Monday, November 15, 2010

How to Sell Used Computers

By: Lesley Lyon

Many people sell their used computers for a variety of reasons. Some sell their used computer instead of throwing them as a trash get some money from them, while others sell their used computers to buy new computers with the latest features and technology. Not only individuals sell their used computers, but also large numbers of organizations or firms sell their used computers. They do so because the computer systems may require maintenance and repairs, after some time due to the decrease in performance seen in the computers after some years. Instead of spending more money on the maintenance and repairs they sell and gain money, as there is a great demand for used computers. Such companies easily sell their used computers online through auctions or exchange for new computers with less effort in no time.

Used computers are bought by either students who do not have good savings or earnings or they are bought by educational institutions like the schools and universities. Some parents buy used computers for their children just for browsing the Internet and to play games. For this purpose, a used computer is more than sufficient than spending huge amounts on a new computer. These target segments however require used computers in a good working condition as well as for a lesser price. Most of the used computers are sold in the online market, as it attracts all sorts of buyers. There are many numbers of online classifieds or auctions or online dealers who sell used computers. Selling used computers are a better option than throwing them as trash or keeping them in a corner occupying space and collecting dust.

The first and important step is to improve the appearance of the used computer by wiping it clean free of dust and dirt. Any buyer would get impressed by the way the computer looks, looks make the first impression. The selling price of a clean used computer is always better than the one, which is full of dirt and dust.

All the software manual, operating system and other supporting discs that came with the computer should be in tact. This will add more value, when selling the used computer and also will make the buyer consider the person who is selling the used computer as a trusted seller.

The most important thing to do before selling a used computer is to erase all the personal details or information from the hard disk or drive. Instead of just putting them in the trash folder it is very important to purge all the personal data from the computer's memory, even invisible backup files can cause danger. A tech savvy person's help can be got if the seller does not know how to do it. If not done it may lead to accessing the bank accounts, or emails by any unknown person leading to identity theft. For that when there is a remedy. Unused scanners, printers can also be bundled with the sale of the used computer. A buyer may sometime value it. The benefits or features of the computer can be highlighted for better sales.

About the Author

Lesley Lyon contributes several informative articles regularly to http://www.laptopmall.info and http://www.bestusedcomputers.info which have exhaustive resources for computers, laptops and the other related accessories.

(ArticlesBase SC #223891)

Article Source: http://www.articlesbase.com/ - How to Sell Used Computers

The Best And Simplest Computer Virus Protection

By: Maxwell Z. Rubin

Many computer users live in fear of computer viruses. It is true that computer viruses can do a lot of damage that most likely could have been easily prevented - that is if they had a working up to date virus program.

First of all be reassured. Even if your computer is "wiped clean" or "wiped out" you may not be in the doghouse so to speak. If you use the computer mainly for browsing on the internet, then it is only a matter of a reinstall of windows to get you on the web again. Your computer is only a device to access the internet. It is as if you get a new phone to plug into the wall or a new TV to watch the channels that were there that were and are still there.

Your email most likely is safe as well. If you use a web based mail program like hotmail or yahoo to access your email - then your email is most likely still sitting on that company's server in California, Bombay India or somewhere else in the world. If Microsoft goes bust, your lost email will be the least of your problems in today's world. If you use a mail reader client like Microsoft Outlook or Outlook Express, then at the worst your new email is sitting safely at that computer mail server computer.

Next it can be can be said that we have gotten off easy with computer viruses. Well at least up the present. Computer viruses can be written by its developer to do anything the developer wishes. For the most part computer viruses have been relatively innocuous. The majority of the computer viruses that you will encounter, at present, in your career as computer user, are of the "Trojan" variety and are not that mean or destructive to your computer. . Trojan antivirus are computer viruses that patiently sit in wait for a signal from a control computer, somewhere in the world, to be part of a large scale computer attack on some remote computer to overwhelm that service and disrupt its function on the internet.. You may have heard such tales in regards to C.N.N. or Amazon having their internet service being knocked out of service maliciously. Believe it or not it is estimated that up to 50 - 60 % of most computers have these Trojan viruses sitting quietly and patiently in their computers and do not know and most likely will never know that they are infected.

The first rules of computer security is that if the computer is used at for storing delicate, sensitive or important data - then that computer should not be attached to the internet or have an internet connection. It's as simple as that. If you don't talk then you can never be accused of blabbing.

As an example there was a firm that was allowed access to very confidential government data as part of its business plan. . It was made very clear, by the government agency involved as a sponsor, that this data was most confidential. I f this information was somehow leaked or placed on the internet then dire consequences would occur. What could be a simpler message? And yet in this case, all for the convenience of the owner of the firm, the computer was directly attached to a fax computer. Even of that computer was only connected to the fax max machine computer for a split second that is all it would take for the wrong information to "get out". Politicians follow the rule of deniability. Why shouldn't you. ? Make your life trouble free. If the computer is nowhere near the internet in any way shape or form you can never be blamed. Simple as that.

The most important factor in computer antivirus protection is not so much the product used or installed - and there is no shortage of very reasonable computer antivirus products. The most important factor for computer antivirus security protection is that updates for the antivirus be done on a regular basis.

When you purchase a new antivirus product or complete a renewal product that is in essence what you are doing. It as if you are buoying a magazine subscription for the year.

By purchasing the subscription you are now entitled to antivirus updates for the coming year. New computer viruses are coming out "all the time". It does you little good to be protected from last years plague. You need to be protected from the current viruses that are causing the havoc now.

Make sure that you either have a copy of an antivirus installed that has current virus definitions or if you purchased a commercial product that you have a valid subscription that allows you access to the current up to date virus lists. Next be sure that you run regular full comprehensive antivirus scans to detect and quarantine new and perhaps dangerous computer viruses. More featured commercial antivirus programs may do this automatically.

In the end most of life comes down to preparation and attention to detail. A major role of fire departments is not only to fight fires but fire prevention. Your computer antivirus protections scheme and program should be likewise

About the Author

Vintage Computer ManualsI May Learn Linux One DayUbuntu Badger Linux

(ArticlesBase SC #245826)

Article Source: http://www.articlesbase.com/ - The Best And Simplest Computer Virus Protection

Used Computers (Desktops/Laptops)- What To Look For?

By: Christophe Catesson

Nowadays desktops and laptops are much more durable and dependable that they were just five years ago. Therefore, buying a used or refurbished computer is becoming more of a trend.

Suppliers replace their computers on average every 6 months and companies frequently upgrade their equipment. Buying one of these used or refurbished computers can save you a lot of money while still using a quite up to date technology. This is even more relevant if you are not a heavy user (i.e. most of your time on a computer is spent online, you may use a few standard applications once in a while). Even modestly priced computers will more than suffice for these types of demand.

Thinking about buying a used or refurbished desktop or laptop?

Buying a computer is not at all an easy job, one has look get detailed information of the available computers of good and reputed brands. One must take into consideration the size, color, configurations, features etc... While your computer should correspond to your personality and lifestyle, you should always keep in mind the reputation of the brand in the market. Brand counts a lot; you can render good service by the manufacturer if your computer is damaged.

Important handy Tips before buying a computer...

* Verify if the brand is reputed and always buy a good reputed brand. Read about customer service experience for that specific computer issues.

* Check the warranty/guarantee of the computer (seek out computers which still have warranty/guarantee remaining)

* Compare the price of the new model in the market with what price your buying your used computer, try to get the best bargain. i.e. a two year old computer should not be bought for more than half of its original price.

* Check if the computer is outdated (if out of production it is difficult to get spare parts)

* Is the operating system current (Windows Vista/Windows Xp). Earlier versions probably run slower (windows 2000) and would not be advisable unless your needs are limited (i.e. web surfing, Word...). In any event, stay away with computers running on Windows 98 (granted you don't find many anymore). Also be aware of Windows Vista. Many users are reverting back to XP and that is even more obvious in the corporate world. Why? Vista looks nice but doesn't bring many technical improvements; therefore IT managers are not willing to implement something new when what they have works just fine. Some domestic users just don't like the new way of navigation within the Vista Operating System.

* Check if the configuration of the computer you are buying is good.

* Check the speed of the processor. If possible start the computer and see how long it takes to fully turn on. If its slow just turning on, imagine the lack of speed once you start adding software..

