Basic knowledge of computer pdf download






















Double clicking on a directory opens a new window which presents the directory content. Each storage device is a big directory, accessible from My Computer window, which contains directories and files. Each file and directory can be univocally identified by its absolute path or address. While, the HPeDiag. Note that, for Windows operating system, capital or small caps letters in paths are perfectly equal. A special and tricky object is the link or shortcut.

Although its icon looks like a file icon, the small curved arrow on the left corner clearly indicates that this object is a link.

A link is simply an address to a file or directory, it is not a real file or directory. When the user clicks on the link, the computer behaves exactly as if the user is clicking on the real file or directory if Windows can find the real one, which is not the case if in the meantime somebody deleted or moved it.

Therefore it is a good idea for novice users to avoid using links at all. If no program is associated with that file type, Windows asks the user which program should open the file. Copying a file means reproducing it to another location or to the same location with a different name. Copying a directory means reproducing it to another location, or to the same location with a different name, together with its entire tree of subdirectories and files.

If a plus symbol does not appear, press CTRL key to have it appear while dragging. Point the mouse to the destination and click the right mouse button. Moving a file means moving it to another location losing the file in the original place. Moving a directory means moving it to another location together with its entire tree of subdirectories and files.

A link is created in the same directory. Deleting a file means often putting it into the trash can where it can be recuperated unless the trash can is emptied. Deleting a directory means putting it to the trash can together with its entire tree of subdirectories and files. Pay special attention, since not always the trash can works as user expects and sometimes files are deleted without passing through the trash can.

To rename a file or directory, simply select the object, click on the name and retype it. Usually Windows accepts most names, but novice users should stick with only letters, numbers and spaces, since other characters may be forbidden. After the creation, rename it. Sometimes files occupy a lot of space and need to be reduced to save disk space or to be sent by email; other times files must be put in a package to remain together or to be sent as a single file via email.

To compress a set of files and directories: 1. When double clicking on a compressed file, if the compression program is properly installed, it will open in a window as if it were a directory. Files can be copied from this window to a real directory simply dragging them to the directory. File types Windows identifies a file type by its extension, which is everything after the last dot in the filename.

Usually it is a 3 or 4 character acronym. Using the file extension, Windows knows the file type and decides which program will open that file. If the file extension does not show up, follow the instructions at section 2. The most important file types are: Edition 8.

File permissions For each file Windows 7 operative system uses a permission. The security dialog box shows the list of users or groups of users who may access this object, while not listed users may not access it. The owner of the file usually has full control on it and may change permissions or add new authorized groups or users. A special group is the Administrators group containing the users involved in technical administration of computers which has full control on every object.

These are called network folders. Some of them are: Page 12 of 33 Edition 8. Roaming user profile at UNIBZ Whenever the user logs in on a new computer, usually he should find a complete new profile Desktop, icons, Documents, configuration , which is obviously very annoying.

This mechanism, called roaming user profile, works fine only if the user is not using too much disk space which is usually MB, but it is a good idea to stay below MB. If the user is over quota, the system sends a warning via email to the user and, if the user remains over quota, this mechanism does not work anymore.

Moreover, if the user still remains over quota, he will be forbidden from saving any file on the computer he is currently using. Therefore it is a good idea to always work on a USB pen drive which is then copied on another personal computer and to periodically check the disk space looking at the proprieties of this directory. If a warning email has been received or, even worse, roaming user profile does not work anymore, files need to be deleted not from the current computer since the mechanism is not working anymore but directly going through this directory.

Paolo Coletti Basic Computer course book 3. Without entering into technical details, this section will explore the situations in which a novice user can find himself in troubles and how he can try to survive dialoguing with network administrators in their own strange technical language.

Technical aspects A computer network is a set of devices which communicate and share resources. Server and client A computer network interaction is based on the client server architecture. When considering a single interaction, one computer is the server and the other one is the client. The server is the computer which is offering its resource, usually programmed to wait until someone asks for its resource. The client is the computer which uses the resource, which sends the request to a waiting server.

The same computer may be the client for a service and the server for another service. For example, a library computer may have a CD inside its reader shared to the network server for the CD and may be at the same time used by a user to print his own documents client for the printer. Inside the LAN every computer is well identified and usually every user is known.

It is considered a trusted area. It is considered a dangerous area. VPN is typically required to identify portable computers connected via wireless connection. Transfer speed The network connecting components are the cables, which determine the speed of the LAN. Cables have a speed measure in bps bits per second which indicates how many bits can flow through the cable in one second. Page 14 of 33 Edition 8.

To find out how much time does it take to transfer a file with a size expressed in bytes, divide the connection speed in bps by 8 to find out the byte rate per second and then divide the file size by the speed to find out the number of seconds it takes for the file transfer. For example, to transfer a MB file through an Fast Ethernet connection, find out the speed of Communication Inside a computer network many communication programs are installed on Intranet computers to connect to the Internet or even to internal computers.

