Tuesday, 5 March 2019

HOW TO REFORMAT A PERSONAL COMPUTER?

Steps To Reformat A Personal Computer

#1 Start your pc and press key F2, F12 or delete key (Depends on your PC model).







#2 Your PC will boot from CD and windows installation will start. Press Enter at this screen.




#3 Accept License agreement by pressing F8 key.



#4 Delete the partitions.



#5 Create the partitions.



#6 Define the size of partitions.



#7 Now select your desired partition for installation of Windows XP and press enter.




#8 Choose to format the partition. Choose NTFS file system quick. 



#9 Setup will format the partition.




#10 After formatting, setup will start copying files on to the hard disk.



#11 After copying of files, setup will start installing Windows. 




#12 Select desired language and regional settings, when prompted by setup.




#13 Enter windows key.




#14 Type a name for your computer.




#15 Select time and date settings and time zone according to your country.




#16 Provide network settings for networking pc's or select typical settings and press enter.




#17 Setup will install devices and register components.




#18 After completion setup will do a cleanup of files and will restart your pc automatically. At this stage you can remove CD from drive.

To Create A Partition


What is disk partitioning?

Disk Partitioning is the creation of one or more regions on a  hard disk or other secondary storage, so that an operating system  can manage information in each region separately.

Partitioning is typically the first step of preparing a newly manufactured disk, before any files or directories have been created. 


Remember:

                     1 KB      = thousand bytes
                     1 MB     = million bytes
                     1 GB      = billion bytes
                     1 TB       = trillion bytes

Remember:

                     1 KB      = 1024 bytes
                     1 MB     = 1024 KB
                     1 GB      = 1024 MB
                     1 TB       = 1024 GB

EXAMPLE:

Original size/capacity = 40995 MB

P1   - 50 %             =      40995 x .50       =        20498    
P2   - 50 %             =      40995 x .50       =        20498 


Original size/capacity = 40995 MB

P1   - 25 GB           =      25 x 1024         =         25600
P2   - 25  %            =      40995 x .25      =         10249
P3   - The rest     
  

Original size/capacity = 38162 MB

P1   - 15 GB           =      15 x 1024          =        15360 
P2   - 30 %             =      38162 x .30       =        11449
P3   - 100%           


Original size/capacity = 38162 MB

P1   - 39 %            =      38162 x .39         =        14883
P2   - 11 GB           =      11 x 1024            =        11264
P3   - 100%                               
            

Original size/capacity = 40995 MB

P1   - 41 %             =      40995 x .41          =        16808
P2   - 10 GB           =      10 x 1024             =        10240
P3   - The rest                               

                 

Tuesday, 19 February 2019

HOW TO SHARE FILE AND PRINTER IN A COMPUTER NETWORK





Sharing file on a network (Server)



1.  Place the file inside the folder
2.  Right click the folder
3.  Click Properties
4.  Click Sharing
5.  Click Share this folder on the network
6.  Click Apply
7.  Click OK



Checking the file (Client)

1.   Click Start button
2.  Click Run
3.  Then type \\[IP address of server]




Sharing printer on a network (Server)



1.  Click Control Panel
2.  Click Add Printer
3.  Right click Printer
4.  Click Sharing
5.  Click Share this printer
6.  Click Apply
7.  Click OK


Connecting printer on a network (Client)


1.   Click Run
2.  Then type \\[IP address of Server]
3.  Double click Printers and Faxes
4.  Right click Printer
5.  Click Connect

Wednesday, 16 January 2019

WHAT IS A NETWORK OR IP ADDRESS?

NETWORK OR IP ADDRESS

An Internet Protocol address (IP address) is a numerical label assigned to each device connected to a computer network that uses the Internet Protocol for communication. An IP address serves two principal functions: host or network interface identification and location addressing.

Example:

For example, the address 168.212.226.204 represents the 32-bit binary number 10101000.11010100.11100010.11001100.

IP Versions

The Difference Between IPv4 and IPv6 Addresses. An IP address is binary numbers but can be stored as text for human readers. For example, a 32-bit numeric address (IPv4) is written in decimal as four numbers separated by periods. ... IPv6 addresses are 128-bit IP address written in hexadecimal and separated by colons.

BINARY

- Binary describes a numbering scheme in which there are only two possible values for each digit: 0 and 1.

IP Classes

IP address classes
ClassAddress range
Class A1.0.0.1 to 126.255.255.254
Class B128.1.0.1 to 191.255.255.254
Class C192.0.1.1 to 223.255.254.254
Class D224.0.0.0 to 239.255.255.255
STEPS:
     Creating IP Address
  1. In the left menu, click Network > Public IP.
  2. Click Create.
  3. Select whether you want to create an IPv4 or IPv6 address.
  4. Select a server to which you want to assign the new IPv4 or IPv6 address. ...
  5. Optional: To create a Reverse DNS, click Showin the Show other settings section. ...
  6. Click Create.

Configuring IP Address
  1. Open Start. . ...
  2. Open Settings. . ...
  3. Click. Network & Internet. ...
  4. Click View your network properties. This link is near the bottom of the page. ...
  5. Scroll down to the "Wi-Fi" heading. It's near the bottom of the page. ...
  6. Note the "Default gateway" address. ...
  7. Press ⊞ Win + X . ...
  8. Click System.

Wednesday, 3 October 2018

WHAT ARE THE TYPES OF CABLE?

A. Twisted Pair 

Twisted pair is the ordinary copper wire that connects home and many business computers to the telephone company. Twisted pair comes with each pair uniquely color coded when it is packaged in multiple pairs. The wire you buy at a local hardware store for extensions from your phone or computer modem to a wall jack is not twisted pair. It is a side-by-side wire known as silver satin. Two different types of twisted pair cable, unshielded twisted pair (UTP) and shielded twisted pair (STP) are used in different kinds of installations.


