Anda di halaman 1dari 48

HARDWARE TROUBLESHOOTING

UNDERSTANDING THE SYSTEM BEEP CODES Beep codes The bio performs a POST when the system is turned on. This test is used to ensure that the system is functioning properly and to gather information about what the system contains. When a problem is identified with the system during the post, the bios will normally produce an error message. However, in some cases the problem is detected so early in the test that the bios cannot even access the video card to print the message! The three most popular types of bios are those made by (AMI, AWARD, and PHOENIX). The Phoenix company bios is famous for its complicated beep patterns that are actually in up to four groups one or more beeps and then a pause, followed by as three more patterns. Common Beep Codes Beeps One short beep One long beep One short, one long beep Two short beeps Probable Causes

Normal startup Keyboard error Monitor problem The POST numeric code appears on the monitor Repeating short beeps or a continuous Power problem beep One long, one short beep System board problem One long, two or three short beeps Monitor/Display error One beep, followed by three, System board problems, possibly with Four or five beeps DMA, CMOS setup chip, timer, or system bus Two beeps, followed by three, Four or First 64K of RAM has errors five beeps Three beeps, followed by three, Four or Keyboard controller or video controller five beeps failed Four beeps, followed by two, Three or Serial or parallel port, system timer, or four beeps time of day problem

WINDOWS DEVICE MANAGER

What is Device Manger?


Device Manager provides you with a graphical view of the hardware that is installed on your computer. You can use Device Manager to update the drivers (or software) for hardware devices, modify hardware settings, and troubleshoot problems. The windows device manager made its debut in Windows 95, took a brief leave of absence in Windows NT 4.0 and has been in every subsequent release of windows since then. It can be accessed by following these simple steps. 1. 2. 3. 4. 1. 2. 3. 4. Right click on My Computers Select Properties Click the General tab. Click the Device manager button. In windows XP Right click on My computers Select Properties Click Hardware tab Click device manager button

Here are some of the tasks you can perform using the Device manager. Check the current status of hardware. Look for symbols next to a particular device to see if there are problems with it. Configure device properties and settings Uninstall and reinstall hardware Update, views and roll back device drivers. COMMON PROBLEMS IN HARDWARE General Hardware Troubleshooting Tips Regardless of the problem there are a few steps that must be taken whenever troubleshooting a hardware problem. These may seem rather insulting to most people, but one must never forget to do them; if they are not done you might very well waste allot of time and possibly create a new problem from fiddling around in your computer chasing down a phantom. Here are some quick steps:
1. Power Cords - Make sure that all of the power cords are firmly in place on all

of the devices that could possibly be causing or attributing to the symptoms you are experiencing . Then trace the cords back to the wall and make sure that the other end of the cord is attached to a power outlet or surge protector. 2. Outlet Power - It is not uncommon to blow a fuse; if the outlet in question is not receiving power than you should not expect any of the devices connected to the computer to receive power. You can test this simply by looking at the device and seeing if any LEDs (Light Emitting Diodes) are lit.

3. Power Button - This step goes hand-in-hand with the last step. Also, some

4.

5.

6.

7.

8.

9.

devices have two power switches on them, and both must be in the "on" position in order for the device to work (i.e. there is a power button both on the front, and on the back of most computers). Communication Connections - Once you've settled that the power to your devices is fine, the next step is to make sure that the device has all of the connections needed for it to communicate. This step consists of making sure that these cables are firmly connected at each end, and that they are connected at the correct port/interface. Do not forget to check internal connections; if your computer has been bumped it is possible for some connections inside to pop loose. Device Configuration - This steps provides both hardware and software configuration. There may be jumpers or switches on the hardware that need to be configured. If these accidentally got moved or switched the device would fail to work properly. Follow Instructions - Computers are not evasive when they report errors; all too often we just do not understand them.Many times there are suggestions on how to fix a problem accompanied with an error message. Simply follow the steps the message suggests; even if the suggestion seems to be ridiculous follow it so that you can discard it as a possibility. Windows Recognition - If you go into the Control Panel, open the System dialog, click on the Hardware tab, and then open the Device Manager, you will see a tree-like structure of all of the hardware that is attached to your computer. The dialog that opens will inform you if the operating system is having any know troubles with the device. Update Drivers - If possible, try connecting to the internet and going to the manufacture's web site to download the latest drivers for your hardware (this requires that you now the model specifications of your hardware). Refresh Device Manager/Reinstall Device - This step falls into the "I don't care what the problem is, I just want it fixed" category. Open the device manager again and delete the devices that are not working properly. You will probably be prompted to restart your computer, if not restart it manually. When the computer restarts the hardware you deleted will be detected again and be reinstalled with the default configurations. If you cannot find the device in the device manager try to uninstall all software that came with it and

What are the common causes of hardware Failure? AGE: Nothing lasts forever. This holds especially true for technology. Age has multiple effects on devices. Some break because they get old, others become obsolete. Most manufactures establish a life expectancy for their devices anywhere from one year to five years. Hardware also ages quickly because of cost factors. Faulty Development: Here problems range from out-of-box failures to poorly and cheaply designed, second-rate devices. Cheap, second-rate devices not only break easier than more reliable, common devices.

Incompatible devices: Just because a piece of hardware works in one computer doesnt mean it will work in another one. Be sure to read all system requirements when buying new hardware and make sure that your existing equipment is compatible. Damage: For some reason, most things on this planet dont like to be bumped, kicked, dropped, stomped, cut and scratched. This is especially true for tech devices. Tech devices are extremely intricate, containing millions of microscopic transistors, tons of interconnected working parts, and complex power management features. You're having a problem with your PC. No matter what the problem, the first step is always to reboot your computer: There are a number of ways to reboot (restart) your computer. If in Windows and the system is not frozen, click start, click shut down, click restart. If in Windows and the system is frozen, on your keyboard, hold down ctrl, alt, and delete all at the same time. In Windows operating systems prior to Windows XP, press ctrl, alt, and delete a second time. In Windows XP, if possible, click Shut down. If these methods are unsuccessful or not viable, you may reboot manually. On some systems, there is a reboot button located on the front of the PC. This is a very small button, usually located beneath the power button. If there is no reboot button or if the reboot button does not respond, press the main power button and keep it held in for about five seconds. The PC should shut off automatically. Once it does, boot the machine. The last resort is to unplug the power on the back of the PC. Wait a moment, then plug it back in and try to reboot. Once a computer has been restarted, if it does not work normally you should follow the basic troubleshooting procedures listed below MONITOR Screen is dark or tinted If the monitor screen is too dark or if the entirety of the screen is tinted, first try changing the display. 1. Right click anywhere on the blank desktop. 2. Click Properties. 3. Click Settings. 4. Under Color Quality, try changing the settings. If this does not work, try changing the settings on your monitor. The brightness menu buttons are located below the screen on most monitors. Try making the screen lighter or darker. If this still does not work, the problem may be with either your monitor or the video card located inside the PC. If another monitor is available, try hooking it up to your PC. If there are still problems, the video card is to blame and must be replaced. If the problems are resolved, the monitor will need to be replaced.

DISPLAY If only a portion of your screen is tinted or warped in any way, the problem needs no troubleshooting as your monitor's tube is going out. The monitor will need to be replaced. Screen is Fuzzy 1. Remove any electronic devices such as fans or electric pencil sharpeners from the proximity of the monitor. 2. Ensure the monitor is plugged tightly to the computer. Monitor Not Responding (No Power) 1. Ensure all power sources are plugged in and turned on. Check the power cord going from the back of the monitor to the power strip and the power cord going from the power strip to the wall. 2. Make sure the power strip is turned on. 3. Try plugging the monitor directly into the wall. If the monitor then works, the power strip has gone bad and will need to be replaced. If not, the monitor must be replaced.

Error on Monitor Reading "No Signal" This error means that the monitor is not plugged in to the PC. Double check the cable and make sure the Cable going from the monitor to the PC is plugged in and is in the appropriate place. KEYBOARD Computer Does Not Recognize Keystrokes If the keyboard does not work at all: 1. Check the back of the PC to make sure the keyboard is correctly connected. Remove the cable and reconnect it, then reboot your PC. 2. If the problem persists, you will need a new keyboard. If only some of the keys work: 1. Run your hand firmly over the keys to ensure none of the keys are stuck. 2. Follow the steps listed above. The keyboard beeps when any of the keys are pressed: 1. Check to see if anything is resting on the keys and remove that object. 2. Follow the steps listed at the top of this page. Keys on Keyboard Move Stiffly/Not At All The keyboard is probably dirty. Lift the keyboard up, turn it over, and firmly tap to remove any excess Material that may resting beneath the keys. Then, using a can of compressed air, clean out the keyboard as best you can. If the problem persists, the keyboard may need to be replaced. This is a common problem that can be easily avoided. Please do not consume any food or beverages over the keyboard and keep these things out of "spilling distance." Loose make-up should not be applied over the keyboard. MOUSE

Cannot Move Mouse Cursor Check the cable going from the mouse to the back of the PC to make sure it is connected appropriately. Remove then reconnect the mouse and reboot the computer. If the mouse is still not recognized, try another mouse in its place. Mouse Cursor Difficult to Move If the mouse is physically difficult to move, either the mouse pad has worn and needs to be replaced or the mouse itself needs to be cleaned. To clean the mouse: 1. Turn the mouse over so that you can see the bottom 2. Remove the plastic holder covering the ball by twisting it clockwise until it comes off. 3. Remove the ball. 4. Cleanse the inner rollers with a cotton swab dipped in alcohol. You may also scrape off any accumulated lint if no alcohol or swabs are available.

