The answer is yes, sooner or later you will need some computer training. As computers evolve and new software becomes available people are finding it important to keep up on their computer skills.
If you work in office environment for example, you may be faced with a situation where your employer purchases a new piece of software in the hopes that it will help his company become more efficient. As a result, you may be required to learn to use this new piece of software. Even if you work in a warehouse this new software may required that you need to enter inventory and print packing slips.
Do you need to know everything about the software? The answer is no, you by no means have to become a computer expert. Just acquire the skills that will allow you to use the software as efficiently as possible in your day to day activities. Here are some ways to gain those computer skills.
1.The software manual. Take some time to briefly read the titles and summaries. By doing so when you come across something you are not sure how to do you may think, "I remember reading something about that" and quickly find it again in the manual.
2.Software specific books. These are books you can purchase at most major book stores. They are quite often written by people who are experts with the software. The text is often followed by examples which may make it easier for you to understand and therefore you learn quicker.
3.CD tutorials. With some of the more popular software you may be able to purchase a CD tutorial. These training aids take you through step by step the different functions of the software. By "doing", as you are learning you are more often to remember these various functions.
It's never to late to start computer training. The skills you learn today may be all you need to get that promotion or qualify for that new job. Taking the initiative to upgrade you computer skills shows your employer or potential employer that you are able to adapt to the every changing computer workplace.
ADS
Thursday, December 18, 2008
Do The Media Spread Computer Viruses?
Summary: Could the mass media hype about computer viruses actually make the problem worse?
If you believe what you hear in the media, there are an awful lot of viruses going around. No, I'm not talking about the make-you-sick kind of virus, though they get plenty of airtime, too. I'm talking about the kind of virus that enters via your internet connection rather than your nasal passages.
What the mainstream media often don't tell you--at least, in most radio and television newscasts and in the crucial headlines and opening paragraphs of newspaper articles-- is that many of these "viruses" are not viruses at all.
What Computer Viruses Really Are
The main reason the mainstream media always are in alarm over viruses is that they tend to call any malicious computer program a virus. In reality, there are at least eleven distinct types of malicious software, or malware, commonly affecting computers today. The most common of these are worms, Trojans, and spyware.
So, what's the difference between computer viruses and the other types of malware? The difference is that computer viruses are just about the only ones that regularly shut down computers and cause other obvious damage. The most common of the other kinds of malware--worms, Trojans, and spyware--are usually only detectable with a special scan.
The Real Danger of Computer Viruses
If the other types of malware are so unobtrusive that they can only be detected with a special scan, then what's to worry about? For starters, these programs are called malicious for a reason: they are designed to cause some kind of damage, if not to your computer, then to someone else's.
Worms are most famously used to damage, destroy, or disrupt other computer networks than the one on which the host computer is located. For instance, worms have been used by website owners to shut down rival websites by sending overwhelming numbers of requests to the computer that hosts that website. Worms have also been used to send out viruses to other computers, often without infecting the host machine--after all, what would it benefit the worm to shut down its host computer?
Trojans, in turn, are often used to insert worms and other malware on your computer, even if the Trojan itself does no damage.
But even if you don't care what happens to anyone else, you should still be concerned about one kind of malware: spyware, a kind of malware that, true to its name, collects data from your computer and sends it back to a remote host.
Most spyware is only interested in monitoring your internet usage so it can tell other programs, called adware, what advertising to popup on your computer. However, there are criminal spyware programs that steal financial data, or perform a thorough identity theft. Don't think you have personal or financial data on your computer? Some spyware programs contain a keylogger, which is a program that copies whatever you type, usually in order to snatch passwords. Even if you keep no financial information on your computer, if you ever buy anything over the web, the keylogger would allow its owner to buy stuff using the same information you typed in to buy stuff yourself.
Why Blame the Media?
Given the danger of all these different types of malware, isn't it a good thing that the mass media are becoming hysterical about it? And can't they be forgiven the sloppy reporting of calling Trojans, worms, spyware, and other malware "viruses"?
No, no, no.
This is a classic case of bad reporting doing more damage than no reporting at all. In this case, the damage bad reporting has done is to promote a common myth that goes something like this: "The only malicious software is a virus. Viruses damage your computer. Therefore, if my computer is working OK, my computer has no malicious software. I only need to scan my computer for problems when there is a sign of problems."
Thanks to this myth, many people complacently let their antivirus software go months out of date, not wanting to be bothered with scheduling an automatic update. Just as bad, many people don't have any extra software to combat the other types of malware that may not be covered by antivirus software.
In fact, it's not uncommon for people who have found malware on their computers after a scan to say, "but I never had malware on my computer before!" But how would they have known if they had never scanned!
Until the biggest mainstream media--and especially television--start educating the public about the need to have their computers automatically scanned at least daily, the world will continue to have major, drawn-out problems with malware that could have been wiped out as soon as soon as the anti-malware software makers discovered it.
And until that day, the mainstream media will have many more opportunities to run hysterical stories about "viruses," thereby forcing them to sell more newspapers and broadcast to even larger audiences of people who suck at the information trough yet somehow never become full.
If you believe what you hear in the media, there are an awful lot of viruses going around. No, I'm not talking about the make-you-sick kind of virus, though they get plenty of airtime, too. I'm talking about the kind of virus that enters via your internet connection rather than your nasal passages.
What the mainstream media often don't tell you--at least, in most radio and television newscasts and in the crucial headlines and opening paragraphs of newspaper articles-- is that many of these "viruses" are not viruses at all.
What Computer Viruses Really Are
The main reason the mainstream media always are in alarm over viruses is that they tend to call any malicious computer program a virus. In reality, there are at least eleven distinct types of malicious software, or malware, commonly affecting computers today. The most common of these are worms, Trojans, and spyware.
So, what's the difference between computer viruses and the other types of malware? The difference is that computer viruses are just about the only ones that regularly shut down computers and cause other obvious damage. The most common of the other kinds of malware--worms, Trojans, and spyware--are usually only detectable with a special scan.
The Real Danger of Computer Viruses
If the other types of malware are so unobtrusive that they can only be detected with a special scan, then what's to worry about? For starters, these programs are called malicious for a reason: they are designed to cause some kind of damage, if not to your computer, then to someone else's.
Worms are most famously used to damage, destroy, or disrupt other computer networks than the one on which the host computer is located. For instance, worms have been used by website owners to shut down rival websites by sending overwhelming numbers of requests to the computer that hosts that website. Worms have also been used to send out viruses to other computers, often without infecting the host machine--after all, what would it benefit the worm to shut down its host computer?
Trojans, in turn, are often used to insert worms and other malware on your computer, even if the Trojan itself does no damage.
But even if you don't care what happens to anyone else, you should still be concerned about one kind of malware: spyware, a kind of malware that, true to its name, collects data from your computer and sends it back to a remote host.
Most spyware is only interested in monitoring your internet usage so it can tell other programs, called adware, what advertising to popup on your computer. However, there are criminal spyware programs that steal financial data, or perform a thorough identity theft. Don't think you have personal or financial data on your computer? Some spyware programs contain a keylogger, which is a program that copies whatever you type, usually in order to snatch passwords. Even if you keep no financial information on your computer, if you ever buy anything over the web, the keylogger would allow its owner to buy stuff using the same information you typed in to buy stuff yourself.
Why Blame the Media?
Given the danger of all these different types of malware, isn't it a good thing that the mass media are becoming hysterical about it? And can't they be forgiven the sloppy reporting of calling Trojans, worms, spyware, and other malware "viruses"?
No, no, no.
This is a classic case of bad reporting doing more damage than no reporting at all. In this case, the damage bad reporting has done is to promote a common myth that goes something like this: "The only malicious software is a virus. Viruses damage your computer. Therefore, if my computer is working OK, my computer has no malicious software. I only need to scan my computer for problems when there is a sign of problems."
Thanks to this myth, many people complacently let their antivirus software go months out of date, not wanting to be bothered with scheduling an automatic update. Just as bad, many people don't have any extra software to combat the other types of malware that may not be covered by antivirus software.
In fact, it's not uncommon for people who have found malware on their computers after a scan to say, "but I never had malware on my computer before!" But how would they have known if they had never scanned!
Until the biggest mainstream media--and especially television--start educating the public about the need to have their computers automatically scanned at least daily, the world will continue to have major, drawn-out problems with malware that could have been wiped out as soon as soon as the anti-malware software makers discovered it.
And until that day, the mainstream media will have many more opportunities to run hysterical stories about "viruses," thereby forcing them to sell more newspapers and broadcast to even larger audiences of people who suck at the information trough yet somehow never become full.
Digital Cameras Are Fun
What is one of the most fun computer accessories? Digital cameras I love mine! Wouldn't you like to send some pictures to some friends and family by e-mail? A digital camera is the easiest way to do that. Also, it is the easiest way to get pictures onto your computer. You can also print them from your computer, most modern printers and some quality photo paper will print great quality photos.
The best part is that you can see the pictures instantly on the camera's LCD screen with the review feature, or load them onto your computer.
Digital makes it so easy to take great pictures because you can see how they turned out instantly and re-take if necessary. No waiting for film to be developed either, just load onto your computer with the software program that comes with the digital camera, and print. There are lots of different sizes, prices, and brands to choose from. So have some fun -- get a digital camera today! One of the greatest computer accessories you will love to use.
The best part is that you can see the pictures instantly on the camera's LCD screen with the review feature, or load them onto your computer.
Digital makes it so easy to take great pictures because you can see how they turned out instantly and re-take if necessary. No waiting for film to be developed either, just load onto your computer with the software program that comes with the digital camera, and print. There are lots of different sizes, prices, and brands to choose from. So have some fun -- get a digital camera today! One of the greatest computer accessories you will love to use.
Data-Recovery: What You Need
Data recovery is something we hope that we will never need. Whether you simply make the mistake of deleting important software or you lose it all in a computer crash, that valuable asset of information may seem like it is lost forever. But, if you have complete and quality data-recovery software on your computer or through your system, you can be confident that it has a backup and it is there even though these things will happen to you. This can be so important when it comes to safeguarding your business or your personal information.
What people do not realize is that there are a number of ways that things can go wrong on their computers. Whether you are responsible for the computers of a large corporation, a small business or even just your own personal computer, having a way to restore information when things go wrong is quite important. Here are some things that could happen to you, well, anytime, even right now. Your computer could be running slowly or be loaded with powerful spyware that can destroy files, transmit personal data or, even worse, cause the computer to crash. All of a sudden, it’s gone. Or, you could be working along nicely without a care in the world and bam! A power surge, an electric storm or something else electrical happens and it’s all gone.
There are many more ways in which you can lose all of the personal data that is stored on your computer. You don’t even have to have the programs running to lose it. Nevertheless, many people mistakenly believe this will not happen to them and therefore do not do anything to prevent this total loss. Data recovery is necessary for this not to happen. The strange thing is, it takes only minutes to install and use and it virtually and it takes care of itself. It is not overly costly either. So, why don’t more people use data recovery? They just don’t realize its importance. And that is one mistake we don’t want to make. Data recovery is a need all computer users have.
What people do not realize is that there are a number of ways that things can go wrong on their computers. Whether you are responsible for the computers of a large corporation, a small business or even just your own personal computer, having a way to restore information when things go wrong is quite important. Here are some things that could happen to you, well, anytime, even right now. Your computer could be running slowly or be loaded with powerful spyware that can destroy files, transmit personal data or, even worse, cause the computer to crash. All of a sudden, it’s gone. Or, you could be working along nicely without a care in the world and bam! A power surge, an electric storm or something else electrical happens and it’s all gone.
There are many more ways in which you can lose all of the personal data that is stored on your computer. You don’t even have to have the programs running to lose it. Nevertheless, many people mistakenly believe this will not happen to them and therefore do not do anything to prevent this total loss. Data recovery is necessary for this not to happen. The strange thing is, it takes only minutes to install and use and it virtually and it takes care of itself. It is not overly costly either. So, why don’t more people use data recovery? They just don’t realize its importance. And that is one mistake we don’t want to make. Data recovery is a need all computer users have.
Crash Course In Getting A #1 Google Ranking
First, here’s the rundown of some of the terminology I’m going to use in this article –
Inbound Links – Links coming into your site
Outbound Links – Links leaving your site
Cross Links – Links that you have “traded” with another site (ie, they’ve got a link from their site to your and you’ve got a link from your site to theirs)
PR (Page Ranking) – Google’s measure of how “important” your site is
SEO Is Not Dead
Ok, now lets talk about what you really want to hear – how to get those coveted 1-10 ranks for your keywords. Remember this - SEO is not dead. In fact, it is very much alive and important. The first thing to do in order to raise your site rank is target specific keywords. I say specific, because you need to target “keyphrases,” meaning more than one word keywords. Some people use the words interchangeably (me included) so just ignore one-word keywords altogether. You will waste your money if you shoot for these, because chances are, there are other, MUCH larger companies who already have you beat, and will continue to have you beat unless you’ve got a bottomless wallet.
