work. Your file will be zipped up:
• Our file has now been zipped up. Note that it has the same name as the original file.
If you want to zip an entire folder, then do exactly the same as above.
• Click the option with your left mouse button, and WinZip unpacks the file for you.
It's quite easy, once you get the hang of it. And it could save you a small amount of money in internet telephone
bills!
Basic Internet
1. General Searching
1. Load up your web browser (IE aka Internet Explorer). Do this by double clicking (quite quickly) on
the IE icon on the desktop.
2. If your PC doesn’t have the icon on your desktop, then click once (left click) on ‘Start’ go upto
‘Programs’ and move your mouse across and select ‘Internet Explorer’.
3. This then brings up your web browser. A website will appear (normally www.google.co.uk). This
depends though as to what website the browser has been set to open up with as it’s homepage.
4. If the homepage is not set to be www.google.co.uk, then we need to type this into the address bar.
5. Google is the main, most popular of all the search engines. Although there are many. Once at the
Google website you can do many things, search general websites, search for images, look into google
maps etc.
6. When you are at Google, you will see a page like this:
7. To search for anything, you will just need to type what you are looking for into the search box, then
press enter.
Google’s search box.
2. Image search
1. Load up your web browser (IE aka Internet Explorer). Do this by double clicking (quite quickly) on
the IE icon on the desktop.
2. If your PC doesn’t have the icon on your desktop, then click once (left click) on ‘Start’ go upto
‘Programs’ and move your mouse across and select ‘Internet Explorer’.
3. This then brings up your web browser. A website will appear (normally www.google.co.uk). This
depends though as to what website the browser has been set to open up with as it’s homepage.
4. If the homepage is not set to be www.google.co.uk, then we need to type this into the address bar.
6. When you are at Google, you will see a page like this:
7. For a Google image search, you then just need to click once (left click) onto Images (top left hand
corner of the screen).
9. To search for anything, you will just need to type what you are looking for into the search box, then
press enter.
Searched for: pc’s
To save image:
Right click once – To ‘Save Picture As..’ – Find suitable location for file – Click ‘Save’
* If you are copying image from Google into a Word Processed document, you may need to remove
Hyperlink. A Hyperlink may have been attached to the image. This means that you can’t resize image
yet. When a Hyperlinked Image is clicked, it takes you to the website of the image.
To remove Hyperlink:
In your WP document, click and highlight image. Click on ‘Insert Hyperlink’. There should be an
option in there to ‘Remove Link’.
Using these you can drag these out to increase image size, and vice versa.
Registering Is Free and Fun (And Fast)
Before you can sign up at eBay, you have to be connected to the Web. This is the time to fire up
your computer and connect to the Internet. After you open your Internet browser, you’re ready to
sign up. Just type www.ebay.co.uk in the address box of your browser and press Enter. Your
next stop is the eBay home page. Right there, where you can’t miss it, is the Register Now link.
Click the link and let the sign-up process begin. The eBay home page changes regularly.
Alternatively, it may be the home page. If you don’t see a Register Now button, look around the
page — there is always a Register button or link somewhere.
Here’s an overview:
The following sections fill you in on all the details. The Registration pages on eBay are through a
secure SSL connection. SSL (Secure Sockets Layer) enables you to have an encrypted
connection to eBay because a bunch of really smart techie types made it that way. You can tell
because the normal http at the beginning of the Web address (also called the URL) is now https.
Also, you’ll see a small closed lock at the bottom-left (or bottom right) corner of your screen. I
could tell you how SSL works, but instead I’ll just give you the bottom line: It does work, so trust
me and use it. The more precautions eBay (and you) take, the harder it is for some hyper-
caffeinated high-school kid to get into your files.
1. At the top of the first registration page, eBay shows the steps of the registration
process and asks you to fill in some required information.
If you register with an anonymous e-mail service such as Yahoo! Mail, Gmail, or Hotmail, you’re
taken to a page that requires additional information for authentication. It wouldn’t surprise me if
eBay will be randomly authorizing all new members by requiring a credit card. (This is for your
safety.) You must provide valid credit card information for identification purposes. Your
information is protected by eBay’s privacy policy, and your credit card won’t be charged. After
you input your personal information, you’re ready to create your eBay persona.
2. Scroll down the page to select your new eBay User ID.
Because many of the “good” User IDs are taken, eBay supplies a link to check on the availability
of your preferred ID. Finding an awesome User ID can be as difficult as finding an untaken vanity
plate at the California DMV.
3. Choose a password, enter it in the Create Password box, and then type it a second time
in the Re-enter Password box to confirm it.
For more information on choosing a password, see “A Quick Word about Passwords,” later in this
chapter.
If you registered with an anonymous e-mail service, such as Yahoo! Mail or Hotmail, you must
enter your credit card information, as I mentioned earlier, before you see the license agreement,
which I cover in the next section. If, when you look at it, your eyes start glazing over at all the
legalese, the next section can help you make sense of it.
When everything goes well, the eBay Web site is like a school gym that opens for Saturday swap
meets. At the gym, if you don’t play by the rules, you can get tossed out. But if you don’t play by
the rules at eBay, the venue gets un-gymlike in a hurry. eBay has the right to get state and
federal officials to track you down and prosecute you. But fair’s fair; if you click the appropriate
box on this page, eBay keeps you posted by e-mail of any updates in the User Agreement.
Before you can proceed, you must click the two check boxes, indicating that you really, really
understand what it means to be an eBay user. Because I know that you, as a law-abiding eBay
member, will have no problem following the rules, go ahead and click the I Agree to These Terms
button at the bottom of the page. You’re transported to a screen stating that eBay is sending you
an e-mail. You’re almost done. The next step is confirming your e-mail address, which I cover in
the next section.
cgi4.ebay.com/ws/eBayISAPI.dll?RegisterConfirmCode
After you reconnect with eBay and it knows your e-mail address is active, you’ll be heartily
congratulated with an eBay mail, and it’s time to start shopping! If you don’t receive your eBay
registration confirmation e-mail within 24 hours, there was most likely an error in your e-mail
address. At this point, the customer-support folks can help you complete the registration process.
Try visiting the Live Help link on the eBay home page. They are always happy to help. If for some
reason (brain cramp is a perfectly acceptable excuse) you incorrectly type in the wrong e-mail
address, you have to start the registration process all over again with a different User ID (eBay
holds the previous ID for 30 days). If you run into a snag, you can click the Live Help button.
Gender: This first choice gets right down to the basics; some people find it a good test of
whether the requests for information seem too personal.
Annual household income: Fill this in if you want to (eBay states that this info is kept
anonymous), but I think this information is too personal. If you’re not comfortable with it, skip it.
Your highest completed education level: Again if this is too personal, leave this area blank.
After selecting your responses from the drop-down box, you can click Submit. If you’re not in the
mood right now, you can click the Answer Later link. (This pop-up box will reappear for your
response later in your eBay dealings.) If you don’t want to answer any of the demographic
queries, click the Please Don’t Ask Me Again link at the bottom of the pop-up window. If
somebody you’re in a transaction with requests your info, you get an e-mail from eBay giving you
the name, phone number, city, and state of the person making the request. Keep your
information up to date. If you don’t, you risk being banished from the site.
Make things tough on the bad guys — combine numbers and letters (use upper- AND lowercase)
or create nonsensical words.
Don’t give out your password to anyone — it’s like giving away the keys to the front door of your
house.
If you ever suspect that someone has your password, immediately change it by going to the
following address:
pages.ebay.com/services/myebay/selectpass.html
Change your password every few months just to be on the safe side. Don’t use the same
password for eBay and PayPal.
Don’t use a name that’s too weird. If people don’t trust you, they won’t buy from you.
eBay doesn’t allow spaces in User IDs, so make sure that the ID makes sense when putting two
or more words together. If you’re dying to have several short words as your User ID, you can use
underscores or hyphens to separate them, as in super-shop-a-holic. If you sign in to eBay
permanently on your computer, typing underscores or dashes won’t slow you down.
You can change your User ID once every 30 days if you want to, but I don’t recommend it.
People come to know you by your User ID. If you change your ID, your past does play tagalong
and attaches itself to the new ID. But if you change your User ID too many times, people may
think you’re trying to hide something. Nevertheless, to change your User ID, click the My eBay
link at the top of most eBay pages. From your My eBay login page, click the Preferences/Set-up
tab and scroll to the Change My User ID link, fill in the boxes, and click the Change User ID
button. You now have a new eBay identity.
No names with eBay in them. (It makes you look like you work for eBay, and eBay takes a dim
view of that.)
No symbols such as the greater than or less than symbols (> <) or consecutive underscores _ _.
No IDs that begin with an e followed by numbers, an underscore, a dash, a period, or a dot.
When you pick your User ID, make sure that it isn’t a good clue for your pass- word. For
example, if you use Natasha as your User ID, don’t pick Boris as your password. Even Bullwinkle
could figure that one out.
Visit: http://tinyurl.com/4zh9w
It's completely free, takes less than 5 minutes, and no personal information is required. You must be
a registered member to buy. All you provide is your name, address info, a user ID, and a password
for your account (remember your ID & password, you will need it for Step 3). No credit card info
is needed.
------------------------------------------------------------------------------------------------------------------------
Use the slider bars on the side and bottom of the window to move around the page.
Click on a number at the bottom of the page to move to the next page (or click on the word Next).
Click the item description (blue text) to see detail and pictures of the item. You will also see a Buy
it Now button you can click to purchase the item.
Click on Back To List of Items near the top of the window page to get back to the item list.
If you want to narrow your search, or search for something else, use the advanced search box
below the window.
------------------------------------------------------------------------------------------------------------------------
Every time an item is bought on eBay, feedback about the transaction is left by the buyer. The
feedback rating (% of positive feedback) ensures you are dealing with an honest seller. A dishonest
seller will be quickly put out of business by negative feedback. EBay is one of the safest ways to
get the lowest prices available on the market today.
By clicking on the item description (blue text), you will be taken to the Item Page. In the Seller
Information box (as above), you will see the seller's ID, and a number in parenthesis. This number
represents how many items the seller has bought or sold. You will also see the seller's % of positive
feedback directly below the seller's ID.
Look for a seller with a number greater than 50 in parenthesis, and a positive feedback at 98% or
greater. This means there would only be 1 negative feedback left for 50 items sold. Analysis shows
these are the top sellers, and you are certain to have a smooth transaction. You don't get that level of
service in your local retail store!
Click on the Buy It Now button for the item you would like to purchase. To get to the Buy it Now
button, click on the item description (blue text) of the item you would like to purchase.
You will be asked to enter the eBay ID and password you created in Step 2 above. Select PayPal as
your payment method, and provide a credit card number. PayPal is one of the most secure payment
processing services available on the internet, using state of the art encryption technology. They are
owned by eBay, so all information is confidential.
Complete the steps, and your item will be on the way! You will receive an email confirming your
purchase. You should hear from the seller within 24 hours.
Using Paypal On Ebay.
by: Kirsten Hawkins
PayPal and eBay were made for each other – and now that eBay own PayPal, using them together is
getting even easier.
------------------------------------------------------------------------------------------------------------------------
What is PayPal?
People with PayPal accounts can send money to each other securely online. You can deposit money
in a PayPal account from a bank account or a credit card, and withdraw money to your bank
account. It is the most common way of paying on eBay, as well as being in widespread use on the
rest of the Internet.
------------------------------------------------------------------------------------------------------------------------
It’s very easy to get a PayPal account. Just go to http://www.paypal.com & click the ‘Sign Up’ link.
As a buyer, you should get a Personal account – you can always upgrade later if you decide to start
selling. Then all you need to do is enter your address, phone number and email address, and create a
password, and two secret questions. You’ll be emailed a confirmation, and then you’re done!
If you want to deposit money into the account now, then you need to register a credit or debit card
or your bank details, and if you want to withdraw money then you need to register your bank
details. There’s no need to do anything like that just yet, though.
------------------------------------------------------------------------------------------------------------------------
Paying with PayPal is very simple. When you win an auction and click ‘Pay Now’, you’ll be given
a list of payment methods the seller accepts. You should always check what the seller accepts before
you bid, as there are still some sellers who won’t take PayPal. If the seller does accept PayPal, it
will already be chosen for you on the payment page.
Now you just need to press ‘Next’, type in your PayPal username and password and confirm the
amount you want to pay. The first time you pay with PayPal you will need to enter the details of
your card or bank account, but after that it will remember for you.
------------------------------------------------------------------------------------------------------------------------
Becoming Verified.
You might have noticed that there is a limit to how much money you can send or withdraw using
PayPal before you need to be verified. Verification has two steps. First, PayPal deposit some very
small amounts of money in your bank account and you need to tell them how much they deposited.
Second, they need to phone you to confirm your address and phone number. Once you’ve done that,
all the limits on your account will be lifted. Log in at paypal.com and click on ‘Get Verified’ for
more information.
How PayPal Works
The simple idea behind PayPal -- using encryption software to allow people to make financial transfers between
computers -- has turned into one of the world's primary methods of online payment. Despite its occasionally
troubled history, including fraud, lawsuits and zealous government regulators, PayPal now boasts more than 100
million accounts worldwide [ref].
In this article, we'll show you how to use PayPal, find out how the transactions are made, and learn something
about the company's history. We'll also examine some of the complaints about PayPal's business practices. Let's
start with the basics.
PayPal is an online payment service that allows individuals and businesses to transfer funds electronically. You can
use it to pay for online auctions, purchase goods and services, or to make donations. You can even use it to send
cash to someone.
A basic PayPal account is free. You can send funds to anyone with an e-mail address, whether or not they have a
PayPal account. They'll get a message from PayPal about the funds, and then they just have to sign up for their own
account.
Funds transferred via PayPal reside in a PayPal account until the holder of the funds retrieves them or spends them.
If the user has entered and verified their bank account information, then the funds can be transferred directly into
their account. Other ways to withdraw your funds are listed below:
PayPal Infrastructure
PayPal doesn't fundamentally change the way merchants interact with banks and credit card companies. It just acts
as a middleman. Credit and debit card transactions travel on different networks. When a merchant accepts a charge
from a card, the merchant pays an interchange, which is a small fee of about ten cents plus approximately 2
percent. The interchange is made up of a variety of small fees paid to all the different companies that have a part in
the transaction -- the merchant's bank, the credit card association and the company that issued the card [ref]. If
someone pays by check, a different network is used, one that costs the merchant less but moves more slowly.
What part does PayPal play in all this? Both buyer and seller deal with PayPal, having already provided their bank
account or credit card information. PayPal, in turn, handles all the transactions with various banks and credit card
companies, and pays the interchange. They make this back on the fees they charge for receiving money, as well as
the interest they collect on money left in PayPal accounts.
PayPal touts their presence as an extra layer as a security feature, because everyone's information, including credit
card numbers, bank account numbers and address, stays with PayPal. With other online transactions, that
information is transmitted from the buyer to the merchant to the credit card processor.
All the money held in PayPal accounts is placed into one or more bank accounts, where PayPal collects interest.
Account holders do not receive any of the interest gained on their money. Some PayPal critics claim that one of the
reasons PayPal locks accounts and puts people through a long, frustrating appeal process is so they can keep the
funds in the bank longer to collect more interest.
Next, we'll learn about the history of PayPal.
Security
After a series of scams, PayPal formulated a plan to prevent
criminals from using computer programs to open dozens of
fraudulent accounts with stolen credit card numbers. This system,
known as the "Gausebeck-Levchin" test, is now widely used by
thousands of Web sites [ref]. It requires new account creators to
type in a word found in a small image file on the account creation
page. A script or a bot can't read this word -- only a human can
decipher it.
PayPal History
Peter Thiel and Max Levchin founded PayPal in 1999 under the name Confinity. The idealistic vision of the
company was one of a borderless currency free from governmental controls. However, PayPal's success quickly
drew the attention of hackers, scam artists and organized crime groups, who used the service for frauds and money
laundering. New security measures stemmed the tide of fraud and customer complaints, but government officials
soon stepped in. Regulators and attorney generals in several states, including New York and California, fined
PayPal for violations and investigated the company's business practices. Some states, such as Louisiana, banned
PayPal from operating in their states altogether. PayPal has since received licenses that allow them to operate in
these places.
