لخّصلي

خدمة تلخيص النصوص العربية أونلاين،قم بتلخيص نصوصك بضغطة واحدة من خلال هذه الخدمة

نتيجة التلخيص (50%)

(تلخيص بواسطة الذكاء الاصطناعي)

This course introduces hardware and operating systems, highlighting the high demand and lucrative salaries in IT. The curriculum covers operating system fundamentals, computing devices (including stationary, mobile, and IoT devices), and their associated platforms and operating systems (Windows, macOS, Linux, Android, iOS, ChromeOS). It emphasizes hands-on learning through videos, interactive activities, and assessments, leading to a shareable certificate. A section on computing fundamentals defines computers, classifies them by size and use, explains their four core functions (input, processing, output, storage), and details their benefits. Another section explains numeral systems (decimal, binary, hexadecimal), data types (characters, strings, integers, floats, Booleans), and character encoding (ASCII, Unicode). Finally, the course explores Windows 10, covering login methods, desktop navigation, settings access, window management, and keyboard shortcuts. The course aims to equip students with job-ready skills and knowledge relevant to the CompTIA IT Fundamentals Certification Exam.


النص الأصلي



  1. Course Introduction
    Welcome to “Introduction to Hardware and
    Operating Systems.” According to Statista.com research, global
    IT spending on PCs, tablets, mobile phones, printers, data center systems, enterprise
    software, and communications systems is expected to total about 4.45 trillion US dollars in




  2. Who will install, configure, manage, and program
    these IT assets? The most recent US Bureau of Labor Statistics
    report indicates about 667,600 annual job postings and projected job growth of 13 percent
    through 2029. At the time of this course publication, the
    median US IT salary was $112,161, more than double the US median salary of $41,950 for
    all jobs. An IT role is right for you if you like change
    and enjoy ongoing learning. Computing technology is always evolving, and
    there’s always new technology or a new feature to learn. If you’re balancing work/life commitments,
    many companies offer onsite work, remote work, hybrid work environments, and flexible shifts. Employers need coverage 24 hours a day and
    seven days a week. IT Careers offer multiple paths for career
    growth, and if you enjoy making a positive difference for others, an IT role can be rewarding. When you complete this course, you’ll be
    able to: Describe and apply operating system fundamentals,
    and identify, classify, and describe computing
    devices and peripherals, interfaces and connectors, and internal computer components. Then, gain job-ready skills and certification-ready
    insights when you learn about recommended workstation evaluation, setup, and troubleshooting
    processes and practices. This course is the first in a series of IBM
    courses intended to help you develop IT Fundamental skills and knowledge
    In addition to gaining valuable skills in Introduction to Hardware and Operating Systems,
    this course, along with other IBM IT courses, can also aid in your preparation for the CompTIA
    IT Fundamentals Certification Exam. Especially for beginners, guided instructional
    videos walk you through key concepts with essential need-to-know facts. Interactive activities reinforce what you’ve
    learned in videos, forums provide connections where you can introduce yourself to others,
    provide feedback, and get support. Practice assessments help you gauge your knowledge,
    and graded assessments prove what you’ve learned, leading to a shareable badge and
    certificate that you can show prospective employers. We’re here to support your success, and
    we’re excited that you’re here. Let’s get started!




