Showing posts with label Computer. Show all posts
Showing posts with label Computer. Show all posts

Computer Crime

Computer Crime
Crimes against computers can pose a threat because it is an irresponsible act of a small group of computer users and one can take advantage in these causes the.
• Computer Crime in the field of law
In an opening of the law say that the crime involves acces kompuetr of important documents in the computer (used by the federal government) or operation.
• Examples - examples of computer crime
1. Theft of money
2. Computer virus
3. Service theft
4. Theft of data in the program
5. Increase the program
6. Changing the data
7. Destruction program
8. Destruction of data
9. Violation of freedom
10. Loss of credit infringement laws - laws or international hukun
• Information systems and computer crime
Crimes against computers and computer criminals is a major challenge to the development of information systems. Development of the system, as well as accounting systems must be memggunakan ways of controlling and negotiated before the system is built and maintain the security system

Computer,

Computers are tools used to process the information according to procedures that have been formulated. Word computer originally used to describe people who perkerjaannya perform arithmetic calculations, with or without a walker, but the meaning of this word is then transferred to the machine itself. Originally, the processing of information is almost exclusively related to arithmetical problems, but modern computers are used for many tasks unrelated to mathematics.
In such a definition there are tools such as slide rules, mechanical calculators types ranging from abacus and so on, until all the contemporary electronic computers. The term better suited for a broad sense such as "computer" is "that process information" or "information processing systems."

Definition

Nevertheless, the above definition includes many specialized tools that can only account for one or several functions. When considering modern computers, their most important properties that distinguish them from earlier computing devices is that, with proper programming, all computers can emulate the behavior of any kind (though perhaps limited by storage capacity and speed are different), and, indeed believed that the machine can now mimic the computing devices we invent the future (though undoubtedly more slowly). In a sense, these limits is a useful test for the computer to recognize "common purpose" of special-purpose devices early. The definition of "general intent" can be formulated into a requirement that a machine must be able to emulate a universal Turing machine. Machines that this definition is known as a Turing-complete, and that they first appeared in 1940 in the midst of developments around the world. See the history of computing article for more details of this period.
Embedded Computer
In about 20 years, many household tools, specifically including video game consoles, but also includes cell phones, video cassette recorders, PDAs and many in the household, industrial, automotive, and other electronic devices, all containing the electronic circuits such as computer Turing-complete qualified above (note that the programming of these devices is often directly into a ROM chip that will need to be replaced to change the programming of the machine). Other special purpose computers commonly known as the "microcontroller" or "computer unders" (embedded computer). Therefore, many of which restrict the definition of computers to devices whose primary purpose is processing information, rather than being part of larger systems such as telephones, microwave ovens, or plane, and can be modified for various purposes by the user without any physical modifications. Mainframe computers, minicomputers, and personal computers (PCs) are the main types of computers this definition.
Personal Computers
Finally, many people who are unfamiliar with forms of computers use this term exclusively to refer to a personal computer (PC).
How Computers Work
While the technologies used in digital computers have changed dramatically since the first computers in the 1940s (see History of the hardware count for more detail), most still use the von Neumann architecture proposed in the early 1940s by John von Neumann .
Von Neumann architecture describes a computer with four main sections: Arithmetic and Logic Unit (ALU), control unit, memory, and input and output devices (collectively termed I / O). This section is connected by a wire beam, "bus"
Memory

RAM memory modules
In this system, memory is a sequence of numbered (such as "cell" or "pigeon holes"), each containing a small piece of information. This information may be a command to tell the computer what to do. Cells may contain data that the computer needs to perform a command. Each slot may contain one, and what is now the data may then be a command.
A memory storing various forms of information as binary numbers. The information will not be resolved binary form (encoded) with a number of instructions that turns it into a sequence of numbers or figures. For example: The letter F is stored as a decimal number 70 (or 1,000,110 binary digits) using one method of solving. More complex instructions that can be used to store images, sounds, videos, and various kinds of information. The information can be stored in a single sell is called a byte.
In general, more memory can be rewritten millions of times - it is a scratchpad rather than a tablet of stone.
The size of each cell, and cell numbers, a great change from computer to computer, and the technology used to mebuat memory has changed violently - from electromechanical relays, to a tube filled with mercury (and later springs) in which the acoustic pulse is formed , until the matrix of permanent magnets, to individual transistors, to integrated circuits with millions of transistors on a single silicon chip.
Processing
Central-processing unit or CPU (central processing unit) to process the referral role, carry out and arrange laluan hypothetic menerusi information computer system. Processing unit or device will also communicate with the device input, output and storan to carry out related directives.
File: CPU with pins.jpg
Example of a CPU in packs Ball Grid Array (BGA) is displayed upside down by showing her legs
In the original von Neumann architecture, he explains an Arithmetic and Logic Unit, and a Control Unit. In modern computers, the second unit is located in a single integrated circuit (IC - Integrated Circuit), which is usually called a CPU (Central Processing Unit).
Arithmetic and Logic Unit, or Arithmetic Logic Unit (ALU), is a device that performs basic implementation such as the implementation of arithmetic (addition, subtraction, and the like), the implementation of the logical (AND, OR, NOT), and the implementation of the comparison (for example, compare the contents of two slots for equality). This unit is made "real work".
The control unit stores the current instruction is done by computer, instruct the ALU to perform and retrieving the information (from memory) required to perform it, and move back the results to the appropriate memory location. Once that happens, the control unit goes to the next (usually placed in the next slot, unless the instruction is a jump instruction that tells the computer that the next instruction is placed in another location).
Input and Results
I / O allows the computer to get information from the outside world, and put his work there, can the physical form (hardcopy) or non-physical (softcopy). There is a wide range of I / O, from the familiar keyboards, monitors and disk drives, to the more unusual such as a webcam (web camera, printers, scanners, and so on.
Owned by all the usual input devices is that they encode (convert) information from a variety into the data that can be further processed by a digital computer system. Instrument output, decode the data into information that can be understood by computer users. In this sense, the digital computer system is an example of a data processing system.
Instruction
The commands discussed above are not rich command language is human. The computer has only a limited number of simple commands that well-defined. Common commands that are understood most computers are "copy the contents of cell 123, and place in a cell clone 456", "add the contents of cell 666 to cell 042, and the result in cell 013", and "if the contents of cell 999 are 0, the next command you in cell 345 '.
Instructions are represented within the computer as numbers - code for "copying" may be 001, for example. The particular instruction set that is supported by a particular computer is known as machine language. In practice, people usually do not write instructions for computers directly in machine language but rather use a programming language "high level" which is then translated into machine language automatically by special computer programs (interpreters and compilers). Some programming languages ​​closely related to machine language, such as assembler (low level languages); on the other hand, languages ​​such as Prolog based on abstract principles that are far from actual implementation details of the engine (high-level language)

