User talk:Kellesaiconnally

2.4.1 – Wiki – Internet Telephones •	What is Voice over Internet Protocol o	A transmission technology that allows you to make voice calls over the Internet using a service such as Skype •	How does VoIP work? o	When you speak into a microphone, software and hardware convert the analog signals of your voice into digital signals that are then transferred over the Internet •	What are the advantages and disadvantages to converting to VoIP? o	Advantages - The major advantage is the cost. Since the voice signal is transmitted over the internet and is considered as data service, VoIP phone service is exempted from long distance fees. Therefore, many VoIP phone providers can offer a very low rate for long distance and international calls. o	Disadvantages - VoIP phone service relies on broadband connection to transmit the signal, it will not work with dialup internet connection. The quality of internet connection also determines the quality of the calls. VoIP phone service also will not work if there is power outage and when the internet connection is down. The 9-1-1 service provided by VoIP phone service is also different from analog phone which is associated with a fixed address. The 9-1-1 emergency center may not be able to determine your location based on your virtual phone number. •	Who offers Internet telephone service in your area? o	Skype, Google Voice, Phonebooth.com, VoxOx •	What are the costs of Internet telephone service? What if you want to cancel? o	Skype – free of charge, cancel anytime o	Google Voice – free of charge, cancel anytime o	Phonebooth.com - $20/month, cancel anytime o	VoxOx – free of charge, cancel anytime •	What equipment will you need for Internet telephone service? o	A broadband (high speed Internet) connection is required. This can be through a cable modem, or high speed services such as DSL or a local area network. A computer, adaptor, or specialized phone is required. Some VoIP services only work over your computer or a special VoIP phone, while other services allow you to use a traditional phone connected to a VoIP adapter. •	Does the government regulate Internet telephone services? If yes, in what ways? o	Currently they do not regulate Internet telephone services, but are looking to do so in the coming years. •	What emergency and security issues, if any, might be concerns in Internet telephone service? o	The quality of internet connection determines the quality of the calls. VoIP phone service also will not work if there is power outage and when the internet connection is down. The 9-1-1 service provided by VoIP phone service is also different from analog phone which is associated with a fixed address. The 9-1-1 emergency center may not be able to determine your location based on your virtual phone number. •	How does a subscriber place an overseas call using an Internet telephone service? What costs are incurred? o	Making an international call from a VoIP telephone line requires the same dialing format as a landline phone. Making an international call with VoIP can be cheaper than using a landline phone. International calls using VoIP can be as cheap as two cents a minute to certain countries. But the biggest advantages of making international calls using VoIP is that you can choose to purchase a phone number in another country which will incur local call fees vs. international call fees. International call fees vary with each service.

Our Digital World - Introduction to Computing (2nd Edition). Paradigm Publishing. 2013.
 * Source: Gordon, J. Lankisch, K. Muir, N. Seguin, D. Verno, A.

Your submission at Articles for creation: Alienware 17 (October 6)
 Your recent article submission to Articles for Creation has been reviewed! Unfortunately, it has not been accepted at this time. Please check the submission for any additional comments left by the reviewer. You are encouraged to edit the submission to address the issues raised and resubmit when they have been resolved.


 * If you would like to continue working on the submission, go to Draft:Alienware 17 and click on the "Edit" tab at the top of the window.
 * If you need any assistance, you can ask for help at the [//en.wikipedia.org/w/index.php?title=Wikipedia:WikiProject_Articles_for_creation/Help_desk&action=edit&section=new&nosummary=1&preload=Template:Afc_decline/HD_preload&preloadparams%5B%5D=User_talk:Kellesaiconnally Articles for creation help desk] or on the [//en.wikipedia.org/w/index.php?title=User_talk:MatthewVanitas&action=edit&section=new&nosummary=1&preload=Template:Afc_decline/HD_preload&preloadparams%5B%5D=User_talk:Kellesaiconnally reviewer's talk page].
 * You can also get real-time chat help from experienced editors.

MatthewVanitas (talk) 16:38, 6 October 2014 (UTC)

