SlideShare una empresa de Scribd logo
1 de 5
PC PROGRAMS
Presentado a:
Lina
Presentado por:
Yesenia Sánchez
Natalia Cardona
Juliana Patiño
Tania Sánchez
Grado 10*4
I.E Gabo
Tabla de Contenido
1 Chris PC-Lock
2 Computer Monitoring, Spy Software, Keylogger
3 Microsoft PowerToys for Windows XP Tablet PC Edition
4 BIOS CMOS Memory
5 MediaMonkey
Chris PC-Lock
It is a useful Windows application with keyboard locking functions. Now you can
enjoy your spare time without any worry that somebody unauthorized will access
your computer. More than that, you can ensure that your work remains unaltered
and meanwhile benefit of your children joy when playing around your laptop or
desktop PC.
It's really a pitty to be concerned about what might happen with your reports or
financial sheets when your children or your favourite pet would hit by mistake the
keyboard. Now you can stay relax. Chris PC-Lock is doing this job for you.
Now by a simple shortcut you can block fast the access to your computer and
secure your work. To resume your work simply unlock it using your secret
password.
Who can use it ?
Anyone who uses a PC. Chris PC-Lock can be a handy utility for anyone who
wants to protect his/her computer from unauthorized access.
Computer Monitoring, Spy Software, Keylogger
With Activity Monitor, SoftActivity™ TS Monitor and SoftActivity™ Keylogger
solutions you have your hand on the pulse of what is going on in your LAN. This
unique spy software allows remote computer monitoring and keylogger recording in
real time. The outstanding built-in keystroke recorder allows you to know
everything user types in his emails, chats and other programs, including
passwords. View and record Internet activity, trace all programs started and run by
your network members.
Here are several popular ideas of how to use our computer monitoring software:
Employee activity monitoring. Find out what they are doing when they are assumed
to be working
Control over students during the academic hours. Easily track their activity with our
keystroke logger, so they will use network for the educational purposes only
Parental control. Our powerful spy software will alert you when your child is into
something suspicious
Our internet monitoring software works out the entire issue with immense
effectiveness. Full statistics, detailed reports, real time computer monitoring. The
completely invisible keylogger to track and record everything happening within the
entire network.
Microsoft PowerToys for Windows XP Tablet PC Edition
They're here! PowerToys are additional programs that developers work on after a
product has been released to manufacturing. They'll add fun and functionality to
your Tablet PC experience.
Note: We've taken great care to ensure that PowerToys operate as they should,
but they are not part of Windows XP Tablet PC Edition and are not supported by
Microsoft. For this reason, Microsoft Technical Support is unable to answer
questions about PowerToys. PowerToys are for Windows XP Tablet PC Edition
only and will not work with Windows Vista.
BIOS CMOS Memory
The BIOS settings that you use to control how your PC works must be saved in
non-volatile memory so that they are preserved even when the machine is off. This
is as opposed to regular system memory, which is cleared each time you turn off
the PC. A special type of memory is used to store this information, called CMOS
memory, and a very small battery is used to trickle a small charge to it to make
sure that the data it holds is always preserved. These memories are very small,
typically 64 bytes, and the batteries that they use typically last for years. This non-
volatile memory is sometimes called NVRAM.
MediaMonkey
Organize music and edit tags in your audio library with a powerful, intuitive
interface.. Automatically lookup and tag Album Art and other metadata. Manage
50,000+ files in your music collection without bogging down. Manage all genres of
audio: Rock, Classical, Audiobooks, Comedy, Podcasts, etc. Play MP3s and other
audio formats, and never again worry about varying volume. Record CDs and
convert MP3s, M4A, OGG, FLAC and WMA files etc. into other formats. Create
playlists and let Auto-DJ & Party Mode take care of your party. Sync iPhones,
iPods, & MP3 players, converting & leveling tracks on-the-fly..
.

Más contenido relacionado

Destacado (11)

Uk culture for turkish learners
Uk culture for turkish learnersUk culture for turkish learners
Uk culture for turkish learners
 
Ingles sena
Ingles senaIngles sena
Ingles sena
 
Dct routes
Dct routesDct routes
Dct routes
 
Pc programs
Pc programsPc programs
Pc programs
 
Ingles.
Ingles.Ingles.
Ingles.
 
