SlideShare a Scribd company logo
1 of 8
What is GPT (GUID Partition Table)?
Short for GUID Partition Table, GPT is a part of the EFI standard that defines the layout of the
partition table on a hard drive. GPT is meant as a replacement to hard drives using a MBR partition
table, which have a 2.20TB size limitation and extends upon UEFI. Using GPT a drive could support
between 8 and 9.4 ZB depending on the sector size.
Quickly change case of text in Microsoft Word.
Highlight any text in Microsoft Word and press the shortcut key Shift + F3 to change the case of the
highlighted text. Pressing this key once will uppercase all highlighted text, pressing the shortcut again
will make the text all lowercase, and then pressing the shortcut again will give the text proper case.
Use the online converter to convert your text to uppercase, lowercase, and many other modifications.
What is IA-32 (Intel Architecture 32)?
Short for Intel Architecture 32, IA-32 is a 32-bit processor architecture developed by Intel that moves
computer processors from the 16-bit architecture of the early 286 computers to the 386 and later
processors. This architecture was later replaced by IA-64.
What is ICMP (Internet Control Message Protocol)?
Short for Intel Comparative Microprocessor Performance, iCOMP is an overall rating that originally
combined five benchmarks: CPUmark32, Norton SI-32, SPECint_base95, SPECfp_base95, and the
Intel Media Benchmark that was released in 1992. iCOMP gives a user a better overall rating and
comparison of computer processors.
Easily fix spots and other problems in photos.
Expensive programs such as Adobe Photoshop have a feature known as Content-Aware, which
allows them to fix spots and other problems in a photo with little work. The free online service
Webinpaint has the same capability and allows you to easily remove spots, blemishes, scratches,
objects, and any other problems you may have in a picture. For example, in the below picture I start
off with an image with four big air balloons and one small air balloon in the middle. I think the image
would look better without this small balloon, so I draw over the balloon and then click the Inpaint
button to remove the small balloon from the picture.
Individually remove page, search, or text in search bar
If you ever find yourself needing to delete an individual address, search, or other text from your
address bar or other auto complete field use the keyboard shortcut key Shift + Del to delete any item
individually. For example, in the below picture I typed computerhope into the address bar and was
given several options. Pressing the down arrow once selects the first address and pressing Shift + Del
will delete that first result.
What is Mission Control?
A feature on the Apple Mac OS X that gives an overview of what is currently running on the computer.
At the top of Mission Control you'll see the Dashboard, Desktop, Full screen windows and any open
application windows. The Mission Control is one of the easiest ways to switch between open
applications.
How to disable or uninstall Java.
Java is not a required component for most computer users and with the recent security exploits
discovered in Java and Oracle not rushing to fix many of the exploits any time soon many users may
choose to disable or uninstall Java on their computer. This document will cover how to update Java,
disable Java, and if needed uninstall Java on your computer. Further information on Java including an
example Java applet can be found on our Java definition page.
Remove formatting in Word from any pasted text.
When copying text from another document or Internet web page and pasting it into Microsoft Word,
Word will keep the formatting of the text. For example, if you were to copy the text on this page to a
Word file, this text would remain bold, and this text would remain blue. To remove the formatting in
Microsoft Word from any text highlight the text and press the shortcut key Ctrl + Spacebar. This will
set the text to the default font, remove the formatting, and even remove links.
Increase and decrease the size of desktop icons
While on the Windows Vista or higher Desktop hold down the Ctrl key and scroll up and down using
the wheel on your mouse. While scrolling up all the icons on the desktop will increase in size and
while scrolling down all the icons will decrease in size.
What is autofit?
AutoFit is a feature in Microsoft Excel that automatically adjusts the width or height of a cell. Below
are the steps on how to AutoFit cells in the different versions of Microsoft Excel.
What is sheet tab?
In Microsoft Excel, a sheet, sheet tab, or worksheet tab is the current worksheet that is being
displayed. Every Excel file is capable of having multiple worksheets, and after opening an Excel file,
you will see multiple sheet tabs as shown in the picture to the right. By default, you will have three
sheet tabs "Sheet1" the default worksheet, "Sheet2", "Sheet3", and an additional tab that will allow
you to add additional sheets to the Excel file.
What is sheet?
A sheet is another name for a single piece of paper or a hard copy.
What is Windows Mobility Center?
The Windows Mobility Center is a location within Microsoft Windows that allows a laptop or other
mobile user quick access to the most common mobile features. As can be seen in the below picture,
this laptop can adjust the brightness, volume, battery, wireless, external displays and sync options.
Depending on your hardware and your computer manufacture more or fewer tiles may be shown.
What is chroot?
The term chroot refers to a process of creating a virtualized environment in a Unix operating system,
separating it from the main operating system and directory structure. This process essentially
generates a confined space, with its own root directory, to run software programs. Because this virtual
environment runs in its own root directory, separated from the main operating system's root directory,
any software program run in this environment can only access files within its own directory tree. It
cannot access files outside of that directory tree. This confined virtual environment is often called a
"chroot jail".
What is NFC?
Short for Near Field Communication, NFC is a set of standards developed primarily for smartphones
and other similar electronic devices, allowing two way communication between the devices. The
range of NFC is very short, usually only an inch (few centimeters) or less. The NFC standards are
defined by the NFC Forum, formed in 2004 by Nokia, Philips, and Sony. Today, there are over 160
members of the NFC Forum.
What is Penetration?
In telecommunications, penetration can mean the act of trying to circumvent, or break through, a
security barrier, like a firewall or encryption. Sometimes called a hacker, a person attempts to
penetrate the barrier using various methods, including finding weaknesses in the security, a brute
force attack in an attempt to discover the password to unlock the security, or even repeated access
attempts in hopes of causing the security system to fail due to being overwhelmed (sometimes called
a Denial-of-service, or DDoS, attack).
What is tuneup?
For a computer, a tuneup refers to improving the performance of the computer by way of several
processes. These processes can include the removal of temporary computer files (also called temp
files), uninstalling computer programs that are not needed or necessary for proper operation of the
computer, fixing computer errors, cleaning up the system registry to remove invalid application and
file links, and more.
What is verbose mode?
Verbose mode is an option available in many computer operating systems, including Microsoft
Windows, Mac OS and Linux that provides additional details as to what the computer is doing and
what drivers and software it is loading during startup. This level of detail can be very helpful for
troubleshooting problems with hardware or software, if errors are occurring during startup or after the
operating system has loaded.
What is Windows CardSpace?
Windows CardSpace was developed by Microsoft as a software program for the Identity Metasystem.
CardSpace was used to create digital identities for users, storing some personal information about
them that could be requested and accessed by websites or other software applications. Users had the
ability to create their own personal card as well, utilizing up to 14 fields to store information. When
users' information, or identity, was requested, the CardSpace UI would appear, looking somewhat like
a business card or Outlook Contact, displaying various pieces of information pertaining to the
individual user. The user can select which card to make available to the website or application, which
then results in that website or application contacting the issuer of the identity to get a digitally signed
XML token. This token would then contain the information being requested about the user.
What is dual-channel memory?
Alternatively referred to as Multi-channel memory, Dual-channel memory is the DDR, DDR2, or DDR3
chipset on the motherboard that provides the memory with two memory channels instead of one. The
dual-channel platform helps alleviate bottlenecks that can occur by having one controller handle the
reading and writing while the other controller prepares the next access and prevents any type of
delay.
What is a Duron?
The Duron processor was manufactured and released by AMD on June 19, 2000. It was a lower cost
processor, providing an alternative to AMD's Athlon processors. It was also released as a competitor
to Intel's Celeron processor. AMD discontinued the Duron in 2004 and introduced a new processor as
a replacement, called the Sempron.
Computer memory history
Computer hard drive history Year Event 1837 Charles Babbage first purposed the Analytical Engine,
which was the first computer to use punch cards as memory and a way to program the computer.
1932 Gustav Tauschek develops drum memory. 1942 John Atanasoff successfully tests the
Atanasoff-Berry Computer (ABC) which was the first computer to use regenerative capacitor drum
memory. 1946 Freddie Williams applies for a patent on his cathode-ray tube (CRT) storing device on
