Sunday, January 11, 2009

Text Formatting Without WordArt

Without WordArt, is it possible to do text formatting(like rotation of text) in MS Word Documents.Do we have any straight command Let us see here.

While preparing the MS Word document, if other readers pay attention to way of text formatting done by user then its a good point for document writer.

Without WordArt, text formatting cannot be done with single command.The following steps have to be used for our own text formatting.

First select the text characters for which formatting has to be done,apply your own font style,size and color to selected text.

The selected text is being cut using Ctrl + X keys or by cut option in Edit menu.

After this, in Edit menu select "Paste Special" option.In the Paste Special Window,select "Picture" option and paste the text in desired location.

Now your text portion has become a picture and it is being merged with document.

In the edge of picture, there are handles. You can use it for rotation, diminishing, elongating processes.

Thus now the selected text is formatted in your own way and can grab special attention of the document Readers..

Sunday, January 4, 2009

Timing in Computers

We set the correct date and timings in computer for the first time.Then after it works fine.But when computer is switched off and restarted again, it displays the wrong timing.

Let us see the reasons for why there is wrong display of time in next boot..

In computers, there is an internal clock. This internal clock needs electricity.This clock is referred as Real Time Clock.

For this clock, a small battery gives power even if the computer is shutted down.

In computer motherboard, this battery resembles a one rupee coin which gives power supply to the Real Time Clock.

If this battery does not work in computer motherboard, then there can be wrong display in date and time.

When computer is turned off, then due to battery malfunction, the Real Time Clock stops functioning.

Thus if this small battery(resemblance of one rupee coin) is changed, then correct date and time can be obtained in every boot..

Printers and UPS

We are connecting computer components with UPS But why printer is noted connected to UPS.By connecting, do printers become problematic ah.. Let us see the reason..

We can connect printer to UPS but subjected to some conditions. Compared to Computer,Modem,Telephones, Printers consumes more electricity for its printing process.

Especially Laser and Inkjet printers need more electricity. In home and some small organizations one computer and printer is used. So for this process UPS of power capacity 0.6 KVA to 1 KVA is being used.

If power cut occurs, and if the printer is being used then at a time power supply to both computer components and printer cannot be provided by UPS.

Moreover in computers, we may be handling/viewing some data information,if power shut down occurs then these data cannot be saved (or sometimes programs can crash).

So for these reasons,simply computer is being connected to UPS without printers. If higher end UPS of power capacity 5 KVA is used, then both computer and printed can be connected to UPS.

Thus we must be aware about power capacity of our UPS. By knowing the exact capacity (in KVA) then accordingly the computer components and printers can be connected to UPS without any problems..

What is Cyber ?

The word "Cyber" was coined by Norbert Weiner. From the word "Cybernetics", he has derived this word.

Cybernetics in turn is obtained from the Greek Word "kubernetes". Kubernetes refers to meaning of Steersman or Governor.

A man or device associated with computers are referred with cyber these days.Cyber use has increased in day to day life now.

Let us see some of the examples where the word Cyber is associated with :

Cybernetics - is the interdisciplinary study of the structure of regulatory systems. Cybernetics is closely related to control theory and systems theory.

Cyberspace - is the global domain of electro-magnetics accessed through electronic technology and exploited through the modulation of electromagnetic energy to achieve a wide range of communication and control system capabilities.

Cybercrime - generally refers to criminal activity where a computer or network is the source, tool, target, or place of a crime.

Cyber warfare (also known as cybernetic war or cyberwar) - is the use of computers and the Internet in conducting warfare in cyberspace.

Cyber espionage - is the act or practice of obtaining secrets from individuals, competitors for advantage using illegal exploitation methods on Internet, networks or even computers.

Cyber counter-intelligence - are measures to identify foreign operations that use cyber means as the primary tradecraft methodology, as well as foreign intelligence service collection efforts that use traditional methods to gauge cyber capabilities and intentions..

Microsoft Powertoys

Powertoys are default programs with some additional features.Once the programs are released, then also programmers work on it and release the enhanced version of the same program in their website.These enhanced versions are called the Powertoys.

Microsoft also provided powertoys for its Windows XP Operating System in website.Powertoys can be downloaded from the link

Download Link

From 2002 onwards, the powertoys are being provided in website.For Windows XP, more programs are being added and published in the website.Let us see some of the powertoys programs

Power Calculator :
Its a powerful calculator.Apart from the scientific calculations, lot of conversion formulations are available.We can also view the history of the calculations(operations performed).

Image Resizer :
After installation, you can resize your photos to desired size. More than one image can be resized at a time.

CD Slideshow Generator :
Using this powertoy, you can view images from CD/DVD in slideshow manner.This powertoy even works in all Windows 9x versions.

Virtual Desktop Manager :
From Windows taskbar, four or more virtual desktops can be managed at a time.

Taskbar Magnifier :
Using this powertoy, a part of screen can be magnified. This process of magnifying can be done from Taskbar too.

Web Camera Timershot :
If your computer has web camera, then this powertoy helps in generating photos in particular intervals of time and stored in folders.

Tweak UI :
If you are using Windows XP, then you are not allowed to access all the system settings. By using this powertoy, mouse settings,explorer settings, taskbar settings are displayed in addition to normal display.

