Computers For Beginners PDF
Computers For Beginners PDF
Computers For Beginners PDF
Table of Contents
1. Introduction
2. Buying A Computer
1. Where to Buy
2. Processor
3. Etc.
3. Flat Out Basics
1. Setting Up and Turning on the Computer
2. Free Software
3. Proprietary Software
4. Choosing my system - Priority "freedom"
5. Moving the Mouse
6. Familiarizing yourself with the keyboard
7. Launching and Working with Programs and Windows
8. Gooey GUI
4. More Basics
1. Files
2. Installing Programs
3. Uninstalling Programs
4. Customizing
5. Security
1. Malware
2. Firewall
6. Office Programs
7. Internet
1. The Basics
1. What is the Internet?
2. The Internet and the World Wide Web
2. Web Browsing
3. Choosing a Password
1. Bad Passwords
2. Good Passwords
4. Searching: Getting Here from There
[1]
References
[1] http:/ / en. wikibooks. org/ wiki/ Computers_for_Beginners/ Buying_A_Computer
Choosing a computer
Choosing a computer is not as difficult as one might think. If all you plan to do is surf the
web, send a few e-mails and write someone a letter, any new computer you find for sale will
work well. Currently available computers have more than enough processing power for the
tasks most people use. The more expensive models provide extra performance or software
that you may or may not use. In fact, even computers as old as five years may be more than
adequate for your needs. You can save a bundle by buying a refurbished or used computer
from a big company (like Dell or Gateway) or from a small, local reseller (like Computer
Renaissance -- a franchise/chain). Most people do not realize this!
What you need to get is determined by what you plan to do with your computer. If you don't
plan to play high end games, you don't need a $500 video card, a $1000 top of the line
processor and a $400 hard drive. If you are typing letters to your grandkids there is no way
you can type faster than even the slowest new computers. Consider what you plan to do,
how much you want to spend and chose your computer from there. Don't be the guy who
bought the SLI pc and 30" flat panel display when he just wanted to play pac-man!
There are a few choices you have to make:
Desktop v. laptop
It comes down to a choice between size and price. Desktop computers (those with a tower
case and a separate monitor) offer better value for the money. They are usually cheaper
and faster than laptops. Laptops, on the other hand, are easy to carry from place to place
and can be set-up on any table or your lap (although lap use tends to be discouraged by
manufacturers due to heat issues, and most have gone so far as to discourage the use of the
term "laptop", preferring "notebook" instead). If you need to move your computer from
location to location, or would like to be able to take your computer with you anywhere you
go, spend the extra to get a laptop. An important factor to consider with laptops is that, due
to their compact design, they are also more prone to hardware failure, making an extended
warranty a must. If you just plan to use your computer at your desk at home, save a few
bucks and get a desktop. For computer gaming, desktops are generally considered greatly
superior. Most laptops are oriented for work use. For an idea of how big the difference
typically is, a laptop will generally cost 20-30% more than a comparable desktop.
Optical Drives
Almost all computers come with some sort of Compact Disc drive. With a standard CD drive
you can play music CDs and install software stored on CDs. For a little extra you can get a
drive that will play both CDs and DVDs. That means you can watch movies on your
computer. The next step after that is what is called a recordable CD (CD-R). This allows you
to be able to record your own Compact Discs. You can create music CDs or save data to a
disc for safe keeping. Some CD-R can also play DVDs and are called combo drives. The top
of the line are DVD recorders (DVD-R, DVD+R or DVD-/+R). They can create both read and
write CDs and DVDs. Most home DVD players will play DVDs that you create on your
computer. There are two types of DVD recorders: the +R and the -R. Try to get a recorder
that works with both formats. If one will fit into your budget, get a DVD recorder.
The next big thing in optical media are Blu-Ray discs/ drives. These discs have a large
capacity (upto 50 Gigabytes) and are already available in the markets, although they remain
expensive.
Hard Drives
Hard drives are like big filing cabinets for your computer. Although they are all the same
physical size (except in desktop v. laptop comparison), hard drives come in different
capacities. When it comes to hard drives, bigger is better, within reason. As of early 2005
the bottom end is about a 40GB (gigabytes*). This would allow you to install a quite a few
programs and still have room left for your data. An upgrade to a 60GB or 80GB is a good
idea, to give yourself that little bit extra room. If you plan to do lots of video editing, or
playing lots of games, you might want to go with a 120GB, 160GB or bigger hard drive. If
you start to run out of room for your stuff you can always add a second hard drive later.
Remember, there's no sense in buying a 400GB hard drive if you only surf the Net.
When sorting through HD controllers, SATA150 is better than IDE, SATA 300 is twice as
good as SATA150, and SCSI is best as it allows for drive speeds for up to 15,000 RPMs. Not
to say that you can't make a high end gaming system with IDE. It can be from 40 gb to 500
gb.
Processor
The processor (or CPU) is the brains of the computer; it does all the calculating. Simply put,
faster is better. However, faster is generally more expensive. Unless you plan on playing
the latest games, or doing a lot of video editing, buy a middle of the pack processor. You
can save a few bucks by going with a slower processor, or spend a few extra for a little
more speed. This book recommends that you stay away from the very high end as you spend
a lot more money for only a small increase in performance. For instance, the highest-end
processor in the Pentium 4 line, labeled the "Extreme Edition" (EE), will add $1,000 to the
price of the chip for only about a 10% speed increase.
There are two main CPU manufacturers, Intel and AMD. Competition keeps them fairly
evenly matched. Intel offers the high-end Pentium 4 and the low-end Celeron processors
while AMD has the high-end 64-bit Athlon 64 and Athlon FX lines, and the mid-range and
low-range Athlon and Sempron, respectively. The low-end processors (Celeron and
Sempron) tend to offer 80% of the performance of their big brothers, at about 50% of the
price - although this varies between applications.
RAM (Memory)
RAM, or Random Access Memory, is memory that is not on your hard drive that your
computer uses to store things you have not saved, such as this web page and a document
that you are typing. RAM is much faster than a hard drive- every letter you type would take
about a second if you used just the hard drive. As with most things computer-related, more
is better. This book suggests getting a minimum of 512MB (megabytes) - 1GB (gigabyte) of
RAM. If you have a little extra money, you may want to go with 2048 (more commonly
referred to in most specifications as simply 2GB). Anything over that is a little excessive.
In any case the amount of memory you will need will be dictated by the applications you
will be using. For example, graphics-heavy applications such as Adobe Photoshop will
demand considerably more RAM than text-based software such as email programs and
word processors.
Operating System
Most likely the most essential part of a computer is the operating system. An operating
system is what connects the computer to the applications, or programs you wish to use,
software speaking.
Although Windows is the most popular operating system, this does not necessarily make it
the best. Linux and Mac are much faster, safer, and more reliable, and if it is within your
budget, consider buying a Mac or a installing Linux on a computer with no operating
system, on which to install Linux.