December 11, 1946. The device that later became known as the Williams tube or more appropriately
the the Williams-Kilburn tube. The tube stored only stored 128 40-bit words and is the first practical
form of random-access memory. 1946 Jan Rajchman begins his work on developing the Selectron
tube that was capable of storing 256 bits. Because of the popularity of magnetic core memory at the
time, the Selectron tube was never put into mass production. 1947 Freddie Williams memory system
known as the Williams-Kilburn tube is now in working order. 1947 Frederick Viehe files a series of
some of the first patents relating to magnetic-core memory. Others who helped with the development
of magnetic-core memory and magnetic drum memory include An Wang, Ken Olsen and Jay
Forrester. 1949 Jay Forrester and other researchers comes up with the idea of using magnetic-core
memory in the Whirlwind computer. 1950 The United States Government receives the UNIVAC 1101
or ERA 1101. This computer is considered to be the first computer that was capable of storing and
running a program from memory. 1951 Jay Forrester applies for a patent for magnetic-core memory,
an early type of random access memory (RAM) May 11, 1951. 1952 In his master's thesis, Dudley
Allen Buck describes Ferroelectric RAM (FeRAM) that was not developed until the 1980's and early
1990's. 1953 In July 1953 a core memory expansion is added to the ENIAC. 1955 KonradZuse
completes the Z22, the seventh computer model and first computer that used magnetic storage
memory. 1955 MIT introduces the Whirlwind machine on March 8, 1955, a revolutionary computer
that was the first digital computer with magnetic core RAM. 1955 An Wang is issued U.S. patent
#2,708,722 on May 17, 1955 for then invention of the magnetic "Pulse Transfer Controlling Device",
which made made magnetic core memory a reality. 1955 Bell Labs introduces its first transistor
computer. Transistors are faster, smaller and create less heat than traditional vacuum tubs, making
these computers more reliable and efficient. 1964 John Schmidt designs a 64-bit MOS p-channel
Static RAM while at Fairchild. 1964 Kenneth Olsen is issued U.S. patent #3,161,861 on December 15,
1964 for Magnetic core memory. 1968 On June 4, 1968 Dr. Robert Dennard at the IBM T.J. Watson
Research center is granted U.S. patent #3,387,286 describing a one-transistor DRAM cell. DRAM will
later replace magnetic core memory in computers. 1969 Charles Sie publishes a dissertation at Iowa
State University where he described and demonstrated Phase-change memory (PRAM). Although
PRAM has still never been commercially practical, it is still being developed at companies like
Samsung. 1969 Intel releases its first product, the 3101 Schottky TTL bipolar 64-bit static random-
access memory (SRAM). In the same year Intel released the 3301 Schottky bipolar 1024-bit read-only
memory (ROM). 1970 Intel releases its first commercially available DRAM, the Intel 1103 in October
1970. Capable of storing 1024 bytes or 1KB of memory. 1971 While at Intel, Dov Frohman invents
and patents (#3,660,819) the EPROM. 1974 While at Intel, Federico Faggin at Intel is granted patent
#3,821,715 on June 28, 1974 that describes a memory system for a multichip digital computer. 1978
George Perlegos with Intel develops the Intel 2816, the first EEPROM. 1983 Wang Laboratories
creates the single in-line memory module (SIMM). 1993 Samsung introduces the KM48SL2000
synchronous DRAM (SDRAM) and quickly becomes an industry standard. 1984 FujioMasuoka
invents flash memory. 1996 DDR SDRAM begins being sold. 1999 RDRAM becomes available for
computers. 2003 DDR2 SDRAM begins being sold. 2003 XDR DRAM begins being sold. 2007 DDR3
SDRAM begins being sold June 2007.
How can I close multiple tasks in Task Manager
Unfortunately, the Windows Task Manager does have any shortcut keys or other methods of selecting
multiple tasks at once to close. However, using the Windows taskkill command will allow you to close
multiple programs at once. For example, let's assume a program has froze, or another problem with
the computer caused the same program to be opened multiple times. Follow the below steps to close
the program from the command line without having to reboot the computer.
What is borderless printing?
Alternatively referred to as full-bleed printing, borderless printing is a printing technique that makes a
printer print an image without any margin or other border. This type of printing is especially useful
when you're printing a photo but don't want a border, printing an image that requires multiple sheets
of paper for a single image (e.g. billboard or larger photo), or printing a template that needs a full
page.
Define names and use them in Microsoft Excel
Microsoft Excel allows any cell to to have a defined name, which makes creating and pointing to that
cell a lot easier. For example, in a traditional formula you may subtract the value in cell A1 from B1 by
using the formula =sum(A1-B1) in cell C1. However refrencing these cells and using them in a formula
could be made easier by defining the name of cells C1 and B1. For example, cell A1 could be named
"total" and cell B1 could be named "tax", which means the same formula in C1 could be =sum(total-
tax) to get the total.
Enter the same text into multiple Excel cells at once
In Microsoft Excel, you can enter the same data or text into multiple cells at once using the below
simple steps. Highlight all the cells that you want to have the same text.
Automate your work with Autohotkey
Autohotkey is a free and powerful tool that allows you to automate almost anything on your Windows
computer in any program. Computer Hope uses this tool daily to help answer common questions
asked in e-mail quickly and perform other common repetitive tasks. If you do anything daily that
requires you to repeat the same actions, we highly recommend using this tool. This page
demonstrates some of this programs capabilities.
What is autohotkey?
AutoHotkey is a fantastic free and open source Microsoft Windows tool that allows you to create
macros, scripts, and automate frequently performed tasks on your computer. For example, Computer
Hope uses this tool daily to help answer common questions asked in e-mail quickly and perform other
common repetitive tasks. Below are just a few examples of what AutoHotkey is capable of doing.
What is dictation mode?
Dictation mode is a mode available in certain types of software (such as Microsoft Word) which
enables a user to speak to a computer. The computer will create text from the speech and enter it as
text into the software. Most software dictation modes can improve their accuracy with repeated use
and/or training by each specific user.
What is ECU (Electronic Control Unit)?
Short for Electronic Control Unit, the ECU, is a name given to a device that controls one or more
electrical systems in a vehicle. It operates much like the BIOS does in a computer. The ECU provides
instructions for various electrical systems, instructing them on what to do and how to operate.
What is embedded Java?
Embedded Java is a set of Java technologies that are used to program embedded systems, such as
printers, mobile phones, GPS receivers, and medical imaging equipment. It also supports desktop
and server platforms like x86, x64, and more on many different operating systems.
What is cookie poisoning?
Cookie poisoning is a process in which an unauthorized person changes the content within a user's
cookie file in order to gain access to sensitive information that may be stored in the cookie or on the
server for the web site that the user is browsing.
What is external link?
Although the definition of an external link may vary from site to site or from person to person.
Generally, an external link is any link that goes to a different domain (e.g., example.com to
someplace.com) is considered an external link to computerhope.com. However, different situations
can cause a link to be thought of as internal instead. This can happen when the site has various
subdomains or directories that host different sites on that domain (e.g., a site that hosts numerous
blogs or homepages, or business sites). For example, the site someplace.com could have different
blog subdomains like cooking.someplace.com, autorepair.someplace.com, etc.
What is cHTML?
cHTML stands for compact HTML and is a version of HTML used for small devices such as cellular
phones or PDAs and only supports a subset of the HTML language. Features such as tables, image
maps, font styles/variations, background colors, background images, frames, and style sheets are not
supported. In cHTML, basic operations are performed by a combination of four buttons rather than via
cursor movement, which is one reason why a number of features (like image maps) are not
supported.
What is cookies.txt?
The cookies.txt file is the file that is used to store a user's cookies in certain web browsers, notably
Netscape and older versions of Firefox. This file is typically in the user profile for the application.
What is dead code?
Dead code in programming is code that is part of a program and gets executed, but the results are
never used by any other part of the program. This results in unnecessary processing, since the code
does not perform a task that is used.
What is darknet?
Darknet is a private P2P file sharing network in which only trusted peers make connections. This is
usually done with ports or protocols that are not typically used. The sharing is anonymous, as IP
addresses are not shared publicly. Darknets are often thought of to be associated with illegal activities
or other activities where the users would not want government and/or other involvments.
What is Boot menu?
When a computer is starting up, a user can access the boot menu by pressing one of several
keyboard keys, including Esc, F10 or F12, depending on the manufacturer of the computer or
motherboard. The specific key to press is usually specified on the computer's startup screen. The
boot menu allows a user to select what device to load an operating system or application from as the
computer is booting.

