Thursday, 5 December 2013

WONDERFUL TIPS

How to "Delete administrator Password" without any software
Method 1

Boot up with DOS and delete the sam.exe and sam.log files from Windows\system32\config in your hard drive. Now when you boot up in NT the password on your built-in administrator account which will be blank (i.e No password). This solution works only if your hard drive is FAT kind.

Method 2

Step 1. Put your hard disk of your computer in any other pc .
Step 2. Boot that computer and use your hard disk as a secondary hard disk (D'nt boot as primary hard disk ).
Step 3. Then open that drive in which the victim’s window(or your window) is installed.
Step 4. Go to location windows->system32->config
Step 5. And delete SAM.exe and SAM.log
Step 6. Now remove hard disk and put in your computer.
Step 7. And boot your computer :-)

Secret Codes for Nokia
Codes :
1) *#06# For checking IMEI(international Mobile Equipment Identity)
2) *#7780# Reset to factory settings
3) *#0000# To view software version
4) *#2820# Bluetooth device address
5) *#746025625# Sim clock allowed status
6) #pw+1234567890+1# Shows if ur sim as any restrictions

Multiple Logins in yahoo without Software
1) Go to Start
2) Navigate to HKEY_CURRENT_USER-->Software-->Yahoo-->Pager-->Test
3)ON the Right side if the page , Right click and choose new Dword Value.
4) Rename it as " Plural ".
5)Double click and assign a decimal value of 1.
6) Now close registry and restar yahoo messenger and try Multiple Login

Hidden Programs In Windows XP !
Is it strange to hear , but true that some good programs are hidden in Windows XP !!!

Programs :

1. Private Character Editor :

Used for editing fonts,etc.
** start>>Run
** Now, type eudcedit

2. Dr. Watson :

This an inbuilt windows repairing software !
** start>>Run
** Now, type drwtsn32

3. Media Player 5.1 :

Even if you upgrade your Media Player, you can still access your old player in case the new one fails !!!
** start>>Run
** Now, type mplay32

4. iExpress :

Used to create SetupsYou can create your own installers !
** start>>Run
** Now, type iexpress

Error Reporting in XP

If error reporting in XP is bugging you then turn it off.

When a system error occurs in XP, a little dialog box appears asking if you want to report the error to Microsoft. Click the message box to make it disappear. You don't have to report the error if you don't want to and on today's "Call for Help" Leo shows you how to turn off the feature if you find it distracting.

To disable error reporting, follow these directions:

1. Right-click My Computer and choose Properties.
2. Click the Advanced tab on your System Properties dialog box.
3. Click the Error Reporting button on the Advanced tab.
4. Place a checkmark next to "Disable error reporting."
5. Leave the other radio button unchecked next to the text labeled, "But notify me when critical errors occur."
6. Click OK


Trick to Show ur name after time in taskbar...


Hi freinds !
I m here to tell u a trick to add up ur name in place of AM and PM beside time and make urself to feel proud among ur group of frnds.
Its simple
Start -> Control Pannel -> Regional and LAnguage option -> Customize (beside English US) -> Go to TIME tab -> Change AM symbol and PM symbol from AM and PM to ur name -> Apply -> Ok ...
IS it changed ??? Might be not ...Now go to time in taskbar and Double Click it to open "Date and time property" ...Look place where time chnges in digital form i.e. 02:47:52 AM , click to arrow to cnage the AM or PM by selecting and press arrow. It will Show ur name or name that was entered by u, Apply -> OK and be HAPPY 8)

Remove Thumb.db file
Thumb.db is is a cache of the current picture in that directory.to remove it go for following

step1 > open "WINDOWS EXPLORER".

2>go to "TOOLS".

3>open "FOLDER OPTIONS".

4>go to "VIEW".

5>see 1st section "FILES & FOLDERS".

6>click on the "DO NOT CACHE THUMBNAILS".

now the thumbnail file will be removed from ur computer once u do this the file will be never created.

Recover the lost administrators password in Windows XP
Slightly more work needed if you lose or forget the Windows XP administrator password.

1.First reboot Windows XP in safe mode by re-starting the computer and pressing F8 repeated as the computer starts up.

2.Then (in safe mode) click Start and then click Run. In the open box type "control userpasswords2" without the quotes - I have just used quotes to differentiate what you have to type.

3.You will now have access to all the user accounts, including the administrators account and will be able to reset the lost password.

4.Just click the administrators user account, and then click Reset Password.

5.You will need to add a new password in the New password and the Confirm new password boxes, and confirm by clicking OK.


All done, you have recovered the lost adminitrators password!

How to find the IP address of the sender in Yahoo! mail
When you receive an email, you receive more than just the message. The email comes with headers that carry important information that can tell where the email was sent from and possibly who sent it. For that, you would need to find the IP address of the sender. The tutorial below can help you find the IP address of the sender. Note that this will not work if the sender uses anonymous proxy servers.

