Get Paid While Promoting Your Business!

Online Shopping

Flipkart.com

Wednesday, September 23, 2009

Desktop

0 comments
After you have started the computer, the area you are looking at is called the desktop. "desktop" will always refer to the whole area of the monitor screen.



Read more...

Folder

0 comments




A folder is one of the containers you will be using to store or locate your work. You will eventually learn how to create and manipulate folders. The My Computer, Network Neighborhood, and Recycle Bin programs are a kind of folder referred to as System Folder(s), they come standard with your computer. They have fancy (artistic) icons. The folders you create are in yellow color with a small tab and are considered "user created" folders.
Read more...

Recycle Bin

0 comments
When you get rid of (delete) some things on your computer (folders or files), they go to an area called the Recycle Bin where you still have a chance of recalling (retrieving or restoring) them.
Read more...

Network Neighborhood

0 comments
You use Network Neighborhood to communicate with other computers if yours is part of a network.
Read more...

My Computer

0 comments
My Computer is used to explore the content of your computer and to do other routine things.
Read more...

Saturday, September 19, 2009

Shareware

0 comments
What is shareware? 
Shareware is software that you ‘Try before you buy it’. Some shareware has no price, instead the author may give it away free (freeware) or ask for a “donation” of money.But most shareware has a price, and the free trial ends after (1) so many uses or (2) or so many days or(3) has some features crippled or (4) some combination of 1, 2 and 3. In addition there may be demo shareware which demonstrates some of the features of the software but demo software is not shareware unless you can add a “key” (you pay for the key) and activate the demo to a full version.I use shareware more than I use conventional software. But like regular software shareware has its problems, and can even have problems that on’t exist in conventional software.
 

Problems with shareware:Some shareware titles contain ads, adware, spyware and other noxious software. If you are going to use shareware you need to have on your computer working and updated: (1) antivirus (paid versions such as one of the following: Norton Antivirus, PC-Cillin, McCafee, Computer Associates, Panda work best, (2) anti adware/anti spyware/ anti worm software such as Microsoft’s free antispyware.Other problems include the software not being fully windows compliant and causing bugs on your computers performance, the author retiring (giving up and failing to support the product), plus all the ordinary problems you can have with any software such as difficulty removing the software when you want to remove it.Visit the shareware author’s website and see if the author states there is no adware, etc. in the software.
Read more...

Friday, September 18, 2009

Laptop Computer

0 comments
Laptop : A laptop is also called a notebook. A laptop is only physically smaller than a desktop but, everything considered, it can do anything that a desktop can do. A computer is called laptop that you can carry it on your laps when traveling or commuting.
Read more...

Desktop Computer

0 comments


Desktop : A desktop computer is made of different parts that are connected with cables.The monitor would be placed on top of the table. This is the most common type of computers used in the office or at home.


Read more...

Backup

0 comments
Where to Back Up?

  • Disks - This is the least desirable option for two reasons. First, floppy disks do not hold very much. Second, they fail fairly often, and seem to do so just when you need them most. I tell people that they should never store anything important on a floppy disk. Floppy disks are for moving files, not storing files.
  • Drive - This is an excellent choice as long as you are careful about picking which things to back up. You cannot do a complete backup of your entire hard drive this way, but I will argue later that for most of us we do not need to a complete backup of our hard drive anyway. Zip drives are just one of several brands of large-capacity drives which hold 100-200 MB of data on a single disk. So if you have one of the other brands that will work out just fine as well.
  • Recordable - A blank CD will hold 650MB of data, and the disks themselves are cheap, as low as $1 a piece in quantity. If your hard drive is not too large, you could use several of these to a do a complete backup as well. If you want to look at this option, experts suggest that you stick to SCSI drives only unless you like making coasters. The drive itself will probably cost around $250-300 for a decent one, plus a SCSI controller card if you don't already have one, which can cost $50-100 more.
  • Tape - If you are going to do a complete backup of your entire hard drive, this is the usual way to go. There are people who need to do this. Usually, they are System Administrators backing up the hard drives of Network Servers. Most home users do not really need to do this. If you already have a tape drive, by all means use it for backups. But if you don't already have one, you might be better off buying a Zip drive or the equivalent.
  • Web site - Yes, there are now places online that will give you free storage space, often in amounts as large as 250 MB. This is great if you don't have any other option for storing your critical files. But news reports say half of all Dot.Coms will go out of business next year. What if one of them takes all of your backups with them when they go? I have never been able to convince myself that storing my backups online is really a good idea. There are companies that do this for a fee that are quite reliable, but they cost a lot and are aimed at corporate clients.
  • Network Drive - These days, more and more people have two or more computers in the home, and they are starting to network those computers. This is a great opportunity for a backup solution as well. If you have a server on your network, you can back up to the server. If your network is peer-to-peer, computers can backup to each other!
  • Second hard drive - If your computer has a second hard drive, backing up to that second drive can at least protect you against data loss due to hard drive failure. That is better than no backup at all.
  • Different directory - This does not give you much protection, but it does protect you against file corruption in the original files, including some types of virus infections. It is the most minimal protection, but better than nothing.

