• Keyboard Shortcuts

    Shortcut keys help provide an easier and quicker method of navigating and executing commands in the computer software.

  • Hardware Tips

    Learn about the latest computer hardware and find out how to diagnose

  • Knowledge Practise questions and answers

    Here you can practise more questions and answers to improve your knowledge on computer

Thursday 27 December 2018

Enabling Windows GodMode

Enabling Windows GodMode

Microsoft Windows Vista (32-bit version) introduced a new hidden feature called GodMode that allows you to view and adjust all settings within Windows. To create a shortcut to the GodMode in Windows Vista (32-bit) or any version of Windows 7 follow the steps below.


Anywhere on your computer create a new folder.
After the folder has been created, copy the below text, rename that folder, and paste the text as the file name.

GodMode.{ED7BA470-8E54-465E-825C-99712043E01C}

Once the above steps have been completed a new shortcut entitled GodMode will be visible. Opening this shortcut displays a Window similar to the example below.



Friday 2 November 2018

How to Navigate on a Tablet

If you have a windows 8 tablet, you can navigate by using swipe gestures instead of hot corners:


  • Swipe in from left edge lets you switch to a different open application
  • Swipe in from right edge opens the Charms bar.

Using Keyboard shortcuts to Navigate

Windows 8 has several keyboard shortcuts that you can use to navigate more easily.

Alt-Tab: You can hold down the Alt key ad then press Tab one or more times to switch between your open (apps). This feature is called Flip and it works in both Desktop view and the Start screen.


Windows : When you have an (app) open, you can press the Windows key to switch to the Start screen. 
This shortcut also lets you switch back to the Start screen when you are in Desktop view.




Windows-D : You can hold down the Windows key and press D to switch to Desktop view.





The Charms Bar

The Charms bar is a toolbar that lets you access the computer's settings, along with other options. You can access the Charms bar by hovering the mouse in the top-right or bottom-right corner. The Charms bar contains several icons, which are called charms and each one contains different options.


Search : The Search charm lets you find (apps), files, or settings on your computer. However, a simpler way to search is to go to the Start Screen and type name of the file or (app) that you're looking for.


Share : The Share charm is basically a copy and paste feature that is designed to be as convenient as possible. It allows you to "copy" information (such as a photo or web address) and "paste" it into another app. For example, if you're viewing a photo in the Photos app, you can share it with the SkyDrive app, which will upload the photo to your SkyDrive. If you're reading an article online, you can share the address with the Email app, which lets you email the article to a friend.

Start : This switches to the Start screen. If you're already on the Start screen, it will open the most recent app.

Devices : This shows any hardware devices that are connected to your computer, such as printers or monitors.

Settings : This lets you access general settings for your computer, as well as settings for the (app)






Tuesday 30 October 2018

How to fix Google Assistant



Friday 19 October 2018

Games CDs

Games CDs


Multimedia games CDs are very popular among children. These games allow children to actively participate. Some of the games CDs are 

Barbie as the Island Princess -

       It is a video game of the Barbie franchise. This game is a collection of 28 different mini-games.

Ben 10  -

Protector of Earth is a video game based on the American animated television series Ben 10.

Star War 
This game is based on star wars.

FIFA Soccer 13

FIFA Soccer 13 is a football video game.

Educational CDs


Educational CDs



There are many multimedia CDs available in the market whose primary purpose is teaching or self-learning.

Kidpix - Kis Pix is a bitmap drawing program aimed at children.

Microsoft Encarta - Microsoft Encarta was a digital multimedia history for better understanding.

The symphony of science - The symphony of science is a musical CD, designed to give scientific knowledge and philosophy in musical form.

Human body  - It will produce details and answers related to human body.

Space and Universe - This CD gives us all answers of questions related to space and universe.


Installing a Multimedia CD-ROM

Steps to install multimedia CD-ROM is 


  • Insert the CD-ROM in the CD-ROM drive.
  • Double click on the MY computer icon.
  • Double Click on the CD Drive letter.
  • Double click on the Setup icon
  • Follow the instructions to install the software.

The steps to start the installed CD after completing installation are :


  • Click on the start button.
  • Select programs
  • Select the CD icon.
  • Click to activate the CD.
 
 Do You Know

The CD-ROM was co-invented and developed by Phillips and Sony in 1984.
The original technology was invented by a senior scientist named James T.Russell in 1965.

Tuesday 18 September 2018

Friday 24 August 2018

Wednesday 1 August 2018

How to access Internet browser settings

How to access Internet browser settings

Each Internet browser has specific settings specific to that browser, including setting a home page, Autofill and Autocomplete settings, and more. To access the settings of the Internet browser on your computer, select your browser below and follow the steps provided.

Microsoft Edge


To access the settings menu in Microsoft Edge, follow the steps below.



  • Open the Edge browser.
  • In the upper-right corner, click the Settings and more icon.
  • Select the Settings entry in the menu.


Microsoft Internet Explorer

 
To access the settings menu in Microsoft Internet Explorer, follow the steps below.
Open the Internet Explorer browser.
In the upper-right corner, click the Tools  icon.
Select the Internet options entry in the menu.



Google Chrome


To access the settings menu in Google Chrome, follow the steps below.
Open the Chrome browser.
In the upper-right corner, click the Customize and control Google Chrome  icon.
Select the Settings entry in the menu.



Mozilla Firefox


To access the settings menu in Mozilla Firefox, follow the steps below.
Open the Firefox browser.
In the upper-right corner, click the Open menu  icon.
Select the Options entry in the menu.