Additional Tips for laptops

* Is the battery life good? (search for the computers with a very good battery backup).

* Check for the screen size of the computer your buying and see to it that it is not exceeding the Normal (normally the screen size should be between 15-17). Less than that generally translates in older computers and increases the chance of age failure. Once the screen breaks, you are often better of changing the whole computer.

* Review the connectivity of the computer (Network, USB, Video, Audio...) look to it that it has a good connectivity including wireless.

* Check out the weight. Ensure the computer is light enough for you to carry.

* More details at http://www.bestlaptopsreviews.com/index.php/Used-Notebooks.html

Where to buy used computers:

* Online auctions. Pro: Often offer the best prices. Cons: Cannot validate the accuracy of the described item. No warranty. Tip 1: Some companies will offer warranty for up to two years, the cost is about 12% to 18% of the purchase price. Tip2: Buy from sellers with great feedback, do not hesitate to contact the seller with questions prior to bidding.

* Online marketplaces: Pro: Set prices and quantities - Sometime warranty is available. Cons: Prices can vary a lot, do your homework.

* http://Craiglist.com Contacting sellers on http://Craiglist.com in your local area gives you a chance to meet with the owner and physically test the computer before the purchase

Where to buy refurbished computers:

Refurbished computers can be a great way to buy as they have warranties and are generally sold by manufacturers or companies affiliated with them.

* Manufacturers websites will tell you how to buy directly from them or from their authorized sellers. Pros: Warranty, established companies. Cons: Prices are higher than regular auctions (you pay more for peace of mind)

Buying a used or refurbished computer can be a great way to save money. If you use some of the advice discussed above you can avoid many pitfalls. One last thing concerning laptops, make sure you have a good bag to protect your computer from a fatal accident. Your bag should be big enough for a 17 inch screen computer as it is rapidly becoming the norm, you will probably change your computer within a few years, the bag you may keep a lot longer.

Good Buy!

About the Author

Christophe Catesson - Communication Manager for http://www.bestlaptopsreviews.com. A source of unbiased information on laptops/notebooks.

(ArticlesBase SC #263928)

Article Source: http://www.articlesbase.com/ - Used Computers (Desktops/Laptops)- What To Look For?

Computer - the Need of Modern Life

By: Roberto Sedycias

Computers simply mean a machine which can compute. Let us peek into the past and find out who were the geeks who thought about having a device that could perform calculative tasks by recognizing inputs and giving the appropriate outputs.

Abacus developed in 3000 BC can be called the first ever computer as it was a simple counting device. In 1941 a German engineer Konard Zuse developed a first programmable calculator using binary math and Boolean logic. UNIVAC was developed in 1951 and the real breakthrough came in 1952 when Texas Instrument developed the Integrated Circuit. In 1964, IBM introduced a mainframe computer called IBM 360. Apple introduced Apple I in 1976 and Apple II in 1977. The Computer that is familiar to most of us in terms of looks and functionality was unveiled in 1981 when IBM introduced the Personal Computer.

The main characteristics of a Computer are:

1 - It follows and is capable of following a special set of instructions.

2 - It can execute preset list of instructions generally known as a computer program.

The basic components which are essential to make a computer are:

1 - Input Device comprising of a Keyboard and Mouse which are used for entering instructions and data into the computer.

2 - Output device such as the Visual Display Unit or the Screen, Printer etc, which lets us see what the computer has done.

3 - The Central Processing Unit which is known as the brain of the Computer where all the processing of data is done and instructions are executed.

4 - Memory is the powerhouse of the computer which stores data and instructions in it.

5 - Mass Storage Devices are those which permanently stores and retain large amount of data. The common ones are floppy drives, CD-ROMs, Hard disks etc.

Computers come in various types designed for various purposes keeping in mind different categories of its users. According to their type they have different capabilities and are priced accordingly. The most popular computer is the Personal Computer which is for personal use of a single user at one time. They come in two types; A Desktop and a Laptop. Then there is an even smaller computer known as the Palmtop which can be held in the palms of the user. While these are the smaller and personal types of computers, The Mainframe, Workstation and Supercomputers are the larger high end computers used by big organizations.

Computers can perform a wide range of functions such as word processing, Digital Audio/Video composition, Internet, Communications and Networking and Desktop Publishing. Computers word processing capability includes automatic correction of spelling and grammar mistakes. Internet is one of the greatest inventions of human beings. It connects infinite number of computers in the manner of a web.

Ungodly amounts of information are available on the Internet and facilities of communications such as messaging, audio and video conferencing are available for free. Graphic engineers are using computers for editing audio and video compositions. No media production can be completed without the help of computers. Nowadays Computers are indispensable for Banking, Railway and Flight Reservations, Education and even defense of a country. There is hardly any sector of business which does not utilize Computers. Important and critical business tasks cannot be accomplished without the help of computers.

Just like human beings, computers are also prone to diseases which are created by attack of viruses. Proper back up of all data stored in computer must be maintained to provide back up in case of storage media failure. Computers must be secured from unauthorized use by passwords and must be protected from viruses by installing anti-virus programs in them. Computers, if safeguarded and used properly can create wonders for human kind and can produce results which are unachievable without them.

This article is under GNU FDL license and can be distributed without any previous authorization from the author. However the author's name and all the URLs (links) mentioned in the article and biography must be kept.

About the Author

This article can also be accessed in portuguese language from the Article section of page www.polomercantil.com.br/computador-pc.php
Roberto Sedycias works as IT consultant for www.PoloMercantil.com.br

(ArticlesBase SC #288052)

Article Source: http://www.articlesbase.com/ - Computer - the Need of Modern Life

Know More About Computer and Computer Training Classes…

By: Iantraynor

Computer a very important equipment to every human being even a high school kid. So you desire to acquire some knowledge in computers, and are waiting to adopt a computer training class? There are many kinds of training class?

Well, there are miscellanea grades of computer training courses of study these days, so picking out the right form for your level of experience is very significant. Most masses that are just checking into adopting a class to solider their individual knowledge of computers or maybe seeking finer attainments to grow their career can be well fitted by the classes put up at localized junior-grade colleges in their region. In this article we will analyze what varieties of computer training classes are generally accessible for the several grades of computer induct. And all that you will learn in a typical basic computer training class.

For those who are an absolute beginner, an elementary in computing is extremely advisable. In this computer training course you'll find out how a computer acts the history of computing, computer constellations, and so on. A primary class is barely what it says - the basics. From using keyboard, the mouse, different types of computers, operating systems, Microsoft office and all those which is very necessary for a beginner to know. It is the beginner's place to take off when learning about computers and computing. Some fundamental computer training classes in addition offers selective information about the fundamentals of networking, from network printing utilizing the local area network or LAN, to the use of a wide area network or WAN, such as the Internet. If you maintain the choice to adopt such a class and you're an initiate to computers, this is highly suggested. The information can be invaluable in day-to-day troubleshooting situations while you're looking to keep the high dollar service fees of on-site technicians.

For the intermediate computer exploiter, there are a various forms of computer training classes that are available. On subject ranging from the inner workings of the computer and upgrading several components to building a system from scratch, there is a lot that you can learn at this level (the beginner's level). Perhaps you know approximately everything about the internal workings of a computer, but you don't know much about how software operates works and runs.

At this stage you can also take up a computer training class covering up the basics of computer programming. While there are a variety of languages available now to program in, it's extremely suggested that you acquire C# (pronounced C sharp). It is on the cutting edge of programming and is a fresh object headed language highly-developed by Microsoft based on the elderly C and C+ programming languages. Maybe you're to a greater extent of a rogue, however, and are more concerned in proceeding against the stream of 'big brother' and 'big business'. Another highly suggested computer training class would be in the programming language of PERL (Practical Extraction and Reporting Language). This linguistic communication is used to create CGI (Common Gateway Interface) programs that are in high requirement and utilization on the web nowadays.

For the advanced user, you'll discover there's always something to learn in a computer training course. Maybe you are very knowledgeable in programming, hardware configuration, operating systems, upgrades, troubleshooting, etc. Depending upon your level of expertness, you may consider adopting a course of process to get your authentication in a several field of computer noesis. Not only will this improve your resume and appear good as far as building up your career skylines, you'll realize an extraordinary experience of achievement when you complete the computer training class required for authentication.

