Search This Blog

No-wait Screen Savers

Don't want to wait for your screen saver to kick in? Create a shortcut to it just as you would for any other program by hitting Windows key + F to search your computer and click on "All files and folders." Type "*.scr" in the "All or part of the file name" field to find every screen saver file on your computer. In the resulting list, right-click and drag the screen saver you want to your desktop. Whenever you want it to start, just double-click its icon.

Change What Programs Start When Windows Does

You can prevent a lot of apps forcing Windows into chilled-molasses boot times—without uninstalling anything. Click Start, then "Run...," and type msconfig. This brings up the System Configuration Utility window. Click on the Startup tab to see a list of all the apps slated to start when you boot up Windows. Click the check mark next to any you don't want, and then click OK to save your choices.

Uses of Internet


Internet has been the most useful technology of the modern times which helps us not only in our daily lives, but also our personal and professional lives developments. The internet helps us achieve this in several different ways.

For the students and educational purposes the internet is widely used to gather information so as to do the research or add to the knowledge of any sort of subject they have. Even the business personals and the professions like doctors, access the internet to filter the necessary information for their use. The internet is therefore the largest encyclopedia for everyone, in all age categories.

The internet has served to be more useful in maintaining contacts with friends and relatives who live abroad permanently. The easiest communication means like the internet chatting systems and the emails are the best and the most common for the maintaining contacts with the people around the world.

Not to forget internet is useful in providing with most of the fun these days. May it be all the games, and networking conferences or the online movies, songs, dramas and quizzes, internet has provided the users with a great opportunity to eradicate the boredom from their lives.

Internet is also used to upgrade the internet and use special software to work on the projects and documentation works as the internet enables the user to download a myriad of different software for a variety of different purposes, making it much easier than buying the costly software cds.

What is Copywriting?


Copywriting is often confused with copyright, and thought to be of the same meaning or related to it. However there is no such association and copywriting itself is a separate term more commonly used in many aspects including the websites.

Copywriting involves the procedure of the promotion of any thing, may it be a person a business or even an opinion or an idea. It is also involved in various types of media may it be radio or television advertisement, or any other type. The soul reason for the promotion and the text is to convince the reader or the listen for a particular product or in simple terms marketing of a company or business, which may also be just a certain view point.

The copywriting can be done in a variety of different ways and means which include for example the World Wide Web, the taglines, scripts, television and radio etc. There are special copy writers associated with the work, who contribute their skills to provide with interesting ads, commercials, and other sort of advertising innovations.

There is a special meaning to the word copywriting for their use in the websites. It is associated with the special ways and means to write the wordings and format the text in website so as to reach a certain level in the higher rankings for the search engines. This type of copywriting is sometimes also referred to as the content writing and involves the use of the strategic keywords and their correct placement in the text for the web pages. This type of copywriting is usually referred to as the search engine optimization or the SEO.

The Hidden Diagnostic Panel


You probably already know about the Control Panel where Windows lets you change most of its settings, but did you know that there’s also a hidden diagnostic panel that tells you what’s going on with your computer right now?

It’s only accessible to those who know the special key combination: hold down Ctrl and Alt and then quickly press and release Delete. Go ahead, try it right now. CTRL, ALT, DEL.

This task manager includes all sorts of information about what programs are running, how much computer processing they’re using, how much network traffic your computer is running. You can use the buttons to force programs to quit and perform other important operations.

The most useful thing you can do with the task manager is find programs that are using too much computer processing (CPU) and force them to quit (if you don’t need them). For example, sometimes Web browsers or the Adobe Flash player will break and try to use all of your CPU—if that’s the case, simply find the program, highlight it, and click Force Quit.

You can also restart explorer.exe when all your desktop icons and task bar disappear.

Close Windows Quick


You’ve been surfing the Internet at work, but the boss just appeared around the corner—quick, what do you do?

You can close down any program quickly by pressing Alt-F4. But Alt-F4 isn’t just great for emergency situations, it’s also useful for closing all those other little applications you use, like the calculator.

Pro Multi-tasking


Here is one of my favorite computer tips and probably the easiest. Do you switch programs a lot? I do. I’m often trying to read my research notes and write an article at the same time, forcing me to switch between two windows a lot.

But switching between two windows takes a long time with the mouse. You need to take one hand off the keyboard, grab the mouse, scroll over to the next window, click, and put your hand back on the keyboard. Wouldn’t it be nice if you could switch windows without taking your hand off the keyboard? You can.

To switch windows, press Alt-Tab. The windows are lined up in the order of which you last used them, so pressing Alt-Tab will take you to the last window you used. Pressing Alt-Tab-Tab (two tabs) will take you to the window you used before that.

If you master Alt-Tab, you’ll be a master multi-tasker.

Advantages of IT


 • Globalization
True globalization has come about only via this automated system. The creation of one interdependent system helps us to share information and end linguistic barriers across the continents. The collapse of geographic boundaries has made the world a 'global village'. The technology has not only made communication cheaper, but also possible much quicker and round the clock. The wonders of text messages, email and auto-response, backed by computer security applications, have opened up scope for direct communication.

• Cost-effective
Computerized, internet business processes have made many businesses turn to the Internet for increased productivity, greater profitability, clutter free working conditions and global clientèle. It is mainly due to the IT industry that business have been able to make their processes more streamlined, thereby becoming more cost-effective and consequently more profitable. People are able to operate their businesses 24x7, even from remote locations only due to the advent of information technology.

• Communication
Quick and effective communication is vital to any business anywhere in the world. Information technology gives an entrepreneur or business the tools, like email, video conferencing, SMS, etc., essential to communicate efficiently and effectively. to the business world, and information technology gives your company the resources it needs to communicate quickly and effectively. Not only do people connect faster with the help of information technology, but they are also able to identify like-minded individuals and extend help, while strengthening ties.

