Please click on the link below which you want to learn
CONTACT US FOR
Any kind of computers, Laptops, Batteries for laptop, Servers , monitors, printers, hard disk, ram, ups, cabinet, keyboards, mouse, Broad-band, ADSL routers, speakers, pen drives, modems, CD, DVD, TV cards, Graphic cards, headphones and other related (desktop & laptop) accessories.
Surya Prasad Dhakal
LUS@N COMPUTER CONSULTANCY SERVICE
SHREESHA HIMALAYAN BUSINESS MART
Putalisadak, Kathmandu,Nepal
Contact no :- +977 - 01 - 4245403, 9841313530, 9741073413
Entertainment...............( मनोरन्जन )



Sagarmatha TV(Live), Image Channel, Chhanel Nepal, Nepal One, Kantipur TV, Nepal Telivision, AVNews, ABC TV
News ....
eKantipur.com, Hamropalo.com, Himalayan Times,NepalNews.com, Nepal Horizons, Nepali Times, Telegraph, Nepal News, Gorkhapatra, Rajdhani, Nagarik, My Republica,Mahanagar, Naya Patrika, Annapurnapost, Kantipur in English
Big News Network, Birmarsha, Budhabar (Kathmandu), Business Manager, CBC News, Cyber Nepal, Deshantar (Kathmandu),Dishanirdesh (Kathmandu), Dristi(Kathmandu), EIN News,Gatibidhi, Himalayan Travel Trade Journal, HimoNews,Image Channel, Independent, Inside Nepal, Jana Aastha (Kathmandu),Janadharana (Kathmandu), Kamana, Kosheli (Kathmandu),Moreover, Nepal/Bhutan News, Nepal News Headlines, Nepal Samachaparta (Kathmandu), Nepal Traveller, Nepal News, Nepal Now, Nepali Post , Nepalnews.com in Nepali, New Business Age,Newslook, NewsTrove, Nispakshya, OneWorld, Parewa News,People’s Review Weekly (Kathmandu), Rajdhani (Kathmandu),The Rising Nepal (Kathmandu), RSS Nepal National News Agency, Samachar Patra, Sandhya Times (Kathmandu), Saptahik Weekly, Satyagraha, Spotlight (Kathmandu), Sunday Post(Kathmandu), Tasapaw (Kathmandu), Topix, Travellers’ Nepal,Washington Post Nepal News, Wave (Kathmandu)
FM Radios



Kantipur FM, Radio Salaam Namaste, Dallas, Texas,USA, BBC Nepali Sewa, CRI Nepali Sewa,Gurkha Radio, Hits FM, KATH 97.9, Machhapuchhre FM, Matri FM, Nepal Fm, Radio Dovan, Radio Nepal,Radio Sagarmatha, Ujyaalo 90 NetworkView Nepali Sabdakosh
फेसबुकमा नेपालीमा टाईपगर्नु परेमा यहाँ क्लिक गर्नुहोस (पहिला रोमन मा टाईप गर्नुहोस् र कपि पेस्ट गर्नुहोस्)
Dictionary
Here is some links to sign in..
Saturday, December 19, 2009
तपाईंको कम्प्युटरको गती(speed)बढाउने उपायहरु(Tips).
१. सर्बप्रथम कम्प्युटर खोल्ने बित्तिकै कुनै पनि Application चाँड चांडै नखोल्नुस् , पहिला राम्रो सँग PC लाई Bootup हुन दिनुस् ।
२. कुनैपनि Application बन्द गरी सके पछि आफ्नो Desktop लाई एक पल्ट Refresh गर्नुस् यसले तपाईंको कम्प्युटरको Ram मा जम्मा भएको Unused फाइलहरु Remove हुन्छ ।
३. आफ्नो कम्प्युटरमा सके सम्म Wallpaper को Use नै नगर्नुस् र यदि गर्नुनै छ भने ठुलो साइजको Image लाई Use नगर्नुस् ।
४. आफ्नो Desktop मा धेरै Unnessesary Shortcut हरुलाई नराख्नुस् र सके सम्म Desktop लाई Clean नै राख् नुस् । Desktop मा फोटो तथा Music को फाइलहरुलाई पनि Save नगर्नुस् ।
५. RecycleBin लाई बेला बेलामा Empty गरी राख् नुस् । तपाईंले Delete गर्नु भएको फाइलहरु RecycleBin मा जम्मा भई राखेको हुन्छ र तपाईंको कम्प्युटरको Harddrive को ठाउँ यसले लीइ राखेको हुन्छ ।
६. temporary internet files लाई बेला बेलामा Delete गरी राखनुस् ।
७. आफ्नो कम्प्युटर लाई प्रत्येक २ महिनामा Defragment गर्नुस् । यसले तपाईंको कम्प्युटरको Harddrive मा धेरै खाली ठाउँ बनाउछ र Program हरु Fast चल्छन ।
८. आफ्नो कम्प्युटर लाई जहिले पनि २ वा २ भन्दा बढीमा partitions गर्नुस् र सके सम्म Software हरुलाई दोस्रो वा तेस्रो Drive मा Instal गर्नुस् । सके सम्म C Drive लाई खाली नै राख् नुस् ।
९. जब तपाईंले नयाँ Software हरु Instal गर्नु हुन्छ त्यो Software को Tray Icon लाई Disable गर्नुस् , यि Icon हरुले तपाईंको कम्प्युटरको RAM को Use गरी राखेका हुन्छन र कम्प्युटर Slow हुन सक्छ र Software का starting the application automatically Option लाई पनि Disable गर्न नभुल्नु होला । यस्ता Option हरुलाई तपाइले software हरु Instal गरी सके पछि उक्त Software को Tools मा गएर पनि Disable गर्न सक्नु हुन्छ ।
१०. आफ्नो कम्प्युटर लाई धुलो बाट पनि सके सम्म बचाउनुस् , किन भने धुलोले तपाईंको कम्प्युटरका Cooling Fan हरुलाई जाम गरी दिन सक्छ यसले कम्प्युटर अनावश्यक रुपमा तातो हुन सक्छ र कम्प्युटर Slow Down हुन सक्छ ।"यि १० वटा साधारण Tips हरुलाई बिचार पुर्याउनु भयो भने तपाईंको कम्प्युटर तुलनात्मक रुपमा पहिले भन्दा धेरै Speed मा चल्न सक्छ ।"
हजुरको कम्प्युटरको सुरक्षाको लागि उपायहरु(Tips).
