Selasa, 19 Maret 2013

Working With Computers

In Today's Society, There's No Escape Well, we've been warned that this time would come - probably from the earlier eighties on. Yes, computers have finally taken over and if you doubt it, we're here to convince you - but not because we want to or because we can. We want to convince you that if you don't take the necessary steps to control that reign, you're going to be left behind further than you could have ever imagined. Computers are everywhere. Take a moment to try and think of a place a business where you didn't see a computer in use. From the small local corner store to the largest hospital, computers are in every gas station, grocery store, bank, restaurant, beauty shop, and doctor's office around. From a consumer's point of view - you may not think that's much to worry about. But along with computers, we've also been infiltrated with a little thing called "self-service." Today, there are more self-serviced resources than ever and in an effort to synchronize them with headquarter databases, they're provided via your inescapable computer. Here are some examples. Banking is self-serviced through the desktop-clad ATM machine. Gas stations are self-serviced through a menu-clad touch screen kiosk. Most cash registers are Windows XP or Vista machines that send purchase details back to headquarters via the Internet (or a small Intranet). Having your weight, blood pressure, and heart rate measured and recorded is now a digitized process. Even ordering a pizza is now a simple matter of dialing from a wireless cell phone and making a few selections from series of pre-programmed menus! The important thing to realize here is that this phenomenon isn't a new convenience - it's a new requirement. And if you haven't jumped onto the binary wagon, you're going to face a few problems. For just as this new lifestyle was once predicted, we're going to predict that "the old ways" will slowly disappear. We're going to predict that all paper-based transactions (checks, money orders, etc.) and documentation (think of the old filing cabinet system) will disappear. We're going to predict that chips will replace everything that was once transported from one location to another through the trusty post office. And we're going to predict that homes will become less cluttered with stacks of paper and that our natural resources will flourish as a result of it. This all sounds fine and dandy of course, but if you're not computer savvy, you're going to feel a little lost once the choice has past and the revolution is 100% complete. Fortunately, computer systems are designed in a way that even a child can manipulate them. In fact, if you can remember that most systems are designed along the line of menus and the selections of a few options on these menus, you'll do just fine no matter how many buttons there are to push. For example, when you're faced with an electronic system, look for a main menu. Most main menus display themselves as soon as a device is turned on, so chances are that if you're standing before a device that shows a bunch of choices to do something, you're looking at a main menu. The buttons on these main menus of course take you to additional menus, which in turn give you even more choices to make. And all of those choices will eventually bring you to the service that you need. One very important choice you'll want to keep your eye on is the option to return to the main menu. This way, you can return to the beginning of a system and start over in case you get lost among the way. Another important choice that you want to keep your eye on is the choice to get help! This option may not be available on every device that you encounter, but when it is available, be sure to use it. There's just no way around it. Computers and computerized systems are here to stay. There's no need to fear them - but you surely can't avoid them. Just remember the menu system and you'll soon discover that you can approach and use these things as if you designed them yourself.

Employer Sponsored Online Computer Training

Most human resource professionals would agree that the most vital aspect in maintaining a good employee is through training. Keeping personnel trained on the most up to date aspects of their profession creates a more valuable employee. The downfall to this is that in a budget crunch, an experienced employee seeking more compensation will have numerous options available. The reasoning: a trained employee is a valuable employee. Unfortunately this is true. In actuality, the employer must hope for loyalty in their employees. Without this loyalty, the doors can be virtually blown off their hinges. An answer to this dilemma may be in providing online computer training to employees for the basic requirements of the job at hand where practical. Certifications expire but don't require classroom attendance. Many online computer training courses are available covering everything from archaeology to zoology and everything in-between. One only need do a Google search for online computer training that covers the given subject to discover this. A dilemma faced by many employers as it refers to training is expense. In a lot of training situations, class reservations, hotel reservations, meals and other expenses become a factor. Sometimes these expenses overshadow the expense of the course alone. In addition to this, the employer loses the employee for an extended period causing a slow down in production. Another consideration is the travel expense; gas, wear and tear on a company owned vehicle that make some training cost prohibitive. All of these expenses add up, sometimes into an astronomical amount that may discourage an employer from sending an employee for training. Online computer training is beneficial in many ways and answers many facets of this dilemma. For one, there are no hotel reservations, or meal expenses. That alone can save money to make online computer training an attractive option. Productivity will be only minimally affected depending on the arrangements made for time to take the online computer training. Given the aforementioned, travel expenses; gas, wear and tear on the company vehicle are eliminated. The only true expense is that of paying the employee while they train. If accomplished properly, the expense can be negated. Many online computer training institutions provide group discounts, thereby lightening the load on the employers wallet even further. In addition, most provide instant or relatively instant course results to the employer. As part of the majority of marketing schemes, these institutions also keep the employer up to date with their latest training schedules thereby building a rapport. Whatever the case, having this information hands-on allows an employer abreast of potential training opportunities. Training an employee builds the employees value. This may increase the possibility that the employee may leave for 'greener pastures'. However, the more optimistic thought process implies that a trained employee is a happy employee. Keeping employees happy through training makes for loyal employees. In keeping with this, employers should not only be productive and proactive towards company goals. By providing not only training, but online computer training the expense bourn by the employer is lost.

