A site for our Arizona Mohave Community College "Leisure Studies" computer students to share questions and answers about this ever changing technology. Anyone wanting to learn is welcome to visit & participate.. Enjoy & we welcome your feeback..
Sunday, August 18, 2013
What does hashtag mean?
Wednesday, January 30, 2013
Helpful Travel Tips
Tuesday, September 11, 2012
Protect each others privacy when sending emails
Friday, August 31, 2012
Email & Online Safety Tips:
If and when you receive an email with lots of other addresses, as soon as you choose to forward it on, be sure to eliminate any of the addresses that are listed before your forward it… Together we can protect each others privacy and reduce the amount of junk mail we get..
Saturday, June 30, 2012
Smartphones – 3G, 4G, Data Plans, Wi-Fi And More…
Thursday, June 21, 2012
What To Do When You Think Your Email Account May Have Been Hacked
Thursday, March 15, 2012
How To Add a Link In Your Email To A Popular Video
- Highlight the letters in the address bar, by hovering your mouse over the highlighted area and right click.
- When the action list appears, choose “copy”
- If you email account isn’t open it, then by using your Tabbed Browsing, open another Internet connection and open your email account (Hotmail, Gmail, AOL…).
- Add the addressee and subject fields.
- Type your letter. (Something like “I thought you’d enjoy this.”) and once you have written what you’d like, be sure to come down to an empty line, then right click and when the action menu appears, Choose paste.
- The link will now be in your email. Notice it is normally a different color than your regular font because it is an active “hyperlink”
- Click send.
- Now, all the receiver has to do is “click on the link” and they will be taken to the website and see the video.
Friday, February 24, 2012
How to verify an emails accuracy - scam or hoax
There are several different ways to do this and it only takes a minute - first you might want to check the accuracy on one of the following websites, such as:
www.hoax-slayer.com
www.truthorfiction.com
www.snopes.com
I’m sorry to say that one of my favorite websites to verify email stories has decided to get out of the business – that was: www.breakthechain.org
OR
- google.com
- bing.com
- yahoo.com
- ask.com
It's estimated that 99 out of 100 of these stories and warnings are false with little or no validity - but they certainly clog up email inboxes, mail servers, cause people to be spammed and damage to computers and waste so much time...
So be safe & check the story out for yourself before you forward it on...
Monday, February 13, 2012
What does “cloud” computing mean?
Cloud computing simply means that whatever task you are performing is happening on the internet, instead of on your own PC.. So for anyone who uses many of the free email accounts, such as hotmail – yahoo – gmail, well they’ve been using “cloud” computing, because when they went to that companies website, and signed in with their user name & password, they were working on that companies computer, not their own… If you use Walgreens.com to store your photos for prints, and projects – such as a photo book or mug, then you were using “cloud” computing..
Cloud computing isn't new - far from it - it's been around since the early 1960's..50 years!!!
Some sources say cloud computing began with the beginning of the IT (Information Technology) Outsourcing industry by using idle/excess compute power (processing, storage, and connectivity) of one entity, to carry out the work of another. It's possible the first such use was when Mr. Ross Perot started the IT Outsourcing industry in 1962, and then rented idle computing power from one company (Southwestern Life) to carry out the processing needs of another (Collins Radio).
Wednesday, February 1, 2012
How to Use our Class Blog
All BLOGS are intended to be "informational" like any newsletter you might receive. But in addition to reading the "posts-otherwise called articles" that we publish on our BLOG, you can also copy any of the "post/articles" and save them to your word processing files so you can then print them and you can comment on what we've said in a specific "post/article" - The how to's are noted below..
- EMAIL: Most blogs have an “email signup” so simply type in your email address and you will receive anemail whenever a new post is added
- FOLLOWING PUBLICLY: Your profile image will appear in the blog's Followers widget. You will also be subscribed to updates for this blog which will appear in your Reading List on your Dashboard and following a blog creates a listing in your Google Reader account.
