tag:blogger.com,1999:blog-56278260945764845722024-03-12T20:47:42.134-07:00IT AutodidactTips & Trick Information TechnologyUnknownnoreply@blogger.comBlogger25125tag:blogger.com,1999:blog-5627826094576484572.post-17542433531430872702012-08-09T20:52:00.002-07:002012-08-09T20:54:40.439-07:00GOOGLEGoogle Inc. (NASDAQ: GOOG and LSE: GGEA) is an American public corporation, specializing in Internet search, Cloud Computing, as well as online advertising technology and software . AdWords is an advantage of almost all the profits of this company.
Google was founded by Larry Page and Sergey Brin while they were students at Stanford University. They both have a stake in the company by 16 percent. At first, the company was formed as a privately held company on 4 September 1998. initial public offering on August 19, 2004. Since its inception, the mission of this company is "To organize world's Information and make it Universally accessible and useful" (To manage all the information in the world and makes it accessible and useful for everyone) , and the slogan is not official is 'Don' t Be Evil "(Do not be evil). In 2006 the company was to move the headquarters to Mountain View, California.
Developments since the company was opened has spawned a wide range of products, mergers, and alliances behind the search engine company. The company offers online productivity software such as email, office applications package, and social networking sites. Google products are also extended to personal computers, with application to surf the web, organize & edit photos, and instant messaging. Google led the development of Android, the mobile operating system, also Google Chrome OS web-based operating system, who found in a special netbook called Chromebook.
Google has been estimated to have been running one million servers in data centers around the world, and has processed over one billion searches and about twenty-four petabytes of data from users every day.
As of September 2009, Alexa menyamtumkan main Google.com site (which focused on the United States) as the most visited website on the Internet, and other international Google website in the top one hundred, as well as websites such as Google-owned YouTube, Blogger and Orkut. Google also ranked number two in the database of brand equity, BrandZ. a dominant market position of Google street acts as a source of criticism on this company from the issue of privacy, copyright, and censorship.
source id.wikipedia.org/wiki/GoogleUnknownnoreply@blogger.com0tag:blogger.com,1999:blog-5627826094576484572.post-74056215269259335792012-08-06T19:08:00.000-07:002012-08-06T00:49:52.715-07:00Domain Yahoo<div style="text-align: justify;"><span style="font-size:100%;">The domain yahoo is one of the most popular in the world and it has become a market leader by providing the much needed access to many services for the customers. The first thing you can benefit from it is the establishment of an email ID which will go long way in launching you into a world where communication can happens with ease. You can open your communication links through the yahoo messenger and other benefits are having your own space for albums and have your file storage in which you can review them from any place. You can get a domain from yahoo and begin the process of having your own web site.<br /><br />The domain name yahoo has therefore brought and continues to bring a world of difference by providing the free services. Through domain yahoo you will get to see all the products that provided and above the mentioned products are yahoo widgets, yahoo travel, yahoo tool bar, yahoo small business, yahoo shopping, yahoo search, yahoo real estate, yahoo photos, yahoo music, yahoo mobile, yahoo message board, yahoo local, yahoo groups, yahoo finance, yahoo bookmarks, yahoo autos, yahoo 360 and so many other products. Yahoo also provides another vital service pertaining to domains. Domain locking is the prevention of unauthorized transfers to another registrar. Domains that are registered through yahoo can access this service.<br /><br />You can get access to so much more information through domain yahoo and some of the most common questions that are asked are on how to lock and unlock your domain and the effects of locking. People also want to know how to create a domain name and yahoo has all the information for you to read. Firstly, a good domain name according to yahoo should be clear and simple. People should not have trouble remembering it and, it should show the kind of business you do. Domain names are therefore very vital and to come up with a unique address, you need to spend some time and make sure you have the right name. Remember that domains should contain letters, numbers and hyphens.<br /><br />You are advised to re angle your domain name if you find that it is already in use. It is also good to think of where you register the domain and make sure that it serves your purpose. At domain yahoo, you will find a private domain registration which will help you safeguard your personal information from the public. This is because many domain owners have their contact details exposed to the public because the information is required by the internet governing body. But, yahoo will make sure that before people access your information, you are first alerted by their business partner Melbourne IT. You will be overwhelmed by the possibilities domain yahoo has to offer. Take sometime and read about the domain and discover so much more, you will find a service you are looking for with ease. The name will continue to break new grounds as it becomes more and more popular to many customers.<br /><br />source: http://www.articlesbase.com/domain-names-articles/why-the-domain-yahoo-is-so-popular-464051.html<br /></div></span>Unknownnoreply@blogger.com0tag:blogger.com,1999:blog-5627826094576484572.post-26314648891464081582012-07-26T19:02:00.001-07:002012-07-26T19:02:45.453-07:00Hosting is the place or internet service to create web pages that you created online and can be accessed by others.
According to Wikipedia Indonesia, which is the hosting are:
Hosting is the internet services that provide the resources to rent servers to enable organizations or individuals to put information on the Internet in the form of HTTP, FTP, EMAIL or DNS. Server hosting consists of a combination of server-server or a server that is connected with high-speed internet networks.
Types of Existing Hosting
There are several types of hosting service that is shared hosting, VPS or Virtual Dedicated server, dedicated server, colocation server.
-Shared Hosting is using the same shared hosting server with other users of the server used by more than one domain name. This means that in a single server, there are some accounts that distinguish between one and another account with a username and password.
-VPS, Virtual Private Server, or also known as Virtual Dedicated Server is a virtualization of the operating system software environment used by the server. Because this environment is a virtual environment, it is possible to install an operating system that can run on other operating systems.
-Dedicated Server is the use of a dedicated server for greater application and can not be operated in a shared virtual hosting or dedicated server. In this case, provision is borne by the hosting company server that typically work with the vendor.
-Server Colocation is where to put the rental service server used for hosting. Servers supplied by customers who typically work with the vendor.
Why Blogger Needs Hosting?
Yep, as a blogger must be sure you realize it or not you need a place to publish to the world of internet. For example if you have a blog at Blogger.com and other blog services, you automatically have to use the hosting services they provide. But if you choose to self-hosted hosting.com, then surely you must have your own hosting rent.
Choosing a Good Web Hosting Services
When you decide to have a blog or hosting your own website, then you should be able to pick and choose a good web hosting services. What should you look for when choosing hosting for your blog or website is:
-Your need for space and bandwidth. The more you post, the greater the space that will be needed. The more visitors your blog, the greater the bandwidth required in order to avoid server full load
-Note the services and features of hosting where you will rent your blog or website. Can include any software in support of their hosting and their hosting services.
-Target readers. If you choose a target audience of the country is better to use only local server in order to further save bandwidth. But if you choose global target, it would not hurt you to choose a server abroad as in America. But this situation is not absolute
-The right price. Consult with those who are more understanding about your hosting needs for your services in accordance with the rent money you will spend.Unknownnoreply@blogger.com0tag:blogger.com,1999:blog-5627826094576484572.post-76665967133216155112012-07-22T21:33:00.001-07:002012-07-22T21:33:22.003-07:00How To Recovery A Deleted File In Memory CardThere are times when we do not accidentally delete a file when that file is an important file that should not be lost. But because of a negligence or are in a hurry, so sometimes we push the button and there goes one of the important files.
Blessed are you because there is a free software that can recover deleted files on memory card your camera or HP. This software is 100% free, you just download it without registration and any trinket. The name of the software is PC Inspector Smart Recovery.
<div class="separator" style="clear: both; text-align: center;">
<a href="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEiWQShDhmqWqUyI1dVYom2TTCNpOklcxxUAnZEinuACt4ar70H0IOxmemOsszGSBAbEYvn-y6Uln_Ki21Nz_KuAxYavHGqPf4NXAgHgb-KkJHPuhvnGDTNWfSzQSywnYu1OW_UUBYKqNX4/s1600/data_recovery.jpg" imageanchor="1" style="margin-left:1em; margin-right:1em"><img border="0" height="234" width="320" src="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEiWQShDhmqWqUyI1dVYom2TTCNpOklcxxUAnZEinuACt4ar70H0IOxmemOsszGSBAbEYvn-y6Uln_Ki21Nz_KuAxYavHGqPf4NXAgHgb-KkJHPuhvnGDTNWfSzQSywnYu1OW_UUBYKqNX4/s320/data_recovery.jpg" /></a></div>
This software has a simple and lightweight appearance.
On the number 1 is the part where we choose the disk where we want to scan. Number 2 is the type of file we want to restore. In number 3, we can determine which files have been restored saved. After that click Start in the lower right corner to start the scan restore deleted files.
How to Restore Deleted Files In Memory CardSetelah What I am trying to M2 memory card, the process will go smoothly but there are still files that are not perfectly restored, but this is only a few percent, most are perfectly restored.
PC Inspector Smart Recovery software is reliable enough to restore a deleted file is much less free.
<p>Download <a rel="nofollow" href="http://www.pcinspector.de/smartrecovery/info.htm?language=1" target="_blank">software here</a>.</p>Unknownnoreply@blogger.com0tag:blogger.com,1999:blog-5627826094576484572.post-13088467413920515882011-04-17T20:13:00.001-07:002011-04-17T20:20:00.954-07:00T-Mobile Sidekick 4G First-Look<a onblur="try {parent.deselectBloggerImageGracefully();} catch(e) {}" href="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEiBHETGWbhDTPVSA4l8VQz00Loz6IwGFestoZX5qh8k_XFxnH6x-pTJgnc7pqI9ZG2ALMW-1o4dIQa4p3JnUET6d81ihlI8nvkVdHxllgmlzsFgydhRBR71QrACUD71ZsiJJGaZAUzk11QK/s1600/4g3.jpg"><img style="float:left; margin:0 10px 10px 0;cursor:pointer; cursor:hand;width: 300px; height: 256px;" src="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEiBHETGWbhDTPVSA4l8VQz00Loz6IwGFestoZX5qh8k_XFxnH6x-pTJgnc7pqI9ZG2ALMW-1o4dIQa4p3JnUET6d81ihlI8nvkVdHxllgmlzsFgydhRBR71QrACUD71ZsiJJGaZAUzk11QK/s320/4g3.jpg" border="0" alt=""id="BLOGGER_PHOTO_ID_5596754401911145538" /></a><br /><div style="text-align: justify;"><span style="font-size:100%;">While it may bear the same name as the old "Sidekick" phones built by Danger Inc. before that company was bought out by Microsoft a few years ago, the new T-Mobile Sidekick 4G has little in common with it's ancestors. Besides having a new manufacturer -- this model is being built by Samsung -- the new Sidekick also has a massive set of internal upgrades, taking it into the realm of a true smartphone.<br /><a onblur="try {parent.deselectBloggerImageGracefully();} catch(e) {}" href="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEjLieofZezeyWvie1XY-gn0ocDZ0Ln6Dg6R-jUrQe0up_oKCkzXVSFG3Yfq7uVIY9of1fvOKAzxr0qJbZgpCeaNsigU1jzCq3oocMcPDdKVNfffnR9-8RCJH7wPa7sEeOEwlt04eNOhyspB/s1600/4g1.jpg"><img style="float:left; margin:0 10px 10px 0;cursor:pointer; cursor:hand;width: 300px; height: 135px;" src="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEjLieofZezeyWvie1XY-gn0ocDZ0Ln6Dg6R-jUrQe0up_oKCkzXVSFG3Yfq7uVIY9of1fvOKAzxr0qJbZgpCeaNsigU1jzCq3oocMcPDdKVNfffnR9-8RCJH7wPa7sEeOEwlt04eNOhyspB/s320/4g1.jpg" border="0" alt=""id="BLOGGER_PHOTO_ID_5596753009701597666" /></a><br />After a brief time with this smartphone, I'm ready to share my first impressions, and a full review will be available when I've had time for complete testing.<br /><br />BUILD & DESIGN<br /><br />The Sidekick 4G is built along fairly common lines: a large central screen which slides out to reveal a thumb keyboard, allowing you to switch between a traditional phone shape and a large keyboard suitable for messaging and data entry.<br /><br />The biggest difference between this and similarly built models is that the Sidekick, being a primarily messaging-oriented device, is more explicitly designed for comfort when in landscape mode. The screen is exactly mid-way along the device to make the keyboard comfortable for both thumbs to reach; buttons are on either side of it for ease of access while positioned this way. The corners are also rounded to better fit against the hand.<br /><br />The button placement does make it a little harder to use in portrait mode, since then, you have needed buttons on either end of the screen.<br /><br />The build quality is what we've come to expect out of Samsung's smartphones over the last few years: it looks good, it feels good, and it's highly usable. At first glance, I worried about the keyboard, because the buttons seemed rather flat. As it turns out, I was worried about nothing--the keyboard is not just usable, but extremely good, with great key feedback. In fact, it's among the most usable thumb keyboards I've come across.<br /><br />PERFORMANCE<br /><br />Let's start with the basic hardware. The T-Mobile Sidekick 4G is based on a "Hummingbird" chipset: a 1GHz Samsung processor, coupled with a PowerVR SGX540 graphical processor. This is the same setup which drives much higher-end devices such as Samsung's Galaxy S, and it boasts some of the fastest graphics performance on any modern smartphone.<br /><br /><a onblur="try {parent.deselectBloggerImageGracefully();} catch(e) {}" href="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEgdKZ5gcZStHqVQQFR_C7wnFpKpJ-flK4Hhc8pyA4ziJowN1oLaI-vPc9dNQJHeGcoYJJcJHYu1lswSAeKzhuDZJ3NNwW1vGmGlzY-ZZOHTFIu9XMkK7lE6KYm1T16qJXKweLtnrVbembIc/s1600/4g2.jpg"><img style="float:right; margin:0 0 10px 10px;cursor:pointer; cursor:hand;width: 300px; height: 241px;" src="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEgdKZ5gcZStHqVQQFR_C7wnFpKpJ-flK4Hhc8pyA4ziJowN1oLaI-vPc9dNQJHeGcoYJJcJHYu1lswSAeKzhuDZJ3NNwW1vGmGlzY-ZZOHTFIu9XMkK7lE6KYm1T16qJXKweLtnrVbembIc/s320/4g2.jpg" border="0" alt=""id="BLOGGER_PHOTO_ID_5596752682617105122" /></a>And it shows. The Sidekick's performance in everything I've yet asked of it has been glassy smooth, ranging from streaming video to light gaming. I haven't put it through any more strenuous testing yet, but that will come later.<br /><br />While the Sidekick runs on Android OS 2.2 (Froyo), it also has a customized user interface, and a couple of added navigation features. In other words, if you're familiar with how existing Android devices work, you'll still have a little bit of a learning curve getting used to this thing. Fortunately, it's not that large. The differences are entirely cosmetic, so you don't need to worry about existing Android software not working.<br /><br />One thing that has been a mystery up until now is the amount of memory that the Sidekick 4G comes with -- not only is this not listed in the online spec sheets, it isn't found anywhere on the box or in T-Mobile's official press material. I had to dig into the device's settings to determine that it comes with a little under 500 MB of available memory out of the box. While not impressive compared to the multi-gigabyte figures boasted by higher end devices, this is still a lot more than most low-end Android phones come with. In comparison, the LG Vortex ships with less than 200 MB of internal memory available.<br /><br />The Sidekick does also come bundled with a 2 GB microSD card -- not a lot of memory, but enough to provide lots of space for apps and a certain amount of music. If you want more, you can also get yourself a much higher capacity card, up to 32 GB.<br /><br />As you might imagine for a messaging-oriented phone, the Sidekick has some special features in that regard. The most obvious is that the keyboard actually includes shortcut keys for common emoticons, like the ":-)" smiley and "<3" heart.<br /><br />T-Mobile Sidekick 4G Image GalleryMuch more substantial though are the two T-Mobile specialty apps. "Group texting" lets you host a conversation by text messaging between multiple people, even on different carriers, all of whom are able to read and respond. "Cloud texting" is an extension of your T-Mobile account that lets you send and receive text messages through their website from other devices, such as a desktop or laptop, even if you don't happen to have your phone with you at the moment. I haven't extensively tested these features yet, and as of this writing, the "Cloud texting" website isn't online yet, but I'll have comments for that in the full review.<br /><br />PRELIMINARY CONCLUSION<br /><br />My first day with the T-Mobile Sidekick 4G could be summarized as "generally pleased." It has satisfying hardware both on the internal specs and external design. It's well thought out, and has the potential to stand out from the pack.<br /><br />Over the next few days, I'll be giving it a more complete and intensive examination, including battery life testing, in depth feature explorations, and a full roundup of all the positives and negatives.<br /></div></span>Unknownnoreply@blogger.com0tag:blogger.com,1999:blog-5627826094576484572.post-59024060413050804832011-04-13T18:32:00.000-07:002011-04-13T19:38:32.776-07:00How to Make Windows 7 Fast<div style="text-align: justify;"><span style="font-size:100%;">This method is similar to previous versions of windows<br />One of the operating systems that a lot of users prefer to use worldwide is often the Windows OS from the Microsoft Corporation. Besides practical to use, Windows also sports an interesting GUI. In fact, with some high end VGA cards, the GUI can spoil users' eyes even more. However, the bad news is that most Windows versions - including Windows 7 - often have a common problem over time. They become slow and annoying to use. But fortunately, there are ways users can approach to make their Windows 7 faster. These approaches also apply to other versions of Windows.<br /><br />First of all, users need to check how much space is left free on their hard drive. If they do not seem to have enough free space, it is time to remove some installed programs. This can be done by clicking Start - Control Panel - Uninstall a program. Another option is to click Start and type appwiz.cpl.<br /><br />Cleaning up the hard drive is also a good thing to do. To carry it out, users simply need to click on the Start button and then navigate to All Programs, Accessories, System Tools and click Disk Cleanup. This will bring out a small window that checks for any possible files to delete and it will then display all the files in a list.<br /><br />Making changes to what services or programs Windows runs during startup is also another good idea to make Windows 7 faster. The System Configuration utility is what users will need in this case. They can launch it by clicking Start followed by typing msconfig. Here, users will first have to check the Startup section to see any programs that may turn out unnecessary to run during startup meaning they are safe to be deactivated. Then, users will also have to take a look at the Services section to find out what services they can deactivate without damaging their system.<br /><br />Last but not least, another effective method to make PC run faster is by cleaning the Windows registry. To do this, users can take advantage of a third party registry cleaner. Fortunately, users have loads of options to choose from when it comes to registry cleaners these days and most of them are often quite handy in cleaning the registry. The reason why users should clean the registry to make their system faster is because the registry gets messed up over time due to installation and removal of applications. Sometimes, removing applications does not remove the entries they have made in the registry. As a result, there are more items in it Windows has to check and this slows down the system.</div></span>Unknownnoreply@blogger.com0tag:blogger.com,1999:blog-5627826094576484572.post-53163217569587085302011-03-24T19:40:00.000-07:002011-04-13T19:40:47.961-07:00RIMM Disappoints On Revs, Guidance<div style="text-align: justify;"><span style="font-size:100%;">BlackBerry maker Research In Motion (RIMM: 64.0875 +1.9675 +3.17%) beat its fiscal 4Q EPS estimates by 2 cents per share, but missed slightly on quarterly revenues and offered guidance well below the current consensus. This has sent RIMM shares down nearly 10% in after-market trading.<br /><br />Research In Motion posted earnings of $1.78 per share in the quarter, topping the $1.76 estimate. But its $5.6 billion in revenues missed expectations for $5.64 billion. Far more damaging, however, was the company’s reported guidance for 1st quarter earnings. It posted an expected range of $1.47-1.55 per share, below the $1.65 consensus.<br /><br />Shares had been enjoying a moderate upsurge of 3.17% ahead of its earnings report after the bell Thursday, as regular trading on the Nasdaq in general was positive. And analysts had been exceedingly more upbeat about RIMM’s results in the past month — 5 upward revisions had been made in the past 30 days alone, 2 in the past week.<br /><br />And profit at Research In Motion grew an impressive 32% on strong BlackBerry sales. However, the average sale price dipped to $304 per device — down from $317 a quarter ago and $310 as of the 4th quarter 2010. Strong competition from other smartphone companies and uncertainties regarding Japan’s consumption and component supply due to its earthquake and Tsunami remain major concerns.<br /><br />Analysts will assess at what point RIMM stock may be oversold during the days to come. Currently, Research In Motion has a Zacks #3 Rank (Hold) and a corresponding longer-term Neutral recommendation.<br /><br />source :http://www.dailymarkets.com/stock/2011/03/24/rimm-disappoints-on-revs-guidance/<br /></div></span>Unknownnoreply@blogger.com0tag:blogger.com,1999:blog-5627826094576484572.post-2915048287320213322009-11-24T01:35:00.000-08:002009-11-25T01:06:26.676-08:00What is HSDPA?<div style="text-align: justify;"><span style="font-family: arial;">High-Speed Downlink Packet Access (HSDPA) is also known as High-Speed Downlink Protocol Access. HSDPA is a protocol for mobile telephones. It is a third-generation (3G) High-Speed Packet Access technology designed to speed up network capacity and data transmission rate of cellular phones.</span><br /><br /><span style="font-family: arial;">HSDPA is associated with various Universal Mobile Telecommunications System (UMTS) networks. These include the Global System for Mobile (GSM) Communications.</span><br /><br /><span style="font-family: arial;">Currently, HSDPA can support speeds ranging from 1.8 Mbps to 14.4 Mbps. While this is not very fast compared to various wired networks, it is a major milestone considering the speed available to cellular technology.</span><br /><br /><span style="font-family: arial;">Although HSDPA is mostly identified with its downlink speeds, it also has the ability to greatly expand transfer capacity. HSDPA networks can transfer up to 30 GB of data monthly and as much as 300 minutes of cellular television viewing and 1000 minutes of talk time.</span><br /><span style="font-family: arial;">Current HSDPA Technology</span><br /><br /><span style="font-family: arial;">At present, there are 100 HSDPA-capable networks operating in 54 countries worldwide. A large number of these networks offer 3.6 Mbps downlink speeds. However, more networks are beginning to switch to faster 7.2 Mbps downlink speeds. Only a number of networks presently offer a full 14.4 Mbps speed</span><br /><br /><span style="font-family: arial;">HSDPA competes with a rival format, the Evolution Data Optimized (EVDO) provided by Code Division Multiple Access (CDMA) cellular providers.</span><br /><span style="font-family: arial;">HSDPA Capable Devices</span><br /><br /><span style="font-family: arial;">Aside from having a cellular plan with a company offering HSDPA access, the only requirement for logging into the HSDPA network is having a cellular device capable of using the technology. A current total of 171 handset models and other mobile devices can use an HSDPA network. Some of these HSDPA capable devices are famous cellular brand and model names such as the Nokia N95, the Palm Treo 750, and the Motorola RAZR as well as many of its various versions.</span><br /><br /><span style="font-family: arial;">In addition to the various HSDPA handsets in the market, several HSDPA notebooks and laptops with access to the data network are available. Such products are offered by several major computer manufacturers including Dell, Acer, Hewlett-Packard, Siemens, Fujitsu, Panasonic, and Lenovo.</span><br /><span style="font-family: arial;">Future HSDPA Technology</span><br /><br /><span style="font-family: arial;">Although 14.4 Mbps is the current cap on downlink speed over HSDPA, networks are preparing to be upgraded with a new type of HSDPA system. Dubbed as HSPA Evolved, this new HSDPA technology is designed to increase download speeds to 42 Mbps upon release, with the possibility of reaching greater speed values in the future.</span></div>Unknownnoreply@blogger.com0tag:blogger.com,1999:blog-5627826094576484572.post-76090043971817373652009-10-22T20:33:00.000-07:002009-11-02T19:52:41.326-08:00Computer Network Security<div style="text-align: justify;" class="fullpost"><span style="font-family:arial;">Whether a business is large or small, computer network security is always a major concern. Networks are a series of interconnected computers. Connecting these systems yield some important benefits including the ability to share files or to share an Internet connection. The need to keep these systems secure has become a necessary fact of life in today's business world. Achieving business computer security involves keeping users who are not authorized to enter a system from gaining access. Equally important is the detection of intruders or other types of malicious use within the system. If intrusion is detected, a trained professional can find out how much damage has been done and take steps to repair this damage. Obviously, taking preventative measures before an attack can occur are a top priority for any organization. The risks to valuable information, not to mention the potential loss of business in the event of a successful attack, make the implementation of solid safety measures a mandatory step in building successful businesses.</span><br /><br /><span style="font-family:arial;">The fact that an outsider could gain control of another person's PC without that person knowing it is an unfortunate reality. Individuals who use their system for personal work and communication value their privacy. Business owners do as well, and all the more so since their livelihood depends on a well defended system. Once an intruder gains access to a system or network, they can gain control of the device, use it to hack into other systems, or examine confidential records. These hackers can also do malicious damage, reformat hard drives or make changes in important data. Many software programs work to provide business computer security, but even as these programs are developed, malevolent intruders look for ways to take advantage of any weaknesses. Businesses need to know that confidential information will only be available to staff and employees who need access and that access should be available whenever it is needed. Changes in this information should only be made by authorized staff. An efficient security system should make sure that these important needs are continually met. Other risks could include hard disk failure, or physical damage to a system.</span><br /><br /><span style="font-family:arial;">Achieving computer network security in the business world is generally best handled by an information technology professional or specialist in this area. In addition to confidentiality, integrity, and availability risks, there are any number of attacks that a business network faces. Other assaults could include attacks against Internet protocol as well as Internet protocol spoofing. In these attacks, an intruder impersonates a host or IP address that does not belong to them. Another method of harassment is the Internet protocol session hijacking. In an IP session hijacking, a hacker can see what a user is doing and take over control in anyway the hacker wishes. A major danger of this type of attack is that the user is generally not even aware that the intrusion has taken place. A skilled professional in computer network security will know how to prevent attacks like this. </span><br /><br /><span style="font-family:arial;">Another type of assault on business computer security could come in the form of a DoS, or denial of service attack. This intrusion basically consists of sending multiple requests that overload a system. For example, if the host system can only process six hundred requests per minute, the attacker might create a program that will send seven hundred requests per minute. Stopping these attacks while still maintaining the ability to process legitimate requests can be a challenge. Up to date protection software can go a long way toward preventing such intrusions. More destructive aggression against a system could come in one of these two categories, data diddling or data destruction. The data diddler presents a major threat to computer network security by fooling with important information and making malicious but undetected changes. Not only is the problem difficult to detect until after the damage has been done, but it can also be very difficult to trace and locate the perpetrator. Data destruction happens when a hacker gains access to a system and then randomly damages or deletes important information. Other threats could include back door attacks, e-mail spoofing, Trojan horse programs, and viruses. Having an efficient system of data backup is an important protective step.</span><br /><br /><span style="font-family:arial;">There are a number of precautionary measures that can be taken to insure computer network security. Anti-virus programs are a must and should be programmed to check for updates automatically and on a regular basis. Spyware and adware detectors are also vital tools that should not be ignored. These programs should also be updated on a regular basis to remain effective. A good firewall is an absolute necessity. Any programs that can be run from the Internet should be checked for viruses before they are installed or run. Extreme care should be taken in opening attachments to e-mails and all e-mails should be scanned for viruses. Important documents, files or e-mails should be protected by passwords. Frequent and extensive data back-up is crucial. Recovery plans in the event of a system crash should also be in place. Hackers can gain access to a system through a variety of ways including Internet connections or even by access to the actual device. Malicious attacks can come from the inside of an organization as well as from the outside. Whatever the source of attack, wise planning for business computer security will pay off in the long run.