2012/01/08

Windows Operating System - 2

Windows Desktop


        Desktop just like a physical top of a desk, the Windows desktop is where you put the things you are working on or went to access. They are appearing on the monitor hence, the full appearance calls desktop. The desktop is the main screen in Windows (or any other operating system) where you can put icons that act as shortcuts to various programs.


  • Icon



        An icon in Windows is a small picture or object that represents a file program, web page, or commands. Most of the time, the icon picture relates to the function of the item that it represents.

        For example, if the icon is attached to an e-mail program, it might be a picture of a letter. Icons are located on the desktop, in the start menu, and various other places.


  • Shortcut

       A shortcut is a Windows icon that when clicked does something - starts a program, views a graphic, plays a sound, etc. Since they are only "paths" to the program, they can be deleted without deleting the actual program itself. On your desktop, you probably have several shortcuts.


  • Recycle Bin

      When you delete a file, Windows XP will place the file into the recycle bin instead of deleting altogether; this allows you to restore the file in case you deleted it by mistake. For example say you deleted a file by accident you could double click on the recycle bin icon to see its contents, and then restore the file back to where you deleted it from by right clicking on it and then selecting restore from the menu that appears.



Keeping the Desktop tidy

      The more you use Windows XP the more your desktop may start to fill up with icons, either because you install more software or you create your own icons.

      Windows XP can automatically align and sort your desktop icons to keep the desktop tidy, to achieve this click the right mouse button anywhere on the desktop and a menu will appear, hover the mouse pointer over Arrange Icons By and a sub menu will appear, from here you can sort your desktop icons be Name, Size, Type, Last Modified date.

       Selecting the Auto Arrange option will automatically align your desktop icons every time you add one to the desktop.

       The Desktop Cleanup Wizard will remove any desktop shortcuts that have never been used to a new folder on your desktop called Unused Desktop Shortcuts.





 






Windows Operating System - 1 | Using the Mouse



Windows Operating System - 1

Using the Mouse

A mouse is a hand - held device that controls the movement of a pointer on your screen. You use your mouse to perfome tasks on your computer.

As you move the mouse, a mouse pointer moves on your screen. When you position the pointer over an object, you can press (click pr double click) the mouse button to perform different action on the object. The pointer usually appears as an arrow, but it can change shape. The following sections explain the other actions you can perform with your mouse.



Mouse Functions
  • Click - To select something on-screen., click the left button quickly and lightly - whatever you are pointing to when you click appears high lighted to show that it's selected.



  • Double-Click - To activate an object on-screen, click twice in rapid succession. Click - Click will manipulate the object usually resulting in the opening of a specific program.
  • Drag - To move or size an object on-screen, hold down the mouse button while you move the mouse across the mouse pad. Dragging moves the object to a new location. Dragging a border or frame changes the size of the object.
  • Right-Click - Displays special menus. When you right-click, you see a menu of commands related to the icon or area of the screen that you are pointing to.
  • Wheel Button - Some mice have a third button or wheel button. The Wheel Button allows you to scroll from screen to screen in a multiple screen document. It also allows you to move to a certain location in the document quickly by moving the mouse button, similar to dragging the navigation bar on a web page.

Windows Operating System - 2 | Windows Desktop



2011/10/26

Types of Operating Systems

           Operating system can be broadly classified into two categories based on the type of interface provided to the user.

Command Line Interface

         In these types of operating systems the user can enter commands through the keyboard and each command will perform a specific action. But this type of interface is very difficult for a beginner to use, because the commands have to be remembered.

          MS-DOS is such a Operating System. Dos stands for Disk Operating system. It was developed by Microsoft as an operating system in the 1980s. Windows 3x needed DOS to run, but the later versions of Windows do not.



Graphical User Interface

         These operating systems provide the user the ability to manipulate the computer in a more interactive way. These systems are more user-friendly and easier to use than command driven interface, because the commands need not be learnt.
E.g. Windows, MacOS, Linux

Windows 7

MacOS


Operating System

         An Operating System or OS is a software program that enables the computer hardware to communicate and operate with the computer software. Without an Operating System, a computer would be useless.


