Press "Enter" to skip to content

Posts published in “PC”

How to Install an Anti Virus

0
There Are Many Settings And Options Available For Mac Computers Č If you currently use a Mac operating system you may be aware of the importance of configuration settings and options available to you. This knowledge will come in handy because you will be more than happy to use them should you get a chance. Getting started with configuration settings. Apple makes the process of configuring your Mac as simple as its operating system. All you have to do is launch the Apple Config Utility and before you do anything you mark the check box for the items that you want to configure. These options include Bluetooth, FireWire, iTunes, iCal, iMessage, iSafari, Speech Recorder, as well as many other items. Once you've finished setting up your Mac you may wish to connect to any Bluetooth device and as Bluetooth is not enabled by default you will have to enable it. Free tests for configuration. The Apple Config Utility may not be completely necessary since version 10.4 Apple incorporated some of these settings in the AIO update. If you are running an older OS you may not have these fixed, so you want to get the latest version of AIO. Here's how to check if you have the necessary settings installed: Getting the latest configuration tips. Once you have AIO updated; launch the System preferences and then get to the Account Preferences window. Between here you can configure any additional devices you want to use Bluetooth for. Some examples of where to get the configuration tips for your Mac are: From here you can also update the firmware on your Mac computer, for example, an AIO update or any wiring setup or any other hardware upgrade. Look on the web for 'how-to articles. These articles take you through the process of configuring your system for the many different devices you have connected to your computer. Advance your troubleshooting. If you can still not get your Mac to boot up you need to try and determine why. You can do this by installing some troubleshooting software that will aid you in finding the problem.
  • These are some common issues and they can be resolved by a simple method:
  • Make a spare set of Ethernet cords and connections at home or in an office. Use these for testing the wireless connection and resolving any issues properly.
  • Ensure the batteries are inserted fully and secure the fitting of the laptop bag.
  • Make sure the stems of the HDMI and the external USB plug are in order.
  • Connect the power cord to the power adaptor and the wall outlet.
  • Plug the AC Adapter into the power adaptor and plug it into the electric socket. 100% efficiency will be achieved only when all cables are connected.
  • Your Apple Power Adapter should now be ready for use with your MacBook.
  • Your battery will now be able to hold the full charge.
  • Your operating system (OS) will detect the presence of the power adaptor.
  • Click the Help menu (top menu bar)
  • Enter help.
  • Use the 'internet' option.
  • Choose 'Downloads'
  • Click the icon for the latest version.
  • Restart your computer.
  • Once the above steps have been taken care of, it may be useful to install an anti-virus such as AVG.
  • Run a scan to clean your computer. Also install an anti spyware such as Spybot.
  • Once again, use the 'internet' option when you are connected to the internet.
  • Choose 'Downloads'
  • Click the icon for the latest version.
  • Restart your computer.
  • Once the above steps have been taken care of, it may be useful to install an anti virus such as AVG.
  • Run a scan to clean your computer. Also install an anti spyware such as Spybot.
  • Once again, use the 'internet' option when you are connected to the internet.
  • Choose 'Downloads'
  • Click the icon for the latest version.
  • Restart your computer.
  • Once the above steps have been taken care of, it may be useful to install an anti-virus such as AVG.
  • Uninstall programs that you no longer use. These will remain on your computer and will slow it down. Therefore, take them off to free up more space.
  • To remove programs from your Mac, choose Go (top menu) and then Control Panel. Then double-click on Add/Remove Programs.
  • Select the programs that you want to remove and then click Remove.
  • This will definitely speed up your Mac.
  • This is really helpful if you are trying to make your computer run faster. I know it's not the most efficient thing to do, but keep in mind how many files you have and how much room you have on your hard drive. This will speed up your computer.
  • Double click on the icon for the start menu.
  • Then go to System Preferences. It's on the panel on the leftmost portion of the window.

