Vous êtes sur la page 1sur 9

Desktop Mentor

Windows Vista Essentials

Working with Windows Photo Gallery Shortcuts

Action Shortcut Action Shortcut

Search F3 Open the Fix pane Ctrl F

Switch between windows Alt Tab Print the selected image Ctrl P

Switch between windows Show or hide the Details


Ctrl Alt Tab Ctrl I
using the arrow keys pane
Switch between windows in Rotate the selected image
Tab Ctrl .
Flip 3D view clockwise
Switch between windows Rotate the selected image
using the arrow keys in Flip Ctrl ,
Ctrl Tab anti-clockwise
3D view
Zoom into the image +
Cycle through windows in the
Alt Esc Zoom out of the image -
order they were opened
Display the address bar F4 Show best fit Ctrl B
Display the menu bar Alt
Close the current document Ctrl F4 Internet Explorer Shortcuts
Close the current application Alt F4 Action Shortcut
Open the Task Manager Ctrl Shift Esc
Back to the previous page Alt ←
Forward to next page Alt →
Editing Items
Find text on the page Ctrl F
Action Shortcut
Refresh page F5
Copy the selected item Ctrl C
Stop downloading from the
Cut the selected item Ctrl X Esc
page
Paste the selected item Ctrl V
Show full screen F11
Undo the last command Ctrl Z
Show your home page Alt Home
Delete the selected item Delete
View History Ctrl H
Delete without sending to
Shift Delete View Feeds Ctrl J
Recycle Bin
Rename the selected item F2 View Favourites Ctrl I
Display properties for the Add the current page to your
Alt Return Ctrl D
selected item Favourites
Select all items in a folder Ctrl A Organise favourites Ctrl B
Switch between tabs Ctrl Tab
Sidebar Shortcuts
Go to a speicifc tab number Ctrl (number)
Action Shortcut Close all other tabs Ctrl Alt F4
Select and view the sidebar Spacebar Show quick tabs Ctrl Q
Cycle through gadgets G Zoom into the page Ctrl +
Cycle through controls Tab Zoom out of the page Ctrl -

© Hewlett-Packard 2007 Page 1 of 9


Desktop Mentor

Best Practices
Inappropriate use of computing and networking In addition to this:
resources can expose the company to various
risks, such as legal liability, loss of brand image,  The password should be at least 8
and loss of confidentiality, integrity, and characters in length
availability of sensitive information assets and
 The password must be different from your
systems.
last 6 passwords
Passwords are critical to the protection of  The password should not contain your full
company information assets. Individual users are first name or last name
responsible for the security of their passwords
and passwords must never be shared amongst
You are responsible for ensuring that no one
colleagues.
else knows your network password. Do not
write down or store network passwords where
Defend your PC against Spyware and other
others can find them.
malicious software

Windows Defender protect your computer To change your Windows Vista login password:
against pop-ups and security threats caused  Press [Ctrl Alt Delete] to show the
by spyware and other unwanted software. Windows Security screen

To start Windows Defender:  Click on Change a password

 Click on the Start menu


 Choose All Programs then Windows
Defender

 Enter your existing password in the Old


Change your password regularly password box

A password is used to secure your computer  Enter your new password in the New
and to ensure that no other user can access password box
your files and directories. To be effective, a  Enter the same new password in the
password should include at least three of the Confirm password box
four following:
 Click on the arrow button to set your new
 Upper case characters e.g. A B C password
 Lower case characters e.g. a b c
 Numeric characters e.g. 1 2 3
 Special characters e.g. comma, period, /,
[, -, =, +, !, #, $, etc.

© Hewlett-Packard 2007 Page 2 of 9


Desktop Mentor

Compress files to take up less disk space Set Internet Explorer privacy

Also known as "zipping", compressing files You can set your Internet Explorer privacy
makes them much smaller and therefore settings to control whether cookies are allowed
easier to copy or send via email. This is to be saved on your computer.
especially true of many image files. It is also a
handy way to email or copy a batch of files in Cookies are files that store information about
one go, rather than singly, even if the overall your visits to a website. A cookie can store the
size is the same. date and time you visited the site, and can also
be used to store information such as your
 Select the files you wish to compress preferences on that site, or choices you wish
to display.
 Right-click over the selected files and
choose Send To, then Compressed
(zipped) folder Cookies are not necessarily a bad thing. As
long as they are used to store only basic
 A zip folder will be created with the same
information, they can be allowed from sites
name as the last selected file, but with
the .zip extension you trust.

