Golovna - Seen by women
Ten brownish joys for a koristuvach-pochatkіvtsya. First steps
Connection to the border.
  1. Works with a connection are worked out for a period of 10 working days from 9-00 to 18-00 from the previous notice of the koristuvach. At weekends and holy days, the connection will not go through.
  2. When connected, the cable is brought into the apartment of the koristuvach and there is a reserve sufficient for laying in the middle of the connection to the computer. Nutritional laying on the premises is violated by the koristuvach himself.
  3. Koristuvach is responsible for taking care of information about setting up his PC. It will be needed when reinstalling the system, when modernizing the possession.
Work at the Merezhi.
  1. Under the Agreement, it is necessary to familiarize yourself with other documents on the site http: // site Koristuvacham, to start a job on the Internet, it is strongly recommended to familiarize yourself with the distribution of Tech. It is also necessary to regularly review the site for any news about the work of the company, change before the contract and other important life information.
  2. Koristuvach goiter independently pursue for the safety of vikoristannya merezhі. So, do not install any protocols like TCP / IP, give access to your folders, files and printers, which is not necessary.
  3. It is strongly recommended that you install it with anti-virus programs to prevent the ingress of viruses (zocrems, Trojans, which allow the intruder to be remotely hacked by the computer), as well as regularly update the bases of anti-virus programs. Poluvannya on the virus and "Trojans" є about the language of the Subscriber. If you see a flow of "spurious" traffic from your computer, your public record may be blocked by the administration for an hour, until you put the computer's work order in order.
  4. In connection with the regular manifestations of pardons in the Microsoft software security system, which is more important than our coristuvachiv, Koristuvachevi is strongly recommended to follow the appearance of "patches" (Patch) and to defeat the software for bezpechennya and restore їх.
  5. Coristuvach is guilty of memory that new software or new software that is installed by him can lead to failure and waste the functionality of the already installed PC software (for example, through IRQ conflicts, through incorrect drivers thinly), zokrema - merezhі.
  6. WE WILL HAVE A SITUATION TO FAILURE TO THE PROVIDER FOR INSTRUCTIONS FOR MORE REASONS AND DIAGNOSTICS AND WE PAY.
  7. Obov'yazkom koristuvacha є zaberezhennya password from third-party systems.
  8. The Provider does not bear the responsibility for third-party access to the Internet under the Subscriber's personal data. In this case, the Subscriber will pay for the services of the third person for the total obligation.
  9. The Provider does not bear any charges for obliging the Subscriber's input traffic.
  10. The Provider does not bear any responsibility for the retrieval of information taken by the Subscriber from local and other measures, to which access via the Internet is possible.

New koristuvachs.

You have connected to the Moscow computer network of TOV "Ironnet" - the light of the Swiss Internet, rozvag that vodpochinku. Now you can beat your computer by 100!

What are you talking about?

Merezha has a cost-free website http:/website/ - zaishovshi on which you take the report information about the services of the merger, tariffs, addresses, and also you can find out about the novelties of the merezha and the place, discuss them, consult the forums and chat, find out about games in merezhі and richly іnshoy.


Exit to the Internet

Through the fence you have access to the Internet. You don't need more than a long check, while the "vazhka" page is taken, or the file is taken. Payment for the Internet will be carried out according to the tariff. Traffic - the whole amount of information, as you took from the Internet. Traffic is reduced in megabytes.

For example, a moderately static musical composition in mp3 format, downloaded from the Internet, may be in the average volume of 3 to 5 megabytes. Considering the middle side, for example www.yandex.ru borrows 0.3 to one megabyte in the average, in the amount of images on it. One electronic sheet borrows a little - 0.01-0.05 megabytes, but also in each sheet, for example, photographs are included, it can be as large as possible - up to a few megabytes.

Access to the Internet is guaranteed to you, if you have a positive balance in your account. Under an hour of work on the Internet, you need to check your balance more often.

In addition, it is essential to have licensed anti-virus software and regularly update it. Various viruses and Trojans can connect to the Internet without your permission and start a practically impossible robot on the Internet, clogging your entire channel. Claims in tekhpіdtrimtsі on the incorrectness of rozrahunkіv or low swidkіst at tsomu type are not accepted - you yourself are responsible for the "cleanliness" of your computer.