Selasa, 12 Maret 2013

When Less Is More Clean Your Disk Drive of Unnecessary Files and Your Computer's Performance Will Improve

When it comes to maintaining your computer, you've probably heard it all before. "Run Defrag!" "Scan Your Disk for Errors!" Although these two activities are important, there's more you can do to extend the life of your computer beyond today's predicted two-year span. In fact, by following the simple advice below, you can enjoy the use of your computer to up to five years or more - reserving expenses to simple software upgrades rather then complete and costly hardware upgrades. One of the easiest and least expensive things you can do to extend the life of your computer is to get rid of unnecessary programs, folders, and files. A disk drive that's clogged with unnecessary and unused files is disk drive that works harder than it has to. Although Window's defrag system can ease some of the stress that these files place onto the drive, it doesn't do much to get rid of the problem in the first place. This is because the defrag program simply organizes the files in a system that makes it easier for the computer to access. (Thus cutting down on the work required to find and load them). But this method merely "relieves" the symptoms that these files induce - it doesn't attack the cause. These files need to be deleted - not "organized!" Of course, deleting files can be a scary adventure to most users. Most computer users don't know which files are safe to delete and which aren't. The worst thing anyone could do is snoop around crucial Window directories and haphazardly delete files that don't look familiar. Doing so could render important programs inoperable, corrupt the Windows operating system, and possibly prevent the computer from even starting. That's why using special deletion software is so important. Deletion programs will analyze a computer's operating system and installed programs to determine which files are crucial to computer function versus which files are safe to delete. You already have such a program on your computer and it's Windows' Add/Remove Programs (available from the Control Panel). This software will assist you with deleting programs that you not only no longer want, but additional files that these program use as well (dynamic link libraries, database files, registry references, shortcut icons, etc.). But sometimes Windows' Add/Remove Programs isn't enough. Although this software does a pretty good job of removing unwanted programs, it can leave some files behind even after a complete uninstall - files which become orphan files. And it's these orphan files that can really clutter up a hard drive and shorten the life of an otherwise, young and robust PC. Orphans are usually files that contain temporary data created by a program, files created by the user, partial files left over from a computer crash, or any other kind of miscellaneous files created for almost any other reason. The problem is that an uninstall program doesn't delete the orphan files it leaves behind because they were never part of the program when it was first installed. An uninstall program can remove only the files it placed onto a hard drive during its install routine. So while Windows' Add/Remove Programs can remove an entire program, you'll need to get rid of those pesky little things with a more advance file cleaner like CleanSweep for example. CleanSweep is a unique program that will specifically seek out files that are no longer associated with a program, and then ask if you want to delete them. The only time that you wouldn't want to delete an orphan file is if the file were an actual document that you created before deleting a program. If you were to say, uninstall Microsoft Word, all the documents that you created with Word would then turn into orphan files. Or if you were to uninstall a graphics-editing program, all the pictures you made with the program would become orphan files. The smart thing to do when you don't want to lose the data that you created with an unwanted program is to: 1. Save or convert your documents to a format that will work with different program first (that is, a program that you intend to keep) 2. Archive them onto a floppy disk, flash drive, or CD-ROM 3. Proceed with a program like CleanSweep. Using CleanSweep or any other similar type of utility could delete anywhere from less than a megabyte of hard drive space to over five megabytes and up. That may seem like a small amount of "clog material" to you, but to your computer, it's a lot less to process!

