Tuesday, 19 November 2019

STEPS OF ASSEMBLING DESKTOP PC

First you will need to buy the parts necessary to build the computer. The parts we will use in this project are labeled in figure 1:


1. Processor (CPU)
2. Computer Case
3. Optical Drive (DVD RW and SATA capable)
4. Memory (RAM)
5. Power Supply
6. SATA Cables
7. Motherboard (SATA Capable)
8. Processor Fan
9. Case Fan
10. Hard Drive (SATA Capable)
11. Assortment of case and drive screws (Not Pictured)
12. Flowers (necessary if you are invading the space of your significant other)

Step 2: Gather Tools and Supplies


Gather the tools you will need for the project:
  • Screwdriver (for slotted and Phillips head screws)
  • Wire cutters and strippers
  • Needle-nosed pliers
  • Utility knife
  • Small flashlight
  • Adjustable wrench
  • Small container to hold screws
  • Heat sink compound
  • Grounding Strap

Step 3: Open the Case

Step 4: Prepare the Case for Assembly

Step 5: Ground Yourself

Step 6: Install Motherboard

Step 7: Install Hard Drive

Step 8: Install Optical Drive

Step 9: Install the CPU

Step 10: Install RAM

Step 11: Install the CPU Fan

Step 12: Install Case Fan

Step 13: Install Power Supply

Step 14: Connect Cables

Step 15: Wrap-up

 

 

 

 

 

 

 

 

 

 

 

 

 

 


 

WHAT ARE COMPONENTS REQUIRED TO ASSEMBLE DESKTOP PC?

Here is the Computer Parts List with all the basic Hardware Parts that you will need for a functioning PC:

  • Case
  • Motherboard
  • CPU [Processor]
  • GPU [Graphics Card] (if no integrated GPU)
  • RAM [Memory]
  • Storage Device (SSD, NVME SSD, HDD)
  • Cooling (CPU, Chassis)
  • PSU [Power Supply Unit]
  • Display device, Monitor
  • Operating System [OS]
  • Input Devices, Mouse, Keyboard

Case

The Computer case is nothing more than a fancy looking box that holds all of the PC’s components. It can be opened and closed and usually has pre-defined areas with screws and holes where all the other Components are supposed to be placed and attached to.

Motherboard

Next up is a very important part, the Motherboard. The Motherboard is a Printed Circuit Board that every other Computer Hardware Component will be attached to. It is like a central Hub that manages all the other Parts.

Processor (CPU)

 

Now, into the Motherboard Socket, the CPU is plugged in. Every CPU type has a specific Socket, that is named like 2066, 1151, AM4, TR4 and so on, and the Motherboard will need the exact same socket to be compatible with the CPU.

CPU Cooler

 

Anything that draws power also produces heat and the CPU produces lots of heat.

Graphics Card (GPU)

 

Next up is the Graphics Card. Its purpose is the calculation of anything having to do with visuals and outputs these visuals (Images, User Interface, GUI) onto the Monitor.

Memory (RAM)

 

Random Access Memory (RAM) is the temporary thinking storage part of the Computer if you would compare it to a brain.

Storage (HDD / SSD / NVME SSD)

 

Because RAM can’t store anything without power and we do want to be able to turn off our computer from time to time, we need a storage medium that retains its stored data, even when the power is off.

Monitor

 

You will, of course, need some kind of display device such as a monitor to be able to see what’s going on. Monitors come in all kinds of sizes, color, resolutions, aspect ratios and so on.

Input Devices

 

Don’t forget a Mouse and Keyboard! 🙂 There are lots of other Input devices such as Graphic Tablets or Pens that you can also use, of course.









 

ADVANCEMENT IN WINDOWS OPEARTING SYSTEM


STARTING FROM WINDOWS 97 WHAT ARE THE ADVANCEMENT IN WINDOWS OPEARTING SYSTEM AND WHAT ARE DIFFERENCE BETWEEN THEM?

Windows 98 (June 1998)

Windows 98 offers support for a number of new technologies, including FAT32, AGP, MMX, USB, DVD, and ACPI. Its most visible feature, though, is the Active Desktop, which integrates the Web browser (Internet Explorer) with the operating system. From the user's point of view, there is no difference between accessing a document residing locally on the user's hard disk or on a Web server halfway around the world.


