SlideShare a Scribd company logo
1 of 23
Download to read offline
Operating Systems, Computing
Network & Presentation of
Information
WINDOWS TOOLS
System Information
System Information
shows details about your
computer's hardware
configuration, computer
components, and software,
including drivers.
Open SystemInformationby clicking Start button » All Programs » Accessories
» SystemTools » SystemInformation
 Security Center
Windows Security Center can
help enhance your computer's
security by checking the status of
several security essentials on your
computer.
If Windows detectsa problemwith any
of these security essential, it displays a
notification and you get information
about how to fix the problem.
If Windows detects a problem with any of these security essentials (for example, if your antivirus program is out of date), Security Center displays a notification and places a Security
Open System Informationby clicking Start button » All Programs » Accessories»
SystemTools »
System Restore
System Restore uses restore points to
return your system files and settings to
an earlier point in time, without
affecting personal files.
Open SystemRestore by clicking the Start button » clicking All Programs »
Accessories » SystemTools » SystemRestore
Sometimes, the installation of a program can
cause an unexpectedchange to your
computerso, you can try restoring your
computer's system to fix the problem
Character Map
Start » Programs » Accessories » SystemTools »
Character Map.
Charmap is used to input or
check out characters of
different encodings and
fonts installed on your
system.
You use the CharacterMap to insert
meaningful charactersto the folder
(or file) names.
Disk Defragmenter
Disk Defragmenter
consolidates fragmented
files and folders on your
computer's hard disk.
As a result, your system
can gain access to your
files and folders and save
new ones more efficiently
Start » Programs » Accessories » SystemTools » Disk Defragmenter
Defragmenting can significantly
increase the speed of file loading.
COMPUTER NETWORK:
Components of network
hardware
All networks are made up of basic hardware building blocks to
interconnect network nodes, such as Network Interface Cards
(NICs), Repeaters, Hubs, cables and Routers.
Network Card
A network card, network adapter
or NIC,
is a piece of computer hardware
designed to allow computers to
communicate over a computer
network.
It allows users to connect to
each other by using cables or
wireless.
Cables & connectors
 Twisted pair using
a RJ45 connector
 Coaxial cable
 Optical cables
Repeaters and Hubs
A repeater is an electronic device
that receives a network signal,
cleans it of unnecessary noise, and
regenerates it. The signal
is retransmitted at a higher power
level, so that the signal can cover
longer distances without
degradation
A repeater with multiple ports is
known as a hub. .
Image of a hub
Router
A hardware device
designed to take
incoming packets,
analyzing the packets and
then directing them to the
appropriate locations
SCHEME OF THE EQUIPMENT AND DEVICES
CONNECTIONS
Network software
settings and protocols
 Name and workgroup
Clicking on “my
PC” with the
second button of
the mouse,
access to
properties.
If we click in computer
name tab, we can find the
details about the
computer´s description,
name and workgroup
Clicking in workgroup and change, we can find
this box
SO, in the box highlighted you can
put a new name
 IP address and other information
Step by step:
1. Click on controlpanel
2. Select network connections
3. Select “Local area connection”and click on
properties
4. A new Windows appear. Select Internet
Protocol(TCP/IP). Click on Properties.
5. You can now key in the IP address,
Subnet mask, Default gateway and DNS
servers.
The boxes would appear in blank, so take the
Numbers following the same steps in the Spanish
version of windows. Copy all the numbers except
the last box of IP adrees
MSDOS COMMANDS
 Ping
It is a utility used to verify if a network data packet is capable of being distributed
to an address without errors.
Allows you to ping anothercomputerwhere the x's are locatedare where
you would place the IP address of the computeryou are attemptingto ping
If this is not able to complete, this should relay back an
unsuccessful message.
If we write “ping” and a wrong IP adress, this box would appear with
a "timed out" error instead of a reply. It means there is a breakdown
somewhere between your computerand the domain
 Ipconfig
This command can be utilized to verify a network connectionas well as to verify
your network settings.
You can get all local network information for your computerwriting
“ipconfig” in the Command Prompt
When I start my computer up I always find a blue
star and a message from Microsoft "Windows
Genuine Advantage" to buy the WindowsOriginal as
long as mine, like many users’, is not, or at least I do
not remember having bought. Let me know how I
can delete the notice and how I can prevent myself
from getting it again.
SECURITY PROBLEMS
Problem 1:
Answer:
Windows GenuineAdvantage notifications occur when your computerhasn't passed
the validation test.
The validation test can be failed because you installed a pirated non-genuinecopy of
XP, or because you have changed your XP productkey to a software-generated key,
or sometimes it just happensfor no reason at all.
If you are being constantlynagged by Microsoft to validate your Windows license,
you have the option of purchasing a genuine copy of Windows XP or resolving the
problemlater. However, there is actuallya way of disabling the message by editing
your registry.
So, if you want to remove thoseannoying notifications, you can follow one of these
5 methods that you can find in this website:
http://www.wikihow.com/Remove-Windows-Genuine-Advantage-Notifications
 PROBLEM 2:
The antivirus detects an infection (Internet
worm) win32/boberog.AQ in working
memory. It seems my antivirus detects it
but cannot solve the problem.
Answer
Win32.Boberog.AQ is one of the Windows illegal malicious programs which may
occupy system resources and slow down computers.
You can find more information about this kind of worn in this website:
http://www.virusradar.com/Win32_Boberog.AQ/description
This worm can open your email address book and despatch one cloneeach to each
of the addresses listed…Here you have more information about how worns spread:
http://www.emsisoft.com/en/kb/articles/tec050629/
Well, now to remove it, you can do it manually or instantlyfollowing the steps given
in this website:
http://www.spydig.com/spyware-info/Win32-Boberog-AQ.html
But if you feel incapable to do that… I´ll recommend you to visit an expert in
computersso this problema won´t appearin the future any more.