२) आफ्नो e-mail मा आएका mail हरुलाई नहेरी नबुझी झत्तै कहिले पनि नखोल्नुस् । शँका लागेका mail हरु कहिले पनि नखोल्नुस् Even तपाईंले चिनेको मान्छेले पठाएको भए पनि..." यो एउटा साधारण नियम नै हो कि यदि तपाईं कसैलाई चिन्नु हुन्न भने त्यो मान्छेले पठाएको mail खोल्नु तपाईंलाई जरुरी छैन र त्यो mail सँग जोडीएको कुनै Attachment पनि । यदि तपाईंलाई शँका लागेका यस्ता कुनै mail आएको छ भने त्यसलाई Delete गरी दिनु नै राम्रो हुन्छ न कि के हो एक चोटि खोली हेरु भनी खोल्नु । यदि तपाईंलाई खोल्नु नै छ भने पनि पहिला त्यो फाइललाई कम्प्युटरमा Save गर्नुस् र आफ्नो Anti-virus Software ले virus check गरेर मात्र खोल्नुस् तर यो पनि तपाईंको कम्प्युटरको लागि risk हुन सक्छ । साथै तपाईंलाई एउटै message एउटै नाम बाट धेरै आएको छ भने पनि तपाइ साबधान हुनुस् ।"
३) आफ्नो कम्प्युटरमा तपाईंले नचाहेर प्रवेस गर्नेलाई रोक्ने सुरक्षित ईन्टरनेट Firewalls लाई activate गर्नुस् । " तपाईंको कम्प्युटरमा भएको Firewalls system लाई active राख् नुस् । यसले तपाईंको कम्प्युटर र बाँकी दुनियाँको बिच सुरक्षा पर्खालको काम गर्छ । यसले तपाईंको कम्प्युटरको software र Hardware को एकै चोटि रक्षा गर्ने काम गर्छ । यसले तुलनात्मक रुपमा अनधाक्रित र खराब Data हरु बिरुद्द सुरक्षाको दिन्छ ।"
४) सके सम्म guess गर्न गार्हो Password को प्रयोग गर्नुस् । " जस्तै capital letter र small latter को mix , कुनै symbol को बिचमा प्रयोग अनि अंक को प्रयोग । र यो पनि नभुल्नुस् कि तपाईंको password कमसे काम ८ ओटा भन्दा कम नहोस् , आफ्नो password लाई regularly change गरी राख् नुस् at least ९० दिन भित्रमा र आफ्नो password कसै सँग पनि Share नगर्नुस् ।"
५) आफ्नो कम्प्युटरको महत्वपूर्ण Data हरुलाई Backup को रुपमा CD मा राख् ने गर्नुस् । " अनुभव प्राप्त कम्प्युटर अपरेटरले सधैं आफ्नो महत्वपूर्ण Data हरुलाई Backup को रुपमा Disk वा CD हरुमा राखेका हुन्छन । यस्तो गर्ने बानिले तपाईंले कहिले काही आफ्नो कम्प्युटरका Data हरु loss भएको खण्डमा धेरै काम दिन सक्छ । तपाईंको कम्प्युटरका Data हरु कुनै बेला पनि Damage हुन सक्छ त्यसैले बेलामै तयार रहनुस् ।"
६) आफ्नो कम्प्युटरलाई कहिले पनि Sharing नगर्नुस् " तपाईंको कम्प्युटरलाई अरु कम्प्युटर सँग network वा Internet बाट sharing नगर्नुस् , यसबाट पनि तपाईंको कम्प्युटरमा virus सर्न सक्ने धेरै Chance हुन्छ त्यसैले जरुरी नभए सम्म sharing mode लाई Turn Off नै राख् नुस् । आफ्नो operating system लाई check गर्नुस् कि कसरी यसलाई disible गर्न सकिन्छ र कहिले पनि कुनै अपरिचित सँग आफ्नो कम्प्युटर लाई share नगर्नुस् ।"
७) Internet connection लाई disconnect गर्नुस् यदि use भएको छैन भने " यो याद राख्नुस् कि Digital Highway को २ वटा बाटो हुन्छ , तपाईंले कुनै Data पठाउनु हुन्छ र पाउनु हुन्छ , जहिले पनि Sent र Receive को नियम लागु हुन्छ । यदि तपाईं online मा हुनु हुन्छ र तपाईं सँग Anti-virus सफ्टवेर छैन र Firewalls पनि active छैन भने अरु कुनै दोस्रो मान्छेले तपाईंको कम्प्युटरमा virus infect गर्न सक्छ । त्यसैले यदि तपाईंलाई आवश्यकता छैन भने Internet connection लाई Disconnect गर्नुस् ।"
८) आफ्नो कम्प्युटरको security system लाई बेला बेलामा check गरी राख् नुस् । " प्रोग्राम र opereting system को धेरै महत्वपूर्ण Value छ तपाईंको life सजिलो गराउनमा तर तपाईंलाई टाढा रहनु छ hackers र viruses सँग र यिनिहरुले तपाईंको यि नै महत्वपूर्ण अङमा आक्रमण गर्न्छन । त्यसैले तपाईं सधैं चनाखो रहनु जरुरी छ ।"
९) ईन्टरनेटमा जे पायो त्यही फाइलहरु download नगरनुस् । " तपाइलाई यो थाहा हुनु जरुरी छ कि ईन्टरनेटमा राम्रो मात्र हैन तपाईंको कम्प्युटरलाई बिगार्ने धेरै नराम्रो फाइलहरु पनि पाईन्छन । त्यसैले ईन्टरनेट बाट फाइलहरु download गर्दा धेरै ध्यान दिनु पर्छ । तपाईंलाई शँका लागेका वा अनावश्यक फाइलहरु सके सम्म download नगर्नु नै राम्रो ।"
१०) आफ्नो घरको परिवार वा जस्ले तपाईंको कम्प्युटर चलाऊछ उनिहरुलाई पनि थाहा हुनु पर्छ कि के गर्नु पर्छ virus बिरुद्द सुरक्षा गर्नको लागि " यो एकदम महत्वपूर्ण कुरा हो कि कम्प्युटर चलाऊने सबैले कम्प्युटरको सुरक्षाको बारेमा पनि जान्नु जरुरी छ । उनिहरुलाई थाहा हुनु पर्छ कि कसरी anti-virus Software लाई Update गर्ने कसरी Password ले सुरक्षा गर्ने आदी आदी ।"
Types of Networks
Client/Server - This type of network is designed to support a large number of users and uses dedicated server/s to accomplish this. Clients log in to the server/s in order to run applications or obtain files. Security and permissions can be managed by 1 or more administrators which cuts down on network users med-ling with things that they shouldn't be. This type of network also allows for convenient backup services, reduces network traffic and provides a host of other services that comes with the network operating system (NOS).