Jumat, 08 Maret 2013

Viruses - What They Are And One Reason Why People Make Them

Over recent years, computers have become synonymous with viruses and viruses don't show any signs of disappearing any time soon. In recent news, LiveScience.com reported that "Before the month is even done, April has set a record for virus e-mails."1 In the past, we would be comfortable in telling new computer users not to worry about viruses and that catching a computer virus is rare. Today, that would be some of the worst advice we could give anyone. As reported in countless news reports, computer viruses are rampant and they're extremely worrisome. This article will describe what viruses are and then point you in the direction of some rather unique protection and prevention. In short, a computer virus is a software program designed to destroy or steal data. It attacks computers via distribution - often unknowingly - through email attachments, software downloads, and even some types of advanced web scripting. Viruses that destroy data are known as Trojan horses, viruses that explode their attacks are called bombs, and viruses that duplicate themselves are called worms. Some viruses are a combination of each, however they can be further identified according to where they're located on a computer. A virus originating from the boot sector of a computer is a boot-sector virus and this nasty devil does its dirty work the moment a computer is turned on. A virus that attaches itself to (infects) other programs is a file virus and activates the moment that an infected program starts. File viruses may also be referred to as parasitic viruses, however should a virus work from both the boot-sector and from an infected program, the virus is then known as a multipartite virus. Why viruses exist remains a mystery, however we had privy access to the mind behind a virus programmer who explained his motivation behind his destructive inclinations. Apparently, this person had a deep grudge against a popular online service which shall remain unnamed. In this hacker's mind, the online service failed to do a quality job in protecting children from online smut and as retaliation, he created and distributed a virus to as many file libraries of this service as he could. His intentions were to disable the computers of the online service's users so much that they wouldn't be able to connect for days. In his mind, the loss of connection meant loss of revenue for the online service. Although the malicious code that this person generated may have worked for a small percentage of users, sufficed to say, the online service continued on and still exists today. Despite his motivation or intention, his efforts were null. We wouldn't be surprised to learn if other motivations behind spreading viruses were similar to this person's, but that doesn't justify the damage that viruses do. Innocent people become pawns for the evil plans of others who've convinced themselves they're doing the "right" thing. To protect a computer from getting a virus, or clean a virus from a computer system once infected requires the use of an antivirus utility. But may be something else we can do. Perhaps we could make an effort to educate the people who want put viruses into the public about ways to display dissatisfaction with a service or product that don't involve harming innocent parties. In doing so, we just might reduce the number of virus news stories and protect our own investments at the same time.

Rabu, 06 Maret 2013

Computer errors

Computer errors can pop up when least expected, they can cause the entire system to suddenly shut down, and they can inadvertently corrupt data to the point where it can't be deciphered. Although they can't always be avoided, it's important to remember that computer errors can be corrected. The key is to understand what computer errors are, understand what they mean when they show up, and understand how to minimize their occurrence in the first place. Basically, computer errors are the result of a number of things that may or may not have anything to do with the way the computer is used. They "operate" whenever there's a conflict among commands. Remember that computers essentially run off of a series of commands and it's usually a smooth process. But when one command conflicts with another command - or when one command asks for a process or information that isn't available, the computer returns results that aren't useable. That's an error. A prime example of this kind of error is when users attempt to use software that isn't applicable for their system. Almost all software accompanies a list of system requirements which dictates what a computer needs to have in order for the software to work properly. To minimize errors of this sort, always verify that your computer has the required components. A project management program that you're interested in may require a specific operating system, like Windows XP for example. And although this program may install just fine on a Windows 98 machine, it will generate a multitude of errors once its started. Insufficient memory will cause errors as well. That's why software programs include minimum memory requirements. A program that needs 14MB of memory will generate errors on a computer that only has 4MB of memory if it runs at all. The same goes for disk space, monitor color depth and resolution. In these situations, problems occur the moment that a piece of software attempts to access the things (hardware, memory, space, resolution, etc.) that it cannot find. Because some programs share common files, errors can also occur when these shared files are not up to date. For instance, let's say that Program A is already installed on a computer and it's working just fine. Then let's say that the user of that computer downloads and installs Program B. Program B uses a file that Program A installed much earlier, but when Program B is run, errors popup. Those errors are the result of Program B attempting to use an outdated (shared) file that was installed by Program A. In order to fix that problem, the user would have to download an updated version of the shared file (which to say the least - is not an easy thing to find or do). Sometimes, errors occur because a system doesn't have the required drivers or the drivers that are on the system are the incorrect version. Both errors in these cases can be resolved by updating the computer on a regular basis. Microsoft provides a section on its website that can automatically update a computer online and it does this at no cost in an effort to reduce errors like this. Always try to keep your computer updated so that should a program share a file, it will share a file that has been updated on hundreds of thousands of computers, like yours. This article doesn't even begin to cover the entire gamut of computer errors - but additional information regarding how to get help with a computer issue (including computer errors) can be found in our article titled, "Computer Help" no matter what the problem is.

