42
Customer’s Choice Presented by: Keystone Computer Concepts

Customer’s Choice Presented by: Keystone Computer Concepts

Embed Size (px)

Citation preview

Page 1: Customer’s Choice Presented by: Keystone Computer Concepts

Customer’s ChoicePresented by:Keystone Computer Concepts

Page 2: Customer’s Choice Presented by: Keystone Computer Concepts

Please turn your cell phone to stun!

Before We Get Started

Page 3: Customer’s Choice Presented by: Keystone Computer Concepts

Before We Get Started

Restrooms are down the hall on the right!

Page 4: Customer’s Choice Presented by: Keystone Computer Concepts

We’ll take a 5 minute break around 11:00 a.m.

Before We Get Started

Page 5: Customer’s Choice Presented by: Keystone Computer Concepts

Before We Get Started

Please hold individual questions about your own computer until the end.

Page 6: Customer’s Choice Presented by: Keystone Computer Concepts

Customer’s ChoicePresented by:Keystone Computer Concepts

Page 7: Customer’s Choice Presented by: Keystone Computer Concepts

Going on vacation this summer? What mode of transportation will you take?

Page 8: Customer’s Choice Presented by: Keystone Computer Concepts

Customer’s ChoicePresented by:Keystone Computer Concepts

Page 9: Customer’s Choice Presented by: Keystone Computer Concepts

Question #1

I would like to know how to safeguard the information on my thumb drive.

Page 10: Customer’s Choice Presented by: Keystone Computer Concepts

Answer #1

1) Purchase a USB drive with encryption built-in

Page 11: Customer’s Choice Presented by: Keystone Computer Concepts

SanDisk

Page 12: Customer’s Choice Presented by: Keystone Computer Concepts

Answer #1

2) Purchase a separate software program to encrypt a USB drive.

Page 13: Customer’s Choice Presented by: Keystone Computer Concepts

Keynesis

Page 14: Customer’s Choice Presented by: Keystone Computer Concepts

Demo

Page 15: Customer’s Choice Presented by: Keystone Computer Concepts

Question #2

Can I send an encrypted email to someone and how do they unencrypt it?

Page 16: Customer’s Choice Presented by: Keystone Computer Concepts

Answer #2

There are a number of ways to send encrypted emails:

Page 17: Customer’s Choice Presented by: Keystone Computer Concepts

Answer #2

1) You can use a service like Hush Mail. There are free and paid accounts. DEMO

Page 18: Customer’s Choice Presented by: Keystone Computer Concepts

Answer #2

2) If you use Outlook, you can purchase a certificate. DEMO

Page 19: Customer’s Choice Presented by: Keystone Computer Concepts

Question #3

3) What is Voice over IP?

Page 20: Customer’s Choice Presented by: Keystone Computer Concepts

Answer #3

3) VoIP simply means voice communication using the Internet Protocol.

Page 21: Customer’s Choice Presented by: Keystone Computer Concepts

Question #4

4) Should I change my router’s password and how often?

Page 22: Customer’s Choice Presented by: Keystone Computer Concepts

Answer #4

4) The Microsoft Answer.

Page 23: Customer’s Choice Presented by: Keystone Computer Concepts

Handout

Page 24: Customer’s Choice Presented by: Keystone Computer Concepts

Cable Modem

Page 25: Customer’s Choice Presented by: Keystone Computer Concepts

DSL Modem

Page 26: Customer’s Choice Presented by: Keystone Computer Concepts

Router

Page 27: Customer’s Choice Presented by: Keystone Computer Concepts

Modem/Router Combo

Page 28: Customer’s Choice Presented by: Keystone Computer Concepts
Page 29: Customer’s Choice Presented by: Keystone Computer Concepts
Page 30: Customer’s Choice Presented by: Keystone Computer Concepts

Question #5

5) How often should I change passwords? (Banking, etc.)

Page 31: Customer’s Choice Presented by: Keystone Computer Concepts

Answer #5

5) Every 90 days. However, the passwords need to be secure.

Page 32: Customer’s Choice Presented by: Keystone Computer Concepts

Question #6

6) What are

tabs?

Page 33: Customer’s Choice Presented by: Keystone Computer Concepts

Answer #6

6) Download the PowerPoint from our webinar.

Page 34: Customer’s Choice Presented by: Keystone Computer Concepts

Question #77) What “tricks” should we

watch for in email?

Page 35: Customer’s Choice Presented by: Keystone Computer Concepts

Answer #77) a) Scare tactics

b) Requests for PINc) Vague greetingsd) Update attachments

Page 36: Customer’s Choice Presented by: Keystone Computer Concepts

Question #8

8) How do I build my own website?

Page 37: Customer’s Choice Presented by: Keystone Computer Concepts

Answer #8

8) Use a free web building

site.

Page 38: Customer’s Choice Presented by: Keystone Computer Concepts

Question #9

9) What things should I do to keep my computer

running smoothly?

Page 39: Customer’s Choice Presented by: Keystone Computer Concepts

Answer #9

9) a) Don’t turn it off more than once a dayb)Keep it clean and coolc)Come into RTS for updates, etc.

Page 40: Customer’s Choice Presented by: Keystone Computer Concepts

Question #10

10) How do I get a picture to come up when there is only a red

X?

Page 41: Customer’s Choice Presented by: Keystone Computer Concepts

Answer #10

10) In most cases, you can’t.

Page 42: Customer’s Choice Presented by: Keystone Computer Concepts

Saturday, June 25, 2011 10:00 a.m.OneNote Intro WebinarMon., Aug. 1st-Sat., Aug. 6thKCC will be closed for vacation!In September, we will have our regular seminar and a Word seminar.

Upcoming Events