More Related Content

What's hot

Lo1.3 diagnosing computer systems
Lo1.3 diagnosing computer systemsLo1.3 diagnosing computer systems
Lo1.3 diagnosing computer systemsFrya Lora
 
Basic Network And Hardware Troubleshooting
Basic Network And Hardware TroubleshootingBasic Network And Hardware Troubleshooting
Basic Network And Hardware Troubleshootingsl0wupl0ads
 
Computer maintenance
Computer maintenanceComputer maintenance
Computer maintenanceDanladi Gambo
 
COMPUTER Trouble shooting
COMPUTER Trouble shootingCOMPUTER Trouble shooting
COMPUTER Trouble shootingargusacademy
 
Computer maintenance lesson 4
Computer maintenance lesson 4Computer maintenance lesson 4
Computer maintenance lesson 4capjjj
 
Pc maintenance security backup and troubleshooting
Pc maintenance security backup and troubleshootingPc maintenance security backup and troubleshooting
Pc maintenance security backup and troubleshootingTech Day Camp
 
PC Maintenance Security and Troubleshooting
PC Maintenance Security and TroubleshootingPC Maintenance Security and Troubleshooting
PC Maintenance Security and TroubleshootingThe Toolbox, Inc.
 
Basic computer maintenance
Basic computer maintenanceBasic computer maintenance
Basic computer maintenancegeepatty
 
Basic Computer Operation and Troubleshooting
Basic Computer Operation and TroubleshootingBasic Computer Operation and Troubleshooting
Basic Computer Operation and TroubleshootingPraveen Sudarsan
 
General PC Maintenance and Troubleshooting
General PC Maintenance and TroubleshootingGeneral PC Maintenance and Troubleshooting
General PC Maintenance and TroubleshootingRaj Alam
 
Siri hardware troubleshooting
Siri hardware troubleshootingSiri hardware troubleshooting
Siri hardware troubleshootingsirikeshava
 
Siri linux installation
Siri linux installationSiri linux installation
Siri linux installationsirikeshava
 
Basic Network Concepts
Basic Network ConceptsBasic Network Concepts
Basic Network ConceptsAbhishek Singh
 
Pc Preventative Maintenance Checklist
Pc Preventative Maintenance ChecklistPc Preventative Maintenance Checklist
Pc Preventative Maintenance ChecklistMiss Cheska
 

What's hot (18)

Lo1.3 diagnosing computer systems
Lo1.3 diagnosing computer systemsLo1.3 diagnosing computer systems
Lo1.3 diagnosing computer systems
 
Computer maintenance-and-repair
Computer maintenance-and-repairComputer maintenance-and-repair
Computer maintenance-and-repair
 
Basic Network And Hardware Troubleshooting
Basic Network And Hardware TroubleshootingBasic Network And Hardware Troubleshooting
Basic Network And Hardware Troubleshooting
 
