Q: If you are moving from an old computer to a new one, and all of your music was purchased through iTunes, you can transfer all the purchased tracks on your iPod to your new computer. This is most useful for users whose library consists mainly of purchased tracks and ripped CDs. If you have music from other sources (online downloads, CDs that are now gone, etc.), or are trying to share music with a friend, see one of the following sections. You will need to authorize the computer with your Apple ID to allow your purchased tracks to be copied back to the computer.  Click here for instructions on downloading and installing iTunes on your new computer. This will open a dialog box prompting you for your Apple  ID. Authorize. This will authorize your new computer to access your iTunes purchases. You can only have five computers authorized at one time. Click here for instructions on deauthorizing computers if you have reached your limit. iTunes should detect the iPod after a few minutes. Transfer Purchases from the dialog box that appears. This will copy all of the songs on your iPod that were purchased with your Apple ID onto the new computer. If you have a lot of songs on the iPod, the transfer process may take a while.
A: Know what will be transferred. Open iTunes on the new computer. Click the "Store" menu and select "Authorize Computer". Enter your Apple ID and password and click . Connect the iPod to the new computer. Select .

Q: We’ll use the same range of ten numbers (2, 3, 5, 5, 7, 7, 7, 9, 16, and 19) as we used in the method for finding the mean value. Enter them in the cells from A1 to A10, if you haven’t already done so. You do this by using the MEDIAN function. As with the AVERAGE function, you can enter it one of three ways:  Click on an empty cell, such as A13, then type “=MEDIAN(A1:10)” (again, without the quotation marks) directly in the cell. Click on an empty cell, then click on the “fx” symbol in the function bar above the worksheet. Select “MEDIAN” from the “Select a function:” list in the Insert Function dialog and click OK. Enter the range “A1:A10” in the Number 1 field of the Function Arguments dialog and click OK. Enter an equals sign (=) in the function bar to the right of the function symbol. Select the MEDIAN function from the Name box dropdown list to the left of the function symbol. Enter the range “A1:A10” in the Number 1 field of the Function Arguments dialog and click OK. The median is the point where half the numbers in the sample have values higher than the median value and the other half have values lower than the median value. (In the case of our sample range, the median value is 7.) The median may be the same as one of the values in the sample range, or it may not.
A: Enter the numbers you want to find the median for. Find the median value of the numbers you entered. Observe the result in the cell you entered the function in.

Q: If you're familiar with common phishing attempts, you'll be less likely to fall for them. University and government cybercrime or information security websites are good sources of information.  For example, the Berkeley Department of Information Security and Policy has an archive of phishing messages available at https://security.berkeley.edu/resources/phishing/phishing-examples-archive. You can also find news and information at https://www.antiphishing.org/, the official website of the Anti-Phishing Working Group. A legitimate email typically will have a specific subject line that gives you a basic understanding of what the email will say. Phishing emails, on the other hand, use vague phrases such as "Urgent Reminder" or "Your Account at Risk" to alarm you.  Phishing email subject lines may also start with the abbreviation "Re:" to make you think the email is a response to an email you've sent. However, if you look at the email thread you can clearly see that there are no other emails. The subject line also may use special characters, emojis, or extra spaces. These don't serve any real purpose other than to draw your attention to the email by making the subject line look different from others in your inbox. Particularly if an email comes from a business, government agency, or other organization, the sender typically proofreads carefully before sending it. Obvious spelling and grammatical errors are a red flag that the email may not be legitimate. Also pay attention to the way language is used. Phishing emails frequently use words incorrectly or include awkward turns of phrase that no one would actually say. Scammers typically try to make the email address a phishing email is sent from look official or legitimate if you just glance at it. However, upon closer inspection, you'll note that something is amiss.  Instead of ending in ".com," as it should, the email address may end differently. They may include "com" in the domain to fool you. For example, you might get a phishing email from "airbnbcom.work" instead of "airbnb.com." It can take a second look to notice that odd extension. The company name may be spelled incorrectly, such as by having transposed letters or a single letter where there should be doubled letters. For example, you might get an email from "welsfargo.com" (attempting to impersonate the bank Well's Fargo). Phishing emails are desperate and insistent that the matter is urgent and you have a limited time to help or to correct a problem. Scammers want to raise a panic in you so that you give them your personal information without thinking. By the time you figure out that you've been scammed, it will be too late.  Variations of this include "last reminder" emails. If you get an email claiming to be your "last reminder" of something and you never received any previous reminders, it's likely a phishing attempt. If the scammer is impersonating a friend or family member rather than a business or government agency, contact that person directly and ask if them about the email. Scammers often use copyright and trademark symbols to make their emails appear more official. However, business communications, such as emails, aren't entitled to copyright protection. A phishing email may include legitimate logos or other branding from the company or organization the scammer is trying to impersonate. They want to make their email look as believable as possible so you'll fall for the scam. Don't expect a scammer to respect intellectual property rights.
A:
Read information on the latest phishing attempts. Check if the subject line is vague or oddly formatted. Look for spelling, grammar, and punctuation errors. Examine email addresses carefully. Treat "urgent" requests with suspicion. Recognize improper use of copyright or trademark notices.