Thursday, February 18, 2010



Motherboards sizes are as follows:
Standard AT = 12" w x 13.8" long
Baby AT = 8.57" w x 13.04" long
LPX = 9.0" w x 13.0
long ATX = 9.6" w x 12.00 long

Wednesday, February 17, 2010


Description:

The best way to describe the motherboard goes along well with my creature body analogy that I used for the CPU. The CPU is the brain, and the motherboard is the jumpy system. Therefore, just as a person would want to have fast message to the body parts, you want fast statement between the parts of your computer. Fast contact isn't as important as reliable communication though. If your brain wanted to move your arm, you want to be sure the nervous system can accurately and constantly carry the signal to do that! Thus, in my opinion, the motherboard is the second most important part of the computer.
The motherboard is the circuit board to which all the other components of the computer connect in some way. The video card, sound card, IDE hard drive, etc. all plug into the motherboard's various slots and connectors. The CPU also plugs into the motherboard via a Socket or a Slot.

This Guide, which I also call just the Reference Guide for dumpy, contains comprehensive metaphors of the major parts of a modern special computer, structured based on the various PC systems and components. I have attempted to be as complete as possible without getting too far into the technical details. The intention is to provide you, the reader, with a complete kind of how the PC works and what the issues are in designing and building one, while still being understandable by someone who isn't a PC expert.

In general, my focus in writing all of the objects on this site, is to look at the PC from the perspective of the home and business PC user, as well as the "do-it-yourselfer", superstar who wants to build or upgrade his or her own machine. I wanted to explain how the PC works from the inside out, so that you will be able to discriminate not just what the various parts of the system do, but why and how they do it.

I do not currently cover all of the components in a typical PC, even if I do cover the most important ones. Coverage for more peripherals will be upcoming in the future.

Tuesday, February 16, 2010

Hacker
The term hacker was once used to illustrate a clever programmer. Today, it’s applied to those who exploit security vulnerabilities to break into a workstation system. You can think of it as electronic burglary. Hackers regularly break into both character computers and large networks. Once they have access, they may install wicked programs, steal confidential data, or conceivably use compromised computers to share out spam.
Hackers are like electronic burglars, who use loopholes in your programs - vulnerabilities - to break into your computer system. You can protect yourself from hackers by using a firewall. A firewall program, which often comes as part of an anti-virus software package, protects a PC by detecting potential intruders and making the PC invisible to hackers.

Exposure
Today’s computer software is very complex, comprised of thousands of lines of code. Since software is written by humans, it’s hardly unexpected that they contain programming mistakes, known as vulnerabilities. These loophole are used by hackers to break into systems; they are also used by authors of mean code to launch their programs automatically on your computer.
Your computer behaves weirdly. in a way that you haven’t seen before.
You hear sudden sounds, played at accidental
Programs start unpredictably
Your personal firewall tells you that an application has tried to connect to the Internet.
Your computer ‘freezes’ frequently, or programs start running slowly.
You get lots of system error messages.
The operating system will not load when you start your computer.
You notice that files or folders have been deleted or changed.
You notice hard disk access when you’re not aware of any programs running.


Why is it essential to secure my wireless network?
These days, most computers are wireless-enabled: they let you connect to the Internet without a physical network cable. The major benefit, of course, is that you can use your computer anywhere in the house or office there are potential risks involved in wireless networking - unless you make your network secure:

A hacker could interrupt any data you send and receive;
A hacker could get access to your wireless network;
Another person could hijack your Internet access.
Therefore, if your wireless network is not protected, a hacker could intercept any data you send; access your network, and therefore your shared files; use your bond to connect to the Internet - especially significant if you have a download limit on your internet package and your bandwidth is being swallow up by a captor


symptoms

What are the symptoms of an contaminated computer?
It’s not always easy to tell if your computer has been compromised. More than ever before, the authors of viruses, worms, Trojans and spy ware are going to big lengths to secrete their code and conceal what their programs are doing on an infected computer. That’s why it’s essential to follow the advice given in this conduct in particular, install Internet security software, make sure you apply protection patches to your operating system and applications and backup your facts intermittently

