Captures an image of your screen and copies it to the clipboard. Very useful for sharing!

Settings that control whether a user can view, edit, or execute a particular file.

The complete location of a file or folder, like C:\Users\YourName\Documents\Report.docx.

Dividing a physical drive into separate logical drives, each with its own filesystem.

For slideshows and lectures. Microsoft’s PPTX is commonly used.

A virtual endpoint for network communication. Different services use specific port numbers, like 80.

The percentage of data packets that get lost in transit. Can noticeably degrade voice and video quality.

An encrypted vault for storing and generating strong passwords. Way better than using the same password everywhere.

Options to control how your data is collected and used. Review them in your OS, browser, and apps.

Tricking people into revealing sensitive info by posing as a trusted entity. Be wary of emails asking you to log in or download attachments.

A secret phrase that grants access to an account. The longer and more random, the better.

Settings that control what a user can access and modify. Useful for locking down sensitive files.

Features that restrict content and computer use. Handy for protecting kids online.

Completely shut down the device, wait a minute, then start it back up. Fixes a surprising number of issues.

A virtual endpoint for network communication. Different services use specific port numbers, like 80.

The percentage of data packets that get lost in transit. Can noticeably degrade voice and video quality.

An encrypted vault for storing and generating strong passwords. Way better than using the same password everywhere.

Options to control how your data is collected and used. Review them in your OS, browser, and apps.

Tricking people into revealing sensitive info by posing as a trusted entity. Be wary of emails asking you to log in or download attachments.

A secret phrase that grants access to an account. The longer and more random, the better.

Settings that control what a user can access and modify. Useful for locking down sensitive files.

Features that restrict content and computer use. Handy for protecting kids online.

Completely shut down the device, wait a minute, then start it back up. Fixes a surprising number of issues.