Author: prashan23

For my eleventh post, I’ll be including in a bunch of video clips on what’s related to computer training…

COMPUTER VIRUSES AND MALWARE

The first three video clips are mostly about stuff that have to do with computer viruses and malware…

TROUBLESHOOTING

The first three video clips shows stuff that are related to troubleshooting such as using Windows tools, troubleshooting a computer and ten basic steps on troubleshooting…

COMPUTER HARDWARE

The first three video clips are mostly showing basic stuff on computer hardware…

BASIC APPLICATIONS

Web Browsers (Internet Explorer, Google Chrome and Firefox)

The first three video clips mostly shows how to re-install and download web browsers from its latest versions into Windows…

E-mail (Yahoo Mail, Gmail, Hotmail and Outlook)

The first four video clips mostly regard stuff that have to do with email like account settings, deleting stuff off an inbox at once, basic tutorials and how to create an email account…

Social Media (Facebook, Twitter, Instagram, Pinterest and Google+)

The first four video clips are simply just stuff on social media like creating unlimited accounts, managing accounts and introductions…

 

Now for my tenth post, I’ll just be adding in images of what’s being put into computer training such as computer hardware and other stuff…

COMPUTER HARDWARE

The motherboard and bus

MotherboardBus

Power Supply Unit (PSU)

PSU

Random Access Memory (RAM)

OLYMPUS DIGITAL CAMERA

Hard Disk Drive

hard disk drive

USB Drive (also known as a flash drive)

USB

BASIC APPLICATIONS

Web browsers

Internet Explorer

internet explorer

Google Chrome

google chrome

Mozella Firefox

firefox_logo-100026079-gallery

Safari (mobile browser for products of Apple-iPhone, iPod and iPad)

safari-icon

EMAIL

Gmail

gmail

Yahoo Mail

yahoo mail

Microsoft Hotmail

hotmail

Microsoft Outlook

outlook

SOCIAL MEDIA

Google+

google-plus

Pinterest

Pinterest-Logo

Instagram

instagram

Twitter

twitter

Facebook

facebook

 

Basic applications

For my ninth post, what I’ll be talking is some basic applications that are meant for those that want to be trained with computers…

WEB BROWSER

A web browser is a software application that users use to retrieve and present information from resources on the World Wide Web. Also, a web browser can be known either as an applications software or any other program that designs to enable others to access retrieve and view their documents and other resources on the web. Even though web browsers are primarily intended to be used on the World Wide Web, they can also be used for accessing information which web servers provide either in private networks or files in file systems. Four of the major web browsers that users would often use are Internet Explorer, Firefox, Google Chrome and Safari (meant for products of Apple-iPhone, iPad and iPod Touch).

SEARCH ENGINE

A search engine is a program that searches for keywords in which they specify on and return a list of documents where keywords were being found. What a search engine is often meant for is a term of describing webpages like Google, Bing and Yahoo which is an internet search tool enabling users to search for documents on the World Wide Web.

GOOGLE APPS

Google Apps is a package of cloud-based services that gives you a whole new way of how you can work together online not just with using email and chat but over video conference calls, social media, real-time document collaborations and many more. All you would have to do is just sign up for a Gmail account and then you can start using Google apps like Gmail, Calendar, Drive and other services of its package as well as services that are additional like Google+, Hangouts and even more.

EMAIL

Electronic mail (mostly common known as email) is a basic application of sending in and exchanging digital messages from one person to another. An email can be meant for three of the components which includes the message’s envelope, the message’s header and the message’s body. With the message’s holder, it controls information including an original email address and one or more email addresses of recipients. Usually, part of the email that has a subject header field and a message submission date/time stamp would be what is called descriptive information.

Regards of email, it is also known as a technology of sending information and communicating a digital message over the web. Although users have email, they may use it in different ways depending on how they think about it. Moreover, there are many platforms of how users can use email to communicate, send, receive and exchange information such as Gmail, Hotmail, Outlook, Yahoo Mail and others, etc.

SOCIAL MEDIA

Social media is a computer-network tool and basic application that allows people or companies to either create, share, exchange information, career interests, ideas and pictures and videos within other communities and other networks. The point of how social media stands by itself is mainly involved through defining what challenges are and what common features include. However, there are at least three to four common features that social media include and here is what they are.