Features Expected of an Operating System
  • To Startup and Shutdown the computer
  • To act as an interface between the user and the hardware.
  • To perform house keeping tasks such as file handling, disk/ memory management.
  • To be able to allow the user to configure the system. This includes changing the types of printers, adding new hardware (such as sound cards), etc.

2011/10/20

The Internet

   The Internet is a network of autonomous computer networks that spans the globe. It provides an infrastructure for global electronic information exchange. Today the Internet is used by millions of people of facilitate various activities such as business, education and plain communication.

   The Internet grew out of a United States Department of Defense project, the ARPANET (Advanced Research Project Agency Network) started in late 1960s. Its main objective was to provide network links between universities, research organizations and remote computer centers.

            The following figure shows how the Internet is structured. At the bottom level are the organizations and home uses connected to the Internet. Typically users connect to the Internet through local Internet Service Providers (ISPs). The ISPs are in turn connected to the Internet Backbone through regional networks. Typically ISPs lease high-bandwidth lines that connect into the Internet and rent that bandwidth to Internet users.

             Typically a home user (client) connects to the Internet via telephone lines. If the telephone network is analog a modem is needed in between the computer and the telephone line to convert digital signals generated by the comuter to analog signals that are being transmitted by the telephone network.

              When a client registers with an ISP for Internet usage he will get an account. To access the Internet by using this account, the client has to dial the ISP and log on to this account.

             On the Internet information is available mainly through three mediums: the World Wide Web (WWW), Usenet News (News) and Electronic Mail (e-mail). The WWW is built on top of the Internet. It can be viewed as a large notice board with posters and printed notices stuck to it. On the WWW Web servers provide information on the Internet. A user can access the information by using a web browser.
  • To Connect to the Internet, your dialer software calls an access number.
  • Your modem converts the signals from your computer to signals that travel over wire lines to an Internet service provider (IPS).
  • Your IPS provides the connection to the Internet.

2011/10/05

How to Protect a Computer from Computer Viruses

        There are many ways of preventing a computer from virus attack. Some of these precautions are listed below.
  • Verbal Warning
  • Avoiding the use of unchecked disks
  • Avoiding the use of unauthorized or unchecked software

Anti-virus Software

        Anti-virus software contains anti-virus scanners, which look for viruses.
  • On-access scanners - Automatically check the hard disk and diskette each time the system starts up.
  • On-demand scanners - Executes only on users demand and can be scheduled to run at various times
       Most commercial anti-virus software provides both types of scanners. It will take some time for an anti-virus software designer get to know about a new type of virus and to write software to detect it. Therefore anti-virus software gets out of date very often.


Firewalls

        A computer generally has many ports (think of them as doorways), which allow external programs to access the computer. Hackers use programs to automatically detect vulnerabilities in the computer and gain access to the computer by using this weak access points. Firewall protection secures these ports so malicious programs can sneak into your machine. Firewall software can also be used to check whether files downloaded from the internet follow a defined security protocol and free of viruses.


Main Types of Virus

Boot Virus

          Boot virus infects the boot sector of the hard disk and is activated every time the computer is switched on. Once infected, the computer may fail to start properly. Usually boot viruses spread from the boot sectors in floppy diskettes to the boot sector of the hard disk. When you start up the system with an infected diskette in the diskette drive, the virus transfers from the diskette to the boot sector of the hard disk. Once infected, the virus may remain in the main memory and infect other diskettes.


File Virus (Parasitic Virus)

         File viruses are virus programs attached to executable files. They become active every time the program is executed.


Macro Virus

         A macro is a collection of application specific instructions coded to automate some manual process such as formatting a word document. Macro Viruses are either complete macros or macro segments embedded as parts of legitimate macros. They may come straight from the software manufacturer's original disks. Once a computer is infected with a macro virus the following action may result.
  • Unusual messages
  • Unknown macros listed in macros list
  • Save data in unintended formats
  • Lost data

Main Phases of Virus Activity

The main phases of virus generally follows are;
  • Gains access to the system
  • Lies dormant
  • Propagates
  • Virus is triggered by some event
  • Virus Action


2011/10/03

Popular Viruses and Worm Programmes

  • 2000
           May : The VBS/Loveletter ('ILOVEYOU') worm appeard. As of 2004 this is the most costly virus to business, causing upwards of 10 billion dollars in damage.
 