  3. Introduction to Computing Fundamentals 
    Welcome to "Introduction to Computing Fundamentals." After watching this video, you will be able
    to: Define what a computer is. Classify computers based on their size and
    their uses. List the four functions of computing and the
    parts of a computer associated with those functions, and Describe the benefits of computing. A computer is a device or system that includes
    hardware, operating system software, application software, and peripheral devices. Hardware is the platform that processes data
    based on the provided instructions and stores data. Software includes the operating system software
    that enables and configures hardware capabilities and the application software that enables
    the computer to perform tasks. Peripheral devices such as keyboards and monitors
    enable user input and output. And finally, computers need users who provide
    instructions. A fast way to classify computers is by their
    size and speed. Supercomputers are the fastest computers and
    are used for the most complex mathematical and analytical computations. Mainframe computers function “at the speed
    of business” and are used to perform transactions and more. Next in size and speed are minicomputers,
    which enable more than one person to access the same data. Finally, the smallest computers are microcomputers. This category includes personal computers,
    laptops, smartphones, and other single-user devices. Another way to classify computers is by use. General-purpose computers perform functions
    such as creating documents, saving files, web conferencing, working online, financial
    analysis, data analytics, coding, and other multi-function capabilities. Even smartphones can be considered general-purpose
    computers. Special-purpose computers, which perform defined,
    limited use functions, include IoT devices such as sensors that report water quality,
    lights that activate during occupancy, sensors that report building occupancy, and IoT devices
    that monitor manufacturing processes. Other types of computers include Wi-Fi-enabled
    appliances, weather stations, alarm systems, and both wired and wireless gaming consoles. Computers perform many tasks, but we can simplify
    and categorize those tasks into four easy-to-remember functions: Input, Processing, Output, and Storage. Let's learn more. Input is the function, or action, of getting
    data into the computer. Input happens when you type or tap on a keyboard,
    use a touchscreen, or speak a voice-to-text command. Clicking the Send button for an email is also
    input. Input is also the information and instructions
    a programmer provides to perform calculations using a set of programs. Next, processing happens when the computer
    receives the input and then converts that data into a format or action that a user can
    recognize and use. Examples include downloading an app, document,
    or photo and moving data from one drive to another. Processing also occurs when the computer performs
    programming instructions, such as data calculations, or even instructions to fly a rocket to the
    stratosphere and back. Technically, processing happens when raw data
    changes into usable formats such as email, documents, and photos. Processors, also called central processing
    units or CPUs, are located inside computers on a system board, also called a motherboard. These boards and their processors are usually
    located centrally within the devices. Next, the computer delivers the processed
    results to the default or configured output devices including monitors, speakers, and
    printers. Output, meaning what you see, hear, or understand,
    is what makes the data apparent and valuable. At the same time, or just after the processing
    function completes, and while output is happening, computers can use the storage function. Storage is the saving of data to disk space
    on your computer, an external hard drive, or on network or cloud storage for an indefinite
    or undefined time unless you explicitly specify a data expiration date or delete the data. Storage saves data for reuse. Server, desktop, and laptop computer storage
    is usually located inside of the case and to the side of the case. Storage is often welded onto the system board
    for phones, IOT, and gaming devices. So, what are the advantages of using computers? Manual entry errors are eliminated by using
    capabilities such as copy and paste and data duplication to reuse data or content. Communication is sped up by using network,
    wireless, cellular, and other communication technologies. Exponential and complex computations such
    as those used for medical research, civil engineering and space exploration are enabled
    by processors, memory, and programming languages. Computers enable the saving of documents and
    data to disk storage, eliminating the extra storage space needed for stacks of paper. Businesses thrive on digital data storage. And, whether it's medical images, car claims,
    research records, or family photos, saving digital images provides durable and long-lasting
    access to that information. Finally, editing capabilities eliminate the
    time-consuming drudgery of having to erase and rewrite work manually. In this video, you learned that: Based on size and speed, supercomputers are
    the fastest, followed by mainframes, then minicomputers, and finally microcomputers,
    which include PCs, laptops, smartphones, and others. Computers can perform general functions or
    specific functions. The four functions of computing are input,
    processing, output, and storage. And, the benefits of computing include reducing
    the number of tasks humans need to do, enhanced data storage, the ability to perform complex
    mathematical tasks, and faster communications.