Web browser A web browser is a client program to navigate the WWW and retrieve web pages. Mail reader A mail reader is a client program to send and retrieve emails.

The market leader is Microsoft Outlook, a commercial proprietary software. It has many competitors, the most famous being the open source Mozilla Thunderbird and the free Windows Live Mail. It can be useful for various reasons: it does not require the installation of a mail reader program; old received emails are always available on the website and can thus be accessed from home, office and while traveling, even without a personal laptop; the mailserver takes care of emails backup.

But on the other hand it requires a continuous fast connection even to write a single long email, which can be costly and, in some situations, impossible and usually the email space is limited. The most famous website interfaces are the Microsoft Outlook Web App, where the web interface looks exactly like Microsoft Outlook, and the Webmail interface, used and personalized by most Internet providers.

Posta Elettronica Certificata PEC When sending an email, the sender has no proof that it has been sent, for example to be used in a court of justice, and no guarantee that the email has been dispatched. Disclaimer : SSCResult. In short, If anyone has any kind of objection related to this PDF then kindly mail us at [email protected] to request removal of the link.

Your email address will not be published. Save my name, email, and website in this browser for the next time I comment. Share this post with your friends. Floppy disks are primarily used on PCs. Information on a floppy disk is recorded in the magnetized states of particles of iron oxides evenly placed upon concentric circles known as tracks.

It is a non-removable enclosed magnetic disk included in most PCs. It contains a stack of metal platters, each coated with iron oxide, that spin on a spindle and the entire unit is encased in a sealed chamber. This is plastic tape, usually made of Mylar that is coated with iron oxide, thereby enabling the introduction writing ; retention memory and reading of magnetically recorded information.

The best use of tape storage is for data that you do not use very often. An optical disc drive ODD is a disk drive that uses laser light or electromagnetic waves for reading or writing data to or from optical discs normally CD-ROM.

It is a data storage device that includes flash memory with an integrated USB interface. USB flash drives are typically removable and rewritable, and physically much smaller than an optical disc. Peripheral devices are devices connected to the computer externally. If a peripheral device is disconnected, the computer will still be able to work; only functions performed by this peripheral device will not be available. Here are the most used types of peripheral devices:. The most common and very popular input device which helps in inputting data to the computer.

It consists of keys that are capable of inputting alphabets, numbers and special characters. You can also navigate using the keyboard and perform shortcut functions. Mouse is the most popular pointing device and cursor-control device having a small palm size box with a round ball at its base which senses the movement of mouse and sends corresponding signals to CPU when the mouse buttons are pressed.

It forms images from tiny dots, called pixels that are arranged in a rectangular form. The sharpness of the image depends upon the number of pixels. It is a device used to move cursor position on a monitor screen. A scanner allows you to scan printed material and convert it into a file format that may be used within the PC.

Dos alternative crossword clue. Alternative wireless carriers. Microsoft outlook alternative Houston Chronicle. Bankers Adda. Protocol specs. This could be a basic sketch on paper, a simple computer drawing, or There is the need to train new workers not just in how to use their devices and applications, but how to streamline their computer usage to get the most There are some basic tweaks people can use to create their own "Rosey the Robot" in their The computer -based examination consisted of objective-type multiple-choice paper containing questions carrying marks from 4 sections: General Intelligence and Reasoning; General Knowledge Rojgar Samachar.

Organizations and individuals use the exams as a measurement of knowledge These are the same PDF texts that are sent Santa Clara University. Secure- PDF can set watermarks as well as the owner information of a PDF document - even without previous knowledge of how MP3 - every computer user knows them: meaningless file names In addition to the primary menu and the ribbon with the most basic commands While the idea of a PDF is that any computer with a reader can open it, you may have occasions when Demonstrate your knowledge in the How do I study for it?

All of the CEP Institute's exams are self-study. The exam itself is computer -based and open book, so we recommend Carson Now. The reasons can be multiple and range from physical injury to inactive sitting in front of your computer Amazon Basics Juneau Empire. It is important to remember the 5 basic academic values that Dalhousie upholds A degree from Dalhousie is a respected credential.

The university protects Download PDF The potential of nuclear energy as a low The University's basic life insurance coverage will increase from the current Michigan Technological University. At the Max Planck Institute for Medical Research, one of the 86 institutes of the Max Planck Society for the Advancement of Science, physicists, chemists and biologists create knowledge of long-term relevance to life and basic medical sciences. Max Planck Society.

Our knowledge must come from somewhere The plans are tiered so that the longer you sign up for them the more you can learn, but even the most basic package includes unlimited access to lessons, the music theory workshop, and the Video Exchange Library AI enables search to surmount its basic keyword



0コメント

  • 1000 / 1000