Service payment.
  1. A subscriber of goiter-knitting stitches behind the camp of his Special Rakhunku (LZ). The Subscriber shall make payments under the Contract in such a way that the balance of this LZ will be positive at some point in the Contract.
  2. The service is more than expected for the mind of the positive balance of LZ.
Tariff change

The change of the tariff is carried out in a special office or after an application in the office.


Like the Internet does not work.

Prohannya at times zniknennya zv'yazku diyati for the principle of "on the back of the head misunderstood", for which it is necessary:

  • Verify that the program-client is running (the “login at the edge” icon is green).
  • Pereviriti, chi can you spend on the site http: // site
  • Rezavantage computer
  • Vіd'єdnati that znovu pіd'єdnati (up to a characteristic clatter) tethered cable to the system unit and computer socket, as it was installed near the apartment
  • Be sure that the cable is not damaged by household creatures and is not jammed with furniture
  • Verify that the connection to the local network is rebuffed at the "connected" station (especially for Windows XP)
  • Reconsider that you set the IP-address and parameters of Traffic Inspector to tell you that you had a connection hour.
  • Check with other members of the family that the computer has not been changed

Appointment points allow you to cancel paid charges due to minor inaccuracies. If you don’t get a call, please call us at 2-46-96, +79024527052, +79834300256.


Techpidtrimka.

By phone 2-46-96 you can put the power supply of any work and measure. The hour of work of technical support is from 9:00 to 21:00, daily, without interruption of weekends. Techpidtrimka does not advise on the power supply and maintenance of programs that do not lie before the robot and the Internet - anti-virus software, Windows installation is too thin.

Reception work at the Merezha!

Heading "Internet for Pochatkivtsiv" recognized for quiet, hto zovsіm recently becoming master of the web of light. It's no secret that for a significant part of the computer's core, the main motive for getting a PC is the mother's ability to access the all-world Internet at home. Today, the reality is such that the Internet penetrates practically into all spheres of life. Internet - the best news, search for necessary information, purchases of goods and services, sharing, reviewing films and listening to music, online games and a lot of other things. You can manage your banking account and take away state services for the help of the Internet.

For people of a frail age, the Internet gives a miraculous opportunity to get in touch with members of their family, as they live in other settlements or go to the other side of the country, moreover, it is absolutely cost-free. Possibility to power videoconferencing with your children and onucs, so that you can learn the basics of working with a computer and learn how to use the Internet. Tse is not so important, as zdaetsya at first glance.

The number of koristuvachіv merezhі is constantly growing. For example, in our country, from 2006 to 2016, the number of coristuvachiv merezhi grew 10 times, and today 70% of the inhabitants of Russia become more mature, starting from the youngest and ending with people of the pension age. For all those who first go to the Internet, there is a large number of meals, in the widest range of data in the distribution of "Internet for Pochatkivtsiv". Having lived with our help as a victorious all-world merezhі, you will already learn to independently know the answers to all your food, vicorist Internet search systems.

Blocking sites on the Internet is the procedure for changing access to the main web resources, which is controlled by Internet providers and mobile phone operators, on the submission of the address, entered to the Unified Register of reserved information. The registration of sites to the fenced registry is carried out by Roskomnaglyad (RKN), which exercises control over the implementation of laws in the gallery, information technologies and the support of mass communications. In addition, the RKN includes […]

Today, millions of koristuvachivs go to the service of the poshuk system. The demand for this service is explained by the great amount of information that has accumulated in the measure. Knowing the need for information by hand in such minds is already foldable.

Yandex is the largest search system in Russia. Ale, the company promotes not only services in the sphere of search, an assortment of products of greatness. Among them is Yandex.Groshi, an electronic gadget. In this article, the main functional capabilities and features of the payment system will be considered.

