CONTACT US FOR

Any kind of computers, Laptops, Batteries for laptop, Servers , monitors, printers, hard disk, ram, ups, cabinet, keyboards, mouse, Broad-band, ADSL routers, speakers, pen drives, modems, CD, DVD, TV cards, Graphic cards, headphones and other related (desktop & laptop) accessories.

Surya Prasad Dhakal
LUS@N COMPUTER CONSULTANCY SERVICE
SHREESHA HIMALAYAN BUSINESS MART
Putalisadak, Kathmandu,Nepal
Contact no :- +977 - 01 - 4245403, 9841313530, 9741073413

Entertainment...............( मनोरन्जन )

TV Channels...

Sagarmatha TV(Live), Image Channel, Chhanel Nepal, Nepal One, Kantipur TV, Nepal Telivision, AVNews, ABC TV

News ....

eKantipur.com, Hamropalo.com, Himalayan Times,NepalNews.com, Nepal Horizons, Nepali Times, Telegraph, Nepal News, Gorkhapatra, Rajdhani, Nagarik, My Republica,Mahanagar, Naya Patrika, Annapurnapost, Kantipur in English


Big News Network, Birmarsha, Budhabar (Kathmandu), Business Manager, CBC News, Cyber Nepal, Deshantar (Kathmandu),Dishanirdesh (Kathmandu), Dristi(Kathmandu), EIN News,Gatibidhi, Himalayan Travel Trade Journal, HimoNews,Image Channel, Independent, Inside Nepal, Jana Aastha (Kathmandu),Janadharana (Kathmandu), Kamana, Kosheli (Kathmandu),Moreover, Nepal/Bhutan News, Nepal News Headlines, Nepal Samachaparta (Kathmandu), Nepal Traveller, Nepal News, Nepal Now, Nepali Post , Nepalnews.com in Nepali, New Business Age,Newslook, NewsTrove, Nispakshya, OneWorld, Parewa News,People’s Review Weekly (Kathmandu), Rajdhani (Kathmandu),The Rising Nepal (Kathmandu), RSS Nepal National News Agency, Samachar Patra, Sandhya Times (Kathmandu), Saptahik Weekly, Satyagraha, Spotlight (Kathmandu), Sunday Post(Kathmandu), Tasapaw (Kathmandu), Topix, Travellers’ Nepal,Washington Post Nepal News, Wave (Kathmandu)



FM Radios

Kantipur FM, Radio Salaam Namaste, Dallas, Texas,USA, BBC Nepali Sewa, CRI Nepali Sewa,Gurkha Radio, Hits FM, KATH 97.9, Machhapuchhre FM, Matri FM, Nepal Fm, Radio Dovan, Radio Nepal,Radio Sagarmatha, Ujyaalo 90 Network

View Nepali Sabdakosh
फेसबुकमा नेपालीमा टाईपगर्नु परेमा यहाँ क्लिक गर्नुहो (पहिला रोमन मा टाईप गर्नुहोस् र कपि पेस्ट गर्नुहोस्)

Dictionary

Saturday, December 19, 2009

Be perfect to use Microsoft Word 2007




Please click on the link below which you want to learn




तपाईंको कम्प्युटरको गती(speed)बढाउने उपायहरु(Tips).




१. सर्बप्रथम कम्प्युटर खोल्ने बित्तिकै कुनै पनि Application चाँड चांडै नखोल्नुस् , पहिला राम्रो सँग PC लाई Bootup हुन दिनुस् ।

२. कुनैपनि Application बन्द गरी सके पछि आफ्नो Desktop लाई एक पल्ट Refresh गर्नुस् यसले तपाईंको कम्प्युटरको Ram मा जम्मा भएको Unused फाइलहरु Remove हुन्छ ।

३. आफ्नो कम्प्युटरमा सके सम्म Wallpaper को Use नै नगर्नुस् र यदि गर्नुनै छ भने ठुलो साइजको Image लाई Use नगर्नुस् ।

४. आफ्नो Desktop मा धेरै Unnessesary Shortcut हरुलाई नराख्नुस् र सके सम्म Desktop लाई Clean नै राख् नुस् । Desktop मा फोटो तथा Music को फाइलहरुलाई पनि Save नगर्नुस् ।