Finding IP address in Yahoo! Mail

1. Log into your Yahoo! mail with your username and password.
2. Click on Inbox or whichever folder you have stored your mail.
3. Open the mail.
4. If you do not see the headers above the mail message, your headers are not displayed. To display the headers,
* Click on Options on the top-right corner
* In the Mail Options page, click on General Preferences
* Scroll down to Messages where you have the Headers option
* Make sure that Show all headers on incoming messages is selected
* Click on the Save button
* Go back to the mails and open that mail.
5. You should see similar headers like this:Yahoo! headers : nameLook for Received: from followed by the IP address between square brackets [ ]. Here, it is 202.65.138.109.That is be the IP address of the sender!
6. Track the IP address of the sender

How to find the IP address of the sender in Gmail
How to find the IP address of the sender in Gmail
When you receive an email, you receive more than just the message. The email comes with headers that carry important information that can tell where the email was sent from and possibly who sent it. For that, you would need to find the IP address of the sender. The tutorial below can help you find the IP address of the sender. Note that this will not work if the sender uses anonymous proxy servers.

Finding IP address in Gmail:

1.Log into your Gmail account with your username and password.

2. Open the mail.

3. To display the headers,* Click on More options corresponding to that thread. You should get a bunch of links.* Click on Show original.

4. You should get headers like this:Gmail headers : nameLook for Received: from followed by a few hostnames and an IP address between square brackets. In this case, it is65.119.112.245.That is be the IP address of the sender!
5. Track the IP address of the sender.

Create A Hidden User Account
Create A Hidden User Account
This tweak allows an account that is normally displayed on the Welcome screen to be hidden from view. To log on using the account it's necessary to use the Log On To Windows dialog box similar to the one in Windows 2000. #[Start] [Run] [Regedit]#Registry Key:

HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\WindowsNT\CurrentVersion\Winlogon\SpecialAccounts\UserList#Modify/Create the Value Data Type(s) and Value Name(s) as detailed below.#Data Type: REG_DWORD [Dword Value] // Value Name: Type Name of Account to be Hidden#Setting for Value Data: [0 = Account is Hidden / 1 = Enabled]#Exit Registry and Reboot...

While the account is hidden on the Welcome screen, note that the account profile will be visible in C:\Documents and Settings or wherever user profiles are stored as well as in Local Users and Groups

Reverse the mouse buttons
1) No context menu

What will you see when you right click on the desktop? You will see a context menu which says arrange icons, refresh,..and so on. Are you angry at your friend for not wishing you for you B'day? Do you wanna play a trick on a newbie in your family who is new to computers? This is a cool trick to play. By this tweak, you will be able to disable the right click on the desktop or any icons/files/folders/applications... But right click will work on taskbar of the start button and registry. So, dont worry!!!
Open your registry and you will see all unknown files like HKEY_CLASSES_ROOT....... and so on. Don't panic. Follow this path. HKEY_CURRENT_USER>SOFTWARE>MICROSOFT>WINDOWS>CURRENT VERSION>POLICIES>EXPLORER. On the right side of the registry, you will see two files(in general) named 'default' and 'NoDriveTypeAutoRun'. Right click on the empty space in the registry and goto New>DWORD VALUE and name it as "NoViewContextMenu". Remember, no spaces and N,V,C,M should be capitals. Right click on this and click modify. The default value will be 0. Change it to 1. Note: DONOT CHANGE THE HEXADECIMAL TO DECIMAL. Click OK. Close your registry and logout. Bingo!!! Once you login again, right click wont work. Your friend will be perplexed and the next thing he/she does is call the system administrator not knowing that not all system administrators will be knowing about registry. Now, to enable it again. follow the same path and set the value to 0. Logout and then login to see the effect.

2) Reverse the mouse buttons
This is a cool trick to play on newbies. Actually, there are two ways to do this. One is changing the settings in the Control panel and the other is through editing registry. You can do it either way. But I prefer the second way, which is challenging.
(i) Through Control Panel - goto Start> Control Panel> Printers and other hardware> Mouse. In Button configuration, enable the switch primary and secondary buttons option and click OK. But remember, you have just swapped the mouse buttons. So, for OK, you have to click the right mouse button. The newbie will be perplexed. Well, this trick is good for left handers.
(ii) Editing the registry - By default the left mouse button is the primary and the right is secondary. Open your registry and follow this path:
HLEY_CURRENT_USER>Control Panel>Mouse and on the right side of the registry, create this String value(REG_SZ): 'SwapMouseButtons' and set its value to 1. Bingo!!! You are done. Log out/Restart the computer.

You can try this: Combine tricks 1 and 2. That means, this will result in swapping of the mouse buttons and disabling the left click(once the buttons are swapped). User is ready to call system administrator cuz he feels that the system is behaving wildly.


Hidden unknown fact in MICROSOFT WORD
Bill Gates still doesn't know why it happens:
Try out yourself...
Open Microsoft Word and type
=rand(200,99)
and then HIT ENTER....see what happens.
it won't hurt ur system!!

FOLDER OPTION missing
Many of us sometimes find the folder options missing in windows explorer.

Here's the solution
Open Run and then type "gpedit.msc".
Now goto
User Configuration > Administrative templates > Windows Component > Windows Explorer.

