MS WORD
WORK HARD, DREAM BIG.
If you are a user of Facebook or considering using Facebook in the future, account security may be on your mind. With all the reports of companies getting hacked, information being stolen, as well as the whole personal identity theft issue, you may be left wondering whether Facebook is safe to use.
If you are a user of Facebook or considering using Facebook in the future, account security may be on your mind. With all the reports of companies getting hacked, information being stolen, as well as the whole personal identity theft issue, you may be left wondering whether Facebook is safe to use.
If you are a user of Facebook or considering using Facebook in the future, account security may be on your mind. With all the reports of companies getting hacked, information being stolen, as well as the whole personal identity theft issue, you may be left wondering whether Facebook is safe to use.
Tips for Designing Logos That Don’t Suck
So you’re designing a logo. It sounds like an easy enough task, right? Draw a circle, type in the company name and you’re done (I’ve literally heard a designer suggest that very process). Unfortunately, if you’re really worth the money the client is paying you, there’s a lot more to it than that.
There are a million people in the logo design industry today dishing out crappy logos in bulk for crowd sourcing sites. How do you as a serious professional stand out from the crowd and produce quality logos that don’t suck? Read on to find out.
Please Note: This article was originally published in August, 2012. Occasionally we re-publish articles that we feel are still relevant, and interesting for our readers
1. Use a Visual Double Entendre
Some of my favorite logos in the world utilize a technique that I like to call a visual double entendre, which is an overly fancy way to say that it has two pictures wrapped into one through clever interpretation of a concept or idea.
This logo takes on the shape of a thumbtack, which suggests “location” or “place,” but it also clearly looks like an upside down wine glass. Logo designs that use this technique come off as clever and memorable. Viewers love the little mind game that you’re playing and are more prone to appreciate a design because of it.
2. Color is Vitally Important
One of the most important considerations for logo design is the color palette. This is not a superficial decision, color carries meanings and communicates ideas.
Sometimes you’re pegged to the colors of a brand, but other times you’ll have the freedom to explore. I love the rich palette used in the Zion logo below.
The colors here grab you and pull you in, they bring life to the illustration and give further context to the shape of the landscape. That being said, remember that a good logo is versatile and will still function well in grayscale:
Beyond a grayscale version, I like to also provide clients with a true single color version, using only black and negative space. This would be a little tricky with the logo above, but definitely possible.
Always consider what it is that the logo will be used for and whether or not the various use cases require different versions.
3. Avoid the Cliché
Every few years or so, some new fads come along in logo design. I personally love to study design trends and you might even find me suggesting jumping onto a few bandwagons to keep up with the times, but with logos I just hate it when a bunch of designers use the same idea over and over.
The basic archetype above is being used again and again in logo design right now and it’s getting old fast. Why not use a design that you actually thought up yourself rather than ripping off what everyone else is doing?
“Why not use a design that you actually thought up yourself rather than ripping off what everyone else is doing?”
4. Make it Ownable
I don’t believe that “ownable” is a real word, but you nevertheless hear it quite a bit in marketing (marketers love to make up words). The concept is definitely an important one that ties closely to the previous tip.
Rather than following the herd and using a cliché design, you should instead strive for something that is uniquely recognizable. I’ve always appreciated the Evernote logo in this regard:
It’s really just an elephant head, which doesn’t sound like a very unique concept. However, the way it’s drawn with the curled trunk and page fold in the ear makes it instantly recognizable.
As you’re designing logos, consider whether or not your design is generic or unique. Is it likely that others will produce something similar? Remember, your first idea is typically your most generic (it’s also everyone else’s first idea). Try filling a notebook page or two with some rough sketches before choosing which ideas to pursue further.
5. Everybody Loves Custom Type
While we’re on the subject of being unique, there’s almost nothing that can give your logo a unique feel quite like some awesome custom lettering.
Too often we see logo design as simply a trip to the font menu to see which typeface makes the company name look best. If someone is paying you to “design” their logo, they probably expect you to put a little more effort into it.
“Too often we see logo design as simply a trip to the font menu to see which typeface makes the company name look best.”
Custom type helps ensure that your unique logo will stay that way. Lowlife designers will rip off your work in a heartbeat if they discover which typeface you’re using, but it takes some real skill to mimic custom hand-drawn type!
Keep in mind though that if your logo is famous enough, people will always try to rip it off. This certainly holds true for my favorite script logo:
The awesome Coca-Cola script has been stolen countless times in awkward parodies throughout the last few decades
6. Keep it Simple Stupid
Let’s face it, not everyone can bust out beautiful, hand-drawn script on a whim. Just because you’re a designer doesn’t mean you’re an awesome illustrator or typographer (though it helps). If you fit this description, fear not, there’s nothing preventing you from making awesome logos.
In this situation, remember these four powerful words: keep it simple stupid! Simple but powerful logos permeate the business world and always prove to be the best icons for standing the test of time.
In considering how to construct one of these types of logos, let’s discuss the Apple logo. The silhouette of an apple is nothing special or memorable:
It’s that missing bite that takes it to the next level. It gives the logo character, makes it unique, and drives the meaning deeper (computers and bytes, get it?). Without the bite, the apple is boring, with it, the apple is suddenly iconic.
Always think about how you can go that extra mile and turn your boring logos into unmistakable brand marks.
7. Consider Proportion & Symmetry
Some people can get carried away with discussions of proportion and symmetry (see the new Pepsi logo pitch), but if we strip out the crazy, there’s still some important lessons here. Consider the new Twitter logo as an example:
Here circles aren’t used to convince you of some strange cosmic tale that makes no sense, they’re simply used as a guide to create a well balanced logo with consistent curves and arcs.