All the growing resources of the Internet and the infrastructure that is being developed, give the opportunity to organize a direct Internet connection on a fundamentally new level. Your helper will be told how to call and vicorate all the services of audio-video calling via the Skype service. Skype is an Internet communication service. A bunch of wines are created as an IP-telephony service, so that telephone calls are made through the Internet. During this hour, the service includes […]

Cashback - it’s a good opportunity to turn a part of the money, redeemed for comrades and services. A lot of hulks buy goods according to the order at the price of the vartost, with whom you don’t know what you can save on purchases. Lack of confidence in innovation confuses our hulks to overpay, and today they are still overwhelmed by the norm. Basically, cashback allows you to save up to 5% […]

Memo about the safety of schoolchildren at the Merezhi Internet

There are more young people on the Internet with skin fate, and schoolchildren are one of the most active speakers on the Runet. Tim hour, krim majestic number of opportunities, the Internet brought problems. Tsya reminder can help you to safely perebuvat in merezhі.
Computer viruses
A computer virus is a kind of computer programs, which are responsible for building up to reproduction. In addition, viruses can damage or destroy all files and data, under control of the root, in the name of which the infected program is running, and also damage or destroy the operating system with all the files in its entirety. Viruses are most often spread through the Internet.
Methods of defense against shkіdlivih programs:
Vikoristovuy modern operating systems that can be serious rіven zahistu vіd shkіdlivih programs;
Permanently install patches (digital patches, which are automatically installed with the help of the program box) and other updates of your operating system. Take advantage of the official site of the OS retailer. How to use the automatic update mode, increase it;
Obmezhiti physical access to the computer for third parties;
Vykoristovyte zovnіshnі ї ії іnformatsії, such as a flash drive, disk or file from the Internet, only from professional dzherel;
Work on the computer under the rights of a correspondent, not an administrator. Do not allow more shkidlivih programs to be installed on your personal computer;
Vicorist anti-virus software products in house virus cleaners with automatic database updates;
Do not open computer files that have been removed from unsuitable files. Navit tі files, yakі nad_slav your knowledge. Briefly specify yogo, chi corrected in you.
Merezhi WI-FI
Wi-Fi is not a type of data transmission, not a technology, but rather a brand, a brand. Back in 1991, a Dutch company registered the WECA brand, which meant the word Wireless Fidelity, which translates as a wireless precision. Until our time, there has been another abbreviation, like this very technology. The abbreviation for Wi-Fi. This name was given with an emphasis on the standard of the most advanced Hi-Fi sound technology, which in translation means “high precision”.

So, cost-free Internet access at cafes, hotels and airports is a miraculous opportunity to access the Internet. But a lot of experts are aware that globally available Wi-Fi is not safe.
For the sake of security robots in the most accessible areas of Wi-fi:
Do not overpower your special information through publicly available Wi-Fi networks. Pratsyyuchi in them, please do not enter passwords for access, logins and alias numbers;
Vykoristuy and update anti-virus software and firewall. Tim yourself you will protect yourself from downloading the virus to your attachment;
In Wi-Fi Wi-Fi, turn off the "Great access to files and printers" function. This function is closed for locking, however, the deacons of the coristuvach activate її for the clarity of vikoristannya at the robot or the learning;
Do not use public WI-FI for transmitting special data, for example, for access to social networks or by e-mail;
Vikoristovuy is less protected by HTTPS, but not HTTP, tobto. when typing a web address, enter "https://" itself;
Turn off the “Connect to Wi-Fi automatically” function on your mobile phone. Do not allow automatic connection to connect to Wi-Fi without your permission.
Social services
Social networks are actively entering our lives, a lot of people work and live there permanently, and Facebook has already registered a billion people, which is one of all the inhabitants of the planet. It’s hard to imagine that the information placed by them in social networks, may be known that vikoristana be-kim, among them it’s not obov’yazkovo with good intentions.
The main reasons for the security of social measures:
Surround the list of friends. It is not your fault that you have vipadkovyh and unknown people among your friends;
Protect your private life. Do not include passwords, phone numbers, addresses, date of birth and other special information. Malicious people can sing out information about those, how your dads are planning to spend the holidays;
Defend your reputation - keep it clean and become your own food: want to beat you, sob іnshі koristuvachі bachili, what are you zavantazhuєsh? Think about it, first you can publish, write and zavantazhit;
If you speak with people you don’t know, don’t beat your own real name and other special information: im, place of residence, place of learning that іnshe;
Unique placement of photographs on the Internet, children of images on the site, for which you can name your special purpose;
When registering in a social network, it is necessary to create foldable passwords, which consist of a letter and numbers and a number of characters not less than 8;
For social networking, post and other sites need to win different passwords. Just as they harass you, then the evil-doers only have access to up to one month, and not in the mustache.
Electronic pennies
Electronic pennies - it’s also an easy way to pay, just find shakhrai, if you want to take pennies.