  4. Common Computing Devices and Platforms
    Welcome to "Common Computing Devices and their
    Platforms." After watching this video, you will be able
    to: Categorize common computing devices and describe
    their main features and benefits. And identify frequently used operating platforms
    associated with these devices. Common computing devices include stationary computing devices, mobile computing devices, and Internet of things or IoT devices. Stationary devices, which include workstations,
    servers, and tabletop gaming consoles, remain on a desk, or rack, or other fixed location. These devices consist of a box that includes
    processors, memory, and input and output connections that connect to networks, keyboards, monitors,
    mice, printers, speakers, microphones, webcams, and other devices. In some instances, you can update the device’s
    memory, storage, or video cards. Let's explore workstations. Workstations, used both at the office and
    at home, are what most people think of when they think about a desktop computer. Also categorized with personal computers,
    these devices are typically in a box that contains a system board with a processor,
    memory, storage, and slots for add-on cards for additional functions. Their motherboards have ports that support
    monitors, keyboards, mice, microphones, printers, speakers, and other devices as well as onboard
    cards for wireless connectivity. Many newer devices enable memory, storage,
    and graphic card upgrades. These devices use Microsoft Windows, macOS,
    and Linux operating systems. Next, servers are generally installed as standalone
    units or in stacked racks on networks enabling shared access to media such as movies, videos,
    and sound clips and web pages for websites. Servers also manage print requests, enable
    shared data and document access, store email, and more. On the network, multiple servers can contain
    the same data so that if one server fails, users can keep working using the same data
    from other servers. The ability for work to continue if a shared
    computing resource is malfunctioning is known as fault tolerance. Server hardware offers robust capabilities
    that often support multiple processors, memory, graphic cards, storage, and port connections
    within the same box. Servers use network operating systems geared
    towards optimizing data distribution. Popular operating system software vendors
    include Microsoft Windows Server, Linux, UNIX, macOS X, and FreeBSD. Desktop gaming consoles are also known as
    tabletop gaming consoles. Gaming console system boards contain processors,
    memory, graphics processors, storage, input ports, output ports, and a memory controller
    that exists separately between the other function blocks and the system memory. In times past, many of these functions existed
    separately as multiple chips on the motherboard, but today these functions exist in a single
    functional block. Gaming consoles, such as those made by Microsoft,
    Sony, and Nintendo, are similar to desktop computers, but use upgraded memory caching
    and graphics processing to enable smoother game-playing experiences. Gaming consoles used to require cable connections
    to monitors and gaming controllers. Today's gaming consoles provide wireless connectivity. Gaming consoles are not usually upgradeable. Mobile devices, including laptops, tablets,
    mobile phones, and portable gaming systems have transformed how we live, work, and play. Let's first check out laptops. Many laptop computers run versions of Microsoft
    Windows, macOS, and Linux operating systems, while others use Google Chrome's lightweight