8. Think About Negative Space
Along the same vein as a double entendre is the age old trick of utilizing the negative space in a logo in some clever way. The industry standard example for this technique is the FedEx logo and its hidden arrow.
Don’t see it yet? Keep looking, it’s there. That’s what I love about this logo, the use of negative space is so subtle. Most people in the U.S. see the FedEx logo daily or weekly for years as it drives by on the side of countless trucks and they never even notice the arrow.
Logopond is chock full of great logo designs that utilize negative space in a cool way. Check out the example below, which blends together the idea of bull horns and a wine glass.
9. Passive vs. Active
One interesting facet of logo design that I’ve been considering a lot lately is the concept of instilling motion or a sense of activity into a logo. This isn’t always appropriate (such as with the Apple logo), but sometimes it can really give a logo the boost it needs, both from a visual and conceptual standpoint.
As an example, let’s look again to the Twitter logo. Way back in the early days, the bird went from sitting perched and passive to becoming active and taking flight.
In the most recent iteration, they took this concept even further by pointing the bird in an upward direction to indicate that it’s climbing into the air rather than floating along the same old trajectory.
A sense of motion is especially important when it comes to logos with mascots. The image of the marlin below doesn’t depict the fish merely lying still, instead it’s leaping into the air in a victorious pose
This concept even extends to typically inanimate objects. Consider how much better the logo below portrays the concept of “rough house” by instilling a sense of motion.
10. Know What it Means
Every good logo has a story. Far beyond simply a pretty sketch, strong logos are filled with meaning, both obvious and hidden. We discussed this in several cases above. The FedEx logo’s arrow indicates moving forward and making deliveries, the Apple logo has a “byte” missing, and the Twitter bird is flying in an upward trajectory.
“It’s great when you as a designer can show a client how much thought and reasoning went into the logo that you produced for them.”
Half the time I wonder if logo designers don’t come up with the meaning after the logo is already produced, but regardless, it’s great when you as a designer can show a client how much thought and reasoning went into the logo that you produced for them.
Clients might think that all they want is something fresh and cool, but if you instead provide a logo that ties into the company’s core values and mission, you’ll blow their minds and they’ll love you for it.
Do Your Logos Suck?
Now that you’ve read our tips for designing logos that don’t suck, leave a comment below and let us know what you think of your own work in this area.
Are you an awesome logo designer or is it something that you struggle with? Which of the tips above are useful to you and what tips can you offer to other designers?
Computer
application buying tip
Purchasing a software application or program can be a big
consideration, especially when purchasing advanced and usually expensive
programs such as Microsoft Office or Adobe Photoshop. When considering
purchasing these programs it is important that you or your staff be familiar
with the program and are sure it's going to be capable of what you need it to
do.
On this page we've listed different considerations to think
about before buying a computer software application.
Competition
Before buying any application make sure there is not a competing
program that may be cheaper or even free. If available and something that's
capable of doing what you want it to do this could save you hundreds of
dollars.
A good example of such a program is OpenOffice and
Corel WordPerfect that would be a competitor to Microsoft Word. Both programs
are an excellent choice for a word processor but can be a considerable price
difference. In the case of OpenOffice, it's 100% free.
Documentation
Make sure proper documentation is included. Many programs today
will include on-line documentation that is more than sufficient. However, it is
also useful to obtain a manual or user guide for the software program or
application.
Licenses
If you are a company who plans on having software programs used
by its employees (more than one person), you need to consider licensing
options. It is required that for each computer a product is installed onto that
it have a software license. If a company purchases the program and shares it
with all its employees without the proper licensing, this would be illegal and
can cause your company to face a criminal lawsuit.
Price
Look at your overall price and shop around. Because a software
price can change often, you can sometimes save hundreds of dollars on expensive
software. If possible, do not purchase directly through the company; many
times, the company's price doubles a retailers price.
Be cautious of OEM software.
Many resellers will sell a program as OEM, which requires you buy a computer or
motherboard. OEM software is software that is included with large
manufacturers' computers and only includes either just a CD or a slim manual
and CD. This is not what you would find at a retail store. This option is not a
bad option, it is only important that you are aware of what you are getting.
Package
Look at the overall software package. How many CDs or diskettes
are included, what inserts and documentation is included, and is there any
bonus or extra software included?
Media
Today, the majority of software is included on CDs and DVDs.
When looking at a program, make sure you have an acceptable drive that's able
to read the media, While not common today, an example of why this is important
is it's better to receive one CD instead of 32 floppy diskettes.
keyboard shortcuts everyone should know
Using keyboard shortcuts can greatly increase your productivity,
reduce repetitive strain, and help keep you focused. For example, to copy text,
you can highlight text and press the Ctrl+C shortcut. The shortcut is faster
than moving your hands from the keyboard, highlighting with the mouse, choosing
copy from the file menu, and then returning to the keyboard.
1.
Ctrl+C or Ctrl+Insert and Ctrl+X
Both Ctrl+C and Ctrl+Insert will
copy highlighted text or a selected item. If you want
to cut an item instead of copying it, press Ctrl+X.
This action removes the text or item and stores it in the clipboard for you,
rather than just copying it to the clipboard while leaving the original behind.
Apple computer users can substitute the Ctrl key for the command
(cmd) key on their computers. For example, pressing Cmd + C copies
highlighted text.
2.
Ctrl+V or Shift+Insert
Both the Ctrl+V and Shift+Insert will paste the
text or object that's stored in the clipboard.
On Apple computers, use Cmd + V instead.
3.
Ctrl+Z and Ctrl+Y
Pressing Ctrl+Z will undo any
change. For example, if you cut text, pressing this key combination will undo
the cut. These shortcuts can also be pressed multiple times to undo or redo
multiple changes. Pressing Ctrl+Y would redo the
undo.