Computer maintenance
Computer maintenanceComputer maintenance
Computer maintenance
 
COMPUTER Trouble shooting
COMPUTER Trouble shootingCOMPUTER Trouble shooting
COMPUTER Trouble shooting
 
Computer maintenance lesson 4
Computer maintenance lesson 4Computer maintenance lesson 4
Computer maintenance lesson 4
 
Installation guide_Rajeev
Installation guide_RajeevInstallation guide_Rajeev
Installation guide_Rajeev
 
Pc maintenance security backup and troubleshooting
Pc maintenance security backup and troubleshootingPc maintenance security backup and troubleshooting
Pc maintenance security backup and troubleshooting
 
Troubleshooting
TroubleshootingTroubleshooting
Troubleshooting
 
PC Maintenance Security and Troubleshooting
PC Maintenance Security and TroubleshootingPC Maintenance Security and Troubleshooting
PC Maintenance Security and Troubleshooting
 
UNTI 2 P7
UNTI 2 P7UNTI 2 P7
UNTI 2 P7
 
Basic computer maintenance
Basic computer maintenanceBasic computer maintenance
Basic computer maintenance
 
Basic Computer Operation and Troubleshooting
Basic Computer Operation and TroubleshootingBasic Computer Operation and Troubleshooting
Basic Computer Operation and Troubleshooting
 
General PC Maintenance and Troubleshooting
General PC Maintenance and TroubleshootingGeneral PC Maintenance and Troubleshooting
General PC Maintenance and Troubleshooting
 
Siri hardware troubleshooting
Siri hardware troubleshootingSiri hardware troubleshooting
Siri hardware troubleshooting
 
Siri linux installation
Siri linux installationSiri linux installation
Siri linux installation
 
Basic Network Concepts
Basic Network ConceptsBasic Network Concepts
Basic Network Concepts
 
Pc Preventative Maintenance Checklist
Pc Preventative Maintenance ChecklistPc Preventative Maintenance Checklist
Pc Preventative Maintenance Checklist
 

Viewers also liked

English 303 Project
English 303 ProjectEnglish 303 Project
English 303 Projectxincijiang
 
MVP = Más Valaki Problémája? @ App!mobile 2013 konferencia
MVP = Más Valaki Problémája? @ App!mobile 2013 konferenciaMVP = Más Valaki Problémája? @ App!mobile 2013 konferencia
MVP = Más Valaki Problémája? @ App!mobile 2013 konferenciaGergely Tilly
 
Expectations and realities of Information Technology
Expectations and realities of Information TechnologyExpectations and realities of Information Technology
Expectations and realities of Information TechnologyVirginia Garcya
 
Ügyfélkiszolgálás mobil platformokon - Empowerment, Social & Lean UX @ Smart ...
Ügyfélkiszolgálás mobil platformokon - Empowerment, Social & Lean UX @ Smart ...Ügyfélkiszolgálás mobil platformokon - Empowerment, Social & Lean UX @ Smart ...
Ügyfélkiszolgálás mobil platformokon - Empowerment, Social & Lean UX @ Smart ...Gergely Tilly
 
Java memory presentation IBM 7
Java memory presentation IBM 7Java memory presentation IBM 7
Java memory presentation IBM 7Yury Bubnov
 
Five facts jiang x.
Five facts jiang x.Five facts jiang x.
Five facts jiang x.xincijiang
 
3.trasnformation of the social environment
3.trasnformation of the social environment3.trasnformation of the social environment
3.trasnformation of the social environmentVirginia Garcya
 
Responsive design szemlélet @ App!2012 konferencia
Responsive design szemlélet @ App!2012 konferenciaResponsive design szemlélet @ App!2012 konferencia
Responsive design szemlélet @ App!2012 konferenciaGergely Tilly
 
English 303 Final Slidecast
English 303 Final SlidecastEnglish 303 Final Slidecast
English 303 Final Slidecastxincijiang
 
The qfd process sutton f03
The qfd process sutton f03The qfd process sutton f03
The qfd process sutton f03Surya Ratheesh
 
Java memory presentation
Java memory presentationJava memory presentation
Java memory presentationYury Bubnov
 

Viewers also liked (17)