Click on Windows Explorer you will find the 3rd option on the right side of screen
"Removes the Folder Option menu item from the Tools menu"

Just check it,

if it is not configured then change it to enable by double clicking on it and after applying again set it to not configured.


I hopes that you will find the option after restarting windows.

Make frnds scare for VIRUS
Open notepad and type this:

lol=msgbox ("Warning a virus has been detected on your PC. Press YES to format your hard disk now or press NO to format your hard disk after system reboot",20,"Warning")

Then save it as Virus.VBS

and go to the folder that contains it and open it if a window pops out saying a virus has been detected it's working. Press yes or no to close the window and put it in the startup folder of the victim's account.
On startup the window should appear.
Note: This does not harm your computer as it does not contain virus.

The Yes and no button does not do anything except closing the window. And you can edit the virus in the sentence: Warning a virus has detected on your PC to any kind of virus eg.Trojan Horse like this lol=msgbox ("Warning a Trojan horse has been detected on your PC. Press YES to format your hard disk now or press NO to format format your hard disk after system reboot",20,"Warning")

Oh in between make sure your victim does not panic and really reformat his harddisk. hahaha :) 35

Friday, 1 November 2013

Cleaning the computer and its components


Quick links
Introduction
Cleaning your computer and your computer components and peripherals helps keep the components and computer in good working condition and helps keep the computers from spreading germs. In the above picture, is a good example of how dirty the inside of your computer case can get. In this example, its obvious that all the dirt build up will prevent proper air flow and may even prevent the fan from working.
Depending on the environment that your computer operates in determines how often you should clean your computer case. The below list is our recommendation and may change depending upon your computer's environment.
How often should I clean my computer?
The frequency of how often you should clean your computer varies on several different factors. To help you determine how often you need to clean your computer we've created the below chart. Check each of the boxes below that apply to your computers environment to determine how often it should be cleaned.
Where is computer located? 
In a home environment
In a clean office environment
In construction or industry environment
In school environment
Computer environment 
Have cat or dog in same building as computer
Smoke in same building as computer
Smoke next to computer
Computer is on floor
Room that the computer is in has carpet
Eat or drink by computer
Who uses it? 
Adult (18 and older)
Young adults (ages 10-18) use computer
Pre-teen (younger than 10) use computer
More than one person uses computer
With what is checked above, clean your computer every  months.
General cleaning Tips
Below is a listing of general tips that should be taken when cleaning any of the components or peripherals of a computer as well as tips to help keep a computer clean.
  1. Never spray or squirt any liquid onto any computer component. If a spray is needed, spray the liquid onto a cloth and then use that cloth to rub down the component.
  2. You can use a vacuum to suck up dirt, dust, or hair around the computer on the outside case. However, do not use a vacuum for the inside of your computer as it generates a lot of static electricity that can damage the internal components of your computer. If you need to use a vacuum to clean the inside of your computer, use a portable battery powered vacuum designed to do this job or try using compressed air.
  3. When cleaning a component or the computer, turn it off before cleaning.
  4. Be cautious when using any cleaning solvents; some individuals may have allergic reactions to chemicals in cleaning solvents and some solvents can even damage the case. Try to always use water or a highly diluted solvent.
  5. When cleaning, be careful not to accidentally adjust any knobs or controls. In addition, when cleaning the back of the computer, if anything is plugged in, make sure not to disconnect any of the plugs.
  6. When cleaning fans, especially the smaller fans within a portable computer or laptop it's suggested that you either hold the fan or place something in-between the fan blades to prevent it from spinning. Spraying compressed air into a fan or cleaning a fan with a vacuum may cause damage or back voltage to be generated.
  7. Never eat or drink around the computer.
  8. Limit smoking around the computer.
Cleaning tools
Although many companies have created products to help improve the process of cleaning your computer and peripherals, users can also use household items to clean their computers and peripherals. Below is a listing of items you may need or want to use while cleaning your computer or computer peripherals.
Keep in mind that some components in your computer may only be able to be cleaned using a product designed for cleaning that component; if this is the case, it will be mentioned in the cleaning tips.
  • Cloth - A cloth is the best tool used when rubbing down a component; although paper towels can be used with most hardware, we recommend using a cloth when ever possible. Caution: We only suggest you use a cloth when cleaning components such as the outside of the case, a drive, mouse, etc. You should not use a cloth to clean any circuitry such as the RAM or motherboard since they can generate ESD that can damage electronics.
  • Water or rubbing alcohol - When moistening a cloth, it is best to use water or rubbing alcohol. Other solvents may be bad for the plastics used with your computer.
  • Portable Vacuum - Sucking the dust, dirt, hair, cigarette particles, and other particles out of a computer can be one of the best methods of cleaning a computer. Over time, these items can restrict the airflow in a computer and cause circuitry to corrode. Do not use a standard vacuum as it can generate a lot of static electricity that can damage your computer.
  • Cotton swabs - Cotton swaps moistened with rubbing alcohol or water are excellent tools for wiping hard to reach areas in your keyboard, mouse, and other locations.
  • Foam swabs - Whenever possible, it is better to use lint-free swabs such as foam swabs.
Case cleaning
Why? Keeps the appearance of the computer looking new. During cleaning, if ventilation locations are found, these can be cleaned helping the case keep a steady airflow to the computer, keeping components cool and in good working condition.
Procedure: The plastic case that houses the PC components can be cleaned with a lint-free cloth that has been slightly dampened with water. For stubborn stains, add a little household detergent to the cloth. It is recommended that you never use a solvent cleaner on plastics.