Mengamankan jaringan wifi
Mengamankan jaringan wifiMengamankan jaringan wifi
Mengamankan jaringan wifi
 
Bipolair en verslaafd
Bipolair en verslaafdBipolair en verslaafd
Bipolair en verslaafd
 
Presales Consultant Roles&Responsibilities
Presales Consultant Roles&ResponsibilitiesPresales Consultant Roles&Responsibilities
Presales Consultant Roles&Responsibilities
 
English 2 sena
English 2 senaEnglish 2 sena
English 2 sena
 
Sync rep aurora_2016
Sync rep aurora_2016Sync rep aurora_2016
Sync rep aurora_2016
 
Escuela para padres valores
Escuela para padres valoresEscuela para padres valores
Escuela para padres valores
 

Similar a Ingles sena

Basic computer for_small_business by rajesh valangaiman
Basic computer for_small_business by rajesh valangaimanBasic computer for_small_business by rajesh valangaiman
Basic computer for_small_business by rajesh valangaiman
sakkara123
 
Basic computer for_small_business from rajesh
Basic computer for_small_business from rajeshBasic computer for_small_business from rajesh
Basic computer for_small_business from rajesh
sakkara123
 
Computer basics--computer basics2
Computer basics--computer basics2Computer basics--computer basics2
Computer basics--computer basics2
Zo Sangpy
 

Similar a Ingles sena (20)

Lesson 1 — Computers.pptx
Lesson 1 — Computers.pptxLesson 1 — Computers.pptx
Lesson 1 — Computers.pptx
 
Class 1
Class 1Class 1
Class 1
 
10 steps to protecting your computer to the world of internet.
10 steps to protecting your computer to the world of internet.10 steps to protecting your computer to the world of internet.
10 steps to protecting your computer to the world of internet.
 
Hardware & software
Hardware & softwareHardware & software
Hardware & software
 
Basic computer for_small_business by rajesh valangaiman
Basic computer for_small_business by rajesh valangaimanBasic computer for_small_business by rajesh valangaiman
Basic computer for_small_business by rajesh valangaiman
 
Basic computer for_small_business from rajesh
Basic computer for_small_business from rajeshBasic computer for_small_business from rajesh
Basic computer for_small_business from rajesh
 
Basic computer for_b_ed
Basic computer for_b_edBasic computer for_b_ed
Basic computer for_b_ed
 
Basic computer
Basic computerBasic computer
Basic computer
 
Basic computer for_b_ed
Basic computer for_b_edBasic computer for_b_ed
Basic computer for_b_ed
 
Computer Hardware
Computer HardwareComputer Hardware
Computer Hardware
 
Linux
LinuxLinux
Linux
 
3uTools Crack 2022
3uTools Crack 20223uTools Crack 2022
3uTools Crack 2022
 
Basic_ComputerS1.ppt
Basic_ComputerS1.pptBasic_ComputerS1.ppt
Basic_ComputerS1.ppt
 
Windows 7 Features
Windows 7 FeaturesWindows 7 Features
Windows 7 Features
 
Basic computer tutorial
Basic computer tutorialBasic computer tutorial
Basic computer tutorial
 
Mainstage 3 for pc
Mainstage 3 for pcMainstage 3 for pc
Mainstage 3 for pc
 
ICT.pptx
ICT.pptxICT.pptx
ICT.pptx
 
Introduction to Operating Systems
Introduction to Operating SystemsIntroduction to Operating Systems
Introduction to Operating Systems
 
Computer basics--computer basics2
Computer basics--computer basics2Computer basics--computer basics2
Computer basics--computer basics2
 
Operating system windows XP
Operating system windows XPOperating system windows XP
Operating system windows XP
 

Más de axiologia

Las variedades de la lengua resumen
Las variedades de la lengua  resumenLas variedades de la lengua  resumen
Las variedades de la lengua resumen
axiologia
 
Ensayo-El limite es tu mente.
Ensayo-El limite es tu mente.Ensayo-El limite es tu mente.
Ensayo-El limite es tu mente.
axiologia
 
Descripción De Mi computador
Descripción De Mi computador Descripción De Mi computador
Descripción De Mi computador
axiologia
 
Componentes del computador sena
Componentes del computador senaComponentes del computador sena
Componentes del computador sena
axiologia
 
9 elementos de proteccion sena
9 elementos de proteccion sena9 elementos de proteccion sena
9 elementos de proteccion sena
axiologia
 