FLOPPY DRIVES Error Reading Floppy Disks More and more often, floppy disks and floppy drives are being phased out of the computing world. The reasons are 1) floppy disks do not have the necessary room to store large documents, and 2) floppy disks are unreliable. There are many errors associated with floppy disks. An error message may accuse the floppy disk of having no content, of needing to be formatted, or of having a corrupt or partial file. In most of these cases, there is little that can be done to save or restore the data on the disk. One option: 1. Go to My Computer and double click. 2. Right click Floppy A 3. Click scan for viruses. What should I do if my computer wont boot? Make sure your power is working: Check your power cord is plugged in properly. Check your wall sockets and check the PC power supply. Check your power on light of your system. Try turning the power switch on and off on your computer a few minutes. Make sure your monitor is power on. Make sure your computer runs the POST. Look for any sort of output on your screen and a single beep. Unplug everything that plugs into your computer on the outside with the exception of the power cord. Try booting it up while listening for any beeps, still its not responding then remove the computer side cover and remove the ram, processor, video card all PCI cards and driver cables. Make sure that your hard drive is working correctly. Check the hard disk. What should I do if my hard drive is having problems?

Check the hard disk connectivity in bios. Check the hard disk power supply and bus cable. The results of these tests will give you a good indication of whether your hard drive is any good. Run the CHECKDISK utility to scan and repair any errors. You can run this utility from windows.

How can I help prevent hard drive failure? Proper Ventilation: Keep your devices vents open and clear from debris. Properly cooling your devices internal components is paramount. Physical impact: Dont drop your device or subject it to severe shock. This can cause damage to the drivers platters and reading heads. Voltage: Use a protector or UPS. This will prevent any voltage spikes or drops from damaging your computer. RAID: Purchase and install drive mirroring hardware. Basically this is a card you install in your pc.

Why wont my monitor turn on? Make sure the monitor is actually turned on. Is the power light on? Check the power cord of monitor. Some computers have an on-board video card and a third party video card. Make sure your monitor is connected right connector on the desktop or laptop. Check to make sure that the connector pins arent bent or broken. Make sure you have power. Verify the monitor is plugged into a power source. If it is plugged into a power strip or UPS, make sure that power strip or UPS is power on. Check the monitor power switch on. Make sure the power button is working perfectly. Try to replace the card. Get help of monitor manufactures or computer tech supporters.

Why does My Monitor Make Noise? CRT monitors traditionally make noise when turned on or when the resolution / refresh rate is changed. This noise is usually a buzzing or clicking sound. The noise is caused by the voltage changes that occur. They are perfectly normal. If your monitor is making noise even when you do not change resolution /refresh rates, this may indicate a hardware problem and you should have your monitor serviced. What should I do if My Device Cant Read or Write to a CD/DVD? First check your Drive, Is it CD drive or DVD drive. Check your inserted disk CD/DVD.

Older CD & DVD players may not be able to read recordable media. Even newer players may not be able to. Consult your owners manual for more information. Insert a disc into the drive and see if any LEDs light up on the drive. In addition check to see if the ejects mechanism works properly. If no lights are visible on the front of the drive, check the power connection on the drive. A dirty laser lens can cause the drive to have difficulty reading the disc. Is your computer mounted sideways? Most drives have catches to allow sideways mounting, but they do not always work.

What can I do if my Floppy drive wont work? Your floppy drive LED should blink when you are booting your machine. If it doesnt, you should check to make sure it is plugged into the power supply. Make sure the drive is being detected by the BIOS. Check your floppy disk, and change it.

What should I do if My computer Keeps shutting Off? Make sure that you have a good constant flow of power to your PC. Make sure your power supply is providing enough current to feed the computer and all of its accessories. Check any recent hardwares installed. Install all windows critical updates. Check your bios configurations. Install or Repair the Operating System.

What should I do if My Desktop computer has NO Sound? Make sure your speakers are on. Verify the Speaker are connected to power and switched on. Pump up the volume. Verify the volume is turned up and not muted. Make sure the speakers are connected to the proper outlet jack. PINK OR RED GREEN LINE LIGHT BLUE MICROPHONE INPUT OUTPUT LINE INPUT

If you hear crackling from the computer speaker, the cables and connectors are loose or need replacement. Open device manager check the status of the sound card.

CHECK LIST TO IDENTIFY THE DEFECT IN COMPUTER OPTIMIZING PERFORMANCE Optimizing Windows is the process of fine-tuning its performance. Both Windows XP and Windows 2000 include some utilities that help optimize the OS performance. In this section, we will discuss how the OS can be fine-tuned for optimum performance Virtual memory. Windows operating systems use virtual memory to temporarily store data when it is running out of the physical memory (RAM) in the computer. This data is stored in a file on the hard disk (which is known as swap file or paging file). For most Windows installations, the OS automatically manages the size of the paging file. You can manually increase or decrease the size of this file or split the file across multiple hard disks depending on your requirements. If you feel that the system performance is poor, you can increase the size of this file or divide the file into multiple disks. The following steps explain how you can change the virtual memory settings in Windows XP: 1. Click Start Control Panel System. 2. Click the Advanced tab. 3. Click the Settings button in the Performance area. 4. Click Advanced. 5. Click Change in the Virtual Memory area. 6. Enter the Initial size and Maximum size and click Set. 7. Close all windows. DEFRAGMENTING HARD DISKS. Defragmenting hard disks helps improve their read/write performance. Hard disks become fragmented when some applications are installed or after a large number of files are moved or deleted. Fragmentation refers to the state of a hard disk when it no longer has contiguous space available to store new files or folders. The Disk Defragmenter utility can analyze hard disks and defragment them to free up contiguous space. Disk Defragmenter works on FAT, FAT32, and NTFS volumes. There are several ways to access the Disk Defragmenter: Click Start All Programs Accessories System Tools Disk Defragmenter. Open Windows Explorer; open the properties of disk or volume. Select the Tools tab. Click Defragment Temporary files: The Disk Cleanup utility in Windows XP is used to free up disk space by deleting temporary files and folders from the disk or volume. This utility can be accessed from Windows Explorer or from the System Tools folder under Accessories in the All Programs menu. Disk Cleanup essentially gives you options to delete several types of files. These files include: Program files downloaded from the Internet, including ActiveX controls and Java Applets.

Temporary Internet files to clear the computer cache. These files are stored in the Temporary Internet Files Folder. Temporary Files located in the Temp folder. Files stored in the Recycle Bin.

MSCONFIG: The msconfig.exe is a command-line tool that eventually opens a GUI called the System Configuration utility. This utility displays the current system configuration and allows you to safely change system settings. The settings that you can change include the following: System startup options for diagnosing startup problems. Advanced boot options to start the system in a selected diagnostic mode.

SOFTWARE TROUBLESHOOTING
SOFTWARE
Computer hardware such as the MOBO CPU, ADAPTER CARDS, DISPLAY DEVICE AND I/O DEVICES, are only a part of the entire computer system. To make this hardware work we need software that acts as interface between human beings and the hardware. Software can be classified into 3 major categories as follows.
1. Operating systems: The piece of software is responsible for controlling a PC

and other devices. It manages memory, printing, networking, those silly smiley faces you send using AIM, disk drivers, and a myriad of other things. You see the hardware through the operating system. 2. BIOS: BIOS stands for basic input/output system. Its what a device uses until it loads the operating system. Most of you have seen the black and white screens that scroll past as you boot up your computer. That is the BIOs hard at work, waiting for the operating system to grab the baton. 3. Drivers: Drivers are a type of software that allows the operating system to communicate with hardware. Every single piece of hardware inside of and connected to you PC needs a driver or it will not work. 4. Applications: Applications is the software program that takes commands from the user for a specific task, executes them and produces the results. Type of Software Installations When software is installed, the installer may add, modify, or delete files, registry entries, or even text within files. There are many different types of software installation packages: Single executable installation: This is probably what comes to mind when you think of software installations. It consists of a single, compressed file that includes all of the instructions that are needed to install the program. Web-based installation: This type of installation has become very popular in recent years, most likely because of the proliferation of broadband internet access. Media based installation: This type of installation places all of the necessary files on a span of discs. Also included is an executable file that knows where to copy the files and what changes to make to the system. Windows installer: Windows installer was introduced with Windows 2000. It can install, repair, and remove software using instructions that are provided in MSI files.