Coffee facts
Coffee factsCoffee facts
Coffee facts
 
Virginiatools
VirginiatoolsVirginiatools
Virginiatools
 
Rhesus
RhesusRhesus
Rhesus
 
English 303 Project
English 303 ProjectEnglish 303 Project
English 303 Project
 
MVP = Más Valaki Problémája? @ App!mobile 2013 konferencia
MVP = Más Valaki Problémája? @ App!mobile 2013 konferenciaMVP = Más Valaki Problémája? @ App!mobile 2013 konferencia
MVP = Más Valaki Problémája? @ App!mobile 2013 konferencia
 
Expectations and realities of Information Technology
Expectations and realities of Information TechnologyExpectations and realities of Information Technology
Expectations and realities of Information Technology
 
Ügyfélkiszolgálás mobil platformokon - Empowerment, Social & Lean UX @ Smart ...
Ügyfélkiszolgálás mobil platformokon - Empowerment, Social & Lean UX @ Smart ...Ügyfélkiszolgálás mobil platformokon - Empowerment, Social & Lean UX @ Smart ...
Ügyfélkiszolgálás mobil platformokon - Empowerment, Social & Lean UX @ Smart ...
 
Java memory presentation IBM 7
Java memory presentation IBM 7Java memory presentation IBM 7
Java memory presentation IBM 7
 
Five facts jiang x.
Five facts jiang x.Five facts jiang x.
Five facts jiang x.
 
Virginiatools
VirginiatoolsVirginiatools
Virginiatools
 
3.trasnformation of the social environment
3.trasnformation of the social environment3.trasnformation of the social environment
3.trasnformation of the social environment
 
Responsive design szemlélet @ App!2012 konferencia
Responsive design szemlélet @ App!2012 konferenciaResponsive design szemlélet @ App!2012 konferencia
Responsive design szemlélet @ App!2012 konferencia
 
Futurists
FuturistsFuturists
Futurists
 
English 303 Final Slidecast
English 303 Final SlidecastEnglish 303 Final Slidecast
English 303 Final Slidecast
 
Immunodefisiency
ImmunodefisiencyImmunodefisiency
Immunodefisiency
 
The qfd process sutton f03
The qfd process sutton f03The qfd process sutton f03
The qfd process sutton f03
 
Java memory presentation
Java memory presentationJava memory presentation
Java memory presentation
 

Similar to Virginiatools

Os and network activity javier guerrero
Os and network activity   javier guerreroOs and network activity   javier guerrero
Os and network activity javier guerreroJGuerreroM96
 
Operating systems and networks
Operating systems and networksOperating systems and networks
Operating systems and networkscarmenpuigdueta
 
Network Troubleshooting
Network TroubleshootingNetwork Troubleshooting
Network TroubleshootingJoy Sarker
 
Vo ip guide
Vo ip guideVo ip guide
Vo ip guideACP
 
10 reasons why p cs crash
10 reasons why p cs crash 10 reasons why p cs crash
10 reasons why p cs crash Srikanth
 
Unit III - Basics of Computer Science
Unit III - Basics of Computer ScienceUnit III - Basics of Computer Science
Unit III - Basics of Computer ScienceHepsijeba
 
Power Point Lesson 03
Power Point  Lesson 03Power Point  Lesson 03
Power Point Lesson 03Nasir Jumani
 
Penetrating Windows 8 with syringe utility
Penetrating Windows 8 with syringe utilityPenetrating Windows 8 with syringe utility
Penetrating Windows 8 with syringe utilityIOSR Journals
 
Network Administrator Career
Network Administrator CareerNetwork Administrator Career
Network Administrator CareerBill Kuhl
 
Operating systems and computing networks
Operating systems and computing networksOperating systems and computing networks
Operating systems and computing networksRociocmf
 
Computer basics--computer basics2
Computer basics--computer basics2Computer basics--computer basics2
Computer basics--computer basics2Zo Sangpy
 

Similar to Virginiatools (20)

Presentation1
Presentation1Presentation1
Presentation1
 
Os and network activity javier guerrero
Os and network activity   javier guerreroOs and network activity   javier guerrero
Os and network activity javier guerrero
 
Operating systems and networks
Operating systems and networksOperating systems and networks
Operating systems and networks
 
Network Troubleshooting
Network TroubleshootingNetwork Troubleshooting
Network Troubleshooting
 
Troubleshooting
TroubleshootingTroubleshooting
Troubleshooting
 
Presentation operation system
Presentation operation systemPresentation operation system
Presentation operation system
 