About the Author

Ian Traynor has been involved with computers since the 1980s. Since then, he has continually been involved in computer training, both receiving training and delivering training. He has brought together a collection of his articles on computer training in one of his websites: Computer Training Secrets:

(ArticlesBase SC #291978)

Article Source: http://www.articlesbase.com/ - Know More About Computer and Computer Training Classes…

A Guide to Basic Computer Terminology

By: pushpinder kaur

A Guide to Basic Computer Terminology
Ram? Mouse? One is an animal and one is a rodent right? Ram...that is the zodiac sign for Aries... If this is what these words mean to you than you can surely use this quick glossary of computer terminology. It would be a good idea to read through them before purchasing a computer because these are things you should know about first. If you already have a computer then these computer terms can help you know what to do if your new computer equipment is unfamiliar. Also, this computer terminology can help you if you have to call in for technical help.

Okay lets go!

Cache: Cache is another type of memory kindred to RAM. The computer uses cache to quickly move data between the RAM and the CPU.

CD-ROM Drive: Most new computers now come with a CD-ROM drive as standard equipment. A CD-ROM drive reads data from a disc. These CDs look like a music CD, but hold data instead of music. CD-ROMs also contain games, dictionaries, recipe files, and lots of other things that you can load onto your computer.

CPU: The CPU, or central processing unit, is the brains of the computer. Most new Windows based programs use a Pentium processor or an AMD Athlon XP. New Macs use a different type of CPU called Power PC.

Disk Drive: Virtually all computers come with a disk drive that can read and save information on portable diskettes, also called floppy disks. You can use floppy disks to save information or to load new software onto your computer.

Hard Drive: The hard drive is also called the hard disk. You'll probably never see it because it is nestled inside your computer. It's the computer's electronic filling cabinet, and it stores the computer's operating system, files, programs and documents.

Keyboard: Just like a typewriter keyboard, this device is the primary way of inputting data into the computer programs.

Megahertz (MHz): This is the clock speed of the microprocessor. The higher the number, the quicker the information is processed. MHz relates to how many millions of instructions can be processed per second.

Memory: This is the circuitry or device that holds information in an electrical or magnetic form. There is read-only memory (ROM), which is information primarily stored on a disk, and random-access memory (RAM), which is chip-based storage inside the computer. Memory is typically measured in megabytes (MBs).

Modem: This mechanism connects a computer to a phone line so information can be sent from one computer to another or the user can access an on-line service or the Internet. In view of the popularity of the Internet, a modem is now considered basic equipment and comes on practically all-new computers. Most modems come with fax capabilities.

Monitor: An output device that allows you to see what you are doing (it is what you are looking into right now to see this). Most computers come with 14 or 15-inch monitors. This size is good for most people's needs. Larger 17 or 21-inch monitors also are available, but may cost more. Myself, I prefer the 17-inch.

Motherboard: The motherboard is the circuit board that everything in the computer plugs into. The CPU, RAM and cache all plug into the motherboard.

Mouse: The mouse is another input device that makes getting around in your computer easier. It is a handheld object that is good for doing tasks such as moving and pointing to objects on the screen, and can replace the function and control keys of the keyboard. (If you need a lesson on how the mouse works and how to use it click here for a tutorial.)

Printer: A printer is an essential part of the computer if you want a hard copy of your work. There are four types of printers on the market: dot matrix, inkjet, bubble jet and laser. The dot matrix is the most basic. Most inkjets and bubble jets can print color and graphics, and a laser printer offers the best resolution at the highest speed.

Video Card: The video card is the part of the computer that sends the images to the monitor.

Well there you have it, a quick course on computer terms. I hope it has helped to guide you in your purchase of a new computer; or to help you with the one you have.

About the Author

For more Free Resources www.100computertips.com

(ArticlesBase SC #336298)

Article Source: http://www.articlesbase.com/ - A Guide to Basic Computer Terminology

Three Things You Can Do to Keep Your Computer Running at Maximum Performance

By: ravindersingh

Although there are many things that can affect the performance of your computer, there are a few simply things you can do each month to help keep your computer running at maximum performance. This article will focus on two problems that impact the performance of your computer and will then explain what you can do about it.

Problem #1: Computer Hard Disk Files
Your computer is always writing information to your hard disk, no matter what you do. Your computer attempts to keep all file information in the same location on your hard drive. As you add and delete files, blank spaces are left between your files. As you add new programs or files, your computer tries to use these blank spaces.

Over time, this reading and writing of files can affect the way your computer performs. The files eventually become scattered in multiple locations on your hard disk rather than in the same location.

Your computer will still find the information. However, the more scattered the information becomes on your hard drive, the more accesses your computer has to make to find (and gather) the information. This requires your hard disk to work harder and do more reading/writing than is necessary. It will slow down your computer by as much as 200% and causes increased wear and tear on your hard drive.

Problem #2: Spyware
If you use the Internet, at some point you will download a file or software program onto your computer. Sometimes you will know something is being downloaded to your computer. Other times you will have no idea. (Although this article will not talk about small files called "cookies", you may want to look up information on this subject. Cookies are written onto your computer from the Internet.)

Free computer programs (often referred to as Freeware) are a big hit on the Internet. Every day thousands of users download these "free programs". Although there are some great freeware programs, these programs often have advertisements or tracking code associated with their use. The term "Spyware" refers to programs that gather information about your computer and (Internet) surfing habits without your knowledge. This information is then sold to a third party company as a means of generating revenue.

The problem with Spyware is that it also impacts the performance of your computer. It can make your computer very sluggish and unresponsive.

Three Steps to Improved Computer Performance
Now that we've discussed two problems that affect the performance of your computer, let's discuss three things you can do to get your computer performance back to normal. You should do these three steps in the order presented. Ideally, you should repeat them about once a month or whenever you notice a change in your computer's performance.

Step #1: Delete Spyware
The first thing you should do is to delete spyware files or programs from your computer. To do this, you can use a free software program such as Ad-Aware SE Personal Edition from LavaSoft. To get the program, go to www.download.com and search for "Ad-Aware SE" (without the quotes). Select "Download Now" and follow the installation instructions. Once the program is installed, you can scan your computer for spyware files. Then, you can select and delete them from your computer.
Note #1: Always be sure to use the "Check for updates now" option to keep your program current.
Note #2: You need to be aware that when you delete spyware files, some of those "free" programs you downloaded may not continue to work correctly. If you have a program you've downloaded and want to continue to use, check very carefully what you select to delete from the "Scanning results" once the scan has been completed.

Step #2: Clean up your Hard Disk
Once the spyware is removed, you need to clean up temporary and unwanted files from your hard disk. To do this on your windows PC, select the start option in the lower left hand corner of your computer screen. Then, select the program option. Under the program option, select "Accessories". Under the "Accessories" option, select "System Tools". From the System Tools option, select "Disk Cleanup".

Select the drive you want to clean from the pull-down menu and select OK. Usually, this is Drive C. If you have more than one hard drive, select one at a time. This program will then scan your computer for files that could be erased from your computer. You can safely erase all temporary and Recycle Bin files. You can also check the box of any other files you want the program to erase.

Step #3: Defrag your Hard Disk
Once all the spyware and temporary files are removed, you need to defrag your hard disk. This process simply rewrites your computer files so they are no longer scattered all over your hard disk, but are written in the same location for quick sequential access.

To defrag your hard disk on your windows PC, select the start option in the lower left hand corner of your computer screen. Then, select the program option. Under the program option, select "Accessories". Under the "Accessories" option, select "System Tools". From the System Tools option, select "Disk Defragmenter". First, select the hard drive from your computer. Usually, this is Drive C. However, many computers have multiple hard drives. Select one at a time.

You can select "Analyze" to have the program check out the hard drive and see if it needs to be defragged. The program will prompt you at the completion of its analysis. Use the defragment option as prompted.

Note: If you've never used this option before, I would recommend that you select the defragment option.

Once, you've completed these three steps, your computer and hard disk should be able to operate at maximum performance. Don't forget to repeat these steps at least once a month or whenever you notice a change in your computer's performance

About the Author

www.greateducationonline.com

(ArticlesBase SC #353762)

Article Source: http://www.articlesbase.com/ - Three Things You Can Do to Keep Your Computer Running at Maximum Performance

Three Things You Can Do to Keep Your Computer Running at Maximum Performance

By: Sandeep Grewal

Although there are many things that can affect the performance of your computer, there are a few simply things you can do each month to help keep your computer running at maximum performance. This article will focus on two problems that impact the performance of your computer and will then explain what you can do about it.