  • 2001
            January : A worm strikingly similar to the Morris worm, names the Ramen worm infected only Red Hat Linux machines running version 6.2 and 7.
 
             July 13 : The Code Red worm attacking Microsoft Internet Information Services.
 
             October 26 : The Klez worm is first identified. 
 
  • 2003
             January 24 : The SQL slammer worm also known as the Sapphire worm, attacked vulnerabilities in Microsoft SQL Server and causes widespread problems on the internet.
 
             August 12 : The Blaster worm, also known as the Lovesan worm, spread rapidly by exploiting Microsoft Windows computers.
 
  • 2004
             January : MyDoom emerges, and currently holds the record for the fastest-spreading mass mailer worm.

             December : Santy, the first known "webworm" is launched. It infected around 40000 sites before Google filtered the search query by the worm.
 
  • 2005
           August 16 : The Zotob worm and several variations of malware exploiting the vulnerability described in MS05-039 are discovered. The effect was overblown because several United States media outlets were infected.
 
  • 2006
              January 20 : The Nyxem work discovered. It spread by mass-mailing. It attempts to certain types, such as Microsoft Office files.
 
               February 16 : Discovery of the first-ever virus for Mac OS X, a low-threat worm known as OSX/Leap-A or OSX/Oompa-A, is announced.
 
  • 2007
               January 7 :  A worm generated by hackers of the popular website MySpace was discovered by many users on the site.
 
 

Components of a Virus

A virus comprises of four general components.
  • The replicator (or Engine) : Replicates the virus.
  • The safeguard : Prevents the detection and the removal of the virus.
  • The trigger monitor : Monitors for a specific condition to deliver payload. These specific conditions may be the arrival of a particular date, time, keyboard stroke, etc.
  • The payload : the action it does apart from propagation. This action may be an amusing or malicious action resulting in distraction from the current work or destruction of data.

Computer Viruses

Some of the main reasons for writing viruses are;
  • Hacking.
  • To prevent copying software.
  • Revenge - Employees may plant "Time Bombs" in programs.
  • Fraud - Viruses may allow access to an otherwise secure system.
  • Political and terrorist motives.
  • Commercial sabotage - Damage the reputation of a competitor.
  • Warfare - Incorporate a virus to an enemy's computer.

Viruses can be transmitted from one system to another through various media types such as;
  • Floppy disks.
  • Tape backups.
  • Internet.
  • Software.
Some of the symptoms that a computer will show up when infected with a virus are listed below.
  • Programs take long time to lead than normal.
  • The floppy disk drive or hard drive runs when you are not using it.
  • New files keep appearing on the system and you do not know where they come from.
  • Strange sound or beeping noises come from the computer or keyboard.
  • Strange graphics are displayed on your computer monitor.
  • Files have strange names you do not recognize.
  • Unable to access the hard drive when booting from the floppy drive.
  • Program sizes keep changing.
  • Conventional memory is less than it used to be and you cannot explain it.

2011/09/20

Network Protocols

           A network protocol is "an agreement on how to converse". The four most commonly used network protocols are TCP/IP, IPX/SPX, X.25 and SNA. Each protocol performs essentially the same functions, but each protocol is incompatible with other unless there is a special device to translate between them.


TCP/IP Network Addressing

              TCP/IP protocol uses 3 different types of addressing to move data between computers: Physical, Logical and Port addresses. The physical addresses (MAC addresses) are utilized to move data within a single LAN, logical addresses (IP addresses) are used to move data from one LAN to another LAN across the network and the port address is used to transmit data to the intended application.

              MAC addresses burned into hardware. IP address is a 32-bit value. This means that there are fore billion different IP address possibilities. IP addresses may be sent in software and are thus flexible. An IP address contains the address of the device itself as well as the address of the network on which the device is located. Therefore, if a device is moved from one network to a different network, the IP address of the device must be changed. IP addresses are hierarchical addresses like phone numbers and zip codes. They provide a better way to organize computer addresses like social security numbers. 


              The International Network Information Center (InterNIC) assigns to companies blocks of IP addresses based on the size of their networks.


How to Determine Your IP Address?

