SlideShare une entreprise Scribd logo
1  sur  16
How to Back-Up Critical Data on Windows computers (Snooze, You Lose) Presented by: Marianne Lenox Staff Training and Development Coordinator Contact info: mlenox@hpl.lib.al.us November 2006 – Updated July 2008
Agenda ,[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object]
The importance of backing up ,[object Object],[object Object],[object Object],[object Object],[object Object]
How often? ,[object Object],[object Object],[object Object]
What to Backup? ,[object Object],[object Object]
Where to Backup? ,[object Object],[object Object],[object Object]
How much room do I need? ,[object Object],[object Object]
Preferred method:  backup by Copy and Paste ,[object Object],[object Object],[object Object],[object Object],[object Object],[object Object]
My Documents backup ,[object Object],[object Object],[object Object],[object Object],[object Object]
Outlook back up ,[object Object],[object Object],In Explorer, browse to the File folder which contains  your item, then copy to your backup media!
What to backup in Outlook ,[object Object],[object Object]
Outlook Express or windows Mail backup ,[object Object],[object Object],[object Object],[object Object]
Outlook Express Click on the “Maintenance” tab Click on the “Store Folder” button
Outlook Express Use the default location, noting the address.  You can actually copy  and paste from this dialogue box!
Windows Backup and restore Utility ,[object Object],[object Object],[object Object]
Follow-up ,[object Object],[object Object]

Contenu connexe

Tendances (20)

Windows 7 Unit B PPT
Windows 7 Unit B PPTWindows 7 Unit B PPT
Windows 7 Unit B PPT
 
Files and Folders
Files and FoldersFiles and Folders
Files and Folders
 
BoxFiles
BoxFilesBoxFiles
BoxFiles
 
EndNote Basics 2016
EndNote Basics 2016EndNote Basics 2016
EndNote Basics 2016
 
ppt on open office.org
ppt on open office.orgppt on open office.org
ppt on open office.org
 
Managing Files
Managing FilesManaging Files
Managing Files
 
Fresh docs
Fresh docsFresh docs
Fresh docs
 
EndNote Set-Up
EndNote Set-UpEndNote Set-Up
EndNote Set-Up
 
WINDOWS 10
WINDOWS 10WINDOWS 10
WINDOWS 10
 
Tidy up for mac
Tidy up for macTidy up for mac
Tidy up for mac
 
Recover Microsoft Office files Easily
Recover Microsoft Office files EasilyRecover Microsoft Office files Easily
Recover Microsoft Office files Easily
 
Online Databases english
Online Databases englishOnline Databases english
Online Databases english
 
Fix 'the disk is unreadable' Error of Mac
Fix 'the disk is unreadable' Error of MacFix 'the disk is unreadable' Error of Mac
Fix 'the disk is unreadable' Error of Mac
 
File Management
File ManagementFile Management
File Management
 
MS Access and Database Fundamentals
MS Access and Database FundamentalsMS Access and Database Fundamentals
MS Access and Database Fundamentals
 
Backsync per sincornizzare due pc
Backsync per sincornizzare due pcBacksync per sincornizzare due pc
Backsync per sincornizzare due pc
 
Endnote FAQs
Endnote FAQsEndnote FAQs
Endnote FAQs
 
Ms access
Ms accessMs access
Ms access
 
EndNote Hands-On: Mac
EndNote Hands-On: MacEndNote Hands-On: Mac
EndNote Hands-On: Mac
 
Kernel for Word Recovery
Kernel for Word RecoveryKernel for Word Recovery
Kernel for Word Recovery
 

En vedette

Workshop on personal productivity at hotel keys nestor
Workshop on personal productivity at hotel keys nestorWorkshop on personal productivity at hotel keys nestor
Workshop on personal productivity at hotel keys nestorNandu Warrier
 
More With Less
More With LessMore With Less
More With Lessmlx
 
Presentations that ROCK!
Presentations that ROCK!Presentations that ROCK!
Presentations that ROCK!mlx
 
Large display templates
Large display templatesLarge display templates
Large display templatesmlx
 
Extreme Google
Extreme GoogleExtreme Google
Extreme Googlemlx
 
The Customer-Centric Library
The Customer-Centric Library The Customer-Centric Library
The Customer-Centric Library mlx
 
A look at computer security
A look at computer securityA look at computer security
A look at computer securityAhmed Mekkawy
 