More Related Content

What's hot

Windows 7 Unit A PPT
Windows 7 Unit A PPTWindows 7 Unit A PPT
Windows 7 Unit A PPT
okmomwalking
 
Five Things Every Win32 Developer Should Know
Five Things Every Win32 Developer Should KnowFive Things Every Win32 Developer Should Know
Five Things Every Win32 Developer Should Know
wvdang
 
Lecture windows xp 3
Lecture windows xp 3Lecture windows xp 3
Lecture windows xp 3
Shafaq Saleem
 
Microsoft windows operating concept
Microsoft windows operating conceptMicrosoft windows operating concept
Microsoft windows operating concept
Mi L
 

What's hot (20)

Introduction to Windows XP
Introduction to Windows XPIntroduction to Windows XP
Introduction to Windows XP
 
The basics of windows
The basics of windowsThe basics of windows
The basics of windows
 
Windows10
Windows10Windows10
Windows10
 
I B.Sc C & HA - Basics of CS
I B.Sc C & HA - Basics of CSI B.Sc C & HA - Basics of CS
I B.Sc C & HA - Basics of CS
 
Computer unit 2
Computer unit   2Computer unit   2
Computer unit 2
 
Introduction to windows xp
Introduction to windows xpIntroduction to windows xp
Introduction to windows xp
 
Windows 7- Introduction and Features
Windows 7- Introduction and FeaturesWindows 7- Introduction and Features
Windows 7- Introduction and Features
 