५. RecycleBin लाई बेला बेलामा Empty गरी राख् नुस् । तपाईंले Delete गर्नु भएको फाइलहरु RecycleBin मा जम्मा भई राखेको हुन्छ र तपाईंको कम्प्युटरको Harddrive को ठाउँ यसले लीइ राखेको हुन्छ ।

६. temporary internet files लाई बेला बेलामा Delete गरी राखनुस् ।

७. आफ्नो कम्प्युटर लाई प्रत्येक २ महिनामा Defragment गर्नुस् । यसले तपाईंको कम्प्युटरको Harddrive मा धेरै खाली ठाउँ बनाउछ र Program हरु Fast चल्छन ।

८. आफ्नो कम्प्युटर लाई जहिले पनि २ वा २ भन्दा बढीमा partitions गर्नुस् र सके सम्म Software हरुलाई दोस्रो वा तेस्रो Drive मा Instal गर्नुस् । सके सम्म C Drive लाई खाली नै राख् नुस् ।

९. जब तपाईंले नयाँ Software हरु Instal गर्नु हुन्छ त्यो Software को Tray Icon लाई Disable गर्नुस् , यि Icon हरुले तपाईंको कम्प्युटरको RAM को Use गरी राखेका हुन्छन र कम्प्युटर Slow हुन सक्छ र Software का starting the application automatically Option लाई पनि Disable गर्न नभुल्नु होला । यस्ता Option हरुलाई तपाइले software हरु Instal गरी सके पछि उक्त Software को Tools मा गएर पनि Disable गर्न सक्नु हुन्छ ।

१०. आफ्नो कम्प्युटर लाई धुलो बाट पनि सके सम्म बचाउनुस् , किन भने धुलोले तपाईंको कम्प्युटरका Cooling Fan हरुलाई जाम गरी दिन सक्छ यसले कम्प्युटर अनावश्यक रुपमा तातो हुन सक्छ र कम्प्युटर Slow Down हुन सक्छ ।"यि १० वटा साधारण Tips हरुलाई बिचार पुर्‍याउनु भयो भने तपाईंको कम्प्युटर तुलनात्मक रुपमा पहिले भन्दा धेरै Speed मा चल्न सक्छ ।"

हजुरको कम्प्युटरको सुरक्षाको लागि उपायहरु(Tips).