</span><br /></div>Unknownnoreply@blogger.comtag:blogger.com,1999:blog-5627826094576484572.post-87634320789196691462009-09-08T21:16:00.000-07:002009-11-02T19:52:51.283-08:00Speed up Mozilla Firefox<span style=";font-family:arial;font-size:100%;" >Speed up Mozilla Firefox </span><span style="font-size:100%;"><br /></span><span style=";font-family:arial;font-size:100%;" >3-30x Faster! </span><span style="font-size:100%;"><br /><br /></span><span style=";font-family:arial;font-size:100%;" >1. Type in the address bar of Mozilla Firefox, "about: config" </span><span style="font-size:100%;"><br /></span><span style=";font-family:arial;font-size:100%;" >Scroll down, find the following entries: </span><span style="font-size:100%;"><br /></span><span style=";font-family:arial;font-size:100%;" >network.http.pipelining </span><span style="font-size:100%;"><br /></span><span style=";font-family:arial;font-size:100%;" >network.http.proxy.pipelining </span><span style="font-size:100%;"><br /></span><span style=";font-family:arial;font-size:100%;" >network.http.pipelining.maxrequests </span><span style="font-size:100%;"><br /></span><span style=";font-family:arial;font-size:100%;" >Normally the browser requests to the web page one time. </span><span style="font-size:100%;"><br /></span><span style=";font-family:arial;font-size:100%;" >If you enable pipelining, the browser will request several times in a single moment, </span><span style="font-size:100%;"><br /></span><span style=";font-family:arial;font-size:100%;" >This will speed up page loading. </span><span style="font-size:100%;"><br /><br /></span><span style=";font-family:arial;font-size:100%;" >2. Fill in the following entries: </span><span style="font-size:100%;"><br /></span><span style=";font-family:arial;font-size:100%;" >Set "network.http.pipelining" to "true" </span><span style="font-size:100%;"><br /></span><span style=";font-family:arial;font-size:100%;" >Set "network.http.proxy.pipelining" to "true" </span><span style="font-size:100%;"><br /></span><span style=";font-family:arial;font-size:100%;" >Set "network.http.pipelining.maxrequests" to any number, 30 (for example). </span><span style="font-size:100%;"><br /></span><span style=";font-family:arial;font-size:100%;" >This will make the browser do 30 requests at a time. </span><span style="font-size:100%;"><br /><br /></span><span style=";font-family:arial;font-size:100%;" >3. Right-click </span><span style="font-size:100%;">anywhere inside the browser page</span><span style=";font-family:arial;font-size:100%;" >, and select New-> Integer. </span><span style="font-size:100%;"><br /></span><span style=";font-family:arial;font-size:100%;" >Give the name "nglayout.initialpaint.delay", and set its value to "0". </span><span style="font-size:100%;"><br /></span><span style=";font-family:arial;font-size:100%;" >Value = count the waiting time before your browser reacts to reply to the information. </span><span style="font-size:100%;"><br /></span><span style=";font-family:arial;font-size:100%;" >It would be more felt when using a broadband connection, loading pages can be 2-30x more </span><span style=";font-family:arial;font-size:100%;" >fast. </span><span style="font-size:100%;"><br /></span><span style=";font-family:arial;font-size:100%;" ><br />Try it .. </span><span style="color:#ff0000;"><div class="fullpost"></span><span style=";font-family:arial;font-size:100%;" ><div class="fullpost"> <div class="fullpost"><div class="fullpost"><div class="fullpost"><div class="fullpost"><div class="fullpost"><br /><br />step 1<br /><br /></div></div></div></div></div><a onblur="try {parent.deselectBloggerImageGracefully();} catch(e) {}" href="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEh_spWMhWdlp0c00IGv_eQXxbSNqEk0MUEFsgaN-lujtsP-Ki9ZTD4rzOSYXggOXF95Ix5KCUb61oDlshV8pMHsM8VckrJRK2qMklsFDSoeE8myhtw2GXhNoEG9fjWr6C0oTSFOwiOgPzw/s1600-h/laju2.jpg"><img id="BLOGGER_PHOTO_ID_5379352874935126290" style="margin: 0px auto 10px; display: block; width: 400px; cursor: pointer; height: 300px; text-align: center;" alt="" src="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEh_spWMhWdlp0c00IGv_eQXxbSNqEk0MUEFsgaN-lujtsP-Ki9ZTD4rzOSYXggOXF95Ix5KCUb61oDlshV8pMHsM8VckrJRK2qMklsFDSoeE8myhtw2GXhNoEG9fjWr6C0oTSFOwiOgPzw/s400/laju2.jpg" border="0" /></a><br />step 2<br /><br /><a onblur="try {parent.deselectBloggerImageGracefully();} catch(e) {}" href="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEg1K_aPVnMqXKUs9IVnrWGMxlyJ14K8DM0BVSswXgX1XiOnu0rS5Mg6G0krWsKrDB2jKs0QfS1_BOqCb135KrE-ytW7rjX14mB6c6Rgvl3NW_MJwJAMYwQg-BsP8BHu7F9ku8YM0eejgBI/s1600-h/laju3.jpg"><img id="BLOGGER_PHOTO_ID_5379353065789232130" style="margin: 0px auto 10px; display: block; width: 400px; cursor: pointer; height: 300px; text-align: center;" alt="" src="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEg1K_aPVnMqXKUs9IVnrWGMxlyJ14K8DM0BVSswXgX1XiOnu0rS5Mg6G0krWsKrDB2jKs0QfS1_BOqCb135KrE-ytW7rjX14mB6c6Rgvl3NW_MJwJAMYwQg-BsP8BHu7F9ku8YM0eejgBI/s400/laju3.jpg" border="0" /></a>step 3<br /><br /><a onblur="try {parent.deselectBloggerImageGracefully();} catch(e) {}" href="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEgQKICo7hIjHn3MZsRvS6BhO7LpzaxMCfgCV1L_je3rumLER6rSkJPpnUSZZhY1rT_icb2V8cGoeFLhO0lKFQ3yWET20aDxC8jLvISvfASty01lOTEeZgxhz-tZ8rNGxnEJ65fXQqV67x0/s1600-h/laju4.jpg"><img id="BLOGGER_PHOTO_ID_5379353284556716482" style="margin: 0px auto 10px; display: block; width: 400px; cursor: pointer; height: 300px; text-align: center;" alt="" src="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEgQKICo7hIjHn3MZsRvS6BhO7LpzaxMCfgCV1L_je3rumLER6rSkJPpnUSZZhY1rT_icb2V8cGoeFLhO0lKFQ3yWET20aDxC8jLvISvfASty01lOTEeZgxhz-tZ8rNGxnEJ65fXQqV67x0/s400/laju4.jpg" border="0" /></a>step 4<br /><br /><a onblur="try {parent.deselectBloggerImageGracefully();} catch(e) {}" href="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEj7kHtGZKwOWNU5LRSpQkhc8MAk408jxQADsHCePawEoDRlqW-dBCQoOikwi0e1o9k4EjYq7jzHsK1nyOep6GQfCL0mV4Cgmtc0K4toAifFikwI9H3yKKbrndjBHT2QNftGawenj9RGHsg/s1600-h/laju5.jpg"><img id="BLOGGER_PHOTO_ID_5379353435373584834" style="margin: 0px auto 10px; display: block; width: 400px; cursor: pointer; height: 300px; text-align: center;" alt="" src="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEj7kHtGZKwOWNU5LRSpQkhc8MAk408jxQADsHCePawEoDRlqW-dBCQoOikwi0e1o9k4EjYq7jzHsK1nyOep6GQfCL0mV4Cgmtc0K4toAifFikwI9H3yKKbrndjBHT2QNftGawenj9RGHsg/s400/laju5.jpg" border="0" /></a>step 5<br /><br /><a onblur="try {parent.deselectBloggerImageGracefully();} catch(e) {}" href="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEjn8_deORfldtB57uw93yeoB67QciG8CgkOa-utSlyXlivCLRu9EWuOhWyVJKePebjKS7bjmHQVCoLicbxWQZjgAq-inJNK_XRccvqk1WuEG2g-ct3J9B5asvgHbrKIE3odC8Bjyai0XLQ/s1600-h/laju6.jpg"><img id="BLOGGER_PHOTO_ID_5379353625734942738" style="margin: 0px auto 10px; display: block; width: 400px; cursor: pointer; height: 300px; text-align: center;" alt="" src="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEjn8_deORfldtB57uw93yeoB67QciG8CgkOa-utSlyXlivCLRu9EWuOhWyVJKePebjKS7bjmHQVCoLicbxWQZjgAq-inJNK_XRccvqk1WuEG2g-ct3J9B5asvgHbrKIE3odC8Bjyai0XLQ/s400/laju6.jpg" border="0" /></a>step 6<br /><br /><a onblur="try {parent.deselectBloggerImageGracefully();} catch(e) {}" href="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEgS8AqiBECc21uUc1E7kAbvYFyGnNDfccnAuWwKX8XeH3rOwvJ3ycypqmia1TPi18XlI5EyWOxeT0QkXxNcznFLbsoWOVkjfApoqvADchTfH5xvy74r6B_UkZtCHs0vKJd1N4RauEMv1j0/s1600-h/laju7.jpg"><img id="BLOGGER_PHOTO_ID_5379353799797158242" style="margin: 0px auto 10px; display: block; width: 400px; cursor: pointer; height: 300px; text-align: center;" alt="" src="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEgS8AqiBECc21uUc1E7kAbvYFyGnNDfccnAuWwKX8XeH3rOwvJ3ycypqmia1TPi18XlI5EyWOxeT0QkXxNcznFLbsoWOVkjfApoqvADchTfH5xvy74r6B_UkZtCHs0vKJd1N4RauEMv1j0/s400/laju7.jpg" border="0" /><span style="color:#ff0000;"></div></span></a> </div></span>Unknownnoreply@blogger.comtag:blogger.com,1999:blog-5627826094576484572.post-8550176137475863962009-08-09T21:58:00.000-07:002009-11-02T19:53:06.821-08:00Information Technology<p style="text-align: justify;font-family:arial;"><span style="font-weight: bold;">Information technology</span>, as defined by the Information Technology Association of America</p><p face="arial" style="text-align: justify;">(<a class="alnk" onclick="assignParam('navinfo','method4'+getLinkTextForCookie(this));" href="http://www.answers.com/topic/information-technology-association-of-america" target="_top" name="&lid=">ITAA</a>), is "the study, design, development, implementation, support or management of computer-based information systems, particularly software applications and computer hardware." Encompassing the computer and information systems industries, information technology is the capability to electronically input, process, store, output, transmit, and receive data and information, including text, graphics, sound, and video, as well as the ability to control machines of all kinds electronically.</p><p class="shw" style="text-align: justify;font-family:arial;"><span style="font-weight: bold;">Information technology</span> is comprised of computers, networks, satellite communications, robotics, <a class="alnk" onclick="assignParam('navinfo','method4'+getLinkTextForCookie(this));" href="http://www.answers.com/topic/videotex" target="_top" name="&lid=">videotext</a>, cable television, electronic mail ("e-mail"), electronic games, and automated office equipment. The information industry consists of all computer, communications, and electronics-related organizations, including hardware, software, and services. Completing tasks using information technology results in rapid processing and information mobility, as well as improved reliability and integrity of processed information.</p><p class="shw" face="arial" style="text-align: justify;">History of <span>Information Technology <div class="fullpost"> <div class="fullpost"><p face="arial" style="text-align: justify;">The term "<span>information technology</span>" evolved in the 1970s. Its basic concept, however, can be traced to the World War II alliance of the military and industry in the development of electronics, computers, and information theory. After the 1940s, the military remained the major source of research and development funding for the expansion of automation to replace <a class="alnk" onclick="assignParam('navinfo','method4'+getLinkTextForCookie(this));" href="http://www.answers.com/topic/manpower" target="_top" name="&lid=">manpower</a> with machine power.</p><p style="font-family: arial; text-align: justify;">Since the 1950s, four generations of computers have evolved. Each generation reflected a change to hardware of decreased size but increased capabilities to control computer operations. The first generation used vacuum tubes, the second used transistors, the third used integrated circuits, and the fourth used integrated circuits on a single computer chip. Advances in artificial intelligence that will minimize the need for complex programming characterize the fifth generation of computers, still in the experimental stage.</p><p style="font-family: arial; text-align: justify;">The first commercial computer was the <a class="alnk" onclick="assignParam('navinfo','method4'+getLinkTextForCookie(this));" href="http://www.answers.com/topic/univac-i" target="_top" name="&lid=">UNIVAC I</a>, developed by John Eckert and John W. Mauchly in 1951. It was used by the Census Bureau to predict the outcome of the 1952 presidential election. For the next twenty-five years, mainframe computers were used in large corporations to do calculations and manipulate large amounts of information stored in databases. Supercomputers were used in science and engineering, for designing aircraft and nuclear reactors, and for predicting worldwide weather patterns. Minicomputers came on to the scene in the early 1980s in small businesses, manufacturing plants, and factories.</p><p style="font-family: arial; text-align: justify;">In 1975, the Massachusetts Institute of Technology developed microcomputers. In 1976, Tandy Corporation's first <a class="alnk" onclick="assignParam('navinfo','method4'+getLinkTextForCookie(this));" href="http://www.answers.com/topic/radioshack" target="_top" name="&lid=">Radio Shack</a> microcomputer followed; the Apple microcomputer was introduced in 1977. The market for microcomputers increased dramatically when IBM introduced the first personal computer in the fall of 1981. Because of dramatic improvements in computer components and manufacturing, personal computers today do more than the largest computers of the mid-1960s at about a thousandth of the cost.</p><p style="font-family: arial; text-align: justify;">Computers today are divided into four categories by size, cost, and processing ability. They are <a class="alnk" onclick="assignParam('navinfo','method4'+getLinkTextForCookie(this));" href="http://www.answers.com/topic/supercomputer" target="_top" name="&lid=">supercomputer</a>, mainframe, <a class="alnk" onclick="assignParam('navinfo','method4'+getLinkTextForCookie(this));" href="http://www.answers.com/topic/minicomputer" target="_top" name="&lid=">minicomputer</a>, and <a class="alnk" onclick="assignParam('navinfo','method4'+getLinkTextForCookie(this));" href="http://www.answers.com/topic/microcomputer" target="_top" name="&lid=">microcomputer</a>, more commonly known as a personal computer. Personal computer categories include desktop, network, laptop, and handheld.</p><p class="shw" face="arial" style="text-align: justify;"><span>Information Technology's </span>Role Today</p><p style="font-family: arial; text-align: justify;">Every day, people use computers in new ways. Computers are increasingly affordable; they continue to be more powerful as information-processing tools as well as easier to use.</p><p style="font-family: arial; text-align: justify;">Computers in Business One of the first and largest applications of computers is keeping and managing business and financial records. Most large companies keep the employment records of all their workers in large databases that are managed by computer programs. Similar programs and databases are used in such business functions as billing customers; tracking payments received and payments to be made; and tracking supplies needed and items produced, stored, shipped, and sold. In fact, practically all the information companies need to do business involves the use of computers and information technology.</p><p style="font-family: arial; text-align: justify;">On a smaller scale, many businesses have replaced cash registers with point-of-sale (POS) terminals. These POS terminals not only print a sales <a class="alnk" onclick="assignParam('navinfo','method4'+getLinkTextForCookie(this));" href="http://www.answers.com/topic/receipt" target="_top" name="&lid=">receipt</a> for the customer but also send information to a computer database when each item is sold to maintain an inventory of items on hand and items to be ordered. Computers have also become very important in modern factories. Computer-controlled robots now do tasks that are hot, heavy, or hazardous. Robots are also used to do routine, <a class="alnk" onclick="assignParam('navinfo','method4'+getLinkTextForCookie(this));" href="http://www.answers.com/topic/repetitive" target="_top" name="&lid=">repetitive</a> tasks in which <a class="alnk" onclick="assignParam('navinfo','method4'+getLinkTextForCookie(this));" href="http://www.answers.com/topic/boredom" target="_top" name="&lid=">boredom</a> or <a class="alnk" onclick="assignParam('navinfo','method4'+getLinkTextForCookie(this));" href="http://www.answers.com/topic/fatigue" target="_top" name="&lid=">fatigue</a> can lead to poor quality work.</p><p style="font-family: arial; text-align: justify;">Computers in Medicine Information technology plays an important role in medicine. For example, a scanner takes a series of pictures of the body by means of computerized <a class="alnk" onclick="assignParam('navinfo','method4'+getLinkTextForCookie(this));" href="http://www.answers.com/topic/axial" target="_top" name="&lid=">axial</a> tomography (CAT) or <a class="alnk" onclick="assignParam('navinfo','method4'+getLinkTextForCookie(this));" href="http://www.answers.com/topic/magnetic-resonance-imaging" target="_top" name="&lid=">magnetic resonance imaging</a> (MRI). A computer then combines the pictures to produce detailed three-dimensional images of the body's organs. In addition, the MRI produces images that show changes in body chemistry and blood flow.</p><p style="font-family: arial; text-align: justify;">Computers in Science and Engineering Using supercomputers, meteorologists predict future weather by using a combination of observations of weather conditions from many sources, a mathematical representation of the behavior of the atmosphere, and geographic data.</p><p style="font-family: arial; text-align: justify;">Computer-aided design and computer-aided manufacturing programs, often called CAD/CAM, have led to improved products in many fields, especially where designs tend to be very detailed. Computer programs make it possible for engineers to analyze designs of complex structures such as power plants and space stations.</p><p style="font-family: arial; text-align: justify;">Integrated Information Systems With today's sophisticated hardware, software, and communications technologies, it is often difficult to classify a system as belonging uniquely to one specific application program. Organizations increasingly are consolidating their information needs into a single, integrated information system. One example is SAP, a German software package that runs on mainframe computers and provides an enterprise-wide solution for information technologies. It is a powerful database that enables companies to organize all their data into a single database, then choose only the program modules or tables they want. The freestanding modules are customized to fit each customer's needs.</p><p class="shw" style="font-family: arial; text-align: justify;">Software</p><p style="font-family: arial; text-align: justify;">Computer software consists of the programs, or lists of instructions, that control the operation of a computer. Application software can be used for the following purposes:</p><ul style="font-family: arial; text-align: justify;"><li>As a productivity/business tool</li><li>To assist with graphics and multimedia projects</li><li>To support household activities, for personal business, or for education</li><li>To facilitate communications</li></ul><p style="font-family: arial; text-align: justify;">Productivity Software Productivity software is designed to make people more effective and efficient when performing daily activities. It includes applications such as word processing, spreadsheets, databases, presentation graphics, personal information management, graphics and multimedia, communications, and other related types of software. <i>Word-processing</i> software is used to create documents such as letters, memos, reports, mailing labels, and newsletters. This software is used to create attractive and professional-looking documents that are stored electronically, allowing them to be retrieved and revised. The software provides tools to correct spelling and grammatical mistakes, permits copying and moving text without rekeying, and provides tools to enhance the format of documents. Electronic <i>spreadsheet</i> software is used in business environments to perform numeric calculations rapidly and accurately. Data are keyed into rows and columns on a <a class="alnk" onclick="assignParam('navinfo','method4'+getLinkTextForCookie(this));" href="http://www.answers.com/topic/work-sheet" target="_top" name="&lid=">worksheet</a>, and formulas and functions are used to make fast and accurate calculations. Spreadsheets are used for "what-if" analyses and for creating charts based on information in a worksheet. A <i>database</i> is a collection of data organized in a manner that allows access, retrieval, and use of that data. A database management system (DBMS) is used to create a computerized database; add, change, and delete data; sort and retrieve data from the database; and create forms and reports using the data in the database. <i>Presentation graphics software</i> is used to create presentations, which can include clip-art images, pictures, video clips, and audio clips as well as text. A <i>personal information manager</i> is a software application that includes an appointment calendar, address book, and <a class="alnk" onclick="assignParam('navinfo','method4'+getLinkTextForCookie(this));" href="http://www.answers.com/topic/notepad" target="_top" name="&lid=">notepad</a> to help organize personal information such as appointments and task lists. Engineers, architects, desktop publishers, and graphic artists often use <i>graphics and multimedia software</i> such as computer-aided design, desktop publishing, video and audio entertainment, and Web page authoring. Software for <i>communications</i> includes <a class="alnk" onclick="assignParam('navinfo','method4'+getLinkTextForCookie(this));" href="http://www.answers.com/topic/groupware" target="_top" name="&lid=">groupware</a>, e-mail, and Web browsers.</p><p class="shw" style="font-family: arial; text-align: justify;">Hardware</p><p style="font-family: arial; text-align: justify;">Information processing involves four phases: input, process, output, and storage. Each of these phases and the associated devices are discussed below.</p><p style="font-family: arial; text-align: justify;"><i>Input devices</i>: Input devices include the keyboard, pointing devices, scanners and reading devices, digital cameras, audio and video input devices, and input devices for physically challenged users. Input devices are used to capture data at the earliest possible point in the <a class="alnk" onclick="assignParam('navinfo','method4'+getLinkTextForCookie(this));" href="http://www.answers.com/topic/workflow" target="_top" name="&lid=">workflow</a>, so that the data are accurate and readily available for processing.</p><p style="font-family: arial; text-align: justify;"><i>Processing</i>: After data are captured, they are processed. When data are processed, they are transformed from raw facts into <a class="alnk" onclick="assignParam('navinfo','method4'+getLinkTextForCookie(this));" href="http://www.answers.com/topic/meaningful" target="_top" name="&lid=">meaningful</a> information. A variety of processes may be performed on the data, such as adding, subtracting, dividing, <a class="alnk" onclick="assignParam('navinfo','method4'+getLinkTextForCookie(this));" href="http://www.answers.com/topic/multiply" target="_top" name="&lid=">multiplying</a>, sorting, organizing, formatting, comparing, and graphing. After processing, information is output, as a printed report, for example, or stored as files.</p><p style="font-family: arial; text-align: justify;"><i>Output devices</i>: Four common types of output are text, graphics, audio, and video. Once information has been processed, it can be listened to through speakers or a <a class="alnk" onclick="assignParam('navinfo','method4'+getLinkTextForCookie(this));" href="http://www.answers.com/topic/headset" target="_top" name="&lid=">headset</a>, printed onto paper, or displayed on a monitor. An output device is any computer component capable of conveying information to a user. Commonly used output devices include display devices, printers, speakers, headsets, data projectors, <a class="alnk" onclick="assignParam('navinfo','method4'+getLinkTextForCookie(this));" href="http://www.answers.com/topic/fax" target="_top" name="&lid=">fax</a> machines, and multifunction devices. A multifunction device is a single piece of equipment that looks like a copy machine but provides the functionality of a printer, scanner, copy machine, and perhaps a fax machine.</p><p style="font-family: arial; text-align: justify;"><i>Storage devices</i>: Storage devices retain items such as data, instructions, and information for retrieval and future use. They include floppy disks or diskettes, hard disks, compact discs (both read-only and disc-recordable), tapes, PC cards, Smart Cards, microfilm, and <a class="alnk" onclick="assignParam('navinfo','method4'+getLinkTextForCookie(this));" href="http://www.answers.com/topic/microfiche" target="_top" name="&lid=">microfiche</a>.</p><p class="shw" style="font-family: arial; text-align: justify;">Information and Data Processing</p><p style="font-family: arial; text-align: justify;">Data processing is the input, <a class="alnk" onclick="assignParam('navinfo','method4'+getLinkTextForCookie(this));" href="http://www.answers.com/topic/verification" target="_top" name="&lid=">verification</a>, organization, storage, retrieval, transformation, and extraction of information from data. The term is usually associated with commercial applications such as inventory control or <a class="alnk" onclick="assignParam('navinfo','method4'+getLinkTextForCookie(this));" href="http://www.answers.com/topic/payroll" target="_top" name="&lid=">payroll</a>. An information system refers to business applications of computers and consists of the databases, application programs, and manual and machine procedures and computer systems that process data. Databases store the master files of the business and its transaction files. Application programs provide the data entry, updating, and query and report processing. Manual procedures document the workflow, showing how the data are obtained for input and how the system's output is distributed. Machine procedures instruct the computers how to perform batch-processing activities, in which the output of one program is automatically fed into another program. Daily processing is the interactive, real-time processing of transactions. Batch-processing programs are run at the end of the day (or some other period) to update the master files that have not been updated since the last cycle. Reports are printed for the cycle's activities. Periodic processing of an information system involves updating of the master files— adding, deleting, and changing the information about customers, employees, vendors, and products.</p><p class="shw" style="font-family: arial; text-align: justify;">Bibliography</p><p style="font-family: arial; text-align: justify;">Cannings, Terence, and Finkel, Leroy. (1993). <i>The Technology Age Classroom</i>. Wilsonville, OR: Franklin, Beedle, & Associates.</p><p style="font-family: arial; text-align: justify;"><i>New Book of Knowledge, The;</i> (1994). <a class="alnk" onclick="assignParam('navinfo','method4'+getLinkTextForCookie(this));" href="http://www.answers.com/topic/danbury-connecticut" target="_top" name="&lid=">Danbury</a>, CT: Grolier.</p><p style="font-family: arial; text-align: justify;">Saettler, Paul. (1990). <i>The Evolution of American Educational Technology</i>. Englewood, CO: Libraries Unlimited.</p><p style="font-family: arial; text-align: justify;">Shelly, Gary, Cashman, Thomas, Vermaat, Misty, and Walker, Tim. (1999). <i>Discovering Computers 2000: Concepts for a Connected World</i>. Cambridge, MA: Course Technology.</p><p style="font-family: arial; text-align: justify;">Swanson, Marie, Reding, Elizabeth Eisner, Beskeen, David W., and Johnson, Steven M. (1997). <i>Microsoft Office 97 Professional Edition—Illustrated, A First Course</i>. Cambridge, MA: Course Technology.</p><p style="font-family: arial; text-align: justify;">Webster, Frank, and Robins, Kevin. (1986). <i>Information Technology—A Luddite Analysis</i>. Norwood, NJ: Ablex.</p><p style="font-family: arial; text-align: justify;"><i>[Article by: LINDA J. AUSTIN; DEBBIE HUGHES] </i></p></div></div></span></p><div class="fullpost"><div class="fullpost"><i><br /></i><p></p></div><p></p></div><p></p><p></p><i></i><p></p>Unknownnoreply@blogger.comtag:blogger.com,1999:blog-5627826094576484572.post-44077463967311086512009-07-30T20:11:00.000-07:002009-07-30T20:24:36.267-07:00Wireless<div style="text-align: justify;"><span style="font-family:arial;">DEFINITION - Wireless is a term used to describe telecommunications in which electromagnetic waves (rather than some form of wire) carrythe signal over part or all of the communication path. Some monitoring devices, such as intrusionalarms, employ acoustic waves at frequencies above the range of human hearing; these are also sometimes classified as wireless.</span><br /><br /><span style="font-family:arial;">The first wireless transmitters went on the air in the early 20th centuryusing radiotelegraphy (Morse code). Later, as modulation made it possible to transmit voicesand music via wireless, the medium came to be called "radio." With theadvent of television, fax, data communication, andthe effective use of a larger portion of the spectrum, the term "wireless" hasbeen resurrected.</span><br /><br /><span style="font-family:arial;">Common examples of wireless equipment in use today include:</span><br /><br /><ul><li><span style="font-family:arial;"> </span><span style="font-family:arial;">Cellular phones and pagers -- provide connectivity for portable and mobile applications, both</span><span style="font-family:arial;"> personal and business</span><br /></li></ul><ul><li><span style="font-family:arial;"> </span><span style="font-family:arial;">Global Positioning System (GPS) -- allows drivers of cars and trucks, captains of boats and</span><span style="font-family:arial;"> ships, and pilots of aircraft to ascertain their location anywhere on earth</span><br /></li></ul><ul><li><span style="font-family:arial;"> </span><span style="font-family:arial;">Cordless computer peripherals -- the cordless mouse is a common example; keyboards and</span><span style="font-family:arial;"> printers can also be linked to a computer via wireless</span><br /></li></ul><ul><li><span style="font-family:arial;"> </span><span style="font-family:arial;">Cordless telephone sets -- these are limited-range devices, not to be confused with cell phones</span></li></ul><ul><li><span style="font-family:arial;"> </span><span style="font-family:arial;">Home-entertainment-system control boxes -- the VCR control and the TV channel control are</span> the most common examples; some hi-fi sound systems and FM broadcast receivers also use<span style="font-family:arial;"> this technology</span><br /></li></ul><ul><li><span style="font-family:arial;"> </span><span style="font-family:arial;">Remote garage-door openers -- one of the oldest wireless devices in common use by</span><span style="font-family:arial;"> consumers; usually operates at radio frequencies</span><br /></li></ul><ul><li><span style="font-family:arial;"> </span><span style="font-family:arial;">Two-way radios -- this includes Amateur and Citizens Radio Service, as well as business,</span><span style="font-family:arial;"> marine, and military communications</span><br /></li></ul><ul><li><span style="font-family:arial;"> </span><span style="font-family:arial;">Baby monitors -- these devices are simplified radio transmitter/receiver units with limited range</span></li></ul><ul><li><span style="font-family:arial;"> </span><span style="font-family:arial;">Satellite television -- allows viewers in almost any location to select from hundreds of channels</span></li></ul><ul><li><span style="font-family:arial;"> </span><span style="font-family:arial;">Wireless LANs or local area networks -- provide flexibility and reliability for business computer</span><span style="font-family:arial;"> users</span><br /></li></ul><br /><span style="font-family:arial;">Wireless technology is rapidly evolving, and is playing an increasingrole in the lives of people throughout the world. In addition, ever-larger numbersof people are relying on the technology directly or indirectly. (It has beensuggested that wireless is overused in some situations, creating a social nuisance.) More specialized and exotic examples of wireless communications and control include:</span><br /><br /><ul><li><span style="font-family:arial;"> </span><span style="font-family:arial;">Global System for Mobile Communication (GSM) -- a digital mobile telephone system used in</span><span style="font-family:arial;"> Europe and other parts of the world; the de facto wireless telephone standard in Europe</span><br /></li></ul><ul><li><span style="font-family:arial;"> </span><span style="font-family:arial;">General Packet Radio Service (GPRS) -- a packet-based wireless communication service that</span><span style="font-family:arial;"> provides continuous connection to the Internet for mobile phone and computer users</span><br /></li></ul><ul><li><span style="font-family:arial;"> </span><span style="font-family:arial;">Enhanced Data GSM Environment (EDGE) -- a faster version of the Global System for Mobile</span></li></ul><ul><li><span style="font-family:arial;"> (GSM) wireless service</span><span style="font-family:arial;">Universal Mobile Telecommunications System (UMTS) -- a broadband, packet-based system </span><span style="font-family:arial;">offering a consistent set of services to mobile computer and phone users no matter where they</span><span style="font-family:arial;"> are located in the world</span></li></ul><ul><li><span style="font-family:arial;"> </span><span style="font-family:arial;">Wireless Application Protocol (WAP) -- a set of communication protocols to standardize the</span> way that wireless devices, such as cellular telephones and radio transceivers, can be used for<span style="font-family:arial;"> Internet access</span><br /></li></ul><ul><li><span style="font-family:arial;"> </span><span style="font-family:arial;">I-Mode -- the world's first "smart phone" for Web browsing, first introduced in Japan; provides</span><span style="font-family:arial;"> color and video over telephone sets</span><br /></li></ul><span style="font-family:arial;">Wireless can be divided into:</span><br /><ul><li><span style="font-family:arial;"> fixed wireless -- the operation of wireless devices or systems in homes and offices, and in particular, equipment connected to the Internet via specialized modems</span></li></ul><ul><li><span style="font-family:arial;"> Mobile wireless -- the use of wireless devices or systems aboard motorized, moving vehicles; examples include the automotive cell phone and PCS (personal communications services)</span></li></ul><ul><li><span style="font-family:arial;"> Portable wireless -- the operation of autonomous, battery-powered wireless devices or systems outside the office, home, or vehicle; examples include handheld cell phones and PCS units</span></li></ul><ul><li><span style="font-family:arial;"> IR wireless -- the use of devices that convey data via IR (infrared) radiation; employed in certain limited-range communications and control systems </span></li></ul></div>Unknownnoreply@blogger.com0tag:blogger.com,1999:blog-5627826094576484572.post-85154607674787226032009-04-29T18:20:00.000-07:002009-05-18T18:57:05.752-07:00GSM Technology<div style="text-align: justify;"><strong style="font-family: arial;">What is GSM?