Problem #1: Computer Hard Disk Files
Your computer is always writing information to your hard disk, no matter what you do. Your computer attempts to keep all file information in the same location on your hard drive. As you add and delete files, blank spaces are left between your files. As you add new programs or files, your computer tries to use these blank spaces.

Over time, this reading and writing of files can affect the way your computer performs. The files eventually become scattered in multiple locations on your hard disk rather than in the same location.

Your computer will still find the information. However, the more scattered the information becomes on your hard drive, the more accesses your computer has to make to find (and gather) the information. This requires your hard disk to work harder and do more reading/writing than is necessary. It will slow down your computer by as much as 200% and causes increased wear and tear on your hard drive.

Problem #2: Spyware
If you use the Internet, at some point you will download a file or software program onto your computer. Sometimes you will know something is being downloaded to your computer. Other times you will have no idea. (Although this article will not talk about small files called "cookies", you may want to look up information on this subject. Cookies are written onto your computer from the Internet.)

Free computer programs (often referred to as Freeware) are a big hit on the Internet. Every day thousands of users download these "free programs". Although there are some great freeware programs, these programs often have advertisements or tracking code associated with their use. The term "Spyware" refers to programs that gather information about your computer and (Internet) surfing habits without your knowledge. This information is then sold to a third party company as a means of generating revenue.

The problem with Spyware is that it also impacts the performance of your computer. It can make your computer very sluggish and unresponsive.

Three Steps to Improved Computer Performance
Now that we've discussed two problems that affect the performance of your computer, let's discuss three things you can do to get your computer performance back to normal. You should do these three steps in the order presented. Ideally, you should repeat them about once a month or whenever you notice a change in your computer's performance.

Step #1: Delete Spyware
The first thing you should do is to delete spyware files or programs from your computer. To do this, you can use a free software program such as Ad-Aware SE Personal Edition from LavaSoft. To get the program, go to www.download.com and search for "Ad-Aware SE" (without the quotes). Select "Download Now" and follow the installation instructions. Once the program is installed, you can scan your computer for spyware files. Then, you can select and delete them from your computer.
Note #1: Always be sure to use the "Check for updates now" option to keep your program current.
Note #2: You need to be aware that when you delete spyware files, some of those "free" programs you downloaded may not continue to work correctly. If you have a program you've downloaded and want to continue to use, check very carefully what you select to delete from the "Scanning results" once the scan has been completed.

Step #2: Clean up your Hard Disk
Once the spyware is removed, you need to clean up temporary and unwanted files from your hard disk. To do this on your windows PC, select the start option in the lower left hand corner of your computer screen. Then, select the program option. Under the program option, select "Accessories". Under the "Accessories" option, select "System Tools". From the System Tools option, select "Disk Cleanup".

Select the drive you want to clean from the pull-down menu and select OK. Usually, this is Drive C. If you have more than one hard drive, select one at a time. This program will then scan your computer for files that could be erased from your computer. You can safely erase all temporary and Recycle Bin files. You can also check the box of any other files you want the program to erase.

Step #3: Defrag your Hard Disk
Once all the spyware and temporary files are removed, you need to defrag your hard disk. This process simply rewrites your computer files so they are no longer scattered all over your hard disk, but are written in the same location for quick sequential access.

To defrag your hard disk on your windows PC, select the start option in the lower left hand corner of your computer screen. Then, select the program option. Under the program option, select "Accessories". Under the "Accessories" option, select "System Tools". From the System Tools option, select "Disk Defragmenter". First, select the hard drive from your computer. Usually, this is Drive C. However, many computers have multiple hard drives. Select one at a time.

You can select "Analyze" to have the program check out the hard drive and see if it needs to be defragged. The program will prompt you at the completion of its analysis. Use the defragment option as prompted.

Note: If you've never used this option before, I would recommend that you select the defragment option.

Once, you've completed these three steps, your computer and hard disk should be able to operate at maximum performance. Don't forget to repeat these steps at least once a month or whenever you notice a change in your computer's performance.

About the Author

For more Free Resources www.100computertips.com

(ArticlesBase SC #353956)

Article Source: http://www.articlesbase.com/ - Three Things You Can Do to Keep Your Computer Running at Maximum Performance

All About Computer Viruses

By: Sonia Sood

Feel Free to reprint this article in newsletters and on websites, with resource box included. If you use this article, please send a brief message to let me know where it appeared:

Your computer is as slow as molasses. Your mouse freezes every 15 minutes, and that Microsoft Word program just won't seem to open.

You might have a virus.

Just what exactly is a virus? What kind is in your computer? How did it get there? How is it spreading and wreaking such havoc? And why is it bothering with your computer anyway?

Viruses are pieces of programming code that make copies of themselves, or replicate, inside your computer without asking your explicit written permission to do so. Forget getting your permission down on paper. Viruses don't bother to seek your permission at all! Very invasive.

In comparison, there are pieces of code that might replicate inside your computer, say something your IT guy thinks you need. But the code spreads, perhaps throughout your office network, with your consent (or at least your IT guy's consent). These types of replicating code are called agents, said Jimmy Kuo, a research fellow with McAfee AVERT, a research arm of anti-virus software-maker McAfee Inc.

In this article, though, we're not talking about the good guys, or the agents. We'll be talking about the bad guys, the viruses.

A long, long time ago in computer years, like five, most viruses were comprised of a similar breed. They entered your computer perhaps through an email attachment or a floppy disk (remember those?). Then they attached themselves to one of your files, say your Microsoft Word program.

When you opened your Microsoft Word program, the virus replicated and attached itself to other files. These could be other random files on your hard drive, the files furthest away from your Microsoft Word program, or other files, depending on how the virus writer wanted the virus to behave.

This virus code could contain hundreds or thousands of instructions. When it replicates it inserts those instructions, into the files it infects, said Carey Nachenberg, Chief Architect at Symantec Research Labs, an arm of anti-virus software-maker Symantec. Corp.

Because so many other types of viruses exist now, the kind just described is called a classic virus. Classic viruses still exist but they're not quite as prevalent as they used to be. (Perhaps we could put classic viruses on the shelf with Hemingway and Dickens.)

These days, in the modern era, viruses are known to spread through vulnerabilities in web browsers, files shared over the internet, emails themselves, and computer networks.

As far as web browsers are concerned, Microsoft's Internet Explorer takes most of the heat for spreading viruses because it's used by more people for web surfing than any other browser.

Nevertheless, "Any web browser potentially has vulnerabilities," Nachenberg said.

For instance, let's say you go to a website in IE you have every reason to think is safe, Nachenberg said.

But unfortunately it isn't. It has virus code hidden in its background that IE isn't protecting you from. While you're looking at the site, the virus is downloaded onto your computer, he said. That's one way of catching a nasty virus.

During the past two years, another prevalent way to catch a virus has been through downloads computer users share with one another, mostly on music sharing sites, Kuo said. On Limewire or Kazaa, for instance, teenagers or other music enthusiasts might think they're downloading that latest Justin Timberlake song, when in reality they're downloading a virus straight into their computer. It's easy for a virus writer to put a download with a virus on one of these sites because everyone's sharing with everyone else anyway.

Here's one you might not have thought of. If you use Outlook or Outlook Express to send and receive email, do you have a preview pane below your list of emails that shows the contents of the email you have highlighted? If so, you may be putting yourself at risk.

Some viruses, though a small percentage according to Nachenberg, are inserted straight into emails themselves.

Forget opening the attachment. All you have to do is view the email to potentially get a virus, Kuo added. For instance, have you ever opened or viewed an email that states its "loading"? Well, once everything is "loaded," a virus in the email might just load onto your computer.

So if I were you, I'd click on View on the toolbar in your Outlook or Outlook Express and close the preview pane. (You have to click on View and then Layout in Outlook Express.)

On a network at work? You could get a virus that way. Worms are viruses that come into your computer via networks, Kuo said. They travel from machine to machine and, unlike, the classic viruses; they attack the machine itself rather than individual files.

Worms sit in your working memory, or RAM, Nachenberg said.

OK, so we've talked about how the viruses get into a computer. How do they cause so much damage once they're there?

