HARDWARE & NETWORK

Sunday, November 30, 2008

RUN WINDOWS APPLICATION ON LINUX

RUN WINDOWS APPLICATION ON LINUX

DOWNLOAD WINE THEN INSTALL IT LINUX OPERATING SYSTEM. RUN PROGRAM & THEN INSTALL WINDOWS APPLICATION ON LINUX.

INTERNET EXPLORER BROWSING SPEED

FIRST OPEN IE THEN GO TO

  • TOOLS
  • INTERNET OPTION.
  • ADVANCED OPTION.
  • CLICK SECURITY TAB.
  • "EMPTY TEMPORARY INTERNET FILES FOLDER WHEN BROWSER IS CLOSED" CHECK THIS BOX.
  • THEN RESTART YOUR BROWSER.

ALL IN ONE MESSENGER

IF YOU HAVE MANY ID, LIKE YAHOO,MSN,GOOGLE, & OTHERS. IF YOU USE MESSENGER
ITS VERY DISTRUB TO LOG IN ALL MESSENGER TO CHAT.

BUT THERE IS A SOLUTION FOR YOU...... USE MEEBO FOR EASY.

DOWNLOAD MEEBO THEN INSTALL THEN OPEN TYPE ALL YOUR ID & PASSWORD THEN LOG IN.

VERY EASY TO USE MEEBO.

HOW YOU THAT YOUR PC SAFE FROM VIRUS ?

  • COMPUTER SLOW.
  • FILE TAKES TIME TO START.
  • BAD SECTOR.
  • FILE LOST.
  • RAM & AGP SIZE NOT SHOW.
  • CHANGE DISK LEBEL.
  • SAVE FAILED.
  • COPY FAILED.
  • LESS SPACE FROM HARD DISK.
  • UNKNOWN EXTENSION FILE.
  • RUNNING PROBLEM.
  • REMOVE FOLDER OPTION.
  • PROBLEM WITH KEYBOARD & MOUSE.
  • PC HANG.
  • TASK MANAGER NOT WORKING.
  • CHANGE ICON.
  • AUTO RESTART.

CHANGE MY PROPERTIES INFORMATION

FIRST GO TO c:/windows/system32 & OPEN oeminfo.ini FILE.

TYPE THIS INFORMATION.....

[GENERAL]

Manufacture= type your name as u like.

Model= type as u like.

[Support Information]

Line 1 = type what u like.

Line 2 = type what u like.

Line 3 = type what u like.

Line 4 = type what u like.

Line 5 = type what u like.

Line 6 = type what u like.

WHEN YOU CHANGE YOUR ALL INFORMATION THEN SAVE & QUITE.

BACKUP & RESTORE YOUR G-MAIL MAIL ON COMPUTER

FIRST DOWNLOAD THIS SOFTWARE FROM http://www.gmail-backup.com/ THEN
INSTALL IT.

START THIS SOFTWARE THEN TYPE YOUR GMAIL USERNAME & PASSWORD & LOCATE WHERE THIS BACKUP STORE.

THEN CLICK BACKUP BUTTON IF YOU CHECK THE NEWEST EMAILS ONLY THEN IT WILL DOWNLOAD NEW MAIL.

THANK YOU.

SHORT CUT KEY FOR SCI CALCULATOR

  • F9 = +/-
  • R = 1/x
  • O = cos
  • S = sin
  • T = tan
  • Ctrl+p = M+ (SAVE INFORMATION TO MEMORY)
  • Ctrl+L = MC (REPEAT INFORMATION FROM MEMORY)
  • Ctrl+M = MS
  • ! = n!
  • P = r (PIE)
  • Ctrl+T = TOTAL
  • F3 = REDIAN
  • F2 = DIGREE
  • L = LOG

Fill your Dream

U.S. Department of State
Bureau of Consular Affairs
Electronic Diversity Visa Lottery


Short Cut Key For Microsoft Word

  • Select all = Ctrl+a
  • Copy = Ctrl+c
  • Cut = Ctrl+x
  • Paste = Ctrl+v
  • Print = Ctrl+p
  • Bold = Ctrl+b
  • Underline = Ctrl+u
  • Font Size Big = Ctrl+]
  • Font Size Small= Ctrl+[
  • Save = Ctrl+s
  • Minimize = Ctrl+m
  • Open = Ctrl+o
  • New = Ctrl+n

Thursday, November 27, 2008

Half and Full Duplex Ethernet

Half-duplex Ethernet is defined in the original 802.3 Ehternet; cisco says it uses only one wire pair with a digital signal running in both direction on the wire.