Make sure all vents and air holes are hair and lint free by rubbing a cloth over the holes and vents. It is also helpful to take a vacuum around each of the hole, vents, and crevices on the computer. It is safe to use a standard vacuum when cleaning the outside vents of a computer; however, if you need to clean the inside of the computer, use a portable battery powered vacuum to prevent static electricity.
If you are looking for steps on cleaning the inside of the computer, see the motherboard cleaning section.
Additional help: Case Page
CD-ROM, DVD, and other disc drive cleaning
Why? A dirty CD-ROM drive or other disc drives can cause read errors when reading discs. These read errors could cause software installation issues or issues while running the program.
Procedure: To clean the CD-ROM drive we recommend purchasing a CD-ROM cleaner from your local retailer such as a local Radio Shack. Using a CD-ROM cleaner should sufficiently clean the CD-ROM laser from dust, dirt, and hair.
In addition to cleaning the drive with a special disc designed to clean drives users can also use a cloth dampened with water to clean the tray that ejects from the drive. Make sure however that after the tray has been cleaned that it completely dry before putting the tray back into the drive.
See the CD cleaning recommendation for further steps on cleaning each of your CDs.
Additional help: CD-ROM Page
CD and DVD disc cleaning
Why? Dirty CDs can cause read errors or cause CDs to not work at all.
Procedure: Cleaning CDs and DVDs should be done with a cleaning kit but can also be done with a normal clean cotton cloth or shirt. When doing this with a clean cotton cloth or shirt, wipe against the tracks, starting from the middle of the CD or DVD and wiping towards the outer side as shown in the below picture. Never wipe with the tracks; doing so may put more scratches on the disc.
Cleaning a CD and DVD disc
It is recommended when cleaning a CD that water is used. However, if the substance on a CD cannot be removed using water, pure alcohol can also be used.
Additional help: CD-ROM Page
Hard drive cleaning
Why? While hard drives cannot be cleaned physically, they can be cleaned with various utilities on the computer to help it run fast and more efficiently. Utilizing these utilities will prevent the hard drive from slowing down.
Procedure: Refer to our basic troubleshooting section for your operating system for steps that can be done to help improve the performance of your computer.
Additional help: Hard drive page
Headphones cleaning
Why? Headphones that are used by multiple people may need to be cleaned frequently to help prevent the spreading of germs and head lice.
Procedure: If the headphones being used are plastic or vinyl, moisten a cloth with warm water and rub the head and earpieces of the headphones. As mentioned earlier in our cleaning tips, it is recommended that if your headphones are being used for a library or school that you do not use any disinfectant or cleaning solvent as users may have allergic reactions to the chemicals they contain.
Headphones that have cushions also have the availability of having the cushions replaced. Replacing these cushions can also help keep the headphones clean.
Finally, in regards to headphones and the spreading of head lice, if multiple students are using your headphones, you should consider having the students use their own headphones, using bags that are placed over the headphones, or having headphones that can be wiped with warm water after each student has used the headphones.
Keyboard cleaning
The below steps are for cleaning a standard desktop keyboard. See the cleaning a laptop keyboard page for steps if you have a laptop.
Dust, dirt, and bacteria
The computer keyboard is often the most germ infected items in your home or office, often it will contain more bacteria than your toilet seat. Cleaning it can help remove any dangerous bacteria. Dirt, dust and hair can also build up causing the keyboard to not function properly.
Procedure: Before cleaning the keyboard first turn off the computer or if you're using a USB keyboard unplug it. Not unplugging the keyboard can result in causing other computer problems as you may press keys that cause the computer to perform a task you don't want it to do.
Many people clean the keyboard by turning it upside down and shaking. A more effective method is to usecompressed air. Compressed air is pressurized air contained in a can with a very long nozzle. aim the air between the keys and blow away all of the dust and debris that has gathered there. A vacuum cleaner can also be used, but make sure the keyboard doesn't have loose "pop off" keys that could possibly be sucked up by the vacuum.
If you wish to clean the keyboard more extensively you'll need to remove the keys from the keyboard.
After the dust, dirt, and hair has been removed. Spray a disinfectant onto a cloth or use disinfectant cloths and rub each of the keys on the keyboard. As mentioned in our general cleaning tips, never spray any liquid onto the keyboard.
Substance spilt into the keyboard
If the keyboard has anything spilt into it (e.g. pop, cola, Pepsi, Coke, beer, wine, coffee, milk, etc.), not taking the proper steps can cause the keyboard to be destroyed.
Procedure: Below are a few recommendations to help prevent a keyboard from becoming bad once a substance has been spilt within it.
If anything is spilt onto the keyboard turn the computer off immediately or at the very least disconnect it from the computer. Once done flip the keyboard over helping to prevent the substance from penetrating circuits. While the keyboard is upside down, shake the keyboard over a surface that can be cleaned later. While still upside down, use a cloth to help clean out what can be reached. After cleaned to the best of your ability leave the keyboard upside down for at least one night allowing it to dry. Once dry, continue cleaning the keyboard with any remaining substance.
If after cleaning the keyboard you have keys that stick remove the keys and clean below the keys and the bottom portion of the key.
Finally, if the keyboard still works but remains dirty or sticky before discarding the keyboard as a last resort try washing the keyboard in the dishwasher.
If after doing all the above steps the keyboard does not function properly or at all it's recommended you buy a new keyboard.
Additional Information: Keyboard Page
LCD cleaning
Why? Dirt, dust, and finger prints can cause the computer screen to be difficult to read.
Procedure: Unlike a computer monitor, the LCD or flat-panel display is not made of glass, therefore requires special cleaning procedures.
When cleaning the LCD screen it is important to remember to not spray any liquids onto the LCD directly, press gently while cleaning, and do not use a paper towel as it may cause the LCD to become scratched.
To clean the LCD screen we recommend that you use a non-rugged microfiber cloth, soft cotton cloth, or Swiffer duster. If a dry cloth does not completely clean the screen, you can apply rubbing alcohol to the cloth and wipe the screen with the damp cloth. Rubbing alcohol is used to clean the LCD before it leaves the factory.
Additional help: LCD help
Monitor cleaning
Tip: This section is for computer monitors if you have a LCD or flat-panel see the LCD cleaning section.
