Tuesday, 4 December 2012

IT in the future


In the future, everything is going to be quite different. IT is always changing, in revolution, if in nowadays the technology is the way that it is, think, within a few years we may start using another type of materials. 

The HUMAN intelligence is bigger than what people may think!

They think computers are better than human, therefore we've to remember who created.
It wasn't made by itself, was needed a HUMAN.

Tuesday, 17 April 2012

Microsoft Surface DEMO (Novo Vídeo / New Video)



No more keyboards!!
Micrsoft has always developed amazing stuff. Here it is, with new technology "Microsoft Surface". There's no need to type anymore. Everything can be done with the touch of fingers.































Microsoft Surface

RAM

The R.A.M (Random Access Memory) is a form of data storage. Since today, R.A.M takes the form of integrated circuits that allow stored data to be accessed in any order with a worst case performance of constant time.

P.S.U

 
The P.S.U (Power Supply Unit) converts the mains electricity to low-voltage regulated DC power for the internal components of the computer. Some power supplies have a manual selector for input on voltage, while others automatically adapt to the voltage. They also send a signal to the motherboard to indicate when the DC power lines are correct so that the computer is able to boot up.

Some of the ways to connect to a computer network.

A computer network is a collection of computers and their hardware components interconnected to each other electronically. Each computer can share resources, information and send or receive data with other computers in the same network. The speed of connection is faster than a normal connection to the Internet. There are various types of networks based on the medium used to transport the data, scale, communications protocol used, topology and organizational scope. There are different ways to connect to a computer network. Some of them are below:



Personal area network
It’s a personal computer network that is used to communicate among computers and devices that are close to a person. Computer, scanner, fax machine are some of the examples. It could be wired or wireless.

Local area network
It’s a network that is used to connect computer and devices in a particular local area. The network connection at home, library are examples of LAN.

Home network
It’s a residential local area network used to communicate between home digital devices and personal computer, such as scanners, printers and mobile computing devices. An internet can be shared through a cable TV or Digital Subscriber Line provider.

Campus network
It’s a computer network within an area built by interconnection of local area networks. It is usually owned by college/university. The networking equipments and transmission media are all owned by the specific college/university. The network is linked to various computers within the campus territory.

Metropolitan area network
It is a network that covers vast amount of computers in a specific geographical area. The large computer network can be connected to a city, or a country.

Wide area network
It’s a broad computer network that covers a large geographical area.  It can cover an entire country; communicate long distances, or even intercontinental distances.
The devices can be interconnected with devices in wide distance in this network.

Enterprise private network
It’s a network usually built by a company/enterprise to interconnect various company sites for its purposes.
It is usually private network interconnected with different devices of the same company.

 Internetwork
It’s a network built by connecting multiple computer network using routers.
The numbers of routers are used to built a multiple computer network.

Purposes of basic computer components

 
Purposes of basic computer components

A lot of components contribute for a computer to work. Below are some purposes of basic computer components.

Motherboard:
Motherboard is the main circuit board of a computer. It works as a connector for attaching other additional boards. It contains all the important controllers such as CPU, memory, processor socket, BIOS, parallel ports, expansion slots, display screen, disk drive, keyboard etc.

Power supply:
Power supply basically supplies electrical energy to the different parts of the computer components in order to operate the parts of the computer. The computer cannot function without the electrical power supply.

Hard disk:
A hard disk is a magnetic disk that store large amount of computer data and provides access to them. It can store from 10 to more than 100 gigabytes.

Ram:
Random access memory (RAM) provides spaces for the computer to store data for processing by a computer's central processing unit (CPU). The data is only stored in the Ram as long as the computer is operating. The data disappears when the computer is turned off. The data is only stored temporarily so, the data can be erased or re-written.

Floppy disks:
Floppy disks are small, removable, media storage devices. They record data onto a thin, circular magnetic film encased in a flat, square plastic jacket. Floppy disks are somewhat antiquated, having been replaced by memory sticks and re-writable CD storage devices.

