You can listen to thousands of titles all you want, whenever you want.
Stream or download to listen offline!
Free 30-day trial.
At some point down the road, usage will dictate a need for more powerful applications. We may need a word processor that can convert a document into an HTML page or PDF document. We may need a calculator that solves geometric problems. Or we may need a multimedia tool that lets us create our own videos as well as watch them. We're going to predict that all paper-based transactions (checks, money orders, etc.) and documentation (think of the old filing cabinet system) will disappear. We're going to predict that chips will replace everything that was once transported from one location to another through the trusty post office. We often joke around the office about the "grandma" who refuses to use a computer until she can afford the "latest" one. Chances are, Grandma isn't ever going to shell out the bucks to buy the latest computer on the market, nor is she going to know how to use it once she gets it. What Grandma doesn't realize however is that a used computer is an excellent training tool that she can use to prepare herself for something "better" in the future. If you download a compressed file from a website or file library that ends in an .exe extension, take note that although the file is compressed, it's typically a file that will install a program onto a computer. .Zip or .Sit files don't install software - they merely archive a collection of them into one, or they significantly reduce the size of a larger one. Customizing Your Computer with Preferences Making Your Computer Work with You - Not Against You Although you did not design or build your computer, you can turn it into a device that responds to your way of using it as if you were its original engineer or programmer. This is because the computer is a mere platform - a blank canvas, if you will - waiting for you to direct its operation or paint the picture of the perfect machine. Hackers look for things like full names, social security numbers, phone numbers, home addresses, work-related information, and credit card numbers. If these things aren't saved onto a computer, there's nothing critical to worry about other than restoring your computer to a non-virus condition. 3. Don't open files without scanning them with an anti-virus/anti-spyware program.
Share This Page