Anda di halaman 1dari 4

Definition of Terms

Mr. Jeffrey A. Diaz

access points = A device used to connect wireless computers and other credentials = Information that includes identification and proof of
wireless devices to a wired network. identification that is used to gain access to local and network resources.
active content = Interactive or animated content used on the Internet. Examples of credentials are user names and passwords, smart cards, and
Active content includes ActiveX control and web browser add-ons. certificates.
active window = The window that you are currently working in. Only one default = A predefined setting. You can accept the default option settings,
window can be active at a time. or you can change them to suit your own preferences.
ActiveX = Technology for creating interactive web content such as desktop = The work area on a computer screen where you can put things
animation sequences, credit card transactions, spreadsheet calculations. that you want easy access to, just as you arrange objects on top of your
ad hoc = A temporary network used for sharing files or an Internet actual desk. On your computer desktop, you can arrange icons such as
connection. In an ad hoc network, computers and devices are connected the Recycle Bin and shortcuts to programs, folders, and documents or
directly to each other instead of to a hub or router. Also called computer-to- other files.
computer network. device = Any piece of equipment that can be attached to a network or
administrator = A person responsible for planning, configuring, and computer, for example, printers, keyboards, external disk drives, or other
managing the day-to-day operation of a computer network. peripheral equipment. These devices require special software (device
administrator account = A type of user account that allows complete drivers) to work with Windows.
access to the computer. Administrator can make any desired changes. dialog boxes = A small window that contains options for completing a
This account type is not recommended for daily use, and should only be task. For example, the first time you save a file, a dialog box appears with
used when necessary. options for naming the file and choosing which folder to save it in.
authenticates = The process of determining the identity of the user Digital Subscriber Line (DSL) = A type of high-speed Internet connection
attempting to access a system. For example, user names and passwords using standard telephone wires. This is also referred to as a broadband
are commonly used to authenticate users. connection.
basic disk = A physical disk that can be accessed by MS-DOS and all discoverable = On a network, a state in which a computer can be
Windows-based operating systems. Basic disks can contain up to four detected by other computers. In this state, certain Windows Firewall ports
primary partitions, or three primary partitions and an extended partition on the computer are open. In Bluetooth technology, a state in which a
with multiple logical drives. Bluetooth enabled device sends out radio signals to advertise its location
BIOS (basic input/output system) = Software that is built into a computer to other devices and computers.
and that is run when the computer is first turned on. Among other things, domain = A collection of computers on a network that share a common
this software starts the operating system and supports the transfer of database and security policy. A domain is administered as a unit with
information between hardware devices (such as the keyboard and the common rules and procedures, and each domain has a unique name.
monitor). domain controllers = A server in an Active Directory network that
blogs = A frequently updated online journal or column. Blogs are often manages user logon and access to network and shared resources.
used to publish personal or company information in an informal way. Short Domain Name System (DNS) = A technology that translates Internet
for web log. address names into numerical address (IP addresses) so that the address
Bluetooth adapter = A device used to connect a computer to a Bluetooth can be found over the Internet. For example, if you type
enabled device (for example, a keyboard or modem). Also known as a into a web browser, the name is translated into a
Bluetooth radio or Bluetooth transceiver. numerical address and that address is used to connect you to the
broadband connection = A high-speed Internet connection. Broadband Microsoft website.
connections are typically 256 kilobytes per second (Kbps) or faster. download = To copy a file from one computer to another using modem or
Broadband includes DSL and cable modem service. network.
burning = To copy files to a recordable CD or DVD. drag = To move an item on the screen by selecting the item and then
certificate = A digital document that verifies the identity of a person or pressing and holding down the mouse button while moving the mouse. For
indicates the security of a website. Certificates are issued by trusted example, you can move a window to another location on the screen by
companies known as Certification Authorities. dragging its title bar.
character pad = The area in Tablet PC Input Panel that you can use to drive = An area of storage that is formatted with a file system and has a
write one character (such as a letter, number, or symbol) at a time. Each drive letter. The storage can be a floppy disk, a CD or DVD, a hard disk, or
character is converted into typed text. another type of disk.
Clipboard = A temporary storage area used by Windows. Information driver / drivers = Software that enables hardware or devices (such as a
(such as text, files, graphics, sound, or video) can be copied to the printer, mouse, or keyboard) to work with your computer. Every device
Clipboard from one program or location and pasted elsewhere. The needs a driver in order for it to work.