• Storing and Protecting Information
IT provides a low-cost business options to store and maintain information that may be important from a business or service point of view. Virtual vaults and other such security systems not only store vital data but also allow control over the access to such information. IT security systems will also protect virtual data from being hacked or wiped out in case of any technical failure.

• Creation of New Jobs 
One of the biggest advantage of IT has been the creation of a whole new field of opportunity for skilled personnel leading to new and interesting jobs. Hardware and software developers, computer programmers, web designers, system analyst, the list of new jobs created could go on. IT has also been attributed to be the major cause of surge in the economies of certain Third World nations too.

Things that were once done manually or by hand have now become easier and faster due to the advent of a computing technology. Our world today has changed a great deal with the aid of IT which has penetrated almost every aspect of our daily lives and society, from leisure to business. IT has become a part of our day-to-day lives through the evident use of PC's, Internet, cell phones, faxes, the list would seem endless. Let us hope that newer development in the field of IT can provide benefits to our future generations, just as it has greatly benefited ours.

Features of an Operating System


Now that we are done with the types of operating system, let us take a look at what are the features that a particular operating system should have. Some of these features are a part of all operating systems, while some of them may or may not be available in the operating system you are using.

Managing Hardware and Software
As already mentioned, it is the computer operating system that causes the hardware and software in a computer to interact with each other. It is also the platform that causes one software in the computer to communicate with another. Once the operating system in a computer loads during the booting up process, other application software can be loaded into the computer.

Consistent Application Program Interface
Application Program Interface which software development professionals refer to as APIs allow the applications that run on one computer to run on another computer having the same operating system. It is thus important that the operating system has a consistent API. Undoubtedly, every operating system will have certain requirements, but it should be flexible enough to support computer hardware from different vendors.

Program Execution
It is up to the operating system to execute all the programs running in it. It is a rather complicated process. It may have to allow multitasking and allow different programs to run at the same time and share the system resources. It needs to allot RAM space to different applications running on the computer. The execution of more than one program may also require the operating system to prioritize the operations running on the computer.

Interrupts
The operating system needs to support a good number of interrupts to react with the immediate external environment. On receiving an interrupt it should have the capability to stop the current execution and start off a new process. Interrupting is not a very simple process. On receiving an interrupt, the computer operating system should be such that they immediately save the status of the current applications and start executing the code of that particular interrupt.

Memory Management
As already mentioned in the section on program execution, it is up to the computer operating system to provide memory to the different programs running on the computer. It has to prioritize and allocate memory to each application. Even when data is saved in a secondary storage device, it is the operating system, that decides how should that particular chunk of information be stored.

Accessing Data
The data required by any particular application software for its smooth running needs to be accessed by the operating system. The operating system stores data in a particular storage area in such a way that the data can be retrieved as and when required. The file system that different computers use may be different. The operating system needs to support these different file systems. Let us try to understand this with an example. Some computers may be using the FAT 32 file system, while some may be using the NTFS file system. Irrespective of which file system is being used, the operating system should provide support for the same. However, not all operating systems support all types of file systems.

Networking
We are in the age of networking. Computers need to communicate with each other. A computer without Internet is not even imaginable. It is the task of the operating system to provide the required networking features. It should have features to allow two or more computers to connect and form a network or connect to the Internet.

Security
Last but not the least, in today's age, security that an operating system should provide is undoubtedly one of its most important features. Right from setting passwords for logging in, to providing firewall protection; everything comes under the tasks of an operating system. Some network utilities may need file sharing, printer sharing and using TCP/IP protocols. Hence, it becomes very important for the computer operating system to provide proper security so that the computer's security is not compromised in such cases.

Let us now take a look at the details of the different operating systems available in the market. Here, we will take a look at only the most popular operating systems and of course, these are the operating systems which you would want to know about.

Your computer, like new with every restart...

Deep Freeze by Faronics is the ultimate line of defense for your computer's security. Memorising your computer's settings and configuration, Deep Freeze returns your system to its original state with every restart. Forget spending hours troubleshooting hard-to-diagnose problems. With Deep Freeze, full system recovery is as easy as restarting your computer. It's that simple.

The Best Free Software Unlocker


If you've ever been unable to delete a file in Windows, and can't figure out what program's using it, Unlocker is the solution. Have you ever seen these Windows error messages?

Cannot delete folder: It is being used by another person or program
Cannot delete file: Access is denied
There has been a sharing violation.
The source or destination file may be in use.
The file is in use by another program or user.

Make sure the disk is not full or write-protected and that the file is not currently in use.
Unlocker can help! Simply right-click the folder or file and select Unlocker. If the folder or file is locked, a window listing of lockers will appear. Simply click Unlock All and you are done!

Download Now

Remove SHORTCUT link from the desktop folder

how to remove short cut arrows on u'r desktop items
just go to >start>run>regedit>hkey_classes_root>u
find a file by name lnkfile click on that to that right
u can see a file by name is shortcut delete that and
again come to left click on pipfile u delete again is shortcut
then restart the pc u cant see the shortcut arrow

To Create Folder " CON "


Without using Command Prompt.

Here is a simple method..........
Rename folder from the right click option........
Now press alt and press 255...
press 255 frm the right sideof the key bords i.e., num pad....
where only numbers r given.....
now write con and then press enter.....huh!!
you ll see a con folder in ur pc
and also you can delete it easily.

How to find the IP address of the sender in Yahoo! Mail


When you receive an email, you receive more than just the message. The email comes with headers that carry important information that can tell where the email was sent from and possibly who sent it. For that, you would need to find the IP address of the sender. The tutorial below can help you find the IP address of the sender. Note that this will not work if the sender uses anonymous proxy servers.