Half-duplex Ethernet-typically 10 BaseT- is only about 30 to 40 percent efficient as cisco sees it because a large 10 Base T network will usually only give you 3 to 4 Mbps at most.

Full Duplex Ehternet is supposed to offer 100 percent efficiency in both directions.

Full-duplex Ethernet can be used in three situtions:-

  • With a connection from a switch to a host.
  • With a connection from a switch to a switch.
  • With a connection from a host to a host using a crossover cable.

Ethernet Networking

Ethernet is a connection media access method that allows all hosts on a network to share the same bandwith of a link. Ethernet networking uses carrier sense multiple access with collision detection(CSMA/CD) a protocol that helps devices share the bandwith evenly without having two devices transmit at the same time on the network medium.

The OSI Reference Model

One of the greatest functions of the OSI(Open Systems Interconnection) Specifications is to assist in data transfer between disparent hosts.

The OSI isnt't a physical model, though. Rather, its a set of guidlines that application developers can use to creat and implement application that run on a network.

The OSI have seven different layers, divided into two groups. The top three layers define how the application within the end stations will communicate with each other and with users.

The bottom four layers define how data is transmitted end to end.

The upper layers:-

  • Application:- Provides a user interface.
  • Presentation:- Present data, Handles processing such as encryption.
  • Session:- Keeps different application data separate.
The lower layers:-

  • Transport:- Provides reliable or unreliable delivery, performs error correction before retransmit.
  • Network:- Provides logical addressing which routers use for path determination.
  • Data Link:- Combines packets into bytes and bytes into frames, performs error detection not correction.
  • Physical:- Moves bits between devices, Specifies voltage,wire speed.

Monday, November 24, 2008

Database Administrator(DBA)

Large proportions of the internal development projects undertaken by business utilities a database management systems. This makes a lot of sense, since tools such as this greatly reduce the time required to implement a large-scale system. Usually a business will select a preffered DBMS and use this for the majority of its systems, including those that are bought is as packages.

System Analyst

A System Analyst is responsible for defining what a system is required to do in order to meet the needs of the business. This role usually requires the analyst to work with potential users and their business managers to elicit and record requirements in the from of a specification that the rest of the team can work with in order to produce the desired system.

Project Manager

A Project Manager takes full responsibility for the delivery of a systems on time.

Development Manager

In many medium sized and larger companies a pool of specialists will undertake all the internal systems development work.

The development function will usually be headed up by a development manager who is responsible for the deployment of all development resources.

Telecommunication or Network Management

  • Wide area Networks(WANs);- for application such as on-line transaction processing, inquiry and response and electronic mail.
  • Local area Networks(LANs);- for work group end user computing.

System Support

This group is responsible for maintaining the hardware and systems software used by the business. They install new hardware, both locally and at any branch offices. They install and maintain systems software such as operating systems, database management systems and software tools.

User Support

user support or IT support is concerned with ensuring that systems continue to deliver effective functionality for user departments. The user support manager will usually be responsible for a help desk, which is a focal point for the reporting of all user-oriented problems.

Operations Management

Operations management is concerned with the use of hardware, software, and personnel resources in the data centre of an organisation. Operational activities that may be involved include data entry, equipment operation, and support. This is a role that can be seen in some very large organisations where IS is still data centre.

Sunday, November 23, 2008

IS MANAGER

An information systems manager or director takes responsibility for the delivery of all information services to the business. He/She will take the lead in defining an information systems strategy for the business so that it can gain a competitive advantage from the most appropriate system.

BUSINESS COMMUNICATION, Q & A

QUESTION 1

Which of the following terms is a method of team development designed to assist the decision making process?

  • Answer:- Brainstorming.

QUESTION 2


What does the acronym ISBN represent?

  • Answer:- International Standard Book Number.
QUESTION 3

Which of the following words is an alternative term for a functional relationship within an organisation?
  • Answer:- Diagonal.
QUESTION 4

What does the abbreviation ISDN stand for?
  • Answer:- Integrated Services Digital Network.
QUESTION 5

Which one of the following might be a barrier to communication?

  • Answer:- Background noise.
QUESTION 6

Which of the following organisational structures emphasises a project team approach?
  • Answer:- Matrix.
QUESTION 7

The informal code of conduct or set of rules that email users are encouraged to follow when sending messages on the Internet is known as which of the following?

  • Answer:- Netiquette