Virus Protection
If you choose to use a Windows computer and you want to use the Internet, you'll be forced
to buy virus protection software. This means, every year, to protect your computer from all
the malicious software that exists on the internet, you need to buy a roughly $50 program
or upgrade of virus protection software. This does not apply to Mac and Linux machines, as
they are secure enough that they do not require virus protection software, although open
source virus protection programs are available.
Video card
Computers aren't very useful if you can't see anything, unless you build a server or other
form of distributed workstation. A video card allows you to see output from the computer.
If you plan to do any 3D gaming whatsoever, you need a graphics card. There are two
main companies who produce graphics card chipsets: ATI and Nvidia. Both make good
graphics cards in all price and performance ranges and you should do more research
before choosing a specific card. Basically, the more expensive cards allow you to play
fancier games. Video cards have their own onboard RAM and have their own processor
known as a Graphics Processing Unit (or GPU). Sometimes, you will find pcs with dual
graphics. This gives the user 2x the power of one card. It will also cost a paltry 500 bucks
more.
If you only want to surf the web, write documents, send and receive email, then
"integrated graphics" are fine and costs much less. Most bargain computers come with
what is known as integrated graphics--very basic graphics built right into the
motherboard.
Brief History
Computers, by our above definition, have been around for thousands of years. One of the
earliest computers, called an abacus, used a series of beads on metal rods, which could be
slid back and forth to add or subtract numbers. This is a very rudimentary device and is not
commonly thought of as a computer in modern times. Our idea of computers involves
electricity and electronics.
Electricity makes computers much more efficient. The first computers used an incredible
amount of electricity, which changed voltages in vacuum tubes in order to operate the
computer. These computers were instructed to calculate by the use of punch cards. These
computers were behemoths, taking up entire floors of buildings. Only the more privileged
universities and government facilities had access to them.
In the 1960's, the vacuum tube was replaced by the integrated circuit and transistor. These
greatly reduced the size and power consumption of computers. These computers where still
very large, but this allowed more institutions to utilize computing power. At the end of
decade, the microchip was invented which reduced the size of the computer even more.
By the end of the 1970's, computer use was widespread in businesses. This involved the use
of a dumb terminal (a keyboard and a monitor attached to a large central computer). Soon,
parts became small enough to allow home users to have a personal computer. Thus the
Personal Computer, or PC, was born.
Since then, PC's have become tremendously more efficient. They are much smaller, and yet
have seen extreme performance gains. In addition to these improvements, computers have
become affordable enough for most American families.
Hardware
Hardware is the stuff you can touch, as opposed to software which is abstract and exists
only in a virtual world as computer code. Hardware is made of materials found in the
universe and are subject to the laws of physics. Contrary to the latter, software is bound
only by the creator's imagination and the user's willingness to believe what the creator
wants them to.
The Insides
Inside the computer case are various components that allow the computer to run.
CPU
The Central Processing Unit, or CPU, contains the brains behind the operation. It is the
main microchip in the computer that distributes tasks to all other parts of the computer.
When most people talk about the processor, or chip, it is actually the CPU they are
referring to.
Memory
Computer memory, more commonly called RAM (Random Access Memory), holds computer
code that needs to be operated on quickly. RAM is plugged into special slots on what is
called the motherboard. It has a large direct expressway (aka CPU bus or Memory bus) to
the CPU, allowing the information held by the memory to quickly interact with the CPU.
RAM size is limited and needs to be constantly cleared and refilled (don't worry; it does this
automatically). RAM is just one part of the computer that determines your speed.
RAM is referred to as "volatile" memory, compared to a hard drive (or a USB "flash" drive)
which has 'non-volatile' memory, meaning that the RAM loses it's memory whenever it loses
power. Non-volatile memory, on the other hand, is semi-permanent, in the same way that
paper is, in that it can be destroyed or erased, but when properly taken care of can last
forever.
Hard Drive
The hard drive is the main storage area in the computer. It is usually where you put your
data to be stored permanently (until you choose to erase it), and it retains data after power
is removed.
Virtually all of your data is stored on your hard drive. A hard drive is composed of disk(s),
where the data is recorded onto the surface, similar to records, CDs, and DVDs. The size of
the hard drive (today's are usually in gigabytes) is determined by how dense (small) the
recording is. Many of today's major programs (such as games, media creating and editing
programs such as Photoshop) and files (such as pictures, music, or video) use a
considerable amount of space. Most low-end computers, as of 2007, are shipped with a
60GB (gigabyte) or larger hard drive. As an example, an average mp3 takes between 7.5
and 15MB (megabyte) of space. A megabyte is 1/1000ths of a gigabyte, thus allowing most
new computers to store thousands of such files.
Users who wish to store a lot of media on a computer will want a larger hard drive, as will
users who want to store numerous programs such as modern games which require a lot of
space. Most video games today are distributed via DVD discs that store data, called
The Peripherals
Peripherals are hardware attached to a computer, but external to the main case that houses
the CPU, Hard drives, and other such equipment. They include your mouse, monitor,
printer, and other devices used by the computer to receive input from the user and return
information after processing.
It is generally a good idea, although not as important as it used to be, to add and remove
hardware from the computer while it is turned off. Things such as USB storage devices and
keyboards/mice can generally be inserted and removed at a whim with no consequence,
however more advanced things such as printers should be installed according to the
manufacturer's instructions, including shutting down your computer.
10
Monitor
The monitor is the main method of giving the computer output, in the same way a book has
pages. A book with all the letters in it, but in a way you can't possible understand or even
see is of no use to you, and the same is true for a computer. While older monitors, CRTs,
were rather bulky like TVs, newer monitors, or LCDs, are much more compact, and easily
lifted by even children.
For much of the history of computers, the most common monitors were CRTs, short for
Cathode Ray Tubes. They work on the same principle as a television. These were generally
heavy, had a lower image quality, and were in general less reliable than an LCD. They come
in two forms, the normal version, which has a curved monitor, and "Flat Screen", where the
display is completely level (although it still has the bulky back end). As CRTs contain
dangerous materials such as lead, you should NEVER attempt to open a CRT monitor by
yourself, and you should NEVER simply toss one in the trash. Look in your area for the
proper channels to dispose of them.
The most common type of monitor today is an LCD, or Liquid Crystal Display, which is
much lighter, although slightly more expensive. They have a smaller form, a higher image
quality, and are overall better than CRT monitors.
11
Printer
If you have a printer attached to your computer you can print your information and keep a
"hard copy". Depending on what type of printer you have, you can print in color,
double-sided, book form. The output quality of some printers goes from draft (to save ink)
all the way to photo quality.
Printers come in all price ranges and in many types. The most common for home use are ink
jets (bubble jets) and laser. There are specialized printers for data plotting (mapping),
photos only, labels and more.
A lot of printers are "all-in-ones" which simply means they combine more than one function.