Opera


To access the settings menu in Opera, follow the steps below.
Open the Opera browser.
In the upper-left corner, click the Menu  button.
Select the Settings entry in the menu.


Safari

 
To access the settings menu in Safari, follow the steps below.
Open the Safari browser.
In the upper-left corner, click on Safari in the menu bar.
Select the Preferences entry in the menu.

How to Paste text without formatting

How to Paste text without formatting

When referring to rich-text, like found on a web page, Word document, or e-mail, the formatting remains when it is copied then pasted elsewhere.


 For example, if you were to copy this paragraph of text, "This is bold" would remain bold when you paste it into any other document that supports rich-text. Anyone needs plain text pasting frequently may find having a universal shortcut key beneficial.


Free Software
We recommend the free tool PureText, which runs in the background and can paste plain text into any program using the same shortcut key your choosing (Windows key + V by default). PureText is capable of removing font faces, font styles (i.e. bold, italic, etc.), font colors, paragraph styles, extra spacing, tables, and pictures from any text you copy.

Windows Tip: In most versions of Windows Ctrl+Windows Key + V also pastes text as plain text.

How to Remove formatting in Word from any pasted text

How to Remove formatting in Word from any pasted text

When copying text from another document or Internet web page and pasting it into Microsoft Word, Word will keep the formatting of the text. 

For example, if you were to copy the text on this page to a Word file, this text would remain bold, and this text would remain blue. 

To remove the formatting in Microsoft Word from any text highlight the text and press the shortcut key Ctrl+Spacebar. 

The shortcut sets the text to the default font, removes the formatting, and even removes links.
Alternatively you can use the Paste Special option or Keep Text Only option in Microsoft Word to paste the text with no formatting.



Tip: In most versions of Windows Ctrl+Windows Key + V also pastes text as plain text.

Tuesday 31 July 2018

PROCEDURES IN LOGO | WRITING PROCEDURE USING INPUT BOX

PROCEDURES IN LOGO 

Logo is a computer programming language. It is used to draw pictures and do calculations.

A Logo screen is divided into two parts - Graphic screen and Command Window. The triangular shape, which appears on the screen, is called the turtle. Turtle is like a pen in Logo. Turtle draws a line from its tail when it moves. The commands of Logo are known as primitives.

Let's have a review of commands.

Command       Full form              Purpose

FD                 Forward         Moves forward by given number of steps.

BK            Backward

LT

RT

Home

HT

ST

CS

CT

Repeat

PU

PD
 

PR

Bye
 

Central Processing Unit | CPU

Central Processing Unit | CPU

Central Processing Unit (CPU) is the most important part of a computer. It manages overall functions of the computer system. It does all calculations and displays the results on the monitor. The main components of a CPU are Memory Unit (MU), Arithmetic Logic Unit (ALU) and Control Unit (CU)

Memory Unit (MU) : Memory unit stores the information either temporarily or permanently according to need.

Arithmetic Logic Unit (ALU) : THis unit performs all arithmetic calculations and logical operations.

Control Unit (CU)  : It manages all the operations of a computer.

If we give instructions to computer to add two numbers 10 and 4,  the control unit sends the data to ALU to perform calculations and display the result 14 through the output device.

The most important parts of CPU are 

Power switch : It is used to turn the computer on and off.

Reset button : This button is used to restart the computer without switching it off.

CD-ROM Drive : CD-ROM drive is used to copy the software and programs from  CD-ROM to hard disk. It is just like a CD player of a music system where we insert a CD to listen to music.

 


MS Word Advance Keyboard Shortcuts

Advance MS Word Shortcuts


MS Word Advance Keyboard Shortcuts

 


Ctrl+]=Font Size Increase

Ctrl+[=Font Size Decrease
 

Ctrl+Shift+D=Double Underline

Ctrl+End=Go to End of the File
 

Ctrl+Home=Go to Starting of the File
 

Ctrl+Shift+  Superscript X2
 

Ctrl+=Subscript H20
 

Ctrl+Shift+C=Format Copy
 

Ctrl+Shift+V=Format Paste
 

F5=Go To
 

F12=Save As
 

Ctrl+Shift+<=Font Size Decrease
 

Ctrl+Shift+>=Font Size Increase
 

Ctrl+Mouse scroll Button=Zoom In/Zoom Out
 

F7=Spelling & Grammar Check
 

Alt+F4=Close any Program
 

Alt+Ctrl+S =Split the document window
 

Alt+Shift+D =Insert current date
 

Alt+Shift+T = Insert time
 

Shift+Arrow Keys=Select Text
 

Shift+Home=Select Line form End to Start
 

Shift+End=Select Line from Start to End
 

Window Key+M= Minimize window
 

Window Key+D= Minimize window
 

Alt+Tab= To Switch Between One Program to another Program
 

Double Click=To Select any Word
 

Triple Click= To Select any Paragraph

Thursday 5 July 2018

MOVING AHEAD WITH HTML

MOVING AHEAD WITH HTML


 We have learnt about how to create HTML document in NOTEPAD and view it in any web browser. We have also learnt about some tags and attributes of HTML. Let us learn some more HTML codes in this chapter.

MARQUEE Element

The MARQUEE element is used to insert scrolling text anywhere in a web page. The code given below will display the text "INTRODUCTION TO HTML" to scroll from right to left in the Web page.

<BODY> <MARQUEE> INTRODUCTION TO HTML
</MARQUEE> </BODY> 

Attributes of the MARQUEE element are as follows.

BG COLOR Attribute

This attribute is used for specifying the background color of the scrolling text.