File Management Using Windows
4.5.1 – File Management Tips

What are some naming convention guidelines to follow up when setting up files and folders? •	Avoid extra-long folder names and complex hierarchical structures but use information-rich filenames instead. This is because complex hierarchical folder structures require extra browsing at time of storage and at the time of file retrieval. By having all the essential information concisely in the file name itself, both the search and identification of the file is streamlined and more precise. •	Put sufficient elements in the structure for easy retrieval and identification but do not overdo it. Precision targeted retrieval requires sufficient elements to avoid ambiguous search results but too much information adds undue effort at file naming time with little or no returns at retrieval time. •	Use the underscore (_) as element delimiter. Do not use spaces or other characters such as: ! # $ % & ' @ ^ ` ~ +, . ; = ) (. The underscore (_) is a generally a standard for field delimiting and is the most visually ergonomic character. Some search tools do not work with spaces and should be especially avoided for internet files. Other characters may be interesting but visually confusing and awkward. •	Use the hyphen (-) to delimit words within an element or capitalize the first letter of each word within an element because spaces are poor visual delimiters and some search tools do not work with spaces. The hyphen (-) is a common word delimiter. •	Elements should be ordered from general to specific detail of importance as much as possible. In general the elements should be ordered logically, in the same sequence that you would normally search for a targeted file. •	The order of importance rule holds true when elements include date and time stamps. Dates should be ordered: YEAR, MONTH, DAY. (e.g. YYYYMMDD, YYYYMMDD, YYYYMM). Time should be ordered: HOUR, MINUTES, SECONDS (HHMMSS). This ensure that files are sorted in proper chronological order the most significant date and time components should appear first followed with the least significant components. •	Personal names within an element should have family name first followed by first names or initials. The family name is the standard reference for retrieving records. Having the family name first will ensure that files are sorted in proper alphabetical order.

What is the distinction between a file and a folder? How is each one visually represented? •	The basic difference between the two is that files store data, while folders store files and other folders. The folders, often referred to as directories, are used to organize files on your computer. The folders themselves take up virtually no space on the hard drive. Folders are often dep •	icted with icons which visually resemble physical file folders, while files are simply listed as the file name, or as the icon of the program that is used to open it. The basic difference between the two is that files store data, while folders store files and other folders. The folders, often referred to as directories, are used to organize files on your computer.Kellesaiconnally (talk) 20:08, 21 October 2014 (UTC)Edited by Kelley on 10/21 @ 4:08 pm

What are the default folders provided with the operating system? •	Modern operating systems such as Windows 8 have been designed to meet the needs of many different users. Accordingly, the operating system provides a method for creating multiple user accounts on a single installation of Windows 8. You can configure and customize each user account based on the needs of the individual who will be using it. For example, desktop settings, screen savers, shortcuts, and user-specific data files are all stored separately for each account. In general, give each user of a system his or her own account.

What is a file extension? Should file extensions be displayed? •	A file extension is a group of letters occurring after a period in a file name, indicating the format of the file. File extensions should be used to help identify what type of program opens the file. In Microsoft Windows, the file extension is a period that is often followed by three characters, but may also be one, two, or four characters long. For example, the filename "myfile.txt" has an extension of ".txt", which is a file extension associated with text files. Kellesaiconnally (talk) 20:08, 21 October 2014 (UTC)Edited by Kelley on 10/21/14

How do I browse the folders on my computer or other storage device? •	Windows Explorer is the file management application in Windows. Windows Explorer can be used to navigate your hard drive and display the contents of the folders and subfolders you use to organize your files on your hard drive. Windows Explorer is automatically launched any time you open a folder. How can I search for a file? •	In Windows 8, you can search for my computer, or simply the files name and the system will navigate through the folder to find the document you are looking for.

How do I perform common management tasks? Administrative Tools is a folder in Control Panel that contains tools for system administrators and advanced users. The tools in the folder might vary depending on which version of Windows you are using. •	Open Administrative Tools by clicking the Start button, and then clicking Control Panel. In the search box, type administrative tools, and then click Administrative Tools. Some common administrative tools in this folder include: •	Computer Management. Manage local or remote computers by using a single, consolidated desktop tool. Using Computer Management, you can perform many tasks, such as monitoring system events, configuring hard disks, and managing system performance. •	Event Viewer. View information about significant events, such as a program starting or stopping, or a security error, which are recorded in event logs. •	Local Security Policy. View and edit Group Policy security settings. •	Performance Monitor. View advanced system information about the central processing unit (CPU), memory, hard disk, and network performance. •	Print Management. Manage printers and print servers on a network and perform other administrative tasks. •	Services. Manage the different services that run in the background on your computer. •	System Configuration. Identify problems that might be preventing Windows from running correctly •	Task Scheduler. Schedule programs or other tasks to run automatically. •	Windows Firewall with Advanced Security. Configure advanced firewall settings on both this computer and remote computers on your network. •	Windows Memory Diagnostic. Check your computer's memory to see if it's functioning properly.

What can I do with deleted that have been sent to the Recycle Bin? •	Files can be deleted by going to the recycle bin and emptying all the files in the recycle bin. If you deleted files by mistake. You can click on items in the recycle bin and restore those files to their original destination.