Tuesday, 20 March 2012

WHY SPREADSHEETS MAY NEED TO BE CONVERTED TO ALTERNATIVE FILE FORMATS



SPREADSHEETS ALTERNATIVE FILE FORMATS


 The standard or default format for saving spreadsheets is known as xls format because the file extension is .xls. However, in addition to the standard format for saving spreadsheets, there are a number of alternative formats you can use for different purposes.
These include:
    ·         PDF (Portable Document Format).
When you save a spreadsheet as a PDF it can be viewed but not edited by others. The PDF forat is very widely used, so it is ideal if you want to publish your spreadsheet online and allow anyone to down load and view it (even if they don’t have a copy of Microsoft Office).
        ·    HTML (Hyper Text Markup Language).
Saving your spreadsheet as HTML means you could include the spreadsheet as part of a web page. As with     PDF, your spreadsheet can be viewed but not edited in this format.
        ·   CSV (Comma Separated Values) file.
This is a text file with the contents of each cell separated by comma. This format can be used to import the spreadsheet data into a database application.
        ·     TXT file.
This is a plain text file.
        ·    XML file.
This is an industry standard format so is useful when you need to export spreadsheet data to other application (especially non-Microsoft ones) such as a database.
When you save your spreadsheet in any of these formats, the formulae are converted to values. This means you have created a final version of the spreadsheet.

What is the different way to connect computer network


 
Computer network there is any different types of system used to connect to computer. One of the most common way is via a dial-up connect. With a dial-up connection the internet user can connect to the internet via his or telephone line and internet service provider, this Method of connecting to the internet is generally

 Local area networks :(LAN) is a network that connects computers and devices in a limited geographical area such as home, school, computer laboratory, office building, or closely positioned group of buildings.

Most local area networks are built with relatively inexpensive hardware such as Ethernet cables, network adapters, and hubs. Wireless LAN and other more advanced LAN hardware options also exist.

Specialized operating system software may be used to configure a local area network. For example, most flavours of Microsoft Windows provide a software package called Internet Connection Sharing (ICS) that supports controlled access to LAN resources


Wide Area Networks: (WAN) are used for local area networks, where the computers are physically linked to each other. A network interface card (NIC) must be fitted to a personal computer before it can be connected through wires to local area net work .The most common type of NIC is an Ethernet card.

Wireless network:  transfer data without the use of cables or wires. Generally wireless connections are not as fast or as reliable as cables but they can be very convenient they are as increasingly popular technology for small network because the computers, especially laptops, can be moved around while remaining connected to the net work


 

Wired Network Connections:

Wired network connections can be defined as a jack in which we plug a network connection and hence a wired connection is established. Wired network connections are similar to the phone jacks except for the size. Network jacks are yellow and orange in colour. Wired network allows for the fast and easy access to the internet. All the wired networks are full duplex, switched.


 


Peer to peer Network: Peer-to-peer is a communications model in which each party has the same capabilities and either party can initiate a communication session. Other models with which it might be contrasted include the client/server model and the master/slave model. In some cases, peer-to-peer communications is implemented by giving each communication node both server and client capabilities. In recent usage, peer-to-peer has come to describe applications in which users can use the Internet to exchange files with each other directly or through a mediating server.

 by Hiwet Araya

Saturday, 17 March 2012

What is a PowerPoint and what you can do on it?

PowerPoint  PowerPoint is a software programs which is used to make presentations really attractive for the audience. It is an application which is often sold as part of the Microsoft Office suite. It allows you to produce slides intended for presentation to an audience. Each slide can include texts, images, animations, videos or sounds. You can produce a template or master slide' that contains common elements such as footers and headers. You may make your each slide from this master slides.

The following lest gives you a quick overview of what you can do in PowerPoint:
  •  When you create a presentation by using the PowerPoint what we can do is not limited, this program is made up from series of slides. The slides that you create by using the PowerPoint can also be presented as overhead transparencies or 35mm slides.
  • In addition, you can print audience handouts, outlines and speaker's notes to the slides.
  • You can format all the slides in a presentation using the powerful Slide Master which will be covered in the tutorial.
  • You can keep your entire presentation in a single file- all your slides, speaker's notes, and audience handouts.
  • You can import what you have created in other Microsoft products, such as Word and Excel into any of your slides. 

Friday, 16 March 2012

What is a logo?

What is a logo?