They can be any combination of printer, copier, fax and scanner. If you are looking to buy
an all-in-one make sure it has all the features you are looking for. You don't want to get it
home and find out you still need a separate fax machine or scanner that you thought was
included!
Software
What is Software?
Software is what allows the computer to run. Think of the computer as a person- even with
strong muscles, sharp eyes, and a brain to rival Einstein, it's not much good if you can't
even think! Software is what almost all people use to input to the computer. Software
makes it much easier for the average person to use a computer, especially without training.
If it weren't for software, you'd have to train for years to be able to even check email, and
when you did check it, you'd wish you'd just gone to the post office!
If you buy a computer from a store, instead of assembling it yourself, they will almost
always include an operating system (usually Microsoft Windows), which will include almost
all of the software the average person will use on a day to day basis. However, you should
be careful to check, as it is not unheard of for a store to sell a computer off with the
perception of it being cheap, only to find out that you cannot run anything on it due to the
lack of an OS!
While most software is designed to be easy to install and use, there will likely be some
programs that will be hard to install (this is much more the case on Linux than on Mac OSX
or Windows XP, and slightly the case with Vista, due to it's being a new OS), and the easiest
way to figure these out is generally to look for the answer on a search engine, such as
google.
12
13
Operating Systems
The major software application on a computer is called the operating system. The operating
system is like the driver of a car. While it might seem like it's only telling the car
(computer) what to do, it is in fact also interfacing with the different parts of it, as well as
taking any new input (say, a map, or instructions on where to go- which equates to other
software) and performing these tasks to the best of it's ability. Although many things are
compatible across platforms, more involved programs, such as photo editing tools and
games, will not work across all platforms, in the same way that if you started giving your
cab driver directions in French, he'd probably tell you to get out, unless you were of course,
in France!
There are three major OS that you should consider using for your first desktop/notebook
PC.
Windows: There are two main branches of this, MS-DOS and Windows NT. Although most
people will not tell you they are running Windows NT, this is actually what Windows XP
and Windows Vista users are doing. MS-DOS OS, The Win9x series, are not in common
use any more. Windows has the advantage of being the most common OS, which means it
is compatible with most software (although users of other OS will say that they have
alternatives which are better). Windows is fairly easy to use, although it is commonly
taunted for using too much of a computer's resources on it's own processes, instead of
what the user is running. Note that almost any computer you buy from a store, unless it's
specifically says it's a mac, will run Windows of some type.
Mac: The second most common OS in desktop systems, Mac OSX is rare compared to
Windows, although not any worse. Macs have been designed to be very easy for people to
use, and are thus a good choice for a first system, as long as you don't mind not having as
many software and games options as windows users. Many Mac users are extremely loyal
to the OS, and it has gained slightly more popularity in recent years, due to the
popularity of the iPod MP3 device, and various other apple products.
Linux: While it is also rare compared to windows, linux does have it's advantages. Linux
is open source, which means that anyone can change the code around and redistribute it
as they want, resulting in many different versions. Though it can be daunting,
distrowatch.com can help the average person decide which version of the OS would be
best for them. There is a wide range of versions, called distros, ranging from one that's
meant to fit on a 50MB business card sized CD to ones that are meant to be easier to use
than windows! Linux can be harder to use than windows at times, especially because it is
almost required that you use the command line at times, however users who are willing
to put in the effort to search for a solution (usually quick and easy) and copy/paste the
answer into the command line will generally appreciate it, with some being as devoted or
more so than the aforementioned mac users! Linux suffers many of the same downfalls as
Mac, however, including a lack of commercial software, especially games. This is slightly
remedied by the large amount of free, open source linux games, and the WINE program,
which can run many windows programs such as games under linux, without having to
emulate Windows OS. While many 'hardcore' gamers are disappointed by the lack of
games, even compared to mac, there are many games which are either native to linux, or
work well enough under WINE that most casual gamers will not have a problem.
Note: If you do want to use Linux, the writer recommends you use Ubuntu [1], which is easy
to use, and has a large and helpful community- at least until you become knowledgeable
14
15
[2]
GUI (Gooey)
Almost all programs that you will be working with will have a GUI or Graphical User
Interface. The GUI is the 'pretty' part of a computer- the windows, buttons, scroll bars, and
task trays. The GUI is really just a front for the command line, which is what does the
actual process and such. While almost all Windows and Mac users do not need to worry
about this, this is important for users of Linux to know, as they will use the command line
for tasks, which either cannot be done or are more efficient to do through the command line
terminal.
Keyboard
The keyboard is used for inputing text into the computer. It is designed so that users can
type all the letters of the alphabet without moving their hands. Many programs from word
processors, media players utilize the keyboard.
The numbers at the right of the keyboard can work in two ways. While in normal mode,
the keys will function as another set of arrow keys, in num lock mode, they will instead
be an alternate way of inputting numbers. This is mainly useful when putting in more
than a few digits at a time, when using the numbers over the letters becomes more of a
hassle than a time saving method.
The keys labeled F1, F2, F3 ... at the top of the keyboard are the "function keys". F1 is
usually assigned as a "help" key, which will open a help dialog when pressed. If you are
having trouble with a program, or just want tips, reading these files can often be useful
or insightful.
"Ctrl" and "Alt" at the bottom means "control" and "alternative". These keys are normally
used to type special symbols or for shortcuts. More on that below.
Windows XP
Booting for the first time
Turn on the computer as described above.
The boring process of booting up will begin. Booting is just starting up the computer.
(Remember to turn on peripherals first!). This may take a few minutes, so be patient. Your
computer is testing itself and running a bunch of internal functions that you'll probably
never have to worry about. You don't care what's happening inside when you turn on your
TV. You just want it on. It's the same with the computer. Just let it do its thing!
If it is the first time booting up the computer running XP operating system, a prompt asking
you to choose a user name and password will appear; you may enter up to five different
users. Note: if you want the computer to just boot up straight into Windows XP every time
you use it, you should create only one user and not enter a password. In Windows XP Home
edition, different users have the same programs installed, but may choose different
backgrounds for their desktop (more on this later), and have different program icons on it
as well; if you have Windows XP Professional, the differences are much fewer. Passwords
should be secure, but not as secure as if it were an online password, as you only need to
prevent people accessing the actual computer itself- make sure if you choose a password
you can remember and write it down, as this is one password you simply cannot afford to
lose. DON'T ever tape your password to a keyboard or other part of your system. That's the
first place everyone looks! There will be some questions that show up on the screen.
Answer them the best you can and if you're not sure, use the default. You may be asked to
activate your software if the installer has not done so. Microsoft requires you to activate
XP. If you don't activate it will quit working and you'll have to install it all over. Activation is
usually done over the internet but can also be done by phone. The number will appear on
the screen. Register it ASAP!