Types of Operating Systems An operating system of any kind is one of the biggest software applications around (some with over 45 million lines of code). The operating system is what people interact with and the environment on which other programs run. Operating system all fall into one or more of the following categories: GUI: The graphical user interface operating system is what most of you will be familiar with. It consists of graphics and icons that are manipulated using a mouse or other input device. Multiprocessing: These operating systems are designed to use more than one processor. Once only a privilege of supercomputers, you can now find these powerful operating systems running servers in a doctors office. Multiuser: The multiuser operating system allows many people to use it all at once or at different times. Multitasking: A multitasking operating system can run multiple programs at the same time. Multithreading: A multithreading operating system allows different parts of software to be run concurrently. Troubleshooting Techniques In order to troubleshoot problems related to the operating system, you must understand the Windows boot sequence, the advanced boot options available, and basic diagnostic procedures. Additionally, you must have good knowledge of using built-in troubleshooting utilities. Familiarity with different types of error messages and common operational problems will help you resolve problems easily and quickly. Understanding boot sequence: The following discussion explains the boot sequence in both Windows XP and Windows 2000: Pre-boot Sequence. When the computer is started, it performs a pre-boot sequence in the following manner: 1. A POST is performed to check the hardware components, which include Physical memory (RAM), video, and the keyboard. In case the computer BIOS supports Plug and Play (PnP), the configuration of PnP-compatible hardware devices is performed. 2. The Master Boot Record (MBR) is loaded from the selected boot device. The MBR in turn loads the NTLDR file from the boot device. In case the computer has a Small Computer System Interface (SCSI) device as the boot device without its own BIOS, the NTBOOTDD.SYS file is loaded. Boot sequence. NTLDR takes charge of the process from here on and performs the following steps:

1. NTLDR switches the processor to 32-bit flat memory mode and loads the file systems driver to access the FAT, FAT32, or NTFS partitions. 2. NTLDR reads the BOOT.INI file and selects an operating system. If multiple operating systems are installed on the computer, the BOOT.INI file prompts the user to select an operating system. If the MS-DOS operating system is selected, NTLDR loads the boot sector from the BOOTSECT.DOS file. 3. NTLDR calls on the NTDETECT.COM file to perform hardware detection, which displays error messages if any hardware problems exist. If the computer has more than one hardware profile, the user is given a choice to select an appropriate profile. UNDERSTANDING THE ADVANCED BOOT OPTIONS Some of the Windows startup problems can be resolved using the Advanced Boot Options during the startup phase. The most commonly used advanced options include Safe Mode, Last Known Good Configuration and Recovery Console. When Windows fails to complete the boot process, you can access any of these options by pressing the F8 key immediately after the POST is complete. Safe Mode In the Safe Mode, Windows XP loads with minimum basic system services and device drivers sufficient to boot the operating system. These components include the keyboard, mouse, hard disks, the VGA monitor, and other most essential system services. Safe Mode provides access to all system and device Configuration options so that you can enable or disable components one by one and try to pinpoint the problem. Safe Mode with Networking Safe Mode with Networking is similar to Safe Mode except that networking devices, drivers, and services are also initialized. Safe Mode with Command Prompt Safe Mode with Command Prompt loads the command interpreter, just like in MSDOS, instead of the GUI. Last Known Good Configuration The Last Known Good Configuration option loads the last used system configuration that allows you to return the system to the previous working configuration. Windows saves two types of configurations in the Registry: Default and Last Known Good. The Default configuration is saved to the registry when you shut down the system. Enable Boot Logging This mode enables the boot logging option that stores the boot process information in a file named NTBTLOG.TXT. This file is stored in the /WINNT directory and is helpful is diagnosing startup problems. Enable VGA Mode This mode loads Windows with basic VGA device drivers and other normal configuration. This mode is helpful in diagnosing problems with the display driver. System Restore (Windows XP)

The System Restore in Windows XP helps restore the system to a working state after you make changes to the system settings or install applications that make it unstable. It uses system restore points to store a snapshot of system settings at regular intervals. When you run the System Restore, a calendar is displayed in which you can pick a particular System Restore point. The System Restore can be accessed in one of the following methods: 1. Open the Help and Support Center, located in the Start menu. Under Pick a Task, click Undo Changes to Your Computer Using System Restore. 2. Click Start All Programs Accessories System Tools System Restore. You can also create System Restore points manually when you expect to make changes to your system. The following steps explain how you can create a System Restore point:
1. Click Start All Programs Accessories System Tools System Restore.

2. Click Create A Restore Point. Click Next. 3. Type a name to identify the restore point in the Restore Point Description box. 4. Click Create. Common error messages The following sections cover some more common error messages that you are likely to encounter: Missing NTLDR The NTLDR is missing error is accompanied by a Press Any Key to Restart message. This error is caused if any of the system startup files are missing or have become corrupt. The files that can cause this error include NTLDR, NTDETECT.COM, and BOOT.INI. You can restore these files by using the Recovery Console, an Emergency Repair Disk (ERD in Windows 2000), or by using the setup CD-ROM and selecting the Repair option when the installation starts. You can also restore these files using a system restore utility in Windows XP. Invalid Boot Disk This error is displayed when the system BIOS cannot access the disk partition that is supposed to contain system startup files. You might have to reinstall the OS to address this problem. Operating System Not Found This error means that the BIOS cannot find an operating system on the configured boot partition or boot device. This error is common in new computers that do have a boot partition configured in the BIOS and on which no OS has been installed so far. Inaccessible Boot Device This error is displayed when the computer finds a critical error with a boot device. This can be due to a malfunctioning device driver or to some resource conflicts. What are the common causes of software failure? The worst kind of software failure you can have is when your computer refuses to

start up because your operating system (windows) refuses to work. The other type of failure you might experience is that an application refuses to run. Both of these types of failures can really stop you tracks and ruin your day. Here are some of the common causes of software failure should put on the top of your troubleshooting list: Registry problems: The good news with windows is that it has a built in database and control system to keep track of all the software and critical information that lives on your PC. This feature is called the Registry. When the Registry has a bad hair day. Your pc might not start up or an important program installed on your pc might not work. Improper Installation: Software can be really fussy. If it isnt installed just right it might not ever run at all or it might run inconsistently. A recent software installation: It might seem that just out of the blue your operating system or an important application starts acting up. This problem will occurs because youve recently done something such as install some new software, a new hardware device like a printer, or attacking virus. Expired Software: Many programs that users install on their PCs are often downloaded from the Internet. Many are trail versions. Subscription based software may continue to work after it expires but not fully. Viruses: Viruses can create havoc on a PC because of the importance of viruses, weve devoted an entire chapter to them. Poorly written code: Software developers tell you, their products are flawed. They are riddled with code flaws, bugs and security holes.

SOFTWARE PROBLEMS
What should I do if my operating system will not start? Investigate all of hardware failure problems: You might just get lucky and discover the problem is due to a faulty power cord. Try to return your system to an earlier state: This solution will work only of your computer is still booting up and you are using Windows Xp. If you installed some new software or hardware drivers recently. You can then use the Windows system Restore feature to restore your computer without losing any of your personal data. Use the windows Setup CD that came with your PC: This is another important solution that can be used if you are running Windows XP. Windows XP setup CD provides a repair option that can fix startup problems, problem with system files and more. With this software we can repair and recover the OS. Try to fix a Registry boot problem: Your computer may be suffering from having a corrupted registry. This is a problem that we fix with reinstall Windows. Use the windows upgrade feature: This is another nice trick you can try if you are running windows XP. Insert the Bootable CD, boot from it and run the Install/Upgrade option. This option will install windows XP, but it will treat the installation as an upgrade and therefore it will be repair and install programs. Perform a clean install of Windows: If youve tried everything else and you still cant get you PC to boot, youll need to use your windows setup CD and perform clean install. What can I do if my computer boots really slowly?

