• No results found

You and Your Laptop. Sheri & Allen Fertic

N/A
N/A
Protected

Academic year: 2021

Share "You and Your Laptop. Sheri & Allen Fertic"

Copied!
28
0
0

Loading.... (view fulltext now)

Full text

(1)
(2)

You and Your Laptop

Sheri & Allen Fertic

(3)

Class Outline

Laptop Protection Battery Life

Memory

Using the Laptop: connect wirelessly, upload pictures, add printers and other peripherals.

Questions and Lab Time

Class Outline

Laptop Protection Battery Life

Memory

Using the Laptop: connect wirelessly, upload pictures, add printers and other peripherals.

(4)

Laptop Protection

Plugging It In

Shutting It Down

Power Options

Virus Protection and Firewall

Overheating

Avoiding Theft

Laptop Protection

Plugging It In

Shutting It Down

Power Options

Virus Protection and Firewall

Overheating

(5)

Laptop Protection PLUGGING IT IN

FIRST, plug power connection into laptop

SECOND, plug power connection into wall, outlet or surge protector.

_________________________________

Why? Prevents electrical arc from occurring at the laptop connection.

FIRST, plug power connection into laptop

SECOND, plug power connection into wall, outlet or surge protector.

_________________________________

(6)

Laptop Protection SHUTTING IT DOWN

The proper way to “shutdown” or turn off Click START, click SHUTDOWN

This protects your data and your hardware. If your laptop is “frozen” or locked, then you

must “hard” power it down by holding down the power button for > 17 seconds.

The proper way to “shutdown” or turn off Click START, click SHUTDOWN

This protects your data and your hardware. If your laptop is “frozen” or locked, then you

(7)

POWER OPTIONS

Sleep vs Hibernate vs Shutdown ?

The answer depends mostly on you. Are you

into saving energy or boot-up time? How often do you leave your computer and for how

long ?

There are three main shut-down options

available in Windows: Shut-Down, Sleep and Hibernate (names may vary depending on the Windows version).

(8)

Sleep Mode

The difference between Sleep and Hibernate is that one uses less power than the other. I'll Explain:

Sleep Feature = Pause

Sleep is a power-saving state which uses just enough power to retain the memory for when you “wake up” your computer again.

This mode use the most power of all the “Power-Off Modes”

(9)

Hibernate Mode

Hibernate:

The Hibernate function was intended primarily for laptop users (also available for Desktops). This mode lets you save much more power when not using your computer (as in saving battery).

When you put the computer in Hibernate Mode, it stores the contents of your RAM (Services, clipboard etc.) to your hard-drive which on reboot is read back into the RAM which takes about a minute to be completed, but on the upside you do save more energy.

(10)

Shut Down

If your concern is to save energy, and you don’t mind the longer Boot Up time – then you should always use the “Shut Down” option.

This will shut down every running service and application and wipe clean your RAM.

This option saves the most energy as the computer is not using any power at all when in this state.

(11)

Hybrid Sleep

Hybrid sleep is both Sleep and Hibernate, primarily intended for Desktop Computers. Hybrid Sleep

(12)

Teacher Note: Which one is best?

 Depends on how you use your laptop.

 I use mine a lot at home so I leave it plugged in.  When I leave it for awhile (a break or at night), I

put it in sleep mode.

 Things to consider: Updates, virus scans, etc.  Always turn it OFF before packing away

(13)
(14)

Power Options: Win7 and VISTA

START button, click CONTROL PANEL Click ALL CONTROL ITEMS at the bottom

Click POWER OPTIONS

OR

-I find the easiest way is to click the START button, then type

(15)

Power Options: XP

Click START

Click CONTROL PANEL

(16)

Virus Protection and Firewall

It is Simple ….

Be sure you have Virus protection and a Firewall on your computer.

There are 2 free virus programs that are reliable and as protective as any of the costly virus programs: AVG and Avast.

(17)

Avoiding Theft

Keep laptop in a non-laptop bag

Password protect it with a strong password Never take your eyes off it when travelling

(18)

Avoiding Overheating

#1 problem with Laptops is overheating Occurs from working on 'soft' surfaces

(19)

Battery Life

Always refer to Mfr recommendations to get most mileage from your battery.

Most recommend fully charge battery before using, then fully discharge occasionally.

(20)

Memory: How much do I have?

Memory is important because if you don't have enough, you run slow. Measured in Megabytes (MB). Most

current systems need at least 512MB.

(21)

Memory: How to Add

Use the Internet to find compatible memory

Know your model #, serial #, and/or service

(22)

Memory: Memory Chip

(23)

Memory: Installing Memory Chip

(24)

Connect to a Wireless Network

IF YOU ARE CONNECTING TO YOUR

WIRELESS, BUT NOT GETTING TO THE INTERNET – BE AWARE THAT THE

(25)

Connect to a Wireless Network

(26)

Connect to a Wireless Network

(27)

Using Your Laptop

Class Time: Your Choice

CONNECT WIRELESSLY

CONNECT DIGITAL CAMERAS EDIT & SEND PICS VIA E-MAIL ADD PRINTER

USE THUMB DRIVES SURF WEB

(28)

END OF CLASS

Thank you for attending this class and we hope to see you again.

References

Related documents

THE COMPANY IS A LEADING PROVIDER OF CLIENT, GATEWAY AND SERVER SECURITY SOLUTIONS FOR VIRUS PROTECTION, FIREWALL AND VIRTUAL PRIVATE NETWORK, VULNERABILITY MANAGEMENT,

Clark Professor at the University of Kentucky, Summers is the author of a number of highly regarded studies of the Gilded Age, most especially Rum, Romanism, and Rebellion: The

The undertaking of this study has shown that the adoption of BIM is unlikely to be without problems and for SMEs may be better undertaken in stages rather than a

Coeficientes de correlación de Spearman (n = 18) del potencial hídrico del xilema al pre-amanecer en relación al contenido de humedad del suelo, temperatura media mensual del

nullectet dolore doloreris in nullupienda ipsam harchil iquaere pelibusdae odi con nobitem quae core re volorum rerupta nonsed most aperum facessin custia sum quatur, ute quae

Packet filter A method of controlling access to a network, or set of networks, by examining packets for source and destination address information, and permitting those packets

Hierarchical to : No other components. Dependencies : FAU_GEN.1 Audit data generation.. 97 FAU_SAR.1.2 The TSF shall provide the audit records in a manner suitable for the user to

The TOE described in this protection profile has several security functions: Infor- mation flow control, Management of the TOE, Administrator identification and au- thentication,