Clipboard can only hold one piece of information at a time. Whenever encrypted = The condition of information being scrambled so that it can
something is copied to the Clipboard, it replaces whatever was there be read only by someone who has the appropriate key to unscramble it.
before. Encryption can be applied to files or to information exchange over a
closed = The process that occur after files are burned (copied) to a CD or network connection.
DVD. After a disk is finalized, it is ready to be played in another computer encrypting / encrypts = A way to enhance the security of a message or
or device, but you can no longer add files to it. file by scrambling the contents so that it can be read only by someone who
Command Prompt windows = A window that mimics an old MS-DOS has the appropriate key to unscramble it.
display for typing command-line instructions. encryption key = A sequence of symbols or characters used to scramble
CompactFlash = A device used by many digital cameras to store pictures or unscramble information that is being encrypted or decrypted.
and video. Flash memory cards store computer information such as text, Ethernet = A networking standard that uses cables to provide network
pictures, and music, and can be copied, erased, and used many times. access. Ethernet is the most widely installed technology for connecting
compressed = To reduce the size of a file so that it takes up less storage computers.
space and is easier to send in e-mail. exception = An instruction that tells Windows Firewall to open a port
compresses = A process for removing redundant data from a digital media briefly, allow a program or service to pass a specific piece of information
file or stream to reduce its size or the bandwidth used. through, and then close the port. These instructions are called
cookie = A small text file that websites put on your computer to store &qout;exception&qout; because normally the firewall blocks all unsolicited
information about you and your preferences. attempts to send information.
correction area = In Tablet PC Input Panel, the area that appears in the executable files = A computer file that starts a program, such as a word
writing pad when you tap the recognized text that you want to correct or processor, game, or different parts of Windows. Executable files can often
when you select text in certain programs and then open Input Panel. You be identified by file name extension .exe.
can use it to rewrite an incorrect recognized character or to replace a word extended partition = A type of partition on a basic disk that should be
with a suggested alternative. used if you want to create more than four volumes. Extended partitions
CPU = The main circuit chip in a computer. It performs most of the can contain multiple logical drives that can be formatted and have drive
calculations necessary to run the computer. letters assigned to them.

Prepared by: Mr. Jeffrey A. Diaz 18 July 2014

FAT = A file system used by MS-DOS and other Windows operating IP address = Short for Internet Protocol address. An IP address identifies
systems to organize and manage files. The file allocation table is a data a computer that is connected to the Internet or on a network. There are
structure that Windows creates when you format a volume by using FAT or two typed of IP addresses: IP version 4 (IPv4) and IP versions 6 (IPv6). An
FAT32 file systems. Windows stores information about each file in the file IPv4 address usually consists of four groups of numbers separated by
allocation table so that it can retrieve the file later. periods, such as An IPv6 address has eight groups of
FAT32 = A system used to store files on a computer drive. FAT32 is based hexadecimal characters (the numbers 0-9 and the letters A-H) separated
on the file allocation table (FAT) file system, but it uses 32-bit values for by colons-- for example, 3ffe:ffff:0000:2f3b:02aa:00ff:fe28:9c5a.
storing files instead of the 16-bit values used by the original FAT file junk e-mail = Unsolicited commercial e-mail (UCE). Also known as spam.
system. FAT32 uses drive space more efficiently than FAT and support keyboard shortcut = A combination of two or more keyboard keys, used
volumes of up to 2 terabytes (TB) in size. to perform a task that would otherwise require a mouse or other pointing
file name extension = A set of characters added to the end of a file name device.
that identifies the file type or format. Library / Libraries = A collection of items, such as files and folders,
file type = The format of a file, commonly indicated by its file name assembled from various locations. The locations might be on your
extension. The file type indicates which program the file was created in computer, an external hard drive, or someone else's computer.
and can be opened with. Live File System = A file storage system that can be used to create CDs
files = A collection of information that is stored on a computer under a and DVDs. Disc formatted with Live File System allow you to copy files to
single name. A file can be text document, a picture, a program, and so on. the disc at any time, instead of copying (burning) them all at once.