Running Windows XP
Now Windows XP has booted up, hopefully, and is running. You should now be looking at a
rolling green hillside with a blue sky and clouds. This view is called the desktop, which
makes sense. The rolling green hillside is called the background and can be changed to a
variety of pictures installed with Windows XP, or to one you yourself load onto your
computer. You'll probably notice a couple of pictures with words like "AOL Free Trial" or
"Shortcut to...something" beneath them (don't panic if these particular ones aren't present).
These are called icons and are linked to specific actions, usually opening a program (see
below). You can create your own icons, as well as delete ones you do not want. Don't worry,
this will be explained later. The blue bar at the bottom of the screen is called the taskbar.
If you have a program open, it will be represented with a little icon and a name here. On
the far left of the taskbar is a large green button which says START; this is logically known
as the Start menu. If you left click (hereafter simply referred to as "click") it with your
mouse, you will open a menu which contains links to almost everything in your computer
(the first time you ever start Windows XP, the Start menu will automatically be displayed).
On the far right of the taskbar, you will see a notification area known as the system tray. It
contains both temporary and constant notification icons. Right now, it probably has only the
clock and a button with a message, asking you to click it if you want to take the Windows
XP tour. If you are unfamiliar with computers, it is highly recommended that you take the
16
Task Bar
There are a few more things you should know that you can do with the task bar to
customize its appearance and behavior:
1. You can lock it (preventing other alterations listed below)
To check if the task bar is locked, hover the mouse over some part of the task bar not
occupied by an icon, then click the right mouse button. A pop-up menu will appear,
with an item "Lock the Taskbar" on it (among others). It can either have a checkmark
next to it on the left, or not. If there is a check mark, the task bar is locked. If not, then
it's not locked.
17
18
19
20
Scroll Bar
When there is too much stuff in a program to be displayed on the screen, a scroll bar
appears in the right hand side of the window. Using this scroll bar, one can go up or down
through the text or whatever needs scrolling. Scroll bars can also appear on the bottom of a
window to scroll left and right. You scroll by using the following methods:
Click the squares with the arrow icons. Up is for up, and down is for down. Every time
you click the arrows, the bar between them (known as the "scroll bar") goes up or down
automatically.
Click and hold the scroll bar and drag it. Dragging it down scrolls down the text, and
dragging up scrolls up. Release the mouse when finished.
There may be a small wheel on your mouse. This is called a "scroll wheel". It will most
likely be between the two mouse buttons. You can use this to scroll up and down.
The Page Up and Page Down buttons on the keyboard will scroll up and down in large
increments.
The arrow keys on your keyboard can sometimes be used for scrolling.
On some occasions, there will be scroll bars inside of scroll bars. This may be confusing, but
you'll get the hang of it.
Linux
Linux is an operating system, much like Windows is. An operating system, aka "OS", is the
middleman between you and the computer. It creates an environment where the user can
interact with the computer in an efficient manner. It was originally created by Linus
Torvalds, while he was still in college. In its early stages, it was a command interface(that's
where you HAVE to type exactly what you want the computer to do), but now has grown to
a fully featured OS used by Enterprises, Developers, and by the Power-Users at home who
need an OS that can perform in the most rigor environments.
Known worldwide as the core of the Open Source world, Linux's nature is comprised as
"free". Linux is "free" by allowing the average user to observe and make changes to the
source code of Linux as needed. That means if YOU want some kind of special functionality,
YOU can implement it. For that reason, Linux is as diverse as the humans that inhabit the
21
Installing Linux
You can get Linux by downloading it, burning it to a disk, placing it inside your computer,
rebooting it, and following the installation process. Always back up your data and
defragment your disk before installing Linux.
Running Linux
You can either run Linux after installing it or directly from the live disk.
Linux Shortcuts
F1 = help
Gnome
K Desktop (KDE)
References
[1] http:/ / www. Ubuntu. com
[2] http:/ / www. ckls. org/ ~crippel/ computerlab/ tutorials/ mouse/ page1. html
22
File Naming
When there is a file on the computer, it is saved on the hard drive with a name. This name
can be whatever you may desire, but it will have an extension at the end. For example, the
picture of a monkey might be called monkey.png. There may be spaces, dashes, and
underscores in file names. Using any other special characters such as parenthesis and @
symbols is generally a bad idea. Capital Letters can also be used. If you had a band with the
name of Green Pickles and a song called Soup, the name for this song on the computer
could be GreenPickles-Soup.mp3, Green Pickles - Soup.mp3, green_pickles-soup.mp3, or
whatever you want.
There will also be times when files don't have an extension. Those are mostly text files or
executable files which will be explained.
23
Open Notepad.
Type "Hello, I am practicing my computer skills" or whatever you want to type.
Click on File -> Save As
Navigate to C:\YourName\ and call the text file practice.txt.
Open My Computer or Windows Explorer.
Go to C:\YourName\
You will see that there is a file called practice.txt.
Double click on it.
24
Shortcuts
A shortcut is a file that leads to another file or a website. There main use is for the desktop
(The screen behind all the windows. Icons are on the desktop).
Here is one way to use a shortcut.
1. Right click on the desktop.
2. Click New -> Shortcut
3. A wizard will come up.
4. Make the shortcut name "Notepad" and the link location
C:\WINDOWS\system32\notepad.exe.
With this shortcut, you can open Notepad in the click of a button. You may now delete this
shortcut if you think you'll never use it by right clicking on it.
Here is one way to use an Internet shortcut.
1.
2.
3.
4.
5. Make the shortcut name "Never Used A Computer" and the link location http:/ / en.
wikibooks. org/ wiki/ Never_Used_A_Computer/ .
25
Compression
When a file or more than one file is too big, compression can be used. Compression is used
on the internet a lot because it is better to download smaller files. If you've ever seen a file
with a .zip extension, then you have witnessed the most common type of compression in
Windows. There are also compression formats with a .gz, .bz2, or .rar extension.
Extracting
"I got a .zip file from the Internet, now what?" is a common question. The answer is actually
quite simple starting with Windows XP. All you have to do is right click on it in My
Computer or Windows Explorer and choose "Extract All..." A wizard will come up and it is
pretty straightforward. When you click next, it will ask you where to put the files. The
default folder is usually good, but you can change it if necessary. Also, if the file has a
password, click the Password... button and type it in. When you click Next, the files will be
extracted to the directory, and one more thing will come up. It'll be a check box that says
"Show extracted files". It is a good idea to make this unchecked because it'll open up a new
window if you don't, which is annoying.
If you have an older version of Windows or want to be able to extract files other than zip
files, a great option is 7-zip [1]. It works basically the same way as the first method, or you
can use their 7-zip File Manager which should be in the Start Menu.
Compressing
Just like files can be uncompressed, it is also possible to make your own .zip files. The
easiest way to do this is to do these steps.
1. Open up My Computer or Windows Explorer
2. Right click on a file or folder that you want to be compressed.
3. Choose Send To -> Compressed (zipped) Folder
A .zip file with the same name as the original file for folder will be created in the same
directory as the original file or folder.
