Skip to main content

Posts

Showing posts with the label computers

Important Shortcut Keys for Computer

Important Shortcut Keys for Computer CTRL+A. . . . . . . . . . . . . . . . . Select All CTRL+C. . . . . . . . . . . . . . . . . Copy CTRL+X. . . . . . . . . . . . . . . . . Cut CTRL+V. . . . . . . . . . . . . . . . . Paste CTRL+Z. . . . . . . . . . . . . . . . . Undo CTRL+B. . . . . . . . . . . . . . . . . Bold CTRL+U. . . . . . . . . . . . . . . . . Underline CTRL+I . . . . . . . . . . . . . . . . . Italic F1 . . . . . . . . . . . . . . . . . . . . . . Help F2 . . . . . . . . . . . . . . . . . . . . . Rename selected object F3 . . . . . . . . . . . . . . . . . . . . . Find all files F4 . . . . . . . . . . . . . . . . . . . . . Opens file list drop-down in dialogs F5 . . . . . . . . . . . . . . . . . . . . . Refresh current window F6 . . . . . . . . . . . . . . . . . . . . . Shifts focus in Windows Explorer F10 . . . . . . . . . . . . . . . . . . . . Activates menu bar options ALT+TAB . . . . . . . . . . . . . . . . Cycles between open applications ALT+F4 . . . . . . . . . . . . . . .

Protect Yourself from Computer Viruses

Want to know how to protect yourself from computer viruses? The internet is a great technology where you can do a lot of things, but a lot problems can also be encountered.  Some of them are: identity theft, fraud, and maybe the largest most problematic is the epidemic of computer viruses that are wreaking havoc. These viruses are different scripts (if you can call them that) written for purposes of destruction. It is the classic "minority of trouble makers ruining it for the vast majority of the rest of us." So what sorts of viruses do we worry about and how can you protect yourself from computer viruses? Different types of computer viruses. Well, there are all sorts of different kinds of virus-type things traveling around in cyber space and require the protection of an anti virus tool. Examples include worms, spiders, spyware, and adware. They have a variety of effects ranging from pure destruction to actually taking sensitive information off of a computer's ha