Remove some of the programs that get loaded when windows startup using with MSCONFIG Clean the Registry using a commercial registry cleaning utility. Check your antivirus software and scan the entire system. If the virus is there remove it. What should I do if I cant run an application? Application shortcut: Check the shortcut of application and make sure the shortcut is pointing the correct executable file. Software Expiration: The software will typically run for a year or so and then expire. If you have a program that suddenly stops working, make sure you check to see that the software hasnt expired. Administrative privileges: Some applications will not run unless you have administrative privileges on the computer you are running it on. You must take the administrative permissions to access the applications. Repair: Some programs allow you to repair an installation by running a special utility. Reinstall the application and access it. DLLs: (Dynamic Link Libraries) these files are that application share to provide familiar functionality. When youre opening an application it displays some DLL file missing. This can make programs that are dependent upon them not work properly. Contact your software manufacture if you suspect DLL problems. What should I do before installing software? Check the Compatibility of your PC. Reboot the PC to clear memory errors Before installing the application you have to delete the temporary files in the TEMP Folder. Before installing the application make sure you have administrative privileges on the computer. Do not open the applications or files when youre installing applications. Turn of you screen saver because it may also cause you to cancel your inadvertently. When youre installing application on laptop check battery power status. When application installing is processing keep your kids away from the keyboard. How do I start a Software Install? Auto run: This method involves putting a CD-ROM in your device and closing it. Your drive will blink and make whirling noises signifying that it is reading data off of the disc. You should shortly see a splash screen for the program you are installing. Executable file: Executable files are another way to start an installation. They are typically named setup.exe, update.exe, or a host of other names. Archive: Some programs are archived inside of another file such as a ZIP file. In a case, you should extract the contents of the archive to a normal folder and then run the install program. What should I do if I cant find a program after installing it? Start Menu: This should be the first place you look. Just click start in the lower left

hand corner. Program File folder: Most window applications install under this main folder. You can find the folder by double-clicking my computer and then Local disk (C :). You will see a folder named Program files. Root of your hard disk: Some software will create a folder on the root of your C: drive. On a different partition or hard drive: If you have multiple partitions or multiple drivers the software may have been inadvertently installed there. Why cant I install/Uninstall Software? Microsoft created different levels of permissions in order to accomplish this: Are you an administrator? To install software you need to be a member of the Administrators or Power Users group. Are you in Terminal Services? Terminal services are a technology that allows multiple people to log into a server and access a Windows Desktop. Are you logged on as administrator? Some programs require that you are actually logged on as the administrator account. What can I do if my software install fails? Reboot and retry Check the event log: The event log keeps a history of errors and warnings that are generated by the software and hardware installed on your computer. Check the install log: During most software installs, a record is kept of all of actions and error messages that were generated during the installation. It can be found in root of your C: drive and is usually named install.log Make sure your system is up-to-date or not Clear you temp file folder Disable you antivirus program: Disabling the real-time scanning of your antivirus software may help in installing stubborn software. Install the software using safe mode booting. How can I uninstall software? Use the Add/Remove Programs feature: Add/Remove programs can be found in windows control panel. This method is the preferred method of uninstalling software on the windows operating system. Use the program files menu: Find the program in the program files menu. Click start Select all programs Find the program you want to uninstall Click the uninstall option. Use an uninstall file: These files can usually be found in the softwares folder in the program files folder. Contact the software company What can I do if my uninstall fails? Reboot the PC Clear your system temporary files in the TEMP folder. Click start- select run- type

%TEMP% Use safe mode Booting Contact the software company. How can I Update Windows? You have two options can manually update or use automatic updates. Click start- then RUN, type in wupdmgr.exe and click ok Click start and then click windows update Go to HYPERLINK "http://windowsupdate.microsoft.com" http://windowsupdate.microsoft.com Updates come in several different types: Critical Update: These are important security updates that Microsoft releases in response to vulnerabilities in its Windows operating Systems. Recommended Updates: These consist of regularly released updates to windows, Internet Explorer and other Microsoft products. Windows Tools: These are utilities and other tools offered by Microsoft for use by system administrators. Internet and Multimedia Updates: These are the latest versions of Internet Explorer, windows Media Player, and other Microsoft Software. Additional Windows Downloads: These are miscellaneous updates for desktop settings and other Windows features. Click Review and install updates and select the ones you want to install. How can I install updated drivers? It can be done from the Device manager using the Hardware Update Wizard. Open the Device Manger Right Clicking My computer Click properties Selecting the hardware tab Click Device manager If its and INF file, you can right click on it and choose install. INF files contain all of the necessary information to install a driver for a particular piece of hardware. Most drivers come packaged into an installer program. What is a device driver? A software routine that links device to the OS. It acts like a translator between a device and the OS.

Device drivers
Device drivers are system programs, which are responsible for proper functioning of devices. Every device, whether it is a printer, monitor, mouse or keyboard, has a driver program associated with it for its proper functioning. Whenever a new device is added to the computer system, a new device driver must be installed before the device is used. In modern operating systems, most hardware drivers, such as the keyboard driver, come with the operating system.

A driver acts like a translator between the device and program (typically, an operating system) that uses the device. For example, when a user prints a document, the processor issues a set of genetic commands to the printer driver, and the driver translates those commands into the specialized instructions that the printer understands. Note that each device has its own set of specialized commands that only its driver understands. A device driver is not an independent program; it assists and is assisted by the operating system for the proper functioning of the device.
How can I Rollback a Driver? You will still be able to revert to the last driver that was installed. Follow these simple instructions: Open Device Manger, You should be an expert in this by now. Right click the device in question Click Properties Click the Driver tab Clicks roll back Drivers. Windows Optional Components IIS: Internet Information Services (IIS) allows you to run a website from your computer. Although this may be overkill for the majority of the readers of this book, it may prove useful in some situations, such as in a small to medium office. You can share information with co-workers using an internet website. FAX Services: Windows Fax services allow you to send and receive faxes via your PC without the use of third-party software such as WINFAX. To Install Windows Optional Components Open the Windows Control Panel. Double-Click Add or Remove Programs Click Add/Remove Windows components Check off any Components you want to install and Click next. How can I Prevent My Self from Deleting Critical System Files? Right click start Click Explore Click Tools in the upper Menu Click Folder Options Check Hide protected operating system files Check Do not show hidden files and folders Uncheck Display the contents of system folders Click OK.

COMPUTER VIRUS/ANTIVIRUS
Computer Virus A virus is a piece of programming code usually disguised as something else that causes some unexpected and usually undesirable event. A virus is often designed so that it is automatically spread to other computers. Viruses can be transmitted as attachments to and e-mail, as downloads, or be present ona diskette of CD. It must be remembered that a computer virus does not spread on its own, rather it requires some carrier to transport it from one place to another. Categories of Computer Viruses The three broad categories of viruses are as follows: File Infectors System Infectors Macro Viruses
1. File Infectors: Some file infector viruses attach themselves to program files

while some can infect any program for which execution is requested. When the program is loaded, the virus is loaded as well. Other file infector viruses arrive as wholly-contained programs or scripts sent as an attachment to an email note.
2. System infectors: These viruses infect executable code found in certain

system areas on a disk. They attach to the DOS boot sector on diskettes or the Master Boot record on hard disks. A typical scenario is to receive a diskette from an innocent source that can be read without triggering the boot disk virus. However, if you leave the diskette in the drive, and then turn the computer off or reload the operating system, the computer will look first in youre A drive, find the diskette with its boot disk virus, load it, and make it temporarily impossible to use your hard disk. This is why you should make sure you have a bootable floppy.
3. Macro Viruses: These are among the most common viruses, and they tend

to do the least damage. Macro viruses infect your Microsoft Word application and typically insert unwanted words or phrases. Symptoms of a Virus Some common symptoms for a virus are as follows: 1. The computer begins to run slowly

2. Unusual messages and graphics appear on your screen for inexplicable reasons 3. Music, not associated with any of the current programs, begins to play 4. Some of the program and/or data files have either been corrupted, or they have become difficult to locate. 5. Unknown files or sub-directories have been created. 6. The sizes/dates of executable files change automatically. 7. The computer does not remember CMOS settings. 8. The disk volume label has been changed unexpectedly. 9. The hardware devices begin to exhibit unusual behavior. WORM: A worm, like a virus, is a program that is designed that is designed to harm the computer and destroy data stored on a computer. Worms are considered more harmful that viruses because they rely less on human behavior in order to spread themselves from one computer to another. TROJAN HORSES: A Trojan horse, or simply a Trojan, is a malicious program that is embedded inside a legitimate application. The application appears to be very useful, interesting and harmless to the user until it is executed. Trojans are different from other computer viruses in that they must be executed by the victim user who fails for the interesting software. Anti-Virus Software: Anti-virus software protects your computer from unexpected virus attack. Apart from protecting your system, anti-virus performs the following tasks: Detects the name of virus and its type. Detects the name of infected file or folder and mentions the exact location of infected file or folder on your computer and removes the virus from the computer. Most of the anti-virus softwares come with Alert feature. This feature keeps a vigil on your computer and as soon as some virus-like activity is found, the Alert feature displays a message box and alters the user. By changing the settings of anti-virus, you can instruct it to scan the computer on a regular basis.

The names of some popular anti-virus softwares are listed below: Norton Anti-Virus: This anti-virus software is most widely used and can easily be purchased from the market. Norton anti-virus has direct patch up with software firm Symantec, which specially deals in anti-virus operations. McAfee Software giant Microsoft used this anti-virus software for its email website Hotmail. Whenever you open some email or download some file from hotmail, the McAfee anti-virus software automatically checks the files for viruses.