Let's say you've caught a classic virus, one that replicates and attacks various files on your computer. Let's go back to the example of the virus that initially infects your Microsoft Word program.

Well, it might eventually cause that program to crash, Nachenberg said. It also might cause damage to your computer as it looks for new targets to infect.

This process of infecting targets and looking for new ones could eventually use up your computer's ability to function, he said.

Often the destruction a virus causes is pegged to a certain event or date and time, called a trigger. For instance, a virus could be programmed to lay dormant until January 28. When that date rolls around, though, it may be programmed to do something as innocuous but annoying as splash popup on your screen, or something as severe as reformat your computer's hard drive, Nachenberg said.

There are other potential reasons, though, for a virus to cause your computer to be acting slow or in weird ways. And that leads us to a new segment – the reason virus writers would want to waste their time creating viruses in the first place.

The majority of viruses are still written by teenagers looking for some notoriety, Nachenberg said. But a growing segment of the virus-writing population has other intentions in mind.

For these other intentions, we first need to explain the "backdoor" concept.

The sole purpose of some viruses is to create vulnerability in your computer. Once it creates this hole of sorts, or backdoor, it signals home to mama or dada virus writer (kind of like in E.T.). Once the virus writer receives the signal, they can use and abuse your computer to their own likings.

Trojans are sometimes used to open backdoors. In fact that is usually their sole purpose, Kuo said.

Trojans are pieces of code you might download onto your computer, say, from a newsgroup. As in the Trojan War they are named after, they are usually disguised as innocuous pieces of code. But Trojans aren't considered viruses because they don't replicate.

Now back to the real viruses. Let's say we have Joe Shoo virus writer. He sends out a virus that ends up infecting a thousand machines. But he doesn't want the feds on his case. So he instructs the viruses on the various machines to send their signals, not of course to his computer, but to a place that can't be traced. Hotmail email happens to be an example of one such place, Kuo said.

OK, so the virus writers now control these computers. What will they use them for?

One use is to send spam. Once that backdoor is open, they bounce spam off of those computers and send it to other machines, Nachenberg said.

That's right. Some spam you have in your email right now may have been originally sent to other innocent computers before it came to yours so that it could remain in disguise. If the authorities could track down the original senders of spam, they could crack down on spam itself. Spam senders don't want that.

Ever heard of phishing emails? Those are the ones that purport to be from your internet service provider or bank. They typically request some information from you, like your credit card number. The problem is, they're NOT from your internet service provider or your bank. They're from evil people after your credit card number! Well, these emails are often sent the same way spam is sent, by sending them via innocent computers.

Of course makers of anti-virus software use a variety of methods to combat the onslaught of viruses. Norton, for instance, uses signature scanning, Nachenberg said.

Signature scanning is similar to the process of looking for DNA fingerprints, he said. Norton examines programming code to find what viruses are made of. It adds those bad instructions it finds to its large database of other bad code. Then it uses this vast database to seek out and match the code in it with similar code in your computer. When it finds such virus code, it lets you know!

About the Author

For more Free Resources

www.100computertips.com

(ArticlesBase SC #365882)

Article Source: http://www.articlesbase.com/ - All About Computer Viruses

Do Some Computer Training Courses and Get Better Position in Your Life

By: Abcotechnology.com

There are several types of computer training course available to the person seeking to learn about computers today. Generally the term computer training comprises everything related to the computer as a whole. This training consists of lessons on the various parts of the computer, their functions and necessities and then the manner to compute or run the computer. Also the content of this kind of computer trainings are based on the term or duration of the training procedure.

To start, it would be a good course of action to look at classes teaching the basics of how to operate a computer. It is a good idea in the computer training course to also learn some basics about the internal operation of the computer (i.e., what makes it tick, how it works). Student self-respect is also important. A good trainer must develop the feeling that it's okay to be wrong and that being wrong does not imply that a student is ignorant. The importance of computer is nowadays felt in each and every sphere. Right from the beginners of the primary schools to the big industrialists, everyone comes in touch with the computers. This immense importance of the computers has led to the necessity of computer training to a great extent. Therefore it will be worthwhile to know about the several types of computer training and its impact and usefulness in our life.

Moving on from the basics, a computer training course should teach more advanced concepts as well. Some of these concepts would include back-up procedures, file maintenance, and data recovery. In the short term computer training classes, the emphasis is put on making the student aware of the general and basic computer term and a basic learning is provided with which the primary computer functions can be done. We prepare students by delivering hands-on job oriented training which teaches them how to apply the knowledge that they gain in classes along with preparing them to pass the vendor based certification exams. We have partnered with Microsoft, Oracle, Linux , Cisco Systems, Prometric testing center and as such offer wide variety of computer training that include but are not limited to Microsoft Certification, A+ training, CISCO Certification Course, Oracle Certification Course, Internet and Microsoft Office 2003.

The importance of the computer training is rapidly increasing as it is required in each and every field in this fast growing world. Even the housewives too need to know the basics of the computer if they want to be an efficient home manager. Shopping, cooking, cleaning everything has become computerized nowadays. Even for guiding the little one in their school homework, the mother should have the primary computer knowledge. Keeping in mind this vital role of the computers numerous computer training institutions have opened up where any class and any age group can get admitted and take lessons. Also, the online computer training courses have made this procedure far more easy and accessible for the learners. Those who are very busy and find it tough to manage time for rushing to the institutes have been helped to a great extent by this online computer learning system.

ABCO Technology specializes in providing Computer Training and Consulting for the Information Technology Industry. Computer Training is provided by experienced, certified industry experts that have years of seasoning in their respective field of Information Technology.

About the Author

Please feel free to visit www.abcotechnology.com for more information about Computer Courses, Computer Training, Computer Training Courses or call us (310)237-5517.

(ArticlesBase SC #371348)

Article Source: http://www.articlesbase.com/ - Do Some Computer Training Courses and Get Better Position in Your Life

Is it Important to Spend Your Money on a Good Computer System?

By: savemysystem

Is it important to spend your money on a good "computer system", "pc", "computers", "laptops"?

Computer systems, pc, computers, and laptops fill our lives. We bank on computer systems, pc, computers, and laptops, we buy with computer systems, pc, computers, and laptops, and we communicate using computer systems, pc, computers, and laptops. Yet these machines still hold an element of mystery that makes some people concerned about how to spend less without getting shortchanged. Computers, computer systems, PCs, laptops like your cars, need proper maintenance to perform at its best. Knowing your way around your computer system", "pc", "computers", "laptops and conducting routine repairs will keep it in good working order. Computer systems, pc, computers, laptops are not only hardware devices, they work on the combination of the hardware and software ,so any damage you do to the software also can make the hardware goes wrong. To save yourself a lot of money and un-needless trips to the computer shop for repairs, it has become a need to keep your new computer running fast and efficient. Hence it is very important that you keep your computer systems, pc, computers, and laptops in good condition. This is possible only when you spend money on a good Computer systems, pc, computers, and laptops.

Spending your money on good computer systems, pc, computers, and laptops can be based on numerous categories and needs.

There are a good number of things to spend on your computer systems, pc, computers, and laptops on a regular basis to keep its innards healthy. Some of the important things where you need to spend on maintaining systems include:

? UPS (Interrupted Power Supply)
? Regular back ups
? Monthly / Yearly maintenance
? Computer repair and maintenance services
? Data recovery services
? Support services
? Regular updates and upgrades
? Data security
? Database management
? Technical Support services
? Hardware support

These are just a few of the easier ways to spend money on your computer. There are more ways to spend less, including building your own PC and choosing quality components at a discount. But spending on cheap computer systems, pc, computers, and laptops will add to your maintenance cost. Hence it is very important that you get the best system from us which also has good value after some years. You need to spend regularly to maintain it so that you don't counter a crisis situation wherein your critical data is at risk. The importance of spending on good computer systems, pc, computers, and laptops indicates of your sound practice on maintaining IT in your home, office or company. Our products are of world class quality and services are of universal quality.

About the Author

Save My System Ltd is a comprehensive computer support company that provides a wide range of services for home and small businesses. We have a variety of services from computer and laptop repair, pc and computer support, data recovery, and the supply of hardware and software application to individual or businesses
PC Computer Support & Data Recovery
Computer Repair & Laptop Repair

(ArticlesBase SC #414539)

Article Source: http://www.articlesbase.com/ - Is it Important to Spend Your Money on a Good Computer System?