military computer

Today's military is on the leading edge of technology. Leaders in the US Armed Forces have long recognized that a trained soldier is a good soldier. Along with this: a good soldier is a happy soldier; a happy soldier is a retained soldier. With advances in technology, and the advent of the internet, it was only a matter of time before the military would come online. Due to this steadfast belief, the military evolved. If mother necessity were the mother of invention, then education was the necessity. Military members now have access to advanced training and other educational materials through online computer training. In the military of old, training was conducted primarily in a classroom environment: no online computer training whatsoever. The alternative to classroom instruction was correspondence courses. While some training requires the student to be under direct supervision of the trainer: other's don't. To alleviate this, the military designed correspondence courses. Each correspondence course had attached a pre-test and a final test: the member would mail in the pre-test and receive a final exam to complete and return. Correspondence courses alleviated the stress put upon training commands and allowed students to study at their own pace. At the time, this was a boon to the military and it's personnel. Problems arose with this program, though. Problems such as lost or misrouted mail often prevented members from obtaining much needed certificates. The course completion certificate was considered the only proof required for course completion. Also, the certificate often served as a substitute for training requirements. In addition to this, certificates were the only requirement for obtaining points toward promotion. With the aforementioned problem came personnel problems. Personnel problems were an issue that if not solved expediently added to retention problems. The military recognized this issue and determined to do something about it. Another issue faced by military members of the past was obtaining a college degree. Members were often deployed or stationed in locations where access to college was not possible. Due to this problem, members attempting to obtain a degree had issues with continuity of their education. A simple change from one duty station to another created problems also: one college not accepting another colleges curriculum. Eventually, the military recognized both problems and determined that providing military members to online computer training would benefit everyone. Nowadays, on any military installation one can find an 'internet café'. These locations were established to serve the member with the opportunity to access the internet. Internet access provided the opportunity for accessing online computer training. Members now access courses that were previously offered only through correspondence. Through online computer training, members can now complete an online degree no matter where they are on the globe. That is, of course, provided that they can access the internet. Generally the only places that have problems with internet connectivity are submarines, yet with technology advancing that may not be a problem for long. And the problem with correspondence courses? Online computer training resolved all of that. Members now have instant access to completion certificates. Certificates lead to points, and points lead to promotions. All of these combined makes a trained, retainable soldier. Therefore, online computer training has helped keep the US Armed Forces truly a force to be reckoned with.

Home Computer Training

Welcome home! You're so excited to have your new computer system up and running. It is pretty exciting, isn't it? So what's next? For some of you, you're off to the races, ready to go to the ends of the Internet. For others, you may be staring at your new system like a calf staring at a new gate. This is why most home users of personal computers can benefit from home computer training. So what are some of the things a home computer user should get trained on? Let's take a look at a short list of things you need to know to be efficient on your home computer and keep it running in tip-top shape. Home computer training should always include how to do back-ups. It goes without saying that if something is important, you should have two copies of it. It's nice to have a hard copy (print-out) of a document or file, but it's also nice to have a back-up of the actual computer file. Just imagine what happens when the spreadsheet you've been using to balance your accounts suddenly get corrupted. If you don't have a electronic copy of the file, then you will be stuck with re-entering all of the information by hand. With home computer training you can get the skills to know how to best back up your files, which files to back up, and what utilities will best meet your needs. Another area that should be covered through home computer training is that of file system maintenance. At this point, we've already covered back-ups. In this area, let's look at two areas that often get overlooked until the system slows down so much it is basically at a stand still. One is disk cleanup and the other is file fragmentation. Home computer training will help the new computer user learn how to recognize when a hard drive is becoming cluttered, and what to do about it. Often, third party software creates temporary files while you are using it, and then conveniently neglects to delete these files when you are done. In addition, trash can collect in your recycle bin as well. Combine these with temporary internet files and cookies and you can be bogged down pretty quickly. Home computer training will also help you understand what causes a file to get fragmented into dozens of pieces on your hard drive. While this doesn't destroy the file, it sure does slow down the computer's access time to it, which increases your wait time while using that software or opening that particular project. A final area that is often overlooked by the new computer user is that of Internet security and setting up of the firewall. A good home computer training class will cover how to set up your firewall, and how to optimize your Internet browser to ensure a good experience while online. All of these areas are important when operating a computer in this modern Internet age. So be sure and address these when you are signing up for home computer training. A good home computer training class will not only address these main issues, but go above and beyond in bringing you up to speed on modern computing.

Computer Training For Emergency Services Personnel

Emergency Services personnel receive extensive training in their respective academy. In the initial phase of training, the subject matter is mainly academic. Law enforcement personnel, for one, cover topics such as state law, drug recognition, hazardous materials recognition, and more through hours of classroom instruction. The remainder of the training cycle is hands-on training. In a portion of the hands-on training, computers play a major role. For instance, for law enforcement there are 'shoot or don't shoot' scenarios: These are played out on a video game like system, in which the officer stands on a padded surface that detects every movement (ducking, kneeling, shifting side-to-side). While standing on the surface, the officer has a weapon 'holstered' and is provided scenarios in which he or she must decide whether or not to shoot a subject. During this training, the officers every action or inaction is monitored up to and including verbal commands given to the 'subject'. This type of computer training has proven vital over the years in terms of evaluating prospective law enforcement officials. In the world of Emergency Services, certification is imperative. Included in the definition of Emergency Services personnel are police, fire, and EMS. In most states these personnel are required to maintain certification through a points system. Personnel earn points through course completion; annual certification in different subject matter and annual re-certifications. In addition to the points earned for required academic subjects, there are points awarded for similar training courses. These 'extra' subject matter are often considered an acceptable substitution for required subjects. In the past fifteen years, due to budget constraints and other factors, annual academic subject matter is being rearranged to accommodate computer training. This has proven cost effective to state and local agencies: budgets aren't stretched thin, leaving funds available for special projects and such. There are many examples of computer training received by Emergency Services personnel. Of the many important classes, for example, are Hazardous Material recognition courses. The benefit of completing a course such as this is twofold: the materials can be covered easily during a shift, and instant results are generated. The fact that a computer training course can be completed during a shift makes it cost effective for a small department in terms of travel expense, wear and tear on a vehicle, and time lost to training. For policemen desiring to obtain training on subject matter that would normally require their attendance at a far off training conference, this is a boon. Computer training courses covering topics such as drug recognition are relatively easy to find. These courses are generally recognized by the respective law enforcement training division of the given state. While a policemen may be discouraged from taking such a course during duty hours, it is entirely possible to complete such a course during off-duty hours. Again, this type of computer training course benefits not only the officer, but the Department. Perhaps the biggest benefit of computer training for Emergency Services personnel is the one aspect of their lives that become the most neglected: family time.

