Thursday, 6 October 2011

Dell Vostro 460 Mini Tower Desktop Available

Another nice mini tower desktop PC has been come out of Dell’s company, the Vostro 460 which supports multiple monitors make you can open multi application at the same time. The system packs a 3.3GHz Intel CoreTM i5-2500 w/VT Processor Continue Reading »
Dell Vostro 460 Mini Tower Desktop Available

Mouse Computer Nextgear i740 Platinum Powerful Laptop (Silver)

Mouse Computer is about to release its new powerful laptop in Silver color designed, namely the Mouse Computer Nextgear i740 Platinum. This new computer is an ideal for powerful portable computing that it’s equipped with 15.6-inch widescreen display with Full HD (1920×1080) picture resolution Continue Reading »
Mouse Computer Nextgear i740 Platinum Powerful Laptop (Silver)

ASUS add Eee PC Seashell 1016PT-BU37-BK to its catalog Read more: http://techngear.com/asus-eee-pc-seashell-1016pt-bu37-bk-features.html#ixzz1JfK0MXhL


 ASUS has done as expected today by release the Eee PC Seashell 1016PT-BU37-BK Netbook in the US market. In case you didn’t know, this new netbook is powered with a lot of enhanced features including a 10.1-Inch Matte WSVGA LED display with 1024X600 pixel resolution, pre-loaded with Windows 7 Professional (32 bit) operating system, 250GB hard drive, and 2 GB DDR3 RAM.
The ASUS Eee PC Seashell 1016PT-BU37-BK Netbook in black color has measures 10.3 x 7 x 1.4 inches and weights 2.8 pounds. It’s available for shipping since April 24, 2011 with price of $475.29. The netbook is an ideal for those who are on the go, because it’s comes with 56W/h battery that provide up to 11 Hours battery life.

GRAPHICS MEMORY of computer

Graphics Memory is the memory that stores your Imagery (Desktop Picture, Game Scenes, Photographs, Icons, Text and so on). It is a microchip on the Graphics Card. The main job of a graphics card is to store Imagery inside its graphics memory and then display that imagery, on the monitor screen, when a program asks it to. For example. If you are editing a photograph the paint package would of allocated some of the graphics memory as file memory (for the original photograph) and some of the graphics memory as edit memory (for editing purposes) - In the same way the file memory and edit memory was allocated in the Microsoft Word 2007 explanation above. The graphics card will not only display the photograph (file memory) on the monitor screen, but it will also update (refresh) the monitor screen instantly every time you edit the photograph. In the same way that Microsoft Word 2007 updates instantly any changes you make to a document. Graphics memory is also in charge of storing other imagery. For example. If you have one game open, a paint program open and the Internet open it is graphics memory storing the imagery of those three programs. The more programs open that use graphics memory the more tasks (jobs) you are giving the graphics card. Meaning. If you give it too much to do and/or it runs out of graphics memory it will not be able to update the monitor screen quick enough, which means editing and game playing for example will not be instant. The monitor screen will update (draw the imagery) so slowly that it would not be worth editing a photograph or playing a game. A normal sign of this is when the monitor screen is updated (drawn) line by line as opposed to instantly. So get a good Graphics Card with plenty of Graphics Memory because the one built into the computer might not be good enough for your needs.

ROM / RAM of computer

Memory is known by two types. ROM (Read Only Memory) which means hardware and software can only read the byte values stored inside rom memory and RAM (Read Access Memory) which means hardware and software can not only read the byte values stored inside ram memory but they can also, temporarily, change the byte values stored inside ram memory.

ROM memory is a microchip on a motherboard (green microchip board), such as a Modem motherboard, that contains the instructions (byte values) needed to make the hardware (Modem) work. This is why ROM memory cannot have its byte values changed. The instructions (byte values) are preprogrammed onto the microchip, so that when you first switch on the computer the instructions (byte values) are always the same.