PayPal's Auction Tools page for eBay sellers.
Despite the initial turmoil, PayPal's market share continued to grow. At first PayPal offered new users $10 to join,
plus bonuses for referring friends. The service grew so quickly that it soon became the default online payment
service. Buyers wanted to use it since so many merchants accepted it, and merchants accepted it because so many
buyers were using it. PayPal owes much of its initial growth to eBay users who used the service to pay for items
and accept payments for their online auctions. PayPal even beat eBay at the online payment business, trumping
eBay's in-house payment system Billpoint so thoroughly that in 2002, eBay bought PayPal. Then it phased out
Billpoint and integrated PayPal into its services. Sellers with PayPal accounts can place icons in their auctions and
buyers can simply click on a PayPal logo when they win an auction to make an immediate payment.
In early 2002, PayPal held its IPO, opening at $15.41 per share and closing the day's trading above the $20 mark
[ref]. eBay purchased PayPal that same year for $1.4 billion in stock [ref]. Recently, eBay spent another $370
million to buy out another PayPal competitor, VeriSign.
In the next section, we'll learn about the different types of PayPal accounts.
------------------------------------------------------------------------------------------------------------------------------------------
Sending Limits
One confusing part of PayPal is the sending limit that they place
on new accounts. These limits are typically $2,000 for new users,
but sometimes users outside of the United States can't use the
account to send money at all until they go through a verification
process that lifts the limit. It's a lifetime limit -- once you hit that
level, you can no longer send until you verify the account.
However, the limits aren't consistent and some transactions don't
count towards the limit. PayPal's user agreement does not make
clear when or why the limits change, or what charges don't count
towards the limit.
------------------------------------------------------------------------------------------------------------------------------------------
The PayPal Shops page includes online merchants that accept PayPal.
You can use PayPal to purchase goods from non-eBay merchants who have set up a PayPal storefront. Once you've
selected your items, go to the Web site's checkout page. You will have the option of selecting a credit card or
PayPal to pay for your purchase. Selecting PayPal may send you to a login page for your PayPal account. There
you can transfer the appropriate amount to the merchant, who will then complete the sale. Some merchants
integrate PayPal into the Web site, meaning that you put your PayPal information directly into their site.
Just click on the PayPal button to use it as a payment method.
If a Web site only accepts credit cards, you can still use funds in your PayPal account to make a purchase. PayPal
users can use the "PayPal Debit Bar" to get a virtual MasterCard number. You can use that card number with any
merchant who accepts MasterCard, and the funds will be deducted from the PayPal account. This service is free.
For example, you might want to use your PayPal account to buy something from Amazon.com. However, Amazon
doesn't accept PayPal as a payment method. You can activate the Debit Bar from within your PayPal account.
Assuming you are carrying enough of a balance in your account to cover the purchase, PayPal will give you a 16-
digit number, just like a credit card number. Then you will select MasterCard as your payment method from
Amazon's payment page and enter the Debit Bar number.
In the next section, we'll see how merchants can use PayPal to accept payments.
------------------------------------------------------------------------------------------------------------------------------------------
Add money to your account so you can shop online. (Photo by Sanja Gjenero)
•
Choose "Close Account" to cancel your account.
PayPal Criticism
• PayPal is the most used site for money transfers online, but it has its critics. Sites like PayPal Sucks accuse
PayPal of infractions that include:
1. Unjustified freezing of customer accounts.
2. Exorbitant fees for non-credit card funding.
3. Poor customer service.
• PayPal is also not set up to service large businesses, who may feel PayPal limits their ability to analyze
sales and keep track of customer information.
Anatomy of an E-Mail Message
E-mail messages are similar to letters, with two main parts:
The header contains the name and e-mail address of the recipient, the name and e-mail address of
anyone who is being copied, and the subject of the message.
Some e-mail programs also display your name and e-mail address and the date of the message.
The body contains the message itself.
The world's first e-mail message was sent in late 1971 by Ray
Tomlinson.
Just like when sending a letter, you need the correct address. But with e-mail, spelling is critical. If you
use the wrong address or mistype it, your message will bounce back to you--the old Return to Sender,
Address Unknown routine.
An Electronic Postmark
When you receive an e-mail, the header tells you where it came from, how it was sent, and when. It's an
electronic postmark.
Unlike a letter, which is sealed in an envelope, e-mail is not as private. It's more like a post card.
Messages can be intercepted and read by people who really shouldn't be looking at it. Avoid including
any confidential information unless you have a way to encrypt it. For more on this, read "How Private is
Your E-Mail?"
TRY THIS...
To learn more about electronic mail, read Wikipedia's e-mail
article.
------------------------------------------------------------------------------------------------------------------------------------------
Internet e-mail addresses typically have two main parts: the user name and the domain name.
Here's an example:
professor@learnthenet.com
professor is the user name and refers to the recipient's mailbox. After the @ sign comes learnthenet,
the host name, also called the domain name. This refers to the mail server, the computer where the
recipient has an electronic mailbox. It's usually the name of a company or organization.
Top-Level Domains
The end of the domain name consists of a dot (".") followed by three or more letters (such as .com and
.gov) that indicate the top-level domain (TLD). This part of the domain name indicates the type of
organization or the country where the host server is located.
These top-level domains are currently in use:
.aero--For the air-transport industry
.biz--Reserved for businesses
.com--For businesses, commercial enterprises, or online services like America Online. Most
companies use this extension.
.coop--Reserved for cooperatives
.edu--For educational institutions and universities
.gov--Reserved for United States government agencies
.info--For all uses
.int--For organizations established by international treaties
.mil--For the United States military
.museum--For use by museums
.name--For use by individuals
.net--For networks; usually reserved for organizations such as Internet service providers
.org--For non-commercial organizations
.pro--For use by professionals, such as attorneys and physicians
More information about top-level domains is available at the website of ICANN, the organization that
administers TLDs.
For e-mail addresses outside of the United States, there is often a two letter country code. For instance,
.ca indicates Canada, .uk indicates the United Kingdom and .mx indicates Mexico. Here's a complete
list of Internet country and territory codes.
------------------------------------------------------------------------------------------------------------------------------------------
Here's a challenge for you: how do you find someone's e-mail address? As you might suspect, there are
a number of ways to go about this. Before you read any further though, make sure you understand the
anatomy of an e-mail address by reviewing the "Understanding E-Mail Addresses" article.
Ask.
It may seem obvious, but the easiest way to get someone's address is to just ask. If you already know
the person, pick up the phone and call. It will certainly save you a lot of time and effort.
Use online directories.
It would be very convenient if you could consult a central directory of e-mail address. Unfortunately, no
comprehensive directory exists, at least not yet. Why not, you may wonder? Imagine the task of
compiling hundreds of millions of addresses from all over the world. Keeping the directory current would
present an enormous challenge, given the frequency with which people change addresses. Then there's
the privacy issue to contend with. Like phone numbers, many people don't want to be listed.
While you can access a number of online directory services, their usefulness is limited. Many are not up-
to-date. Also, if the person you're looking for has a common name, the database may turn up a number
of addresses. Which one is correct? You'll just have to guess. Here's the one we recommend:
• Yahoo! People Search (formerly Four11.com)
If you strike out, don't give up. Try another approach.
Check business cards and websites
Many people list their e-mail address on their cards, so look there. Or go to the company website and
see if there's a staff directory.
Mine old messages.
If you've received a message from someone in the past,
it contains the person's address. Many e-mail programs,
like Outlook and Yahoo! Mail, automatically record the
sender's address in your address book. If it's not there,
locate the address by first opening the message, then
double-clicking on the name in the FROM: field. This
should open a box that displays information about the
sender.
Search for online references.
If you're looking for the address of a journalist, politician
or corporate executive, try using a search engine. For help, refer to the "Searching the Web" article. Your
search may turn up articles written by the journalist that contain her e-mail address. Many politicians
now have websites with contact information and many companies list key executives along with their e-
mail addresses.
Take a guess.
Once you understand how e-mail addresses are constructed, you may be able to figure out someone's
address. Believe-it-or-not, guessing frequently works. If you know where a person works you can usually
figure out the domain name, for instance, learnthenet.com. But what about the recipient's mailbox?
Suppose you want to contact Mary Jones. Her address may take one of these forms:
• Her first name (mary@learnthenet.com)
• Her last name (jones@learnthenet.com)
• Her initials (mj@learnthenet.com)
• Her first initial and last name (mjones@learnthenet.com)
• Her first and last name separated by a dot (mary.jones@learnthenet.com)
• Her first and last name separated by an underscore (mary_jones@learnthenet.com).
Try one of these. The worst that can happen is that the message comes back to you. Send it again using
an alternate form. With any luck, it will work.
------------------------------------------------------------------------------------------------------------------------------------------
E-mail is by far the most popular service on the Internet. Sending messages is a snap. Just follow these simple
steps. (Although our demonstration uses Microsoft Outlook, most e-mail programs work the same way.)
Open your e-mail program and launch a new message window by clicking on the appropriate
icon.
In the TO box, type the name of the recipient. It should take this form:
comments@learnthenet.com. Make sure you enter the address correctly or the message will return to
you.
You can send a message to more than one person by entering multiple addresses. Just put a semicolon
(;) between each address.
You can also send a copies (Cc:)and blind copies (Bcc:) to multiple addresses.
Write your message in the message window. You can also copy text from a word processing
program and paste it into the window.
Click on the Send icon or select Send from the File menu.
------------------------------------------------------------------------------------------------------------------------------------------
In written correspondence, most people sign their letters. With electronic messages, you can add a
signature too, although it's a bit different.
Most e-mail programs these days let you insert a signature file at the bottom of the message. It can be
anything from a clever quote to some additional information about you, such as your title, company,
phone number and website address. If you're creative, use the characters on your keyboard to make a
unique design.
Once you create a signature file, your e-mail program will insert it automatically, instead of you having to
retype it with each message. If you send a lot of e-mail, this saves time and keystrokes.
When the dialog box opens, click on the Mail Format tab, then click the Signatures button at the
bottom.
Next, click the New button.
Now type the name of the new signature. If you want, you can have more than one signature, maybe
one for professional use and one for personal messages. Click Next.
Type your signature information into the text box. Make sure it's formatted and spelled correctly.
When you're done, click the Finish button.
TRY THIS...
Test your signature. Click on this link. When the e-mail
window appears, type your address in the TO: field, then
fill in the Subject field and write a note. Now click the
Send button. In a few minutes, your message should
appear in your Inbox, along with your new signature (if
you chose to have it added automatically).
------------------------------------------------------------------------------------------------------------------------------------------
With the advent of an Internet protocol called MIME, Multipurpose Internet Mail Extension, and other
types of encoding schemes, you can send formatted documents, photos, sound and video files as
attachments to your e-mail messages.
These protocols use a complex mathematical formula to convert files to text and then back to their
original form. This conversion process is known as encoding and decoding. If the person to whom you
are sending an attachment uses a MIME-compliant or UUencode e-mail program--and most popular
programs do--it will automatically detect the attachment, decode it, and either open it or prompt the
recipient to save the file. This process is mostly invisible to you.
Before you send binary files or formatted documents as attachments, make sure that the person you are
sending them to has the ability to open the files. For instance, if you send a spreadsheet created in
Excel, the recipient will need that program to view the file.
By the way, don't confuse encoding a file with encrypting a file. Encoding files adds no security.
Anyone with the right decoding software can view it.
How to Do It
The procedure for attaching files varies depending on the type
of e-mail program you use. In general, you click on an icon,
such as a paper clip, located on the toolbar of the program. You
then select the file you want to attach by locating it on your
hard drive or on disk. Once you've selected the file, either its name will appear as part of the e-mail
header, or as an icon within the body of your message. Most programs allow you to attach multiple files,
but may limit the size of the files to no more than 10 Mb. Once the files are attached, click the Send
button and off they go.
------------------------------------------------------------------------------------------------------------------------------------------
Here's how to e-mail documents, spreadsheets, photos or any other type of file. We're using Microsoft
Outlook, but most e-mail programs, even Web-based e-mail like Hotmail and Yahoo! Mail, work the
same way.
Open your e-mail program, launch a new message window
and compose your message.
------------------------------------------------------------------------------------------------------------------------------------------
One of the most useful features of e-mail is the ability to send digital files. But once you receive an
attachment, how do you open it? The answer depends on the type of file and how your computer is
configured.
All digital files have names, such as "balloon1.jpg." The letters after the "." are known as the file
extension and indicate which kind of program can open the file. For instance, you can view a .jpg photo
file with your web browser and listen to a .mp3 music file with Windows Media Player and iTunes, among
others. The most common types of files sent over the Net include these:
.jpg
Images A web browser, Office Picture Manager, image editing programs
.gif
.doc Word
Documents .xls Excel
.pdf Acrobat Reader
To learn more about file types and for a comprehensive list, refer to the File Formats article.
Beware of Viruses
Attachments may be dangerous to the health of your computer. Why? Because
they can conceal viruses and other malicious programs designed to destroy your
data or cause computer chaos. Unless you know who sent an attachment, DO
NOT OPEN IT. Delete the attachment to avoid infection.
Even if you do know the source, scan it with anti-virus software before you open
it. If your computer has an anti-virus program running in the background, it should
automatically check for viruses. For more on this, read to the Computer Virus
article.
Open Sesame
Once you're sure that an attachment is safe, here's how to open it:
Double-click on the attachment icon.
A dialog box opens.
To view the file without saving it, check Open it, then click OK. The application should open,
allowing you to view the file. If the file extension isn't associated with an application, follow the directions
below.
If you saved the file, locate the folder where you saved it, find the file and double-click on it. The
appropriate program should open. Alternately, you can first open the associated application--for instance,
Word if the you received a ".doc" file--then locate the file and open it.
Click on the File Types tab, then locate the file type from the list. Click it once to highlight it. You will
see which application, if any, is associated with the file. To associate a new application, click the Change
button.
When the dialog box opens, click the program you want to use to open the file. If the program
doesn't appear in the list, click the Browse button and locate it on your hard drive. Once you've made
your choice, click OK.
There's no doubt that the above procedure is a bit complicated, so if you encounter problems, ask
someone to walk you through the steps. After a while, you'll get the hang of it.
------------------------------------------------------------------------------------------------------------------------------------------
Suppose you've received an e-mail that you want to forward, but you only want to send some of the text.
Here's how to do it:
Highlight the text you want to forward by placing your cursor at the beginning of the text. Hold down
the left mouse key and drag the cursor over the text.
Paste the text by selecting Paste from the Edit menu. That's it! Now you can send a cleaned-up
message.
------------------------------------------------------------------------------------------------------------------------------------------
Once e-mail becomes an essential part of your life, you will want to check it often. With a Web-based e-
mail account, you can do it from any computer connected to the Net, anywhere on earth. There's no
need to lug around a laptop when you're traveling, because you can access your e-mail from a computer
at a friend's house, a hotel business center or at one of the thousands of cybercafés that have sprung up
around the world. (Coffee and e-mail make a potent brew.)
TRY THIS...
For a list of addresses around the world, visit
Cybercafés.com.
Another benefit of Web-based e-mail is that you can keep the same address for life. Once you have an
account, even if you change your company or switch Internet service providers, the address remains
yours.
How It Works
With client-based e-mail, like Outlook or Thunderbird, a software program running on your
computer accesses a remote mail server. With Web-based e-mail, to send and receive
messages, you access a website, so all you need is Internet access and a web browser. To
access your e-mail you log on to your account by entering your user ID and password. Now you
can read and reply to messages. Most services offer online address books to store e-mail addresses
and contact information. You can also set up folders to manage your messages.
One thing to keep in mind is that free Web-based e-mail services limit the amount of storage that they
provide. For instance, Yahoo! Mail has a 5 GB limit. This may sound like a lot, but if you receive loads of
mail with large attachments like photos, music and video clips, you will have to delete or download them
to your computer periodically to stay below the limit. Another option is to pay for additional storage.
Setting Up an Account
Establishing a new e-mail account takes only a few minutes and couldn't be easier. You'll have to
provide information about yourself and choose an account name and password. Your account name or
ID becomes part of your e-mail address. If you open a Hotmail account and choose "wiseguy" as your
ID, your address becomes "wiseguy@hotmail.com." Account names can use letters and numbers, such
as "professor2000," can't contain any spaces, and are limited in length, depending on the service.