11 mantenimiento preventivo sena
11 mantenimiento preventivo sena11 mantenimiento preventivo sena
11 mantenimiento preventivo sena
axiologia
 
Mantenimiento de software
Mantenimiento de softwareMantenimiento de software
Mantenimiento de software
axiologia
 
Electricidad estatica sena! fisk
Electricidad estatica sena! fiskElectricidad estatica sena! fisk
Electricidad estatica sena! fisk
axiologia
 
Electricidad estatica sena! fisk
Electricidad estatica sena! fiskElectricidad estatica sena! fisk
Electricidad estatica sena! fisk
axiologia
 
Mantenimiento de software
Mantenimiento de softwareMantenimiento de software
Mantenimiento de software
axiologia
 
Etica senaa!!!!
Etica senaa!!!!Etica senaa!!!!
Etica senaa!!!!
axiologia
 
Etica senaa!!!!
Etica senaa!!!!Etica senaa!!!!
Etica senaa!!!!
axiologia
 
Quimica senaaa!
Quimica senaaa!Quimica senaaa!
Quimica senaaa!
axiologia
 
Etica senaa!!!!
Etica senaa!!!!Etica senaa!!!!
Etica senaa!!!!
axiologia
 
Sena fisikaa!!!!
Sena fisikaa!!!!Sena fisikaa!!!!
Sena fisikaa!!!!
axiologia
 
Ed.fisica senaa!!
Ed.fisica senaa!!Ed.fisica senaa!!
Ed.fisica senaa!!
axiologia
 

Más de axiologia (20)

Doc1
Doc1Doc1
Doc1
 
Las variedades de la lengua resumen
Las variedades de la lengua  resumenLas variedades de la lengua  resumen
Las variedades de la lengua resumen
 
Ensayo-El limite es tu mente.
Ensayo-El limite es tu mente.Ensayo-El limite es tu mente.
Ensayo-El limite es tu mente.
 
Redes 1 3
Redes 1 3Redes 1 3
Redes 1 3
 
Redes 1 3
Redes 1 3Redes 1 3
Redes 1 3
 
Descripción De Mi computador
Descripción De Mi computador Descripción De Mi computador
Descripción De Mi computador
 
Componentes del computador sena
Componentes del computador senaComponentes del computador sena
Componentes del computador sena
 
9 elementos de proteccion sena
9 elementos de proteccion sena9 elementos de proteccion sena
9 elementos de proteccion sena
 
11 mantenimiento preventivo sena
11 mantenimiento preventivo sena11 mantenimiento preventivo sena
11 mantenimiento preventivo sena
 
Mantenimiento de software
Mantenimiento de softwareMantenimiento de software
Mantenimiento de software
 
Electricidad estatica sena! fisk
Electricidad estatica sena! fiskElectricidad estatica sena! fisk
Electricidad estatica sena! fisk
 
Electricidad estatica sena! fisk
Electricidad estatica sena! fiskElectricidad estatica sena! fisk
Electricidad estatica sena! fisk
 
Mantenimiento de software
Mantenimiento de softwareMantenimiento de software
Mantenimiento de software
 
Etica senaa!!!!
Etica senaa!!!!Etica senaa!!!!
Etica senaa!!!!
 
Etica senaa!!!!
Etica senaa!!!!Etica senaa!!!!
Etica senaa!!!!
 
Quimica senaaa!
Quimica senaaa!Quimica senaaa!
Quimica senaaa!
 
Etica senaa!!!!
Etica senaa!!!!Etica senaa!!!!
Etica senaa!!!!
 
Redes sena!
Redes sena!Redes sena!
Redes sena!
 
Sena fisikaa!!!!
Sena fisikaa!!!!Sena fisikaa!!!!
Sena fisikaa!!!!
 
Ed.fisica senaa!!
Ed.fisica senaa!!Ed.fisica senaa!!
Ed.fisica senaa!!
 