<BODY> <MARQUEE BGCOLOR = YELLOW> INTRODUCTION TO HTML
</MARQUEE> </BODY> 

The code given above will display YELLOW as the background color for the scrolling text.

DIRECTION Attribute

This attribute is used for specifying the DIRECTION of the scrolling text. The direction can be specified as either LEFT or RIGHT. By default the text scrolls from right to left.

<BODY> <MARQUEE DIRECTION = LEFT> INTRODUCTION TO HTML
</MARQUEE> </BODY> 


The code given above will display the text to scroll from left to right.

BEHAVIOR Attribute

The BEHAVIOR Attribute is used for specifying the movement of the scrolling text. The values for the BEHAVIOR attribute can be specified as SCROLL, SLIDE or ALTERNATE.

Sunday 1 July 2018

How to display a computer image on a TV or projector

How to display a computer image on a TV or projector

All modern televisions and projectors have one or more ports that allows them to receive and display an image generated by a computer. Both desktop and laptop computers are capable of connecting to a TV or projector, provided that they have the appropriate cables. The following sections contain instructions for using your TV or projector as a computer monitor. For best results, we recommend reading them in order.

Tip: You can also use a Google Chromecast to stream information from your computer, smartphone, or tablet to your TV.

  • Identifying available connections
  • Connecting computer and projector or TV
  • Display using Desktop
  • Display using Laptop
  • I don't see an image on my TV screen
Identifying available connections

The first step in connecting your computer to a TV or projector is finding an identical port on both machines. Once the matching port has been identified (one that is the same on both your input device and output device), you need the appropriate cable to connect them. This section contains a picture of the back of an Epson projector and its available connection ports; as well as descriptions of each.

Tip: You only need to use one of the following cables.

HDMI
The HDMI connection is very popular among display electronics. In fact, nearly all modern televisions and projectors feature HDMI ports. Most laptop computers support HDMI and it is becoming more prevalent on desktop computers as well, even those without a high-end video card. HDMI is quickly becoming the standard for all electronic equipment for its high quality signal and ability to carry both audio and video signals. The image to the right is an example of an HDMI cable.

VGA

The VGA connection is the most common type of connection on both desktop and laptop computers. It is also found on most projectors and some TVs, especially LCD and LED TVs. The VGA cable has a 15-pin connector on each end that plugs into a VGA port on each device. Because most televisions do not support VGA, we recommend using HDMI for their wider range of compatibility.

Tip: VGA cabling is universal for devices that support it. For example, if your desktop monitor uses a removable VGA cable, that same cable can be used by a laptop to connect it to a projector.

Note: If you are using an Apple desktop or laptop computer, you need a VGA adapter to connect a VGA cable to the computer.

DVI

The DVI connection is newer than VGA and it offers a sharper image. Although the DVI port is not shown on the image of the Epson projector above, it is still somewhat common on projectors, but not as common on TVs. It is mostly found on desktop computers for monitors, but some laptops have DVI connections as well (Apple laptops are more commonly known to support DVI than any other brand of laptop). Since finding DVI on a TV or projector is more difficult, we recommend using HDMI cables if available.

Tip: There are special cables that convert from DVI to VGA or DVI to HDMI and vice versa.

Composite Video

The composite video connection is quite common on a TV or projector, but it is nearly non-existent on modern computers. This connection is the yellow female cable on what is normally a three-cable bundle consisting of red, white, and yellow cables. The only time you should see this setup is on older video cards for desktop computers.

S-Video

The S-Video connection is also commonly found on TVs and projectors, but is seldom found on a desktop or laptop computer. This connection is a small step up from composite video, but is nearing obsolescence.

USB

Although all computers have a USB connection it cannot be used to connect to computer or laptop a projector or TV. You must use one of the above connections for a display signal.

Connecting computer and projector or TV
After you've identified what connections are available on both your computer and TV or projector, you're ready to connect the cables. If the same connections are not available for both the computer and TV or projector, you'll need to purchase a video converter cable that converts one signal into a compatible signal.

Desktop Computers
For a desktop, plug the cable into the computer and output device. If you don't see an image, you may need to change the display using the following steps.

Press the Windows Key.
Type Adjust screen resolution and press Enter.
Find Display and click the down arrow on the right-hand side of the box.
Select the appropriate output device.
Click Apply, then click OK.


Laptop Computers

 
If you're connecting a laptop computer to a TV or a projector, you'll often need to "send" the video signal to the display device. The key sequence to do this varies depending on the laptop, but usually it's either Fn + F3, F4, F5, F8, or F9. For example, pressing and holding Fn + F3 at the same time on the laptop sends the video signal to the connected TV instead of the laptop's screen. The corresponding key used with Fn may be labeled as CRT/LCD or have a picture of a monitor on the key. Additional help and information with switching the laptop display can also be found on the link below.

Steps in connecting an external monitor or projector to your laptop.


Switching TV inputs


Finally, if you're connecting a computer to a TV, make sure the TV has been switched to the correct input channel. For example, if you connected an HDMI cable to your computer and the "HDMI 2" port on your TV, you'll need to switch to the "HDMI 2" input channel on the TV. This action can usually be accomplished by pressing the input button on your TV remote until the correct input channel is displayed.


See our TV and projector definition for further information and related links.

Quickly insert bullets and numbered list into Word

Quickly insert bullets and numbered list into Word

Quickly insert bullets into Microsoft Word by typing an asterisk (*), a space, and then your sentence. When enter is pressed Microsoft Word will automatically change your asterisks to a bullet and text proceeding that text. Below is an example of how this may look.

* this will bullet.

Bonus tip: Bullet dashes can also be done by starting with a hyphen ( - ), and numbers (1. or 1) to create a numbered list.