Check Out Your Competition
Take this example, for instance, if you sell computers, you should not try to optimize your site for the keyword “computer” or “computers.” First, think about all of the businesses that do ANYTHING with computers. Yeah, that’s a lot. They’ll all show up if you search for “computer.” Now try to think of who would show up at the top of that list. I’ll make it easy, it’s Apple, Dell, Computer World, Computer Associates, IEEE, Computer History Museum, Webopedia, ASUSTeK, WhatIs.com, and HP. I’m going to go out on a limb here and say that I 99.9
Inbound Links – Links coming into your site
Outbound Links – Links leaving your site
Cross Links – Links that you have “traded” with another site (ie, they’ve got a link from their site to your and you’ve got a link from your site to theirs)
PR (Page Ranking) – Google’s measure of how “important” your site is
SEO Is Not Dead
Ok, now lets talk about what you really want to hear – how to get those coveted 1-10 ranks for your keywords. Remember this - SEO is not dead. In fact, it is very much alive and important. The first thing to do in order to raise your site rank is target specific keywords. I say specific, because you need to target “keyphrases,” meaning more than one word keywords. Some people use the words interchangeably (me included) so just ignore one-word keywords altogether. You will waste your money if you shoot for these, because chances are, there are other, MUCH larger companies who already have you beat, and will continue to have you beat unless you’ve got a bottomless wallet.
Check Out Your Competition
Take this example, for instance, if you sell computers, you should not try to optimize your site for the keyword “computer” or “computers.” First, think about all of the businesses that do ANYTHING with computers. Yeah, that’s a lot. They’ll all show up if you search for “computer.” Now try to think of who would show up at the top of that list. I’ll make it easy, it’s Apple, Dell, Computer World, Computer Associates, IEEE, Computer History Museum, Webopedia, ASUSTeK, WhatIs.com, and HP. I’m going to go out on a limb here and say that I 99.9
Computer Security - What Exactly Is It?
Although the term 'computer security' is used a lot, the content of a computer is actually vulnerable to only a few risks unless the computer is connected to others on a network. As the use of computer networks (especially the Internet) has increased dramatically during the past few years, the term computer security is now used to describe issues referring to the networked use of computers and their resources.
The major technical areas of computer security are confidentiality, integrity and authentication/availability.
- Confidentiality, also known as secrecy or privacy, means that the information you own cannot be accessed by unauthorized parties. Breaches of confidentiality range from the embarrassing to the disastrous.
- Integrity means that your information is protected against unauthorized changes that are undetectable to authorized users. The integrity of databases and other resources are usually compromised through hacking.
- Authentication means that an user is who he claims to be.
- Availability means that the resources are accessible by authorized parties. Examples of availability attacks are the 'denial of service' attacks.
Other important things that the computer security professionals are concerned about are access control and nonrepudiation. Access control refer not only to the fact that users can only access the resources and services they are entitled to, but also to the fact that they can't be denied to access the resources they legitimately expect. Nonrepudiation means that a person who sends a message cannot deny he sent it and vice versa.
In addition to these technical aspects, the concept of computer security is very large. Computer security's roots are drawn from disciplines like ethics and risk analysis and the major topics that are concerning it are computer crime (tries to prevent, detect and remedy attacks) and identity/anonymity in cyberspace.
Although confidentiality, integrity and authenticity are the most important things when it comes to computer security in general, for everyday internet users, privacy is the most important one, because many people think that they have nothing to hide or the information they give doesn't seem sensitive when they register with an internet service/site.
But remember that, on the internet, information is very easily shared among companies and small pieces of related information from different sources can be linked together to form something alot more complex about a person. Because of this, nowadays, the ability to maintain control over what information is collected about them, who may use it and how it can be used is extremely important.
The major technical areas of computer security are confidentiality, integrity and authentication/availability.
- Confidentiality, also known as secrecy or privacy, means that the information you own cannot be accessed by unauthorized parties. Breaches of confidentiality range from the embarrassing to the disastrous.
- Integrity means that your information is protected against unauthorized changes that are undetectable to authorized users. The integrity of databases and other resources are usually compromised through hacking.
- Authentication means that an user is who he claims to be.
- Availability means that the resources are accessible by authorized parties. Examples of availability attacks are the 'denial of service' attacks.
Other important things that the computer security professionals are concerned about are access control and nonrepudiation. Access control refer not only to the fact that users can only access the resources and services they are entitled to, but also to the fact that they can't be denied to access the resources they legitimately expect. Nonrepudiation means that a person who sends a message cannot deny he sent it and vice versa.
In addition to these technical aspects, the concept of computer security is very large. Computer security's roots are drawn from disciplines like ethics and risk analysis and the major topics that are concerning it are computer crime (tries to prevent, detect and remedy attacks) and identity/anonymity in cyberspace.
Although confidentiality, integrity and authenticity are the most important things when it comes to computer security in general, for everyday internet users, privacy is the most important one, because many people think that they have nothing to hide or the information they give doesn't seem sensitive when they register with an internet service/site.
But remember that, on the internet, information is very easily shared among companies and small pieces of related information from different sources can be linked together to form something alot more complex about a person. Because of this, nowadays, the ability to maintain control over what information is collected about them, who may use it and how it can be used is extremely important.
Computers Are Not Scary
Do you remember when you were a kid, and saw your first automobile? To the older crowd, the answer might be yes. To them, the first automobile was most-likely an object of wonder. It wasn't necessarily a thing to be feared, just an unknown. It was something that you had heard of, but hadn't had any experience with it. It wasn't scary.
To most everyone else, you don't remember your first time you saw an automobile, because they've just always been around. You aren't scared of them because you are familiar with them. The youngest generation of youth feel the same way about computers.
Many of you may remember the first time you saw a computer. It was a strange thing that you weren't familiar with. To some of you, it was exciting. To others, it wasn't. But somewhere along the line, you decided that using a computer was something that only younger (or more "gifted") people should do.
We're past the age when cars are for only the most wealthy. Now, everyone has a car. In previous days, it was perfectly fine to walk everywhere. Some still do that, but most have learned to drive. In these days, there are still some who can "get around" just fine without the use of a computer, but most people use them multiple times in a week.
In the same way, however, that most people see cars, the younger generations see computers. Computers are not something to fear. They're only something that you're not familiar with. That doesn't make them bad. And it doesn't make YOU bad.
So in the same way you have gotten used to cars, go ahead and have some fun with computers. Play around. You won't break it, just like you didn't break your car the first time you got in it. Go for it! Have Fun!
To most everyone else, you don't remember your first time you saw an automobile, because they've just always been around. You aren't scared of them because you are familiar with them. The youngest generation of youth feel the same way about computers.
Many of you may remember the first time you saw a computer. It was a strange thing that you weren't familiar with. To some of you, it was exciting. To others, it wasn't. But somewhere along the line, you decided that using a computer was something that only younger (or more "gifted") people should do.
We're past the age when cars are for only the most wealthy. Now, everyone has a car. In previous days, it was perfectly fine to walk everywhere. Some still do that, but most have learned to drive. In these days, there are still some who can "get around" just fine without the use of a computer, but most people use them multiple times in a week.
In the same way, however, that most people see cars, the younger generations see computers. Computers are not something to fear. They're only something that you're not familiar with. That doesn't make them bad. And it doesn't make YOU bad.
So in the same way you have gotten used to cars, go ahead and have some fun with computers. Play around. You won't break it, just like you didn't break your car the first time you got in it. Go for it! Have Fun!
Computer Rental: Worth Your Money?
Is computer rental worth the money? Depending on the type of computer that you have a need for as well as the expenses that you plan to save, computer rental may or may not be the right road for you to go down. One thing is quite certain. That is, there are a number of companies out there right now wanting to provide you with the computer rental that you are after. They offer a wide range of products and services. But, is it worth spending your money on these computer rentals? Or, maybe you should just outright make the purchase?
The value of the computer rental is dependent on the need that you have as well as the overall need you expect to have down the road. It makes sense that if you only plan to use the computers for a few days or weeks that you should consider the computer rental industry. Often times it is important to have a large group of computers ready to go but you really have no need for them after a certain point. This happens and it just makes complete sense to use computer rental services.
If you plan to rent a computer for a continuous time period, then it may just be well worth it to actually make the purchase. For example, many individuals find that computer rental is a low cost option to purchasing and owning a computer. For personal use, though, it makes very little sense as you will likely be able to find a PC at a much lower cost in the long run.
Regardless of your need of computer rentals, it makes good sense to shop around for the right deal. And, it also makes sense to get the exact computer that you need as well as a back up service should you need that as well. Computer rental is something that many corporations need and therefore it is important for services out there to satisfy their customer’s demands. Computer rental services can be found throughout the web as well as in most local areas.
The value of the computer rental is dependent on the need that you have as well as the overall need you expect to have down the road. It makes sense that if you only plan to use the computers for a few days or weeks that you should consider the computer rental industry. Often times it is important to have a large group of computers ready to go but you really have no need for them after a certain point. This happens and it just makes complete sense to use computer rental services.
If you plan to rent a computer for a continuous time period, then it may just be well worth it to actually make the purchase. For example, many individuals find that computer rental is a low cost option to purchasing and owning a computer. For personal use, though, it makes very little sense as you will likely be able to find a PC at a much lower cost in the long run.
Regardless of your need of computer rentals, it makes good sense to shop around for the right deal. And, it also makes sense to get the exact computer that you need as well as a back up service should you need that as well. Computer rental is something that many corporations need and therefore it is important for services out there to satisfy their customer’s demands. Computer rental services can be found throughout the web as well as in most local areas.
Computer Network Installation
Computer Network Installation has become an essential prerequisite for any efficient modern-day business as it allows employees to truly work as a team by sharing information, accessing the same database and staying in touch constantly. For a computer network to give the best results, a lot of detailed planning and foresight is required before installation.
Firstly, an organisation needs to clearly define its requirements – how many people would use the network, how many would use it locally (within the office) and how many might require remote access (from a different location), how many computers and other devices (servers, printers, scanners) would be connected to the network, what are the needs of the various departments and who would be in charge of running/managing the network. It also helps if one can anticipate the direction the company would take in the near future so potential growth can be factored in during computer network installation.
The technology issues should also be ironed out in advance – hardware, software, servers, switches, back-up devices, cables and network operating systems. Make sure you have the required licenses to run the software on all your machines before installing a computer network. Alongside computer network installation should proceed the building of a dedicated technical support staff, either within your own organisation or outside consultants. Delegate responsibility clearly for network management. Before installing the network, you also need to choose the security mechanism to protect corporate data and keep viruses at bay.
The transition to a new or upgraded computer network can bring some teething problems. To minimise chances of confusion, the company might need to train its staff to make them familiar with the new system. Careful planning will to a large extent prevent crises like system downtime and network crashes.
If you are planning to install a computer network or upgrade and existing one, contact Viper System at sales@vipersystems.co.uk for help.
Firstly, an organisation needs to clearly define its requirements – how many people would use the network, how many would use it locally (within the office) and how many might require remote access (from a different location), how many computers and other devices (servers, printers, scanners) would be connected to the network, what are the needs of the various departments and who would be in charge of running/managing the network. It also helps if one can anticipate the direction the company would take in the near future so potential growth can be factored in during computer network installation.
The technology issues should also be ironed out in advance – hardware, software, servers, switches, back-up devices, cables and network operating systems. Make sure you have the required licenses to run the software on all your machines before installing a computer network. Alongside computer network installation should proceed the building of a dedicated technical support staff, either within your own organisation or outside consultants. Delegate responsibility clearly for network management. Before installing the network, you also need to choose the security mechanism to protect corporate data and keep viruses at bay.
The transition to a new or upgraded computer network can bring some teething problems. To minimise chances of confusion, the company might need to train its staff to make them familiar with the new system. Careful planning will to a large extent prevent crises like system downtime and network crashes.
If you are planning to install a computer network or upgrade and existing one, contact Viper System at sales@vipersystems.co.uk for help.
Computer Components for Idiots
There are many fancy add-ons for computers, but the basic components of the computer are simple and universal. If 1 of these main components is missing, it’s not a computer.
The 4 essentials of every computer system are: a motherboard, a Central Processing Unit (CPU), memory, and a hard drive. These components are installed in a case to which are attached a monitor, a keyboard and a mouse. That’s your basic computer.
Mother WHAT?
The motherboard ("mobo" for short) is the foundation. Everything attaches to the mobo -- the CPU, memory, hard drive, monitor, mouse, keyboard, add-on cards, even additional peripherals like printers, scanners, and speakers. The motherboard is like the nervous system and skeleton of the human body -- it provides support for the internal components and also passes information between the computer parts.
CPU
If the motherboard is the nervous system, then the CPU is the brain. Most of the mathematical manipulations that make computers operate are done by the CPU. Other components may also have their own processors, but their results still have to be passed through the CPU.
The speed of the computer is usually measured by the speed of the CPU. Even though other factors also affect overall speed, the CPU rating is generally seen as the single most important measure of performance.
Modern CPUs are usually rated between 2.0 GHz and 3.0 GHz, although each passing month will see increasing performance. This measurement refer to the number of calculations the processor can make in 1 second. The higher the number, the faster (better) the computer.
CPUs generate a lot of heat doing this work, so they need a heat sink and fan to keep them from overheating. Heat is a major enemy of the computer and directly affects its life span.
Computer Memory
RAM (Random Access Memory) is the part of the computer that stores information the computer needs while it is operating. It is Random Access because the computer can get the data in any order, not necessarily the order in which it is stored. Generally speaking, the more RAM the better. 512 to 1024 megabytes is common for memory.
The most common type of RAM these days is DDR-SDRAM, which stands for double-data-rate synchronous dynamic random access memory. We already know what the RAM part means. DDR means that the data is accessed twice as fast as ordinary RAM.
The latest type of RAM is DDR2. It offers even faster access rates and is quickly becoming the standard for computer memory.