</strong><br /><span style="font-family:arial;"> GSM (Global System for Mobile communications) is an open, digital cellular technology used for transmitting mobile voice and data services. </span> </div><p face="arial" style="text-align: justify;"> <strong>What does GSM offer?</strong><br />GSM supports voice calls and data transfer speeds of up to 9.6 kbit/s, together with the transmission of SMS (Short Message Service). </p><div style="text-align: justify;"> </div><p style="font-family: arial; text-align: justify;"> GSM operates in the 900MHz and 1.8GHz bands in Europe and the 1.9GHz and 850MHz bands in the US. The 850MHz band is also used for GSM and 3G in Australia, Canada and many South American countries. By having harmonised spectrum across most of the globe, GSM’s international roaming capability allows users to access the same services when travelling abroad as at home. This gives consumers seamless and same number connectivity in more than 218 countries. </p><div style="text-align: justify;"> </div><p style="font-family: arial; text-align: justify;"> Terrestrial GSM networks now cover more than 80% of the world’s population. GSM satellite roaming has also extended service access to areas where terrestrial coverage is not available.<span style="font-weight: normal;font-size:130%;" ><br /></span></p><p style="text-align: left; font-weight: bold; font-family: arial;font-family:arial;"><span style="font-weight: normal;font-size:130%;" >GSM Roaming</span></p><h1 face="arial" style="text-align: justify; font-weight: bold;"> </h1><div style="text-align: justify;"> </div><p style="font-family: arial; text-align: justify;"> Roaming is defined as the ability for a cellular customer to automatically make and receive voice calls, send and receive data, or access other services when travelling outside the geographical coverage area of the home network, by means of using a visited network. </p><div style="text-align: justify;"> </div><p style="font-family: arial; text-align: justify;"> Roaming is technically supported by mobility management, authentication and billing procedures. Establishing roaming between network operators is based on - and the commercial terms are contained in - Roaming Agreements. </p><div style="text-align: justify;"> </div><p style="font-family: arial; text-align: justify;"> If the visited network is in the same country as the home network, this is known as National Roaming. If the visited network is outside the home country, this is known as International Roaming (the term Global Roaming has also been used). </p><div style="text-align: justify;"> </div><p style="font-family: arial; text-align: justify;"> If the visited network operates on a different technical standard than the home network, this is known as Inter-standard roaming. </p><div style="text-align: justify;"> </div><p style="font-family: arial; text-align: justify;"> GSM Roaming, which involves roaming between GSM networks, offers the convenience of a single number, a single bill and a single phone with worldwide access to over 219 countries. The convenience of GSM Roaming has been a key driver behind the global success of the GSM Platform. </p><div style="text-align: justify;"> </div><p style="font-family: arial; text-align: justify;"> GSM Coverage Maps is a unique resource containing information supplied and approved by the members of the GSM Association. </p><div style="text-align: justify;"> </div><p style="font-family: arial; text-align: justify;"> Network, Services and Roaming information are continually updated to reflect the evolving situation worldwide. Interactive coverage maps, updated quarterly, allow you to navigate to see where exactly you can use your phone. </p><div style="text-align: justify;"> </div><p style="font-family: arial; text-align: justify;"> These definitions are provided simply to help industry discussion and do not indicate the scope of activities within the GSM Association. </p><p style="font-family: arial;"><br /></p>Unknownnoreply@blogger.com0tag:blogger.com,1999:blog-5627826094576484572.post-56181806148066753002009-04-29T18:18:00.000-07:002009-06-05T00:59:39.541-07:003G Technology<div style="text-align: justify;"><span style="font-family:arial;"></span><span style="font-family:arial;">3G is one of the latest technologies to be incorporated into mobile devices today. With 3G people are able to gain access to data and information at almost anytime and from any place.</span><br /><br /><span style="font-weight: bold;font-family:arial;" >What is 3G?</span><br /><br /><span style="font-family:arial;">3G (Third Generation) is also known as UMTS (Universal Mobile Telecommunications System) and is said to be the next generation of mobile network. 3G is described by Cellular (2004) as being a generic name for a set of mobile technologies which comprise a host of high-tech infrastructure networks, handsets, base stations, switches and other equipment. This technology enables cell phones to offer high-speed Internet access, data, video and CD-quality music services.</span><br /><br /><span style="font-weight: bold;font-family:arial;" >The introduction of 3G</span><br /><br /><span style="font-family:arial;">3G cellular phones were first launched in Japan in October 2001 and were introduced into South Africa in December 2004. This phone was designed so users would be able to surf the Internet, view pictures of the people they are talking to, watch movies and listen to music on their handsets (BBC News, 2001).</span><br /><br /><span style="font-weight: bold;font-family:arial;" >The difference between 3G and GPRS</span><br /><br /><span style="font-family:arial;">GPRS and 3G serve similar functions but 3G data services are the next step up from GPRS (Vodacom, 2004). The main difference between these two technologies is that 3G is able to achieve significantly faster data transfer rates and this enables one to work faster. 3G offers speeds of up to 384 kilobits per second – that is up to 7 times faster than a standard dial-up connection (Orange, 2005). For more information on GPRS websites see our GPRS article.</span><br /><br /><span style="font-weight: bold;font-family:arial;" >What are the benefits of 3G?</span><br /><br /><span style="font-family:arial;">With 3G you can do everything you do now, but you can do it much better, a lot faster and from almost anywhere! Some of the main advantages are that 3G allows for higher call volumes and supports multimedia data applications such as video and photography (3G Newsroom.com, n.d).</span><br /><br /><span style="font-weight: bold;font-family:arial;" >The effects of 3G on society</span><br /><br /><span style="font-family:arial;">Some of the latest features which have been brought about by this technology are mentioned by Orange (2005) and include:</span><br /><ul style="font-weight: bold;"><li><span style="font-family:arial;">Video calling</span></li></ul><div style="text-align: justify;"><span style="font-family:arial;"> With 3G you can now actually see the person on the other side! As long as both people have</span><span style="font-family: arial;font-family:arial;" > a 3G phone you no longer have to imagine what they look like and you can see them</span><span style="font-family: arial;font-family:arial;" > face-to-face via your cell phone’s screen.</span><br /></div><ul style="font-weight: bold;"><li><span style="font-family:arial;">Obtaining information and news</span></li></ul><span style="font-family:arial;"> With 3G technology it is possible to access any site on the Internet by using your phone as a modem with your laptop. You can use your favourite search engines to find information on the weather, the daily news, stocks and shares, or practically any other information you require to ensure that you are continually on top of things.</span><br /><ul style="font-weight: bold;"><li><span style="font-family:arial;">E-mail</span></li></ul><span style="font-family:arial;"> Should you have left your office and forgotten to send an important e-mail, you are now able to quickly and efficiently perform this function directly by using your cell phone. Alternatively, you can use your cell phone as a modem to be connected to your laptop or PDA (Personal<br /> Digital Assistant).</span><br /><ul style="font-weight: bold;"><li><span style="font-family:arial;">Games</span></li></ul><span style="font-family:arial;"> Since the invention of cell phones, games have always formed a part of mobile devices. As technology has developed, the games we are able to engage in have become far more interactive, exciting and entertaining. For those who play games over their mobile devices for recreation purposes or for those who simply play to pass the time, 3G now makes it possible to download these games at anytime and from almost anywhere.</span><span style="font-family:arial;"><br /></span><ul><li><span style="font-weight: bold;font-family:arial;" > Film</span><span style="font-family:arial;"><span style="font-weight: bold;"> </span> </span></li></ul><span style="font-family:arial;"> The speed and quality of 3G really contributes to enhancing the quality of film over mobile devices. One is now able to view film trailers, reviews, and interviews, download ring tones, wall papers and enter competitions all by means of your cell phone.</span><br /><ul><li><span style="font-family:arial;"><span style="font-weight: bold;">Sport</span></span></li></ul><span style="font-family:arial;"> With the incredible sound and video quality of your 3G phone you can view highlights from your favourite matches and you’ll always have access to the latest scores.</span><br /><ul><li><span style="font-family:arial;"><span style="font-weight: bold;">Music</span></span></li></ul><span style="font-family:arial;"> It's now possible for you to download songs, music videos and interviews. You can even compose your own ring tone through your cell phone if you wish!</span><br /><br /><span style="font-weight: bold;font-family:arial;" >3G and its impact on websites</span><br /><br /><span style="font-family:arial;">The importance of having a web site in today’s world is evident. Some have even gone so far as to say that if your company does not have a web site, you do not exist! With the introduction of 3G technology, this statement will probably become more and more true as people from across the globe will soon be able to access the Internet at almost any time and from almost any place.</span><br /><br /><span style="font-weight: bold;font-family:arial;" >How are 3G services charged?</span><br /><br /><span style="font-family:arial;">Users are charged on how much data they transmit and not on how much time they are connected to the network. This is because with 3G you are constantly online and only pay for the information you receive (3G Newsroom.com, n.d).</span><br /><br /><span style="font-weight: bold;font-family:arial;" >The future of 3G</span><br /><br /><span style="font-family:arial;">A great deal of potential exists for new applications in the future as 3G packet based networks will allow users to be on line all the time. The capabilities of wireless networks in terms of bandwidth must still, however, be improved upon (3GNewsroom.com, n.d.).</span><br /><br /><span style="font-weight: bold;font-family:arial;" >Conclusion</span><br /><br /><span style="font-family:arial;">3G is an exciting new technology that is being incorporated into mobile devices across the globe. Users are now able to make person-to-person calls, download data and do a variety of other tasks they never imagined possible all via their 3G cell phones.</span><br /><br /><span style="font-weight: bold;font-family:arial;" >References</span><br /><br /><span style="font-family:arial;"> * BBC News. 2001. First 3G mobiles launched in Japan.</span><br /><span style="font-family:arial;"> Available from: http://news.bbc.co.uk/1/hi/business/1572372.stm</span><br /><span style="font-family:arial;"> * Cellular. 2004. Third Generation Mobile Technology.</span><br /><span style="font-family:arial;"> Available from: http://www.cellular.co.za/technologies/3g/3g.htm#3G%20Outline</span><br /><span style="font-family:arial;"> * 3GNewsroom.com. Not dated. 3G Frequently Asked Questions.</span><br /><span style="font-family:arial;"> Available from: http://www.3gnewsroom.com/html/about_3g/faq_3g.shtml</span><br /><span style="font-family:arial;"> * Orange. 2005. Types of connection.</span><br /><span style="font-family:arial;"> Available from: http://www.orange.co.uk/business/corporate/office/moc/ohsd_gprs_3g.html</span><br /><span style="font-family:arial;"> * Orange. 2005. Experience 3G.</span><br /><span style="font-family:arial;"> Available from: http://www.orange.co.uk/3g/?flash=true</span><br /></div>Unknownnoreply@blogger.com0tag:blogger.com,1999:blog-5627826094576484572.post-22158203872140746502009-04-29T18:15:00.000-07:002009-05-18T19:06:41.055-07:00CDMA Technology<div style="text-align: justify;"><span style="font-family: arial;font-size:130%;" >CDMA (Code Division Multiple Access)</span><br /><br /><span style="font-family: arial;">Stands for "Code Division Multiple Access." CDMA is a wireless transmission technology that was developed during World War II by the English allies to avoid having their transmissions jammed. After the war ended, Qualcomm patented the technology and made it commercially available as a digital cellular technology. Now CDMA is a popular communications method used by many cell phone companies.</span><br /> <br /><span style="font-family: arial;"> Unlike the GSM and TDMA technologies, CDMA transmits over the entire frequency range available. It does not assign a specific frequency to each user on the communications network. This method, called multiplexing, is what made the transmissions difficult to jam during World War II. Because CDMA does not limit each user's frequency range, there is more </span><span style="font-family: arial;">bandwidth</span> available. This allows more users to communicate on the same network at one time than if each user was allotted a specific frequency range.<br /> <br /><span style="font-family: arial;"> Because CDMA is a </span><span style="font-family: arial;">digital</span><span style="font-family: arial;"> technology, analog audio signals must be </span><span style="font-family: arial;">digitized</span><span style="font-family: arial;"> before being transmitted on the network. CDMA is used by 2G and 3G wireless communications and typically operates in the frequency range of 800 MHz to 1.9 GHz.</span></div>Unknownnoreply@blogger.com0tag:blogger.com,1999:blog-5627826094576484572.post-12835051842290106422009-04-15T23:35:00.000-07:002009-06-04T02:32:23.825-07:00150 Tips and tricks basic Windows<w:zoom></w:zoom><div style="text-align: justify;font-family:arial;"><span style="font-size:100%;">After installing Windows and other applications that are required in the computer, there are several things you should do. Of them is to do some things to speed up and simplify the performance of the computer. For example, set the computer to restart more quickly, or display the hidden menu, use the shortcut for faster access and so forth.<br /></span></div><w:trackmoves><w:trackformatting><w:punctuationkerning><w:validateagainstschemas><div style="text-align: justify;font-family:arial;"><span style="font-size:100%;"><w:saveifxmlinvalid></w:saveifxmlinvalid></span></div><w:donotpromoteqf><w:compatibility><w:breakwrappedtables><w:snaptogridincell><w:wraptextwithpunct><w:useasianbreakrules><w:dontgrowautofit><w:splitpgbreakandparamark><w:dontvertaligncellwithsp><w:dontbreakconstrainedforcedtables><w:dontvertalignintxbx><w:word11kerningpairs><div style="text-align: justify;font-family:arial;"><span style="font-size:100%;"><w:browserlevel></w:browserlevel></span> </div><m:mathpr><div face="arial" style="text-align: justify; font-family: arial;"> </div><m:mathfont val="Cambria Math"><div face="arial" style="text-align: justify;"> </div><m:brkbin val="before"><div face="arial" style="text-align: justify;"> </div><m:brkbinsub val="--"><div style="text-align: justify; font-family: arial;"> </div><m:smallfrac val="off"><div style="text-align: justify; font-family: arial;"> </div><m:dispdef><div style="text-align: justify; font-family: arial;"> </div><m:lmargin val="0"><div style="text-align: justify; font-family: arial;"> </div><m:rmargin val="0"><div style="text-align: justify; font-family: arial;"> </div><m:defjc val="centerGroup"><div style="text-align: justify; font-family: arial;"> <span style="font-size:100%;"><m:wrapindent val="1440"> <m:intlim val="subSup"> <m:narylim val="undOvr"> </m:narylim></m:intlim> </m:wrapindent></span><!--[endif]--><!--[if gte mso 9]><xml> <w:latentstyles deflockedstate="false" defunhidewhenused="true" defsemihidden="true" defqformat="false" defpriority="99" latentstylecount="267"> <w:lsdexception locked="false" priority="0" semihidden="false" unhidewhenused="false" qformat="true" name="Normal"> <w:lsdexception locked="false" priority="9" semihidden="false" unhidewhenused="false" qformat="true" name="heading 1"> <w:lsdexception locked="false" priority="9" qformat="true" name="heading 2"> <w:lsdexception locked="false" priority="9" qformat="true" name="heading 3"> <w:lsdexception locked="false" priority="9" qformat="true" name="heading 4"> <w:lsdexception locked="false" priority="9" qformat="true" name="heading 5"> <w:lsdexception locked="false" priority="9" qformat="true" name="heading 6"> <w:lsdexception locked="false" priority="9" qformat="true" name="heading 7"> <w:lsdexception locked="false" priority="9" qformat="true" name="heading 8"> <w:lsdexception locked="false" priority="9" qformat="true" name="heading 9"> <w:lsdexception locked="false" priority="39" name="toc 1"> <w:lsdexception locked="false" priority="39" name="toc 2"> <w:lsdexception locked="false" priority="39" name="toc 3"> <w:lsdexception locked="false" priority="39" name="toc 4"> <w:lsdexception locked="false" priority="39" name="toc 5"> <w:lsdexception locked="false" priority="39" name="toc 6"> <w:lsdexception locked="false" priority="39" name="toc 7"> <w:lsdexception locked="false" priority="39" name="toc 8"> <w:lsdexception locked="false" priority="39" name="toc 9"> <w:lsdexception locked="false" priority="35" qformat="true" name="caption"> <w:lsdexception locked="false" priority="10" semihidden="false" unhidewhenused="false" qformat="true" name="Title"> <w:lsdexception locked="false" priority="1" name="Default Paragraph Font"> <w:lsdexception locked="false" priority="11" semihidden="false" unhidewhenused="false" qformat="true" name="Subtitle"> <w:lsdexception locked="false" priority="22" semihidden="false" unhidewhenused="false" qformat="true" name="Strong"> <w:lsdexception locked="false" priority="20" semihidden="false" unhidewhenused="false" qformat="true" name="Emphasis"> <w:lsdexception locked="false" priority="59" semihidden="false" unhidewhenused="false" name="Table Grid"> <w:lsdexception locked="false" unhidewhenused="false" name="Placeholder Text"> <w:lsdexception locked="false" priority="1" semihidden="false" unhidewhenused="false" qformat="true" name="No Spacing"> <w:lsdexception locked="false" priority="60" semihidden="false" unhidewhenused="false" name="Light Shading"> <w:lsdexception locked="false" priority="61" semihidden="false" unhidewhenused="false" name="Light List"> <w:lsdexception locked="false" priority="62" semihidden="false" unhidewhenused="false" name="Light Grid"> <w:lsdexception locked="false" priority="63" semihidden="false" unhidewhenused="false" name="Medium Shading 1"> <w:lsdexception locked="false" priority="64" semihidden="false" unhidewhenused="false" name="Medium Shading 2"> <w:lsdexception locked="false" priority="65" semihidden="false" unhidewhenused="false" name="Medium List 1"> <w:lsdexception locked="false" priority="66" semihidden="false" unhidewhenused="false" name="Medium List 2"> <w:lsdexception locked="false" priority="67" semihidden="false" unhidewhenused="false" name="Medium Grid 1"> <w:lsdexception locked="false" priority="68" semihidden="false" unhidewhenused="false" name="Medium Grid 2"> <w:lsdexception locked="false" priority="69" semihidden="false" unhidewhenused="false" name="Medium Grid 3"> <w:lsdexception locked="false" priority="70" semihidden="false" unhidewhenused="false" name="Dark List"> <w:lsdexception locked="false" priority="71" semihidden="false" unhidewhenused="false" name="Colorful Shading"> <w:lsdexception locked="false" priority="72" semihidden="false" unhidewhenused="false" name="Colorful List"> <w:lsdexception locked="false" priority="73" semihidden="false" unhidewhenused="false" name="Colorful Grid"> <w:lsdexception locked="false" priority="60" semihidden="false" unhidewhenused="false" name="Light Shading Accent 1"> <w:lsdexception locked="false" priority="61" semihidden="false" unhidewhenused="false" name="Light List Accent 1"> <w:lsdexception locked="false" priority="62" semihidden="false" unhidewhenused="false" name="Light Grid Accent 1"> <w:lsdexception locked="false" priority="63" semihidden="false" unhidewhenused="false" name="Medium Shading 1 Accent 1"> <w:lsdexception locked="false" priority="64" semihidden="false" unhidewhenused="false" name="Medium Shading 2 Accent 1"> <w:lsdexception locked="false" priority="65" semihidden="false" unhidewhenused="false" name="Medium List 1 Accent 1"> <w:lsdexception locked="false" unhidewhenused="false" name="Revision"> <w:lsdexception locked="false" priority="34" semihidden="false" unhidewhenused="false" qformat="true" name="List Paragraph"> <w:lsdexception locked="false" priority="29" semihidden="false" unhidewhenused="false" qformat="true" name="Quote"> <w:lsdexception locked="false" priority="30" semihidden="false" unhidewhenused="false" qformat="true" name="Intense Quote"> <w:lsdexception locked="false" priority="66" semihidden="false" unhidewhenused="false" name="Medium List 2 Accent 1"> <w:lsdexception locked="false" priority="67" semihidden="false" unhidewhenused="false" name="Medium Grid 1 Accent 1"> <w:lsdexception locked="false" priority="68" semihidden="false" unhidewhenused="false" name="Medium Grid 2 Accent 1"> <w:lsdexception locked="false" priority="69" semihidden="false" unhidewhenused="false" name="Medium Grid 3 Accent 1"> <w:lsdexception locked="false" priority="70" semihidden="false" unhidewhenused="false" name="Dark List Accent 1"> <w:lsdexception locked="false" priority="71" semihidden="false" unhidewhenused="false" name="Colorful Shading Accent 1"> <w:lsdexception locked="false" priority="72" semihidden="false" unhidewhenused="false" name="Colorful List Accent 1"> <w:lsdexception locked="false" priority="73" semihidden="false" unhidewhenused="false" name="Colorful Grid Accent 1"> <w:lsdexception locked="false" priority="60" semihidden="false" unhidewhenused="false" name="Light Shading Accent 2"> <w:lsdexception locked="false" priority="61" semihidden="false" unhidewhenused="false" name="Light List Accent 2"> <w:lsdexception locked="false" priority="62" semihidden="false" unhidewhenused="false" name="Light Grid Accent 2"> <w:lsdexception locked="false" priority="63" semihidden="false" unhidewhenused="false" name="Medium Shading 1 Accent 2"> <w:lsdexception locked="false" priority="64" semihidden="false" unhidewhenused="false" name="Medium Shading 2 Accent 2"> <w:lsdexception locked="false" priority="65" semihidden="false" unhidewhenused="false" name="Medium List 1 Accent 2"> <w:lsdexception locked="false" priority="66" semihidden="false" unhidewhenused="false" name="Medium List 2 Accent 2"> <w:lsdexception locked="false" priority="67" semihidden="false" unhidewhenused="false" name="Medium Grid 1 Accent 2"> <w:lsdexception locked="false" priority="68" semihidden="false" unhidewhenused="false" name="Medium Grid 2 Accent 2"> <w:lsdexception locked="false" priority="69" semihidden="false" unhidewhenused="false" name="Medium Grid 3 Accent 2"> <w:lsdexception locked="false" priority="70" semihidden="false" unhidewhenused="false" name="Dark List Accent 2"> <w:lsdexception locked="false" priority="71" semihidden="false" unhidewhenused="false" name="Colorful Shading Accent 2"> <w:lsdexception locked="false" priority="72" semihidden="false" unhidewhenused="false" name="Colorful List Accent 2"> <w:lsdexception locked="false" priority="73" semihidden="false" unhidewhenused="false" name="Colorful Grid Accent 2"> <w:lsdexception locked="false" priority="60" semihidden="false" unhidewhenused="false" name="Light Shading Accent 3"> <w:lsdexception locked="false" priority="61" semihidden="false" unhidewhenused="false" name="Light List Accent 3"> <w:lsdexception locked="false" priority="62" semihidden="false" unhidewhenused="false" name="Light Grid Accent 3"> <w:lsdexception locked="false" priority="63" semihidden="false" unhidewhenused="false" name="Medium Shading 1 Accent 3"> <w:lsdexception locked="false" priority="64" semihidden="false" unhidewhenused="false" name="Medium Shading 2 Accent 3"> <w:lsdexception locked="false" priority="65" semihidden="false" unhidewhenused="false" name="Medium List 1 Accent 3"> <w:lsdexception locked="false" priority="66" semihidden="false" unhidewhenused="false" name="Medium List 2 Accent 3"> <w:lsdexception locked="false" priority="67" semihidden="false" unhidewhenused="false" name="Medium Grid 1 Accent 3"> <w:lsdexception locked="false" priority="68" semihidden="false" unhidewhenused="false" name="Medium Grid 2 Accent 3"> <w:lsdexception locked="false" priority="69" semihidden="false" unhidewhenused="false" name="Medium Grid 3 Accent 3"> <w:lsdexception locked="false" priority="70" semihidden="false" unhidewhenused="false" name="Dark List Accent 3"> <w:lsdexception locked="false" priority="71" semihidden="false" unhidewhenused="false" name="Colorful Shading Accent 3"> <w:lsdexception locked="false" priority="72" semihidden="false" unhidewhenused="false" name="Colorful List Accent 3"> <w:lsdexception locked="false" priority="73" semihidden="false" unhidewhenused="false" name="Colorful Grid Accent 3"> <w:lsdexception locked="false" priority="60" semihidden="false" unhidewhenused="false" name="Light Shading Accent 4"> <w:lsdexception locked="false" priority="61" semihidden="false" unhidewhenused="false" name="Light List Accent 4"> <w:lsdexception locked="false" priority="62" semihidden="false" unhidewhenused="false" name="Light Grid Accent 4"> <w:lsdexception locked="false" priority="63" semihidden="false" unhidewhenused="false" name="Medium Shading 1 Accent 4"> <w:lsdexception locked="false" priority="64" semihidden="false" unhidewhenused="false" name="Medium Shading 2 Accent 4"> <w:lsdexception locked="false" priority="65" semihidden="false" unhidewhenused="false" name="Medium List 1 Accent 4"> <w:lsdexception locked="false" priority="66" semihidden="false" unhidewhenused="false" name="Medium List 2 Accent 4"> <w:lsdexception locked="false" priority="67" semihidden="false" unhidewhenused="false" name="Medium Grid 1 Accent 4"> <w:lsdexception locked="false" priority="68" semihidden="false" unhidewhenused="false" name="Medium Grid 2 Accent 4"> <w:lsdexception locked="false" priority="69" semihidden="false" unhidewhenused="false" name="Medium Grid 3 Accent 4"> <w:lsdexception locked="false" priority="70" semihidden="false" unhidewhenused="false" name="Dark List Accent 4"> <w:lsdexception locked="false" priority="71" semihidden="false" unhidewhenused="false" name="Colorful Shading Accent 4"> <w:lsdexception locked="false" priority="72" semihidden="false" unhidewhenused="false" name="Colorful List Accent 4"> <w:lsdexception locked="false" priority="73" semihidden="false" unhidewhenused="false" name="Colorful Grid Accent 4"> <w:lsdexception locked="false" priority="60" semihidden="false" unhidewhenused="false" name="Light Shading Accent 5"> <w:lsdexception locked="false" priority="61" semihidden="false" unhidewhenused="false" name="Light List Accent 5"> <w:lsdexception locked="false" priority="62" semihidden="false" unhidewhenused="false" name="Light Grid Accent 5"> <w:lsdexception locked="false" priority="63" semihidden="false" unhidewhenused="false" name="Medium Shading 1 Accent 5"> <w:lsdexception locked="false" priority="64" semihidden="false" unhidewhenused="false" name="Medium Shading 2 Accent 5"> <w:lsdexception locked="false" priority="65" semihidden="false" unhidewhenused="false" name="Medium List 1 Accent 5"> <w:lsdexception locked="false" priority="66" semihidden="false" unhidewhenused="false" name="Medium List 2 Accent 5"> <w:lsdexception locked="false" priority="67" semihidden="false" unhidewhenused="false" name="Medium Grid 1 Accent 5"> <w:lsdexception locked="false" priority="68" semihidden="false" unhidewhenused="false" name="Medium Grid 2 Accent 5"> <w:lsdexception locked="false" priority="69" semihidden="false" unhidewhenused="false" name="Medium Grid 3 Accent 5"> <w:lsdexception locked="false" priority="70" semihidden="false" unhidewhenused="false" name="Dark List Accent 5"> <w:lsdexception locked="false" priority="71" semihidden="false" unhidewhenused="false" name="Colorful Shading Accent 5"> <w:lsdexception locked="false" priority="72" semihidden="false" unhidewhenused="false" name="Colorful List Accent 5"> <w:lsdexception locked="false" priority="73" semihidden="false" unhidewhenused="false" name="Colorful Grid Accent 5"> <w:lsdexception locked="false" priority="60" semihidden="false" unhidewhenused="false" name="Light Shading Accent 6"> <w:lsdexception locked="false" priority="61" semihidden="false" unhidewhenused="false" name="Light List Accent 6"> <w:lsdexception locked="false" priority="62" semihidden="false" unhidewhenused="false" name="Light Grid Accent 6"> <w:lsdexception locked="false" priority="63" semihidden="false" unhidewhenused="false" name="Medium Shading 1 Accent 6"> <w:lsdexception locked="false" priority="64" semihidden="false" unhidewhenused="false" name="Medium Shading 2 Accent 6"> <w:lsdexception locked="false" priority="65" semihidden="false" unhidewhenused="false" name="Medium List 1 Accent 6"> <w:lsdexception locked="false" priority="66" semihidden="false" unhidewhenused="false" name="Medium List 2 Accent 6"> <w:lsdexception locked="false" priority="67" semihidden="false" unhidewhenused="false" name="Medium Grid 1 Accent 6"> <w:lsdexception locked="false" priority="68" semihidden="false" unhidewhenused="false" name="Medium Grid 2 Accent 6"> <w:lsdexception locked="false" priority="69" semihidden="false" unhidewhenused="false" name="Medium Grid 3 Accent 6"> <w:lsdexception locked="false" priority="70" semihidden="false" unhidewhenused="false" name="Dark List Accent 6"> <w:lsdexception locked="false" priority="71" semihidden="false" unhidewhenused="false" name="Colorful Shading Accent 6"> <w:lsdexception locked="false" priority="72" semihidden="false" unhidewhenused="false" name="Colorful List Accent 6"> <w:lsdexception locked="false" priority="73" semihidden="false" unhidewhenused="false" name="Colorful Grid Accent 6"> <w:lsdexception locked="false" priority="19" semihidden="false" unhidewhenused="false" qformat="true" name="Subtle Emphasis"> <w:lsdexception locked="false" priority="21" semihidden="false" unhidewhenused="false" qformat="true" name="Intense Emphasis"> <w:lsdexception locked="false" priority="31" semihidden="false" unhidewhenused="false" qformat="true" name="Subtle Reference"> <w:lsdexception locked="false" priority="32" semihidden="false" unhidewhenused="false" qformat="true" name="Intense Reference"> <w:lsdexception locked="false" priority="33" semihidden="false" unhidewhenused="false" qformat="true" name="Book Title"> <w:lsdexception locked="false" priority="37" name="Bibliography"> <w:lsdexception locked="false" priority="39" qformat="true" name="TOC Heading"> </w:LatentStyles> </xml><![endif]--><style> <!