Avoiding Improprieties In Online Computer Training Courses

Online computer training courses are offered by both reputable institutions and sometimes not-so-reputable sources. The problem in determining which is which can be determined through appropriate resources. The purpose of this article is to provide a few guidelines as to what to look for when you are looking for online computer training. Regardless of the course taken, this may prove helpful. More and more students are taking to the internet to solve a common dilemma: lack of time to obtain classroom instruction. This has created a niche for education professionals: online computer training courses. These courses are numerous and cover topics from astrology to zoology and everything in between. Starting with the information provided below may prove helpful: Reputation: One of the first signs or signals of impropriety to look for when evaluating an online computer training course is reputation. Are there reviews available for the company or group offering the training? If not, this may be a negative indication. If there are, do they post both favorable and unfavorable reviews? If so, this may indicate an open-mindedness towards criticism on the part of the staff. Accredited or Not: Is the particular online computer training course accredited? If not, depending on your needs, this may prove to be a wasted effort on your part. Though you may feel as though you've learned something, it may prove to be worthless as it pertains to advancing a degree. Accreditation should be looked at with scrutiny. A good source for determining accreditation is through a Google search for accredited online colleges. Physical Location: Is the staff located in one physical location or does correspondence go to a post office box? A company that doesn't have a physical location on a map could be another sign of impropriety. Without a physical location to visit and or lodge a complaint can prove to be difficult in the event of legal problems such as settling a dispute. Some online computer training courses offer interaction through electronic mail (Email), this should not be taken as a negative unless there is no corresponding physical address. Contact Information: Is telephonic conversation done through a 1-800 number? Often times dummy corporations and other illegal activities are coordinated through 800 numbers. That's not to say that this by itself should be a deciding factor: some operate call centers through a network of 800 numbers to lessen expenses. Is there an alternate contact phone number? Again, not solely a disqualifying factor however it is a plus to find that there is a non 800 number available. Catalog: Is the company offering the online computer course, offering only one course or do they possess a catalog of courses available? Providing a singular course is a bad sign. Just as a traditional college doesn't concentrate on one discipline of study, neither should a reputable institution offering online computer training courses. As in any online endeavor that may have an effect on your future, due diligence should be taken prior to a financial commitment. The suggestions made in this article are not all inclusive and should not be taken singularly as an indication of impropriety; rather in whole or in combination.

A Few Common Computer Errors (And What They Mean)

Computer errors can pop up when least expected, they can cause the entire system to suddenly shut down, and they can inadvertently corrupt data to the point where it can't be deciphered. Although they can't always be avoided, it's important to remember that computer errors can be corrected. The key is to understand what computer errors are, understand what they mean when they show up, and understand how to minimize their occurrence in the first place. Basically, computer errors are the result of a number of things that may or may not have anything to do with the way the computer is used. They "operate" whenever there's a conflict among commands. Remember that computers essentially run off of a series of commands and it's usually a smooth process. But when one command conflicts with another command - or when one command asks for a process or information that isn't available, the computer returns results that aren't useable. That's an error. A prime example of this kind of error is when users attempt to use software that isn't applicable for their system. Almost all software accompanies a list of system requirements which dictates what a computer needs to have in order for the software to work properly. To minimize errors of this sort, always verify that your computer has the required components. A project management program that you're interested in may require a specific operating system, like Windows XP for example. And although this program may install just fine on a Windows 98 machine, it will generate a multitude of errors once its started. Insufficient memory will cause errors as well. That's why software programs include minimum memory requirements. A program that needs 14MB of memory will generate errors on a computer that only has 4MB of memory if it runs at all. The same goes for disk space, monitor color depth and resolution. In these situations, problems occur the moment that a piece of software attempts to access the things (hardware, memory, space, resolution, etc.) that it cannot find. Because some programs share common files, errors can also occur when these shared files are not up to date. For instance, let's say that Program A is already installed on a computer and it's working just fine. Then let's say that the user of that computer downloads and installs Program B. Program B uses a file that Program A installed much earlier, but when Program B is run, errors popup. Those errors are the result of Program B attempting to use an outdated (shared) file that was installed by Program A. In order to fix that problem, the user would have to download an updated version of the shared file (which to say the least - is not an easy thing to find or do). Sometimes, errors occur because a system doesn't have the required drivers or the drivers that are on the system are the incorrect version. Both errors in these cases can be resolved by updating the computer on a regular basis. Microsoft provides a section on its website that can automatically update a computer online and it does this at no cost in an effort to reduce errors like this. Always try to keep your computer updated so that should a program share a file, it will share a file that has been updated on hundreds of thousands of computers, like yours. This article doesn't even begin to cover the entire gamut of computer errors - but additional information regarding how to get help with a computer issue (including computer errors) can be found in our article titled, "Computer Help" no matter what the problem is.