Windows 7 Features
Windows 7 FeaturesWindows 7 Features
Windows 7 Features
 
Dos; windows os l 4
Dos; windows os l 4Dos; windows os l 4
Dos; windows os l 4
 
Windows 7 Unit A PPT
Windows 7 Unit A PPTWindows 7 Unit A PPT
Windows 7 Unit A PPT
 
Introduction to ms windows
Introduction to ms windowsIntroduction to ms windows
Introduction to ms windows
 
Five Things Every Win32 Developer Should Know
Five Things Every Win32 Developer Should KnowFive Things Every Win32 Developer Should Know
Five Things Every Win32 Developer Should Know
 
Lecture windows xp 3
Lecture windows xp 3Lecture windows xp 3
Lecture windows xp 3
 
Features of windows
Features of windowsFeatures of windows
Features of windows
 
Mac os installation and Hardware Report
Mac os installation and Hardware ReportMac os installation and Hardware Report
Mac os installation and Hardware Report
 
Microsoft windows operating concept
Microsoft windows operating conceptMicrosoft windows operating concept
Microsoft windows operating concept
 
Windows series operating system
Windows series operating systemWindows series operating system
Windows series operating system
 
Operating system and services
Operating system and servicesOperating system and services
Operating system and services
 
Lotus Notes 7.0.3
Lotus Notes 7.0.3Lotus Notes 7.0.3
Lotus Notes 7.0.3
 
Windows 7: The Basics
Windows 7:  The BasicsWindows 7:  The Basics
Windows 7: The Basics
 

Viewers also liked

Fotografia matemàtica a l'institut de Sils
Fotografia matemàtica a l'institut de SilsFotografia matemàtica a l'institut de Sils
Fotografia matemàtica a l'institut de Sils
moniquetakk
 
Presentazione 5 giugno 2010 licata
Presentazione 5 giugno 2010 licataPresentazione 5 giugno 2010 licata
Presentazione 5 giugno 2010 licata
ciroslide
 
La Sexualidad Humana
La Sexualidad HumanaLa Sexualidad Humana
La Sexualidad Humana
katherine
 
أفراح آل المقيد
أفراح آل المقيدأفراح آل المقيد
أفراح آل المقيد
mq2004
 
Presentazione finale
Presentazione finalePresentazione finale
Presentazione finale
ciroslide
 
Voip user and_configuration_guide
Voip user and_configuration_guideVoip user and_configuration_guide
Voip user and_configuration_guide
Santosh Kulkarni
 
Basic concepts in_computer_hardware_and_software
Basic concepts in_computer_hardware_and_softwareBasic concepts in_computer_hardware_and_software
Basic concepts in_computer_hardware_and_software
Santosh Kulkarni
 

Viewers also liked (11)

Exchange server 2013
Exchange server 2013Exchange server 2013
Exchange server 2013
 
Fotografia matemàtica a l'institut de Sils
Fotografia matemàtica a l'institut de SilsFotografia matemàtica a l'institut de Sils
Fotografia matemàtica a l'institut de Sils
 
Formas123
Formas123Formas123
Formas123
 
Introduction to routers
Introduction to routersIntroduction to routers
Introduction to routers
 
Hardware1
Hardware1Hardware1
Hardware1
 
Presentazione 5 giugno 2010 licata
Presentazione 5 giugno 2010 licataPresentazione 5 giugno 2010 licata
Presentazione 5 giugno 2010 licata
 
La Sexualidad Humana
La Sexualidad HumanaLa Sexualidad Humana
La Sexualidad Humana
 
أفراح آل المقيد
أفراح آل المقيدأفراح آل المقيد
أفراح آل المقيد
 
Presentazione finale
Presentazione finalePresentazione finale
Presentazione finale
 
Voip user and_configuration_guide
Voip user and_configuration_guideVoip user and_configuration_guide
Voip user and_configuration_guide
 
Basic concepts in_computer_hardware_and_software
Basic concepts in_computer_hardware_and_softwareBasic concepts in_computer_hardware_and_software
Basic concepts in_computer_hardware_and_software
 

Similar to Definitions

Unit III - Basics of Computer Science
Unit III - Basics of Computer ScienceUnit III - Basics of Computer Science
Unit III - Basics of Computer Science
Hepsijeba
 
Integrating technology into the classroom
Integrating technology into the classroomIntegrating technology into the classroom
Integrating technology into the classroom
TammiRice
 
Operatig System Tutorial Level3
Operatig System Tutorial Level3Operatig System Tutorial Level3
Operatig System Tutorial Level3
willye83
 
Computer software form 4
Computer software form 4Computer software form 4
Computer software form 4
norhaslinamj
 
INTRODUCTION CHAP. 1 complete access to all the hardware and can.docx
INTRODUCTION CHAP. 1 complete access to all the hardware and can.docxINTRODUCTION CHAP. 1 complete access to all the hardware and can.docx
INTRODUCTION CHAP. 1 complete access to all the hardware and can.docx
vrickens
 
Tricks N Tips By Ravish Roshan
Tricks N Tips By Ravish RoshanTricks N Tips By Ravish Roshan
Tricks N Tips By Ravish Roshan
ravish roshan
 
Operating systems 2
Operating systems 2Operating systems 2
Operating systems 2
mariacalji
 

Similar to Definitions (20)

Mke15
Mke15Mke15
Mke15
 
Operating system windows XP
Operating system windows XPOperating system windows XP
Operating system windows XP
 
Features Of A Operating System
Features Of A Operating SystemFeatures Of A Operating System
Features Of A Operating System
 
Note book pc
Note book pcNote book pc
Note book pc
 
Unit III - Basics of Computer Science
Unit III - Basics of Computer ScienceUnit III - Basics of Computer Science
Unit III - Basics of Computer Science
 
Wk 2 - computers
Wk 2 - computersWk 2 - computers
Wk 2 - computers
 
Presentation1
Presentation1Presentation1
Presentation1
 
computing networks and operating system
computing networks and operating system computing networks and operating system
computing networks and operating system
 
