Of course a mini keyboard is available for the text-messaging fan or for the poor fellow who can't seem to get away from the office. In the latter case, don't be surprised if you find the entire Microsoft Office suite displayed within a screen no bigger than a matchbook. Is this a phase? That's highly doubtful. Identifying Compressed Files Most files are compressed in .zip format (if you're using Windows) or .sit format (if you're using a Mac). The two most popular software programs used to compress and decompress files are Winzip and StuffIt respectively. There are other programs that do the same thing and there are even programs that can compress and decompress files for both the Windows and the Mac system. Can an absolute newbie operate a computer without knowing how to use a mouse or keyboard? Assuming that a computer is set up to operate on voice command - sure! Voice command software allows users to tell a computer what to do and the computer responds by fulfilling the user's commands. Although it's pretty new and still under development, voice directed technology has already infiltrated consumer service related systems. If you find that you can't type information into one of these, you can effectively resolve the issue with a technician by calling it an input box, rather than a "white rectangle," or "place to put in text." Button - buttons perform a command after a user clicks them with a mouse. Problems occur when the text of a button is grayed out or if it doesn't appear to sink into the screen when clicked. If you're familiar with MS-DOS at all, you'll recall that it's a command-driven operating system that performs functions issued at the C:> prompt. The only way to get an MS-DOS computer to do something was to type a command at this prompt and if you can imagine, it was a rather cumbersome way to use a computer. Innocent people become pawns for the evil plans of others who've convinced themselves they're doing the "right" thing. To protect a computer from getting a virus, or clean a virus from a computer system once infected requires the use of an antivirus utility. But may be something else we can do.
Share This Page