Windows ME - Millennium Edition (September 2000)

The Windows Millennium Edition, called "Windows Me" was an update to the Windows 98 core and included some features of the Windows 2000  operating system. This version also removed the "boot in DOS" option.

Windows 2000 (February 2000)

Often abbreviated as "W2K," Windows 2000 is an operating system for business desktop and laptop systems to run software applications, connect to Internet and intranet sites, and access files, printers, and network resources. Microsoft released four versions of Windows 2000: Professional (for business desktop and laptop systems), Server (both a Web server and an office server), Advanced Server (for line-of-business applications) and Datacenter Server (for high-traffic computer networks).

Windows XP (October 2001)

Windows XP was released in 2001. Along with a redesigned look and feel to the user interface, the new operating system is built on the Windows 2000 kernel, giving the user a more stable and reliable environment than previous versions of Windows. Windows XP comes in two versions, Home and Professional.  Microsoft focused on mobility for both editions, including plug and play features for connecting to wireless networks. The operating system also utilizes the 802.11x wireless security standard. Windows XP is one of Microsoft's best-selling products.

Windows Vista (November 2006)

Windows Vista offered an advancement in reliability, security, ease of deployment, performance and manageability over Windows XP. New in this version was capabilities to detect hardware problems before they occur, security features to protect against the latest generation of threats, faster start-up time and low power consumption of the new sleep state. In many cases, Windows Vista is noticeably more responsive than Windows XP on identical hardware. Windows Vista simplifies and centralizes desktop configuration management, reducing the cost of keeping systems updated.

Windows 7 (October, 2009)

Windows 7 was released by Microsoft on October 22, 2009 as the latest in the 25-year-old line of Windows operating systems and as the successor to Windows Vista (which itself had followed Windows XP). Windows 7 was released in conjunction with Windows Server 2008 R2, Windows 7's server counterpart. Enhancements and new features in Windows 7 include multi-touch support, Internet Explorer 8, improved performance and start-up time, Aero Snap, Aero Shake, support for virtual hard disks, a new and improved Windows Media Center, and improved security.


Windows 8

Windows OS - Windows 8
Windows 8 was released on August. 1, 2012 and is a completely redesigned operating system that's been developed from the ground up with touchscreen use in mind as well as near-instant-on capabilities that enable a Windows 8 PC to load and start up in a matter of seconds rather than in minutes.
Windows 8 will replace the more traditional Microsoft Windows OS look and feel with a new "Metro" design system interface that first debuted in the Windows Phone 7 mobile operating system. The Metro user interface primarily consists of a "Start screen" made up of "Live Tiles," which are links to applications and features that are dynamic and update in real time.  Windows 8 supports both x86 PCs and ARM processors.

Windows 10

Windows 10 is Microsoft's Windows successor to Windows 8. Windows 10 debuted on July 29, 2015, following a "technical preview" beta release of the new operating system that arrived in Fall 2014 and a "consumer preview" beta in early 2015. Microsoft claims Windows 10 features fast start up and resume, built-in security and the return of the Start Menu in an expanded form. This version of Windows will also feature Microsoft Edge, Microsoft's new browser. Any qualified device (such as tablets, PCs, smartphones and Xbox consoles) can upgrade to Windows 10, including those with pirated copies of Windows.

Background processing after enterning a link in the browser.

Let’s imagine that you want to access maps.google.com to check the exact time it would take for you to get to your dinner reservation from work-

1. You type maps.google.com into the address bar of your browser.

2. The browser checks the cache for a DNS record to find the corresponding IP address of maps.google.com.

 DNS(Domain Name System) is a database that maintains the name of the website (URL) and the particular IP address it links to. Every single URL on the internet has a unique IP address assigned to it. The IP address belongs to the computer which hosts the server of the website we are requesting to access. For an example, www.google.com has an IP address of 209.85.227.104


In order to find the DNS record, the browser checks four caches.
● First, it checks the browser cache. The browser maintains a repository of DNS records for a fixed duration for websites you have previously visited. So, it is the first place to run a DNS query.