                               



  a. Shielded Twisted Pair   

                      Shielded twisted pair is a special kind of copper telephone wiring used in some business installations. An outer covering or shield is added to the ordinary twisted pair telephone wires; the shield functions as a ground. STP is similar to unshielded twisted pair (UTP); however, it contains an extra foil wrapping or copper braid jacket to help shield the cable signals from interference. STP cables are costlier when compared to UTP, but has the advantage of being capable of supporting higher transmission rates across longer distances.
  


b. Unshielded Twisted Pair




               Unshielded twisted pair (UTP) is a ubiquitous type of copper cabling used in telephone wiring and local area networks (LANs). Unshielded means no additional shielding like meshes or aluminum foil, which add bulk, are used. UTP cables are often groups of twisted pairs grouped together with color coded insulators, the number of which depends on the purpose. They are typically used in computer networking such as Ethernet for short-to-medium distances because of their relatively cheap price compared to optical fiber and coaxial cables.

B. Coaxial
Coaxial cable is a type of copper cable specially built with a metal shield and other components engineered to block signal interference. It is primarily used by cable TV companies to connect their satellite antenna facilities to customer homes and businesses. It is also sometimes used by telephone companies to connect central offices to telephone poles near customers. Coaxial cable received its name because it includes one physical channel that carries the signal surrounded.

C. Fiber Optic
Fiber optics, or optical fiber, refers to the medium and the technology associated with the transmission of information as light pulses along a glass or plastic strand or fiber. A fiber optic cable can contain a varying number of these glass fibers -- from a few up to a couple hundred. Surrounding the glass fiber core is another glass layer called cladding. A layer known as a buffer tube protects the cladding, and a jacket layer acts as the final protective layer for the individual strand.

A straight through cable is a type of twisted pair cable that is used in local area networks to connect a computer to a network hub such as a router. This type of cable is also sometimes called a patch cable and is an alternative to wireless connections where one or more computers access a router through a wireless signal. On a straight through cable, the wired pins match. Straight through cable use one wiring standard. While the crossover cable is a type of Ethernet cable used to connect computing devices together directly. Unlike straight through cable, crossover cables use two different wiring standards: one end uses the T568A wiring standard, and the other end uses the T568B wiring standard. The internal wiring of Ethernet crossover cables reverses the transmit and receive signals.

source:
fiberoptic.com
searchdatacenter.com


Wednesday, 22 August 2018

WHAT ARE THE TYPES OF NETWORK TOPOLOGY?

LINEAR BUS TOPOLOGY
bus topology is a network setup in which each computer and network device are connected to a single cable or backbone. The device is connected one after the other in a sequential.




MESH TOPOLOGY
     Mesh topology is a type of networking where all nodes cooperate to distribute data among each other.  This topology was originally developed 30+ years ago for military applications.

RING TOPOLOGY
ring topology is a network configuration in which device connections create a circular data path. Each networked device is connected to two others, like points on a circle. Together, devices in a ring topology are referred to as a ring network.

STAR TOPOLOGY

Star topology is one of the most common network setups. In this configuration, every node connects to a central network device, like a hub, switch, or computer. The central network device acts as a server and the peripheral devices act as clients.

HYBRID TOPOLOGY
Hybrid topology is an integration of two or more different topologies to form a resultant topology which has many advantages (as well as disadvantages) of all the constituent basic topologies rather than having characteristics of one specific topology.



SOURCE:
lablink.com
computerhope.com

Wednesday, 8 August 2018

WHAT ARE THE TYPES OF COMPUTER NETWORK?

Personal Area Network (PAN)

A personal area network (PAN) is the interconnection of information technology devices within the range of an individual person, typically within a range of 10 meters. They typically involve a computer, phone, printer, tablet and/or some other personal device like a PDA.

Local Area Network (LAN)

A local area network (LAN) is a group of computers and associated devices that share a common communications line or wireless link to a server. Most often, a LAN is confined to a single room, building or group of buildings, however, one LAN can be connected to other LANs over any distance via telephone lines and radio waves.

Metropolitan Area Network (MAN)

A metropolitan area network (MAN) is a network that interconnects users with computer resources in a geographic area or region larger than that covered by even a large local area network (LAN) but smaller than the area covered by a wide area network (WAN).

Wide Area Network (WAN)

A wide area network (WAN) is a network that exists over a large-scale geographical area. WANs are used to connect LANs and other types of networks together so that users and computers in one location can communicate with users and computers in other locations. Many WANs are built for one particular organization and are private. 


source:
wikipedia.com
whatis.com


Tuesday, 10 July 2018

HOW TO BE A RESPONSIBLE NETIZEN?

Facebook, Instagram, or Twitter are just example of social media site network. It may be fun to use, but make sure you are responsibly from what you are posting. Before posting online, make sure you ask yourself if this is good or bad. Does it cause harm to someone else?

Or is it worth it sharing? Remember that everything you post or share in social media can put you
at risk or can harm someone else.


Instead of ranting and sharing non-sense post on your social media network sites,
why not share something more resourceful? Be polite and be more mature when interacting
with your friend or followers. It's okay to act cool on social media, but getting involved
in like cyber bullying. Never criticize a particular person without knowing the real reason
behind the issue.


These are just some ways that you can do to be a better netizen. I hope that after reading this,
you can now know that it is important to think first before you posting or sharing anything
in online. So, be a smart netizen.

HOW TO REFORMAT A PERSONAL COMPUTER?

Steps To Reformat A Personal Computer #1   Start your pc and press key F2, F12 or delete key (Depends on your PC model). ...