    operating system. Laptop system boards include processors, memory,
    video cards, ports for connecting to other devices, and Wi-Fi capability. Many laptop manufacturers allow upgrades to
    storage and memory. Tablet devices are usually less powerful than
    laptops, but that is beginning to change. Tablets, built in very tight cases, include
    most laptop components but don't include a keyboard. Tablets generally use operating systems such
    as Microsoft Windows, iOS, and Chrome. The system board includes the device's processor,
    memory, a video card, sound card, a limited number of ports, a Wi-Fi card, and limited
    hard drive storage. Tablets are usually not upgradeable. Mobile phones include onboard components with
    specialized processors, memory, sound, and video capabilities. Phones can include a slot for a SIM card that
    links the phone to a cell phone access provider and a slotted port for additional storage,
    All phones include one multifunctional port primarily used to recharge the phone's battery. Mobile phone operating systems, built for
    speed, are specially designed to support multiple communication spectrum capabilities including
    the designated cell phone frequencies, Bluetooth, Wi-Fi, near field communications, and other
    connectivity options. Android and iOS operating systems dominate
    the market. But with practically all components welded
    onto the board, you can only upgrade the software, not the hardware. Portable gaming devices use specialized processors,
    storage, and memory, and include battery and multiuse ports for power, Wi-Fi, and other
    connectivity options. These devices use operating systems specially
    configured for mobile use, and many of those operating systems are Linux-derived. Gaming software is usually onboard or downloadable,
    and the hardware is generally not upgradeable. Internet of things, known as IoT devices,
    describes physical objects that have sensors, processing ability, software, and other technologies
    that enable these devices to exchange data with other devices and systems over the Internet
    or other communications networks. IoT devices communicate via Wi-Fi, Bluetooth,
    NFC, Zigbee, and other protocols. They can receive software updates, but generally
    the hardware within a limited space is soldered to the board and is not upgradeable. Let's learn more. Widely available consumer IoT devices include
    smart speakers, TVs, wearable devices such as fitness trackers, and appliances such as
    automatic floor vacuums, stoves, and others. Light bulbs, toys, thermostats, and medical
    devices are also part of today's IoT world. Enterprise IoT devices enable organizations
    to offer consumers more targeted features and manage costs. For example, utilities install smart meters
    to help both residential and commercial customers manage their energy usage. Occupancy sensors and IoT-enabled security
    systems help businesses prevent losses and enhance worker and customer safety. Similarly, industrial IoT devices help organizations
    monitor the weather, operate robots, assess water and air quality, and more. In this video, you learned that: Common computing devices currently fit into
    three categories: stationary devices, mobile devices, and IoT devices. Desktop computers, mobile computers, and IoT
    devices feature a processor and input and output ports or capabilities. Desktop machines usually offer the most upgrade
    capabilities, while IoT devices are generally not upgradeable. And desktop operating systems include Microsoft
    Windows, macOS, Linux, or Unix while Google Android, Google Chrome, and Apple's iOS operating
    systems dominate the mobile operating system market.




