• Keyboard Shortcuts

    Shortcut keys help provide an easier and quicker method of navigating and executing commands in the computer software.

  • Hardware Tips

    Learn about the latest computer hardware and find out how to diagnose

  • Knowledge Practise questions and answers

    Here you can practise more questions and answers to improve your knowledge on computer

Friday, 22 June 2018

How to make Windows programs open as full screen

How to make Windows programs open as full screen

By default, Windows opens it's programs in a "Normal" window size, meaning its dimensions won't fill the entire screen. 


While users may easily maximize the window's size by clicking the middle icon in the upper right-hand corner, many don't like having to repeat the action every time they start a program. 

To force Windows to open a program in full-screen mode proceed through the steps in the following section.



  1. Right-click on any Windows shortcut and click Properties.
  2. In the Properties window, click the Shortcut tab (as shown below).
  3. Locate the Run: section, and then click the down arrow on the right-hand side.
  4. In the drop-down menu that appears, choose Maximized.
  5. Click Apply, and then OK. The program should now open in a full window.

Thursday, 21 June 2018

Top 100 Networking Interview Questions & Answers,


81) What is multicast routing?

Multicast routing is a targeted form of broadcasting that sends message to a selected group of user, instead of sending it to all users on a subnet.

82) What is the importance of Encryption on a network?

Encryption is the process of translating information into a code that is unreadable by the user. It is then translated back or decrypted back to its normal readable format using a secret key or password. Encryption help ensure that information that is intercepted halfway would remain unreadable because the user has to have the correct password or key for it.

83) How are IP addresses arranged and displayed?

IP addresses are displayed as a series of four decimal numbers that are separated by period or dots. Another term for this arrangement is the dotted decimal format. An example is 192.168.101.2

84) Explain the importance of authentication.

Authentication is the process of verifying a user’s credentials before he can log into the network. It is normally performed using a username and password. This provides a secure means of limiting the access from unwanted intruders on the network.

85) What do mean by tunnel mode?

This is a mode of data exchange wherein two communicating computers do not use IPSec themselves. Instead, the gateway that is connecting their LANs to the transit network creates a virtual tunnel that uses the IPSec protocol to secure all communication that passes through it.

86) What are the different technologies involved in establishing WAN links?

Analog connections – using conventional telephone lines; Digital connections – using digital-grade telephone lines; switched connections – using multiple sets of links between sender and receiver to move data.

87) What is one advantage of mesh topology?

In the event that one link fails, there will always be another available. Mesh topology is actually one of the most fault-tolerant network topology.

88) When troubleshooting computer network problems, what common hardware-related problems can occur?

A large percentage of a network is made up of hardware. Problems in these areas can range from malfunctioning hard drives, broken NICs and even hardware startups. Incorrectly hardware configuration is also one of those culprits to look into.

89) What can be done to fix signal attenuation problems?

A common way of dealing with such a problem is to use repeaters and hub, because it will help regenerate the signal and therefore prevent signal loss. Checking if cables are properly terminated is also a must.

90) How does dynamic host configuration protocol aid in network administration?

Instead of having to visit each client computer to configure a static IP address, the network administrator can apply dynamic host configuration protocol to create a pool of IP addresses known as scopes that can be dynamically assigned to clients.

91) Explain profile in terms of networking concept?

Profiles are the configuration settings made for each user. A profile may be created that puts a user in a group, for example.

92) What is sneakernet?

Sneakernet is believed to be the earliest form of networking wherein data is physically transported using removable media, such as disk, tapes.

93) What is the role of IEEE in computer networking?

IEEE, or the Institute of Electrical and Electronics Engineers, is an organization composed of engineers that issues and manages standards for electrical and electronic devices. This includes networking devices, network interfaces, cablings and connectors.

94) What protocols fall under the TCP/IP Internet Layer?

There are 4 protocols that are being managed by this layer. These are ICMP, IGMP, IP and ARP.

95) When it comes to networking, what are rights?

Rights refer to the authorized permission to perform specific actions on the network. Each user on the network can be assigned individual rights, depending on what must be allowed for that user.