Architecture
Contemporary computers put the ALU and control unit into a single integrated circuit known as the Central Processing Unit or CPU. Typically, computer memory is placed on top of some small integrated circuits near the CPU. The overwhelming majority of the computer mass is either ancillary systems (eg, to provide electrical power) or I / O.
Some larger computers differ from the above model in one major respect - they have multiple CPUs and control units working simultaneously. Moreover, several computers, used mostly for research purposes and scientific computing, have differed significantly from the above model, but they have found little commercial use.
The function of the computer is actually quite simple in principle. The computer fetches instructions and data from its memory. The instructions are executed, the results are stored, and the next instruction is achieved. Repeat this procedure until the computer is turned off.
Program
The computer program is a huge list of commands for the computer, perhaps with data in the table. Many computer programs contain millions of orders, and many of the commands are executed repeatedly. A [[Personal Computer [PC]] modern public (in 2003) can execute around 2-3 billion instructions per second. Computers do not gain their extraordinary capabilities through the ability to perform complex commands. However, they do millions of simple instructions arranged by clever people, "programmer." "Good programmers develop sets of commands to perform common tasks (for example, draw a dot on the screen) and then make those sets of instructions available to other programmers." Today, most computers seem to do several programs at once. This is usually referred to as multitasking. In fact, the CPU executes instructions from one program, then after a while, the CPU is switched to the second program and do some commands. Small interval of time is often referred to as time slices (time-slice). This raises an imaginary double folding programs are performed simultaneously by giving the CPU time in between courses. This is similar to how the film is a series of lightning just still frame. The operating system is a program that normally controls this time sharing
Operating System
The operating system is a sort of useful pieces of code. As a kind of computer code can be used together by a wide-range of computer programs, after many years, programmers finally menmindahkannya into the operating system.
Operating system, determine which program is run, when, and where the tools (such as memory or I / O) that they use. The operating system also provides services to other programs, such as code (driver) that allows programmers to write programs for a machine without needing to know the details of all electronic devices are connected.
Use of Computers
The first digital computer, the size and cost of large, mostly working on scientific calculations. ENIAC, the U.S. early computer was originally designed to calculate ballistics tables for weapons (artillery), calculate the density of the neutron cross-section to see if the hydrogen bomb would work properly (this calculation, conducted in December 1945 to January 1946 and involves dala in more than one million punch cards, and then show the form under consideration would fail). CSIR Mk I, Australia's first computer, evaluated rainfall patterns for the catchment of the Snowy Mountains, a major hydroelectric generation project. The others are also used in cryptanalysis, for example, the first digital electronic computer, Colossus, built during World War II. However, early visionaries also think that it will allow programming to play chess, moving images and other uses.
The people in government and large corporations also use computers for data collection and automate many tasks previously done by humans - for example, maintain and update accounts and inventory. In the field of education, scientists in various fields began to use computers for their own analysis. Decline in computer prices to make them can be used by smaller organizations. Businesses, organizations, and governments often use very many small computers to accomplish tasks that formerly performed by main frame computers are expensive and bulky. A collection of smaller computers at one site were referred to as a server farm.
With the invention of the microprocessor in the 1970s, became probably produce a very low-cost computers. PCs are becoming popular for many tasks, including keeping books, write and print documents. The calculation of forecasts and other repetitive math with spreadsheets, dealing with e-mail and, the Internet. However, the wide availability of computers and easy customization has seen them used for many other purposes.
Simultaneously, a small computer, usually with programming, began to find their way into other devices such as home appliances, automobiles, airplanes, and industrial equipment. Embedded processors which are controlled behavior of such devices easier, allowing more complex control behavior (for instances, the development of anti-lock brakes in cars). When the twenty-first century begins, most electrical devices, most forms of powered transport, and most factory production lines are controlled by computers. Most engineers predicted that this trend will continue.
The word "Computer"
Over the years there have been several slightly different meanings to the word 'computer', and several different words for things we now usually called a computer.
Eg "computer" once commonly used to mean hiring someone to perform arithmetic calculations, with or without engine assist. According to the Barnhart Concise Dictionary of Etymology, the word is used in English in 1646 as the word for "people who count" and then before 1897 are also to "mechanical calculators". During World War II, the word refers to the U.S. and British women workers whose jobs account for a large war artillery road with such machines.
Charles Babbage designed one of the first calculating machine called the Analytical Engine, but due to technological problems are not built in his lifetime. A variety of simple mechanical devices such as a slide rule kind have also been called a computer. In some cases they were referred to as "analog computer", as they represent numbers by continuous physical quantities rather than in addition to the binary digits are different. What are now called "computers" were once commonly called "digital computers" to distinguish them from these other devices (which are still used in the field of analog signal processing, for example).
In the thinking of another word for computer, it is observed that prices in other languages ​​chosen words do not always have the same literal meaning as the English word. In French for example, the word is "ordinateur", which means roughly "organizer", or "sorting machine". In the Spanish used the word "ordenador", with the same meaning, although in some countries they use anglicism computadora. In Italian, the computer is "calcolatore", a calculator, to emphasize that computational logic behind using such sorting. In Swedish, a computer is called "dator" from "data". Or at least the 1950's, they are called "matematikmaskin" (math engines). In Chinese, a computer is called "lake tien" or an "electric brain". In English, in other words and phrases have been used, such as "data processing machines".
The computer is any equipment / machinery / equipment used to process the intimation / information berpandukan to procedures / directives established.
Preamble
Someone cloning of computer owners need to recognize the computer components are different. Knowledge about the name, form and function fizik computer components cloning will help someone if he's dealing with a problem or when using another computer cloning. This knowledge will also make a person more confident that when using a multimedia computer apatah another computer if it is not often used by him before this. More typical for teachers more for teaching and learning. With that let's dive into the knowledge of the principle components contained in something computer cloning.
Basically, the words mean computer experts think (compute). Experts think the duty to perform mathematical calculation samada with the help of mechanical devices or not. So the estimates converted into a machine. At home, the task of "computer" is just special to the completion of mathematics, but Modern computers are used for various other tasks unrelated to mathematics.
Definition
Computer Takrifan origin, such as those mentioned above, only merangkumi special equipment that may think (compute) a function (single-tasking) or berbilang functions (multi-tasking) that terhad. Had to take some Computer Modern, one of the traits that membezakannya with initial computer is this: if inserted with perisian-perisian (software) appropriate, Modern computers capable to imitate (emulate) any hypothetic. However, this ability is limited by the charge kapasiti storan (hard disk), memory (RAM) and speed of processing (processor). Erti In other words, this capability may be used as a test for computer membezakan "versatile" with the early computer that specialized only for certain work. Computers can also be defined as a system that controls the electronic symbols quickly and precisely and cooked typical to receive, process, store and retrieve the results (output)
See the history of computer development.
Use of Computers
At first, computer electronic digits, with Saiz and his boarding is great, only used for scientific calculation, for the purpose ketenteraan selalunya, for example, ENIAC.
Embedded Computer
In this 20-year period, most home appliances, such as Toys Video Console, so the phone easier than, perakam video tapes, PDAs, and more; wheels of industry, vehicles, and other electronic devices; all of which contain adequate litar a Turing-complete computer. Computers are used in the equipment for a particular function, identified as a "microcontroller" or "Computer unders" (embedded computer). This kind of computer system only serves to process a particular edict our other features.
Computers cloning
Most people recognize the computer as a more general approach for cloning computer.
How Computers work
In digital computer technology has gone through major changes since the first computer in 1940. But most of them still use senibina (architecture) von Neumann, which is reserved by John von Neumann in the early 1940s.
Senibina von Neumann computer stating dibahagi to four main portion: an arithmetic and logic unit (Arithmetic and Logic Unit - ALU), litar guard (control circuitry), memory (memory), and input and output (I / O). All of this portion are connected together by wiring-wiring, which is identified as a "bass".
Memory
In the computer system, memory (memory) is jujukan stanza (numbered byte sequence) (as cells), in which each of them contain adequate grain edict. Notices may be the direction (instruction) to the computer, and each cell stores the data bits that the computer needs to run the landing.
In amnya, memory may be used initially over a million times. He is more of lakaran pad, rather than the stone tablet which should only be written once.
Size of each cell, and bilangannya, differed between one computer to another computer. So also with the memory technology, rather than electromechanical pulsations, so tiub mercury, so the arrangement of the magnetic matrix eternal, so the transistor, and so on litar bersepadu (integrated circuit) which contain adequate millions chip capacitor in the grain (chips).
Processing
Arithmetic and logic unit (ALU), is a tool that implements the principle of operation, such as arithmetic operations (add, reject, multiplication, etc.), logical operations (AND, OR, NOT) and compare operations. This unit actually perform the task in the computer.
Bodyguard unit (Control Unit), supervising slots that hold the direction (instruction) current, so tell the ALU of the operation that needs to be done and to receive notices that need (rather than memory) to carry out such operations. Later he was catapulted back into the position of the operating results of the appropriate memory. After that, the Guard unit will switch to an onward referral.
Input-Output
Input-output unit received notice confirming the computer rather than the outside world, and deliver a decision notice back to the outside world. There are various forms of I / O, rather than the Board kekunci, skrin, Cakera leathery, to an incredible tool, such as webcams.
All equipment (devices) input mengkod (encode) the data so that intimation to be processed by a digital computer system. Instrument (device) output is also menyahkod (decode) to the edicts of computer data that can be understood by computer users.
Referral (Instruction)
Computer is not a referral Referral flower like human language. The computer has only a simple directives that terhad. Referrals usually supported by most computers are like: Copy content of cell 123, and location of copies into 456 cells; add the content of the cell 666 to cell 042, and the location of additional results to 013 cells; if cell 999 are 0, so the direction is in cell 345 .
Directions are represented as numbers (numbers). For example, Kod to "Copy" is probably the 001. Directives set backed by a computer is called Machine Language. In practice, referrals to a computer is usually not written in the form of machine language, but in the form of language Pengaturcaraan Stage High (High Level Programming Language). Language pengaturcaraan kemudiaanya dialihbahasa to Machine Language by using a typical computer program (such as Pengkompil - compiler, or interpreter).
Sesetengah pengaturcaraan language is in a form that is almost a language machine, for example Language Grouper (assembler) - (also known as the Language Stage Low - Low-level language); When sesetengah language using the principle of a far differing with machine operation, eg Prolog.
Senibina (Architecture)
Modern computers put the ALU (arithmetic and logic unit) and the Guard Unit in one litar bersepadu that are recognized as a processing unit Central (Central Processing Unit - CPU). Kebiasaanya, computer memory will litar bersepadu diletak on some small border with the CPU. Other tools in the computer is bekalan power and input-output devices.
Principle functions of a computer is somewhat unclear. Computers welcomes referrals and data rather than memory. Referral later executed, the result is stored, and so the next one also welcome referrals. This procedure is repeated so that the computer was shut down.
Program
The computer program listing is a great landing to be realized by a computer. Most computer programs have millions of referrals, and most instead of directives are carried out repeatedly. An approach for cloning the Modern Computer seeks to carry out more about 2-3 Billion per current directives.
At the present time, most computers attempt to implement more than one program at a time. Keupayaan is called multitasking (multitasking). Although it is rough, as if the computer do the two work well, the CPU actually implement advance directives than one program, then switch to another program at run time for a moment. Term future of this moment is called Hirisan Period (Time Slice). Operating systems are programs that guard the partnership during this period.
Examples of multitasking operating system that justifies is Windows and Unix.
Control system
The main plan: System control
Control system is a system that determines what programs need to be implemented, and what resources (memory or I / O) to be used. Perkhidmatan membekalkan control system (service) to another program, such as cod (driver) that allows pengaturcara write programs for the machine without needing to know more details about the electronic device on a computer system.