Finding IP address in Yahoo! Mail

1. Log into your Yahoo! mail with your username and password.
2. Click on Inbox or whichever folder you have stored your mail.
3. Open the mail.
4. If you do not see the headers above the mail message, your headers are not displayed. To display the headers,
* Click on Options on the top-right corner
* In the Mail Options page, click on General Preferences
* Scroll down to Messages where you have the Headers option
* Make sure that Show all headers on incoming messages is selected
* Click on the Save button
* Go back to the mails and open that mail.
5. You should see similar headers like this:Yahoo! headers : nameLook for Received: from followed by the IP address between square brackets [ ]. Here, it is 202.65.138.109.That is be the IP address of the sender!
6. Track the IP address of the sender

Clean out the prefetch folder


Windows XP uses a system called 'prefetch' to organize and preload some of the data necessary for commonly used applications and files. A folder called prefetch is used to store the information the operating system needs to carry out this operation.
After several months of use, the prefetch folder may become quite overloaded with older references to software and files that may no longer be in use.It's a good idea to manually empty the older files out of the prefetch folder every few months or so.
To do this: Navigate to 'c:\windows\prefetch' and delete all .
PF files that are older than a week or two.

Top 10 keyboard shortcuts everyone should know


Using keyboard shortcuts can greatly increase your productivity, reduce repetitive strain, and help keep you focused. For example, highlighting text with the keyboard and pressing Ctrl + C is much faster than taking your hand from the keyboard, highlighting the text using the mouse, clicking copy from the file menu, and then putting your hand back in place on the keyboard. Below are our top 10 keyboard shortcuts we recommend everyone memorize and use.

Ctrl + C or Ctrl + Insert

Copy the highlighted text or selected item.

Ctrl + V or Shift + Insert

Paste the text or object that's in the clipboard.

Ctrl + Z and Ctrl + Y

Undo any change. For example, if you cut text, pressing this will undo it. This can also often be pressed multiple times to undo multiple changes. Pressing Ctrl + Y would redo the undo.

Ctrl + F

Open the Find in any program. This includes your Internet browser to find text on the current page.

Alt + Tab or Alt + Esc

Quickly switch between open programs moving forward.

Tip: Press Ctrl + Tab to switch between tabs in a program.

Tip: Adding the Shift key to Alt + Tab or Ctrl + Tab will move backwards. For example, if you are pressing Alt + Tab and pass the program you want to switch to, press Alt + Shift + Tab to move backwards to that program.

Tip: Windows Vista and 7 users can also press the Windows Key + Tab to switch through open programs in a full screenshot of the Window.

Ctrl + Back space and Ctrl + Left or Right arrow

Pressing Ctrl + Backspace will delete a full word at a time instead of a single character.

Holding down the Ctrl key while pressing the left or right arrow will move the cursor one word at a time instead of one character at a time. If you wanted to highlight one word at a time you can hold down Ctrl + Shift and then press the left or right arrow key to move one word at a time in that direction while highlighting each word.

Ctrl + S

While working on a document or other file in almost every program pressing Ctrl + S will save that file. This shortcut key should be used frequently anytime you're working on anything important.

Ctrl + Home or Ctrl + End

Move the cursor to the beginning or end of a document.

Ctrl + P

Print the page being viewed. For example, the document in Microsoft Word or the web page in your Internet browser.

Page Up, Space bar, and Page Down

Pressing either the page up or page down key will move that page one page at a time in that direction. When browsing the Internet pressing the space bar will also move the page down one page at a time. If you press Shift and the Space bar the page will go up a page at a time.

Top Ten Antivirus Ranking

Here is the list of the best antivirus and security software of all times. Among the top are BitDefender, ESET, Norton, F-Secure, Kaspersky, TrendMicro, AVG, Avira, Zonealarm, Panda security and more. We will be running comparisons between different versions of the same security software, for eg., 2011 version vs 2012 version. We will be also comparing between the capabilities of different security software, for eg., BitDefender vs Norton. Based on the performance of various different antivirus security software, we will give them scoring. The factors on which we will score antivirus software: Speed, stealth, detection, link scanning, removing virus, updates, blocking bad websites, blocking phishing attempts, technical support and lots more factors. These are the antivirus programs we will be testing to come up with our top ten antivirus list:
Top Ten Antivirus 2012

1. BitDefender Antivirus 2012
2. McAfee Antivirus 2012
3. Kaspersky Antivirus 2012
4. ESET Antivirus 2012
5. Norton Antivirus 2012
6. F-Secure Antivirus 2012
7. Vipre Antivirus 2012
8. TrendMicro Antivirus 2012
9. ZoneAlarm Antivirus 2012
10. Panda Antivirus 2012

Other Antivirus Programs

Avira Antivirus 2012
Avast Antivirus 2012
Avanquest Antivirus 2012
G Data Antivirus 2012
Webroot Antivirus 2012
PC Tools Antivirus 2012
Comodo Antivirus 2012
CA Antivirus 2012
Norman Antivirus 2012
AVG Antivirus 2012
Sophos Endpoint Security 2012
Quick Heal Antivirus 2012
Microsoft Security Essentials 2012

Top Ten Antivirus Ratings

Most of these antivirus software have been tested extensively for their performance. The old versions have received ratings based on the performance to quickly detect viruses from infected systems and stop new viruses from infecting the computers. There is a very strong criteria that will be used to provide points to various antivirus software 2012. Another interesting factor that we are considering is the antivirus coupons, we will give scores to antivirus software companies that offer discount coupons from time to time. Although this is not a major factor, but many users value coupons because it is a good way to save money on security software. Although this factor will not inflate the original ratings, we are including it only to help people save money. These are the factors that will contribute to the scoring:

Speed: When it comes to computing, speed is an important aspect that we can't neglect. It has been reported that some antivirus software are much slower in comparison to other antivirus software. Which means, some antivirus programs slow down a computer. Computer users (specially gamers) like using antivirus software that does not degrade the performance of a computer system. They enjoy using the fastest antivirus software.
Stealth: Many viruses and spyware are designed to deactivate antivirus programs so that they are not detected. Antivirus software should quickly detect such a threat and stop the virus from harming the system files. Those antivirus software will receive higher score that can not only defend against known viruses but also protect a computer system from new and unknown virus and spyware.
Detection: A good antivirus program will quickly detect infection and will take the necessary steps to quarantine the infected files in order to stop the virus from spreading to other system files. Only if security software has the capabilities of detecting infection, it can stop a virus/spyware. So this is a major aspect of security software. Many poorly designed security software cannot detect all forms of threat. However, only those antivirus software will be included in our top ten antivirus 2012 list that are capable of detecting all sorts of threats.
Technical Support: We will also provide scores depending upon the type of technical support and customer service provided by the antivirus software manufacturer. Only those programs will receive higher ratings that are bundled with quality support. We will also count on the type of support available: phone, chat, email, etc. When your computer system is infected with virus, spyware or other forms of malware, you need quick assistance. That's when you need to contact someone who is technically equipped to assist you. Based on the quality of technical support, scores will be provided to various security software and hence will win a rank in our top ten antivirus 2012 list.
Price: Antivirus software should not be too costly, it should be reasonably priced. We will be comparing the price of antivirus software and will be providing scores based upon how cheap is the antivirus software. The cheapest and the best antivirus 2012 will receive higher rankings. People love saving money, so the cheapest antivirus software will receive higher scores.

These are some of the major factors we will be using to rate the best antivirus software of 2012. We will also include other factors like real-time scanning, frequency of updates, blocking phishing attempts, link scanning, IM protection, parental lock and lots more factors. However, we will majorly focus on the 5 key-points mentioned above. Based on these factors, we will provide our lab test reports that will show you which antivirus software is best for your computer in the year 2012. Most antivirus manufacturers will release their 2012 antivirus software sometime in May or June this year. If you have any questions or suggestions about this report of top ten antivirus 2012, please leave your review below by leaving a comment.

Information Technology

Definition of Information Technology: the branch of engineering that deals with the use of computers and telecommunications to retrieve and store and transmit information

How to Reset Your Forgotten Windows Password the Easy Way


Forgetting your password is never any fun, but luckily there’s a really easy way to reset the password. All you need is a copy of the Windows installation disk and one simple command line trick.

Resetting Your Forgotten Windows Password
Boot off the Windows disk and select the “Repair your computer” option from the lower left-hand corner.


Follow through until you get to the option to open the Command Prompt, which you’ll want to select.

First you’ll want to type in the following command to backup the original sticky keys file:

copy c:\windows\system32\sethc.exe c:\

Then you’ll copy the command prompt executable (cmd.exe) over top of the sticky keys executable:

copy c:\windows\system32\cmd.exe c:\windows\system32\sethc.exe


Now you can reboot the PC.

Resetting the Password
Once you get to the login screen, hit the Shift key 5 times, and you’ll see an administrator mode command prompt.


Now to reset the password—just type the following command, replacing the username and password with the combination you want:

net user geek MyNewPassword


That’s all there is to it. Now you can login.

Of course, you’ll probably want to put the original sethc.exe file back, which you can do by rebooting into the installation CD, opening the command prompt, and copying the c:\sethc.exe file back to 

c:\windows\system32\sethc.exe.


How to Remove Shortcut Arrow on Icons in Windows (Include Desktop Items)

All shortcut icons in Windows operating system, including Windows XP, Windows Vista and Windows 7, has a small arrow overlay on the icons. The arrow is used to different between a shortcut from an actual physical file itself. The shortcut arrow is presented on all desktop icons, and icons in Windows Explorer, and it can be easily remove or hide.

from Desktop Icons and Other Icons

Run Registry Editor (RegEdit).
Navigate to the following registry key:
HKEY_CLASSES_ROOT\lnkfile


Delete the IsShortcut registry value in the right pane.
Tip: It’s also workable to just rename the IsShortcut registry entry to another name, such as IsNotShortcut.

Some other type of documents and files may be shortcut arrow on their icons too. To remove the shortcut arrow overlay image on these icons, navigate to each of the following registry keys, and then repeat step 2 and step 3 above to deactivate the shortcut arrow:
HKEY_CLASSES_ROOT\piffile
HKEY_CLASSES_ROOT\ConferenceLink
HKEY_CLASSES_ROOT\DocShortCut
HKEY_CLASSES_ROOT\InternetShortcut
HKEY_CLASSES_ROOT\WSHFile


Exit from Registry Editor.
Logout and login again or restart Explorer for the change to take effect.
Note that removing the shortcut arrow with hack

Note : Please note that in some cases deactivating the arrow for *.LNK files might lead to duplicate items in the Explorer context menu, as in essence, removing the “IsShortcut” effectively forces Windows to treat the shortcut as real hard file. In Windows 7, it may also cause error such as unable to pin shortcut to Taskbar or Start Menu. To avoid these issue, use another workaround to remove shortcut arrow.