A logo is a symbol, a name, or trademark that represents a company and it is a simple representation and hopefully the most memorable aspect of a company. A logo is a great way to trigger memories of a particular brand. A logo is very important it is not the whole brand but at the end of the day people may forget the exact details of your website design. But a logo should be well exhibited to the viewer to be able to remember the logo of your company or logo of your website. If you think of logos like Nike and Apple these companies have such well made logos. For instance if somebody ask you to draw the Apple or the Nike tick logo you are able to do it straight from your memory and that is a part of good branding.

There is an example that explains more the logo

For instance you are crossing the road suddenly you see a poster of a beautiful woman drinking Coca cola and right below is a company name written. What will catches your eyes first, the woman or the Coca cola? Will definitely you see the woman and not even read what is written in the poster. The purpose of this example is said that a logo or pictures catches more attention than the text. People remember less the name but they remember the pictures and logos associated with the company. Logo helps in getting more customers. Look at all the big companies like Coco Cola, T-mobile, 3G, O2 and a lot more they have a symbol representing them. Just like a flag represent a country, a logo represents a company. That’s why all the successful companies have a logo associated with them.

What is a memo?

                                  What is a memo ?

A memo, also known as a memorandum, is a method for communication.Memos are commonly used for communicating at a place of work . Memo sent and received in offices, all over the world are used to communicate with the internal audience,that is the employees and so on, and not with the external audience such as suppliers,customers and many more. It's main purpose is to provide assistance to the memory by recording event such as a business meeting.







    

Wednesday, 14 March 2012

What is a Web server ?

                                    What is a Web server ?
A Web server is a computer that stores website on the Internet and delivers webpages on the Internet and delivers webpages to viewers on request. This service is referred to as web hosting. Every Web server has a unique address,called an Internet Protocol address, that tells other computers connected to the Internet where to find the server on the vast network. The Internet Protocol (IP) address looks something like this :69, 93, 141,146; This address links to a more human -friendly address such as http://www.carley.com/ Web hosts rent out space on their web servers for people or businnesses to set up their own websites,and the web server allocates a unique website address to each website it hosts.

Tuesday, 13 March 2012

What lies beneath the Index...


When regular content becomes “too mainstream”.

We know it – everyone uses the Internet. Facebook, YouTube, Twitter are just a few websites people access every day. The time spent on these websites sometimes may go up to many hours on a single day. But that’s exactly where usual user’s concert reaches its end. Truth is: Google does not have all the answers, Facebook doesn’t know all the people and 4chan is not the only website that may scar you for life.
Behind the cover hides what’s sometimes called “Invisible Internet” also known as the Deep Web. So, first of all...

What is the Deep Web?

Good question! For short, the Deep Web consists of non-indexed web pages. In other words, the regular web search engines, such as Google, Yahoo cannot use their bots (crawlers) to access those web pages because of some reasons.
This video gives a brief explanation of what's the deep web.


So what does this Deep Web consist of then??


Okay, so what do you usually see on Facebook?Twitter? Or in summary - all the surface web? Well, it's nothing more than comments, discussions, blog posts, bookmarks, quotations and that's pretty much it.
Now, Deep Web has something more. For example, if you wanted to start a new business, the answer on how to do it is there... but you won't find it! Not really.
The Deep Web holds data created by databases (Access, Oracle, MySQL, SQL Server), non-text multimedia files, such as PDFs, images, software, etc., some content from subscription-based websites. Doesn't look impressive? The information held on databases has no rules, it could be absolutely anything, starting with laws and ending with full articles.


Okay, it's cool. But how do I get ALL this information then?


- Try to figure out the information that might be stored in the database and search for it.
- Use vertical search engines to access the content.

Mining the deep web is a subtle thing and it makes it more interesting at least 10 times.

So, thank you for reading and good luck exploring what lies down there.

Some of the ways to connect to a computer network.



A computer network is a collection of computers and their hardware components interconnected to each other electronically. Each computer can share resources, information and send or receive data with other computers in the same network. The speed of connection is faster than a normal connection to the Internet. There are various types of networks based on the medium used to transport the data, scale, communications protocol used, topology and organizational scope. There are different ways to connect to a computer network. Some of them are below:


Personal area network
It’s a personal computer network that is used to communicate among computers and devices that are close to a person. Computer, scanner, fax machine are some of the examples. It could be wired or wireless.


