I have put together information on the web in a more condensed form. The following is a short documentation of differences between Microsoft Windows 7 and 10. Click here to Download differences between Win 7 & 10...
My name is Iris Barreto (aka Sister Iris Marie). I am a Schoenstatt Sister of Mary getting updated and learning about the world of IT. I began my studies at MATC in the Fall of 2016. Studying the IT Support Specialist program, I hope to be a great asset to my community and to the Schoenstatt Movement.
Latest posts by Iris Barreto (see all)
- Differences between Windows 7 and Windows 10 for Enterprise Support users - July 9, 2017
- Quick Guide to using the Spell Checker in Microsoft Word - March 15, 2017
- Quick Guide to using the Sort and Filter in Excel - March 15, 2017
Okay, you’ve made it! You are now a Project manager of a medium sized company that is based out of Milwaukee Wisconsin. The region your company has is in Milwaukee, Indianapolis, Chicago. The company wants to upgrade their tech departments for the latest version Samsung has to offer. Our job is to figure out a good strategy that will help the users transition smoothly to the new applications. This scenario requires us to have 57 new Samsung devices, which means 57 users are getting a brand new deceives that they may never have used before. Organization and communication are paramount in the success of this mission. The first thing we need to do is identify a list of tasks that are required to accomplish the project. We need to: • Document number of devices • Create inventory of all applications installed on devices • Create a pilot upgrade device, with the new operating system installed • Install existing applications on to the pilot device • Verify compatibility of the applications on the new OS • Remediate issues with the applications (make changes to make apps work) • Create a migration plan • Execute migration plan • Support devices/users that still have issues • Close the project. Above is a sample list of tasks that will need to be completed to have a successful upgrade. Now it is my opinion that people can use multiple devices to connect to the existing internet. There has never been anything wrong with options. In fact, in my day to day life I have many different forms of electronic equipment that all can do...
Latest posts by James Farrell (see all)
What are the differences between Adware Virus, Worms, Spyware, Trojan, Rootkits, Backdoors, Logic bomb, Botnets
Security breaches is a big problem that concerns every company. Many businesses are still unprepared or not protected at all from a variety of security threat. There are many causes and many type of security threat. These threats are referred to as malicious software program also known as “Malware”. Some of them are not even known by the average computer users. Below are the most known malware that can harm our computers, each one will be define along with their characteristics. Adware: They are designed to display advertisements on your computer, redirect your search request to advertising websites and collect marketing-type data about you- in instance- the types of websites that you visit-so that customized adverts can be displayed. There is no signs of the program in your computer’s system making its presence unknown and challenging to detect. Visiting an infected website can result in unauthorized installation of adware on your computer. Virus: Is design to spread from host to host. It has the ability to replicate itself. A computer virus is a type of malicious program written to alter the way a computer operates. It is also designed to spread from one computer to another. A virus operates by inserting itself to a legitimate program in order to execute its code. Worms: A computer worm is a self-b replicating computer program that penetrates an operating system with the intend of spreading malicious codes. Worms utilizes networks to send copies of the original code to others computers. Worms cause harm by consuming bandwidth or sometimes deleting files or sending document via e-mail. Worms can also install backdoor on computers. Worms are often...