HOW TO INSTALL ANTIVIRUS


Heres what to do before installing your antivirus software: Back up your files: I dont mean copy them to another directory on the same hard drive that would be like making copies of important documents and putting them in the same drawer. Convenient until you have a fire. Instead, copy everything to another computer, or to a CD-ROM that you have verified is readable on another computer. Reboot your system: Stop all of your other programs Open the Antivirus software CD in the OS Open the setup file (Executable file) Install your new anti-virus program. Follow the instructions carefully. If you become dazed and confused, stop the install, and get some help. After completing Installing restart your computer Open the Antivirus Application and update through Internet After completing update process Scan the all Hard Drives.

Virus Information:
This section provides a list of the latest viruses and their symptoms. You can use this section to prepare yourself for facing the latest virus threats. Virus name: W32.KazaA.Benjimin This new type of worm spreads via a computer network known as KaZaA. Whenever a contact is made with this type of worm, a message is displayed to the user which forces him to believe that this worm is a new game or utility to enhance the performance of computer.

Virus name: W32.Klez.H W32.Klez.H is file type worm, which infects files by renaming them with a random extension and copying itself as the name of the original file. It is network aware and detects all open shares and copies itself to them with random filenames. Virus name: W32.Nimda W32.Nimda is a very highly infectious worm, which creates.EML and .NWS files in all folders that are accessed by the user. This is a network aware virus and creates the .EML and/or .NWS files in the shared folders of other computers as well. When any of these files are opened in Outlook, the virus automatically gets executed on computers without the outlook patch.

Virus name: W32.Sircam This is a network aware trojan. It installs itself as a hidden file in the RECYCLED folder with the name SIRC32.EXE.It changes the registry to execute the virus whenever any .EXE file is run. Virus name: CHM.Britney-Pics.Worm This is a worm that arrives in emails as a CHM (Compiled HTML) attachment. The subject of the mail is RE: Britney Pics. It spreads through e-mails by using addresses it collect from the Microsoft Outlook Address Book. How to avoid Virus? If we follow some simple safety measures, we can easily protect our computers from getting corrupted by viruses. For this keep the following tips in mind: First of all you must prepare yourself against viruses by knowing about their symptoms, behavior, general working and their common source of origin.

On a regular basis collect information about the latest virus threats. You can find such information from websites like www.s-cop.com and www.symantec.com.

Never download files from unfamiliar or doubtful websites. Do not open any suspicious or unfamiliar email. Simply delete it. Maintain a separate folder for downloading files from the Internet. Once the download is complete, scan the folder with anti-virus software. Once the scan is complete, move the file to some other location on your computer.

Scan your computer thoroughly on a regular basis and never stop the scanning operation in the middle. Update your anti-virus software regularly from the Internet to empower it against new viruses. Always scan a floppy disk before using it because it may also contain viruses. Take regular back-ups of files so that a possible damage is minimized if a virus attack does occur. Create strong passwords so that virus could not guess the password and breach the security settings of your computer. Maintain a strict security level for browsing the Internet. Remove files having extension .TMP and .CHK regularly.

What is malicious code and software? Malicious codes are the software programs that generate threats to the computer system and precious data. This code can be in the form of viruses, worms, Trojan horses, Logic bombs, and other uninvited software. Viruses are a small segment of code, which replicates by attaching copies of itself to existing executables files. The new copy of the virus is executed when a user executes the new host program.

SCANNING HARD DISK FOR VIRUSES


To Open the Antivirus Software: Start Button- Mouse Cursor Place over the Programs Option- Select the Antivirus Software-Click it. The main window of Antivirus appears. Select the Scan drivers Option and click it. By default antivirus software selects all drives present on computer for scanning Select the which drive do you want to scan Next click the scan button Antivirus starts scanning selected drives for viruses

After completing the scanning, antivirus display a Summary window. This window mentions how many files or folders scanned by antivirus, number of infected files detected by antivirus, files repaired and deleted by antivirus. After viewing the scan summary, click the finished button.

INTERNET
What is internet? The internet is a global collection of computer networks that are linked together by devices called routers, modems and use a common set of protocols for data transmission known the TCP/IP (Transmission control protocol/Internet protocol). The Primary purpose of the Internet is to facilitate the sharing of information. This global network links thousands of computers at universities, research institutions, government agencies and business houses throughout the world. Using a small pc at your home and telephone connection, you can access information from any place in the world through internet. There are many different tools used on the Internet to make this possible. Some of the more common tools 1. Email 2. Information store house 3. FTP (File Transfer protocol) 4. Telnet 5. Entertainment 6. Online Shopping/Electronic Commerce Email: Electronic mail is a fast easy and economical way to send messages to anymore having an Internet account. Through this most widely used feature on Internet you can exchange messages with your family, friends and business associates around the world. Along with the messages one can also send pictures, audio and animation. Information Storehouse: You can easily access information from internet regarding any subject. Internet is very much like a library with enormous information on any subject. FTP: There are thousands of free programs and softwares available on Internet. You can transfer them to your hard disk through a process called File Transfer Protocol.

Telnet:Telnet is an Internet exploration tool that allows your PC to connect to another network and login as if you were a user on that system. You can communicate with a wide variety of remote systems with which you have an account. Telnet is widely used to access databases and explore public access computer systems. Libraries frequently use Telnet. When you search for

resources, and an item is not found in one library, another library needs to be searched. The Telnet application helps you to do this.
Entertainment: Hundreds of simple games are available for free on internet, Like chess, football, etc. Internet also allows you to review the current movies as well as indulge in interactive conversation with people around the world. Online Shopping/Electronic Commerce: Online shopping means buying or selling on the Net. You can order goods and services on internet such as computers, softwares, books, dress, vegetable etc.

EQUIPMENT REQUIRED FOR AN INTERNET CONNECTION


Computer: Any good IBM compatible pc and unix or windows os, computer that has good storage space and minimum configuration of pc. Modem: The term modem is derived from Modulator/Demodulator. A modem is a hardware device that is used to convert digital signals from a computer to analog signals (modulation) in order to transmit them over analog lines. At the receiving end, it converts the analog signals back to digital signals (demodulation) so that a computer can understand them. It can be built onto the MOBO of the computer can be installed as an extension card, or can be and external device. External modems can either be connected to one of the serial ports or to the USB port of the computer. Web Browser: The software used to navigate through the web is known as a browser. The most popular browser types today are Netscape Navigator and Microsoft Internet Explorer. Before you start working on the Internet, make sure you have a web browser in your computer, otherwise you will not be able to surf the net. The Microsoft Internet Explorer comes installed along with MSOFFICE. Telephone Line: It is essential to have a telephone connection to get connected to Internet. All the data and information pass through the telephone lines as analogue signals. ISP (Internet Service Providers): If you have a computer with a web browser, a modem and a telephone line connected to your computer, you now need an Internet connection. You can get and Internet connection from various Internet Service Providers. EX: BSNL, VSNL, MTNL.

INTERNET TERMINOLOGY
TCP/IP TCP/IP is the protocol suite that is designed especially for the Internet. Basically, the TCP/IP handles network communications between network nodes (computers connected to each other over the Internet).The suite is actually composed of several

protocols including IP, which handles the movement of data between host computers and TCP, which manages the movement of data between applications. URL (Uniform Resource Locator) A URL is the address of a resource accessible on the Internet. The type of resource depends on the Internet application protocol. Using the World Wide Webs protocol, the HTTP and the resource can be and HTML page. The URL contains the name of the protocol required to access the resource, a domain name that identifies a specific computer on the Internet and hierarchical description of a file location on that computer. Here is an example of URL: http://www.google.com.