To set Internet Explorer privacy settings, click


The contents of a compressed folder can be on the Tools menu and choose Internet
viewed by double-clicking on the folder icon Options, then click on the Privacy tab.
and browsing in the normal manner. Files can
also be opened, copied and pasted from Lock your PC when you're away from your
within a compressed folder. desk

To lock your computer,


Set Internet Explorer security
click on the Lock This
Security settings in Internet Explorer control Computer button in the
how potentially unsafe content in websites is Start Menu.
handled. You can have different settings for
To unlock your computer:
external Internet sites and internal Intranet
sites. You can also add sites that you can  Type your password into the password
always trust, so that all content is always box
allowed from that site. Similarly, you can block
any sites from which you never wish to  Click on the arrow button next to the
download any active content. password box or press [Enter]

To set your security settings:


All the programs that you have open when
 Click on the Tools menu of Internet you lock your computer will still be open when
Explorer and choose Internet Options you unlock it.
 Click on the Security tab
Shut down at the end of the day

If you are leaving your desk for a considerable


time - e.g., overnight - you should switch your
computer off.

 Click on the Shut


Down button at the
bottom right of the
Start Menu
 Choose Shut Down from the pop-up
menu. Your computer will close all open
applications and switch off
 Restart the computer by pressing the
power button
 Log in to your computer again in the
normal way

© Hewlett-Packard 2007 Page 3 of 9


Desktop Mentor

Frequently Asked Questions


How can I find an application I need to use?

Click on the Start Menu button at the bottom left corner of the screen. If the application is not in the
list that appears immediately above the button, click on the All Programs link at the bottom of the list
and browse amongst the files and folders until you find it.

Alternatively, type the name of the application into the Search Box immediately above the Start
Menu button and all matching links will appear in place of the application list.

How can I find a file I need to work on?

Click on the Start Menu button at the bottom left corner of the screen and type the name of the file
into the Search Box that appears immediately above it. The list of applications above the search box
will change to display the closest matching files, applications and correspondence on your computer.

How can I add gadgets to the side bar?

Click on the [+] button at the top of the side bar to open the Gadget Gallery. Double-click on a gadget
to install it on your side bar. You can also find more gadgets by clicking on the Get more gadgets
online link.

How do I show the new Flip 3D view?

Press the [Ctrl + Windows Logo + Tab] keys to switch to Flip 3D view. Use the left and right arrow
keys to browse between the screens. Press [Enter] to open the window that is at the front of the stack.

How can I open Windows Explorer?

Click on the Start Menu button at the bottom left corner of the screen and then on any of the following
buttons that appear: Your personal folder (with your login name); Documents; Pictures; Music;
Computer; Network. All of these choices will open Windows Explorer, although in different locations.

How can I show the menu in an Explorer window?

To display the menu temporarily, press [Alt]. To display it permanently, click on Organize, Layout,
Menu Bar.

Where is the Print Preview command in Internet Explorer?

Click on the small arrow to the right of the Print button and select Print Preview from the pop-up
menu.

Where is my History list in Internet Explorer?

Click on the Favorites Center button (it's a star) near the top left corner of the window. Click on the
History button that appears below it to view your browsing history.

How can I map to a new network drive?

Click on the Start Menu button at the bottom left corner of the screen and then on the Computer
button. Click on the Map network drive button towards the top right side of the window. Choose a
drive letter and then click on the Browse... button to find the required folder.

How do I shut down my PC?

Click on the Start Menu button at the bottom left corner of the screen and then on the arrow at the
extreme bottom right of the menu. Choose Shut Down from the pop-up menu to switch your
computer off.