Hard Drive
All the data contained in RAM is lost when the computer is turned off, so there has to be a place to store it permanently. This is what the hard disk is for.
It holds the computer’s operating system. An operating system like Windows uses around 4 gigabytes of hard drive space. The extra space is used to install computer programs and to store your personal data.
80 gigabyte hard drives are common, but 400 GB units are available. Furthermore, you can install more than 1 in a computer case for added security and convenience.
Peripherals
All you need to complete the basic computer system is a monitor, keyboard and mouse.
Accessories like a printer or scanner are useful for office work, and gamers will probably want to add speakers and joystick controls.
So there you have it. The basic computer needs just 7 major components. For the best performance, these components must integrate well. The motherboard is the most important component for determining the type and specification of the other parts. Choosing an appropriate mobo for your computer needs is the first step and may require a quick call to your local geek.
Soon YOU will be considered the local geek!
The 4 essentials of every computer system are: a motherboard, a Central Processing Unit (CPU), memory, and a hard drive. These components are installed in a case to which are attached a monitor, a keyboard and a mouse. That’s your basic computer.
Mother WHAT?
The motherboard ("mobo" for short) is the foundation. Everything attaches to the mobo -- the CPU, memory, hard drive, monitor, mouse, keyboard, add-on cards, even additional peripherals like printers, scanners, and speakers. The motherboard is like the nervous system and skeleton of the human body -- it provides support for the internal components and also passes information between the computer parts.
CPU
If the motherboard is the nervous system, then the CPU is the brain. Most of the mathematical manipulations that make computers operate are done by the CPU. Other components may also have their own processors, but their results still have to be passed through the CPU.
The speed of the computer is usually measured by the speed of the CPU. Even though other factors also affect overall speed, the CPU rating is generally seen as the single most important measure of performance.
Modern CPUs are usually rated between 2.0 GHz and 3.0 GHz, although each passing month will see increasing performance. This measurement refer to the number of calculations the processor can make in 1 second. The higher the number, the faster (better) the computer.
CPUs generate a lot of heat doing this work, so they need a heat sink and fan to keep them from overheating. Heat is a major enemy of the computer and directly affects its life span.
Computer Memory
RAM (Random Access Memory) is the part of the computer that stores information the computer needs while it is operating. It is Random Access because the computer can get the data in any order, not necessarily the order in which it is stored. Generally speaking, the more RAM the better. 512 to 1024 megabytes is common for memory.
The most common type of RAM these days is DDR-SDRAM, which stands for double-data-rate synchronous dynamic random access memory. We already know what the RAM part means. DDR means that the data is accessed twice as fast as ordinary RAM.
The latest type of RAM is DDR2. It offers even faster access rates and is quickly becoming the standard for computer memory.
Hard Drive
All the data contained in RAM is lost when the computer is turned off, so there has to be a place to store it permanently. This is what the hard disk is for.
It holds the computer’s operating system. An operating system like Windows uses around 4 gigabytes of hard drive space. The extra space is used to install computer programs and to store your personal data.
80 gigabyte hard drives are common, but 400 GB units are available. Furthermore, you can install more than 1 in a computer case for added security and convenience.
Peripherals
All you need to complete the basic computer system is a monitor, keyboard and mouse.
Accessories like a printer or scanner are useful for office work, and gamers will probably want to add speakers and joystick controls.
So there you have it. The basic computer needs just 7 major components. For the best performance, these components must integrate well. The motherboard is the most important component for determining the type and specification of the other parts. Choosing an appropriate mobo for your computer needs is the first step and may require a quick call to your local geek.
Soon YOU will be considered the local geek!
COMPUTER BACKUPS
COMPUTERS AND HALLOWEEN, DO THEY MIX?
Computer backup is so important to your computer that to ignore it is to risk its damnation.
Computers require care and feeding. They require that you attend to their needs. If you don't, then they will most surely be sent to Hell.
Halloween means Hell. What! What do you mean that Halloween means Hell?
Well, if your computer is given the option of trick or treat, which will it accept? Will it accept the trick or the treat? What do you think?
Halloween is the time that computers are subject to tricks or treats. Did you know that more computers fail on Halloween than any other day of the year? That’s right. It’s true (smile). Your computer is in danger! Protect it. Do your computer backups.
Back to the Hell thing. Hell you say? Yep. Well, what do you mean by Hell?
Computer hell is the place for computers without computer backup. The failure to perform hard drive backup means that you are playing Russian Roulette with your data. Data needs your protection. Failure to protect your data may cause your home or business records to be sent to Hell.
Hell in this instance is for the records and files that cannot be resurrected. Resurrected you say, what does that mean?
It means that without computer backup as a source of salvation then the files can safely enjoy eternal oblivion. Oblivion you say, what does that mean? That means they are eternally lost from computer resurrection.
Is there any mercy for my precious files, you ask?
Why yes there is. Would like to know what the mercy for your files is? Yes! Yes! You say.
OK boys and girls listen carefully. The salvation, mercy, resurrection and redemption of your files lies in regular and consistent and persistent computer backup.
If you backup your computer consistently and persistently your files will be resurrected and saved from accidental deletion, hard drive failure and those nasty things like fire, flood, theft, earthquake, hurricanes, tornados and the like!
Computer backup is the key to your data's salvation!
Do your computer backups boys and girls.
Milk and cookies will be served in the pantry.
Trick or treat for your computer backup?
Computer backup is so important to your computer that to ignore it is to risk its damnation.
Computers require care and feeding. They require that you attend to their needs. If you don't, then they will most surely be sent to Hell.
Halloween means Hell. What! What do you mean that Halloween means Hell?
Well, if your computer is given the option of trick or treat, which will it accept? Will it accept the trick or the treat? What do you think?
Halloween is the time that computers are subject to tricks or treats. Did you know that more computers fail on Halloween than any other day of the year? That’s right. It’s true (smile). Your computer is in danger! Protect it. Do your computer backups.
Back to the Hell thing. Hell you say? Yep. Well, what do you mean by Hell?
Computer hell is the place for computers without computer backup. The failure to perform hard drive backup means that you are playing Russian Roulette with your data. Data needs your protection. Failure to protect your data may cause your home or business records to be sent to Hell.
Hell in this instance is for the records and files that cannot be resurrected. Resurrected you say, what does that mean?
It means that without computer backup as a source of salvation then the files can safely enjoy eternal oblivion. Oblivion you say, what does that mean? That means they are eternally lost from computer resurrection.
Is there any mercy for my precious files, you ask?
Why yes there is. Would like to know what the mercy for your files is? Yes! Yes! You say.
OK boys and girls listen carefully. The salvation, mercy, resurrection and redemption of your files lies in regular and consistent and persistent computer backup.
If you backup your computer consistently and persistently your files will be resurrected and saved from accidental deletion, hard drive failure and those nasty things like fire, flood, theft, earthquake, hurricanes, tornados and the like!
Computer backup is the key to your data's salvation!
Do your computer backups boys and girls.
Milk and cookies will be served in the pantry.
Trick or treat for your computer backup?
Choosing the best computer model
Computer Families and Models
Many computer manufacturers, especially such computer giants as IBM, Dell, Gateway, Sony, Apple, etc. issue families (series) of computers. Models of computers in each series have either the same principle of design, or same processor, or have been given diapason of performances. The series can include a base model, and several derivative models. Usually for each type of computer, manufacturers issue series that generally can be divided into 3-4 categories: budget-friendly (at low price), mid-range (at middle price), cutting-edge and ultimate performance (at high, and very high prices). IBM, Gateway, Dell and Apple issue computer families not only for Home and Home office, but also for Small, Mid size or Large Businesses. These families can also include the network optimized series.
The needed features
First of all, you have to make a preliminary analysis of your needs to pick a type of computer, and a zone where you might search this computer, for example, for Home or for Small Business. But it is not sufficient.
(see: http://www.cleverace.com/Choosing_type_of_computer.htm)
To understand what kind of computer to buy, you additionally have to determine what computer performance you need: the type of processor, speed, size of memory, type of video and audio cards, type of case, and so on. You can select one from two ways: 1 - to formulate your needs in the process of searching, 2 - to compile a list a hardware requirement for the programs you might want to run
(see: http://www.cleverace.com/Choosing_best_computer_model2.htm.)
Preliminary selection:
To select a computer family, you have to choose one, which the features match your wishes. Such families can be several. Next procedures are to find the best computer family and best model of computer belonging to this family. If you know the features you need, you can identify the name of the computer family. For this goal you have to use for example, a Table of Features comparison for base models of computer families. For example, according to this Table, if you know that you need a computer only for simple text editing and emailing, your choice is Budget-Friendly Series. On the other hand, if you need for realization of your tasks a computer from Cutting-Edge series , but it is not affordable, your choice can be like a computer from Mid-range series plus a customization (perhaps, when you can better afford it).
To accelerate the search for the preliminary selection, you can find comparison information about the different types of computers with the help a comparison-shopping search engine. It allows you quickly to find the needed products sold by online stores, small businesses, and individuals in diapason of affordable prices. Search can be done by Brand, by Price, by Processor speed, etc. To find what you need, see: http://www.nextag.com/serv/cleverace/buyer/outpdir.jsp
Generally, a preliminary selection can be executed on the basis of not only cost and main functions, but also on an evaluation of convenience of use, warranties, and so on. This kind of selection you can make for computer families of different manufacturers for example, for 3 or 4 families of computer giants. Some companies, such as Gateway, gives to a buyer an opportunity to compare preliminary selected models of computers with "compare" option.
Final selection.
To find the optimal model for yourself, you may make the final selection from the preliminary chosen models. It is much easier to compare 3-4 models, than more than 5 million variants that are available on the Computer Market at the beginning of your search.
Custom built model
If you can't find a computer with the needed performances among the available computers, you need to select a vendor and to order a custom built computer.
See: http://www.cleverace.com/Ordering_custom_built_computers.htm.
Discount
Keep in mind, you can find a cheaper computer for the same model on the Discount Market, because some online stores, especially the computer giants, suggest coupons; or discounts, such as $20 off, when you spend $150 or more; free shipping; free printer; and so on.
See: http://www.cleverace.com/discount_market.htm
For more information see: Web site: www.cleverace.com:
Many computer manufacturers, especially such computer giants as IBM, Dell, Gateway, Sony, Apple, etc. issue families (series) of computers. Models of computers in each series have either the same principle of design, or same processor, or have been given diapason of performances. The series can include a base model, and several derivative models. Usually for each type of computer, manufacturers issue series that generally can be divided into 3-4 categories: budget-friendly (at low price), mid-range (at middle price), cutting-edge and ultimate performance (at high, and very high prices). IBM, Gateway, Dell and Apple issue computer families not only for Home and Home office, but also for Small, Mid size or Large Businesses. These families can also include the network optimized series.
The needed features
First of all, you have to make a preliminary analysis of your needs to pick a type of computer, and a zone where you might search this computer, for example, for Home or for Small Business. But it is not sufficient.
(see: http://www.cleverace.com/Choosing_type_of_computer.htm)
To understand what kind of computer to buy, you additionally have to determine what computer performance you need: the type of processor, speed, size of memory, type of video and audio cards, type of case, and so on. You can select one from two ways: 1 - to formulate your needs in the process of searching, 2 - to compile a list a hardware requirement for the programs you might want to run
(see: http://www.cleverace.com/Choosing_best_computer_model2.htm.)
Preliminary selection:
To select a computer family, you have to choose one, which the features match your wishes. Such families can be several. Next procedures are to find the best computer family and best model of computer belonging to this family. If you know the features you need, you can identify the name of the computer family. For this goal you have to use for example, a Table of Features comparison for base models of computer families. For example, according to this Table, if you know that you need a computer only for simple text editing and emailing, your choice is Budget-Friendly Series. On the other hand, if you need for realization of your tasks a computer from Cutting-Edge series , but it is not affordable, your choice can be like a computer from Mid-range series plus a customization (perhaps, when you can better afford it).
To accelerate the search for the preliminary selection, you can find comparison information about the different types of computers with the help a comparison-shopping search engine. It allows you quickly to find the needed products sold by online stores, small businesses, and individuals in diapason of affordable prices. Search can be done by Brand, by Price, by Processor speed, etc. To find what you need, see: http://www.nextag.com/serv/cleverace/buyer/outpdir.jsp
Generally, a preliminary selection can be executed on the basis of not only cost and main functions, but also on an evaluation of convenience of use, warranties, and so on. This kind of selection you can make for computer families of different manufacturers for example, for 3 or 4 families of computer giants. Some companies, such as Gateway, gives to a buyer an opportunity to compare preliminary selected models of computers with "compare" option.
Final selection.
To find the optimal model for yourself, you may make the final selection from the preliminary chosen models. It is much easier to compare 3-4 models, than more than 5 million variants that are available on the Computer Market at the beginning of your search.
Custom built model
If you can't find a computer with the needed performances among the available computers, you need to select a vendor and to order a custom built computer.
See: http://www.cleverace.com/Ordering_custom_built_computers.htm.
Discount
Keep in mind, you can find a cheaper computer for the same model on the Discount Market, because some online stores, especially the computer giants, suggest coupons; or discounts, such as $20 off, when you spend $150 or more; free shipping; free printer; and so on.
See: http://www.cleverace.com/discount_market.htm
For more information see: Web site: www.cleverace.com:
Buying a Personal Computer
For so many people the computer world is a seeming unsolvable jungle filled with mysterious words. Here is a guide to help you understand the personal computer and to give you the information needed to make a shopping decision you can live with so you can enjoy your PC for years to come.