On Apple computers, use Cmd + Z and Cmd
+ Y to undo and redo.
4.
Ctrl+F
Pressing Ctrl+F opens the Find field,
which allows you to search the text currently displayed in any program that
supports it. For example, Ctrl+F can be used in your Internet browser to
find text on the current page. Press Ctrl+F now to open the Find in your
browser and search for "shortcut" to display each time shortcut is
mentioned on this page.
On Apple computers, use Cmd + F to find.
5.
Alt+Tab or Ctrl+Tab
Pressing Alt+Tab switches between open programs
moving forward. For example, if you have your browser window open and other
programs running in the background press and hold Alt and then press the tab
key to cycle through each open program.
On Apple computers instead of using the Alt key use the Command
(Cmd) key. For Example, Cmd + Tab to switch between open
programs.
Bonus Tip: Press Ctrl+Tab to
switch between tabs in a program. For example, if you have multiple tabs open
in your Internet browser, press Ctrl+Tab to switch between them.
Bonus Tip: Adding the Shift
key to Alt+Tab or Ctrl+Tab moves backward. For example, if you
are pressing Alt+Tab and pass the program you want to use, press Alt+Shift+Tab to
move back to that program.
Bonus Tip: Windows Vista, 7, 8, and 10 users can
also press the Windows Key + Tab to switch through
open programs in a full screenshot of the window.
Know your Internet browser shortcuts
There are dozens of different shortcut keys that can be used
with Internet browsers. Below are a few of our top suggested Internet browser
shortcuts.
·
Press Alt+D or Ctrl+L to
move the cursor into the address bar.
·
Hold down the Ctrl
key and press the + or - to increase and decrease the size of
text. Ctrl+0 will reset the text.
·
Press the backspace
key or press Alt key + left arrow to go back a page.
·
Press F5 or Ctrl+R to
refresh or reload a web page.
·
Press F11 to
make the Internet browser screen full screen. Press F11 again to return to the
normal view.
·
Press Ctrl+B to
open your Internet bookmarks.
·
Press Ctrl+F to
open the find box to search for text within the web page you are reading.
About Excell
Codenamed Odyssey, Excel is a
software program from Microsoft that is part of the
Microsoft Office suite of software programs. Developed by Microsoft and first
released on September 30, 1985, Excel is capable of creating and editing spreadsheets that
are saved with a .xls or .xlsx file extension. General uses of
Excel include cell-based calculation, pivot tables, and
various graphing tools. For instance, with an Excel spreadsheet, you could
create a monthly budget, track business expenses, or sort and organize large amounts
of data.
Unlike a word processor, such as Microsoft
Word, the Excel documents consist of columns and rows of
data, made up of individual cells. Each
of these cells can contain either text or numerical values that can be
calculated using formulas.
Excel overview
Below is an example of Microsoft Excel with each of its major
sections highlighted. See the formula bar, cell, column, row,
or sheet tab links for further information about each of these
sections.
How can Excel be formatted?
Each of the rows, columns, and cells can be modified in many
ways, including the background color, number or date format, size, text font,
layout, etc. In our above example, you can see that the first row (row 1) has a
blue background, bold text, and each cell has its text centered.
How many Sheets are there in an Excel Workbook?
By default, there are three sheets in a new workbook,
though users can create as many as their computer memory allows.
Top 10 steps in writing an effective e-mail
Keep your e-mails short
Less is more. The shorter you can keep your e-mail while still relaying your message or question the better. At most we suggest no more than three paragraphs of text.
Make the subject line clear and easy to read
The subject of the e-mail should contain enough information to let the recipient know the contents of an e-mail.
Make the e-mail personal
Always include the name or alias of the e-mail recipient. If you want the e-mail to be even more personal include your real name in the e-mail as well.
Watch your spelling and grammar
E-mail with spelling and other grammatical errors tells the reader it's not that important. Always spell check, keep the below suggestions in mind, and proof read the e-mail before sending it out.
- Always use proper punctuation and capitalization.
- Never use shorthand or acronyms people don't understand.
- Do not WRITE IN ALL CAPS; it gives the impression you're YELLING.
Don't forward jokes and other e-mails
While you may find a joke funny or find an e-mail interesting or disturbing most people don't enjoy getting forwarded e-mails. Never forward e-mails to all your friends' and family.
Remember e-mail isn't private
Realize that e-mail is not encrypted and can be forwarded to other people. Never send personal or company confidential data in e-mail.
Reply to e-mails effectively
When replying to e-mails keep the below suggestions in mind.
- Try to reply to e-mails as quickly as possible.
- Use the "Reply to all" option cautiously. Really make sure if there are multiple recipients in the CC that everyone really needs to see your reply.
- Keep the e-mail thread (previous messages) in the body of the message and your response at the top. Keeping the previous message helps the reader remember the e-mail discussion.
- Do not over use e-mail program options such as "high-priority", "automatic replies", "read receipts", etc.
Keep the CC and BCC to a minimum
When using CC to send to e-mail to multiple recipients try to keep the list to a minimum. Often when someone sees more than four in the list they will disregard it as not important or think one of the other recipients are going to take care of the e-mail.
Also, use BCC instead of CC when it's not important for the e-mail recipients to see whom the e-mail was sent to and to help keep everyone's e-mail addresses private.
Use plaintext instead of HTML
Always send your e-mails as plaintext. It may not be as pretty but it does allow the e-mail to be read easier and is often less distracting.
Use a clean signature
Signatures can be an effective method of displaying your contact information at the bottom of e-mails. However, follow e-mail signature etiquette when creating a signature.
How do I download or save a YouTube video to my computer?
YouTube has been designed to only allow users to watch and view videos on their website. Many users want to download or save their favorite YouTube videos to their computer so they can watch them without being connected to the Internet or on other devices. Below are the steps required for downloading and watching YouTube videos on your computer for free.