96) What is one basic requirement for establishing VLANs?

A VLAN is required because at switch level there is only one broadcast domain, it means whenever new user is connected to switch this information is spread throughout the network. VLAN on switch helps to create separate broadcast domain at  switch level. It is used for security purpose.

97) What is IPv6?

IPv6 , or Internet Protocol version 6, was developed to replace IPv4. At present, IPv4 is being used to control internet traffic, butis expected to get saturated in the near future. IPv6 was designed to overcome this limitation.

98) What is RSA algorithm?

RSA is short for Rivest-Shamir-Adleman algorithm. It is the most commonly used public key encryption algorithm in use today.

99) What is mesh topology?

Mesh topology is a setup wherein each device is connected directly to every other device on the network. Consequently, it requires that each device have at least two network connections.

100) what is the maximum segment length of a 100Base-FX network?

The maximum allowable length for a network segment using 100Base-FX is 412 meters. The maximum length for the entire network is 5 kilometers.

Top 100 Networking Interview Questions & Answers

31) What is the purpose of cables being shielded and having twisted pairs?

The main purpose of this is to prevent crosstalk. Crosstalks are electromagnetic interferences or noise that can affect data being transmitted across cables.

32) What is the advantage of address sharing?

By using address translation instead of routing, address sharing provides an inherent security benefit. That’s because host PCs on the Internet can only see the public IP address of the external interface on the computer that provides address translation and not the private IP addresses on the internal network.

33) What are MAC addresses?

MAC, or Media Access Control, uniquely identifies a device on the network. It is also known as physical address or Ethernet address. A MAC address is made up of 6-byte parts.

34) What is the equivalent layer or layers of the TCP/IP Application layer in terms of OSI reference model?

The TCP/IP Application layer actually has three counterparts on the OSI model: the Session layer, Presentation Layer and Application Layer.

35) How can you identify the IP class of a given IP address?

By looking at the first octet of any given IP address, you can identify whether it’s Class A, B or C. If the first octet begins with a 0 bit, that address is Class A. If it begins with bits 10 then that address is a Class B address. If it begins with 110, then it’s a Class C network.

36) What is the main purpose of OSPF?

OSPF, or Open Shortest Path First, is a link-state routing protocol that uses routing tables to determine the best possible path for data exchange.

37) What are firewalls?

Firewalls serve to protect an internal network from external attacks. These external threats can be hackers who want to steal data or computer viruses that can wipe out data in an instant. It also prevents other users from external networks from gaining access to the private network.

38) Describe star topology

Star topology consists of a central hub that connects to nodes. This is one of the easiest to setup and maintain.

39) What are gateways?

Gateways provide connectivity between two or more network segments. It is usually a computer that runs the gateway software and provides translation services. This translation is a key in allowing different systems to communicate on the network.

40) What is the disadvantage of a star topology?

One major disadvantage of star topology is that once the central hub or switch get damaged, the entire network becomes unusable.



Related Articles 

Top 100 Networking Interview Questions & Answers

Top 100 Networking Interview Questions & Answers

21) What is the importance of the OSI Physical Layer?

The physical layer does the conversion from data bits to electrical signal, and vice versa. This is where network devices and cable types are considered and setup.

22) How many layers are there under TCP/IP?

There are four layers: the Network Layer, Internet Layer, Transport Layer and Application Layer.

23) What are proxy servers and how do they protect computer networks?

Proxy servers primarily prevent external users who identifying the IP addresses of an internal network. Without knowledge of the correct IP address, even the physical location of the network cannot be identified. Proxy servers can make a network virtually invisible to external users.

24) What is the function of the OSI Session Layer?

This layer provides the protocols and means for two devices on the network to communicate with each other by holding a session.  This includes setting up the session, managing information exchange during the session, and tear-down process upon termination of the session.

25) What is the importance of implementing a Fault Tolerance System? Are there limitations?

A fault tolerance system ensures continuous data availability. This is done by eliminating a single point of failure. However, this type of system would not be able to protect data in some cases, such as in accidental deletions.