Not long ago the average 'cheaper' personal computer cost was about $1500. - $2000. And this price did not necessarily include the power to edit videos, pictures, or play games. For that you would have had to spend more on upgrades. Now things such as video editing are standard on the newest personal computers. PC’s have become less expensive than ever before and they come with more capabilities than ever.
The personal computer (PC) you purchase will depend upon what it will be used for. So will you surf the Internet and email, working in spreadsheets, playing video games? Who is using the PC and what are there interests? More than likely you will have to accommodate a combination of these or maybe even all of them.
Many personal computers (PC) today offer very similar capabilities so your main decision will be based upon which specialties your personal needs present. For instance if you are mainly interested in gaming than you will be sure to spend more for a good 3D graphics card. If you want to make music you will need a good sound card. If you work all day on your computer or use it for photo editing you will want to invest in a better monitor. Also, make sure your PC has enough memory to quickly work the tasks you have planed.
For the best value for your dollar spend your money on the personal computer components that will best suit your needs.
Buying a personal computer
Not long ago the average 'cheaper' personal computer cost was about $1500. - $2000. And this price did not necessarily include the power to edit videos, pictures, or play games. For that you would have had to spend more on upgrades. Now things such as video editing are standard on the newest personal computers. PC’s have become less expensive than ever before and they come with more capabilities than ever.
The personal computer (PC) you purchase will depend upon what it will be used for. So will you surf the Internet and email, working in spreadsheets, playing video games? Who is using the PC and what are there interests? More than likely you will have to accommodate a combination of these or maybe even all of them.
Many personal computers (PC) today offer very similar capabilities so your main decision will be based upon which specialties your personal needs present. For instance if you are mainly interested in gaming than you will be sure to spend more for a good 3D graphics card. If you want to make music you will need a good sound card. If you work all day on your computer or use it for photo editing you will want to invest in a better monitor. Also, make sure your PC has enough memory to quickly work the tasks you have planed.
For the best value for your dollar spend your money on the personal computer components that will best suit your needs.
Buying a personal computer
Buying a computer
In today’s world of technology buying a computer can be difficult and confusing. Because of this we’ve decided to write this article to guide you next time you buy a computer.
Before you buy a computer it’s important to decide what you want. Consider what your needs are. This will affect the decision you make in which kind of computer to buy. How much memory will you need? What kind of video card will suit you best? Should you buy a desktop or laptop? What sort of processor will suit you best?
When you want to buy a computer it is important that you buy when you need to buy. After all, no matter how long you wait, what you want will always be cheaper in six months time.
Choose the computer you want to buy based on its functions, quality and ongoing technical support. The salesperson at your local computer should be able to help you with this when you tell them you want to buy a computer.
You will also need to decide which additional drives you will need when you buy a computer. These can include CD and DVD burners, CD drives and Zip drives.
There are also extra accessories to consider when you buy a computer. Will you want to connect to the internet? You will need a modem, whether it be built into the computer or external. Sound cards, video cards and speakers also need to be considered when you buy a computer as well as what pre-installed software – such as an operating system (eg. Windows) you will need.
Before you buy a computer it’s important to decide what you want. Consider what your needs are. This will affect the decision you make in which kind of computer to buy. How much memory will you need? What kind of video card will suit you best? Should you buy a desktop or laptop? What sort of processor will suit you best?
When you want to buy a computer it is important that you buy when you need to buy. After all, no matter how long you wait, what you want will always be cheaper in six months time.
Choose the computer you want to buy based on its functions, quality and ongoing technical support. The salesperson at your local computer should be able to help you with this when you tell them you want to buy a computer.
You will also need to decide which additional drives you will need when you buy a computer. These can include CD and DVD burners, CD drives and Zip drives.
There are also extra accessories to consider when you buy a computer. Will you want to connect to the internet? You will need a modem, whether it be built into the computer or external. Sound cards, video cards and speakers also need to be considered when you buy a computer as well as what pre-installed software – such as an operating system (eg. Windows) you will need.
Build Your Own Computer or Buy?
Just look inside a computer case. At first glance, all those wires and components can look terrifyingly complex. And thinking about putting them all together by yourself may seem impossible.
Not to worry! Even though they are the products of advanced technology, the various pieces of a personal computer (PC) fit together with simple connections. If you can use a screwdriver and follow simple instructions, you can build your own PC.
Don't be intimidated by the task of connecting the computer components together. Many of the internal connections are molded so that it is impossible to fit them together the wrong way. If you have ever assembled a child's toy, you are more than capable of assembling a computer.
Advantages Of Building Your Own
You are probably asking yourself why anyone would bother to build a PC. After all, you can buy a cheap computer in almost any retail store.
If cost is your only consideration, you probably are better off buying one of those cheap machines. But if you have any special requirements for software or hardware, you’ll benefit from the total control over the type and quality of components you get from building your own PC.
You can save some money, too. Although you probably can't match the price of the cheapest preassembled PC, once you begin adding on the inevitable customized hardware, the costs go up anyway. Suddenly building your own computer starts looking cheaper. And don't forget--those super-cheap PCs are bare-boned systems. Unless you need a computer only for basic word processing and e-mail, you will probably have to upgrade anyway.
Building your own PC can be a great learning experience. You will gain a better understanding of how the various components work together, knowledge that can be useful for troubleshooting. If your computer ever breaks down, you may be able to pinpoint the problem and fix it yourself, saving money on expensive repair bills.
You are virtually guaranteed to get the best computer when you build your own system. Big retailers often use cheaper OEM (Original Equipment Manufacturer) components to cut down on costs. Components like these can compromise the performance of a computer system. Although you can buy OEM components yourself, the trade-off in reliability and stability is usually not worth it. Brand name components are just a bit more expensive, but are well worth the cost.
Disadvantages
The major disadvantage in building your own PC is that you don't get a system-wide warranty. For example, if a malfunctioning motherboard fries your memory chips, you may not be able to get compensation for the damaged memory. If something like this happens with a store-bought system you could probably get the whole computer repaired under the warranty.
However, if you buy all your components at the same time from the same retailer, you are more likely to be compensated for this kind of situation.
Time is, of course, a factor. But it is educational time. And if you enjoy tinkering at all, it counts as fun time as well.
The Bottom Line
Building your own PC has a lot to offer. You'll be assured of getting the best components available, which translates to the best and most reliable computer for your money. You will learn about computer components and how to choose parts with the best performance. When it comes to servicing your computer, you may be able to solve and fix the problem yourself.
Oh, and one final advantage. The bragging rights of telling your friends that you built your own computer. Priceless!
Not to worry! Even though they are the products of advanced technology, the various pieces of a personal computer (PC) fit together with simple connections. If you can use a screwdriver and follow simple instructions, you can build your own PC.
Don't be intimidated by the task of connecting the computer components together. Many of the internal connections are molded so that it is impossible to fit them together the wrong way. If you have ever assembled a child's toy, you are more than capable of assembling a computer.
Advantages Of Building Your Own
You are probably asking yourself why anyone would bother to build a PC. After all, you can buy a cheap computer in almost any retail store.
If cost is your only consideration, you probably are better off buying one of those cheap machines. But if you have any special requirements for software or hardware, you’ll benefit from the total control over the type and quality of components you get from building your own PC.
You can save some money, too. Although you probably can't match the price of the cheapest preassembled PC, once you begin adding on the inevitable customized hardware, the costs go up anyway. Suddenly building your own computer starts looking cheaper. And don't forget--those super-cheap PCs are bare-boned systems. Unless you need a computer only for basic word processing and e-mail, you will probably have to upgrade anyway.
Building your own PC can be a great learning experience. You will gain a better understanding of how the various components work together, knowledge that can be useful for troubleshooting. If your computer ever breaks down, you may be able to pinpoint the problem and fix it yourself, saving money on expensive repair bills.
You are virtually guaranteed to get the best computer when you build your own system. Big retailers often use cheaper OEM (Original Equipment Manufacturer) components to cut down on costs. Components like these can compromise the performance of a computer system. Although you can buy OEM components yourself, the trade-off in reliability and stability is usually not worth it. Brand name components are just a bit more expensive, but are well worth the cost.
Disadvantages
The major disadvantage in building your own PC is that you don't get a system-wide warranty. For example, if a malfunctioning motherboard fries your memory chips, you may not be able to get compensation for the damaged memory. If something like this happens with a store-bought system you could probably get the whole computer repaired under the warranty.
However, if you buy all your components at the same time from the same retailer, you are more likely to be compensated for this kind of situation.
Time is, of course, a factor. But it is educational time. And if you enjoy tinkering at all, it counts as fun time as well.
The Bottom Line
Building your own PC has a lot to offer. You'll be assured of getting the best components available, which translates to the best and most reliable computer for your money. You will learn about computer components and how to choose parts with the best performance. When it comes to servicing your computer, you may be able to solve and fix the problem yourself.
Oh, and one final advantage. The bragging rights of telling your friends that you built your own computer. Priceless!
Building Cheap Computers in 3 Easy Steps
Just a decade ago, the only people who put computers together were those individuals who possessed an extensive technical background. Advancements in technology have eliminated some of the complexities in how computers work. This change has resulted in average people who have a basic understanding of computers being able to build a system themselves. Whether you are interested in building computers to establish a new hobby or to start a business, you can so in only a few easy steps and on a shoestring budget.
The first step in building cheap computers is to determine the route you want to use to build systems. You basically have three choices when considering building cheap computers: build a system from scratch, expand on a bare bones computer, or upgrade an existing system. Building a system from scratch can be a rewarding experience. However, it is not for everyone. If you are impatient or are intimidated by mechanical tools, you are better to choose one of the other two options.
Regardless of the method you choose, you will follow three basic steps:
1. Plan
2. Assemble
3. Test
The planning phase of your project involves determining the specifications for the computer you want to build. Once you know this information you can start shopping for parts that meet those specifications. Your main considerations should be
hard-disk, memory, and CPU (central processing unit). The harddrive is important because it determines how much information you are able to store on the computer. While you could build a computer with a harddrive smaller than 2 GB (gigabytes), it is not recommended.
The harddrive and memory work together. The amount of memory you place in your computer will directly affect how the system is able to complete the different processes that you request when using the system. If you have no idea what size hard-drive and the amount of memory you need, you should consider the type of operating system you intend to load on the system. You can consult the manufacturer of your hard-drive or review the information on Cheap-Computer-Guy.com, which features a list of minimum harddrive and memory requirements for various operating systems, and use this information as a guide.
The equipment presented in this article includes the basics of a computer system. Of course, nowadays people want far more than the basics and you undoubtedly feel the same way. There are optional components available that you may want to add to your systems, which include CD or DVD drives, a modem or other communication component for Internet connectivity, or a video graphics card.
Once you have decided on the specifications of the computer you want to build, you are ready to assemble the system. In addition to detailed information about the parts you will need to build your computer, cheap-computer-guy.com includes step-by-step instructions for assembling a cheap do-it-yourself computer.
When you have finished assembling the computer, you will then need to test to make sure that the system boots and that all components are functioning properly. Once you have completed all these tests you will have built your own cheap computer.
The first step in building cheap computers is to determine the route you want to use to build systems. You basically have three choices when considering building cheap computers: build a system from scratch, expand on a bare bones computer, or upgrade an existing system. Building a system from scratch can be a rewarding experience. However, it is not for everyone. If you are impatient or are intimidated by mechanical tools, you are better to choose one of the other two options.
Regardless of the method you choose, you will follow three basic steps:
1. Plan
2. Assemble
3. Test
The planning phase of your project involves determining the specifications for the computer you want to build. Once you know this information you can start shopping for parts that meet those specifications. Your main considerations should be
hard-disk, memory, and CPU (central processing unit). The harddrive is important because it determines how much information you are able to store on the computer. While you could build a computer with a harddrive smaller than 2 GB (gigabytes), it is not recommended.
The harddrive and memory work together. The amount of memory you place in your computer will directly affect how the system is able to complete the different processes that you request when using the system. If you have no idea what size hard-drive and the amount of memory you need, you should consider the type of operating system you intend to load on the system. You can consult the manufacturer of your hard-drive or review the information on Cheap-Computer-Guy.com, which features a list of minimum harddrive and memory requirements for various operating systems, and use this information as a guide.
The equipment presented in this article includes the basics of a computer system. Of course, nowadays people want far more than the basics and you undoubtedly feel the same way. There are optional components available that you may want to add to your systems, which include CD or DVD drives, a modem or other communication component for Internet connectivity, or a video graphics card.
Once you have decided on the specifications of the computer you want to build, you are ready to assemble the system. In addition to detailed information about the parts you will need to build your computer, cheap-computer-guy.com includes step-by-step instructions for assembling a cheap do-it-yourself computer.
When you have finished assembling the computer, you will then need to test to make sure that the system boots and that all components are functioning properly. Once you have completed all these tests you will have built your own cheap computer.
Are They Watching You Online?
When surfing the Internet you probably take your anonymity
for granted, most of us do.
Tapping phones, listening to confidential conversations,
reading others' e-mail messages seems like something that
only happens in spy movies to "other" people.
However, you probably don't realize just how much
information about yourself has the potential to get
transmitted across the Internet every time you go online.
Every computer connected to the Internet has "ports" that
allow it to connect. A "port" doesn't mean you have a
physical hole or opening in your computer's case or
hardware, but it does mean you have openings through which
information passes back and forth between your computer and
the Internet.
