View
216
Download
1
Embed Size (px)
Citation preview
CIS 251 – Lesson 4 CIS 251 – Lesson 4
File Management and The File Management and The InternetInternet
Rod RodriguesRod Rodrigues
File OrganizationFile Organization
Exploring Folders and FilesExploring Folders and Files
3 ways to copy/move/delete files or folders
Deleting a File or FolderDeleting a File or FolderOptions for deleting a file or folderOptions for deleting a file or folder– Delete its icon in My ComputerDelete its icon in My Computer– Click on the file icon and press the Delete Click on the file icon and press the Delete
buttonbutton– Drag its icon to the Recycle Bin on the desktopDrag its icon to the Recycle Bin on the desktop– Right-click, then click DeleteRight-click, then click Delete
Where does the file go?Where does the file go?
Other Copying and Moving Other Copying and Moving TechniquesTechniques
Other techniques for moving and Other techniques for moving and copying filescopying files– Cut, copy and pasteCut, copy and paste– Drag and dropDrag and drop– Right-click, drag and dropRight-click, drag and drop– Move to folder and copy to folderMove to folder and copy to folder– Compressed dataCompressed data
File TypesFile Types
Files in a Windows system usually Files in a Windows system usually end the a dot (“.”) followed by 2, 3, end the a dot (“.”) followed by 2, 3, or 4 letters. or 4 letters.
Examples: .com, .exe, .htm, doc, wpdExamples: .com, .exe, .htm, doc, wpd
These are called “extensions”These are called “extensions”
Sometimes it is crucial to SEE the Sometimes it is crucial to SEE the extensions.extensions.
Proprietary ExtensionsProprietary ExtensionsSoftware companies often register their Software companies often register their standard extensions as proprietary.standard extensions as proprietary.In this way you can identify which piece of In this way you can identify which piece of software was used to create the file by software was used to create the file by inspecting the extension.inspecting the extension.Underneath the hood, the SYSTEM uses Underneath the hood, the SYSTEM uses the extensions to “know” which program the extensions to “know” which program to launch in order to edit a file. This will to launch in order to edit a file. This will become more important when become more important when downloading files.downloading files.
Viewing ExtensionsViewing Extensions
Use My Computer and click on drive Use My Computer and click on drive c:c:
In the menu bar, choose In the menu bar, choose Tools > OptionsTools > Options
Uncheck “Hide extensions…”Uncheck “Hide extensions…”
My Documents on CampusMy Documents on Campus
When you are signed on with your When you are signed on with your username, everything you place in username, everything you place in My Documents follows you from My Documents follows you from computer to computercomputer to computer
BACKUP your work to another BACKUP your work to another mediummedium– All lab computers have USB portsAll lab computers have USB ports– Use Thumb Drives and lanyardsUse Thumb Drives and lanyards
The InternetThe Internet
World Wide WebWorld Wide Web
HTML
Browser
www.w3.org
Internet ExplorerInternet ExplorerComes with WindowsComes with Windows
Interfaces to System Registry, creating Interfaces to System Registry, creating problemsproblems
Alternate Browser: FirefoxAlternate Browser: Firefox
Integrated into WindowsIntegrated into Windows– Comes with the OSComes with the OS
Current Internet problemsCurrent Internet problems
Hijacking softwareHijacking software
PopupsPopups
Multiple programs running, using up Multiple programs running, using up system resources, slowing you down.system resources, slowing you down.
Remedy: Remedy: SpybotSpybot Search and Destroy Search and Destroy– Free for the downloadFree for the download
Remedy: Use FirefoxRemedy: Use Firefox– Lose some featuresLose some features
Current problemsCurrent problems
Viruses – common to all systems, all Viruses – common to all systems, all platformsplatforms
BUT Windows provides a wider target BUT Windows provides a wider target for hackers to become well known. for hackers to become well known.
Need Virus checkers Need Virus checkers – Norton Anti-VirusNorton Anti-Virus– McAfeeMcAfee
Internet TermsInternet Termsdial-up / Baud Ratedial-up / Baud RateDomain NameDomain NameFAQFAQHTMLHTMLNetiquetteNetiquetteSpammingSpammingEmoticonsEmoticonsPhishing – super dangerousPhishing – super dangeroushijackinghijacking
Browser BasicsBrowser Basics
The server/client structureThe server/client structureA client makes a request for data or services and a server processes the request.
Identify a hyperlink on a Web pageIdentify a hyperlink on a Web page
Hyperlinks are usually underlined and in a different color.
Clicking a hyperlink will instantly transfer you to that page.
Hyperlink to a downloadable fileHyperlink to a downloadable file
Sometimes the hyperlink leads NOT Sometimes the hyperlink leads NOT to another web page, but rather to a to another web page, but rather to a photograph, a graphic, a movie, etc.photograph, a graphic, a movie, etc.
The file extension on the file being The file extension on the file being downloaded tells your computer downloaded tells your computer which software to use to open it. which software to use to open it.
What if your system does not HAVE What if your system does not HAVE the software to open the file?the software to open the file?
ExampleExample
You have clicked on a hyperlink to a You have clicked on a hyperlink to a PDF file.PDF file.