Why? Dirt, dust, and fingerprints can cause the computer screen to be difficult to read.
Procedure: The glass monitor screen can be cleaned with ordinary household glass cleaner*. Be sure to remove power from the monitor and spray the cleaner onto a lint free-cloth so the fluid doesn't leak into the electrical components inside the monitor. Vacuum off any dust that has settled on top of the monitor, and make sure no books or papers have been placed on the air vents. Obstructed monitor vents can cause the monitor to overheat or even catch on fire.
Caution: We suggest using a cloth dampened with water when cleaning monitor on a screen that is not made of glass or has any anti-glare protection on the screen. Using ordinary household glass cleaner on special screens, especially cleaners with ammonia can remove anti-glare protection or other special surfaces.
Other good cleaning solutions
  • Microfiber Towels
  • Swiffer Dusters
Additional help: Monitor page
Motherboard cleaning
Why? Dust and especially particles of cigarette smoke can build up and corrode circuitry causing various problems such as computer lockups
Caution: When inside the computer take the necessary ESD precautions and try to avoid unplugging any cables or other connections.
Procedure: Our recommendation when cleaning the motherboard from dust, dirt, or hair is to usecompressed air. When using compressed air, hold it in the up-right position; otherwise, it is possible chemicals may come out of the container that could damage or corrode the Motherboard or other component within the computer. Also, ensure when using compressed air that you always blow the dust or dirt away from the motherboard, or out of the case.
Another good alternative to compressed air is to use a portable battery powered vacuum that can effectively remove the dust, dirt, and hair from the motherboard completely and prevent it from getting trapped within the case. However, do not use a standard electricity powered vacuum as it can cause a lot of static electricity that can damage the computer. When using the vacuum it is vital that you stay a couple inches away from the motherboard and all other components to help prevent contact as well as to help prevent anything from being sucked into the vacuum. Ensure that you do not remove any small components with the vacuum such as jumpers.
Tip: When cleaning the inside of the case also look at any fans or heat sinks. Dust, dirt, and hair collects around these components the most.
Additional help: Motherboard Page
Mouse cleaning
Why? A dirty optical-mechanical mouse (mouse with a ball) can cause the mouse to be difficult to move as well as cause strange mouse movement.
Procedure: To clean the rollers of an optical-mechanical mouse, you must first remove the bottom cover of the mouse. To do this, examine the bottom of the mouse to see what direction the mouse cover should be rotated. As you can see in the below illustration, the mouse cover must be moved counter clockwise. Place two fingers on the mouse cover and push the direction of the arrows.
Computer mouse with ball removedOnce the cover has rotated about an inch, rotate the mouse into its normal position, covering the bottom of the mouse with one hand and the bottom should fall off including the mouse ball. If this does not occur, attempt to shake the mouse gently.
Once the bottom cover and the ball are removed, you should be able to see three rollers located within the mouse. Use a cotton swab, finger, or fingernail to remove any substance. Usually, there will be a small line of hair and dirt in the middle of the roller, remove as much as this substance as possible.
Once you have removed as much dirt and hair as possible, place the ball back within the mouse and place the cover back on.
If the mouse still appears to be having the same issue, repeat the above process; if after several attempts the mouse is still having the same issues, it's likely that your mouse has other hardware issues and we recommend that it be replaced.
Note: Cleaning your mouse pad with a damp cloth can also help improve a computer's mouse movement.
Why? To help keep a mouse clean and germ free it can be helpful to clean the mouse.
Procedure: Use a cloth moistened with rubbing alcohol or warm water and rub the surface of the mouse and each of its buttons.
Additional help: Mouse Page
Printer cleaning
Why? Cleaning the outside of a printer can help keep the printer's appearance looking good; and in the case of a printer that is used by many different people, keep the printer clean of germs.
Procedure: First, make sure to turn off the printer before cleaning it. Dampen a cloth with water or rubbing alcohol and wipe the case and each of the buttons or knobs on the printer. As mentioned earlier, never spray any liquid directly onto the printer.
Why? With some printers it may be necessary to clean the inside of the printer to help keep the printer running smoothly.
Scanner cleaning
Why? Flatbed scanners commonly become dirty with dust, fingerprints, and hair. When a scanner is dirty, the images may have distortions. 
Procedure: Clean a flatbed scanner's surface by spraying a window cleaner onto a paper towel or cotton cloth and wipe the glass until clean. As mentioned earlier, never spray a liquid directly onto the component.
To clean the outside of the scanner, the same towel or cotton cloth can be used.
Miscellaneous cleaning steps
Below are a listing of miscellaneous computer hardware that is rarely used today, but kept on this page for the few people who are working on older computers and need to clean these devices.
Floppy drive cleaning
Why? Dirty read/write heads on the floppy drive can cause errors during the reading or writing process.
Procedures: The floppy drive can be cleaned two different ways. The first method of cleaning a floppy drive, and our recommended method, is to purchase a kit at your local retail store designed to clean the read/write heads on your floppy drive.
The second method of cleaning the floppy drive is only recommended for experienced computer users. Open the floppy drive casing and physically swab the read/write heads with a lint-free foam swab soaked in pure alcohol, free-on, or trichloroethane. When performing these steps, be extremely careful when cleaning the heads to ensure that you do not lock them out of alignment causing the floppy drive to not work. To help prevent the heads from becoming out of alignment, use a dabbing motion lightly putting the swab on the head and removing it, do not perform a side-to-side motion with the swab.
Additional help: Floppy Drive Page
Palm pilot cleaning
Why? Dirty touch screens can cause difficult navigation.
Procedure: To clean the Palm Pilot Screen, use a soft cloth moistened with rubbing alcohol and rub the screen and the casing of the palm pilot. It is not recommended to use glass cleaner as it could damage plastics over time.
SuperDisk and LS120 cleaning
Why? It is recommended that the SuperDisk and LS120 drive be cleaned regularly to prevent drive heads from becoming dirty.
Procedure: Purchase the SuperDisk cleaning kit available through Imation. Using any other method will void the warranty on your drive.