Note: This page only provides instructions for downloading or saving a YouTube video to your computer. Instructions for saving a video as audio is on our saving only the audio of a YouTube video to an MP3 file page.
Tip: Unless you plan on transferring the video from your computer to your smartphone or tablet after it has been downloaded, we suggest using our how to download a YouTube video on a smartphone or tablet steps for these devices.
Saving YouTube video as a video file on your computer
Today, many websites that allow you to enter the URL of the video you want to save to your computer and get a link to download the video file. Below is a simple three-step process to download any YouTube video.
Note: These steps may not work if at a school or job that's blocking YouTube.
1. First, go to the YouTube page containing the video you want to download. When you've found the page, press Ctrl+L on your keyboard to highlight the text in the address bar, and then Ctrl+C to copy the Internet address. If you are on an Apple computer substitute Ctrl with the Command key.
2. Once this address has been copied, paste that address into the text field below by clicking inside the box and pressing Ctrl+V on your keyboard. Then, click the Download Video button.
Note: If the text field or Download Video button above is not visible or clickable, you can also type savefrom.net/ in front of any YouTube address (URL).
3. Click the link next to "Fine with Low Quality?" that says Download it Free.
4. If done properly, a new window will appear displaying a preview of the video (as shown below), along with a green Download button and the video format. The default format for downloading the video is either Low or Medium format.
Click the down arrow on the right-hand side of the Download box and click on the More option in that drop-down list to see additional video formats, such as FLV, 3GP, and WebM. Select the video format you want and click the green Download button.
Note: A Subtitles option may be available in the list when clicking on the "More" option. If subtitles are available for the YouTube video you are downloading, you can choose to include subtitles in the downloaded YouTube video.
After the file has been downloaded, it will be available in your downloads folder.
What about a private video?
You cannot download private videos because the YouTube download service would not have the necessary rights to access the video.
I still can't download a video
If after following the above steps, you do not get a preview like our example, make sure that the link you are using works by opening the page in a new window. Once verified as working, try the above steps again. If the steps continue to not work, try refreshing this page by pressing the F5 key on your keyboard and following the above steps again. If that does not work, try one of the YouTube download sites below. Or, use the link below for installing a utility to download videos on Windows, Linux, and macOS operating systems.
It is only saving as audio and not video
Make sure you are choosing the "MP4 360p" or "MP4 480p" option from the download link. If you choose "Audio MP4 128", it only downloads the audio and not the video. If you did choose the right download link to download the file, it is very likely that the player you are using does not have the necessary codec for video files. Download the free VLC player for your computer and try to play the video file from within VLC and not the player you are currently using.
YouTube bookmarklet, browser add-ons, and extensions
If you plan on downloading several videos, you can also use the Computer Hope YouTube bookmarklet. See our bookmarklet page for more information about bookmarklets. There are also browser add-ons for Firefox and extensions for Google Chrome to download videos from video sites.
What are the F1 through F12 keys?
Commonly known as function keys on a computer keyboard, F1 through F12 may have a variety of different uses or no use at all. The operating system installed on the computer and the software program that is currently open dictates how each of these keys operate. A program is capable of not only using each of the function keys, but also combining the function keys with the Alt or Ctrl key. For example, Microsoft Windows users can press Alt+F4 to close the currently active program.
F1
- Almost always used as the help key, almost every program opens a help screen when this key is pressed.
- Enter CMOS Setup.
- Windows Key + F1 would open the Microsoft Windows help and support center.
- Open the Task Pane.
F2
- In Windows renames a highlighted icon, file, or folder in all versions of Windows.
- Alt+Ctrl+F2 opens document window in Microsoft Word.
- Ctrl+F2 displays the print preview window in Microsoft Word.
- Quickly rename a selected file or folder.
- Enter CMOS Setup.
F3
- Often opens a search feature for many programs including Microsoft Windows when at the Windows Desktop.
- In MS-DOS or Windows command line F3 will repeat the last command.
- Shift+F3 will change the text in Microsoft Word from upper to lower case or a capital letter at the beginning of every word.
- Windows Key + F3 opens the Advanced find window in Microsoft Outlook.
- In Windows Explorer start the search function.
- Open Mission Control on an Apple computer running macOS X.
F4
- Open find window in Windows 95 to XP.
- Open the address bar in Windows Explorer and Internet Explorer.
- Repeat the last action performed (Word 2000+).
- Alt+F4 closes the program window currently active in Microsoft Windows.
- Ctrl+F4 closes the open window within the current active window in Microsoft Windows.
F5
- In all modern Internet browsers, pressing F5 will refresh or reload the page or document window.
- Ctrl+F5 forces a complete refresh of the web page, clearing the cache and downloading all contents of the page again
- Refresh the list of contents in a folder.
- Open the find, replace, and go to window in Microsoft Word.
- Starts a slideshow in PowerPoint.
F6
- Move the cursor to the address bar in Internet Explorer, Mozilla Firefox, and most other Internet browsers.
- Ctrl+Shift+F6 opens to another open Microsoft Word document.
- Reduce laptop speaker volume (on some laptops).
F7
- Commonly used to spell check and grammar check a document in Microsoft programs such as Microsoft Word, Outlook, etc.
- Shift+F7 runs a Thesaurus check on the word highlighted.
- Turns on Caret browsing in Mozilla Firefox.
- Increase laptop speaker volume (on some laptops).
F8
- Function key used to enter the Windows startup menu, commonly used to access Windows Safe Mode.
- Used by some computers to access the Windows recovery system, but may require a Windows installation CD.
- Displays a thumbnail image for all workspaces in macOS.
F9
- Refresh document in Microsoft Word.