Kellesaiconnally (talk) 19:46, 21 October 2014 (UTC)

Mac vs. PCs
5.5.1

•	Macs and PCs To compare Mac and PC is not that difficult. Below is a brief Mac vs. PC review and overview. I will list as many pros as possible about each one. A PC generally refers to a computer that runs on the Windows operating system. It is also defined as an IBM-compatible computer, thereby meaning that its architecture is based on the IBM microprocessor. A number of different operating systems are compatible with PCs; the most popular of which is Microsoft Windows. Some others are the UNIX variants, such as Linux, FreeBSD, and Solaris. On the other hand Macintosh, commonly known as Mac, is a brand name which covers several lines of personal computers designed, developed, and marketed by Apple Inc. The Mac is the only computer in the world that can run all the major operating systems, including Mac OS X, Windows XP, and Vista. With software like Parallels Desktop or VMware Fusion they can be run; side by side. Macs and PCs both have dedicated followers, and each type of computer has its own strengths and weaknesses (Edited by Kellesai Connally, 11/4/14.) •	Why Macs are Better - Macs give you the ability to run OS X and Windows both (legally). - Macs work great with other Apple components such as the iPhone, iPod Classic, iPod Nano, iPod Touch, iPod Shuffle, etc... - Macs are very simple to use. - Macs are less prown to computer viruses, although they can get viruses. - Purchasing a Mac gives you Apple Store support. - Apple uses quality parts to manufacture Macs. - Macs are trendsetting, designed well, and visually appealing. - Macs come with better software, out of the box (iLife). - Macs give you out of the box access to the iTunes Store, if you are an iPod or iPhone user. - Out of the box, Macs are not loaded with trials and additional software. - Apple has top of the line phone support. •	Why PCs are Better - You can build a PC from the ground up, picking each individual component.PCs give you maximum customizability. - PCs are generally cheaper in price. You can get the same processor, amount of RAM, and hard drive capacity for much cheaper with a PC. - Branded PCs are a wide market. You have many options when it comes to choosing a PC: Dell, HP, Gateway, etc... There are really only 6 types of Mac computer: MacBook, MacBook Pro, MacBook Air, Mac Mini, iMac, and Mac Pro. - PCs have better software compatibility. You can find practically any software for PC. Macs are more limited in selection. - PCs generally have better backwards compatibility. You can run Windows 7 on a 5 year old PC. You cannot run Snow Leopard on a Power Mac G5. - More people use PCs. Thus, PCs have a larger support community behind them. - The majority of businesses use PCs. - PCs are better for gaming. - PCs have more compatible accessories than Macs. - PCs are more upgradable. - PCs are open source. •	Conclusion To compare Mac and PC... Which one is better? It's all personal preference. I'm sure that's not what you wanted to hear, but that's the best answer. In the above review, you can see that both of them have some great advantages. Some people like Macs better, some people like PCs better. Thus, some people absolutely hate Macs, and some people absolutely hate PCs. It's all an opinion, a personal preference.

Wiki - Computer Security
How can I protect my mobile device from malware? •	Prevent jailbreaking •	Keep device operating systems up to date •	Encrypt your devices •	Install apps from trusted sources; consider building an enterprise app store How can I tell if an email message is a phishing attempt?

Hover. Whatever you do, don't click on any of the links in the email. You can and should, however, point your mouse at them and hover over them.

Copy and paste. If you can't see the URL where the links direct when you hover over them, Peck suggests copying and pasting the link into a Microsoft Word document. Right click on the pasted link and select "Edit Hyperlink" from the menu that appears. Selecting "Edit Hyperlink" will open a pop-up window in Word that shows in the "Address" field the web address to which the link directs.

Investigate the email's properties. Act on information that you know for sure is trustworthy. If your bank or credit card company is sending you an email regarding a fraud alert, you ought to see that same fraud alert on your bank or credit card company's legitimate website

When in doubt, throw it out.

How can I tell if a checkout page is secure? Check the website URL. Normally when browsing the web, URLs (website addresses) begin with “http.” However, over a secure connection, the address displayed should begin with “https.” Note, the “s” is what stands for secure. So, before you purchase anything online, type a password or enter other sensitive information, verify the web address begins with “https.”

Look for the lock icon. Most web browsers display a lock icon somewhere in the browser window (not in the web page display area). For example, Internet Explorer shows the lock icon in the lower right of the browser window while Firefox displays it in the lower left corner. You can also click on the icon to see details of the site’s security. This is important to know because some fraudulent sites are built to imitate the lock icon. If everything looks valid when you click the icon, the company or individuals running the website have provided you with a safe means of communicating your sensitive information.

Notice the security certificate seal. In addition to the “https” in the address bar, many e-commerce sites that collect personal or credit card information on their site display a security certificate seal such as VeriSign on the checkout page to indicate the site is secure. Some websites may process information/payments via a third party site like PayPal; therefore, if you don’t see a security certificate seal, be sure to look for the “https” before entering any information.