Computer security privacy and ethics
Computer security privacy and ethicsComputer security privacy and ethics
Computer security privacy and ethicsgeneveve_
 
Talking Points
Talking PointsTalking Points
Talking Pointsmlx
 
Computer , Internet and physical security.
Computer , Internet and physical security.Computer , Internet and physical security.
Computer , Internet and physical security.Ankur Kumar
 
Ethics and privacy ppt 3rd period
Ethics and privacy ppt 3rd periodEthics and privacy ppt 3rd period
Ethics and privacy ppt 3rd periodcharvill
 
Chapter 11 computer security and safety, ethics, and privacy
Chapter 11   computer security and safety, ethics, and privacyChapter 11   computer security and safety, ethics, and privacy
Chapter 11 computer security and safety, ethics, and privacyhaider ali
 
Lesson 8 - Understanding Backup and Recovery Methods
Lesson 8 - Understanding Backup and Recovery MethodsLesson 8 - Understanding Backup and Recovery Methods
Lesson 8 - Understanding Backup and Recovery MethodsGene Carboni
 
Computer security threats & prevention
Computer security threats & preventionComputer security threats & prevention
Computer security threats & preventionPriSim
 
InformationSecurity
InformationSecurityInformationSecurity
InformationSecuritylearnt
 
Privacy , Security and Ethics Presentation
Privacy , Security and Ethics PresentationPrivacy , Security and Ethics Presentation
Privacy , Security and Ethics PresentationHajarul Cikyen
 
Introduction to Information Security
Introduction to Information SecurityIntroduction to Information Security
Introduction to Information SecurityDr. Loganathan R
 
Computer Ethics Presentation
Computer Ethics PresentationComputer Ethics Presentation
Computer Ethics Presentationguest65a1c4
 

En vedette (20)

Workshop on personal productivity at hotel keys nestor
Workshop on personal productivity at hotel keys nestorWorkshop on personal productivity at hotel keys nestor
Workshop on personal productivity at hotel keys nestor
 
More With Less
More With LessMore With Less
More With Less
 
Presentations that ROCK!
Presentations that ROCK!Presentations that ROCK!
Presentations that ROCK!
 
Large display templates
Large display templatesLarge display templates
Large display templates
 
Extreme Google
Extreme GoogleExtreme Google
Extreme Google
 
The Customer-Centric Library
The Customer-Centric Library The Customer-Centric Library
The Customer-Centric Library
 
A look at computer security
A look at computer securityA look at computer security
A look at computer security
 
Computer security privacy and ethics
Computer security privacy and ethicsComputer security privacy and ethics
Computer security privacy and ethics
 
Talking Points
Talking PointsTalking Points
Talking Points
 
1556 a 10
1556 a 101556 a 10
1556 a 10
 
Computer , Internet and physical security.
Computer , Internet and physical security.Computer , Internet and physical security.
Computer , Internet and physical security.
 
Ethics and privacy ppt 3rd period
Ethics and privacy ppt 3rd periodEthics and privacy ppt 3rd period
Ethics and privacy ppt 3rd period
 
Chapter 11 computer security and safety, ethics, and privacy
Chapter 11   computer security and safety, ethics, and privacyChapter 11   computer security and safety, ethics, and privacy
Chapter 11 computer security and safety, ethics, and privacy
 
Lesson 8 - Understanding Backup and Recovery Methods
Lesson 8 - Understanding Backup and Recovery MethodsLesson 8 - Understanding Backup and Recovery Methods
Lesson 8 - Understanding Backup and Recovery Methods
 
Computer security threats & prevention
Computer security threats & preventionComputer security threats & prevention
Computer security threats & prevention
 
InformationSecurity
InformationSecurityInformationSecurity
InformationSecurity
 
Computer Security 101
Computer Security 101Computer Security 101
Computer Security 101
 
Privacy , Security and Ethics Presentation
Privacy , Security and Ethics PresentationPrivacy , Security and Ethics Presentation
Privacy , Security and Ethics Presentation
 
Introduction to Information Security
Introduction to Information SecurityIntroduction to Information Security
Introduction to Information Security
 
Computer Ethics Presentation
Computer Ethics PresentationComputer Ethics Presentation
Computer Ethics Presentation
 

Similaire à Snooze, you Lose!

