Computer desktop, monitor, games and how to repair it
Computers Desk
Clean Your Disk Drive of Unnecessary Files and Your Computer’s Performance Will Improve
When it comes to maintaining your computer, you’ve
probably heard it all before. “Run Defrag!” “Scan Your Disk for Errors!”
Although these two activities are important, there’s more you can do to extend the life of your
computer beyond today’s predicted two-year span. In fact, by following the
simple advice below, you can enjoy the use of your computer to up to five years
or more – reserving expenses to simple software upgrades rather then complete
and costly hardware upgrades.
Computer desktop, monitor, games and how to repair it
One of the easiest and least expensive things you can do
to extend the life of your computer is to get rid of unnecessary programs,
folders, and files. A disk drive that’s clogged with unnecessary and unused
files is disk drive that works harder than it has to. Although Window’s defrag
system can ease some of the stress that these files place onto the drive, it
doesn’t do much to get rid of the problem in the first place. This is because
the defrag program simply organizes the files in a system that makes it easier
for the computer to access. (Thus cutting down on the work required to find and
load them). But this method merely “relieves” the symptoms that these files
induce – it doesn’t attack the cause.
These files need to be deleted – not “organized!”
Of
course, deleting files can be a scary adventure to most users. Most computer
users don’t know which files are safe to delete and which aren’t.
The
worst thing anyone could do is snoop around crucial Window directories and
haphazardly delete files that don’t look familiar. Doing so could render
important programs inoperable, corrupt the Windows operating system, and
possibly prevent the computer from even starting. That’s why using special
deletion software is so important. Deletion programs will analyze a computer’s
operating system and installed programs to determine which files are crucial to
computer function versus which files are safe to delete.
You
already have such a program on your computer and it’s Windows’ Add/Remove
Programs (available from the Control Panel). This software will assist you with
deleting programs that you not only no longer want, but additional files that
these program use as well (dynamic link libraries, database files, registry
references, shortcut icons, etc.).
Computers Monitors
But
sometimes Windows’ Add/Remove Programs isn’t enough. Although this software
does a pretty good job of removing unwanted programs, it can leave some files
behind even after a complete uninstall – files which become orphan files. And
it’s these orphan files that can really clutter up a hard drive and shorten the
life of an otherwise, young and robust PC.
Orphans
are usually files that contain temporary data created by a program, files
created by the user, partial files left over from a computer crash, or any
other kind of miscellaneous files created for almost any other reason. The
problem is that an uninstall program doesn’t delete the orphan files it leaves
behind because they were never part of the program when it was first installed.
An uninstall program can remove only the files it placed onto a hard drive
during its install routine.
So
while Windows’ Add/Remove Programs can remove an entire program, you’ll need to
get rid of those pesky little things with a more advance file cleaner like
CleanSweep for example. CleanSweep is a unique program that will specifically
seek out files that are no longer associated with a program, and then ask if
you want to delete them.
The
only time that you wouldn’t want to delete an orphan file is if the file were
an actual document that you created before deleting a program. If you were to
say, uninstall Microsoft Word, all the documents that you created with Word
would then turn into orphan files. Or if you were to uninstall a
graphics-editing program, all the pictures you made with the program would
become orphan files.
The
smart thing to do when you don’t want to lose the data that you created with an
unwanted program is to:
1.
Save
or convert your documents to a format that will work with different program
first (that is, a program that you intend to keep)
2.
Archive
them onto a floppy disk, flash drive, or CD-ROM
3.
Proceed
with a program like CleanSweep.
Using
CleanSweep or any other similar type of utility could delete anywhere from less
than a megabyte of hard drive space to over five megabytes and up. That may
seem like a small amount of “clog material” to you, but to your computer, it’s
a lot less to process!
Working With Computers
In
Today’s Society, There’s No Escape
Well,
we’ve been warned that this time would come – probably from the earlier
eighties on. Yes, computers have finally taken over and if you doubt it, we’re
here to convince you - but not because we want to or because we can. We want to
convince you that if you don’t take the necessary steps to control that reign,
you’re going to be left behind further than you could have ever imagined.