● Second, the browser checks the OS cache. If it is not found in the browser cache, the browser would make a system call (i.e. gethostname on Windows) to your underlying computer OS to fetch the record since the OS also maintains a cache of DNS records.

● Third, it checks the router cache. If it’s not found on your computer, the browser would communicate with the router that maintains its’ own cache of DNS records.

● Fourth, it checks the ISP cache. If all steps fail, the browser would move on to the ISP. Your ISP maintains its’ own DNS server which includes a cache of DNS records which the browser would check with the last hope of finding your requested URL.

3. If the requested URL is not in the cache, ISP’s DNS server initiates a DNS query to find the IP address of the server that hosts maps.google.com.


4. Browser initiates a TCP connection with the server.

Once the browser receives the correct IP address it will build a connection with the server that matches IP address to transfer information. Browsers use internet protocols to build such connections. There are a number of different internet protocols which can be used but TCP is the most common protocol used for any type of HTTP request.

5. The browser sends an HTTP request to the web server.

 Once the TCP connection is established, it is time to start transferring data! The browser will send a GET request asking for maps.google.com web page. If you’re entering credentials or submitting a form this could be a POST request.

6. The server handles the request and sends back a response.

The server contains a web server (i.e Apache, IIS) which receives the request from the browser and passes it to a request handler to read and generate a response.

7. The server sends out an HTTP response.

The server response contains the web page you requested as well as the status code, compression type (Content-Encoding), how to cache the page (Cache-Control), any cookies to set, privacy information, etc.

8. The browser displays the HTML content (for HTML responses which is the most common).

The browser displays the HTML content in phases. First, it will render the bare bone HTML skeleton. Then it will check the HTML tags and sends out GET requests for additional elements on the web page, such as images, CSS stylesheets, JavaScript files etc. These static files are cached by the browser so it doesn’t have to fetch them again the next time you visit the page. At the end, you’ll see maps.google.com appearing on your browser.

 

 

 

 



 

Safety measures when connected to net,not connected to internet and while using Wi-Fi

I. While using Wi-Fi 

The risks of free Wi-Fi

Using public Wi-Fi isn't unlike having a conversation in a public place: Others can overhear you. If you don't take precautions, information your devices send over a public Wi-Fi network goes out in clear text — and anyone else on the network could easily take a look at what you're doing with just a few simple software tools.
Someone spying could easily pick up your passwords or other private information. If you use the same password on multiple sites, that could be a big problem. This is the biggest concern with public hotspots.
The next potential problem is what is called a honeypot. Thieves might set up their own Wi-Fi hotspot with an unassuming name like "Public Wi-Fi" to tempt you to connect so they can grab up any data you send. These are easy to set up without any kind of special equipment — it could be done just using a laptop or smartphone — so you could run into them anywhere. News reports about honeypots pop up once or twice a year.

How to stay safe on public Wi-Fi


1. Know your network

Before you connect, be sure you know whose network you're connecting to so you don't fall prey to Wi-Fi honeypots. If you're not sure what the public network at a business is called, ask an employee before connecting. And check to make sure your computer or smartphone is not set up to automatically connect to unknown Wi-Fi networks — or set it to ask you before connecting — so you're sure you know what you're connecting to when you connect.

2. Keep your connection secure

Make sure to connect to websites via HTTPS, which encrypts anything you send and receive from the website. While a VPN service encrypts everything you send, HTTPS ensures that communication to and from a particular website is secure. To verify if you're connected via HTTPS, look at the address bar of your browser window; you should see "HTTPS" at the beginning of the web address (or, on some web browsers, a lock icon). Looking for HTTPS isn't enough, though. Hackers have been able to acquire legitimate SSL certificates for sites with names that are slightly off those of major financial institutions and also bear the HTTPS at the front of the URL. Site names include banskfamerica.com, paypwil.com and itunes-security.net. It's always better to type the url in yourself versus clicking on a link you receive in an email.

3. Use a VPN

If you use a VPN service, anyone trying to steal your data will see only encrypted data, even if you're connecting to sites using HTTP. There are many services that can do this. Based on our own testing, as well as third-party analysis, such as PC Mag, we recommend NordVPN  VPN services charge a fee for their use, with pay packages ranging from day passes to year-round protection. Keep in mind that services like Netflix may not let you connect if you're using a VPN service. Check out our tips on how to use a VPN and still access Netflix.