                                                     Go to the Start menu and select Run... Then type "cmd" in the box and click OK. Then type "ipconfig" in the command prompt and press Enter.


Backbone Network Components

         A backbone network is a network that connects many networks in a single site. There are many backbone network components.

  • Router - A router is a special device that enables the connection of two or more networks so that the computers in different networks can communicate with each other. A router may be a special device, a computer with several network interface cards or a special network module in a computer or other network device. Routers also allow a network to be segmented into smaller logical networks or subnets.



  • Bridge - A Bridge is an interface that enables similar networks to communicate.





  • Gateway - A Gateway is an interface that enables dissimilar networks to communicate. 


2011/09/18

Data Transmission Types

       In a network data can be transmitted in two different ways, serial transmission and in parallel transmission.
  • Serial Data Transmission - Bits are transmitted sequentially, one after the other.
  • Parallel Data Transmission - Bits are transmitted through separate channels simultaneously.
     The standard unit of measure used to specify the speed of the data flow through a network is bits per second (bps).


Network Interface Card (NIC)


 A network Interface Card provides the physical connection between the computer and a network cable and enables access to a network. Most modern computers come with NIC cards pre-installed, and ready to be connected to networks.





 Types of Networks

             There are two primary types of networks.
  • Local Area Networks (LAN) - LAN is a communication network that serves users within a confined geographical area. Private parties generally own LANs and their effective range is limited.
  • Wide Area Network (WAN) - WAN is a communications network that has no geographical limit. A WAN may span hundreds or thousands of miles. In general, a WAN is made up of a number of interconnected LANs. WANs can use either analog (telephone lines) or digital signals or a combination of both. WANs may be privately owned by large organizations or may be public.
  • Local Area Networks (LAN) - Local area networks are two types: client server and peer- to-peer. 
            - Client Sever
                                   A Client server LAN consists of devices that provide services called servers, and devices that request services from servers, called clients. Typically servers are the devices that manage shared devices such as printers.

           - Pear-to-Peer Networks 
                                         In a peer-to-peer LAN there is no server, instead all devices communicate directly with each other. Peer-to-Peer networks are also called work groups. In a peer-to-peer network there is no hierarchy among the computers. Typically the number of computers in a peer-to-peer network would be less than 10. All the computers in the network are treated equal and are referred to s peers. Each computer may function as a client and a sever and there is no central administrator to manage the entire network. The users at each computer determine what data on his computer should be shared with the other peers.


2011/09/16

Communication Media

           The communication media is the matter or substance that carries the voice or data. Many different types of transmission media are currently in use. All these different media types can be grouped into two categories: Guided media and Radiated media.


Guided Media

          The guided media are those in which the data flows through physical media.
  • Twisted-pair Wire - A twisted-pair wire consists of two insulated copper wires, twisted around each other and covered in another layer of plastic insulation.
  • Coaxial Cable - A coaxial cable consists of insulated copper wire wrapped in a metal shield, which is then wrapped in an outer external cover. Often many coaxial cables are  bundled together.
  • Fiber-Optical Cable - Consists of hundreds of thin glass wires that transmit pulsation beams of light.






Radiated Media

             And the radiated media are those in which the data is broadcast through the air.
  • Radio Transmission - Radio transmission use the same basic principle as standard radio transmission. When using radio transmission each device/computer on the network should equipped with a radio transmitter/receiver on a specific frequency that does not interfere with commercial radio stations. The transmitters are very low power and are designed typically to transmit a signal to a very short distance, typically up to 500 feet.
  • Infrared Transmission - Infrared transmission uses low-frequency light wave, below the visible spectrum, to transmit data through the air. Infrared transmitters are seldom uses to transmit data to and from portable or handheld computers.
  • Microwave Transmission - Microwave is a high-frequency beam with short wave length. Microwave can be transmitted over a direct line-of sight path between any two points. This transmission medium is typically used for long-distance data/voice transmission.
  • Satellite Transmission - In satellite transmission, singles are transmitted to a satellite 500 to 22,000 miles in space. One disadvantage of satellite transmission is the delay that occurs in transmission, which is known as the propagation delay.