For example, if there was a file called C:\Ronald\Bacon\BaconBenefits.doc, and you
compressed it, there would now be a file called C:\Ronald\Bacon\BaconBenefits.zip.
BaconBenefits.doc is still there.
4. If you want to add to the archive, right click the .zip file and click Open.
5. You can add more files by copying and pasting them in the new window that opens up.
The same can be done in other programs such as 7-zip, WinZip, and WinRar.
26
Installing Programs
Your computer probably came with some software already on it, but what if you need to do
something fancy? For almost every task you could think of doing with a computer, there is a
software program to let your computer do it.
There are a few types of Programs
Open Source or Free (as in freedom) - software where the source code, the language
programmers use to make computers do their jobs, is available to everyone. Anyone can
change the code and see how it works.
Freeware - Freeware is software you can acquire legally without paying for it.
Shareware - typing is here
Commercial - typing is here
Free-Trial - typing is here
There are also a few ways to install programs
Install from a CD or DVD - You put the disc in the drive and follow instructions. The
defaults will usually work fine.
Install from the internet
You download a file, extract it if it's compressed (.zip, .bz2, .gz, ect.), click on the file
with a .exe extension, and follow instructions.
On a very rare occasion you have to compile a program from source. This can be
tough, but the program will probably have a file called INSTALL that should be read.
Learning is fun, so here's some more useful info. An executable file has either no extension
at all or a .exe extension. When a file is executable, you can run it and it will do something.
For example, the executable for Notepad is C:\WINDOWS\system32\notepad.exe. When you
click on Start -> Accessories -> Notepad, it is really the same thing as going to notepad.exe
in Windows Explorer and double-clicking it.
Uninstalling Programs
Sometimes a program is installed, but you don't want it anymore. Removing unwanted
programs is like eating pie, easy.
1.
2.
3.
4.
27
Customizing
This chapter will not explain every secret and tweak in Windows. What it will do is describe
things that everyone should know in terms of customizing their computing experience to
suite their needs.
Start Menu
Contents
Programs usually put themselves in the Start Menu automatically, but you may find that
there is something that needs to be added or tweaked.
There are two ways to edit what is inside of the start menu. Try the first one, and if that
doesn't work, the second method will work.
Dragging, Dropping, and Right Clicking
Taskbar
Auto-Hide the Taskbar
Have you ever seen someone's desktop and noticed that there is no taskbar, but then when
they put their mouse at the bottom of the screen, it appears? That is called auto-hiding the
taskbar. This is the kind of thing where some people love it and some people hate it. Here's
how to do it.
1.
2.
3.
4.
To make it normal again, do the same thing but this time uncheck the box.
Show Quick Launch
1. Do the first two steps as Auto-Hide the Taskbar.
1. Right click on the taskbar.
2. Click Properties.
2. Check Show Quick Launch.
To deactivate it, do the same thing but this time uncheck the box.
28
References
[1] http:/ / 7-zip. org/
29
Updating
An important part to security is making sure your computer's software is up to date.
Software that is out of date may contain exploits that a cracker or worm (a program that
spreads itself through email) can use to cause harm to your computer. In addition, security
software should be updated in order to be protected against new types of threats. Windows
can be updated through Windows Update or the newer Microsoft Update.
User Privileges
The administrator account should not be used for anything but administration purposes, or
for programs that require administrative privledges. This is because it is too easy for your
computer to become victim of malware, crackers, and viruses while logged onto an
administrators account. This is especially important when performing mundane tasks like
browsing the web, checking your e-mail, or word processing. This is because many of the
programs that hackers and like create require that you be an administrator to execute.
They require writing files to certain directories, and registry keys, that "normal" user do not
have access too. These programs are often hidden within webpages, IM chat windows, word
processing documents, and e-mails. It is a very good idea to create a new user without
administrative privledges to use on a normal basis.
In Windows, a problem often arises when a program needs to have administrative
privledges to run. In this case, you can run the program as administrator. In windows
operating systems, this is done by right clicking the program to run, selecting run as.., and
typing in the administrator accounts information. If that doesn't work, you can always login
to the administrators account to run the program, but be wary of running any other
programs while in that account. Especially programs that access the internet like web
browsers, chat programs, or e-mail programs.
Sometimes, damaging programs can infect non-administrator accounts. If this happens,
these programs are usually limited to the that specific user account. Deleting that user
account usually solves the problem. There are viruses sophisticated enough to infect the
entire computer from a non-administrator account; however, if you keep your computer up
to date with (like using windows update) the security holes are closed and the virus cannot
damage the system.
You wouldn't hand out a key that could open everything in your house to anyone who asked,
so why would you hand out administrative account to anyone? If you really want to protect
your data, do not give out your administrator password or account to untrusted people. If
other people want to use your computer, it is a good idea to create a general guest account
without administrative privledges for them to use. If they use it often, creating a new user
for them is also an option.
30
Physical Access
If a person has physical access to the computer, there are a few measures that can be taken
to prevent damage to the computer. First, change the settings in your computers bios so
that it boots first to the hard drive. Booting from the hard drive first ensures that a person
cannot boot from a bootable media such as a cd-rom or floppy disk. Often bootable media
contains programs that can crack Windows and change the administrators password. As
well, operating system (ex: Windows XP, Linux) installtion disks are bootable and often
have tools that allow users to erase all the information on the computer. NOTE: Do not
EVER go into BIOS if you are not 100% sure of what you are doing. Ask someone who has
extensive knowledge to help you.
Next, make it so a user needs a password to change the bios settings, this prevents
someone from changing the boot order and thus booting from a cd-rom or floppy disk drive.
Last, put a lock on the computer case preventing someone from opening the computer case
and resetting the jumper on the motherboard that clears the bios boot password.
Malware
Malware is a class of software, which usually does harm to a computer, and is unwanted on
the computer by its owner. Malware includes viruses, spyware, adware, and trojans.
Anti-Virus
There are some people who spend their free time writing viruses, programs that do bad
things to computers. The threat of getting a virus is high in the digital age of today
especially if you are using the Windows operating system. In order to protect your files and
everything on your computer, an anti-virus program should be obtained. Anti-virus software
is dependent on definitions. Worms can spread through the internet faster than anti-virus
makers can make definitions for them, so you should not protect your self with only
anti-virus software.
Here are some good ones:
AVG Antivirus [1] - This is an outstanding free anti-virus program. It is free for personal
use only. A more advanced, professional version is available for purchase as well.
Norton Anti-Virus [2] - This is probably the most popular commercial anti-virus. A good
choice.
McAfee VirusScan [3] - A competitor to Norton Anti-Virus. This one is also a good choice.
NOD32 [4] - This is one of the top anti-virus scanners based on tests conducted by ISCA
Labs [5]. Although it isn't as well known as Norton and McAfee, it still provides an
excellent degree of protection along with a faster scanning rate than most other
Anti-Virus applications.