  5. Understanding How Computers Talk
    Welcome to “Understanding How Computers
    Talk.” After watching this video, you will be able
    to: Describe three widely used notational systems Convert numbers between notational systems
    Identify common data types, and And identify the two most widely used character
    types. In computers, a notational system, also called
    a numeral system, is a system of symbols that represent numbers. The three most widely used notational systems
    are decimal, binary, and hexadecimal. Decimal notation is base 10, as in numbers
    1 through 9, then 10, 20, 30, and so on. Decimal notation uses a decimal mark, usually
    a period, which identifies the numbers to the right of the period as a fractional amount. Decimals with negative values display a minus
    symbol immediately left of the number. Binary notation is the base system for "computer
    speak" and programming in bits, but more commonly referenced in bytes. Binary uses only two numbers, zero and one,
    and combinations of those two numbers. Binary notation represents zero as an "off”
    state and the number 1 as an “on” state. A single digit is known as a bit and is the
    smallest piece of computing information computers process. The next size of computing information is
    a byte. Eight adjacent bits or digits create a byte. To convert decimal numbers to binary numbers,
    divide your starting number and each subsequent quotient by two until the quotient equals
    zero. For example, start at the top of the column
    with the decimal 25. Divide 25 by 2 and
    note the remainder. Now, divide the quotient 12 by 2, and note
    the remainder again. Repeat these steps until you get zero as the
    quotient. For your final step, write the remainders
    so that the last remainder, for one divided by two, is written first, followed by the
    other remainders, reading from bottom to top. So, the binary equivalent of 25 is one, one,
    zero, zero, one. Here’s how to change a number from binary
    to decimal using the doubling method. Let’s start with the binary number 010010. Start with the leftmost digit, which is zero. Since you are starting from the leftmost digit
    and there is no previous digit to the leftmost digit, we consider the double of the previous
    digit as zero. Double the previous number and add the result
    to the current digit. Continue the same process for the next digit,
    which is 1. Now, double the previous digit and add the
    number to the current digit. In this example, you get 0 × 2 + 1, which
    is 1. Repeat the process for each number, moving
    to the right one digit at a time. The result of converting the binary number
    (010010) to a decimal using the doubling method is 18. Next, the hexadecimal notation system, often
    shortened to “hex,” is made up of 16 symbols using the numbers 0 through 9 and the letters
    A through F to represent decimal numbers 10 through 15. Hex offers compact notation for large numbers. Hex is used for: MAC addresses, which identify where the device
    resides on the network, similar to your home address, color values, IP addresses, which are website addresses,
    and memory addresses, which identify where data
    exists within the computer’s storage. The first column displays decimal numbers
    from 0 to 10. The second column displays the decimal numbers’
    hex equivalent. The third column displays the decimal and
    the hex numbers’ binary equivalent. In this example, reading left to right, you
    can see that the decimal ten is equal to A in hex and 1010 in binary. Many websites offer conversion tables where
    you can quickly convert numbers to their decimal, hex, and binary equivalents. To convert a hex number such as 123A into
    binary, follow these steps. First, note the hex number and represent each
    hex digit by its binary equivalent number. Next, add insignificant zeros to the left
    if the binary number has less than 4 digits. For example, write the decimal 10 as 0010. Then, string each of the converted binary
    numbers together, working from left to right. This process is called concatenation. Your fourth and final step is to discard any
    leading zeros at the left of the concatenated binary number. For this example, let’s use the hex number
    123A. Use the table to convert each hex digit in
    “123A” to binary, adding zeros to the left of the number, if necessary, to make
    the number a four-digit number. Then string all four groups of four-digit
    numbers together. On the left most binary number, discard any
    leading zeros. So, zero, zero, zero, one becomes one. Your result is1001000111010, the binary equivalent
    of the hex number 123A. Computers follow sets of instructions to perform
    tasks such as calculations, word processing, and web browsing using the following data
    types to process and present that information. Characters represent single letters. Strings show combinations of characters. Integers display whole numbers such as the
    number eight. Floats represent decimals and fractions. And Boolean values provide yes or no and true
    or false statements. ASCII, first published in 1963, is the American
    Standard Code for Information Interchange format that translates computer language into
    understandable text. To save on transmission costs, ASCII was originally
    a 7-byte system representing 128 binary characters. The system expanded to 8 bytes providing another
    256 characters. The displayed chart shows binary, ASCII, and
    hex equivalent numbers. You’ll find similar charts online. Unicode includes ASCII characters, characters
    from languages worldwide, as well as emojis. More than 95% of the world’s web pages use
    Unicode 8-bit encoding, commonly called UTF-8. Programming languages tend to use Unicode
    16-bit, referred to as UTF-16, and a few programming languages use Unicode 32-bit encoding. Unicode provides a unique hexadecimal value
    for each character called code points. The default encoding format is usually shown
    as U + hhhh, where the “hhhh” is the character’s hexadecimal value. You’ll find numerous conversion services
    online. In this video, you learned that: Bits and bytes are the base language of computer
    communications and eight bits equals one byte. MAC addresses, colors, IP addresses, and memory
    addresses use hexadecimal notation. Programs can read ASCII character text, strings,
    integers, floats, and Boolean data. And Unicode text, namely UTF-8, is used to
    display character sets on webpages.