Vo ip guide
Vo ip guideVo ip guide
Vo ip guide
 
5 stepmainttut
5 stepmainttut5 stepmainttut
5 stepmainttut
 
10 reasons why p cs crash
10 reasons why p cs crash 10 reasons why p cs crash
10 reasons why p cs crash
 
Unit III - Basics of Computer Science
Unit III - Basics of Computer ScienceUnit III - Basics of Computer Science
Unit III - Basics of Computer Science
 
Power Point Lesson 03
Power Point  Lesson 03Power Point  Lesson 03
Power Point Lesson 03
 
Chapter 12.0
Chapter 12.0Chapter 12.0
Chapter 12.0
 
Penetrating Windows 8 with syringe utility
Penetrating Windows 8 with syringe utilityPenetrating Windows 8 with syringe utility
Penetrating Windows 8 with syringe utility
 
Network Administrator Career
Network Administrator CareerNetwork Administrator Career
Network Administrator Career
 
Operating systems and computing networks
Operating systems and computing networksOperating systems and computing networks
Operating systems and computing networks
 
Software
SoftwareSoftware
Software
 
Systems Administration
Systems AdministrationSystems Administration
Systems Administration
 
Main notes (1)
Main notes (1)Main notes (1)
Main notes (1)
 
Computer basics
Computer basicsComputer basics
Computer basics
 
Computer basics--computer basics2
Computer basics--computer basics2Computer basics--computer basics2
Computer basics--computer basics2
 

Recently uploaded

Moving Beyond Passwords: FIDO Paris Seminar.pdf
Moving Beyond Passwords: FIDO Paris Seminar.pdfMoving Beyond Passwords: FIDO Paris Seminar.pdf
Moving Beyond Passwords: FIDO Paris Seminar.pdfLoriGlavin3
 
Gen AI in Business - Global Trends Report 2024.pdf
Gen AI in Business - Global Trends Report 2024.pdfGen AI in Business - Global Trends Report 2024.pdf
Gen AI in Business - Global Trends Report 2024.pdfAddepto
 
"ML in Production",Oleksandr Bagan
"ML in Production",Oleksandr Bagan"ML in Production",Oleksandr Bagan
"ML in Production",Oleksandr BaganFwdays
 
DevEX - reference for building teams, processes, and platforms
DevEX - reference for building teams, processes, and platformsDevEX - reference for building teams, processes, and platforms
DevEX - reference for building teams, processes, and platformsSergiu Bodiu
 
New from BookNet Canada for 2024: Loan Stars - Tech Forum 2024
New from BookNet Canada for 2024: Loan Stars - Tech Forum 2024New from BookNet Canada for 2024: Loan Stars - Tech Forum 2024
New from BookNet Canada for 2024: Loan Stars - Tech Forum 2024BookNet Canada
 
TrustArc Webinar - How to Build Consumer Trust Through Data Privacy
TrustArc Webinar - How to Build Consumer Trust Through Data PrivacyTrustArc Webinar - How to Build Consumer Trust Through Data Privacy
TrustArc Webinar - How to Build Consumer Trust Through Data PrivacyTrustArc
 
Merck Moving Beyond Passwords: FIDO Paris Seminar.pptx
Merck Moving Beyond Passwords: FIDO Paris Seminar.pptxMerck Moving Beyond Passwords: FIDO Paris Seminar.pptx
Merck Moving Beyond Passwords: FIDO Paris Seminar.pptxLoriGlavin3
 
Commit 2024 - Secret Management made easy
Commit 2024 - Secret Management made easyCommit 2024 - Secret Management made easy
Commit 2024 - Secret Management made easyAlfredo García Lavilla
 
WordPress Websites for Engineers: Elevate Your Brand
WordPress Websites for Engineers: Elevate Your BrandWordPress Websites for Engineers: Elevate Your Brand
WordPress Websites for Engineers: Elevate Your Brandgvaughan
 
"Subclassing and Composition – A Pythonic Tour of Trade-Offs", Hynek Schlawack
"Subclassing and Composition – A Pythonic Tour of Trade-Offs", Hynek Schlawack"Subclassing and Composition – A Pythonic Tour of Trade-Offs", Hynek Schlawack
"Subclassing and Composition – A Pythonic Tour of Trade-Offs", Hynek SchlawackFwdays
 