Friday 22 June 2018

How to make Windows programs open as full screen

How to make Windows programs open as full screen

By default, Windows opens it's programs in a "Normal" window size, meaning its dimensions won't fill the entire screen. 


While users may easily maximize the window's size by clicking the middle icon in the upper right-hand corner, many don't like having to repeat the action every time they start a program. 

To force Windows to open a program in full-screen mode proceed through the steps in the following section.



  1. Right-click on any Windows shortcut and click Properties.
  2. In the Properties window, click the Shortcut tab (as shown below).
  3. Locate the Run: section, and then click the down arrow on the right-hand side.
  4. In the drop-down menu that appears, choose Maximized.
  5. Click Apply, and then OK. The program should now open in a full window.

Thursday 21 June 2018

Top 100 Networking Interview Questions & Answers,


81) What is multicast routing?

Multicast routing is a targeted form of broadcasting that sends message to a selected group of user, instead of sending it to all users on a subnet.

82) What is the importance of Encryption on a network?

Encryption is the process of translating information into a code that is unreadable by the user. It is then translated back or decrypted back to its normal readable format using a secret key or password. Encryption help ensure that information that is intercepted halfway would remain unreadable because the user has to have the correct password or key for it.

83) How are IP addresses arranged and displayed?

IP addresses are displayed as a series of four decimal numbers that are separated by period or dots. Another term for this arrangement is the dotted decimal format. An example is 192.168.101.2

84) Explain the importance of authentication.

Authentication is the process of verifying a user’s credentials before he can log into the network. It is normally performed using a username and password. This provides a secure means of limiting the access from unwanted intruders on the network.

85) What do mean by tunnel mode?

This is a mode of data exchange wherein two communicating computers do not use IPSec themselves. Instead, the gateway that is connecting their LANs to the transit network creates a virtual tunnel that uses the IPSec protocol to secure all communication that passes through it.

86) What are the different technologies involved in establishing WAN links?

Analog connections – using conventional telephone lines; Digital connections – using digital-grade telephone lines; switched connections – using multiple sets of links between sender and receiver to move data.

87) What is one advantage of mesh topology?

In the event that one link fails, there will always be another available. Mesh topology is actually one of the most fault-tolerant network topology.

88) When troubleshooting computer network problems, what common hardware-related problems can occur?

A large percentage of a network is made up of hardware. Problems in these areas can range from malfunctioning hard drives, broken NICs and even hardware startups. Incorrectly hardware configuration is also one of those culprits to look into.

89) What can be done to fix signal attenuation problems?

A common way of dealing with such a problem is to use repeaters and hub, because it will help regenerate the signal and therefore prevent signal loss. Checking if cables are properly terminated is also a must.

90) How does dynamic host configuration protocol aid in network administration?

Instead of having to visit each client computer to configure a static IP address, the network administrator can apply dynamic host configuration protocol to create a pool of IP addresses known as scopes that can be dynamically assigned to clients.

91) Explain profile in terms of networking concept?

Profiles are the configuration settings made for each user. A profile may be created that puts a user in a group, for example.

92) What is sneakernet?

Sneakernet is believed to be the earliest form of networking wherein data is physically transported using removable media, such as disk, tapes.

93) What is the role of IEEE in computer networking?

IEEE, or the Institute of Electrical and Electronics Engineers, is an organization composed of engineers that issues and manages standards for electrical and electronic devices. This includes networking devices, network interfaces, cablings and connectors.

94) What protocols fall under the TCP/IP Internet Layer?

There are 4 protocols that are being managed by this layer. These are ICMP, IGMP, IP and ARP.

95) When it comes to networking, what are rights?

Rights refer to the authorized permission to perform specific actions on the network. Each user on the network can be assigned individual rights, depending on what must be allowed for that user.

96) What is one basic requirement for establishing VLANs?

A VLAN is required because at switch level there is only one broadcast domain, it means whenever new user is connected to switch this information is spread throughout the network. VLAN on switch helps to create separate broadcast domain at  switch level. It is used for security purpose.

97) What is IPv6?

IPv6 , or Internet Protocol version 6, was developed to replace IPv4. At present, IPv4 is being used to control internet traffic, butis expected to get saturated in the near future. IPv6 was designed to overcome this limitation.

98) What is RSA algorithm?

RSA is short for Rivest-Shamir-Adleman algorithm. It is the most commonly used public key encryption algorithm in use today.

99) What is mesh topology?

Mesh topology is a setup wherein each device is connected directly to every other device on the network. Consequently, it requires that each device have at least two network connections.

100) what is the maximum segment length of a 100Base-FX network?

The maximum allowable length for a network segment using 100Base-FX is 412 meters. The maximum length for the entire network is 5 kilometers.

Top 100 Networking Interview Questions & Answers

31) What is the purpose of cables being shielded and having twisted pairs?

The main purpose of this is to prevent crosstalk. Crosstalks are electromagnetic interferences or noise that can affect data being transmitted across cables.

32) What is the advantage of address sharing?

By using address translation instead of routing, address sharing provides an inherent security benefit. That’s because host PCs on the Internet can only see the public IP address of the external interface on the computer that provides address translation and not the private IP addresses on the internal network.

33) What are MAC addresses?

MAC, or Media Access Control, uniquely identifies a device on the network. It is also known as physical address or Ethernet address. A MAC address is made up of 6-byte parts.

34) What is the equivalent layer or layers of the TCP/IP Application layer in terms of OSI reference model?

The TCP/IP Application layer actually has three counterparts on the OSI model: the Session layer, Presentation Layer and Application Layer.