- Send and receive e-mail in Microsoft Outlook.
- Opens the Measurements toolbar in Quark 5.0.
- Reduce laptop screen brightness (on some laptops).
- With macOS 10.3 or later, displays a thumbnail for each window in a single workspace.
- Using the Fn key and F9 at the same time opens Mission Control on an Apple computer running macOS X.
F10
- In Microsoft Windows activates the menu bar of an open application.
- Shift+F10 is the same as right-clicking on a highlighted icon, file, or Internet link.
- Access the hidden recovery partition on Compaq, HP, and Sony computers.
- Enter CMOS Setup on some computers.
- Increase laptop screen brightness (on some laptops)
- With macOS 10.3 or later, shows all open Windows for the active program.
F11
- Enter and exit fullscreen mode in all modern Internet browsers.
- Ctrl+F11 as computer is starting to access the hidden recovery partition on many Dell computers.
- Access the hidden recovery partition on eMachines, Gateway, and Lenovo computers.
- With macOS 10.4 or later, hides all open windows and shows the Desktop.
F12
- Open the Save as window in Microsoft Word.
- Ctrl+F12 opens a document In Word.
- Shift+F12 saves the Microsoft Word document (like Ctrl+S).
- Ctrl+Shift+F12 prints a document in Microsoft Word.
- Preview a page in Microsoft Expression Web.
- Open Firebug or browser debug tool.
- With an Apple running macOS 10.4 or later, F12 shows or hides the Dashboard.
- Access the list of bootable devices on a computer at startup, allowing you to select a different device to boot from (hard drive, CD or DVD drive, floppy drive, USB drive, and network).
F13 - F15
- On newer Apple keyboards the F13, F14, and F15 may be shown in place of the Print Screen key, Scroll lock key, and Pause key.
F16 - F19
- On newer Apple keyboards the F16, F17, F18, and F19 keys are above the number pad.
F13 - F24
- Early IBM computers also had keyboards with F13 through F24 keys. However, because these keyboards are no longer used, they are not listed on this page.
General Computer Cleaning Tips
Below is a listing of suggestions to follow when cleaning any computer components or peripherals as well as tips to help keep a computer clean.
- Never spray or squirt any liquid onto any computer component. If a spray is needed, spray the liquid onto a cloth.
- You can use a vacuum to suck up dirt, dust, or hair around the computer. However, do not use a vacuum inside your computer as it generates static electricity that can damage your computer. If you need to use a vacuum inside your computer, use a portable battery powered vacuum or try compressed air.
- When cleaning a component or the computer, turn it off before cleaning.
- Be cautious when using any cleaning solvents; some people have allergic reactions to chemicals in cleaning solvents, and some solvents can even damage the case. Try always to use water or a highly diluted solvent.
- When cleaning, be careful to not accidentally adjust any knobs or controls. Also, when cleaning the back of the computer, if anything is connected make sure not to disconnect the plugs.
- When cleaning fans, especially smaller fans, hold the fan or place something in-between the fan blades to prevent it from spinning. Spraying compressed air into a fan or cleaning a fan with a vacuum may cause damage or generate a back voltage.
- Never eat or drink around the computer.
- Limit smoking around the computer.
See available drives in Microsoft Windows
Microsoft Windows users can identify which drives Windows has detected by opening File Explorer, My Computer (called "This PC" in Windows 8 and Windows 10), or pressing the Windows key + E. The picture to the right is an example of My Computer. As you can see in this example, three different drive types are listed.
Tip: In Windows 7 and earlier versions, you can access My Computer (Computer) by double-clicking the icon on the desktop or by opening the Start Menu and selecting My Computer or Computer, depending on the version of Windows.
Tip: In Windows 8 and Windows 10, press Windows key + E to open the File Explorer, then click on This PC in the left navigation pane.
3 1/2 Floppy (A:)
If the computer has a floppy disk drive, this drive will be visible and is usually set as the A: drive. If any floppy diskette is in the computer and the A: drive is opened, its contents will be shown.
Local Disk (C:), New Volume (D:), and New Volume (E:)
Next, in this example, the C:, D: and E: are all hard drives or hard drive partitions on the computer. Most computers commonly have just a C: drive. The hard drive is the primary location where all files are stored on your computer.
Compact Disc (F:)
Finally, the F: drive in this example is the optical disc drive installed in the computer. In most situations, the disc drive will be the last drive letter. If a disc is in the drive, the contents of that disc will be shown if you double-click the drive icon.
Windows 3.x users
Windows 3.0, 3.1, and 3.11 users can open drives through the Windows File Manager. Within the File Manager, click the drive icons shown above the folder and files. By default, the C: drive will be open, if you want to move to the floppy disk drive, click the A: drive icon, or click the D: or the CD-ROM drive icon if you want to open the CD drive.
See drives in MS-DOS and the Windows command line
Windows Vista, 7, 8, and 10 command line users
If you're using Windows Vista, 7, or 8, use the wmic command at the Windows command line to view available drives on the computer. At the prompt, type the below command.
wmic logicaldisk get name
- See the wmic command page for further information and examples on this command.
Other Windows command line and MS-DOS version users
Unfortunately, there is no easy way to list all available drives on the computer through the MS-DOS prompt with one command. Below are different recommendations for viewing drives.
Change drive letter
Change the drive to an alternate drive letter to determine if a drive is available and ready if no error message is received.
Fdisk
If you're running a version of MS-DOS or Windows that supports fdisk, running the fdisk command allows you to view how the hard drives are setup and configured on the computer.
- See the fdisk command page for additional information about this command.
vol
Running the vol command on a drive displays the drive's label and serial number if available. This command allows you to see what drives are detected.
- See the vol command page for additional information and help with this command.
How do I password protect my files and folders in Windows?