What is DBT - The Ultimate Data Build Tool.pdf
What is DBT - The Ultimate Data Build Tool.pdfWhat is DBT - The Ultimate Data Build Tool.pdf
What is DBT - The Ultimate Data Build Tool.pdfMounikaPolabathina
 
SAP Build Work Zone - Overview L2-L3.pptx
SAP Build Work Zone - Overview L2-L3.pptxSAP Build Work Zone - Overview L2-L3.pptx
SAP Build Work Zone - Overview L2-L3.pptxNavinnSomaal
 
Connect Wave/ connectwave Pitch Deck Presentation
Connect Wave/ connectwave Pitch Deck PresentationConnect Wave/ connectwave Pitch Deck Presentation
Connect Wave/ connectwave Pitch Deck PresentationSlibray Presentation
 
DSPy a system for AI to Write Prompts and Do Fine Tuning
DSPy a system for AI to Write Prompts and Do Fine TuningDSPy a system for AI to Write Prompts and Do Fine Tuning
DSPy a system for AI to Write Prompts and Do Fine TuningLars Bell
 
Dev Dives: Streamline document processing with UiPath Studio Web
Dev Dives: Streamline document processing with UiPath Studio WebDev Dives: Streamline document processing with UiPath Studio Web
Dev Dives: Streamline document processing with UiPath Studio WebUiPathCommunity
 
Take control of your SAP testing with UiPath Test Suite
Take control of your SAP testing with UiPath Test SuiteTake control of your SAP testing with UiPath Test Suite
Take control of your SAP testing with UiPath Test SuiteDianaGray10
 
Ensuring Technical Readiness For Copilot in Microsoft 365
Ensuring Technical Readiness For Copilot in Microsoft 365Ensuring Technical Readiness For Copilot in Microsoft 365
Ensuring Technical Readiness For Copilot in Microsoft 3652toLead Limited
 
The State of Passkeys with FIDO Alliance.pptx
The State of Passkeys with FIDO Alliance.pptxThe State of Passkeys with FIDO Alliance.pptx
The State of Passkeys with FIDO Alliance.pptxLoriGlavin3
 
DevoxxFR 2024 Reproducible Builds with Apache Maven
DevoxxFR 2024 Reproducible Builds with Apache MavenDevoxxFR 2024 Reproducible Builds with Apache Maven
DevoxxFR 2024 Reproducible Builds with Apache MavenHervé Boutemy
 

Recently uploaded (20)

Moving Beyond Passwords: FIDO Paris Seminar.pdf
Moving Beyond Passwords: FIDO Paris Seminar.pdfMoving Beyond Passwords: FIDO Paris Seminar.pdf
Moving Beyond Passwords: FIDO Paris Seminar.pdf
 
Gen AI in Business - Global Trends Report 2024.pdf
Gen AI in Business - Global Trends Report 2024.pdfGen AI in Business - Global Trends Report 2024.pdf
Gen AI in Business - Global Trends Report 2024.pdf
 
"ML in Production",Oleksandr Bagan
"ML in Production",Oleksandr Bagan"ML in Production",Oleksandr Bagan
"ML in Production",Oleksandr Bagan
 
DevEX - reference for building teams, processes, and platforms
DevEX - reference for building teams, processes, and platformsDevEX - reference for building teams, processes, and platforms
DevEX - reference for building teams, processes, and platforms
 
New from BookNet Canada for 2024: Loan Stars - Tech Forum 2024
New from BookNet Canada for 2024: Loan Stars - Tech Forum 2024New from BookNet Canada for 2024: Loan Stars - Tech Forum 2024
New from BookNet Canada for 2024: Loan Stars - Tech Forum 2024
 
TrustArc Webinar - How to Build Consumer Trust Through Data Privacy
TrustArc Webinar - How to Build Consumer Trust Through Data PrivacyTrustArc Webinar - How to Build Consumer Trust Through Data Privacy
TrustArc Webinar - How to Build Consumer Trust Through Data Privacy
 
Merck Moving Beyond Passwords: FIDO Paris Seminar.pptx
Merck Moving Beyond Passwords: FIDO Paris Seminar.pptxMerck Moving Beyond Passwords: FIDO Paris Seminar.pptx
Merck Moving Beyond Passwords: FIDO Paris Seminar.pptx
 
Commit 2024 - Secret Management made easy
Commit 2024 - Secret Management made easyCommit 2024 - Secret Management made easy
Commit 2024 - Secret Management made easy
 