HTTP: (Hyper Text Transfer Protocol) HTTP is a protocol used by the WWW. The main task of HTTP is deals with the messages format and transmission and what actions Web Servers and browsers should take in response to various commands. The main standards that controls how the WWW works is HTML, which deals with how Web pages are formatted and displayed. Modem Modem: The term modem is derived from Modulator/Demodulator. A modem is a hardware device that is used to convert digital signals from a computer to analog signals (modulation) in order to transmit them over analog lines. At the receiving end, it converts the analog signals back to digital signals (demodulation) so that a computer can understand them. It can be built onto the MOBO of the computer can be installed as an extension card, or can be and external device. External modems can either be connected to one of the serial ports or to the USB port of the computer. Network A network is a group of interconnected systems sharing services and interacting by means of a shared communications link. A network therefore, requires two or more individual systems with something to share (data). The individual systems must be connected through a phyiscal pathway called the transmission medium. All systems on the physical pathway must follow a set of common communication rules for data to arrive at its intended destination and for the sending and receiving systems to understand each other. The rules that govern computer communication are called protocol. Types of Internet Connection:

The must be connected to a telephone line to access the web. However modems do not need a special telephone line. Most people use their regular phone line to connect to the Internet. Apart from a normal telephone line, you could also use other channels to connect to the web. Some of the other common types of Internet access, available for the use these days, are briefed below: Dial-up: A dial up connection is the access method that uses telephone lines to connect to the Internet. It is the most common way that individuals who use home computer connect to the Internet. To connect to the Internet by using dial up, the user needs to specify a username, a password, and a telephone number. After the connection is established, the user can start browsing sites on the Internet. ISDN: It stands for Integrated Services Digital Network and is more common in business and ISDN involves the digitization of telephone network so that voice, graphics, text and other data can be provided to users from a single terminal over existing telephone wiring. Digital connections have fewer errors in transmission, which means speed of downloading graphics, web pages, sound and so on is increased to four times faster than with dial-up modems. DSL: Digital subscriber Line service is provided through the existing phone line, but it works differently than regular analog modem dial-up access. DSL operates over normal telephone lines and it can be used simultaneously with the telephone. DSL can increase the connection speed by as much as ten fold form a standard dial-up modem. Broadband: This type of access is good for remote locations, where ISDN, cable or DSL are not available. It gives a decent download speed, but to upload data, the user sill needs a regular analog modem to dial in, via a phone line. Satellite connection can be either a two way service or a one-way service. In case of two-way satellite service, the data is transmitted via satellite to a dish antenna at the users house. In one way system, the user needs a conventional modem and telephone link to an ISP. Satellite connection is expensive but sometimes is the only fast option for people who are beyond the service area of cable and DSL providers. Internet Softwares: TCP/IP: It is the basic communication protocol of the Internet. It allows programs on users computer to communicate properly over the Internet. Usually when you are setup with direct access to the Internet, Your computer is provided with a copy of the TCP/IP program. Similarly every other computer that you may send messages to or get information from also has a copy of TCP/IP. Dialer Software: This software is provided by the ISP to instruct the modem to dial the phone number and to identify the users machine to the access providers system for access to the network.

Browser: To use the Internet a web browser is essential. This program allows the user to view the information available on the World Wide Web. Internet Relay chats The internet relay chat (IRC) feature of internet lets you instantly communicate with people around the world. Using IRC you can converse on the Net with one or more individuals simultaneously by simply typing replies to lines coming in from the other individuals. This is a great way to meet people and exchange ideas. During Internet conversations, if you type text, it immediately appears on the screen of every person involved in that conversation. Unlike talking on the telephone, the IRC lets you chat with friends and colleagues in other cities, states or countries without your having to pay long distance charges. TYPES OF CHAT
1. TEXT BASED CHAT: It is the oldest and most popular mode of chat on the

Internet. This mode enables you to have conversation with one or more people. During chat when you type text, the text appears on the computer screen of every person participating in your conversation. The test gets transferred quickly across the Internet through the modem. So you do not need a high-speed modem for text based chat.
2. WEB BASED CHAT: In this type of conversation, you make use of

multimedia. In fact, multimedia chat is a new feature of the Internet. This feature enables you to have voice conversations and communicate with other people through live video over the Internet. Since sound and video signals get transferred slowly across Internet, it is recommended that you use a high speed modem for web based chat. However, web-based chat is not functional in India as yet because of the narrow band-width available for use in India. Browsing the WWW When you open the Internet Explorer browser, the home page of Microsoft will open by default. If you have the Netscape browser, the home page of Netscape Incorporation opens on your screen by default. Each Web page on the web has a unique address. This address is called a URL (Uniform Resource Locator). The URLs of web pages start with http:// where http stands for hyper text transfer Protocol. To view a particular website, you will have to provide an address that is a URL of that website. 1. Open the Internet Explorer and it displays the homepage of Microsoft. 2. Move the mouse-pointer inside the Address box and click the left mouse button.

3. Now type the URL http://www.google.com and then press the Enter key.

List of Popular Websites www.rediff.com www.timesofindia.com www.hindustantimes.com www.navbharattimes.com www.filmfare.com www.msn.com www.google.com www.cards4you.com www.bluemountains.com www.yahoo.com www.hotmail.com www.ibm.com

Introduction of WWW The Web is a vast collection of information that is stored on the computers that make up the Internet. The term World Wide Web is often used interchangeably with the terms WWW and W3. It consists of huge collections of pages containing information, images, sounds and video clips stored in computers around the world. It is basically a collection of millions of files stored on thousands of computers which are connected through the internet. The information provided is regularly updated. Each page is called Website. The very first page of any web site is known as its Home page. A link is any text, image or figure, which when clicked takes us to some other web page or some other section of the same web page. These links are commonly known as hyperlink or hypertext links. Evolution of the World Wide Web: The Arpanet (Advanced Research Projects Association Network) was born with four host computers (in the Research Department of the US Department of Defense) connected to each other. However as time passed the number of computers connected to the Internet increased. The number soon reached 3, 00,000 in 1990. And then the number of host, connected to the Internet crossed over 109 millions in just a decade. It was in 1991, that the emergences of e-commerce led the business to enter the Internet world. The NFSnet was responsible for this major development. Basic Features:
1. Client and Server: In a client/server scenario, we have a client program,

which interacts with a server program. When talking in context of Web, the server is called the web server and all the computers connected to the Web server are the Web clients. A web server is a repository of all the files on the web. It is the duty of the web server to store, retrieve and manage these files

on the web. All the host computers requesting the web server for these files are the web clients.
2. HTTP: Hyper Text Transfer protocol is a set of rules that are responsible for

the transmission of web pages- on the web. In other words, it is the standard language that tells how the client and the web server are going to communicate with each other. It has been exclusively designed for the World Wide Web. When a request is made from web client to the web server, the server uses this protocol to fulfill the request made.
3. URLs: A URL is the address of a resource accessible on the Internet. The

URL contains the name of the protocol required to access the resource, a domain name a file located on that computer. You can instantly display a web page if you know its URL. For example, http://www.wileydreamtech.com is a URL.
4. HTML: Hyper Text Markup language (HTML) is a computer language used to

create web pages. Thus, a web page is an HTML document made up of text and various HTML tags. It is the browser, who is responsible to transfer the tags in the HTML document and display the document as a web page. However, each web browser interprets the HTML tags differently. When a web browser does not understand a tag or attribute, the information is usually ignored. The HTML tags tell a Web browser about the structure and formatting of a web page.
5. XML: Extensible markup Language (XML) WAS DEVELOPED BY THE W3C

to create information formats and share both the format and the information on the web. It was not supposed to replace HTML, but to extend the power of HTML by separating data from presentation.
6. Java and Java Script: In java, there are small programs known as applets

that can be sent on the web. Java Script is a scripting language that is an extension of HTML. Using Java script small programs called scripts can be embedded in web pages.
7. VB Script: This is a scripting language that `closely resembles Microsofts

Visual Vasic. Like java script, VB script can embed small programs on web.
8. Multimedia: These days all kinds of files graphics, sound, video and

animationare being used over the Web. Technologies such as Shockwave and Java allow these files to be transferred to your system and played over there. WWW Browsers A browser is a computer program that accesses web pages and displays them on the computer screen. It is the basic software that is needed to find, retrieve,

view, and send information over the Internet. In fact, to access the World Wide Web, the user requires a web browser. When you open the Internet Explorer browser, the home page of Microsoft will open by default. If you have the Netscape browser, the home page of Netscape Incorporation opens in your screen by default. Browsers are two types:
1. Graphical browsers: It allows retrieval of text, images, audio and

video. Navigation is accomplished by pointing and clicking with a mouse on highlighted words and graphics. Both Netscape navigator and internet explorer and Graphical browsers.
2. Text browsers: It provides access to the web in text-only mode.

Navigation is accomplished by highlighting emphasized words on the screen with the arrow up and down keys, and then pressing the Enter key to follow the link. Mosaic This was the first Web browser and was developed by the National center for Supercomputing Applications (NCSA) at the University of Illinois at UrbanaChampaign. It is available for Macintosh, Window and X Windows platforms. This software is available free on the Internet and can be downloaded from ftp.ncsa.uiuc.edu by any anonymous FTP. Netscape Navigator Netscape Navigator was released in 1994 and is one of the fastest Web browsers currently available in the market. It is available in different versions for UNIX, Windows and Macintosh platforms and has built-in the e-mail and Newsgroups facilities. Microsoft Internet Explorer This is based on NCSA Mosaic and is distributed under a licensing agreement with Spyglass Inc. This is shareware software and can be downloaded from the Internet. It comes in different versions for various Windows products. We will discuss Internet Explorer 3.0 in detail. Web Servers A web server can be any computer, which stores various web pages and contains the web server software. The web pages on the server are mostly HTML documents. The web client (i.e. a browser, like Internet Explorer and Netscape) makes a request to the web server.:

Whenever you have to look up a web page, you type that URL into your browser and press return. After a while, no matter where in the words that URL lives, the page appears on computer screen. Your browser forms a connection to a Web server, requests a page and receives it. If you want to get into a bit more detail, here are the basic steps that occur being the scenes: The browser broke the URL you typed into three parts: 1. The protocol (http) 2. The server name (www.mypage.com) 3. The file name (web-server.htm) The browser communicates with a www.mypage.com to translate the server name into an IP Address, which it uses to connect to the server at that IP address on port80. Following the HTTP protocol, the browser sends a request to the server, asking for the file http://www.mypage.com/web-server.htm. The server then sent the HTML text for the Web page to the browser. The browser read the HTML tags and formatted the page onto your computer screen. Internet Information Server (IIS): This is a product of Microsoft and runs on Windows NT or Windows 2000. It is the most widely used web server. One of the reasons for its popularity is that it is easy to set up. IIS offers various tools. These tools are as follows:
1. Microsoft Transaction Server: It is used for building distributed

applications.
2. Index Server: Index Server is used for indexing and searching web pages

and Microsoft word documents.