Depending on the type of connection (dial up, LAN, cable,
DSL), you may have several openings for potential mischief
by hackers, malicious code or viruses.
Computers with dedicated connections rate the most at risk.
If someone or something gets into one of these ports and
into your computer, they can potentially watch everything
you do and see all the data you enter, including social
security numbers and credit card information.
The easiest way to defeat this problem involves using a
firewall. Firewalls, simple and inexpensive software
available at virtually any office supply or computer store,
block the most common ports hackers use to enter your
computer.
Firewalls also help you detect and block unauthorized
transmission of information from your computer to the
Internet. This adds a significant measure of protection if
you get infected with a Trojan Horse virus that tries to
"phone home" to the hacker with your sensitive information.
If you'd like to test your connection for vulnerability to
attack, log on to http://security1.norton.com and run the
various diagnostics. I would strongly advise anyone
connected to the Internet through DSL or cable to get and
use a firewall to protect against unauthorized access.
Infected with "Spyware?"
Previously we talked about unauthorized access to your
computer. But a growing problem online with people watching
you and your activities involves using programs you
willingly place on your computer.
Commonly called "Spyware," this refers to any program that
transmits information about you to someone else without you
knowing exactly what gets sent. The main purpose of Spyware
involves tracking your surfing habits so advertisers know
which targeted ads to send you.
Most Spyware basically comes onto your computer bundled
with other software applications, as a standalone program,
or as modification to the HTML on a web page.
Regardless of how you get it, you need to understand
exactly what information gets transmitted about you so you
can decide whether to keep or uninstall the software. Plain
and simple, these Spyware programs can potentially reveal
extremely sensitive information about you and your online
habits.
If you have concerns about Spyware and whether or not your
computer currently carries any, log on to www.lavasoft.de
and check out the free PC software that will scan your
system for known Spyware.
for granted, most of us do.
Tapping phones, listening to confidential conversations,
reading others' e-mail messages seems like something that
only happens in spy movies to "other" people.
However, you probably don't realize just how much
information about yourself has the potential to get
transmitted across the Internet every time you go online.
Every computer connected to the Internet has "ports" that
allow it to connect. A "port" doesn't mean you have a
physical hole or opening in your computer's case or
hardware, but it does mean you have openings through which
information passes back and forth between your computer and
the Internet.
Depending on the type of connection (dial up, LAN, cable,
DSL), you may have several openings for potential mischief
by hackers, malicious code or viruses.
Computers with dedicated connections rate the most at risk.
If someone or something gets into one of these ports and
into your computer, they can potentially watch everything
you do and see all the data you enter, including social
security numbers and credit card information.
The easiest way to defeat this problem involves using a
firewall. Firewalls, simple and inexpensive software
available at virtually any office supply or computer store,
block the most common ports hackers use to enter your
computer.
Firewalls also help you detect and block unauthorized
transmission of information from your computer to the
Internet. This adds a significant measure of protection if
you get infected with a Trojan Horse virus that tries to
"phone home" to the hacker with your sensitive information.
If you'd like to test your connection for vulnerability to
attack, log on to http://security1.norton.com and run the
various diagnostics. I would strongly advise anyone
connected to the Internet through DSL or cable to get and
use a firewall to protect against unauthorized access.
Infected with "Spyware?"
Previously we talked about unauthorized access to your
computer. But a growing problem online with people watching
you and your activities involves using programs you
willingly place on your computer.
Commonly called "Spyware," this refers to any program that
transmits information about you to someone else without you
knowing exactly what gets sent. The main purpose of Spyware
involves tracking your surfing habits so advertisers know
which targeted ads to send you.
Most Spyware basically comes onto your computer bundled
with other software applications, as a standalone program,
or as modification to the HTML on a web page.
Regardless of how you get it, you need to understand
exactly what information gets transmitted about you so you
can decide whether to keep or uninstall the software. Plain
and simple, these Spyware programs can potentially reveal
extremely sensitive information about you and your online
habits.
If you have concerns about Spyware and whether or not your
computer currently carries any, log on to www.lavasoft.de
and check out the free PC software that will scan your
system for known Spyware.
All About Computer Viruses
Feel Free to reprint this article in newsletters and on websites, with resource box included. If you use this article, please send a brief message to let me know where it appeared: kara333@earthlink.net
Word Count = 1,500
Word Wrapped to 60 characters per line
URL: http://www.karathecomputertutor.com
Author photo: http://www.karathecomputertutor.com
Date of copyright: November 2004
All About Computer Viruses
by Kara Glover
kara333@earthlink.net
Your computer is as slow as molasses. Your mouse freezes every 15 minutes, and that Microsoft Word program just won’t seem to open.
You might have a virus.
Just what exactly is a virus? What kind is in your computer? How did it get there? How is it spreading and wreaking such havoc? And why is it bothering with your computer anyway?
Viruses are pieces of programming code that make copies of themselves, or replicate, inside your computer without asking your explicit written permission to do so. Forget getting your permission down on paper. Viruses don’t bother to seek your permission at all! Very invasive.
In comparison, there are pieces of code that might replicate inside your computer, say something your IT guy thinks you need. But the code spreads, perhaps throughout your office network, with your consent (or at least your IT guy’s consent). These types of replicating code are called agents, said Jimmy Kuo, a research fellow with McAfee AVERT, a research arm of anti-virus software-maker McAfee Inc.
In this article, though, we’re not talking about the good guys, or the agents. We’ll be talking about the bad guys, the viruses.
A long, long time ago in computer years, like five, most viruses were comprised of a similar breed. They entered your computer perhaps through an email attachment or a floppy disk (remember those?). Then they attached themselves to one of your files, say your Microsoft Word program.
When you opened your Microsoft Word program, the virus replicated and attached itself to other files. These could be other random files on your hard drive, the files furthest away from your Microsoft Word program, or other files, depending on how the virus writer wanted the virus to behave.
This virus code could contain hundreds or thousands of instructions. When it replicates it inserts those instructions, into the files it infects, said Carey Nachenberg, Chief Architect at Symantec Research Labs, an arm of anti-virus software-maker Symantec. Corp.
Because so many other types of viruses exist now, the kind just described is called a classic virus. Classic viruses still exist but they’re not quite as prevalent as they used to be. (Perhaps we could put classic viruses on the shelf with Hemingway and Dickens.)
These days, in the modern era, viruses are known to spread through vulnerabilities in web browsers, files shared over the internet, emails themselves, and computer networks.
As far as web browsers are concerned, Microsoft’s Internet Explorer takes most of the heat for spreading viruses because it’s used by more people for web surfing than any other browser.
Nevertheless, “Any web browser potentially has vulnerabilities,” Nachenberg said.
For instance, let’s say you go to a website in IE you have every reason to think is safe, Nachenberg said.
But unfortunately it isn’t. It has virus code hidden in its background that IE isn’t protecting you from. While you’re looking at the site, the virus is downloaded onto your computer, he said. That’s one way of catching a nasty virus.
During the past two years, another prevalent way to catch a virus has been through downloads computer users share with one another, mostly on music sharing sites, Kuo said. On Limewire or Kazaa, for instance, teenagers or other music enthusiasts might think they’re downloading that latest Justin Timberlake song, when in reality they’re downloading a virus straight into their computer. It’s easy for a virus writer to put a download with a virus on one of these sites because everyone’s sharing with everyone else anyway.
Here’s one you might not have thought of. If you use Outlook or Outlook Express to send and receive email, do you have a preview pane below your list of emails that shows the contents of the email you have highlighted? If so, you may be putting yourself at risk.
Some viruses, though a small percentage according to Nachenberg, are inserted straight into emails themselves.
Forget opening the attachment. All you have to do is view the email to potentially get a virus, Kuo added. For instance, have you ever opened or viewed an email that states it’s “loading”? Well, once everything is “loaded,” a virus in the email might just load onto your computer.
So if I were you, I’d click on View on the toolbar in your Outlook or Outlook Express and close the preview pane. (You have to click on View and then Layout in Outlook Express.)
On a network at work? You could get a virus that way. Worms are viruses that come into your computer via networks, Kuo said. They travel from machine to machine and, unlike, the classic viruses, they attack the machine itself rather than individual files.
Worms sit in your working memory, or RAM, Nachenberg said.
OK, so we’ve talked about how the viruses get into a computer. How do they cause so much damage once they’re there?
Let’s say you’ve caught a classic virus, one that replicates and attacks various files on your computer. Let’s go back to the example of the virus that initially infects your Microsoft Word program.
Well, it might eventually cause that program to crash, Nachenberg said. It also might cause damage to your computer as it looks for new targets to infect.
This process of infecting targets and looking for new ones could eventually use up your computer’s ability to function, he said.
Often the destruction a virus causes is pegged to a certain event or date and time, called a trigger. For instance, a virus could be programmed to lay dormant until January 28. When that date rolls around, though, it may be programmed to do something as innocuous but annoying as splash popups on your screen, or something as severe as reformat your computer’s hard drive, Nachenberg said.
There are other potential reasons, though, for a virus to cause your computer to be acting slow or in weird ways. And that leads us to a new segment – the reason virus writers would want to waste their time creating viruses in the first place.
The majority of viruses are still written by teenagers looking for some notoriety, Nachenberg said. But a growing segment of the virus-writing population has other intentions in mind.
For these other intentions, we first need to explain the “backdoor” concept.
The sole purpose of some viruses is to create a vulnerability in your computer. Once it creates this hole of sorts, or backdoor, it signals home to mama or dada virus writer (kind of like in E.T.). Once the virus writer receives the signal, they can use and abuse your computer to their own likings.
Trojans are sometimes used to open backdoors. In fact that is usually their sole purpose, Kuo said.
Trojans are pieces of code you might download onto your computer, say, from a newsgroup. As in the Trojan War they are named after, they are usually disguised as innocuous pieces of code. But Trojans aren’t considered viruses because they don’t replicate.
Now back to the real viruses. Let’s say we have Joe Shmo virus writer. He sends out a virus that ends up infecting a thousand machines. But he doesn’t want the feds on his case. So he instructs the viruses on the various machines to send their signals, not of course to his computer, but to a place that can’t be traced. Hotmail email happens to be an example of one such place, Kuo said.
OK, so the virus writers now control these computers. What will they use them for?
One use is to send spam. Once that backdoor is open, they bounce spam off of those computers and send it to other machines, Nachenberg said.
That’s right. Some spam you have in your email right now may have been originally sent to other innocent computers before it came to yours so that it could remain in disguise. If the authorities could track down the original senders of spam, they could crack down on spam itself. Spam senders don’t want that.
Ever heard of phishing emails? Those are the ones that purport to be from your internet service provider or bank. They typically request some information from you, like your credit card number. The problem is, they’re NOT from your internet service provider or your bank. They’re from evil people after your credit card number! Well, these emails are often sent the same way spam is sent, by sending them via innocent computers.
Of course makers of anti-virus software use a variety of methods to combat the onslaught of viruses. Norton, for instance, uses signature scanning, Nachenberg said.
Signature scanning is similar to the process of looking for DNA fingerprints, he said. Norton examines programming code to find what viruses are made of. It adds those bad instructions it finds to its large database of other bad code. Then it uses this vast database to seek out and match the code in it with similar code in your computer. When it finds such virus code, it lets you know!
Word Count = 1,500
Word Wrapped to 60 characters per line
URL: http://www.karathecomputertutor.com
Author photo: http://www.karathecomputertutor.com
Date of copyright: November 2004
All About Computer Viruses
by Kara Glover
kara333@earthlink.net
Your computer is as slow as molasses. Your mouse freezes every 15 minutes, and that Microsoft Word program just won’t seem to open.
You might have a virus.
Just what exactly is a virus? What kind is in your computer? How did it get there? How is it spreading and wreaking such havoc? And why is it bothering with your computer anyway?
Viruses are pieces of programming code that make copies of themselves, or replicate, inside your computer without asking your explicit written permission to do so. Forget getting your permission down on paper. Viruses don’t bother to seek your permission at all! Very invasive.
In comparison, there are pieces of code that might replicate inside your computer, say something your IT guy thinks you need. But the code spreads, perhaps throughout your office network, with your consent (or at least your IT guy’s consent). These types of replicating code are called agents, said Jimmy Kuo, a research fellow with McAfee AVERT, a research arm of anti-virus software-maker McAfee Inc.
In this article, though, we’re not talking about the good guys, or the agents. We’ll be talking about the bad guys, the viruses.
A long, long time ago in computer years, like five, most viruses were comprised of a similar breed. They entered your computer perhaps through an email attachment or a floppy disk (remember those?). Then they attached themselves to one of your files, say your Microsoft Word program.
When you opened your Microsoft Word program, the virus replicated and attached itself to other files. These could be other random files on your hard drive, the files furthest away from your Microsoft Word program, or other files, depending on how the virus writer wanted the virus to behave.
This virus code could contain hundreds or thousands of instructions. When it replicates it inserts those instructions, into the files it infects, said Carey Nachenberg, Chief Architect at Symantec Research Labs, an arm of anti-virus software-maker Symantec. Corp.
Because so many other types of viruses exist now, the kind just described is called a classic virus. Classic viruses still exist but they’re not quite as prevalent as they used to be. (Perhaps we could put classic viruses on the shelf with Hemingway and Dickens.)