Centralized - This is also a client/server based model that is most often seen in UNIX environments, but the clients are "dumb terminals". This means that the client may not have a floppy drive, hard disk or CD ROM and all applications and processing occur on the server/s. As you can imagine, this requires fast and expensive server/s. Security is very high on this type of network.
OSI Seven(7) Layer Model
* Physical - The Physical layer is the specification for the hardware connection, the electronics, logic circuitry, and wiring that transmit the actual signal. It is only concerned with moving bits of data on and off the network medium. Most network problems occur at the Physical layer.
* Data Link - The Data Link layer is the interface between the upper "software" layers and the lower "hardware" Physical layer. One of its main tasks is to create and interpret different frame types based on the network type in use. The Data Link layer is divided into two sub-layers: the Media Access Control (MAC) sub-layer and the Logical Link Control (LLC) sub-layer.
o LLC sub-layer starts maintains connections between devices (e.g. server - workstation).
o MAC sub-layer enables multiple devices to share the same medium. MAC sub-layer maintains physical device (MAC) addresses for communicating locally (the MAC address of the nearest router is used to send information onto a WAN).
* Network - The Network layer addresses messages and translates logical addresses and names into physical addresses. It also manages data traffic and congestion involved in packet switching and routing. It enables the option of specifying a service address (sockets, ports) to point the data to the correct program on the destination computer.
* Transport - The Transport layer provides flow control, error handling, and is involved in correction of transmission/reception problems. It also breaks up large data files into smaller packets, combines small packets into larger ones for transmission, and reassembles incoming packets into the original sequence.
* Session - The Session layer handles security and name recognition to enable two applications on different computers to communicate over the network. Manages dialogs between computers by using simplex(rare), half-duplex or full-duplex. The phases involved in a session dialog are as follows: establishment, data-transfer and termination.
* Presentation- The Presentation layer determines data exchange formats and translates specific files from the Application layer format into a commonly recognized data format. It provides protocol conversion, data translation, encryption, character-set conversion, and graphics-command expansion.
* Application - The Application layer represents user applications, such as software for file transfers, database access, and e-mail. It handles general network access, flow control, and error recovery. Provides a consistent neutral interface for software to access the network and advertises the computers resources to the network.
Here is an idiotic, yet easy way to remember the 7 layers. Memorize the following sentence: All People Seem To Need Data Processing. The first letter of each word corresponds to the first letter of the layers starting with Application and ending with the physical layer.
Layer 1 – The Physical Layer
* Translates data into bits, or bits into data
* Deals only with electrical and mechanical level of data communication, which builds the foundation to allow higher OSI layers to walk through it.
* Physical Layer devices are:
o NIC Cards
o Ethernet Hubs
o Repeaters
o Multistation Access Units (MAUs)
o Transceiver
o Media Filters
Layer 2 – The Data Link Layer
* Provides flow and error control and synchronization for the Physical Layer
* Is made up of the Logical Link control and MAC sublayers
* Data Link Layer Devices are:
o Bridges
o Switches
o Brouters
The Protocols that operate at the Data Link Layer are:
* Point-to-Point Protocol (PPP)
* Serial Line Internet Protocol (SLIP)
* High-Level Data Link Control (HDLC)
* Logical Link Control (LLC)
* Link Access Protocol (LAP)
Layer 3- The Network Layer
* Manages communications routing for packets that are destined for addresses that are not on the LAN
* Uses routable protocols to deliver packets across interconnected networks joined by routers.