 






26) What does 10Base-T mean?

The 10 refers to the data transfer rate, in this case is 10Mbps. The word Base refers to base band, as oppose to broad band. T means twisted pair, which is the cable used for that network.


27) What is a private IP address?

Private IP addresses are assigned for use on intranets. These addresses are used for internal networks and are not routable on external public networks. These ensures that no conflicts are present among internal networks while at the same time the same range of private IP addresses are reusable for multiple intranets since they do not “see” each other.

28) What is NOS?

NOS, or Network Operating System, is specialized software whose main task is to provide network connectivity to a computer in order for it to be able to communicate with other computers and connected devices.

29) What is DoS?

DoS, or Denial-of-Service attack, is an attempt to prevent users from being able to access the internet or any other network services. Such attacks may come in different forms and are done by a group of perpetuators. One common method of doing this is to overload the system server so it cannot anymore process legitimate traffic and will be forced to reset.

30) What is OSI and what role does it play in computer networks?

OSI (Open Systems Interconnect) serves as a reference model for data communication. It is made up of 7 layers, with each layer defining a particular aspect on how network devices connect and communicate with one another. One layer may deal with the physical media used, while another layer dictates how data is actually transmitted across the network.


Related Articles :-

Top 100 Networking Interview Questions & Answers

Top 100 Networking Interview Questions & Answers

Top 100 Networking Interview Questions & Answers

1) What is a Link?

A link refers to the connectivity between two devices. It includes the type of cables and protocols used in order for one device to be able to communicate with the other.

2) What are the layers of the OSI reference model?

There are 7 OSI layers: Physical Layer, Data Link Layer, Network Layer, Transport Layer, Session Layer, Presentation Layer and Application Layer.

3) What is backbone network?
A backbone network is a centralized infrastructure that is designed to distribute different routes and data to various networks. It also handles management of bandwidth and various channels.

4) What is a LAN?

LAN is short for Local Area Network. It refers to the connection between computers and other network devices that are located within a small physical location.

5) What is a node?

A node refers to a point or joint where a connection takes place. It can be computer or device that is part of a network. Two or more nodes are needed in order to form a network connection.

6) What are routers?

Routers can connect two or more network segments. These are intelligent network devices that store information in its routing table such as paths, hops and bottlenecks. With this info, they are able to determine the best path for data transfer. Routers operate at the OSI Network Layer.

7) What is point to point link?

It refers to a direct connection between two computers on a network. A point to point connection does not need any other network devices other than connecting a cable to the NIC cards of both computers.

8) What is anonymous FTP?

Anonymous FTP is a way of granting user access to files in public servers. Users that are allowed access to data in these servers do not need to identify themselves, but instead log in as an anonymous guest.

9) What is subnet mask?

A subnet mask is combined with an IP address in order to identify two parts: the extended network address and the host address. Like an IP address, a subnet mask is made up of 32 bits.

10) What is the maximum length allowed for a UTP cable?

A single segment of UTP cable has an allowable length of 90 to 100 meters. This limitation can be overcome by using repeaters and switches.



Related Articles:-

Top 100 Networking Interview Questions & Answers





Credit card fraud

Credit card fraud

Credit card fraud is the act of someone illegally using another person's credit card to make purchases without their permission.



Related pages
Is online banking safe?
How can I protect myself while online?

How to prevent unauthorised access?

How to Protect yourself while on the internet

Computer security questions and answers.

Define names and use them in Microsoft Excel

Define names and use them in Microsoft Excel

 
Microsoft Excel allows any cell to have a defined name, which makes creating and pointing to that cell a lot easier. For example, in a traditional formula you may subtract the value in cell A1 from B1 by using the formula =sum(A1-B1) in cell C1. However, referencing these cells and using them in a formula could be made easier by defining the name of cells. For example, cell A1 could be named "total" and cell B1 could be named "tax", which means the same formula in C1 could be =sum(total-tax) to get the total.

To create a defined name for any cell right-click the cell and choose Define Name, once clicked a New Name window, like the one shown below should appear. Fill out the name you want to use and click Ok.