Privacy & Trust in the Internet World:
Review Impact of Computers on Society
By: Rev. Adi Setyanto
Abstract
The development of computers connected to the Internet so fast. Almost no side of human life untouched by this Information Highway. Conditions which make us forget the two principal issues that are closely linked and require immediate solutions: protection of privacy and building trust between individuals with computers, people with computers, as well as fellow members of society mediated by the computer. This paper describes relations between the two issues are, and what solutions we might employ to overcome them.
Preliminary
I can still see in our minds, how our society conditions when the Internet has not been so developed. Computer automation of media is just a routine administrative work, a little (or a lot ...?) as entertainment media, data storage, or completing a special kind of design activity. Computer network limited to any office environment only. At that time, we already feel the real benefits of the computer, and may be able to proudly say "my computer is a personal assistant".
At present, in which the demands of society has thus evolved, bringing trends of development of computer networks have a much larger scale than we can imagine ten or fifteen years ago. The number of computers connected to the Internet is becoming so very much. People are starting to form their own community in cyberspace, parallel with their daily lives. Recent developments world of computers and the Internet whenever they are looking to exploit its benefits. In short, the affairs of this one is so important to do, a kind of necessity a day - the day for them.
Aspects of the technology becomes a major consideration so that the social aspects of computing and surfing tend tesisihkan. That is, our society does not have a cultural readiness to face the invasion of value - new value that was not too worried. The lack of anticipation of this gives us two fundamental issues that must be addressed immediately. The problem that the authors believe to have correlation with each other.
First, the issue of privacy becomes increasingly important and in need of protection are proportional. The crucial problem raised is the extent to which the boundaries of individual privacy in the context of space and time and social values ​​which are believed to society, who is entitled to enforce its rules, constraints on protection of privacy in the technological perspective, what condition that renders the privacy of a person / group.
Second, build the 'triangle of trust "between individuals with computers, computers with communities and individuals with society through computer mediation. Despite the constraints of space and time have been resolved by the network claimed the Internet, but in social interaction still needs psychological aspects of each offender, the context of space and time - each, historical aspects and the need for computer and Internet media trustworthiness.
Privacy issues and their Conservation
According to the Standing Committee on Human Rights and the Status of Persons with Dissabilities, privacy is "the core of human values ​​that animate the protection of human dignity and autonomy". Meanwhile, Professor Alan Westin, legal experts and government from the University of Columbia defines privacy as "the right of individuals to determine the personal information that may or may not be known to the public". In historical perspective, the formulation of this limitation still leaves a pretty warm debate. Government as the party put forward a counter reasons - reasons of national security as a justification for the surveillance activities of the dynamics of society and its attribute information attached to it. In line with the government, among the flying businesses also want to benefit as much as possible over information about its customers in return for the services they offer.
Represented by the pro lawyers and people who care about the rights - their rights, taking the point of view of privacy as an intellectual property or private property. This right is equivalent to the rights - the rights of other individuals in the context of democratic countries, such as the right of expression, the right to enjoy a decent life, which in this case can be perceived as well as the right to be alone (the right to be left alone) and to protect the personal interests of the disturbance external, within certain limits. Limits - limits that faint in the arguments both sides bring to the debate on a resolution that is more moderate: the balance between the rights to the circulation of information freely.
Concrete manifestation is the adoption of regulations that protect the privacy rights of individuals. For example, the United States has, among others, the Privacy Act (1974), the Electronic Communications Privacy Act (1986), and the Children's Online Privacy Protection (1994), while the EU has the European Privacy Directive 8 (1998). Significant impact on new privacy protections will be felt when the law became the main reference in the handling of social problems. Consistent law enforcement is meant to bridge the asymmetry of social transactions between (group) of individuals on one side by side - the users of public information on the other side. Their bargaining position will be slightly increased. However, law enforcement alone is not sufficient for business people are still willing to exploit the rights - the rights of individuals who have been protected with individual motives - each. In an actor's perspective, it takes a good intention for it. In terms of society, necessary control mechanisms. Another reason is that the formal law enforcement model is seen as too rigid and long process compared to the movement of such a rapid flow of information. Above constraints - these constraints, present the next strategy: self-regulation.
Self-regulation (self-regulation) is a mechanism handed enforcement of the rules of privacy protection to those who are actually likely to breach the privacy of individuals. The expected effects of its application is rapid response to cases which lead to privacy invasion. In the abstract, this is manifested in the excavation of the code of ethics in business, which reflects how they achieve the defined business objectives. How did they dig up the value - the value of a company that believed and put it into the corporate culture. Concretely, the code of ethics is to be implemented integrally into policy strategic, tactical and operational companies about how they manage information on the society legally and ethically. With the transparency that has characterized the era of information, communities themselves who will oversee the extent to which consistency in implementing the company's code of ethics. Very likely to occur, a company that proved to not be trusted to manage the attribute information held by the public will lose confidence and lead to loss of income.
Almost similar to the legislation, the concept of self-regulation also requires three essential elements: a set of privacy rules derived from practice - fair information management practices, methods of enforcement, as well as independent mechanisms of conflict mediation. In order for the application takes place smoothly, take a few requirements. First, it takes the application of the code of ethics privacy protection together in a business sector, so there is no inequality between firms that can trigger unhealthy competition. Second, the enforcement of privacy standards should be conducted by an independent agency outside the business sector. Finally, disclosure rules and the implementation of the first and second terms for the community.
In general, the code of ethics that can be used to maintain the consistency of the company / organization in protecting their privacy is Praise be to Allaah must:
1. responsible for all personal information they have.
2. know the purpose of collecting and processing information.
3. collect information with the knowledge and permission of the owner (except in certain conditions agreed upon).
4. limit the quantity of information required in executing a number of the above purposes.
5. avoid the use of distorted information with the original intention.
6. store information in the specified time period based on the need to achieve goals.
7. ensure the information is accurate, complete and current.
8. maintain / protect that information with the best - good.
9. is open in the policy and practice.
10. allow the data subject to access his data and convert it when needed.

Computer/Technology Standards of Learning

Computer Technology
Standards of Learning
For Virginia’s Public Schools

June 22, 2005


Board of Education
Commonwealth of Virginia


Computer/Technology Standards of Learning


Introduction

Technology Literate
…to possess technology skills that support learning, personal productivity, decision making, and daily life.
Six-Year Educational Technology Plan for Virginia, 2003-2009

The Computer/Technology Standards of Learning identify and define the progressive development of essential knowledge and skills necessary for students to access, evaluate, use and create information using technology. They provide a framework for technology literacy and demonstrate a progression from physical manipulation skills for the use of technology, to intellectual skills necessary for information use, to skills needed for working responsibly and productively within groups. Computer/technology proficiency is not an end in itself, but lays the foundation for continuous learning. The focus is on learning using technology rather than learning about technology.