Files typically have a three-letter file name extension that helps to indicate location = Any disk drive, folder, or other place in which you can store files
the type (for example, picture files are often saved in JPEG format and and folders. Programs will commonly ask you to choose a location to save
have the file name extension .jpg). a file.
filter = To display files that meet certain. For example, you might filter files logical drive = A volume created within an extended partition on a basic
by a particular author so that you only see the files written by that person. disk. A logical drive can be formatted and assigned a drive letter, but
Filtering does not delete files, it simply changes the view so that you only cannot host an operating system.
see the files that meet your criteria. malicious software = Software designed to deliberately harm your
firewall = Software or hardware that can help protect a computer from computer. For example, viruses, worms, Trojan horses are malicious
hackers or malicious software. A firewall helps prevent malicious software software. Also known as malware.
(such as worms) from gaining access to a computer through a network or Mastered = A file system used to create CDs and DVDs created using the
over the Internet, and helps prevent a computer from sending malicious Mastered format are more likely to be compatible with older computers, but
software to other computers. an additional step is required to burn the collection of files to the disc.
firmware = The software that is embedded in a hardware device and media information = Information about digital media content such as the
controls how the device interacts with the operating system. artist, title, album, producer, and so forth. Also known as metadata or tags.
flash memory cards = A device used by many digital cameras to store memory = Typically refers to random access memory (RAM), but can also
pictures and video. Flash memory cards store computer information such refer to any temporary storage space used within or in conjunction with a
as text, pictures, and music, and can be copied, erased, and used many computer, such as a USB flash drive.
times. modem = A device that allows computer information to be transmitted and
gadgets = A program that you can display on your desktop. Examples are received over a telephone line or through broadband services such as
clocks, news headlines, slide shows, and weather forecasts. Another type cable or DSL. Modems are most commonly used to connect to the
of gadget is an add-in program that runs on a Windows SideShow- Internet.
compatible device and updates the device with information from your MS-DOS (Microsoft Disk Operating System) = A Microsoft computer
computer, such as e-mail messages and media files. operating system with a command-line interface that is used to control
group / groups / security group = A collection of users, computers, many internal computer functions, such as running programs and
contacts, and other groups. Groups can be used for security or as e-mail organizing and maintaining files.
distribution collections. Security groups are used both to grant access to multiboot = A computer configuration in which two or more different
resources and as e-mail distribution lists. Distribution groups are used only operating systems are installed on the same computer hard disk, and you
for e-mail. can choose which operating system to use when the computer starts. Also
Group Policy = An administrative tool for managing user settings and called dual-boot.
computer settings across a network. navigation pane = The area on the left side of a folder window. It displays
hard disk = The primary storage device located inside a computer. Also favorites, libraries, and an expandable list of drives and folders.
called a hard drive or hard disk drive, it is where your files and programs network = A group of computers or other devices, such as printers and
are typically stored. scanners, that communicate either wirelessly or by using a physical
homegroup = A group of computers on a home network that can share connection, such as an Ethernet cable or a phone line.
pictures, music, videos, documents, and printers. A homegroup is network adapters = A device that connects your computer to a network.
protected with a password. Sometimes called a network interface card (NIC).
hub = A device used to connect computers on a network. The computers network address translation (NAT) = A process that translates the
are connected to the hub with cables. The hub sends information received internal Internet Protocol (IP) address of each computer on a local area
from on computer to all other computers on the network. network (LAN) into an external IP address when that computer connects to
icon = A small picture that represents a file folder, program, or other object the Internet. This process improves the security of the network because
or function. internal addresses are not made public.
import / importing = To copy pictures, music, or videos from a digital network projectors = A projector that is connected to a network through a
camera or some other device to your computer. wired or wireless connection, rather than one that is connected directly to a
index = A collection of detailed information about the files on your computer.
computer. The index allows you to perform fast, accurate searches by network security key = A password that can help protect wireless
using information about the files to help you find them. networks from unauthorized access. A network security key encrypts
Information bar = The Information bar displays information about information sent from one network computer to another so that the
downloads, blocked pop-up windows, and other activities. information can only be read by someone who has the key.
Internet Connection Sharing (ICS) = A Microsoft Windows technology newsgroups = A forum on the Internet for discussions on a specified
that allows computers on a network to access online services through a range of subjects.
single Internet connection. NTFS file system = A file system for formatting computer hard disks so
Internet service provider (ISP) = A company that provides Internet they can store information. NTFS provides several improvements over
access to individuals or companies. An ISP provides a telephone number, earlier file allocation table (FAT) file systems, including file and folder
a user name, a password, and other connection information so that users permissions, encryption, and file compression.
can access the Internet through the ISP's computers. An ISP typically operating system = The computer program that manages all other
charges a monthly or hourly connection fee. programs on the computer. The operating system stores files, allows you
Intranet = A network within an organization that uses Internet technologies to use software programs, and coordinates the use of computer hardware
and protocols, but is available only to certain people, such as employees (such as the keyboard and mouse).
of a company. Also called a private network. packet = A unit of information transmitted from one computer or device to
another on a network.