Computer battery buying tips


Quick links
Main batteries
Laptop batteryThe main battery is the battery used to power laptop computers. When looking to purchase a new main battery from a third-party make sure you're getting the correct battery. Verify the below specifications either from the bottom of the battery or from the computer manufacturer.
  • Type - Get the right battery: NicadNiMH, or Li-ion.
  • Manufacturer - Some portables may use a certain manufacturer of battery. Verify if a third-party manufacturer's battery was used. Also ensure that the battery is not proprietary and that it is possible to purchase from a third-party.
  • Voltage - Verify the Voltage of battery, this amount can vary depending on the battery.
  • mAH - Verify the mAH of the battery, this amount can vary depending on the battery.
Warranty
Before purchasing the battery, see if the battery comes with any warranty and how long the warranty may be. This will make things easier if it's defective that it is possible to return the battery for a new battery or for a refund.
Prices
BatteryEstimated price
1 NICAD Battery$80.00 to $150.00
1 NiMH Battery$100.00 to $160.00
1 Li-ion Battery$100.00 to $180.00
Prices can vary depending upon quantity of batteries and how old the laptop is.
Where to buy
Your laptop computer manufacturer is the best first place to get a price quote on a replacement battery. After doing this check any of the below links to get a price quote comparison and find the cheapest solution.
Charge the battery properly
Once you have received the battery if it includes documentation for how to charge it for the first time make sure to follow those instructions exactly. Otherwise it's recommended that you charge the battery for at least 24-hours before use.
Recycle
See the battery recycling section for further information about properly recycling your old defective battery.
CMOS batteries
CMOS batteryThe CMOS battery is used to store system information such as the time and date and should be replaced when receiving error "System battery dead", the computer does not keep the time or date, or if you are losing a dramatic amount of time over a period of time.
Before replacing the CMOS battery you need to know what battery the computer is using. This can be done either by opening the computer and locating the battery or through the motherboard or computer documentation. We suggest visiting a local Radio Shack if you've got the battery but can't identify it or to purchase a new battery.
Prices
BatteryEstimated price
CMOS coin battery$1.00 to $10.00
CMOS RTC battery$2.00 to $20.00
Prices can vary.
Bridge batteries
The bridge battery is a small battery that holds a charge for a sufficient amount of time while swapping between main batteries. If you believe that this battery is defective or bad, it is recommended that you contact your laptop manufacturer for a replacement part.

Friday, 1 February 2013

SLR


What is SLR?