  6. An Introduction to Operating Systems 
    Welcome to “An Introduction to Operating
    Systems.” After watching this video, you will be able
    to: Describe what an operating system is and
    describe the functions operating systems manage; Classify types of operating systems;
    Describe operating system generations; and describe the history of Linux, Windows,
    macOS, and ChromeOS operating systems. Operating systems provide standardized backbone
    code for managing input, output, processing, and storage. These efforts help keep data error-free and
    mitigate data loss. Operating systems can have more than one environment. The first environment, the command line interface
    (or CLI), is an environment where the user can type commands. The second environment is known as a graphical
    user interface, or a graphic shell. These environments provide menus, links, buttons,
    and fields that help users manage the operating system. History groups operating systems into four
    generations. The first generation was from 1945 to 1955. The second generation happened from 1955 to




  7. The third generation lasted 15 years, from
    1965 to 1980. And, 1980 ushered in the fourth and current
    generation. During the first generation of modern computing,
    from 1945 to 1955, operating systems that worked for multiple computers did not yet
    exist. Each computer’s parameters were uniquely
    created for every job, or task, using machine language. However, some of the code developed during
    this era became the basis for future operating systems. During the second generation of operating
    systems, mainframe computers became available for commercial and scientific use. Tape drives, a relatively new invention, provided
    input and output storage. In 1956, General Motors Research produced
    the first single-stream batch operating system, notably for its IBM 704 computing system. Subsequently, IBM became the first company
    to create operating systems to accompany computers. Embedded operating systems, developed in the
    early 1960s and still in use, focus on a single task, providing split-second response times,
    also known as low latency. In case of a system error, these operating
    systems can restart where the task needs to resume. Real-time operating systems are a type of
    embedded operating system. Airplanes, air traffic control systems, and
    space exploration were among the first to use real-time operating systems. As time passed, satellite systems, robotics,
    and even our cars implemented real-time operating systems. Then, during the third generation of operating
    system development, additional companies began creating batch file operating systems specifically
    for their large computing needs. This generation of operating systems saw the
    development of network operating systems that provided scalable, fast, accurate, and secure
    network traffic and communications and enabled each workstation within the network to operate
    independently. In 1969, the UNIX operating system offered
    a new innovation, an operating system that was installable on multiple computer systems
    and featured processor timesharing. Processor timesharing enabled multiple users
    with different programs to interact nearly simultaneously with a central computer, such
    as a mainframe. The fourth and current generation of operating
    systems brought computing into a new age with multitasking operating systems including Linux,
    Windows, macOS, and ChromeOS operating systems that enable computers to perform multiple,
    complex tasks simultaneously. Mobile operating systems including Android,
    Windows, iOS, and ChromeOS (which is also considered a mobile operating system), fit
    the definition of multitasking operating systems. Let’s learn more about some of these operating
    systems. In 1991, Linus Torvalds created a small, open
    source operating system for a PC, releasing version 1.0 of Linux in 1994. In 1996, the version 2.0 release with support
    for network-based symmetric multiprocessing (or SMP) provided a serious technical benefit
    for commercial and scientific data processing, evolving Linux into a powerful network and
    server operating system. Throughout the next 10 years, Linux gained
    market acceptance and its distributions continued to mature. In 2013, Google's Linux-based mobile operating
    system, Android, took 75% of the market share. When evaluating the value of Linux, consider
    that in 2018, IBM acquired Red Hat for 34 billion US dollars. The operating systems PC-DOS and MS-DOS once
    existed, with MS-DOS launching in 1981. In 1985, Windows offered the consumer market
    a graphical user interface version of the Windows operating system, written in variations
    of C language. In 1995, the debut of Windows 95 catapulted
    Microsoft's dominance in the consumer operating system software market, with Microsoft holding
    about 70% of the consumer desktop operating system market share in 2021. Microsoft also offers network, server management,
    mobile, and phone operating systems. Apple, with its OS X and macOS based on Unix,
    began its foray into the operating system market in 1999 with PowerPC-based Macs. In 2006, Apple began selling Macs using Intel
    core processors. In 2020, Apple began the Apple silicon chip
    transition, using self-designed, 64-bit, ARM-based Apple M1 processors on new Mac computers. Apple also offers the iOS operating system
    for its tablet and smartphone devices. In 2011, Google debuted ChromeOS built atop
    Linux, ChromeOS offers a lightweight operating system
    for mobile devices, including laptops Laptops and tablets running ChromeOS require
    less local storage and cost less, making them ideal for students, and
    this operating system is currently used by about 10% of the laptop market. In this video, you learned that:
    Operating systems provide standardized code that eliminates the need to manually recreate
    all the possible code necessary for input, processing, output and storage for every computer
    action. In 1956, GM Research created the first operating
    system that is also credited as being the first single-stream batch operating system. Linux evolved into a powerful operating system
    for networks and servers. With the creation of Windows 95, Microsoft
    began its domination of the consumer operating system market. And ChromeOS, built on top of Linux, is a
    lightweight, primarily browser-based operating system.




