Using the software provide by Milwaukee Area Technical College for students in the IT Computer Program

Milwaukee area technical college (MATC) provides free software to those students in the IT Computer Program, it can be support, networking or security etc. These software are VMware and DreamSpark. My job is to inform how to use these software’s. First we have to start with VMware, every student in the IT program will get an Email relate to your account on VMware and the information for example your user ID and the password. First we have to look for the email with the information, this email was sent once you start any IT class. 2.  The second step will be to click on the link it will send us to the VMware website, where we have to put our personal information like the username and the password provide by the email.   3. In this official website we have put our username and the password to get into VMware and download items from there. 4. We can look for a specific version of VMware if we want and so far we can find any version on here. There are hundreds of Software for students on here all those relate to VMware. In the next example I will show you how to purchase VMware on here First we have to select the VMware version, in this case will be the VMware version 10, I selected and clicked on add to My chart then I went to my chart and started downloading where they give us the product key and expiration date.   Second once we go to start download, it will appear on a folder, because this software are...

List of the Tools and Requirement’s Needed for Cell Phone Repair

1. Opening Tools a) Screw driver: This is the first tool that we need to open/ disassemble a cell phone. We are going to find different types but one of the most common used for this specific work is a Phillips screw driver  whose head is of plus (+) shape. The second type of crew for Mobile Repair is the one with s star shaped head. Those screw are in different size so it recommendable to buy the entire set. b) Openers: Openers are used to open the housing/casing as it is locket. c) Tweezers: Tweezers are needed ti hold the electronic components. 2. Cleaning tools a) IPA (Iso Propyl Alcohol): the recommended cleaning solutions for this mobile phone circuit board (PCB) are IPA. b) Brush: This is used to remove and clean any dirt or dust inside the phone or on the PCB. c) Ultrasonic Cleaner Machine: An ultrasonic cleaner s used  for deep cleaning of the Phone Circuit board. 3. Testing tools a) Multimeter: A Multimeter is used for checking ad testing many parts and components. They can be used to check broken tracks on the PCB. There are two types of Multimiter, Digital and Analog, for Mobile repair it is recommended to use Digital because of accuracy and ease. b) LCD repair tool: In smartphones the most common problem is that the LCD cracks, while sometimes just the touch glass cracks. The LCD and glass are fused, you will need to buy the entire set of both. 4. Some Soldering a) Rework Station: A rework station is used for heating and replacing ICs (chips) on the...

The greatest features on the Samsung Galaxy Note 4

Samsung finally brought us the new Galaxy Note 4, which it comes with one of the greatest design. The galaxy Note 4 comes with a metal frame and curve glass over the screen along with a refine faux leather. The most important Key Features are: 5.7″ 16M-color Quad HD (Graphic Display Resolution) Super AMOLED display more pixels per inch than any other display. It means images are clearer, brighter and more captivating than ever before and capacitive touchscreen with curved Gorilla Glass 3 LTE Cat 6 support LTE 700/800/850/900/1700/1800/1900/2100/2600 (Bands 1, 2, 3, 4, 5, 7, 8, 17, 20) – N910F Quad-core 2.7GHz Krait 450 CPU; Qualcomm Snapdragon 805 chipset The snapdragon 805 processor is the first mobile processor to enable a truly comprehensive Ultra HD (4K) solution, bringing the ultimate in high resolution mobile video. 3 GB of RAM The Galaxy note 4 has 3 GB of RAM , having this RAM is important in today because their realities of big screen, conductive for heavy multitasking. 16 MP OIS camera with 2160p video recording 3.7 MP front facing camera, 1440p video recording Wi-fi a/b/g/n/ac, Wi-fi direct and DLNA, Download booster GPS with A-GPS, GLONASS 32 GB of built-in storage and  a microSD card slot up to 128 GB S Pen stylus The S Pen it’s smooth interaction makes it easy to do things like highlight, hand-write, sign documents, annotate picture and so much more. Stylus Pen for easy drawing and writing and allows precise control of phone’s function. Enhanced Multi-window multitasking support You can use Multi-window and Popup window to perform multiple tasks on the same screen and...
Protecting Data on Mobile Device against Theft

Protecting Data on Mobile Device against Theft

Smart phones, tablets, laptops, notebooks, iPhone and other mobile devices are the most common to access and store personal and institutional information. However mobile devices are easy to stole or lost. I will show you some steps on how to security your personal and institutional information on mobile devices.   1.Keep our devices physically secure We can keep our devices all the time close to us or leave it on a secure physical location. Its really important to record our device information such as; MAC address, serial numbers and  date of purchase, with this information the authorities can track or identify a lost or stolen mobile device 2. Data encryption Many mobile devices are capable of data encryption, we can consult our device’s documentation or online resources for more information. We can do two encryption on smart phones. The first is called encryption device and the second one will be Encrypt external SD card. My next example will show you on an Samsung Galaxy S5. T   Its important to do both encryption, because people can see what do you have on your external memory SD card. If they connect your SD card to a computer they can see what you stored on it. But once its encrypted people can not see what is stored on it. 3.   Password or PIN This security feature vary between devices and operating system, however setting a password or PIN to access your device is generally easy, and effective. Some operating system require to use four digits or longer, also you can use your email or pass-phrase 4. Unlock pattern To use...

Project Management – Training Users with a New System at Work

    In many large organizations, a Project Manager is responsible for training in the newly implemented system. The Project Manager oversees training on the new system. The manager can use the previously designed training plan to train effectively. Request feedback to determine the training was effective, if not on which areas they need to work on it. The next steps will help manager to deliver a successful training.  Define the main objectives. An effective trainer preparing a session and break down the objectives more clearly into specific points. At the end of the section managers can test if these adjectives have been met by asking questions and having the trainees demonstrate the skills they have been taught. Set the agenda and training sequence. In this step the manager has to make a schedule that works with every staff member affected by the new system. Project Manager have to explain the agenda and sequences of the steps to be covered to the trainees as it is ti have planned the session and know how you are going to preceded. Conditions and find the right environment Preconditioning of your trainees so that they know what to expect. Find the right place for your practices. The place for this section need many requirements. For example in the meeting room the trainees expect a quiet room, with some light, nice temperature etc. Show and Tell how the system works In the first  step the manager show or demonstrate some techniques to the trainee,identifying ways ti support your organization mission, vision and strategy. Second you tell the trainees how those techniques works and...