* Device which operate at the Network Layer are:
o Routers
o Connectionless Oriented services
The two main protocols that operate at the Network Layer are:
* TCP/IP
* IPX/SPX
Layer 4 – The Transport Layer
o Manages the end-to-end control and error checking by providing an end-to-end connection between the source and the destination node to ensure reliable data delivery
o Also responsible for providing end-to-end recovery, flow control, and releasing the connection
Connectionless-Oriented Protocols that operate at this layer are:
* UDP
Connection-Oriented Protocols that operate at this layer are:
* TCP/IP
* SPX/IPX
Layer 5 – The Session Layer
* The session layer manages the establishment of a continuing series of requests and responses between the applications at each end.
* Mainframes used to use this layer – modern networking does not.
Layer 6 - The Presentation Layer
* Usually part of the Operating System
* It prepares incoming data for the Application layer and formats outgoing data that the Application layer sends and receives.
* Data compression and data encryption.
Layer 7 – The Application Layer
* The top layer of the OSI model
* Provides information services
* FTP and Telnet access the OSI model at this layer.
Sunday, November 22, 2009
Microsoft Disk Operating System
An operating system is a set of specialized programs, which coordinate the activities, resources, and operations of it are various hardware peripherals. It is heart of the computer system software.
DOS: Among other operating system MS-DOS is the most common single task (only one task at a time) operating system in use today in personal computers. It is a production of Microsoft Inc. USA. Similarly DOS developed by IBM (International Business Machine) is known as PC DOS.
BOOTING: It is a process by which a computer loads an operating system software (e.g. MS-DOS) from secondary storage media (e.g. Floppy Diskette or Hard Disk) into the main memory of computer and gets ready to accept data, commands and instructions.
Or
It is a process for making the computer ready for working.
Booting is of two types:
Cold Booting: Starting the computer by switching on the main switch (Power) of system unit or starting a cold computer is called Cold Booting.
Warm Booting: Re-booting the computer, which is already been started.
This can be done in two ways:
Press "Reset" button available on your system unit.
Press Ctrl + Alt + Del keys in Keyboard at a time.
When the machine is switched on, a number of steps are undertaken before the system is ready. The steps are:
The system does the POST [Power On Self Test], where the system automatically checks the memory, the devices like the KEYBOARD, VDU, MOUSE (if attached), the disk drives are so on and if any discrepancy is detected, relevant messages are displayed on the screen.
Searches for the booting files i.e. IO.SYS, MSDOS.SYS & COMMAND.COM from the drive, which was set up in BIOS.
On finding the booting files, it first loads the IO.SYS file, which shall look after all, inputs to the system and outputs form the system. Then it loads MSDOS.SYS that looks after the disk operations, and lastly COMMANA.COM is loaded which is to ensure the execution of the commands.
Before loading COMMAND.COM the system searches a very import yet optional file called CONFIG.SYS, the function of this file is to configure the system according to the user's specification.
After COMMAND.COM is loaded the system again searches for another important file AUTOEXEC.BAT and if found, system executes it.
Now when all files are loaded, the system provides the user with a PROMPT on the screen. The prompt looks like A:> or C:>. Only when the prompt appears on the screen we know that the system is ready functioning.
Files: Every DATA and PROGRAM in the computer system is stored in the form of Files. The files in DOS have two parts namely Base name and extension. A base name has maximum of eight characters whereas extension can have a maximum of 3 characters. Filename and Extension must be separated by a period (.) not by space. It must be a single. No empty space allowed in between.
Program Files: They are the files having some special instructions stored in them, which executes and provides the instructed output when they run. Files with the extension like EXE, BAT, SYS and COM are the examples of program files.
Data Files: They are the files which are just used to store data and records in them. They do not execute and are shared by the program files when a program needs to get the required data. These files may or may not have extensions. All the files without the extension like that of the program files are the data files.
Command: A command is a request or instruction to the computer, which when feeded in the computer through input device is process and implemented by computer accordingly. They are of two types:
Internal or In-Built-Up Command:
All internal commands are associated with COMMAND.COM file and it is loaded while booting and remains in Computer's Main Memory (RAM) until we you turn off the CPU. So, whenever you issue an internal command it runs immediately.
Following are the MS-DOS internal commands:
CLS Clear the screen.
Example: CLS
DATE It allows users to view and reset the system date.
Example: DATE
TIME It allows users to view and reset the system time.
Example: TIME
COPY CON It allows users to create and save a file under the given name. It is the worst word-processing command, which does not allow us to modify and print the contents. [Note: Do not use the following extension BIN, SYS, COM, EXE].
Example: COPY CON Ramesh.txt
Dear Girish
How is your computer class is going?
See you soon
F6, [saves & exits to command prompt].
or
CTRL + C [exits to command prompt without saving]
TYPE It allows users to view content of the given file.
Example: TYPE Ramesh.txt
REN or RENAME It allows users to change the name of a file.
Example: REN Ramesh.txt Ramesh1.txt
Or
RENAME Ramesh.txt Ramesh1.txt
DIR It allows us to view the contents (e.g. files and directories/folders) of current path.
Examples:
a) DIR Displays the content of current directory, continuously.
b) DIR/P Displays the content of current directory, pausing between the pages.
c) DIR/W Displays only the name of the directory in width format.
d) DIR/L Displays in lowercase.
e) DIR *.EXE Displays only those files having EXE extension.
