Académique Documents
Professionnel Documents
Culture Documents
Switch between windows Alt Tab Print the selected image Ctrl P
Best Practices
Inappropriate use of computing and networking In addition to this:
resources can expose the company to various
risks, such as legal liability, loss of brand image, The password should be at least 8
and loss of confidentiality, integrity, and characters in length
availability of sensitive information assets and
The password must be different from your
systems.
last 6 passwords
Passwords are critical to the protection of The password should not contain your full
company information assets. Individual users are first name or last name
responsible for the security of their passwords
and passwords must never be shared amongst
You are responsible for ensuring that no one
colleagues.
else knows your network password. Do not
write down or store network passwords where
Defend your PC against Spyware and other
others can find them.
malicious software
Windows Defender protect your computer To change your Windows Vista login password:
against pop-ups and security threats caused Press [Ctrl Alt Delete] to show the
by spyware and other unwanted software. Windows Security screen
A password is used to secure your computer Enter your new password in the New
and to ensure that no other user can access password box
your files and directories. To be effective, a Enter the same new password in the
password should include at least three of the Confirm password box
four following:
Click on the arrow button to set your new
Upper case characters e.g. A B C password
Lower case characters e.g. a b c
Numeric characters e.g. 1 2 3
Special characters e.g. comma, period, /,
[, -, =, +, !, #, $, etc.
Compress files to take up less disk space Set Internet Explorer privacy
Also known as "zipping", compressing files You can set your Internet Explorer privacy
makes them much smaller and therefore settings to control whether cookies are allowed
easier to copy or send via email. This is to be saved on your computer.
especially true of many image files. It is also a
handy way to email or copy a batch of files in Cookies are files that store information about
one go, rather than singly, even if the overall your visits to a website. A cookie can store the
size is the same. date and time you visited the site, and can also
be used to store information such as your
Select the files you wish to compress preferences on that site, or choices you wish
to display.
Right-click over the selected files and
choose Send To, then Compressed
(zipped) folder Cookies are not necessarily a bad thing. As
long as they are used to store only basic
A zip folder will be created with the same
information, they can be allowed from sites
name as the last selected file, but with
the .zip extension you trust.
Click on the Start Menu button at the bottom left corner of the screen. If the application is not in the
list that appears immediately above the button, click on the All Programs link at the bottom of the list
and browse amongst the files and folders until you find it.
Alternatively, type the name of the application into the Search Box immediately above the Start
Menu button and all matching links will appear in place of the application list.
Click on the Start Menu button at the bottom left corner of the screen and type the name of the file
into the Search Box that appears immediately above it. The list of applications above the search box
will change to display the closest matching files, applications and correspondence on your computer.
Click on the [+] button at the top of the side bar to open the Gadget Gallery. Double-click on a gadget
to install it on your side bar. You can also find more gadgets by clicking on the Get more gadgets
online link.
Press the [Ctrl + Windows Logo + Tab] keys to switch to Flip 3D view. Use the left and right arrow
keys to browse between the screens. Press [Enter] to open the window that is at the front of the stack.
Click on the Start Menu button at the bottom left corner of the screen and then on any of the following
buttons that appear: Your personal folder (with your login name); Documents; Pictures; Music;
Computer; Network. All of these choices will open Windows Explorer, although in different locations.
To display the menu temporarily, press [Alt]. To display it permanently, click on Organize, Layout,
Menu Bar.
Click on the small arrow to the right of the Print button and select Print Preview from the pop-up
menu.
Click on the Favorites Center button (it's a star) near the top left corner of the window. Click on the
History button that appears below it to view your browsing history.
Click on the Start Menu button at the bottom left corner of the screen and then on the Computer
button. Click on the Map network drive button towards the top right side of the window. Choose a
drive letter and then click on the Browse... button to find the required folder.
Click on the Start Menu button at the bottom left corner of the screen and then on the arrow at the
extreme bottom right of the menu. Choose Shut Down from the pop-up menu to switch your
computer off.
edit
to add, remove or revise text and graphics
email folder
mail composed and transmitted on a computer a container used to hold files and sub-folders,
system or network also known as a directory
embed hardware
to insert text or graphics created in another the physical parts of the computer
application
history
a list of shortcuts to web pages in the order in
F which they were visited
favorites html
a shortcut to a frequently used web address HyperText Markup Language - the most common
coding language for create web pages. HTML
file can also be used to create format-rich email
a document that has been saved with a unique messages
name
I
file format
the way in which a document has been saved
images
photographs and pictures held on a computer
file name conventions
a set of rules by which a computer can identify a
file, usually limited to a specific number of internet
characters and not including \ / > < * ? " | : ; a vast grouping of computer networks which
operates world-wide using a common set of
communications protocols
file versions
a feature of Vista which allows you to use a
previously-backed up version of a file, rather than internet explorer
the current one Microsoft's application for browsing the internet
filter
a way of arranging files in a folder so that only
the required ones are on display
flip 3d
a way of browsing through all the open windows
on a computer, in a virtual 3D stack
L N
launch network
to start up an application or program an interconnected system of computers
link
a connection to a document, such as a web page
O
password
log on
a string of characters that is required to gain
to initialise a connection to a computer or
access to a resource that is password-protected
network
paste
M to insert cut or copied text from the clipboard into
a document
malware
usually software that is intentionally included or personal folder
inserted in a system for a harmful purpose a collection of files and folders only accessible by
the person who has logged on to the computer
mapped drives
drives on remote computers that are permanently phishing
accessible across a network the theft of personal information via a spoof web
site or email
menu
a list of options that appears when the menu pin to...
name is clicked to ensure that a file is always accessible from a
certain point, usually the top of the start menu
menu bar
the area just below the top of a window which Pop-Up Blocker
houses the menu a feature in Internet Explorer that prevents
unwanted web pages from opening
Microsoft Office
Microsoft's suite of productivity applications, pop-ups
including Excel, Outlook, PowerPoint and Word usually unwanted web pages that open when a
'host' web page is accessed
mouse pointer
the graphic image that indicates the on-screen print preview
location of the pointing device an accurate display of how a document will look
when printed
multimedia
the interactive use of text, audio, still images, properties
video, and graphics the attributes and characteristics of a file or folder
sleep
Q a state in which the computer is unused and
'sleeps' to conserve energy
Quick Launch bar
a graphic menu of applications usually found slide show
next to the start button a display of still images stored on a computer
R software
programs that run on a computer
rating
a system for measuring the quality of an image sort
to arrange files and folders into a logical order
Recycle Bin
a folder for storing deleted files in case they are spam
required again unsolicited email, usually advertisements sent in
bulk to a large number of email addresses. Spam
is an email message that you did not request,
restore
from somebody you do not know
to return data to a prior consistent state, usually
from a backup
spyware
software that covertly gathers user information
RSS feed
through the user's Internet connection without his
a format for distributing news headlines and
or her knowledge or consent
other continuously-updated content on the Web
stacked files
S virtual groups of files that allow users to easily
view all files that meet a certain criteria
scroll bar
positioned along the right and bottom of the stacked windows
screen, these bars are used to move around a the screen is divided horizontally between all the
document or folder open applications
virus zoom
a self-replicating program that spreads by to reduce or increase the magnification of an on-
inserting copies of itself into other executable screen element
code or documents with harmful intent
web site
a collection of connected web pages stored on a
web server
Window
a rectangular part of a computer screen with
contentsdifferent to the rest of the screen
Windows Contacts
an application for storing contact information
such as names, email addresses, postal
addresses and notes
Windows Defender
an application that protect the computer against
pop-ups and security threats caused by spyware
and other unwanted software