Local area network
It’s a network that is used to connect computer and devices in a particular local area. The network connection at home, library are examples of LAN.


Home network
It’s a residential local area network used to communicate between home digital devices and personal computer, such as scanners, printers and mobile computing devices. An internet can be shared through a cable TV or Digital Subscriber Line provider.

Campus network
It’s a computer network within an area built by interconnection of local area networks. It is usually owned by college/university. The networking equipments and transmission media are all owned by the specific college/university. The network is linked to various computers within the campus territory.

Metropolitan area network
It is a network that covers vast amount of computers in a specific geographical area. The large computer network can be connected to a city, or a country.


Wide area network
It’s a broad computer network that covers a large geographical area.  It can cover an entire country; communicate long distances, or even intercontinental distances.
The devices can be interconnected with devices in wide distance in this network.

Enterprise private network
It’s a network usually built by a company/enterprise to interconnect various company sites for its purposes.
It is usually private network interconnected with different devices of the same company.

 Internetwork
It’s a network built by connecting multiple computer network using routers.
The numbers of routers are used to built a multiple computer network.

Jetman Flight at Grand Canyon West






Ever wanted to fly like a bird?

Yves Rossy nicknamed 'Jetman' was the first person to fly  a jet engine-powered wings. He developed and built a system comprising a back pack with semi-rigid aeroplane-type carbon-fiber wings with a span of about 2.4 metres (7.9 ft), powered by four attached Jet-Cat P200 jet engines  modified from large-model, kerosene fueled, aircraft engines. His first flight occurred in November 2006 in Bex, lasting nearly six minutes and nine seconds. He flew over some places. On 5 November 2010, he flew a new version of his jet-powered flight system and successfully performed 2 aerial loops before landing via parachute. He launched from a hot air balloon  at 2,400 meters (7,900 feet) and flew a total of 18 minutes before landing. The wingspan of Rossy's latest craft has been reduced to 2m. He says that the suit with the jet engine-powered wings attached will be available for human to fly in near future. Isn't that amazing? I cant wait to get my hands on them and fly like a bird.

Monday, 5 March 2012

SYSTEM SECURITY

The hardware used in organisations can be worth many hundreds of thousands of pounds. If any of it is damages or stolen then it may take a while to replace it. The cost of replacement will usually be covered by insurance, so the main problem will be the delay in installing replacement hardware. The delay can mean that business is lost and the company will lose money.


Threats to data stored on a computer
 ICT systems have to be protected from a number of threats. Someone may access a system illegally in order to read sensitive information and, even though they may not cause any damage to the system, they may create all kinds of problems to the organisation. Worse still, they may actually change data or even delete it.

The main aims of security are:
To maintain the system as intended
To protect the system from unauthorised changes being made to the software or data
To protect the system from both accidental and deliberate illegal access
To detect successful and unsuccessful attempts at illegal access
To provide a means of recovery if things go wrong.

Computer Viruses














Viruses are a small computer program that can cause damaged to a computer system. Viruses can cause a lot of damage to software, by deleting and altering programs and data. They can be spread from one computer to another through a network system, or on disks.

 Media failure














If a disk becomes damaged then the data stored on it may be lost. This can be true of fixed hard disks as well as all the removable media. It is sometimes possible to recover data from a disk, even if some of it has been corrupted. But to protect against the loss of data, all disks should be backed up regularly.

Back up procedures













 The main aim of security is to maintain the system hardware and software as intended. So if things do go wrong it is important to be able to re create the system that existed before the damage was done.
It is far more difficult to replace data. But if proper backup procedures have been followed then the data can be copied from the backups and the system can revert to how it was before.

Thursday, 1 March 2012

How does the Web Work?


What Hardware and Software do you need to be able to connect to and use the Internet?


Before you can connect to the Internet and access the World Wide Web, you must have certain equipments as follow:
·         A computer,
·         A modem and access to a telephone line or a local area network (LAN),
·         An Internet browser and software to connect you to the ISP,
·         And finally an account with an Internet Service Provider (ISP).
These things work together to establish a connection to the internet and allow the access to the web.