Grid Computing in Distributed Gis

By: Zahid Imran Ahmed

Grid Computing

Some consider this to be the "the third information technology wave" after the Internet and Web, and will be the backbone of the next generation of services and applications that are going to further the research and development of GIS and related areas.

Grid computing allows for the sharing of processing power, enabling the attainment of high performances in computing, management and services. Grid computing, (unlike the conventional supercomputer that does parallel computing by linking multiple processors over a system bus) uses a network of computers to execute a program. The problem of using multiple computers lies in the difficulty of dividing up the tasks among the computers, without having to reference portions of the code being executed on other CPUs.

Parallel processing

Parallel processing is the use of multiple CPU's to execute different sections of a program together. Remote sensing and surveying equipment have been providing vast amounts of spatial information, and how to manage, process or dispose of this data have become major issues in the field of Geographic Information Science (GIS).

To solve these problems there has been much research into the area of parallel processing of GIS information. This involves the utilization of a single computer with multiple processors or multiple computers that are connected over a network working on the same task. There are many different types of distributed computing, two of the most common are clustering and grid processing.

The primary reasons for using parallel computing are:

Saves time.

Solve larger problems.

Provide concurrency (do multiple things at the same time).

Taking advantage of non-local resources - using available computing resources on a wide area network, or even the Internet when local computing resources are scarce.

Cost savings - using multiple "cheap" computing resources instead of paying for time on a supercomputer.

Overcoming memory constraints - single computers have very finite memory resources. For large problems, using the memories of multiple computers may overcome this obstacle.

Limits to serial computing - both physical and practical reasons pose significant constraints to simply building ever faster serial computers.

Limits to miniaturization - processor technology is allowing an increasing number of transistors to be placed on a chip.

However, even with molecular or atomic-level components, a limit will be reached on how small components can be.

Economic limitations - it is increasingly expensive to make a single processor faster. Using a larger number of moderately fast commodity processors to achieve the same (or better) performance is less expensive.

The future: during the past 10 years, the trends indicated by ever faster networks, distributed systems, and multi-processor computer architectures (even at the desktop level) clearly show that parallelism is the future of computing.

Distributed GIS

As the development of GIS sciences and technologies go further, increasingly amount of geospatial and non-spatial data are involved in GISs due to more diverse data sources and development of data collection technologies. GIS data tend to be geographically and logically distributed as well as GIS functions and services do. Spatial analysis and Geocomputation are getting more complex and computationally intensive. Sharing and collaboration among geographically dispersed users with various disciplines with various purposes are getting more necessary and common. A dynamic collaborative model -" Middleware" - is required for GIS application.

Computational Grid is introduced as a possible solution for the next generation of GIS. Basically, the Grid computing concept is intended to enable coordinate resource sharing and problem solving in dynamic, multi-organizational virtual organizations by linking computing resources with high-performance networks. Grid computing technology represents a new approach to collaborative computing and problem solving in data intensive and computationally intensive environment and has the chance to satisfy all the requirements of a distributed, high-performance and collaborative GIS. Some methodologies and Grid computing technologies as solutions of requirements and challenges are introduced to enable this distributed, parallel, and high-throughput, collaborative GIS application.

Security

Security issues in such a wide area distributed GIS is critical, which includes authentication and authorization using community policies as well as allowing local control of resource. Grid Security Infrastructure (GSI), combined with GridFTP protocol, makes sure that sharing and transfer of geospatial data and Geoprocessing are secure in the Computational Grid environment.

Conclusion

As the conclusion, Grid computing has the chance to lead GIS into a new "Grid-enabled GIS" age in terms of computing paradigm, resource sharing pattern and online collaboration.

About the Author

The Author is the Sr. IT Manager of Stesalit Inc.

Please Visit http://www.stesalit-inc.com/userexperience.html

(ArticlesBase SC #416312)

Article Source: http://www.articlesbase.com/ - Grid Computing in Distributed Gis

Computer Security: How You Can Improve Yours

By: Craig Thornburrow

The objective behind the concept of computer security actually varies quite a bit depending on the use of the computer. Computer security may include the protection of specific information from corruption or theft, for example. In general this can impose specific requirements on computers in addition to most standard system requirements. There are a number of different typical approaches that can be taken when it comes to improving computer security, including the following:

- Physically limiting the access to a computer so that computer security will not be compromised by those who are granted access to use it.

- Utilizing hardware mechanisms that can create and impose rules for specific computer programs, allowing computer security to be imposed without requiring individual programs to implement it.

- Implementing operating system or OS mechanisms that are capable of creating and imposing rules that avoid having to trust programs on the computer.

- Implementing programming strategies that allow subversion to be resisted and make computer programs more dependable.

In most cases, the computer security devices that are put into place are dependent upon the application uses the computer is created for. Different computer systems require different levels of security, as the level of privacy or protection needed is going to vary significantly. Computer systems under government control, for example, require a much higher level of security than computers used by students in a university setting. The level of required computer security, then, along with what forms of security are implemented, are going to vary significantly as well.

Implementing computer security may include creating or utilizing secure operating systems, though much of the science associated with this form of security was developed several decades ago. Security architecture is another option, and involves describing how specific security countermeasures and controls are positioned to protect the information technology. Firewalls are an example of security meant to protect computers from threats that travel via the internet or peer to peer connections. Chain of trust techniques are techniques that are used to ensure that all software on a computer is certified as authentic directly from the designers of the system. Access control is used to ensure the separation of privileges, ensuring that only specified people have the right capabilities on a computer system.

There are also cryptographic techniques which transform information into something that is meant to be indecipherable by anyone but approved persons. Information can also be secured for computer security purposes using backup files which allow important files to be protected by creating copies should they ever become corrupted or destroyed.

Essentially, the primary focus of the computer security field of information technology is to protect the integrity of computers, the data contained within them, and any information that may require restricted access. Some level of computer security is needed by anyone who owns a computer, including student computers in a university setting, computers owned and operated by the government, and even the laptop that you use to check your e-mail at night.

About the Author

Craig Thornburrow is an acknowledged expert in his field. You can get more free advice on a computer security system and computer security product at http://www.computersecurityclinic.com

(ArticlesBase SC #416739)

Article Source: http://www.articlesbase.com/ - Computer Security: How You Can Improve Yours

Vdu: the Computer Monitoring System

By: Ajibola Daniel

INTRODUCTION
the Visual display Unit (VDU) according to International Labour Office (1989) defined VDU as an electrical instrument that is use to display the information recieved from the computer system,in a very short period of time emerged from comparative obscruity in scientific laboratory(s) to become an integral and indespensable part of normal working life for millions of people both in home and in workplaces. As the technological revolutioncontinues, the use of computer with screen-base output unit or VDU grows at an incresing rate. worlwide, millions of VDUs are now in use, recieving and processing information on television-like screen or monitors. Also, it is a television type monitor that display information recieved from computer system wordprocessor rather than from a signal broad cast for televisio. The VDU contributes the interactive element between the operator and the computer system. The VDU could be limited to a main computer, as with a terminal or the physical entity comporising the VDU could also include the computer system, as with a personal computer (PC). the basic principle of operation of most VDUs in use is simikar to that of television sets.They contain a large evacuated glass tube, called Cathode Ray Tube (CRT), which include a source of electrons (The Cathode) and a phospor coating on thte inside of the vewing face of the screen. A high voltage (typically) in the range of 10-25kv accelerated electrons, releasing from the cathod towards a second electrode called The Cathode. They pass the through a hole in the anode on to the phosphor materials. However, computers are very important and for all the apparent complexity, they seems to hve a wide range of uses and play an ever-increasing role within our society likeoffice, commerce and industries, public services and of course schools and home, with this we can see that the importance of computer monitor can not be over emphasis.

STATEMENT OF THE PROBLEM
The study is to determine the influence of computer monitor (VDU) a computer system of an organisation and it is stated below:
1. what are the effect of VDU to human and health?
2. what are the control measure and prevention of VDU effect?
3. what are the measuement and level of control of radiation emmision of VDU?

PURPOSE OF THE STUDY
The purpose of this seminar is to provide information on the computer monitor which base on the influence, importance and the uses of computer monitor in a computer system of an organisation.