© Hewlett-Packard 2007 Page 4 of 9


Desktop Mentor

Glossary control panel


part of the operating system that allows you to
make changes to the computer's settings
A
copy
application to transfer a duplicate of selected text from the
A software program designed to perform a document into the clipboard
specific task, such as word processing
cut
arrow key to transfer selected text from the document into
the up, down, left or right arrows on the keyboard the clipboard
used to position the cursor
cursor
attachment the flashing line which indicates the current
a file that is attached to an email message. This insertion point on the screen
could be an image or document e.g. a Word or
Excel file
D
associated program
a program that launches when a specific file type default program
is opened a program that automatically launches when a
file is opened, unless an alternative is specified
AutoPlay
the automatic playing or launching of a disc when desktop
it is inserted into a computer the background behind all the windows, menus,
and dialog boxes that are open on the computer
B
desktop background
the image that displays on the desktop
back up
copying or saving data to a different location
dialog box
a window that displays all available options for a
browse chosen command
to search through a set of files and folders
directory
C a sub-division of a disk in which files can be
stored, also known as a folder
cascading
a screen layout in which all the open windows download
are visible, one behind the other to transfer a copy of a message or file from a
Server or the Internet onto your own computer.
click
to press and release the mouse button in one drag
movement to move the mouse while holding the mouse
button. This is used to move text or graphics
within a document
clipboard
temporary storage area for text that has been
cut or copied. The paste command is used to E
transfer this text back into the document
Easy Transfer
compressed files/folders a method of copying the entire PC so that all files
a method of reducing the size of files or folders, and settings can be transferred to another
also known as 'zipping' computer

edit
to add, remove or revise text and graphics

© Hewlett-Packard 2007 Page 5 of 9


Desktop Mentor

email folder
mail composed and transmitted on a computer a container used to hold files and sub-folders,
system or network also known as a directory

email address font


the address used to reach someone via email. a collection of characters in a typeface e.g.
The format of an email address is Times New Roman or Arial
user@domain. For example, the email address
john.smith@hp.com is made up of the user
name john.smith and the domain hp.com G

email client gadgets


a program used to read and send email the individual applications available for the side
messages. Outlook 2007 is an email client bar

email server group


the program used to transport and distribute a method of binding together a number of objects
email within a company. The email server sends
messages to the email client, for access by all
users H

embed hardware
to insert text or graphics created in another the physical parts of the computer
application
history
a list of shortcuts to web pages in the order in
F which they were visited

favorite links home page


a folder in which shortcuts to other, often-used the web page that loads each time Internet
folders are held Explorer is launched

favorites html
a shortcut to a frequently used web address HyperText Markup Language - the most common
coding language for create web pages. HTML
file can also be used to create format-rich email
a document that has been saved with a unique messages
name

I
file format
the way in which a document has been saved
images
photographs and pictures held on a computer
file name conventions
a set of rules by which a computer can identify a
file, usually limited to a specific number of internet
characters and not including \ / > < * ? " | : ; a vast grouping of computer networks which
operates world-wide using a common set of
communications protocols
file versions
a feature of Vista which allows you to use a
previously-backed up version of a file, rather than internet explorer
the current one Microsoft's application for browsing the internet

filter
a way of arranging files in a folder so that only
the required ones are on display

flip 3d
a way of browsing through all the open windows
on a computer, in a virtual 3D stack

© Hewlett-Packard 2007 Page 6 of 9


Desktop Mentor

L N

launch network
to start up an application or program an interconnected system of computers

layout Network And Sharing Center


the arrangement of visual elements into a the application in which networking and file
specific design sharing can be manipulated

link
a connection to a document, such as a web page
O

linked applications operating system


to insert data from one application into another, software that controls a computer's fundamental
so that when the former is updated, so is the operations
latter
Outlook
locked computer the email client in Microsoft's Office suite
a computer in a stand-by state, requiring a
password to return to the active state
P
log off
pane
to terminate a connection to a computer or
a subdivision of a window
network

password
log on
a string of characters that is required to gain
to initialise a connection to a computer or
access to a resource that is password-protected
network