१) सधैं "anti-virus software" को प्रयोग गर्नुस् र यसलाई सधैं Up to Date गर्नुस् । "तपाईं यो सुनिस्चित गर्नुस् कि तपाईं सँग राम्रो anti-virus software छ र यस्ले तपाईंको कम्प्युटरलाई virus बिरुद्द सुरक्षा गर्छ । उक्त anti-virus Software लाई सधैं Up to Date राख् ने गर्नुस् । Virus दैनिक जसो फरक फरक बन्दै जान्छन त्यसैले तपाईंले आफ्नो anti-virus software लाई Up Date गरी राख् नु जरुरी छ । जति धेरै तपाईंले यसलाई Up to Date राख् नु हुन्छ त्यती राम्रो , नभए हप्ता को १ पल्ट अबस्य Up to Date गर्नुस् ।"
२) आफ्नो e-mail मा आएका mail हरुलाई नहेरी नबुझी झत्तै कहिले पनि नखोल्नुस् । शँका लागेका mail हरु कहिले पनि नखोल्नुस् Even तपाईंले चिनेको मान्छेले पठाएको भए पनि..." यो एउटा साधारण नियम नै हो कि यदि तपाईं कसैलाई चिन्नु हुन्न भने त्यो मान्छेले पठाएको mail खोल्नु तपाईंलाई जरुरी छैन र त्यो mail सँग जोडीएको कुनै Attachment पनि । यदि तपाईंलाई शँका लागेका यस्ता कुनै mail आएको छ भने त्यसलाई Delete गरी दिनु नै राम्रो हुन्छ न कि के हो एक चोटि खोली हेरु भनी खोल्नु । यदि तपाईंलाई खोल्नु नै छ भने पनि पहिला त्यो फाइललाई कम्प्युटरमा Save गर्नुस् र आफ्नो Anti-virus Software ले virus check गरेर मात्र खोल्नुस् तर यो पनि तपाईंको कम्प्युटरको लागि risk हुन सक्छ । साथै तपाईंलाई एउटै message एउटै नाम बाट धेरै आएको छ भने पनि तपाइ साबधान हुनुस् ।"
३) आफ्नो कम्प्युटरमा तपाईंले नचाहेर प्रवेस गर्नेलाई रोक्ने सुरक्षित ईन्टरनेट Firewalls लाई activate गर्नुस् । " तपाईंको कम्प्युटरमा भएको Firewalls system लाई active राख् नुस् । यसले तपाईंको कम्प्युटर र बाँकी दुनियाँको बिच सुरक्षा पर्खालको काम गर्छ । यसले तपाईंको कम्प्युटरको software र Hardware को एकै चोटि रक्षा गर्ने काम गर्छ । यसले तुलनात्मक रुपमा अनधाक्रित र खराब Data हरु बिरुद्द सुरक्षाको दिन्छ ।"
४) सके सम्म guess गर्न गार्हो Password को प्रयोग गर्नुस् । " जस्तै capital letter र small latter को mix , कुनै symbol को बिचमा प्रयोग अनि अंक को प्रयोग । र यो पनि नभुल्नुस् कि तपाईंको password कमसे काम ८ ओटा भन्दा कम नहोस् , आफ्नो password लाई regularly change गरी राख् नुस् at least ९० दिन भित्रमा र आफ्नो password कसै सँग पनि Share नगर्नुस् ।"
५) आफ्नो कम्प्युटरको महत्वपूर्ण Data हरुलाई Backup को रुपमा CD मा राख् ने गर्नुस् । " अनुभव प्राप्त कम्प्युटर अपरेटरले सधैं आफ्नो महत्वपूर्ण Data हरुलाई Backup को रुपमा Disk वा CD हरुमा राखेका हुन्छन । यस्तो गर्ने बानिले तपाईंले कहिले काही आफ्नो कम्प्युटरका Data हरु loss भएको खण्डमा धेरै काम दिन सक्छ । तपाईंको कम्प्युटरका Data हरु कुनै बेला पनि Damage हुन सक्छ त्यसैले बेलामै तयार रहनुस् ।"
६) आफ्नो कम्प्युटरलाई कहिले पनि Sharing नगर्नुस् " तपाईंको कम्प्युटरलाई अरु कम्प्युटर सँग network वा Internet बाट sharing नगर्नुस् , यसबाट पनि तपाईंको कम्प्युटरमा virus सर्न सक्ने धेरै Chance हुन्छ त्यसैले जरुरी नभए सम्म sharing mode लाई Turn Off नै राख् नुस् । आफ्नो operating system लाई check गर्नुस् कि कसरी यसलाई disible गर्न सकिन्छ र कहिले पनि कुनै अपरिचित सँग आफ्नो कम्प्युटर लाई share नगर्नुस् ।"
७) Internet connection लाई disconnect गर्नुस् यदि use भएको छैन भने " यो याद राख्नुस् कि Digital Highway को २ वटा बाटो हुन्छ , तपाईंले कुनै Data पठाउनु हुन्छ र पाउनु हुन्छ , जहिले पनि Sent र Receive को नियम लागु हुन्छ । यदि तपाईं online मा हुनु हुन्छ र तपाईं सँग Anti-virus सफ्टवेर छैन र Firewalls पनि active छैन भने अरु कुनै दोस्रो मान्छेले तपाईंको कम्प्युटरमा virus infect गर्न सक्छ । त्यसैले यदि तपाईंलाई आवश्यकता छैन भने Internet connection लाई Disconnect गर्नुस् ।"
८) आफ्नो कम्प्युटरको security system लाई बेला बेलामा check गरी राख् नुस् । " प्रोग्राम र opereting system को धेरै महत्वपूर्ण Value छ तपाईंको life सजिलो गराउनमा तर तपाईंलाई टाढा रहनु छ hackers र viruses सँग र यिनिहरुले तपाईंको यि नै महत्वपूर्ण अङमा आक्रमण गर्न्छन । त्यसैले तपाईं सधैं चनाखो रहनु जरुरी छ ।"
९) ईन्टरनेटमा जे पायो त्यही फाइलहरु download नगरनुस् । " तपाइलाई यो थाहा हुनु जरुरी छ कि ईन्टरनेटमा राम्रो मात्र हैन तपाईंको कम्प्युटरलाई बिगार्ने धेरै नराम्रो फाइलहरु पनि पाईन्छन । त्यसैले ईन्टरनेट बाट फाइलहरु download गर्दा धेरै ध्यान दिनु पर्छ । तपाईंलाई शँका लागेका वा अनावश्यक फाइलहरु सके सम्म download नगर्नु नै राम्रो ।"
१०) आफ्नो घरको परिवार वा जस्ले तपाईंको कम्प्युटर चलाऊछ उनिहरुलाई पनि थाहा हुनु पर्छ कि के गर्नु पर्छ virus बिरुद्द सुरक्षा गर्नको लागि " यो एकदम महत्वपूर्ण कुरा हो कि कम्प्युटर चलाऊने सबैले कम्प्युटरको सुरक्षाको बारेमा पनि जान्नु जरुरी छ । उनिहरुलाई थाहा हुनु पर्छ कि कसरी anti-virus Software लाई Update गर्ने कसरी Password ले सुरक्षा गर्ने आदी आदी ।"