35) How can you identify the IP class of a given IP address?

By looking at the first octet of any given IP address, you can identify whether it’s Class A, B or C. If the first octet begins with a 0 bit, that address is Class A. If it begins with bits 10 then that address is a Class B address. If it begins with 110, then it’s a Class C network.

36) What is the main purpose of OSPF?

OSPF, or Open Shortest Path First, is a link-state routing protocol that uses routing tables to determine the best possible path for data exchange.

37) What are firewalls?

Firewalls serve to protect an internal network from external attacks. These external threats can be hackers who want to steal data or computer viruses that can wipe out data in an instant. It also prevents other users from external networks from gaining access to the private network.

38) Describe star topology

Star topology consists of a central hub that connects to nodes. This is one of the easiest to setup and maintain.

39) What are gateways?

Gateways provide connectivity between two or more network segments. It is usually a computer that runs the gateway software and provides translation services. This translation is a key in allowing different systems to communicate on the network.

40) What is the disadvantage of a star topology?

One major disadvantage of star topology is that once the central hub or switch get damaged, the entire network becomes unusable.



Related Articles 

Top 100 Networking Interview Questions & Answers

Top 100 Networking Interview Questions & Answers

21) What is the importance of the OSI Physical Layer?

The physical layer does the conversion from data bits to electrical signal, and vice versa. This is where network devices and cable types are considered and setup.

22) How many layers are there under TCP/IP?

There are four layers: the Network Layer, Internet Layer, Transport Layer and Application Layer.

23) What are proxy servers and how do they protect computer networks?

Proxy servers primarily prevent external users who identifying the IP addresses of an internal network. Without knowledge of the correct IP address, even the physical location of the network cannot be identified. Proxy servers can make a network virtually invisible to external users.

24) What is the function of the OSI Session Layer?

This layer provides the protocols and means for two devices on the network to communicate with each other by holding a session.  This includes setting up the session, managing information exchange during the session, and tear-down process upon termination of the session.

25) What is the importance of implementing a Fault Tolerance System? Are there limitations?

A fault tolerance system ensures continuous data availability. This is done by eliminating a single point of failure. However, this type of system would not be able to protect data in some cases, such as in accidental deletions.

 






26) What does 10Base-T mean?

The 10 refers to the data transfer rate, in this case is 10Mbps. The word Base refers to base band, as oppose to broad band. T means twisted pair, which is the cable used for that network.


27) What is a private IP address?

Private IP addresses are assigned for use on intranets. These addresses are used for internal networks and are not routable on external public networks. These ensures that no conflicts are present among internal networks while at the same time the same range of private IP addresses are reusable for multiple intranets since they do not “see” each other.

28) What is NOS?

NOS, or Network Operating System, is specialized software whose main task is to provide network connectivity to a computer in order for it to be able to communicate with other computers and connected devices.

29) What is DoS?

DoS, or Denial-of-Service attack, is an attempt to prevent users from being able to access the internet or any other network services. Such attacks may come in different forms and are done by a group of perpetuators. One common method of doing this is to overload the system server so it cannot anymore process legitimate traffic and will be forced to reset.

30) What is OSI and what role does it play in computer networks?

OSI (Open Systems Interconnect) serves as a reference model for data communication. It is made up of 7 layers, with each layer defining a particular aspect on how network devices connect and communicate with one another. One layer may deal with the physical media used, while another layer dictates how data is actually transmitted across the network.


Related Articles :-

Top 100 Networking Interview Questions & Answers

Top 100 Networking Interview Questions & Answers

Top 100 Networking Interview Questions & Answers

1) What is a Link?

A link refers to the connectivity between two devices. It includes the type of cables and protocols used in order for one device to be able to communicate with the other.

2) What are the layers of the OSI reference model?

There are 7 OSI layers: Physical Layer, Data Link Layer, Network Layer, Transport Layer, Session Layer, Presentation Layer and Application Layer.

3) What is backbone network?
A backbone network is a centralized infrastructure that is designed to distribute different routes and data to various networks. It also handles management of bandwidth and various channels.

4) What is a LAN?

LAN is short for Local Area Network. It refers to the connection between computers and other network devices that are located within a small physical location.

5) What is a node?

A node refers to a point or joint where a connection takes place. It can be computer or device that is part of a network. Two or more nodes are needed in order to form a network connection.

6) What are routers?

Routers can connect two or more network segments. These are intelligent network devices that store information in its routing table such as paths, hops and bottlenecks. With this info, they are able to determine the best path for data transfer. Routers operate at the OSI Network Layer.

7) What is point to point link?

It refers to a direct connection between two computers on a network. A point to point connection does not need any other network devices other than connecting a cable to the NIC cards of both computers.

8) What is anonymous FTP?

Anonymous FTP is a way of granting user access to files in public servers. Users that are allowed access to data in these servers do not need to identify themselves, but instead log in as an anonymous guest.

9) What is subnet mask?

A subnet mask is combined with an IP address in order to identify two parts: the extended network address and the host address. Like an IP address, a subnet mask is made up of 32 bits.

10) What is the maximum length allowed for a UTP cable?

A single segment of UTP cable has an allowable length of 90 to 100 meters. This limitation can be overcome by using repeaters and switches.



Related Articles:-

Top 100 Networking Interview Questions & Answers





Credit card fraud

Credit card fraud

Credit card fraud is the act of someone illegally using another person's credit card to make purchases without their permission.



Related pages
Is online banking safe?
How can I protect myself while online?

How to prevent unauthorised access?

How to Protect yourself while on the internet

Computer security questions and answers.

