Customer’s Choice Presented by: Keystone Computer Concepts.

42
Customer’s Choice Presented by: Keystone Computer Concepts

Transcript of Customer’s Choice Presented by: Keystone Computer Concepts.

Page 1: Customer’s Choice Presented by: Keystone Computer Concepts.

Customer’s ChoicePresented by:Keystone Computer Concepts

Page 2: Customer’s Choice Presented by: Keystone Computer Concepts.

Please turn your cell phone to stun!

Before We Get Started

Page 3: Customer’s Choice Presented by: Keystone Computer Concepts.

Before We Get Started

Restrooms are down the hall on the right!

Page 4: Customer’s Choice Presented by: Keystone Computer Concepts.

We’ll take a 5 minute break around 11:00 a.m.

Before We Get Started

Page 5: Customer’s Choice Presented by: Keystone Computer Concepts.

Before We Get Started

Please hold individual questions about your own computer until the end.

Page 6: Customer’s Choice Presented by: Keystone Computer Concepts.

Customer’s ChoicePresented by:Keystone Computer Concepts

Page 7: Customer’s Choice Presented by: Keystone Computer Concepts.

Going on vacation this summer? What mode of transportation will you take?

Page 8: Customer’s Choice Presented by: Keystone Computer Concepts.

Customer’s ChoicePresented by:Keystone Computer Concepts

Page 9: Customer’s Choice Presented by: Keystone Computer Concepts.

Question #1

I would like to know how to safeguard the information on my thumb drive.

Page 10: Customer’s Choice Presented by: Keystone Computer Concepts.

Answer #1

1) Purchase a USB drive with encryption built-in

Page 11: Customer’s Choice Presented by: Keystone Computer Concepts.

SanDisk

Page 12: Customer’s Choice Presented by: Keystone Computer Concepts.

Answer #1

2) Purchase a separate software program to encrypt a USB drive.

Page 13: Customer’s Choice Presented by: Keystone Computer Concepts.

Keynesis

Page 14: Customer’s Choice Presented by: Keystone Computer Concepts.

Demo

Page 15: Customer’s Choice Presented by: Keystone Computer Concepts.

Question #2

Can I send an encrypted email to someone and how do they unencrypt it?

Page 16: Customer’s Choice Presented by: Keystone Computer Concepts.

Answer #2

There are a number of ways to send encrypted emails:

Page 17: Customer’s Choice Presented by: Keystone Computer Concepts.

Answer #2

1) You can use a service like Hush Mail. There are free and paid accounts. DEMO

Page 18: Customer’s Choice Presented by: Keystone Computer Concepts.

Answer #2

2) If you use Outlook, you can purchase a certificate. DEMO

Page 19: Customer’s Choice Presented by: Keystone Computer Concepts.

Question #3

3) What is Voice over IP?

Page 20: Customer’s Choice Presented by: Keystone Computer Concepts.

Answer #3

3) VoIP simply means voice communication using the Internet Protocol.

Page 21: Customer’s Choice Presented by: Keystone Computer Concepts.

Question #4

4) Should I change my router’s password and how often?

Page 22: Customer’s Choice Presented by: Keystone Computer Concepts.

Answer #4

4) The Microsoft Answer.

Page 23: Customer’s Choice Presented by: Keystone Computer Concepts.

Handout

Page 24: Customer’s Choice Presented by: Keystone Computer Concepts.

Cable Modem

Page 25: Customer’s Choice Presented by: Keystone Computer Concepts.

DSL Modem

Page 26: Customer’s Choice Presented by: Keystone Computer Concepts.

Router

Page 27: Customer’s Choice Presented by: Keystone Computer Concepts.

Modem/Router Combo

Page 28: Customer’s Choice Presented by: Keystone Computer Concepts.
Page 29: Customer’s Choice Presented by: Keystone Computer Concepts.
Page 30: Customer’s Choice Presented by: Keystone Computer Concepts.

Question #5

5) How often should I change passwords? (Banking, etc.)

Page 31: Customer’s Choice Presented by: Keystone Computer Concepts.

Answer #5

5) Every 90 days. However, the passwords need to be secure.

Page 32: Customer’s Choice Presented by: Keystone Computer Concepts.

Question #6

6) What are

tabs?

Page 33: Customer’s Choice Presented by: Keystone Computer Concepts.

Answer #6

6) Download the PowerPoint from our webinar.

Page 34: Customer’s Choice Presented by: Keystone Computer Concepts.

Question #77) What “tricks” should we

watch for in email?

Page 35: Customer’s Choice Presented by: Keystone Computer Concepts.

Answer #77) a) Scare tactics

b) Requests for PINc) Vague greetingsd) Update attachments

Page 36: Customer’s Choice Presented by: Keystone Computer Concepts.

Question #8

8) How do I build my own website?

Page 37: Customer’s Choice Presented by: Keystone Computer Concepts.

Answer #8

8) Use a free web building

site.

Page 38: Customer’s Choice Presented by: Keystone Computer Concepts.

Question #9

9) What things should I do to keep my computer

running smoothly?

Page 39: Customer’s Choice Presented by: Keystone Computer Concepts.

Answer #9

9) a) Don’t turn it off more than once a dayb)Keep it clean and coolc)Come into RTS for updates, etc.

Page 40: Customer’s Choice Presented by: Keystone Computer Concepts.

Question #10

10) How do I get a picture to come up when there is only a red

X?

Page 41: Customer’s Choice Presented by: Keystone Computer Concepts.

Answer #10

10) In most cases, you can’t.

Page 42: Customer’s Choice Presented by: Keystone Computer Concepts.

Saturday, June 25, 2011 10:00 a.m.OneNote Intro WebinarMon., Aug. 1st-Sat., Aug. 6thKCC will be closed for vacation!In September, we will have our regular seminar and a Word seminar.

Upcoming Events