Último

Cloud Frontiers: A Deep Dive into Serverless Spatial Data and FME
Cloud Frontiers:  A Deep Dive into Serverless Spatial Data and FMECloud Frontiers:  A Deep Dive into Serverless Spatial Data and FME
Cloud Frontiers: A Deep Dive into Serverless Spatial Data and FME
Safe Software
 
Why Teams call analytics are critical to your entire business
Why Teams call analytics are critical to your entire businessWhy Teams call analytics are critical to your entire business
Why Teams call analytics are critical to your entire business
panagenda
 

Último (20)

TrustArc Webinar - Unlock the Power of AI-Driven Data Discovery
TrustArc Webinar - Unlock the Power of AI-Driven Data DiscoveryTrustArc Webinar - Unlock the Power of AI-Driven Data Discovery
TrustArc Webinar - Unlock the Power of AI-Driven Data Discovery
 
Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...
Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...
Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...
 
Repurposing LNG terminals for Hydrogen Ammonia: Feasibility and Cost Saving
Repurposing LNG terminals for Hydrogen Ammonia: Feasibility and Cost SavingRepurposing LNG terminals for Hydrogen Ammonia: Feasibility and Cost Saving
Repurposing LNG terminals for Hydrogen Ammonia: Feasibility and Cost Saving
 
Corporate and higher education May webinar.pptx
Corporate and higher education May webinar.pptxCorporate and higher education May webinar.pptx
Corporate and higher education May webinar.pptx
 
Exploring the Future Potential of AI-Enabled Smartphone Processors
Exploring the Future Potential of AI-Enabled Smartphone ProcessorsExploring the Future Potential of AI-Enabled Smartphone Processors
Exploring the Future Potential of AI-Enabled Smartphone Processors
 
MS Copilot expands with MS Graph connectors
MS Copilot expands with MS Graph connectorsMS Copilot expands with MS Graph connectors
MS Copilot expands with MS Graph connectors
 
2024: Domino Containers - The Next Step. News from the Domino Container commu...
2024: Domino Containers - The Next Step. News from the Domino Container commu...2024: Domino Containers - The Next Step. News from the Domino Container commu...
2024: Domino Containers - The Next Step. News from the Domino Container commu...
 
Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...
Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...
Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...
 
FWD Group - Insurer Innovation Award 2024
FWD Group - Insurer Innovation Award 2024FWD Group - Insurer Innovation Award 2024
FWD Group - Insurer Innovation Award 2024
 
GenAI Risks & Security Meetup 01052024.pdf
GenAI Risks & Security Meetup 01052024.pdfGenAI Risks & Security Meetup 01052024.pdf
GenAI Risks & Security Meetup 01052024.pdf
 
Cloud Frontiers: A Deep Dive into Serverless Spatial Data and FME
Cloud Frontiers:  A Deep Dive into Serverless Spatial Data and FMECloud Frontiers:  A Deep Dive into Serverless Spatial Data and FME
Cloud Frontiers: A Deep Dive into Serverless Spatial Data and FME
 
DBX First Quarter 2024 Investor Presentation
DBX First Quarter 2024 Investor PresentationDBX First Quarter 2024 Investor Presentation
DBX First Quarter 2024 Investor Presentation
 
Polkadot JAM Slides - Token2049 - By Dr. Gavin Wood
Polkadot JAM Slides - Token2049 - By Dr. Gavin WoodPolkadot JAM Slides - Token2049 - By Dr. Gavin Wood
Polkadot JAM Slides - Token2049 - By Dr. Gavin Wood
 
Strategize a Smooth Tenant-to-tenant Migration and Copilot Takeoff
Strategize a Smooth Tenant-to-tenant Migration and Copilot TakeoffStrategize a Smooth Tenant-to-tenant Migration and Copilot Takeoff
Strategize a Smooth Tenant-to-tenant Migration and Copilot Takeoff
 
Apidays New York 2024 - The value of a flexible API Management solution for O...
Apidays New York 2024 - The value of a flexible API Management solution for O...Apidays New York 2024 - The value of a flexible API Management solution for O...
Apidays New York 2024 - The value of a flexible API Management solution for O...
 