To become technologically proficient, the student must develop the skills through integrated activities in all content areas K-12, rather than through one specific course. These skills should be introduced and refined collaboratively by all K-12 teachers as an integral part of the learning process. Teachers can use these standards as guidelines for planning technology-based activities in which students achieve success in learning, communication, and prepare them to meet the challenges of today’s technology-rich world of work.




Computer/Technology Standards of Learning

Grades K-2

Basic Operations and Concepts
C/T K-2.1 The student will demonstrate knowledge of the nature and operation of technology systems.
• Identify the computer as a machine that helps people at school, work, and play.
• Use technology to demonstrate the ability to perform a variety of tasks; among them turning on and off a computer, starting and closing programs, saving work, creating folders, using pull-down menus, closing windows, dragging objects, and responding to commands.

C/T K-2.2 The student will demonstrate proficiency in the use of technology.
• Demonstrate the use of mouse, keyboard, printer, multimedia devices, and earphones.
• Use multimedia resources such as interactive books and software with graphical interfaces.

Social and Ethical Issues
C/T K-2.3 The student will practice responsible use of technology systems, information, and software.
• Know the school’s rules for using computers.
• Understand the importance of protecting personal information or passwords.
• Understand the basic principles of the ownership of ideas.

C/T K-2.4 The student will use technology responsibly.
• Demonstrate respect for the rights of others while using computers.
• Understand the responsible use of equipment and resources.

Technology Research Tools
C/T K-2.5 The student will use technology to locate, evaluate, and collect information from a variety of sources.
• Identify information in various formats.
• Identify available sources of information.

Computer/Technology Standards of Learning


Problem-solving and Decision-making Tools
C/T K-2.6 The student will use technology resources for solving problems and making informed decisions.
• Recognize that technology can be used to solve problems and make informed decisions.
• Identify and select technologies to address problems.

Technology Communication Tools
C/T K-2.7 The student will use a variety of media and formats to communicate information and ideas effectively to multiple audiences.
• Identify the best tool to communicate information.
• Use technology tools for individual writing, communication, and publishing activities.
• Demonstrate the ability to create, save, retrieve, and print document.


Computer/Technology Standards of Learning


Grades 3-5

Basic Operations and Concepts
C/T 3-5.1 The student will demonstrate knowledge of the nature and operation of technology systems.
• Discuss common uses of computers in their daily life and the advantages and disadvantages those uses provide.
• Communicate about basic technology components with appropriate terminology.

C/T 3-5.2 The student will demonstrate proficiency in the use of technology.
• Use skills and procedures needed to operate various technologies such as scanners, digital cameras and hand-held computers.
• Identify basic software applications such as word processing, databases, and spreadsheets.

Social and Ethical Issues
C/T 3-5.3 The student will demonstrate knowledge of ethical, cultural, and societal issues related to technology.
• Identify how technology has changed society in areas such as communications, transportation, and the economy.
• Discuss ethical behaviors when using information and technology.

C/T 3-5.4 The student will practice responsible use of technology systems, information, and software.
• Understand the need for the school division’s acceptable use policy.
• Discuss the rationale of fair use and copyright regulations.
• Follow rules for personal safety when using the Internet.

C/T 3-5.5 The student will demonstrate knowledge of technologies that support collaboration, personal pursuits, and productivity.
• Work collaboratively when using technology.
• Practice and communicate respect for people, equipment, and resources.
• Understand how technology expands opportunities for learning.

Technology Research Tools
C/T 3-5.6 The student will use technology to locate, evaluate, and collect information from a variety of sources.
• Collect information from a variety of sources.
• Evaluate the accuracy of electronic information sources.
• Enter data into databases and spreadsheets.

Computer/Technology Standards of Learning



Problem-solving and Decision-making Tools
C/T 3-5.7 The student will use technology resources for solving problems and making informed decisions.
• Determine when technology tools are appropriate to solve a problem and make a decision.
• Select resources to solve problems and make informed decisions.

Technology Communication Tools
C/T 3-5.8 The student will use a variety of media and formats to communicate information and ideas effectively to multiple audiences.
• Produce documents demonstrating the ability to edit, reformat, and integrate various software tools.
• Use technology tools for individual and collaborative writing, communication, and publishing activities.
• Use telecommunication tools to communicate and share information with others.




Computer/Technology Standards of Learning


Grades 6-8

Basic Operations and Concepts
C/T 6-8.1 The student will demonstrate knowledge of the nature and operation of technology systems.
• Describe how technology impacts learning.
• Explore how software and hardware are developed to respond to the changing needs of technology.
• Describe compatibility issues, between various types of technology.

C/T6-8.2 The student will demonstrate proficiency in the use of technology.
• Understand that hardware and software have different operating systems that may affect their use.
• Use self-help features such as online tutorials and manuals to learn to use hardware and software.

Social and Ethical Issues
C/T 6-8.3 The student will demonstrate knowledge of ethical, cultural, and societal issues related to technology.
• Demonstrate knowledge of current changes in information technologies.
• Explain the need for laws and policies to govern technology.
• Explore career opportunities in technology related careers.

C/T 6-8.4 The student will practice responsible use of technology systems, information, and software.
• Demonstrate the correct use of fair use and copyright regulations.
• Demonstrate compliance with the school division’s Acceptable Use Policy and other legal guidelines.

C/T 6-8.5 The student will demonstrate knowledge of technologies that support collaboration, personal pursuits, and productivity.
• Work collaboratively and/or independently when using technology.
• Practice preventative maintenance of equipment, resources, and facilities.
• Explore the potential of the Internet as a means of personal learning and the respectful exchange of ideas and products.


Computer/Technology Standards of Learning


Technology Research Tools
C/T 6-8.6 The student will use technology to locate, evaluate, and collect information from a variety of sources.
• Use databases and spreadsheets to evaluate information.
• Use technology resources such as calculators and data collection probes for gathering information.
• Use Internet and other electronic resources to locate information in real time.

C/T 6-8.7 The student will evaluate and select new information resources and technological innovations based on the appropriateness for specific tasks.
• Use search strategies to retrieve information.
• Evaluate the accuracy, relevance, and appropriateness of electronic information sources.

Problem-solving and Decision-making Tools
C/T 6-8.8 The student will use technology resources for solving problems and making informed decisions.
• Employ technology in the development of strategies for solving problems.
• Use a variety of technologies to identify and provide possible solutions to real-world problems.
• Use content-specific tools, software, and simulations such as environmental probes, graphic calculators, exploratory environments, and web tools.
• Participate in collaborative problem-solving activities.
• Select and use appropriate tools and technology resources to accomplish a variety of tasks.

Technology Communication Tools
C/T 6-8.9 The student will use a variety of media and formats to communicate information and ideas effectively to multiple audiences.
• Choose the appropriate tool, format, and style to communicate information.
• Independently use technology tools to create and communicate for individual and/or collaborative projects.
• Produce documents demonstrating the ability to edit, reformat, and integrate various software tools.





Computer/Technology Standards of Learning


Grades 9-12

Basic Operations and Concepts
C/T 9-12.1 The student will demonstrate knowledge of the nature and operation of technology systems.
• Discuss the inherent advantages and limitations of technology.
• Define the relationship between infrastructure, electronic resources, and connectivity.
• Identify and describe the impact of new and emerging technologies and their applications.

C/T 9-12.2 The student will demonstrate proficiency in the use of technology.
• Identify and resolve hardware and software compatibility issues.
• Develop and communicate strategies for solving routine hardware and software problems.

Social and Ethical Issues
C/T 9-12.3 The student will demonstrate knowledge of ethical, cultural, and societal issues related to technology.
• Assess the potential of information and technology to address personal and workplace needs.
• Demonstrate knowledge of electronic crimes such as viruses, pirating, and computer hacking.
• Explore and participate in online communities, and online learning opportunities.
• Identify the role that technology will play in future career opportunities.

C/T 9-12.4 The student will practice responsible use of technology systems, information, and software.
• Adhere to fair use and copyright guidelines.
• Adhere to the school division’s Acceptable Use Policy as well as other state and federal laws.
• Model respect for intellectual property.

C/T 9-12.5 The student will demonstrate knowledge of technologies that support collaboration, personal pursuits, and productivity.
• Respectfully collaborate with peers, experts, and others to contribute to an electronic community of learning.
• Model responsible use and respect for equipment, resources, and facilities.