Account Names
The more popular Web-based e-mail services have millions of members, so most
common account names are already taken. If you want to use your own name, try
incorporating underscores ( _ ) into the address, like this: jane_r_franklin. If you're lucky,
no one else will have it.
Passwords
Since e-mail may contain sensitive information, it's important to have a secure account
that only you can access. Choose you password carefully.
Passwords are usually case sensitive, meaning that they use both upper and lower case
letters. If your password is "mOmbO," then entering "MOmbo" won't work. The most
secure passwords contain both letters, symbols and numbers, like this: @nimAls8.
Changing your password every few months is a good idea, too. For more help read our
Password article.
Many websites now offer free Web-based e-mail, so how do you decide which one to go with? Think
about this: We expect the postal service to deliver our letters reliably every day and we trust it to keep
our communications private. As you come to depend more on e-mail for business and personal
communications, having a reliable, trustworthy service becomes critical. You will have to evaluate each
service based on its track record.
A few services stand out for their longevity, reliability and friendliness. Our top recommendations are:
When you use a computer other than yours to check your e-mail, log off the service when
you're done. For extra security, close the web browser too.
Once you've configured your account, you can stay connected from anywhere.
------------------------------------------------------------------------------------------------------------------------------------------
Each day billions of e-mail messages zap across the Internet. If it seems that most of them make their
way to your Inbox, you're not alone. "Overwhelming" is how many people feel about this electronic
communication. The bad news is that it will only get worse as the popularity of e-mail increases. The
good news is that you can avoid drowning in a sea of messages by following some simple steps.
Yes, e-mail is instant communication, but that doesn't mean a reply has to occur
instantly. Take time to consider your response. This will slow down a stream of
messages flying back and forth.
------------------------------------------------------------------------------------------------------------------------------------------
What most annoys Internet users? The answer is a four letter word: spam, those obnoxious, unsolicited
e-mail messages touting get rich quick schemes, miracle diets, amazing beauty products and
pornographic pleasures. Unlike paper junk mail, which senders pay for, spammers pay almost nothing to
e-mail millions of their offensive messages. It's your ISP and ultimately you that have to bear the cost of
transmitting unwanted e-mail across the Net. AOL, MSN, Earthlink, Yahoo! and other e-mail providers try
to block spam before it reaches your mailbox, but their efforts are only partially effective.
Some countries have laws against spam and some spammers have been fined for their actions, but the
practice continues. In fact, it's increasing. Why, you may wonder, when spammers are universally
despised? Because it works. Sending e-mail in bulk is so cheap that even if only a handful of people
respond, there's a profitable payoff for the spammer.
Unfortunately, spam is here to stay. That doesn't mean you have to be an innocent victim. Here's how to
fight back:
Protect your e-mail address.
Spammers either buy lists of e-mail addresses or use software programs that mine the addresses from
the Internet. If your address is posted in discussion groups, on websites, chat rooms, blogs, etc., the
chances are that it will end up on one or more of these lists. Only post your address publicly when
absolutely necessary.
If you have to post your address, you can fool the mining software by writing it this way:
professor(at)learnthenet.com. Instruct people who want to e-mail you to replace (at) with the @ sign.
Set up multiple e-mail accounts.
If you do participate regularly in online activities where you post your address, then set up another e-mail
account. Only give it to close friends and family.
Use spam filters.
Many e-mail programs, such as Outlook, have built-in tools that block messages sent from certain
addresses or that filter messages based on keywords you define. To learn how these features work,
check the online help files for your e-mail software.
TRY THIS...
Until the Internet explosion, SPAM was a popular
processed luncheon meat made by Hormel Foods. How
did it come to acquire its current loathsome meaning?
Find out at the source.
Don't respond.
Spammers continue their pernicious practice because it's effective. Help stomp it out by
boycotting them. Don't buy their products regardless of how enticing the offers may be.
Some clever spammers include instructions at the bottom of the message on how to
remove your name from their list. The worse thing you can do is to reply. Why? Because this tells the
spammer that you read your mail and that your address is valid. The result may be that you get even
more junk mail.
Don't retaliate.
After receiving dozens of unwanted messages, the natural inclination is to fire off a nasty missive. Resist
the urge. It could backfire, resulting in more, not less, spam.
Opt-out.
Some websites require you to register to use their services. Before you do, review the
site's privacy policy to see how it uses your personal information like your e-mail
address. If the site sends out commercial messages, you should be given a choice
whether you want to receive e-mail from the site or from its third party partners. If you
don't want to hear from them, be sure to check the No box.
Remove your address from directories.
Your address may be listed with people finder services, such as Yahoo! People Search and other
directories that are goldmines for spammers. To prevent your address from being harvested, e-mail
these lookup services and ask them to remove your name.
Report violators.
A number of government agencies and private organizations accept complaints. Whether they can
actually do anything to stop the deluge is an unanswered question. Among the ones to contact are:
• SpamCop
• The National Fraud Information Center
You can also forward spam to the U.S. Federal Trade Commission at spam@uce.gov.
Use your Delete key.
Perhaps the path of least resistance is to highlight the offending message and delete it, banishing it to
the trash bin. If everyone ignored spam, it would eventually go away.
------------------------------------------------------------------------------------------------------------------------------------------
When we converse, we expect other people to observe certain rules of behavior. The same is true for e-
mail, the most popular form of online communication. Here are a few pointers to help you communicate
more effectively.
Sending Attachments
Users of many wireless devices don't have the software required to open an
attachment such as a Word document or spreadsheet.
To make sure your message isn't compromised by misspelled words, use your e-
mail program's built-in spell checker.
For more tips, visit Emailreplies.com.
E-mail etiquette may take a while to learn, but don't let your fear of making mistakes inhibit you. All
Internet users were beginners once, so most people are quite forgiving.
------------------------------------------------------------------------------------------------------------------------------------------
When you talk to someone face-to-face, your body language, the tone of your voice and your facial
expressions impart great meaning to what you say. These non-verbal cues may be more important than
your words. You can personalize your written messages by using a smiley or emoticon--a "character"
you create with your keyboard. You'll be amazed at the range of emotions these little characters express.
TRY THIS...
For more inspiration, visit the Unofficial Smiley Dictionary
.
Abbreviations
While smileys add personality to your messages, abbreviations save keystrokes. Some common ones
include:
• <BFN> Bye For Now
• <BRB> Be Right Back
• <BTW> By The Way
• <G> Grin
• <HTH> Hope This Helps
• <IJWTK> I Just Want To Know
• <IJWTS> I Just Want To Say
• <IMHO> In My Humble Opinion
• <LOL> Laughing Out Loud
• <OTOH> On The Other Hand
• <ROTFL> Rolling on the Floor Laughing
• <TOY> Thinking of You
• <YMMV> Your Mileage May Vary
------------------------------------------------------------------------------------------------------------------------------------------
Email Basics
What is Email?
Most people use the Internet primarily to email and surf the World Wide Web.
Simply put, email, or "electronic mail," is the process of sending and receiving messages over the Internet.
While email is similar to a traditional mail system, or "snail mail," as it's sometimes referred to, it's also very
different. See the chart below.
"Snail" Mail Email
Letter, Card, Postcard, Electronic Text Message,
What is
Larger packages electronic pictures, etc.
mailed?
Packet:
In what is it
Envelope, etc A piece of text delivered over the
delivered?
Internet
Who is it Sender: Sender:
from? John Doe John Doe
Recipient:
Recipient:
Who is it for? Jane Doe
Jane Doe
www.GCFLearnFree.org,
A non-profit or not-for-profit
.org www.goodwillenc.org
institution
www.epa.gov,
.gov US Governmental agency www.whitehouse.gov
Email Clients
To send and receive email, both the sender and recipient must have the right tools: an Internet connection, an email
client, and an email address.
An email client (sometimes referred to as a composer) is software that runs on a personal computer, and relies on
an Internet connection to perform some of its operations.
Email clients work with any ISP (Internet Service Provider) that uses standard Internet email protocols. These
protocols make it possible for people using different email client software to communicate with one another. For
example, if I use Microsoft OutlookTM, I can send and receive email with someone who uses QUALCOMM
EudoraTM.
Challenge!
Match the top level domain with the correct description.
____1) .com A. US Educational institution
B. A non-profit or not-for-profit
____2) .gov
institution
____3) .org C. US Governmental agency
____4) .mil D. A company or business
____5) .edu E. US Military
• Once you've opened your email client's window, click the New Mail or Compose button.
• The email message window appears.
• Look for a menu bar and toolbar to help compose and format your message.
• Below the menu bar and toolbar, there are several fields. These fields may include To, CC, BCC, Subject,
and the message body area.
To and From
In the email message window, type the recipient's email address in the To: field. This tells the email server where
to send the email message.
The person who is composing the email is called a sender. When the recipient receives a message, a message
header (sender's email information, subject line, and time received, usually) appears in the recipients INBOX.
To receive new messages (known as "checking your email"), you may need to click the Send and Receive button
to display new email. To automate this process, some email clients let you set up a schedule. Others display a
graphical or audio notice.
Challenge!
• Start your email client.
• Familiarize yourself with the email client window.
• Explore the menus and tools.
• Click the New Mail button.
• Familiarize yourself with the message fields.
• Send a message to a friend.
• Check your email account for new messages.
------------------------------------------------------------------------------------------------------------------------------------------
When to Reply
Email is reliable, immediate, and often informal. However, there are some email "do's and don'ts" you should be
aware of.
I have a couple of things... first, I thought yesterday's sales meeting went extremely well. You should be proud of
a job well done.
You probably remember that in two weeks (May 15), I am scheduled to run the May sales meeting. However, I've
been asked to do some in-house training for a new group in Wilmington during that time. Kate and I thought you
did such a great job yesterday that it would be great if you could possibly take over the May 15 meeting. Check
your schedule and let me know what it looks like. This would be a great help. Let me know.
Thanks,
Rhonda
John's response, quoting parts of Rhonda's message:
Quoting Text when Replying -- Example #2
Initial Message:
Do you and Peter want to double date Friday night? We could go out to eat. Tom and I are in the mood for pizza.
Joe's is a great pizza place. Do you have any other suggestions?
Challenge!
• Check your email.
• Reply to a message using reply one of the methods described in this lesson.
------------------------------------------------------------------------------------------------------------------------------------------
What are you and John doing Friday? Tom's parents will be in town Saturday and Sunday. But, I'd like to do
something with friends before they arrive.
We have 6 tickets to Friday night's hockey game. Do you want to join us? Actually, do you want to go ahead
invite Anita and Tim? I don't have their number or email addresses.
--Meg
Josie forwards the message to Anita:
This is especially difficult when reading a longer message. To keep this from happening, don't use the forward
function. Instead, copy and paste the message into a new email message window. Once it's copied, delete any
carat symbols, add your message, and click Send.
Rather than letting lots of carats accumulate, you may want to ask recipients to copy and paste the message into a
new email message window.
Forward:
Challenge!
• Check your email.
• Forward a message using one of the methods explained in this lesson.
------------------------------------------------------------------------------------------------------------------------------------------
Web Mail
In this lesson, we'll explore other email options, including web mail and instant messaging.
Web mail, sometimes called web-based email, functions somewhat like a traditional email client and can include
many of the same features.
Web mail doesn't require any special email client software. Free web mail accounts such as HotmailTM or
YahooTM use an email client that appears in a web page. You can access your web mail account on any
computer with Internet access. Just type in your web mail service's URL and log in.
Convenient.
Web mail is kept on an Internet server, so you can access it with any computer that is connected to the Internet. You
can also set up new web mail accounts easily.
Accessible.
Even if you change ISPs, you'll still be able to access your web mail account.
Choice.
Pick a web mail service that best suits your needs. For example, is the access point (URL) always available? How
much storage space are you allotted? Does it feature an electronic address book? Is your privacy being protected?
Waiting.
If the speed of your computer and bandwidth are slow, you may have to wait long periods of time to read simple
text messages.
Advertising.
Not only will you have to view ads as you check your email, most services will affix some sort of advertising line
to your email message. For example, "For the best free web mail, check out www.webmail.com." Also, some web
mail providers sell member lists to advertisers, which may result in a lot of unwanted mail in your INBOX.
Privacy.
Keep your web mail password secret and change it often. You never know who may want to read your email.
Instant Messaging
Instant Messaging (IM) is another type of email software that is frequently used for chat. Chat somewhat mimics
a conversation. Instead of talking, you type messages back and forth in real time.
An instant messaging service is software that runs on a personal computer. Like other email services, you need an
Internet connection and software to use instant messaging. AOL Instant MessengerTM, Yahoo! MessengerTM,
MSN MessengerTM, and ICQTM are just a few of the instant messaging services available. Most services are
free.
Real time.
Instead of waiting for someone to reply to your email message, if someone in your contact list is online, you can
chat in "real time."
Turn it off.
There may be times when you don't want to be available for chat.
Privacy.
Do you want everyone to know when you log on?
Difficulty.
Poor typing skills can inhibit IM communication.
Waiting.
If the speed of your computer and bandwidth are slow, you may have to wait long periods of time to read simple
text messages.
Advertising.
View ads as you "message" others.
Challenge!
• Do some research on web mail services. Set up a free web mail account.
• Do some research on instant messaging (IM) services. Ask your friends and family which IM service they
use, or tell them about the service. Download an IM service and start emailing in real time!
------------------------------------------------------------------------------------------------------------------------------------------
What is an Attachment?
Email is one of the quickest ways of sharing information with others. Learning to create, send, and open an email
attachment is the next step to becoming an email pro.
Using your email client's attachment feature, you can attach and send different file types along with your email
messages. When sending an email attachment, your email program changes (encodes) your file so it can be sent
across the Internet.
To send an email attachment:
• Enter a message into an email message window.
Most word processors have a Save as option that allows you to save your file in a variety of different formats,
including RTF.
Challenge!
• Using the tips described in this lesson, send an email attachment to a friend or family member.
• Don't open any attachments without first scanning them for viruses.
------------------------------------------------------------------------------------------------------------------------------------------
HTML is a computer language used to format text and objects on the World Wide Web. Using HTML
(sometimes called Rich Text in email client software), you can add formatting to your email messages.
Formatting includes:
• Formatting text (font and style)
• Text alignment (right, left, center, justified)
• Bullets
• Numbering
• Background color
• Adding objects (such as the computer picture above)
Microsoft Outlook lets you create an email message using any of the Office suite applications (Word, Excel,
PowerPoint, and Access).
You can choose a default format for your messages. Many email clients allow you to choose HTML or plain text
for each individual message.
Formatting Text
OR
• See if your email client has any stationary templates. Stationary templates include background images,
special text, and formatting.
OR
To send pictures:
• Attach it. Each picture you want to email is a file. You can attach one or more files to an email message and
send it as an attachment.
• Provide a link. Instead of sending the file as an email attachment, provide a link to a web page that
includes a picture.
• Use a Microsoft program. Outlook lets you create email messages using any of the Office suite
applications (Word, Excel, PowerPoint, and Access). Insert pictures as you normally would if you were
using that application.
Challenge!
• Determine whether or not your email client has HTML (Rich Text) formatting options.
• If so,
• Determine font (Arial, Verdana, etc).
• Determine font size (small medium, large or measured in points).
• Determine font style (bold, italics, underline).
• Determine font color.
• Determine text alignment.
• Determine background color.
• Send your message to friends and family.
------------------------------------------------------------------------------------------------------------------------------------------
Newsgroups
Besides the WWW, there are other sources of information on the Internet. USENET is an international bulletin
board system (BBS) that features discussions on any topic imaginable. These discussion topics are called
newsgroups.
A newsgroup is an online "place" where people chat about anything and everything. There are over 14,000
newsgroups used by millions of people each day. Want to meet others who have hiked the Appalachian Trail? Are
you a fan of a particular television program? Chances are, you'll find a newsgroup that suits your interests.
Newsgroups can be a great resource. Anyone can read and post questions/answers, thoughts, and opinions. In many
cases, no one moderates the discussions. Be forewarned, anyone can say anything. That doesn't mean you should,
though.
Professionals often use newsgroups to network electronically.