SCOPE OF THE STUDY
This project work will be based mainly on the use, importance and the configuration of a computer monitor

METHODOLOGY
During the course of this project work, data were obtained from second sorce, this cisist of information from the periodicals, texetrbooks, encarta software and research findings. Aslo, search engines like www.google.com, www.devilfinder.com, www.mamma.com, and son on will also contacted during the project work.

LIMIITATION OF THE STUDY
This research work suppose to go in-depth but due to the power fai.lure, there is no money to move from one place another, insufficient time allocation and the resarch is also expensive to carry out.

ANALYSIS TO THE STUDY
In the first generation of computerwhich was between the year 1945-1958 one of the first digital computer in this generation was a machine called ENIAC (Electrical Numerical Integrator and Calculator) was design band built at the Moore school of Electrical Engineering at the univesity of Pennsylvanian in 1956. This ENIAC contained over 18,000 vacuum tubes wieghed more than 30 tons and required 1500 square fact of floor space. It was programmed by setting up to 6,000 switch and connecting cables between the various units of the computer.
The second generation introduced the designing computer which was between (1958-1964) machine based on the store concet using discrete semiconductor element diodes, translator and so on. The vacuum tube was reduce to weighed about 25 tons and required 1000 sqaure of the floor space and again reduction in heat generation. The size-reduction brought by the utilization of semiconductor elements.
Between 1964-1971 which was the third generation f computer which was the third generation of computer which was characterized by further reduction in sixe of the VDu low cast, low in heat generatiion. Introduction of im[proved method of storing datas and applicaron of Integrated Circuits (I.C.), they accepted their input data through magnetic tape and magnetic disk, which they also accepted for secondary storage.
During 1971-1975, Here computer were first designed on the basis of large-scale integrated circuit along with vacuum 3tube and transistror. Each electronic along has its own set of characteristics including reliability, packing density, heated dissipation, speed and cost of all which designer must balance then the VDU size was drastically reduced compare to the first generation and the cost which is very cheap. This fourth of computer are otherwise known as microprocessor on a chip and is characterized by the energence of personal computer (PCs) so called foruth generation programming language such as spread sheet, Dbase III, windowing menu dialoging and other paraphernalia.
The fifth generation of computer (1975-1995) is the mother language or lingual franca of each user. Hence the following thechonolgies were involved in the fifth generation; (1) Micro electronics (2) computer architecture (3) Artificial intelligence (4) Language processing (5) database management. A logical influence is an elementary inductive method of reasoning and each lips is equivalent to some 300 instruction on a conventional computer.
The sixth generation of computer monitor was the geneation which innovation called Optic Computer, the computer of this generation is from year 1995 till date and the computer of this generation are laptop computer, palmtop computer, plasma computer all which are usin a flat screen are been constructed. Here are the computer monitor that came into being in this generation MDA (Monocrono Display Adapter), HA (Hercules Adapter). CGA (Color Graphic Adapter), LCD (Liquid Crystal Display), Palmtop Plasma Television and so on.

THE DESIGN OF A MONITOR
The Monitor could be linke to a main computer, as with a terminal, or the physical entity comprising the VDU could also include the computer system, as with a personal computer (PC). The basic principle of operation of most VDUs in use is similar to that of television sets. They contain a large evacuated glass tube called Cathod Ray Tube (CRT), which include a source of electrons (the cathode) and a phosphor coating on the inside of the viewing face of the screen. A high voltage (typically in the range of 10-25kv) accelerates electrons release trom the cathod towards a second elctrode on to the direction and thus the impact of the points of the electrons on the phosphor are controlledby magnetic field produced by deflecting the coils mounted near the back of the tube. In this manner, the electron beam is swept horizontally and vertically across the viewing face-the whole face normally being-covered in about 1/70th of a second. By modulating the intensity of the electron beam in each position, the resulting pattern of light and dark points can be generated into pictrue. The electronic circuit used to control these processess gives rise to both radio frequency (RF) field and to electric and magnetic fields of lower frequencies. Recently, solid state circuitry in conjuction with liquid crystal, gas plasma or similar display technology(s) has been used to replace cathode ray tube. However, to a rather limited extent.

DEFINITION OF TERMS
Computer:- an electronic device capable of storing and processing information in accordance with a set of instruction.
Cathode Ray Tube:- a vacuum tube in which beam of electrones produce a luminous image on a fluorescence screen, used in television and display unit (VDU).
Monitor:- a television used to view a pictrue from a particular camera o a display from a computer.
Monochrome:- consisting of or display image in black and white or in varying tones of one color.
Hercules:- requiring or having greate strnght or effects.
Flash:- shine with a bright but brief or irregular light.
Pixel (Pictrue Element):- any of the tiny ray of light on a display screen which are made up of an image.
Pallete:- a thin board on which an artist lay anf mixes pints abd the range of color used by an artists.

CONCLUSION
In conclusion, there are no health hazards associated wityh radiation, graphic adapter and field from VDUs. However, since a large number of people are involved in VDU work measure sohould be taken to ensure that VDU workplace are economically well designed. This include aspect of the VDU, the workstation and the work environment as well as work organiszation.

REFERENCES
Bergqiust, U. (1984), "Video Display Terminals and Health", in scandinavia via journal of work environment and
health (helsinkin), vol.10.
Health and Welfare (Canada).1993), Investigations of Radiation Emission from Vidoe Display Terminals, Reporter 83-
-91 (Ottawa, Environment Health Directorate).
Intenational Labour Office (ILO), 1989. Working With Visual Display Unit, Occupational safety and Health Series
No. 61.
Locksley E.A. et al (2006). Introduction to Computer Studies 1, Immacuilate Concept, Ogbomosho, Oyo state
Pg. 3-7.
Micheal Tooley (1997), PC Troubleshooting Pocket Book, the bath press Pg. 150.

About the Author

Ajibola Daniel Abiodun

(ArticlesBase SC #420913)

Article Source: http://www.articlesbase.com/ - Vdu: the Computer Monitoring System

Computer Security

By: davidtuffel

 

What is Computer Security?

Computer Security is a branch of technology known as information security as applied to computers. Information security means protecting information and information systems from unauthorized access, use, disclosure, disruption, modification, or destruction. The objective of computer security varies and can include protection of information from theft or corruption, or the preservation of availability, as defined in the security policy.


Technological and managerial procedures applied to computer systems to ensure the availability, integrity and confidentiality of information managed by the computer system

 

Computer security imposes requirements on computers that are different from most system requirements because they often take the form of constraints on what computers are not supposed to do.

Typical approaches to improving computer security can include the following:


  • Physically limit access to computers to only those who will not compromise security.

  • Hardware mechanisms that impose rules on computer programs, thus avoiding depending on computer programs for computer security.

  • Operating system mechanisms that impose rules on programs to avoid trusting computer programs.

  • Programming strategies to make computer programs dependable and resist subversion.


Computer Security has three Layers:

o Hacking

o Cracking

o Phreaking

 

Hacking:

Unauthorized use or attempts to circumvent or bypass the security mechanisms of an information system or network.

Computer hacking always involves some degree of infringement on the privacy of others or damage to computer-based property such as files, web pages or software. The impact of computer hacking varies from simply being simply invasive and annoying to illegal.

 

Cracking:

The act of breaking into a computer system.

Software Cracking is the modification of software to remove protection methods: copy prevention, trial/demo version, serial number, hardware key, CD check or software annoyances like nag screens and adware.

The most common software crack is the modification of an application's binary to cause or prevent a specific key branch in the program's execution.

 

Phreaking:

The art and science of cracking the phone network.

 

 

Security by design:

The technologies of computer security are based on logic. There is no universal standard notion of what secure behavior is. "Security" is a concept that is unique to each situation. Security is extraneous to the function of a computer application, rather than ancillary to it, thus security necessarily imposes restrictions on the application's behavior.

There are several approaches to security in computing; sometimes a combination of approaches is valid:


  1. Trust all the software to abide by a security policy but the software is not trustworthy (this is computer insecurity).

  2. Trust all the software to abide by a security policy and the software is validated as trustworthy (by tedious branch and path analysis for example).

  3. Trust no software but enforce a security policy with mechanisms that are not trustworthy (again this is computer insecurity).