Every bank is required to maintain at the close of business every day, a minimum proportion of their Net Demand and Time Liabilities as liquid assets in the form of cash, gold and un-encumbered approved securities. The ratio of liquid assets to demand and time liabilities is known as Statutory Liquidity Ratio (SLR). Present SLR is 24%. (reduced w.e.f. 8/11/208, from earlier 25%) RBI is empowered to increase this ratio up to 40%. An increase in SLR also restrict the bank’s leverage position to pump more money into the economy.

What is SLR ? (For Non Bankers) :

SLR stands for Statutory Liquidity Ratio. This term is used by bankers and indicates the minimum percentage of deposits that the bank has to maintain in form of gold, cash or other approved securities. Thus, we can say that it is ratio of cash and some other approved to liabilities (deposits) It regulates the credit growth in India.

BANK PO BITSSSSSSSSSSSS

1. Computer uses the……….number system to store data and perform calculations.
(A) binary
(B) octal
(C) decimal
(D) hexadecimal
(E) None of these
Ans : (A)

2. A disk's content that is recorded at the time of manufacture and that cannot be changed or erased by the user is–
(A) Memory-only
(B) Write-only
(C) Once-only
(D) Run-only
(E) Read-only
Ans : (E)

3. Which of the following can be used to select the entire document ?
(A) CTRL+A
(B) ALT+F5
(C) SHIFT+A
(D) CTRL+K
(E) CTRL+H
Ans : (A)


4. ……….are 'attempts by individuals to obtain confidential information from you by falsifying their identity.
(A) Phishing
(B) Computer viruses
(C) Spyware scams
(D) Viruses
(E) None of the above
Ans : (A)

5. Part number, part description, and number of parts ordered are examples of–
(A) control
(B) output
(C) processing
(D) feedback
(E) input
Ans : (E)

6. A Web site's main page is called its–
(A) Home Page
(B) Browser Page
(C) Search Page
(D) Bookmark
(E) None of these
Ans : (A)

7. The simultaneous processing of two or more programs by multiple processors is–
(A) multiprogramming
(B) multitasking
(C) time-sharing
(D) multiprocessing
(E) None of these
Ans : (D)

8. Codes consisting of lines of varying widths or lengths that are computer-readable are known as–
(A) an ASCII code
(B) a magnetic tape
(C) an OCR scanner
(D) a bar code
(E) None of these
Ans : (D)

9. To instruct Word to fit the width of a column to the contents of a table automatically, click the button and then point to AutoFit Contents.
(A) Fit to Form
(B) Format
(C) Autosize
(D) Contents
(E) AutoFit
Ans : (E)

10. Why is it unethical to share copyrighted files with your friends ?
(A) It is not unethical, because it is legal.
(B) It is unethical because the files are being given for free.
(C) Sharing copyrighted files without permission breaks copyright laws.
(D) It is not unethical because the files are being given for free.
(E) It is not unethical-anyone can access a computer
Ans : (C)

11. Reusable optical storage will typica1ly have the acronym–
(A) CO
(B) DVD
(C) ROM
(D) RW
(E) ROS
Ans : (D)

12. The most common type of storage devices are–
(A) persistent
(B) optical
(C) magnetic
(D) flash
(E) steel
Ans : (D)

13. A device that connects to a network without the use of cables is said to be–
(A) distributed
(B) free
(C) centralized
(D) open source
(E) None of these
Ans : (B)

14. A person who used his or her expertise to gain access to other people's computers to get information illegally or do damage is a–
(A) hacker
(B) analyst
(C) instant messenger
(D) programmer
(E) spammer
Ans : (A)

15. To access properties of an object, the mouse technique to use is–
(A) dragging
(B) dropping
(C) right-clicking
(D) shift-clicking
(E) None of these
Ans : (C)

16. To change selected text to all capital letters, click the change case button, then click–
(A) UPPERCASE
(B) UPPER ALL
(C) CAPS LOCK
(D) Lock Upper
(E) Large Size
Ans : (A)

17. The basic unit of a worksheet into which you enter data in Excel is called a–
(A) tab
(B) cell
(C) box
(D) range
(E) None of these
Ans : (B)

18. You can keep your personal files / folders in–
(A) My folder
(B) My Documents
(C) My Files
(D) My Text
(E) None of these
Ans : (B)

19. In Word you can force a page break–
(A) By positioning your cursor at the appropriate place and pressing the F1 key
(B) By positioning your cursor at the appropriate place and pressing Ctrl+Enter
(C) By using the Insert/Section Break
(D) By changing the font size of your document
(E) None of these
Ans : (B)

20. A DVD is an example of a(n) –
(A) hard disk
(B) optical disc
(C) output device
(D) solid-state storage device
(E) None of these
Ans : (B)

21. The default view in Excel is……….view.
(A) Work
(B) Auto
(C) Normal
(D) Roman
(E) None of these
Ans : (C)

22. The process of transferring files from a computer on the Internet to your computer is called–
(A) downloading
(B) uploading
(C) FTP
(D) JPEC
(E) downsizing
Ans : (A)

23. ……….is the process of dividing the disk into tracks and sectors.
(A) Tracking
(B) Formatting
(C) Crashing
(D) Allotting
(E) None of these
Ans : (B)