Accessing Newsgroups
To view and post messages to a newsgroup, you need a newsreader. A newsreader is a program that connects you
to a news server on the Internet.
• Your email client may be a newsreader.
• Some web browsers, such as Internet Explorer and Netscape, come with newsreaders.
• There are freeware, shareware, or commercial software newsreaders available.
You can configure your system to handle USENET newsgroups. Follow the instructions appropriate to your
system and software. For more information about accessing newsgroups, check out:
http://webreference.com/roadmap/map08.html
Mailing Lists
Much like bulletin boards, mailing lists are a great way to share knowledge and information with a group.
However, mailing list messages are accessed using an email client. Professionals often use mailing lists to network
electronically with other professionals in their field.
For example, you are the head of a committee and oversee 15 volunteers. You need to communicate with your
volunteers one or more times a week, but only meet once a month. Volunteers often need to contact one another.
You decide to set up a mailing list to help your group communicate more efficiently. A mailing list is a list of email
addresses identified by a single email address called a mailing list name.
For example, volunteers@yahoo.com (the mailing list name) consists of members' email addresses (your email
address and each volunteer's email address). To receive mailing list email, members subscribe to the list.
Pros:
• There are mailing lists available on almost any topic.
• Learn and share information.
• Read about tips, tricks, opinions, and events that interest you.
• Meet others who share your interests, are in your same line of work, etc.
• Some lists are moderated, meaning there is someone appointed as moderator to keep the discussion on
topic.
• Some lists are sent in a "digest" format. Periodically, you'll receive an email message containing several
messages.
Cons:
• If a mailing list has even 100 members, it can generate a lot of email. Do you have time to read it all?
• Some lists are not moderated, and discussion can quickly get off-topic.
Challenge!
• Newsgroups and mailing lists provide way to meet and communicate with people from all over the world
who share your interests. The best part is, you never have to leave your computer.
• To learn more about newsgroups, check out:
http://www.ibiblio.org/usenet-i/usenet-help.html
• To learn more about subscribing to a mailing list, check out:
http://www.webcom.com/impulse/list.html#Search
------------------------------------------------------------------------------------------------------------------------------------------
Email Do's
Because email is fast, easy, cheap, and convenient, it's rapidly becoming a common form of communication in the
workplace. Here are a few basic guidelines to follow when sending e-mail.
Do include a descriptive subject line
A subject line should be a short phrase, since many email clients shorten longer subject lines, and somewhat
describe the contents of the message. If you like, you can include a prefix to help your recipient understand the
message.
urgent = please read now
req = request
FYI = for your information
For example:
Do keep it short
It's time-consuming to read through a lot of text looking for specific information. Make your point and make it
short. Think of e-mail as a brief telephone conversation. People you work with may receive hundreds of e-mail
messages a day.
Email Don'ts
Don't ignore spelling and grammar mistakes
It's true that email communication is far more casual than a formal report, but it's crucial to know when to pay
attention to detail such as spelling and grammar. To help you, many email clients feature Spell check.
Don't bother with excessive formatting
Keep it simple. Formatting doesn't matter a whole lot when you are composing a short e-mail message. Logically
organize your message with line breaks when appropriate. Use HTML (Rich Text) sparingly.
Don't use excessive punctuation
Let your words express your feelings; don't follow up a short statement with 50 exclamation points.
Don't use emoticons
Emoticons, or smilies, are keyboard characters used to convey an emotion. Use emoticons sparingly. Some
consider them too "cutesy" and unprofessional.
Examples:
:-) = happy
:-( = sad
;-) = wink
:-o = shocked, surprised
Mind Your Manners
When you communicate face-to-face, you pay attention to what is said and how it is said. Non-verbal clues such as
facial expression, body language, dress, and hearing the emotion in someone's voice all help you understand of the
intention of the statement being made.
Electronic communication is very different. If you're not careful, email can complicate communication.
Before you send that next email message, consider the following:
Tone
When you are e-mailing friends, a casual tone is fine. When e-mailing at work, treat each message individually. If
you typically address someone using Mr. or Ms., then do so in your e-mail message. Generally, be courteous. Treat
others as you would like to be treated. And remember, sarcasm is often misunderstood in electronic
communication.
Think Twice
Keep it simple. Formatting doesn't matter a whole lot when you are composing a short e-mail message. Logically
organize your message with line breaks when appropriate. Use HTML (Rich Text) sparingly.
Avoid Engaging in a Flame War
Let your words express your feelings; don't follow up a short statement with 50 exclamation points.
Avoid "Shouting"
AVOID USING ALL CAPITAL LETTERS. IT'S CALLED "SHOUTING," AND IS CONSIDERED RUDE.
Don't Spam
While you may enjoy passing e-cards and jokes along to your friends and family, don't make a habit of sending this
kind of mail to your coworkers.
And Finally…
Privacy
E-mail is not a private form of communication. Some companies monitor employee e-mail. Keep this in mind
when you e-mail at work. Everything is on record.
Immediacy
Although e-mail is much faster than "snail mail," don't assume that your e-mail message will be answered 30
seconds after you send it.
Printing
E-mail (electronic mail) cuts down on the amount of paper you have to deal with on a daily basis. Print the
important stuff (directions to a company meeting across town, flight information).
Challenge!
• When composing your next email message, practice the rules of email etiquette.
------------------------------------------------------------------------------------------------------------------------------------------
Make it Easier
Get rid of junk mail.
Junk mail, or SPAM, is email that is sent to many people or groups, regardless of whether the recipients want to
receive it. Don't bother opening it if you don't recognize the sender and/or the subject line looks suspicious. Junk
mail filters can keep unwanted email out of your INBOX and deliver it to a junk mail folder. It takes a few minutes
to set up, but it is well worth it. Sometimes, non-junk mail messages get classified as junk and filtered into the junk
mail folder. Review messages in your junk mail folder before deleting them.
Create a signature.
A signature is somewhat like an online business card. Include your first and last name, position, business, and
contact information. You can insert your signatures after composing a message. It saves you from having to retype
this information again and again.
Set up an Auto Responder.
Send an automatic reply to people who send you email. This is especially useful when you are away from your
email (vacation, business trip, etc.).
Create ready-made responses.
Write text to answer common e-mail inquiries.
For example,
Thank you for your interest in Summer Adventures.
Summer Adventures is geared towards boys and girls aged 5-10. The program begins June 1, 2002. For more
information (including registration process and fees), please visit: http://www.summeradventures.com.
Regards,
Sally Smith
Keeping it Together
Use the address book.
The electronic equivalent to the traditional address book, your email client's address book is a convenient place to
store individual email addresses, home and work address, phone numbers, and more. Most programs let you set up
groups (a list of email addresses) for those you email frequently.
Use the calendar.
Your email client's calendar is similar to the traditional day planner. You can schedule events, list tasks, set up
reminders, send and receive invitations, add holidays, and even customize the view. Take advantage of the group
scheduling if possible.
Empty your Deleted Items folder occasionally.
Before permanently deleting messages, many email clients put deleted messages into a Deleted Items folder.
Review the email in this folder before emptying.
Don't readily give out your email address.
Unless it's required, don't give our your email address. You could end up with a lot of unwanted junk mail.
Consider creating a web mail account you use when shopping online, etc. When your web mail account becomes
overrun with junk mail, simply stop using the account and open a new one.
Challenge!
• Read your email client's Help files to discover features that can help you better manage your email.
Managing Your Mailbox
Working With Folders
With Yahoo! Mail, you can organize the incoming and outgoing messages in your mailbox into different folders.
Several special-purpose, permanent folders come with your Yahoo! Mail account. You can’t remove or rename
these permanent folders.
• Inbox—By default, all incoming messages (except suspected spam) appear in your Inbox folder. You
can read your mail in the Inbox, then delete it, move it to another folder, or leave it in the Inbox.
• Draft—The Draft folder stores messages that you have composed but have not yet sent. A message that
you save in your Draft folder remains there until you either send it or delete it.
• Sent—You have the option of saving copies of the email messages you send in the Sent folder. This
makes it very easy for you to review or resend the message, if the need arises.
• Trash—When you delete messages in Yahoo! Mail, they are moved to the Trash folder. The Yahoo!
Mail server can delete messages in your Trash folder at any time without warning. You can also empty the
Trash folder yourself. Once messages are emptied from the Trash folder, they are permanently deleted from
the Yahoo! Mail server and cannot be recovered.
• Bulk—The first time you receive messages that the SpamGuard utility identifies as junk mail, it creates
an additional permanent folder labeled Bulk, where it stores these messages.
It’s easy to view the contents of any folder in your Yahoo! Mail account.
Here’s How
1. Go to your Yahoo! Mail Welcome page in a browser.
A list of all your folders appears on the left side of the page.
2. Click the name of the folder you wish to open.
The contents of the folder (that is, a list of the messages that it contains) are displayed.
3. To read a message in the folder, click the subject of the message.
The message is displayed in the browser window.
Creating Folders
Yahoo! Mail allows you to create as many personal folders as you like so your email is easier to manage. Personal
folders help you organize your incoming and outgoing mail messages in ways that make sense to you.
Here’s How
1. Go to the folders list on the left side of your Yahoo! Mail page
2. Click the Add link next to the word Folders.
Tip: Folder names cannot contain the ’ (single quote), + (plus), and @ (at) symbols.
Your new folder appears under the My Folders heading in the folders list.
4. To close your list of personal folders, click the Hide link located next to My Folders. If your list of folders
is hidden and you want to open it, click the Show link.
Here’s How
1. Open the folder containing the message that you want to move.
2. Check the box to the left of the message you want to transfer.
To move more than one message, check the box to the left of each message.
3. Select the destination folder from the Move... pull-down list near the top of the page.
You can sort the messages in any of your folders in a variety of ways using the following columns:
• Sender or Sent To—Every folder has a column titled either Sent To (the Sent and Draft folders) or Sender
(all other folders). This column displays the senders’ names for incoming messages and the recipients’
names for outgoing messages. If a name isn’t specified, the corresponding email address appears instead.
• Subject—The Subject column displays the subject, as the sender entered it, of each message in the folder.
• Date—The Date column displays the origination dates for the messages in the folder. A message’s
origination date is a time stamp indicating when the message was created.
Tip: Since messages can originate in the different time zones, it is sometimes misleading to compare these
dates.
• Size—The Size column displays the sizes, in kilobytes, of each message in the folder.
Here’s How
1. Open a folder to sort its contents.
The title of the column currently used for sorting is highlighted. The arrow button to the right of the title
indicates whether the messages are sorted in ascending order ( ) or descending order ( ).
2. To change the sort order from descending to ascending or vice versa, click the arrow button.
The direction of the arrow changes, and the contents of the folder are resorted in the opposite order.
3. To sort the messages in a folder by a different column, click the column title, for example, Sender or Size.
The title of the newly selected column is highlighted and the contents of the folder
Here’s How
To rename a folder:
1. Click the Edit link at the top of the list of folders.
The Folders page appears, listing all your permanent and personal folders.
2. Click the Rename link next to the folder whose name you want to change.
A window opens with the folder name highlighted for you to edit.
3. Enter the new name and then click OK.
Tip: Folder names can be letters, numbers, and the hyphen (-), space ( ), and underline (_) characters only.
The renamed folder appears in alphabetical order in the folder list.
4. Click the name of any folder or the Check Mail button to return to the regular Mail display.
To delete a folder:
1. Click the Edit link at the top of the list of folders.
The Folders page appears, listing all your permanent and personal folders.
Note: You can only delete empty folders, so be sure to move or delete all the messages in a folder before
you try to delete it.
2. Click the Delete link next to the folder whose name you want to change.
A world without the convenience of e-mail is hard to imagine -- which may explain, in part, why millions of us
have turned to Yahoo Mail and other free Web-based e-mail services for fast communications. While AOL, Prodigy
and CompuServe came earlier, Yahoo Inc. entered the field with Yahoo Mail in 1997 and has become a leader with
an estimated 250 million users worldwide [sources: Computerworld and Search Engine Journal].
Next, enter your topic after "Subject," and type your message in the large box. Using the symbols
above the box, you can change the formatting, font and color of the text. You can also check
spelling, add links and attach files. (You'll learn more about attachments later on this page.)
Gmail automatically saves your message in draft every few minutes while you're writing. When
your message is complete, click "Send." A confirmation above the window will show your message
was sent. If you don't want to save the draft message, delete it from the Draft folder.
Receiving a Message and Responding
Check the tally number next to your Inbox to see if you have new messages. Gmail checks for new
messages every two minutes and updates the tally.
Gmail saves a "conversation" of each original message and all replies. When you open a message,
the newest in the conversation is on top with the rest stacked below. To read all the messages in the
conversation, click "Expand All."
To print a message, click the down arrow next to "Reply" and select "Print." To print the whole
conversation, click "Print all."
To forward an individual message, open it and click "Forward" from below the message area. Enter
recipients' addresses and add any notes to the message. Click "Send."
Using Attachments
With Gmail, attachments like documents, photos or video are easy to add and read. To attach a file
to a message, click "Attach a file" under the Subject field. Find the file you want to attach, and click
"Open." "Attach another file" lets you repeat the process. To remove an attached file, click
"Remove."
To view an attachment, open the message, click "Download" at the message's bottom and then
"Open" or "Save." To view an attachment without downloading, click "View as HTML" after you
open the message. You also can open Microsoft Excel files as Google spreadsheets and Microsoft
Word files as Google docs.
Message Archives
Archiving lets you move messages from the inbox to All Mail for storage. You can find information
in these e-mails later by using the search tool. To archive a message, check the box next to the
sender's name and click "Archive." If someone responds to a message you've archived, the whole
conversation reappears in your inbox.
Gmail has plenty of features beyond the basics. Next, let's look at some of them, such as security
filters, Gmail Notifier to announce new mail, and "retrieve and respond" to access messages from
other e-mail services.
------------------------------------------------------------------------------------------------------------------------
Gmail features make e-mail easier and more convenient. Let's take a closer look at some like Gmail
Notifier, which can alert you when you have a new message, and Mail Fetcher, which allows you to
retrieve e-mail from other services, like Yahoo Mail or AOL.
Image courtesy of Google
Gmail users can create their filters for
sending and receiving e-mails.
Gmail Notifier
This downloadable application lets you know when you have new Gmail messages -- without
opening your browser. The Notifier automatically checks for new messages every two minutes.
With it, you can see a brief section of text from up to 30 messages and select a sound to indicate
you have new mail.
Running Gmail Notifier requires Windows 2000, Windows XP or a newer version of Windows.
Mac users need OS X 10.3.8 or later to run the Notifier, which can also alert them of upcoming
events recorded on Google Calendar.
Mail Fetcher
This feature lets you fetch and download messages from up to five other e-mail accounts. Mail
Fetcher will check all of the accounts regularly so that mail from them appears automatically in
Gmail. Accounts that you want to access must be POP (Post Office Protocol) access enabled. POP
allows users to download messages from Gmail's servers so e-mail can be accessed without an
Internet connection.
Contact Groups
By creating a contact group, you can quickly send e-mails to everyone in the group. To create a
group, click "Contacts" at the left and then "New Group" in the top left corner. Enter the name of
the group and click "OK."
To fill the group with contacts, select the contacts you want in the Contacts list. Then open the
Groups menu, and under "Add to . . .," select the group you want.
For later additions, enter the contact's name or e-mail address in the "Add this to group" box below
the contact list.
To send a message to the group, go to the Compose window. After "To:" enter the first few letters of
the contact group's name. Choose from the list that auto-complete suggests and write and send your
message.
Security and Spam
Gmail is security conscious, starting with virus scans of every attachment you send. Every
attachment you receive is scanned twice, when it's delivered and when you open the message.
Questionable e-mails go directly into the spam folder. To remove spam from your inbox, select the
unwanted message and click "Report Spam."
You also can send unwanted mail from specific addresses or domains directly to the trash by setting
up a filter. Click "Create a filter" under the search box. Fill in fields with your criteria for the filter,
and click "Next Step." Choose how you want the e-mails handled by checking a box such as
"Delete it." Then click "Create Filter."
Parental Controls
Children under age 13 need parental permission to create a Gmail account. Parents also can use
mail filters to block unwanted mail from reaching their children.
