Skip to Main Content
NPC Libraries Banner
-
Peripherals include devices that are not part of the computer but are tied directly to it, like printers (laser, dot matrix, ink jet, photographic imagesetters, and plotters), input devices (graphic tablet, modems, midi), and storage devices (internal/external drive, optical drive, CD-ROM). Viewers gain additional information and confidence in computer skills as each of these items is clearly detailed. One 24-minute video. A Meridian Production.
-
From texting to email to video calls, digital technology has transformed how we communicate with each other. But in formal situations like at work or in school, which forms of communications are appropriate, and when? Viewers of this video, especially digital natives, may be surprised to discover that communicating isn’t just about sharing information—it’s creating it—and that the ways in which emails, texts or voice messages are composed and conveyed may make the difference in impressing or disappointing an employer or co-worker. Even for late adopters of digital technology, this video has important points on what you should do—and what you don’t want to do—when it comes to email, texting, videoconferencing and using the phone for business calls or voice mail. A Coproduction of Films for the Humanities & Sciences and MotionMasters.
-
Formed decades ago from a small pool of data sources, the Internet has grown into a seemingly endless ocean of information—in which today’s young researcher can easily get lost. This video introduces strategic, study-related online search methods that teenage or college-level viewers may not be familiar with, especially if they’re accustomed to the more recreational side of the Internet. Outlining ways to formulate initial questions about a topic, the program offers examples of frequently used search engines (from Google to specialized databases) and how to take advantage of them using keywords, quotation marks, Boolean operators, nesting, wildcard and truncation symbols, and other typed-in directives. Result-oriented topics are also featured, including the differences between primary, secondary, and tertiary sources; the best criteria for confirming the legitimacy of a particular Web site; and helpful techniques for searching within a site. Part of the series Internet Research and Information Literacy: Effective Strategies and Cautionary Tales. A viewable/printable instructor’s guide is available online. A Cambridge Educational Production. (22 minutes)
-
In every city, in every tower block, in every office is a computer connected to the internet. 3 million computers. 146 countries. 30 million people. It's a global nervous system of phone lines, fiber optic cables, satellite and microwave links, pages, and computers. It is a digital pulse of trillions of packets of data. It is a virtual dimension of pure information. This is the story of some of the people and events which created it.
-
Computers: everyone uses them, but how do they actually work? This video goes beyond the desktop and program software to grapple with the system hardware itself. After a quick history of the computer, Inside a Computer takes a close look at the motherboard, with its central processing unit, RAM, and system clock; input devices such as the keyboard, mouse, and joystick; output devices like the monitor and printer; and storage devices, including internal and external hard disks and flash drives. The binary system of data management is also examined. Designed for computer novices, technicians-in-training, and experienced software users who want a better understanding of how a computer does what it does. Viewable/printable educational resources are available online. (27 minutes)
-
We will explore the importance of managing your online presence and practicing digital etiquette to navigate the digital world effectively and professionally.
-
A person normally wouldn’t shout out the details of a secret hookup or give a credit card to a total stranger and say “Max it out for me.” Yet as this video playfully points out, in effect that’s what people do when they post indiscreetly on social networking sites or are duped by phishing scams. Think b4 u Post uses a light touch to deliver some very serious information on how people can protect their reputation and guard their privacy online while still having a good time using social networking sites.
NPC Libraries Banner