Computers
are everywhere. Take a moment to try and think of a place a business where you
didn’t see a computer in use. From the small local corner store to the largest
hospital, computers are in every gas station, grocery store, bank, restaurant,
beauty shop, and doctor’s office around. From a consumer’s point of view – you
may not think that’s much to worry about. But along with computers, we’ve also
been infiltrated with a little thing called “self-service.” Today, there are
more self-serviced resources than ever and in an effort to synchronize them
with headquarter databases, they’re provided via your inescapable computer.
Conputer Repair
viced through the desktop-clad ATM machine. Gas stations are self-serviced through a menu-clad touch screen kiosk. Most cash registers are Windows XP or Vista machines that send purchase details back to headquarters via the Internet (or a small Intranet). Having your weight, blood pressure, and heart rate measured and recorded is now a digitized process. Even ordering a pizza is now a simple matter of dialing from a wireless cell phone and making a few selections from series of pre-programmed menus!
The
important thing to realize here is that this phenomenon isn’t a new convenience
– it’s a new requirement. And if you haven't jumped onto the binary wagon,
you’re going to face a few problems. For just as this new lifestyle was once
predicted, we’re going to predict that “the old ways” will slowly disappear.
We’re
going to predict that all paper-based transactions (checks, money orders, etc.)
and documentation (think of the old filing cabinet system) will disappear.
We’re going to predict that chips will replace everything that was once
transported from one location to another through the trusty post office. And
we’re going to predict that homes will become less cluttered with stacks of
paper and that our natural resources will flourish as a result of it.
This
all sounds fine and dandy of course, but if you’re not computer savvy, you’re
going to feel a little lost once the choice has past and the revolution is 100%
complete. Fortunately, computer systems are designed in a way that even a child
can manipulate them. In fact, if you can remember that most systems are
designed along the line of menus and the selections of a few options on these
menus, you’ll do just fine no matter how many buttons there are to push.
Computers Desktop
For
example, when you’re faced with an electronic system, look for a main menu.
Most main menus display themselves as soon as a device is turned on, so chances
are that if you’re standing before a device that shows a bunch of choices to do
something, you’re looking at a main menu. The buttons on these main menus of
course take you to additional menus, which in turn give you even more choices
to make. And all of those choices will eventually bring you to the service that
you need. One very important choice you’ll want to keep your eye on is the
option to return to the main menu. This way, you can return to the beginning of
a system and start over in case you get lost among the way.
Another
important choice that you want to keep your eye on is the choice to get help!
This option may not be available on every device that you encounter, but when
it is available, be sure to use it.
There’s
just no way around it. Computers and computerized systems are here to stay.
There’s no need to fear them – but you surely can’t avoid them. Just remember
the menu system and you’ll soon discover that you can approach and use these
things as if you designed them yourself.
Viruses in Computers
What They Are And One Reason Why People Make Them
Over recent years, computers have become synonymous with
viruses and viruses don’t show any signs of disappearing any time soon. In
recent news, LiveScience.com reported that “Before the month is even done,
April has set a record for virus e-mails.”[1]
In the past, we would be comfortable in telling new computer users not to worry
about viruses and that catching a computer virus is rare. Today, that would be
some of the worst advice we could give anyone. As reported in countless news
reports, computer viruses are rampant and they’re extremely worrisome. This
article will describe what viruses are and then point you in the direction of
some rather unique protection and prevention.
In short, a computer virus is a software program
designed to destroy or steal data. It attacks computers via distribution –
often unknowingly – through email attachments, software downloads, and even
some types of advanced web scripting. Viruses that destroy data are known as
Trojan horses, viruses that explode their attacks are called bombs, and viruses
that duplicate themselves are called worms. Some viruses are a combination of
each, however they can be further identified according to where they’re located
on a computer.
A virus originating from the boot sector of a computer
is a boot-sector virus and this nasty devil does its dirty work the moment a
computer is turned on. A virus that attaches itself to (infects) other programs
is a file virus and activates the moment that an infected program starts. File
viruses may also be referred to as parasitic viruses, however should a virus
work from both the boot-sector and from an infected program, the virus is then
known as a multipartite virus.
Computer Games
Here are some examples. Banking is self-ser
Why viruses exist remains a mystery, however we had
privy access to the mind behind a virus programmer who explained his motivation
behind his destructive inclinations. Apparently, this person had a deep grudge
against a popular online service which shall remain unnamed. In this hacker’s mind,
the online service failed to do a quality job in protecting children from
online smut and as retaliation, he created and distributed a virus to as many
file libraries of this service as he could. His intentions were to disable the
computers of the online service’s users so much that they wouldn’t be able to
connect for days. In his mind, the loss of connection meant loss of revenue for
the online service.