Gmail also recommends that parents:
• Keep their child's computer in a public area of the house so they can monitor online activity.
• Download parental control software or use browser settings that can block unwanted visits
to inappropriate sites.
• Discuss appropriate e-mail communication and behavior.
• Advise children not to download attachments from unknown senders -- and to check with an
adult if they're unsure.
• Tell children not to give identifiable photos or information over e-mail or in chats,
particularly to strangers.
Gmail continues to look at new ways to send and receive e-mail. Keep reading to learn how you can
use Gmail for chat, instant messaging with AIM users, e-mailing from mobile devices and mail with
voice.
------------------------------------------------------------------------------------------------------------------------
Gmail innovations go beyond simply handling e-mail on your personal computer. With Gmail from
Google, you can chat with a friend or in groups, instant message (IM) with other AIM users, take
advantage of mail with voice and use Gmail for Mobile from your BlackBerry, iPhone or other
mobile device.
Mail with Voice
If you're also signed into downloadable Google Talk while using Gmail's chat features, you can
make and receive voice calls. A "Call" button will appear next to your contacts' profiles. Unless that
button appears gray, the person is available to talk.
Your contacts also can leave you voice messages using Google Talk's voicemail. These will appear
as special messages in your inbox. They have the subject "Voicemail from ContactName (x
seconds)" and appear with a telephone icon. To hear voicemail, click "Play" in the conversation
view.
Image courtesy of Google
Gmail lets users chat with friends directly from their inbox.
Gmail Chat
Like Google Talk, Gmail allows you to chat with just one person or with a group. You can chat with
anyone on your chat list who has a colored ball next to his or her name. Go to "Chat" and find and
click on the name of the person you want. That will open a chat window, so enter your message and
press "Enter."
You also can search for a contact by entering the name you want in the box at the top of Chat. Or
you can search for the person you want from your Contacts list and then click the Chat link. When
you're finished chatting, click the x in the top right corner of the chat window. Chat works with
Internet Explorer 6.0+ or Firefox 1.0+ but not with Safari or other browsers. Chats are saved and
can be searched.
Group chat lets you talk with an unlimited number of contacts at once. Here's how to set it up:
1. Start a chat with one person in your Contacts list.
2. Click "Options" at the bottom left of the chat window, and select "Group Chat."
3. Enter the names of contacts you want to add in "Add a person to this chat."
4. To end the chat, click the x in the corner of the chat window. The group chat continues until
everyone has left.
Chat/IM with AIM Users
With Gmail chat, you can sign into your AIM account from Gmail to chat with AIM buddies.
They're listed among your contacts, and you can search for them. To chat, you just click on a name
on your chat list and type a message.
Gmail for Mobile
Gmail for mobile can be accessed through a smartphone's Web browser or from an application
downloaded to the phone. To access by browser, point your phone's browser to Gmail. The interface
makes it appear as if you're using Gmail on your computer.
Downloadable Gmail for mobile also keeps your actions in sync with your Gmail account, but it's
faster and uses less data than the browser version. To try downloadable Gmail for mobile, point the
phone's browser to Gmail applications.
Either version provides Gmail functions like search and conversation view. And both have
automatic synching so anything you do in Gmail from your phone is also shown in your regular
Gmail account.
This article gives an overiew of Gmail services, but Google keeps upgrading and adding to its
offerings.
------------------------------------------------------------------------------------------------------------------------
Lynda Ward – This always states your name. Also the green circle represents your current status online.
Search, add .... - This is where you can chat with others using Gmail, or those in your contacts list.
Label – Gmail uses labels to identify particular emails. You can set up as many as you like.
Invite a friend – Gmail used to be by invite only. You will always have many invites that you can give to friends etc.
Gmail Basics – ©By Lynda Ward 2008
Web clips
New email
Starred email
Older emails – These have been read
Labels
Usage so far
Contact info
Groups
Contacts
Gmail Basics – ©By Lynda Ward 2008
Documents
File structure is the same – Create folders for multiple files etc
Google Docs – To create a new WP/Spreadsheet document, just click on drop down menu arrow next to 'New'. Select appropriate document type.
Gmail Basics – ©By Lynda Ward 2008
After making any alterations you will need to click 'Save Changes' for those changes to take affect
In Settings – You can create a signature. This is text that appears at the bottom of every email you send out. Most
web based emails allow you to have a signature, except Tiscali. After filling this in you will need to 'Save Changes'.
How to Use Gmail
Writing an email in Gmail is simple. Click “Compose Mail” and an email screen will appear in
front of you. Gmail has recently added features that allow you to format your text, and enable you
to add hyperlinks to your emails.
Emails are arranged in conversations and not by individual messages. This allows you to view a
message and all the replies to that message on a single screen. However, this does not always work,
especially if the subject of the email changes.
Organizing and Finding Emails in Gmail
Gmail does not allow for folders in your email account. However, it allows you to assign labels to
an email, which allows you to categorize emails. Clicking on a certain label will show you all
emails with that label.
Gmail also allows you to search your email. You can search by subject, title, and date. You can
also search for words that appear in an email. Gmail also allows you to search deleted messages
that are in your trash folder.
No point in deleting
With Google Mail, or “Gmail” if you want to sound savvy, you are offered an amount of cyber-
space storage that is constantly increasing. Literally. Once you sign up, you can watch the counter
increase. Don’t ask me how hey do it, but what this means is that you never have to worry about
whether an email might be important to have at some vague point in the future, because you don’t
have to delete anything. Instead, you clear it from your inbox by adding it to your “archive”. It
makes you a virtual pack rat with no draw backs. You might wonder how you keep your archive
organized, but remember: this is Google. Finding stuff is their bread and butter. You simply search
for any number of key words from whichever email you want to find, and in less time than it takes
to double click, there it is, the subject line staring you in the face.
What Is Spam?
There’s a difference between legitimate email and spam. At the core of the difference is this: one
you want to receive, the other you don’t. When fighting the spam battle, this distinction is very
important.
Chances are that some of the messages that clutter your inbox are messages you opted to receive—
even if you don’t remember saying that you wanted them. Many legitimate businesses offer to send
you promotions and updates when you register on their web sites. Such messages should not be
reported as spam—you did, after all, ask for them to be sent to you. In such cases, legitimate
businesses will have an opt-out procedure that will terminate the messages. These messages are also
easily identified. The sender will be a familiar name, on that you recognize.
It’s the messages that come from senders that you don’t recognize that are the problem. These are
the emails that you did not ask to receive; the ones that you would like to get rid of, but cannot.
Unfortunately, spam is a reality of online life. With the growth of technology and the spread of
information, spamming is incredibly easy to perpetrate. Your email address can be gleaned from any
number of sources, and can even be produced at random by some programs. No matter what you
do, you will receive some spam. But there are things you can do to cut back on the amount that you
are receiving.
Preventing Spam
When it comes to stopping the spread of spam, the key is to protect your information. If spammers
cannot find your email address, they can’t send you spam. So how do you protect your information?
Try these five preventative steps.
1. Never post your email address on the web. Try this activity: search Google for your email
address. If you find it in a search, then so can a spammer. Even if you don’t, be aware that
posting your email address on the web—in chatrooms, usenets, newsgroups, discussion or
bulletin boards, or on web pages—makes that email address available to anyone, anywhere.
2. Read the privacy policies when registering with a website. Check to see if the privacy policy
states whether they do or do not sell your contact information to list subscribers. Most
companies do not sell your information, but some do. Watch carefully and consider the risks.
Even if the policy states that lists are only available to subscribers doesn’t mean that a
spammer isn’t subscribed. If you are on a legitimate email publisher list, check to see if you
can gain access to that list. If you can, so can a spammer.
3. Be extremely careful when forwarding messages. If you forward a message, then someone
else might as well—and then the next person, and the next, and the next.…Eventually, that
message could end up in a spammer’s inbox, and, lucky day, look at all those legitimate
email addresses in the message. If you are going to forward a message, delete the email
addresses that are already displayed there and make sure that those you are forwarding to do
the same. Don’t make a spammer’s job easier.
4. Never click on anything in a spam message. This includes any unsubscribe or opt-out
buttons. More often than not, clickable options in spam are just a means of verifying email
addresses. Certain programs used by spammers create random email addresses and then send
out messages to those addresses, whether they are real or not. By clicking on a link in the
message, you are effectively telling the spammer that not only is this a legitimate email
address, but you also read your messages—a prime candidate for spam. Even if the spammer
does remove you from their lists, they now know that your email address is valid, and thus
worth much more when they decide to sell their emailing lists.
5. Turn off the “fetch” option. Many email programs have a “fetch” option that tells the
computer to go out and fetch any images that appear in the message. These images are often
a means of once again verifying legitimate email addresses. When your computer goes out
in search of the images, it tells the sender to send the messages to your address—giving the
spammer a valid email address. While it may not be visually appealing to not have images
retrieved automatically into email messages, it will hamper the efforts of spammers. A
simple right-click will retrieve the images from legitimate messages if you want them.
Stopping Spam
Great strides are being made in creating programs that can stop spam from reaching you. At the
same time, spammers are taking great strides to circumvent these programs. Again, you’ll probably
never be free of spam, but there are a few things you can do to stem the rush.
Spam Filters
Spam filters rely on keywords to determine if a message is spam or not. These filters can be reliable
and effective. Check with your email provider to see if they have a built-in filter. If they don’t, you
can purchase one.
Keyword filters, however, have their drawbacks. Because they rely on keywords to identify spam,
they can erroneously mark a legitimate message as spam. Take, for instance, the word “breast.”
Many keyword filters will mark this word as a keyword for spam offering pornography. But what if
that message was a newsletter from the National Breast Cancer Society? Keyword filters can be a
two-edged sword in this regard.
Additionally, spammers can work around keyword filters by not including keywords in the text of
their messages. The next time you get a message about Viagra, look to see if “Viagra” is actually in
the text of the message. Remember, the text of the message does not include the gif or jpeg that is
downloaded with the message. Keyword filters only “read” the text of a message, not the image.
Often times, spammers use incoherent text, or horribly misspelled text, in their spam all with the
hopes of fooling a keyword filter.
So, while spam filters can stop some spam, it won’t catch all of it. Or it may catch things you don’t
want caught. If you have signed up to receive an internet publication, find out what your service
provider is doing to block spam. If their efforts would block the emails you want to receive, fill out
a request that they be allowed to pass through the blocks.
Never Purchase Spam-Made Offers
More often than not, offers made through spam messages are not legitimate. They are really just an
attempt to get your information—especially your purchasing information. Before you decide to
purchase something from any message, consider the source and the offer. Would Norton Antivirus
actually offer their product at drastically reduced prices through 3edcid39r@ghurmeno.com?
Even if the offer is legitimate, purchasing the product through spammers only encourages more
spamming. That’s why people still send out spam—somewhere, someone is buying what they’re
selling. If no one ever bought anything offered in spam, spam would soon die out.
• Facebook: Founded by Mark Zuckerberg, Facebook was designed as a social networking site for Harvard
students. After spreading from Harvard through the university ranks and down into high school, Facebook
was opened to the public in 2006.
• Hi5: A fast-growing social network with a strong base in Central America, Hi5 has over fifty million users
worldwide.
• Ning: A social network for creating social networks, Ning takes the idea of groups to a whole new level.
More social networking sites of general interest
Pros
• Keep Track Of Friends: Facebook.com tells you when your friends are updating their profile's, adding to
their blogs or have some other news on their Web site.
• Photo Album: Add photos and photo albums to your Facebook.com profile.
• Blog Merge: Use the notes feature to create your own simple blog or you can merge your existing blog
right into Facebook.com notes.
• Excellent Search and Browse: Search and browse for people on Facebook.com using just about anything.
Cons
• No Music: You can not add music to your Facebook.com profile.
• No Video: You also can not add video to your Facebook.com profile.
• No Chatroom: I really would have thought that a site like Facebook.com would have a chatroom or general
forum so people can get together online and just chat and say "hi". They don't. There was no chatroom or
IM to be found on Facebook.com.
Getting Started
MySpace allows you to sign up and create a profile for yourself so your friends can find you online and so you
have a starting place for your online presence. If you would like to have a MySpace account here is what you need
to do.
First you will need to sign up. Just click on the "Sign Up" link on the MySpace homepage and fill out the sign up
form.
After you sign up you will be asked to post a photo of youself. If you want to add a photo of youself to your profile
click on the "Browse" button, find your photo on your computer and click the "Upload" button. If you don't want to
add a photo to your MySpace account click the link underneath that says "Skip for now". You can always add your
photo later if you want to.
The next page allows you to sent emails to all your friends so they can sign up for MySpace too.
If they already have a MySpace account they will be added to your friends list. If you don't want to sign up any
friends right now click on the "Skip for now" link.
Join Facebook
Facebook is an online site that lets you find people. Find people you used to know with Facebook or find out who's
living around you. Create groups and events with Facebook too.
There are three sections on Facebook; high school, college and work. To register for the high school section of
Facebook you need to be in high school. To register for the college section of Facebook you need to be in a
participating college. To register for the work section of Facebook you need to use your work email address and
work for a company that is recognized by Facebook.
Signing up for Facebook is easy, just follow these steps. Start by going to the Facebook Web site and clicking on
the "Register" button.
How to change your Windows XP Wallpaper
Wallpapers are images that appear in the background on your Desktop, behind all your icons. To change your
Desktop wallpaper, do the following:
• Click anywhere on the Desktop that is not an icon, but click once with your right hand mouse button
• A menu pops up. The one below
This is the Display Properties dialogue box. As you can see, there are tab strips for Themes, Desktop, Screensaver,
Appearance, and Settings. Click on the Background tab strip and the dialogue box will change to this one:
There is a list of wallpapers we can use. Click on one, and you get a preview of what it will look like. Scroll down
to see more wallpapers. If you're satisfied, click the OK button to set your wallpaper.
You can use your own images. You are not limited to the ones on the list. If you have an image somewhere on your
computer, and you want to use that instead of the ones on the list, you can click the Browse button, in the image
above. Doing so will bring up the Browse Dialogue box:
In the image above, no background files are showing. You can click one of the folders on the left to search for a
picture, or use the "Look In" drop down box at the top. When some background image are showing, click on one to
select it. The name of the file you have selected will then appear in the File name text box.
Click the "Open" button to return to the Display Properties dialogue box. A preview of your image will be
displayed. If you're happy with your selection, click the "Apply" button then OK. Your desktop will change to your
selected image.
• On and empty area of your desktop click with your right mouse button
• On the small menu that pops up, select Properties. The Display Properties window will appear
• Select the Screen Saver tab to view the screensaver settings
From the screen saver settings page you can select a different screen saver, adjust the settings of the current
screensaver and set the time required before your screensaver will activate. You also have the option of requiring a
password to be entered before you can use the computer after the screensaver has been activated.
You can also adjust your computer screen power settings by pressing the Power button.
After choosing a screensaver, and pressing the settings button to make adjustments to the screensaver you can
preview how it will look by pressing the Screensaver Preview button.
When you are happy with the screen saver settings you've selected, press OK to save your settings.
Windows Wallpaper
The Windows Wallpaper is the image that is displayed in the background, on your desktop. If you have a new
computer, the Windows wallpaper may show the manufacturers logo, or it may simply be the default Windows
wallpaper.
How to change your Windows XP Wallpaper
• On an unused area of your screen, click with the right mouse button
• On the small menu that pops up, click Properties
• On the Display Properties window, click the Desktop tab
From the Desktop Properties window, scroll through the Background list until you find a image you like, and press
OK.
Definitions:
Uploading - The process of putting any data [text, audio, video] online.
Downloading - Importing data into your computer for further usage. In the case of downloading audio, it means
that one saves the audio file on their hard drive in order to manipulate it [play, edit, broadcast].
Download - To transfer programs or data from a computer to a connected device, usually from a server to your
personal computer.
------------------------------------------------------------------------------------------------------------------------------------------
Upload and Download are often used together. One is just the opposite of the other.
Upload/Download covers a vast variety of things that you can do on the Internet.