3. Site Analyst: The site Analyst carries out the task of site management.

IIS supports a large number of features. Some of the important features are--crash protection, support for active server pages and java, script debugging and content management. IIS is also being used for providing support for HTTP.

HTTP (Hyper Text Transfer Protocol)


Protocols are the rules that describe how clients and servers communicate with each other over a network. Hyper Text Transfer Protocol is a protocol used by the WWW. It can be defined as a set of rules that signify how the web pages are transmitted over the web. These include text files, sound files, music files, graphics, etc. Some of the commands that help in the communication between the browser and the web server are listed below 1. GET: This command initiates the server to retrieve the information located at the path specified in the URL.

2. HEAD: This command is exactly the same as the GET command. The only difference is that unlike the GET command, The server retrieves only the document header to the browser. The body of the document is ignored. The HTML document is divided into 2 parts: The Head and the Body. 3. Post: The post method instead of reading the page, writes the page. However, instead of replacing the existing date, the new date is appended to it in some generalized sense. The transaction in HTTP uses the TCP/IP protocol. Given below are the various phases which a transaction must undergo: Connection: This is the first phase of the Transaction cycle. In this phase, a connection is established between the browser and the web server. The browser requests the server for the connection and the server on receiving the request establishes a connection. Request: Once a connection has been established, the client sends a request to the server, specifying the files it needs to access. Response: The server searches its database, finds the web pages requested by the client and sends the results back to the client. Close: When the server has processed the request made by the client, the connection is no more needed. The client delivers a request to the server to close the connection. Uniform Resource Locator A Uniform Resource Locator (URL) is the address of a resource accessible on the Internet. The URL contains the name of the protocol required to access the resource, a domain name that identifies a specific computer on the Internet, and a hierarchical description of a file located on that computer. Example of URL: http://www.yahoo.com Search Engines A search engine is a software program that searches a particular piece of information, according to the specified criteria. We all know amount of information available on the Web is huge. Most of us are not even aware of the names of the sites available on net. Even if we know the names of a few sites, The is way a search engines makes a hunt for the specified criteria through its own database. In a survey conducted by Neilsen /Net Ratings, it was found that for the year 2002, the two most popular search engines for navigating the Web were yahoo and MSN.

Components of the Google search

There are three components that work together to provide us with the search results. These arethe Robot, the Database and the Search Form. Let us now have a look at these components one by one:
1. Robot: Also known as Spider or Bot, this is a program that

automatically navigates the various hypertext structures on the Web. It makes a move like a robot spider and retrieves and lists the various web pages. The robot works by categorizing the web pages and storing information about the web site and the web pages in a database.
2. Database: A database is a repository to store and manage the

information (here on the web). Oracle, Microsoft SQL Server, IBM DB2 are some of the Database Management systems that are used to configure and manage the databases. The search engines make a list of the web pages and sites using these databases. Remember that different sites have different databases. Therefore, the search results will vary, depending on the database used by a particular site.
3. Search Form: This is an interactive form, which is used by a visitor to

make a request for some information. This mainly consists of a text box and a submit button. The visitor usually types the topics related to his or her search and clicks the script, which then searches the database using the criteria specified by the visitor. The result of the search, often known as the result-set is sent by the web server to the browser for display. The sequence in which, the web pages are listed, depends on the alphabetical order of the sites, amount spent on their advertisements by their owners, link popularity etc.

IP ADDRESSING
The task of assigning a network address to your network and a host address to each of your servers and workstations is known as IP Addressing. An IP address is a fourpart number in which each part represents an eight bit binary number. The four parts are known as octets or bytes and are separated by periods. The total length of an IP Address is 32 bits. A simple example of IP Address is listed here under. IP addresses are assigned and controlled by an organization called Internet Assigned Numbers Authority (IANA). There are two current versions of IP addressing IPv4 and IPv6. A part of the IP addresses is known as the network address, or network ID, and the rest of it is known is the host address or host ID. Example: 192.68.1.15 Subnet Mask The subnet Mask is used to identify which part of the IP address is the network address and which part is the host address. The subnet mask is telling the network that the first eight bits of the corresponding IP address are to used as the network address. The last 24 bits in this example are to be used as the host address. Different classes of IP Addressing

PUBLIC IP ADDRESSES A-CLASS: 1.0.0.0 TO 126.255.255.255 1 NID- 3HID B-CLASS: 128.0.0.0 TO 191.255.255.255 2NID 2HID C-CLASS: 192.0.0.0 TO 223.255.255.255 3NID 1HID D-CLASS: 224.0.0.0 TO 239.255.255.255 255.255.255.255 Multicast E-CLASS: 240.0.0.0 TO 255.255.255.255 Default subnet mask: 255.0.0.0 Default Subnet Mast: 255.255.0.0 Default Subnet Mask: 255.255.255.0 Default Subnet Mask: Reserved for Experimental usage

PRIVATE IP ADDRESSES: A-CLASS: B-CLASS: C-CLASS: Domain A domain name is one that follows the at sign (@) in an email address, such as hotmail.com. The domain names have different words, separated by periods that indicate different levels of organization. The size of the organization increases from left to right. For Example, the domain indianrail.gov is meant for Indian railways, which is part of Indian government and comes under its direct jurisdictions. Domain can be categorized into two broad categories: Three letter top-level domains and two-letter top level domains. Three Letter Top-Level Domains TLD .com .net .gov .edu .org .mil .int MEANING Commercial Business, a company Network provider, ISP Government agency Educational Institution Non-profit institution U.S. Military International EXAMPLES Hotmail.com Usa.net Indianrail.gov Stanford.edu Redcross.org Army.mil Itu.int 10.0.0.0 TO 10.255.255.255 172.16.0.0 TO 172.31.255.255 192.168.0.0 TO 192.168.255.255

Two Letter Top Level Domains: these are country codes TLD COUNTRY EXAMPLES

In Us Uk De Jp

India United states United Kingdom Germany (Deutschland) Japan

www.drc.in Nasdap.us Bbc.uk Sgi.de www.nihon-u.ac.jp

Sending and Receiving E-mails using Outlook Express Outlook Express is a message - or E-mail handling software. This comes along with the Internet Explorer. The Electronic Mail is sent and received in the form of text or images to different Internet Users. The Internet Explorer mail and news program, Outlook express is used to exchange Email messages. Receiving an Email 1. You will notice a mail button present on the standard toolbar of Internet Explorer 2. Then click the left mouse button on the mail button. 3. Inside the pull down menu click on the read mail option 4. Immediately a Microsoft outlook express logo appears on the screen for a few seconds. 5. Now to view all the Emails you have received, move the mouse pointer over the inbox option inside the Folders box and click the left mouse button. 6. If you wish to read the contents of a particular mail, in our case a mail that has come from Microsoft Outlook Express, Just move the Mouse-Pointer to it and double-click the left mouse button. Replying to and Email using Outlook Express 1. Click on the particular mail which has to be replied to. 2. Now click on the reply button. 3. Type the message in the mail. 4. Now send the mail to To Email address. Sending an Email using Outlook express 1. Click on the new mail button present on the standard toolbar. 2. Inside the pull down menu click on the any letter option, Instantly a new message box gets displayed on the screen. 3. Now type the Email address of the person to whom you wish to send a message.