Read more...

Search Engine

0 comments
In order to make use of Easily Search Engine Submission, your domain name MUST be hosted with Easily. Search Engine Submission does NOT work for domains which use web forwarding to point to the website, or are hosted on our basic EasilyMe package.

HOW DOES IT WORK?
1. Submission of your web site every month to the 400+ major global and regional search engines (Google, AOL, Wanadoo, Yahoo!, Altavista etc).
2. Submission report by email every month detailing what search engines you have been submitted to.
3. Rank tracking and link popularity report via your control panel.

Here is a partial list of the search engines & directories we submit your website to:

Major search engines and directories
Yahoo!, Google, MSN, AOL, Overture, Excite, Lycos, iWon, HotBot, DogPile, Ask Jeeves, WebCrawler, MetaCrawler, InfoSpace, Netscape Search, Alltheweb, About, Alexa, Go, Looksmart, NBCi, Search King, Search.com, Espotting, EarthLink, ScrubTheWeb, Mamma, Teoma, Altavista

2nd level search engines and directories
WhatUSeek, WiseNut, ICQ, Euroseek, Go2net, Enhance, Gigablast, Vivisimo, ExactSeek, Nation, Wired, Surfwax, ixQuick, Infontware, Fazzle, infoGrid, ZapMeta, Finger, MetaEureka, Aeiwi, EntireWeb, Jayde, 100hot.com

General Search Engines
Turbo10, QueryServer, CurryGuide, ithaki.net, B Central, API Links, CanLinks, 2Kcity, Aesop, Allestra, Beamed, Coyotesearch, CozyCabin, Goto411, Hidden Street, IdoFind, Imarvel, Info Apex, Intel Search, Jblue, MixCat, NerdWorld, NetSearch, Newwebstuff, PrimeFind, Raging Banners Search, Search Ave, Search it, SurfGopher Directory, TureSEarch, Try America, Turnpike Emporium, Voyager, Web Trawler, 1CokeMKG Link Page, 1TennPuters Link Page, Aatrax, AdWebZone, classified2000, Cognigen Telecom, Emailpromoter, F10, Multilinks, Netrogenic, Submit One, Super P, The Rail Links, Traffic Wave, TrueMoney4u, 911Hits, FFA Farm, Link2U

UK Specific Search Engines
Yahoo UK, Google UK, MSN UK, Netscape UK, AOL UK, Mirago, Abacho UK, Wanadoo, global.net.uk, BBC, Doras, FindOnce, Excite UK, Foundya, HotBot UK, Official Site Register, Search UK, Spark Search, searchengine UK, Selu, UKDirectory

Plus many hundreds more!!!!!!!!!!!!!!!!!!!!
Read more...

Thursday, September 17, 2009

Wireless or Computer Networking

0 comments
In the world of computers, networking is the practice of linking two or more computing devices together for the purpose of sharing data. Networks are built with a mix of computer hardware and computer software.
Read more...

IP Address

0 comments
Definition: The IP address 192.168.0.1 is the default for certain home broadband routers, principally various D-Link and Netgear models. This address is set by the manufacturer at the factory, but you can change it at any time using the network router's administrative console.
192.168.0.1 is a private IPv4 network address. Home routers can use it to establish the [default gateway. On such routers, you can access its administrative console by pointing a Web browser to http://192.168.0.1.
Any brand of router, or any computer on a local network for that matter, can be set to use this address or a comparable private IPv4 address. As with any IP address, only one device on the network should use 192.168.0.1 to avoid address conflicts.

Read more...