Mac OS X Guide.doc
Mac OS X Guide.docMac OS X Guide.doc
Mac OS X Guide.docbutest
 
05 Network, Files And Folders
05 Network, Files And Folders05 Network, Files And Folders
05 Network, Files And FoldersBuffalo Seminary
 
Windows Xp Presentation Downing
Windows Xp Presentation  DowningWindows Xp Presentation  Downing
Windows Xp Presentation DowningIWCS
 
WORKING WITH FILES AND FOLDERS OR DIRECTORIES.pptx
WORKING WITH FILES AND FOLDERS OR DIRECTORIES.pptxWORKING WITH FILES AND FOLDERS OR DIRECTORIES.pptx
WORKING WITH FILES AND FOLDERS OR DIRECTORIES.pptxGessabelMatugas1
 
ITFT - Window explorer
ITFT - Window explorerITFT - Window explorer
ITFT - Window explorerBlossom Sood
 
File Management (1).pptx
File Management (1).pptxFile Management (1).pptx
File Management (1).pptxSolomonAnab1
 
Learning The Computer[1]
Learning The Computer[1]Learning The Computer[1]
Learning The Computer[1]dmworsley
 
1.0 QuickBooks Fundementals : Day 02 Windows :2.1 windows
1.0 QuickBooks Fundementals : Day 02 Windows :2.1 windows1.0 QuickBooks Fundementals : Day 02 Windows :2.1 windows
1.0 QuickBooks Fundementals : Day 02 Windows :2.1 windowsVeerendra Singh
 
Mail Backup X user guide
Mail Backup X user guideMail Backup X user guide
Mail Backup X user guideInventpure
 
Decatur File Clean Up Guide
Decatur File Clean Up GuideDecatur File Clean Up Guide
Decatur File Clean Up Guidestevenslena
 
Scaredycat computers session 3 file management
Scaredycat computers session 3  file managementScaredycat computers session 3  file management
Scaredycat computers session 3 file managementiteachgeek
 
How to Recover Corrupted Word File
How to Recover Corrupted Word FileHow to Recover Corrupted Word File
How to Recover Corrupted Word FileJohn Park
 
Week 1 lesson 9 Intro to tech class
Week 1 lesson 9 Intro to tech classWeek 1 lesson 9 Intro to tech class
Week 1 lesson 9 Intro to tech classrdubroy
 
Windows operating system
Windows operating systemWindows operating system
Windows operating systemGeorgen Charnes
 

Similaire à Snooze, you Lose! (20)

Mac OS X Guide.doc
Mac OS X Guide.docMac OS X Guide.doc
Mac OS X Guide.doc
 
C) ICT Application
C) ICT ApplicationC) ICT Application
C) ICT Application
 
05 Network, Files And Folders
05 Network, Files And Folders05 Network, Files And Folders
05 Network, Files And Folders
 
Windows Xp Presentation Downing
Windows Xp Presentation  DowningWindows Xp Presentation  Downing
Windows Xp Presentation Downing
 
WORKING WITH FILES AND FOLDERS OR DIRECTORIES.pptx
WORKING WITH FILES AND FOLDERS OR DIRECTORIES.pptxWORKING WITH FILES AND FOLDERS OR DIRECTORIES.pptx
WORKING WITH FILES AND FOLDERS OR DIRECTORIES.pptx
 
ITFT - Window explorer
ITFT - Window explorerITFT - Window explorer
ITFT - Window explorer
 
File Management (1).pptx
File Management (1).pptxFile Management (1).pptx
File Management (1).pptx
 
Managing Client E Mail
Managing Client E MailManaging Client E Mail
Managing Client E Mail
 
File management
File management File management
File management
 
Module 2 b_win 7
Module 2 b_win 7Module 2 b_win 7
Module 2 b_win 7
 
Learning The Computer[1]
Learning The Computer[1]Learning The Computer[1]
Learning The Computer[1]
 
1.0 QuickBooks Fundementals : Day 02 Windows :2.1 windows
1.0 QuickBooks Fundementals : Day 02 Windows :2.1 windows1.0 QuickBooks Fundementals : Day 02 Windows :2.1 windows
1.0 QuickBooks Fundementals : Day 02 Windows :2.1 windows
 
Mail Backup X user guide
Mail Backup X user guideMail Backup X user guide
Mail Backup X user guide
 
Decatur File Clean Up Guide
Decatur File Clean Up GuideDecatur File Clean Up Guide
Decatur File Clean Up Guide
 
Comodo presentation
Comodo presentationComodo presentation
Comodo presentation
 
Scaredycat computers session 3 file management
Scaredycat computers session 3  file managementScaredycat computers session 3  file management
Scaredycat computers session 3 file management
 