Selasa, 05 Maret 2013

Protecting Children Online Steps Toward Making Your Computer "Weirdo-Proof"

It's an unfortunate fact of reality, but children are the most victimized computer users on the Internet today. The good news is that there are some practical steps you can take to protect your children from sexual predators, hackers, and other seedy individuals who want to cause harm. This article will describe a few of them. The first step in protecting your children at the computer is to prevent their access to passwords. This will keep them from sharing passwords with others and inadvertently enabling hacking into your system. If you think about it, there's no reason why a five, seven, or even twelve year old needs to know the passwords to sensitive areas on the computer unless you've given them permission! In fact, children don't need to know the password used to access the Internet either. It may be a hassle to type it in each time they want to get online, but it's better to know the times that they connect than to have them sneak online without your permission and knowledge of their activities. The second step towards protecting your children online is using the computer together. Siting next to your child while he or she peruses the Internet, you can guide him or her to make safe and intelligent decisions. You can approve websites and bookmark them together. You can monitor the conversations your children have with their friends and teach them appropriate online behavior at the same time. You can make recommendations and create a private time for quality time as well. The third step involves blocking access to inappropriate areas altogether. You and your children may not always agree about what's appropriate, but as a guardian, you're in control and you're ultimately responsible for their safety. Take the time to investigate software tools that put you in control and allow you to block access to certain websites. If you use an online service like AOL (America Online), you can use its internal Parental Control settings to block access to various chatrooms and websites. You could even block instant messaging and email from anyone who isn't a fellow AOL user. Other tools available online operate similar to the way that AOL's Parental Control settings work, however no collection of tools could replace the reinforcement of mom and dad. Never let your children speak with strangers and never leave them alone at the computer unattended. Children just don't have the experience that adults have and they don't have the skills required to handle inappropriate conversations, emails, or images found online. NOTE: Some of these tools include kid-specific web browsers that will visit pre-approved websites. Others include browser plug-ins that won't allow access to online areas that contain forbidden keywords. Another step requires teaching your children to never ever volunteer personal information. Under no circumstances, should children give their personal names, home addresses, phone numbers, or school information to anyone over the Internet regardless of the situation. In the even this information is required to enter a contest of some sort, be sure that you're the one who makes the decision to supply it and that you're the one who does it. Performing all of these steps won't be easy. However you can help minimize resistance to your monitoring efforts by explaining why you're taking these precautions. Smaller children will probably enjoy the time you spend together at the computer, but older children and pre-teens may resent it. To help build a case for your concern, you might want to show your older children a few news stories that exemplify the dangers that unsupervised children are exposed to. The newspaper is unfortunately full of examples but with your help, we can reduce them world-wide.