Best OS (Operating System)

Windows 8 is The Best Operating System at This Time. Windows 8 is an upcoming version of Microsoft Windows, a series of operating systems produced by Microsoft for use on personal computers, including home and business desktops, laptops, netbooks, tablet PCs, and media center PCs. According to unofficial sources, the release date for Windows 8 has been set for October 2012, three years after the release of its predecessor, Windows 7. Windows 8's server counterpart, Windows Server 2012, is in development concurrently with Windows 8. The most recent official pre-release version of Windows 8 is the Consumer Preview, which was released on February 29, 2012. An almost-complete Release Preview is scheduled for the first week of June 2012.

Windows In Under 5 Seconds

If you work on windows , you know that shutting it down can be really a hassle and time taking , especially when a lot of programs are running . Most of us tend to avoid shut down due to this reason but we know that shut down is always safer and also considered good for the pc .

There are a lot of shut down tricks and tools available , which help you to achieve a smooth and fast shut down of windows without negatively affecting your pc . However this trick , which was suggested to me by a friend , is probably the simplest one and also the fastest way to shut down your pc .

Here are the steps :-

1: Press Ctrl+Alt+Delete to go to the Task Manager .

2: Click on Shut Down on the Top .

3: Highlight ‘ Turn Off ‘ and while holding down the Ctrl key , click on it .

And thats it ! Just count 1 , 2 , 3…5 and there you go…your pc is off !

I have tried this trick on my XP system and it has worked everytime and hasn’t negatively affected my pc . I haven’t tried this on any other version of Windows but I think it’ll work .

However I advise you to use this trick only when you are in a rush and you need a speedy shut down of your pc .

What is Computer Network?


Two or more computers connected together through a communication media form a computer network.
 The computers are connected in a network to exchange information and data. The computers connected in a network can also use resources of other computers.

 Computer Network Components

There are different components of a network. Following are the basic components of network.

1. Server:

Powerful computers that provides services to the other computers on the network.

2. Client:

Computer that uses the services that a server provides. The client is less powerful than server.

3. Media:

A physical connection between the devices on a network.

4. Network Adopter:

Network adopter or network interface card (NIC) is a circuit board with the components necessary for sending and receiving data. It is plugged into one of the available slots on the Pc and transmission cable is attached to the connector on the NIC.

5. Resources:

Any thing available to a client on the network is considered a resource .Printers, data, fax devices and other network devices and information are resources.

6. User:

Any person that uses a client to access resources on the network.

8. Protocols:

 These are written rules used for communications. They are the languages that computers use to talk to each other on a network

Need and Importance of Information Technology in Education


Need
Education is a life long process therefore anytime anywhere access to it is the need
Information explosion is an ever increasing phenomena therefore there is need to get access to this information
Education should meet the needs of variety of learners and therefore IT is important in meeting this need
It is a requirement of the society that the individuals should posses technological literacy
We need to increase access and bring down the cost of education to meet the challenges of illiteracy and poverty-IT is the answer


Importance
access to variety of learning resources
immediacy to information
anytime learning
anywhere learning
collaborative learning
multimedia approach to education
authentic and up to date information
access to online libraries
teaching of different subjects made interesting
educational data storage
distance education
access to the source of information
multiple communication channels-e-mail,chat,forum,blogs,etc.
access to open courseware
better accesses to children with disabilities
reduces time on many routine tasks


Information Technology in Education

INTRODUCTION Information Technology in Education, effects of the continuing developments in information technology (IT) on education.

The pace of change brought about by new technologies has had a significant effect on the way people live, work, and play worldwide. New and emerging technologies challenge the traditional process of teaching and learning, and the way education is managed. Information technology, while an important area of study in its own right, is having a major impact across all curriculum areas. Easy worldwide communication provides instant access to a vast array of data, challenging assimilation and assessment skills. Rapid communication, plus increased access to IT in the home, at work, and in educational establishments, could mean that learning becomes a truly lifelong activity—an activity in which the pace of technological change forces constant evaluation of the learning process itself.

Significance of IT in education

Access to variety of learning resources

In the era of technology. IT aids plenty of resources to enhance the teaching skills and learning ability. With the help of IT now it is easy to provide audio visual education. The learning resources are being widens and widen. Now with this vivid and vast technique as part of the IT curriculum, learners are encouraged to regard computers as tools to be used in all aspects of their studies. In particular, they need to make use of the new multimedia technologies to communicate ideas, describe projects, and order information in their work.

Immediacy to information

IT has provided immediacy to education. Now in the year of computers and web networks the pace of imparting knowledge is very very fast and one can be educated anywhere at any time. New IT has often been introduced into well-established patterns of working and living without radically altering them. For example, the traditional office, with secretaries working at keyboards and notes being written on paper and manually exchanged, has remained remarkably stable, even if personal computers have replaced typewriters.

Any time learning

Now in the year of computers and web networks the pace of imparting knowledge is very very fast and one can be educated .One can study whenever he wills irrespective of whether it is day or night and irrespective of being in India or in US because of the boom in IT.

Collaborative learning

Now IT has made it easy to study as well as teach in groups or in clusters. With online we can be unite together to do the desired task. Efficient postal systems, the telephone (fixed and mobile), and various recording and playback systems based on computer technology all have a part to play in educational broadcasting in the new millennium. The Internet and its Web sites are now familiar to many children in developed countries and among educational elites elsewhere, but it remains of little significance to very many more, who lack the most basic means for subsistence.

Multimedia approach to education

Audio-Visual Education, planning, preparation, and use of devices and materials that involve sight, sound, or both, for educational purposes. Among the devices used are still and motion pictures, filmstrips, television, transparencies, audiotapes, records, teaching machines, computers, and videodiscs. The growth of audio-visual education has reflected developments in both technology and learning theory.