How to Recover Corrupted Word File
How to Recover Corrupted Word FileHow to Recover Corrupted Word File
How to Recover Corrupted Word File
 
CHAP 2 - FILE MANAGEMENT
CHAP 2 - FILE MANAGEMENTCHAP 2 - FILE MANAGEMENT
CHAP 2 - FILE MANAGEMENT
 
Week 1 lesson 9 Intro to tech class
Week 1 lesson 9 Intro to tech classWeek 1 lesson 9 Intro to tech class
Week 1 lesson 9 Intro to tech class
 
Windows operating system
Windows operating systemWindows operating system
Windows operating system
 

Dernier

03_Emmanuel Ndiaye_Degroof Petercam.pptx
03_Emmanuel Ndiaye_Degroof Petercam.pptx03_Emmanuel Ndiaye_Degroof Petercam.pptx
03_Emmanuel Ndiaye_Degroof Petercam.pptxFinTech Belgium
 
Stock Market Brief Deck (Under Pressure).pdf
Stock Market Brief Deck (Under Pressure).pdfStock Market Brief Deck (Under Pressure).pdf
Stock Market Brief Deck (Under Pressure).pdfMichael Silva
 
Gurley shaw Theory of Monetary Economics.
Gurley shaw Theory of Monetary Economics.Gurley shaw Theory of Monetary Economics.
Gurley shaw Theory of Monetary Economics.Vinodha Devi
 
The Economic History of the U.S. Lecture 21.pdf
The Economic History of the U.S. Lecture 21.pdfThe Economic History of the U.S. Lecture 21.pdf
The Economic History of the U.S. Lecture 21.pdfGale Pooley
 
The Economic History of the U.S. Lecture 26.pdf
The Economic History of the U.S. Lecture 26.pdfThe Economic History of the U.S. Lecture 26.pdf
The Economic History of the U.S. Lecture 26.pdfGale Pooley
 
Pooja 9892124323 : Call Girl in Juhu Escorts Service Free Home Delivery
Pooja 9892124323 : Call Girl in Juhu Escorts Service Free Home DeliveryPooja 9892124323 : Call Girl in Juhu Escorts Service Free Home Delivery
Pooja 9892124323 : Call Girl in Juhu Escorts Service Free Home DeliveryPooja Nehwal
 
The Economic History of the U.S. Lecture 19.pdf
The Economic History of the U.S. Lecture 19.pdfThe Economic History of the U.S. Lecture 19.pdf
The Economic History of the U.S. Lecture 19.pdfGale Pooley
 
The Economic History of the U.S. Lecture 30.pdf
The Economic History of the U.S. Lecture 30.pdfThe Economic History of the U.S. Lecture 30.pdf
The Economic History of the U.S. Lecture 30.pdfGale Pooley
 
The Economic History of the U.S. Lecture 25.pdf
The Economic History of the U.S. Lecture 25.pdfThe Economic History of the U.S. Lecture 25.pdf
The Economic History of the U.S. Lecture 25.pdfGale Pooley
 
WhatsApp 📞 Call : 9892124323 ✅Call Girls In Chembur ( Mumbai ) secure service
WhatsApp 📞 Call : 9892124323  ✅Call Girls In Chembur ( Mumbai ) secure serviceWhatsApp 📞 Call : 9892124323  ✅Call Girls In Chembur ( Mumbai ) secure service
WhatsApp 📞 Call : 9892124323 ✅Call Girls In Chembur ( Mumbai ) secure servicePooja Nehwal
 
Vip Call US 📞 7738631006 ✅Call Girls In Sakinaka ( Mumbai )
Vip Call US 📞 7738631006 ✅Call Girls In Sakinaka ( Mumbai )Vip Call US 📞 7738631006 ✅Call Girls In Sakinaka ( Mumbai )
Vip Call US 📞 7738631006 ✅Call Girls In Sakinaka ( Mumbai )Pooja Nehwal
 
Top Rated Pune Call Girls Viman Nagar ⟟ 6297143586 ⟟ Call Me For Genuine Sex...
Top Rated  Pune Call Girls Viman Nagar ⟟ 6297143586 ⟟ Call Me For Genuine Sex...Top Rated  Pune Call Girls Viman Nagar ⟟ 6297143586 ⟟ Call Me For Genuine Sex...
Top Rated Pune Call Girls Viman Nagar ⟟ 6297143586 ⟟ Call Me For Genuine Sex...Call Girls in Nagpur High Profile
 