[Note: Here '*' is called a "Wild Card". It is used to represent nothing, one or more unknown characters while specifying the filename and extension.]
f) DIR P*.EXE Displays only those file starting with letter 'P' and having extension "EXE".
g) DIR R???.* Display file name starting with 'R' having 4 characters. Extension any.
[Note: the "?" (a question/what/interrogative sign) is also a wild character represents either nothing or one unknown character when we use it in filename or extension.]
h) DIR > PRN Send the directory list to the printer.
DIR > file1 Save the list of directory in to file named file1.
DEL It allows us to erase one or more unwanted files.
Example: DEL file1
VER Displays the version/ edition/generation of MS-DOS being currently used.
Example: VER
VOL It helps us to know the volume label (i.e. name) of a floppy diskette or hard disk.
Example: VOL
Directory / Folder Maintenance:
What is Directory?
A directory is just like a folder of a cabinet (or room of a house) utilized to store the similar type of files. As it is used to store the systematically, it helps us to search for a particular file in a very short period.
Example C:\Users\Rama\Data
Where C: = Drive name or Root Directory of drive C.
Users = Directory or Folder.
Rama = Sub-directory or sub-folder.
Data = Sub-directory of Sub-folder.
\(Back slash) = sign is used to separate the drive name, folder, subfolder and filename.
So any directory created in Root Directory of any drive is called a "Directory or Folder".
Any directory created inside a directory is called "Sub-Directory or Sub-Folder".
Root directory, Directory and Sub Directory are the relative term.
MD Creating a directory, or Make Directory.
Example: MD LETTER Creates directory called LETTER.
CD Changing Directory.
CD.. Coming out from current directory.
CD\ Coming to root directory.
CD letter Going inside the directory called letter.
RD Remove Directory.
[Note: the Directory to be removed must be empty, the command should be issued outside from the directory to be removed.]
PROMPT: Changes the appearance of MS-DOS prompt.
Example: PROMPT $P$D$G {P=path, D=Date, G= Greater than sign}
PATH: Establishes or shows or remove the searching path (drive & directory) for executable program file.
Example: PATH C:\WINDOWS Establish the searching path as WINDOWS.
PATH Display current path.
PATH; Clears the current path.
COPY: It is used to make the duplicate of one or more files.
Example: COPY C:\file1 A:\file2 Copy file1 form C: to A: and change name as file2.
COPY file1 + file2 + file3 Newfile Merging three file together and put it into Newfile.
C: A: Changing the Drive.
Example: C: A: change working drive from C: to A:.
External Command.
All the MS-DOS commands except those mentioned above are the external commands. It runs slower than internal command. It is stored in secondary storage devices. They are specially designed for some specific purpose.
1.CHKDSK: Check the status of a disk and displays a status reports. It can fix the problems but is not much reliable.
Example: CHKDSK C: Run check disk on C: drive.
2.SCANDISK: Checks disks for damages, and repairs them, if needed. It is more reliable and recommended command to fix the disk and file errors.
Example: SCANDISK C: Run scandisk on C: drive.
3.ATTRIB: Displays or changes file attributes.
Any file has certain specific characteristics or qualities that define the nature of the file; this in turn determines the access of the file. The Attributes available under DOS are R, A, H and S.
R [Read-Only file attribute] The file with this attribute can be displayed or read only but cannot be modified in any way or neither can they be deleted.
A [Archive file attributes] With this attributes, we can mark the files. The MSBACKUP, XCOPY and RESTORE commands can copy only those files marked with this attributes.
S [System file attributes] it designates a file as a system file. Files with I this attributes cannot be seen, edited and run.
H [Hidden file attributes] the files with these attributes are not normally displayed in directory listings, such file cannot be edited, deleted by can be run, if we know their names.
+ Set an attributes.
Remove an attribute.
Example: ATTRIB Displays attributes of all files in current directory.
ATTRIB +R Nepal Assign read only attributes to file called Nepal.
4.DELTREE: Deletes a directory and all the subdirectories and files in it.
Example: DELTREE C:\temp Delete directory called temp.
[Be sure to use this command before you use it. It can be mishandle to create problems]
5.DISK COPY: Copies the contents of one floppy disk to another. It is duplicating the floppy diskette. [Note: A hard disk can not be disk copied.]
Example: DISK COPY A: B: Make B:duplicate copy of A:
6.DOSKEY: Loads the DOSKEY program into memory. It will allow us to recall old command recently used.
Example: DOSKEY Starts storing old command now unwands.
7.EDIT: It is a powerful MS-DOS text editor, which allows us to create, edit, save, open, duplicate and print a TEXT file.
Example EDIT Gita.txt Create text file called Gita.txt and allows us to edit.
8.FORMAT: A new disk, including a hard disk, must to prepare before it is used for the first time. This step is called formatting.
Example: FORMAT A: It formats a floppy drive.
9.LABEL: Creates, changes, or deletes the volume label of a disk. User can give a name to each disk, which will be stored internally as information. This name is known as volume label.
Example: LABEL Displays the volume label and serial number of the disk in current drive, if they exist. Then it prompts you to enter the new volume label (not longer than 11 characters) or delete the existing volume label.
10.MORE: Displays one screen of output at a time. This command is commonly used too view long text files.
Examples: DIR | MOREDisplays the directory listing one screen at a time. Press a key to see the next screen. This command does the same function of DIR/P .
11.MOVE: Moves files to the drive and directory you specify. It also renames files and directories.