TrendMicro PC-Cillin [6] - This is also a good choice and has been around for many years.
Make sure that you set up your anti-virus program to update its virus definitions at least
every week, or you'll get lost in the dust. If possible set up your anti-virus program to
update every day because new viruses are always emerging. To get an idea of how quickly
things change you can look at any of the sites listed above and they will list the current top
virus threats.
31
32
Worms
Worms are a type of virus that spread automatically through the internet, through exploits
in a running service. Examples are Nimda and Msblaster. These can easily be blocked using
a firewall, or making sure the services and your Operating System are up-to-date. Doing
these can be especially important, because worms can spread faster than anti-virus
software can be created, and often don't need any use interaction in order to install.
[7]
Ares
Azureus
BitTorrent (watch out for "rigged" distributions however)
eMule
Limewire (older versions contained some spyware/adware; make sure you have the latest
version to avoid this)
Shareaza
The best places to download freeware without spyware, adware, and malware in them are:
download.com [10]
fileplanet.com [11]
betanews.com [12]
softpedia.com [13]
sourceforge.net [14]
pcworld.com [15]
Firewall
A firewall protects your computer by blocking certain network packets. They come in
different flavors. Even if you are sent a packet that contains an exploit that is unpatched, a
firewall can block the packet.
NAT Firewall
A NAT Firewall is used in routers. It maps one public IP address to multiple private IP
addresses. This will make your whole network appear to be one computer. By default,
unsolicited (inbound) packets are dropped, giving you basic firewall protection. Many
routers offer more advanced firewall features. By default, any servers run behind the NAT
(Network Address Translation) will only be accessible from your LAN (Local Area Network).
Port forwarding can be used so that a server can be accessed from the internet.
Software Firewall
A software firewall runs on the client computer. They're also known as personal firewalls.
(This can refer to any firewall that only protects one computer like the firewall built into
some nForce chipsets.) Because it runs on your computer, it can block or allow traffic
depending on the application. For this reason, many people run software firewalls in
addition to a hardware firewall. Hardware firewalls are harder to configure for new
33
34
computer users so software firewalls are more common. However, software firewalls take
up resources on the host computer. Windows XP and above comes with a basic firewall.
We suggest:
ZoneAlarm [16] the free firewall for personal users
Norton's Internet Security [17] More commercial firewall
References
Also part of the Microsoft Office suite are: Frontpage, a web publishing program and Visio,
a diagram making program.
Office suites are not made only by Microsoft. Some companies have taken their own stab at
making these handy bundles of programming, and many have succeeded. If you don't want
to shell out serious cash (hundreds of US dollars) for the latest version of Microsoft Office,
you should take a look at OpenOffice.org [1], a free, open-source office suite which offers
almost all the features of Microsoft Office and then some. If you wish to have an alternative
[2]
Once you learn how to use one office program, you can figure out the other ones without
much effort.
References
[1] http:/ / www. openoffice. org
[2] http:/ / www. abisource. com
35
Web Browsing
Web browsing is probably the most accessible beginners' Internet activity. It is the act of
viewing textual or image-based content using the World-Wide Web over the Hypertext
Transfer Protocol (HTTP). You are doing this as you read this text.
All recent versions of Windows come with a version of Internet Explorer, and most of them
are inextricably integrated with the operating system. The current version, bundled with
Windows XP, is Internet Explorer 7. Windows 98 ships with version 4, and Me or 2000 are
integrated with 5.0 or 5.5 (the difference being that 5.5 has support for more advanced
security measures).
Internet Explorer is not the only browser, and not necessarily the best. Although it's still by
far the most common, many people point out that it's difficult to use and may expose your
computer to security risks. If you plan to use the world wide web, it's highly recommended
that you at least try out one of the alternatives:
Mozilla Firefox [1] is simple and reliable, and one of the most popular alternative
browsers.
Mozilla Suite [2] (includes e-mail support)
Opera [3]
Netscape
[4]
Linux users sometimes want to use command-line, or textual, browsers such as Lynx or
Links2 where a graphical user interface is unavailable, for instance when installing, but
most browsers are graphical.
When learning to use a browser (graphical or textual) most efficiently, it can be useful to
learn keyboard commands, as well as the discrete uses of the Left and Right mouse button.
If your mouse has a wheel in the middle, it can be useful to scroll, or for browsers with
tabbed browsing support, opening a new tab. Check your settings so you can get the best
use of this tool.
The vast majority of Web browsing is done among sites you might already know. The first
one that you may have seen is your home page. When the browser is out of the box, it may
direct to the company (Microsoft for Internet Explorer, Netscape for Netscape and allied
products), or it will direct to your Internet Service Provider (the people who manage your
connection). You can also have a home page of your choosing. If you are surfing at school or
work, your school or work will have a page, as will the library or the Internet cafe.
Choosing a password
Many web services, such as email, internet shopping or online banking require the user to
"log in" by entering a username and password.
It is important to choose a good password, that is, a password that cannot be easily cracked
by a third party who could potentially gain access to your email account or finances.
Bad passwords
The following types of passwords should never be used. They can easily be cracked by
modern password breaking tools and offer little or no protection in case of an attack.
Dictionary words, common phrases and names in any language, even if combined
with numbers. For example:
36
Good passwords
Good passwords should:
be at least 8 characters long
contain upper and lowercase characters, as well as numbers in a random sequence.
be easy to remember
FQr7erfn5, QWd3fTr6U, rgi82eJiFF0, GI$87d90%nj, kEirt4Pw, ...
A convenient way of creating a password is thinking of a "pass phrase" and then
abbreviating it into a password. This procedure usually results in a password that is both
safe and easy to remember. For example:
"Roses are red, violets are blue, I'm a bad poet, so are you" becomes "RarVabIabp5ay",
where the first word of each line is represented by a capital and "S" becomes a "5"
because both characters look similar.
"I use this website to buy cheap flights from Stanstead airport" becomes "IutwtbcffSa"
Using special characters such as *&^%$ also improves a password's safety. However, some
applications and websites don't allow passwords to contain special characters. If in doubt,
leave them out and make the password longer.
Another convenient way to creating a good password is to change the letters to numbers or
symbols in a short phrase. For example, if I wanted to use the phrase "Pepsi Man", I could
simple change a few letters to numbers or symbols and get "P3p$1_m4n" an good and easy
to use password that is accepted by most websites.
37
38
Email
E-mail (commonly referred to as email - either spelling is acceptable) is a method of
sending messages with a computer. Sending email costs nothing extra over your Internet
connection.
You send email either with an email client such as Microsoft Outlook , Mozilla
Thunderbird or with a web-based email system. The basic principle is the same for both:
The email is written and sent to a server with an email address attached.
The server looks at the domain name of the email (the section following the @) and sends
the email on its way through the internet.
The receiving server receives the email. It looks at the username of the email (the section
preceding the @) and stores the email in an appropriate folder on its hard disc.