Computer/Technology Standards of Learning


Technology Research Tools
C/T 9-12.6 The student will use technology to locate, evaluate, and collect information from a variety of sources.
• Integrate databases, spreadsheets, charts, and tables to create reports.
• Use available technological tools to expand and enhance understanding of ideas and concepts.

C/T 9-12.7 The student will evaluate and select new information resources and technological innovations based on the appropriateness for specific tasks.
• Analyze and draw conclusions about the comprehensiveness and bias of electronic information sources.
• Design and implement a variety of search strategies to retrieve electronic information.

Problem-solving and Decision-making Tools
C/T 9-12.8 The student will use technology resources for solving problems and making informed decisions.
• Investigate and apply expert systems, intelligent agents, and simulations in real-world situations.
• Select and apply technology tools for information analysis, problem-solving, and decision-making.
• Use technology resources such as educational software, simulations, and models for problem-solving, and independent learning.
• Produce and disseminate information through collaborative problem-solving activities.

Technology Communication Tools
C/T 9-12.9 The student will use a variety of media and formats to communicate information and ideas effectively to multiple audiences.
• Determine the most effective tool, format, and style to communicate to specific audiences.
• Use technology-based options, including distance and distributed education, to collaborate, research, publish, and communicate.
• Practice self-directed use of advanced technology tools for communicating with specific audiences.

All You Need To Know About Aluminum Cases For Computers

SilverStone TD01S Aluminium Computer Cooling CaseIf you're a computer enthusiast and you're creating your own machine or shopping for a case for one, you should look into aluminum cases as a good option for protecting your computer while keeping it stylish. There are plenty of things to think about before you decide on the case that's right for your box!
Aluminum is a good choice for a material because it's incredibly strong and durable. You're not likely to break your computer if it's got a metal shield around it. You can find high quality cases that are built out of hand crafted aluminum making them truly excellent pieces. You'll find that your machine will look nice and neat when put inside an aluminum case.
The prices for cases can vary from under $100 to over a few hundred so think about what your budget is before you get excited about something that may be out of your price range. You can get a sleek simple design for cheap if that's all you want, but if you want to go in for fancy features, that's an option as well. Choose your price range before you decide on what you want.
Some of the cases available are designed with specific uses in mind. For example, some put cooling and graphics cards at the top of the list, because those are the most important features for a serious gamer. If you expect your machine to get a lot of use and to heat up, you'll want to make sure you buy something with high quality fans to protect yourself from overheating. If these aren't important characteristics for you then go for something else.
Another obvious factor that you have to consider is how big you want the case to be. Where do you plan on putting it? Make sure that you know how big your computer is, or how big the space you wan to keep it in is. There are cases out there designed to be super compact if going small is important to you. Either way, make sure you get the right size.
Looks matter! Just because you're wrapping up your pride and joy in sheet metal doesn't mean it has to be ugly. There are aluminum cases out there in tons of colors and designs. And if you're particularly proud of your PC's innards, there are designs with clear side panels so you can look in on your creation and everyone can appreciate it as well.
You also want to keep in mind whether you want easy access to your computer. Lots of models have card readers and USB ports positioned on the front; does it matter to you where they are? Do you want the motherboard to slide out easily and conveniently? Ask yourself these questions before you make your purchase.
Aluminum cases for desktop PCs are an excellent investment because you're buying a necessary protective component for your computer. You want to do it right the first time. Choose something you won't mind looking at that's functional as well.
I have even more reviews and information about Desktop PC Cases and aluminum cases at my website. I will also let you in on a little secret: Where to get them cheaper than anyplace else on the web;) Many thanks for reading, and good luck!

A Glance at Computer Firewall Security

Building Internet Firewalls (2nd Edition)We all think about personal computers frequently. We use them throughout the day for different purposes. They're quite basically an important part of our lives like few other machines. Since we utilize them for nearly everything we do in some way or another it's important that our pcs are safe from invasion and attack.
While we use our pcs to store personal information, crucial documents and to make dealings, we are opening ourselves to the potential for having that information stolen or tampered with. Because of the design of our personal computers, it's possible for many who are considered unsuitable to have access to specific services to enter anyway.
So that you can protect against most of these unwanted visitors, there are numerous of things you can do. Essentially the most fundamental way of protecting your computer is using a firewall. Computer firewall security be able to go a long way in keeping uninvited users from info that they may use in the wrong method.
You will find 4 different types of firewall application.
Packet filter- these examine every packet that goes by means of a network and checks whether or not they comply with rules the user has laid out.
Software gateway- these use protection mechanisms on certain applications. It can be useful, but can reduce effectiveness.
Circuit-level gateway- applies protection mechanisms at the time a connection is developed and then enables packets to move without more examination.
Proxy server- this one looks at every message that goes by means of the network plus hides the network addresses.
When you have a firewall of any sort set up, you will know what comes and goes in your network is being inspected, or at least that there's something in place ensuring that not merely anybody can hop in plus send messages that may threaten the safety of the machine and the records it contains.
Checking which computer firewall security software meets your needs or your company is not always so easy. In case you are unsure of what precisely your company wants seek the recommendation of your IT department or hire a personal computer protection consultant that can advise you on what specifically your program needs are and how to be met and the network made as secure as achievable.
If you have your firewall in place, you should make sure that it is doing its job correctly. It is possible to check its effectiveness by giving it a safety test. You'll find these free on the internet. They will check your system and provide feedback on what parts are weak and what upgrades you need to make.
Since our PCs are so essential to our everyday lives we must make sure to protect them with the proper computer firewall security. This really is the best way to make certain that any risks will be stopped in their tracks earlier than they are able to cause any damage to your personal computer.
Get all the facts on Computer Security at http://www.computersecurityfacts.com

Tips on Checking the Computer's Speed

Speed It Up! A Non-Technical Guide for Speeding Up Slow ComputersRun the speed test in determining the current speed capabilities before you are considering upgrading the computer to the higher speed of central processing unit or even switching to the different Internet service provider. Download and also install the third-party speed test program in order to test the processor and also Internet connection speed, or even use the entirely online-based speed test service. Here is more information for you.
For the first step, you can open the web browser and then navigate to the website that usually offers the CPU speed testing program just like "CPU Speed Professional". Access an area of the website that normally hosts the download link and then click on it.
For the second step, you can open the file that you have downloaded and then follow the on-screen instructions in order to install the CPU speed testing program. After that, open the program when you have installed it by double-clicking on the corresponding desktop icon.
For the next step, click on "Show CPU Speed" details on a left side of the windows of program in order to view the make, model and also advertised speed of the central processing unit of your computer. After that, close each other program that is currently open in order to make a test as accurate as possible.
Then, click on "Test CPU Speed" button at the top of a window in order to start the CPU speed testing process.
You need to wait for the test in order to finish and then click on "View Results" button in seeing the speed of the processor is running at.
Checking Internet Connection Speed
In checking the Internet connection speed, you need to open the web browser and then click the navigation bar at the top end of a window. Remember to navigate to the website that will offer the Internet connection speed testing service just like "Speakeasy Speed Test".
After that, close all other programs that are using the Internet connection, just like the instant messengers. Close all extra tabs that you have open in the current web browsing session therefore the speed test will get the accurate results.
Choosing the Server
For the first thing that you have to do in choosing the server is that you have to click on the link for all of the servers that are used by the Internet speed testing website. Then, click on "Start Speed Test" in order to start the first process which will test the download speed of the Internet connection.
After that, you should click on the "Upload Test" when the download speed test has already finished. You need to wait for the upload speed test in order to finish running.
For the last step, it is important for you to click on the "View Speed Test Results" button in order to see the upload and also download speed.
It is important for you to have the wireless cable modem router as it will give you more advantages. There are many choices of this device such as ADSL modem wireless router. It is specially designed to meet your specific needs.

How to Build a Computer?