Integrating technology into the classroom
Integrating technology into the classroomIntegrating technology into the classroom
Integrating technology into the classroom
 
Operatig System Tutorial Level3
Operatig System Tutorial Level3Operatig System Tutorial Level3
Operatig System Tutorial Level3
 
Computer software form 4
Computer software form 4Computer software form 4
Computer software form 4
 
INTRODUCTION CHAP. 1 complete access to all the hardware and can.docx
INTRODUCTION CHAP. 1 complete access to all the hardware and can.docxINTRODUCTION CHAP. 1 complete access to all the hardware and can.docx
INTRODUCTION CHAP. 1 complete access to all the hardware and can.docx
 
Operating System.pptx
Operating System.pptxOperating System.pptx
Operating System.pptx
 
Basic computer tutorial
Basic computer tutorialBasic computer tutorial
Basic computer tutorial
 
Basic computer for_small_business
Basic computer for_small_businessBasic computer for_small_business
Basic computer for_small_business
 
Basic computer for small business
Basic computer for small businessBasic computer for small business
Basic computer for small business
 
ComputerSoftware.pdf
ComputerSoftware.pdfComputerSoftware.pdf
ComputerSoftware.pdf
 
Tricks N Tips By Ravish Roshan
Tricks N Tips By Ravish RoshanTricks N Tips By Ravish Roshan
Tricks N Tips By Ravish Roshan
 
Win8 seminar
Win8 seminarWin8 seminar
Win8 seminar
 
Operating systems 2
Operating systems 2Operating systems 2
Operating systems 2
 

More from Santosh Kulkarni (6)

Interview questions n answers
Interview questions n answersInterview questions n answers
Interview questions n answers
 
Personal computer-hardware
Personal computer-hardwarePersonal computer-hardware
Personal computer-hardware
 
Dhcp
DhcpDhcp
Dhcp
 
Hardware & softwares
Hardware & softwaresHardware & softwares
Hardware & softwares
 
Internet protocols
Internet protocolsInternet protocols
Internet protocols
 
Assembling the computer
Assembling the computerAssembling the computer
Assembling the computer
 

Recently uploaded

+971581248768>> SAFE AND ORIGINAL ABORTION PILLS FOR SALE IN DUBAI AND ABUDHA...
+971581248768>> SAFE AND ORIGINAL ABORTION PILLS FOR SALE IN DUBAI AND ABUDHA...+971581248768>> SAFE AND ORIGINAL ABORTION PILLS FOR SALE IN DUBAI AND ABUDHA...
+971581248768>> SAFE AND ORIGINAL ABORTION PILLS FOR SALE IN DUBAI AND ABUDHA...
?#DUbAI#??##{{(☎️+971_581248768%)**%*]'#abortion pills for sale in dubai@
 
Why Teams call analytics are critical to your entire business
Why Teams call analytics are critical to your entire businessWhy Teams call analytics are critical to your entire business
Why Teams call analytics are critical to your entire business
panagenda
 

Recently uploaded (20)

Strategize a Smooth Tenant-to-tenant Migration and Copilot Takeoff
Strategize a Smooth Tenant-to-tenant Migration and Copilot TakeoffStrategize a Smooth Tenant-to-tenant Migration and Copilot Takeoff
Strategize a Smooth Tenant-to-tenant Migration and Copilot Takeoff
 
EMPOWERMENT TECHNOLOGY GRADE 11 QUARTER 2 REVIEWER
EMPOWERMENT TECHNOLOGY GRADE 11 QUARTER 2 REVIEWEREMPOWERMENT TECHNOLOGY GRADE 11 QUARTER 2 REVIEWER
EMPOWERMENT TECHNOLOGY GRADE 11 QUARTER 2 REVIEWER
 
Strategies for Landing an Oracle DBA Job as a Fresher
Strategies for Landing an Oracle DBA Job as a FresherStrategies for Landing an Oracle DBA Job as a Fresher
Strategies for Landing an Oracle DBA Job as a Fresher
 
DBX First Quarter 2024 Investor Presentation
DBX First Quarter 2024 Investor PresentationDBX First Quarter 2024 Investor Presentation
DBX First Quarter 2024 Investor Presentation
 
+971581248768>> SAFE AND ORIGINAL ABORTION PILLS FOR SALE IN DUBAI AND ABUDHA...
+971581248768>> SAFE AND ORIGINAL ABORTION PILLS FOR SALE IN DUBAI AND ABUDHA...+971581248768>> SAFE AND ORIGINAL ABORTION PILLS FOR SALE IN DUBAI AND ABUDHA...
+971581248768>> SAFE AND ORIGINAL ABORTION PILLS FOR SALE IN DUBAI AND ABUDHA...
 
Why Teams call analytics are critical to your entire business
Why Teams call analytics are critical to your entire businessWhy Teams call analytics are critical to your entire business
Why Teams call analytics are critical to your entire business
 
Corporate and higher education May webinar.pptx
Corporate and higher education May webinar.pptxCorporate and higher education May webinar.pptx
Corporate and higher education May webinar.pptx
 
How to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected WorkerHow to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected Worker
 
ICT role in 21st century education and its challenges
ICT role in 21st century education and its challengesICT role in 21st century education and its challenges
ICT role in 21st century education and its challenges
 
MS Copilot expands with MS Graph connectors
MS Copilot expands with MS Graph connectorsMS Copilot expands with MS Graph connectors
MS Copilot expands with MS Graph connectors
 
Connector Corner: Accelerate revenue generation using UiPath API-centric busi...
Connector Corner: Accelerate revenue generation using UiPath API-centric busi...Connector Corner: Accelerate revenue generation using UiPath API-centric busi...
Connector Corner: Accelerate revenue generation using UiPath API-centric busi...
 
Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...
Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...
Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...
 