Your system has no software to load Your system has no software to load such a thing.such a thing.
You get an error message from your You get an error message from your computer. computer.
What do you do?What do you do?
Domain Name ExampleDomain Name Example
Every machine on the internet has a Every machine on the internet has a unique numerical address such as unique numerical address such as 192.133.12.38 (that is the address for 192.133.12.38 (that is the address for Microsoft)Microsoft)
The DNS Registrar maps that numerical The DNS Registrar maps that numerical address to their alphabetic name which is address to their alphabetic name which is microsoft.com microsoft.com – Rhode Island College = Rhode Island College = 192.133.12.38192.133.12.38
– http://192.133.12.38http://192.133.12.38 = = www.ric.eduwww.ric.edu
Favorite Web sites can be Favorite Web sites can be saved and organizedsaved and organized
The URL’s of sites you want to revisit can be saved and organized into folders using the Favorites Explorer Bar.
Navigate the WebNavigate the Web
To navigate to a linked page without To navigate to a linked page without leaving the current pageleaving the current page– Right click on the link and choose Open Right click on the link and choose Open
in new window orin new window or– Press Ctrl+N and then click on the link in Press Ctrl+N and then click on the link in
the duplicate window that is displayedthe duplicate window that is displayed
Use the History BarUse the History Bar
Change your home pageChange your home page
CookiesCookies
Cookies are harmless text files stored Cookies are harmless text files stored on your computer that are intended on your computer that are intended to make life easier for you. to make life easier for you.
You can delete themYou can delete them
Temporary Internet FilesTemporary Internet Files
Also called the “cache”Also called the “cache”
All things viewed using a browser are All things viewed using a browser are actually viewed AFTER they have bee actually viewed AFTER they have bee downloaded to your computer. downloaded to your computer.
Without telling you, the browser Without telling you, the browser downloads all necessary files to view downloads all necessary files to view a page into a temporary folder.a page into a temporary folder.
Use A Search EngineUse A Search EngineMany browser home pages have a search engine (or multiple search engines) that is available directly from that page. One example can be seen in this figure, where the Google search engine is accessible for quick and easy searches.
Google has new features that block popups and fill out forms for you…
Identify the Explorer’s Identify the Explorer’s interface componentsinterface components
Change Security OptionsChange Security Options
Use the Address BarUse the Address Bar
You can go to a specific Web site by entering the URL into the Address bar and pressing the Enter key, or clicking the Go button.
Printing Pages from the ‘Net’Printing Pages from the ‘Net’
Bring up the page to be printed in Bring up the page to be printed in your browseryour browser– Click on the Print icon on the toolbarClick on the Print icon on the toolbar– Click on File > Print from the menu barClick on File > Print from the menu bar– If you only want a portion of the If you only want a portion of the
information on the page, select it by information on the page, select it by dragging over it. Then when you bring dragging over it. Then when you bring up the Print dialogue box, choose up the Print dialogue box, choose “Selection” instead of “All” and just the “Selection” instead of “All” and just the selected material will be printed.selected material will be printed.
CaveatCaveat
If you print a “web page” you may be If you print a “web page” you may be on a poorly formatted web page that on a poorly formatted web page that is 50 pages long or more. Printing a is 50 pages long or more. Printing a web page is not advisable. web page is not advisable.
Saving a web page on diskSaving a web page on disk
Bring up the page to be saved in Bring up the page to be saved in your browseryour browser– Click on File > Save AsClick on File > Save As
Caveat: If the owner of the page Caveat: If the owner of the page changes it, your saved version will be changes it, your saved version will be inaccurate.inaccurate.
Copying Information from the ‘Net’Copying Information from the ‘Net’
TextText– Information you want to use in a Information you want to use in a
document of your owndocument of your own
GraphicsGraphics– Pictures you want to use in your own Pictures you want to use in your own
documentdocument
Careful about Copyright InfringementCareful about Copyright Infringement
Saving a GraphicSaving a GraphicBring up the web page in your browser that has Bring up the web page in your browser that has the graphic you wish to savethe graphic you wish to save– Right Click on the graphicRight Click on the graphic– Select “Select “SSave picture as…”ave picture as…”
File Save CaveatFile Save CaveatYou are the only one who can “know” You are the only one who can “know” where you saved a document. where you saved a document. If you save it and can’t find it what If you save it and can’t find it what do you do?do you do?Plan A – Repeat the File/Save and Plan A – Repeat the File/Save and observe where the SYSTEM wants to observe where the SYSTEM wants to place it.place it.Plan B – Use System Search and Plan B – Use System Search and specify the date.specify the date.
Email BasicsEmail Basics
How Email worksHow Email works
This figure illustrates the path an e-mail message takes from creation to reception.
Email address componentsEmail address components
An email address consists of:An email address consists of:– A user name or login IDA user name or login ID– The “at” symbol (@)The “at” symbol (@)– The name of the email serverThe name of the email server
Free email accounts
at hotmail, yahoo,
juno, and others
The EndThe End
http://http://www.ric.eduwww.ric.edu/mrodrigues/mrodrigues