24. Help Menu is available at which button ?
(A) End
(B) Staft
(C) Turnoff
(D) Restart
(E) Reboot
Ans : (B)

25. The contents of……….are lost when the computer turns off.
(A) storage
(B) input
(C) output
(D) memory
(E) None of these
Ans : (D)

26. When you save to this, your data will remain intact even when the computer is turned off–
(A) RAM
(B) Motherboard
(C) Secondary storage device
(D) Primary storage device
(E) None of these
Ans : (C)

27. A central computer that holds collections of data and programs for many PCs, workstations, and other computers is a(n) –
(A) supercomputer
(B) minicomputer
(C) laptop
(D) server
(E) None of these
Ans : (D)

28. The……….folder retains copies of messages that you have started but are not yet ready to send.
(A) Drafts
(B) Outbox
(C) Address Book
(D) Sent Items
(E) Inbox
Ans : (B)

29. Grouping and processing all of a firm's transactions at one time is called–
(A) a database management system
(B) batch processing
(C) a real-time system
(D) an on-line system
(E) None of these
Ans : (B)

30. The……….enables you to simultaneously keep multiple Web pages open in one browser window.
(A) tab box
(B) pop-up helper
(C) tab row
(D) address bar
(E) Esc key
Ans : (C)

31. Which ports connect special types of music instruments to sound cards ?
(A) BUS
(B) CPU
(C) USB
(D) MIDI
(E) MINI
Ans : (C)

32. You can……….a search by providing more information the search engine can use to select a smaller, more useful set of results.
(A) refine
(B) expand
(C) load
(D) query
(E) slowdown
Ans : (A)

33. What is the permanent memory built into your computer called ?
(A) RAM
(B) Floppy
(C) CPU
(D) CO-ROM
(E) ROM
Ans : (E)

34. What displays the contents of the active cell in Excel ?
(A) Name box
(B) Row Headings
(C) Formula bar
(D) Task pane
(E) None of these
Ans : (A)

35. The piece of hardware that converts your computer's digital signal to an analog signal that can travel over telephone lines is called a–
(A) red wire
(B) blue cord
(C) tower
(D) modem
(E) None of these
Ans : (D)

36. Video processors consist of……….and………., which store and process images.
(A) CPU and VGA
(B) CPU and memory
(C) VGA and memory
(D) VGI and DVI
(E) None of these
Ans : (C)

37. If you want to connect to your own computer through the Internet from another location, you can use–
(A) e-mail
(B) FTP
(C) instant message
(D) Telnet
(E) None of these
Ans : (D)

38. To reload a Web page, press the……….button.
(A) Redo
(B) Reload
(C) Restore
(D) Ctrl
(E) Refresh
Ans : (E)

39. This first step in the transaction processing cycle captures business data through various modes such as optical scanning or at an electronic commerce website–
(A) Document and report generation
(B) Database maintenance
(C) Transaction processing startup
(D) Data Entry
(E) None of these
Ans : (D)

40. A(n) ……….is a special visual and audio effect applied in Power-point to text or content.
(A) animation
(B) flash
(C) wipe
(D) dissolve
(E) None of these
Ans : (A)

41. When the pointer is positioned on a……….it is shaped like a hand.
(A) grammar error
(B) Formatting error
(C) Screen Tip
(D) Spelling error
(E) hyperlink
Ans : (E)

42. Personal computers can be connected together to form a–
(A) server
(B) supercomputer
(C) network
(D) enterprise
(E) None of these
Ans : (C)

43. A……….is the term used when a search engine returns a Web page that matches the search criteria.
(A) blog
(B) hit
(C) link
(D) view
(E) success
Ans : (E)

44. ……….are words that a programming language has set aside for its own use.
(A) Control words
(B) Control structures
(C) Reserved words
(D) Reserved keys
(E) None of these
Ans : (C)

45. Mobile Commerce is best described as–
(A) The use of Kiosks in marketing
(B) Transporting products
(C) Buying and selling goods/services through wireless handheld devices
(D) Using notebook PC's in marketing
(E) None of the above
Ans : (C)

46. Which of, the following is a storage device that uses rigid, permanently installed magnetic disks to store data/information–
(A) floppy diskette
(B) hard disk
(C) permanent disk
(D) optical disk
(E) None of these
Ans : (B)

47. The computer abbreviation KB usually means–
(A) Key Block
(B) Kernel Boot
(C) Key Byte
(D) Kit Bit
(E) Kilo Byte
Ans : (E)

48. What is the process of copying software programs from secondary storage media to the hard disk called?
(A) Configuration
(B) Download
(C) Storage
(D) Upload
(E) Installation
Ans : (D)

49. In Excel……….allows users to bring together copies of work-books that other users have worked on independently.
(A) Copying
(B) Merging
(C) Pasting
(D) Compiling
(E) None of these
Ans : (B)

50. Which of the following are advantages of CD-ROM as a storage media?
(A) CD-ROM is an inexpensive way to store large, amount of data and information
(B) CD-ROM disks retrieve data and information more quickly than magnetic disks do
(C) CD-ROMs make less errors than magnetic media
(D) An of the above
(E) None of these
Ans : (D)

Followers

Powered By Blogger