Studies in the psychology of learning suggest that the use of audio-visuals in education has several advantages. All learning is based on perception, the process by which the senses gain information from the environment. The higher processes of memory and concept formation cannot occur without prior perception. People can attend to only a limited amount of information at a time; their selection and perception of information is influenced by past experiences. Researchers have found that, other conditions being equal, more information is taken in if it is received simultaneously in two modalities (vision and hearing, for example) rather than in a single modality. Furthermore, learning is enhanced when material is organized and that organization is evident to the student.

These findings suggest the value of audio-visuals in the educational process. They can facilitate perception of the most important features, can be carefully organized, and can require the student to use more than one modality.

Authentic and up to date information

The information and data which are available on the net is purely correct and up to date.

Internet, a collection of computer networks that operate to common standards and enable the computers and the programs they run to communicate directly provides true and correct information.

Online library

Internets support thousands of different kinds of operational and experimental services one of which is online library. We can get plenty of data on this online library.

As part of the IT curriculum, learners are encouraged to regard computers as tools to be used in all aspects of their studies. In particular, they need to make use of the new multimedia technologies to communicate ideas, describe projects, and order information in their work. This requires them to select the medium best suited to conveying their message, to structure information in a hierarchical manner, and to link together information to produce a multidimensional document.

Distance learning

Distance Learning, method of learning at a distance rather than in a classroom. Late 20th-century communications technologies, in their most recent phases multimedia and interactive, open up new possibilities, both individual and institutional, for an unprecedented expansion of home-based learning, much of it part-time. The term distance learning was coined within the context of a continuing communications revolution, largely replacing a hitherto confusing mixed nomenclature—home study, independent study, external study, and, most common, though restricted in pedagogic means, correspondence study. The convergence of increased demand for access to educational facilities and innovative communications technology has been increasingly exploited in face of criticisms that distance learning is an inadequate substitute for learning alongside others in formal institutions. A powerful incentive has been reduced costs per student. At the same time, students studying at home themselves save on travel time and other costs.

Whatever the reasoning, distance learning widens access for students unable for whatever reason (course availability, geographical remoteness, family circumstances, individual disability) to study alongside others. At the same time, it appeals to students who prefer learning at home. In addition, it appeals to organizers of professional and business education, providing an incentive to rethink the most effective way of communicating vital information.

Better accesses to children with disabilities

Information technology has brought drastic changes in the life of disabled children. IT provides various software and technique to educate these poor peoples. Unless provided early with special training, people profoundly deaf from birth are incapable of learning to speak. Deafness from birth causes severe sensory deprivation, which can seriously affect a person's intellectual capacity or ability to learn. A child who sustains a hearing loss early in life may lack the language stimulation experienced by children who can hear. The critical period for neurological plasticity is up to age seven. Failure of acoustic sensory input during this period results in failure of formation of synaptic connections and, possibly, an irremediable situation for the child. A delay in learning language may cause a deaf child's academic progress to be slower than that of hearing children. The academic lag tends to be cumulative, so that a deaf adolescent may be four or more academic years behind his or her hearing peers. Deaf children who receive early language stimulation through sign language, however, generally achieve academically alongside their hearing peers.

The integration of information technology in teaching is a central matter in ensuring quality in the educational system. There are two equally important reasons for integrating information technology in teaching. Pupils must become familiar with the use of information technology, since all jobs in the society of the future will be dependent on it, and information technology must be used in teaching in order to improve its quality and make it more effective.


INTRODUCTION

The information society challenges the education system. In recent years, the speedy, effective and global communication of knowledge has created a new foundation for co-operation and teamwork, both nationally and internationally. The increasing role played by information technology in the development of society calls for an active reaction to the challenges of the information society.

Already, new and greater demands are being made as to the core qualifications of individuals, as well as to their understanding and knowledge of the consequences of the introduction of information technology for the work and organisation of a company. Companies are no longer forced to gather all their functions in one place. The knowledge-intensive functions such as development and marketing can be sited in countries where the labour market can supply highly educated employees, whilst production itself can be moved to low wage countries. The result is the efficient handling, processing, co-ordination and administration of company resources, which is decisive for the competitiveness of the company.In a society which is becoming increasingly dependent on information and the processing of knowledge, great demands are therefore made that the individual should have a solid and broad educational foundation on which to build. Educational policy in the information society must ensure that:
 IT qualifications are developed by means of their integration in all activities in the education sector and
 The individual citizen must have an active and critical attitude to developments and not passively allow technological development to set the pace.


IT educational policy must ensure:
Up-to-date qualifications in the information society
Up-to-date qualifications gained against the background of a high general level of education in the population will be decisive if Denmark is to maintain competitiveness and its share of the global labour market in the information society. IT skills and IT understanding are thus central prerequisites for the individual, both now and especially in the future.

The advantage of using information technology is that time-consuming work routines can increasingly be performed by means of this technology and time can thus be devoted instead to communicating and informing, to the processing of information and the production of knowledge.

PC Troubleshooting Tips Why is My PC Crashing?


Nothing can put a damper on productivity quite like a computer that crashes on a regular basis. Sometimes, a crash is preceded by the dreaded “blue screen of death” or another warning; other times, a computer simply shuts off without any warning at all. In either case, the end result is a whole lot of frustration, aggravation and lost work. If your computer has been crashing frequently, you’d probably like to put an end to it. Unfortunately, getting to the bottom of things if often easier said than done. The following tips about improving your computer’s performance, though, are excellent places to begin.

Possibility #1: Corrupted System Registry Files

Every Windows-based PC has something called a Windows registry. The registry contains several files that are integral to the performance and operation of your computer. Over time, some of those files can become corrupted, be misplaced or get lost altogether. When that happens, the system registry becomes compromised – and frequent crashes are all-too-common symptoms. The best way to rule this possibility in or out is by running a Windows registry cleaning program. Such programs scan your Windows registry for problems then automatically make repairs. If you run a registry cleaner and the crashes persist, they are probably being caused by a different issue.