Firstly, social media is a web-based application of version 2.0. Secondly, user-generated content is the lifeblood of the social media organization. Thirdly, users create service-specific profiles either for the site or app that are designed and maintained by the social media organization. Lastly, social media facilitates the development of social media networks by taking a user’s profile and connecting it with those of others and groups. Also, social media depends on mobile and web-based technology to create a highly interactive platform through which people and communities share, co-create, discuss and modify user-generated account.

 

Troubleshooting

Now for my eighth post, I’ll be talking all about troubleshooting…

Troubleshooting is a form of solving problems which often apply to repairing products that fail or process. Also, troubleshooting is a logical systematic search for the source of a problem in order to solve it and make the product or process operational again. Regards of troubleshooting, it is only needed for identifying the symptoms. With troubleshooting, the process of elimination which eliminates potential causes of a problem is what can determine the cause that can be mostly liken to happen. Also, troubleshooting requires confirmation that the solution helps to either take the product and restore it or process it into its state of work.

Continue reading

The processes of computer viruses and malware

For my seventh writing post, what I’ll be mainly talking about are stuff on computer viruses and malware and what its processes are…

COMPUTER VIRUSES

Computer viruses are programs of malware that become replicated and whenever they execute it would insert copies of itself either into other computer programs, data files or the boot sector of the hard drive. With viruses, what they often perform with are some types of harmful activities on hosts being infected such as:

  • Either stealing hard disk space or CPU time
  • Having access to private information
  • Corrupting data
  • Either displaying political or humorous messages on the user’s screen
  • Spamming their contacts
  • Logging their keystrokes
  • Uselessly rendering the computer

THE PROCESSES OF COMPUTER VIRUSES

How can you tell whether if your computer either has a virus or not?

  • Well, if you can say “yes” to any of the following questions then the chances are that your computer might have a virus or it may not.

Is there any specific reason on how your computer runs very slow?

  • According to computer viruses, there are common symptoms on one of them that is much slower than it is with computers which usually run normal as they are. However, there can be other specific reasons on how your computer can run very slow depending on whether if the hard disk needs to have some fragment or if your computer needs more random access memory (RAM).

What messages do you get which are being unexpected and how do programs start automatically?

  • Regards of computer viruses, some of them can cause damage either to your Windows system or to some of your programs. The results of this damage may include messages that appear which are being unexpected, programs that either start or close automatically or your Windows system that shuts down automatically.

How should you know whether if your modem or hard disk is working overtime?

  • Well, to tell how your modem or hard disk works overtime is that an email virus can work by sending many copies of itself by email. An indication of this is that the activity light indicated on either your broadband or external modem is being lit. Another is the sound of your computer’s hard disk that continuously works. Because of that, they are not always symptoms of computer viruses but whenever they combine with other problems that is when viruses are indicated after being infected.

THE RECOVERY AND PREVENTION OF COMPUTER VIRUSES

  1. Once the virus is removed off your computer, what you may need to do is either take some software and re-install them onto your computer or find any lost information and restore them. Having to do regular backups on your files can help you avoid loss of data if for any reason your computer gets infected again. If any of your backups have not been kept in the past, what is recommended is that you start right now.
  2. Whenever you have an Antivirus software that is being put onto your computer, always make sure that it is installed and updated once it is done.
  3. Always make sure to have all of your Windows updates done.

How do I remove a computer virus and spyware?

  • Well, there are two steps of how you can remove a computer virus and spyware.
  1. Run AdwCleaner and Malware Bites to clean out malware
  2. Do a manual cleanup

a. Check Start Up programs and remove apps that are unwanted

b. Check Programs and Features, Control Panel and remove any programs that are unwanted

c. Empty the “Temp” folder from your Windows system

 

MALWARE

Malware (also known as malicious software) is any type of software that is being used to disrupt computer operations, gather sensitive information, gain access to private computer systems or display advertisements being unwanted. The definition of malware is its malicious intent that acts against what is required for the computer’s user and does not include software with unintentional harm which causes due to some deficiency. Another term for malware is badware which sometimes uses and applies to both true malware and unintentionally harmful software. With malware, it may sometimes be stealthy, it may intend to either steal information or spy on computer users for extended periods without them knowing or it may be designed to cause harm or it may export payment.