Most people find it convenient to just walk into a store selling branded computers and purchase one. These computers offer both quality and service at a fairly reasonable price. But they generally have at least one component that is under-spec or outdated. For example, the amount of system memory would be too low, or the hard drive capacity would be less, or perhaps they won't offer an option with a video card suitable for gaming. As such, more-and-more people today prefer to build their own PC from scratch. This gives them complete control over the customization.
How to Select Components?
Selection of components depends upon your specific requirements from the computer you're planning to build. A basic home computer will not need any fancy configuration, while a computer meant for gaming purposes will need an excellent graphics card and extra high-speed RAM. A server will need big hard-drive/s, and audio/video editing would require a high quality sound/graphics card, along with speedy memory and advanced processor.
How to Assemble the Hardware?
Assembling the hardware is what stumps most people. But in truth, it's as easy as plugging in your cell phone for re-charging. Most computer parts are designed in such a way that they fit-in properly in just one way. The slots are notched differently, numbers of pins vary for different components, or they're just color coded. So, as long as unnecessary force is not applied, it doesn't take too long to set it all up without breaking anything.
How to Install the Software?
After the hardware setup, the software installation is a piece of cake, although it does take longer than the assembling part. Operating System, device drivers, application softwares, antivirus program, any games, printers, cameras and all other third party devices are installed.
This might seem like a complex procedure to someone who is not from technical background. But building a computer is not as difficult as most people think it is.
At ewisdomtv, the how-to videos provide complete step-by-step process for building your own computer. From component selection to installation of software, these how-to videos at ewisdomtv give easy-to-follow instructions to build exactly the kind of computer one needs.
Kreesh Smith associate with ewisdomtv; and how-to videos provide complete step-by-step process for building your own computer.

How to Speed Up Your Computer in 3 Easy Ways

Microsoft Windows tends to show a sluggish performance over time. The system takes abnormally long time to boot up and shut down. The response time taken for actions such as opening files and folders or browsing the internet also increases. A hardware upgrade is not always required to increase the speed of your computer; a bit of "spring cleaning" can also help. The following list gives 3 simple ways to speed up your computer.
Disk Cleanup
The Disk Cleanup utility of Microsoft Windows identifies files taking up unnecessary space in your hard drive, and lets you select them for deletion. A clutter-free hard drive shows an increased system performance, especially during internet surfing and burning CDs/DVDs. The various kinds of files scanned by this utility are temporary internet files, downloaded files like JAVA applets and ActiveX controls, windows temporary files (that usually get created during installation of programs) and even the Recycle Bin.
Defrag
The Disk Defragmenter tool is the "re-organization" tool of Microsoft Windows. When files are saved in the hard drive, they are usually fragmented in various small pieces and stored in a non-sequential arrangement within the hard drive. This makes accessing these files slower. The Defrag utility re-organizes all the files in the hard drive such that all fragments are brought together in the correct sequence, and the read/write time is reduced.
Clearing Unwanted Startup Items
Applications, such as games, word processors and media players, need enough RAM (operating memory) to run smoothly. This is one of the most critical resources of a computer and seriously deteriorates performance if overloaded. One of the most effective ways of freeing RAM is to remove all unnecessary startup files that get loaded into this operating memory when the computer starts. This increases both the performance speed as well as the boot-up speed.
A detailed walk-through of the above steps, and also several other ways in which you can speed up your computer, is available on eWisdomtv, in the form of how to videos. These how to videos on eWisdomtv provide a complete visual guide on boosting your system performance, in a manner that even non-technical people can easily follow.
Kreesh Smith associate with eWisdomtv and provided many more how to videos, for complete visual guide on boosting your system performance, in a manner that even non-technical people can easily follow.

4 Easy Ways to Speed Up a Slow Computer

The first one I wish I could do to my own brain sometimes, and that's adding more memory. If your computer is running one of the more recent Windows Operating Systems like Vista or Windows 7, Microsoft recommends 2 gigs of memory as a minimum, but I would try to go at least 4 gigs if only to give yourself a smoother experience. And like a car, it's always nice to have some extra power under the hood to climb any steep hills one may encounter. YouTube will have lots of video on how to add memory if you've never done it before, it's really easy to snap some more in.
The second way to speed up your machine is to clean up your desktop. Think of your computer desktop like your real desktop when you try to find something. Is that document over there under that pile of books? Maybe under last week's Sunday paper with the coffee ring stain on it? Or is it tucked away in one of the drawers? You get the picture. I know some people swear that a messy desk helps them find things faster but your computer isn't one of them. Move all your files to "Documents" or condense them in folders, your computer can find them faster that way. Speed It Up! The Newbie's Guide to Speeding Up Slow Computers and Optimizing Your Internet Connection
Number three. Scan your hard drive with Windows built in Systems File Checking utility. This comes in very handy if your computer isn't running stable and keeps popping up a lot of errors. As your computer ages it collects more and more files that are associated with lots of different functions. Sometimes those associations and files can become corrupted and produce errors. Use System File Checker to run a quick scan and smooth them out. In Vista and Windows 7, go to All Programs-Accessories-Command Prompt - type in "SFC/ScanNow" without the quotes and hit enter. It may take a few minutes to scan but may be well worth it.
And last but not least, scan your computer for Spyware and viruses. They can really slow your computer down by using up lots of memory resources, redirecting your browser to sites you don't want to visit, and causing a host of other unpleasant events. I usually recommend running a couple of different ones just in case one misses something the others find. You can find a whole list of free Spyware removal programs at my site listed below.
May your computer purr like a kitten (so to speak)

The Newest Acer Desktop PC Acer Aspire and Acer Aspire X3 M3

Acer announces new desktop PC is Acer Aspire and Acer Aspire X3 M3 with a space-saving casing. Small form factor is a major advantage Aspire X3 processor and AMD Athlon diotaki II, AMD Phenom II, I3 Intel Core or Intel Pentium E6600 processor and memory up to 4GB of RAM.

Acer Aspire X3

Acer Aspire X3 slim PC is equipped with NVIDIA GeForce or Intel GMA 9200 HD graphics and offers HDMI output. Acer Aspire X3 offers an open PCI Express x16 slot, and some models will have a PCI Express x1 slots.

Acer Aspire M3

On the other hand, M3 is a PC with Aspire microtower casing which is supported by the choice of II or AMD Athlon AMD Phenom II CPU, there are options for ATI graphics HD 5450 or NVIDIA GeForce 9200 graphics. This PC gets hard drives with capacities 640GBe. There is also room for expansion with the availability of two PCI Express x1 slots, a PCI Express slot and an extra bay for optical drives and hard drives. Both Aspire Aspire X3 and M3 prices starting at $ 449.99 or four millions of dollars.

For now the two products have been marketed in the United States. (Source)

How to Make Your Computer Faster

How to make your computer faster ? Computers are wonderful devices that allow us to do many things but things can get rough once the garbage that comes in through our internet connection begins to stop up our system. I have put together a step-by-step PC maintenance procedure for cleaning all of this out.

Follow the steps below and you will see a noticeable improvement in your PC performance. If you're looking to really speed up your PC -- like make your computer twice as fast -- check out Computer Secrets Unleashed. Remember if you run Windows XP, keep the registry clean. Enjoy!

1. Download Microsoft's Anti-Spyware program, Adaware, and Spybot Search and Destroy. Microsoft's program can be downloaded at Microsoft Windows Defender. Adaware can be downloaded at Lavasoft Downloads. Spybot can be downloaded at The Home of Spybot-S&D. All of these programs are free.
2. Install Microsoft's anti-spyware program now, but not the other two.
3. Run MSconfig. To do this, select Start>Run and type msconfig into the space. Select the Startup tab and get rid of all unnecessary programs. The way to determine this is to go to ProcessLibrary.com and check it against their database.
4. Boot into Safe Mode. To do this, restart the computer and press F8 continuously. Select the Safe Mode option from the list and continue to desktop.

Want more tips to improve computer performance?
Try PC Booster

5. Delete any spyware programs from your add/remove. To do this, select Start>Control Panel>Add or Remove Programs. Check all unknown programs against SpywareGuide.com.
6. Locate the temp folder in your computer and delete everything in the folder. This is located, usually, in C:\Documents and Settings\Username\local settings.

7. Still in Safe Mode, install Adaware and Spybot. Run Adaware, Microsoft's anti-spyware and Spybot. Update to the most recent definitions in each program and run them in full scan mode. Microsoft's program cannot be installed in Safe Mode. You have already installed it.
8. Reboot into standard Windows mode.
9. Download HijackThis. You can get this program here Merijn.org. Install and run it. Click Do A System Scan and Save A Logfile. HijackThis will analyze processes that are running on your computer and alert you when there are things running that should not be there. It will also let you know when there are programs running that are not malicious but can safely be gotten rid of because they are not needed.
10. Post the logfile in the Automated Log Analyzer at HijackThis.
11. After determining what's safe and isn't, check appropriate boxes and click Fix Checked.
12. Run the Microsoft Anti-Malicious program, which you can download at the Microsoft Download Center. This program is designed by Microsoft to detect and remove programs whose sole purpose is harming your computer. The technical term for this type of program is a rootkit.
13. Download and run BLBeta Expert. This can be downloaded at F-Secure Blacklight. Make sure to carefully review anything it detects before removing. BlBeta is another program that is designed to get rid of rootkits.
14. For Internet Explorer, click Tools> Internet Options> Security Tab. Click on the Internet Globe icon and select Custom Level. Disable the following:

a. Download Unsigned ActiveX Controls.

b. Initialize And Script ActiveX Controls Not Marked As Safe.

c. Active Scripting.

d. Scripting Of Java Applets.