The Economic History of the U.S. Lecture 18.pdf
The Economic History of the U.S. Lecture 18.pdfThe Economic History of the U.S. Lecture 18.pdf
The Economic History of the U.S. Lecture 18.pdfGale Pooley
 
The Economic History of the U.S. Lecture 17.pdf
The Economic History of the U.S. Lecture 17.pdfThe Economic History of the U.S. Lecture 17.pdf
The Economic History of the U.S. Lecture 17.pdfGale Pooley
 
High Class Call Girls Nashik Maya 7001305949 Independent Escort Service Nashik
High Class Call Girls Nashik Maya 7001305949 Independent Escort Service NashikHigh Class Call Girls Nashik Maya 7001305949 Independent Escort Service Nashik
High Class Call Girls Nashik Maya 7001305949 Independent Escort Service NashikCall Girls in Nagpur High Profile
 
Call Girls Service Nagpur Maya Call 7001035870 Meet With Nagpur Escorts
Call Girls Service Nagpur Maya Call 7001035870 Meet With Nagpur EscortsCall Girls Service Nagpur Maya Call 7001035870 Meet With Nagpur Escorts
Call Girls Service Nagpur Maya Call 7001035870 Meet With Nagpur Escortsranjana rawat
 
Booking open Available Pune Call Girls Shivane 6297143586 Call Hot Indian Gi...
Booking open Available Pune Call Girls Shivane  6297143586 Call Hot Indian Gi...Booking open Available Pune Call Girls Shivane  6297143586 Call Hot Indian Gi...
Booking open Available Pune Call Girls Shivane 6297143586 Call Hot Indian Gi...Call Girls in Nagpur High Profile
 
Basic concepts related to Financial modelling
Basic concepts related to Financial modellingBasic concepts related to Financial modelling
Basic concepts related to Financial modellingbaijup5
 

Dernier (20)

03_Emmanuel Ndiaye_Degroof Petercam.pptx
03_Emmanuel Ndiaye_Degroof Petercam.pptx03_Emmanuel Ndiaye_Degroof Petercam.pptx
03_Emmanuel Ndiaye_Degroof Petercam.pptx
 
Stock Market Brief Deck (Under Pressure).pdf
Stock Market Brief Deck (Under Pressure).pdfStock Market Brief Deck (Under Pressure).pdf
Stock Market Brief Deck (Under Pressure).pdf
 
VIP Independent Call Girls in Andheri 🌹 9920725232 ( Call Me ) Mumbai Escorts...
VIP Independent Call Girls in Andheri 🌹 9920725232 ( Call Me ) Mumbai Escorts...VIP Independent Call Girls in Andheri 🌹 9920725232 ( Call Me ) Mumbai Escorts...
VIP Independent Call Girls in Andheri 🌹 9920725232 ( Call Me ) Mumbai Escorts...
 
Gurley shaw Theory of Monetary Economics.
Gurley shaw Theory of Monetary Economics.Gurley shaw Theory of Monetary Economics.
Gurley shaw Theory of Monetary Economics.
 
The Economic History of the U.S. Lecture 21.pdf
The Economic History of the U.S. Lecture 21.pdfThe Economic History of the U.S. Lecture 21.pdf
The Economic History of the U.S. Lecture 21.pdf
 
(Vedika) Low Rate Call Girls in Pune Call Now 8250077686 Pune Escorts 24x7
(Vedika) Low Rate Call Girls in Pune Call Now 8250077686 Pune Escorts 24x7(Vedika) Low Rate Call Girls in Pune Call Now 8250077686 Pune Escorts 24x7
(Vedika) Low Rate Call Girls in Pune Call Now 8250077686 Pune Escorts 24x7
 
The Economic History of the U.S. Lecture 26.pdf
The Economic History of the U.S. Lecture 26.pdfThe Economic History of the U.S. Lecture 26.pdf
The Economic History of the U.S. Lecture 26.pdf
 
Pooja 9892124323 : Call Girl in Juhu Escorts Service Free Home Delivery
Pooja 9892124323 : Call Girl in Juhu Escorts Service Free Home DeliveryPooja 9892124323 : Call Girl in Juhu Escorts Service Free Home Delivery
Pooja 9892124323 : Call Girl in Juhu Escorts Service Free Home Delivery
 