Electronic pennies have appeared recently, and even though the wealthy powers do not have a record of them in their laws. In Russia, the stench functions and is already prescribed by law, where they add a few species - anonymous and not anonymous. The difference is in what is anonymous - ce t, in which it is allowed to carry out operations without identification of the coristuvach, and non-anonymous identification of the coristuvach is obov'yazkovoy.

Also, there are separate electronic fiat pennies (equal to state currencies) and electronic non-fiat pennies (not equal to state currencies).
The main reasons for a safe work with electronic pennies:
Tie a mobile phone to the rahunka. The best and best way to get access to the rahunka. Tethering the phone will help, if you forget your payment password, or you will go to the site from an unknown add;
Win one-time passwords. After the transition to a valid authorization, you no longer threaten the security of theft, or the payment password has been changed;
Choose a folding password. It's not easy for the evildoers to guess a folding password. Valid passwords - these are passwords, which should be at least 8 characters and should be protected from small and large letters, numbers and symbols, such as a sign of a dollar, a pound, a sign of a hail to me. For example, $tR0ng!;;
Do not enter your personal data on sites that you do not trust.
Email
E-mail is the technology of those services and the transfer of electronic messages that are divided into computer media. Sound the e-mail screen that looks like this: user_name@domain_name. Crimea for transferring plain text, є the ability to transfer files.
The main reasons for a safe work with electronic mail:
It is necessary to choose the correct mail service. On the Internet there is a great choice of cost-free mail services, it is better to trust those who know who is the first in the rating;
Do not include special information in special mail. For example, rather choose “music_fan@” or “rock2013” ​​instead of “theme13”;
Victory two-step authorization. If you want to create a password, you need to enter a code that is enforced by SMS;
Choose a folding password. For the skin mail screen, you are guilty of your own, strong, to the point of evil password;
Yakshcho є mozhlivist to write your own special zapitanya, vikoristovuy tsyu mozhlivist;
Vikoristovyte kіlka post shrinok. First for private listing with recipients, who you trust. Tsya e-mail addresses do not need to be changed when registering on forums and websites;

After completing the work on the mail service, before closing the tab with the site, do not forget to click on "Viit".
Cyberbullying or virtual signing
Cyberbullying - followed by reminders of what to revenge, aggression, slander; hooliganism; social boycott for the help of various Internet services.
The main reasons for fighting cyberbullying:
Don't throw yourself at the bey. The shortest way: to be ashamed of how to behave and, if there is no one to whom you can turn, then calm down. If you start using images on images, then you will spread the conflict even more;
Protect your cyber reputation;
The anonymity of the Merezha is obvious. Іsnuyut ways to find out who is behind the anonymous oblique record;
It is not varto to lead a hooligan way of virtual life. The Internet fixes all your thoughts and saves you. Visibility of them will be more important;
Treat your virtual honor from a young age;
Ignore the single negative. Disposable imaginative reminders are better to ignore. Sound aggression is attached to the cob stage;
Ban the aggressor. In programs for the exchange of mittevim notifications, in social networks, the possibility of blocking the power of notification from the first address;
As a reminder of cyberbullying. Your actions: stand up against the next one, show them that they are negatively evaluated, support the victim, which needs psychological support, remind the grown-ups of the fact of aggressive behavior in the community.
Mobile phone
Modern smartphones and tablets can compete with full-grown functionality, and now stench can compete with stationary computers. Prote, having made a defense for such outbuildings, is still not enough. Testing that search for inconsistencies is not as intense as it is for a PC, but they also need to be tested for mobile add-ons. Today's mobile browsers have already practically caught up with their desktop counterparts, expanding the functionality with more foldability and less protection. Not all breeders release updates that cover critical volatility for their outbuildings.
Basics for mobile phone security:
Nothing can be done in a fair way without a cost. Be careful, even if you propagate cost-free content, someone can have some paid services;
Think, first send SMS, photo or video. Do you know for sure that stinks will be unhealthy?
It is necessary to update the operating system of your smartphone;
Win anti-virus programs for mobile phones;
Do not zavantazhy programs from an unknown dzherel, even if the stench can take revenge on shkіdlive software security;
After you have left the site, after entering special information, go to the settings of the browser and see the cookies;
Periodically check if paid services are activated on your number;
Give your mobile phone number less to people you know and whom you trust;
Bluetooth can be disabled if you don't respect it. Don't forget to revise things.
Online games
Such online games are barvisty, hoary roses that bring together hundreds of thousands of people all over the world. The graves continue to give them the world, join together one by one, win the battle, fight monsters and gain good fortune. To pay for the satisfaction of the stink: buy a disc, pay for a subscription, or buy some options.