4. Use two-factor authentication

Whenever you can, use two-factor authentication, which requires both a password and a secondary code that changes regularly, for websites. This makes it very difficult for hackers to get at your accounts because even if they can get your password, they won't have the secondary code. Though not all services support it, many popular sites offer this level of security including Google, Facebook, Twitter, LinkedIn, Apple and Microsoft.

5. Disable file sharing

Make sure your computer isn't configured to share access to files or be seen on public or guest networks. When you're at home, it may be convenient to keep things in a folder you share with other members of the household, but that's less safe when you're connecting to public Wi-Fi.
Disable sharing in:
  • Windows 10: Go to Control Panel > Network and Internet > Network and Sharing Center > Advanced sharing settings. Turn off file and printer sharing and network discovery and save changes.
  • Windows 8: Go to Control Panel > Network and Internet > View network status and Tasks > Change advanced sharing settings > Turn off file and printer sharing and network discovery> Save changes.
  • Windows 7: Go to Control Panel > Network and Sharing Center > Change advanced sharing settings > Home or Work > Turn off file and printer sharing > Save changes.
  • Mac OS X: Go to System Preferences > Sharing and be sure that File Sharing doesn't have a check mark by it.

II. When connected to net


I Will Think Before I Post
I agree not to post information and images that could put me at risk, embarrass me or damage my future, such as cell and home phone numbers, home address, sexual messages and inappropriate pictures or videos.

I Will Respect Other People Online
I will not post anything rude, offensive or threatening. I will not send or forward images and information that might embarrass, hurt or harass someone. I will not take anyone’s personal information and use it to damage his or her reputation.

I Will Be Careful When Meeting Online Friends in Person
I agree to ask my parent or guardian’s permission before going, have a parent or guardian accompany me or meet in a public place.

I Will Protect Myself Online
If someone makes me feel uncomfortable or if someone is rude or offensive, I will not respond. I will save the evidence, tell my parent, guardian or another trusted adult and, when appropriate, report it to the website, cell phone company, CyberTipline.com or the police.
 
Keeping your personal information safe and your etiquette appropriate may keep your body, family, finances, future job aspirations and friendships whole, healthy and safe. Check out the these resources on cybersecurity and smartphone safety helpful security information.

III. When not connected to net

 

Be Careful What You Download

A top goal of cybercriminals is to trick you into downloading malware—programs or apps that carry malware or try to steal information. This malware can be disguised as an app: anything from a popular game to something that checks traffic or the weather. As PCWorld advises, don't download apps that look suspicious or come from a site you don't trust.

Keep Your Antivirus Program Up To Date

Internet security software cannot protect against every threat, but it will detect and remove most malware—though you should make sure it's to date. Be sure to stay current with your operating system's updates and updates to applications you use. They provide a vital layer of security.


DIFFERENCE BETWEEN HUB, ROUTER AND SWITCH?SUGGEST WHICH IS BEST FOR YOUR UNIVERSITY?

The difference between hub, router and switch is-




Hence, at the end I conclude that for University purpose a hub can be used.

DIFFERENCE BETWEEN MINI, MICRO, MAINFRAME, SUPER AND WORKSTATION COMPUTER


Micro computer
Micro computer are general purpose computer also called PC. They are used at our homes. Micro computer can handle one user at a time. These computer are used for documentation, making power point presentation , printing tasks and other usual tasks that u all know.
micro computer
Super Computer
Super computer are those which can perform trillion of operations per second. They are very costly and are used for:
  • testing nuclear explosion
  • micro biology task like how proteins can be usual for us
  • operations on space
  • weather forecasting
  • Sophisticated animations
super computer
Mainframe computer
Mainframe computers are those which can handle 100 of user at a time. That mean we cannot run Pc operating system on mainframe. Mainframe computers have special operating system that can handle parallel user processing, transactions and time sharing. These computers run best run on linux operating system. In mainframe computers there are many processors working and integrating with each other. Like host processor, back-end processor and front-end processor. Host processor give instructions to back-end and front-end processors. Back end processor get record from the storage. Front-end processor sends the data to the interconnected users
mainframe computer