First of all the computer is essential, next the modem is necessary if you are using a telephone line to access the internet. It translates the language that computers talk into a language that can travel across the phone lines, and vice versa. Two lots of software are also needed to connect you to the internet. The first is the software that connects you to your ISP and the second is a browser. Browsers go and get web pages and display them on your computer. The two most popular and commonly used are Mozilla Firefox and Google Chrome. Finally the ISP provides you with an account that you will pay monthly or yearly in return for accessing the internet through the ISP. This account will come with a user name and a password that you use to log on to the internet.


Simple diagram of connection to the internet via a modem and telephone

Friday, 24 February 2012

The Elder Scrolls – “Skyrim”


Expectations and reality.

And so, after lots of discussions, debates, on 2011/11/11 the famous “Skyrim” has finally been released. “Skyrim” is the fifth game of The Elder Scrolls game franchise.
As many have expected, this game was an incredible success. It’s been released for several platforms, thus expanding the amount of players. “Skyrim” is said to have taken many souls of mortal players, so let’s dig deeper and see, what the craze about.

Arrows, knees and Alduin in between.

The main story starts with you as a prisoner, on his way to execution. Just before you lose your head, a mysterious dragon appears. He burns down the village, kills several people and – saves your life. But that doesn’t matter, you’ll kill him later.
Soon after killing your very first dragon, you find out you’re something, called Dragonborn. Although you’ve no idea what that is, everyone suddenly starts worshiping you. Of course, it’s cool, but with the amount of trouble caused, you’d rather stay in and drink some mead.
The game is not only about chasing the poor dragon. It contains lots and lots of side quests for your personal taste. By doing them, you may collect coins, artefacts, weapons and some epic armour.  And this is where it gets funny.
The land of Skyrim has quite a few major holds, ruled by jarls. And, just like any city, they have guards. It appears that members of Skyrim’s development team in Bethesda experienced a great lack of coffee, because every single guard knows this line – “I used to be an adventurer like you... but then I took an arrow in the knee”.

Needless to say, this phrase was a huge success. In fact, it became so popular that now it’s now probably a valid reason to hurt someone.
Now, back to game play. After completing whole line of quests you finally get to meet your saviour, Alduin. If you’re a smart player, you can actually beat Mr. Alduin with nothing else, but an axe. Hell, even fists would probably do the job!
Enough spoilers, we don’t want the game ruined, do we?

“Horse gravity”, or why you might re-consider buying this game.
Despite its greatness, “Skyrim” has its flaws, minor and major ones. Some quests/NPCs often appear bugged, dragons, who act like overgrown worms and so on. Also, the game contains other minor issues that could’ve been fixed easily, but Bethesda must have experienced a horrible deprivation of coffee, because “Skyrim” comes packed with all kinds of bugs. But still,  the awesomeness of it stays. 

The end.



This. Is. Not. Sparta.

This is Madness, Madness Combat to be exact.

A running animation made by one Matt "Krinkels" Jolly, so far the series has reached 10 episodes with 3 side episodes showing what happens to two of the side characters.

As great as this flash is it isn't exactly for eveyone, on the site it is currently situated it is rated 17+ and features alot of blood and many humanoid figures being killed in different ways.

The series started with a storyless blood(less) bath in where a single man takes down 30 men, two zombies and a Jesus looking character.

After that the story starts in Nevada (as it does in each of them) with the protagonist named Hank J. Wimbleton hunting the sheriff but in the end fails and is killed by Jesus.

In almost all of the episodes Hank dies but this never makes the series any less interesting since the deaths are unique from each other.

I would highly recommend those that can watch this animated series watch it indefinately it is amazing, the series can be found here: http://www.newgrounds.com/ or at Krinkels official site here: http://www.krinkels.net/index.html

Personal Review on Call of Duty Morden Warfare 3 Multiplayer

This is my outlook of CoD (Call of Duty) MW3. To all CoD fans I am currently 10th prestige (at the time of writing) so I fill I can give a in-depth review. I am going to start off with the graphics. Many have compared the graphics to the previous title mw2 but i can say although similar there is a definite improvement in them. For example poor sharpness when laying in grass or close up to cars in mw2 but is much better in mw3 although they can never really get rid of these minor defects.