- FOLLOWING PRIVATELY: Your profile image and will NOT be displayed in the blog's Followers widget, but you’ll be subscribed to updates for this blog which will appear in your Reading List on your Dashboard and following a blog creates a listing in your Google Reader account
Sunday, May 1, 2011
QR CODES (Quick Response)

While in Las Vegas recently, we stopped at the Hard Rock Café and noticed throughout the hotel, almost all of the countless items on display worn by various entertainment artists had these little squares.. . These little squares were new – they were black & white, probably 6-8” sq. tiles – quite similar to sections of what we call “bar codes” but different. I couldn’t find any explanation as to what they were…
I’d intended to “Google” them, but hadn’t done that yet and when I mentioned them during one of our classes here in AZ a student solved the puzzle. By the way Harley-thank you… Harley is keeping current on technology and had recently read an article which explained they were QR Codes. Harley was kind enough to send me an article he’d read, some of which I've included below.. So combined with what he sent me and a little more research here’s an “English” explanation of how & what they are for…
They were initially designed and used for tracking parts in vehicle manufacturing, but now these QR codes are used everywhere both commercially and residentially. One use growing in popularity is that which was intendd at the Hard Rock Café – in the display cases, they encourage/allow Smartphone (cell) users with the right app (called mobile tagging) to aim their Smartphone at the code, which in turn display all the info & a photo of what’s in the case OR it can compose an email or text message for use later… Users can also generate and print their own QR codes for others to scan and use by visiting one of several free QR code generating site – WOW…
Here’s the article quote from March 28, 2011|By Umika Pidaparthy on CNN News
“A confused crossword puzzle. A psychedelic postage stamp. A bar code on drugs. This is how a QR, or Quick Response, code may appear to most people. You may have noticed these black-and-white squares showing up in subway ads or in pages of magazines. Thanks to our growing addiction to our Smartphone’s, you'll likely be seeing more of them. QR codes are showing up in more and more places: posters, storefront window displays, TV advertisements, business cards, websites and even on T-shirts. When accessed with your phone, a QR code takes you to a landing page where you'll usually find special promotional content” The QR code was invented by a Japanese company called DENSO Corp., a subsidy of Toyota, in 1994. The codes have been used in Japan for years and are quite common there. But only now are they becoming mainstream in the United State”
Now that I know what they are, I’m seeing them everywhere – Amazing how this technology continues to change…
Friday, April 15, 2011
What is a smartphone?
Smartphones offer greater functionality than regular cell phones, so that you can...
- use a full “qwerty” keyboards for easier typing
- have access to the Internet to access your email, Facebook and Twitter accounts
- work with all your Office documents, such as word & excel,
- sync data with personal and business computers
- send & receive instant messages
- play music
- show streaming video
- edit photos
- get driving directions from the GPS
- play countless games and
- work with hundreds of other “applications referred to as “apps”
Smartphones are actually mini-computers with an OS-Operating system (such as the BlackBerry OS; Palm OS or Windows Mobile OS); Smartphones have internet access so that you can download countless applications, including GPS systems, you can link to your social networking & email accounts; many smartphones give you the ability to not only take photos but edit them; you can view, update & edit Office documents and they can be synchronized with your computer for all the updates you make, as well as synchronizing your address book, calendar and tasks list quickly and easily – similar to what a PDA used to do – only faster and more easily… And of course the applications allow you access, via the internet, to hundreds of games, music, video and other sites…
This, like all other computer related technology, is changing almost daily so no doubt, as soon as you buy a new “smartphone” it’s going to be outdated and topped with a newer version with more bells & whistles… leaving us all to wonder where it will end…
Wednesday, March 23, 2011
How to add “attachments” to your email message…
Once you are in your email account and into the section where you can write/compose a new email message:
Be sure to fill in the names whom it is going to in the BCC (to protect everyone’s privacy) - also be sure to fill in a subject and then write your message
Now – click the “attachment” option which usually has a paperclip icon beside it (it might also say Add attachment, insert attachment or insert file/photo”
With many programs you will now see a BROWSE button which allows you to open the Document, Picture, Video or Music files so that you can find what it is you want to attach
Once you have found the correct folder and then found the correct “file” highlight/left click on the file name – with most services if you left click the file twice it will insert/add it to your email message. Remember if you have several files in one folder, you can use the CTRL or SHFT keys to add multiple files.
If you want to send a different file from a different folder or section, just repeat the steps above.