Also click High Safety under Java Permissions.

If this causes trouble viewing any favorite sites, click the Trusted Sites icon of the Security Tab and use the Sites button to add the URL's of sites that are exempt from these requirements. The purpose of these changes is to tighten the security of your system so that not so many malicious programs make it to your system.

15. For Firefox, type about:config in the address bar. Right click in the window and click New and Integer. In the first box, type privacy.popups.disable_from_plugins. In the second box, type 2. This will prevent Flash popups in Firefox.
16. Open Regedit by clicking Start>Run and type in regedit.
17. Once Regedit is open, click the plus symbol next to the HKEY_CURRENT_USER folder, the plus symbol next to Control Panel, and then click the Desktop folder icon to display its contents. In the right pane, double-click MenuShowDelay to change its value. (This Registry location is referred to as HKEY_CURRENT_USER\CONTROL\PANEL\DESKTOP\MENUSHOWDELAY.) The default Value Data is 400, or 4/10 of a second. Change the Value Data to 0 for the least delay, and click OK. This will make menus appear instantly on your computer instead of having a delay.
18. Open HKEY_LOCAL_MACHINE\SYSTEM\CURRENTCONTROLSET\CONTROL\FILESYSTEM. Right-click Filesystem, select New, and DWORD Value. Rename NewValue#1 on the right-side pane to DisableNTFSLast-AccessUpdate. Double-click this new entry, change the Value Data field from 0 to 1, and then click OK. This disables the constant updating of the dates when a file or folder were last updated. This will speed up the system.
19. Open HKEY_CURRENT_USER\SOFTWARE\MICROSOFT\WINDOWS\CURRENTVERSION\EXPLORER. Create a new DWORD Value called DesktopProcess, and set its Value Data to 1.
20. Expand HKEY_CURRENT_USER, expand Control Panel, and click Desktop. Double-click the AutoEndTasks string and change the value to 1. This causes all of the components of the explorer to run in one process, making your computer faster.

There is a caveat for some users here. Do not make this change if you are not running at least a Pentium processor and 16 MB of physical memory. Dating Blogs.
21. Expand HKEY_LOCAL_MACHINE, expand SOFTWARE, expand Microsoft, expand Windows, and expand CurrentVersion. Right-click Explorer, expand New, click Key, and name the new key AlwaysUnloadDLL. Click AlwaysUnloadDLL, double-click the Default string, and change the value to 1. Windows tries to keep some DLL's in memory when the program uses them. If a user has low memory, this can cause performance issues.
22. Expand HKEY_CURRENT_USER, expand Control Panel, and click Desktop. Double-click the HungAppTimeout string and change the value to 1000. Now, double-click the WaitToKillAppTimeout, string and change the value to 2000. This sets your system up to more efficiently handle application hangups. It also will optimize the amount of time a system takes to close a program when you try to end Windows.
23. Expand HKEY_LOCAL_MACHINE, expand System, expand CurrentControlSet, and click Control. Double-click the WaitToKillServiceTimeout string and change the value to 2000. This optimizes the time that it will take for Windows Services to close when the system is set to shut down.
24. Expand HKEY_CURRENT_USER, expand Control Panel, click Desktop, and double-click the MenuShowDelay string in the right-hand pane. Change the value to 100. This will cause Desktop menus to appear almost instantly.
25. Close regedit.
26. Set Recycle Bin to 1-3 percent of the hard drive space. To do this, right click on the Recycle Bin. Select properties. Move the slider down to the desired amount and click Ok. By default, the Recycle bin takes up too much of your space.
27. To ensure DMA is in use, click Start, right-click My Computer, click Properties, select the Hardware tab, and click Device Manager. Expand the IDE ATA/ATAPI Controllers entry, double-click the entry for the channel where your hard drive is installed (most likely the Primary IDE Channel), and use the Transfer Mode drop-down menu to select DMA If Available if PIO Only mode is selected. Click Ok, reboot, and recheck the setting to make sure it sticks. When this is enabled, it will allow information from your CD/DVD to go straight to memory, bypassing the system processor and speeding up the system.

You should notice markedly increased speeds in your computer. Remember that this is not a "do once and forget it" procedure.

Crud is constantly building up in your computer, so make sure and set up a maintenance plan to keep your computer clean.

It's important to keep your Windows registry clean, and that takes regular computer maintenance. If you can get your windows registry cleaner, you can speed up your PC dramatically. This alone will prevent your computer from running slow.

Reff : howtodothings.com
Are you wondering, "Why is my computer slow? How can I fix my computer?" I'm going to help you figure out how to speed up your computer and solve those slow computer problems once and for all.

Computers are wonderful devices that allow us to do many things but things can get rough once the garbage that comes in through our internet connection begins to stop up our system. I have put together a step-by-step PC maintenance procedure for cleaning all of this out.

Follow the steps below and you will see a noticeable improvement in your PC performance. If you're looking to really speed up your PC -- like make your computer twice as fast -- check out Computer Secrets Unleashed. Remember if you run Windows XP, keep the registry clean. Enjoy!

1. Download Microsoft's Anti-Spyware program, Adaware, and Spybot Search and Destroy. Microsoft's program can be downloaded at Microsoft Windows Defender. Adaware can be downloaded at Lavasoft Downloads. Spybot can be downloaded at The Home of Spybot-S&D. All of these programs are free.
2. Install Microsoft's anti-spyware program now, but not the other two.
3. Run MSconfig. To do this, select Start>Run and type msconfig into the space. Select the Startup tab and get rid of all unnecessary programs. The way to determine this is to go to ProcessLibrary.com and check it against their database.
4. Boot into Safe Mode. To do this, restart the computer and press F8 continuously. Select the Safe Mode option from the list and continue to desktop.

Want more tips to improve computer performance?
Try PC Booster

5. Delete any spyware programs from your add/remove. To do this, select Start>Control Panel>Add or Remove Programs. Check all unknown programs against SpywareGuide.com.
6. Locate the temp folder in your computer and delete everything in the folder. This is located, usually, in C:\Documents and Settings\Username\local settings.

7. Still in Safe Mode, install Adaware and Spybot. Run Adaware, Microsoft's anti-spyware and Spybot. Update to the most recent definitions in each program and run them in full scan mode. Microsoft's program cannot be installed in Safe Mode. You have already installed it.
8. Reboot into standard Windows mode.
9. Download HijackThis. You can get this program here Merijn.org. Install and run it. Click Do A System Scan and Save A Logfile. HijackThis will analyze processes that are running on your computer and alert you when there are things running that should not be there. It will also let you know when there are programs running that are not malicious but can safely be gotten rid of because they are not needed.
10. Post the logfile in the Automated Log Analyzer at HijackThis.
11. After determining what's safe and isn't, check appropriate boxes and click Fix Checked.
12. Run the Microsoft Anti-Malicious program, which you can download at the Microsoft Download Center. This program is designed by Microsoft to detect and remove programs whose sole purpose is harming your computer. The technical term for this type of program is a rootkit.
13. Download and run BLBeta Expert. This can be downloaded at F-Secure Blacklight. Make sure to carefully review anything it detects before removing. BlBeta is another program that is designed to get rid of rootkits.
14. For Internet Explorer, click Tools> Internet Options> Security Tab. Click on the Internet Globe icon and select Custom Level. Disable the following:

a. Download Unsigned ActiveX Controls.

b. Initialize And Script ActiveX Controls Not Marked As Safe.

c. Active Scripting.

d. Scripting Of Java Applets.

Also click High Safety under Java Permissions.

If this causes trouble viewing any favorite sites, click the Trusted Sites icon of the Security Tab and use the Sites button to add the URL's of sites that are exempt from these requirements. The purpose of these changes is to tighten the security of your system so that not so many malicious programs make it to your system.