Navi Mumbai Call Girls 🥰 8617370543 Service Offer VIP Hot Model
Navi Mumbai Call Girls 🥰 8617370543 Service Offer VIP Hot ModelNavi Mumbai Call Girls 🥰 8617370543 Service Offer VIP Hot Model
Navi Mumbai Call Girls 🥰 8617370543 Service Offer VIP Hot Model
 
AWS Community Day CPH - Three problems of Terraform
AWS Community Day CPH - Three problems of TerraformAWS Community Day CPH - Three problems of Terraform
AWS Community Day CPH - Three problems of Terraform
 
Why Teams call analytics are critical to your entire business
Why Teams call analytics are critical to your entire businessWhy Teams call analytics are critical to your entire business
Why Teams call analytics are critical to your entire business
 
How to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected WorkerHow to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected Worker
 
ProductAnonymous-April2024-WinProductDiscovery-MelissaKlemke
ProductAnonymous-April2024-WinProductDiscovery-MelissaKlemkeProductAnonymous-April2024-WinProductDiscovery-MelissaKlemke
ProductAnonymous-April2024-WinProductDiscovery-MelissaKlemke
 

Ingles sena

  • 1. PC PROGRAMS Presentado a: Lina Presentado por: Yesenia Sánchez Natalia Cardona Juliana Patiño Tania Sánchez Grado 10*4 I.E Gabo
  • 2. Tabla de Contenido 1 Chris PC-Lock 2 Computer Monitoring, Spy Software, Keylogger 3 Microsoft PowerToys for Windows XP Tablet PC Edition 4 BIOS CMOS Memory 5 MediaMonkey
  • 3. Chris PC-Lock It is a useful Windows application with keyboard locking functions. Now you can enjoy your spare time without any worry that somebody unauthorized will access your computer. More than that, you can ensure that your work remains unaltered and meanwhile benefit of your children joy when playing around your laptop or desktop PC. It's really a pitty to be concerned about what might happen with your reports or financial sheets when your children or your favourite pet would hit by mistake the keyboard. Now you can stay relax. Chris PC-Lock is doing this job for you. Now by a simple shortcut you can block fast the access to your computer and secure your work. To resume your work simply unlock it using your secret password. Who can use it ? Anyone who uses a PC. Chris PC-Lock can be a handy utility for anyone who wants to protect his/her computer from unauthorized access. Computer Monitoring, Spy Software, Keylogger With Activity Monitor, SoftActivity™ TS Monitor and SoftActivity™ Keylogger solutions you have your hand on the pulse of what is going on in your LAN. This unique spy software allows remote computer monitoring and keylogger recording in real time. The outstanding built-in keystroke recorder allows you to know everything user types in his emails, chats and other programs, including passwords. View and record Internet activity, trace all programs started and run by your network members. Here are several popular ideas of how to use our computer monitoring software: Employee activity monitoring. Find out what they are doing when they are assumed to be working Control over students during the academic hours. Easily track their activity with our keystroke logger, so they will use network for the educational purposes only
  • 4. Parental control. Our powerful spy software will alert you when your child is into something suspicious Our internet monitoring software works out the entire issue with immense effectiveness. Full statistics, detailed reports, real time computer monitoring. The completely invisible keylogger to track and record everything happening within the entire network. Microsoft PowerToys for Windows XP Tablet PC Edition They're here! PowerToys are additional programs that developers work on after a product has been released to manufacturing. They'll add fun and functionality to your Tablet PC experience. Note: We've taken great care to ensure that PowerToys operate as they should, but they are not part of Windows XP Tablet PC Edition and are not supported by Microsoft. For this reason, Microsoft Technical Support is unable to answer questions about PowerToys. PowerToys are for Windows XP Tablet PC Edition only and will not work with Windows Vista. BIOS CMOS Memory The BIOS settings that you use to control how your PC works must be saved in non-volatile memory so that they are preserved even when the machine is off. This is as opposed to regular system memory, which is cleared each time you turn off the PC. A special type of memory is used to store this information, called CMOS memory, and a very small battery is used to trickle a small charge to it to make sure that the data it holds is always preserved. These memories are very small, typically 64 bytes, and the batteries that they use typically last for years. This non- volatile memory is sometimes called NVRAM. MediaMonkey Organize music and edit tags in your audio library with a powerful, intuitive interface.. Automatically lookup and tag Album Art and other metadata. Manage 50,000+ files in your music collection without bogging down. Manage all genres of audio: Rock, Classical, Audiobooks, Comedy, Podcasts, etc. Play MP3s and other audio formats, and never again worry about varying volume. Record CDs and convert MP3s, M4A, OGG, FLAC and WMA files etc. into other formats. Create
  • 5. playlists and let Auto-DJ & Party Mode take care of your party. Sync iPhones, iPods, & MP3 players, converting & leveling tracks on-the-fly.. .