Powerful Google developer tools for immediate impact! (2023-24 C)
Powerful Google developer tools for immediate impact! (2023-24 C)Powerful Google developer tools for immediate impact! (2023-24 C)
Powerful Google developer tools for immediate impact! (2023-24 C)
 
A Beginners Guide to Building a RAG App Using Open Source Milvus
A Beginners Guide to Building a RAG App Using Open Source MilvusA Beginners Guide to Building a RAG App Using Open Source Milvus
A Beginners Guide to Building a RAG App Using Open Source Milvus
 
"I see eyes in my soup": How Delivery Hero implemented the safety system for ...
"I see eyes in my soup": How Delivery Hero implemented the safety system for ..."I see eyes in my soup": How Delivery Hero implemented the safety system for ...
"I see eyes in my soup": How Delivery Hero implemented the safety system for ...
 
Emergent Methods: Multi-lingual narrative tracking in the news - real-time ex...
Emergent Methods: Multi-lingual narrative tracking in the news - real-time ex...Emergent Methods: Multi-lingual narrative tracking in the news - real-time ex...
Emergent Methods: Multi-lingual narrative tracking in the news - real-time ex...
 
TrustArc Webinar - Unlock the Power of AI-Driven Data Discovery
TrustArc Webinar - Unlock the Power of AI-Driven Data DiscoveryTrustArc Webinar - Unlock the Power of AI-Driven Data Discovery
TrustArc Webinar - Unlock the Power of AI-Driven Data Discovery
 
Apidays New York 2024 - The value of a flexible API Management solution for O...
Apidays New York 2024 - The value of a flexible API Management solution for O...Apidays New York 2024 - The value of a flexible API Management solution for O...
Apidays New York 2024 - The value of a flexible API Management solution for O...
 
Polkadot JAM Slides - Token2049 - By Dr. Gavin Wood
Polkadot JAM Slides - Token2049 - By Dr. Gavin WoodPolkadot JAM Slides - Token2049 - By Dr. Gavin Wood
Polkadot JAM Slides - Token2049 - By Dr. Gavin Wood
 
Boost Fertility New Invention Ups Success Rates.pdf
Boost Fertility New Invention Ups Success Rates.pdfBoost Fertility New Invention Ups Success Rates.pdf
Boost Fertility New Invention Ups Success Rates.pdf
 