Gameplay

As far as game play goes it’s a must that it is different from other CoD titles but at the same time must fill like CoD still I would say they have achieved that although some would say it fills to like previous title mw2.there are also 2 new game modes added to the playlist . 1st  is kill confirmed a team death match based game but u do not get a point for your kill enemies drop dog tags which you must collect for the point . Secondly team defender, another team death match based game but this time teams must fight to capture a neutral flag. Teams must hold the flag and get kills to increase team score double point are awarded to the team who holds the flag.

Maps

The maps are all country based for example underground based in England and resistance based in France (obviously due to the world war 3 theme) the maps are very well designed and fort out .they are easy to notice the country they represent .unfortunately for all you snipers out there, there are hardly any (if any to be honest) maps that you will play and think you know what I think I’ll do better with my sniper. which is a shame considering  the epic fail black op had to there sniper fan base hopefully just like black ops they will bring better sniper maps in the dlc (downloadable content) to come. I have had much fun playing mw3 I hope you guys did too thanks for reading !

What is a Motherboard?


The Motherboard is the central printed circuit board put in many modern computers and holds many of the crucial components of the system, providing connectors for other peripherals. One of the important components of a motherboard is the microprocessor’s supporting chipset, which provides support interfaces between the CPU and the various buses and external components. The Motherboard includes: sockets, a chipset, non-volatile memory chips, a clock generator and power connectors.

Tuesday, 21 February 2012

Applications and Their Features

Click to enlarge this picture - you will find a great guide to some of the common applications people use on a dail basis! Can you guess the name from the icon button and description?

Laser Printer Samsung CLP-320 Colour review


There are various different types of printers on the market, but with a laser printer you produce more printed material at high speed because it is the best. Laser printers are not only faster than inkjet printers, but they're also cheaper to run. As for a number of inkjet printers they are designed to cope with low-volume print jobs, laser printers are stronger, as a result it prints page after page of crisp text and graphic.

Laser printers need little in the way of maintenance too, and only rarely require a change of cartridge. Laser printers are best for black and white printing. Although there are colour laser printers on the market, they tend to be expensive and more suited to printing graphics than photos.

Type of Computer

Ways to Connect to the Internet

Different ways to connect to a computer network


As we are in the 21st century our communication is highly dependent on the computer. A PC can be linked to local area networks. Networks use a number of different methods to send data from one computer or device to another.

There are different ways to sending data and they fall into two groups: there are those that use wireless and those that do not.

  • Wired connection – is used for local area networks, in these areas the computers a linked to one another. A network interface card (NIC) is to be placed in a personal computer for one to be able to link it through the wires to a local area network. The common type of NIC is an Ethernet card.
  • Wireless connections – passes information without the use of cables or wires. Though it is not as efficient as the cable it is very convenient. They are efficient when it comes to mobile PC’s such as laptops, they can be moved around and still be connected to the internet and for that they are very popular.

Wireless networks normally use radio transmissions:

  • Wi-Fi – Is a wireless network which is used to send information between devices and computers. One can use Wi-Fi instead of cables by making small networks in the house or at your work place. Most mobile phones can use Wi-Fi to access the internet.
  • Bluetooth – is similar To Wi-Fi difference is it works over short distances and is slower. Its main used is to send information between two devices such as a laptop and a printer.


  • 3G (3rd Generation) – Is a radio technology that is used by mobile phone networks. It can carry more information than the older mobile phone systems. You can link to Wi-Fi in any area that has Wi-Fi if you have a laptop for example in airports. Most Wi-Fi networks are privet and use protected passwords. There are also public Wi-Fi networks that can be provided by a commercial organisation such as a hotel or coffee shop.



Monday, 20 February 2012

Advantages and Disadvantages of Databases

Advantages


  • Reduced data redundancy ;Sometimes Data redundancy refers to in computer data storage, is a property of some disk which provides fault tolerance, so that all or part of the data stored in the array can be recovered in the case of disk failure.


  • The cost typically associated with providing this feature is a reduction of disk capacity available to the user, since the implementations require either a duplication of the entire data set, or an error-correcting code to be stored on the array.


  • Improved data security; This is data about living, identified or identifiable individuals and includes information such as names and addresses, bank details, and opinions expressed about an individual.