The recipient connects to the Internet and logs into their mail client or webmail site.
The receiving server then allows the message to be downloaded by the recipient.
All this often happens in a second or less. The speed depends on the speed of the two
previously mentioned servers and all the ISP servers in between, the amount of internet
traffic, and the distance between the two servers.
Web-based email
Web-based email is very convenient compared to email accessed via a client, but almost
never has the featureset of clients.
Here is how to sign up for a Yahoo! Mail account. Yahoo! was one of the very first
web-based email companies.
1. Having got to the Yahoo site! (the American one), find 'Sign up'.
2. The splash screen shows us three choices: Yahoo Mail, Yahoo Mail Plus and Personal
Yahoo. The one that will be easiest for our purposes will be Yahoo Mail.
3. It is always a good idea to read the Privacy Policy http://privacy.yahoo.com/, and Terms
of Service http://docs.yahoo.com/info/terms/. Look at everything marked with an asterisk
and read the Terms of Service very very carefully. (Even print them out if you can't read
them: there is a printable version).
4. The most important thing is to have a user name and password:
For this demonstration we'll type in [email protected] where the
pattern is [email protected].
You can make up your own password
39
40
Online Scams
Common sense in the real world applies online. If an offer sounds too good to be true, it
probably is. A good idea is to research an offer before you accept it.
A typical scam letter expresses an urgent need for a person to do them a favor. This usually
involves some type of inheritance. These scammers are very good, and their letters sound
sincere and legitimate. They are not. They also will target anyone who they think has
money. There are even reports of religious figures being scammed. One occurred with a
Pastor who was scammed into thinking that a Nigerian man had an inheritance of a few
million dollars. However, a stipulation was placed on the inheritance that he had to give
half of it away to charity but he didn't have the initial money to get to the location of the
money in order for it to be released. The Pastor trusted him and in exchange for fronting
the $10,000 or so USD, the scammer was to give him a few million for his church for the
trouble. Unfortunately, the Pastor was scammed, he never received the money and was out
$10,000.
Phishing is another way that crackers will try to obtain your personal information. They
send emails claiming to be from reputable companies like Amazon.com or PayPal. The
emails claim that they need information from you, like your credit card information or
password, for some reason or another. Common excuses are technical glitches and software
upgrades. These emails look legitimate at first glance--complete with company logos and
professional formatting. They may ask you give you information via phone, through a reply,
or through a website, which is also masked as the website of the company that they are
trying to imitate. If you ever get an email like this, always treat it like it is evil as most
companies would never ask for personal information through email. If anything, call the
company and verify that they sent you the email. Also, both Mozilla Firefox and Internet
Explorer will detect many phishing sites and warn users that they are malicious.
Links
References
[1]
[2]
[3]
[4]
41
Games
A game, on the other hand, is an executable file or an application. This means that it is
usually (on Windows) an .exe, .com, or .bat file. Games come from the manufacturer. Some
operating system versions, like Windows 3.1, had games that come on floppy disks or
CD-ROMS. Many of those games were created in Visual Basic or other programming
languages or game engines. Many games can also be downloaded from the Internet and are
often played there.
Games in the computer world are often as variable as those in the non-computer world.
Many games have systems of artifical intelligence to make them more interesting. Many
games get much harder as the player goes on, and some users like to cheat or modify the
game. There are two sorts of modifications: cosmetic and fundamental.
Playing Games
In most games, it is a case of installing and loading the particular game from the Setup file.
The Setup file will ask you where to save the game. It will either have its own folder, or be
installed in Program Files. Program Files is slightly easier, and having games on the
desktop is easiest of all.
Before playing the game, you might like to read the Terms of Service and disclaimers. Most
game developers and publishers who release games on a commercial basis are very strict
on this. With shareware and freeware, it is desirable, though not required, to acknowledge
the developer by paying a nominal amount of money or sending them a postcard.
If your game happens to be limited to a certain amount of play, like 10 days or 28 days,
respect that and delete it when you've got your use out of it. Some games will have a
limited amount of plays, rather than time.
Wikipedia has a list of freeware games and some links to shareware outlets, which will
cover a wide range of the twenty-five year history of personal computing. Each archive has
its own procedures and rules, such as limits on how much a user can download at a time.
Games are considered to be a relatively heavy use of bandwidth, so use common sense and
discretion in regard to where and when you load them on your Internet Service Provider.
In the end, it's all an issue of personal preference-what educates and entertains you. Many
successful games immerse their users into another world where they can learn
computer-and other-skills.
Games also use images, sounds and often videos-either pre-recorded, or in real time.
42
43
Images
Looking at pictures is fun. They spice up time at the computer and make boring text fresh
and exciting. But before you view pictures, you should know what you're looking at.
File Types
Compressed Formats
jpg or jpeg - Most realistic photos are in this format. Almost every digital camera uses the
jpeg format for their pictures. It has great compression and supports enough colors to suit
most people's needs. The only draw back is that it uses lossy compression, which means
that pictures saved in jpeg loose quality. Line art looks really bad in jpeg, but there are
other formats for that.
gif - An easy and common format for creating animated images on web site. Commonly,
used for advertisements. It only supports 256 different colors in any given image, thus it
often looks grainy. Gif images have a lossless compression, so pictures saved in this format
do not lose quality unless they have more than 256 colors.
png - Another popular image type on the Internet. It was created to be an open source
replacement for gif's, but it doesn't support animation. This format like jpeg's allows for
enough colors to create a realistic photo.
mng - An image format that has potential, but isn't used frequently. Mng has a lot in
common with png and is made by most of the same people. The advantage of mng is that it
also supports animation like gif's.
Uncompressed Formats
Images that aren't compressed get really big. The most popular format is bmp.
Vector
Every picture format described so far are raster. This means that they are drawn using
different colored dots, or pixels.
Vector images are different because they are drawn with mathematical or vector images.
For example, a circle is described using a mathematical equation instead of a whole bunch
of dots that are placed to look like a circle. Because of this, you can zoom in forever and the
vector circle would not lose quality. Most clip art is some sort of vector format. The main
44
45
one is that if there was a circle, diagonal line, or something similar, one could zoom in
forever and the picture wouldn't
Here are some popular vector formats:
swf - A proprietery format used by Macromedia Flash. Most animated movies on the
internet use the swf.
svg - A basic and widely used format. It's not used for animations with sound.
Music
Music is a great way to change the mood while working on the computer. With music on
your computer, you can make customize CDs, create your own jukebox, and listen to a wide
variety of radio stations from all around the world.
File Types
Lossy Formats
Lossy compress music, discarding data in order to compress the file to something much
smaller than lossless compression and the original PCM stream. The resulting file will
sound inferior to the original. Lossy formats can be compressed to varying sizes, with
smaller file sized having lower quality.
MP3 -The most popular lossy compression format, and the one that is synonymous with
digital music. It is supported by all major DAPs and multimedia players.