THE PROCESSES OF MALWARE

How can you tell whether if your computer is infected with spyware?

Spyware is a type of software that is being installed onto your computer and its main purpose is to watch and record your what you see on the internet. There are some different types of spyware that records your keystrokes and information in which you type into either from websites or other programs and then that information becomes used either for targeted advertising or identity theft. Regards of spyware, whatever programs you get are what can be installed into on your computer in many ways but often they get hidden inside of software such as free games, screensavers or animated cursors.

Indicated below, are some signs of how your computer might be infected with spyware:

  • Either new toolbars, links or favorites that you are noticing in which you are not intentionally adding into your internet browser
  • Either your homepage, mouse pointer or search program that unexpectedly changes
  • The address of a specific website that you type into from your internet browser but suddenly it gets taken into a website which is completely unrelated
  • Whenever you computer does not connect to the internet, what you will randomly get are ads called pop-ups
  • Your computer may suddenly start to run slow and not all of your computer performance problems will be caused by spyware but what can cause a noticeable change is spyware

Sometimes, your computer may not show any symptoms even if a program of spyware is running. To help protect your privacy and computer, what we should recommend is that you should either run Windows Defender or another anti-spyware program at all times.

COMMON TYPES OF MALWARE

  • Rogue software

-Software that masquerades as genuine security software while it reports non-existent threats of malware in order to scare the user into paying for software

  • Ransomware

-A usual webpage which contains a malicious JavaScript that does not allow you to close down the window either of your internet browser or it goes into a different webpage. Also, it displays a notification on bogus which indicates that it is from your local law enforcement agency (examples; FBI, RCMP and AFP-Australian Federal Police)

  • Trojans

-Potentially unwanted software which downloads and installs software on your computer without you knowing

  • Adware

-Programs that displays ads of pop-ups and ads on webpages that you go into

  • Browser hijackers

-Software that changes your homepage and default search engine

PHISHING EMAIL MESSAGES

What are designed to steal money from are what they call as phishing email messages, websites and phone calls. The kind of criminals that can do this are cyber-criminals as they install malicious software either on your computer or they would just take your personal information and steal it right off your computer. What cyber-criminals also use is social engineering and the purpose of that is they convince you of either installing malicious software or they just hand over your personal information under pretenses that are being false. Also, they will either email you, call you on the phone or convince you to download something off a website.

The driver

For my sixth post, I’ll be talking all about the driver which is another part of computer software…

A driver is what consists of all the software components that you must supply in order for your device to be supported under Windows. With the driver, there are two things which involve your device to be supported with regards of two components that are supplied. One of them is a system-supplied component and the other is a vendor-supplied component. For all device classes, the system must provide installation software that is generic to the driver. Also, the vendors must supply at least either one or more device-specific components within the driver.

Here as I mentioned from my previous writing post are what goes from kilobytes to terabytes…

KILOBYTES TO TERABYTES

1000 bytes->1 kilobyte

1000 kilobytes->1 megabyte

1000 megabytes->1 gigabyte

1000 gigabytes->1 terabyte (Most common type)

 

Computer Hardware

Now for my fifth post, what I’ll be talking about is stuff on computer hardware…

THE MOTHERBOARD

The motherboard which they sometimes call it as the logic board is what contains connectors to get the power from the power supply and other connectors in order to host in a variety of devices that have a plug-in. Another part of the motherboard is the bus which is a set of many parallel lines which enables communication among the devices with its plug-in by providing paths for electrical current.

THE POWER SUPPLY (PSU)

The power supply unit (PSU) is what it uses to convert a main AC to low-regulated voltage power for the internal components of a computer.

RANDOM ACCESS MEMORY (RAM)

Random Access Memory (RAM) is a kind of hard drive that is meant for those that want to put in data and other stuff like files. Because of that, not all of its data will be used at the same time but as it was mentioned there can be a lot of it being put on the hard drive. Whatever kind of data that we work with is what we are given at any moment to be stored with which is none other than RAM (often called as “memory). The main advantage of using RAM is take in what we are working on whether if it is data or anything as it make us have less time waiting and have more time being reproductive. The main point of RAM is that it is very fast, so reliable and not only that but everything is put where it is needed. Let’s say for an example that you are working with a bunch of files and data and your computer accidentally shuts down due to a power outage then you should not rely on putting in all of your data into the RAM in case if everything gets deleted. What will hold all of your data and other stuff will be the hard drive so whenever the power on your computer is either on or off by itself it will always be there as it is needed.