Once you have attached all the files you want, you will send the email message the same as you always do. If you want to be sure what your recipients will see, simply send a copy to yourself as well…
Notes:
Most services allow you to add attachments up to 25GB, although this varies depending on the email provider :
IN AOL – the ATTACH FILE button is in the bottom left corner of the email message
IN YAHOO: When you choose the file you want to attach it appears in the file field, when you are finished, select the 'Attach Files' button and you will receive a message that you have successfully attached your files.
IN HOTMAIL: In newer versions it will ask you if you want to save the attachments as online documents/photos – you can say yes or no (when you say yes they will be saved in your online/cloud documents/photo folders)
Thursday, January 13, 2011
HOW TO GET PHOTOS FROM YOUR CELL PHONE TO YOUR COMPUTER..
CABLE FROM CELL PHONE TO COMPUTER: Some phones, come with cables that have a connection for the phone and the other end has a USB port connection – if you phone has this, you will copy and paste the photo’s from your cell phone to your computer, the same as you would from a flash drive/memory card to your computer.. For example, if you have a Motorola phone you can use a tool called Motorola Phone Tools-It isn't free but comes with a USB cable you can directly connect to the computer
FOR CELL PHONES WITH TEXTING CAPABILITIES: Then you can simply “email the photo’s to yourself or anyone else with an email address” just like a text message; instead of a phone number you would send it to the “email address”
FOR CELL PHONES WITH MEMORY CARDS: Before you take pictures with your cell phone, be sure you have a memory card in the slot and that your camera setting is set to save all photos & videos that you take, and other information you’d like, to the memory card. Refer to your user manual to make sure you buy the right kind of memory card for your cell phone If your cell phone didn’t come with one. Common cell phone memory card formats include: TransFlash MicroSD, MiniSD, Sony MemoryStick but, the most popular is MicroSD (remember "MiniSD" and "MicroSD" are not the same kind of cards)..
Small memory cards require a larger adapter to insert in a computer memory card reader.
Once your small memory card is in the adapter, insert the memory card adapter into a memory card reader or into your laptop/computer/printer’s built in memory card reader..
Now it is ready to be “read” - Open Windows Explorer (Windows Flag Key & E), you will then see your memory card with an assigned drive letter – typically E or F. When you left click on that drive, look to the right side of the screen and you will see the photos and or all information on the memory card.
- Highlight the photos you want to put on the computer
- Choose COPY
- Now go to or create a new folder for the picture
- Once you are in the correct folder, choose PASTE
Saturday, November 27, 2010
TOP 12 CYBER SCAMS OF CHRISTMAS
TOP 12 CYBER SCAMS THIS CHRISTMAS (Top on this year's list: Offers of free iPads)
Nov 16, 2010 published on MSNBC & MSN
Shoppers looking for holiday bargains are already scouring the Web as well as incoming e-mails and text messages for deals — and cyber criminals are quite busy, too, hoping to lure you in with a deal that seems too good to be true. "We’re all looking for a great deal online, but some sites offer electronics or luxury goods at prices that are too good to be true," said Alison Southwick of the Better Business Bureau.
"Every holiday season BBB hears from holiday shoppers who paid for a supposedly great deal online, but received nothing in return." (For more tips on shopping safely online, check out the BBB's link for this list...
Security software company McAfee recently released its "12 Scams of Christmas" list, and offers of "free" iPads — among this year's most coveted tech gadgets — comes in at No. 1.
"With Apple products topping most shopping lists this holiday season, scammers are busy distributing bogus offers for free iPads" via e-mail spam, McAfee said. In the e-mail, "consumers are asked to purchase other products and provide their credit card number to get the free iPad. Of course, victims never receive the iPad or the other items, just the headache of reporting a stolen credit card number."
Meanwhile, in the Facebook, Twitter or other social media version of the ruse, users are asked to "take a quiz to win a free iPad and must supply their cell phone number to receive the results. In actuality they are signed up for a cell phone scam that costs $10 a week," McAfee said.
Here's the rest of the company's "12 Scams of Christmas" list:
2. "Help! I’ve Been Robbed" — "This travel scam sends phony distress messages to family and friends requesting that money be wired or transferred so that they can get home." We and other news organizations have written about this before, especially as an issue on Facebook, where people feel like they trust information that's posted. With so many people traveling during the holiday season, though, it's easy to fall prey to this one.