Upload:
1. You can upload HTML to domain names control panel – To create websites.
2. You can use an online file storage site, to store files for later retrieval (i.e. www.filecrunch.com)
3. You can upload images etc onto blogs.
4. AND MUCH MORE.
Download:
1. You can download software off the Internet.
2. You can use an online file storage site, to download files (i.e. www.filecrunch.com)
3. You can download BitTorrents, these can be tv episodes or movies etc.
4. AND MUCH MORE.
------------------------------------------------------------------------------------------------------------------------------------------
Knowing how to upload and download really opens up what you can do with the Internet. To see what you can do,
you could just type into www.google.co.uk something like uploading and downloading. See what comes up.
------------------------------------------------------------------------------------------------------------------------------------------
Online File Storage Websites:
www.filecrunch.com
www.box.net
www.xdrive.com
www.mediafire.com
www.4shared.com
www.mediamax.com
www.badongo.com
www.dropboks.com
www.megaupload.com
www.driveway.com
www.ripway.com
www.adrive.com
My 4shared.com account:
http://lwpcqueries.4shared.com
------------------------------------------------------------------------------------------------------------------------------------------
For Practice:
Register free for an account at: www.filecrunch.com/newuser
Once you have an account, click on 'Upload Files' tab. This is where you would upload your files to your
filecrunch account.
(With filecrunch you can only upload one file at a time, making this a good practice site to use. Other sites do
allow multiple uploads. It's always best to start on a site like this though.)
Step by step:
1. Click on 'Browse'.
2. Locate your file and doubleclick (Left mouse button). Quite quickly.
3. Type in a brief 'File description'.
4. Type in the appropriate 'Security Code'.
5. Click in the checkbox to show that you agree with the 'Terms of service'.
6. Click on 'Upload File', it will let you know when upload is complete.
3. This will bring up a list of all your uploaded files. From here you can delete/download files.
4. If you make your files 'Public', then ANYONE can access those files and download them.
'Public' – ANYONE in theory can access your files and download as often as they like.
'Private' – Only YOU can access your files, unless you give someone the link.
------------------------------------------------------------------------------------------------------------------------------------------
For Practice(Cont...):
Now that you know how to upload files, practice downloading them to your folder. With filecrunch website, access
your files as above (To access your uploaded files).
Step by step:
1. Click on one of your files.
2. This will bring up another webpage, this will include the download link somewhere.
3. Click on this link, find your folder on the hard drive (Learning on boostr). And save file.
* You might have to double check the FONT in Word. Make sure it’s not still on WINGDINGS
before typing in the telephone number.
___________________________________________________________________________________
That’s it. Well done. You should now have a merged document ☺
PRACTICE:
Now make up your own Datafile(s) and Form Letter(s).
Print Screen
Overview of job:
Using the Print Scrn key, show how to save, print, open etc.
-------------------------------------------------------------------------------------------------------------------------------------------
You can use Print Screen at any time, to show anything. Print Screen can prove to be very useful, just keep
practising. I used ‘Print Screen’, ‘Cropping’ and ‘Resizing’ for the ‘Toolbar’ diagram in this guide.
-------------------------------------------------------------------------------------------------------------------------------------------
To do this:
1. Go into Word/Excel/Access and select SAVE / PRINT / OPEN etc.
2. When the SAVE / PRINT / OPEN etc dialogue box appears, press PRINT SCRN, just once.
3. In Word, start a new document.
4. Press CTRL+V to paste.
5. The screen shot should now appear.
It is not unusual to use an Excel worksheet to create different types of checklists and forms that are used by other
people. When you are developing your checklist, you may want to actually put a check mark into a cell. There are
several ways you can go about doing this. Both methods involve changing the font applied to a cell and then typing
the character you want in the cell.
For instance, try these steps:
1. Select the cell that you want to contain the check mark.
2. Using the Font drop-down list, select Wingdings. The cell is now formatted to use the Wingdings font.
3. Start the Character Map accessory included with most versions of Word. Click on Start, then Programs, then
Accessories to find the program..
4. In the Character Map, select the Wingdings font.
5. Scroll though the available characters until you find the check mark you like.
6. Copy the character to the Clipboard. (The controls in the Character Map accessory allow you to do this,
although the controls differ from one version of Word to another.)
7. Close the Character Map accessory.
8. In Excel, press Ctrl+V to paste the character into the cell.
This is quite a few steps to put in a simple check mark. There is a simpler way, however, if you simply remember
that you need to pick a font that contains check marks, and then put in the character to produce that check mark.
When it comes to fonts containing check marks, there are quite a few. The appearance of the check mark will
depend on the font you use. The following information shows what you would type (on the keyboard) in various
fonts to achieve a check mark:
For those instances where an Alt combination is mentioned, you simply need to hold down the Alt key as you type
the three or four numbers on the keypad.
There are undoubtedly numberless other character/font combinations that will result in a check mark in a cell. If
you want to do your own exploring, you can use the Character Map accessory to look around through different
fonts to find out what is available.
1. You don't have the Insert Symbol option. Therefore you have to load 'Character Map' from the 'Start Menu'.
2. Click once on the 'Start Menu', go to 'Programs', go to 'Accessories', go to 'System Tools' and select
'Character Map'.
Font Type
Ready? Here we go! If you haven't done so already, close your web browser and all other programs that
may be running until you are looking at your Windows desktop. You will know when you are on your desktop
when you can see the "Start" button in the lower left-hand corner of your screen along with all your desktop
icons. Are you looking at your Windows desktop? Good. Now position your mouse cursor on a blank area
somewhere in the middle of your desktop and right-click. Notice the menu that appears. Highlight the
command "New" and then highlight "Folder." Now, left-click on the word "Folder" and presto! The menu
disappears, and a new folder called "New Folder" appears highlighted in blue; appropriately called "New
Folder." Now begin typing the letters... "Folder 1" (without the quotes) then press the Enter key. You have
just created a new folder called "Folder 1." If this isn't what you see, then right-click on the folder and
select "Rename" with a left-click." Then type "Folder 1" (without the quotes) then hit the Enter key. Be
sure to get this right before you continue.
Again position your mouse cursor on another blank area somewhere in the middle of your desktop and right-
click. Notice the same menu appeared as before. Again highlight the command "New" and then highlight
"Folder." Now, left-click on the word "Folder" and begin typing the letters... "Folder 2" then press the Enter
key. You have just created another new folder called "Folder 2." Once your two folders have been created,
we're ready to continue...
Locate a digital .jpg (JPEG) picture of your choice from anywhere on your computer and right-click on the
file name. Notice that a different right-click menu appears! Next, highlight "Copy" and left-click. The
menu disappears but indeed, the file has been placed on your Windows clipboard and it's now ready to be
pasted somewhere. We'll paste it into "Folder 1." Here's how... First close all open windows by clicking on
the "X" in the upper right-hand corner of each window and then position your mouse pointer over "Folder 1"
and right-click. Highlight "Paste" and left-click. Presto again! A copy of your picture file has been placed
into "Folder 1"! Double-click on "Folder 1" to open the folder and you will see the copy of your picture file
in there where it should be! Do it now.
Now let's copy the picture file from "Folder 1" into "Folder 2." Here's how... First, open the "Folder 1" window
with a double-click (it should already be open from the previous step) and then right-click on your picture
file to highlight it. Select "Copy" from the menu and then close the "Folder 1" window. Next, position your
mouse cursor over "Folder 2" and right-click then select "Paste" with a left-click. You now have another
copy of your picture file in "Folder 2." The original copy of your picture file in "Folder 1" is still there and will
always be there until you delete it. Let's delete it now.
Double-click on "Folder 1" then right-click on your picture file and select "Delete" with a left-click.
Confirm with "Yes" to the "Confirm File Delete" message and the file disappears to the recycle bin. Close the
"Folder 1" window and now let's delete "Folder 1" in the same way... Right-click on "Folder 1" then select
"Delete." Confirm with "Yes" and "Folder 1" is gone it's way to the Recycle Bin. All that is now left is
"Folder 2" containing a copy of your original picture file.
Let's rename the picture file in "Folder 2." Here's how... Double-click on "Folder 2" to open the folder then
right-click on your picture file and select "Rename" with a left-click. Begin typing "pic1" (without the
quotes) then hit the Enter key. Done. Your picture file has just been renamed "pic1." Finally, close the
"Folder 2" window to get back to your Windows desktop and delete "Folder 2" in the same manner as you
deleted "Folder 1."
Congratulations! You are now a veteran "copy and paster!" And with just a little practice, using these
common Windows commands will become second nature to you. Knowing how to use these common
Windows commands will also help you with all your computing tasks. In fact, it's virtually impossible to use
a computer without knowing how to copy and paste files and folders. Ask any experienced computer user...
He or she will tell you that learning how to copy and paste files and folders is a must with most computer
applications.
Test and improve your PC knowledge with this
guide
Any Comments:
E-Mail me at: lynda@wardworks.org.uk
Contents
Front Cover
Which of the following is used to enter text into a word processing programme?
a) Scanner
b) Plotter
c) Touch Screen
d) Mouse
If a business purchases 2 copies of Application Software package that is protected by Copyright legally; they can –
a) Install as many copies as they like
b) Make copies and give away
c) Install 2 copies
d) Make copies and sell them
Which application is used to open and use Rich Text Format (RTF)?
a) Basic text editor
b) Databases
c) Graphics
d) Operating system
A disk that has “write protection” –
a) Can be written to
b) Overwritten
c) Not readable
d) Cannot be written to
Which of the following is a non-essential item on a standard chair for a computer Workstation?
a) Arm rests
b) Adjustable back
c) Five feet
d) Height adjustable seat
Which file type can be opened in Word Processing, but must be edited in another application?
a) .doc
b) .txt
c) .gif
d) .wpd
A directory structure is effective because –
a) Data files can be backed up
b) Directory name is all in capitals
c) Programme files are separate from data files
d) It makes good use of the large capacity on the hard disk
Computer D
a) Client / Server
b) P2P
c) ISP
d) LAN
Which of the following software prints high quality combined text and graphics?
a) Spreadsheets
b) Desktop publishing
c) Word processing
d) Graphics
Which one of the following parts of a computer is necessary to enable it to play music?
a) Sound card
b) CD-ROM
c) MIDI interface
d) Serial interface
Which one of the following printers is suitable for printing sprocket fed carbon copies?
a) Laser
b) Dot matrix
c) Ink-jet
d) Drum
Which of the following is twice the size of A4 paper?
a) A2
b) A3
c) A5
d) A6
A gigabyte is equal to
a) 1024 bytes
b) A million megabytes
c) A thousand kilobytes
d) 1024 megabytes
RAM is
a) Temporary storage / workspace
b) Backup storage
c) Disk storage
d) Read Only Memory
Where does the computer store information when it’s turned off?
a) RAM
b) Monitor
c) Disks
d) Scanner
A package, which can be used for a short period before purchasing is termed
a) Try and buy
b) Freeware
c) Shareware
d) Borrow-ware
True / False
The processor is also called the Central Processing Unit, or CPU.
Secondary storage units contain the instructions and data to be used immediately by the processor.
Desktop publishing software is used primarily to Store and Retrieve information.
Processed data that is organized, meaningful and useful is called information.
“User-Friendly” refers to a special kind of terminal.
To use a computer, you need to know its internal functions.
PDA’s are also called mainframes.
Mainframes are also called notebook computers.
Computers can be classified, smallest to largest, as mainframes, microcomputers or mini computers.
Custom software may be purchased off the shelf.
General keyboard shortcuts
CTRL+C Copy
CTRL+X Cut
CTRL+V Paste
CTRL+Z Undo
DELETE Delete
SHIFT+DELETE Delete selected item permanently without placing the item in the
Recycle Bin
CTRL+RIGHT ARROW Move the insertion point to the beginning of the next word
CTRL+LEFT ARROW Move the insertion point to the beginning of the previous word
CTRL+DOWN ARROW Move the insertion point to the beginning of the next paragraph
CTRL+UP ARROW Move the insertion point to the beginning of the previous
paragraph
SHIFT With any of the arrow keys Select more than one item in a
window or on the desktop, or select text within a document
CTRL+F4 Close the active document in programs that allow you to have
multiple documents open simultaneously
RIGHT ARROW Open the next menu to the right, or open a submenu
LEFT ARROW Open the next menu to the left, or close a submenu
SHIFT When you insert a CD into the CD-ROM drive Prevent the CD
ENTER Carry out the command for the active option or button
SPACEBAR Select or clear the check box if the active option is a check box
Arrow keys Select a button if the active option is a group of option buttons
F1 Display Help
NUM LOCK+ASTERISK On numeric keypad (*) Display all subfolders under the selected
folder
NUM LOCK+PLUS SIGN On numeric keypad (+) Display the contents of the selected folder
NUM LOCK+MINUS SIGN On numeric keypad (-) Collapse the selected folder
Notes
Some keyboard shortcuts may not work if StickyKeys is turned on in Accessibility Options. If you
are connected to Windows through Microsoft Terminal Services Client, some shortcuts have changed.
For more information, see the online documentation for Terminal Services Client.
GENERAL INFORMATION
FILE EXTENSIONS
A standard single-byte character encoding scheme used for text-based data. ASCII uses designated 7-bit or
8-bit number combinations to represent either 128 or 256 possible characters. Standard ASCII uses 7 bits to
represent all uppercase and lowercase letters, the numbers 0 through 9, punctuation marks, and special control
characters used in U.S. English. Most current x86-based systems support the use of extended (or "high") ASCII.
Extended ASCII allows the eighth bit of each character to identify an additional 128 special symbol characters,
foreign-language letters, and graphic symbols.
On x86-based computers, the set of essential software routines that test hardware at startup, start the oper-
ating system, and support the transfer of data among hardware devices. The BIOS is stored in read-only mem-
ory (ROM) so that it can be executed when you turn on the computer. Although critical to performance, the BIOS
is usually invisible to computer users.
binary
A base-2 number system in which values are expressed as combinations of two digits, 0 and 1.
The smallest unit of information handled by a computer. One bit expresses a 1 or a 0 in a binary numeral, or
a true or false logical condition. A group of 8 bits makes up a byte, which can represent many types of informa-
tion, such as a letter of the alphabet, a decimal digit, or other character. Bit is also called binary digit.
The number of bits transmitted every second, used as a measure of the speed at which a device, such as a
modem, can transfer data.
boot
The process of starting or resetting a computer. When first turned on (cold boot) or reset (warm boot), the
computer runs the software that loads and starts the computer's operating system, which prepares it for use.
boot files
The system files needed to start Windows. The boot files include Ntldr and Ntdetect.com.
broadband
Of or relating to communications systems in which the medium of transmission (such as a wire or fiber-optic
cable) carries multiple messages at a time, each message modulated on its own carrier frequency by a modem.
bus
A communication line used for data transfer among the components of a computer system. A bus essentially
allows different parts of the system to share data. For example, a bus connects the disk-drive controller, memo-
ry, and input/output ports to the microprocessor.
bytes
A unit of data that typically holds a single character, such as a letter, a digit, or a punctuation mark. Some
single characters can take up more than one byte.
cable modem
A device that enables a broadband connection to the Internet by using cable television infrastructure. Access
speeds vary greatly, with a maximum throughput of 10 megabits per second (Mbps).
cache
For DNS and WINS, a local information store of resource records for recently resolved names of remote
hosts. Typically, the cache is built dynamically as the computer queries and resolves names. It also helps opti-
mize the time required to resolve queried names.
cache file
A file used by the Domain Name System (DNS) server to preload its names cache when service is started.
Also known as the root hints file because DNS uses resource records stored in this file to help locate root serv-
ers that provide referral to authoritative servers for remote names. For Windows DNS servers, the cache file is
named Cache.dns and is located in the %SystemRoot%\System32\Dns folder.
CD-R
Recordable compact disc. Data can be copied to the CD on more than one occasion; however, data cannot
be erased from the CD.
CD-RW
Rewritable compact disc. Data can be copied to the CD on more than one occasion and can be erased.
client
Any computer or program connecting to, or requesting the services of, another computer or program. Client
can also refer to the software that enables the computer or program to establish the connection.
For a local area network (LAN) or the Internet, a computer that uses shared network resources provided by
another computer (called a server).