What's That File? An Introduction to File Extensions

In an effort to be "user-friendly," Windows (and perhaps some other operating systems) hides the most important part of a file name from new computer users: the extension. Okay - we're assuming that the reasoning behind hiding extensions is a "user-friendly" one because we just can't come up with any other reason for hiding them. No harm could ever come from seeing an extension, but plenty could be learned from it. Fortunately you have this article to guide you through some of the most common extensions that you'll run into. But before you can see file extensions, you need to turn them on. From Windows Explorer, click on the "Tools" menu, and select "File Options." Click the "View" tab and then uncheck the box next to "Hide file extensions for known file types." Click "OK" and you'll notice that the files in Windows Explorer show a dot and group of three letters after their names. That dot and group of three letters is known as an "extension," and the extension explains what kind of file it is. A file could be a plain text file, an image, a sound, a video, or program. But without seeing the extension, you wouldn't know it unless you double-clicked on it. The following list defines some of the most common extensions that you'll find on your computer. .au - This extension indicates a sound file. Most sound players will load up and play this kind of file. .art - This extension indicates an image file that was compressed with AOL (America Online) technology. Both Internet Explorer and the AOL service software can display this kind of file, however if you don't have AOL installed on your system, Internet Explorer will display it. .avi - This extension indicates a video file playable by most multimedia viewers including Microsoft's Media Player. .bmp - This extension indicates another image file that might have originated from Windows Paint program. .dll - This extension indicates a Dynamic Link Library which may contain additional programming code for software. Many different programs often share Dynamic Link Libraries and you'll find a bunch of them in the Windows/System directory (but don't ever delete them)! .exe - This extension indicates a program or an application like Microsoft Word, Internet Explorer, or Outlook Express. Use extreme caution when downloading .exe files from the Internet since malicious programmers like to hide viruses in these types of files. .gif - This extension indicates another image file and it stands for "Graphics Interchange Format." .Gif files are often smaller than .bmp files (described earlier) and they're commonly found on Internet web pages. .jpg - This extension indicates yet another image file and it stands for "Joint Photographers Experts Group." Like the .gif file, it's commonly found on Internet web pages, however it's much smaller than both the .gif image and the .bmp image. .mid - This extension indicates a sound file created with a Musical Instrument Digital Interface. Windows Media Player will open and run these files, however they don't sound like normal .wav or .mp3 files (described later). .Mid files are designed to product synthetic sounds using a computer's sound card. .mp3 - This extension indicates a sound file that authentically reproduces voice and/or music. Windows Media Player will open and run this kind of file. .scr - This extension indicates a screen saver file. .sit - This extension indicates a Macintosh archive StuffIt file. They will not open on a Windows system without a special utility. .ttf - This extension indicates a font especially designed for use on a Windows system. It stands for "True Type Font." .txt - This extension indicates a plain text file that can be opened with Notepad. .wav - This extension indicates a sound file that like the .mp3 file, can be opened with Windows Media Player or Windows Sound Recorder. .Wav files are much larger than .mp3 files. .zip - This extension indicates a Windows archive WinZip file. They will not open on a Macintosh system without a special utility.

Using Computers - It's Not Rocket Science

These days it's strange to hear people say, "I'm just not computer literate," as computers have evolved from archaic scientific calculators to simple point-and-click type machines. We suspect that today's "computer illiterates" are people who haven't taken the time to experiment with such a machine. And we strongly believe that spending just twenty minutes with one could turn the most adamant technological caveman into any one of those who have fun wreaking chatroom havoc on the Internet today. Today, one only needs to learn how to manipulate a mouse, punch a few buttons on a keyboard, or really just turn the thing on to use a computer. It's hard for some folks to believe, but the computers of this generation almost run themselves! For fun, let's investigate just how little knowledge these thousand-dollar machines actually require. Can an absolute newbie operate a computer without knowing how to use a mouse or keyboard? Assuming that a computer is set up to operate on voice command - sure! Voice command software allows users to tell a computer what to do and the computer responds by fulfilling the user's commands. Although it's pretty new and still under development, voice directed technology has already infiltrated consumer service related systems. Think back to the last time that you paid a bill over the phone. Instead of speaking to a human being, chances are that you spoke to a computer that not only responded to what you said and followed the commands that you gave it, it also asked you for more information such as your full name or credit card number. In this case, a person (such as yourself) operated a computer without even knowing it! Can an absolute newbie sit down at a computer without knowing how to use one? Assuming that a computer is set up to operate on touch command - the answer is again, yes! Touch command software allows users to literally touch objects on a monitor and tell the computer what to do with a finger. Known as "kiosks," these programs are already in use world wide at ATM machines, employment centers, and in health monitoring systems. Neither a mouse nor a keyboard is required. A computer user only needs to touch various boxes on a screen to control a computer. Sure, the programming behind such technology is extensive and advanced, but to the end user, it makes computer use less intimidating and plain easy. Of course when we talk about operating a computer, we envision more involvement than speaking on the phone or touching things on a screen. The above illustrations were just a couple of examples of how far computer technology has grown, and how far we've pushed "user-friendliness" to its limit. Eventually, the keyboard and mouse will have to play a role when computer newbies have to work with one as a cash register, as a hotel booking program, or as a library's catalog system. These requirements don't make computers any less easier to operate, but they don't make them that much harder either. So much of today's software is designed to accommodate the experience of a new user that anyone could get connected to the Internet, send an email message, and download an MP3 file within the first five hours of purchasing a personal PC.