3. Fake gift cards — Social media (Facebook, Twitter, MySpace as examples) are used by no-goodniks to "promote fake gift card offers with the goal of stealing consumers’ information and money, which is then sold to marketers or used for ID theft," says McAfee. "One recent Facebook scam offered a 'free $1,000 Best Buy gift card" to the first 20,000 people who signed up for a Best Buy fan page, which was a lookalike. To apply for the gift card they had to provide personal information and take a series of quizzes."
4. Holiday job offers — Maybe for some, the recession is over, but not for many of us still. Which is why "as people seek extra cash for gifts this holiday season, Twitter scams offer dangerous links to high-paying, work-at-home jobs that ask for your personal information, such as your e-mail address, home address and Social Security number to apply for the fake job."
5. "Smishing" — You've heard of phishing? "Smishing" is when a phishing SMS, or text messages, arrives on your cell phone, wanting you to bite. "These texts appear to come from your bank or an online retailer saying that there is something wrong with an account and you have to call a number to verify your account information. In reality, these efforts are merely a ruse to extract valuable personal information from the targets," McAfee says. "Cyber crooks know that people are more vulnerable to this scam during the holiday season when consumers are doing more online shopping and checking bank balances frequently."
6. Suspicious holiday rentals — Many of us are looking to save on that Christmas-y cabin in the mountains or chic vacation apartment in the city of our dreams. "During peak travel times when consumers often look online for affordable holiday rentals, cyber crooks post fake holiday rental sites that ask for down payments on properties by credit card or wire transfer."
7. Recession scams continue — "Scammers target vulnerable consumers with recession related scams such as pay-in-advance credit schemes. McAfee Labs has seen a significant number of spam e-mails advertising pre-qualified, low-interest loans and credit cards if" — that emphasis is mine —"the recipient pays a processing fee, which goes directly into the scammer’s pocket."
8. Grinch-like greetings, involving e-cards — Electronic cards can save paper and postage, but "cyber criminals load fake versions with links to computer viruses and other malware instead of cheer ... Computers may start displaying obscene images, pop-up ads, or even start sending cards to contacts that appear to come from you."
9. Low price traps — Discussed above, as the "too good to be true" deals, which are promoted on some auction sites and fake websites. The aim, McAfee says: "the goal of stealing your money and information."
10. Charity scams — "Common ploys include phone calls and spam e-mails asking you to donate to veterans’ charities, children's causes and relief funds for the latest catastrophe."
11. Dangerous holiday downloads — "Holiday-themed screensavers, jingles and animations are an easy way for scammers to spread viruses and other computer threats especially when links come from an e-mail or IM that appears to be from a friend."
12. Hotel and airport Wi-Fi vulnerabilities — This is an anytime risk with thieves who are savvy enough to hack into public networks being used by hurried travelers. Hacker-thieves can steal credit card numbers, bank accounts and other forms of personal identity; try not to access bank accounts, for example, or give your credit card number online while using public Wi-Fi. It's a good rule for every day — not just for the holidays.
© 2010 msnbc.com Reprints
Saturday, November 6, 2010
November Comptuer Classes
The following classes are being held before Thanksgiving … To reserve your seat, Call Registration 928-855-7812 or 453-1139.. Consider signing up with a friend – coming to class with someone else gives you the motivation to practice and the more people in each class the more is learned from questions....