Multidimensional color space consisting of the cyan, magenta, yellow, and black intensities that make up a
given color. Commercial color printing devices generally use this system of four-color process inks.
default printer
The printer to which a computer sends documents if you select the Print command without first specifying
which printer you want to use with a program. You can have only one default printer; it should be the printer you
use most often.
defragmentation
The process of rewriting parts of a file to contiguous sectors on a hard disk to increase the speed of access
and retrieval. When files are updated, the computer tends to save these updates on the largest continuous
space on the hard disk, which is often on a different sector than the other parts of the file. When files are thus
fragmented, the computer must search the hard disk each time the file is opened to find all of the file's parts,
which slows down response time.
desktop
The on-screen work area on which windows, icons, menus, and dialog boxes appear.
desktop pattern
A design that appears across your desktop. You can create your own pattern or select a pattern provided by
Windows.
device
Any piece of equipment that can be attached to a network or computer; for example, a computer, printer, joy-
stick, adapter, or modem card, or any other peripheral equipment. Devices normally require a device driver to
function with Windows.
dial-up connection
The connection to your network if you are using a device that uses the telephone network. This includes mo-
dems with a standard phone line, ISDN cards with high-speed ISDN lines, or X.25 networks.
If you are a typical user, you may have one or two dial-up connections, for example, to the Internet and to
your corporate network. In a more complex server situation, multiple network modem connections might be used
to implement advanced routing.
A type of optical disc storage technology. A digital video disc (DVD) looks like a CD-ROM disc, but it can
store greater amounts of data. DVDs are often used to store full-length movies and other multimedia content that
requires large amounts of storage space.
disk
document
Any self-contained piece of work created with an application program and, if saved on disk, given a unique
file name by which it can be retrieved.
The standard used to measure screen and printer resolution, expressed as the number of dots that a device
can display or print per linear inch. The greater the number of dots per inch, the better the resolution.
downloadable fonts
A set of characters stored on disk and sent (downloaded) to a printer's memory when needed for printing a
document. Downloadable fonts are most commonly used with laser printers and other page printers, although
many dot-matrix printers can accept some of them. Downloadable fonts are also called soft fonts.
drag
To move an item on the screen by selecting the item and then pressing and holding down the mouse button
while moving the mouse. For example, you can move a window to another location on the screen by dragging its
title bar.
drive
An area of storage that is formatted with a file system and has a drive letter. The storage can be a floppy
disk, a CD, a hard disk, or another type of disk. You can view the contents of a drive by clicking its icon in Win-
dows Explorer or My Computer.
drive letter
The naming convention for disk drives on IBM and compatible computers. Drives are named by letter, begin-
ning with A, followed by a colon.
DVD decoder
A hardware or software component that allows a digital video disc (DVD) drive to display movies on your
computer screen.
DVD drive
A disk storage device that uses digital video disc (DVD) technology. A DVD drive reads both CD-ROM and
DVDs; however, you must have a DVD decoder to display DVD movies on your computer screen.
encrypted password
A password that is scrambled. Encrypted passwords are more secure than plaintext passwords, which are
susceptible to network sniffers.
A feature in this version of Windows that enables users to encrypt files and folders on an NTFS volume disk
to keep them safe from access by intruders.
encryption
The process of disguising a message or data in such a way as to hide its substance.
file system
In an operating system, the overall structure in which files are named, stored, and organized. NTFS, FAT,
and FAT32 are types of file systems.
A member of the TCP/IP suite of protocols, used to copy files between two computers on the Internet. Both
computers must support their respective FTP roles: one must be an FTP client and the other an FTP server.
file type
In the Windows environment, a designation of the operational or structural characteristics of a file. The file
type identifies the program, such as Microsoft Word, that is used to open the file. File types are associated with
a file name extension. For example, files that have the .txt or .log extension are of the Text Document type and
can be opened using any text editor.
In the Macintosh environment, a four-character sequence that identifies the type of a Macintosh file. The Ma-
cintosh Finder uses the file type and file creator to determine the appropriate desktop icon for that file.
firewall
A combination of hardware and software that provides a security system, usually to prevent unauthorized
access from outside to an internal network or intranet. A firewall prevents direct communication between net-
work and external computers by routing communication through a proxy server outside of the network. The
proxy server determines whether it is safe to let a file pass through to the network. A firewall is also called a se-
curity-edge gateway.
folder
A container for programs and files in graphical user interfaces, symbolized on the screen by a graphical im-
age (icon) of a file folder. A folder is a means of organizing programs and documents on a disk and can hold
both files and additional folders.
font
A graphic design applied to a collection of numbers, symbols, and characters. A font describes a certain
typeface, along with other qualities such as size, spacing, and pitch.
font cartridge
A plug-in unit available for some printers that contains fonts in several styles and sizes. As with download-
able fonts, printers using font cartridges can produce characters in sizes and styles other than those created by
the fonts built into it.
format
The structure of a file that defines the way it is stored and laid out on the screen or in print. The format of a
file is usually indicated by its extension. For example, .txt after a file name indicates the file is a text document,
and .doc after a file name indicates it is a Word document.
fragmentation
The scattering of parts of the same disk file over different areas of the disk. Fragmentation occurs as files on
a disk are deleted and new files are added. It slows disk access and degrades the overall performance of disk
operations, although usually not severely.
free space
Available space that you use to create logical drives within an extended partition.
gigabyte (GB)
handle
In the user interface, an interface added to an object that facilitates moving, sizing, reshaping, or other func-
tions pertaining to an object. In programming, a pointer to a pointer, that is, a token that lets a program access
an identified resource.
A tool, such as a digital pen and tablet, used to enter text by writing instead of typing. Along with writing tab-
lets, you can use 3-D drawing or Computer Aided Drafting (CAD) tablets, or a tablet-PC. You can also write by
moving your mouse on the mouse pad.
handwriting recognition
The ability to interpret handwritten text and convert it into computer-readable text. Handwriting recognition
programs allow you to enter text using a pen stylus or other handwriting input device, rather than a keyboard.
hard disk
A device, also called hard disk drive, that contains one or more inflexible platters coated with material in
which data can be recorded magnetically with read/write heads. The hard disk exists in a sealed case that pro-
tects it and allows the head to fly 10 millionths to 25 millionths of an inch above the surface of a platter. Data can
both be stored and accessed much more quickly than on a floppy disk.
hardware
The physical components of a computer system, including any peripheral equipment such as printers, mo-
dems, and mouse devices.
hexadecimal
A base-16 number system represented by the digits 0 through 9 and the uppercase or lowercase letters A
(equivalent to decimal 10) through F (equivalent to decimal 15).
hyperlink
Colored and underlined text or a graphic that you click to go to a file, a location in a file, an HTML page on
the World Wide Web, or an HTML page on an intranet. Hyperlinks can also go to newsgroups and to Gopher,
Telnet, and FTP sites.
In Windows folders, hyperlinks are text links that appear in the folder's left pane. You can click these links to
perform tasks, such as moving or copying a file, or to go to other places on your computer, such as the My Doc-
uments folder or Control Panel.
A simple markup language used to create hypertext documents that are portable from one platform to anoth-
er. HTML files are simple ASCII text files with codes embedded (indicated by markup tags) to denote formatting
and hypertext links.
The protocol used to transfer information on the World Wide Web. An HTTP address (one kind of Uniform
Resource Locator [URL]) takes the form: http://www.microsoft.com.
icon
A small image displayed on the screen to represent an object that can be manipulated by the user. Icons
serve as visual mnemonics and allow the user to control certain computer actions without having to remember
commands or type them at the keyboard.
A channel through which data is transferred between a device and the microprocessor. The port appears to
the microprocessor as one or more memory addresses that it can use to send or receive data.
insertion point
The place where text will be inserted when typed. The insertion point usually appears as a flashing vertical
bar in an application's window or in a dialog box.
install
When referring to software, to add program files and folders to your hard disk and related data to your regis-
try so that the software runs properly. Installing contrasts with upgrading, where existing program files, folders,
and registry entries are updated to a more recent version.
When referring to hardware, to physically connect the device to your computer, to load device drivers onto
your computer, and to configure device properties and settings.
internet
internet. Two or more network segments connected by routers. Another term for internetwork.
Internet. A worldwide network of computers. If you have access to the Internet, you can retrieve information
from millions of sources, including schools, governments, businesses, and individuals.
Internet address
An address for a resource on the Internet that is used by Web browsers to locate Internet resources. An In-
ternet address typically starts with a protocol name, followed by the name of the organization that maintains the
site; the suffix identifies the kind of organization it is. For example, the address http://www.yale.edu/ provides the
following information:
http: This Web server uses the Hypertext Transfer Protocol.
www: This site is on the World Wide Web.
edu: This is an educational institution.
Internet address is also called Uniform Resource Locator (URL).
A routable protocol in the TCP/IP protocol suite that is responsible for IP addressing, routing, and the frag-
mentation and reassembly of IP packets.
A company that provides individuals or companies access to the Internet and the World Wide Web. An ISP
provides a telephone number, a user name, a password, and other connection information so users can connect
their computers to the ISP's computers. An ISP typically charges a monthly or hourly connection fee.
IP address
A 32-bit address used to identify a node on an IP internetwork. Each node on the IP internetwork must be
assigned a unique IP address, which is made up of the network ID, plus a unique host ID. This address is typi-
cally represented with the decimal value of each octet separated by a period (for example, 192.168.7.27). In this
version of Windows, you can configure the IP address statically or dynamically through DHCP.
A high-speed digital telephone service that can dramatically increase the speed at which you connect to the
Internet or to your corporate LAN (local area network). ISDN can operate at 128 kilobytes per second (Kbps),
which is five or more times faster than many analog modems.
keyboard layout
The arrangement that accommodates the special characters and symbols used in different languages. Key-
board layouts affect which characters appear when you press the keys on your keyboard. After you change your
keyboard layout, the characters that appear on your screen may no longer correspond to the characters that are
printed on your keyboard keys.
A type of display used in digital watches and many portable computers. LCD displays utilize two sheets of
polarizing material with a liquid crystal solution between them. An electric current passed through the liquid
causes the crystals to align so that light cannot pass through them. Each crystal, therefore, is like a shutter, ei-
ther allowing light to pass through or blocking the light.
A communications network connecting a group of computers, printers, and other devices located within a
relatively limited area (for example, a building). A LAN allows any connected device to interact with any other on
the network.
log on
To begin using a network by providing a user name and password that identifies a user to the network.
maximize
To enlarge a window to its largest size by clicking the Maximize button (at the right of the title bar), or by
pressing ALT+SPACEBAR and then pressing X.
minimize
To reduce a window to a button on the taskbar by clicking the Minimize button (at the right of the title bar), or
by pressing ALT+SPACEBAR and then pressing N.
modem (modulator/demodulator)
A device that allows computer information to be transmitted and received over a telephone line. The trans-
mitting modem translates digital computer data into analog signals that can be carried over a phone line. The
receiving modem translates the analog signals back to digital form.
MouseKeys
A keyboard feature that enables you to use the numeric keypad to move the mouse pointer and to click, dou-
ble-click, and drag.
An operating system used on all personal computers and compatibles. As with other operating systems,
such as OS/2, it translates user keyboard input into operations the computer can perform. MS-DOS can be eas-
ily accessed by using the command prompt, while MS-DOS-based programs can be accessed through the use
of shortcuts on the desktop.
MS-DOS-based program
A program that is designed to run with MS-DOS and therefore may not be able to take full advantage of all
Windows features.
My Documents
A folder that provides you with a convenient place to store documents, graphics, or other files you want to
access quickly. When you save a file in a program such as WordPad or Paint, the file is automatically saved in
My Documents, unless you choose a different folder.
network
A group of computers and other devices, such as printers and scanners, connected by a communications
link, enabling all the devices to interact with each other. Networks can be small or large, permanently connected
through wires or cables, or temporarily connected through phone lines or wireless transmissions. The largest
network is the Internet, which is a worldwide group of networks.
A device, such as a printer, modem, or game controller, that requires manual configuration of hardware set-
tings before it can be used. Non-Plug and Play devices are becoming increasingly rare as manufacturers stop
producing them in favor of Plug and Play devices. Non-Plug and Play typically applies to older pieces of equip-
ment.
normal backup
A backup that copies all selected files and marks each file as having been backed up (in other words, the
archive attribute is cleared). With normal backups, you need only the most recent copy of the backup file or tape
to restore all of the files. You usually perform a normal backup the first time you create a backup set.
offline
A state that marks a component in a cluster as unavailable. A node in an offline state is either inactive or not
running. Resources and groups also have an offline state.
online
A state that marks a component in a cluster as available. When a node is online, it is an active member of
the cluster and can own and run groups as well as honor cluster database updates, contribute votes to the quo-
rum algorithm, and maintain heartbeats. Resources and groups also have an online state.
operator
In mathematics and in programming and computer applications, a symbol or other character indicating an
operation that acts on one or more elements. You can use the following four operators in standard calculations:
/ divide
* multiply
- subtract
+ add
For Indexing Service, a word or character that specifies a relationship in a query.
orphan
A member of a mirrored volume or a RAID-5 volume that has failed due to a severe cause, such as a loss of
power or a complete hard-disk head failure. When this happens, the fault-tolerant driver determines that it can
no longer use the orphaned member and directs all new reads and writes to the remaining members of the fault-
tolerant volume.
orphan file
A file that is stored inside My Briefcase and not linked to any file outside My Briefcase. When you update
files, the orphan file is not synchronized with any other file.
package
An icon that represents embedded or linked information. That information may consist of a complete file,
such as a Paint bitmap, or part of a file, such as a spreadsheet cell. When you choose the package, the applica-
tion used to create the object either plays the object (for example, a sound file) or opens and displays the object.
If you change the original information, linked information is automatically updated. However, you must manually
update embedded information.
peripheral
A device, such as a disk drive, printer, modem, or joystick, that is connected to a computer and is controlled
by the computer's microprocessor.
pixel
Short for picture element, one spot in a rectilinear grid of thousands of such spots that form an image pro-
duced on the screen by a computer or on paper by a printer. A pixel is the smallest element that display or print
hardware and software can manipulate to create letters, numbers, or graphics. A pixel is also called a pel.
plotter
Any device used to draw charts, diagrams, and other line-based graphics.
plotter font
A font created by a series of dots connected by lines. Plotter fonts can be scaled to any size and are most
often printed on plotters. Some dot-matrix printers also support plotter fonts.
A set of specifications developed by Intel that allows a computer to automatically detect and configure a de-
vice and install the appropriate device drivers.
An industry standard suite of protocols for the use of point-to-point links to transport multiprotocol data-
grams. PPP is documented in RFC 1661.
Primary disk
The hard disk drive that contains the system and boot partitions used to start Windows.
The button you use most often for clicking and double-clicking. The primary mouse button is the left button
on most mice and trackball devices, and the lower button on some trackball devices, but you can switch the
function of the buttons by using the Mouse Properties dialog box in Control Panel.
printer
A device that puts text or images on paper or other print media. Examples are laser printers or dot-matrix
printers.
printer driver
A program designed to allow other programs to work with a particular printer without concerning themselves
with the specifics of the printer's hardware and internal language. By using printer drivers that handle the subtle-
ties of each printer, programs can communicate properly with a variety of printers.
Printer window
Also called the queue view, the Printer window shows information about any pending print jobs for the print-
er. For each printer you have installed or to which you are connected, you can such information as see how
many documents are waiting to be printed, who owns them, and how large they are.
The folder in Control Panel that contains the Add Printer Wizard and icons for all the printers installed on
your computer.
private network
program
A complete, self-contained set of computer instructions that you use to perform a specific task, such as word
processing, accounting, or data management. Program is also called application.
protocol
A set of rules and conventions for sending information over a network. These rules govern the content, for-
mat, timing, sequencing, and error control of messages exchanged among network devices.
public network
A cluster network that supports client-to-cluster communication (either with or without supporting node-to-
node communication).
query
For Indexing Service, a structured statement that specifies the documents you want to find. The simplest
query is a single word.