Buying a Computer

It isn't fair, but buying a computer is just plain easier for some than it is for others. Those who've purchased and used a computer in the past already have an idea of what they need in a new computer. But those who are new to the computer world could get lost in the myriad of choices available. The short answer to "What should I buy?" is "The best." Of course that answer is extremely subjective because "the best" to one person is certainly different to another. Our definition of "the best" is the fastest and the biggest, but even that leaves the computer newbie confused. Here's a quick rundown of what the computer novice should do and why. 1. Buy a computer that includes basic peripherals. Every computer can be broken down into four major components: CPU unit, monitor, keyboard, and mouse. For the novice, it's best to buy a computer that has all of these components included so that when it's taken home, assembling the computer is a simple matter of plugging things in where they belong. Save the individual purchases of these components for those who have more experience. 2. Decide what you'll use the computer for. If you want to use your computer for cruising the web, sending email, or performing simple word-processing or spreadsheet tasks, a computer with the basic components that we just described should suffice. If you want to use a computer to help with a career in multimedia however, you're going to need to accessorize your system with a scanner, printer, digital camera, tablet, or digicam for example. If you want a computer to help with a career in music, you will need a quality microphone and set of speakers. 3. Create a budget and stick to it. How much can you afford to spend on a new computer? Although the prices of computers are decreasing, they can still create a hefty expense especially if you need additional peripherals described above. In addition, you'll need to figure in costs for maintenance, servicing, and insuring. 4. Start comparison shopping and look for the "fastest and biggest." By "fastest and biggest," we mean the computer with the fastest processor, the fastest modem, the biggest memory, and the biggest hard drive capacity. Even if you think that you'll never need the amount of speed or space available on the market today, it's important to have in the event that you truly do need that much in the future. Having such a large reserve will cut down on costs when the time comes to upgrade for more than what you may settle for in a computer that offers less. 5. Stick with the better-known brands. Venturing off the beaten path with lessor-known brands is again, an adventure for those who have more experience with computers. Although those better-known brands may be a tad bit more expensive, the computer novice will appreciate the comfort in purchasing a computer from a business that has a long record of building quality products, and that has the funds available for fulfilling returns, trades, servicing, and warranties. 6. Select a store. Having an idea of what you want in a computer and what kind of computer that you want, your only task left is to select the place in which you want to buy it. There are a number of places available including computer store outlets, online stores, auction sites, used computer stores, or your friendly neighborhood yard sale. For the computer novice, we recommend buying a computer from a physical store. In a physical store, you have the opportunity to see the computer of interest in person and ask questions. New computer buyers also have access to store warranties, returns, trades, and services. These suggestions should give the computer newbie a great start in selecting a quality computer for the first time and they apply to either Windows computers or Apple Macintosh computers. After making these decisions and finally selecting one that fits your needs, you can then venture into the fascinating world of software - a world that is just as grand as the world of hardware!

Jumat, 01 Maret 2013

Smartphones - What's the craze all about?

If you haven't heard of smartphones, we'd like to learn where you've been hiding all this time. Smartphones have been all over the news and chances are, you do know what they are - only you know them under a different name. Smartphones are mobile phones with computer like capabilities. What's that? Aha! Yes, you've not only heard of them, you've probably seen them as well. Packed with Internet access, email capabilities, address books, and a whole lot more, cell phones have come a long way since their first debut. But be careful not to confuse these newest toys with sandbox devices. Sandbox devices are tools that come pre-loaded with things like calendars, calculators, and a notepad. What differentiates them from smartphones is that users can add (download and install) additional programs to smartphones and they seemingly become mini portable computers for the people who use them. That - and the ability to edit the content that sits on them - is what makes these phones "smart." Some of the more popular brand names include the Blackberry, PalmSource, Nokia, and Windows CE. Yet the craze is extending to even some off-brand company names. Today, it's hard to find a cell phone that doesn't offer some sort of "smart" technology because it's in such a high demand. The convenience of having information at our immediate access is phenomenal - so much so that thousands of programmers have jumped on the opportunity to build unique applications specific to these small machines. As a result, you can find tons of games, databases, GPA systems, weather reporting programs, and even small encyclopedias on these things - each accessible not at the click of a mouse - but at a few presses of a free thumb. Of course a mini keyboard is available for the text-messaging fan or for the poor fellow who can't seem to get away from the office. In the latter case, don't be surprised if you find the entire Microsoft Office suite displayed within a screen no bigger than a matchbook. Is this a phase? That's highly doubtful. The market for these devices extends from the highly technical and professional all the way to the pre-teen socialite. The product crosses all demographics and thanks to decreasing costs - it sees no economic boundaries as well. The Wikipedia encyclopedia claims that "Out of 1 billion camera phones to be shipped in 2008, Smartphones, the higher end of the market with full email support, will represent about 10% of the market or about 100 million units." But what is it that makes smartphones so appealing? As mentioned, smartphones give us the ability to not only carry our data around with us where ever we go, it also gives us the ability to edit that data any place - any time. In today's "reality" based generation, we're always looking for the opportunity to capture and relive a moment. And we want to share that moment with others. At best, smart phones give us the opportunity to express ourselves impromptu with entertaining results. Attempting to do the same with a bulky desktop computer or laptop is to cumbersome. Even some of the smallest peripherals (digicams, digital cameras, etc.) don't give us the same opportunities that smart phones do. Being able to carry around a device for communication, creation, recording, and editing simply compliments the need for today's generation to do more and then do it, faster!

Software Piracy - It's Best To Avoid It At All Costs