OGG Vorbis - A higher quality codec than MP3, it is also free, but with limted support
from DAPs. It is supported by the Rio Karma and most iRiver DAPs.
WMA AAC - The format used by iTunes, but with FairPlay DRM. The iPod is the only major DAP
to support it.
Real Audio Uncompressed Formats
Uncompressed formats store music in the PCM format, the same used by the Red Book
audio CD format. For 2 Channel, 44.1KHz 16 bit audio, this takes up 1378Kbp/s compared
to 192Kbp/s for lossy formats like MP3.
AIFF WAV Lossless Compressed Formats
Lossless compression shrinks a music file, without a loss of any sound, and can be
decompressed back into the original file. However, at around 75% of the original file, they
take up more room than lossy compression formats.
FLAC - A patent free format by the Xiph.org Foundation, who made Ogg Vorbis.
Apple Lossless (MP4) Shorten (SHN) - A lossless file format written by Tony Robinson
Windows Media Audio 9 Lossless (WMA) -
[4]
Listening
There is a wide variety of audio players available for free off of the Internet. They usually
support Audio CDs and MP3s. Oftentimes they also support proprietary formats as well.
iTunes - Apple's popular audio player which supports listening to CDs, converting audio
CDs into a jukebox, making custom CDs, downloading songs off of Apple's iTune store, and
listening to streaming radio stations. iTunes also supports listening to music off other
computers running iTunes through a local area network (LAN) and uploading songs to
popular MP3 players including Apple's iPod.
Musicmatch - Musicmatch similar audio CD features as iTunes. Plus, it has it's own Music
store. One unique feature it supports is the ability to stream any song in the Musicmatch
library for a monthly fee.
RealPlayer Winamp - Compared to the jukebox style music players, Winamp's GUI is simple and takes
up very little screen space.
Windows Media Player -
Video
Media Types
A media type is how one would store video if they wanted to share it with other people. For
exaple, a DVD is what most new movies are stored on.
DVD-Video - The popular format that replaced VHS as the standard for hollywood
production movies. This standard is only produced by manufactures of large movie
companies. Home users can not produce this format of video. Video is encoded in MPEG2.
Audio can be encoded in PCM, MPEG2 Audio, Dolby Digital, and DTS. However, the DVD
spec requires that a DVD contain a PCM or Dolby Digital sound track. Up to 8 audio
channels may be used.
DVD-R and DVD+R - A popular format for home made DVD movies. These disc play in
most standalone DVD players. These disc can be single layer or dual layer. The single layer
are relatively inexpensive and can hold 4.7 GB. The dual layer are very expensive and can
hold roughly twice the information.
DVD-RW and DVD+RW - A similar format to DVD-R and DVD+R expect it is rewritable.
DVD-RAM - A format that requires a special drive and isn't real popular. It can support
single layer 4.7 GB disc and 9.4 dual layer disc. Like DVD-RW and DVD+RW, it is
rewriteable.
VCD - A low quality video disc contraining 1374Mb/s MPEG1 video, the same bitrate as
audio CDs. VCDs can be burned onto regular CD-Rs and CD-RWs with a CD burner.
SVCD - Similar to VCD but with slightly higher quality at the cost of not being able to store
as much video.
46
47
Watching
Media Player Classic QuickTime RealPlayer VLC media player (VLC) - A free cross-platform multimedia player than plays almost
anything [5] you give it, including DVDs.
Windows Media Player -
Glossary
Links
References
[1] http:/ / www. vancouver. wsu. edu/ fac/ peabody/ game-book/ Coverpage. html
[2] http:/ / adt. library. qut. edu. au/ adt-qut/ uploads/ approved/ adt-QUT20040713. 153317/ public/ 05Chapter4.
pdf
[3] http:/ / adt. library. qut. edu. au/ adt-qut/ uploads/ approved/ adt-QUT20040713. 153317/ public/
08Appendixes. pdf
[4] http:/ / www. tonyrobinson. com/
[5] http:/ / www. videolan. org/ vlc/ features. html
48
Files Sharing
Print Sharing
There are two major ways to share a printer across the network. The first requires a
stand-alone printer, the other is using a printer that is connect to a computer.
A stand-alone printer is a printer that does not require being attached to a computer to use.
Common examples are large office printers. They each have their own network card that
allows them to connect directly into the network. These printers then can be assigned a
network address, or a host name that allows other computers on the network to find them.
In order to set these up please refer to your printer's administration manual.
Most modern printers also have a web-administration guide. A web administration guide
shows options that can be set for the printer using a web-based interface. To get to it, you
simply open your web browser and put the host name of the printer or the IP address. This
will usually ask you for an administrator's account and password to change settings. This
will be found in the administration manual, or you may have set it when setting up the
printer's IP address.
Next, you will have to install the printer drivers and software on each computer that you
want to have use of the printer.
In Windows XP:
49
50
51
Source
How to Take the First Steps in Home Networking
[1]
References
[1] http:/ / wiki. ehow. com/ Take-the-First-Steps-in-Home-Networking
2) Using registry
Type REGEDIT on your run dialog box. Now browse
to the following location in the window that opens
up.
Screenshot of removing/disabling logoff
HKEY_CURRENT_USER\Software\Microsoft\Windows\CurrentVersion\Policies\Explorer.
On the right side you may see a value named
NoLogOff. Double click on it and change its value to 1 If you don't see the NoLogOff value
then create a STRING value and name it as NoLogOff; now change its data to 1
You may need to reboot.
52
System Requirements
Update Everything
Applications, operating systems, drivers... Nearly everything on your PC can be updated.
Updates are often released to remove bugs, fix exploits, improve compatibility, optimize
performance, add features, refresh databases, and enhance experiemce.
However you should be aware that some updates are purely optional and may be require
certain conditions to be applicable, especially firmware updates.
While you should avoid interrupting software updates, you should never interrupt a
firmware update.
You should update your:
Anti-Virus
Anti-Spyware / Anti-Adware
Personal Firewall
Windows XP
Internet Browsers
Communications Software (E-Mail, IM, and Chat Clients)
Productivity Suites
Favorite Applications
Device Drivers
Firmware
A useful tutorial on a sequence for managing your computer's health is available at [1]
under the WORKSHOP NOTES heading Clean your PC
53
References
[1] http:/ / seniornetwgtn. blogspot. com/
54
55
56
57
Deviance99
Deviance99 has had a home PC running Microsoft Windows since he was 9 years old. He
has been consulting friends, family, and neighbors since age 15. He started dabbling in
Q-Basic computer programming at age 12, and started building his own computers at 14,
and discovered Linux at age 17 (23 now). He's been designing webpages since his
sophomore year in high school, and has had several jobs making websites. He studied
Information Technology from 2001-2005 with a speciality in Multimedia Design, and is
58
59
60
61
License
License
GNU Free Documentation License
http:/ / www. gnu. org/ copyleft/ fdl. html
62