  4. Trust no software but enforce a security policy with trustworthy mechanisms.


 

12 tips for computer security:


  1. Update / patch ALL your software every now and then!

  2. Check / adjust ALL your settings so they are safe, since they ARENT by default!

  3. Use firewall, like ZoneAlarm to control what goes in and out from your computer!

  4. Use good passwords: at least 13marks long, containing both letters and numbers. Remember to change your password every few months atleast and dont ever use the same password in two places!

  5. Get a good antivirus program: NOD32, F-Secure or Norton Antivirus and keep it updated!

  6. Don't open or execute files that you are not 100% sure are absolutely safe nomatter where or how you get them.

  7. Wipe your historyfiles (like cookies, internet history and temporary files, etc.), logs and personal files, with specific wiping program (like Eraser) instead of just deleting them.

  8. Use encryption to enhance your privacy! Use encrypted email (like Hushmail or Ziplip), www-surfing and encrypt sensitive files on your computer (PGP).

  9. When you are finished using some internet-based service like email, sign out of it rather than just closing your browser! Also, when you leave your computer, make sure that none of such programs or connections are left open that someone could abuse. In WindowsNT/2k/XP, press Windowskey+L to lock the workstation.

  10. Don't use public computers for anything you need to type in your logins, they usually have Trojan horses that capture your passwords.

  11. Make backups and store them in safe place! Easiest way to do a total-backup is to make an "Image" of your harddrive or partition and store it on safe location, but floppies will usually be just fine for storing documents, etc.

  12. Install and Use a Hardware Firewall


 

Regards,
Kethy Wright
www.perceptionsystem.com

About the Author

Kethy Wright is having a good Skill in Computer Hardware & Computer Security Systems. Know about for your Computer Security from his knowledge here.

(ArticlesBase SC #436459)

Article Source: http://www.articlesbase.com/ - Computer Security

Hack Back Your Computer - Revive Your Lagging Pc

By: Geoffrey Vaughan

Over time and use with a windows machine you may notice that it does not run as fast as when you first got it.

This is usually because of a number of different problems that can occur with regular use of a computer. The smart computer user knows about these things and how to repair them on their own rather then having to hire a technician to solve the problem, (costing you time with out your computer and usually around 50 dollars an hour).

Possible problems usually include one or many of the following things:

Viruses

They happen, even if you spend all the money you can on antivirus software, you likely don't even know you have one.

Spam

Loosely falls under the same definition as a virus but with some negligible variations, can also include programs that hit you computer with nasty pop ups and redirect you to web pages you don't want to visit.

Registry

This is a comprehensive list of all programs that have ever been installed on your computer, sometimes when you uninstall a program some information can still be left on this list, the longer you have your computer the larger this list is likely to be.

To much junk

Unused programs and applications (different browser menus, and other programs)

Start up programs

On the bottom right of your computer beside the clock is usually a bunch of icons. These represent programs that are running on your computer at a given time, the problem is that not all programs that are running display an icon in the taskbar. There is usually much more programs running at a time that you are unaware of.

So lets get started then. Bellow are some tips almost any computer user can performe, to help speed up your computer

1. Restore Point

Before we get started we are going to record a windows restore point. If at any point you feel you've made a big mistake you can always go back into the windows restore program and reverte to where you're computer was at before you tried to fix it. This should give you the confidence to play and adjust settings on your computer without the worry of messing it up. To do this you go to the start menu -> Program files - > Accessories -> System tools -> System restore.

A new program will open from there all you have to do is ask your computer to set a restore point, later if needed you can revert to it. A restore point is a virtual snap shot of your computers settings. It may take a few moments to process.

2. Safe Mode

Because you probably have viruses and unwanted programs slowing down your computer, in order to make the clean up process easier and more efficient we will put your computer into safe mode to run quicker. Safe mode is a basic start up of windows without all the extra bells and whistles that slow down your computer. Also if there is any viruses or programs running on your computer they will very likely not be running in safe mode.

To get into safe mode simply restart your computer then right as it is starting up press F8 on your keyboard, A menu will come up listing some options for you, you need to select Safe mode with networking so that you can still have access to the internet.

It is important to press F8 at a precise time as windows is starting up, some computers will prompt you on the bottom of the screen as its loading but its ok if you just keep pressing it until the menu loads, you can definitely press it more than once.

3a. Windows Updates

Windows frequently releases security updates for problems they find with their operating system. It is usually set up to do it automatically but most people ignore it for whatever reason. Even if this is not the case go to www.windowsupdate.microsoft.com and run through their automatic updates program. Its really easy just basically keep clicking yes and next until it is complete. Once the updates are finished it will prompt you to restart your computer, do so before you continue onto the next step.

3b. Restart Again

The computer will likely restart you into normal windows mode, we will continue to work on your computer through safe mode as it will run the next steps quicker, and we can pretty much guarantee that the viruses won't be running aswell. So restart your computer again and enter into safe mode again.

4. Anti-virus

Ok the easy step to do now is to run a virus scan. Even if you don't have an anti-virus program on your computer you can still scan your computer for free. The site I recommend is antivirus.com put on by a company called trendmicro, this company mainly profits from its corporate clients but offers a free online scan to public users. Simply go to antivurs.com and look for their free online services for home and office use. Then follow the instructions to run the housecall program on all your local hard drives. This program will provide a current scan of your computer removing all known viruses. Its updates everyday with new definitions so you always know you have an up to date program.

There are a couple other virus programs I should mention. Some of the commercial versions of virus software (Norton and Mcafee) are usually expensive, and require a subscription. In addition to the cost they all use alot of your computers resources to run. So if you are trying to remove virus to speed up a computer by installing Norton you likely won't notice a difference in speed as it is probably making just as slow.

The solution is to get AVG free edition, Which is a free virus program for all to use, They do also have a subscription version that has a few more features but even the full version of AVG uses way less resources on your computer then norton or Mcafee.So after you've finished fixing your computer if you do want to install an antivirus program you may choose to.

4b. Restart in normal mode

At this point you will need to restart you computer and let it boot normally to get out of safe mode

5. MSCONFIG

This program isn't very well known to most computer users but it is crucial to keeping your computer clean and organized. MSCONFIG is a windows program on all windows machines that controls all start up settings. To access it go to your start menu and click on the run command then type MSCONFIG and press enter.
This program will open in a new window and there will usually be 4 tabs at the top of the window. The main one that you can edit with little difficulty or computer knowledge is the start up tab, click on it and you will see a list of all programs that start when your computer starts up. In reality there is really only 2 or 3 programs that are absolutely necessary These are your systray and anything to do with windows explorer. At this point what you can do is go through the list and uncheck any programs that look suspicious or that you know are malicious or unwanted. When you apply the settings it will ask you to reboot. Once the reboot is complete if all is well you can uncheck more of the programs from the list and see if you computer will still run as you need it. Usually I uncheck almost all of them then add the ones I absolutely need back in after. You can also work in reverse and gradually remove a few at a time and make sure your computer is still ok after each reset. You will need to performe this step a number of times until you have the computer running as quickly as possible with the programs you need.

Usually some of the types of programs that are ok to have on your start up include your software for your burner, msn, your antivirus software, printer software,windows themes.

Tip: If your not sure what a particular program does then you can google all the information list in the startup list on that program and you can usually get an answer.

6. Registry

Similarly to MSCONFIG and the start up list. Your computer registry stores a list of all programs that have ever been installed on your machine. So if you've had your computer a while and added and removed alot of programs there can be alot of entries in your registry. A handy program also available on the antivirus.com site is the Hijack This program. This program allows you to clean up and edit your registry.

Caution!!!!!
Be very careful with this step, only remove entries you are sure that are old and unused. This can mess up your computer if done incorrectly, that is why the hijack this program is a good tool to use. Risk of failure can be reduced by setting another restore point before you performe this task.

The windows program that is used to allow you to perform the same task is called REGEDIT. I would only suggest this program for advanced users, and I only use it when I know specifically what program I want to remove from the registry as I can search for it with the find and replace tool.

Hope these tips provide you with a little more confidence and can save you a few service call to the tech support companies.

About the Author

Geoffrey Vaughan - High School Teacher and Web Developer. Owner and operator of http://www.MrVaughan.com - Resources for for High School students and teachers in the area's of Computers and Technology.

(ArticlesBase SC #439510)

Article Source: http://www.articlesbase.com/ - Hack Back Your Computer - Revive Your Lagging Pc