Archive for May 2014

You Can Send Word Document as an Email to Easy Way.

Monday, May 26, 2014
Posted by Unknown
Tag :

1. Open your word document type your topics and save it.













2. Click File on the menu bar.
















3. Select send to - Mail Recipient.
















4. Above your word document you should now see an email tool bar that is full of
    icons that you are used to seeing in Outlook.  Just fill it out as you would to send    
    any email.
















5. When you are done filling address line and the SUBJECT click to send your email.

Remember: 
Your word document will be turned into an email automatically.  The recipients will not need to open it as an attachment or anything.  The size of the file will also be smaller which will help those who have full mailboxes.


1. PDF File open and click file

















2. Click saves as

















3. Save as type select














4. Select JPEG

















5. Create New Folder


















6. New Folder Name or Rename


7. File Name


 8. Save click


















Finish.

Using ONE COMMAND You Can Print Several Files

Sunday, May 25, 2014
Posted by Unknown
Tag :

Firstly Go to the location of the files you want to print. 

1. Select all of the files that you want to print.  

















2. Right click on the selected files.

















3. Select “Print” from the menu that appears.


















MS Word will automatically open each file and rather rapidly print them.

1. Create New Folder

















2. Click on the folder and press F2 for rename

















3. Erase New Folder Text and then press Alt key+0160

















Now click anywhere. Folder is created with a blank name


Microsoft Excel Most Important Shortcut Key

Wednesday, May 21, 2014
Posted by Unknown
Tag :
Microsoft Excel Most Important Shortcut Key


Excel Shortcut Keys
Description
F2
Edit the selected cell
F3
After a name has been created F3 will paste names.
F4
Repeat last action. For example, if you changed the color of text in another cell pressing F4 will change the text in cell to the same color.
F5
Go to a specific cell. For example, C6.
F7
Spell check selected text or document.
F11
Create chart from selected data.
Ctrl + Shift + ;
Enter the current time.
Ctrl + ;
Enter the current date.
Alt + Shift + F1
Insert New Worksheet.
Alt + Enter
While typing text in a cell pressing Alt + Enter will move to the next line allowing for multiple lines of text in one cell.
Shift + F3
Open the Excel formula window.
Shift + F5
Bring up search box.
Ctrl + 1
Open the Format Cells window.
Ctrl + A
Select all contents of the worksheet.
Ctrl + B
Bold highlighted selection.
Ctrl + Z
Undo last action.
Ctrl + F3
Open Excel Name Manager.
Ctrl + F9
Minimize current window.
Ctrl + F10
Maximize currently selected window.
Ctrl + F6
Switch between open workbooks or windows.
The terms bit and byte are same in computer networking. Both terms refer to digital data transmitted over a network connection. Bits and bytes both may represent network addresses or port numbers.

Bit: A bit is a single numeric value, either '1' or ‘0’ that encodes a single unit of digital information.

Byte:
A byte is a sequence of bits; usually eight bits equal one byte.


Cloud Computing

Thursday, May 15, 2014
Posted by Unknown
Cloud Computing: 

Thus your computer has died. Your external hard drive was stolen from your car. Then your house burned down. By all rights, you’re having a total fail of an afternoon. But by backing up your computer’s data to the cloud, none of these tragedies need cost you your precious memories. cloud storage Simply, backing up data to the cloud means you’re backing up data to our secure servers via your Internet connection, instead of just to a hard drive in your home or office. Using cloud backups, you’ve removed from your shoulders the burden and stress of protecting whatever device your data is stored on.

Protecting data on lost laptops with encryption: 

Laptops are easily lost or stolen. It’s embarrassing for the person who has left the laptop in the back of the car, or let it out of their sight at a conference or in the airport. It’s more than embarrassing for your company however. Laptop loss or theft presents a real danger of serious data breach, leading to security and compliance problems.

Any time any person lost a laptop while traveling. It contained the personal data of thousands of compensation claimants. The data included names, phone numbers, addresses and social security numbers. The laptop was password protected but the information wasn’t encrypted.

This huge case highlights the need for all confidential data to be properly and appropriately protected. Whether a laptop is lost, stolen as a crime of opportunity, or targeted by a thief who has specific knowledge of your business, the result is the same. The laptop has gone, and everything contained on it is beyond your control, and vulnerable to abuse.

Password protection alone is not enough to protect your data. The worst case is that there’s a Post-It note stuck on the laptop with the password written on it. It may be that a default password is being used by more than one employee. Even a unique password can be bypassed, because it is data on the disk drive like everything else. If the data is not protected, neither is the password, and it can be accessed easily.

Security of data is not the only risk faced when a laptop goes missing. Compliance issues are raised when considering potential effects of data breaches through loss or theft. The Data Protection Act, industry regulations such as the Payment Card Data Security Standard (PCI DSS) and ISO 27001 require information to be kept safe and secure. A laptop containing data that can be easily accessed by an unauthorized user is neither safe nor secure.
Encryption protects all your data. Once encrypted, only those who are authorized can access it. The password is part of the encrypted data, and can’t be discovered by someone who doesn’t know it. Your data remains safe even if your laptop is stolen or goes missing.

Effective encryption solutions can be found in Sophos Safeguard products. Full-disk encryption protects all confidential and sensitive data on desktops, laptops and removable media. It allows authorized users to share data securely, easily and fast. Detailed logs, along with compliance reports on users and encrypted devices keep you informed. With Sophos Safeguard you can prevent data breaches, comply with regulations, and ensure security and data protection is up to date. Human error will always mean that laptops are lost or left vulnerable to theft.



How to resize any image

Thursday, May 8, 2014
Posted by Unknown
Tag :
1. Image select mouse right click with ACD Photo Enhance.


2. Click resize and open resize box.


3. Using new size width and height. use standard size.


4. After using character then click ok.


5. click File menu.


6. Click Save as.


7. Create New Folder


8. Rename folder name.


9. File Name.


10. Click save.


Finish.

Before resize


After resize 



How to convert PDF file to MS Word

Wednesday, May 7, 2014
Posted by Unknown
Tag :
1. PDF File open and click file 


2. Click saves as 


3. Save as type select



4. Select Microsoft Word (document)



5. Create New Folder


6. New Folder Name or Rename


7. File Name 


8. Save click 


9. Finish. 

IT Tips

Saturday, May 3, 2014
Posted by Unknown
Tag :
IT Tips:

1. Do not use android mobile/smart phone while charging.

2. Do not answer any calls or call out while charging your android
    mobile/smart phone.

3. Please alert about using UPS backup and electric power line via
    power strip

4. When cleaning a component (specially keyboard) of Laptop or
    desktop, turn it off before cleaning.

5. Never spray any liquid onto the Laptop component.



Welcome to My Blog

Free IT Tips

Popular Post

Blogger templates

@2014 . Raduzamanit. Powered by Blogger.

- Copyright © Free IT Tips Hardware/Networking for every one -Robotic Notes- Powered by Blogger - Designed by Johanes Djogan -