DMCC Future of Trade Web3 - Special Edition
DMCC Future of Trade Web3 - Special EditionDMCC Future of Trade Web3 - Special Edition
DMCC Future of Trade Web3 - Special Edition
 
WordPress Websites for Engineers: Elevate Your Brand
WordPress Websites for Engineers: Elevate Your BrandWordPress Websites for Engineers: Elevate Your Brand
WordPress Websites for Engineers: Elevate Your Brand
 
"Subclassing and Composition – A Pythonic Tour of Trade-Offs", Hynek Schlawack
"Subclassing and Composition – A Pythonic Tour of Trade-Offs", Hynek Schlawack"Subclassing and Composition – A Pythonic Tour of Trade-Offs", Hynek Schlawack
"Subclassing and Composition – A Pythonic Tour of Trade-Offs", Hynek Schlawack
 
What is DBT - The Ultimate Data Build Tool.pdf
What is DBT - The Ultimate Data Build Tool.pdfWhat is DBT - The Ultimate Data Build Tool.pdf
What is DBT - The Ultimate Data Build Tool.pdf
 
SAP Build Work Zone - Overview L2-L3.pptx
SAP Build Work Zone - Overview L2-L3.pptxSAP Build Work Zone - Overview L2-L3.pptx
SAP Build Work Zone - Overview L2-L3.pptx
 
Connect Wave/ connectwave Pitch Deck Presentation
Connect Wave/ connectwave Pitch Deck PresentationConnect Wave/ connectwave Pitch Deck Presentation
Connect Wave/ connectwave Pitch Deck Presentation
 
DSPy a system for AI to Write Prompts and Do Fine Tuning
DSPy a system for AI to Write Prompts and Do Fine TuningDSPy a system for AI to Write Prompts and Do Fine Tuning
DSPy a system for AI to Write Prompts and Do Fine Tuning
 
Dev Dives: Streamline document processing with UiPath Studio Web
Dev Dives: Streamline document processing with UiPath Studio WebDev Dives: Streamline document processing with UiPath Studio Web
Dev Dives: Streamline document processing with UiPath Studio Web
 
Take control of your SAP testing with UiPath Test Suite
Take control of your SAP testing with UiPath Test SuiteTake control of your SAP testing with UiPath Test Suite
Take control of your SAP testing with UiPath Test Suite
 
Ensuring Technical Readiness For Copilot in Microsoft 365
Ensuring Technical Readiness For Copilot in Microsoft 365Ensuring Technical Readiness For Copilot in Microsoft 365
Ensuring Technical Readiness For Copilot in Microsoft 365
 
The State of Passkeys with FIDO Alliance.pptx
The State of Passkeys with FIDO Alliance.pptxThe State of Passkeys with FIDO Alliance.pptx
The State of Passkeys with FIDO Alliance.pptx
 
DevoxxFR 2024 Reproducible Builds with Apache Maven
DevoxxFR 2024 Reproducible Builds with Apache MavenDevoxxFR 2024 Reproducible Builds with Apache Maven
DevoxxFR 2024 Reproducible Builds with Apache Maven
 

