Category Archives: Computer Parts
Types of Computer Hardware
Types of Computer Hardware
Computer hardware is a physical part of a computer that executes within the hardware. It is unlike computer software or data that can be frequently changed, modified or erased on a computer. Computer hardware is not frequently changed and so is stored in hardware devices such as read only memory (ROM) where it is not readily changed.
Most computer hardware is embedded and so is not visible to normal users. Below are the different types of hardware’s found in a computer.
Motherboard: It is the central or primary circuit board making up a complex electronic system such as a computer. A motherboard is also known as a main board, logic board or system board.
Central processing Unit: A CPU is the main component of a digital computer that interprets instructions and process data in computer programs.
Random Access Memory: A RAM allows the stored data to be accessed in any order. RAM is considered as the main memory of the computer where the working area is used for displaying and manipulating data.
Basic Input Output System: BIOS prepares the software programs to load, execute and control the computer.
Power Supply: Power Supply supplies electrical energy to an output load or group of loads.
Video Display Controller: It converts the logical representation of visual information into a signal that can be used as input for a display medium.
Computer Bus: It is used to transfer data or power between computer components inside a computer or between computers.
CD-ROM drive: It contains data accessible by a computer
Floppy disk: It is a data storage device
Zip Drive: It is a medium capacity removable disk storage system.
Hard Disk: It is a non-volatile data storage system that stores data on a magnetic surface layered unto hard disk platters.
Computer Courses: Do We Really Need Them?
Computer Courses: Do We Really Need Them?
For Seniors This Does Compute
Probably the most prevalent, and perhaps least costly of any training anywhere are computer courses. In fact, computer courses are about the most important courses offered, as they provide skills needed for personal as well as business acumen.
Community colleges, senior centers, community centers, non-profit organizations, high schools, colleges, universities and private for-profit firms all offer computer courses. Many retails and office supply stores, as well as e-merchants, offer computer courses by e-book, POD (print on demand), Web-based training and CD or DVD.
For seniors especially the choice in computer courses is diverse, plentiful and generally low cost. One of the perks of growing old is the right to become part of what is fast becoming a commonplace college affiliated organization – Creative Retirement centers. These are typically cropping up on the campuses of community colleges and state universities and offer computer courses, discounts on standard college courses, senior computer centers, events, trips and get togethers such as meetings, dances and dinners.
The impetus behind these creative retirement facilities and organizations and their computer centers and computer courses was the University of North Carolina and its Asheville campus. The home of the Center for Creative Retirement, UNC Ashville each Memorial Weekend hosts a weekend get-together for seniors or about-to-be-retirees, with a look at the various facilities and housing available locally, the various courses including computer courses offered at the UNC campus club, and a tour of the local area.
The College for Seniors is a program of the North Carolina Center for Creative Retirement, established in 1988. With full access to the resources of the University of North Carolina at Asheville, College for Seniors members keep mentally and physically fit through participation in classes and possibly even teaching a class or two.
College for Seniors draws from members’ experiences and professional expertise as well as from the UNCA faculty to offer four terms each year. Courses range from Chaucer to computers, foreign affairs to opera, yoga to history. Held on the UNCA campus and at community locations, courses are non-credit, with no tests or grades, open to all interested adults. Members collaborate with staff to teach, learn, design curricula and arrange special events. Educational travel opportunities are available. Term-renewable registration entitles members to as many courses as schedules permit.
All College for Seniors students are required to be members of the North Carolina Center for Creative Retirement. This membership allows participation in all Center for Creative Retirement programs and provides a UNCA parking permit, a UNCA identification card, and UNCA library privileges. There are no age limits for College for Seniors courses or Center for Creative Retirement membership.
Examples of computer courses offered as part of College for Seniors include a basic Getting Started with Computers course, Advanced Home Computer, Basic e-mail and Internet access, MS Word training, Excel Spreadsheet basics, and Power Point basics. The only prerequisites for the more advanced of these computer courses are knowledge of the keyboard and mouse, and comfort with the use of both. A basic knowledge of either Windows or Macintosh jargon and menu bar items such as filing, editing, viewing and inserting functions. You should also know commands such as copying, cutting and pasting, and standard and formatting toolbars.
For the beginning computer courses, you don’t even need these rudimentary understandings, though. The computer starter course assumed you’ve never used a computer before, and teaches the senior student how to navigate around the Internet, and how to conduct searches. Windows applications are taught as well in these basic courses. Here the retirees learn how to use word processing to save files, and to create folders. They also learn the basics of sending and receiving e-mail.
Keeping Yourself Business Oriented
Keeping Yourself Business Oriented
For most home businesses, the computer and the
Internet are an integral part of the success or
failure of the business.
However, just like when you are at work, there’s
always the temptation to check your email, talk to
friends online, or play a game when you are not busy.
However, just like at a job that you commute to, this
should be something that should be avoided when you
are working at your home based business.