These days, in the modern era, viruses are known to spread through vulnerabilities in web browsers, files shared over the internet, emails themselves, and computer networks.
As far as web browsers are concerned, Microsoft’s Internet Explorer takes most of the heat for spreading viruses because it’s used by more people for web surfing than any other browser.
Nevertheless, “Any web browser potentially has vulnerabilities,” Nachenberg said.
For instance, let’s say you go to a website in IE you have every reason to think is safe, Nachenberg said.
But unfortunately it isn’t. It has virus code hidden in its background that IE isn’t protecting you from. While you’re looking at the site, the virus is downloaded onto your computer, he said. That’s one way of catching a nasty virus.
During the past two years, another prevalent way to catch a virus has been through downloads computer users share with one another, mostly on music sharing sites, Kuo said. On Limewire or Kazaa, for instance, teenagers or other music enthusiasts might think they’re downloading that latest Justin Timberlake song, when in reality they’re downloading a virus straight into their computer. It’s easy for a virus writer to put a download with a virus on one of these sites because everyone’s sharing with everyone else anyway.
Here’s one you might not have thought of. If you use Outlook or Outlook Express to send and receive email, do you have a preview pane below your list of emails that shows the contents of the email you have highlighted? If so, you may be putting yourself at risk.
Some viruses, though a small percentage according to Nachenberg, are inserted straight into emails themselves.
Forget opening the attachment. All you have to do is view the email to potentially get a virus, Kuo added. For instance, have you ever opened or viewed an email that states it’s “loading”? Well, once everything is “loaded,” a virus in the email might just load onto your computer.
So if I were you, I’d click on View on the toolbar in your Outlook or Outlook Express and close the preview pane. (You have to click on View and then Layout in Outlook Express.)
On a network at work? You could get a virus that way. Worms are viruses that come into your computer via networks, Kuo said. They travel from machine to machine and, unlike, the classic viruses, they attack the machine itself rather than individual files.
Worms sit in your working memory, or RAM, Nachenberg said.
OK, so we’ve talked about how the viruses get into a computer. How do they cause so much damage once they’re there?
Let’s say you’ve caught a classic virus, one that replicates and attacks various files on your computer. Let’s go back to the example of the virus that initially infects your Microsoft Word program.
Well, it might eventually cause that program to crash, Nachenberg said. It also might cause damage to your computer as it looks for new targets to infect.
This process of infecting targets and looking for new ones could eventually use up your computer’s ability to function, he said.
Often the destruction a virus causes is pegged to a certain event or date and time, called a trigger. For instance, a virus could be programmed to lay dormant until January 28. When that date rolls around, though, it may be programmed to do something as innocuous but annoying as splash popups on your screen, or something as severe as reformat your computer’s hard drive, Nachenberg said.
There are other potential reasons, though, for a virus to cause your computer to be acting slow or in weird ways. And that leads us to a new segment – the reason virus writers would want to waste their time creating viruses in the first place.
The majority of viruses are still written by teenagers looking for some notoriety, Nachenberg said. But a growing segment of the virus-writing population has other intentions in mind.
For these other intentions, we first need to explain the “backdoor” concept.
The sole purpose of some viruses is to create a vulnerability in your computer. Once it creates this hole of sorts, or backdoor, it signals home to mama or dada virus writer (kind of like in E.T.). Once the virus writer receives the signal, they can use and abuse your computer to their own likings.
Trojans are sometimes used to open backdoors. In fact that is usually their sole purpose, Kuo said.
Trojans are pieces of code you might download onto your computer, say, from a newsgroup. As in the Trojan War they are named after, they are usually disguised as innocuous pieces of code. But Trojans aren’t considered viruses because they don’t replicate.
Now back to the real viruses. Let’s say we have Joe Shmo virus writer. He sends out a virus that ends up infecting a thousand machines. But he doesn’t want the feds on his case. So he instructs the viruses on the various machines to send their signals, not of course to his computer, but to a place that can’t be traced. Hotmail email happens to be an example of one such place, Kuo said.
OK, so the virus writers now control these computers. What will they use them for?
One use is to send spam. Once that backdoor is open, they bounce spam off of those computers and send it to other machines, Nachenberg said.
That’s right. Some spam you have in your email right now may have been originally sent to other innocent computers before it came to yours so that it could remain in disguise. If the authorities could track down the original senders of spam, they could crack down on spam itself. Spam senders don’t want that.
Ever heard of phishing emails? Those are the ones that purport to be from your internet service provider or bank. They typically request some information from you, like your credit card number. The problem is, they’re NOT from your internet service provider or your bank. They’re from evil people after your credit card number! Well, these emails are often sent the same way spam is sent, by sending them via innocent computers.
Of course makers of anti-virus software use a variety of methods to combat the onslaught of viruses. Norton, for instance, uses signature scanning, Nachenberg said.
Signature scanning is similar to the process of looking for DNA fingerprints, he said. Norton examines programming code to find what viruses are made of. It adds those bad instructions it finds to its large database of other bad code. Then it uses this vast database to seek out and match the code in it with similar code in your computer. When it finds such virus code, it lets you know!
A Guide To Basic Computer Terminology
Ram? Mouse? One is an animal and one is a rodent right? Ram...that is the zodiac sign for Aries... If this is what these words mean to you than you can surely use this quick glossary of computer terminology. It would be a good idea to read through them before purchasing a computer because these are things you should know about first. If you already have a computer then these computer terms can help you know what to do if your new computer equipment is unfamiliar. Also, this computer terminology can help you if you have to call in for technical help.
Okay lets go!
Cache: Cache is another type of memory kindred to RAM. The computer uses cache to quickly move data between the RAM and the CPU.
CD-ROM Drive: Most new computers now come with a CD-ROM drive as standard equipment. A CD-ROM drive reads data from a disc. These CDs look like a music CD, but hold data instead of music. CD-ROMs also contain games, dictionaries, recipe files, and lots of other things that you can load onto your computer.
CPU: The CPU, or central processing unit, is the brains of the computer. Most new Windows based programs use a Pentium processor or a AMD Athlon XP. New Macs use a different type of CPU called Power PC.
Disk Drive:Virtually all computers come with a disk drive that can read and save information on portable diskettes, also called floppy disks. You can use floppy disks to save information or to load new software onto your computer.
Hard Drive: The hard drive is also called the hard disk. You'll probably never see it because it is nestled inside your computer. It's the computer's electronic filling cabinet, and it stores the computer's operating system, files, programs and documents.
Keyboard: Just like a typewriter keyboard, this device is the primary way of inputting data into the computer programs.
Megahertz (MHz): This is the clock speed of the microprocessor. The higher the number, the quicker the information is processed. MHz relates to how many millions of instructions can be processed per second.
Memory:This is the circuitry or device that holds information in an electrical or magnetic form. There is read-only memory (ROM), which is information primarily stored on a disk, and random-access memory (RAM), which is chip-based storage inside the computer. Memory is typically measured in megabytes (MBs).
Modem:This mechanism connects a computer to a phone line so information can be sent from one computer to another or the user can access an on-line service or the Internet. In view of the popularity of the Internet, a modem is now considered basic equipment and comes on practically all-new computers. Most modems come with fax capabilities.
Monitor: An output device that allows you to see what you are doing (it is what you are looking into right now to see this). Most computers come with 14 or 15-inch monitors. This size is good for most people's needs. Larger 17 or 21-inch monitors also are available, but may cost more. Myself, I prefer the 17-inch.
Motherboard:The motherboard is the circuit board that everything in the computer plugs into. The CPU, RAM and cache all plug into the motherboard.
Mouse: The mouse is another input device that makes getting around in your computer easier. It is a handheld object that is good for doing tasks such as moving and pointing to objects on the screen, and can replace the function and control keys of the keyboard. (If you need a lesson on how the mouse works and how to use it click here for a tutorial.)
Printer: A printer is an essential part of the computer if you want a hard copy of your work. There are four types of printers on the market: dot matrix, inkjet, bubble jet and laser. The dot matrix is the most basic. Most inkjets and bubble jets can print color and graphics, and a laser printer offers the best resolution at the highest speed.
RAM:Computers save data in two ways: on the hard drive and in random access memory or internal memory. New computer buyers should look for models with at least 16 MBs of RAM (or more, depending on what types of programs you'll be running). Make sure that the computer can be upgraded.
Scanner:A scanner is a useful accessory to have if you are working with lots of artwork or photos. This device can copy written documents, pictures or photographs directly into your computer. There are three types of scanners: handheld, hopper-feed and flatbed.
Sound Card: This device allows your computer to reproduce music, sounds and voices. Make sure you have a sound card if you're planning to play multimedia games.
Video Card: The video card is the part of the computer that sends the images to the monitor.
Well there you have it, a quick course on computer terms. I hope it has helped to guide you in your purchase of a new computer; or to help you with the one you have.
Okay lets go!
Cache: Cache is another type of memory kindred to RAM. The computer uses cache to quickly move data between the RAM and the CPU.
CD-ROM Drive: Most new computers now come with a CD-ROM drive as standard equipment. A CD-ROM drive reads data from a disc. These CDs look like a music CD, but hold data instead of music. CD-ROMs also contain games, dictionaries, recipe files, and lots of other things that you can load onto your computer.
CPU: The CPU, or central processing unit, is the brains of the computer. Most new Windows based programs use a Pentium processor or a AMD Athlon XP. New Macs use a different type of CPU called Power PC.
Disk Drive:Virtually all computers come with a disk drive that can read and save information on portable diskettes, also called floppy disks. You can use floppy disks to save information or to load new software onto your computer.
Hard Drive: The hard drive is also called the hard disk. You'll probably never see it because it is nestled inside your computer. It's the computer's electronic filling cabinet, and it stores the computer's operating system, files, programs and documents.
Keyboard: Just like a typewriter keyboard, this device is the primary way of inputting data into the computer programs.
Megahertz (MHz): This is the clock speed of the microprocessor. The higher the number, the quicker the information is processed. MHz relates to how many millions of instructions can be processed per second.
Memory:This is the circuitry or device that holds information in an electrical or magnetic form. There is read-only memory (ROM), which is information primarily stored on a disk, and random-access memory (RAM), which is chip-based storage inside the computer. Memory is typically measured in megabytes (MBs).
Modem:This mechanism connects a computer to a phone line so information can be sent from one computer to another or the user can access an on-line service or the Internet. In view of the popularity of the Internet, a modem is now considered basic equipment and comes on practically all-new computers. Most modems come with fax capabilities.
Monitor: An output device that allows you to see what you are doing (it is what you are looking into right now to see this). Most computers come with 14 or 15-inch monitors. This size is good for most people's needs. Larger 17 or 21-inch monitors also are available, but may cost more. Myself, I prefer the 17-inch.
Motherboard:The motherboard is the circuit board that everything in the computer plugs into. The CPU, RAM and cache all plug into the motherboard.
Mouse: The mouse is another input device that makes getting around in your computer easier. It is a handheld object that is good for doing tasks such as moving and pointing to objects on the screen, and can replace the function and control keys of the keyboard. (If you need a lesson on how the mouse works and how to use it click here for a tutorial.)
Printer: A printer is an essential part of the computer if you want a hard copy of your work. There are four types of printers on the market: dot matrix, inkjet, bubble jet and laser. The dot matrix is the most basic. Most inkjets and bubble jets can print color and graphics, and a laser printer offers the best resolution at the highest speed.
RAM:Computers save data in two ways: on the hard drive and in random access memory or internal memory. New computer buyers should look for models with at least 16 MBs of RAM (or more, depending on what types of programs you'll be running). Make sure that the computer can be upgraded.
Scanner:A scanner is a useful accessory to have if you are working with lots of artwork or photos. This device can copy written documents, pictures or photographs directly into your computer. There are three types of scanners: handheld, hopper-feed and flatbed.
Sound Card: This device allows your computer to reproduce music, sounds and voices. Make sure you have a sound card if you're planning to play multimedia games.
Video Card: The video card is the part of the computer that sends the images to the monitor.
Well there you have it, a quick course on computer terms. I hope it has helped to guide you in your purchase of a new computer; or to help you with the one you have.
After the best sourced advice relating to computer securityrisk model computer security
When you are in search of top advice concerning computer securityrisk model computer security, you'll find it easier said than done extricating superior advice from misguided computer securityrisk model computer security submissions and support so it is wise to recognize ways of judging the information you are offered.
Here's a few tips that we think you should use when you're searching for information about computer securityrisk model computer security. You need to realize the recommendation we give is only applicable to internet based information regarding computer securityrisk model computer security. We cannot offer any assistance or guidance when you are also conducting research offline.
A great hint to follow when offered help and advice regarding a computer securityrisk model computer security article is to verify the ownership of the website. Doing this could reveal the owners computer securityrisk model computer security qualifications The easiest way to work out who is at the back of the computer securityrisk model computer security website is to look on the 'about' page or 'contact' page.
All reliable sites providing content on computer securityrisk model computer security, will almost certainly provide an 'about' or 'contact' page which will list the site owner's details. The details should make known key points about the owner's necessary expertise. This permits you to make an informed assessment about the vendor's insight and appreciation, to provide advice to you regarding computer securityrisk model computer security.
Here's a few tips that we think you should use when you're searching for information about computer securityrisk model computer security. You need to realize the recommendation we give is only applicable to internet based information regarding computer securityrisk model computer security. We cannot offer any assistance or guidance when you are also conducting research offline.
