How MATC Graduate Can Secure IT Computer Support job in 30 days?

Evette

Evette

Passionate Information Technology Customer Support Specialist Student at Milwaukee Area Technical College
Motivated and determined Information Technology Customer Support student with an anticipated graduation date of Spring 2018.
Evette
If you have been keeping up with the industry, then you already know that social media is the latest and greatest forum arts, sports, fashion, cosmetic makeovers, and jobs… yes, jobs!  Social media is at the intersection of technology and human interaction. We are gradually shifting to websites which offer the opportunity for greater human interaction. Typical recruiting is a thing of the past (just like pagers).  Statistics reveal that more employers look to locates candidates and hire the latest asset to their business based on social media recruiting.  Social media is a talent pipeline. SOURCE:  https://www.job-hunt.org/social-networking/social-media.shtml In business and the private sectors, social networking is at a fury right now, in business and in private life. Employers is using social media to find qualified applicants, often a faster and cheaper method of identifying good job candidates than posting a job. Even before you sit down at your first interview, social media is used to helps recruiters gain a clearer picture of who you. They also pick up clues about your personality and how you might fit into their corporate culture.  According to www.job-hunt.org, employers look to social media to find out your history.  Here are some of the things potential employers look to social media for: How well you communicate (your spelling, punctuation, and grammar as well as your ability to clearly communicate ideas). Your work history and education. Your industry knowledge. Your use of alcohol. Your use of illegal substances. Your use of profanity. How you spend your non-work time. FACEBOOK is the world’s largest social network.  Facebook is a social networking website that is operated and...

HOW TO SETUP AND CONFIGURE WIRELESS NETWORK IN SECURE MANNER

Evette

Evette

Passionate Information Technology Customer Support Specialist Student at Milwaukee Area Technical College
Motivated and determined Information Technology Customer Support student with an anticipated graduation date of Spring 2018.
Evette
Wireless networks are setup based on the administrator or end user’s goals, which includes:  speed, range, and security.  Deploying secure wireless networking is an ongoing practice.  Employing encryption to protect wireless network is one of the best manner to protect your wireless network from attacks and interceptions.  Encryption is the process of preventing unauthorize access by changing information or data into a code.  Wireless network users have an option of choosing between three common forms of secure encryption.  These options are: WEP, WPA. And WPA2.  Details regarding these protocols can be accessed through Wireless Encryption Basics.  Passwords are simply one level of security.  Encryption and selecting the right wireless broadband router are also essential when setting up your wireless network.  Another facet of setup of routers that should be considered is location.  Placement of the wireless router near a window means that your wireless signal range reach too far outside the house where it can be easily interception by cybercriminals.  Place your router in the middle of you house so all rooms have the same internet access.  When you leave on vacation, make sure to disable your wireless network, prevent an opportunity for malicious hackers to attempt to gain unauthorized access to your network. Here are great points about securing your wireless network: New technology on routers has wi-fi protected setup which has a WPS button to lock the device during setup. As with any software, check the manufacturer’s website for updates to your firmware. Disable SSID in your wireless setting which will prevent your device showing up is a list of nearby network. Each device on the network...

How to protect data on Mobile devices?

  Here are useful security features for your mobile device. Use whichever feature your device offers that provide the best security for your needs: 1.  Password, pass code, or Pin: If you set a password, pass code, or Pin to access your device is simple and effective. Try using a code that is four digits or longer so that you can keep it a secret, like you do for any of your other passwords. 2. Unlock pattern:  Many mobile devices let you set unlock patterns that function like passwords in a way. Use a pattern that is complex and keep it a secret to protect it from observers. Also be careful of smudges on the front of your device may reveal your pattern to unauthorized users. 3. Device lockout: Most mobile devices provide a lockout option that locks the device if someone makes several unsuccessful attempts to enter the password, Pin, or pattern. If you set the lockout setting to a limit of 10 attempts is usually enough....

Most important features of Samsung Galaxy Note 4

  1. Link preview enables you to view the URL link received via SMS or messengers in advance using the S pen with opening a web browser. To activate that you will need to go to settings, then to S pen, and last Air view. Then you need to move the S pen close to the URL link and you will now be able to see the major contents provided by the URL in a pop up window. 2. Caller information display features –  When you get a call from someone, sometimes you want to know what the person has been up to lately or about the last conversation was made between you and the person. You can check information about the person when you are receiving a call from, or making a call to. If you want to show caller id you will need to go to the dial app and check to settings, then calls, and last show caller information. It will then show all the person’s activities uploaded to his or her contact history. 3. Wi-Fi Sharing – This feature allows your device to connect to another device that is connected to Wi-Fi without having to type in the password. To get to to this feature you will need to make sure your connect to Wi-Fi. Once that opens go to Quick Connect by swiping down the Notification panel from the top edge of the screen, then finds device that needs to be sharing the Wi-Fi with, and last select Share Wi-Fi to share your Wi-Fi network. 4. One Handed Operation – This feature is awesome out of the...

Finding Repair instructions for Mobile devices online

Evette

Evette

Passionate Information Technology Customer Support Specialist Student at Milwaukee Area Technical College
Motivated and determined Information Technology Customer Support student with an anticipated graduation date of Spring 2018.
Evette
Today, your greatest information source lies right at your fingertips.  It is the world-wide web (“www” or “web”)! The web is an information space where documents and other web resources are identified by Uniform Resource Locators (URLs), interlinked by hypertext links and easily accessible through the internet.  Countless “how to’s” and do-it yourself “diy” imaginable is sourced on numerous websites.  And the leading forum specializing in internet-related searches, including webpages, images, videos and more in Google.  Google is the perfect place to find instructions for disassembling and reassembling laptop, Ultrabook, and mobile device repair, and much more. Notice, the snip (or partial screenshot) of the Google search engine below or Chrome browser (Google and Google Chrome have similar names, but different details –  Chrome is a web browser developed by engineers at Google). After typing in whatever you want to search, press the Enter key on the keyboard of your computer. Choose the most specific or relevant keywords or phrases to describe your topic, for example:  “how to disassemble an iPhone 4S?” and press ENTER on your keyboard. To maximize your search research, give specific details about the product, such as manufacturer’s name and version.  Next, access your results.  Use the tabs at the top to help define what type of search you want.  For “how to,” I would suggest a video.  In the image above, the first search result shows a guide in a portable document format (commonly referred to as “pdf” which is a file format used to present and exchange documents reliably), and the second is a YouTube link.  The more information you have, the better! ...

How to share files using Google Drive

You can share files and folders that you store in Google Drive with anyone. The people you share with always see the most updated file and you can control whether they can edit, comment on, or only view the file. Here is a step by step on how you can share files with others. 1.  First you start by going to your Google account and click in the right upper corner that has a little square. Next, there will be a drop menu and you will need to click on the app that says Drive it looks like a colored triangle. Just like the screen print below. 2. Second step is you should see the Google Drive page. Just like the screen print below. Once the page shows up you will then need to click in the upper left corner and click New if your trying to add a new file or you can see if your file shows up on the home scree of Google Drive. 3. The third step is you will need to find the file you want to share. By doing that you can click on the file and right click; then wait for a menu to drop down and click share. 4. The last step is after you click share you should see the screen as shown below in screen print and once you see that. Then under “People” type the email address or Google Group you want to share with. To choose what someone can do with your file, click  the Down arrow. After that you can finally click send and an email...