Define names and use them in Microsoft Excel

Define names and use them in Microsoft Excel

 
Microsoft Excel allows any cell to have a defined name, which makes creating and pointing to that cell a lot easier. For example, in a traditional formula you may subtract the value in cell A1 from B1 by using the formula =sum(A1-B1) in cell C1. However, referencing these cells and using them in a formula could be made easier by defining the name of cells. For example, cell A1 could be named "total" and cell B1 could be named "tax", which means the same formula in C1 could be =sum(total-tax) to get the total.

To create a defined name for any cell right-click the cell and choose Define Name, once clicked a New Name window, like the one shown below should appear. Fill out the name you want to use and click Ok.

By defining a name of a cell in your spreadsheet you will increase your overall productivity since it's a lot easier to remember a name you have defined instead of a cell reference.

Additional information

Help, examples, and information on Excel formulas

Monday 11 June 2018

Top 10 YouTube tips and tricks

Top 10 YouTube tips and tricks

According to Alexa, YouTube is the third most visited page on the Internet which means you have probably visited the page in the past. These tips and tricks help make your experience more enjoyable and if possible, productive.

YouTube keyboard shortcuts
YouTube has several keyboard shortcuts that can be used while watching YouTube. Keyboard shortcuts like pressing the spacebar to play and pause or using the arrow keys to fast forward and rewind can make a big difference while on YouTube.



See our YouTube keyboard shortcuts list for a full listing.
Share a video at any point

Not everyone wants to watch a full video, link to the exact location you found most entertaining instead of making your friends or family watch the full video. To do this get to the location you want and pause the video. Once paused right-click the video and select Get video URL at current time and then copy the link created.

Alternatively you can manually add the time by adding "#t=XXmXXs" at the end of the URL, where XXm is the minutes, and XXs is the seconds into the video you want to start. For example:

https://www.youtube.com/watch?v=MKVWUUwoV4o

would become

https://www.youtube.com/watch?v=MKVWUUwoV4o#t=33s

to link to the video 33 seconds into the video. If you wanted to link 4 minutes and 20 seconds into a video add #t4m20s to the end of the URL. Alternatively you can use only seconds, so 4 * 60 (seconds in a minute) = 240 + 20 = 260 seconds for 4 minutes and 20 seconds into the video.

Find out what is popular on YouTube
YouTube can be a great place to find the most popular videos because of its popularity. Visit the Popular on YouTube to find the most recent popular videos, recently released music videos, top cute videos, latest trailers, events, and much more.

Add videos to Watch Later

Sometimes you just do not have the time to watch a video or maybe you just do not feel like watching an hour long video at this time. In the bottom right corner of every video is a Watch Later button that will add the video to your watch later list. Once you are ready to watch the video or if you saved a video to share with someone else you can find the video in your Watch Later Playlist.

Bonus Tip: Each of the thumbnails of videos on YouTube also shows the Watch Later icon when hovering over the thumbnail of the video.

Take advantage of search filters
YouTube usually does a great job giving you search results but is not always perfect. Take full advantage of their search filters by clicking the Filters button to get a list like that shown below. In the filters list you can refine the searches to when the video was uploaded, length of the video, view count, and features like HD (High definition) and 3D.

Watch live videos on YouTube
YouTube not only features pre-recorded videos, but they now also feature YouTube Live, including live events, sports, news, gaming, music, education, and much more.

Take full advantage of YouTube tools
Not many people know that YouTube also has several helpful YouTube Tools that can help extremely helpful when creating new content. For example, the YouTube editor allows you to edit uploaded videos, create videos, and adjust settings like the brightness and contrast, pan and zoom, stabilize, slow motion, and rotation. Other tools include a slideshow creator, YouTube capture, captions, audio library, and YouTube analytics.

Bypass regional restrictions and other blocks
Some videos may have restrictions that prevent them from playing on a certain device, playing in a certain region, or other restrictions that prevent you from playing the video. You can bypass some of these restrictions by changing how the URL is entered into your address bar.

Once the id of the video has been copied erase everything after the .com/ and add "v/<id>" where id is what was copied earlier. Once this is done your URL should resemble the example shown below.

https://www.youtube.com/v/xxxxxxxxx

Loading this URL opens the video in a full screen, but because of how it is loaded many of the restrictions YouTube may have on the video are ignored.

Set the default video quality
Watch all videos at the highest quality by adjusting your settings to use the best quality. To adjust your settings click on your profile icon in the top-right corner of the window and click the YouTube Gear settings icon as shown below. In the YouTube Account Settings, select Playback and then select "Always choose the best quality for my connection and player size." If you have a slow Internet connection or YouTube videos frequently need to buffer, select the "I have a slow connection. Never play higher-quality video" option.

 



Alternative ways to watch YouTube
There are dozens of ways to watch YouTube today. Most Smart TVs already have an app that allows you to watch YouTube videos on your TV using your remote. For those who do not have Smart TV or have a Smart TV but do not like the interface (it is not easy typing on a remote), there are also other solutions.

Our current favorite method of watching YouTube on the TV is using the Google Chromecast. The Chromecast allows you or anyone else with a smartphone or computer to stream YouTube videos to your TV with a click of a button. The Chromecast is the easiest solution to stream videos to your TV, and you can type on your phone or computer or use your voice to search for videos instead of using your TV remote.