Although the malicious code that this person generated
may have worked for a small percentage of users, sufficed to say, the online
service continued on and still exists today. Despite his motivation or
intention, his efforts were null.
We wouldn’t be surprised to learn if other motivations
behind spreading viruses were similar to this person’s, but that doesn’t
justify the damage that viruses do. Innocent people become pawns for the evil
plans of others who’ve convinced themselves they’re doing the “right” thing.
To protect a computer from getting a virus, or clean a
virus from a computer system once infected requires the use of an antivirus
utility. But may be something else we can do. Perhaps we could make an effort
to educate the people who want put viruses into the public about ways to
display dissatisfaction with a service or product that don’t involve harming
innocent parties. In doing so, we just might reduce the number of virus news
stories and protect our own investments at the same time.
File of Computers What’s That File?
An
Introduction to File Extensions
In an
effort to be “user-friendly,” Windows (and perhaps some other operating
systems) hides the most important part of a file name from new computer users:
the extension. Okay – we’re assuming
that the reasoning behind hiding extensions is a “user-friendly” one because we
just can’t come up with any other reason for hiding them. No harm could ever
come from seeing an extension, but plenty could be learned from it. Fortunately
you have this article to guide you through some of the most common extensions
that you’ll run into.
But
before you can see file extensions, you need to turn them on. From Windows
Explorer, click on the “Tools” menu, and select “File Options.” Click the
“View” tab and then uncheck the box next to “Hide file extensions for known
file types.” Click “OK” and you’ll notice that the files in Windows Explorer
show a dot and group of three letters after their names. That dot and group of
three letters is known as an “extension,” and the extension explains what kind
of file it is.
A file
could be a plain text file, an image, a sound, a video, or program. But without
seeing the extension, you wouldn’t know it unless you double-clicked on it. The
following list defines some of the most common extensions that you’ll find on
your computer.
- .au – This extension indicates a sound file. Most sound players will load up and play this kind of file.
- .art - This extension indicates an image file that was compressed with AOL (America Online) technology. Both Internet Explorer and the AOL service software can display this kind of file, however if you don’t have AOL installed on your system, Internet Explorer will display it.
- .avi - This extension indicates a video file playable by most multimedia viewers including Microsoft’s Media Player.
- .bmp - This extension indicates another image file that might have originated from Windows Paint program.
- .dll - This extension indicates a Dynamic Link Library which may contain additional programming code for software. Many different programs often share Dynamic Link Libraries and you’ll find a bunch of them in the Windows/System directory (but don’t ever delete them)!
- .exe - This extension indicates a program or an application like Microsoft Word, Internet Explorer, or Outlook Express. Use extreme caution when downloading .exe files from the Internet since malicious programmers like to hide viruses in these types of files.
- .gif - This extension indicates another image file and it stands for “Graphics Interchange Format.” .Gif files are often smaller than .bmp files (described earlier) and they’re commonly found on Internet web pages.
- .jpg - This extension indicates yet another image file and it stands for “Joint Photographers Experts Group.“ Like the .gif file, it’s commonly found on Internet web pages, however it’s much smaller than both the .gif image and the .bmp image.
- .mid - This extension indicates a sound file created with a Musical Instrument Digital Interface. Windows Media Player will open and run these files, however they don’t sound like normal .wav or .mp3 files (described later). .Mid files are designed to product synthetic sounds using a computer’s sound card.
- .mp3 - This extension indicates a sound file that authentically reproduces voice and/or music. Windows Media Player will open and run this kind of file.
- .scr - This extension indicates a screen saver file.
- .sit - This extension indicates a Macintosh archive StuffIt file. They will not open on a Windows system without a special utility.
- .ttf - This extension indicates a font especially designed for use on a Windows system. It stands for “True Type Font.
- .txt - This extension indicates a plain text file that can be opened with Notepad.
- .wav - This extension indicates a sound file that like the .mp3 file, can be opened with Windows Media Player or Windows Sound Recorder. .Wav files are much larger than .mp3 files.
- .zip - This extension indicates a Windows archive WinZip file. They will not open on a Macintosh system without a special utility.
0 Response to "Computer desktop, monitor, games and how to repair it"
Post a Comment