Network Topologies

           Networks can be laid out in a number of different ways. The physical layout of a network is called its topology. The basic network topologies are Star, Ring, Bus. These basic topologies can be combined in a variety of ways to build complex hybrid network topologies.


Star Topology

           In a star network all computers and other communications devices are connected to a central point such as a hub, file sever or a host computer.



Ring Topology

            In a ring network all communications devices are connected in a continuous ring. Messages are passed around the ring until they reach the right destination.



Bus Topology

           In a bus network communications devices are connected to a common channel. There is no central computer and the communications devices transmit message to the other devices.



2011/09/14

Data Communications

           Data Communication is the process of moving information from one point to another by means of some transmission system.


Network

          A network is a collection of entities that exchange information or good. Few examples of networks are railway system, nervous system of animals, telephone system.


Communications Network

          A communications network is a system of interconnected computers, and communication devices that can communicate with one another and share resources. At the most elementary level, a computer network consists  of two computers connected with each other by a cable to allow them to share data. A device connected to a network is called a node. A node may be a device such as a computer, a printer, workstation etc.


Advantages of Networks

         Networks offer several advantages over stand along systems. Some of these advantages listed below:
  • Sharing of peripheral devices: Expensive resources can be shared by connecting them to the network.
  • Sharing of programs and data: Some programs may be expensive, and it may not be possible to purchase multiple copies. Such programs can be shared a network.
  • Better communications: Networks can be used to establish communication such as e-mail.
  • Access to databases: Users can access numerous databases by making them available on the network.


Common Network Elements

            The different types of components that you can find in a network are:
  • Servers: Computers that provide shared resources to the network users.
  • Clients: Computers that access shared network resources provided by the users.
  • Communication Media: The media through which data is being transmitted.
  • Network Operating System: Software that manages the activities of a network.
  • Shared resources: Any service or resource made available for use by the members of the network.
  • Modem: Used to connect a computer to another computer over phone lines.
  • Hub: A hub can be thought of as a junction box, permitting new computers to be connected to a network as easily as plugging a power cord into an electrical socket. Hubs are commonly available in 4, 8, 16 port sizes, enabling anywhere from 4 to 16 network devices to be plugged into a network. There is no need to connect all the ports of a hub to network devices simultaneously. When no cables are plugged in, the signals bypass the unused ports. Some hubs have an additional interface port that connects to another hub, increasing the size of the network.
  • Switch: An enhanced version of the hub. Typically a switch can distribute the communication load so all the computers connected to the switch can communicate effectively.


2011/09/11

Application Software

               Application software is designed to perform useful general-purpose tasks. For example, an application program called Solitaire is a single program that lets you play a card game. Application software can be grouped as customized software or as application packages. Customized software is generally designed for a particular customer whereas application packages are "off the shelf" programmes designed for the general public. Common types of application software are:
  • Word Processing
  • Spreadsheet
  • Database Management System
  • Presentation Software
  • Desktop Publishing and Graphic Design
  • Web Design and Development



Device Drivers

               Virtually every hardware component located inside or connected externally to a computer requires associated software component to enable that hardware to communicate and function with the operating system, other applications and other hardware components of the computer. This software component is referred ti as driver software of that hardware component. Until you install the proper software derive for a hardware component that hardware component remains logically isolated from the rest of the components of the computer.



Booting the Computer

            The process of loading the operating system into the computer's main memory from the hard disk, floppy disk or CD is called booting. A programme known as the boot routine or bootstrap loader is in change of the booting process and this boot routine is stored permanently in the computer's electronic circuitry, typical in ROM. Another series of programmes which start up prior to the booting process are the diagnostic routines. These programs test the main memory, the CPU and other parts of the system to make sure that they are running properly.



System Start up Process

            When you switch on a computer it automatically loads a program called the Basic Input / Output System (BIOS). The BIOS is stored on a special chip on the computer's motherboard. As it runs, it performs a number of essential tests on the computer hardware. These tests are called Power On Self Test (POST).