-- /* Font Definitions */ @font-face {font-family:"Cambria Math"; panose-1:2 4 5 3 5 4 6 3 2 4; mso-font-charset:1; mso-generic-font-family:roman; mso-font-format:other; mso-font-pitch:variable; mso-font-signature:0 0 0 0 0 0;} @font-face {font-family:Calibri; panose-1:2 15 5 2 2 2 4 3 2 4; mso-font-charset:0; mso-generic-font-family:swiss; mso-font-pitch:variable; mso-font-signature:-1610611985 1073750139 0 0 159 0;} /* Style Definitions */ p.MsoNormal, li.MsoNormal, div.MsoNormal {mso-style-unhide:no; mso-style-qformat:yes; mso-style-parent:""; margin-top:0in; margin-right:0in; margin-bottom:10.0pt; margin-left:0in; line-height:115%; mso-pagination:widow-orphan; font-size:11.0pt; font-family:"Calibri","sans-serif"; mso-ascii-font-family:Calibri; mso-ascii-theme-font:minor-latin; mso-fareast-font-family:Calibri; mso-fareast-theme-font:minor-latin; mso-hansi-font-family:Calibri; mso-hansi-theme-font:minor-latin; mso-bidi-font-family:"Times New Roman"; mso-bidi-theme-font:minor-bidi;} .MsoChpDefault {mso-style-type:export-only; mso-default-props:yes; mso-ascii-font-family:Calibri; mso-ascii-theme-font:minor-latin; mso-fareast-font-family:Calibri; mso-fareast-theme-font:minor-latin; mso-hansi-font-family:Calibri; mso-hansi-theme-font:minor-latin; mso-bidi-font-family:"Times New Roman"; mso-bidi-theme-font:minor-bidi;} .MsoPapDefault {mso-style-type:export-only; margin-bottom:10.0pt; line-height:115%;} @page Section1 {size:8.5in 11.0in; margin:1.0in 1.0in 1.0in 1.0in; mso-header-margin:.5in; mso-footer-margin:.5in; mso-paper-source:0;} div.Section1 {page:Section1;} --> </style><!--[if gte mso 10]> <style> /* Style Definitions */ table.MsoNormalTable {mso-style-name:"Table Normal"; mso-tstyle-rowband-size:0; mso-tstyle-colband-size:0; mso-style-noshow:yes; mso-style-priority:99; mso-style-qformat:yes; mso-style-parent:""; mso-padding-alt:0in 5.4pt 0in 5.4pt; mso-para-margin-top:0in; mso-para-margin-right:0in; mso-para-margin-bottom:10.0pt; mso-para-margin-left:0in; line-height:115%; mso-pagination:widow-orphan; font-size:11.0pt; font-family:"Calibri","sans-serif"; mso-ascii-font-family:Calibri; mso-ascii-theme-font:minor-latin; mso-fareast-font-family:"Times New Roman"; mso-fareast-theme-font:minor-fareast; mso-hansi-font-family:Calibri; mso-hansi-theme-font:minor-latin;} </style> <![endif]--> </div><div style="text-align: justify;"><span style=";font-family:arial;font-size:100%;" >All the above is a small tip and tricks from the basic Windows that we submit the following. All tips and tricks here we Pair 150 to be safe and easy step to be done. 150 tips and tricks, including some step-by-step guide that is easy to below, will make your computer work more comfortable. Of course, ultimately, productivity in front of your computer the more developed.</span><span style="font-size:100%;"><br /><br /></span><div style="text-align: justify;"><span style="font-size:100%;"><span style="font-family:arial;">A computer is just not comfortable</span> enough dibarengi without increasing the security. This is important, because the connection to the network, the Internet or to another computer, a little more certain risk. Start from the spread of virus to the data by our people that are not eligible. For that, we also include some basic tips to improve security in Windows.<br /></span></div></div><p class="MsoNormal" style="margin-bottom: 0.0001pt; line-height: normal; text-align: justify;font-family:arial;"><span style="font-size:100%;"><br /></span></p></m:defjc></m:rmargin></m:lmargin></m:dispdef></m:smallfrac></m:brkbinsub></m:brkbin></m:mathfont></m:mathpr></w:word11kerningpairs></w:dontvertalignintxbx></w:dontbreakconstrainedforcedtables></w:dontvertaligncellwithsp></w:splitpgbreakandparamark></w:dontgrowautofit></w:useasianbreakrules></w:wraptextwithpunct></w:snaptogridincell></w:breakwrappedtables></w:compatibility></w:donotpromoteqf></w:validateagainstschemas></w:punctuationkerning></w:trackformatting></w:trackmoves><div style="text-align: justify;"><span style="font-size:100%;"><w:trackmoves style="font-family: arial;"><w:trackformatting><w:punctuationkerning><w:validateagainstschemas><w:donotpromoteqf><w:compatibility><w:breakwrappedtables><w:snaptogridincell><w:wraptextwithpunct><w:useasianbreakrules><w:dontgrowautofit><w:splitpgbreakandparamark><w:dontvertaligncellwithsp><w:dontbreakconstrainedforcedtables><w:dontvertalignintxbx><w:word11kerningpairs><m:mathpr><m:mathfont val="Cambria Math"><m:brkbin val="before"><m:brkbinsub val="--"><m:smallfrac val="off"><m:dispdef><m:lmargin val="0"><m:rmargin val="0"><m:defjc val="centerGroup">Some tips and tricks and step by step guide in this paper using specific assistance programs, which can be downloaded from several sites on the Internet. However, to facilitate you, as usual all the programs mentioned in any posts is included in the following PC CD Media. Of course, all the program has been tested in labs PC Media.</m:defjc></m:rmargin></m:lmargin></m:dispdef></m:smallfrac></m:brkbinsub></m:brkbin></m:mathfont></m:mathpr></w:word11kerningpairs></w:dontvertalignintxbx></w:dontbreakconstrainedforcedtables></w:dontvertaligncellwithsp></w:splitpgbreakandparamark></w:dontgrowautofit></w:useasianbreakrules></w:wraptextwithpunct></w:snaptogridincell></w:breakwrappedtables></w:compatibility></w:donotpromoteqf></w:validateagainstschemas></w:punctuationkerning></w:trackformatting></w:trackmoves></span><br /><w:trackmoves><w:trackformatting><w:punctuationkerning><w:validateagainstschemas><w:donotpromoteqf><w:compatibility><w:breakwrappedtables><w:snaptogridincell><w:wraptextwithpunct><w:useasianbreakrules><w:dontgrowautofit><w:splitpgbreakandparamark><w:dontvertaligncellwithsp><w:dontbreakconstrainedforcedtables><w:dontvertalignintxbx><w:word11kerningpairs><m:mathpr><m:mathfont val="Cambria Math"><m:brkbin val="before"><m:brkbinsub val="--"><m:smallfrac val="off"><m:dispdef><m:lmargin val="0"><m:rmargin val="0"><m:defjc val="centerGroup"></m:defjc></m:rmargin></m:lmargin></m:dispdef></m:smallfrac></m:brkbinsub></m:brkbin></m:mathfont></m:mathpr></w:word11kerningpairs></w:dontvertalignintxbx></w:dontbreakconstrainedforcedtables></w:dontvertaligncellwithsp></w:splitpgbreakandparamark></w:dontgrowautofit></w:useasianbreakrules></w:wraptextwithpunct></w:snaptogridincell></w:breakwrappedtables></w:compatibility></w:donotpromoteqf></w:validateagainstschemas></w:punctuationkerning></w:trackformatting></w:trackmoves></div><w:trackmoves><w:trackformatting><w:punctuationkerning><w:validateagainstschemas><w:donotpromoteqf><w:compatibility><w:breakwrappedtables><w:snaptogridincell><w:wraptextwithpunct><w:useasianbreakrules><w:dontgrowautofit><w:splitpgbreakandparamark><w:dontvertaligncellwithsp><w:dontbreakconstrainedforcedtables><w:dontvertalignintxbx><w:word11kerningpairs><m:mathpr><m:mathfont val="Cambria Math"><m:brkbin val="before"><m:brkbinsub val="--"><m:smallfrac val="off"><m:dispdef><m:lmargin val="0"><m:rmargin val="0"><m:defjc val="centerGroup"><span style="font-size:100%;"><br /></span></m:defjc></m:rmargin></m:lmargin></m:dispdef></m:smallfrac></m:brkbinsub></m:brkbin></m:mathfont></m:mathpr></w:word11kerningpairs></w:dontvertalignintxbx></w:dontbreakconstrainedforcedtables></w:dontvertaligncellwithsp></w:splitpgbreakandparamark></w:dontgrowautofit></w:useasianbreakrules></w:wraptextwithpunct></w:snaptogridincell></w:breakwrappedtables></w:compatibility></w:donotpromoteqf></w:validateagainstschemas></w:punctuationkerning></w:trackformatting></w:trackmoves><w:trackmoves><w:trackformatting><w:punctuationkerning><w:validateagainstschemas><w:donotpromoteqf><w:compatibility><w:breakwrappedtables><w:snaptogridincell><w:wraptextwithpunct><w:useasianbreakrules><w:dontgrowautofit><w:splitpgbreakandparamark><w:dontvertaligncellwithsp><w:dontbreakconstrainedforcedtables><w:dontvertalignintxbx><w:word11kerningpairs><m:mathpr><m:mathfont val="Cambria Math"><m:brkbin val="before"><m:brkbinsub val="--"><m:smallfrac val="off"><m:dispdef><m:lmargin val="0"><m:rmargin val="0"><m:defjc val="centerGroup"><div style="text-align: justify;"><span style="font-size:100%;">Installing the program is in this paper comes mostly from the official Microsoft site. So the less likely these programs cause errors in your PC. So do not doubt, continue to follow the basic tips and tricks in Windows that is rarely revealed!<br /></span></div><div style="text-align: justify;"><span style="font-size:100%;"><br /></span><span style="font-size:100%;"><span style="font-family:arial;">Install Windows Easy and Fun</span><br /><br /></span><span style="font-size:100%;"><span style="font-family:arial;">01. Back-up first before the registry edit. How, click Start | Run, type regedit. After the registry window appears, select the menu File | Export. In the Export range, select All and specify the file name, end with the click of a button Save.</span></span><br /></div><p class="MsoNormal" style="margin-bottom: 0.0001pt; line-height: normal; text-align: justify;font-family:arial;"><span style="font-size:100%;"><span style="font-family:arial;"><br /></span></span></p><div style="text-align: justify;"><span style="font-size:100%;"><span style="font-family:arial;">02. Many programs are actually installed in Windows, but not active. To activate it, go to Control Panel | Add / Remove Windows Components, and check on the program that have not been active.</span><br /><br /></span><span style="font-size:100%;"><span style="font-family:arial;">03. Before installing the new program or make changes to Windows settings overall, it is better to make manual Restore Point first. How, Click Start | All Programs | Accessories | System Tools | System Restore and click Create a restore point.</span></span><br /></div><p class="MsoNormal" style="margin-bottom: 0.0001pt; line-height: normal; text-align: justify;font-family:arial;"><span style="font-size:100%;"><span style="font-family:arial;"><br /></span></span></p><div style="text-align: justify;"><span style="font-size:100%;"><span style="font-family:arial;">04. If you decide to install a Windows Update that previously didecline, go to Control Panel | System, select the Automatic Updates tab and click Restore Declined Updates.</span><br /><br /></span><span style="font-size:100%;"><span style="font-family:arial;">05. To set the Windows update in line with your needs, set the first Windows Update. How, open System in Control Panel and click the Automatic Updates tab. Set the option to disable or enable Keep my computer up to date.</span><br /><br /></span><span style="font-size:100%;"><span style="font-family:arial;">06. If you do not have a bootable CD, do not worry. Microsoft already offers a free tool to create the floppy booting</span></span><br /></div><p class="MsoNormal" style="margin-bottom: 0.0001pt; line-height: normal; text-align: justify;font-family:arial;"><span style="font-size:100%;"><span style="font-family:arial;"><br /></span></span></p><div style="text-align: justify;"><span style="font-size:100%;"><span style="font-family:arial;">07. If the current Windows installation suddenly stopped, turn off the computer and drop additional card. For example, sound card. Reinstall and re-install the card after the installation is complete.</span><br /><br /></span><span style="font-size:100%;"><span style="font-family:arial;">08. To add the System Administration Tools are Start Menu, right click on Start | Properties. Entry in the Start Menu tab and click Customize and then enter in the Advanced tab. Slide down and check the Display option on the All Programs and the Start Menu.</span></span><br /></div><p class="MsoNormal" style="margin-bottom: 0.0001pt; line-height: normal; text-align: justify;font-family:arial;"><span style="font-size:100%;"><span style="font-family:arial;"><br /></span></span></p><div style="text-align: justify;"><span style="font-size:100%;"><span style="font-family:arial;">09. To install Back-up Utility in Windows XP Home Edition look ntbackup.msi file in the directory \ valudeadd \ MSFT \ ntbackup \ in the Windows XP installation CD. Run the file and follow the langkahlangkahnya.</span><br /><br /></span><span style="font-size:100%;"><span style="font-family:arial;">10. Windows XP will automatically highlight any new program that ter-install. How removed it, right-click Start | Properties. Go to the Start Menu tab | Customize, then click the Advanced tab and uncheck the checkbox option Highlight newly installed programs.</span><br /><br /></span><span style="font-size:100%;"><span style="font-family:arial;">11. To view the film or the best game on the computer, make sure that the latest DirextX already installed properly. View the latest version in</span><br /><br /></span><span style="font-size:100%;"><span style="font-family:arial;">12. Sometimes the hardware will be installed not support Plug-and-Play. For that, use the Add Hardware Wizard in the Control Panel | System | Hardware for mendeteksinya.</span></span><br /></div><p class="MsoNormal" style="margin-bottom: 0.0001pt; line-height: normal; text-align: justify;font-family:arial;"><span style="font-size:100%;"><span style="font-family:arial;"><br /></span></span></p><div style="text-align: justify;"><span style="font-size:100%;"><span style="font-family:arial;">-> TOP TIPS! Computers speed of<br /><br />13. Actually only take no more than 2 minutes to go to Windows since the computer is turned on. However, it sometimes feels very old. To speed up loading of Windows, there are some things you can do. For example, the icon on the desktop and not using the wallpaper can be a lot of memory. Change wallpaper with a background color, and use the Desktop Cleanup</span><br /><br /></span><span style="font-size:100%;"><span style="font-family:arial;">Wizard that there can be found with a right click on the desktop icon to clean up. Do not forget, run defrag regularly.</span><br /><br /></span><span style="font-size:100%;"><span style="font-family:arial;">If you frequently add or remove programs on the computer, clean registry regularly. Use software such as Registry Mechanic bantu's www.winguides.com site. Unfortunately, the trial version of this program can only be used to improve the course of 6 sections.</span><br /><br /></span><span style="font-size:100%;"><span style="font-family:arial;">Other steps that need to be is me-remove programs that are loaded automatically when Windows starts. Of course, the only programs that are not needed. How, by removing all the startup folder and msconfig to open the Start | Run.</span></span><br /></div><p class="MsoNormal" style="margin-bottom: 0.0001pt; line-height: normal; text-align: justify;font-family:arial;"><span style="font-size:100%;"><span style="font-family:arial;"><br /></span></span></p><div style="text-align: justify;"><span style="font-size:100%;"><span style="font-family:arial;"><span style="font-family:arial;">14. Use Files and Settings Transfer Wizard to move files and settings to a new computer. How, click Start | AllPrograms | Accessories | System Tools, and then run the File and Settings Transfer Wizard.</span></span></span><br /><br /><span style="font-size:100%;"><span style="font-family:arial;"><span style="font-family:arial;">15. Use the exception of the security settings in Internet Explorer, so that the update through Windows Update page is running smoothly. How, open Internet Options in the Tools menu in Internet Explorer. Click the Security tab, select Trusted Site and click the Sites button. Fill in the name of the Windows Update site, uncheck the checkbox option Require server verification ... and click OK.</span></span></span><br /><br /><span style="font-size:100%;"><span style="font-family:arial;"><span style="font-family:arial;">16. If you lose your serial number Windows XP, use the freeware Magical Jelly Bean Keyfinder from http://www.magicaljellybean.com/keyfinder.shtml.</span></span></span><br /><br /><span style="font-size:100%;"><span style="font-family:arial;"><span style="font-family:arial;">17. If the name that teregister in Windows XP does not suit you, fix the registry. Do, open the registry and select My Computer. Click the Edit | Find and type RegOwner. If you have found, right click, select Modify and fill in the appropriate name. This change can also be done in the key RegCompany.</span></span></span><br /></div><p class="MsoNormal" style="margin-bottom: 0.0001pt; line-height: normal; text-align: justify;font-family:arial;"><span style="font-size:100%;"><span style="font-family:arial;"><br />Performance Improvement Network and Internet<br /><br /></span></span></p><div style="text-align: justify;"><span style="font-size:100%;"><span style="font-family:arial;">18. For men, share a folder on your computer to the network, right-click the folder and select Properties. Click the Sharing tab and enable option Share this folder on the network. Give your name and click OK.</span></span><br /><br /><span style="font-size:100%;"><span style="font-family:arial;">19. Create a My Network Places icon on the desktop by clicking the blank area right in the desktop and click Properties. Select the Desktop tab | Customize Desktop. Then open the General tab and enable option My Network Places.</span></span><br /><br /><span style="font-size:100%;"><span style="font-family:arial;">20. It's an easy way to send messages to other computers on the network, ie, using the Message Console. Open the Control Panel | AdministrativeTools | Computer Management | Action | All Task | Send Console Message. Type the text you want to send, add the name of the computer that would dituju and click Send.</span></span><br /><br /><span style="font-size:100%;"><span style="font-family:arial;">21. To set the Internet Connection Firewall (ICF), open the Network Connection in Control Panel, right-click the connection and click Properties. Go to the Advanced tab and enable option Protect my computer and network by limitting or Preventing access to this computer from the Internet.</span></span><br /></div><p class="MsoNormal" style="margin-bottom: 0.0001pt; line-height: normal; text-align: justify;font-family:arial;"><span style="font-size:100%;"><span style="font-family:arial;"><br /></span></span></p><div style="text-align: justify;"><span style="font-size:100%;"><span style="font-family:arial;">22. Set the Internet Connection Firewall (ICF) for each existing connection. Both dial-up or broadband. If your computer is part of a network that is connected to the Internet, just plug in the ICF computer server.</span><br /><br /></span><span style="font-size:100%;"><span style="font-family:arial;">23. To find out your IP address, enter in DOS by typing in the Run command. Then type ipconfig / all.</span><br /><br /></span><span style="font-size:100%;"><span style="font-family:arial;">24. If you receive a message from the Internet through the Messenger, immediately turn off. How, go to Contol Panel | Administrative Tools | Services, and then click Stop Messenger ganda. To prevent that do not recur, set so that Messenger becomes Disabled in the Startup.</span><br /><br /></span><span style="font-size:100%;"><span style="font-family:arial;">25. Disable Windows Messenger with the regedit. Go to HKEY_LOCAL_MACHINE \ Software \ Policies \ Microsoft, then select the menu Edit | New | Key, and name Messenger. And then make a key again in this way in the directory with the name of Messenger to its key client. After that, click the Edit menu | New | DWORD Value, and name-Run prevent. Value PreventRun right click, select Modify, fill in the number 1 on the Value data, and click OK.</span><br /><br /></span><span style="font-size:100%;"><span style="font-family:arial;">26. To find out information about the connection on your computer, click Start | All Programs | Accessories | System Tools | System Information. Select the menu Tools | Net Diagnostics. In the window that opens and select the option Scan your system. Wait until the process is complete to see the results.</span><br /><br /></span><span style="font-size:100%;"><span style="font-family:arial;">27. Protect your privacy by preventing the application of Windows Media Player to send data about the habits and the computer you are using the computer through the Internet to certain addresses. How easy, in Windows Media Player, select the menu Tools | Options. Open the Player tab, and disable option Aloww Uniquely internet sites to your player.</span></span><br /></div><p class="MsoNormal" style="margin-bottom: 0.0001pt; line-height: normal; text-align: justify;font-family:arial;"><span style="font-size:100%;"><span style="font-family:arial;"><br /></span></span></p><div style="text-align: justify;"><span style="font-size:100%;"><span style="font-family:arial;">28. To lock a computer in a network domain, press the Ctrl + Alt + Del at the same option and click Lock Computer. To open again, press the Ctrl + Alt + Deldan enter the password. Configuring the Windows Easy and Fast.</span></span><br /><br /><span style="font-size:100%;"><span style="font-family:arial;">29. To men-disable autorun feature, right-click the CD drive icon, select Properties and enter in the AutoPlay tab. Then disable autoplay for each type of file is listed on the list.</span></span><br /><br /><span style="font-size:100%;"><span style="font-family:arial;">30. Use Microsoft Clear Type Tuning Control http://www.microsoft.com/typography/cleartype/'s to set the Clear Type on the computer.</span></span><br /><br /><span style="font-size:100%;"><span style="font-family:arial;">31. To view the system files by default in-hidden by Windows XP, select the View tab in the menu Tools | Folder Options in Windows Explorer. Enable the Display content of system folders.</span></span><br /><br /><span style="font-size:100%;"><span style="font-family:arial;">32. To put the volume control icon in the taskbar, go in Control Panel | Sound and Audio tab and click Volume. Enable Place volume control in the Taskbar and click OK.</span></span><br /><br /><span style="font-size:100%;"><span style="font-family:arial;">33. Set the Power button on the keyboard through Control Panel | Power Options in the Advanced tab. Define the Power button to select this option available.</span></span><br /><br /><span style="font-size:100%;"><span style="font-family:arial;">34. Set to clean the Windows Pagefile when shut down for security. Do, open the registry and the entry in the directory HKEY_LOCALMACHINE \ SYSTEM \ CurrentControlSet \ Control | Session Manager. Edit the key value-Clear PageFileAtShutdown to 1. Consequently, the shut down process will take slightly longer.</span></span><br /><br /><span style="font-size:100%;"><span style="font-family:arial;">35. Set Windows to display each file extension. How, in Windows Explorer, select the menu Tools | Folder Options and the View tab. Remove the check mark in the option Hide file extentions for known file types.</span></span><br /></div><p class="MsoNormal" style="margin-bottom: 0.0001pt; line-height: normal; text-align: justify;font-family:arial;"><span style="font-size:100%;"><span style="font-family:arial;"><br /></span></span></p><div style="text-align: justify;"><span style="font-size:100%;"><span style="font-family:arial;">-> STEP BY STEP</span><br /><br /></span><span style="font-size:100%;"><span style="font-family:arial;">36. Removing the Installed Components Many components of Windows that does not appear in Add / Remove Windows Components, so can not uninstall it.</span><br /><br /></span><span style="font-size:100%;"><span style="font-family:arial;">1. Open Notepad and select the menu File | Open. Navigate to the folder Windows \ Inf. Sysoc.inf contents of the file name. Click Open to open this file.</span><br /><br /></span><span style="font-size:100%;"><span style="font-family:arial;">2. Select the menu Edit | Replace. Hide in the Type I, but the Replace With field empty, click Replace All. The goal is to remove all of the words in the Hide file. When finished, close and save the file.</span><br /><br /></span><span style="font-size:100%;"><span style="font-family:arial;">3. Open the Control Panel and select Add / Remove Programs. Then select Add / Remove Windows Components, on the windows that will look out and then some components that were previously hidden.</span><br /><br /></span><span style="font-size:100%;"><span style="font-family:arial;">37. Change the picture on the welcome screen with the entrance way to the User Accounts in Control Panel. Open your account and click Change my picture. Determine the image of your choice by clicking on the Browse to the disk image, or selecting between images that are available.</span><br /><br /></span><span style="font-size:100%;"><span style="font-family:arial;">38. If you look more like the old version of the Start Menu, you can change it by clicking the right button Start, select Properties. Select Classic Start Menu and click Customize to set the contents.</span><br /><br /></span><span style="font-size:100%;"><span style="font-family:arial;">39. To improve the appearance on the classic Start Menu, right-click the desktop and select Properties. Open the Themes tab, and select Windows Classic from the Theme list.</span><br /><br /></span><span style="font-size:100%;"><span style="font-family:arial;">40. Add image to a folder, so that the image that will appear when the Windows Explorer in the thumbnails. How, right-click the folder to which you want to be treated, select Properties. Click the Customize tab and click Choose Picture. Select a picture and click Open | OK.</span><br /><br /></span><span style="font-size:100%;"><span style="font-family:arial;">41. Adjust capacity to the Recycle Bin right-click the Recycle Bin icon and choose Properties. Fill in the capacity as you want and click OK.</span><br /><br /></span><span style="font-size:100%;"><span style="font-family:arial;">42. At the time set in the View Details in Windows Explorer, right-click a column header untukmengatur columns are displayed. Click More if necessary set the other settings.</span><br /><br /></span><span style="font-size:100%;"><span style="font-family:arial;">43. To add programs that you use most often in the Quick Launch, drag the program icon in the Quick Launch.</span></span><br /></div><p class="MsoNormal" style="margin-bottom: 0.0001pt; line-height: normal; text-align: justify;font-family:arial;"><span style="font-size:100%;"><span style="font-family:arial;"><br /></span></span></p><div style="text-align: justify;"><span style="font-size:100%;"><span style="font-family:arial;">44. Add the address bar on the taskbar, so that speed up access to an address on the Internet. How, right-click the taskbar, select Toolbar | Address. Ganda click to open and close it.</span><br /><br /></span><span style="font-size:100%;"><span style="font-family:arial;">45. Make the display look like Windows Explorer on the My Computer window. How, right-click Windows Explorer icon and select Properties. In the Target area, after the% SystemRoot% \ explorer.exe add / n, / e, / select, C: \ and click OK.</span><br /><br /></span><span style="font-size:100%;"><span style="font-family:arial;">46. To add a program shortcut in the top of the Start Menu, right-click its icon in the Start Menu and click Pin to Start Menu. 47. So that a drive or folder can be entered in the Send To menu, drag its shortcut to the folder \ Documen Your Settings \ \ SendTo.</span><br /><br /></span><span style="font-size:100%;"><span style="font-family:arial;">48. Search for SendTo folder? Just click Start | Run and type in SendTo and click OK.</span><br /><br /></span><span style="font-size:100%;"><span style="font-family:arial;">49. To clear the list of documents in the My Recent Document folder in the Start Menu, right-click Start, select Properties. Customize and click open the Advanced tab and click the Clear button list. So that no longer appear in the My Recent Documents, disable option List my most recently opened documents.</span><br /><br /></span><span style="font-size:100%;"><span style="font-family:arial;">-> STEP BY STEP 50. With Fast User Switching Fast User Switching, a user does not need to logoff the user login.</span><br /><br /></span><span style="font-size:100%;"><span style="font-family:arial;">1. To enable Fast User Switching, entry in the Control Panel and select User Accounts. Click the option Change the way users log on or off, and enable Use Fast User Switching.</span><br /><br /></span><span style="font-size:100%;"><span style="font-family:arial;">2. So that the dial-up connection is still running even though Fast User Switching in the-enable, go to the directory in the registry HKEY_LOCAL_MACHINE \ SOFTWARE \ Microsoft \ WindowsNT \ CurrentVersion \ Winlogon.</span><br /><br /></span><span style="font-size:100%;"><span style="font-family:arial;">3. Right-click on the right panel and select New | String Value. Name KeepRasConnections and give the value 1. Restart the computer.</span><br /><br /></span><span style="font-size:100%;"><span style="font-family:arial;">51. To view the content indeed My Recent Documents folder, click Start | Run, then type% UserProfile% \ Recent.</span><br /><br /></span><span style="font-size:100%;"><span style="font-family:arial;">Setting Multiple Users 52. To switch between user accounts, press the Ctrl + Alt + Del, and then on the Task Manager window that opens, select the Users tab. Right-click a user name which you want to use and click the Connect button.</span><br /><br /></span><span style="font-size:100%;"><span style="font-family:arial;">53. Add Guest account so that others can use your computer. How, open User Accounts in Control Panel, click Guest | Turn On the Guest Account.</span></span><br /></div><p class="MsoNormal" style="margin-bottom: 0.0001pt; line-height: normal; text-align: justify;font-family:arial;"><span style="font-size:100%;"><span style="font-family:arial;"><br /></span></span></p><div style="text-align: justify;"><span style="font-size:100%;"><span style="font-family:arial;">54. Remember to always log in as System Administrator before making changes berimbas on the performance of the computer.</span><br /><br /></span><span style="font-size:100%;"><span style="font-family:arial;">55. To copy a user profile, enter in the Control Panel | System. Entry in the Advance tab and click the Settings button in the User Profiles. Highlight the profile you want copied, and then click Copy to specify the location and profile. To change the permission, click the Change button.</span><br /><br /></span><span style="font-size:100%;"><span style="font-family:arial;">56. Change Welcome screen with a login dialog to increase security level. How, in the entry in the User Accounts Control Panel, select the option Change the way users log on or off and disable Welcome screen.</span><br /><br /></span><span style="font-size:100%;"><span style="font-family:arial;">57. Use the Shared Documents folder to store which can be opened filefile other people in the network. This folder can be found in My Documents \ Other Places area.</span><br /><br /></span><span style="font-size:100%;"><span style="font-family:arial;">58. On Windows XP Pro Edition, the password can expire if not used long log. To avoid this, set so that Windows does not do so. How, click Start | Run, and type userpasswords2 Enter. Go to the Advanced tab and select the Advanced user management, click the Advanced button and select the Local Users and</span><br /><br /></span><span style="font-size:100%;"><span style="font-family:arial;">Groups. Right-click a user name and select Properties. Open the General tab and enable Password never expires option.</span><br /><br /></span><span style="font-size:100%;"><span style="font-family:arial;">59. Give the name of each partition or drive with a different name. This is important to facilitate the search file. 60. Create a password reset floppy disk as an emergency when the lost password. How, go to Control Panel and open User Accounts. Select your account and select prevent a forgotten password to start the wizard.