RAM memory is a microchip that is permanently fitted onto a Card (small motherboard), such as a Graphics Card or Memory Card, or a single removable microchip that you attach to the main motherboard. The main motherboard is the big green microchip board inside the computer (base unit). RAM memory can have its byte values temporarily changed, and read, so that you can change Graphics settings (Graphics Card) or store data (Memory Card) for example. Even though RAM memory is cleared when you switch off or restart the computer, because it is meant as a temporary storage place only, the data inside the memory is normally saved by a program (as a file) beforehand. For example. If you change the Modem (hardware) settings using a modem program it will save your changes as a settings file on the hard drive before the computer is switched off or restarted. When the computer is switched on again the modem uses its default (normal, preprogrammed) settings before looking at, and using, the settings from the saved settings file. The modem uses its default settings first for two reasons. One is so that it knows it is setup correctly (by using its normal, manufacturer's, preprogrammed settings) and two is in case the settings file is corrupt, damaged or missing. If it reads a settings file incorrectly (i.e because it is corrupt) you may get problems with the modem or it may revert back to its default settings.

How to remove a computer virus

Even for an expert, removing a computer virus can be a difficult task without the help of computer virus removal tools. Some computer viruses and other unwanted software, such as spyware, even reinstall themselves after the viruses have been detected and removed. Fortunately, by updating the computer and by using antivirus tools, you can help permanently remove unwanted software.

To remove a computer virus, follow these steps:

1. Install the latest updates from Microsoft Update on the computer.
2. Update the antivirus software on the computer. Then, perform a thorough scan of the computer by using the antivirus software.

3. Download, install, and then run the Microsoft Malicious Software Removal Tool to remove existing viruses on the computer. To download the Malicious Software Removal Tool, visit the following Microsoft Web site:
http://www.microsoft.com/security/malwareremove/default.mspx
For more information about how to remove a computer virus, visit the following Microsoft Web site:
http://www.microsoft.com/protect/computer/viruses/remove.mspx (http://www.microsoft.com/protect/computer/viruses/remove.mspx)

What is a computer virus?

A computer virus is a small software program that spreads from one computer to another computer and that interferes with computer operation. A computer virus may corrupt or delete data on a computer, use an e-mail program to spread the virus to other computers, or even delete everything on the hard disk.

Computer viruses are most easily spread by attachments in e-mail messages or by instant messaging messages. Therefore, you must never open an e-mail attachment unless you know who sent the message or unless you are expecting the e-mail attachment. Computer viruses can be disguised as attachments of funny images, greeting cards, or audio and video files. Computer viruses also spread by using downloads on the Internet. Computer viruses can be hidden in pirated software or in other files or programs that you may download.

IMB Computers

the computer that are manufacture by IMB are called  IMB computers. although IMB's launch of the personal computer (IMB5150) in 1981 set the indeustry standerd for personal computing, IMB had introduced a variety of small computers for individual users several years before that . So while now is certainly an appropriate moment to salute the legendary IMB PC on its 28th birthday.

             

introduction of basic programming

you have been learning the computer as subject right from the early classes. you know, how to use ans hanndle your machine and you have the concepts oe programs. however, have you ever thought how these propgrams exist? and why? these prigrams instruct the hardware and help you solve your problems in many respects. the programs are written using various programming languages by programmers and software engineersa.

Usage of computer

as we have discussed earlier how computers are used in various fileds some of the major computers application filed are listed below.
1.education
2.an aid to management
3.Banking
4.industrial application
5.Engineering Design
6.Meteology
7.Travel
8.Tourism
9.Electronic Commerce
10Medicine

Monday, 5 September 2011

Dell Inspiron Zino IZHD-2264NBK HD Desktop


The Dell Inspiron Zino IZHD-2264NBK comes to replace the large desktop PC, its has measures only 7.8″ (H) x 7.8″ (W) x 3.4″ (D) and weights just 1.6kg. It’s is perfect for places where a normal desktop PC just doesn’t fit.
The Dell Inspiron Zino IZHD-2264NBK HD Desktop equipped with incredible features include up to 4GB of installed DDR3 RAM, slot load 8X DVD burner, powered with 1.6GHz AMD Athlon 2650e CPU, 640GB hard drive, 2.1-channel Audio, an ATI Radeon HD3200 graphics processor, and runs Windows 7 Home Premium OS (64-bit version).
Perfect for any where in your home, Dell Inspiron Zino IZHD-2264NBK is also include 2.1 High Definition Audio support, a HDMI and two eSATA ports, two USB 2.0 connectivity, VGA, 4-in-1 memory card reader, 802.11b/g wireless card from Dell, and an Ethernet LAN connector.