Types of Networks

Peer to Peer - A peer to peer network is one in which lacks a dedicated server and every computer acts as both a client and a server. This is a good networking solution when there are 10 or less users that are in close proximity to each other. A peer to peer network can be a security nightmare, because the people setting permissions for shared resources will be users rather than administrators and the right people may not have access to the right resources. More importantly the wrong people may have access to the wrong resources, thus, this is only recommended in situations where security is not an issue.

Client/Server - This type of network is designed to support a large number of users and uses dedicated server/s to accomplish this. Clients log in to the server/s in order to run applications or obtain files. Security and permissions can be managed by 1 or more administrators which cuts down on network users med-ling with things that they shouldn't be. This type of network also allows for convenient backup services, reduces network traffic and provides a host of other services that comes with the network operating system (NOS).

Centralized - This is also a client/server based model that is most often seen in UNIX environments, but the clients are "dumb terminals". This means that the client may not have a floppy drive, hard disk or CD ROM and all applications and processing occur on the server/s. As you can imagine, this requires fast and expensive server/s. Security is very high on this type of network.

OSI Seven(7) Layer Model

The OSI networking model is divided into 7 layers. Each layer has a different responsibility, and all the layers work together to provide network data communication.

* Physical - The Physical layer is the specification for the hardware connection, the electronics, logic circuitry, and wiring that transmit the actual signal. It is only concerned with moving bits of data on and off the network medium. Most network problems occur at the Physical layer.

* Data Link - The Data Link layer is the interface between the upper "software" layers and the lower "hardware" Physical layer. One of its main tasks is to create and interpret different frame types based on the network type in use. The Data Link layer is divided into two sub-layers: the Media Access Control (MAC) sub-layer and the Logical Link Control (LLC) sub-layer.
o LLC sub-layer starts maintains connections between devices (e.g. server - workstation).
o MAC sub-layer enables multiple devices to share the same medium. MAC sub-layer maintains physical device (MAC) addresses for communicating locally (the MAC address of the nearest router is used to send information onto a WAN).
* Network - The Network layer addresses messages and translates logical addresses and names into physical addresses. It also manages data traffic and congestion involved in packet switching and routing. It enables the option of specifying a service address (sockets, ports) to point the data to the correct program on the destination computer.

* Transport - The Transport layer provides flow control, error handling, and is involved in correction of transmission/reception problems. It also breaks up large data files into smaller packets, combines small packets into larger ones for transmission, and reassembles incoming packets into the original sequence.

* Session - The Session layer handles security and name recognition to enable two applications on different computers to communicate over the network. Manages dialogs between computers by using simplex(rare), half-duplex or full-duplex. The phases involved in a session dialog are as follows: establishment, data-transfer and termination.

* Presentation- The Presentation layer determines data exchange formats and translates specific files from the Application layer format into a commonly recognized data format. It provides protocol conversion, data translation, encryption, character-set conversion, and graphics-command expansion.

* Application - The Application layer represents user applications, such as software for file transfers, database access, and e-mail. It handles general network access, flow control, and error recovery. Provides a consistent neutral interface for software to access the network and advertises the computers resources to the network.

Here is an idiotic, yet easy way to remember the 7 layers. Memorize the following sentence: All People Seem To Need Data Processing. The first letter of each word corresponds to the first letter of the layers starting with Application and ending with the physical layer.