Possibility #2: Disorganized Files

Windows operating systems handle file organization in a way that isn’t very intuitive. Basically, they break files up and fit them into gaps in the computer’s memory. As time goes by, these disorganized files can prompt frequent crashes. Luckily, a great optimization solution is built right into Windows-based PCs: the disk defragmentation utility. Although its location on a computer varies, you can generally locate it within the System and Security section inside the Control Panel. By running a defrag once every few months, you may be able to keep those pesky computer crashes at bay.

Possibility #3: Malicious Software

Malicious software can take many different forms. Sometimes, it’s a virus that is accidentally unleashed after opening a strange email; other times, its adware that tags along with other information that is automatically downloaded from a website. Whatever type it is, there’s no question that malicious software can wreak havoc on a computer’s performance. Happily, there are many topnotch programs out there that regularly scan your computer for the presence of such problems – and that help guard against them, too. Buy one, install it and use it regularly; your crash issues may come to an end.

Possibility #4: Too Little Available Memory

When you buy a new computer, it feels like there’s no end to the amount of memory that it has. Of course, this isn’t true at all. As never-ending as the available memory on your PC may initially seem, the fact is that it can be depleted with incredible speed. You can find out for sure by checking the information within “My Computer.” If it appears that your available memory is low, you can use a PC cleanup program to remove unnecessary files; such programs remove things like temporary Internet files and other file debris that can suck away much-needed memory.

Possibility #5: Overheating

If you’ve run through all of the preceding possibilities and continue experiencing frequent crashes, a hardware issue could be to blame. An easy one to rule out is overheating. A computer’s CPU, or central processing unit, includes a fan that is designed to keep it running cool. Sometimes, the fan wears down and doesn’t work as efficiently; other times, it’s just not able to handle the work that your computer has to do. In either case, buying a bigger, better fan isn’t very expensive. If it puts an end to your PC crashing problem, it will have been more than worth it.

Don’t Put Up with Frequent Crashes!

As discussed, frequent computer crashes can be triggered by a wide variety of issues. Luckily, many of these issues are relatively easy to remedy. Work your way through the preceding list; chances are, you’ll be able to pinpoint the problem and put an effective cure to work. Nine times out of ten, a computer simply needs a little bit of routine maintenance to get it back on track again. In the future, keep these points in mind. Any time you buy a new computer, keep up with its basic maintenance right from the get-go. By doing that, you could avoid “blue screen of death” and crashing problems altogether – and that’s something that you’re bound to appreciate!

What is Computer Network?


Two or more computers connected together through a communication media form a computer network.
The computers are connected in a network to exchange information and data. The computers connected in a network can also use resources of other computers.

Computer Network Components

There are different components of a network. Following are the basic components of network.

1. Server:

Powerful computers that provides services to the other computers on the network.

2. Client:

Computer that uses the services that a server provides. The client is less powerful than server.

3. Media:

A physical connection between the devices on a network.

4. Network Adopter:

Network adopter or network interface card (NIC) is a circuit board with the components necessary for sending and receiving data. It is plugged into one of the available slots on the Pc and transmission cable is attached to the connector on the NIC.

5. Resources:

Any thing available to a client on the network is considered a resource .Printers, data, fax devices and other network devices and information are resources.

6. User:

Any person that uses a client to access resources on the network.

8. Protocols:

These are written rules used for communications. They are the languages that computers use to talk to each other on a network

Intel Core i7

Intel Core i7 is an Intel brand name for several families of desktop and laptop 64-bit x86-64 processors using the Nehalem, Westmere, Sandy Bridge and Ivy Bridge microarchitectures. The Core i7 brand is targeted at the business and high-end consumer markets for both desktop and laptop computers, and is distinguished from the Core i3 (entry-level consumer), Core i5 (mainstream consumer), and Xeon (server and workstation) brands.
The Core i7 name was introduced with the Bloomfield Quad-core processor in late 2008.In 2009 new Core i7 models based on the Lynnfield desktop quad-core processor and the Clarksfield quad-core mobile were added, and models based on the Arrandale dual-core mobile processor were added in January 2010. The first six-core processor in the Core lineup is the Gulftown, which was launched on March 16, 2010. Both the regular Core i7 and the Extreme Edition are advertised as five stars in the Intel Processor Rating. In January 2011, Intel released the second generation of Core i7 processors. Both the first and second generation of Intel Core i7 processors are rated as 5 stars in the Intel processor rating. The second generation of Intel core processors are based on the "Sandy Bridge" core and are set to be updated in January1 2012 with "Ivy Bridge". 1Footnote: It has not yet been launched, as of 2012-04-22
In each of the first three microarchitecture generations of the brand, Core i7 has family members using two distinct system-level architectures, and therefore two distinct sockets (for example, LGA 1156 and LGA 1366 with Nehalem). In each generation, the highest-performing Core i7 processors use the same socket and QPI-based architecture as the low-end Xeon processors of that generation, while lower-performing Core i7 processors use the same socket and PCIe/DMI/FDI architecture as the Core i5.
"Core i7" is a successor to the Intel Core 2 brand.Intel representatives stated that the moniker Core i7 is meant to help consumers decide which processor to purchase as the newer Nehalem-based products are released in the future.