By defining a name of a cell in your spreadsheet you will increase your overall productivity since it's a lot easier to remember a name you have defined instead of a cell reference.

Additional information

Help, examples, and information on Excel formulas

Monday, 11 June 2018

Top 10 YouTube tips and tricks

Top 10 YouTube tips and tricks

According to Alexa, YouTube is the third most visited page on the Internet which means you have probably visited the page in the past. These tips and tricks help make your experience more enjoyable and if possible, productive.

YouTube keyboard shortcuts
YouTube has several keyboard shortcuts that can be used while watching YouTube. Keyboard shortcuts like pressing the spacebar to play and pause or using the arrow keys to fast forward and rewind can make a big difference while on YouTube.



See our YouTube keyboard shortcuts list for a full listing.
Share a video at any point

Not everyone wants to watch a full video, link to the exact location you found most entertaining instead of making your friends or family watch the full video. To do this get to the location you want and pause the video. Once paused right-click the video and select Get video URL at current time and then copy the link created.

Alternatively you can manually add the time by adding "#t=XXmXXs" at the end of the URL, where XXm is the minutes, and XXs is the seconds into the video you want to start. For example:

https://www.youtube.com/watch?v=MKVWUUwoV4o

would become

https://www.youtube.com/watch?v=MKVWUUwoV4o#t=33s

to link to the video 33 seconds into the video. If you wanted to link 4 minutes and 20 seconds into a video add #t4m20s to the end of the URL. Alternatively you can use only seconds, so 4 * 60 (seconds in a minute) = 240 + 20 = 260 seconds for 4 minutes and 20 seconds into the video.

Find out what is popular on YouTube
YouTube can be a great place to find the most popular videos because of its popularity. Visit the Popular on YouTube to find the most recent popular videos, recently released music videos, top cute videos, latest trailers, events, and much more.

Add videos to Watch Later

Sometimes you just do not have the time to watch a video or maybe you just do not feel like watching an hour long video at this time. In the bottom right corner of every video is a Watch Later button that will add the video to your watch later list. Once you are ready to watch the video or if you saved a video to share with someone else you can find the video in your Watch Later Playlist.

Bonus Tip: Each of the thumbnails of videos on YouTube also shows the Watch Later icon when hovering over the thumbnail of the video.

Take advantage of search filters
YouTube usually does a great job giving you search results but is not always perfect. Take full advantage of their search filters by clicking the Filters button to get a list like that shown below. In the filters list you can refine the searches to when the video was uploaded, length of the video, view count, and features like HD (High definition) and 3D.

Watch live videos on YouTube
YouTube not only features pre-recorded videos, but they now also feature YouTube Live, including live events, sports, news, gaming, music, education, and much more.

Take full advantage of YouTube tools
Not many people know that YouTube also has several helpful YouTube Tools that can help extremely helpful when creating new content. For example, the YouTube editor allows you to edit uploaded videos, create videos, and adjust settings like the brightness and contrast, pan and zoom, stabilize, slow motion, and rotation. Other tools include a slideshow creator, YouTube capture, captions, audio library, and YouTube analytics.

Bypass regional restrictions and other blocks
Some videos may have restrictions that prevent them from playing on a certain device, playing in a certain region, or other restrictions that prevent you from playing the video. You can bypass some of these restrictions by changing how the URL is entered into your address bar.

Once the id of the video has been copied erase everything after the .com/ and add "v/<id>" where id is what was copied earlier. Once this is done your URL should resemble the example shown below.

https://www.youtube.com/v/xxxxxxxxx

Loading this URL opens the video in a full screen, but because of how it is loaded many of the restrictions YouTube may have on the video are ignored.

Set the default video quality
Watch all videos at the highest quality by adjusting your settings to use the best quality. To adjust your settings click on your profile icon in the top-right corner of the window and click the YouTube Gear settings icon as shown below. In the YouTube Account Settings, select Playback and then select "Always choose the best quality for my connection and player size." If you have a slow Internet connection or YouTube videos frequently need to buffer, select the "I have a slow connection. Never play higher-quality video" option.