15. For Firefox, type about:config in the address bar. Right click in the window and click New and Integer. In the first box, type privacy.popups.disable_from_plugins. In the second box, type 2. This will prevent Flash popups in Firefox.
16. Open Regedit by clicking Start>Run and type in regedit.
17. Once Regedit is open, click the plus symbol next to the HKEY_CURRENT_USER folder, the plus symbol next to Control Panel, and then click the Desktop folder icon to display its contents. In the right pane, double-click MenuShowDelay to change its value. (This Registry location is referred to as HKEY_CURRENT_USER\CONTROL\PANEL\DESKTOP\MENUSHOWDELAY.) The default Value Data is 400, or 4/10 of a second. Change the Value Data to 0 for the least delay, and click OK. This will make menus appear instantly on your computer instead of having a delay.
18. Open HKEY_LOCAL_MACHINE\SYSTEM\CURRENTCONTROLSET\CONTROL\FILESYSTEM. Right-click Filesystem, select New, and DWORD Value. Rename NewValue#1 on the right-side pane to DisableNTFSLast-AccessUpdate. Double-click this new entry, change the Value Data field from 0 to 1, and then click OK. This disables the constant updating of the dates when a file or folder were last updated. This will speed up the system.
19. Open HKEY_CURRENT_USER\SOFTWARE\MICROSOFT\WINDOWS\CURRENTVERSION\EXPLORER. Create a new DWORD Value called DesktopProcess, and set its Value Data to 1.
20. Expand HKEY_CURRENT_USER, expand Control Panel, and click Desktop. Double-click the AutoEndTasks string and change the value to 1. This causes all of the components of the explorer to run in one process, making your computer faster.

There is a caveat for some users here. Do not make this change if you are not running at least a Pentium processor and 16 MB of physical memory. Dating Blogs.
21. Expand HKEY_LOCAL_MACHINE, expand SOFTWARE, expand Microsoft, expand Windows, and expand CurrentVersion. Right-click Explorer, expand New, click Key, and name the new key AlwaysUnloadDLL. Click AlwaysUnloadDLL, double-click the Default string, and change the value to 1. Windows tries to keep some DLL's in memory when the program uses them. If a user has low memory, this can cause performance issues.
22. Expand HKEY_CURRENT_USER, expand Control Panel, and click Desktop. Double-click the HungAppTimeout string and change the value to 1000. Now, double-click the WaitToKillAppTimeout, string and change the value to 2000. This sets your system up to more efficiently handle application hangups. It also will optimize the amount of time a system takes to close a program when you try to end Windows.
23. Expand HKEY_LOCAL_MACHINE, expand System, expand CurrentControlSet, and click Control. Double-click the WaitToKillServiceTimeout string and change the value to 2000. This optimizes the time that it will take for Windows Services to close when the system is set to shut down.
24. Expand HKEY_CURRENT_USER, expand Control Panel, click Desktop, and double-click the MenuShowDelay string in the right-hand pane. Change the value to 100. This will cause Desktop menus to appear almost instantly.
25. Close regedit.
26. Set Recycle Bin to 1-3 percent of the hard drive space. To do this, right click on the Recycle Bin. Select properties. Move the slider down to the desired amount and click Ok. By default, the Recycle bin takes up too much of your space.
27. To ensure DMA is in use, click Start, right-click My Computer, click Properties, select the Hardware tab, and click Device Manager. Expand the IDE ATA/ATAPI Controllers entry, double-click the entry for the channel where your hard drive is installed (most likely the Primary IDE Channel), and use the Transfer Mode drop-down menu to select DMA If Available if PIO Only mode is selected. Click Ok, reboot, and recheck the setting to make sure it sticks. When this is enabled, it will allow information from your CD/DVD to go straight to memory, bypassing the system processor and speeding up the system.

You should notice markedly increased speeds in your computer. Remember that this is not a "do once and forget it" procedure.

Crud is constantly building up in your computer, so make sure and set up a maintenance plan to keep your computer clean.

It's important to keep your Windows registry clean, and that takes regular computer maintenance. If you can get your windows registry cleaner, you can speed up your PC dramatically. This alone will prevent your computer from running slow.

Seagate Will Unveil 3 TB Hard Drive 2010

The news is very exciting for the fans when he heard a large capacity hard disk, Seagate plans to launch with the largest capacity hard drive for 2010 is the capacity of 3 TB. This information is obtained from the Register in which this product will be part of Constellation Seagate ES series of enterprise products and interfaces offered with 6Gbit / s SAS.

According to Seagate, Constellation ES series is the replacement of the Barracuda ES series. For now Constellation ES series is the largest capacity 3.5-inch model with 2 TB 7200 rpm.

For version 2.5-inch, maximum ES Constellation is currently planned to be 500 GB and 1 TB version released in June or not there was a rumor also lama.Dan Seagate launches Savvio 2.5-inch drives with a speed of 10,000 rpm and 750 GB capacities.

We live to collect some money to buy the hard drive, okay for storing our favorite films

Computer Introduction

What do you know about computer ? All of you need a computer to finish your working. If you want to learn about definition of computer you can read this article. A computer is a programmable machine that receives input, stores and manipulates data, and provides output in a useful format.

Although mechanical examples of computers have existed through much of recorded human history, the first electronic computers were developed in the mid-20th century (1940–1945). These were the size of a large room, consuming as much power as several hundred modern personal computers (PCs). Modern computers based on integrated circuits are millions to billions of times more capable than the early machines, and occupy a fraction of the space. Simple computers are small enough to fit into small pocket devices, and can be powered by a small battery. Personal computers in their various forms are icons of the Information Age and are what most people think of as "computers". However, the embedded computers found in many devices from MP3 players to fighter aircraft and from toys to industrial robots are the most numerous.

The ability to store and execute lists of instructions called programs makes computers extremely versatile, distinguishing them from calculators. The Church–Turing thesis is a mathematical statement of this versatility: any computer with a certain minimum capability is, in principle, capable of performing the same tasks that any other computer can perform. Therefore computers ranging from a netbook to a supercomputer are all able to perform the same computational tasks, given enough time and storage capacity.

source : www.wikipedia.org

How to Remove and Uninstall Software From Your Computer

One of the tasks that you should regularly undertake is to uninstall software from your computer. Software, especially those that you do not use and that your Internet browser put into your computer, can accumulate on your hard drive and slow down your computer. Surfing the Internet without ample protection will also let malicious code enter your system. You would need to clean your hard drive of unused software every so often to prevent this from happening.

Some people make the mistake of deleting folders from Windows Explorer in an attempt to uninstall software from their computers. This is not the right way to do it because it does not really get rid of the software. Moreover, it might accidentally delete files that the software you have deleted shares with other software, thus hampering the way these other software work.

There are many ways to uninstall software properly, and here is how to do it with the Windows Vista operating system.

Removing Software You Installed

As you use your computer, you would be installing software by yourself, software that you use for work, games that you play, applications for easier communication or file sharing with others online, and other such software. Eventually, you would stop using them when you get tired of them or when they have served their purpose.

You would need to uninstall software that you do not use anymore. To do this, you should go to your computer's Control Panel and open the Programs folder. Click on the name of the software you do not use anymore and then click uninstall.

Removing Browser-Installed Software and Malware
Not all the programs you would find in your computer are applications that have installed by yourself. When you browse the Internet, the websites you visit sometimes install cookies and other tidbits of code in the computer. If the computer is not protected, malicious software may also find their way into your system, causing your computer to breakdown - or worse, steal data from your computer.

To remove software you did not install by yourself, you would need to use Disk Cleanup. You can type "Disk Cleanup" on the search panel of your Windows Start menu, the small circle carrying the Windows logo on the lower left-hand corner of your screen. Find this application by accessing the Administrative Tools folder under the System and Maintenance menu in your Control Panel. Another option would be to download a third-party disk cleaner like CCCleaner.

To remove malware, you can use Windows Defender to scan computer. Also scan computer using protective software that can download for free, such as Spybot Search and Destroy. Also you need to do a deep scan of your registry to fish out malware hiding in there. To do that, you would need a registry cleaner, which you can also download for free.

After uninstall software from your computer, remember to defragment your hard drive. This will close all the gaps created by removing data from your hard drive and keep computer running faster and more smoothly.

This Article is written by John C Arkin from PrinterInkCartridges.PrintCountry the contributor of PrintCountry Articles. More information on the subject is at PrintCountry.com, and related resources can be found at Registry Cleaner.

Article Source: http://EzineArticles.com/?expert=John_C_Arkinn