About Keyloggers

The term ‘keylogger’ itself is neutral, and the word describes the program’s function. Most sources define a keylogger as a software program designed to secretly monitor and log all keystrokes. This definition is not altogether correct, since a keylogger doesn’t have to be software – it can also be a device. Keylogging devices are much rarer than keylogging software, but it is important to keep their existence in mind when thinking about information security. Legitimate programs may have a keylogging function which can be used to call certain program functions using “hotkeys,” or to toggle between keyboard layouts (e.g. Keyboard Ninja). There is a lot of legitimate software which is designed to allow administrators to track what employees do throughout the day, or to allow users to track the activity of third parties on their computers. However, the ethical boundary between justified monitoring and espionage is a fine line. Legitimate software is often used deliberately to steal confidential user information such as passwords. Most modern keyloggers are considered to be legitimate software or hardware and are sold on the open market. Developers and vendors offer a long list of cases in which it would be legal and appropriate to use keyloggers, including: Parental control: parents can track what their children do on the Internet, and can opt to be notified if there are any attempts to access websites containing adult or otherwise inappropriate content; Jealous spouses or partners can use a keylogger to track the actions of their better half on the Internet if they suspect them of “virtual cheating”; Company security: tracking the use of computers for non-work-related purposes, or the use of workstations after hours; Company security: using keyloggers to track the input of key words and phrases associated with commercial information which could damage the company (materially or otherwise) if disclosed; Other security (e.g. law enforcement): using keylogger records to analyze and track incidents linked to the use of personal computers; Other reasons. However, the justifications listed above are more subjective than objective; the situations can all be resolved using other methods. Additionally, any legitimate keylogging program can still be used with malicious or criminal intent. Today, keyloggers are mainly used to steal user data relating to various online payment systems, and virus writers are constantly writing new keylogger Trojans for this very purpose. Furthermore, many keyloggers hide themselves in the system (i.e. they have rootkit functionality), which makes them fully-fledged Trojan programs. As such programs are extensively used by cyber criminals, detecting them is a priority for antivirus companies. Kaspersky Lab’s malware classification system has a dedicated category for malicious programs with keylogging functionality: Trojan-Spy. Trojan-Spy programs, as the name suggests, track user activity, save the information to the user’s hard disk and then forward it to the author or ‘master’ of the Trojan. The information collected includes keystrokes and screen-shots, used in the theft of banking data to support online fraud.

Must Use Defragmentation

Defragmentation is a process that reduces the amount of fragmentation. It does this by physically organizing the contents of the mass storage device used to store files into the smallest number of contiguous regions (fragments). It also attempts to create larger regions of free space using compaction to impede the return of fragmentation. Some defragmentation utilities try to keep smaller files within a single directory together, as they are often accessed in sequence. Defragmentation is advantageous and relevant to file systems on electromechanical disk drives. The movement of the hard drive's read/write heads over different areas of the disk when accessing fragmented files is slower, compared to accessing the entire contents of a non-fragmented file sequentially without moving the read/write heads to seek other fragments.

Seo (Search Engine Optimization)


Keywords

First You Need You Choose The Best Keywords

On page SEO Meta Tags

HTML meta tags are bits of code that aren’t visible on your site but which help with on page SEO by describing the pages of your site to search engines. The use of meta tags is one of the basic elements of on page SEO.

<head>
<title>Trunzout.blogspot.com</title>
<meta content='Trunzout.blogspot.com,Trunzout,Mirza Ahmed Ali,Pc Tipz,Pc Trickz' name='keywords'/>
<meta content='Trunzout.blogspot.com Providing The Best Info.' name='description'/>
</head>

Off page SEO

Search Engine and Directory Submission

Search The Different Search Engines & Submit URL To  Directory.

Back links

Post You URL To  Other Sites

How to Protect Your Computer


Below are some key steps to protecting your computer from intrusion:

Keep Your Firewall Turned On: A firewall helps protect your computer from hackers who might try to gain access to crash it, delete information, or even steal passwords or other sensitive information. Software firewalls are widely recommended for single computers. The software is prepackaged on some operating systems or can be purchased for individual computers. For multiple networked computers, hardware routers typically provide firewall protection.

Install or Update Your Antivirus Software: Antivirus software is designed to prevent malicious software programs from embedding on your computer. If it detects malicious code, like a virus or a worm, it works to disarm or remove it. Viruses can infect computers without users' knowledge. Most types of antivirus software can be set up to update automatically.

Install or Update Your Anti spyware Technology: Spyware is just what it sounds like—software that is surreptitiously installed on your computer to let others peer into your activities on the computer. Some spyware collects information about you without your consent or produces unwanted pop-up ads on your web browser. Some operating systems offer free spyware protection, and inexpensive software is readily available for download on the Internet or at your local computer store. Be wary of ads on the Internet offering downloadable antispyware—in some cases these products may be fake and may actually contain spyware or other malicious code. It's like buying groceries—shop where you trust.

Keep Your Operating System Up to Date: Computer operating systems are periodically updated to stay in tune with technology requirements and to fix security holes. Be sure to install the updates to ensure your computer has the latest protection.

Be Careful What You Download: Carelessly downloading e-mail attachments can circumvent even the most vigilant anti-virus software. Never open an e-mail attachment from someone you don't know, and be wary of forwarded attachments from people you do know. They may have unwittingly advanced malicious code.

Turn Off Your Computer: With the growth of high-speed Internet connections, many opt to leave theircomputers on and ready for action. The downside is that being "always on" renders computers more susceptible. Beyond firewall protection, which is designed to fend off unwanted attacks, turning thecomputer off effectively severs an attacker's connection—be it spyware or a botnet that employs yourcomputer's resources to reach out to other unwitting users

Ethical Hacking

Ethical Hacker has obtained a certification in how to look for the weaknesses and vulnerabilities in target systems and uses the same knowledge and tools as a hacker.

Hackers


Who accesses a computer system by circumventing its security system. who makes innovative customization's or combinations of retail electronic and computer equipment. who shares an anti-authoritarian approach to software development now associated with the free software movement .