Prepared by: Mr. Jeffrey A. Diaz 18 July 2014
partitions = Part of a computer hard disk that functions like a separate rip / ripped = To copy digital media content from an audio CD. Content
disk. Separate, formatted partitions share your computer's memory and may be converted to a different format during the ripping process.
storage space. Partitions allow you to install more than one operating router = A device that sends, or routes, information between two networks
system on the computer. (for example, between a home network and the Internet). Routers find the
passphase = A string of characters used to control access to a network or quickest paths for sending information, which makes network connection
program. faster. Routers can be wired or wireless.
password = A string of characters used to access information or log on to Safe mode = A method of starting Windows using only basic files and
a computer. Passwords help prevent unauthorized people from accessing drivers. Safe mode is available by pressing F8 key during startup. This
files, programs, and other resources. allows you to start the computer when a problem prevents it form starting
path = A sequence of folders (directories) that leads to a specific file or correctly.
folder. A backslash is used to separate each folder in the path. For saved searches = A search that you can create in Windows. When you
example, the path to a file called invoice.txt might be open a saved search, it searches your computer again to find all files that
C:\Documents\July\invoice.txt. match what you're looking for.
permission = Rules associated with shared items on a computer or screen resolution = The setting that determines how much information is
network, such as files and folders or printers. Permission determine who displayed on the computer screen, measured horizontally and vertically in
can access an item, and what can be done to it. Permission can be pixels. At lower screen resolution, such as 640 x 480 fewer items fit on the
assigned to individuals or groups. screen, but they are larger. At higher resolutions, such as 1600 x 1200,
personal folder = A folder containing folders that are specific to your user more items fit on the screen but they are smaller.
account. The personal folder is labeled with the name that you use to log script = A scripting language used to create interactive or animated
on to your computer. content for the Internet, such as games or advanced financial applications.
phishing = A technique used to trick computer users into revealing Secure Digital (SD) = A memory card used by many digital cameras to
personal or financial information. A common online phishing scam starts store pictures and video. Secure Digital (SD) cards store computer
with an e-mail message that appears to come from a trusted source but information such as text, pictures, and music, and can be formatted and
actually directs recipients to provide information to a fraudulent website. reused many times.
pixels = The smallest element used to form the composition of an image security key = A password that can help protect wireless networks from
on a computer monitor. Computer monitors display images by drawing unauthorized access. A network security key encrypts information sent
thousands of very small pixels arranged in columns and rows. from one network computer to another so that the information can only be
playlists = A list of digital media content. read by someone who has the key.
point = To move a pointer (for example, an arrow) to a particular position server = A computer that provides shared resources, such as files or
on the screen, by using a pointing device such as a mouse or pen. printers, to network users.
port = A hardware-or-software-based interface used to transfer information service = A computer program or process that runs in the background and
between a computer and other devices. Hardware ports are physical provide support to other programs.
connections that are visible on the outside of the computer. Software ports service set identifier (SSID) = A unique set of letters or numbers that
are the numbered interfaces in programs that software programs use to identifies a wireless network. For a computer or device to connect to a
exchange information. wireless network, it must supply that network's SSID. An SSID can be up
portable device = A mobile electronic device that can exchange files or to 32 characters. SSIDs are sometimes called network names.
other data with a computer or device. Examples of portable devices shortcut = A link to any item accessible on your computer or on a network,
include Pocket PCs, portable digital music players, and smartphones. such as a program, file folder, disk drive, printer, or another computer. You
processor = The main circuit chip in a computer. It performs most of the can put shortcuts in various areas, such as on the desktop, on the Start
calculations necessary to run the computer. menu, or in specific folders.
product key = A sequence of 25 letters and numbers. To activate snap-in = A tool or set of tools that can be added to the Microsoft
Windows, you must enter the product key. Management Console (MMC) to help manage a computer.
programs = A set of instructions that a computer uses to perform a sound card = Hardware that enables sounds to be recorded, played back,
specific task, such as word processing, accounting, or data management. and heard on a computer.