</span><br /><br /></span><span style="font-size:100%;"><span style="font-family:arial;">Setting File and Folder 61. Create a compressed folder by clicking the right blank area on the desktop and select New | Compressed (zipped) Folder. Give the name and drag and drop the files you want in the compressed folder.</span><br /><br /></span><span style="font-size:100%;"><span style="font-family:arial;">62. A compressed folders can be protected with a password. How, open the File menu | Add a Password. Fill in your password and fill it again to confirm.</span><br /><br /></span><span style="font-size:100%;"><span style="font-family:arial;">63. A compressed folder can remain content with the added drag and drop the files you want compressed into it.</span><br /><br /></span><span style="font-size:100%;"><span style="font-family:arial;">64. When running Disk Cleanup, select the option to compress old files compressing files that are not needed, so capacity can be hard savings.</span></span><br /></div><p class="MsoNormal" style="margin-bottom: 0.0001pt; line-height: normal; text-align: justify;font-family:arial;"><span style="font-size:100%;"><span style="font-family:arial;"><br /></span></span></p><div style="text-align: justify;"><span style="font-size:100%;"><span style="font-family:arial;">65. Enkrip or random files can be done in Windows XP Pro Edition with right clicking My Computer, select Properties. Open the General tab and click Advanced. Activate the option Encrypt contents to secure data.</span></span><br /><br /><span style="font-size:100%;"><span style="font-family:arial;">66. The easiest way to change the name of the file or folder is to select it, then pressing F2.</span></span><br /><br /><span style="font-size:100%;"><span style="font-family:arial;">67. So you can switch between the folder quickly, especially on the folders that are frequently opened, make a shortcut to any folder that is accessed frequently.</span></span><br /><br /><span style="font-size:100%;"><span style="font-family:arial;">68. Reset the file association with the menhakan the Shift key while right-clicking a file. Select Open With ... Select the program you want to use to open the file and enable the Open option use the selected program to open this kind of file. Then click OK.</span></span><br /><br /><span style="font-size:100%;"><span style="font-family:arial;">69. Customize the music file storage capacity in a way to open Windows Media Player and select the menu Tools | Options. Open the Copy Music tab and adjust the size capacity of friction with the slider.</span></span><br /><br /><span style="font-size:100%;"><span style="font-family:arial;">70. If you save all documents in the My Documents folder, all files are easier on the back-up and system restore is not affected.</span></span><br /><br /><span style="font-size:100%;"><span style="font-family:arial;">71. If a file copy of the CD can not be accessed, then removed the Read only attribute. How, right-click the file and select Properties. Remove the check mark in the Read only option.</span></span><br /><br /><span style="font-size:100%;"><span style="font-family:arial;">72. Arrange the display of each folder by clicking the right folders on My Computer. Select Properties and click Customize. Select the template that is available, or select a picture according to your wishes. Click OK to save the settings.</span></span><br /><br /><span style="font-size:100%;"><span style="font-family:arial;">73. Me-you can rename multiple files at once that have the same characters in the same folder as well. For example, a photo or image collection. Way, select all the files you want in-rename, right-click the file and click Rename. Give your name, for example Koleksi.JPG, then all the other files will be changed into the name Collection (1). JPG, Collection (2). JPG, and so on.</span></span><br /><br /><span style="font-size:100%;"><span style="font-family:arial;">-> STEP BY STEP</span></span><br /><br /><span style="font-size:100%;"><span style="font-family:arial;">74. Did you send a Fax, that Windows XP has a tool to send and receive fax?</span></span><br /><br /><span style="font-size:100%;"><span style="font-family:arial;">1. Open the Control Panel, select Add / Remove Programs and click Add / Remove Windows Components. Enable Fax Services and click Next.</span></span><br /><br /><span style="font-size:100%;"><span style="font-family:arial;">2. Click Start | All Programs | Accessories | Communication | Fax | Fax Console to run the Fax Configuration Wizard. Set all settings, including fax and modem numbers that are used and the incoming fax.</span></span><br /><br /><span style="font-size:100%;"><span style="font-family:arial;">3. Create all of the fax Fax Console. Check all the content before it is transmitted, including the setting and so forth.</span></span><br /></div><p class="MsoNormal" style="margin-bottom: 0.0001pt; line-height: normal; text-align: justify;font-family:arial;"><span style="font-size:100%;"><span style="font-family:arial;"><br /></span></span></p><div style="text-align: justify;"><span style="font-size:100%;"><span style="font-family:arial;">Set Print Quality </span></span><br /></div><div style="text-align: justify;"><span style="font-size:100%;"><span style="font-family:arial;">75. You can print multiple photos together, and set the layout and the other option with the easy way. First, open the image files in the My Pictures folder, then select the menu File | Print. Akan Photo Printing Wizard appears. Set the printer to which you want to use and the layout that will be used. Some of the printer allows printing of multiple photos in one paper.</span></span><br /><br /><span style="font-size:100%;"><span style="font-family:arial;">76. Rather than have to set the printer settings each time you use it, make a copy of your printer. Set each with a different option as you need.</span></span><br /><br /><span style="font-size:100%;"><span style="font-family:arial;">77. You can use a character that is not in the keyboard, but can be used with the features in the Windows Character Map. To open, you can find in the Start | All Programs | Accessories | System Toolss | Character Map. Or type in "charmap" without the quotation marks in the Start | Run.</span></span><br /><br /><span style="font-size:100%;"><span style="font-family:arial;">78. To capture a scene in the movie file into an image, putarlah the film and press Stop when the desired scene. Click the Take Picture, save in your folder and name.</span></span><br /><br /><span style="font-size:100%;"><span style="font-family:arial;">Bring Penampakan Hidden Features 79. You are interested in music with an original Windows? Find it in the file \ windows \ oobe \ system32 \ images \ tittle.wma.</span></span><br /><br /><span style="font-size:100%;"><span style="font-family:arial;">80. There are two editions of Windows Plus! circulating, ie, Microsoft Plus! and for Windows Digital Media Edition (DME). See www.microsoft.com / windows / plus / PlusHome.asp trial version and try DME.</span></span><br /><br /><span style="font-size:100%;"><span style="font-family:arial;">81. Type "iexpress" without quotes in the dialogue box Start | Run. You will find a utility to create and mengompres self extraction file.</span></span><br /><br /><span style="font-size:100%;"><span style="font-family:arial;">82. You will find some tools that are less popular, but have tremendous advantages. Tools can be found in the folder support \ tools in the Windows XP installation CD. Use suptools.msi program to install the tools in your computer.</span></span><br /><br /><span style="font-size:100%;"><span style="font-family:arial;">83. There are many wizard stepby-step or in Windows. To find out what the wizard, open the Help and Support and type "Wizard" without quotes in the search field. Windows wizard will display the list of available. You chose to live.</span></span><br /><br /><span style="font-size:100%;"><span style="font-family:arial;">84. To create your own characters, click Start | Run and type Eudcedit. Create as you see fit, asalakan still in the 64x64 grid sizes. Save by selecting the menu Edit | Save Character.</span></span><br /><br /><span style="font-size:100%;"><span style="font-family:arial;">85. To put the characters in the Character Map into a document, you simply open the Character Map and select the character. Then you copy and paste it into your document.</span></span><br /><br /><span style="font-size:100%;"><span style="font-family:arial;">Caparison Desktop 86. You can set the mouse pointer in accordance with the desire to open a tab in the Mouse Pointer in the Control Panel. Click Browse to search for a pointer as you see fit.</span></span><br /><br /><span style="font-size:100%;"><span style="font-family:arial;">87. To display a list of recent documents accessed in the Start Menu in Windows XP Home Edition, right-click on the Start button and select Properties. Click Customize, open the Advanced tab and enable option List my most recently opened documents.</span></span><br /><br /><span style="font-size:100%;"><span style="font-family:arial;">88. If you want to display the Windows Explorer opens up to full cover the taskbar, press the F11.</span></span><br /><br /><span style="font-size:100%;"><span style="font-family:arial;">89. You can create a shortcut key or keystroke key to access a program. How, right-click the program icon and select Properties. Open the Shortcut tab and specify which key you use to access the program</span></span><br /><br /><span style="font-size:100%;"><span style="font-family:arial;">it. Windows will automatically add the keys Ctrl + Alt + your choice of shortcut key.</span></span><br /><br /><span style="font-size:100%;"><span style="font-family:arial;">90. Sort the alphabet, all programs in the Start Menu for easy initialization. How, click Start | All Programs, right-click one of the existing program and select Sort by Name.</span></span><br /></div><p class="MsoNormal" style="margin-bottom: 0.0001pt; line-height: normal; text-align: justify;font-family:arial;"><span style="font-size:100%;"><span style="font-family:arial;"><br /></span></span></p><div style="text-align: justify;"><span style="font-size:100%;"><span style="font-family:arial;">91. Munculkan penampakan icon indicator broadband connection or dial-up in the system tray for easier control. Do, open the My Network Places, select View Networks Connections, right-click the connection that you use and select Properties. Change the option Show icon in the area when connected notofication become enable.</span></span><br /><br /><span style="font-size:100%;"><span style="font-family:arial;">92. You can edit the Start Menu in accordance with their needs. Good to add, subtract, or even change the name. How, right-click Start and select Open or Open All Users. Set each shortcut is available as needed.</span></span><br /><br /><span style="font-size:100%;"><span style="font-family:arial;">93. You can open several programs simultaneously by pressing the Shift key while clicking on the program in Start Menu.</span></span><br /><br /><span style="font-size:100%;"><span style="font-family:arial;">94. To remove the icon on the desktop, right-click the icon, and select Rename. Press the Alt key and numeric 255. Kemudan press Enter.</span></span><br /><br /><span style="font-size:100%;"><span style="font-family:arial;">95. You can remove the arrow on the shortcut icon on the desktop. How, go to registry editor by typing "regedit" without quotes in the dialogue box Start | Run. Go to the directory in the HKEY_CLASSES_ROOT \ Lnkfile. Remove IsShortcut value. 85</span></span><br /><br /><span style="font-size:100%;"><span style="font-family:arial;">-> TOP TIPS!</span></span><br /><br /><span style="font-size:100%;"><span style="font-family:arial;">96. Shortcut Here is a list of some of the shortcuts used when working day-to-day use of Windows.</span></span><br /><br /><span style="font-size:100%;"><span style="font-family:arial;">[Windows] + [L] Lock the computer [Windows] + [U] Showing Utility Manager [Windows] + [R] Showing Run [Windows] + [F] Displays the search window [Windows] + [E] Opening My Computer [Windows ] + [D] death or the Toggle Desktop [Windows] + [M] Minimize all windows [Windows] + [Shift] + [M] Restore all windows minimize the [Windows] + [Ctrl] + [F] Search for computer network in the [Windows] + [F1] Showing page Help [Windows] + [Break] window display the System</span></span><br /><br /><span style="font-size:100%;"><span style="font-family:arial;">Properties [Windows] + [Tab] button on the Taskbar Scroll If you use a keyboard that does not have the Windows key, use key combination Ctrl + ESC.</span></span><br /><br /><span style="font-size:100%;"><span style="font-family:arial;">97. You can enable or disable grouping of several files in one program. How, right-click the taskbar and select Properties. Give a check or uncheck the option Groups similar taskbar buttons.</span></span><br /><br /><span style="font-size:100%;"><span style="font-family:arial;">98. You can remove or display the icon on the desktop by clicking on the desktop and select the right arrange Icons By | Show Desktop Icons.</span></span><br /><br /><span style="font-size:100%;"><span style="font-family:arial;">99. You can create a custom toolbar to the taskbar right-click, choose Toolbars | New Toolbar. Set in accordance with your wishes, for example, the My Documents as a toolbar in the taskbar to easily and quickly accessible.</span></span><br /><br /><span style="font-size:100%;"><span style="font-family:arial;">100. Right-click Start Menu, select Properties, if not using the Classic Start Menu, Customize, and click open the Advanced tab. There are some who can munu activated with a checkmark on the option. Start from the Scroll Programs penampakan to bring some of the features in the Start Menu. 101. You can open the site without opening a browser first. How, type the full address of the site would be opened in the dialog box Start | Run. For example www.pcmedia.co.id. Then press Enter.</span></span><br /></div><p class="MsoNormal" style="margin-bottom: 0.0001pt; line-height: normal; text-align: justify;font-family:arial;"><span style="font-size:100%;"><span style="font-family:arial;"><br /></span></span></p><div style="text-align: justify;"><span style="font-size:100%;"><span style="font-family:arial;">102. In every menu in Windows there is underlined in the letter that the use of navigation as a standard keyboard. For example, the File menu can be opened by pressing the Alt key + F. You can enable or disable the feature marked with a line under this. How, right-click an empty area on the desktop. Appereance then open the tab, and click the button effects. Set the check mark on the option Hide underlined letter for keyboard navigation until I press the [Alt] key.</span></span><br /><br /><span style="font-size:100%;"><span style="font-family:arial;">103. Set the computer to issue a warning sound when the key Caps Lock, Num Lock or Scroll Lock is activated. To do, Open the Control Panel, go in the Accessibility Options. Open the Keyboard tab, and enable option-Use Toggle Keys.</span></span><br /><br /><span style="font-size:100%;"><span style="font-family:arial;">104. To enable Hibernate in Windows XP Turn Off when pressing the Start Menu, hold down the Shift key. So stand by button on the Shut Down dialog box will change to Hibernate.</span></span><br /><br /><span style="font-size:100%;"><span style="font-family:arial;">105. If your hardware Hibernate support, enable this feature soon. How, open Control Panel and open Power Options. Click the Hibernate tab and check the option Enable Hibernate. If your hardware does not support Hibernate, this tab can not be found.</span></span><br /><br /><span style="font-size:100%;"><span style="font-family:arial;">Improving Performance 106 Computer. Add speed to your computer with a good penampakan but eat a lot of time, ie, animation. How, open Control Panel, and double-click System. Click the Advanced tab and press the Performance Settings. Adjust and enable option for the best performance.</span></span><br /><br /><span style="font-size:100%;"><span style="font-family:arial;">107. To reduce the time booting the old feel, set in the BIOS so that booting from the start and then a new CD drive or floppy drive on the next option.</span></span><br /><br /><span style="font-size:100%;"><span style="font-family:arial;">108. Set so that Windows will only load the program only when needed to start running faster loading time and the work computer is lighter. Type "msconfig" without the quotes in the Run dialog box and press Enter. On the General tab, select the Selective Startup option, and open the Startup tab and disable all programs that are not necessary.</span></span><br /><br /><span style="font-size:100%;"><span style="font-family:arial;">109. You can monitor the processor by pressing the keys Ctrl + Alt + Del to open Task Manager. Then minimize the window, you'll see a graph of processor capacity in the system tray.</span></span><br /><br /><span style="font-size:100%;"><span style="font-family:arial;">110. To increase the speed of storing data on a USB ZIP drive, open My Computer and right click the ZIP drive. Select Properties, open the Hardware tab click Properties, and open the Policies tab and enable the Optimize for Performance option.</span></span><br /><br /><span style="font-size:100%;"><span style="font-family:arial;">111. To speed up the display Start Menu, open the Registry Editor (type "regedit" without quotes in the Run dialog box). Directory entry in the HKEY_CURRENT_USER \ Control Panel \ Desktop. Click ganda value called MenuShowDelay, change the number to 100. In this way, the delay Start Menu view the brief.</span></span><br /><br /><span style="font-size:100%;"><span style="font-family:arial;">112. It's a fast way to turn off the computer. Press the Ctrl + Alt + Del, the Task Manager window that appears, press Shut Down menu and hold down the Ctrl key while clicking on Turn Off. Make sure first of all documents have been save.</span></span><br /></div><p class="MsoNormal" style="margin-bottom: 0.0001pt; line-height: normal; text-align: justify;font-family:arial;"><span style="font-size:100%;"><span style="font-family:arial;"><br /></span></span></p><div style="text-align: justify;"><span style="font-size:100%;"><span style="font-family:arial;">113. You can view a graphical display performance computer based on several indicators. For example, the use of processor, memory, and so forth. How, open Control Panel and double-click Administrative Tools. Performance features open.</span></span><br /><br /><span style="font-size:100%;"><span style="font-family:arial;">114. You can also add some other indicator in the Performance features (13 in number) by clicking the + icon and select a new indicator of what would appear.</span></span><br /><br /><span style="font-size:100%;"><span style="font-family:arial;">115. You can merge a registry file or. Reg in your Windows registry, ganda by clicking on the file. To know the function, open with notepad.</span></span><br /><br /><span style="font-size:100%;"><span style="font-family:arial;">116. If you use 512 MB of RAM, set it so that Windows does not create a paging to disk so that increasing computer performance. Do, open the Registry Editor and in direktory HKEY_LOCAL_MACHINE \ SYSTEM | Current ControlSet \ Control \ SessionManager \ MemoryManagement. DisablePagingExecutive Change the value to 1.</span></span><br /><br /><span style="font-size:100%;"><span style="font-family:arial;">117. Bootcfg.exe use to edit the boot.ini of Windows XP. Way, type "cmd" without quotes in the Run dialog box to enter in the DOS Prompt, and type bootcfg: /? appear after the prompt to obtain information about the features in this program.</span></span><br /><br /><span style=";font-family:arial;font-size:100%;" >118. To select the operating system in use in a computer that has a partition the drive, open the Control Panel, go and open the System in the Advanced tab. Click the Startup and Recovery Settings and then Edit.</span><span style=";font-family:arial;font-size:100%;" ><o:p></o:p></span></div><div style="font-family: arial; text-align: justify;"> </div><p style="text-align: justify;font-family:arial;" class="MsoNormal"><span style="font-size:100%;"><o:p> </o:p></span></p><div style="text-align: justify;"><div style="text-align: justify;"> <span style="line-height: 115%;font-family:arial;font-size:100%;" >119. Use the chkdsk utility for classic men-scan disk and fix errors found. How, click Start | Run and type "chkdsk c: / f" without the quotes for the men-scan and repair the drive C. If you want to know more about the features in chkdsk, type "chkdsk /?". 120. You can skip Scanner and Camera Wizard when installing digital camera. To access it, use Windows Explorer or My Computer. Your digital camera will appear as a drive.</span><br /><br /><span style="line-height: 115%;font-family:arial;font-size:100%;" >121. Have utility in Windows XP Pro Edition is rarely used, namely gpedit. Run this utility by typing "gpedit.msc" without quotes in the Run dialog box and press Enter. This utility can be used for each tool and the components of the Windows. Try one at a setting you want and then see the results.</span><br /><br /><span style="line-height: 115%;font-family:arial;font-size:100%;" >-> STEP BY STEP</span><br /><br /><span style="line-height: 115%;font-family:arial;font-size:100%;" >122. Set the Schedule of Personal bother to clean waste in Windows, set Windows so that clean themselves regularly with the Schedule Task.</span><br /><br /><span style="line-height: 115%;font-family:arial;font-size:100%;" >1. To set the schedule of the regular Windows, open Control Panel, double-click Scheduled Tasks. Add Scheduled Task wizard through. Click Next to go in the list contains programs that can be scheduled.</span><br /><br /><span style="line-height: 115%;font-family:arial;font-size:100%;" >2. If the tool you want to schedule it is not listed on the list, click Browse and navigate to the folder where the tool is that you mean. Most of the tools in the Windows folder Windows \ system32. Select one and click Open.</span><br /><br /><span style="line-height: 115%;font-family:arial;font-size:100%;" >3. Type the task name and specify the level of frequency or frequency of the schedule program. Click Next, set other settings that are required and add the username and the password to secure the Schedule Task.</span><br /><br /><span style="line-height: 115%;font-family:arial;font-size:100%;" >123. Use PowerToys utility free from www.microsoft.com / WindowsXP / home / downloads / powertoys.asp very useful. PowerToys itself consists of several programs, including the Open Command Window Here, Alt-Tab Replacement, Tweak UI, Power Calculator, Image Resizer, CD Slide Show Generator, Virtual Desktop Manager, Taskbar Magnifier, HTML Slide Show Wizard, and Timershot Webcam.</span><br /></div><span style="font-size:100%;"><br /></span><div style="text-align: justify;"><span style="line-height: 115%;font-family:arial;font-size:100%;" >124. Windows you can get extra speed, if Indexing Service is disabled. How easy, open the Administrative Tools in Control Panel, select Services and disable Indexing Service.</span><br /><br /><span style="line-height: 115%;font-family:arial;font-size:100%;" >125. Develop capacity hard drive using Disk Cleanup. Open My Computer, right-click the drive and select Properties. Open the General tab and click Disk Cleanup. Clean all trash, including empty the Recycle Bin contents of all data that is not used anymore.</span><br /><br /><span style="line-height: 115%;font-family:arial;font-size:100%;" >126. Eliminate all the shortcuts in the Startup folder in the Start Menu. For programs that have shortcuts in this folder will be automatically executed when you first run Windows.</span><br /><br /><span style="line-height: 115%;font-family:arial;font-size:100%;" >127. Check the settings in the messenger of your computer, because almost every messenger akan load itself automatically every time Windows is started. Keep Login or option Automatically Load at Windows Start off.</span><br /><br /><span style="line-height: 115%;font-family:arial;font-size:100%;" >128. You can access each program directly by typing the program's name in the Run dialog box. For example, a calculator for calc, winword for Microsoft Word, and others.</span><br /><br /><span style="line-height: 115%;font-family:arial;font-size:100%;" >Troubleshooting Sederhana 129. If defrag when the computer suddenly stop, restart and enter in Safe Mode by pressing the F8 key right before Windows starts to run. Defrag your hard drive again from this mode.</span><br /><br /><span style="line-height: 115%;font-family:arial;font-size:100%;" >130. Find out if your drive with FAT or NTFS drive right click and select Properties and then go to the General tab. Read the detail on the file system dialog box that appears.</span><br /><br /><span style="line-height: 115%;font-family:arial;font-size:100%;" >131. Change a drive in FAT into NTFS format through DOS with the command convert c: / FS: NTFS. Enter in the registry editor and open the directory HKEY_USERS \ Default \ Control Panel \ Desktop and create value in AutoEndTask with a value of 1.</span><br /><br /><span style="line-height: 115%;font-family:arial;font-size:100%;" >133. If the time to install a new driver hangs the computer, the computer to restore the previous configuration. How, to restart the computer and press F8 to enter Safe Mode option and select Last Known Good Configuration.</span><br /><br /><span style="line-height: 115%;font-family:arial;font-size:100%;" >134. Use Event Viewer to track the application error. How, right-click My Computer, select Manage, and click the event viewer. Click ganda each application or system error that indicates an error to view the information.</span><br /><br /><span style="line-height: 115%;font-family:arial;font-size:100%;" >135. It's the most appropriate way to set the hours in computer accuracy. Click ganda hour on the right bottom of the screen or in the system tray, select the Internet Time tab. Activate the option Automatically Synchronize with an Internet time server. Select the server that is available and click Update Now!</span><br /><br /><span style="line-height: 115%;font-family:arial;font-size:100%;" >Tips and Tricks Special for Windows 98 and ME 136. Back-up dial-up settings to the way drag and drop the file connection in Dial Up Networking folder to a floppy drive. Back-up files will be stored in ekstensi.dun.</span><br /><br /><span style="line-height: 115%;font-family:arial;font-size:100%;" >137. A quick restart, press Start | Shut Down | Restart, click OK temporarily, hold down the Shift key.</span><br /><br /><span style="line-height: 115%;font-family:arial;font-size:100%;" >138. Use Tweak UI from the Windows 98 specific www.microsoft.com / ntworkstation / downloads / powertoys / networking / nttweak .... After installation is complete, open Tweak UI, via the Control Panel.</span><br /><br /><span style="line-height: 115%;font-family:arial;font-size:100%;" >139. Use the F3 key to open the Find feature while in Windows Explorer or desktop.</span><br /><br /><span style="line-height: 115%;font-family:arial;font-size:100%;" >140. Set the dial-up connection to the Telephony Location Manager. Telephony Location Manager feature will help you optimize your dial-up connection. How, click Start | Run and type "tlocmgr" without the quotes.</span><br /><br /><span style="line-height: 115%;font-family:arial;font-size:100%;" >141. If your computer can not be set in standby mode or suspended, then fix with Pmtshoot from http://support.microsoft.com/?kbid=185949.</span><br /><br /><span style="line-height: 115%;font-family:arial;font-size:100%;" >142. Always back-up registry before making changes in it. How, use the Registry Checker that can be found in Start | Programs | Accessories | System Tools | Tools.</span><br /><br /><span style="line-height: 115%;font-family:arial;font-size:100%;" >143. Create a bootable disk for Windows 98 with memformatnya how to use the system files. Then copy the file c: \ windows \ command \ scanreg.exe and c: \ windows \ himem.sys to the diskette in it. Do not forget, edit the config.sys file in the diskette with the additional line "device = a: \ himem.sys" without the quotes.</span><br /><br /><span style="line-height: 115%;font-family:arial;font-size:100%;" >144. To me-restore registry when the computer does not want to run, try booting with the boot disk. Then go to drive C: \ and type "scanreg \ restore", without quotes. Follow angkah-step to complete. Then out of the DOS.</span><br /><br /><span style="line-height: 115%;font-family:arial;font-size:100%;" >145. Add shortcut to Control Panel to Start Menu by clicking the Start button and right click Open. Then right click in an empty area, select New | Folder. Fill in the "Control Panel. (21EC2020-3AEA-1069-A2DD-08002B30309D)" without the quotes and press Enter.</span><br /><br /><span style="line-height: 115%;font-family:arial;font-size:100%;" >146. You can remove the password dialog box that appears before the first entry in Windows. How, go to Control Panel, open the Password and Change Password tabs open. Fill in the password field with a password of your own, and new password fields empty. After that, click the User Profiles tab and enable option All users of this PC use the same preferences and desktop settings. This change will be in the running after a Windows restart.</span><br /><br /><span style="line-height: 115%;font-family:arial;font-size:100%;" >147. To cancel the Print command, open the Printer icon in the system tray by clicking the ganda. Then highlight the files that are in-print on the printer window and then right click Cancel.</span><br /><br /><span style="line-height: 115%;font-family:arial;font-size:100%;" >148. Discover the tools under DOS that are still feasible in the folder tools \ msdos in the Windows 98 installation CD.</span><br /><br /><span style="line-height: 115%;font-family:arial;font-size:100%;" >149. If Windows 98 or Me is running slow, check the memory. How, right-click My Computer and select Properties. Open the Performance tab and see the System Resource. If you reach 80 percent, restart the computer. Remember, close all programs before viewing the System Resource.</span><br /><br /><span style="line-height: 115%;font-family:arial;font-size:100%;" >150. Sysedit use to edit the file system. For example Autoexec.bat and so forth. Type "sysedit" in the Run dialog box without the quotation marks are given.</span></div></div></m:defjc></m:rmargin></m:lmargin></m:dispdef></m:smallfrac></m:brkbinsub></m:brkbin></m:mathfont></m:mathpr></w:word11kerningpairs></w:dontvertalignintxbx></w:dontbreakconstrainedforcedtables></w:dontvertaligncellwithsp></w:splitpgbreakandparamark></w:dontgrowautofit></w:useasianbreakrules></w:wraptextwithpunct></w:snaptogridincell></w:breakwrappedtables></w:compatibility></w:donotpromoteqf></w:validateagainstschemas></w:punctuationkerning></w:trackformatting></w:trackmoves>Unknownnoreply@blogger.com0tag:blogger.com,1999:blog-5627826094576484572.post-85339054114743186502009-04-15T23:22:00.000-07:002009-04-15T23:25:29.997-07:00Increasing Windows Page File<div style="text-align: justify;"><span style="font-size:100%;">A page file in the Windows operating system is a temporary source of memory used by the system in processing functions. The problem is that if your page file is too small, then your computer might be suffering from poor performance. Fortunately, there is a way to increase the page file and you can do it by right clicking on My Computer -> Properties->Advanced Tab -> Settings. After clicking on the advanced button you can change the size of your virtual memory. Most computers do not need this adjustment, but you may want to verify if your page file is around 1.5 times the amount of your RAM, as this is the recommended setting.</span></div><h2 style="font-family: arial; font-weight: normal;"> </h2>Unknownnoreply@blogger.com0tag:blogger.com,1999:blog-5627826094576484572.post-81112737553306282832009-04-03T01:51:00.000-07:002009-05-05T21:29:26.164-07:00How To Increase Computer Speed And Performance - Great Tips & Tricks<div style="text-align: justify;"><span style="font-family:arial;">21st August 2005</span><br /><span style="font-family:arial;"></span><br /><span style="font-family:arial;"></span><span style="font-family:arial;">Many computer users are worried about their computer's performance. After spending lot of bucks, still they cannot have that charm of using PC as they had expected. Here I am going to explain some major tricks which are used by many computer users which help them to take efficient use of their CPU.