Some of the other Powertoys are
Alt-Tab Replacement, Open Command Window Here, HTML Slideshow Wizard, Clear Type Tuner, RAW Image Thumbnailer, Sync Toy, Color Control Panel Applet, etc..

By using this enhanced versions of the normal Windows Programs, much amount of time is being saved..

Thursday, January 1, 2009

Extensions (*.*)

There are 100+ file extensions in computer technologies. So for particular extensions, which application can be used is determined by users only (not in easy manner).

In our computer system, a file with particular extension is first determined and analyzed by Windows(or any operating system in this case) accordingly it uses application to open the file.In windows, certain file extensions are not defined.

In such case,that unknown file extension is first double clicked and then windows list out certain applications for opening the file.

For listing applications, Open With dialog box appears and from that user has to select the application.

In order to determine which application for which extension, you can refer many websites.There is a website with web address

Go to Link

in which if type the extension, the application names are listed for that particular file extension. Here the website of the organization(which developed the application for the particular extension file) is also given so that user can download applications from website and can run that particular file extension.

Thus user is getting relieved of issue of unknown file extensions..

TWAIN

When users try to access the Digital Camera in Computers, then sometime error message stating "Not TWAIN Compliant" is obtained. Let us see Whats TWAIN

TWAIN is nothing but an industry standard. This name refers to a kind of technology. All Graphical devices like Scanner, Digital Camera, Web Camera uses this technology for communicating with computers.

If a new graphical device is not defined according to TWAIN then it cannot be accessible in computers. In that case it need a special software for data communication.

In such cases, the manufacturer has to provide CD for installing software and the specific drivers for proper interaction between computers and device (Driver Software acts as bridge between device and computers).

After installation of the software in computer, the images and videos can be transferred. For example using Microsoft Word, the TWAIN technology can be implemented and communication can be done with computers from digital camera.

Likewise softwares like Word Perfect, Adobe Photoshop, Omni PagePro can implement this technology.

Many of us dont know where this TWAIN name is derived from. Some have defined it with an interesting name "Technology Without An Interesting Name (TWAIN)"..

Use Toggle Keys Option

Whenever we type characters, accidentally we click the Caps Lock key thus next characters appear in Capital letters(Uppercase). To overcome this problem, a clear solution is given below.

Caps Lock, Scroll Lock, Num Lock are all keys with two functions. If Kept On they perform certain actions and when kept Off perform certain other actions. Thus by the use of toggle keys, user can hear some sounds from keyboard if the keys like Caps Lock is pressed accidentally.

For enabling the use of toggle keys the option is given as follows :

Go to to Control Panel, In that select Accessibility Option. In this there are various tabs, out of these select the first window (which is the Keyboard Window).

In this Keyboard window there are three parts. In that select third part which show Toggle Keys.From that just click the checkbox "Use Toggle Keys".

Hereafter, if Caps Lock or Num Lock is being pressed then sound is heard. This sound can keep users alert of characters change(meaning changing in the case of letters Upper or Lower)..

Insert Key for Pasting

In Keyboards, There are many toggle keys. Here Insert Key(Ins) which is also toggle in nature is discussed for some actions.

Insert Key also can perform two kinds of functions.First being inserting the text in between two or more texts.This insertion does not affect the nearby text.

The second being if insertion is done then selected text is being replaced.

We can also set a special function to Insert key (Ins). We copy the selected file or folder using the Ctrl + C keys.And for pasting we use either "Paste" command or Ctrl + V keys.

For this pasting, Insert key can also be used. For enabling such option, Go to Tools menu and click Options. Then from the various tabs select Edit tab. In that just tick the checkbox showing "Use the Ins Key for Paste" then click OK.

Thus after copying files, then in your desired folder press Insert Key (Ins) for pasting..

Internet Terminologies

In day to day life we hear a lot of words (or) terms associated with Internet.Some of these Internet based terms are explained as follows :

Adware :

Used for publishing software based Ads in websites (web pages)

Auto Responder :

Program used for sending ready made e-mails (e-mails being sent to user automatically). If you are leaving for tour and wont be available for ten days(say) if some of your friends send e-mail, then this program send e-mails (ready made messages created by user) to your friends automatically.

Bandwidth :

The rate at which data(information) is being transmitted in the network.

Browser :

Software used for getting, retrieving data from Internet.

Buffer :

Data is stored in temporary storage area. This buffer is being used by programs, printers, CD/DVD Writers etc.. stores data in buffer and retrieves back whenever necessary.

Cache :

This is also a temporary memory. This is used for temporarily storing the website based data information. When user visit the same website, then stored information is retrieved and shown to user through web browser.

Cookies :

Program used for storing some website information in our computers. Thus website identify users in easy way and accordingly services are being provided.

Domain Name System (DNS) :

System used for converting the user given string web address to computer understandable numeric address. Each website has its own DNS systems.

Netiquette :

Whenever we are communicating with other users in network certain etiquette has to be followed.

QuickTime :

Apple Computers invented this multimedia program. Using this program creating, editing and processing of audio and video is possible.Whenever you are trying to view video then this add-on program is must in web browser.

Trace Route :

In Internet connection, this command is used to trace communication between two or more computers. This command must be executed in MS-DOS prompt. This traces the communication of computers by referring the web servers.
Custom Search