I’ve been inundated with questions about how to make & order Christmas cards with photos, so I’m preparing a special handout for this and will distribute the handout and cover the steps for creating & ordering greeting cards online (at Walgreens, CVS,Wal-Mart, etc) in 3 of our November classes in time for this holiday season: our Picasa; Create a Book and Word Processing Classes…
I’m heading back to new England for the holidays but will be back when the New Year begins and our classes will begin again on Wednesday morning, January 5th and continue thru April – so for those of you coming to Havasu after the holidays, these and many more classes will be held – Have a wonderful holidays and we will look forward to seeing you
PICASA PHOTO EDITING LSC100A-123 NOV 8 & 10, Monday & Wednesday mornings 8:30am-12:20pm Two 4 hr classes learning to edit & print Digital Photos using Picasa (a free Google software) learn to upload photos from your camera and/or scanner to the PC and learn t order prints on line.. We will also show you upload photos & create holiday cards online... Bring photos to class (on camera or flash drive)
SOCIAL NETWORKING & BLOG BASICS LSC080-121 Nov. 9 & 16, Tuesday mornings 8:30am-12:20pm 1pm-4:50pm Two 4 hour classes learning all about social networking & blogging, including “Facebook” “Twittering” etc.. Create a family or organization blog – learn how, why & when to post – comments; Set Up Your Own Blog; Templates; Add Ons: Links, Photos, Slide Shows, Blog Tools & more - it’s fun free & easy
CREATE/PUBLISH YOUR OWN BOOK LSC100A-124 Nov. 9 & 16, Tuesday afternoons 1pm-4:50pm - Two 4 hour classes learning to create & publish your own book, using free book publishing software from www.blurb.com known as personal book making & publishing-use your wp skills & digital photos and learn in quantities as small as just one. You decide: soft or hard cover, various sizes, all text, all photos or a combination of photos & text, story book or recipe book-we will also work with walgreens.com to create a book & greeting cards using your photos Bring photos to class We will also show you upload photos & create holiday cards online... (on camera or flash drive)
EMAIL HOW TO’S LSC071-123 NOV 15 & 17 Monday & Wednesday mornings, 8:30am-12:20pm, Two 4 hr classes to enhance your basic email skills, work extensively with attachments of all types: documents, photos, videos, power point, learn to open & save, find & attach. Also learn to work with hyperlinks, learn to copy & paste to and from emails, Internet and word.
CREATE GREAT LOOKING DOCUMENTS LSC068-122 Nov 15 & 17 Mon & Wed afternoons, 1pm-4:50pm Two 4 hour classes-reviewing the basics to open, create, save documents; highlight; cut-copy-paste, set & change margins; create letters, envelopes, labels & use clip art, word art to enhance documents, create flyers & invitations & lots of printing tips and We will also show you upload photos & create holiday cards online...
Sunday, September 26, 2010
Should you have many different passwords to get into your accounts?
- 1 password for getting into each of your email accounts
- 1 password for getting into your financial accounts
- 1 password for getting into all other accounts you register with
TIPS:
- Keep your primary email addresses, user names and passwords on an index card with your other important papers.
- Don't share your passwords on the Internet, over email, on the phone or in the mail with something sent to you-only when you generate the contact. Internet Service Providers (ISP) and reputable companies will never generate calls, emails or correspondence asking for your password or other confidential information. If it doesn't feel right - don't respond!!!!
- Passwords are always case sensitive
- Never use your email password for anything but your email account
- Create another password (minimum 8-20 characters) a word & phrase with 3 or 4 numbers (be sure the numbers & letters are not consecutive, that you use for all other Internet accounts. If you need to change it, reverse the order (i.e. 4378david or david4378 or DAVID4378 or 4378 DAVID)
Friday, September 10, 2010
Tips for Texting, Emailing & Cell Phones
Tips for better online and cell phone behavior (etiquette)
- Try not to use email to address problems better handled face to face – shows your maturity and respect for the other person
- Email is wonderful – but picking up the phone for a real conversation is always a better option to enhance any relationship – personal or business
- Read & reread your email messages before hitting the send button – to check for spelling & grammatical errors, but just as importantly to be watchful of the tone – emails make it to easy to misread between the lines, so always be polite and respectful
- Email, especially business related, should always be professional – not cutesy or too casual
- Be sure to respect & protect others email addresses – whenever possible – put addresses in the BCC line so that email addresses aren't’ publicized.
- Always remove others email addresses when forwarding stories or jokes.. you never know where they will end up.. (remove the FW or FWD from the subject line)
- Put something in the subject line - even 1 or 2 words (directions, hello, estimate, questions) will help the receipient know what is is and if it needs to be addressed now or later
- This is very true for business emails: don't respond to e-mail immediately – it’s too easy to hit the reply button after a quick response, but the downsides to this is you may appear to be constantly reachable to colleagues, too eager to clients or upper management so unless it’s urgent, wait a few hours and be sure you’ve thought about your response and are focused on the task at hand.