ASUS EB1020-B0020 Mini Desktop with HDMI Socket

ASUS has just revealed a new addition to its compact computer which know as the ASUS EB1020-B0020 Mini Desktop PC. This space saving machine comes with dimensions are only 8.8 x 7 x 1.1 (LxWxH) inches and weights just 2.6 pounds make it can fits nicely in any room
Continue Reading »

Mouse Computer Nextgear i740 Platinum Powerful Laptop (Silver)

Mouse Computer is about to release its new powerful laptop in Silver color designed, namely the Mouse Computer Nextgear i740 Platinum. This new computer is an ideal for powerful portable computing that it’s equipped with 15.6-inch widescreen display with Full HD (1920×1080) picture resolution Continue Reading »
Mouse Computer Nextgear i740 Platinum Powerful Laptop (Silver)


ASUS add Eee PC Seashell 1016PT-BU37-BK to its catalog Read more: http://techngear.com/asus-eee-pc-seashell-1016pt-bu37-bk-features.html#ixzz1JfK0MXhL


 ASUS has done as expected today by release the Eee PC Seashell 1016PT-BU37-BK Netbook in the US market. In case you didn’t know, this new netbook is powered with a lot of enhanced features including a 10.1-Inch Matte WSVGA LED display with 1024X600 pixel resolution, pre-loaded with Windows 7 Professional (32 bit) operating system, 250GB hard drive, and 2 GB DDR3 RAM.
The ASUS Eee PC Seashell 1016PT-BU37-BK Netbook in black color has measures 10.3 x 7 x 1.4 inches and weights 2.8 pounds. It’s available for shipping since April 24, 2011 with price of $475.29. The netbook is an ideal for those who are on the go, because it’s comes with 56W/h battery that provide up to 11 Hours battery life.


Soundfreaq SFQ-02RB Bluetooth Wireless Audio System

Soundfreaq has kicked off on May 26, 2011 their new Bluetooth Wireless Audio System, namely the Soundfreaq SFQ-02RB. The Soundfreaq SFQ-02RB has dimensions are 13 x 4.4 x 3.6 inches and weights 3.1 pounds. It’s support to Android, iPad, Blackberry iPhone, and more. Continue Reading »
Soundfreaq SFQ-02RB Bluetooth Wireless Audio System

Westinghouse LD-2680 and LD-4258 Edge-Lit LCD HDTVs

Westinghouse has just kicked off its new LED-backlit HDTVs, available in two different model including the LD-2680 (26-inch) and the LD-4258 (42-inch). These TV are features Edge-Lit LCD panel with Full HD 1920×1080 picture resolution, SRS TruSurround HD sound system Continue Reading »
Westinghouse LD-2680 and LD-4258 Edge-Lit LCD HDTVs

Sunday, 4 September 2011

Tucano Easy sleeve PC netbook case


Tucano Easy Sleeve PCThe go-anywhere nature of your netbook means you’re likely to take with you, well, anywhere. This means you’ll be needing a case of some sort to keep it looking fresh, and few are neater or more convenient than Tucano’s Easy sleeve PC slip case.
Available from PC World stores, and online from www.pcworld.co.uk, the Tucano netbook sleeve is designed to accomodate both 7 and 9-inch netbooks - specifically Asus' Eee PC. Constructed from tactile and stylish neoprene-like material, it’s little larger than a netbook itself, offering protection without hindering mobility.
You’ll find two zippers, making it easy to open in an instant, a padded finish that protects against knocks and, at £15, the Easy sleeve PC case is a must-have for those who cherish their netbooks.
Tucano Easy Sleeve PC
For more information, visit PC World.

How to Avoid the Wireless Risk Factors

Here are some simple steps to help you avoid these risks:

1. Turn off your wireless ad hoc mode, and don’t connect to other ad hoc networks, unless you have a very good reason to do so — perhaps to exchange information among trusted people in a secure meeting room. The rule of thumb, however, should be: don’t use ad hoc networks!