4. Then press the tab key two times to move the cursor in the box beside the Subject option. 5. Next, type a brief description for the subject of Email. 6. Then pres s tab key from the keyboard to move the cursor into the typing area. 7. Now type the message in the mail. 8. When you are ready to send your message, click on the send button.
9. Click on the Outbox option present inside the Outlook window. Instantly all the

mails present inside the outbox get displayed. HOW TO CREATE EMAIL ID: 1. Connect your computer to the Internet. 2. Step 2 Open a Web browser and type in the Web address of the company with which you want to get an email ID. Yahoo is free and very easy to set up 3. Step 3 Click on "Sign up." On the Yahoo page this says "Don't have a Yahoo ID?" above it. 4. Step 4 Fill out your personal information. This includes your name, date of birth, gender and country. Most companies do not ask for your specific address. 5. Step 5 Get out a pen and paper and begin writing out email ID's that you would like to have. He best ones are easy to remember. Your name or a nickname that everyone knows you by are good places to start. 6. Step 6 Start with your favorite ID and type it in the ID box on the email service's Web page and click "Check." A few seconds later you will be told whether this ID is taken or not taken. 7. Step 7 Create a password. This is usually longer than eight characters and it is best to make it a combination of both letters and numbers. 8. Step 8 Type in the letters on the screen and click done. 9. Step 9 Let your friends know what your new email address is and start sending and receiving your emails. Dealing with a search Engine Google
1. First of all you need to open the website of google by typing www.google.com

in the address bar of the Internet Explorer.

2. Once the home page of google appears on the screen, enter the search query in the text provided on the home page for entering queries and press the Enter key from the keyboard. 3. In a few moments google will display the links and name of websites that can provide you information on search query entered by you. You can click on any link to view the information. E-Learning Electronic Learning is the mode of learning and acquiring knowledge by means of Internet, Intranet, CD-ROM, which can include text, audio, graphics or animation. In e-learning, you can learn about any subject at anytime and anywhere with the help of a computer. Types of e-Learning 1. Knowledge-based e-learning 2. Online Support based e-learning 3. Synchronous Based e-learning 4. Asynchronous Based e-learning Knowledge based e-learning: This type or e-learning involves giving step-by-step instructions to perform a particular task. Example: Software Websites. Online Support-based e-learning: In online support-based e-learning the user puts up his query on forums, chat rooms, online bulletin boards, emails etc. and gets the answer to his query online. Synchronous based e-learning: The synchronous based e-learning operates in real-time environment where an instructor provides learning and training to students. In this type of e-learning, students and instructor can set a time for communication over the internet and can communicate directly with the instructor and fellow students. Asynchronous based e-learning: This type of e-learning is most common as it involves self learning by means of Internet, Intranet and CD-ROM. E-Commerce In todays web-oriented society the most discussed word is e-Commerce . The concept of e-Commerce originated from the word commerce, which means transaction/exchange of goods and services for their worth. This applies to eCommerce too, but the difference is that e-Commerce involves selling and purchasing of commodities and services using a computer network, usually the Internet.

Product: To conduct e-commerce you must have some produce to sell. Selling place: In a e-commerce, the place of selling and ordering goods is an web site. Accessibility to people: This element decides how people would access the web site that is hosting e-commerce. How to place orders: The website must have some on-line forms that people can use to place their orders. How to accept money from customers: In e-commerce credit card is the most convenient and commonly used means of accepting money from customers. Delivery mechanism: The website that is hosting e-commerce must have the provision to deliver commodities to their customers. Internet Telephony Internet Telephony is one of the latest and most discussed technologies. From the very first day of its launch, this technology has found increasing favour with corporate companies and programmers. This technology was first introduced by Vocal Tech Inc that deployed this technology in its Internet phone software. To use this technology you must have the following devices. 1. Sound card 2. Speakers 3. Microphone 4. Voice-capable modem Category 1: PSTN to PSTN using voice over the Internet In this category communication between two users takes place over PSTN line. As a phone call is made the telephone exchange transfers the telephone call on an IT gateway, which delivers the call to the target telephone exchange. The target telephone exchange on receiving the call delivers the call to the intended user. Category 2: PC to PC using Voice over the Internet In this category a user makes a call to the other user by using a computer and applications such a s phone dialer. When a user makes a call by using a computer, the IT gateway delivers the call to the target telephone exchange. On receiving the call the telephone exchange delivers the call to the target user. It must be remembered that only a person using a computer can make a call to another user irrespective of whether the other user has a computer or not. Category 3: PC to PC using voice over Internet

In this category there is no role of PSTN whatsoever. Here two users communicate with each other over the Internet using H.323 protocol, which is specially designed for delivering voice over the Internet.

CUSTOMIZE THE WEB BROWSER


What are Favorites? When browsing the World Wide Web you will come across certain web sites which you might want to visit again. Instead of typing in the address each time, you can store a list of Favorites in Internet Explorer which require only a simple click to take you to a web site. View Favorites To view your current list of Favorites, in Internet Explorer 6 click on the Favorites menu at the top of your browser. In Internet Explorer 7 you can access your Favorites list by clicking on the Favorites Center button. Add a Favorite Site To add the current web site page to your list of Favorites, right-click somewhere on the page and select Add to Favorites from the menu that appears. Alternatively, in Internet Explorer 7 you can also click the Add to Favorites button at the top left of the screen. A new window will open allowing you to give this Favorite a name to help you remember what the site was about. Type it into the Name box. What is popup? Pop-up ads are a form of online advertising on the World Wide Web intended to increase web traffic. It works when certain web sites open a new web browser window to display advertisements. but can be generated by other means as well. A less intrusive variation on the pop-up window is the pop-under advertisement. This opens a new browser window, but in the background, so as not to interrupt the user's page-view. OPTION A: Disable the pop-up blocker in Windows XP Service Pack 2 1. Launch Internet Explorer. 2. Click Tools > Internet options > Security tab. 3. Click the Custom Level button. 4. Scroll down the Security Settings list to find and select the Use Pop-Up Blocker Disable setting. 5. Click OK. 6. When prompted with a security settings warning, click Yes. OPTION B: Create an exception for the pop-up blocker in Windows XP Service Pack 2

NOTE: The pop-up blocker remains enabled in this option 1. Open Internet Explorer. 2. Click Tools > Popup blocker. 3. Select Popup blocker settings. 4. Under "Address of Web site to allow:" enter "*.platoweb.com" and click Add. If the URL you use to access Web Learning Network is different, use the appropriate URL for your school or facility. 5. Click Close to close the Pop-up blocker settings window. What is ACTIVE X CONTROLS? A control using ActiveX technologies. An ActiveX control can be automatically downloaded and executed by a Web browser. ActiveX is not a programming language, but rather a set of rules for how applications should share information. Programmers can develop ActiveX controls in a variety of languages, including C, C++, Visual Basic, and Java. ActiveX controls have full access to the Windows operating system. This gives them much more power than Java applets, but with this power comes a certain risk that the applet may damage software or data on your machine. Another difference between Java applets and ActiveX controls is that Java applets can be written to run on all platforms, whereas ActiveX controls are currently limited to Windows environments. Active X Control 1. 2. 3. 4. 5. Click "Tools" located on the IE 6 toolbar. Select "Internet Options." Click the "Security" tab. Click "Custom Level." Configure the categories by following the directions below: o Active X Controls and Plug-ins - Enable Download signed ActiveX, Run ActiveX controls and plug-ins, and Script ActiveX controls marked safe for scripting. o Cookies - Enable both options in this category. o Downloads - Enable File Download. o Miscellaneous - Set Software Channel to Medium. o Scripting - Enable all options in this category. 6. Click "OK." Web Browser Plug INS There are a core set of key programs from third parties that you can download to extend the capabilities of your browser. Several companion programs for Internet Explorer can be set on the window accessed under "Tools / Internet Options / Programs", and others under the "Manage Add-ons" on that window. Internet Explorer generally downloads additional

plug-in automatically the first time it needs them, and will prompt you for permission if it runs an installer program. You can get information on Mozilla Firefox plug-in from the menu "Tools / Options / Downloads / Plug-Ins". Resources: The average plugin is between 500 KB and 1 MB in size. If you have the disk space, you should get the latest copy of the following key plugins which are widely used across the Internet:

Acrobat Mediaplayer Quicktime Realplayer Shockwave Flash Player

PROXY SERVER In computer networks, a proxy server is a server (a computer system or an application program) that acts as an intermediary for requests from clients seeking resources from other servers. A client connects to the proxy server, requesting some service, such as a file, connection, web page, or other resource, available from a different server. The proxy server evaluates the request according to its filtering rules.

To speed up access to resources (using caching). Web proxies are commonly used to cache web pages from a web server. To apply access policy to network services or content, e.g. to block undesired sites. To bypass security/ parental controls. To scan transmitted content before delivery for malware. To scan outbound content, e.g. for data leak protection.

How to configure Internet Explorer to use a proxy Internet Explorer 6.0


1. On the Tools menu in Internet Explorer, click Internet Options, click the

Connections tab, and then click LAN Settings.


2. Under Proxy server, click to select the Use a proxy server for your LAN

check box.
3. In the Address box, type the IP address of the proxy server. 4. In the Port box, type the port number that is used by the proxy server for

client connections (by default, 8080). 5. You can click to select the Bypass proxy server for local addresses check box if you do not want the proxy server computer to be used when you connect to a computer on the local network (this may speed up performance). 6. Click OK to close the LAN Settings dialog box.

7. Click OK again to close the Internet Options dialog box.

Anda mungkin juga menyukai