THE HARD DISK

The hard disk is what has all of its information that is being kept on your computer. Unlike RAM, which is very fast and so reliable, the hard disk can hold everything forever including your files and data either with or without having electrical current. With modern hard disks, most of them may have billions of bytes of storage space on them which means that you can take in these files to create, save and download either for months or years without even using up all of its storage space that it provides. Whenever you fill up your hard disk, what Windows will start indicating is a small message on the computer’s screen saying that “you’re running low on disk space” due to any problem in advance. But in fact that if the message appears on your computer’s screen, it means that it would not run low until you come down to 800 MB of free embed disk space. Moreover, all of these megabytes of free embed disk space you get can be equal up to 600 floppy disks and that is still plenty of room for it.

REMOVABLE STORAGE OR DISK DRIVES

The removable storage or disk drives is what people use to get information from whenever they work with computers. With the terms “disk” and “drive”, they can often be described in two exact meanings but can help understand what they are meant for. The term “disk” can be described as the storage device which helps to store information and either contain data or software straight from your computer. The term “drive” is what is described as its hardware which runs the disk. With disk drives, each of them can be designed for any type of media that is specific whether if it is either a CD, DVD or hard drive.

USB DRIVES

A USB drive is like a media drive that works slightly different as they use memory cards to take in information and store them onto there. With digital cameras, they also use what are called “Flash” memory cards because they do the same thing as USB drives do such as taking in information and storing them on.

About the USB drives, each of them should be able to do two of the following tasks:

  • Write-Take in information and place them right onto the disk
  • Read-Get information of data right off the disk

Also, there are four different drive sizes that you can get from an USB:

DRIVE SIZES

1000 bytes (B)->1 kilobyte (KB)

1000 kilobytes (KB)->1 megabyte (MB)

1000 megabytes (MB)->1 gigabyte (GB)

1000 gigabytes (GB)->1 terabyte (TB) (Most common type of drive size)

The development of employees

For my fourth post, I’ll be talking about what it is for employees to be developed with when it comes more into computer training…

THE DEVELOPMENT OF EMPLOYEES

When it comes to employees in what they are developed with, there are are a wide variety of applications that can be meant for in computer training but not just for simulating software but for other things like troubleshooting, detecting viruses and spyware, hardware and even basic applications (internet-email, social network). Whatever people are taught with in a classroom is what they can be taught with when using a computer. For employees, there are several training courses that can be recommendable for them such as ethics, safety, job skills training, leadership training, etc. Having employees to use computer technology can continuously help to provide training opportunities for their co-workers to steadily increase their professional competencies and experience while accruing the benefits of a comprehensive development program to its business.

The productivity of computer training

For my third post, I’ll be talking about what the productivity is all about when it comes to computer training…

THE PRODUCTIVITY OF COMPUTER TRAINING

Aside from what it is important for employees when obtaining computer training, there are small businesses which can realize important benefits from bringing technology into their computer software programs. Regards of productivity, what may avoid the loss of it is its use of computers to excel in training exercises as it would usually come with employees when they learn new systems on their jobs. For example, retail operations is what helps to train employees on the job when they learn how to operate POS systems as it can cause line queues to back up while customers become annoyed. Moreover, a simulated POS system which provides new hires with computer training in a capable setting on the other hand can at least give employees the skills and confidence they need in order to do well with serving customers while being on the first day on their jobs.

Job Learning

For my second writing post, I’ll be talking all about what it’s like for employees to learn on the job…

JOB LEARNING

In order for employees to learn on the job, they need to provide some basic computer training that can help them build new skills. If employees want to do well on their jobs, what they need to learn is how to use software programs (any kind). For example, an employee that wants to do well with their job skills needs to know how to operate a POS system while being at work. With job learning, having employees to learn how to use computer software which they have not worked with can be quite simple only if there is enough experience for them to expand. Without having experience, anyone can at least try to build up new skills as it can be challenging.