A great hint to follow when offered help and advice regarding a computer securityrisk model computer security article is to verify the ownership of the website. Doing this could reveal the owners computer securityrisk model computer security qualifications The easiest way to work out who is at the back of the computer securityrisk model computer security website is to look on the 'about' page or 'contact' page.
All reliable sites providing content on computer securityrisk model computer security, will almost certainly provide an 'about' or 'contact' page which will list the site owner's details. The details should make known key points about the owner's necessary expertise. This permits you to make an informed assessment about the vendor's insight and appreciation, to provide advice to you regarding computer securityrisk model computer security.
Advice about the most informative opinion regarding computer.
Advice about the most informative opinion regarding computer.
When you're trying to find high-class advice about computer, you'll find it difficult extricating the best information from misguided computer suggestions and help so it's best to know ways of judging the information you are offered.
Here are several guidelines which we believe you should use when you're searching for information regarding computer. Please understand that the advice we offer is only relevant to internet information about computer. We don't offer any guidance or advice for conducting research offline.
A great hint to follow when you are presented with information or advice on a computer web page is to verify the ownership of the website. This may show you the people behind the site computer authority The easiest way to reveal who owns the computer website is to look on the 'about' page or 'contact' page.
Any reputable site providing information about computer, will almost always provide an 'about' or 'contact' page which will list the people behind the site. The particulars should reveal key points concerning the owner's requisite knowledge. This enables you to make an assessment about the vendor's education and practical knowledge, to offer guidance about computer.
When you're trying to find high-class advice about computer, you'll find it difficult extricating the best information from misguided computer suggestions and help so it's best to know ways of judging the information you are offered.
Here are several guidelines which we believe you should use when you're searching for information regarding computer. Please understand that the advice we offer is only relevant to internet information about computer. We don't offer any guidance or advice for conducting research offline.
A great hint to follow when you are presented with information or advice on a computer web page is to verify the ownership of the website. This may show you the people behind the site computer authority The easiest way to reveal who owns the computer website is to look on the 'about' page or 'contact' page.
Any reputable site providing information about computer, will almost always provide an 'about' or 'contact' page which will list the people behind the site. The particulars should reveal key points concerning the owner's requisite knowledge. This enables you to make an assessment about the vendor's education and practical knowledge, to offer guidance about computer.
Advancement in Computer Technology
5 years ago we gathered around and marveled at the little specs moving at our commands, doing not much – except moving off course, we called these things games. Today the hardware in computers and other devices has changed significantly; we went from having a “spacious” 1mb hard drive to 250 GB of space. The graphics have also taken a giant leap for our computers, no longer are we confined to little dots but our 256mb graphic cards allow us to explore a virtual world in 3d. The sound has also changed from 4bit to 32 and pretty soon 64bit; we went from beeps to actually words. Finally the speed of our beloved computers has also increased from mere kilobytes to gigabytes of rams. In such a short period of time we went from what we used to call “advanced” technology to today’s much superior devices. So if you guys are like I am, there is one question that strikes our mind, what’s next? Well I would love to say that we will be able to put on our virtual glasses that will allow us to explore the virtual world as if we were in it, but this is not likely, sorry guys; however, these sorts of glasses are being constructed but its unlikely they will come out any time soon. What we can expect to see is an improvement in our Text-to-speech and vise versa programs after the 64bit sound card is released allowing the computer to understand our voices much clearly, also we should soon be seeing more “dept” in our computer as you may know that the most our computers can run on 32bit resolution, it is expected that Microsoft is like to bring out a 64bit resolution with there next version of windows. Also the speed and graphics are to increase a lot more, already some games look as they are almost real, and soon they will look real. I am not certain exactly what marvel the computer hardware’s will hold in the future, but one thing is certain it will be something to forward too, and once again the next generation will be mocking the so called advanced technology we have today.
Access Your PC From The Road
Have you ever sat in front of your computer and wished you could show someone else what appeared on your screen?
Maybe you were experiencing a problem, or couldn't figure out how to make something work, but you knew if someone else could see what was happening on your screen, they could help you fix the problem immediately.
Ever had a phone conversation with someone about a particular business topic, but you just couldn't "connect" with your ideas because it was too hard to explain over the phone?
Now, visualize jumping on the phone with that same person and literally sharing your computer's desktop to collaborate, discuss, and create virtually anything together, even if you are separated by thousands of miles.
Though this may sound like an episode of Star Trek, remote computer sharing is actually a daily business reality.
Imagine you need to take a trip and you either don't want to or can't take your computer.
The thought of emails piling up for days makes you crazy and you also need to monitor some things on your pc.
Instead of trying to lug your laptop (or fit your desktop into your suitcase), you can use "remote desktop" software that allows you to access your computer through the Internet from any other computer in the world.
One of the most common remote desktop services is GoToMyPC.com, which provides a safe and secure way for you to go down to the local internet café, log on, and access your office or home computer just like sitting at your own desk.
Now, before you panic and think anyone can access your computer, let me explain security.
First, you log in to the GoToMyPC.com website with a username and password.
Once logged in, you then click a link to log onto your PC, which will then ask you for another password.
GoToMyPC.com has even thought of a solution for those of you worried about people looking over your shoulder as you enter your passwords on a public computer or if the computer you use might carry a keystroke logger.
Before leaving home, you can program in a series of up to 99 passwords that only work one time.
This means even if someone watches you log into your computer or records your keystrokes, the password you used won't work again.
If a would-be thief tries to access your computer too many times, GoToMyPC.com will shut down all access attempts to your PC.
The benefits of remotely accessing your PC from the road are numerous, but the bottom line is that it enables you to use your computer from the road like you never left home.
For example: while traveling to a conference this weekend, my wife (and business partner) accessed our office computer from my laptop and, instead of the usual pile of 4,000 emails that would normally await after 5 days away, we just picked up this morning like we'd never been gone.
The same company that offers GoToMyPC.com also offers a service called GoToMeeting.com which allows you to remotely host a meeting where multiple users can share and collaborate on a single computer desktop.
This service makes it super simple to provide online training, do software demos, and even make complete sales presentations.
I personally use both of these services and find them easy, reliable and well worth the price.
Maybe you were experiencing a problem, or couldn't figure out how to make something work, but you knew if someone else could see what was happening on your screen, they could help you fix the problem immediately.
Ever had a phone conversation with someone about a particular business topic, but you just couldn't "connect" with your ideas because it was too hard to explain over the phone?
Now, visualize jumping on the phone with that same person and literally sharing your computer's desktop to collaborate, discuss, and create virtually anything together, even if you are separated by thousands of miles.
Though this may sound like an episode of Star Trek, remote computer sharing is actually a daily business reality.
Imagine you need to take a trip and you either don't want to or can't take your computer.
The thought of emails piling up for days makes you crazy and you also need to monitor some things on your pc.
Instead of trying to lug your laptop (or fit your desktop into your suitcase), you can use "remote desktop" software that allows you to access your computer through the Internet from any other computer in the world.
One of the most common remote desktop services is GoToMyPC.com, which provides a safe and secure way for you to go down to the local internet café, log on, and access your office or home computer just like sitting at your own desk.
Now, before you panic and think anyone can access your computer, let me explain security.
First, you log in to the GoToMyPC.com website with a username and password.
Once logged in, you then click a link to log onto your PC, which will then ask you for another password.
GoToMyPC.com has even thought of a solution for those of you worried about people looking over your shoulder as you enter your passwords on a public computer or if the computer you use might carry a keystroke logger.
Before leaving home, you can program in a series of up to 99 passwords that only work one time.
This means even if someone watches you log into your computer or records your keystrokes, the password you used won't work again.
If a would-be thief tries to access your computer too many times, GoToMyPC.com will shut down all access attempts to your PC.
The benefits of remotely accessing your PC from the road are numerous, but the bottom line is that it enables you to use your computer from the road like you never left home.
For example: while traveling to a conference this weekend, my wife (and business partner) accessed our office computer from my laptop and, instead of the usual pile of 4,000 emails that would normally await after 5 days away, we just picked up this morning like we'd never been gone.
The same company that offers GoToMyPC.com also offers a service called GoToMeeting.com which allows you to remotely host a meeting where multiple users can share and collaborate on a single computer desktop.
This service makes it super simple to provide online training, do software demos, and even make complete sales presentations.
I personally use both of these services and find them easy, reliable and well worth the price.
A Basic Introduction To Spyware
Spyware is the most troublesome software to appear on the
Internet in recent times. When spyware infects a computer
system, it may be relatively harmless or it may be
devastating.
Spyware like coolwebsearch and new.net are capable of
paralyzing a computer system. Laws to regulate spyware are
pending in many states and may take years to enforce.
What Is Spyware?
Spyware is any software that collects information about
computer usage and/or the computer user. It is installed on
one computer and sends information to another computer.
Some spywares like the Weather Bug, Bear Share and Kazaa
are knowingly downloaded and installed by users. Other
spyware is installed without the knowledge or permission of
the user.
How Does Spyware Affect A Computer?
Symptoms of spyware infection includes:
* Very slow system performance while browsing the Internet.
* Your homepage changing mysteriously on its own.
* Excessive appearance of pop-ups, on sites likes Google,
Yahoo and MSN, which don't use them.
* You can only get your browser to visit sites, which are
trying to dupe you into buying spy ware removal software.
Many spyware detection and elimination programs are easily
available for free on the Internet.
How Does One Deal With Spyware?
There are many tools and catalogues available to deal with
spyware. One of these tools is Spybot Search and Destroy.
It scans computers for spyware and harmful programs. It
shows a list of problem areas to the user and allows him to
delete any or all of them.
A user can leave legitimate programs installed by him.
These may include peer-to-peer file sharing software or
software installed to monitor the on-line activities of
children.
A Comprehensive Solution
It may be a good idea for most computer owners to get a
comprehensive PC security solution as a bundle. Norton and
McAfee, now offer a complete security suite consisting of
anti-virus, personal firewall, anti-spam and privacy
offerings, and anti-spy ware.
They are quite easy to install and allow parents to monitor
children who use the computer. There are many threats on
the Internet, from which these suites can protect your
computer.
===========================================================
Click to find a daily updated blog of articles and news
about spyware ! Get advice and information about how to
protect your computer from attack, and disinfect it.. Click
Internet in recent times. When spyware infects a computer
system, it may be relatively harmless or it may be
devastating.
Spyware like coolwebsearch and new.net are capable of
paralyzing a computer system. Laws to regulate spyware are
pending in many states and may take years to enforce.
What Is Spyware?
Spyware is any software that collects information about
computer usage and/or the computer user. It is installed on
one computer and sends information to another computer.
Some spywares like the Weather Bug, Bear Share and Kazaa
are knowingly downloaded and installed by users. Other
spyware is installed without the knowledge or permission of
the user.
How Does Spyware Affect A Computer?
Symptoms of spyware infection includes:
* Very slow system performance while browsing the Internet.
* Your homepage changing mysteriously on its own.
* Excessive appearance of pop-ups, on sites likes Google,
Yahoo and MSN, which don't use them.
* You can only get your browser to visit sites, which are
trying to dupe you into buying spy ware removal software.
Many spyware detection and elimination programs are easily
available for free on the Internet.
How Does One Deal With Spyware?
There are many tools and catalogues available to deal with
spyware. One of these tools is Spybot Search and Destroy.
It scans computers for spyware and harmful programs. It
shows a list of problem areas to the user and allows him to
delete any or all of them.
A user can leave legitimate programs installed by him.
These may include peer-to-peer file sharing software or
software installed to monitor the on-line activities of
children.
A Comprehensive Solution
It may be a good idea for most computer owners to get a
comprehensive PC security solution as a bundle. Norton and
McAfee, now offer a complete security suite consisting of
anti-virus, personal firewall, anti-spam and privacy
offerings, and anti-spy ware.
They are quite easy to install and allow parents to monitor
children who use the computer. There are many threats on
the Internet, from which these suites can protect your
computer.
===========================================================
Click to find a daily updated blog of articles and news
about spyware ! Get advice and information about how to
protect your computer from attack, and disinfect it.. Click
5 Sure-Fire Tips for Buying a New Computer
So you're thinking of buying a new computer...
Where do you start? There are so many brands and models of computers available, and it can all be a little overwhelming when you start to look around.
How do you decide what type of computer you need? And perhaps more importantly, how do you decide what the best value is?
I have sold computers professionally for almost 20 years, and there are certain "tricks of the trade" that most computer stores and salespeople use. Knowing these secrets can make your decision easier and will help you buy the right computer for your needs.
1. Buy What You Need, Maybe a Little More
One of the most important things you can do when buying a new computer is make a list of the things that you will be using it for. There are so many different models - with different capabilities - that you can easily buy more, or less, than you really need if you don't.
If this is your first computer, this can be a little tougher. Until you've used a computer, it's hard to know exactly what you might want to do with it beyond the obvious, like connecting to the internet.
Regardless, you should think about some of the things you might want to do. Some possibilities include:
- Connect to the internet
- Play games
- Digital photography
- Digital video
- Type documents
- Accounting
- Design websites
- Programming
- Digital scrapbooking
- Geneology
Some of these things need more power than others. For example, connecting to the internet really doesn't need a lot of power. Even the most basic computer available will probably work just fine.
Digital video and many games need a lot more power. If you don't get a fast enough computer with enough memory, you'll be disappointed with the performance.
Knowing what you're going to be using your computer for will help your salesperson, whether they're on the phone, the internet or standing in front of you, recommend the best system for your needs.