Because most versions of Windows do not include a method of password protecting your files and folders, this page provides steps on encrypting files and folders instead. To password protect your files and folders in Windows, you need to use a third-party program.
Tip: Before password protecting any document, you may want to create a backup of the non-password protected files and folder in case you forget the password in the future.
- Microsoft Windows Vista, 7, 8, and 10 users
- Microsoft Windows XP Professional users
- Microsoft Windows XP Home users
- Other security solutions for protecting your files and folders in Windows
- How to password protect an Excel file
- Things to remember when encrypting or password protecting files and folders
Microsoft Windows Vista, 7, 8, and 10 users
Unfortunately, Windows Vista, Windows 7, and Windows 8 do not provide any features for password protecting files or folders. You need to use a third-party software program to accomplish this.
If you want to encrypt a file or folder, this can be done by following these steps:
- Select the file or folder you want to encrypt.
- Right-click the file or folder and select Properties.
- On the General tab, click the Advanced button.
- Check the box for the "Encrypt contents to secure data" option.
- Click Apply and then OK.
Note: If the "Encrypt contents to secure data" option is not selectable and grayed out or you do not see the option at all, you likely have a Home edition of Windows, which does not support this feature. It is also possible that the hard drive where the files are located is not formatted as NTFS, as this is a requirement for the encryption feature.
Microsoft Windows XP Professional users
The steps below for encrypting the files on Windows XP Professional apply to users who are using a computer that has two or more accounts. If you are using a single account, see the other security solutions section.
- Select the file or folder you want to encrypt.
- Right-click the file or folder and click Properties.
- On the General tab, click the Advanced button.
- Check "Encrypt contents to secure data" option.
- Click Apply and then OK.
Note: You will not be prompted to enter a password when encrypting a folder in Windows XP Pro. However, other user accounts on your computer will not have access to files contained in the encrypted folder.
Encrypt contents to secure data is grayed out
If you are using the Home edition of Microsoft Windows XP, see the Windows XP Home steps.
Show "Encrypt" on the context menu
The newest version of TweakUI also enables you to show the Encrypt option in the context menu. To do this, follow the steps below.
- Open TweakUI.
- In the TweakUI window, select Explorer.
- In the right side of the window under Settings, locate Show 'Encrypt' on context menu and check the box. This option should be below Prefix 'shortcut to' on new shortcuts and above Show 'View workgroup computers' in NetPlaces.
- I'm missing Show "Encrypt" on the context menu in TweakUI.
Microsoft Windows XP Home users
- Select the file or folder you want to encrypt.
- Right-click the file or folder and click Properties.
- Click the Sharing tab.
- Check the box Make this folder private
- Click Apply and then OK.
Make this folder private is grayed out
For this option to work on Microsoft Windows XP Home edition, you must meet the below requirements.
- The hard drive must be formatted in NTFS and not FAT32 File System.
- The folder you are attempting to encrypt is your personal folder. For example, if your name is Bob, you must encrypt the following folder, or a folder within it:
C:\Documents and Settings\Bob\
You cannot encrypt any folders outside of this folder. If you want to encrypt folders outside of this folder, see the other security solutions section below.
Other security solutions for protecting your files and folders in Windows
File and folders not frequently used - An easy way to password protect files is to create an archive of the files using a compression tool. When the archive is created, you can encrypt the contents by specifying a password.
Windows ME and Windows XP users - Windows ME and Windows XP come with their own compression utility. This utility can also be used to compress and password protect files.
Windows Vista and Windows 7 users - Windows Vista and Windows 7 also include a compression utility. However, password protection for the compressed files is not possible without the use of a third-party software program.
Tip: When a file is compressed, users can still view a listing of the files in the compressed file. If you want both your file names and the contents to be hidden, move all the files into a single folder and password protect that folder.
File and folders frequently used or accessed
If you need to password protect or encrypt data you frequently use, you need to install a third-party program that allows you to protect your files and folders. Below are some free and commercial solutions.
- 7-Zip - A free file and folder zipping utility, which also includes the ability to password protect zipped files and folders.
- AxCrypt - An excellent free encryption utility that enables users to encrypt all files within a folder and not allow those files to be viewed unless a passphrase (password) is known.
- Folder Guard - A commercial version of a password protection software that enables you to password protect files, folders, and other Windows resources.
- Protected Folder- For a small fee, it's an excellent software program that enables you to password protect folders.
Things to remember when encrypting or password protecting files and folders
- There is no such thing as a 100% protected file. There are numerous tools, utilities, and instructions for how to break encryption and passwords on files. However, the protection methods listed above will protect your files from the majority of users who may encounter them. If you are working with really sensitive data, we suggest a commercial product for protecting your files and data.
- Even though a file or folder may be password protected, it still can be deleted (unless the program supports the ability to protect files from being deleted). Always remember to backup all your files, even those protected by passwords.
- If you forget the password, unless you're willing to spend the time attempting to break it or pay someone else to break the password, all the data in the file or folder will be lost. Thus, it is important to backup a copy of the non-password protected files or folders, just in case.
Is Facebook safe?
Updated: 04/26/2017 by Computer Hope
If you are a user of Facebook or considering using Facebook in the future, account security may be on your mind. With all the reports of companies getting hacked, information being stolen, as well as the whole personal identity theft issue, you may be left wondering whether Facebook is safe to use.
Overall, Facebook as a website is a pretty safe place. There is built-in security that helps to protect you and your information. One primary level of security that Facebook uses is called Secure Socket Layer (SSL). In a nutshell, this type of security encrypts (protects) any data transmitted while using Facebook, from login credentials to chat conversations.