2. Before connecting to your corporate wired network, disable your wireless card, or check that your wireless NIC isn’t in ad hoc mode and isn’t connected to any wireless network.

3. Ask your IT department for the corporate wireless usage policy, and adhere to it. The policies are intended to protect corporate information and all mobile users share that responsibility.
And here are some things IT departments can do to ensure secure and manageable wireless computing:

4. Don’t look at wireless as a separate island of technology; it is an integral part of your enterprise.

5. Enterprise IT management must include the security and management of wireless end-devices — both in connected and disconnected modes.

6. Utilise a comprehensive enterprise management solution that provides automatic policy enforcement across wired and wireless systems.

Network connectivity will continue to be a hybrid of wired and wireless. Adhering to best practices will help secure our devices and prevent corporate information from being compromised. So, the next time you connect to a Wi-Fi network, make sure you’ve taken care of the hidden risks before you launch into the wireless cyberspace.

Tips to know more about Internet Hackers



Researchers uncovered a serious flaw in the underlying technology for nearly all Internet traffic, a discovery that led to an urgent and secretive international effort to prevent global disruptions of web surfing, e-mails and instant messages. The British government announced the vulnerability in core Internet technology on Tuesday. Left unaddressed, experts said, it could allow hackers to knock computers offline and broadly disrupt vital traffic-directing devices, called routers, that coordinate the flow of data among distant groups of computers.“Exploitation of this vulnerability could have affected the glue that holds the Internet together,’’ said Roger Cumming, director for England’s National Infrastructure Security Coordination Centre.
The Homeland Security Department issued its own cyberalert hours later that attacks “could affect a large segment of the Internet community.’’ It said normal Internet operations probably would resume after such attacks stopped. Experts said there were no reports of attacks using this technique. The risk was similar to Internet users “running naked through the jungle, which didn’t matter until somebody released some tigers,’’ said Paul Vixie of the Internet Systems Consortium Inc. “It’s a significant risk,’’ Vixie said. “The larger Internet providers are jumping on this big time. It’s really important this just gets fixed before the bad guys start exploiting it for fun and recognition.’’ The flaw affecting the Internet’s “transmission control protocol,’’ or TCP, was discovered late last year by a computer researcher in Milwaukee. Paul Watson said he identified a method to reliably trick personal computers and routers into shutting down electronic conversations by resetting the machines remotely.
Experts previously said such attacks could take between four years and 142 years to succeed because they require guessing a rotating number from roughly four billion possible combinations. Watson said he can guess the proper number with as few as four attempts, which can be accomplished within seconds. Routers continually exchange important updates about the most efficient traffic routes between large networks. Continued successful attacks against routers can cause them to go into a standby mode, known as “dampening,’’ that can persist for hours. Cisco Systems Inc., which acknowledged its popular routers were among those vulnerable, distributed software repairs and tips to otherwise protect large corporate customers.

Touch Screen Laptop HP Pavilion tx1000

Touch Screen Laptop HP Pavilion tx1000
The HP Pavilion tx1000 Entertainment Notebook PC brings a new personal mobile computing experience with a ‘twist & touch’ screen display. The most innovative design enables you to enjoy the best entertainment and productivity experience. The Following features will enough to bring HP tx1000 into top level Notebook series.

• AMD Turion™ 64 X2 Dual Core Mobile technology will give maximum perfomance to multi-media applications for a more enjoyable entertainment experience. It accelerates current applications witTouch Screen Laptop HP Pavilion tx1000h HyperTransport™ Technology, for faster response and greater agility.

• Genuine Windows Vista for superior digital entertainment and advanced features

• HP BrightScreen technology. 12.1-inch touchscreen display. Enjoy bright, sharp images and crisp video clips.

• Protect your Laptop and data from unauthorize access with the built-in biometric scanner. Scan and register your fingerprint so only you may have access to the computer. Log on to email, banking or any password protected websites.

Twitter Delicious Facebook Digg Stumbleupon Favorites More

 
Design by Free WordPress Themes | Bloggerized by Lasantha - Premium Blogger Themes | belt buckles