Windows Version

0 comments
* Microsoft Windows XP Professional
* Microsoft Windows XP Home Edition
* Microsoft Windows Server 2003 R2 Datacenter Edition (32-Bit x86)
* Microsoft Windows Server 2003 R2 Datacenter x64 Edition
* Microsoft Windows Server 2003 R2 Enterprise Edition (32-Bit x86)
* Microsoft Windows Server 2003 R2 Enterprise x64 Edition
* Microsoft Windows Server 2003 R2 Standard Edition (32-bit x86)
* Microsoft Windows Server 2003 R2 Standard x64 Edition
* Microsoft Windows Server 2003, Datacenter Edition (32-bit x86)
* Microsoft Windows Server 2003, Datacenter x64 Edition
* Microsoft Windows Server 2003, Enterprise x64 Edition
* Microsoft Windows Server 2003, Enterprise Edition (32-bit x86)
* Microsoft Windows Server 2003, Standard x64 Edition
* Microsoft Windows Server 2003, Standard Edition (32-bit x86)
* Windows Server 2008 Datacenter without Hyper-V
* Windows Server 2008 Enterprise without Hyper-V
* Windows Server 2008 for Itanium-Based Systems
* Windows Server 2008 R2 Datacenter
* Windows Server 2008 R2 Datacenter without Hyper-V
* Windows Server 2008 R2 Enterprise
* Windows Server 2008 R2 Enterprise without Hyper-V
* Windows Server 2008 R2 Standard
* Windows Server 2008 R2 Standard without Hyper-V
* Windows Server 2008 Service Pack 2
* Windows Server 2008 Standard without Hyper-V
* Windows Server 2008 Datacenter
* Windows Server 2008 Enterprise
* Windows Server 2008 Standard
* Windows Vista Enterprise 64-bit Edition
* Windows Vista Home Basic 64-bit Edition
* Windows Vista Home Premium 64-bit Edition
* Windows Vista Ultimate 64-bit Edition
* Windows Vista Business
* Windows Vista Enterprise
* Windows Vista Home Basic
* Windows Vista Starter
* Windows Vista Ultimate
Read more...

COMPUTER VIRUS

0 comments
A computer virus is a computer program that can copy itself and infect a computer without permission or knowledge of the user. However, the term "virus" is commonly used, albeit erroneously, to refer to many different types of malware programs. The original virus may modify the copies, or the copies may modify themselves, as occurs in a metamorphic virus. A virus can only spread from one computer to another when its host is taken to the uninfected computer, for instance by a user sending it over a network or the Internet, or by carrying it on a removable medium such as a floppy disk, CD, or USB drive. Additionally, viruses can spread to other computers by infecting files on a network file system or a file system that is accessed by another computer. Viruses are sometimes confused with computer worms and Trojan horses. A worm can spread itself to other computers without needing to be transferred as part of a host, and a Trojan horse is a file that appears harmless until executed.

Most personal computers are now connected to the Internet and to local area networks, facilitating the spread of malicious code. Today's viruses may also take advantage of network services such as the World Wide Web, e-mail, and file sharing systems to spread, blurring the line between viruses and worms. Furthermore, some sources use an alternative terminology in which a virus is any form of self-replicating malware.

Some viruses are programmed to damage the computer by damaging programs, deleting files, or reformatting the hard disk. Others are not designed to do any damage, but simply replicate themselves and perhaps make their presence known by presenting text, video, or audio messages. Even these benign viruses can create problems for the computer user. They typically take up computer memory used by legitimate programs. As a result, they often cause erratic behavior and can result in system crashes. In addition, many viruses are bug-ridden, and these bugs may lead to system crashes and data loss.
Read more...

Wednesday, September 16, 2009

Video Card

0 comments
Your video card performs the function of displaying the screen you see on the monitor. Inside the video card is a special kind of memory called video memory, where information is stored that represents what you see on the screen. If you look closely at the screen you can see that it is made up of many dots, or pixels. Each pixel's color and brightness is stored in the video memory. When the computer wants to display something, it calculates how it needs to change the color and brightness of the different pixels, and changes the values in the video memory. The video card then presents the new pixels to you on the monitor. In modern computers, this calculating job is shared between the processor and the video card itself. Having the video card do the calculation can often be much faster, because the video card is specialized to do these types of calculations. Also, while the video card is doing this work, the processor can go on to other things.
Read more...

Tuesday, September 15, 2009

Things To Check First

0 comments

Although a list of things to check won’t catch every PC problem you encounter,
you’ll be surprised at how often the simple steps below can lead to
troubleshooting success. Whether you’re kicking off a troubleshooting session or
at your wits’ end after hours of fruitless research, here are some good tips to try.
  • Is the PC’s power supply switch turned on? Some PCs have a power switch at

the back. Make sure it hasn’t been switched off.
  • Are all cables connected? Loose connections regularly cause headaches. Remove

and reconnect each plug firmly, even if you’re sure it’s connected.
  • Are all peripherals turned on? Make sure a powered-off print server isn’t preventing

your printer from working.
  • Does the Device Manager display any problems? Check this tool for red Xs,

which indicate a malfunctioning or disabled device.
  • Is there a new driver? Updated drivers often fix hardware problems. If you can’t find

new drivers (check the manufacturer’s Web site), try reinstalling your existing driver.
  • Have you installed software updates? Software publishers sometimes release

patches via their Web sites. Also, check to see if your software recently installed
updates automatically. In rare cases, a software update may introduce problems.
Read more...

The Peripherals

0 comments
Some other parts, not required, can also be connected to the computer to complement it. A peripheral is an object attached to the computer to help it perform some necessary assignments none of the other parts can handle. The most used peripherals are the printer, a digital camera, a scanner, a projector, an external drive (such as an external CD burner for an old computer), etc.
Read more...