</span><br /><br /><span style="font-family:arial;">These tips could be of little importance for people who are already using processors with speed more than 2400 MHz but people using computer with less speed and little older mother boards and processors will enjoy these tips. They will realize significant increase in their computer's performance.</span><br /><br /><span style="font-family:arial;">Here are these tips:</span><br /><br /><span style="font-family:arial;">1. Operating system choice:</span><br /><br /><span style="font-family:arial;">You will be amazed to know that your choice of choosing right windows or operating system could play a significant role on your CPU's performance. For example if you are given 5 bricks to carry them to next apartment and then 10 bricks to do same. Think how would be your performance if compared with both situations. Obviously you would perform well when carrying only 5 bricks.</span><br /><br /><span style="font-family:arial;">Same is the case with Microsoft windows. The lighter the windows you have, higher the performance will be shown. Now this does not mean that you should install Windows 95. Here is the order of Windows weight: Windows XP (any addition) > Windows 2000 > Windows Me > Windows 98 (the lightest one). So if you have Pentium 4 with good ram then I would recommend you to use Microsoft Windows XP. People using Pentium 3 computers could use windows 2000 or if they have ram more than 256 MB then they can use windows XP too. All other lower speed users should use windows ME or 98.</span><br /><br /><span style="font-family:arial;">You would have to compromise between speed and quality. You can decide now which operating system you should use now.</span><br /><br /><span style="font-family:arial;">2. Partitions:</span><br /><br /><span style="font-family:arial;">Before starting this topic I would like to give you a simple example. Suppose in one case if 100 items are placed in a house having only 2 rooms and you are required to find item no. 89, from second room. You will have to scroll through 50 items in room two to find item 89. In other case if same 100 items are placed in house having 4 rooms and you are required to find item 89 from room 2 then you would have to scroll through only 25 items present in that room and you would spend less time.</span><br /><br /><span style="font-family:arial;">Same is the case here for partitions. If you are having more number of partitions, it would help your windows more to find required data easily from your hard disk, when you run any file or program. I would advice you to have more partitions each having at least 5 GB memory and maximum 20 GB.</span><br /><br /><span style="font-family:arial;">You should be very careful while partitioning your hard drive and believe me many people make mistakes when they partition hard disk and lose all of their important data. Here is a free resource Windows Setup Guide that can help you to learn about partitioning, formatting hard disks and installing windows.</span><br /><br /><span style="font-family:arial;">3. Defragment Your Hard disks:</span><br /><br /><span style="font-family:arial;">Your partitions become more fragmented when you create or delete folders, save new files, delete or move them and they become scattered on you hard drive and as time passes, windows become slower and slower due to time needed by the system to find required file on hard disk. You can learn more about why volumes become fragmented by using "Disk Defragmenter" Help.</span><br /><br /><br /><span style="font-family:arial;">My main point is that your computer becomes lazy with time. I am sure many of you have observed that after installing windows, computer become slower gradually with time. So I would strongly recommend you that you use Disk Defragmenter regularly, at least a week. I know it is quite boring process but while taking bath, lunch start it. Believe me you will feel the difference later.</span><br /><br /><span style="font-family:arial;">4. Frequency of Changing Windows:</span><br /><br /><span style="font-family:arial;">I would like you to compare the difference between speeds of your computer when you freshly installed windows and now. I know your answer! Obviously now you will be feeling your PC lazier than before.</span><br /><br /><span style="font-family:arial;">This is all due to many factors such as file fragmentation; increasing of windows registry size, increase in number of files and folders in your primary partition and also because of some viruses and spy wares.</span><br /><br /><span style="font-family:arial;">I would strongly suggest you that you should reinstall windows after formatting your primary partition at least every 3 months. That will keep your computer always efficient. Many people think that formatting hard drive is not good. That is almost a wrong illusion. Formatting your partition every 3 months and installing fresh copy of windows will considerably increase your computer's performance. Same website Windows Setup Guide could help you regarding this matter.</span><br /><br /><span style="font-family:arial;">5. My last tip:</span><br /><br /><span style="font-family:arial;">Finally do not save junk, programs, movies, games and almost anything you can on your windows partition that is usually C: and believe me your computer would show optimal performance for longer time and provide fewer errors.</span><br /><br /><span style="font-family:arial;">It is better you make your "My Documents" folder in other drive than C: as well as make also Program Files folder so install everything like Microsoft office e.t.c there not in windows installation drive. Do it and feel the difference.</span><br /><br /><span style="font-family:arial;">Always check for your programs which automatically run at startup and use your computer's significant resources. Try to disable them carefully and feel the change in performance. Here is a way to check which programs and processes start automatically when windows starts.</span><br /><span style="font-family:arial;">Go to START->Run then type "MSCONFIG" then you can see which your memory consuming programs are.</span><br /><span style="font-family:arial;">If you do not want to do anything above and want shorter way with shorter improvements then create new user account and delete previous one. You will observer a slighter change and this also removes many errors if present in windows.</span><br /><span style="font-family:arial;">If you cannot even do this then why you wasted your time by reading this article and do something else ;)</span><br /><span style="font-family:arial;">I have tried my best to show all possible ways that could help you all to improve your computer performance.</span><br /><br /><span style="font-family:arial;">Author:</span><br /><span style="font-family:arial;">Me, Alan John, always have tried to help windows users in all ways possible. Due to good experience and taking of some computer courses, I am able to do that. Here is one of my website should help many of you. Windows Setup Guide</span><br /></div>Unknownnoreply@blogger.com0tag:blogger.com,1999:blog-5627826094576484572.post-88099560419008553362009-04-02T20:49:00.001-07:002009-05-05T21:29:36.929-07:00Iexplorer.exe error troubleshooting<div style="text-align: justify;">(<span style="font-family:arial;">1) Click on start > control panel > click on Internet options click on Deleted cookies ok, click on <br /> delete files and put a check mark on deleted offline content and click on ok, click on clear<br /> history and click on yes.</span><br /><span style="font-family:arial;">(2) again under internet option on the top right click on advanced look for Browsing and under that<br /> look for Enable third -party browser extension if it has a check mark uncheck it and then click on<br /> apply and OK.</span><br /><span style="font-family:arial;">(3) click on start > run > type in prefetch then click on the edit button on the top left click on select all<br /> and then press the delete button on the keyboard </span><br /><span style="font-family:arial;">(4) click on start > run > type in msconfig under general put a check mark next to selective startup, </span><br /><span style="font-family:arial;"> on the top right click on services at the bottom there is a ok button just above it there is an<br /> option called Hide all microsoft services put a check mark next to it and then cleck on disable all<br /> and click on apply at the botton right. after that again on the top right click on startup click on<br /> startup and click on disable all and click on apply on the botton right and click on close it will ask<br /> U to restart the computer so click on restart</span></div>Unknownnoreply@blogger.com0tag:blogger.com,1999:blog-5627826094576484572.post-63665583795978818732009-04-01T19:20:00.000-07:002009-05-05T21:29:52.035-07:00Notebook Computer<div style="text-align: justify; font-family: arial;" class="KonaBody"><p><a id="KonaLink0" target="undefined" class="kLink" style="text-decoration: underline ! important; position: static;" href="http://www.articlesbase.com/laptops-articles/notebook-computer-856063.html#"><span style="color: rgb(0, 153, 0) ! important; font-weight: 400; position: static;font-family:Verdana,Arial,sans-serif;font-size:12;" ><span class="kLink" style="border-bottom: 1px solid rgb(0, 153, 0); color: rgb(0, 153, 0) ! important; font-weight: 400; position: static;font-size:12;color:#0000e0;" >Notebook</span></span><span style="position: relative;" id="preLoadWrap0"><div style="position: absolute; z-index: 4000; top: -32px; left: -18px; display: none;" id="preLoadLayer0"><img style="border: 0px none ;" src="http://kona.kontera.com/javascript/lib/imgs/grey_loader.gif" /></div></span></a> is a smaller version of the desktop computer. The concept of <a id="KonaLink1" target="undefined" class="kLink" style="text-decoration: underline ! important; position: static;" href="http://www.articlesbase.com/laptops-articles/notebook-computer-856063.html#"><span style="color: rgb(0, 153, 0) ! important; font-weight: 400; position: static;font-family:Verdana,Arial,sans-serif;font-size:12;" ><span class="kLink" style="border-bottom: 1px solid rgb(0, 153, 0); color: rgb(0, 153, 0) ! important; font-weight: 400; position: static;font-size:12;color:#0000e0;" >laptop</span></span></a> was to make a device that could use the same software of a desktop computer, but much smaller in size to enable mobility and support mobile computing (ability to use the computer while in transit). A <a id="KonaLink2" target="undefined" class="kLink" style="text-decoration: underline ! important; position: static;" href="http://www.articlesbase.com/laptops-articles/notebook-computer-856063.html#"><span style="color: rgb(0, 153, 0) ! important; font-weight: 400; position: static;font-family:Verdana,Arial,sans-serif;font-size:12;" ><span class="kLink" style="color: rgb(0, 153, 0) ! important; font-weight: 400; position: static;font-size:12;" >notebook </span><span class="kLink" style="color: rgb(0, 153, 0) ! important; font-weight: 400; position: static;font-size:12;" >computer</span></span></a>, sometimes called a laptop, typically usually weighs around 2 to 17 pounds (1 to 8 kgs) depending on the make, materials and different other factors that come into play such as the parent company etc. It is 3 inches or less in thickness. Notebook is a small mobile personal computer that has components that are similar to their desktop counterparts but are optimized for mobile use and efficient power consumption. Notebooks usually have a built-in keyboard and typically employ liquid crystal displays (LCD). However, all laptops have power management features to extend battery life, or conserve battery power when battery is low.</p> <p>Notebook generally runs on a single main battery and is capable of doing the same tasks as a desktop computer can. It charges the battery and in the meanwhile supplies power to the laptop too. Notebook are less powerful than their desktop counterparts at the same price. This is because of the fact that most parts used in desktop computers are miniaturized to fit into the slim notebook version of the machine. A notebook differs from a desktop PC in terms of <a id="KonaLink3" target="undefined" class="kLink" style="text-decoration: underline ! important; position: static;" href="http://www.articlesbase.com/laptops-articles/notebook-computer-856063.html#"><span style="color: rgb(0, 153, 0) ! important; font-weight: 400; position: static;font-family:Verdana,Arial,sans-serif;font-size:12;" ><span class="kLink" style="border-bottom: 1px solid rgb(0, 153, 0); color: rgb(0, 153, 0) ! important; font-weight: 400; position: static;font-size:12;color:#0000e0;" >power </span><span class="kLink" style="border-bottom: 1px solid rgb(0, 153, 0); color: rgb(0, 153, 0) ! important; font-weight: 400; position: static;font-size:12;color:#0000e0;" >supply</span></span></a>, display, and the type of input devices it uses. Notebook processors usually have multiple sleeps, meaning slow down modes which help in increasing battery life and can also run on low voltage.</p> <p>Notebook computers generally cost more than desktop computers with the same capabilities because they are more difficult to design and manufacture. The most important advantage of a notebook is its portability. One can work with ease anytime and everywhere. Also, access to wireless networking in public places is making notebooks more and more useful.</p> <p>The first notebook was arguably the GRiD Compass 1101, released in 1982 by Bill Moggridge. It was enclosed in a magnesium case, and could run on batteries. It featured the clamshell design where the flat display folded shut on the keyboard. The first commercially successful notebooks were from the SupersPort series from Zenith Data Systems (ZDS)</p> <p>Notebooks are the rage of the new generation today. No matter what the purpose one might have for using a notebook, it seems that mobility will always seem to be the main reason for such a product purchase.</p></div><div style="text-align: justify; font-family: arial;"> </div><div style="text-align: justify;font-family:arial;" class="image"><span style="font-size:85%;"></span><br /></div> <div class="text"><p><a rel="nofollow" onclick="javascript:pageTracker._trackPageview('/outgoing/article_exit_link');" href="http://buy-notebooks.blogspot.com/"><br /></a></p></div>Unknownnoreply@blogger.com0tag:blogger.com,1999:blog-5627826094576484572.post-71011810685759955162009-04-01T19:15:00.000-07:002009-04-21T03:19:19.883-07:00Tips for Buying a New Laptop<div style="text-align: justify;"><span style="font-family:arial;">Buying a </span><a id="KonaLink0" target="undefined" class="kLink" style="text-decoration: underline ! important; position: static; font-family: arial;" href="http://www.articlesbase.com/laptops-articles/tips-for-buying-a-new-laptop-380840.html#"><span style="color: rgb(0, 153, 0) ! important; font-weight: 400; position: static;font-family:Verdana,Arial,sans-serif;font-size:12;" ><span class="kLink" style="border-bottom: 1px solid rgb(0, 153, 0); color: rgb(0, 153, 0) ! important; font-weight: 400; position: static;font-size:12;" >new </span><span class="kLink" style="border-bottom: 1px solid rgb(0, 153, 0); color: rgb(0, 153, 0) ! important; font-weight: 400; position: static;font-size:12;" >laptop</span></span></a><span style="font-family:arial;"> is something that I would consider a fairly major purchase. To start with, I would like to state that I have actually worked for a retail company that purchases and sells everything that has to do with </span><a id="KonaLink1" target="undefined" class="kLink" style="text-decoration: underline ! important; position: static; font-family: arial;" href="http://www.articlesbase.com/laptops-articles/tips-for-buying-a-new-laptop-380840.html#"><span style="color: rgb(0, 153, 0) ! important; font-weight: 400; position: static;font-family:Verdana,Arial,sans-serif;font-size:12;" ><span class="kLink" style="color: rgb(0, 153, 0) ! important; font-weight: 400; position: static;font-size:12;" >computers</span></span></a><span style="font-family:arial;">, and being a salesmen, I would like to contribute my knowledge to properly purchasing a new laptop. This especially applies to those who are buying a new laptop for the first time, or buying a computer for the first time.</span><br /><br /><span style="font-family:arial;"> Step 1 - Define your goal, and figure out your requirements</span><br /><br /><span style="font-family:arial;"> Hopefully that title does not scare you. Basically, the first question I ask someone, when they are purchasing a laptop is: What are you going to be using it for? Generally, responses are quite simple: I need it for work, or my daughter is going to school, or I am a gamer and want to play the latest and greatest games out there. This is when you should consider answering that question yourself. However, before you do that, there is one question that you must answer for yourself, and that is: Are you or someone that uses your laptop, ever going to play new 3D games on it?</span><br /><br /><span style="font-family:arial;"> If your answer is:</span><br /><br /><span style="font-family:arial;"> NO: If your answer is no, then you have narrowed your selection of laptops down by about 25% - 40% (Depending where you are buying them from). An important thing to keep in mind is that, if you are not playing games on it, you do not want a "dedicated graphics card" on the laptop, because you will never use it for what you are doing. The dedicated graphics card is a costly piece of material and it will not speed your laptop up for word processing, or the internet, or even your video editing.</span><br /><br /><span style="font-family:arial;"> YES: If you answered "yes" to the fact that you would play new 3D games, then you absolutely need a laptop that has a "dedicated graphics card" in it. When you talk to your sales representative make certain they know you will be playing games on it, and that the card itself has 128Mb of video ram, or more. Another point that you MUST watch out for, is that many laptops have an "on-board graphics card". Do not get stuck with an on-board graphics card, if you intend on having a </span><a id="KonaLink2" target="undefined" class="kLink" style="text-decoration: underline ! important; position: static; font-family: arial;" href="http://www.articlesbase.com/laptops-articles/tips-for-buying-a-new-laptop-380840.html#"><span style="color: rgb(0, 153, 0) ! important; font-weight: 400; position: static;font-family:Verdana,Arial,sans-serif;font-size:12;" ><span class="kLink" style="color: rgb(0, 153, 0) ! important; font-weight: 400; position: static;font-size:12;" >gaming </span><span class="kLink" style="color: rgb(0, 153, 0) ! important; font-weight: 400; position: static;font-size:12;" >laptop</span></span></a><span style="font-family:arial;">. The quality of games will be considerably horrible, and you will wish you re-read this article. As of writing this article, the more expensive, and thus better cards are GeForce 7600 Go, or 8600 cards, or some of ATI's Radeon X1700 or better. You will have to discuss with your representative your budget, and how fast you want your games to run.</span><br /><br /><span style="font-family:arial;"> Now that you have figured out whether or not you will be gaming on your laptop, you must consider the other software you will be using, and what kind of processing power, and memory you will want on your laptop. To make things easy I would suggest reading the software requirements of the programs you will be running, to get an idea of what you will need to run that software.</span><br /><br /><span style="font-family:arial;"> Step 2 - Identifying your wants</span><br /><br /><span style="font-family:arial;"> This could almost be the final step, if not for some last minute notes. This step is very straightforward. You must decide for yourself how fast you want your machine to be. This is a critical step, because as soon as you purchase your laptop, you cannot change anything inside of it! The one exception is the memory, and that can always be upgraded. A general rule is, the more you pay, the more you get. Below, I will list in order of importance, the general components of the laptop that you are interested in:</span><br /><br /><span style="font-family:arial;"> 1) CPU - This will determine how fast your machine launches programs and runs ( You will want at least a dual-core, unless you cannot afford it ). Look for Pentium Core2 chips, or AMD's X2 type chips. Ask your product rep for a range of processors, and more information or guidance if you need.</span><br /><br /><span style="font-family:arial;"> 2) Memory (RAM) - This is where all your programs store their temporary information. So, like our brains, the larger the amount of ram, the more programs you can have running, or you can launch larger programs. *Note: If you skimp on this item, you will sacrifice alot of performance (1 Gigabyte is generally the minimum, 2 Gigabytes will be the recommended).</span><br /><br /><span style="font-family:arial;"> 3) Hard drive - This part is where you store your files for the long term. Accounting books, and music files, are all stored on the hard drive. The larger it is, the more files you can cram into it. Performance of your laptop is not affected by the size of the drive, and generally not by the speed of the drive. Hard drives will range from 80 Gb - 200 Gb (Sometimes more).</span><br /><br /><span style="font-family:arial;"> Generally those are the three most important components you will need to look at in all the laptops. Now I wish to share with you some final notes.</span><br /><br /><span style="font-family:arial;"> 3) Final notes, and considerations</span><br /><br /><span style="font-family:arial;"> a) If the laptop you are considering purchasing is going to be over $1200, I would greatly consider buying a "Total care warranty". This will run for 20% - 30% of the </span><a id="KonaLink3" target="undefined" class="kLink" style="text-decoration: underline ! important; position: static; font-family: arial;" href="http://www.articlesbase.com/laptops-articles/tips-for-buying-a-new-laptop-380840.html#"><span style="color: rgb(0, 153, 0) ! important; font-weight: 400; position: static;font-family:Verdana,Arial,sans-serif;font-size:12;" ><span class="kLink" style="color: rgb(0, 153, 0) ! important; font-weight: 400; position: static;font-size:12;" >laptop </span><span class="kLink" style="color: rgb(0, 153, 0) ! important; font-weight: 400; position: static;font-size:12;" >price</span></span></a><span style="font-family:arial;">, but will cover any drops, wear, split liquids, etc. for 2-3 years. This is definitely worth considering, as I have seen many laptops with cracked screens, and to replace the screen, you are looking at $800 with labor and parts at least.</span><br /><br /><span style="font-family:arial;"> b) Brands do not matter a whole lot. Most, if not all laptops are manufactured by a global electronics company, that fills orders for many of the major brands you will see. So do not judge based on brand name, and do not judge based on looks. You will here many people tell you that "such and such a brand is no good" and some brands will be praised. To each their own, good luck shopping!<br /><br />source : http://www.articlesbase.com/laptops-articles/tips-for-buying-a-new-laptop-380840.html<br /></span></div>Unknownnoreply@blogger.com0tag:blogger.com,1999:blog-5627826094576484572.post-35331576263160568232009-04-01T19:01:00.000-07:002009-05-05T21:30:21.567-07:00Laptop Battery Performance Maximizing<div class="navigation">August 13th, 2006<br /></div> <!--thecontent--> <p>I am on the planes a decent amount of the time (100,000 miles by late May) and tend to spend a chunk of my flights using my laptop. Most of the time it’s productive, but it can also include a DVD or the occasional game (either <a href="http://www.nethack.org/" target="_blank">Nethack</a> or <a href="http://www.bfme2.ea.com/" target="_blank">Battle for Middle-Earth 2</a>, which are obviously similar). When I was <a href="http://www.livedigitally.com/?p=738">a-hunting for a laptop</a>, battery life was a key criterion in my selection process, as was weight. While I like my <a href="http://www.livedigitally.com/?p=855">Vaio VGN SZ-160P</a>, the standard battery was lasting about 3 hours (the extended life clocks in under six hours before my tweaks), not enough for the SFO-JFK route (now switching to SFO-EWR as a default due to Manhattan traffic, which is a huge bummer because United’s P.S. flights have standard AC outlets on board). </p> <p><a class="imagelink" title="Vaio battery tips" href="http://www.livedigitally.com/wp-content/uploads/2006/08/ld_vaiobatteryadvice.jpg"><img id="image977" title="Vaio battery tips" alt="Vaio battery tips" src="http://www.livedigitally.com/wp-content/uploads/2006/08/ld_vaiobatteryadvice.thumbnail.jpg" align="right" /></a>So I did a lil’ <a href="http://www.google.com/search?sourceid=navclient&ie=UTF-8&&q=maximize+battery+life" target="_blank">Googlin’</a> for tips on extending battery life, and I found them all pretty, well, <a href="http://www.microsoft.com/atwork/stayconnected/battery.mspx" target="_blank">lacking</a>. Stuff like “don’t try to do real-time 3d rendering” or “fully charge up your battery before flying.” One of them even said “buy an extra battery.” Not exactly helpful (Sony’s tips are in the picture on the right). The most common tip that I’ve found truly deceptive is on disabling wireless: many claim it makes a huge impact to disable it, but personally I’ve only noticed a minor difference. I do in fact disable it (and Bluetooth) but on my Vaio the difference was about 10 minutes over 3 hours (but as I state below, it all adds up).</p> <p>Alas, I’ve gone and done a lot of experimenting and have a list of my tips to really maximize battery life for my laptop.</p> <p><a class="imagelink" title="Battery remaining time" href="http://www.livedigitally.com/wp-content/uploads/2006/08/ld_batteryremaining.jpg"><img id="image972" title="Battery remaining time" alt="Battery remaining time" src="http://www.livedigitally.com/wp-content/uploads/2006/08/ld_batteryremaining.thumbnail.jpg" align="right" /></a>Key to this process is having some good methodology. While testing, I kept a plain text file on my Desktop (creatively called “battery.txt”) tracking the <em>real</em> clock as well as Windows’ expected battery life. The problem with the Windows tool, is it really just tells you the current state of the battery based on the <em>current</em> system activity. This means if you start with 3 hours remaining then spend 30 minutes doing something that rapidly consumes the battery, you’ll be down to 2 or less. In other words, you need to track the actual history/lifespan of your battery if you want to get the best information out of your system. You can <a id="p978" href="http://www.livedigitally.com/wp-content/uploads/2006/08/battery.txt">check out</a> my little tracking file for inspiration.</p> <p>And now, with no more delay, here’s <strong>Jeremy’s Tips for Maximizing Your Battery</strong>, or <em>How to Fly From San Francisco to New York City With an Average Battery and Not Have to Watch an Ernest Goes to Anywhere Movie)</em>:</p> <ol><li><strong>Brightness: how low can you go?</strong> Without any question, the fastest way to suck the life out of a battery is leaving your brightness high. Turn it down as low as you possibly can without needing to up your glasses prescription. On my Vaio, I can select from one of 8 levels. During one test, at brightness level 3 my system reported 60% full, with 3:52 (all times are hours:minutes) of life to go. I switched up to level 5 and in 17 minutes of use, I was down to 52% full, with 3:06 to go. In other words, 17 minutes used 46 minutes worth of battery (all other variables were held constant). You can even be so bold as to lower your brightness all the way down when sitting idle for a minute or two (for example, if you are writing a long blog post and pause to clarify your thoughts before typing).</li><li><strong>Don’t use any external devices.</strong> USB and PC-Cards (aka PC-MCIA) use your battery to function, <em>even when you aren’t using them</em>! Have an EVDO card or maybe a USB mouse? Remove them if you can. Even a memory card reader in your PC-MCIA slot uses power just by being in there. The effect varies based on the type of device, but even a few minutes here and there (as you’ll see) add up significantly.</li><li><strong>Single-task, not multi-task.</strong> The more you are doing at the same time with your PC, the more memory and CPU usage increases. Both of which directly use up battery. Close any applications you aren’t using, even the small ones. When doing some experimentation, I found it more efficient to run a single application at a time, then close it and open a new one when ready to move on. While your hard drive uses the battery too, if you are doing anything ‘productive’ you are probably hitting the drive on a regular (even if infrequent) basis anyway.</li><li><strong>Keep it cool.</strong> You can take a page out of the extreme gamer’s handbooks, and have your system perform more optimally by keeping it cool. Make sure your air vents (inflow and outflow) aren’t blocked by anything, which often occurs by poorly positioning your notebook on your lap (which is known to have some other side-effects too, by the way). Heavy CPU and memory use all contribute to heat as well, hence my comment on multi-tasking above.</li><li><strong><a class="imagelink" title="Windows task manager" href="http://www.livedigitally.com/wp-content/uploads/2006/08/ld_windowstaskmanager.jpg"><img id="image979" title="Windows task manager" alt="Windows task manager" src="http://www.livedigitally.com/wp-content/uploads/2006/08/ld_windowstaskmanager.thumbnail.jpg" align="right" /></a>Shut down unused services.</strong> MSN Messenger, Google Desktop Search, QuickTime, wireless managers, etc. They’ve all gotta go. You probably aren’t going to use them, and they all eat up valuable resources. Especially things that ’scan’ anything. For advanced users, I also recommend launching Windows Task Manager and getting rid of anything not used in-flight. In fact, I put together another little text file with a list of all the services I don’t use, and I go down the list and manually shut down each one. If you really want to get this one right, a little bit of research is in order. While online, I launched the task manager (control-shift-escape) and for each service that has my User Name, I googled it. There are a few <a href="http://www.theeldergeek.com/services_guide.htm" target="_blank">good web sites</a> out there which chronicle what all these <a href="http://www.processlibrary.com/" target="_blank">mysterious services do</a>, and you should be able to figure out which you need, and which you don’t. <strong>Important warning:</strong> if you aren’t comfortable with this lingo, you should skip this step, or get some techie friend to help you out. <strong>Less important warning:</strong> you may end up in a situation where you need to do a reboot after you get to your destination.</li><li><strong><a class="imagelink" title="Hibernate options" href="http://www.livedigitally.com/wp-content/uploads/2006/08/ld_hibernateoptions.jpg"><img id="image973" title="Hibernate options" alt="Hibernate options" src="http://www.livedigitally.com/wp-content/uploads/2006/08/ld_hibernateoptions.thumbnail.jpg" align="right" /></a>Do Hibernate, Do Not Suspend.</strong> I’ve found that my Vaio tends to use way too much battery when in suspend mode. Not sure why, but the ‘instant-on’ effect isn’t worth the extra 30-60 seconds it takes to get out of hibernation. Furthermore, the minor hit to the hard drive is unlikely to have a significant impact to your overall battery time. Also, if you weren’t aware, going in and out of hibernate is <em>much</em> better than a full startup/shutdown sequence. Note that you might need to manually enable Hibernate as a system option (once you have, the quick shortcut into it is ‘windows button’ followed by U followed by H, and some PCs will have even faster shortcuts available as well). If you make a run to the bathroom, however, that’s worth a quick Standby, but anything over 10 minutes and I’d Hibernate instead.</li><li><strong><a class="imagelink" title="Advanced power options" href="http://www.livedigitally.com/wp-content/uploads/2006/08/ld_poweradvanced.jpg"><img id="image974" title="Advanced power options" alt="Advanced power options" src="http://www.livedigitally.com/wp-content/uploads/2006/08/ld_poweradvanced.thumbnail.jpg" align="right" /></a>Tweak advanced settings.