    • Disadvantages
      Database systems are complex, difficult, and time-consuming to design • Substantial hardware and software start-up costs

    • Damage to database affects virtually all applications programs

    • Extensive conversion costs in moving form a file-based system to a database system

    • Initial training required for all programmers and users

    By Bismark!

    What is a MEMO?

    A memo, also known as a memorandum, is a method for communication. Memos are commonly used for communicating at a place of work.

    Memos, sent and received in offices, all over the world are used to communicate with the internal audience, that is the employees and so on, and not with the external audience such as suppliers, customers and many more.

    Its main purpose is to provide assistance to the memory by recording events or observations related to a particular event such as a business meeting.
    Computer systems

    A computer is a system of many parts working together. The physical parts, which you can see and touch, are collectively called hardware. Software refers to the instructions, or programs, that tell the hardware what to do.


    Types of Computer systems 

    A Desktop computer is the type of computer people are most familiar with.  It contains most of the computer components within its case, such as the CPU, the Hard disk and the RAM.  A monitor would usually sit on the desktops case and an external keyboard and mouse would be attached to it.




    A Laptop is a portable computer that is powered by mains electricity via an AC adapter; it can also be used away from an electricity supply using its rechargeable battery.  A laptop has most of the same components of a desktop computer, a screen, a keyboard and a pointing device (Touchpad), these are built into the laptop and do not need to be externally attached.



    Handheld computers or PDAs (Personal Digital Assistant) are computers small enough to store in a pocket and to use in the palm of your hand. Handheld computers are usually used for keeping schedule with calendars, using its address book and accessing the internet.
    
    What hardware and software do you need to be able to connect to and use the Internet?


    To connect to the Internet you need the following four things:

    1. A modem and telephone line (if you are using dial up access)
    2. An Internet browser (software) and software to connect you to the ISP
    3. An account with an Internet Service Provider (ISP) Souvenirs

    The Modem is necessary if you are using a telephone line to access the Internet. It translates the language that computers talk into a language that can travel across the phone lines and vice versa.


    The ISP is your gateway to the Internet. You access the ISP over the phone line, and the ISP will connect you to the Internet. The ISP provides you with e-mail and access to the Internet.



    You need two lots of software to connect to the Internet. The first is the software that connects you to your ISP. This is different for each ISP. Some ISP's will give you a disk with the connection software on it. Other ISP's will use the connecting software that comes with the operating systems Windows 95, OS7 and OS8. They will give you the settings to put into this software.

    The second lot of software you need is a Browser. Browsers go and get web pages and display them on your computer. The two most popular and commonly used browsers are Netscape Navigator and Microsoft Internet Explorer. These browsers also provide the software for e-mail and to read Usenet newsgroups. If you have a browser that is just a browser, you will also need software for e-mail and for reading newsgroups.




    Microsoft develops, manufactures, licences and supports a wide range of products and services related to computing. Microsoft is an American multinational corporation headquartered in Redmond, Washington, United states.

    Microsoft first rose to dominate the home computer operating system market with MS-DOS in the mid 1980s, followed by a Microsoft windows chain of operating systems. Microsoft also dominated the office suite with Microsoft office. Some of the most known Microsoft office applications are Microsoft Word, Microsoft excel, Microsoft PowerPoint and Microsoft Access.

    In recent years the company has gone into the video game industry with the Xbox and its successor, the Xbox 360 as well as entering consumer electronics and digital services market with MSN, Zune and presenting the Windows Phone OS.

    The rise of the Microsoft Company has made an estimated three billionaires and 12,000 millionaires out of Microsoft employees.

    Microsoft Word
    Microsoft word is a word processor. It is a component of the Microsoft office software system.

    Microsoft Excel
    Microsoft Excel is a spreadsheet application. It features calculation, graphing tools, Pivot tables and a macro programming language called visual basic for applications. Excel also forms part of Microsoft office.

    Microsoft PowerPoint
    Microsoft PowerPoint is a presentation program. PowerPoint consists if a number of individual pages or “slides”. These presentations are usually presented live on a computer.

    Microsoft Access
    Microsoft access is a database Engine with a graphical user interface and software- development tools. Using Access users can create tables, queries, forms and reports, and connect then together with macros.





    Related Posts Plugin for WordPress, Blogger...