Memory that can be read from or written to by a computer or other devices. Information stored in RAM is lost
when the computer is turned off.
read-only memory (ROM)
Recycle Bin
The place in which Windows stores deleted files. You can retrieve files you deleted in error, or you can
empty the Recycle Bin to create more disk space.
refresh
refresh interval
An interval of time used by secondary masters of a zone to determine how often to check if their zone data
needs to be refreshed. When the refresh interval expires, the secondary master checks with its source for the
zone to see if its zone data is still current or if it needs to be updated using a zone transfer. This interval is set in
the SOA (start-of-authority) resource record for each zone.
refresh rate
The frequency with which the video screen is retraced to prevent the image from flickering. The entire image
area of most monitors is refreshed approximately 60 times per second.
registry
A database repository for information about a computer's configuration. The registry contains information
that Windows continually references during operation, such as:
Profiles for each user.
The programs installed on the computer and the types of documents each can create.
Property settings for folders and program icons.
What hardware exists on the system.
Which ports are being used.
The registry is organized hierarchically as a tree and is made up of keys and their subkeys, hives, and value
entries.
Removable Storage
A service used for managing removable media (such as tapes and discs) and storage devices (libraries).
Removable Storage allows applications to access and share the same media resources.
right-click
To position the mouse over an object, and then press and release the secondary (right) mouse button.
Right-clicking opens a shortcut menu that contains useful commands, which change depending on where you
click.
ROM
An acronym for Read-Only Memory, a semiconductor circuit into which code or data is permanently installed
by the manufacturing process. ROM contains instructions or data that can be read but not modified.
screen resolution
The setting that determines the amount of information that appears on your screen, measured in pixels. Low
resolution, such as 640 x 480, makes items on the screen appear large, although the screen area is small. High
resolution, such as 1024 x 768, makes the overall screen area large, although individual items appear small.
screen saver
A moving picture or pattern that appears on your screen when you have not used the mouse or keyboard for
a specified period of time.
The button that you use to display shortcut menus or other program-specific features. The secondary mouse
button is the right button on most mice and trackball devices, and the upper button on other trackball devices,
but you can switch the function of the buttons in the Mouse Control Panel.
serial port
An interface on the computer that allows asynchronous transmission of data characters one bit at a time.
Also called a communication or COM port.
server
shared folder
A folder on another computer that has been made available for other people to use on the network.
shortcut
A link to any item accessible on your computer or on a network, such as a program, file, folder, disk drive,
Web page, printer, or another computer. You can put shortcuts in various areas, such as on the desktop, on the
Start menu, or in specific folders.
speech recognition
The ability to interpret spoken words and convert them into computer-readable text. Speech recognition pro-
grams allow you to enter text by speaking into a microphone, rather than using a keyboard.
spooling
A process on a server in which print documents are stored on a disk until a printer is ready to process them.
A spooler accepts each document from each client, stores it, then sends it to a printer when the printer is ready.
standby
A state in which your computer consumes less power when it is idle, but remains available for immediate
use. While your computer is on standby, information in computer memory is not saved on your hard disk. If there
is an interruption in power, the information in memory is lost.
startup environment
In dual-boot or multiple-boot systems, the configuration settings that specify which system to start and how
each system should be started.
status bar
A line of information related to the current program. The status bar is usually located at the bottom of a win-
dow. Not all windows have a status bar.
StickyKeys
A keyboard feature that enables you to press a modifier key (CTRL, ALT, or SHIFT), or the Windows logo
key, and have it remain active until a non-modifier key is pressed. This is useful for people who have difficulty
pressing two keys simultaneously.
Stop error
A serious error that affects the operating system and that could place data at risk. The operating system
generates an obvious message, a screen with the Stop error, rather than continuing on and possibly corrupting
data. Stop error is also called a fatal system error.
string
A group of characters or character bytes handled as a single entity. Computer programs use strings to store
and transmit data and commands. Most programming languages consider strings (such as 2674:gstmn) as dis-
tinct from numeric values (such as 470924).
system disk
A disk that contains the MS-DOS system files necessary to start MS-DOS.
system files
Files used by Windows to load, configure, and run the operating system. Generally, system files must never
be deleted or moved.
System menu
A menu that contains commands you can use to manipulate a window or close a program. You click the pro-
gram icon at the left of the title bar to open the System menu.
taskbar
The bar that contains the Start button and appears by default at the bottom of the desktop. You can click the
taskbar buttons to switch between programs. You can also hide the taskbar, move it to the sides or top of the
desktop, and customize it in other ways.
taskbar button
TCP
text box
In a dialog box, a box in which you type information needed to carry out a command. The text box may be
blank or may contain text when the dialog box opens.
thumbnail
A miniature version of an image that is often used for quick browsing through multiple images.
title bar
The horizontal bar at the top of a window that contains the name of the window. On many windows, the title
bar also contains the program icon, the Maximize, Minimize, and Close buttons, and the optional ? button for
context-sensitive Help. To display a menu with commands such as Restore and Move, right-click the title bar.
toolbar
In a program in a graphical user interface, a row, column, or block of on-screen buttons or icons. When
clicked, these buttons or icons activate certain functions, or tasks, of the program. For example, the toolbar in
Microsoft Word contains buttons for, among other actions, changing text to italic or boldface, and for saving or
opening a document. Users can often customize toolbars and move them around on the screen.
topology
In Windows, the relationships among a set of network components. In the context of Active Directory replica-
tion, topology refers to the set of connections that domain controllers use to replicate information among them-
selves.
transaction
For Message Queuing, the pairing of two or more actions that are performed together as a single action; the
action succeeds or fails as a whole. Using Microsoft Distributed Transaction Coordinator (MS DTC) ensures that
either both actions succeed or neither is executed.
A set of networking protocols widely used on the Internet that provides communications across intercon-
nected networks of computers with diverse hardware architectures and various operating systems. TCP/IP in-
cludes standards for how computers communicate and conventions for connecting networks and routing traffic.
tree view
A hierarchical representation of the folders, files, disk drives, and other resources connected to a computer
or network. For example, Windows Explorer uses a tree view to display the resources that are attached to a
computer or a network.
TrueType fonts
Fonts that are scalable and sometimes generated as bitmaps or soft fonts, depending on the capabilities of
your printer. TrueType fonts are device-independent fonts that are stored as outlines. They can be sized to any
height, and they can be printed exactly as they appear on the screen.
An address that uniquely identifies a location on the Internet. A URL for a World Wide Web site is preceded
with http://, as in the fictitious URL http://www.example.microsoft.com/. A URL can contain more detail, such as
the name of a page of hypertext, usually identified by the file name extension .html or .htm.
uninstall
When referring to software, the act of removing program files and folders from your hard disk and removing
related data from your registry so the software is no longer available.
When referring to a device, the act of removing the corresponding device drivers from your hard disk and
physically removing the device from your computer.
A device connected between a computer and a power source to ensure that electrical flow is not interrupted.
UPS devices use batteries to keep the computer running for a period of time after a power failure. UPS devices
usually provide protection against power surges and brownouts as well.
An external bus that supports Plug and Play installation. Using USB, you can connect and disconnect de-
vices without shutting down or restarting your computer. You can use a single USB port to connect up to 127
peripheral devices, including speakers, telephones, CD-ROM drives, joysticks, tape drives, keyboards, scan-
ners, and cameras. A USB port is usually located on the back of your computer near the serial port or parallel
port.
UPS service
An interface on the computer that enables you to connect a Universal Serial Bus (USB) device. USB is an
external bus standard that enables data transfer rates of 12 Mbps (12 million bits per second). USB ports sup-
port a plug that is approximately 7 mm x 1 mm.
user
A person who uses a computer. If the computer is connected to a network, a user can access the programs
and files on the computer, as well as programs and files located on the network (depending on account restric-
tions determined by the network administrator).
user account
A record that consists of all the information that defines a user to Windows. This includes the user name and
password required for the user to log on, the groups in which the user account has membership, and the rights
and permissions the user has for using the computer and network, and accessing their resources. For Windows
XP Professional and member servers, user accounts are managed with Local Users and Groups. For Windows
Server domain controllers, user accounts are managed with Microsoft Active Directory Users and Computers.
user name
A unique name identifying a user account to Windows. An account's user name must be unique among the
other group names and user names within its own domain or workgroup.
user password
The password stored in each user's account. Each user generally has a unique user password and must
type that password when logging on or accessing a server.
user profile
A file that contains configuration information for a specific user, such as desktop settings, persistent network
connections, and application settings. Each user's preferences are saved to a user profile that Windows uses to
configure the desktop each time a user logs on.
user rights
Tasks that a user is permitted to perform on a computer system or domain. There are two types of user
rights: privileges and logon rights. An example of a privilege is the right to shut down the system. An example of
a logon right is the right to log on to a computer locally. Both types are assigned by administrators to individual
users or groups as part of the security settings for the computer.
Users
A special group that contains all users who have user permissions on the server. When a Macintosh user
assigns permissions to everyone, those permissions are given to the group's users and guests.
vector
For Indexing Service, an ordered series of words or numbers used in a query. For example, a single docu-
ment can have (Scott Cooper; Don Hall; Amy Egert) as a vector of coauthors.
vector font
A font rendered from a mathematical model, in which each character is defined as a set of lines drawn be-
tween points. Vector fonts can be cleanly scaled to any size or aspect ratio.
virus
A program that attempts to spread from computer to computer and either cause damage (by erasing or cor-
rupting data) or annoy users (by printing messages or altering what is displayed on the screen).
volume
An area of storage on a hard disk. A volume is formatted by using a file system, such as FAT or NTFS, and
has a drive letter assigned to it. You can view the contents of a volume by clicking its icon in Windows Explorer
or in My Computer. A single hard disk can have multiple volumes, and volumes can also span multiple disks.
Web server
A computer that is maintained by a system administrator or Internet service provider (ISP) and that responds
to requests from a user's browser.
A communications network connecting geographically separated computers, printers, and other devices. A
WAN allows any connected device to interact with any other on the network.
wildcard character
A keyboard character that can be used to represent one or many characters when conducting a query. The
question mark (?) represents a single character, and the asterisk (*) represents one or more characters.
wildcarding
In DNS, the supported use of wildcard characters such as the asterisk (*) in domain names for DNS queries
that resolve to multiple names. When wildcarding is used, DNS servers must support resolving name queries
that use wildcard characters, and resolvers must be able to parse multiple records from any resource record
sets (RRsets) issued in wildcard query responses.
window
A portion of the screen where programs and processes can be run. You can open several windows at the
same time. For example, you can open your e-mail in one window, work on a budget in a spreadsheet in anoth-
er, download pictures from your digital camera in another window, and order your weekly groceries on the Web
in another window. Windows can be closed, resized, moved, minimized to a button on the taskbar, or maximized
to take up the whole screen.
A system for exploring the Internet by using hyperlinks. When you use a Web browser, the Web appears as
a collection of text, pictures, sounds, and digital movies.
writable CD
Recordable compact disc (CD-R) or rewritable compact disc (CD-RW). Data can be copied to the CD on
more than one occasion. Rewritable compact discs can also be erased.
Byte – binary term
8 bits = Byte
1,000,000 bits = Gb (Gigabit)
8,796,093,022,208 bits = TB (Terrabyte)
9,007,199,254,740,992 bits = PB (Pettabyte)
9,223,372,036,854,775,808 bits = EB (Exabyte)
9,444,732,965,739,290,427,392 bits = ZB (Zettabyte)
9,671,406,556,917,033,397,649,408 bits = YB (Yottabyte)
Which of the following is used to enter text into a word processing programme?
a) Scanner
b) Plotter
c) Touch Screen
d) Mouse
If a business purchases 2 copies of Application Software package that is protected by Copyright legally; they can –
a) Install as many copies as they like
b) Make copies and give away
c) Install 2 copies
d) Make copies and sell them
Which application is used to open and use Rich Text Format (RTF)?
a) Basic text editor
b) Databases
c) Graphics
d) Operating system
A disk that has “write protection” –
a) Can be written to
b) Overwritten
c) Not readable
d) Cannot be written to
Which of the following is a non-essential item on a standard chair for a computer Workstation?
a) Arm rests
b) Adjustable back
c) Five feet
d) Height adjustable seat
Which file type can be opened in Word Processing, but must be edited in another application?
a) .doc
b) .txt
c) .gif
d) .wpd
A directory structure is effective because –
a) Data files can be backed up
b) Directory name is all in capitals
c) Programme files are separate from data files
d) It makes good use of the large capacity on the hard disk
Computer D
a) Client / Server
b) P2P
c) ISP
d) LAN
Which of the following software prints high quality combined text and graphics?
a) Spreadsheets
b) Desktop publishing
c) Word processing
d) Graphics
Which one of the following parts of a computer is necessary to enable it to play music?
a) Sound card
b) CD-ROM
c) MIDI interface
d) Serial interface
Which one of the following printers is suitable for printing sprocket fed carbon copies?
a) Laser
b) Dot matrix
c) Ink-jet
d) Drum
Which of the following is twice the size of A4 paper?
a) A2
b) A3
c) A5
d) A6
A gigabyte is equal to
a) 1024 bytes
b) A million megabytes
c) A thousand kilobytes
d) 1024 megabytes
RAM is
a) Temporary storage / workspace
b) Backup storage
c) Disk storage
d) Read Only Memory
Where does the computer store information when it’s turned off?
a) RAM
b) Monitor
c) Disks
d) Scanner
A package, which can be used for a short period before purchasing is termed
a) Try and buy
b) Freeware
c) Shareware
d) Borrow-ware
True / False
The processor is also called the Central Processing Unit, or CPU. T
Secondary storage units contain the instructions and data to be used immediately by the processor. F
Desktop publishing software is used primarily to Store and Retrieve information. F
Processed data that is organized, meaningful and useful is called information. T
“User-Friendly” refers to a special kind of terminal. F
To use a computer, you need to know its internal functions. F
PDA’s are also called mainframes. F
Mainframes are also called notebook computers. F
Computers can be classified, smallest to largest, as mainframes, microcomputers or mini computers. F
Custom software may be purchased off the shelf. F
How to Attach Files to Email
Have you ever needed to send a computer file to someone? Perhaps it was a word processing doc or an
image of your family. You can attach files to your email and—attach, click, zap!—your file is delivered.
_______________________________________________________________________________________
With a googlemail (Gmail) account, you would follow the following steps:
1. Compose your email as normal.
* Gmail doesn't allow you to send exe files as an attachment. If you do want to send an exe file, you will need to
rename file first.
4. Wait for the file to be attached to the email. When it's attached you will see a checkbox for each
individual file attached. Unchecking a checkbox removes the attached file from your email.
5. Then when you are happy with the context of the email etc, you can just click on SEND.
That's it, you now just have to hope the recipient can open the file.
____________________________________________________________________________________________
The above is the standard for all email clients and all web based email. If there isn't an Attach a file link, then you
may just have Attach or just a paper clip.
____________________________________________________________________________________________
If you receive an email with an attachment, you will see a paper clip in the subject field. With Gmail, you would
click on the subject to open up the email. Scroll down to the bottom of the email. Click on the link to download all
attachments. Find a suitable folder on your PC to save the file to and Save.
Email & Attachments
The format for all email addresses is username@domain.general and breaks down as follows:
"Username" is the ID of the person who has the address, whether real or an alias.
The "@" symbol attaches the user to their email box location.
Note: If an address doesn't have the @ sign attached, it's not an email address!
Note: ".com" refers to a commercial entity, ".org" to an organization, ".net" to a network provider, and ".edu" to an
educational institution. These are the most common extensions.
How to use Memory Sticks
Using a memory stick has become very popular nowadays. It has basically replaced floppy disks.
Memory sticks can contain a lot more than floppy disks. Memory sticks are also very hard to wreck.
Floppy disks: 1.44MB (Must be kept away from magnets and direct sunlight etc, as this could wipe the
data)
Memory sticks also have the benefit of being easier to carry around than floppies. You can have them
around your neck, on a lanyard.
Most laptops now don't have a floppy drive, although you could buy an external one.
Window
____________________________________________________________________________________________
To create a New Folder
On the Desktop:-
PC Desktop
1. Minimize/Close any, and all windows, so that you can see the desktop (as above).
2. Right Click once – Anywhere in a blank part of the Desktop. Select 'New' and then move your mouse into sub
menu and select 'Folder'.
That's all there is to creating a new folder. You can also repeat steps 2-4 whichever Window you are in.
3. Click and drag around icon / image etc that you want to copy, click twice
4. Save file
5. Open separate bmp image file