Definitions

  • 1. What is GPT (GUID Partition Table)? Short for GUID Partition Table, GPT is a part of the EFI standard that defines the layout of the partition table on a hard drive. GPT is meant as a replacement to hard drives using a MBR partition table, which have a 2.20TB size limitation and extends upon UEFI. Using GPT a drive could support between 8 and 9.4 ZB depending on the sector size. Quickly change case of text in Microsoft Word. Highlight any text in Microsoft Word and press the shortcut key Shift + F3 to change the case of the highlighted text. Pressing this key once will uppercase all highlighted text, pressing the shortcut again will make the text all lowercase, and then pressing the shortcut again will give the text proper case. Use the online converter to convert your text to uppercase, lowercase, and many other modifications. What is IA-32 (Intel Architecture 32)? Short for Intel Architecture 32, IA-32 is a 32-bit processor architecture developed by Intel that moves computer processors from the 16-bit architecture of the early 286 computers to the 386 and later processors. This architecture was later replaced by IA-64. What is ICMP (Internet Control Message Protocol)? Short for Intel Comparative Microprocessor Performance, iCOMP is an overall rating that originally combined five benchmarks: CPUmark32, Norton SI-32, SPECint_base95, SPECfp_base95, and the Intel Media Benchmark that was released in 1992. iCOMP gives a user a better overall rating and comparison of computer processors. Easily fix spots and other problems in photos. Expensive programs such as Adobe Photoshop have a feature known as Content-Aware, which allows them to fix spots and other problems in a photo with little work. The free online service Webinpaint has the same capability and allows you to easily remove spots, blemishes, scratches, objects, and any other problems you may have in a picture. For example, in the below picture I start off with an image with four big air balloons and one small air balloon in the middle. I think the image would look better without this small balloon, so I draw over the balloon and then click the Inpaint button to remove the small balloon from the picture. Individually remove page, search, or text in search bar If you ever find yourself needing to delete an individual address, search, or other text from your address bar or other auto complete field use the keyboard shortcut key Shift + Del to delete any item individually. For example, in the below picture I typed computerhope into the address bar and was given several options. Pressing the down arrow once selects the first address and pressing Shift + Del will delete that first result.
  • 2. What is Mission Control? A feature on the Apple Mac OS X that gives an overview of what is currently running on the computer. At the top of Mission Control you'll see the Dashboard, Desktop, Full screen windows and any open application windows. The Mission Control is one of the easiest ways to switch between open applications. How to disable or uninstall Java. Java is not a required component for most computer users and with the recent security exploits discovered in Java and Oracle not rushing to fix many of the exploits any time soon many users may choose to disable or uninstall Java on their computer. This document will cover how to update Java, disable Java, and if needed uninstall Java on your computer. Further information on Java including an example Java applet can be found on our Java definition page. Remove formatting in Word from any pasted text. When copying text from another document or Internet web page and pasting it into Microsoft Word, Word will keep the formatting of the text. For example, if you were to copy the text on this page to a Word file, this text would remain bold, and this text would remain blue. To remove the formatting in Microsoft Word from any text highlight the text and press the shortcut key Ctrl + Spacebar. This will set the text to the default font, remove the formatting, and even remove links. Increase and decrease the size of desktop icons While on the Windows Vista or higher Desktop hold down the Ctrl key and scroll up and down using the wheel on your mouse. While scrolling up all the icons on the desktop will increase in size and while scrolling down all the icons will decrease in size. What is autofit? AutoFit is a feature in Microsoft Excel that automatically adjusts the width or height of a cell. Below are the steps on how to AutoFit cells in the different versions of Microsoft Excel. What is sheet tab? In Microsoft Excel, a sheet, sheet tab, or worksheet tab is the current worksheet that is being displayed. Every Excel file is capable of having multiple worksheets, and after opening an Excel file, you will see multiple sheet tabs as shown in the picture to the right. By default, you will have three sheet tabs "Sheet1" the default worksheet, "Sheet2", "Sheet3", and an additional tab that will allow you to add additional sheets to the Excel file. What is sheet? A sheet is another name for a single piece of paper or a hard copy.
  • 3. What is Windows Mobility Center? The Windows Mobility Center is a location within Microsoft Windows that allows a laptop or other mobile user quick access to the most common mobile features. As can be seen in the below picture, this laptop can adjust the brightness, volume, battery, wireless, external displays and sync options. Depending on your hardware and your computer manufacture more or fewer tiles may be shown. What is chroot? The term chroot refers to a process of creating a virtualized environment in a Unix operating system, separating it from the main operating system and directory structure. This process essentially generates a confined space, with its own root directory, to run software programs. Because this virtual environment runs in its own root directory, separated from the main operating system's root directory, any software program run in this environment can only access files within its own directory tree. It cannot access files outside of that directory tree. This confined virtual environment is often called a "chroot jail". What is NFC? Short for Near Field Communication, NFC is a set of standards developed primarily for smartphones and other similar electronic devices, allowing two way communication between the devices. The range of NFC is very short, usually only an inch (few centimeters) or less. The NFC standards are defined by the NFC Forum, formed in 2004 by Nokia, Philips, and Sony. Today, there are over 160 members of the NFC Forum. What is Penetration? In telecommunications, penetration can mean the act of trying to circumvent, or break through, a security barrier, like a firewall or encryption. Sometimes called a hacker, a person attempts to penetrate the barrier using various methods, including finding weaknesses in the security, a brute force attack in an attempt to discover the password to unlock the security, or even repeated access attempts in hopes of causing the security system to fail due to being overwhelmed (sometimes called a Denial-of-service, or DDoS, attack). What is tuneup? For a computer, a tuneup refers to improving the performance of the computer by way of several processes. These processes can include the removal of temporary computer files (also called temp files), uninstalling computer programs that are not needed or necessary for proper operation of the computer, fixing computer errors, cleaning up the system registry to remove invalid application and file links, and more.
  • 4. What is verbose mode? Verbose mode is an option available in many computer operating systems, including Microsoft Windows, Mac OS and Linux that provides additional details as to what the computer is doing and what drivers and software it is loading during startup. This level of detail can be very helpful for troubleshooting problems with hardware or software, if errors are occurring during startup or after the operating system has loaded. What is Windows CardSpace? Windows CardSpace was developed by Microsoft as a software program for the Identity Metasystem. CardSpace was used to create digital identities for users, storing some personal information about them that could be requested and accessed by websites or other software applications. Users had the ability to create their own personal card as well, utilizing up to 14 fields to store information. When users' information, or identity, was requested, the CardSpace UI would appear, looking somewhat like a business card or Outlook Contact, displaying various pieces of information pertaining to the individual user. The user can select which card to make available to the website or application, which then results in that website or application contacting the issuer of the identity to get a digitally signed XML token. This token would then contain the information being requested about the user. What is dual-channel memory? Alternatively referred to as Multi-channel memory, Dual-channel memory is the DDR, DDR2, or DDR3 chipset on the motherboard that provides the memory with two memory channels instead of one. The dual-channel platform helps alleviate bottlenecks that can occur by having one controller handle the reading and writing while the other controller prepares the next access and prevents any type of delay. What is a Duron? The Duron processor was manufactured and released by AMD on June 19, 2000. It was a lower cost processor, providing an alternative to AMD's Athlon processors. It was also released as a competitor to Intel's Celeron processor. AMD discontinued the Duron in 2004 and introduced a new processor as a replacement, called the Sempron. Computer memory history Computer hard drive history Year Event 1837 Charles Babbage first purposed the Analytical Engine, which was the first computer to use punch cards as memory and a way to program the computer. 1932 Gustav Tauschek develops drum memory. 1942 John Atanasoff successfully tests the Atanasoff-Berry Computer (ABC) which was the first computer to use regenerative capacitor drum memory. 1946 Freddie Williams applies for a patent on his cathode-ray tube (CRT) storing device on December 11, 1946. The device that later became known as the Williams tube or more appropriately the the Williams-Kilburn tube. The tube stored only stored 128 40-bit words and is the first practical form of random-access memory. 1946 Jan Rajchman begins his work on developing the Selectron tube that was capable of storing 256 bits. Because of the popularity of magnetic core memory at the time, the Selectron tube was never put into mass production. 1947 Freddie Williams memory system known as the Williams-Kilburn tube is now in working order. 1947 Frederick Viehe files a series of some of the first patents relating to magnetic-core memory. Others who helped with the development of magnetic-core memory and magnetic drum memory include An Wang, Ken Olsen and Jay