Computers and Their Importance

0
A computer can be defined as a general-purpose device that can easily be programmed in order to carry a set of logical and arithmetic operations in an automatic manner. Since a sequence of various operations can be changed easily, the computer is capable of solving more than one kind of problem. On a conventional basis, a computer consists of at least one element for processing that is typically called a central processing unit. This processing unit or element is responsible for carrying logical as well as arithmetic operations. In this world, it is impossible to even imagine that any person can survive without a computer. These computers have become an electronic device for any particular individual as they are essential for any office, home, or school. It is also essential for making any document, figure, or data durable and available for future references. In this assumption, we can also see the importance of a computer. Even if there are several computers in an office, they can't perform all the tasks a single computer can. It is just irrelevant how fast a computer can perform a task if a computer doesn't have the necessary resources or power to carry on the same tasks. That is why it is necessary to secure a computer system. The information in the computer can be stored in many ways. The information can be stored in the memory of the computer, on the hard disk, transferred to the hard disk through the means of a floppy or zip drive. The floppy and zip drives can store files that are related to any other purpose. Even so, most computers have floppy controllers and zip points. In addition to storing the information in the computer's memory, the hard disk can also be another important place where information can be stored. The hard disk is made up of many large sectors that are used to store one file. The sectors are highly rated; therefore, it is necessary to repair your computer system by identifying the sectors that are damaged or the files that are unreadable. We can see that there are many Similar computer problems that can happen to your computer system. Most of them are of the following types:
  •  When the computer cannot load a device driver for a hardware cause.
  •  When the windows do not run certain programs.
  •  When the computer is running slowly.
  •  When the windows hang.
  •  When your computer crashes.
  •  When you cannot access any page of the web page that you want to visit.
Server Management- Managing a computer system is a big task as it also includes administering the network. Each and every PC in the network has its details stored in a computer system information file, commonly known as a configuration managing file or the CMI. The file contains a table of different system IDs and also the names and preferences of the user. This table can be viewed by clicking "Start" and then "Control Panel" or by "Control Panel" > "User Accounts and Family Safety" > "Internet Safety" Secondly, the big bad guys are always out there seeking to take advantage of the least obvious target. All it takes is for a user to turn on one side of the coin and the other side of the coin for them to attack. However, for every coin you have, you can also have two. Therefore, only choose solutions that trust your good side and discard the bad side. The client-Server paradigm is similar to the concept of Least Cost Reservation where a business has a collection of resources that it needs to complete a task. The client on the other hand is the end-user who has the authority to request that the computing resources should be shared with him. The client does not have the authority but it is assumed that he needs to get the job done. For instance, if you are a student and you want to write your examination paper on a particular date you have to ask your professor for approval. If he gives you the approval you are expected to go to your host computer and the program will go ahead with the examining of your paper. Computing ProfanityIn case you have been studying our society and English class you will know that there are many swear words that actually exist as part of everyday language. The word computer actually comes from the phrase, "computers are very complicated devices." Nowadays, technology is a completely evolving beast and we all are forced to use it even more. However, one thing is for sure that once something has been introduced to a large number of people, it will be almost impossible to get hold of a solution to that problem. Probably, only God knows why?