Layer 1 – The Physical Layer

* Translates data into bits, or bits into data
* Deals only with electrical and mechanical level of data communication, which builds the foundation to allow higher OSI layers to walk through it.
* Physical Layer devices are:
o NIC Cards
o Ethernet Hubs
o Repeaters
o Multistation Access Units (MAUs)
o Transceiver
o Media Filters

Layer 2 – The Data Link Layer

* Provides flow and error control and synchronization for the Physical Layer
* Is made up of the Logical Link control and MAC sublayers
* Data Link Layer Devices are:
o Bridges
o Switches
o Brouters

The Protocols that operate at the Data Link Layer are:

* Point-to-Point Protocol (PPP)
* Serial Line Internet Protocol (SLIP)
* High-Level Data Link Control (HDLC)
* Logical Link Control (LLC)
* Link Access Protocol (LAP)

Layer 3- The Network Layer

* Manages communications routing for packets that are destined for addresses that are not on the LAN
* Uses routable protocols to deliver packets across interconnected networks joined by routers.
* Device which operate at the Network Layer are:
o Routers
o Connectionless Oriented services

The two main protocols that operate at the Network Layer are:

* TCP/IP
* IPX/SPX

Layer 4 – The Transport Layer

o Manages the end-to-end control and error checking by providing an end-to-end connection between the source and the destination node to ensure reliable data delivery
o Also responsible for providing end-to-end recovery, flow control, and releasing the connection

Connectionless-Oriented Protocols that operate at this layer are:

* UDP

Connection-Oriented Protocols that operate at this layer are:

* TCP/IP
* SPX/IPX

Layer 5 – The Session Layer

* The session layer manages the establishment of a continuing series of requests and responses between the applications at each end.
* Mainframes used to use this layer – modern networking does not.

Layer 6 - The Presentation Layer

* Usually part of the Operating System
* It prepares incoming data for the Application layer and formats outgoing data that the Application layer sends and receives.
* Data compression and data encryption.

Layer 7 – The Application Layer

* The top layer of the OSI model
* Provides information services
* FTP and Telnet access the OSI model at this layer.

FANS OF LUS@N COMPUTER

Network Topologies

· Bus - This topology is an old one and essentially has each of the computers on the network daisy-chained to each other. This type of network is usually peer-to-peer and uses Thinnet (10base2) cabling. It is configured by connecting a "T-connector" to the network adapter and then connecting cables to the T-connectors on the computers on the right and left. At both ends of the chain, the network must be terminated with a 50 ohm impedance terminator. If a failure occurs with a host, it will prevent the other computers from communicating with each other. Missing terminators or terminators with an incorrect impedance will also cause problems.


As you can see if computer #1 sends a packet to computer #4, it must pass through computers #2 and #3, creating excess traffic.
ADVANTAGES: Cheap, simple to set up.
DISADVANTAGES
: Excess network traffic, a failure may affect many users, problems are difficult to troubleshoot.

· Star - The star topology uses twisted pair (10baseT or 100baseT) cabling and requires that all devices are connected to a hub.


ADVANTAGES: centralized monitoring, failures do not affect others unless it is the hub, easy to modify.

DISADVANTAGES: If the hub fails then everything connected to it is down. This is like if you were to burn down the phone company's central office, then anyone connected to it wouldn't be able to make any phone calls.

· Ring - The ring topology looks the same as the star, except that it uses special hubs and ethernet adapters. The ring topology is used with Token Ring networks.
ADVANTAGES: Equal access.
DISADVANTAGES: Difficult to troubleshoot, network changes affect many users, failures affect many users.

· Hybrid - Hybrid topologies are combinations of the above and are common on very large networks. For example, a star bus network has hubs connected in a row (like a bus network) and has computers connected to each hub as in the star topology.

· Mesh - In a true mesh topology every node has a connection to every other node in the network. A full mesh network can be very expensive, but provides redundancy in case of a failure between links.

· Wireless - As the name implies, wireless networks allow computers to comunicate without the use of cables. IEEE 802.11b defines two pieces of equipment, a wireless station, which is usually a PC or a Laptop with a wireless network interface card (NIC), and an Access Point (AP),which acts as a bridge between the wireless stations and Distribution System (DS) or wired networks. An 802.11b wireless network adapter can operate in two modes, Ad-Hoc and Infrastructure. In infrastructure mode, all your traffic passes through a wireless ‘access point’. In Ad-hoc mode your computers talk directly to each other and do not need an access point at all. 802.11b delivers data throughput of 11 Mbps.
ADVANTAGES: World-wide acceptance. Ranges over 150 feet. Freedom to move about and no cables (obvious).
DISADVANTAGES: Susceptible to interference from objects such as microwave ovens and cordless phones