 



Alternative ways to watch YouTube
There are dozens of ways to watch YouTube today. Most Smart TVs already have an app that allows you to watch YouTube videos on your TV using your remote. For those who do not have Smart TV or have a Smart TV but do not like the interface (it is not easy typing on a remote), there are also other solutions.

Our current favorite method of watching YouTube on the TV is using the Google Chromecast. The Chromecast allows you or anyone else with a smartphone or computer to stream YouTube videos to your TV with a click of a button. The Chromecast is the easiest solution to stream videos to your TV, and you can type on your phone or computer or use your voice to search for videos instead of using your TV remote.



13 Android tips and tricks you probably didn't know about

Other popular alternatives of watching YouTube


Apple TV - The Apple TV is another great solution for watching YouTube and other content.
Consoles - Consoles like Xbox, PlayStation 3, and Wii all have a YouTube player.
Lean Back - YouTube Lean Back is a completely different way of watching YouTube videos and allows you to browse and watch videos on alternative devices.
Roku - The Roku is another great device that connects to your TV to watch YouTube and other content.
TiVo - The TiVo DVR is another fantastic method of watching YouTube, your shows, and other content.


Computer hard drive history

Computer hard drive history

Year                                       Event

1890    Herman Hollerith developed a method for machines to record and store 

           information onto punch cards to be used for the US census. He later 
           formed the company we know as IBM today.

1946    Freddie Williams applies for a patent on his cathode-ray tube (CRT) 

           storing device in December. The device that later became known as the  
           Williams tube is capable of storing between 512 and 1024 bits of data.
 

1946    The Selectron tube capable of storing 256 bits of information begins 
           development.
 

1950    Before using disks, storage units used magnetic drums referred to as 
           drum machines or drum-memory computers. The first commercial drum 
           machine was developed by the Engineering Research Associates of 
           Minneapolis and used by the U.S. Navy ERA 110. Drum machines were 
           used throughout the early '50s.
 

1956    On September 13, 1956, the IBM 305 RAMAC was the first computer to 
           be shipped with a hard drive. The drive contained 50 24-inch platters, 
           was the size of two refrigerators, and weighed a ton. It could store only 
           five megabytes of information and each megabyte cost $10,000.
 

1959    Chucking Grinder Co. begins working on disk drives.
 

1961    Chucking Grinder Co. moves to Walled Lake Michigan and becomes 
           Bryant Computer Products, a subsidiary of Ex-Cello Corp. company.
 

1961    IBM introduced the IBM 1301 disk storage unit on June 2, 1961, 
            capable  of storing 28 million characters.
 

1962    On October 11, 1962, IBM introduced the IBM 1311 disk storage drive, 
           which stored.
 

1973    IBM ships the 3340 Winchester hard drive with two spindles and a 
           capacity of 30 MB. This drive was the first drive to utilize the Winchester 
            technology.
 

1980    Seagate introduces the ST506 hard drive, the first hard drive developed 
           for microcomputers.
 

1980    The first Gigabyte hard drive is introduced by IBM and weighed 550lbs 
           with a price of $44,000.
 

1986    The original SCSI, SCSI-1 is developed.
 

1990    SCSI-2  is approved.
 

1996    SCSI-3 is approved.
 

2002    Hitachi closed deal to purchase IBM's hard drive operation for $2.05 
           billion on December 31, 2002.

Friday, 8 June 2018

Top 10 Facebook tips


Top 10 Facebook tips

Below is a listing of our top 10 tips for the popular social networking website Facebook.

Hide users, games, polls, etc.
It quickly gets annoying seeing some users posts, game invites, polls, etc. Hovering your mouse to the right of the post and clicking the Hide button can hide any post. After pressing the button, you'll have the option to hide that user or in the case of a Facebook application the option to hide that application from ever showing up on your profile.

To unhide someone or unblock an application click the Edit Options link in the bottom right corner of the news feed as shown below.

