Not Just Another Computer Book
()
About this ebook
Related to Not Just Another Computer Book
Related ebooks
BackTrack: Testing Wireless Network Security Rating: 0 out of 5 stars0 ratingsPractical Malware Prevention Rating: 0 out of 5 stars0 ratingsWeb Penetration Testing: Step-By-Step Guide Rating: 0 out of 5 stars0 ratingsKali Linux Wireless Penetration Testing Essentials Rating: 5 out of 5 stars5/5Android Forensics: Investigation, Analysis and Mobile Security for Google Android Rating: 3 out of 5 stars3/5Penetration Testing with Kali Linux: Learn Hands-on Penetration Testing Using a Process-Driven Framework (English Edition) Rating: 0 out of 5 stars0 ratingsHacking: 10 Easy Beginners Tutorials on How to Hack Plus Basic Security Tips Rating: 0 out of 5 stars0 ratingsSeven Deadliest USB Attacks Rating: 0 out of 5 stars0 ratingsProtect Your Personal Information Rating: 0 out of 5 stars0 ratingsApple Secure Enclave Processor Rating: 0 out of 5 stars0 ratingsEthical Hacking: A Comprehensive Beginner's Guide to Learn and Understand the Concept of Ethical Hacking Rating: 0 out of 5 stars0 ratingsPenetration Testing of Computer Networks Using BurpSuite and Various Penetration Testing Tools Rating: 0 out of 5 stars0 ratingsOnline Hacker Survival Guide Rating: 0 out of 5 stars0 ratingsMind-blowing Signal 101 Guide for Beginners and Experts: Unravel the Best Signal Private Messenger Tips for Secured Calls and Chats Rating: 0 out of 5 stars0 ratingsHack Proofing Linux: A Guide to Open Source Security Rating: 0 out of 5 stars0 ratingsMethods to Increase the Internal Storage Space of Android Devices Rating: 0 out of 5 stars0 ratingsCommon Windows, Linux and Web Server Systems Hacking Techniques Rating: 0 out of 5 stars0 ratingsQuick Configuration of Openldap and Kerberos In Linux and Authenicating Linux to Active Directory Rating: 0 out of 5 stars0 ratingsOverview of Some Windows and Linux Intrusion Detection Tools Rating: 0 out of 5 stars0 ratingsLearning zANTI2 for Android Pentesting Rating: 0 out of 5 stars0 ratingsSome Tutorials in Computer Networking Hacking Rating: 0 out of 5 stars0 ratingsPC Safety 101 Rating: 0 out of 5 stars0 ratingsAndroid & Cellphones Rating: 5 out of 5 stars5/5Kismet Hacking Rating: 0 out of 5 stars0 ratingsBreaking Computer Network with Internet Rating: 0 out of 5 stars0 ratingsAndroid Security Cookbook Rating: 0 out of 5 stars0 ratingsUbuntu: Powerful Hacks and Customizations Rating: 2 out of 5 stars2/5Hacking and Penetration Testing with Low Power Devices Rating: 2 out of 5 stars2/5
Computers For You
Mastering ChatGPT: 21 Prompts Templates for Effortless Writing Rating: 5 out of 5 stars5/5Deep Search: How to Explore the Internet More Effectively Rating: 5 out of 5 stars5/5Artificial Intelligence: The Complete Beginner’s Guide to the Future of A.I. Rating: 4 out of 5 stars4/5The ChatGPT Millionaire Handbook: Make Money Online With the Power of AI Technology Rating: 0 out of 5 stars0 ratingsCreating Online Courses with ChatGPT | A Step-by-Step Guide with Prompt Templates Rating: 4 out of 5 stars4/5Procreate for Beginners: Introduction to Procreate for Drawing and Illustrating on the iPad Rating: 0 out of 5 stars0 ratingsFundamentals of Programming: Using Python Rating: 5 out of 5 stars5/5People Skills for Analytical Thinkers Rating: 5 out of 5 stars5/5Grokking Algorithms: An illustrated guide for programmers and other curious people Rating: 4 out of 5 stars4/5Elon Musk Rating: 4 out of 5 stars4/5How to Create Cpn Numbers the Right way: A Step by Step Guide to Creating cpn Numbers Legally Rating: 4 out of 5 stars4/5SQL QuickStart Guide: The Simplified Beginner's Guide to Managing, Analyzing, and Manipulating Data With SQL Rating: 4 out of 5 stars4/5Practical Lock Picking: A Physical Penetration Tester's Training Guide Rating: 5 out of 5 stars5/5Remote/WebCam Notarization : Basic Understanding Rating: 3 out of 5 stars3/5Master Builder Roblox: The Essential Guide Rating: 4 out of 5 stars4/5The Professional Voiceover Handbook: Voiceover training, #1 Rating: 5 out of 5 stars5/5The Mega Box: The Ultimate Guide to the Best Free Resources on the Internet Rating: 4 out of 5 stars4/5CompTIA IT Fundamentals (ITF+) Study Guide: Exam FC0-U61 Rating: 0 out of 5 stars0 ratings101 Awesome Builds: Minecraft® Secrets from the World's Greatest Crafters Rating: 4 out of 5 stars4/5Assembly Programming:Simple, Short, And Straightforward Way Of Learning Assembly Language Rating: 5 out of 5 stars5/5ChatGPT Ultimate User Guide - How to Make Money Online Faster and More Precise Using AI Technology Rating: 0 out of 5 stars0 ratingsCompTIA Security+ Practice Questions Rating: 2 out of 5 stars2/5Everybody Lies: Big Data, New Data, and What the Internet Can Tell Us About Who We Really Are Rating: 4 out of 5 stars4/5Dark Aeon: Transhumanism and the War Against Humanity Rating: 5 out of 5 stars5/5Ultimate Guide to Mastering Command Blocks!: Minecraft Keys to Unlocking Secret Commands Rating: 5 out of 5 stars5/5
Reviews for Not Just Another Computer Book
0 ratings0 reviews
Book preview
Not Just Another Computer Book - Alfonso J. Kinglow
NOT JUST ANOTHER COMPUTER BOOK
Alfonso J. Kinglow
INTRODUCTION
PREFACE
After reviewing many computer books over the years, I discovered that they all assume that the reader’s have some basic knowledge of computers and that they understand the entire computer lingo’s that are used. All of their assumptions are wrong, and lead sometimes to misconceptions.