The Facebook servers, where you data is stored and protected, have their own security built-in as well. There are anti-intrusion systems in place, to help thwart hackers from getting in, or intruding, and stealing your data. They also employ anti-virus & anti-spyware programs to keep their systems clean and free of security threats that can arise from virus & spyware infections. Basically, Facebook works hard to keep your data locked up and safe from others who might attempt to use your information in a threatening or illegal manner.
There are also ways that you can help protect yourself and your data while on Facebook, beyond what Facebook already does to protect you.
When you log in to Facebook, you provide a password. This password is something you have complete control over and can make it difficult for others to gain access to your account. By using combinations of capital letters, lowercase letters, and numbers, you can create a password that would be difficult to figure out. Your goal is to make your password something that only you could figure out.
You also should never give out your password to anyone, not even someone you know. That password is for you and you only. Keep it close and help keep your account safe.
Be familiar with phishing techniques. For example, if you receive an email that looks like it is from Facebook, asking for your username, password, or any personal information, delete it immediately. Facebook never asks you for this information. Emails that ask for this kind of information are common ways for other people to gain access to your account.
Another way to help keep your account safe is to make sure that your Internet browser, browser plugins, and operating system are up-to-date. Doing so will ensure that you have the most current security features on your system.
Lastly, it's important that you have an anti-virus and anti-spyware program installed on your computer. Keep this program updated at all times, which helps prevent virus and spyware infections, greatly reducing the chances of your personal information and passwords from being stolen.
Tip: Regardless of Facebook's default level of security, you should be vigilant about protecting your privacy. If you're a Facebook member, make sure to review your account privacy settings and adjust them if necessary. We recommend that your settings allow only your friends (not friends of friends) to view your profile, pictures, and information.
Is Facebook safe?
Updated: 04/26/2017 by Computer Hope
If you are a user of Facebook or considering using Facebook in the future, account security may be on your mind. With all the reports of companies getting hacked, information being stolen, as well as the whole personal identity theft issue, you may be left wondering whether Facebook is safe to use.
Overall, Facebook as a website is a pretty safe place. There is built-in security that helps to protect you and your information. One primary level of security that Facebook uses is called Secure Socket Layer (SSL). In a nutshell, this type of security encrypts (protects) any data transmitted while using Facebook, from login credentials to chat conversations.
The Facebook servers, where you data is stored and protected, have their own security built-in as well. There are anti-intrusion systems in place, to help thwart hackers from getting in, or intruding, and stealing your data. They also employ anti-virus & anti-spyware programs to keep their systems clean and free of security threats that can arise from virus & spyware infections. Basically, Facebook works hard to keep your data locked up and safe from others who might attempt to use your information in a threatening or illegal manner.
There are also ways that you can help protect yourself and your data while on Facebook, beyond what Facebook already does to protect you.
When you log in to Facebook, you provide a password. This password is something you have complete control over and can make it difficult for others to gain access to your account. By using combinations of capital letters, lowercase letters, and numbers, you can create a password that would be difficult to figure out. Your goal is to make your password something that only you could figure out.
You also should never give out your password to anyone, not even someone you know. That password is for you and you only. Keep it close and help keep your account safe.
Be familiar with phishing techniques. For example, if you receive an email that looks like it is from Facebook, asking for your username, password, or any personal information, delete it immediately. Facebook never asks you for this information. Emails that ask for this kind of information are common ways for other people to gain access to your account.
Another way to help keep your account safe is to make sure that your Internet browser, browser plugins, and operating system are up-to-date. Doing so will ensure that you have the most current security features on your system.
Lastly, it's important that you have an anti-virus and anti-spyware program installed on your computer. Keep this program updated at all times, which helps prevent virus and spyware infections, greatly reducing the chances of your personal information and passwords from being stolen.
Tip: Regardless of Facebook's default level of security, you should be vigilant about protecting your privacy. If you're a Facebook member, make sure to review your account privacy settings and adjust them if necessary. We recommend that your settings allow only your friends (not friends of friends) to view your profile, pictures, and information.
Is Facebook safe?
If you are a user of Facebook or considering using Facebook in the future, account security may be on your mind. With all the reports of companies getting hacked, information being stolen, as well as the whole personal identity theft issue, you may be left wondering whether Facebook is safe to use.
Overall, Facebook as a website is a pretty safe place. There is built-in security that helps to protect you and your information. One primary level of security that Facebook uses is called Secure Socket Layer (SSL). In a nutshell, this type of security encrypts (protects) any data transmitted while using Facebook, from login credentials to chat conversations.
The Facebook servers, where you data is stored and protected, have their own security built-in as well. There are anti-intrusion systems in place, to help thwart hackers from getting in, or intruding, and stealing your data. They also employ anti-virus & anti-spyware programs to keep their systems clean and free of security threats that can arise from virus & spyware infections. Basically, Facebook works hard to keep your data locked up and safe from others who might attempt to use your information in a threatening or illegal manner.
There are also ways that you can help protect yourself and your data while on Facebook, beyond what Facebook already does to protect you.
When you log in to Facebook, you provide a password. This password is something you have complete control over and can make it difficult for others to gain access to your account. By using combinations of capital letters, lowercase letters, and numbers, you can create a password that would be difficult to figure out. Your goal is to make your password something that only you could figure out.
You also should never give out your password to anyone, not even someone you know. That password is for you and you only. Keep it close and help keep your account safe.
- Information on passwords with good and bad password examples.
Be familiar with phishing techniques. For example, if you receive an email that looks like it is from Facebook, asking for your username, password, or any personal information, delete it immediately. Facebook never asks you for this information. Emails that ask for this kind of information are common ways for other people to gain access to your account.
Another way to help keep your account safe is to make sure that your Internet browser, browser plugins, and operating system are up-to-date. Doing so will ensure that you have the most current security features on your system.