Greasemonkey and FB Purity


Although Facebook does not give you the option to hide friends, friend requests, or various notifications, these can be hidden using browser add-ons. If you're running Mozilla Firefox, Chrome, Opera, or Safari ,we suggest installing the Facebook Purity add-on.

Update your privacy settings
Click Account in the top right corner of the Facebook window and then click Privacy settings to adjust who is capable of seeing what on your Facebook profile. We highly recommend going through all the privacy settings to verify your privacy is properly protected.

Anything that is not set to friends only or friends of friends can be seen by anyone searching on the Internet. Below is a few things we recommend for most users.

Under Search in Privacy settings uncheck Public Search Results. Adjusting the settings prevents users from finding your account and profile picture in search results such as Google
Under Application settings, make sure you're only allowing applications you want to have access to your information. Applications that you grant rights to can have access to your Facebook profile information.
If you're curious to see how a program or web page connect to the Facebook API can see your profile see See what an API connected to Facebook sees about you .

Use the Facebook top bar for navigation


Knowing how to properly navigate is vital if you want to get the most out of Facebook. Below is a brief description of each of the available options in the top bar as shown above.

Home (Facebook logo) - Clicking this logo takes you to your wall (News Feed) that shows all friends recent posts.

Friend requests - If any friend requests are waiting to be approved this icon shows a notification of how many friends are waiting for approval. This icon can also be clicked when you want to view any friend recommendations or search for friends on Facebook.

Messages - This section allows you to send and receive private messages between one or more of your friends'.

Notifications -
Any time a friend or Facebook application creates a new post you'll be notified in this section. Clicking this icon shows all recent notifications. To change notifications including any Facebook applications or games click the See All Notifications link at the bottom and check or uncheck what you want to be notified on.

Search - Finally, the Facebook search box can be a powerful tool that can be used to quickly find any current friends or people on Facebook. Also, searching for terms such as a company name, product, sports team, music band, etc. will find fan pages and groups that can be joined.

Modify your account notifications

Keep your e-mail and your cell phone clean by updating or eliminate Facebook notifications or keep more up-to-date by adding new notifications. Facebook notifications can be added and removed by clicking Account link in the top right corner, then Account Settings, and then clicking the Notifications tab.

Top News and Most Recent
Facebook News and most Recent

By default, Facebook displays your wall postings in the News format, which means it only displays posts it believes are most relevant to you. These results are based on your past interaction with your friends'. If you want to see every post made by your friends that is not hidden, click Most recent in the upper right of your news feed, as shown in the above picture example.

If you want to adjust who shows up manually, click the Edit Options in the bottom right corner of your news feed.

View High School work friends
If you've added your High School or previous Work locations to your profile, quickly see all classmates and co-workers on Facebook by clicking the link in your Info tab under your profile.

Quickly change profile picture
Your profile picture can be changed by visiting your profile, hovering the mouse over your current profile picture, and clicking the Change Picture link in the top right corner.

Don't post private information on friend's walls on in comments
When you make a post on a friend's wall or in any of their comments, realize that any of their friends are going to be able to see that post. If you want something to remain only between you and a friend send them a Facebook message instead.

Suggestions and random friend invites
As you get more friends on Facebook, it will begin making friend, groups, and fan suggestions. These are suggestions made by Facebook and not your friends'. Unless these are something you're interested in they can be ignored.

This same rule can be applied to people who may want to be your friend that you don't know. If you don't know someone do not accept his or her friend invite. Once someone becomes your friend, they'll have access to any information your friends' are capable of seeing.

Tag your Facebook friends in your photos
Always make sure to tag any of your Facebook friends that are in pictures you upload. However, never tag someone who is not in the picture. When someone is tagged in a photo that picture is automatically added to that persons profile and is a great way to share pictures with all friends.

See what an API connected to Facebook sees about you

See what an API connected to Facebook sees about you

Facebook allows website developers and application developers access to their Facebook Graph Application Program Interface (API) that enables them to display information about your profile. For example, show your friends who've visited that page, show friends who've liked the page, personally greet you, etc.

Note: The API does not give that developer access to your personal information, but for some people may be of some concern.