- Make sure your email messages have a purpose…
- Never TYPE IN ALL UPPERCASE. Uppercase implies that you are SHOUTING.
- By the same token, you don’t want to use all lower case letters, especially in professional e-mails. Some say that writing in all lowercase appears you don't have enough respect for your recipient to use proper capitalization.
- You should never be too busy to use proper grammar, spelling and punctuation in your e-mails (although using incomplete sentences and lists for explanation is acceptable).
- Whenever you send professional emails – whether those are to your vendors, customers, clients, organization members - use their formal titles followed by their last name unless they invite you to use their first name – remember – show respect.
- Return calls in a timely manner – ideally always within twenty-four hours whenever possible.
- Leaving a voice mail message – it helps to give your number at both the beginning and end of the message and tell them when it’s convenient for them to return your call "I’ll be home this evening" or "back in the office after 2"
- Using your cell phone – be respectful of those around you especially try not to scream into your cell phone. Cell phone speakers are very sensitive and can transmit your slightest whisper – those around us aren’t interested in our conversations…
- When you are with someone at dinner – in a meeting – at an event – give them your full attention; most people find it rude & disrespectful to have those they are with texting, accepting/making cell phone calls and the like - if they are important enough to be with, then they are important enough to have your full attention...
- When you are in public settings - restaurants, places of worship, social gatherings-work & pleasure, turn your cell phone off or put it on vibrate so as not to disturb those around you-need to take the call - then take it outside!
- Technology is wonderful, but it sure can be annoying...
Wednesday, August 4, 2010
What is "phishing" and how to avoid it
Phishing attacks work by the scam artist sending "spoofed" emails that appear to come from a legitimate website that you have online dealings with such as a bank, credit card company or ISP - any site which requires users to have a personal identity or account. The email may ask you to reply with your account details in order to "update security" or for some other reason.
The phishing email may also direct you to a spoofed website or pop-up window which looks exactly like the real site, but has been set up for the sole purpose of stealing personal information. Unsuspecting people are then often fooled into handing over credit card numbers, passwords or other details.
- Never respond to emails that request personal financial informationBanks or e-commerce companies generally personalize emails, while phishers do not. Phishers often include false but sensational messages ("urgent - your account details may have been stolen") in order to get an immediate reaction. Reputable companies don't ask their customers for passwords or account details in an email. Even if you think the email may be legitimate, don't respond - contact the company by phone or by visiting their website.
- Visit bank or other financial, retail or medical websites by typing the URL (web address) into the address bar yourself. Phishers often use links within emails to direct their victims to a spoofed site, usually to a similar address such as mybankonline.com instead of mybank.com. When clicked on, the URL shown in the address bar may look genuine, but there are several ways it can be faked, taking you to the spoofed site. If you suspect an email from your bank or online company is false, do not follow any links embedded within it.
- Keep a regular check on your accounts - Regularly log into your accounts & and check your statements. If you see any suspicious transactions report them to your bank or credit card provider.
Be sure the website you are visiting is secure - Always, before you submit any personal or fiancial information, always check to ensure the site uses encryption to protect your personal data:
- Check the web address in the address bar. If the website you’re visiting is on a secure server it should start with "https://" ("s" for security) rather than the usual "http://"
- Look for a lock icon on the browser's status bar. Check the level of encryption, expressed in bits, by hovering over the icon with your cursor. Note that the fact that the website is using encryption doesn't necessarily mean that the website is legitimate; it only tells you data is being sent in encrypted form.
Wednesday, July 14, 2010
Aligning your text
When you use Microsoft Word, Works, Word Pad or Word Perfect an this also works for cells in Excel, slides in Power Point, in most email programs when you are typing a new email message and many other software programs when you are working with “text”.
The "alignment buttons" allow you to easily align your text and the 4 standard options are:
- Left
- Center
- Right
- Justify/full justify (used to be called block style)
On your formatting toolbar (or in the Home Tab Ribbon of Word 2007/2010) you will see 4 “alignment buttons”.
When your cursor/pointer is in the word, sentence or paragraph you want to change the alignment for, simply click on the alignment button of your choice..