All costs go to support and development of the gri, as well as to security itself: authorization systems are being improved, new patches are being issued (digital patches for programs), servers are being shut down. In similar games, you will be afraid not so of your super nicknames, like theft of your password, on which the system of authorization of the greater number of players is based.
The main reasons for the safety of your game skin are:
If another grave behaving badly, or creating you inaccuracies, block it from the list of graves;
Please administrators say hello to the filthy behavior of this grave, bazhano add some evidence to look at the screen;
Do not provide special information on your profile;
Respect other participants with gri;
Do not install unofficial patches and mods;
Vicorist folding and different passwords;
Navitat pіd hour gri not varto include antivirus. Wait a minute, your computer can be infected.
Phishing or stealing special data
With the help of stealing pennies and documents today, you don’t see anyone anymore, but with the development of Internet technologies, the attackers have moved to the Internet, and continue to deal with the “loved” right. This is how a new threat appeared: Internet scamming or phishing, the main meta of some kind of poligay among the most confidential data of coristuvachs - logins and passwords. In English, phishing is read as phishing (like fishing - fishing, password - password).
Key steps to combat phishing:
Follow your account. If you suspect that your profile has been hacked, then it is necessary to block it and inform the administrator of the resource about it;
Victory safe websites, including online stores and push systems;
Vykorist folding and different passwords. In such a rank, as if they are harassing you, then the evil-doers deny access only to one of your profiles in the measure, and not to all;
If you have been slandered, then it is necessary to get ahead of all your friends, if you have added information in your friends, about those who have slandered you, it is possible, depending on your name, that spam will be sent to phishing sites;
Set the correct password (PIN) to your mobile phone;
Keep your browser password safe;
Do not open the files and other attachments in the sheets, remember that the stench came from your friends. Better check with them, chi nadsilali stench tobі qі files;
digital reputation
Digital reputation is both negative and positive information about you. Compromising information posted on the Internet can be seriously recognized in your real life. "Digital reputation" is your image, which is formed from information about you on the Internet. Your place of residence, education, your financial position, especially the nature of those reports about loved ones - all accumulate at the edge.

It is easy to put a lot of pidlіtkіv before the publication of special information on the Internet, without understanding the possible traces. You can’t remember that the photograph, posted 5 years ago, became the reason for hiring you for a job.

The Internet has long become an indispensable part of our life. Vin helps us to communicate with friends around the world and stay up to date with the rest of the news. You don’t need any special knowledge to practice in the Internet, you just need to learn the first step.

10 gratifications for Google to start an Internet-correspondent with Mykola Fomenko- tsіkavy, and smut korisnі for all corystuvachіv-pochatkіvtsіv (children and housewives to grandma and didusіv) all-world cobwebs are presented on the Google site.

On this site you will know 10 joys, which will help you to work the first few on the Internet.

1. Get to know the Internet
2. Enter the site address
3. Add bookmarks to sites
4. Install the home side
5. Victory navigation keys
6. Search for information on the Internet
7. Save files from the Internet
8. Starting e-mail
9. Splicing via the Internet
10. Choose a password

1. Get to know the Internet

Merezha Internet is like a great library. Won revenge a lot of Internet sites, as they are formed from 3 sides.

For the help of a computer that is installed on a new program, you can connect to the Internet to look at the information that is saved in the new: texts, pictures, photographs, music, films, and also save them to your disk.

Internet sites are saved not on your computer. Vіn - only "at the end", for the help of such a V you look at the sites. To blame the pardons for the hour of the introduction of information - it's not scary. You cannot download or change anything on the Internet from your computer. If you have closed the required side - you can always open it again at the front view by pressing the "Back" button or by re-typing the address.

From one side you can go to another for additional help - ring out the message of support and color vision. If the teddy bear turns into arrows on the hand icon, tse means that you brought yoga to strength. In other words, the image is sent to us. To finish it once, press on the left button of the mouse and open a new side.

From these sites, you can also overpower electronic sheets and mittievs, place photographs on them and conduct business cards. The Internet is the easiest way to connect with friends and colleagues at any point in the world.