The Economic History of the U.S. Lecture 19.pdf
The Economic History of the U.S. Lecture 19.pdfThe Economic History of the U.S. Lecture 19.pdf
The Economic History of the U.S. Lecture 19.pdf
 
The Economic History of the U.S. Lecture 30.pdf
The Economic History of the U.S. Lecture 30.pdfThe Economic History of the U.S. Lecture 30.pdf
The Economic History of the U.S. Lecture 30.pdf
 
The Economic History of the U.S. Lecture 25.pdf
The Economic History of the U.S. Lecture 25.pdfThe Economic History of the U.S. Lecture 25.pdf
The Economic History of the U.S. Lecture 25.pdf
 
WhatsApp 📞 Call : 9892124323 ✅Call Girls In Chembur ( Mumbai ) secure service
WhatsApp 📞 Call : 9892124323  ✅Call Girls In Chembur ( Mumbai ) secure serviceWhatsApp 📞 Call : 9892124323  ✅Call Girls In Chembur ( Mumbai ) secure service
WhatsApp 📞 Call : 9892124323 ✅Call Girls In Chembur ( Mumbai ) secure service
 
Vip Call US 📞 7738631006 ✅Call Girls In Sakinaka ( Mumbai )
Vip Call US 📞 7738631006 ✅Call Girls In Sakinaka ( Mumbai )Vip Call US 📞 7738631006 ✅Call Girls In Sakinaka ( Mumbai )
Vip Call US 📞 7738631006 ✅Call Girls In Sakinaka ( Mumbai )
 
Top Rated Pune Call Girls Viman Nagar ⟟ 6297143586 ⟟ Call Me For Genuine Sex...
Top Rated  Pune Call Girls Viman Nagar ⟟ 6297143586 ⟟ Call Me For Genuine Sex...Top Rated  Pune Call Girls Viman Nagar ⟟ 6297143586 ⟟ Call Me For Genuine Sex...
Top Rated Pune Call Girls Viman Nagar ⟟ 6297143586 ⟟ Call Me For Genuine Sex...
 
The Economic History of the U.S. Lecture 18.pdf
The Economic History of the U.S. Lecture 18.pdfThe Economic History of the U.S. Lecture 18.pdf
The Economic History of the U.S. Lecture 18.pdf
 
The Economic History of the U.S. Lecture 17.pdf
The Economic History of the U.S. Lecture 17.pdfThe Economic History of the U.S. Lecture 17.pdf
The Economic History of the U.S. Lecture 17.pdf
 
High Class Call Girls Nashik Maya 7001305949 Independent Escort Service Nashik
High Class Call Girls Nashik Maya 7001305949 Independent Escort Service NashikHigh Class Call Girls Nashik Maya 7001305949 Independent Escort Service Nashik
High Class Call Girls Nashik Maya 7001305949 Independent Escort Service Nashik
 
Call Girls Service Nagpur Maya Call 7001035870 Meet With Nagpur Escorts
Call Girls Service Nagpur Maya Call 7001035870 Meet With Nagpur EscortsCall Girls Service Nagpur Maya Call 7001035870 Meet With Nagpur Escorts
Call Girls Service Nagpur Maya Call 7001035870 Meet With Nagpur Escorts
 
Booking open Available Pune Call Girls Shivane 6297143586 Call Hot Indian Gi...
Booking open Available Pune Call Girls Shivane  6297143586 Call Hot Indian Gi...Booking open Available Pune Call Girls Shivane  6297143586 Call Hot Indian Gi...
Booking open Available Pune Call Girls Shivane 6297143586 Call Hot Indian Gi...
 
Basic concepts related to Financial modelling
Basic concepts related to Financial modellingBasic concepts related to Financial modelling
Basic concepts related to Financial modelling
 

Snooze, you Lose!

  • 1. How to Back-Up Critical Data on Windows computers (Snooze, You Lose) Presented by: Marianne Lenox Staff Training and Development Coordinator Contact info: mlenox@hpl.lib.al.us November 2006 – Updated July 2008
  • 2.
  • 3.
  • 4.
  • 5.
  • 6.
  • 7.
  • 8.
  • 9.
  • 10.
  • 11.
  • 12.
  • 13. Outlook Express Click on the “Maintenance” tab Click on the “Store Folder” button
  • 14. Outlook Express Use the default location, noting the address. You can actually copy and paste from this dialogue box!
  • 15.
  • 16.