</strong> Virtually all laptops manufactured in the past 24 months have some advanced power options. Mine, for example, allows me to go into 16-bit color mode, force the CPU into a power-saving mode, disable my LAN port, and more. This might seem obvious, but if you aren’t doing it already, go find these settings (probably in the control panel, or possibly through custom software provided by your manufacturer) and get aggressive with them! If you don’t have any extra control, one good extra tip is to manually force your screen into lower color modes, as they use less CPU overall and can make a huge difference in the long run. While you are at it, you might want to change your Alarms settings, as many laptops default to shutting down with as much as 10% of your battery still available (my Low Battery is just an alert at 5%, and my Critical is force hibernate at 1%)!<br /><img id="image971" title="Advanced Vaio power options" alt="Advanced Vaio power options" src="http://www.livedigitally.com/wp-content/uploads/2006/08/ld_advancedvaiooptions.jpg" /></li><li><strong>Choose Wisely.</strong> Good: Word, Excel, Outlook, Text Editors. Bad: anything by Adobe (you think Microsoft has bloatware, have you noticed how long even Acrobat takes to launch these days???), all Google plugins, many ‘Widgets’, ‘Gadgets’, etc. All I can say is pick your battles wisely. 50 minutes of a video game ate up over 2 hours of my battery time, whereas writing email or documents tend to use up <em>less</em> than what Windows predicts (about 105% of the estimate on average). I’ve also found WinDVD is right on the money for battery consumption, and Windows Media Player is a little power-hungry (by the way, if you are using your laptop to play music make certain you disable visualizations). On that note, don’t use your laptop to play music unless absolutely necessary, it’s a real resource killer.</li><li><strong>Watch That Hard Drive.</strong> I just wrote, don’t play music, but the reason is mostly about your drive. The more it spins, the more power it takes. Make sure you’ve set your basic power option to turn off your drive relatively fast, but not necessarily too fast. Some drives use more power getting started than staying running for short periods of time. I set my Vaio to turn off the disk after 3 minutes of inactivity, you may want more, you may want less. At the end of the day, if you are doing anything that <em>prevents</em> the hard drive from spinning down ever, you are draining your battery more than needed.</li><li><strong><a class="imagelink" title="Power alarms" href="http://www.livedigitally.com/wp-content/uploads/2006/08/ld_poweralarms.jpg"><img id="image975" title="Power alarms" alt="Power alarms" src="http://www.livedigitally.com/wp-content/uploads/2006/08/ld_poweralarms.thumbnail.jpg" align="right" /></a>Like a Boy Scout, Be Prepared.</strong> I make a point of configuring my ‘flight mode’ <em>prior</em> to getting on the plane. It may only take 5-10 minutes to get your system setup properly, but that just eats into your battery life if you wait to do it on the plane. Once done with all the settings, the last thing I do before unplugging my power supply is hibernating the PC.</li></ol> <p>I hope some of these tips help you out. Personally, I add around 30 minutes (or more) to the longevity of my standard battery (3:30 on average now), and almost an hour on the extended one (6:30 or so). This gives me almost 10 hours of combined life (4 full DVDs guaranteed), which suits me quite well.</p>Unknownnoreply@blogger.com0tag:blogger.com,1999:blog-5627826094576484572.post-51927093911077323182009-04-01T18:34:00.000-07:002009-05-05T21:30:38.025-07:00Basic Computer Network Information<span class="maintextlarge2">Introduction</span><p face="arial"> </p> <p style="font-family: arial;" align="justify">A network is a group of things that are connected together. In a computer network, the things that are connected are computers, of course. A computer network can be as small as two computers but there is no maximum size, and many networks have hundreds or thousands of computers.</p> <p style="font-family: arial;" align="justify"> </p><p style="font-family: arial;" align="justify">There are three main reasons for connecting computers in a network:</p> <p style="font-family: arial;" align="justify"> </p><ol style="font-family: arial;"><p align="justify"> <b> </b></p><p align="justify"><b> </b> </p><li><b>Share information</b>. This can be messages such as e-mail, or it can be files that are stored on one computer and used by someone at a different computer.</li><p align="justify"> <b> </b></p><p align="justify"><b> </b> </p><li><b>Share resources</b>. A printer that can be accessed from different computer systems is a shared resource. So is an Internet connection used by more than one computer.</li><p align="justify"> <b> </b></p><p align="justify"><b> </b> </p><li><b>Centralized control</b>. In most offices, the management determines what the computers may be used for and what kind of resources and support they need. This is much easier to deal with if the computers are connected.</li></ol> <p style="font-family: arial;" align="justify"> </p><p style="font-family: arial;" align="justify"><b><a name="_Toc69032173">Types of Networks</a></b></p> <p style="font-family: arial;" align="justify"> </p><p style="font-family: arial;" align="justify">Just as there is no limit to the number of systems in a network, there is also no limit to the geographical size of a network. As a practical matter though, there are some structural differences between a network of computers all in the same room, and a network connecting computers in Los Angeles to ones in Sydney Australia.</p> <p style="font-family: arial;" align="justify"> </p><p style="font-family: arial;" align="justify">The most common network includes computers that are close together, usually in the same building or office. This is called a <b>Local Area Network</b>, abbreviated <b>LAN</b>.</p> <p style="font-family: arial;" align="justify">The computers in a LAN are usually connected with cable made up of pairs of wires, but faster (and more expensive) cables are made from glass fibers, called <b>fiber optic</b> cable. A network may even use radio waves, in which case it is a <b>wireless</b> LAN.</p> <p style="font-family: arial;" align="justify"> </p><p style="font-family: arial;" align="justify">When the computers being connected are far apart, typically in different cities, it is called a <b>WAN</b> or <b>Wide Area Network</b>. The connection is usually done with special high-speed lines leased from the phone company, but it is also possible to connect over an ordinary phone line using a device called a modem. It’s slow, but possible. Accessing a network through a phone line and modem is called a <b>dial-up connection</b>.</p> <p style="font-family: arial;" align="justify"> </p><p style="font-family: arial;" align="justify">The biggest of all networks is the <b>Internet</b>. The backbone of the Internet consists of powerful computers all over the world with high-speed connections between them. Individual computers such as yours then connect to this backbone through an Internet Service Provider or <b>ISP</b>.</p> <p style="font-family: arial;" align="justify"> </p><p style="font-family: arial;" align="justify"><b><a name="_Toc69032174">Ethernet</a></b></p> <p style="font-family: arial;" align="justify"> </p><p style="font-family: arial;" align="justify">Most LANs in existence today use a technology called Ethernet. In an Ethernet network, every piece of information put on the network is seen by every other computer on the network, and each computer must determine if that information is meant for itself.</p> <p style="font-family: arial;" align="justify"> </p><p style="font-family: arial;" align="justify">To make this work, before the information goes out on the network it is first broken up into small pieces called packets, and each packet has added to it the address of the computer that should receive it. The part of the packet containing the address is called the <b>header</b>. </p> <p style="font-family: arial;" align="justify"> </p><p style="font-family: arial;" align="center"><b>Header</b></p> <p style="font-family: arial;" align="center"><img src="http://www.micro2000.co.uk/images/nw_image3.gif" width="335" height="55" /></p> <p style="font-family: arial;" align="justify"><b>Packet diagram</b></p> <p style="font-family: arial;" align="justify">Then, each computer looks at the address on each packet that comes by on the network cable, and copies the ones that have the right address. The computer that sent the packet is called the <b>source</b>, and the one that is supposed to receive it is called the <b>destination</b>.</p> <p style="font-family: arial;" align="justify"><b><a name="_Toc69032175">Network Connections</a></b></p> <p style="font-family: arial;" align="justify">When a packet comes out of the computer that originated it, that packet must have a complete electrical path to every other computer. The simplest way to do this is to have a cable that goes from one computer to the next until it has connected to each one. This is called a <b>bus network</b>.</p> <p style="font-family: arial;" align="center"><img src="http://www.micro2000.co.uk/images/nw_image4.gif" width="367" height="183" /></p> <p style="font-family: arial;"><b><a name="_Toc69032176">Bus Network</a></b></p> <p style="font-family: arial;" align="justify">A bus network is the simplest to explain and draw, but it’s not often the simplest one to use, especially if computers are distributed around various offices in a building, and then get added, taken away, moved around and so forth. </p> <p style="font-family: arial;" align="justify">A much more practical way to connect more than a couple of systems is to connect each one to a device called a hub. Each system has a cable that goes from it to the <b>hub</b>, and inside the hub an electrical connection is made between all of the cables. Each place where a cable plugs into the hub is called a <b>port</b>.</p> <p style="font-family: arial;" align="justify"> </p> <p style="font-family: arial;" align="center"><img src="http://www.micro2000.co.uk/images/nw_image5.gif" width="259" height="170" /></p> <p style="font-family: arial;" align="center"><b>5-port</b> <b>hub ports</b></p> <p style="font-family: arial;" align="justify">To create larger networks, hubs can use one or more of their connections to connect to other hubs. This is called a <b>star network</b>, but as far as the electrical signals are concerned, they go from one computer to every other computer, no different than the bus network.</p> <p style="font-family: arial;" align="center"><img src="http://www.micro2000.co.uk/images/nw_image6.gif" width="423" height="240" /></p> <p style="font-family: arial;" align="center"><b>3-hub star network</b></p> <p style="font-family: arial;" align="justify">When networks get really big, with 100s of systems or more, it’s no longer such a good idea to have each computer look at every packet, because almost none of the packets will be for that computer. The large network can be broken up into smaller groups called <b>subnets</b>, and these are connected with a device called a <b>data switch</b>, or just a <b>switch</b>.</p> <p style="font-family: arial;" align="justify">Within each subnet, all of the computers still see every packet, and so does the switch. Normally the switch won’t pass those packets on to the other subnets, but if the packet has an address for a destination in another subnet, the switch will pass the packet to the port for that subnet. All of the systems in <i>that</i> subnet will then see the packet, including the system it is actually addressed to. In order to know where to send a packet, the switch must have a table of addresses for each subnet. </p> <p style="font-family: arial;" align="center"><img src="http://www.micro2000.co.uk/images/nw_image7.gif" width="507" height="269" /></p> <p style="font-family: arial;" align="center"><b>Switch with 4 subnets</b></p> <p style="font-family: arial;" align="justify">The simplest form of a switch is called a <b>bridge</b>, and it connects just two subnets. A bridge only needs two ports then, one for each of the subnets. </p> <p style="font-family: arial;" align="justify">Sometimes a network will be so big and complex that one switch isn’t enough to connect all of the subnets. In that case the subnet receiving a packet might be connected to a different switch than the subnet where the packet started. This is a more complicated problem, because the switch would need to know not only the packet’s destination, but also where to send it next to make sure it got there. </p> <p style="font-family: arial;" align="justify">For this, a smarter device is needed, called a <b>router</b>. The router needs to know not only the subnet addresses, but also the best path, or route, to get from one to another.</p> <p style="font-family: arial;" align="center"><img src="http://www.micro2000.co.uk/images/nw_image8.gif" width="437" height="165" /></p> <p style="font-family: arial;" align="center"><b>Route path diagram</b></p> <p style="font-family: arial;" align="justify">One place where routers are used in a big way is the Internet. If you send a message on the Internet, it might go through many routers before it reaches its destination. And when you surf to a website, all of the graphics and text showing up on your screen had to go through routers to find their way from the web site to your computer.</p> <p style="font-family: arial;" align="justify">By the way, every LAN that connects to the Internet becomes a subnet of the Internet, even if it has its own internal subnets.</p> <p style="font-family: arial;"><b><a name="_Toc69032177">Clients and Servers</a></b></p> <p style="font-family: arial;" align="justify">In addition to the various ways networked systems can be physically connected, there are two basic ways that network activities can be arranged. In one, all of the computers have equal status. This is called peer-to-peer, because a peer means someone (or something) that is the equal of another. Peer-to-peer is used mostly in very small networks of less than a dozen systems.</p> <p style="font-family: arial;" align="justify">The more common arrangement is called <b>client-server</b>. One system, called the <b>server</b>, is responsible for a particular activity or resource. The other systems are called <b>clients</b>, and they go through the server when they want to use the function or resource that the server is responsible for.</p> <p style="font-family: arial;" align="justify">Some of the things servers are commonly used for include network administration, e-mail, printers, file storage, and Internet access. Often several of these functions will be combined into one machine. There is no rule that says a network server and a print server can’t be the same system.</p> <p style="font-family: arial;"><b> Clients Server</b></p> <p style="font-family: arial;" align="center"><img src="http://www.micro2000.co.uk/images/nw_image9.gif" width="335" height="80" /></p> <p style="font-family: arial;" align="center"><b>print server</b></p> <p style="font-family: arial;" align="justify">There is also no rule that says a server must serve the entire network. It is usually convenient to have a separate network server for each subnet. There are other divisions that can occur even within a subnet. Computers that need to share the same resources can be organized into <b>workgroups</b>. With the Windows NT operating system, the LAN can be divided into sections called <b>domains</b>, and each domain needs its own server called a <b>domain controller</b>.</p> <p style="font-family: arial;" align="justify"><b><a name="_Toc69032178">Protocols</a></b> </p><p style="font-family: arial;" align="justify">A protocol is an agreed-upon standard for how something will be done. When your mother taught you to chew with your mouth closed and keep your elbows off the table, that was a protocol for proper dining. Computer protocols are the rules for connecting with other computers and exchanging information with them. </p> <p style="font-family: arial;" align="justify">Ethernet is a protocol. Earlier we called it a technology, but it is also a set of rules for how that technology is used. If each piece of hardware and software complies with the rules, then information can be correctly transferred from one from one system to another in a LAN. </p> <p style="font-family: arial;" align="justify">There are many protocols used in networking. There are some protocols that are used together with other protocols, where each one takes care of different aspects of networking. Sometimes two protocols do the same thing in different ways, and it is necessary to choose one or the other. The important thing is that both systems trying to communicate with each other have matching protocols that they can use.</p> <p style="font-family: arial;" align="justify"><b><a name="_Toc69032179">TCP/IP</a></b></p> <p style="font-family: arial;" align="justify">One very important set of protocols is called <b>TCP/IP</b>. It is important because it is what the creators of the Internet decided would be used for that particular network, which means that any computer that wants to connect to the Internet must also use TCP/IP. TCP/IP stands for <b>T</b>ransmission <b>C</b>ontrol <b>P</b>rotocol / <b>I</b>nternet <b>P</b>rotocol. </p> <p style="font-family: arial;" align="justify">TCP/IP is actually in two parts. The TCP portion covers the agreements between systems about how they will carry on their ‘conversation’, and the IP portion deals with addressing the packets and routing them.</p> <p style="font-family: arial;" align="justify">The TCP part all happens in the background and we don’t really need to concern ourselves with it under normal circumstances. However, in a network that uses TCP/IP, every system must have a unique <b>IP address</b>, and that is something that requires human intervention in one way or another.</p> <p style="font-family: arial;"><b> </b></p> <p style="font-family: arial;"><b><a name="_Toc69032180">IP Addresses</a></b></p> <p style="font-family: arial;" align="justify">An IP address is made up of four sets of numbers separated by periods. An example is:</p> <p style="font-family: arial;" align="justify"><b>192.168.42.122</b></p> <p style="font-family: arial;" align="justify">Each of these sets of numbers is called an octet, because they started out as 8-digit binary numbers. By changing them into 3-digit decimal numbers, the whole address is shorter and easier to remember. The highest value for any octet is 255, because the highest number you can make with eight binary digits is equal to 255 in decimal. </p> <p style="font-family: arial;" align="justify">In most networks, the first three octets are the same for all systems, and the last octet is different for every machine. If there are more than 255 computers in a network, it is usually divided into smaller subnets. </p> <p style="font-family: arial;"><b><a name="_Toc69032181">Static or Dynamic?</a></b></p> <p style="font-family: arial;" align="justify">There are two ways to associate a unique IP address to a specific computer. One way is for the administrator to assign a number, which stays the same unless somebody decides to change it some day. That number is then a static IP address.</p> <p style="font-family: arial;" align="justify">The other way is to assign a group of addresses to a server, and let the server hand them out as needed to any system that wants to communicate on the network. This produces a <b>dynamic IP address</b>. It is sometimes important to know which method is in use on a network, because with dynamic addressing, the IP address of a machine may be different each time you try to communicate with it.</p> <p style="font-family: arial;"><b><a name="_Toc69032182">Computer Names</a></b></p> <p style="font-family: arial;" align="justify">The example address 192.168.42.122 is only one digit longer than a phone number with area code, but that’s plenty long enough to give most of us a hard time. It’s much easier for people to remember a name instead of a number, and for this reason computers in a network are also given a unique name. It may be something mundane like Sales14, but at least it’s a name and not a number.</p> <p style="font-family: arial;" align="justify">This is not only easier to remember, but it solves the problem of a dynamic address that changes all the time, because the computer name doesn’t normally change. It does create another problem though, because the computers use only the addresses and not the names to keep track of each other. Fortunately there is a part of the TCP/IP protocol called <b>address resolution</b>, and it matches up the names and addresses so things keep rolling smoothly along.</p> <p style="font-family: arial;"><b><a name="_Toc69032183">Security</a></b></p> <p style="font-family: arial;" align="justify"> </p><p style="font-family: arial;" align="justify">The problem with connecting computers to the Internet is that they are then sharing a network with many other computers from all over the world, and the users of some of those other computers are not such nice folks. Protecting the network and the information on it is one of the most important parts of a network administrator’s job.</p> <p style="font-family: arial;" align="justify"> </p><p style="font-family: arial;"><b><a name="_Toc69032184">Encryption</a></b></p> <p style="font-family: arial;" align="justify"> </p><p style="font-family: arial;" align="justify">One way to protect information is to scramble it so that it appears to be gibberish unless someone has the right ‘<b>key</b>’ to unscramble it. Scrambling it is called <b>encryption</b>, and unscrambling it is called <b>decryption</b>. There are many ways to encrypt information, and of course just as many keys to decrypt it.</p> <p style="font-family: arial;" align="justify"> </p><p style="font-family: arial;" align="justify">Encrypting and decrypting information slows things down a bit, so a decision must be made about when to use it. For packets going around the LAN, it depends on how likely it is that someone will gain unauthorized access to the LAN, called <b>hacking</b>. It also depends on how much damage would be done if that happened. If the threat is severe, encryption can be done not only on the transmitted packets but also to information stored on the disk drive.</p> <p style="font-family: arial;" align="justify"> </p><p style="font-family: arial;" align="justify">For information going over the Internet, encryption is much more important unless it’s all right for the whole world to see the information. If you send your credit card number to a vendor, you must trust that vendor to encrypt and safeguard the information.</p> <p style="font-family: arial;" align="justify"> </p><p style="font-family: arial;"><b><a name="_Toc69032185">Virus Software</a></b></p> <p style="font-family: arial;" align="justify"> </p><p style="font-family: arial;" align="justify">A computer virus is a little program that makes copies of itself to send to other computers. It’s very similar in some ways to contagious germs spreading a disease from one person to the next. And like diseases, some of these computer viruses have some really nasty side effects, like wiping out important files in the operating system or filling up the hard drive with garbage data.</p> <p style="font-family: arial;" align="justify"> </p><p style="font-family: arial;" align="justify">As we will discuss a little later, there are ways to keep these virus programs from getting to your computer, but they are not foolproof. A lot of viruses come in attached to e-mail, and then they will mail copies of themselves to everyone in your e-mail address folder. You can’t completely block them without blocking e-mail, and most of us like to get e-mail from our friends and coworkers.</p> <p style="font-family: arial;" align="justify"> </p><p style="font-family: arial;" align="justify">The most important prevention for viruses is to have a good anti-virus program installed on your computer. Norton, McCaffey and Panda are probably the most popular. The next most important thing is to keep the anti-virus software up-to-date, because the delinquents who write virus software are always coming up with new tricks, and the anti-virus companies are just as quickly coming up with new versions to stop them.</p> <p style="font-family: arial;"><b><a name="_Toc69032186">Access Control</a></b></p> <p style="font-family: arial;" align="justify"> </p><p style="font-family: arial;" align="justify">If you have ever had a computer that was connected to a local area network, you almost certainly had to type in a user name and password to get network access. It’s two forms of ID, just like when you cash a check at department store. </p> <p style="font-family: arial;" align="justify"> </p><p style="font-family: arial;" align="justify">The network administrator used that identification information to determine what you could and couldn’t do on the network. And there may have been additional passwords to access the company’ customer database, employee payroll records, or files stored on someone else’s computer.</p> <p style="font-family: arial;" align="justify"> </p><p style="font-family: arial;" align="justify">Here are a few tips about passwords: </p> <p style="font-family: arial;" align="justify"> </p><ol style="font-family: arial;"><p align="justify"> </p><p align="justify"> </p><li>First, if you share files on your computer, use password protection for them even if they are available to everyone in the network. That way they can’t be tampered with if a hacker breaks in. </li><p align="justify"> </p><p align="justify"> </p><p align="justify"> </p><li>In choosing a password, never use your name, your birthday or other obvious personal information. The best is a random combination of letters and numbers.</li><p align="justify"> </p><p align="justify"> </p><p align="justify"> </p><li>Commit the password to memory, and if you must write it down, hide it. A password written on a post-it note stuck to your monitor is probably worse than no password at all.</li><p align="justify"> </p><p align="justify"> </p><p align="justify"> </p><li>Don’t give your password to someone you don’t know personally just because they claim to be tech support, the phone company, the police or your long-lost Aunt Matilda. Refer them to the network administrator, or better yet, get their phone number and have the network administrator call them back.</li></ol> <p style="font-family: arial;" align="justify"> <b><a name="_Toc69032187">Firewalls</a></b> </p><p style="font-family: arial;" align="justify"> </p><p style="font-family: arial;" align="justify">In a building, a firewall is a wall to keep fire from spreading from one area to another. In a computer network, a <b>firewall</b> is a boundary that can block unwanted data packets. The firewall may be program running on the server or router, or it may be a separate piece of hardware or even a complete computer system just for that purpose. In any case, its purpose is to look at all of the packets coming through, and decide which ones can pass and which ones get blocked.</p> <p style="font-family: arial;" align="justify"> </p><p style="font-family: arial;" align="justify"><b>Ports</b> – Several pages ago, we defined a port as the place in a hub that a cable plugs into. There is another completely different kind of thing called a <b>port</b>, and that is a location in a computer’s memory that is used by a device or application to send and receive data. Each application will have one (or more) of these locations for its own use.</p> <p style="font-family: arial;" align="justify"> </p><p style="font-family: arial;" align="justify">For instance, there is a common e-mail program that has port # 110, which means that the program exchanges information with the rest of the system at memory location 110. The popular game called Doom uses port # 666. </p> <p style="font-family: arial;" align="justify"> </p><p style="font-family: arial;" align="justify">When a packet is sent over a network, it will contain not only the destination address, but also the port number of the application that will use it at that destination. One of the ways a firewall controls the packets is by looking at the port number, and only passing packets with ports that are appropriate for the destination. If nobody should be playing Doom on the network’s computers, then it would make sense to block port 666.</p> <p style="font-family: arial;" align="justify"> </p><p style="font-family: arial;" align="justify">Another way a firewall can control traffic is to look at the source of the packet. It can have a ‘prohibited’ list that keeps out packets from certain IP addresses, or it can have an ‘allowed’ list and block everyone who isn’t on it. Ports can be done the same way, with a ‘prohibited’ or ‘allowed’ list of ports.</p> <p style="font-family: arial;"><b><a name="_Toc69032188">Conclusion</a></b></p> <p style="font-family: arial;" align="justify"> </p><p style="font-family: arial;" align="justify">There is much more to know about security, and about networks in general, if one is to be involved in managing them. The purpose of this paper is to present just enough information to enable you talk with network administrators and to understand their concerns when presenting network products to them. For additional training in this subject, we recommend the Micro2000 A+ and Network+ courses.<br /></p><p style="font-family: arial;" align="justify"><br /></p><p style="font-family: arial;" align="justify"><br /></p>Unknownnoreply@blogger.com0tag:blogger.com,1999:blog-5627826094576484572.post-10342699693283183332009-04-01T18:20:00.000-07:002009-05-05T21:30:52.661-07:00Basic Computer Hardware Information<div style="text-align: justify;">This is a very short course about computers. It won't make you into a computer technician, but it will let you talk to one without thinking they are speaking a foreign language. The computers we are interested in are the general-purpose personal computers like we use at our desk, rather than the specialized computer under the hood of your car, or the big mainframe computers that the IRS uses to keep track of us all. </div><div style="text-align: justify;"> </div><p style="font-family: arial; text-align: justify;">For our purposes, a computer can be defined as a machine for processing and storing information electronically. To be useful, it must have a way for us to get information into the machine, and some way to get it out afterwards so we can see it. Therefore, a computer has four basic functions:</p><div style="text-align: justify;"> </div><p style="font-family: arial; text-align: justify;">1. Input<br /> 2. Processing<br /> 3. Storage<br /> 4. Output</p><div style="text-align: justify;"> </div><p style="font-family: arial; text-align: justify;">Every part of a computer system, and everything it does, is connected to one or more of these basic functions. Computers can seem complex because there are many ways of doing each of these functions, and because everything has a new name, often made up of what appear to be nonsense initials like RAM or CPU.</p><div style="text-align: justify;"> </div><p style="font-family: arial; text-align: justify;">To keep it simple, first look up any word or technical term you don't understand. There is a glossary at the back of this course pack with definitions for all the technical terms we use here or that you are likely to hear in talking to technicians. Second, when you encounter any part of a computer for the first time, find out which of these four functions it is used for.</p><div style="text-align: justify;"> </div><p style="font-family: arial; text-align: justify;"><b>Input</b></p><div style="text-align: justify;"> </div><p style="font-family: arial; text-align: justify;">The most obvious device for getting information (also called data) into a computer system is the keyboard. Another common input device is the mouse. Almost any time we use a computer we use one or both of these to get text data or instructions into the system. To get large amounts of information into the computer we would probably use a CD (compact disc), a floppy diskette, a modem connected to a phone line, or a network card connected to a network.</p><div style="text-align: justify;"> </div><p style="font-family: arial; text-align: justify;">With the right sound equipment, a microphone or musical instrument can be used to bring in sound, and a digital camera can download visual information, so these are all being used as input.