A Closer Look at the Basics of Runtime Error in Computer Systems

0
An error commonly found in computer systems, a runtime error comes in the form of a message box made up of varying codes and commonly known as always asking the user to find the specific error. After locating the error, it is commonly fixed by means of two methods. First, there is a pop-up message showing the message and the computer searches for its contents to locate the error. Each runtime error comes in different forms with solutions for fixing different problems. The earliest runtime errors saw the first implementation sometime in the late 1980s. Later on, codes were added to find the solutions for proliferating the codes. Today, codes are generated to indicate a Security Error in Operating System. According to the definition, a Security Error is any error that there is a need for special operations and certain procedures that need to be executed to correct this error. A Runtime Error will transform the same manner as a fatal error but may include codes to guide the user about the cause of the error. Usually, runtime errors arise due to the loss of connection between server and client or between client and server. When it comes to the development of code, there is a procedure used to generate codes that are indicative of various events to be followed to determine the cause of runtime errors. This procedure is known as error handling. Runtime errors come in two types: fatal and non-fatal. fatal errors are more serious and carry more damage to the system. In the world of online computer support, a non-fatal error usually results in frustration due to the loss of necessary data. Additional Information and Other Important Details About Runtime Errors The term runtime error comes from the Petersfield manual that deals with the runtime control of the operations system. In computer lingo, a runtime error is usually encountered when there is a failure in the execution of a program while another operation is dependent on the result of that program. Another error type is the one encountered when there is a failure in the termination of a system process. The runtime errors come in the form of messages or dialog boxes and may appear on the screen, and often times the error message is given in agnostics or informational messages. The manual has also added information about the possible causes of these errors and the diagnostic codes. A runtime error of unknown origin is sometimes displayed when the computer is being used by someone who is not knowledgeable about the language or operating system. Computers are complex machines that need to be handled carefully. Anyone who has improper control over the functioning of computer systems may face problems such as viruses or other failures that results in the loss of important data. For those who don't know the language or operating system, getting support is a must. Millions of people have the fear that end-users will not be able to cope with the technical knowledge required to use some machines like computers. Anyone who perceives himself as not having a computer may feel frustrated, angry, or even unsafe. In a workplace where computer systems are mainly used for work, a lot of important data could be lost. This is why it's better to adopt a support plan for the use of specialized applications. Before you buy a new application, it's vital that you're aware of the possible causes of a runtime error.
  • Features of Runtime Errors
A runtime error is common for programs that are not fully downloaded or properly configured. These errors often occur when incompatible or outdated program add-ons are installed on the computer. The two main causes of this type of error are the mistaken installation of add-ons and incomplete programs.
  • DLL problems due to installers
There are a few cases where the runtime retrofitted from a registry problem. It is most commonly seen when the PC registry becomes corrupted due to the install of new programs. The registry of the PC stores all the data that is required by the programs installed on the computer. An improperly configured PC creates a lot of problems for the user. There are a few ways to fix this error. First, the computer itself may be too old to be able to handle the old programs. The PC should be bought new so that old files can be deleted and a registry cleaner can be used to fix the issues. Along with the step above, old files should be purged from the hard drive. using the built-in function of your computer, you can delete files by going to the address bar and selecting the command "Delete File." But if you are not sure if your computer can handle orphaned files, you can use a disk clean-up tool that will help you fix the problems.
  • Update your virus definitions.
Oftentimes, even if you have viruses, they may have gathered a little too much power and will pose a Task Manager - generated error. The virus definition will need to be updated to ensure that your computer is safe.

How to Protect Your Computer

0
Spyware spread quickly across the internet world forcing users to become aware of the prevalent threats facing their privacy while surfing the internet. A PC will begin to run slower, have difficulty accessing the internet, have a reduced bandwidth, show unwanted pop-ups and or alter the start page. A spyware infection means your personal information is being exposed to individuals or companies without your knowledge or approval. Spyware collects information on your internet and computer usage habits as well as more serious information including personal identification and credit card numbers. Many spyware applications can run silently, leaving you in the dark about the information being released from your computer. Even without symptoms users must beware of spyware infections. By downloading from freeware programs, such as free music file-sharing or game programs, then your computer most likely has spyware. Downloading ring tones, screensavers, and other free applications usually result in spyware piggybacking in your computer with the downloads. Other forms of dangerous spyware include Browser hijackers that let advertisements run on your computer through your internet browser without your knowledge. The damage from this spyware can also draw your attention to other annoying pop-up ads and spam. On the other side spyware also acts as a form of internet terrorism by leaving you and your computer vulnerable to attack. Spies intentionally write malicious code into popular websites or secretly install harmful scripts into your web pages. These applications are then used by cybercriminals to steal your personal information and private customer data. Credit card information is sent back to the intruder, who then uses it to steal your identity, and cause you to financially suffer. Many forms of spyware can run undetected, leaving your computer vulnerable to acts of vandalism and sabotage. Spyware is necessary to deliver important information, such as password resets and mobile verification codes to your web browser for authentication. However, if the wrong person gets access to your computer, the information can be stolen. The best way to safeguard your personal information and computer is by downloading and using anti-spyware software and habits. Trial versions of anti-spyware are free, while paid versions are required to remove any problems. Using a firewall protects your computer from spyware, hacker attacks, and viruses. Spyware is a common term in today's computer world affecting programs, websites, and user's acts. Today's internet security software can remove or prevent access to spyware which may allow being installed on your computer. A good internet security program uses two approaches to protect your computer: active protection and preventative. While both of these methods help secure your computer they are different in how they are implemented. Passive protection is nothing but a series of random activities or actions by the software which is authorized access to your computer. In other words, it works to keep the software and the data secure when in the knowledge that it is not authorized to do so. It will not load information or programs on the computer unless it is instructed to by the user or administrator of the computer. Active protection has been around for a while now and is now offered in a variety of means by different companies. It is now offered in the form of a hardware device called a personal firewall. Personal firewalls are normally hardware-based and wedge-shaped devices that form shadows over the computer terminal. The basic concept is that the small device acts as a guard for the computer, between the computer terminal and the world outside of the computer. If a nefarious person tries to get into your computer without your knowledge they may be able to see some of the information that you are sending or receiving through the internet. In order to prevent this from happening you can make sure that only clear text (no data is sent over the internet in clear text) is seen through the device. You can also choose to encrypt data before sending it, which makes it so difficult for people to see what they are looking for. A personal firewall is software, which can filter both incoming and outgoing network data. The firewall will check incoming requests and only allows access to those that you have made known to you, or based on what you have permitted. It will not allow, for example, a person to forward unsolicited emails. Spam, a common annoyance when you are online, is actually a tool to catch bad packets of data so that your network does not have to waste valuable resources. Spam is often used for marketing purposes, where target consumers are contacted through unsolicited emails. Personal firewalls can be set to check all emails that come into your inbox and deny access to those that are unwanted.