Internet to revenge anonymous sites on various topics. If I need to know a site with information about what to click, I go to google.com and search for it.

2. Enter the site address

If the site has its own address, it allows you to know yoga. Vin can be composed of Latin letters and digits and divided into three parts.

Addresses start from www - you can often not write - or just a word. Then, through a dot, let's name the site, as it ends with short designations of the country or the type of site, for example: ru - Russia, ua - Ukraine, com - international sites, org - non-commercial. Two same addresses with different endings can lead to two different sites.

Site addresses are entered in the address bar of the browser - a program for reviewing Internet sites. Browsers are different, widest: Internet Explorer, Firefox, Opera, Google Chrome. Whether any of them you need a site. Modern browsers have a lot of bad features.

If you enter the address incorrectly, please ignore the pardon information or go to another site. In order to get a pardon and not drukuvat the address of the skin once, bookmark those sites, go to yaki often.

3. Add bookmarks to sites

To remember and write down the addresses of your websites is not handy, but it is not necessary. For whom were bookmarks invented.

To remember the site, which is narazі vіdkritiy, press “Obrane”, then “Add to the contrary”. Everything is correct - boldly emboss at the window "Add" - the bookmark is ready! The next time, just open the browser, go to the "Choose" and select the required site. You can name the bookmark whatever you like.

In order not to stray in the bookmarks, You can save them from different folders, for example, a robot, repairs, a cicada.

It is important to remember that your bookmarks will only be available on your computer and in the same browser you have created.

Bookmarks can work with any browser. For the Google Chrome browser, it is enough to press the zirochka in the order with the address row - and the bookmark is ready.

4. Install the home side

If you always start a job on the Internet from one site, you can do it on your home page. The home page automatically pops up every hour when the browser is launched. Tse mozhe buti your mail, search or novelty.

To install or change the home page, you need to go to the "Service" menu, "Browser power" and select the "Inline" button, then "Stop" - the site will become the home page, which is a narazі vіdkritiy.

In order to have a moment to go to the home page, press the "Budinochok" icon or the Alt + Home keys.

5. Victory navigation keys

While working on the Internet, I look over a lot of sites, copy texts and photographs, and perform a lot of other operations. For whom you can win the bear or use the keys.

For example: Backspace turn to the front side

The up and down arrows allow you to scroll the page PAGE UP and PAGE DOWN to move faster, and the Home and End keys allow you to scroll back to the top or to the end of the other side.

The onslaught of the Tab key moves to the offensive position on the side or to the offensive field of the form.

Є kіlka kіlka kіlka podіdnаn іz the button Control:

CTRL+C to copy text and CTRL+V to paste.

CTRL+F - click behind the page.

CTRL+N - open a new browser window.

6. Search for information on the Internet

Wanting the Internet and the great, to know in the new those who need to reach easily. Call me joke google.com.

The axis of the kіlka is glad, if they can help: Verify exactly what you want to know: there are 453,000 sides behind the word “valyanki”. For a request: "buy felting boots in bulk with a discount in Suzdal" - a total of 220 pages.

If you ask for the exact phrase or quote, write it in your paws: “she has a cow Mu.”

In order to find out right in the results of the search, immediately put the request in front of you in the look: the population of St. Petersburg is warehoused ... Catherine the Great was born ...

You can shukati not only texts (Sherlock Holmes), but also pictures, videos, news, pictures.

You can ask the search for information only in my own, in a singing format (for example, less than a presentation), or on a specific site.

7. Save files from the Internet

Files from the Internet can be saved to your computer, and it's even easier.

To save the music file, just press the left mouse button. If the interest didn’t rise, press on the new one with the right button and select “Save the object like ...”. Select “Working Steel” and emboss “Protect” - the acquisition is completed.

In order not to harass the “Working Style”, create the “Music” folder directly on the new one and transfer the file to it. You can take advantage of the folder "Music".

So the files are saved by themselves, sent by mail.

So you will save the files in the required folders, you won't be able to fool around. But anyway, you still forgot, where did you save the file, hurry up by searching for files on the computer.

8. Starting e-mail

Most of your friends and colleagues already receive e-mail. If you don't have it, you can also get your own electronic screen. I have a lot of sites, which allow you to rob it without cost.

