Page 4 of 12 FirstFirst ... 23456 ... LastLast
Results 31 to 40 of 118

Thread: Do You Know ?

  1. #31
    Join Date
    Sep 2006
    Location
    Kerala, India
    Posts
    17,476

    Default Computer terminology

    small computer system interface (SCSI)
    A standard high-speed parallel interface defined by the American National Standards Institute (ANSI). A SCSI interface is used for connecting microcomputers to peripheral devices, such as hard disks and printers, and to other computers and local area networks (LANs).

    socket
    An identifier for a particular service on a particular node on a network. The socket consists of a node address and a port number, which identifies the service. For example, port 80 on an Internet node indicates a Web server. There are two kinds of sockets: streams (bidirectional) and datagrams.

    status bar
    A line of information related to the current program. The status bar is usually located at the bottom of a window. Not all windows have a status bar.

    strong password
    A password that provides an effective defense against unauthorized access to a resource. A strong password is at least six characters long, does not contain all or part of the users account name, and contains at least three of the four following categories of characters: uppercase characters, lowercase characters, base 10 digits, and symbols found on the keyboard (such as !, @, #).

  2. #32
    Join Date
    Sep 2006
    Location
    Kerala, India
    Posts
    17,476

    Default system partition

    system partition
    The partition that contains the hardware-specific files needed to load Windows (for example, Ntldr, Osloader, Boot.ini, Ntdetect.com).

    systemroot
    The path and folder name where the Windows system files are located. Typically, this is C:\Windows, although you can designate a different drive or folder when you install Windows. You can use the value %systemroot% to replace the actual location of the folder that contains the Windows system files. To identify your systemroot folder, click Start, click Run, type %systemroot%, and then click OK.

    Task Manager
    A tool that provides information about programs and processes running on the computer. Using Task Manager, you can end or run programs, end processes, and display a dynamic overview of your computer's performance.

    taskbar
    The bar that contains the Start button and appears by default at the bottom of the desktop. You can click the taskbar buttons to switch between programs. You can also hide the taskbar, move it to the sides or top of the desktop, and customize it in other ways.

  3. #33
    Join Date
    Sep 2006
    Location
    Kerala, India
    Posts
    17,476

    Default Computer glossary

    thumbnail
    A miniature version of an image that is often used for quick browsing through multiple images.

    uninstall
    When referring to software, the act of removing program files and folders from your hard disk and removing related data from your registry so the software is no longer available.

    When referring to a device, the act of removing the corresponding device drivers from your hard disk and physically removing the device from your computer.

    universal serial bus (USB)
    An external bus that supports Plug and Play installation. Using USB, you can connect and disconnect devices without shutting down or restarting your computer. You can use a single USB port to connect up to 127 peripheral devices, including speakers, telephones, CD-ROM drives, joysticks, tape drives, keyboards, scanners, and cameras. A USB port is usually located on the back of your computer near the serial port or parallel port.

  4. #34
    Join Date
    Sep 2006
    Location
    Kerala, India
    Posts
    17,476

    Default unsigned driver

    unsigned driver
    A driver that is not supported and that is not certified to work with a particular version of Windows.

    virus
    A program that attempts to spread from computer to computer and either cause damage (by erasing or corrupting data) or annoy users (by printing messages or altering what is displayed on the screen).

    wildcard character
    A keyboard character that can be used to represent one or many characters when conducting a query. The question mark (?) represents a single character, and the asterisk (*) represents one or more characters.

    wireless communication
    Communication between a computer and another computer or device without wires. The form of wireless communication provided as part of the Windows operating system uses infrared (IR) light to transmit files. Radio frequencies, as used by cellular and cordless telephones, are another form of wireless communication.

  5. #35
    Join Date
    Sep 2006
    Location
    Kerala, India
    Posts
    17,476

    Default Web safe Colours

    Web safe Colours

    You can give colours to text by specifying the color in between the double quotes below :
    <FONT SIZE="3" COLOR="red">Beautiful India</FONT>

    Displays the text Beautiful India in red color in font sze=3.

    Other colors are <FONT COLOR="white">white</FONT> <FONT COLOR="black">black</FONT> <FONT COLOR="silver">silver</FONT> <FONT COLOR="gray">gray</FONT> <FONT COLOR="maroon">maroon</FONT> <FONT COLOR="green">green</FONT> <FONT COLOR="lime">lime</FONT> <FONT COLOR="navy">navy</FONT> <FONT COLOR="blue">blue</FONT> <FONT COLOR="purple">purple</FONT> <FONT COLOR="fuchsia">fuchsia</FONT><FONT COLOR="olive">olive</FONT> <FONT COLOR="yellow">yellow</FONT><FONT COLOR="teal">teal</FONT><FONT COLOR="pink">pink</FONT><FONT COLOR="aqua">aqua</FONT>.