Using the Facebook API Browser you can see what the Facebook API shares from your profile. If you feel that this is too much information, you can then adjust your Facebook Privacy settings accordingly.

Once you've visited the above link enter your Facebook alias or ID to view the API settings. If you're not sure what your ID is, you can quickly find out by moving your mouse over your name on your Facebook page. For example, if your name was Joy it's likely your Facebook alias could be joy.s or if you haven't entered an alias a number such as 148757536227.

Top 10 tips for keeping your e-mail inbox clean

Top 10 tips for keeping your e-mail inbox clean

These days, the majority of our most personal and important digital correspondence happens through email, so it's important to keep it organized. Here are some tips for cleaning up your inbox.

Setup rules, filters, or labels

Today, all e-mail programs and online e-mail services have rules, filters, or a labeling system that allows you to move and otherwise organize incoming e-mail. Use these features to organize your e-mail and get to what is most important first. Below are some suggestions for rules we suggest trying first.

Move important and unimportant e-mails to a folder of their own.

Highlight or set priority to certain addresses. For example, a rule could be created to highlight any user in your address book.
Filter out common spam words that get into your inbox (e.g., Viagra).
In programs that support rules, mark messages that are not important to keep your inbox clean and prevent you from getting overwhelmed when you first open e-mail.
If you are getting lots of spam filter your e-mail through Gmail.


Do not be afraid to delete
After reading e-mail, always take action on that e-mail. Do not save it for later or move it into a folder to deal with later. If you are unable to take action on the e-mail, delegate it to someone else, or postpone it for later that day delete it. Every e-mail does not need a response and there is no reason to save e-mail that is going to be deleted later.

Automatic replies, FAQs, and canned responses

If you find yourself using the same reply over and over again, consider creating a list of your frequent replies that you can copy and paste. Or, try using a tool such as one of the ones listed below to help make replying to these e-mails even faster.

Thunderbird Quicktext - Fantastic Mozilla Thunderbird e-mail add-on.

Lifehacker Texter - Easy to use script tool that can be used in anywhere in Windows including e-mail.
AutoHotkey - Another great tool although much more advanced. However, this tool can be used to automate anything on the computer.

Keep it simple
Many times people over complicate their e-mail by creating dozens of different folders to help organize their e-mails. Keep it simple do not have dozens of different folders to organize your e-mail into.

If there is no way getting around your need for folders in e-mail use the rules to filter your messages into the folders. Folders can save hundreds of hours you may be spending thinking about and organizing each of the e-mails you receive.

Always do quick short replies

When replying to any of your e-mails try to keep the reply as quick as possible and do not spend too much time on an individual e-mail. We suggest spending no more than five minutes on a single e-mail and avoid anything longer than three paragraphs.

You are e-mail is not a calendar or to-do list

Many times a person’s inbox is full because they are treating it as a calendar of things that they need to do. Do not use your e-mail for this. Have a separate program or text document that keeps a list of things you need to do or that keep track of your calendar of events.

Unsubscribe from newsletters and disable notifies
Although you may have had good intentions when subscribing to a newsletter or other e-mail list these are often distracting and often clutter your e-mail. Unsubscribe from any newsletter you have not been reading.

The same is true for notifications from social network sites such as Facebook, MySpace, and Twitter you may be receiving. Disable all notifications about posts made on your wall, new friends, or followers, which clutter your inbox and distract you.

Do not reply to spam
If spam sneaks past your protection or rules never reply to it; just delete the message.

Keep at it but not too much

Try to read your e-mails at least once daily or every hour, depending on how much e-mail you receive.

However, do not live in your e-mail. Create a schedule where you check your e-mail in regular intervals and then ignore it all other times. If you have any notification about new incoming e-mails disable these or close your e-mail program or e-mail web page.

Delete some more
Finally, if after following all the above steps you still have e-mails that are weeks old delete them. If you have a hard time deleting e-mails create a folder and move all old e-mails into that folder. After a few weeks have passed the e-mail becomes too old for a reply.

Good Morning Beautiful

Do you know????

Do you know????
/