  8. Getting Started with Microsoft Windows
    Welcome to "Getting Started with Microsoft
    Windows 10." After watching this video, you will be able
    to: Identify four Windows login methods. Describe how to use the Windows desktop. Explain how to find the Settings app. Explain how to resize windows and switch programs,
    and identify Windows keyboard shortcut commands. Microsoft Windows 10 provides four easy methods
    to log into a machine, You can log in using a PIN, a password by drawing over a photo that you previously
    set up, or by scanning the fingerprint that you previously
    paired with the computer. Next, let’s check out parts of the Windows
    desktop. Click the Windows icon to view the Start menu
    and Productivity pane. On the left side of the Start menu, you can
    see which user is logged on, and shortcuts to documents, pictures, settings, and power
    management options. Available programs are organized alphabetically.
    If you right-click a program’s icon, you see menu options to uninstall the program,
    pin the program to your Taskbar, run the program with administrator rights, and open its file
    location. To the right of the Start menu is the Productivity
    pane, which consists of a mixture of live and static tiles. Static tiles are shortcuts to favorite and
    frequently used programs. Live tiles provide a quick view of information
    such as news, weather, and sports. Right-click any tile to remove the tile, uninstall
    the program, or perform other tasks. At the bottom of the screen, the Windows Taskbar
    provides access to the Windows Start button, where you can open the Start menu. Next is the Taskbar Search box, where you
    can search for files, settings, and programs on the computer or perform a quick web search. The circle icon provides a shortcut to talk
    to Cortana, and The filmstrip icon provides access to Windows
    Task view. Next, access File Explorer. Settings lets you access an app that customizes
    the toolbar. On the right side of the Taskbar, you can
    see the current weather, an upward caret that you can click to display the news, the Windows
    Meet Now icon that opens a video conferencing program, access to OneDrive, shortcuts to
    Wi-Fi and wired network access, speaker volume settings, Time and date settings, and notifications. When you have time, explore Taskbar customizations
    by using the Settings app, selecting Personalization, and selecting Taskbar. Notifications are a convenient way to view
    the news you want to see, receive app notifications, and more.
    On the Taskbar, click the Notifications icon to
    display your notifications. Click Manage notifications to customize the
    notifications you see. Clicking Manage notifications opens Notifications
    & actions, which is located within the Settings app.
    Here you can set notification preferences, including: Getting app and vendor notifications. Showing notifications on the lock screen. Allowing notifications to play sounds and
    other settings. Next, let’s learn about the control buttons
    used to resize, maximize, and minimize windows on the desktop. To resize a window, hover over the edge of
    the window to display the double-headed arrow. Then drag the double-headed arrow to resize
    the window. You can quickly maximize a window by clicking
    the rectangle. If you need to minimize the window, click
    the underscore button. To close a window, click the X. You’ll see
    the X shaded in red to remind you that you are about to close an active window. You can quickly locate and switch windows
    by pressing the Alt and Tab keys. Your screen will display windows using a carousel format.
    Keep the Alt key pressed and repeatedly press the Tab key each time you want to switch to
    the next window. Then click and hold to display the selected window. Let’s check out more
    keyboard shortcuts. Keyboard shortcuts save valuable time and
    reduce errors, resulting in productivity gains to benefit the business. Windows provides numerous keyboard shortcuts,
    many more than are listed here. Often new users become confused when they see the first
    key and the second key with a plus in between, so we’ve shown them here as the first key,
    the second key, and, if needed, the third key. To copy your file or content, press Control
    C. To paste or insert a file or content, press
    Control V. To delete a file or delete content, press
    control D. To repeat an action, such as inserting rows
    or columns or a series of words, press Control Y. To undo the previous action, press Control
    Z. To edit the file name, press Control O. To restart the computer, press Control, Alt,
    and Delete. To capture a screen image, you can use the
    print screen button displayed as PRT SCR or the Windows Start key and the print screen
    button. In this video, you learned that: You can log in to Windows using a PIN or a
    password by drawing over a photo that you previously set up, or by scanning your fingerprint. The Start menu provides shortcuts to documents,
    pictures, settings, and power management options. If notifications are interrupting your workflow,
    open the notifications panel, click Manage notifications, and then turn off notifications. To resize a window, hover over the edge of
    the window to display the double-headed arrow, then drag the double-headed arrow to resize
    the window. Using the Alt and Tab keys is a fast way to
    locate an open Window that you’re not currently viewing, and finally Windows keyboard shortcuts save you valuable
    time performing frequent tasks.