One way to help avoid doing this is to set up an
account on your computer that is just for your home
based business.
Set up an email that is just business, set up an
instant messenger that is just business, and use the
web browser to just do things that are part of the
business.
The temptation is still there, of course, but if you
start doing this right away you will find that it’s
not so difficult.
The other reason that setting up an account that is
separate for your business is good is because when you
are doing things that are personal on the computer you
will be less likely to work during your ‘off’ hours.
One of the biggest mistakes that people who work from
home make is that they are ‘always’ working. They
never allow themselves time to be ‘off the clock’.
This isn’t something that is healthy, and it’s
something that should be avoided. Having a separate
account on your computer helps to prevent this from
happening.
Related Computer Part Articles
PC Power Supply
PC Power Supply
There comes a day in the life of every pc owner when you must make a decision. Do I fix it, or do I buy a new one? Many people just go out and buy a new one, but I’m not sure that’s a cost effective way to deal with the problem. In other words, you can call me cheap. Last year, my computer started making a disturbing whirling noise, and I was afraid it was on its last leg. We did a little research and figured out it was the power supply. The pc power supply on my computer not only handles the incoming power, it has a fan to keep the computer cool. At times, the fan would stop working, and I knew that wasn’t good.
Once the fan started giving out, I knew I had to either get a new computer or I had to get a new pc power supply. My husband is somewhat good with things like this, but he’s just guessing when he takes something apart. As nervous as I was, I allowed him to open the computer and he cleaned out the fan. While doing this, we noticed the pc power supply was exceptionally easy to remove and replace. The fan worked again for a while, but started to conk out again.
I got on the Internet and looked up pc power supply, and saw that I could find one for under a hundred dollars that could be shipped to my home. Sometimes, the parts to fix a computer cost more than a new one, so I wasn’t sure what the price would be. As you can imagine, I was immensely relieved. We ordered the part and it came three days later. My husband easily installed the new pc power supply, and it has worked like a dream ever since. Best of all, because I work online, the replacement part was a tax write off.
If you hear the fan in your computer acting up, don’t panic too much. It might just be your pc power supply. These are easy to replace, and won’t cost you a lot of money. Just make sure you find out the model number and that you are ordering the correct pc power supply unit for your particular computer. If you don’t think you can replace it, find someone to do it for you. However, let them know you know it is an easy procedure and don’t let them charge you too much to do it. A new pc power supply will give your computer a few more years of life before you have to replace it.
How Computer Forensics Analysts Work
How Computer Forensics Analysts Work
Thanks to television shows most of us already have an idea of what forensics is. Although some scenes are not depicted correctly (examining specimens are more exhausting and mentally draining due to the constant demand for paying attention to details, they don’t look as easy as they are in television with swooping camera angles) they have given us an idea on what they do in collecting evidence.
Computer forensics is part of this investigation. Due to the higher incidence of cyber crimes they are now an essential part of the legal process.
We already have an idea on what they do. However a computer forensics job entails a lot of procedures and expertise. Like any other evidence electronic data can also be fragile and damaged. There are certain steps to be followed to ensure that the data will be collected without being tampered.
A day in the work of a computer forensic analyst
The first thing that an analyst will do is to secure the data and the machine. The data can never be analyzed in the same system that it came from so exact copies are made. Usually the data in a hard drive is duplicated to extract the information needed.
The collection process starts when the analyst examines the surroundings of the machine. Other physical evidence such as notes, disks and printouts are also taken. Photographs of the surroundings are also taken. The area is also examined for portable storage devices.
If the computer system is still operating the information will be collected by examining its applications. Computers that are used for illegal communications may not have all of the data stored in the hard drive. Information stored in Random Access Memory will be lost if the computer is shut down so this step is important.
Open source tools are used to analyze on live computers. Analysts can also obtain an image of mapped drives and encrypted containers while they are on. The data from network connections are captured first, then running applications, and lastly from the Random Access Memory.
The computer is then shut off carefully in a way that it will not loose any data. The method used will depend in the computer and the operating system it uses. If proper shut down is made volatile data can be lost. Pulling the plug is not advisable either because it may corrupt the file system and loose important data.
The analyst then inspects for trap and photographs the configuration of the system. A diagram will also be made including serial number and markings.
The analyst then makes an exact duplicate of the hard drive called Imaging. They often use hard drive duplicators or software imaging tools. This is done in sector levels to make bit-stream copies of ever part that is accessible to the user which can store data.
The original hard drive is then installed with a hardware write protection and sent to a secure storage. After making a complete and accurate copy the duplicated data can now be analyzed for evidence. Analysts use algorithm to make sure that the imaging process is verified. Two algorithms are generally used in this process.
The analyst then renders his opinion then documents everything that was done. A report is made that contains all the findings of the analyst and whether or not it has been used in an illegal activity or criminal act.