paste
M to insert cut or copied text from the clipboard into
a document
malware
usually software that is intentionally included or personal folder
inserted in a system for a harmful purpose a collection of files and folders only accessible by
the person who has logged on to the computer
mapped drives
drives on remote computers that are permanently phishing
accessible across a network the theft of personal information via a spoof web
site or email
menu
a list of options that appears when the menu pin to...
name is clicked to ensure that a file is always accessible from a
certain point, usually the top of the start menu
menu bar
the area just below the top of a window which Pop-Up Blocker
houses the menu a feature in Internet Explorer that prevents
unwanted web pages from opening
Microsoft Office
Microsoft's suite of productivity applications, pop-ups
including Excel, Outlook, PowerPoint and Word usually unwanted web pages that open when a
'host' web page is accessed
mouse pointer
the graphic image that indicates the on-screen print preview
location of the pointing device an accurate display of how a document will look
when printed
multimedia
the interactive use of text, audio, still images, properties
video, and graphics the attributes and characteristics of a file or folder

© Hewlett-Packard 2007 Page 7 of 9


Desktop Mentor

sleep
Q a state in which the computer is unused and
'sleeps' to conserve energy
Quick Launch bar
a graphic menu of applications usually found slide show
next to the start button a display of still images stored on a computer

R software
programs that run on a computer
rating
a system for measuring the quality of an image sort
to arrange files and folders into a logical order
Recycle Bin
a folder for storing deleted files in case they are spam
required again unsolicited email, usually advertisements sent in
bulk to a large number of email addresses. Spam
is an email message that you did not request,
restore
from somebody you do not know
to return data to a prior consistent state, usually
from a backup
spyware
software that covertly gathers user information
RSS feed
through the user's Internet connection without his
a format for distributing news headlines and
or her knowledge or consent
other continuously-updated content on the Web

stacked files
S virtual groups of files that allow users to easily
view all files that meet a certain criteria
scroll bar
positioned along the right and bottom of the stacked windows
screen, these bars are used to move around a the screen is divided horizontally between all the
document or folder open applications

search box Start Button


the area in which search queries are entered the large round button in the bottomn left corner
of the screen which launched the Start Menu
search folder
a saved search that can be reused Start Menu
an interactive menu of files and applications on
select the computer
to highlight a file or folder to indicate which
item(s) you wish to use switch users
the process by which one user logs off from the
share permissions computer to allow another to log on, without
properties that allow individual control over switching it off
shared files and folders
Sync Center
sharing an application that synchronises data on the
the ability to view or amend a file that belongs to computer and portable devices or remote files
a different user across a network
T
shortcut
an icon or file that points towards another file
tabs
a graphic method of selecting different windows
shut down within a group
the process of switching off a computer
tags
Side Bar descriptive information saved with a file to help
an application that houses other small and identify it
frequently-used applications

© Hewlett-Packard 2007 Page 8 of 9


Desktop Mentor

Task Bar Windows Media Player


The bar along the bottom of the screen, housing an application for playing various formats of
the start button, quick launch bar, task bar tray, audio and video files
etc
Windows Meeting Space
Task Bar Tray an application for sharing files and programs with
the area at the bottom right of the screen in the other users at the same time, allowing users to
Task bar, used to provide information and links to collaborate on projects remotely
running applications
Windows Movie Maker
Task Manager an application for combining image, video and
an application for viewing and terminating the audio files into one long video with titles, effects
various programs currently running on the and transitions
computer, as well as shutting it down
Windows Photo Gallery
theme an application which is used to sort, tag and
a collection of saved personalised settings, such adjust the images on the computer
as the desktop background, screen saver and
cursor style Windows Vista
the latest version of Microsoft's operating system
title bar
horizontal bar at the top of the screen which wireless devices
displays the application and document name hardware that can be connected to a computer
without cables
toolbar
horizontal or vertical bar containing buttons
which are usually shortcuts for frequently used Z
tasks
zipping
a method of reducing the size of files or folders,
V also known as compressing

virus zoom
a self-replicating program that spreads by to reduce or increase the magnification of an on-
inserting copies of itself into other executable screen element
code or documents with harmful intent

web site
a collection of connected web pages stored on a
web server

Window
a rectangular part of a computer screen with
contentsdifferent to the rest of the screen

Windows Contacts
an application for storing contact information
such as names, email addresses, postal
addresses and notes

Windows Defender
an application that protect the computer against
pop-ups and security threats caused by spyware
and other unwanted software

© Hewlett-Packard 2007 Page 9 of 9

Vous aimerez peut-être aussi