تلخيص النصوص العربية والإنجليزية أونلاين

تلخيص النصوص آلياً

تلخيص النصوص العربية والإنجليزية اليا باستخدام الخوارزميات الإحصائية وترتيب وأهمية الجمل في النص

تحميل التلخيص

يمكنك تحميل ناتج التلخيص بأكثر من صيغة متوفرة مثل PDF أو ملفات Word أو حتي نصوص عادية

رابط دائم

يمكنك مشاركة رابط التلخيص بسهولة حيث يحتفظ الموقع بالتلخيص لإمكانية الإطلاع عليه في أي وقت ومن أي جهاز ماعدا الملخصات الخاصة

مميزات أخري

نعمل علي العديد من الإضافات والمميزات لتسهيل عملية التلخيص وتحسينها


آخر التلخيصات

وأهداف أوبك الم...

وأهداف أوبك المعلنة في النظام التشريعي لأوبك، والمتاحة للعامة على موقعها الإلكتروني هي تنسيق وتوحيد ...

1. Course Intro...

1. Course Introduction Welcome to “Introduction to Hardware and Operating Systems.” According to Sta...

- عنوان البريد ...

- عنوان البريد الإلكتروني الذي تم إدخاله عند تقديم الشكوى ([email protected] ) السبب: الحساب اتسرق ...

هيرودوت )Hérodo...

هيرودوت )Hérodote). ولد هيرودوت حوالي العام 484ق.م. في إحدى مدن كاريا في فارس وهي إحدى المقاطعات ال...

مدى ملاءمة النظ...

مدى ملاءمة النظرية لوسائل الإعلام الجديدة أو الرقمية: يرى الكثير من الباحثين أن دوامة الصمت غير ملائ...

القصة القصيرة ا...

القصة القصيرة الرومانسية : كان محمود تيمور يعتقد في بدايات نشاطاته الأدبية أن القصة القصيرة ستحل محل...

Dear Sir/Madam,...

Dear Sir/Madam, I am a secondary school student seeking a part-time shop assistant position advertis...

أحدث التقنيات ا...

أحدث التقنيات الجديدة في مدارس تصميم الأزياء وجد استطلاع حديث أن خمسة فقط من أفضل ثماني مدارس تصميم...

يجب على المديري...

يجب على المديرين/المسيرين تحديد التوجهات والغرض أو الهدف من المؤسسة (الاستراتيجية تأهيل بالجودة، تطب...

Smiling is an e...

Smiling is an easy and effective way to show how socially open a person is. It is also one of the th...

في تصعيد لافت ل...

في تصعيد لافت للمواقف الدولية الضاغطة على إسرائيل لوقف حربها على غزة، أعلنت كندا، إلى جانب المملكة ا...

The school in t...

The school in the future Now the school is small. I study seven subjects like math , English ,scin...