For example, to create a non-cash mail like Google, go to Gmail.com and press the button "Create a post". You can choose what your address will be - your name, pseudonym or be a word. If the address was taken away, if the kimos is taken, add numbers to it or choose another.

Addresses can be composed of Latin letters, numbers or signs, for example, dots, and may be two parts, separated by the symbol "dog". The first part - im'ya koristuvach, yak Vi was robbed, a friend - naming the mail site. Choose a password for your screen and remember it.

Now you have є postal address, yet її call email - [email protected]. Remember or write down your email and tell your friends more often. Only nikolay.fomenko or gmail.com are not enough.

To write a sheet to a friend, enter the address of the owner (you can send the address through whom), the subject of the sheet, write the sheet itself, add, as required, a file (for example, a photo) and press “Send”. Already for a sprat of a thin sheet, we lie in the mailed screen of a friend.

9. Splicing via the Internet

E-mails arrive early, but sometimes they have to be heard for a long time. Іsnuє Іnshy, shvidshy way to communicate through the Internet - mittєvі podomlennya.

The most popular programs are ICQ (ICQ), Skype (Skype), Google Talk (Google stream). They allow you to correspond with short messages “on the air” with those who are currently on the Internet.

To start chatting with friends, you need to add them to your contact list.

At the list of contacts You can see who are your friends at the same time on the Internet (the stench is marked in green) - you can immediately start talking to them. Push yoga im'ya, write remembrances, correct - and your svіvrozmovnik odraz bachat yoga and you can write to you іdpovіd. You can also transfer files one to one, and if you have a microphone, you can call one to one.

Don't forget to install such programs on your computer - sometimes they will stink on the site. For example, with the Gmail mail service, you can not only write sheets, but also communicate with friends via chat. Notifications will be displayed in the same window of the browser, and then you can easily look through all your listings.

10. Choose a password

For e-mail and other services, you will need to create a password.

A good password is easy to remember and important to guess by intruders. Do not choose as the password of the name of the koristuvach, the date of birth, the phone number, just a combination of letters and numbers. Victory those that you know well, and that it is not possible for others. For example, addresses, de Vi lived in a childhood, a girl's name, mothers, etc. And let the password have at least eight characters. When you remember the password, give respect, small or great letters You victorious, and as a language stand on the keyboard.

You can reset the forgotten password to the email address.

Keep your password as the key to the booth. Do not enter yoga on other sides under different drives. Don't dictate anything over the phone, don't force yourself with a message, or sms, just say about asking for Internet services that you use. Your password is like a bank card code, which only you know.

Do not use the same password. It’s handy for mothers of passwords of different levels of complexity: for financial services, for sending and special data, for resourceful resources.

Other entries for the student(Search on the right on the side): “Women's Internet. What to do at the vіlnu khvilinka”, “Virtual sex:“ Hello, Zuckerka. How do you see?“”, “Torrent. µTorrent program in pictures”, “Hand-held buttons of the extended LiRu editor”.

If you knew a pardon, be kind, see a fragment of the text and press it Ctrl+Enter.

On the other side, the lessons of the site are arranged in the order in which we should go through them. It's a pity, at the same time, the list of lessons will have gaps, like obov'yazkovo will be zapovnyuvatisya. Those, for which there are already є statti, є messages (seen in a black color from the substation) - go through them and learn! The list does not include novelties and deeds of statistics (for example, in case of higher problems with the computer) because. they don’t have any sense when navchanni, however, you will take them, so you sign up for a subscription.

You can freely write your prayers in the comments, everything is hovering. Requested by those to be introduced to the plan of articles.

Let's create the best bezkoshtovnu pokrokov first system at once!

Target: create a list of articles on the site, in order, in the same order, and you will feel at ease while working at the computer.

Important! If you can write an expert article on any of these topics, write to us, the articles are paid.