  • 5. Forrester. 1949 Jay Forrester and other researchers comes up with the idea of using magnetic-core memory in the Whirlwind computer. 1950 The United States Government receives the UNIVAC 1101 or ERA 1101. This computer is considered to be the first computer that was capable of storing and running a program from memory. 1951 Jay Forrester applies for a patent for magnetic-core memory, an early type of random access memory (RAM) May 11, 1951. 1952 In his master's thesis, Dudley Allen Buck describes Ferroelectric RAM (FeRAM) that was not developed until the 1980's and early 1990's. 1953 In July 1953 a core memory expansion is added to the ENIAC. 1955 KonradZuse completes the Z22, the seventh computer model and first computer that used magnetic storage memory. 1955 MIT introduces the Whirlwind machine on March 8, 1955, a revolutionary computer that was the first digital computer with magnetic core RAM. 1955 An Wang is issued U.S. patent #2,708,722 on May 17, 1955 for then invention of the magnetic "Pulse Transfer Controlling Device", which made made magnetic core memory a reality. 1955 Bell Labs introduces its first transistor computer. Transistors are faster, smaller and create less heat than traditional vacuum tubs, making these computers more reliable and efficient. 1964 John Schmidt designs a 64-bit MOS p-channel Static RAM while at Fairchild. 1964 Kenneth Olsen is issued U.S. patent #3,161,861 on December 15, 1964 for Magnetic core memory. 1968 On June 4, 1968 Dr. Robert Dennard at the IBM T.J. Watson Research center is granted U.S. patent #3,387,286 describing a one-transistor DRAM cell. DRAM will later replace magnetic core memory in computers. 1969 Charles Sie publishes a dissertation at Iowa State University where he described and demonstrated Phase-change memory (PRAM). Although PRAM has still never been commercially practical, it is still being developed at companies like Samsung. 1969 Intel releases its first product, the 3101 Schottky TTL bipolar 64-bit static random- access memory (SRAM). In the same year Intel released the 3301 Schottky bipolar 1024-bit read-only memory (ROM). 1970 Intel releases its first commercially available DRAM, the Intel 1103 in October 1970. Capable of storing 1024 bytes or 1KB of memory. 1971 While at Intel, Dov Frohman invents and patents (#3,660,819) the EPROM. 1974 While at Intel, Federico Faggin at Intel is granted patent #3,821,715 on June 28, 1974 that describes a memory system for a multichip digital computer. 1978 George Perlegos with Intel develops the Intel 2816, the first EEPROM. 1983 Wang Laboratories creates the single in-line memory module (SIMM). 1993 Samsung introduces the KM48SL2000 synchronous DRAM (SDRAM) and quickly becomes an industry standard. 1984 FujioMasuoka invents flash memory. 1996 DDR SDRAM begins being sold. 1999 RDRAM becomes available for computers. 2003 DDR2 SDRAM begins being sold. 2003 XDR DRAM begins being sold. 2007 DDR3 SDRAM begins being sold June 2007. How can I close multiple tasks in Task Manager Unfortunately, the Windows Task Manager does have any shortcut keys or other methods of selecting multiple tasks at once to close. However, using the Windows taskkill command will allow you to close multiple programs at once. For example, let's assume a program has froze, or another problem with the computer caused the same program to be opened multiple times. Follow the below steps to close the program from the command line without having to reboot the computer. What is borderless printing? Alternatively referred to as full-bleed printing, borderless printing is a printing technique that makes a printer print an image without any margin or other border. This type of printing is especially useful when you're printing a photo but don't want a border, printing an image that requires multiple sheets of paper for a single image (e.g. billboard or larger photo), or printing a template that needs a full page.
  • 6. Define names and use them in Microsoft Excel Microsoft Excel allows any cell to to have a defined name, which makes creating and pointing to that cell a lot easier. For example, in a traditional formula you may subtract the value in cell A1 from B1 by using the formula =sum(A1-B1) in cell C1. However refrencing these cells and using them in a formula could be made easier by defining the name of cells C1 and B1. For example, cell A1 could be named "total" and cell B1 could be named "tax", which means the same formula in C1 could be =sum(total- tax) to get the total. Enter the same text into multiple Excel cells at once In Microsoft Excel, you can enter the same data or text into multiple cells at once using the below simple steps. Highlight all the cells that you want to have the same text. Automate your work with Autohotkey Autohotkey is a free and powerful tool that allows you to automate almost anything on your Windows computer in any program. Computer Hope uses this tool daily to help answer common questions asked in e-mail quickly and perform other common repetitive tasks. If you do anything daily that requires you to repeat the same actions, we highly recommend using this tool. This page demonstrates some of this programs capabilities. What is autohotkey? AutoHotkey is a fantastic free and open source Microsoft Windows tool that allows you to create macros, scripts, and automate frequently performed tasks on your computer. For example, Computer Hope uses this tool daily to help answer common questions asked in e-mail quickly and perform other common repetitive tasks. Below are just a few examples of what AutoHotkey is capable of doing. What is dictation mode? Dictation mode is a mode available in certain types of software (such as Microsoft Word) which enables a user to speak to a computer. The computer will create text from the speech and enter it as text into the software. Most software dictation modes can improve their accuracy with repeated use and/or training by each specific user. What is ECU (Electronic Control Unit)? Short for Electronic Control Unit, the ECU, is a name given to a device that controls one or more electrical systems in a vehicle. It operates much like the BIOS does in a computer. The ECU provides instructions for various electrical systems, instructing them on what to do and how to operate.
  • 7. What is embedded Java? Embedded Java is a set of Java technologies that are used to program embedded systems, such as printers, mobile phones, GPS receivers, and medical imaging equipment. It also supports desktop and server platforms like x86, x64, and more on many different operating systems. What is cookie poisoning? Cookie poisoning is a process in which an unauthorized person changes the content within a user's cookie file in order to gain access to sensitive information that may be stored in the cookie or on the server for the web site that the user is browsing. What is external link? Although the definition of an external link may vary from site to site or from person to person. Generally, an external link is any link that goes to a different domain (e.g., example.com to someplace.com) is considered an external link to computerhope.com. However, different situations can cause a link to be thought of as internal instead. This can happen when the site has various subdomains or directories that host different sites on that domain (e.g., a site that hosts numerous blogs or homepages, or business sites). For example, the site someplace.com could have different blog subdomains like cooking.someplace.com, autorepair.someplace.com, etc. What is cHTML? cHTML stands for compact HTML and is a version of HTML used for small devices such as cellular phones or PDAs and only supports a subset of the HTML language. Features such as tables, image maps, font styles/variations, background colors, background images, frames, and style sheets are not supported. In cHTML, basic operations are performed by a combination of four buttons rather than via cursor movement, which is one reason why a number of features (like image maps) are not supported. What is cookies.txt? The cookies.txt file is the file that is used to store a user's cookies in certain web browsers, notably Netscape and older versions of Firefox. This file is typically in the user profile for the application. What is dead code? Dead code in programming is code that is part of a program and gets executed, but the results are never used by any other part of the program. This results in unnecessary processing, since the code does not perform a task that is used.
  • 8. What is darknet? Darknet is a private P2P file sharing network in which only trusted peers make connections. This is usually done with ports or protocols that are not typically used. The sharing is anonymous, as IP addresses are not shared publicly. Darknets are often thought of to be associated with illegal activities or other activities where the users would not want government and/or other involvments. What is Boot menu? When a computer is starting up, a user can access the boot menu by pressing one of several keyboard keys, including Esc, F10 or F12, depending on the manufacturer of the computer or motherboard. The specific key to press is usually specified on the computer's startup screen. The boot menu allows a user to select what device to load an operating system or application from as the computer is booting.