Articles in this category

Parent Category:Computers
This Category:ELearning

Sub Categories: -

Latest Articles

  1. Handy Tools from the Microsoft Office Package

    by sezer bozkurt - 2007-01-07
    The Microsoft Office Package comes with 4 important software products. Microsoft Word, Microsoft Access, Microsoft Excel and Microsoft Power-point. Each product having their own separate uses.The firs...
  2. SMART way to prevent data loss.

    by Vitali Priadkine - 2007-01-07
    Many computer users take hard drive reliability for granted, not even thinking about minimal possibility of drive crash. They suppose that hard disk drive manufacturers have done a great improvement t...
  3. FTP Uploading

    by How Kin Weng - 2007-01-06
    To do that you must have a ftp software program. There are several free ftp software in the market and the one i'm using right now is smartftp and it's free. I always try to go for freebies unless it&...
  4. Seven Steps to Prosperity: Starting Your Own Computer Services Business

    by Rick Parrott, MCP - 2007-01-01
    Self employment has increased over 12.2 million people according to a study on the Small Business Administration website. Would you like to join them and start your own small business?You can, it&rsqu...
  5. How to Reduce Spam in Your Inbox and Enhance Your Email Security

    by Richard Rogers - 2007-01-01
    Spam is defined as an e-mail message sent to people without their consent or permission. Addresses of recipients are often harvested from Usenet postings or web pages, obtained from databases, or simp...
  6. How a Personal Firewall Helps to Protect Your Home Computer From Hackers

    by Richard Rogers - 2006-12-29
    A hardware firewall is a device which sits between your computer and the internet. At home for example it could reside on a broadband router which is used to share your internet connection with a numb...
  7. How Hackers Take Control of Your Computer

    by Richard Rogers - 2006-12-28
    Your PC has many "ports" which are vulnerable to attack from a hacker. These ports are used to communicate internally with your monitor or printer or externally to the internet. For example,...
  8. Windows Keyboard Shortcuts

    by Paul van Zyl - 2006-12-28
    When I observe most colleagues and friends working on their PC's they mostly use the mouse as they are unaware of the powerful Windows keyboard shortcuts that will make their lives so much easier. Som...
  9. Computer Training School Tutorial: Know Your Instructor

    by Chris Bryant - 2006-12-28
    Making the decision to attend a computer tech school can be one of the best decisions of your life.  Another great decision is to tap a hidden wealth of knowledge that is right before every stude...
  10. 10 Great Tips to a Successful Website

    by Paul Guzman - 2006-12-28
    How to make a successful website1. Make and develop your own website. Do NOT copy or get websites that have absolutley no value. Always write and create good content for your website visitors. It w...
  11. How To Succeed At A Computer Training School

    by Chris Bryant - 2006-12-27
    One of the best decisions you can ever make is to attend a computer training school. As I've written in several other articles, you have to ask the right questions before writing a check or taking out...
  12. Computer Memory And The Future

    by Michael Russell - 2006-12-21
    We have come a long way from those early days. Today your standard PC has 32 bit processors and a minimum of 128 meg of RAM and even that amount will barely run anything.Windows XP recommends that you...
  13. Computer Memory - Does RAM Latency Matter?

    by Michael Russell - 2006-12-21
    My apologies in advance if some of this stuff seems like it's out in the stars. When people consider system memory, it is unfortunately an afterthought, next to the rest of the stuff you find in your ...
  14. Computer Memory - What To Buy?

    by Michael Russell - 2006-12-21
    Unfortunately, not all computer memory is alike and the make of your motherboard will determine what memory you will need to get if you want to upgrade or even just replace a defective memory chip.The...
  15. Computer Memory - The Different Types

    by Michael Russell - 2006-12-21
    Random Access Memory is considered random access because you can access any cell of the memory at any time for any piece of information either for retrieval or storage if you know the row and column t...
  16. Computer Memory - How Much Is Enough?

    by Michael Russell - 2006-12-21
    The truth is, memory requirements to run basic programs over the last 20 years have gone up exponentially. Back in the early stone ages of PCs your basic computer came with 64K of RAM. This was just a...
  17. Computer Memory Problems

    by Michael Russell - 2006-12-21
    If you've ever worked on a PC and all of a sudden in the middle of blasting the heck out of some space invader your PC goes black and then suddenly reboots look no further than some kind of memory pro...
  18. Why You Need Spyware Removal

    by Michael Russell - 2006-12-21
    Once installed these programs will bombard you with advertisements based on what it is that you view on the Internet. Such programs are called spyware and they can not only cause your computer to run ...
  19. Computer Memory - Flash Memory

    by Michael Russell - 2006-12-21
    That means it does not need power to retain the information that is on the chip itself. Also, flash memory has very fast read access times, though not quite as fast as volatile DRAM which is used as t...