Also called an application. spam = Unsolicited commercial e-mail. Also known as junk e-mail.
protocol = A standard set of formats and procedures that enable spyware = Software that can display advertisements (such as pop-up
computers to exchange information. ads), collect information about you, or change settings on your computer,
Public folder = The folder in Windows where you can store files that you generally without appropriately obtaining your consent.
want to share with other people on the same computer or network. The standard account = A type of user account that allows users to install
Pictures, Music, Documents, and Videos libraries each include a Public software and change system settings that do not affect other users or the
folder (for example, the Public Pictures folder is included in the Picture security of the computer. This account type is recommended for daily use.
library). stream / streamed = A method of delivering digital media accross a
random access memory (RAM) = The temporary storage area the network in a continuous flow. The digital media is played by client software
computer uses to run programs and store data. Information stored in RAM as it is received. Typically, streaming makes it unnecessary for users to
is temporary and is designed to be erased when the computer is turned download a file before playing it.
off. strong password = A password that cannot be easily guessed or cracked.
registry = A repository for information about the computer's configuration. A strong password is at least eight characters long, does not contain all or
registry key = A collection of information within the Windows registry. The part of the user's account name, and contains at least three of the four
information contained within the key controls how specific parts of following categories of characters: uppercase characters, lowercase
Windows look and work. characters, numbers, and symbols found on the keyboard (such as !, @,
remote computer = A computer located elsewhere that you can connect #).
to from your computer by using remote access software (such as Remote subkey = An element of the registry that contains entries or other subkeys.
Desktop Connection) and a modem or Internet connection. A tier of the registry that is immediately below a key or a subtree (if the
Remote Desktop Protocol (RDP) = A standard set of communication subtree has no keys).
rules used by computers that enables you to use your computer to connect subnet = A network that forms part of a larger computer network. Subnets
to a computer located elsewhere. are connected through routers. Each subnet has a separate range of IP
removable media = Anything used for information storage that is addresses.
designed to be easily inserted into and removed from a computer or switch = A device used to connect computers on a network. The
portable device. Common removable media include CD and DVD discs, as computers are connected to the switch with cables. A switch is similar to
well as removable memory cards. hub, except that it sends the information received from one computer to
restore points = A representation of a stored state of your computer's the specific computers that are supposed to receive it.
system files. Restore points are created by System Restore at specific system administrator = A person responsible for planning, configuring,
intervals and when System Restore detects the beginning of a change to and managing the day-to-day operation of a computer network. Typically, a
your computer. Also, you can create a restore point manually at any time. system administrator assigns user accounts and password, establishes
rights = Computer policies that control access to the computer and security access levels, allocates storage space, and monitors systems to
network resources. Rights are usually set up by a system administrator. prevent unauthorized access and attacks by malicious software.

Prepared by: Mr. Jeffrey A. Diaz 18 July 2014

system events = An event triggered by Windows system components that user profile = A file that contains configuration information for a specific
is recorded in the system log, such as the failure of a driver or other user, such as desktop settings, persistent network connections, and
system component to load during startup. application settings. Each user's preference are saved to a user profile that
Table PCs = A laptop with a screen that you can write on or interact with Windows uses to configure the desktop each time that a user logs on.
by using a table pen. On Table PCs that have touchscreens, you can also video card = A piece of computer hardware that converts electronic
interact with the screen by using your finger. information into text, images, movies, and animations that are displayed on
tablet pens = The pen that comes with a Tablet PC and is used to interact a computer screen. Also called video display adapter, video adapter, or
with items on the screen. video controller.
tags = A custom file property that you create to help find and organize your video port = A connection that sends video information from one device to
files. another. For example, a computer's video port sends video signals to a
taskbar = The area of the desktop that contains the Start button and monitor.
buttons for all open programs. By default, the taskbar is located at the virtual memory = Temporary storage used by a computer to run programs
bottom of the desktop, but you can move it. that need more memory than the computer has.
taskbar button = A button representing an open folder or program. These virtual private network (VPN) = A network that connects one or more
buttons appear on the taskbar (the horizontal bar at the bottom of your computers to a large network, such as a business network, using the
desktop). You can click a taskbar button to switch between programs. Internet. A VPN is encrypted, so only authorized people have access to it.