13 Android tips and tricks you probably didn't know about

Other popular alternatives of watching YouTube


Apple TV - The Apple TV is another great solution for watching YouTube and other content.
Consoles - Consoles like Xbox, PlayStation 3, and Wii all have a YouTube player.
Lean Back - YouTube Lean Back is a completely different way of watching YouTube videos and allows you to browse and watch videos on alternative devices.
Roku - The Roku is another great device that connects to your TV to watch YouTube and other content.
TiVo - The TiVo DVR is another fantastic method of watching YouTube, your shows, and other content.


Computer hard drive history

Computer hard drive history

Year                                       Event

1890    Herman Hollerith developed a method for machines to record and store 

           information onto punch cards to be used for the US census. He later 
           formed the company we know as IBM today.

1946    Freddie Williams applies for a patent on his cathode-ray tube (CRT) 

           storing device in December. The device that later became known as the  
           Williams tube is capable of storing between 512 and 1024 bits of data.
 

1946    The Selectron tube capable of storing 256 bits of information begins 
           development.
 

1950    Before using disks, storage units used magnetic drums referred to as 
           drum machines or drum-memory computers. The first commercial drum 
           machine was developed by the Engineering Research Associates of 
           Minneapolis and used by the U.S. Navy ERA 110. Drum machines were 
           used throughout the early '50s.
 

1956    On September 13, 1956, the IBM 305 RAMAC was the first computer to 
           be shipped with a hard drive. The drive contained 50 24-inch platters, 
           was the size of two refrigerators, and weighed a ton. It could store only 
           five megabytes of information and each megabyte cost $10,000.
 

1959    Chucking Grinder Co. begins working on disk drives.
 

1961    Chucking Grinder Co. moves to Walled Lake Michigan and becomes 
           Bryant Computer Products, a subsidiary of Ex-Cello Corp. company.
 

1961    IBM introduced the IBM 1301 disk storage unit on June 2, 1961, 
            capable  of storing 28 million characters.
 

1962    On October 11, 1962, IBM introduced the IBM 1311 disk storage drive, 
           which stored.
 

1973    IBM ships the 3340 Winchester hard drive with two spindles and a 
           capacity of 30 MB. This drive was the first drive to utilize the Winchester 
            technology.
 

1980    Seagate introduces the ST506 hard drive, the first hard drive developed 
           for microcomputers.
 

1980    The first Gigabyte hard drive is introduced by IBM and weighed 550lbs 
           with a price of $44,000.
 

1986    The original SCSI, SCSI-1 is developed.
 

1990    SCSI-2  is approved.
 

1996    SCSI-3 is approved.
 

2002    Hitachi closed deal to purchase IBM's hard drive operation for $2.05 
           billion on December 31, 2002.

Friday 8 June 2018

Top 10 Facebook tips


Top 10 Facebook tips

Below is a listing of our top 10 tips for the popular social networking website Facebook.

Hide users, games, polls, etc.
It quickly gets annoying seeing some users posts, game invites, polls, etc. Hovering your mouse to the right of the post and clicking the Hide button can hide any post. After pressing the button, you'll have the option to hide that user or in the case of a Facebook application the option to hide that application from ever showing up on your profile.

To unhide someone or unblock an application click the Edit Options link in the bottom right corner of the news feed as shown below.

Greasemonkey and FB Purity


Although Facebook does not give you the option to hide friends, friend requests, or various notifications, these can be hidden using browser add-ons. If you're running Mozilla Firefox, Chrome, Opera, or Safari ,we suggest installing the Facebook Purity add-on.

Update your privacy settings
Click Account in the top right corner of the Facebook window and then click Privacy settings to adjust who is capable of seeing what on your Facebook profile. We highly recommend going through all the privacy settings to verify your privacy is properly protected.

Anything that is not set to friends only or friends of friends can be seen by anyone searching on the Internet. Below is a few things we recommend for most users.

Under Search in Privacy settings uncheck Public Search Results. Adjusting the settings prevents users from finding your account and profile picture in search results such as Google
Under Application settings, make sure you're only allowing applications you want to have access to your information. Applications that you grant rights to can have access to your Facebook profile information.
If you're curious to see how a program or web page connect to the Facebook API can see your profile see See what an API connected to Facebook sees about you .

Use the Facebook top bar for navigation


Knowing how to properly navigate is vital if you want to get the most out of Facebook. Below is a brief description of each of the available options in the top bar as shown above.

Home (Facebook logo) - Clicking this logo takes you to your wall (News Feed) that shows all friends recent posts.

Friend requests - If any friend requests are waiting to be approved this icon shows a notification of how many friends are waiting for approval. This icon can also be clicked when you want to view any friend recommendations or search for friends on Facebook.

Messages - This section allows you to send and receive private messages between one or more of your friends'.

Notifications -
Any time a friend or Facebook application creates a new post you'll be notified in this section. Clicking this icon shows all recent notifications. To change notifications including any Facebook applications or games click the See All Notifications link at the bottom and check or uncheck what you want to be notified on.

Search - Finally, the Facebook search box can be a powerful tool that can be used to quickly find any current friends or people on Facebook. Also, searching for terms such as a company name, product, sports team, music band, etc. will find fan pages and groups that can be joined.

Modify your account notifications

Keep your e-mail and your cell phone clean by updating or eliminate Facebook notifications or keep more up-to-date by adding new notifications. Facebook notifications can be added and removed by clicking Account link in the top right corner, then Account Settings, and then clicking the Notifications tab.

Top News and Most Recent
Facebook News and most Recent

By default, Facebook displays your wall postings in the News format, which means it only displays posts it believes are most relevant to you. These results are based on your past interaction with your friends'. If you want to see every post made by your friends that is not hidden, click Most recent in the upper right of your news feed, as shown in the above picture example.