Read the website’s privacy policy. A website’s privacy policy should tell you how your information is collected, how it’s used and what measures the site owner(s) take to secure information they obtain from you.

How do I know If My computer has a virus?

POP-UP ADS

Running into pop-up ads while surfing the Web used to be par for the course. Thanks to pop-up blocking now standard in modern browsers, these annoyances aren't common.

Still seeing pop-ups online from multiple sites? It could be a badly-configured browser.

Seeing pop-ups when your browser isn't even open? It's usually adware, spyware or scareware.

You can usually tell it's the last one if the pop up says "a virus was detected." It will offer you a paid program to remove the virus. Of course, you'll just be downloading even more malware.

Your regular anti-virus might not seem to stop this. In that case, run a scan with a separate anti-spyware program. SpyBot Search & Destroy or Ad-Aware are two you could try. These can help you get to the root of the problem.

PHANTOM MESSAGES

A dangerous feature of most malware is that it spreads. With always-on Internet, email, instant messaging and social media available, modern viruses have it easy.

Once they're on your computer, they have plenty of options. You might see friends replying to email messages you didn't send. Perhaps you notice a post on your Facebook profile you didn't write.

In most cases, these will have a tempting link. If your friends and family click the link, they're infected and the virus spreads even further.

Keep an eye on your email "sent" folder and on your social network posts. If you see items you didn't send or post, change your account passwords immediately. This will lock out a virus that's stolen your passwords.

Then go to work with your security software. After you've removed the virus, I'd change your passwords again, just in case.

Be sure to let your friends and family know you were hacked. That way they can take precautions for their accounts as well.

LOCKED COMPUTER

Having trouble taking back your account from a virus or hacker?

You're surfing the Web minding your own business. Suddenly a scary message appears. It says law enforcement has detected illegal material on your computer. You've been locked out until you pay a fine!

Of course it's a lie. A virus has taken over and is holding your computer ransom. That's why it's commonly called "ransomware."

Some ransomware doesn't even try to be sneaky. It tells you up front that hackers took over your system. You have to pay to get it back.

I don't recommend paying. You won't get your computer back.

Unfortunately, you probably won't be able to run your normal anti-virus program. You'll need a rescue CD. AVG Rescue CD or Windows Defender Online are two that could take care of the problem.

In some cases, the ransomware actually encrypts your files. If that happens, you better have a recent backup. Even if you get rid of the virus, your files might be lost.

ESSENTIAL TOOLS AND PROGRAMS STOP WORKING

If a computer is misbehaving, most computer users hit Ctrl + Alt + Del. The "three-finger salute" lets you open up Task Manager. This can show you what programs are causing trouble.

Sometimes, you'll hit this keyboard shortcut and nothing happens. Your Start Menu won't open. Nothing happens when you right-click on the desktop. Your security software won't run.

This is often a clue that a virus is messing with your computer. It's doing what it can to keep you from identifying it and removing it.

This is where deep-cleaning anti-malware software like MalwareBytes will shine. If that fails, you'll need to use a rescue CD like I mentioned earlier.

If nothing you do works, it could also be a hardware problem. Most likely it's bad RAM or a failing power supply. (Edited by Kellesai ConnallyKellesaiconnally (talk) 20:15, 3 December 2014 (UTC))

Source: http://www.usatoday.com/story/tech/columnist/komando/2013/05/31/computer-infection-messages-computer/2366835/

Draft:Alienware 17 concern
Hi there, I'm HasteurBot. I just wanted to let you know that Draft:Alienware 17, a page you created, has not been edited in 6 months. The Articles for Creation space is not an indefinite storage location for content that is not appropriate for articlespace.

If your submission is not edited soon, it could be nominated for deletion. If you would like to attempt to save it, you will need to improve it.

You may request Userfication of the content if it meets requirements.

If the deletion has already occured, instructions on how you may be able to retrieve it are available at WP:REFUND/G13.

Thank you for your attention. HasteurBot (talk) 01:30, 7 April 2015 (UTC)

Your draft article, Draft:Alienware 17


Hello, Kellesaiconnally. It has been over six months since you last edited your WP:AFC draft article submission, entitled "Alienware 17".

The page will shortly be deleted. If you plan on editing the page to address the issues raised when it was declined and resubmit it, simply and remove the  or  code. Please note that Articles for Creation is not for indefinite hosting of material deemed unsuitable for the encyclopedia mainspace.

If your submission has already been deleted by the time you get there, and you want to retrieve it, you can request its undeletion by one of two methods (don't do both): 1) follow the instructions at WP:REFUND/G13, or 2) copy this code:, paste it in the edit box at this link , and click "Save page". An administrator will in most cases undelete the submission.

Thanks for your submission to Wikipedia, and happy editing. JMHamo (talk) 23:35, 25 April 2015 (UTC)