Virginiatools

  • 1. Operating Systems, Computing Network & Presentation of Information
  • 3. System Information System Information shows details about your computer's hardware configuration, computer components, and software, including drivers. Open SystemInformationby clicking Start button » All Programs » Accessories » SystemTools » SystemInformation
  • 4.  Security Center Windows Security Center can help enhance your computer's security by checking the status of several security essentials on your computer. If Windows detectsa problemwith any of these security essential, it displays a notification and you get information about how to fix the problem. If Windows detects a problem with any of these security essentials (for example, if your antivirus program is out of date), Security Center displays a notification and places a Security Open System Informationby clicking Start button » All Programs » Accessories» SystemTools »
  • 5. System Restore System Restore uses restore points to return your system files and settings to an earlier point in time, without affecting personal files. Open SystemRestore by clicking the Start button » clicking All Programs » Accessories » SystemTools » SystemRestore Sometimes, the installation of a program can cause an unexpectedchange to your computerso, you can try restoring your computer's system to fix the problem
  • 6. Character Map Start » Programs » Accessories » SystemTools » Character Map. Charmap is used to input or check out characters of different encodings and fonts installed on your system. You use the CharacterMap to insert meaningful charactersto the folder (or file) names.
  • 7. Disk Defragmenter Disk Defragmenter consolidates fragmented files and folders on your computer's hard disk. As a result, your system can gain access to your files and folders and save new ones more efficiently Start » Programs » Accessories » SystemTools » Disk Defragmenter Defragmenting can significantly increase the speed of file loading.
  • 8. COMPUTER NETWORK: Components of network hardware All networks are made up of basic hardware building blocks to interconnect network nodes, such as Network Interface Cards (NICs), Repeaters, Hubs, cables and Routers.
  • 9. Network Card A network card, network adapter or NIC, is a piece of computer hardware designed to allow computers to communicate over a computer network. It allows users to connect to each other by using cables or wireless.
  • 10. Cables & connectors  Twisted pair using a RJ45 connector  Coaxial cable  Optical cables
  • 11. Repeaters and Hubs A repeater is an electronic device that receives a network signal, cleans it of unnecessary noise, and regenerates it. The signal is retransmitted at a higher power level, so that the signal can cover longer distances without degradation A repeater with multiple ports is known as a hub. . Image of a hub
  • 12. Router A hardware device designed to take incoming packets, analyzing the packets and then directing them to the appropriate locations
  • 13. SCHEME OF THE EQUIPMENT AND DEVICES CONNECTIONS
  • 14. Network software settings and protocols  Name and workgroup Clicking on “my PC” with the second button of the mouse, access to properties.
  • 15. If we click in computer name tab, we can find the details about the computer´s description, name and workgroup Clicking in workgroup and change, we can find this box SO, in the box highlighted you can put a new name
  • 16.  IP address and other information Step by step: 1. Click on controlpanel 2. Select network connections 3. Select “Local area connection”and click on properties 4. A new Windows appear. Select Internet Protocol(TCP/IP). Click on Properties. 5. You can now key in the IP address, Subnet mask, Default gateway and DNS servers. The boxes would appear in blank, so take the Numbers following the same steps in the Spanish version of windows. Copy all the numbers except the last box of IP adrees
  • 17. MSDOS COMMANDS  Ping It is a utility used to verify if a network data packet is capable of being distributed to an address without errors. Allows you to ping anothercomputerwhere the x's are locatedare where you would place the IP address of the computeryou are attemptingto ping
  • 18. If this is not able to complete, this should relay back an unsuccessful message. If we write “ping” and a wrong IP adress, this box would appear with a "timed out" error instead of a reply. It means there is a breakdown somewhere between your computerand the domain
  • 19.  Ipconfig This command can be utilized to verify a network connectionas well as to verify your network settings. You can get all local network information for your computerwriting “ipconfig” in the Command Prompt
  • 20. When I start my computer up I always find a blue star and a message from Microsoft "Windows Genuine Advantage" to buy the WindowsOriginal as long as mine, like many users’, is not, or at least I do not remember having bought. Let me know how I can delete the notice and how I can prevent myself from getting it again. SECURITY PROBLEMS Problem 1:
  • 21. Answer: Windows GenuineAdvantage notifications occur when your computerhasn't passed the validation test. The validation test can be failed because you installed a pirated non-genuinecopy of XP, or because you have changed your XP productkey to a software-generated key, or sometimes it just happensfor no reason at all. If you are being constantlynagged by Microsoft to validate your Windows license, you have the option of purchasing a genuine copy of Windows XP or resolving the problemlater. However, there is actuallya way of disabling the message by editing your registry. So, if you want to remove thoseannoying notifications, you can follow one of these 5 methods that you can find in this website: http://www.wikihow.com/Remove-Windows-Genuine-Advantage-Notifications
  • 22.  PROBLEM 2: The antivirus detects an infection (Internet worm) win32/boberog.AQ in working memory. It seems my antivirus detects it but cannot solve the problem.
  • 23. Answer Win32.Boberog.AQ is one of the Windows illegal malicious programs which may occupy system resources and slow down computers. You can find more information about this kind of worn in this website: http://www.virusradar.com/Win32_Boberog.AQ/description This worm can open your email address book and despatch one cloneeach to each of the addresses listed…Here you have more information about how worns spread: http://www.emsisoft.com/en/kb/articles/tec050629/ Well, now to remove it, you can do it manually or instantlyfollowing the steps given in this website: http://www.spydig.com/spyware-info/Win32-Boberog-AQ.html But if you feel incapable to do that… I´ll recommend you to visit an expert in computersso this problema won´t appearin the future any more.