If you want to adjust who shows up manually, click the Edit Options in the bottom right corner of your news feed.

View High School work friends
If you've added your High School or previous Work locations to your profile, quickly see all classmates and co-workers on Facebook by clicking the link in your Info tab under your profile.

Quickly change profile picture
Your profile picture can be changed by visiting your profile, hovering the mouse over your current profile picture, and clicking the Change Picture link in the top right corner.

Don't post private information on friend's walls on in comments
When you make a post on a friend's wall or in any of their comments, realize that any of their friends are going to be able to see that post. If you want something to remain only between you and a friend send them a Facebook message instead.

Suggestions and random friend invites
As you get more friends on Facebook, it will begin making friend, groups, and fan suggestions. These are suggestions made by Facebook and not your friends'. Unless these are something you're interested in they can be ignored.

This same rule can be applied to people who may want to be your friend that you don't know. If you don't know someone do not accept his or her friend invite. Once someone becomes your friend, they'll have access to any information your friends' are capable of seeing.

Tag your Facebook friends in your photos
Always make sure to tag any of your Facebook friends that are in pictures you upload. However, never tag someone who is not in the picture. When someone is tagged in a photo that picture is automatically added to that persons profile and is a great way to share pictures with all friends.

See what an API connected to Facebook sees about you

See what an API connected to Facebook sees about you

Facebook allows website developers and application developers access to their Facebook Graph Application Program Interface (API) that enables them to display information about your profile. For example, show your friends who've visited that page, show friends who've liked the page, personally greet you, etc.

Note: The API does not give that developer access to your personal information, but for some people may be of some concern.

Using the Facebook API Browser you can see what the Facebook API shares from your profile. If you feel that this is too much information, you can then adjust your Facebook Privacy settings accordingly.

Once you've visited the above link enter your Facebook alias or ID to view the API settings. If you're not sure what your ID is, you can quickly find out by moving your mouse over your name on your Facebook page. For example, if your name was Joy it's likely your Facebook alias could be joy.s or if you haven't entered an alias a number such as 148757536227.

Top 10 tips for keeping your e-mail inbox clean

Top 10 tips for keeping your e-mail inbox clean

These days, the majority of our most personal and important digital correspondence happens through email, so it's important to keep it organized. Here are some tips for cleaning up your inbox.

Setup rules, filters, or labels

Today, all e-mail programs and online e-mail services have rules, filters, or a labeling system that allows you to move and otherwise organize incoming e-mail. Use these features to organize your e-mail and get to what is most important first. Below are some suggestions for rules we suggest trying first.

Move important and unimportant e-mails to a folder of their own.

Highlight or set priority to certain addresses. For example, a rule could be created to highlight any user in your address book.
Filter out common spam words that get into your inbox (e.g., Viagra).
In programs that support rules, mark messages that are not important to keep your inbox clean and prevent you from getting overwhelmed when you first open e-mail.
If you are getting lots of spam filter your e-mail through Gmail.


Do not be afraid to delete
After reading e-mail, always take action on that e-mail. Do not save it for later or move it into a folder to deal with later. If you are unable to take action on the e-mail, delegate it to someone else, or postpone it for later that day delete it. Every e-mail does not need a response and there is no reason to save e-mail that is going to be deleted later.

Automatic replies, FAQs, and canned responses

If you find yourself using the same reply over and over again, consider creating a list of your frequent replies that you can copy and paste. Or, try using a tool such as one of the ones listed below to help make replying to these e-mails even faster.

Thunderbird Quicktext - Fantastic Mozilla Thunderbird e-mail add-on.

Lifehacker Texter - Easy to use script tool that can be used in anywhere in Windows including e-mail.
AutoHotkey - Another great tool although much more advanced. However, this tool can be used to automate anything on the computer.

Keep it simple
Many times people over complicate their e-mail by creating dozens of different folders to help organize their e-mails. Keep it simple do not have dozens of different folders to organize your e-mail into.

If there is no way getting around your need for folders in e-mail use the rules to filter your messages into the folders. Folders can save hundreds of hours you may be spending thinking about and organizing each of the e-mails you receive.

Always do quick short replies

When replying to any of your e-mails try to keep the reply as quick as possible and do not spend too much time on an individual e-mail. We suggest spending no more than five minutes on a single e-mail and avoid anything longer than three paragraphs.

You are e-mail is not a calendar or to-do list

Many times a person’s inbox is full because they are treating it as a calendar of things that they need to do. Do not use your e-mail for this. Have a separate program or text document that keeps a list of things you need to do or that keep track of your calendar of events.

Unsubscribe from newsletters and disable notifies
Although you may have had good intentions when subscribing to a newsletter or other e-mail list these are often distracting and often clutter your e-mail. Unsubscribe from any newsletter you have not been reading.

The same is true for notifications from social network sites such as Facebook, MySpace, and Twitter you may be receiving. Disable all notifications about posts made on your wall, new friends, or followers, which clutter your inbox and distract you.

Do not reply to spam
If spam sneaks past your protection or rules never reply to it; just delete the message.

Keep at it but not too much

Try to read your e-mails at least once daily or every hour, depending on how much e-mail you receive.

However, do not live in your e-mail. Create a schedule where you check your e-mail in regular intervals and then ignore it all other times. If you have any notification about new incoming e-mails disable these or close your e-mail program or e-mail web page.

Delete some more
Finally, if after following all the above steps you still have e-mails that are weeks old delete them. If you have a hard time deleting e-mails create a folder and move all old e-mails into that folder. After a few weeks have passed the e-mail becomes too old for a reply.

Good Morning Beautiful

Do you know????

Do you know????
/