Almost all of the computer books I reviewed did not have, or did not include basic computer terms used, or did not explain the meaning of some basic computer concepts.
This book assumes nothing, and tries to present basic computer information in a plain and simple format, which includes some hidden features and commands that all users should know; but are not published. These hidden features are basic information built into the hardware and software that are in the public domain; but are not considered important enough for the readers to know.
This book gives the user a complete knowledge of computer hardware and software and current related standard’s up to date.
An emphasis is placed on current and new standards that applies to new technology today, and why they are important. We review the current Wireless standard (802.11 bgn) and the new standards ac and ad.
We also explain the defacto standards that are used in today’s technologies.
This basic knowledge help’s the reader to understand why some hardware and software features that are used operate the way they do, and explains the difference between standards related to computer networks, hardware and software.
The material presented provides an in-depth of introductory computer subjects; which includes how to use computers, how to access information and data on computer networks and the Internet World Wide Web, and hidden features and commands embedded into your computer hardware and software.
The objectives of this book are to:
Present the most up to date computer technology
Teach the basic concepts of hardware and software
Present the material in a way that seniors and students can understand it, using simple comprehensive methods and charts.
Present a basic understanding of Local Area Networks ( LAN) and Wide Area Networks (WAN) and Wireless Networks.
Present basic information on how to secure your computer
Present the most up to date technology on computer security hardware and software.
Give students an in-depth understanding of why computers are used in business, academia, government, industry and society today.
Present strategies that seniors and students can use to install secure and maintain their desktop and laptop computers.
Present some of the hidden software and utilities in Windows 8
Show the users how to use Snapins and the Microsoft Management Console ( MMC ).
Present information on Free and Paid Antivirus Programs
Present information on how to use Email and Email Applications.
Present complete and comprehensive information on the Internet and the World Wide Web.
Present information on setting up Wireless Networks and using WI-FI on the Internet.
Complete information on using the Internet Search Engines and Search operators.
Present information on Free Software available for Download
Present information on Freeware, Shareware, Trial ware and Public Domain Software.
Present information on Cleaning and Protecting Computers
General Information on The first Rule of Protection for Computers, and the Rule of 30.
Present information about user Applications and System Applications.
General information on the different Search Engines on the Internet.
DEDICATION
I Dedicate this book to all of the
Seniors at MUNSON SENIOR CENTER
Of Las Cruces; New Mexico
Who showed interest in learning about Computers and attending my Basic and Intermediate Computer Classes
And for the
Cooperation of all the Staff for their help and attention in assisting me and providing all the necessary space and facilities for the classes at Munson Center and to Genevieve,Guillermina and Sally,who encouraged me and supported my vision to make Technology available to Seniors and many others for their support
Thank you
To my wife Sarah Elizabeth
For all her support love and care
And for
My Strength
My Light and
My Joy
My Daughters
Kezia Keren and Karina
Who inspired me to leave some of my vast knowledge behind for posterity
And
For my Grand-son Kenny, Te-Sho Virtue and Longevity
And my
Grand-daughter Anaiah Aia, Patience Purity and Power
You all made me a very proud Father, Grandfather
And a better person, now and forevermore.
Copyright © 2014 by Alfonso J. Kinglow
All rights reserved. This book or any portion thereof
may not be reproduced or used in any manner whatsoever
without the express written permission of the publisher
except for the use of brief quotations in a book review.
Printed in the United States of America
First Printing 2014
ISBN: 978-1-312-33288-1
Lulu Publishing
3101 Hillsborough St.
Raleigh, NC. 27607-5436
Publisher’s Cataloging-in-Publication data
Kinglow, Alfonso J.
Not Just Another Computer Book : a subtitle of the same book / Alfonso J. Kinglow/
p. cm.
ISBN 978-1-312-33288-1
1. The main category of the book —Computers —Other category. 2. Computer Technology —From one perspective. 3. More categories —And their modifiers. I. Johnson, Ben. II. Title.
HF0000.A0 A00 2014
299.000 00–dc22 2010999999
First Edition
14 13 12 11 10 / 10 9 8 7 6 5 4 3 2 1
Ordering Information:
Quantity sales. Special discounts are available on quantity purchases by corporations, associations, and others. For details, contact the publisher at the address above.
Orders by U.S. trade bookstores and wholesalers.
Printed in the United States of America
Limit of Liability/Disclaimer of Warranty
Limit of Liability/Disclaimer of Warranty: While the publisher and author have used their best efforts in preparing this book, they make no representations or warranties with respect to the accuracy or completeness of the contents of this book and specifically