Example: MOVE A:\HARI.TXT C:\DATA\SITA.TXT Moves the file named HARI.TXT from drive A into the DATA directory on drive C and in the same time renames the file to SITA. TXT.
12.SYS: Copies MS-DOS system files (IO.SYS & MSDOS.SYS) and command interpreter (COMMAND.COM) to a disk you specify.
Example: SYS A: Copies the system files and files and command interpreter from current drive into the disk on drive A.
13.UNFORMAT: Restores a disk erased by the FORMAT command or restructured by the RECOVER command.
Example: UNOFROMAT A: Restores the formatted disk in drive A without listing all the files and sub _ directories.
14.XCOPY: Copies directories, subdirectories and their files (expect hidden and system). The XCOPY command first loads the specified directories and files into RAM as much as it can hold and after then, copies them from RAM to target drive &folder. So xcopy is faster than COPY command (The COPY command copies one file at one time from source to target location however RAM has the sufficient spaces to hold more files)
Examples: XCOPY A: B:/S/E Copies all the files and sub -directories (including the empty sub-directories) from the disk in drive A to the disk in Drive B.
15.TREE: This command is needed usually since a disk can have numerous directories and sub directories and all of them filled with files, so at times it becomes really difficult to locate particular file or group of files. This command graphically displays the directory structure.
Example: TREE C: Displays the names of all sub-directories on the disk C:.
16.PRINT: Prints the contents of MS-DOS Text File. This command can print in the background if you have an output device connected to your system serial or parallel ports.
Examples: PRINT COW Sends the contents of Cow to the computer.
17.DISKCOMP: Compares the contents of two floozy diskettes. This command performs the track-by-track comparisons. It determines the number of sides and sectors per track to compare based on the format of the first disk you specify.
Example: DISKCOMP B: A: Compares the disk in drive B with the disk in drive A.
18.SORT: Sorts input and writes results to the screen, a file, or another device.
Examples: SORT/R Sorts the paragraphs/records of MAILLIST.TXT in reverse order and then displays the output on screen
19.MSD: The MSD (Microsoft Diagnostic Tool) command provides detailed technical information about your computer.
Example: MSD Runs the Microsoft Diagnostics tool, analyzes the computer and then, displays different headings. You can choose the desired heading to view the corresponding technical information. Press F3 to quit from Microsoft Diagnostic tool.
20.MEM: Displays the amount of used and free memory in your system. It displays the information about allocated memory areas, free memory areas and the programs currently loaded into memory.
Example: MEM
Checks and then displays the amount of used and free memory in your system.
Memory Type Total Used Free
Conventional 640k 144k 496k
Upper 91k 91k 0k
Reserved 384k 384k 0k
Extended (XMS) 15.269k 273k 14.996k
Total Memory 16.384k 892k 15.492k
Total under 1 MB 731k 234k 496k
HELP: Starts MS-DOS help on MS-DOS commands.
Example: HELP Displays the MS-DOS help table of contents. From the table of contents, you can choose the desired command topic you want to view. HELP CHKDSK Displays the help about CHKDSK command.
FAST HELP: When used alone, displays the list of all MS-DOS commands and gives a brief explanation of each. The information about the FAST HELP command displays in similar to, but less detailed than, the information found in MS-DOS help. OR The FAST HELP along with the any MS-DOS command, provides help information about that.
Example: COMMAND /? Displays help information on that command.
Thursday, November 5, 2009
How to Save Battery Life of Your Digital Camera

1. Most of the cameras these days come with “Auto Power Saving” mode. Make sure you keep it on when you are not using the camera for a while.
2. Always make it a point to buy genuine and large capacity batteries. Keep away from the Grey Market stuff. Not just your batteries, even your camera’s life will be at stake.
3. I have seen many starters/amateurs using Flash unnecessarily. Avoid using Flash until absolutely required. Or better keep Flash in AUTO mode!
4. Think before you CLICK! Give a thought on what the resolution of the pictures you are taking right now should be. Lesser the resolution, lower the battery consumption!
5. Avoid using the LCD screen when focussing. Personally, I prefer using the view finder since it gives me the real view of the subject I am clicking. If you can get use to view finder, it will surely bring down the battery consumption a great deal.
6. Disable unnecessary settings in your camera like ‘Auto Chase Focus’ or ‘Motion detector’.
7. Some Digi-cams are known to consume battery even when they are switched off. So don’t forget to remove the batteries when it is not in use.
8. Use the Zoom option of your camera sparingly. The motor which zooms in/out the lenses uses the battery.
9. Its a well known thing that the battery life is shorter in cold climates. Make sure you keep the camera warm as much as possible.
10. Avoid erasing the images from the camera directly.
11. Use AC adapter when you are transferring the photos to your PC. Common sense! Downloading photos to your hard drive is a steady battery drain.
12. Avoid pressing the shutter button half way down when you don’t plan to take a photo. The camera goes through a series of processes getting ready to shoot a digital photo, that means huge power drain.
13. Constantly previewing the pictures on the digital camera, is something that we are all guilty of. Avoiding this is surely tough! But its definitely worth it!
14. Don’t keep turning the cam on & off. It empties your batteries really quickly
Saturday, October 31, 2009
Microsoft Windows Se7en Wallpapers
Thursday, October 8, 2009
Time to learn about Microsoft Excel 2007
Microsoft Excel is an electronic spreadsheet that runs on a personal computer. You can use it to organize your data into rows and columns. You can also use it to perform mathematical calculations quickly.Lesson 1: Entering Text and Numbers
This teaches Microsoft Excel basics. Although knowledge of how to navigate in a Windows environment is helpful, this tutorial was created for the computer novice. This lesson will introduce you to the Excel window. You use the window to interact with Excel.