</p><div style="text-align: justify;"> </div><p style="font-family: arial; text-align: justify;"><img src="http://www.micro2000.co.uk/images/computeritems.gif" width="379" height="272" /></p><div style="text-align: justify;"> </div><p style="font-family: arial; text-align: justify;"><b>Processing</b></p><div style="text-align: justify;"> </div><p style="font-family: arial; text-align: justify;">If we just put information into the computer and took it out again later, computers could be much simpler. Most of the time though, we want to do something with it or change it in some way. Doing something with it is called <b>processing</b>, or <b>data processing</b>. Most of this takes place in a part called the processor, or <b>C</b>entral <b>P</b>rocessing <b>U</b>nit. This is usually abbreviated to <b>CPU</b>.</p><div style="text-align: justify;"> </div><p style="font-family: arial; text-align: justify;"><img src="http://www.micro2000.co.uk/images/p2.jpg" width="256" align="right" height="130" />The CPU is such an important part of the computer that we often refer to a system by the type of CPU it contains. My office computer is a <b>Pentium III</b> but at home I have an <b>Athlon system</b>. Sometimes you will hear the entire computer cabinet called a CPU.</p><div style="text-align: justify;"> </div><p style="font-family: arial; text-align: justify;">To help the CPU there is another part that takes over a lot of the arithmetic. It is called the co-processor and also the <b>N</b>umerical <b>P</b>rocessing <b>U</b>nit or <b>NPU</b>.</p><div style="text-align: justify;"> </div><p style="font-family: arial; text-align: justify;">The smallest piece of data that a computer can process is called a <b>bit</b>, and each bit will be either a one or a zero. For the sake of efficiency, the computer normally deals with a minimum of 8 bits at a time, and 8 bits together is called a <b>byte</b>. This is an important word to remember, because in working with computers you will hear about bytes frequently, and also megabytes which is one million bytes. Megabyte is usually abbreviated MB.</p><div style="text-align: justify;"> </div><p style="font-family: arial; text-align: justify;"><b>Storage</b></p><div style="text-align: justify;"> </div><p style="font-family: arial; text-align: justify;">Information is stored in a computer in several different ways, but the main two are <b>RAM</b> and <b>hard drive</b>, also called a <b>hard disk</b>.</p><div style="text-align: justify;"> </div><p style="font-family: arial; text-align: justify;">The hard drive can store huge amounts of information, and it can keep this information when the computer is turned off. The only problem with hard drives is that it takes too long to get the data from them, because the system must wait as the disk spins until the right part of the disk surface comes under the read heads, and then the drive transfers a block of data in sequence.</p><div style="text-align: justify;"> </div><p style="font-family: arial; text-align: justify;">For information being used at the moment, the system needs to be able to get to any part of that information very quickly. The storage for this information is <b>RAM</b>, which stands for <b>R</b>andom <b>A</b>ccess <b>M</b>emory. Random access means the system can ask for any piece of stored data at random and get it immediately, without waiting for to come up in sequence.</p><div style="text-align: justify;"> </div><p style="font-family: arial; text-align: justify;">Random access is faster than sequential access. The main reason that computers don't just store everything in RAM is that information in RAM is lost whenever the power is turned off. So, the computer needs both RAM and disk storage. Everything stored long-term is on the disk, and whatever is needed at the moment is copied into RAM. If changes are made to the data in RAM, the changes must be copied back to the disk before that computer is turned off so those changes are not lost.</p><div style="text-align: justify;"> </div><p style="font-family: arial; text-align: justify;">When people talk about the memory of a computer, they almost always mean RAM, and not the hard drive or other forms of storage that we haven't covered yet. Sometimes they will say 'main memory' just to be perfectly clear about it.</p><div style="text-align: justify;"> </div><p style="font-family: arial; text-align: justify;"> <b>Output</b></p><div style="text-align: justify;"> </div><p style="font-family: arial; text-align: justify;">There are a number of ways to get data back out of the computer. One of them is right there in front of your face, and that's the <b>monitor</b>. It has a screen that shows you information from the computer, so it is an <b>output device</b>. The monitor and the parts of the computer that run it are known as <b>video</b>. Another common output device is a printer, which of course puts the computer's output on paper for you.</p><div style="text-align: justify;"> </div><p style="font-family: arial; text-align: justify;">Some devices are both input <b>and</b> output, like the floppy diskette mentioned earlier. If you have a modem or network connection, information can go both ways over the line so it's both input and output. In many cases it is practical to consider input and output together, in which case they are called <b>Input/Output</b> and abbreviated as <b>I/O</b>.</p><div style="text-align: justify;"> </div><p style="font-family: arial; text-align: justify;"><img src="http://www.micro2000.co.uk/images/outputs.jpg" width="375" height="181" /></p><div style="text-align: justify;"> </div><p style="font-family: arial; text-align: justify;"> <b>Software</b></p><div style="text-align: justify;"> </div><p style="font-family: arial; text-align: justify;">The physical parts of as computer are called <b>hardware</b>. These are things you can see and touch, and yes, they are hard. </p><div style="text-align: justify;"> </div><p style="font-family: arial; text-align: justify;">These same pieces of hardware are used whether you want to write a letter, balance your checkbook or play a game of computer solitaire, so how does this hardware know what to do, and when to do it? Actually, the hardware parts don't have a clue. They need instructions to tell them what to do, so some of that information we're storing and processing must be the instructions telling the computer what to do.</p><div style="text-align: justify;"> </div><p style="font-family: arial; text-align: justify;">These instructions are called software, and they are organized into <b>sets</b> of instructions called <b>programs</b>. If you want to play a game on the computer, the computer must have a program with the instructions for that particular game. If you want to send e-mail, there must be an e-mail program.</p><div style="text-align: justify;"> </div><p style="font-family: arial; text-align: justify;">One program called the <b>operating system</b> contains the instructions for actually running the computer. Certain things need to be done no matter what you are using the computer for. These are things like getting data on and off the disk, getting information to the monitor screen, and so forth. A program called <b>Windows</b> is the most common operating systems for PCs, and the one used in this office. It comes from a little company called Microsoft. Perhaps you have heard of it. </p><div style="text-align: justify;"> </div><p style="font-family: arial; text-align: justify;">Anyway, the operating system takes care of the basic details of running the computer, and allows other programs to concentrate on their particular tasks. These other programs are called <b>applications</b>, because their job is to <i><b>apply</b></i> the computer to a specific task. When we say software, that can mean the applications, the operating system, or both. </p><div style="text-align: justify;"> </div><p style="font-family: arial; text-align: justify;">There are other little chunks of software that attach to the operating system and tell it how to run particular hardware components or applications. These little chunks are called <b>drivers</b>, and anytime you add a piece of hardware to a system or upgrade to a new version of a device, you will need to have the right driver for that new piece of hardware.</p><div style="text-align: justify;"> </div><p style="font-family: arial; text-align: justify;"> <b>Circuits</b></p><div style="text-align: justify;"> </div><p style="font-family: arial; text-align: justify;">The word 'circuit' means a path something follows that goes back to where it started. In an electrical or electronic circuit, the thing following the path is of course electricity. Whatever work it does and whatever components it must go through on the way, the 'circuit' just means there is a complete path back to the starting point. The word 'circuitry' means the components, and the connections between them, that make up the path. It's as simple as that.</p><div style="text-align: justify;"> </div><p style="font-family: arial; text-align: justify;">In a computer, this word 'circuit' shows up in a couple of places. Most of the components will be found soldered to a '<b>circuit board</b>', also called a <b>printed circuit board</b>. This is a thin board of fiberglass, with the connections between components (called traces) printed right on the board in copper.</p><div style="text-align: justify;"> </div><p style="font-family: arial; text-align: justify;">The components themselves are often something called an <b>Integrated Circuit</b>, abbreviated <b>IC</b>. To integrate means to combine things together, so an integrated circuit is one that combines many circuits into the same part. These are formed on a thin wafer or 'chip' of silicon, and you will sometimes hear an IC being called a '<b>chip</b>'. This is also where we get the name 'Silicon Valley', for the area in Central California where many of them are made.</p><div style="text-align: justify;"> </div><p style="font-family: arial; text-align: justify;">This chip of silicon is put into a case with metal legs, and tiny wires between the wafer and the legs connect those circuits with the outside world. There are now ICs containing millions of transistors and other components, all in a package that will fit in your palm with lots of room to spare.</p><div style="text-align: justify;"> </div><p style="font-family: arial; text-align: justify;"><b>The Motherboard</b></p><div style="text-align: justify;"> </div><p style="font-family: arial; text-align: justify;"><img src="http://www.micro2000.co.uk/images/motherboard.jpg" width="250" align="right" height="206" />The biggest and most important circuit board in a computer is the <b>motherboard</b>. It's called the motherboard because every other part of the computer is connected to it. The CPU plugs into the motherboard, and so does the memory. And all the components that plug into the back of the case, like the keyboard and monitor, are connected from there to the motherboard. It is also called the <b>system board</b>.</p><div style="text-align: justify;"> </div><p style="font-family: arial; text-align: justify;">There is a set of slots near the back edge of the board for plugging in other circuit boards, called <b>adapter cards</b>. These plug-in slots are for things like modems, sound cards, network cards and just about any other add-on feature you can think of. There is a set of traces connecting these slots to each other. A trace goes from Pin 1 of the first slot to Pin 1 of each of the other slots, and other traces connect each of the Pin 2s, each of the Pin 3s, etc. These traces then go on to connect to the memory, CPU, disk drives and other parts of the computer.</p><div style="text-align: justify;"> </div><p style="font-family: arial; text-align: justify;"> <b>The Bus</b></p><div style="text-align: justify;"> </div><p style="font-family: arial; text-align: justify;">These traces are called a bus, and they provide a way for each part of the system to exchange information with every other part. There are different types of bus that have been developed over the years, and your computer may have more than one. The most common one, found in every PC sold today, is called the <b>PCI bus</b>. An older version, still seen in some new computers, is the<b> ISA bus</b>. These are fairly easy to tell apart, because the connector that fits in the PCI slot has smaller pins and more of them.</p><div style="text-align: justify;"> </div><p style="font-family: arial; text-align: justify;">One of the differences between PCI and ISA is that PCI supports a feature called <b>Plug-and-Play</b>, which allows you to add new hardware and have the system detect and configure it automatically. As anyone knows who has used the old method, plug-and-play is a great convenience.</p><div style="text-align: justify;"> </div><p style="font-family: arial; text-align: justify;"><b>Resources</b></p><div style="text-align: justify;"> </div><p style="font-family: arial; text-align: justify;">Since just about everything in the computer uses the bus to exchange data, there must be a way to decide whose turn it is. This is done with something called an <b>Interrupt Request</b>, abbreviated <b>IRQ</b>. Each component or device that will need access to the bus is assigned an IRQ level, from IRQ 0 to IRQ 15, and there are lines on the bus that correspond to these levels. When a device needs to transfer data on the bus, it tugs on the appropriate Interrupt Request line and waits until the CPU grants an interrupt for that level. It's all very nice and orderly. IRQs are an example of a <b>system resource</b>, which is a feature available in limited quantity that must be assigned to specific components.</p><div style="text-align: justify;"> </div><p style="font-family: arial; text-align: justify;">There are other resources too. Each device must have a unique memory location where their data is stored as it is transferred to and from the bus. These locations are called <b>I/O Ports</b>. For the BIOS and any other devices that use ROM, there must be a range of memory set aside, so that ROM and RAM are not trying to use the same addresses. These <b>ROM addresses</b> are a resource just like the IRQs and I/O Ports. Some devices need to transfer large amounts of data directly to and from memory without using an interrupt for each little piece of data. These devices, such as disk drives, are assigned a resource called <b>DMA</b>, for <b>D</b>irect <b>M</b>emory <b>A</b>ccess. Like IRQs, there are 16 DMA levels.</p><div style="text-align: justify;"> </div><p style="font-family: arial; text-align: justify;"><b>Ports</b></p><div style="text-align: justify;"> </div><p style="font-family: arial; text-align: justify;"><img src="http://www.micro2000.co.uk/images/ports.jpg" width="254" align="right" height="360" />In addition to the I/O ports mentioned in the last section which are really addresses, there are physical connections on the back of the computer that are also called <b>ports</b>, and various devices connect to the computer through cables attached to these ports. One of these connections is called the <b>Serial Port</b> because data goes over a single signal line as a <u>series</u> of bits, one right after the other. Serial port connectors have either 9 or 25 pins, with the male connector on the back of the computer and a female connector on the cable. The 9-pin version is more common, and is often used to connect a mouse if there is not a separate mouse connection.</p><div style="text-align: justify;"> </div><p style="font-family: arial; text-align: justify;">Another connection is called the <b>Parallel Port</b> because its cable has 8 parallel signal lines to transmit 8 bits at a time. The computer has a 25-pin female connector on the back, so it won’t be confused with the 25-pin male serial connector. The parallel port is most often used to connect a printer. Computers sold in the last few years will probably also have a connection called <b>USB</b>, for <b>U</b>niversal <b>S</b>erial <b>B</b>us. It is a bus because several devices can be connected on the same cable, but it’s also a port because data goes into and out of the computer cabinet through its connector. There is USB1 and USB2. USB2 is newer and much faster.</p><div style="text-align: justify;"> </div><p style="font-family: arial; text-align: justify;"><b>The BIOS</b></p><div style="text-align: justify;"> </div><p style="font-family: arial; text-align: justify;">As we mentioned earlier, the computer knows what to do by taking instructions from programs stored in RAM. The main instructions come from a program called the operating system, and those instructions direct traffic for other programs called applications.</p><div style="text-align: justify;"> </div><p style="font-family: arial; text-align: justify;">When the computer is turned off, all the instructions copied into the RAM are gone. When the system is turned on again, it needs to go out to the disk, get the operating system and load it into RAM, but there are no instructions in the RAM to tell it how to do this. The solution to this problem is a set of instructions that stay in memory and don’t get lost when the computer is turned off. </p><div style="text-align: justify;"> </div><p style="font-family: arial; text-align: justify;">This set of instructions is called the <b>BIOS</b>, for <b>B</b>asic <b>I</b>nput <b>O</b>utput <b>S</b>ystem. Since the instructions don’t need to change, they can be stored in a different kind of chip than we use for RAM. It’s called <b>ROM</b>, for <b>R</b>ead <b>O</b>nly <b>M</b>emory. We say that the instructions in the BIOS are <b>hard-wired</b>, and instead of software they are called <b>firmware</b>. </p><div style="text-align: justify;"> </div><p style="font-family: arial; text-align: justify;">The computer goes through a process called <b>booting up</b> when it is first turned on. This involves executing the BIOS instructions, loading the operating system from disk into RAM, and then turning control of the computer over to the operating system after everything checks out OK. The term refers to somebody pulling themselves up by their own bootstraps (without outside help, in other words). Any computer term that includes ‘boot’ will have something to do with this start-up process.</p><div style="text-align: justify;"> </div><p style="font-family: arial; text-align: justify;"><b>CMOS and RTC</b></p><div style="text-align: justify;"> </div><p style="font-family: arial; text-align: justify;">There is other start-up information that normally stays the same but that we might want to change once in a while. This includes info about the various pieces of hardware connected to the system, which disk drive to check first for the operating system and that sort of thing. This data can’t be stored on the hard drive because we need it to boot up. It can’t be stored in RAM because it will be lost at power-off, and it can’t be stored in the BIOS because we might need to change it.</p><div style="text-align: justify;"> </div><p style="font-family: arial; text-align: justify;">The problem is solved by a type of RAM chip that uses very low power, and it is connected to a battery. This type of low-power memory chip is called <b>CMOS</b>. It stands for the type of technology used in the chip, which is <b>C</b>omplementary <b>M</b>etal <b>O</b>xide <b>S</b>ubstrate. This is probably more than you need to know, but I’m a fanatic about defining things. By the way, since batteries don’t last forever, if you leave your computer unplugged for about 5 years you’ll find it needs a bit of trickery to get it to boot again, because the CMOS information will be gone.</p><div style="text-align: justify;"> </div><p style="font-family: arial; text-align: justify;">There is another feature in the computer that has the same requirements as CMOS, and that is the date and time function. This obviously needs to change very minute, but we don’t want to lose track when the computer is turned off. The circuitry for this is called the <b>RTC</b> or <b>R</b>eal <b>T</b>ime <b>C</b>lock, and for convenience it is usually included in the same chip with the CMOS. A little trickle of juice from the CMOS battery keeps the clock running, and when you turn the computer on again it knows exactly what time and day it is. Convenient, isn’t it?</p><div style="text-align: justify;"> </div><p style="font-family: arial; text-align: justify;"><b>More About Video</b></p><div style="text-align: justify;"> </div><p style="font-family: arial; text-align: justify;">The monitor is a passive device that just displays the video output from the system. However, so much data is needed for the constantly changing screen display that special provisions are made for it.</p><div style="text-align: justify;"> </div><p style="font-family: arial; text-align: justify;">The video card (or video circuitry on the motherboard) has its own RAM memory just to hold the display information, and its own ROM BIOS to control the output. Some motherboards even have a special high-speed connection between the CPU and the video. It’s called the <b>AGP</b>, or <b>A</b>ccelerated <b>G</b>raphics <b>P</b>ort.</p><div style="text-align: justify;"> </div><p style="font-family: arial; text-align: justify;">The important numbers in evaluating a video display are how many distinct colors can be displayed and also the <b>resolution</b>, which is how many pixels the image contains across and from top to bottom. Each dot of color making up the image is one <b>pixel</b>. As video technology evolved there have been a number of standards, and each one has its own set of initials like EGA, CGA or VGA. A common one is <b>SVGA</b>, which stands for <b>S</b>uper <b>V</b>ideo <b>G</b>raphics <b>A</b>rray and has a resolution of 800x600 (that’s 800 pixels across and 600 down). Some high-performance monitors use <b>SXGA</b> (1280x1024) or even <b>UXGA</b> with a resolution of 1600x1200.</p><div style="text-align: justify;"> </div><p style="font-family: arial; text-align: justify;"><b>More About Disk Drives</b></p><div style="text-align: justify;"> </div><p style="font-family: arial; text-align: justify;"><b><img src="http://www.micro2000.co.uk/images/floppy.gif" width="175" align="right" height="164" />Floppies</b> – Although floppy drives are being phased out in some new computers, there are still millions of them out there and you should know something about them. The floppy drive has a little slot on the face of the computer cabinet, and into this slot you can slide a floppy diskette like the one shown here. One of the reasons floppy drives are still around is that it is very easy to take a floppy diskette from one system to another.</p><div style="text-align: justify;"> </div><p style="font-family: arial; text-align: justify;">Inside the floppy diskette is a round flat disk coated with iron oxide on each side so that data can be stored on it magnetically. This disk is called a <b>platter</b>, and it spins underneath an electro-magnet called the <b>write head</b> that puts data onto the platter surface. There is another head called the <b>read head</b> that copies data from the platter.</p><div style="text-align: justify;"> </div><p style="font-family: arial; text-align: justify;">Once the disk has made one complete revolution, data is written all the way around. That is called a <b>track</b>. The head then moves a bit and writes another circle of data to create a second track. Altogether, there are 80 tracks on each side, for a total of 160. Altogether, the floppy can hold 1.44 MB (megabytes) of data.</p><div style="text-align: justify;"> </div><p style="font-family: arial; text-align: justify;">If we are looking for just a few bytes out of 1.44 million, it’s not enough to know which track it is in. To help narrow the search, the track is divided into 18 pieces, called <b>sectors</b>, which look much like a slice of pie. Each sector holds 512 bytes of data, so if we know the track and sector number of the data we want it won’t be hard to find.<b><img src="http://www.micro2000.co.uk/images/floppy2.gif" width="175" align="right" height="175" /></b></p><div style="text-align: justify;"> </div><p style="font-family: arial; text-align: justify;"><b>Hard Drives</b> – On a hard drive, data is also organized into tracks and sectors. While each sector still holds 512 bytes, there can be many more tracks and sectors on a platter. There are also multiple platters, one on top of the other like a stack of pancakes. Hard drives can hold much more data than floppies, sometimes into the billions of bytes, called <b>gigabytes</b> (<b>GB</b>).</p><div style="text-align: justify;"> </div><p style="font-family: arial; text-align: justify;"> </p><div style="text-align: justify;"> </div><p style="font-family: arial; text-align: justify;">Multiple platters require multiple read and write heads, all attached to the same arm so they move together. It’s called an actuator arm. When we are reading track number 10 on the top platter, the other heads are also positioned over track 10 of the other platters, and together all of these track 10s make up a <b>cylinder</b>. To specify the location of data on a hard drive it is necessary to say what cylinder, then the track and sector. Moving the heads from one cylinder to another is called a <b>seek</b>, and the amount of time this takes is the <b>average seek time</b>. </p><div style="text-align: justify;"> </div><p style="font-family: arial; text-align: justify;"><img src="http://www.micro2000.co.uk/images/platters.gif" width="325" align="left" height="228" />Although hard drives can hold much more data than floppies, the platters are sealed into a metal case that is fastened inside the computer cabinet, so it’s not an easy matter to move from one system to another like you can with floppies. A hard drive is sometimes called a <b>fixed disk</b> for this reason.</p><div style="text-align: justify;"> </div><p style="font-family: arial; text-align: justify;">Operating systems use a couple of different methods to keep track of what data is stored where on a drive. One common method uses a table called a <b>File Allocation Table</b> or <b>FAT</b>, which is a section of the disk with pointers to data locations. There are two versions, called <b>FAT16</b> and <b>FAT32</b>. Windows NT, XP and 2000 use a similar method called <b>NTFS</b>.</p><div style="text-align: justify;"> </div><p style="font-family: arial; text-align: justify;">There are two different interfaces commonly by hard drives to talk to the rest of the system. These are called <b>IDE</b> for <b>I</b>ntegrated <b>D</b>rive <b>E</b>lectronics, and <b>SCSI</b> for <b>S</b>mall <b>C</b>omputer <b>S</b>ystem <b>I</b>nterconnect. The technical differences are not important at this point, but you should know about the two types because they are not interchangeable.</p><div style="text-align: justify;"> </div><p style="font-family: arial; text-align: justify;">Figuring out where the heads should go next and then moving them there is the job of some electronic circuitry called the <b>disk controller</b>. Every disk drive has its own controller, which may be on the motherboard or inside the drive itself, depending on the type of drive.</p><div style="text-align: justify;"> </div><p style="font-family: arial; text-align: justify;">There are a few more things you should know about disk drives before we leave the subject. The first sector of Cylinder 0, Track 0 is called the <b>boot sector</b>, and it contains a <b>Master Boot Record</b> (<b>MBR</b>) that shows whether the disk contains an operating system and the location of the code. If there is more than one operating system, the drive must be divided into multiple <b>partitions</b>. If not, then the whole drive will be a single partition. All of the disk space assigned to a partition is called a <b>volume</b>.</p><div style="text-align: justify;"> </div><p style="font-family: arial; text-align: justify;">Another term you will encounter is a <b>disk format</b>. There is a <b>high-level format</b>, which creates a new file allocation table and is done with a FORMAT command. There is also a <b>low-level format</b> that creates a new pattern of sectors. A low-level format must be followed by an FDISK command to create a new Master Boot Record and partitions.</p><div style="text-align: justify;"> </div><p style="font-family: arial; text-align: justify;">Last, we have the word <b>media</b>. This refers to the actual surface holding the data, which is the platter in the case of a disk drive. Because the floppy platter can be taken out of the drive, it is called <b>removable media</b>, while a hard drive is called <b>fixed media</b>.</p><div style="text-align: justify;"> </div><p style="font-family: arial; text-align: justify;"><b>Other Drives</b> – Most systems today, especially home systems, have additional storage drives that use <b>CD</b> or <b>DVD</b> discs. The technology for both is similar but DVDs hold much more data. These drives do not store data magnetically but use optical markings that are read with a laser. They are mostly used just to read data and not to write it. The full name for CD in fact is <b>CD-ROM</b>, which stands for <b>C</b>ompact <b>D</b>isc - <b>R</b>ead <b>O</b>nly <b>M</b>emory. However, there are versions that can be used to write also, and these are called <b>CD-RW</b> and <b>DVD-RW</b>. Even so they are mostly used to write just once for permanent storage, and are not practical for constantly changing data.</p><div style="text-align: justify;"> </div><p style="font-family: arial; text-align: justify;">Like hard drives, CD-ROM drives can use either an IDE or SCSI interface. The version of IDE for CD-ROM drives is called <b>ATAPI</b>, and for SCSI the CD-ROM version is <b>ASPI</b>. </p><div style="text-align: justify;"> </div><p style="font-family: arial; text-align: justify;">Because the discs can be removed, CD-ROM and DVD are considered removable media. There are other types of removable media also that are not as common, such as <b>tape drives</b> and <b>Zip disks</b>, which are similar to floppies but with a storage capacity of 100 or 250 MB. Zip disks and tape drives also use the ATAPI interface.</p><div style="text-align: justify;"> </div><p style="font-family: arial; text-align: justify;"><b>More About Memory</b></p><div style="text-align: justify;"> </div><p style="font-family: arial; text-align: justify;">RAM memory is installed in the system on little circuit boards called modules that plug into the motherboard. This makes it very convenient to add more memory by plugging in another module. Older computers used a <b>SIMM</b>, which stands for <b>S</b>ingle <b>I</b>nline <b>M</b>emory <b>M</b>odule, and later ones use a <b>DIMM</b> or <b>D</b>ual <b>I</b>nline <b>M</b>emory <b>M</b>odule. The difference is that DIMMs have different signals on each side of the module connector, and the additional signals allow more memory addresses and more data lines going in and out.</p><div style="text-align: justify;"> </div><p style="font-family: arial; text-align: justify;"><img src="http://www.micro2000.co.uk/images/dimm.gif" width="236" align="right" height="276" />The amount of memory is always is some multiple of two bytes. The most common values are 32, 64, 128, 256 or 512 megabytes.</p><div style="text-align: justify;"> </div><p style="font-family: arial; text-align: justify;">As it is used by the system, RAM is divided into base memory and extended memory. <b>Base memory</b> is the first megabyte, and <b>extended memory</b> is everything over that. The very first PCs had only base memory, and then a scheme was developed called <b>expanded</b> memory that tricked the computer into allowing more than 1 MB of memory. Once extended memory was developed though, expanded memory quickly became obsolete and will only be found in older computers.</p><div style="text-align: justify;"> </div><p style="font-family: arial; text-align: justify;">Another memory term you will encounter is <b>cache</b> memory. This refers to memory that is not on DIMMs but is either built into the CPU or connected directly to the motherboard near the CPU. It provides even faster access than RAM for the data that the CPU expects to need next. The contents of the cache will change constantly depending on what the CPU is doing.</p><p style="font-family: arial; text-align: justify;"><br /></p><p style="font-family: arial; text-align: justify;"><br /></p>Unknownnoreply@blogger.com0tag:blogger.com,1999:blog-5627826094576484572.post-59258170890158040212007-09-16T01:12:00.000-07:002009-09-16T01:14:29.586-07:00<div id="cse-search-results"></div><br /><script type="text/javascript"><br /> var googleSearchIframeName = "cse-search-results";<br /> var googleSearchFormName = "cse-search-box";<br /> var googleSearchFrameWidth = 800;<br /> var googleSearchDomain = "www.google.com";<br /> var googleSearchPath = "/cse";<br /></script><br /><script type="text/javascript" src="http://www.google.com/afsonline/show_afs_search.js"></script>Unknownnoreply@blogger.com0