Software Evaluation

              Software evaluation is the process of checking the software for suitability for the required function. the major steps involved in software evaluation are:
  • Identity clearly the problem or application for which the software is required.
  • Inspect the manual or instructions supplied with the software.
           - Is the manual clearly written? 
           - Does it explain the main functions of the software? 
           - Does it provide examples?
  • Input / Output Interfaces
             - Do the input and output of the software meet your requirements?
  • Test the system with your own data sets to see its performance.
  • Reliability
              - Is the system consistent? 
              - Does it give consistent answers to similar or the same problems?
  • User Friedliness
              - User interface is easy to use. 
              - Error message are clear. 
              - Time periods to wait between successive screens are acceptable.
  • Adaptability
              - To what extent the original problem be modified without affecting the functionality of the software.

2011/09/06

System Software

Software

          Software refers to instructions which are used by  the computer to perform various tasks. The word programme is synonymous with software. Software is created with programming languages and related utilities. Software is generally classified into two types: System Software and Application Software.


System Software

          System software is responsible for controlling, integrating and managing the individual hardware components of a computer system so that other software and the users of the system see it as a functional unit without having to be concerned with the low-level details of the computer hardware.
System software can be further classified as:
  • Operating Systems.
  • Utilities and service programs.
Operating Systems (OS)

              The Operating System manages the resources and the basic operations of the computer. Without an operating system the computer would not work. The operating system (or a part of it) is loaded into the main memory when the computer is switched on and handles many tasks, which we are unaware of when we use the computer. A part of the operating system remains in main memory until the computer is turned off.

             There are several operating systems used with personal computers such as Windows 98, Windows XP, Linux and Mac OS. Different systems are designed for different hardware platforms or for different functions.

            Operating systems may provide different types of user interfaces such as Command Line Interface and Graphical User Interface (GUI). In the command line interface, users communicate with the operating system by typing commands using the keyboard. One of the main disadvantages of the command line interface is that the user has to memorize the commands exactly.

               In the graphical user interface, a user invokes a command by means of graphical objects shown on the screen and the system translates the user action to the operating system commands and executes them on behalf of the user. The graphical user interface was first developed for Apple Macintosh Computers.

              The general-purpose operating systems are typically supplied on CD-ROMs and must be installed before using the computer. Some computers such as hand held computers come with pre-installed operating systems on the computers' ROM. Such operating systems provide only limited capabilities and are virtually impossible to be upgraded.


Utilities and Service Programs 

             Another category of software is utility software, which is a collection of useful programs that enhance the capabilities of the operating system. These software programmes are designed to perform various tasks. Some examples of utility software are Norton Utilities and Download Accelerator.



2011/09/04

Different Types of Printers

            Many different types of printers are in use today. Two primary technologies used for printing are impact printing and non-impact printing. Impact Printers use a print head containing a number of metal pins which strike an inked ribbon placed between the print head and the paper. The non-impact printers are much quieter than impact printers as their printing heads do not strike the paper.


The Most Common Printer Types Are:
  • Dot matrix printers,
  • Ink-jet printers,
  • Laser printers. 


Dot Matrix Printers

              These printers work by firing a matrix of tiny pins (which are located in the print head), through a ribbon similar to that found on a typewriter. As the head moves across the paper the correct pins are fired out to hit an inked ribbon and form the shape of the character required. The greater the number of pins, the higher the quality of the print. Dot matrix printers are impact printers and are used to print multipart stationery. So print several copies of a document at the same time you will need to use a dot matrix printer. Such printers are cheap and have the lowest running cost compared to any other type of printer.

Laser Printers

            These non-impact printers offer high-speed printing and an excellent quality of text and graphics. A laser beam is used to from an image on a rotating, charged metal drum. This then picks up toner from the toner cartridge and transfers it onto paper. Very soon after wards heat and pressure are applied so the toner sticks to the paper. Since they are page printers they are very fast. Colour laser printers are now available and are mainly used for desktop publishing. Although they are expensive, they are likely eventually to come into widespread use.



Inkjet Printers

             Inkjet printers can produce high quality text and graphics. They are quieter than dot matrix printers. The technology involves ink flowing through the appropriate nozzles (usually in an array of 64) where it is then heated and a bubble is formed. This expands to release a tiny droplet of ink onto the paper.


Twitter Delicious Facebook Digg Stumbleupon Favorites More

 
Design by Tech Cave | Bloggerized by TechCave.info - TechCave.info | Tech Cave