Lesson 2: Entering Excel Formulas and Formatting Data
A major strength of Excel is that you can perform mathematical calculations and format your data. In this lesson, you learn how to perform basic mathematical calculations and how to format text and numerical data.
Lesson 3: Creating Excel Functions, Filling Cells, and Printing
By using functions, you can quickly and easily make many useful calculations, such as finding an average, the highest number, the lowest number, and a count of the number of items in a list. Microsoft Excel has many functions you can use. You can also use Microsoft Excel to fill cells automatically with a series. For example, you can have Excel automatically fill your worksheet with days of the week, months of the year, years, or other types of series. This lesson teaches you how to use functions, how to create a series, how to create headers and footers, and how to print.
In Microsoft Excel, you can represent numbers in a chart. On the Insert tab, you can choose from a variety of chart types, including column, line, pie, bar, area, and scatter. The basic procedure for creating a chart is the same no matter what type of chart you choose. As you change your data, your chart will automatically update. This lesson teaches you how to create a chart in Excel.
Microsoft Excel 2007 Keyboard shortcut keys
This topic informs you about shortcut keys in Microsoft Excel 2007.
Friday, September 18, 2009
Saturday, September 12, 2009
Microsoft Powerpoint 2007
PowerPoint is a presentation software package. With PowerPoint, you can easily create slide shows. Trainers and other presenters use slide shows to illustrate their presentations.
Sunday, August 9, 2009
Learn More About Viruses
• Attaches itself to the boot sector of a floppy disk or an executable file
• Copies all or part of itself onto the boot sector of your hard drive when you turn on your computer or try to run an executable file
• Can get one from an infected disk or the Internet
File-Infecting Virus
• Attach themselves to executable files associated with other programs
• Mostly attach to .EXE or .COM files but can infect .SYS, .DLL, and .BIN files
• When you open a program that contains a virus, the virus loads into your computer’s memory and then infects any other executed program.
Macro Virus
• Affect the Microsoft Word and Excel templates
• Once infected, every document or spreadsheet opened with the program becomes corrupted.
• Widespread
Polymorphic Virus
• Can infect the boot sector, files, or both
• Can modify their appearance and signature
• Use code alteration and encryption so that they can not be detected by anti-virus search screens
Stealth Viruses
• Infects a file by adding bytes to the infected file, and then subtracting the same number of bytes to from the directory entry of that file, so that it appears that nothing is different
• Stay in memory
Multipartite Virus
• Can infect the boot sector and executable files
• Combine characteristics of memory-resident and nonresident files, and boot sector viruses incorporating stealth and polymorphic characteristics.
Meta Virus
• The first viruses known to infect data files and work on multiple platforms
• Normally carried in data files for Microsoft Word and AmiPro documents
Other Destructive Programs
Worms
• Often mistaken for a virus
• A single destructive program on a single system
• Often planted by someone with direct access to the system
• Do not replicate themselves
Trojan Horses
• Appears to be a program
• Waits for an user to execute it
• Can infect other files on the system, or other computers on the network
Logic Bombs
• Similar to a Trojan Horse but it has a timing device that is keyed to go off on a certain day or time
• Can do damage anywhere from destroying data on the hard drive to releasing a virus
Computer Viruses
Dear, Sir/Madam
Do you familiar with "Computer Viruses" if not please read below:
A virus is a software program designed to infect, destroy or interfere with a computer or software program. A Virus is a software program capable of reproducing itself and usually capable of causing great harm to files or other programs on the same computer. This computer program can copy itself and infect a computer without the permission or knowledge of the owner. It can be transmitted between computers via networks (especially the Internet) or removable storage such as CDs, USB drives, floppy disks, etc., generally without the knowledge or consent of the recipient. It's a very dangerous computer program with the characteristic feature of being able to generate copies of it (self), and thereby spreading. Additionally most computer viruses have a destructive payload that is activated under certain conditions. A computer virus is a piece of code that is secretly introduced into a system in order to corrupt it or destroy data. Often viruses are hidden in other programs or documents and when opened, the virus is let loose. This is a self-replicating computer program that spreads by inserting copies of itself into other executable code or documents.
A virus can infect other programs by modifying them to include a possibly evolved copy of itself. Programming code created as a prank or as a malicious action that secretly affects other programs and causes unwanted consequences. It can damage system's settings and memory, so it is possible for virus to generate run time error messages as well.
If your computer is already running a virus protection program make sure it has latest updated patch or ".dat" file.
According to my experience a truth is that a true virus cannot spread to another computer without human assistance. So you have to be careful yourself while working at computer/Laptops.
If you are suffering from computer viruses please feel easy to contact me.
Monday, July 27, 2009
What is PSU(Power supply Unit)
PC Power supplies use switcher technology to convert the AC input to lower DC voltages. The 3.3- and 5-volts are typically used by digital circuits, while the 12-volt is used to run motors in disk drives and fans.
If there is any one component that is absolutely vital to the operation of a computer, it is the power supply. Without it, a computer is just an inert box full of plastic and metal. The power supply converts the alternating current (AC) line from your home to the direct current (DC) needed by the personal computer. In this article, we'll learn how PC power supplies work and what the wattage ratings mean.
In a personal computer (PC), the power supply is the metal box usually found in a corner of the case. The power supply is visible from the back of many systems because it contains the power-cord receptacle and the cooling fan.
The term power supply is more commonly abbreviated to PSU, this will be used from hereon in.
