Writing a letter in Word

Download Report

Transcript Writing a letter in Word

U3A Computing CMP Class
Leader – Brian Moore
Week 7 of 10 weeks.
Mondays 2:30 to 4:30pm
10/11/14
New Members Social Event
• The committee would like to invite all new
members, who have joined Crewe and
Nantwich U3A since October 2013, to join us
for our annual ‘Coffee and Cake’ event on
• Wednesday November19th at 2.30pm
• at
• Wistaston Memorial Hall.
Windows 8 Demo
• Windows 8 starts in a completely different view
called Metro which is intended to allow use on
Tablets. Icons have been replaced by chunky
rectangular “Tiles” and NO Start menu.
• These “Apps” are different from normal programs.
They are minimalistic and run full screen only.
• W8 uses mouse movements to the edge of the
screen and the Windows button for control.
These actions have to be remembered.
• There is still a simplified Desktop for programs.
I have a program to give me back the Start Menu.
Control of Windows 8
• Use of corner positions.
• After switch on get a picture with date/time defined
by the last user logged in.
• Top LHS & click gives a login list. Try U3A / u3a.
• At Metro screen try Photos App, Top LHS RH click
gives Close & Snap- makes it like a Window. But
next time shows a command bar at the bottom.
• The normal way to close an App is to drag from the
top all the way down.
• RH click on a App gives commands, Unpin removes
from Metro, use All apps to get back.
• Top RHS or Windows & C. Brings up the Charms bar,
a list Search, Share, Start, Devices, and Settingsincludes shut down.
• Many standard Apps use the internet, slowing it
down for your own use of the Internet Explorer
App. Because IE layout is so minimal, its hard to see
why its frozen. IE is available as a normal Program.
• New App’s can only be installed from Apps Store.
• Bottom LH & click brings up a reduced desktop and
taskbar which shows all Programs and no App’s but
no Startup. So Internet Explorer is the full version
with all controls.
Web sites on Windows 8
• http://www.bleepingcomputer.com/tutorials/howto-use-windows-8-start-screen/
• http://en.wikipedia.org/wiki/Windows_8
Email Safety
• If you have used Email for a while you will no
doubt encounter malicious emails in your inbox.
• It is important to be able to recognise them.
• They are steadily getting more and more
convincing all the time.
• The main problems are Links to dubious web sites
and dubious Attachments.
• Banks keep reminding users that they will never
send an Email asking for personal details or to log
on to verify something.
An Example of a Malicious Email.
How to check a dubious email
• First, if it’s like the previous slides, delete it.
• If you are not sure, I often Google a part of it
which is unlikely to be customised for you.
• Be sure to put “ “ around the phrase so Google
searches for the exact whole phrase. EG=
• “Please submit the tax refund request and allow us
5-7 days in order to process it”
• If it’s malicious, somebody else in the world will
have seen it and will warn about it.
• Try it. Look at the results. Only open the first one
from http://www.justchat.co.uk.
Malicious Email exploiting interest in Ebola. The
attachment contains the DarkKomet virus
Other Malicious Emails
Some of the newest printers have scan-to-email
ability. Symantec has identified what looks like a
printer generated email which tempts you to open
what looks like a .doc file but in fact contains a virus.
http://mpa.com/blog/identify-malicious-email/ &
http://www.makeuseof.com/tag/spot-dangerousemail-attachment/
Contains helpful tips on identifying a Malicious Email.
Web sites can spread Viruses
• Web sites can be taken over by Malware hackers
so that if you enter them your computer will be
infected, unless• All Anti Virus programs now check for this. AVG
has link scanner and for Google searches will
show a green tick if OK.
• Even so they may be behind in finding a problem
site so it’s best to avoid obvious dubious sites
e.g. sites offering free music/software etc.
Internet Safety. E-mail Tips
• MalwareBytes is a good program to remove
Malware. Run it in addition to a antivirus program.
Download for free from
http://www.majorgeeks.com/mg/getmirror/malwar
ebytes_anti_malware,1.html Then Save As
mbam-setup-majorgeeks-2.0.3.1025.exe on your
desktop then run it to install.
• http://www.emailsafety.net/tips.php A bit old.
• I have made a Glossary of computer terms. It is
available for download on the CMP, Course material
page of http://www.creweandnantwich-u3a.org.uk/
Practical on Hotmail
• Browse to www.hotmail.com It will redirect to
Login.Live.com Outlook sign in screen. Login to
[email protected] with password=
u3a1234.
Go to OneDrive (was SkyDrive), Documents.
You should have the safe version of the malicious
email mentioned earlier in your inbox. Double click
on it will open a on line version of word.
Its OK to click on “Proceed to refund”
Then Sign
Out.
• Note the large amount of space 15Gb that is
available for on line storage.
Facebook
• Worlds No 1 social web site.
• Browse to https://www.facebook.com/
• Log in with your own account or email=
[email protected] password=
u3a.Monday.
• Settings of Facebook. Think about who you want
to communicate with, called Friends. Their friends
can ask if you want to be friends of theirs. This can
get tiresome. Even worse is requests from Everyone.
Facebook settings
• Two good sites on Facebook settings=
http://www.welivesecurity.com/2014/07/08/facebo
ok-account-settings/
• & http://thecybersafetylady.com.au/2014/06/4important-security-settings-protect-facebookprofile/
• They are also on the Crewe & Nantwich web site,
CMP, Course Material, Week 7 as Best Facebook
Settings as a word document.
Twitter
• For quick comments – called Tweets.
• Browse to http://twitter.com/
• Log in with your own account or email=
[email protected] password=
u3a.Monday.
• Settings of Twitter see
• http://www.fightcyberstalking.org/privacy-settingstwitter/
• This is also on the Crewe & Nantwich web site,
CMP, Course Material, Week 7 as Best Twitter
Settings as a word document.