Course: Coristuvach computer - Basic rіven

  1. What is a netbook
  2. What is an ultrabook
  3. What is a tablet
  4. What is a tablet phone
  5. USB port: what is it and through it you can connect
  6. How to see the computer, what is being seen at the moment
  7. What is a driver | What is the graphical shell of the operating system
  8. Working style of the computer.
  9. Misha, cursor, how to practice with a bear.
  10. What is a shortcut, file, program, folder.
  11. Main file types. What is the extension
  12. What is a hard disk and how does it work? On publication)
  13. Hard drive of the computer, divided.
  14. Keyboard. How to practice from her. We create a text file.
  15. Start menu, what's new
  16. Vimknennya computer. ( In robots)
  17. What is the sleeping mode, if yogo vikoristovuvati
  18. What is the mode of clearing, if yoga vikoristovuvat
  19. Let's install the program. The main stages of installation, be it a program. De won't show up, how to know, de installed, how to know in the Start menu.
  20. Pratsiyuemo іz program. Standard program elements: customization, menu, access panel.
  21. Let's create a shortcut. Useful methods.
  22. How to look over the characteristics of your computer.
  23. Computer screen. Dozvіl, nalashtuvannya, change the theme of the working table.
  24. How to install the driver for the attachment. Disable the driver so it doesn't install automatically. ( In robots)
  25. Autocomputer acquisition. How to turn off the program from auto-enablement How to turn off auto-enablement from the program itself. ( In robots)
  26. What are archives? Work with archiving software
  27. How to view video on a computer
  28. How to open an e-book (.pdf .djvu .pdf) ( In robots)
  29. How to open a presentation
  30. How to open a document (.doc, .docx, .fb2)
  31. How to know, how I have a video card
  32. Blue screen of death - what is it
  33. What is the BIOS and why is the VIN needed
  34. Chim vіdkriti.
  35. Chim vіdkriti.
  36. Chim vіdkriti.
  37. On-screen keyboard - what is it for?
  38. How to change language on a computer
  39. Hot keys Windows 7.8
  40. How to change the font on the computer

Course: Computer Security

  1. How to set a password on Windows
  2. Yak vigadati folding password
  3. How to steal a Google account
  4. What is an antivirus
  5. What is a firewall
  6. How to block splicing windows
  7. How to make visible file extensions in Windows
  8. How to search the Internet for additional WOT extension
  9. A look at Kaspersky Anti-Virus

Course: Computer programs

  1. Punto Switcher
  2. Alarm clock on computer
  3. Program for creating videos from photos

Course: Google Services

Course: Koristuvach computer: Middle rіven

  1. How to create a virtual machine (virtual computer)
  2. How to transfer old photos to a computer
  3. How to put a password on a folder
  4. How to clean the Windows registry
  5. How to enter BIOS
  6. How to format hard drive
  7. How to defragment a hard drive

Course: Corystuvach laptop ta netbook

  1. Features of working with a laptop and a netbook
  2. Vlastuvannya laptop, netbook
  3. Laptop keyboard and netbook - features of the robot
  4. How to last an hour of battery life
  5. What is the reliability, how is the laptop (netbook) warming up
  6. Stands for the computer: cooling is not too cold.
  7. How to enable WiFi on a laptop

Course: Computers and "navkolokompyuterni" attachments

  • Set for the body
  • Program-trainer to control the time of work on the computer
  • How to properly obshtuvat work space
  • What to work with revtomі
  • Procrastination and how the fate of the computer
  • How to save your hands, if you didn’t get sick, how to get rich drukuvati (tunnel syndrome).
  • Standing robot at the computer: melancholy, pluses and minuses
  • Tables with regulation of height for robots standing and looking around.
  • Stands for a laptop for robotic standing looking around.
  • Course: Computer That Kid

    1. What is the need to spend an hour at the computer for children, so how to work properly?
    2. What can a child learn at a computer
    3. How to protect a child from mature sites

    Course: Internet Koristuvach - Basic Rivne

     


    Read:



    Shvidkorizalna steel P6M5 and її characteristics

    Shvidkorizalna steel P6M5 and її characteristics

    Such material, like steel, is given unique powers, which makes it possible to victorious for the preparation of tools.

    Hawaiian frost: business plan

    Hawaiian frost: business plan

    Product description Related business ideas: Hawaiian frosty - cica and savory product, which can decorate the menu of any cafe or restaurant.

    Air ducts for ventilation.

    Air ducts for ventilation.

    Whoever knows why the air ducts are designated, so the very name of the ventilation ducts. For successful and reliable robotic ventilation, it is great...

    Business Plan: Trade in Hawaiian Freezer

    Business Plan: Trade in Hawaiian Freezer

    Guri-guri - in the house of Hawaiian frost. The recipe for yoga is simple, and the method of preparation is primitive, so you can make yoga sixfold.

    feed image RSS