AMD Vs Intel Processors

0
The battle continues... Things are about to get very messy in the ongoing battle for processing chip dominance between AMD and Intel. For years, Intel has held the high ground, beating off attack after attack from AMD and holding its own in a marketplace that changes chips every half hour. Intel has always been the big name, the big player, and the 'go-to guys' for everything Core i3, i5, and i7 orientated. But all of that could be about to change if AMD's talks with giant corporations Apple are successful. Intel has been the sole provider of microprocessors for the iconic Apple Notebook and its desktop PCs since 2006 when Apple parted company with PowerPC. AMD's representatives have recently been spotted leaving meetings with members of Apple's top people - and according to hearsay, it's been smiles all round. The meetings have led to Apple starting to take a long, hard look at AMD processors in their research labs as a precursor to the chips being incorporated into some of Apple's up and coming projects. Rumour is that Apple is particularly interested in AMD's workstation and notebook CPUs. So why is Apple talking to the enemy (as far as Intel is concerned)? It may have a lot to do with the problems that Apple has encountered with Intel processors. Not only were there accusations that the Intel chips slowed the page refresh time for the notebook, but the Intel chipset designs have hindered Apple's plans to continue their partnership with Nvidia to develop a standardized chipset for use with Intel processors across the full range of Apple products. A shortage of the new Core family of chips also delayed the release of the latest version of the MacBook series, which didn't help matters. The result of this has been that Apple has been forced to use the less capable Intel integrated graphics chip inside the new MacBook Pro instead of the more capable Nvidia product. AMD - up and coming and a potential threat to Intel's dominance The deal with Apple could undermine Intel's dominance of the marketplace. As a result of Apple's discussions with AMD, more manufacturers are now taking a second look not only at what AMD offers already but also their plans for future research and development. Admittedly, it could all be a case of corporate maneuvering on Apple's part to see what Intel step up with as an alternative. But no matter what the reasons, the real winners down the line will be the consumer. Competition, particularly in the technology world, leads to leaps forward in development. New ideas and concepts are the product of debate and competition as each tries to outmaneuver the other. AMD may lack the performance and efficiency of the Intel processor, but their acquisition of ATI gives them the edge over their rivals when it comes to GPU technology. Because Apple is focusing on improving its graphics package (name one graphic designer who doesn't use a MacBook), the smart money is on a merger between Apple and AMD, allowing Apple to push forward with the Nvidia plan. But rest assured - Intel isn't just going to sit back and let it happen without a fight. It could all come down to numbers - which is going to profit Apple most; stick with their current partnership or change to a new one with AMD? The most likely probability is that Apple, recently announced as financially bigger than the monolithic Microsoft and therefore a major influence in the direction of the microprocessing marketplace, will most likely end up working with both AMD and Intel. As the old saying goes, those who are at the forefront of microprocessing and graphics capability are living in interesting times...