As a general rule you're always better off buying more power than you need rather than less, but buying too much can be a waste of money.
2. Warranty Considerations
Computer warranties are one of the most confusing and obscure parts of your purchase. Most manufacturers have cut back on their customer service to the point where poor service has become a given.
The three most common options are onsite, carry-in or manufacturer's depot service.
Onsite service can be helpful, but think about whether you want to have to be available for a technician to come and diagnose your computer, and possibly have to come back with parts at another time.
Carry in service is a good option, but find out whether the service center is factory authorized for warranty repairs, as well as whether the technicians are all certified.
Shipping your computer to a factory service center can take a long time - sometimes a number of weeks. It also creates risk that your computer will be damaged or even lost in shipping. In some cases, the manufacturer will even replace your computer with another unit and ship it back to you, rather than repairing it. This can result in your losing any information that was on your system and having to reload all your software.
Another aspect of the warranty to find out about is technical support. Find out if the computer manufacturer offers a toll-free phone number and what the quality of service is like.
The better computer salespeople will be honest about this and tell you if a company's service leaves something to be desired. You can also do some research on the internet - most of the computer magazines like PC Magazine and PC World have annual customer service comparisons that rate the larger computer companies.
Always find out how the warranty is handled before making your decision. Even if it doesn't influence your choice, knowing what to expect if something does go wrong will save some nasty surprises down the road.
3. Can You Negotiate the Price Down?
A computer is a relatively large investment - anywhere from a few hundred to a few thousand dollars. Many computer buyers expect that there is a significant amount of "wiggle room" on the price.
The reality is that most computer hardware - the physical pieces like the computer, monitor and printer - is sold at very low profit margins. Often, computer systems are even sold at or below the dealer cost. When you're buying a computer, it never hurts to ask for a better deal, but don't be surprised if you only get a few dollars off, if anything.
Over the close to 20 years I've sold computers, I watched the profit margins go from over 40% to less than 5%. It's almost embarassing to offer a $20 discount on a $2500 computer system, but that could mean the difference between making and losing money on the sale.
What you can do to get the best price is to do some comparison shopping. Most computer stores offer price-matching guarantees, so if you find your computer for less at another store, most dealers will match or beat that price, even if it means they lose money.
4. How Do Computer Stores Make Any Money?
You might be wondering how these computer stores make any money if they're selling computer for so little profit.
Their money is made on add-on items. The highest profit areas in most computer stores are cables and "consumable" products such as printer ink and paper.
Printer ink is a huge money-maker for most computer stores (even more so for the printer manufacturers). Why is this? Once you've bought a printer, you're going to have to replace your ink at some point, and continue to replace it as it runs out.
Most chain computer stores and office supply stores that carry a large selection of ink cartridges make more from ink than they do from the computers themselves.
Cables also have huge markups. A cable that costs the store $2-3 will often sell for $20-30. That's ten times their cost!
If you're buying a new computer, you will likely need to buy some cables. Some items - printers, for example - don't often include the cables needed to hook them up.
Many printers also come with "starter" ink cartridges that are only half-full. You might also want to pick up some extra ink cartridges.
This is where you should be able to negotiate a better price. Don't expect the salesperson to throw them in for nothing, but they should be willing to offer you a better price. After all, if you're happy with their service, you'll probably continue to buy your ink, paper and other products from that store in the future.
5. What Software is Included?
The last secret of buying a new computer has to do with the software that is included. Most new computer systems include quite a few programs and sometimes the value of the software can be quite high.
Something to watch out for when looking at the included software is "trial versions" or "limited editions".
Many programs that are preloaded are either crippled versions that don't have all the features of the full program, or trial versions that will only run for a certain amount of time before they expire.
Computer are often sold with trial versions of the following types of software:
- antivirus
- firewall
- MS Office or other office suites
- Accounting - both business and personal
The computer manufacturers generally don't make it easy to tell whether the software on their systems are trial versions or limited versions. This is a question that you should specifically ask if you can't find the answer in their promotional information.
If you're buying a new computer with trial versions of the software, keep in mind that you will need to pay to continue using it after the trial period is over. This is an added cost that you need to consider as part of your overall budget.
These five "secrets" of buying a new computer are fairly common sense, but they are not always made clear up front. Knowing what to ask will help you in two ways. First, you can be sure you are getting the right computer for your needs.
Second, if the salesperson or company that you're dealing with explains these things to you without being asked, you'll know you're dealing with someone who is honest and upfront.
Knowing you can trust the people you're dealing with is an invaluable feature of your new computer system.
Where do you start? There are so many brands and models of computers available, and it can all be a little overwhelming when you start to look around.
How do you decide what type of computer you need? And perhaps more importantly, how do you decide what the best value is?
I have sold computers professionally for almost 20 years, and there are certain "tricks of the trade" that most computer stores and salespeople use. Knowing these secrets can make your decision easier and will help you buy the right computer for your needs.
1. Buy What You Need, Maybe a Little More
One of the most important things you can do when buying a new computer is make a list of the things that you will be using it for. There are so many different models - with different capabilities - that you can easily buy more, or less, than you really need if you don't.
If this is your first computer, this can be a little tougher. Until you've used a computer, it's hard to know exactly what you might want to do with it beyond the obvious, like connecting to the internet.
Regardless, you should think about some of the things you might want to do. Some possibilities include:
- Connect to the internet
- Play games
- Digital photography
- Digital video
- Type documents
- Accounting
- Design websites
- Programming
- Digital scrapbooking
- Geneology
Some of these things need more power than others. For example, connecting to the internet really doesn't need a lot of power. Even the most basic computer available will probably work just fine.
Digital video and many games need a lot more power. If you don't get a fast enough computer with enough memory, you'll be disappointed with the performance.
Knowing what you're going to be using your computer for will help your salesperson, whether they're on the phone, the internet or standing in front of you, recommend the best system for your needs.
As a general rule you're always better off buying more power than you need rather than less, but buying too much can be a waste of money.
2. Warranty Considerations
Computer warranties are one of the most confusing and obscure parts of your purchase. Most manufacturers have cut back on their customer service to the point where poor service has become a given.
The three most common options are onsite, carry-in or manufacturer's depot service.
Onsite service can be helpful, but think about whether you want to have to be available for a technician to come and diagnose your computer, and possibly have to come back with parts at another time.
Carry in service is a good option, but find out whether the service center is factory authorized for warranty repairs, as well as whether the technicians are all certified.
Shipping your computer to a factory service center can take a long time - sometimes a number of weeks. It also creates risk that your computer will be damaged or even lost in shipping. In some cases, the manufacturer will even replace your computer with another unit and ship it back to you, rather than repairing it. This can result in your losing any information that was on your system and having to reload all your software.
Another aspect of the warranty to find out about is technical support. Find out if the computer manufacturer offers a toll-free phone number and what the quality of service is like.
The better computer salespeople will be honest about this and tell you if a company's service leaves something to be desired. You can also do some research on the internet - most of the computer magazines like PC Magazine and PC World have annual customer service comparisons that rate the larger computer companies.
Always find out how the warranty is handled before making your decision. Even if it doesn't influence your choice, knowing what to expect if something does go wrong will save some nasty surprises down the road.
3. Can You Negotiate the Price Down?
A computer is a relatively large investment - anywhere from a few hundred to a few thousand dollars. Many computer buyers expect that there is a significant amount of "wiggle room" on the price.
The reality is that most computer hardware - the physical pieces like the computer, monitor and printer - is sold at very low profit margins. Often, computer systems are even sold at or below the dealer cost. When you're buying a computer, it never hurts to ask for a better deal, but don't be surprised if you only get a few dollars off, if anything.
Over the close to 20 years I've sold computers, I watched the profit margins go from over 40% to less than 5%. It's almost embarassing to offer a $20 discount on a $2500 computer system, but that could mean the difference between making and losing money on the sale.
What you can do to get the best price is to do some comparison shopping. Most computer stores offer price-matching guarantees, so if you find your computer for less at another store, most dealers will match or beat that price, even if it means they lose money.
4. How Do Computer Stores Make Any Money?
You might be wondering how these computer stores make any money if they're selling computer for so little profit.
Their money is made on add-on items. The highest profit areas in most computer stores are cables and "consumable" products such as printer ink and paper.
Printer ink is a huge money-maker for most computer stores (even more so for the printer manufacturers). Why is this? Once you've bought a printer, you're going to have to replace your ink at some point, and continue to replace it as it runs out.
Most chain computer stores and office supply stores that carry a large selection of ink cartridges make more from ink than they do from the computers themselves.
Cables also have huge markups. A cable that costs the store $2-3 will often sell for $20-30. That's ten times their cost!
If you're buying a new computer, you will likely need to buy some cables. Some items - printers, for example - don't often include the cables needed to hook them up.
Many printers also come with "starter" ink cartridges that are only half-full. You might also want to pick up some extra ink cartridges.
This is where you should be able to negotiate a better price. Don't expect the salesperson to throw them in for nothing, but they should be willing to offer you a better price. After all, if you're happy with their service, you'll probably continue to buy your ink, paper and other products from that store in the future.
5. What Software is Included?
The last secret of buying a new computer has to do with the software that is included. Most new computer systems include quite a few programs and sometimes the value of the software can be quite high.
Something to watch out for when looking at the included software is "trial versions" or "limited editions".
Many programs that are preloaded are either crippled versions that don't have all the features of the full program, or trial versions that will only run for a certain amount of time before they expire.
Computer are often sold with trial versions of the following types of software:
- antivirus
- firewall
- MS Office or other office suites
- Accounting - both business and personal
The computer manufacturers generally don't make it easy to tell whether the software on their systems are trial versions or limited versions. This is a question that you should specifically ask if you can't find the answer in their promotional information.
If you're buying a new computer with trial versions of the software, keep in mind that you will need to pay to continue using it after the trial period is over. This is an added cost that you need to consider as part of your overall budget.
These five "secrets" of buying a new computer are fairly common sense, but they are not always made clear up front. Knowing what to ask will help you in two ways. First, you can be sure you are getting the right computer for your needs.
Second, if the salesperson or company that you're dealing with explains these things to you without being asked, you'll know you're dealing with someone who is honest and upfront.
Knowing you can trust the people you're dealing with is an invaluable feature of your new computer system.
3 Summer Computer Tips
#1 – Summer Computer Travel
Holiday travelers should be on alert when arriving home from long weekends, such as the Fourth of July, a popular time for computer viruses to spread.
Most computer users have a tendency to turn off their computers when away on trips, which means you’re not getting newly-released anti-virus patches or anti-spyware updates; the two most common areas that cause computers problems. We recommend you update anti-virus and anti-spyware scans before opening e-mail or going online after an extended absence.
We consistently see an increase in calls for virus related problems immediately following long weekends. Avoid the problems altogether by updating your security software before using your computer. For a free listing of viruses, spyware threats and trends, visit: www.VisitingGeeks.com/downloads.htm
#2 -- Should You Leave Your Computer Running?
One question we hear frequently is, "Should I leave my desktop computer on or turn it off?"
There are 2 schools of thought…
Turning it on and off numerous times during the day subjects the microcircuits to flexing and fatigue due to change in temperatures. Over time this could lead to a break in the circuitry and result in system failure.
Leaving the computer on all the time puts excess wear on the mechanical components (the hard drive spindle motor and cooling fans).
Best compromise. First user in the morning turns it on; last user turns it off.
We leave our desktops on all the time allowing for scheduled utility tasks to run during overnight hours. We also restart the systems (to flush the RAM and reset the operating system) on a regular basis and routinely remove the case covers to clean out any dust that may have accumulated, especially around the fans and screens.
#3 -- Stop Popups!
Never click inside the window of a popup. Instead, close it by clicking on the X in the upper right corner. Many people are fooled into installing spyware applications by popups that promise to clean their system. If you receive a message saying it can help, assume it’s spyware and don’t click!
Holiday travelers should be on alert when arriving home from long weekends, such as the Fourth of July, a popular time for computer viruses to spread.
Most computer users have a tendency to turn off their computers when away on trips, which means you’re not getting newly-released anti-virus patches or anti-spyware updates; the two most common areas that cause computers problems. We recommend you update anti-virus and anti-spyware scans before opening e-mail or going online after an extended absence.
We consistently see an increase in calls for virus related problems immediately following long weekends. Avoid the problems altogether by updating your security software before using your computer. For a free listing of viruses, spyware threats and trends, visit: www.VisitingGeeks.com/downloads.htm
#2 -- Should You Leave Your Computer Running?
One question we hear frequently is, "Should I leave my desktop computer on or turn it off?"
There are 2 schools of thought…
Turning it on and off numerous times during the day subjects the microcircuits to flexing and fatigue due to change in temperatures. Over time this could lead to a break in the circuitry and result in system failure.
Leaving the computer on all the time puts excess wear on the mechanical components (the hard drive spindle motor and cooling fans).
Best compromise. First user in the morning turns it on; last user turns it off.
We leave our desktops on all the time allowing for scheduled utility tasks to run during overnight hours. We also restart the systems (to flush the RAM and reset the operating system) on a regular basis and routinely remove the case covers to clean out any dust that may have accumulated, especially around the fans and screens.
#3 -- Stop Popups!
Never click inside the window of a popup. Instead, close it by clicking on the X in the upper right corner. Many people are fooled into installing spyware applications by popups that promise to clean their system. If you receive a message saying it can help, assume it’s spyware and don’t click!
Subscribe to:
Posts (Atom)