Telecommunications equipment is designed to operate on voltages lower than the domestic Mains voltage. In order to reduce this voltage a PSU is used.
To provide a useable low voltage the PSU needs to do a number of things:-
Reduction of AC Mains
This is achieved by using a device known as a Transformer an electromagnetic device consisting of an ferrous iron core which has a large number of turns of wire wound around it, known as the Primary Winding
The ends of these turns of wire being connected to the input voltage (in this case Mains AC).
A second number of turns of wire are wound around the Primary Winding, this set being known as the Secondary Winding.
The difference between the number of turns provides us with a way of reducing (in our case) a high AC voltage to a lower one.
Conversion of AC to DC
To convert our now low AC voltage to DC we use a Rectifier Diode connected to the Secondary Winding.
This is a silicon diode, which has operation analogous to a bicycle tyre valve (as the valve only allows air to flow into the tyre, the diode only allows current to flow in one direction)
As our low AC voltage will be working at a frequency of 50Hz (Mains AC frequency) it is desirable to reduce the inherent hum on this to a lower level.
This is achieved by a technique known as Smoothing (“Ironing” out the bumps in the AC).
A simple way to reduce the hum is to use Full Wave Rectification.
Today this is usually done by four diodes in a bridge configuration known as a Bridge Rectifier. (This can be four individual diodes or a dedicated self contained package)
Regulation of Output Voltage
The Electrolytic Capacitor is a device capable of storing energy the amount of energy and the time it remains stored depending on the value.
In a simple PSU the easiest way to provide regulation to compensate for varying load conditions is to use a pair of relatively high value Electrolytic Capacitors.
Their values in this case being in the region of 470uF to 2000uF depending on the application and the amount of current required from the output of the unit.
One of these capacitors is connected across the DC output of the rectifier diode(s) or bridge, this capacitor also providing an extra degree of smoothing the output waveform.
The second capacitor is connected via a low value, medium to high wattage resistor, which assists in limiting the current demand.
Protection against excessive voltages
In a simple PSU the easiest way to do this is by providing fuses at the input to the transformer, generally in the live side of the mains supply, also at the DC outputs.
In the event of an excessive input voltage, or excessive current being drawn from the output, one of these fuses should normally blow protecting the PSU and the equipment connected to it.
The transformer may also be fitted with an internal or external thermal fuse, which will open if the transformer becomes hot due to the aforementioned conditions.
Other PSU’s
There are lots of other types of PSU, some of which are much more complex in their design and operation and are beyond the scope of this overview.
Power supplies, often referred to as "switching power supplies", use switcher technology to convert the AC input to lower DC voltages. The typical voltages supplied are:
3.3 volts
5 volts
12 volts
The 3.3- and 5-volts are typically used by digital circuits, while the 12-volt is used to run motors in disk drives and fans. The main specification of a power supply is in watts. A watt is the product of the voltage in volts and the current in amperes or amps. If you have been around PCs for many years, you probably remember that the original PCs had large red toggle switches that had a good bit of heft to them. When you turned the PC on or off, you knew you were doing it. These switches actually controlled the flow of 120 volt power to the power supply.
Today you turn on the power with a little push button, and you turn off the machine with a menu option. These capabilities were added to standard power supplies several years ago. The operating system can send a signal to the power supply to tell it to turn off. The push button sends a 5-volt signal to the power supply to tell it when to turn on. The power supply also has a circuit that supplies 5 volts, called VSB for "standby voltage" even when it is officially "off", so that the button will work.

FANS OF LUS@N COMPUTER
Network Topologies
· Bus - This topology is an old one and essentially has each of the computers on the network daisy-chained to each other. This type of network is usually peer-to-peer and uses Thinnet (10base2) cabling. It is configured by connecting a "T-connector" to the network adapter and then connecting cables to the T-connectors on the computers on the right and left. At both ends of the chain, the network must be terminated with a 50 ohm impedance terminator. If a failure occurs with a host, it will prevent the other computers from communicating with each other. Missing terminators or terminators with an incorrect impedance will also cause problems.
As you can see if computer #1 sends a packet to computer #4, it must pass through computers #2 and #3, creating excess traffic.
ADVANTAGES: Cheap, simple to set up.
DISADVANTAGES: Excess network traffic, a failure may affect many users, problems are difficult to troubleshoot.
· Star - The star topology uses twisted pair (10baseT or 100baseT) cabling and requires that all devices are connected to a hub.
ADVANTAGES: centralized monitoring, failures do not affect others unless it is the hub, easy to modify.
DISADVANTAGES: If the hub fails then everything connected to it is down. This is like if you were to burn down the phone company's central office, then anyone connected to it wouldn't be able to make any phone calls.
· Ring - The ring topology looks the same as the star, except that it uses special hubs and ethernet adapters. The ring topology is used with Token Ring networks.
ADVANTAGES: Equal access.
DISADVANTAGES: Difficult to troubleshoot, network changes affect many users, failures affect many users.
· Hybrid - Hybrid topologies are combinations of the above and are common on very large networks. For example, a star bus network has hubs connected in a row (like a bus network) and has computers connected to each hub as in the star topology.
· Mesh - In a true mesh topology every node has a connection to every other node in the network. A full mesh network can be very expensive, but provides redundancy in case of a failure between links.
ADVANTAGES: World-wide acceptance. Ranges over 150 feet. Freedom to move about and no cables (obvious).
DISADVANTAGES: Susceptible to interference from objects such as microwave ovens and cordless phones



