Lastly, it's important that you have an anti-virus and anti-spyware program installed on your computer. Keep this program updated at all times, which helps prevent virus and spyware infections, greatly reducing the chances of your personal information and passwords from being stolen.
Tip: Regardless of Facebook's default level of security, you should be vigilant about protecting your privacy. If you're a Facebook member, make sure to review your account privacy settings and adjust them if necessary. We recommend that your settings allow only your friends (not friends of friends) to view your profile, pictures, and information.
First developed by Tim Berners-Lee in 1990, HTML is short for HyperText Markup Language. HTML is used to create electronic documents (called pages) that are displayed on the World Wide Web. Each page contains a series of connections to other pages called hyperlinks. Every web page you see on the Internet is written using one version of HTML code or another.
HTML
First developed by Tim Berners-Lee in 1990, HTML is short for HyperText Markup Language. HTML is used to create electronic documents (called pages) that are displayed on the World Wide Web. Each page contains a series of connections to other pages called hyperlinks. Every web page you see on the Internet is written using one version of HTML code or another.
HTML code ensures the proper formatting of text and images so that your Internet browsermay display them as they are intended to look. Without HTML, a browser would not know how to display text as elements or load images or other elements. HTML also provides a basic structure of the page, upon which Cascading Style Sheets are overlaid to change its appearance. One could think of HTML as the bones (structure) of a web page, and CSS as its skin (appearance).
What does an HTML tag look like?

As seen above in the above HTML tag example, there are not many components. Almost all HTML tags have an opening tag that contains the name with any attributesand a close tag that contains a forward slash and the name of the tag that is being closed. For tags that do not have a closing tag like the <img> tag, it is best practice to end the tag with a forward slash.
Each tag is contained within a less than and greater than angle brackets and everything between the opening and closing tag is displayed or affected by the tag. In the above example, the <a> tag is creating a link called "Computer Hope" that is pointing to the hope.html file.
What does HTML look like?
The following is an example of a basic web page written in HTML as well as a description of each section and its function.
<!DOCType HTML PUBLIC "-//W3C//DTD HTML 4.01 Transitional//EN" "http://www.w3.org/TR/html4/loose.dtd">
<html lang="en"><head>
<title>Example page</title>
<meta http-equiv="Content-Type" content="text/html; charset=windows-1252">
</head>
<body>
<h1>This is a heading</h1>
<p>This is an example of a basic HTML page.</p>
</body></html>
<html lang="en"><head>
<title>Example page</title>
<meta http-equiv="Content-Type" content="text/html; charset=windows-1252">
</head>
<body>
<h1>This is a heading</h1>
<p>This is an example of a basic HTML page.</p>
</body></html>
The box above contains the key ingredients to a basic web page. The first line (DOCType) describes what version of HTML the page was written in so that an Internet browser can interpret the text that follows. Next, the HTML opening tag lets the browser know that it is reading HTML code. The HTML tag is followed by the headsection which contains information about the page such as its title, meta tags, and where to locate the CSS file. The body section is all content that is viewable on the browser. For example, all the text you see here is contained within the body tags. Finally, closing tags wrap each element for proper syntax.
- See our HTML and Web Design Help for a full listing of HTML tags.
What is HTML5?
HTML5 is the update made to HTML from HTML4 (XHTML follows a different version numbering scheme). It uses the same basic rules as HTML4, but adds some new tags and attributes which allow for better semantics and for dynamic elements that are activated using JavaScript. New elements include section, <article>, <aside>, <audio>, <bdi>, <canvas>, <datalist>, <details>, <embed>, <figure>, <figcaption>, <footer>, <header>, <keygen>, <mark>, <meter>, <nav>, <output>, <progress>, <rp>, <rt>, <ruby>, <time>, <track>, <video>, and <wbr>. There are also new input types for forms, which include tel, search, url, email, datetime, date, month, week, time, datetime-local, number, range, and color.
With the increasing movement to keep structure and style separate, a number of styling elements have been removed along with those that had accessibility issues or saw very little use. These following elements should no longer be used in HTML code: <acronym>, <applet>, <basefont>, <big>, <center>, <dir>, <font>, <frame>, <frameset>, <noframes>, <strike>, and <tt>. HTML5 also simplifies the doctype declaration to the tag in the following box.
<!doctype html>
What does HTML5 look like?
As shown below the HTML5 code is very similiar to the earlier HTML4 example, but is much cleaner with the revised doctype tag.
<!doctype html>
<html>
<head>
<meta charset="utf-8">
<title>Example page</title>
</head>
<body>
<h1>This is a heading</h1>
<p>This is an example of a basic HTML page.</p>
</body>
</html>
<html>
<head>
<meta charset="utf-8">
<title>Example page</title>
</head>
<body>
<h1>This is a heading</h1>
<p>This is an example of a basic HTML page.</p>
</body>
</html>
How to create and view HTML
Because HTML is a markup language it can be created and viewed in any text editor as long as it is saved with a .htm or .html file extension. However, most find it easier to design and create web pages in HTML using an HTML editor.
Once the HTML file is created it can be viewed locally or uploaded to a web server to be viewed online using a browser.
Which file extensions are used with HTML?
HTML files use either the .htm or .html file extension. Older versions of Windows (Windows 3.x) only allow three-letter file extensions, so they used .htm instead of .html. However, both file extensions have the same meaning, and either may be used today. That being said, we recommend sticking to one naming convention as certain web servers may prefer one extension over the other
Print only sections of a page
Save on your printer ink by selectively printing in Windows programs such as Microsoft Word, Excel, Internet Explorer (and other browser), WordPad, Outlook, etc. To do this highlight portions of text you want to print and click the Print icon or option in the File menu. In the printer dialog window (like the one shown below) under Page Range choose the option Selection.
No comments:
Post a Comment