Tuesday, February 2, 2010

Business software is generally any software program that helps a business increase efficiency or measure their productivity. The term covers a large variation of uses within the business environment, and can be categorized by using a small, medium and large matrix The small business market generally consists of home accounting software, and office suites such as Microsoft Office and OpenOffice.
The medium size, or SME, has a broader range of software applications, ranging from accounting, groupware, customer relationship management, human resources software, outsourcing relationship management, loan origination software, shopping cart software, ground service software, and other yield enhancing application
The last segment covers project level software applications, such as those in the fields of enterprise resource scheduling enterprise content management business process management and product lifecycle management. These applications are wide-ranging in scope, and often come with modules that either add native functions, or incorporate the functionality of third-party software programs.
Now, technologies that have beforehand only existed in peer-to-peer software applications, like Kazaa and Napster, are starting to feature within business applications. JXTA is an open source platform that enables the creation of machine and language neutral applications.

SYSTEM SOFTWARE

System software :
Device drivers
operating systems
servers
utilities
windowing systems
The purpose of systems software is to unburden the application programmer from the often complex details of the particular computer being used, including such accessories as communications devices, printers, device readers, displays and keyboards, and also to partition the computer's resources such as memory and processor time in a safe and stable manner. Examples are- Windows XP, Linux, and Mac OS X. integrated electronic environment that is available to and easily accessible by each employee and is structured to provide immediate, individualized on-line access to the full range of information, software, guidance, advice and assistance, data, images, tools, and assessment and monitoring systems to permit job performance with minimal support and intervention by others.
a computer-based system that improves worker productivity by providing on-the-job access to integrated information, advice, and learning experiences.

An electronic performance support system can also be described as any computer software program or component that improves employee performance by

Reducing the complexity or number of steps compulsory to perform a task,
providing the performance information an employee needs to perform a task, or
providing a decision support system that enables an employee to identify the action that is appropriate for a particular set of conditions.
Electronic concert Support Systems can help an society to reduce the cost of training staff while greater than ever productivity and routine It can empower an employee to achieve tasks with a minimum amount of peripheral intrusion or training. By using this type of system an employee, above all a new employee, will not only be able to inclusive their work more quickly and accurately, but as a secondary promote they will also learn more about their job and their employer's business.

EPSS must be famous from a long-established online help structure In her book, Glory Gery points out that on-line help habitually supports a single software application and is not necessarily focused on the entire range of job tasks but just that specific software. With online help, cross-referencing is often not available and the information provided is limited and rarely combined with procedures or complex tasks. Perhaps most critically, on-line help can not be customized to the user or the job task; in fact, the same software screen may require different inputs depending on the user and job task.

EPSS must also be differentiated from e-learning simulations that replay a series of steps on-demand within a software application. Simulations are more closely associated with on-demand training, not just-in-time support, because of the longer time considerations, complexity, and media restrictions for playing a simulation. Ted Gannan (2007) describes this differentiation and states that an EPSS can be considered a part of the e-learning category, as it is on-demand learning, and notes that the EPSS modality fits more within the informal learning definition.

A performance support system provides just-in-time, just enough training, information, tools, and help for users of a product or work environment, to enable optimum performance by those users when and where needed, thereby also enhancing the performance of the overall business.

In adding together to recommending consideration of an EPSS when knowledge is required to achieve individual performance in a business environment, Bezanson points out that an EPSS should be painstaking when skilled performers spend significant amount of time helping less skilled performers, when new workers must begin to perform immediately and training is impractical, unavailable or constrained, or employees need to be guided through a complex process/task that can’t be memorized. These situations often occur when new systems (e.g. Customer Relationship Management, Enterprise Resource Planning) are introduced, upgraded or consolidated, and in certain call centres when agents must perform using complex systems, processes or products