    If you want other 216 web safe colors use the hexa decimal code. The six digit hex code represents the primary colors - Red, Green and Blue.

    eg - #FFFF00 represents yellow.

  6. #36
    Join Date
    Sep 2006
    Location
    Kerala, India
    Posts
    17,476

    Default Font color in html

    <FONT SIZE="2" COLOR="#FF0000">Beautiful India</FONT> or

    <FONT SIZE="2" COLOR="red">Beautiful India</FONT>

    Displays the text Beautiful India in red color in font sze=2.

  7. #37
    Join Date
    Sep 2006
    Location
    Kerala, India
    Posts
    17,476

    Default Cookie

    Cookie is small 4 kb data file that a website uses to remember your settings or track your surfing habits. Designed to benefit the web surfer, a cookie is a small piece of data that a website stores on your hard disk. It stores your login name, pasword, custom settings etc. If you've already visited a site, cookie is set in your PC. When you visit the site again, the web server search for cookie and customize the website according to the information in cookie. Cookies keep the history of visited sites. Cookies are stored in a directory named temporary internet files.

    Deleting cookies makes privacy online, but it looses some functionality in the web. To disable cookie, IE ->Tools->Internet options->Security->Cookies->Enable/disable.

    If the security level is high, cookie will be disabled. To delete cookie in IE , \Documents and Settings\Administrator\Local Settings\Temporary Internet Files.

    The Temporary Internet Files directory will be under systemDrive. You can find it by typing 'set' at Dos command prompt.

    Delete cookie in Opera :
    Tools - History (select all & delete).
    Tools - Cookies (delete one by one)
    Tools -wandpasswords (delete one by one)
    Tools -delete private data (delete all the checked).

    Documents and Settings\Administrator\Recent : contains the short cut to recent documents opened in the PC. The directory will be under SystemDrive.

  8. #38
    Join Date
    Sep 2006
    Location
    Kerala, India
    Posts
    17,476

    Default Covering your tracks.

    Covering your tracks.

    Delete temporay Internet files, history, auto complete, links on favourite list, cookie, clear document menu. When you are visitng a site, it will record the site from you come from and the link which takes you out of the site.

    By pressing Alt + Tab, you can toggle between two opened windows.

    Email is not a secure form of communication of credit card number.

    Common TCP/IP ports : FTP - Port 21, Telnet - Port 23, SMTP - Port 25, http - Port 80.

    Password recovery : Always form a strong password longer than 8 character long using both uppper & lower case letters, special characters and numbers. Don't use any personally related name or a dictionary word as password.

    Download the shareware from www.download.com and recover the forgetted password.

    A 'post' is a message that you send to a mailing list of a newsgroup. A 'thread' is a conversation that consists of several related messages sent over a period of time.

  9. #39
    Join Date
    Sep 2006
    Location
    Kerala, India
    Posts
    17,476

    Default Computer security

    Computer security

    1. For Encrypting files in a folder

    Right Click on the folder to be encrypted, click on properties. Select the General tab, click on the Advanced tab below. Check the box to Encrypt contents to secure data and click OK.

    2. Don't allow to share a drive or folder in your PC. If you share a folder, its contents will be accessible to others when you are online.

    3. Uncheck the box for Hide extensions for known file types. For this, Control Panel->Folder Options (View tab)->Uncheck the box for Hide extensions for known file types. This will show file extensions, virus/worms come as mallika.jpg.exe, if one clicks it thinking it as a jpg picture file, his system will be virus infected. So the above mentioned option will take care of this threat.

  10. #40
    Join Date
    Sep 2006
    Location
    Kerala, India
    Posts
    17,476

    Default Computer security

    Computer security

    4. Convert your disk to NTFS, which is the new and safe file system for Windows. FAT, FAT32 are outdated. Seperate softwares are available for this conversion. Format command will also do this with loss of data on the disk (My Cpmputer ->Right click on the disk to format in NTFS->Format.)

    5. Disable dump file creation. Control Panel->System->Select 'Advanced' tab of System Properties and click on 'Settings' of Start up and recovery. Make Write debugging to None and click OK.

    6.Show hidden files and folders. Normally hidden files system files, not used by a user directly. Viruses are utilising this weakness of the operating system to hide. Control Panel->Folder Options (View tab)->Click on the radio button for 'Show hidden files and folders' and click OK.

Page 4 of 12 FirstFirst ... 23456 ... LastLast

Bookmarks

Posting Permissions

  • You may not post new threads
  • You may not post replies
  • You may not post attachments
  • You may not edit your posts
  •