TCP/IP = A set of rules, called network protocols, that computers use to virus = A malicious computer program designed specifically to replicate
exchange information over the Internet and over home and business itself and spread from computer to computer. A virus may damage
networks. TCP/IP includes standards for how computers communicate and hardware, software, or data.
conventions for connecting networks. volume = A storage area on a hard disk that is formatted with a file
themes = A collection of pictures, colors, and sounds for your computer system. Volumes have drive letters assigned to them. A single hard disk
desktop. A theme includes a desktop background, screen saver, window can have multiple volumes. Some volumes can span multiple hard disks.
colors, and sounds. Some themes might also include icons and mouse web browser = A software program used to display webpages and to
pointers. navigate the Internet.
title bar = The horizontal bar at the top of a window that contains the web server = A computer that stores information (such as webpages or
name of the window. Most title bars also contains boxes or buttons for files) and makes that information available over the Internet.
closing and resizing the window. Welcome screen = The first screen that appears when you turn on
toolbar = The row, column, or block of buttons or icons, usually displayed windows. The Welcome screen lists all of the accounts on the computer.
across the top of the screen, that represent tasks you can do within a Wi-Fi = The acronym for wireless fidelity, a wireless networking standard. A
program. For example, in WordPad, the toolbar contains buttons you can Wi-Fi network can be used to enable connectivity to a larger local area
click to apply bold formatting to text, print a file, or open a new document. network (LAN), wide area network (WAN), or the Internet.
The toolbar buttons provide shortcut to common tasks frequently accessed Wi-Fi Protected Access (WPA or WPA2) = A security method used by
from the menus. wireless networks. WPA or WPA2 encrypt the information that is sent
traffic = The number of visits to a website, or the amount of user activity between computers on a wireless network and authenticate users to help
on a website or on a network. ensure that only authorized people can access the network. WPA2 is more
Transmission Control Protocol (TCP) = The protocol within TCP/IP that secure that WPA.
governs the breakup of data messages into packets to be sent via IP, and windows = A rectangular area on a computer screen in which programs
the reassembly and verification of the complete messages from packets and content appear. A window can be moved, resized, minimized, or
received by IP. closed.
TV tuner = A card or device that can receive television signals, usually Windows Internet Name Service (WINS) = A technology that translates
through an antenna or cable connection. computer names into numerical addresses (IP addresses). Computers
unallocated disk space = Unpartitioned and unformatted space on a hard uses these addresses to find other computers on a network. WINS
disk. enables you to connect to a network computer by typing the computer's
updates = Addition to software that can prevent or fix problems, enhance name, so you don't have to know the IP address.
the security of a computer, or improve a computer's performance. Wired Equivalent Privacy (WEP) = A security protocol designed for use
URL = An address that uniquely identifies a location on the Internet. A URL with wireless networks. WEP encrypts the information that is sent between
is usually preceded by http://, as in A URL can computers on a wireless network. WEP is not as secure as the more
contain more detail, such as the name of a page or hypertext, often with recent protocol, Wi-Fi Protected Access (WPA).
the file name extension .html or .htm. workgroup = A group of computers that are connected on a network and
USB = A narrow, rectangular connector used to attach a device, such as a share resources, such as printers and files. when you set up a network,
keyboard or a mouse, to a computer. Windows automatically creates a workgroup and gives it a name.
USB flash drive = A small device used to store information. USB flash worms = A self-replicating program, similar to a virus. A worm can make it
drives plug into computer USB ports so you can copy information to or possible for a malicious user to take over your computer or can send out
from them, making it easy to share and transport information. enough copies of itself to cause your computer or a web or network server
USB port = A narrow, rectangular connection point on a computer or other to stop responding.
device (such as a keyboard) where you can connect a universal serial bus writable = A CD or DVD disc onto which files can be copied. Common
(USB) device. writeable disc types include CD-R, CD-RW, DVD-R, and DVD-RW.
user account = A collection of information that tells Windows which files writing pad = The writing area in Tablet PC Input Panel that you use to
and folders you can access what changes you can make to the computer, write text to be converted to typed text and inserted in a program.
and your preference, such as your desktop background or screen saver.
Each person accesses their user account with a user name and password.

Recovery Tools

Startup Repair = Automatically fix problems that are preventing Windows from starting.
System Restore = Restore Windows to an earlier point in time.
System Image Recovery = Recover your computer using a system image you created earlier.
Windows Memory Diagnostic = Check your computer for memory hardware errors.
Command Prompt = Opens a command prompt window.

Prepared by: Mr. Jeffrey A. Diaz 18 July 2014