Monday, 3 December 2012

Samsung Galaxy S3 (Samsung Flagship Phone)


December 03,2012
Samsung Galaxy S3 is a Smartphone designed and manufactured by Samsung Electronics and was released on the 29th May, 2012. It is the immediate successor of Samsung Galaxy S2. More than anticipated, its design, configuration and features show a very wide gap between it and its immediate predecessors. It s slogan goes thus: “Designed for humans, inspired by nature”.

It has continued to receive encomium from the public, its users and top popular Mobile review experts due to the peculiarity of its features and Operating System as compared with it contemporaries or competitors.

Samsung S3 Smartphone release was greeted with a massive reception and sales which could be attributed to a number of factors as will be seen in the course of this review. It was reported that there was over 10 million pre-release orders by about 100 Carriers and over 20 million was sold within the first 100 days of its release. As at 2nd November, 2012 thirty Million units have been sold.

This kind of reception will normally give one the cause to find out why? What are the features that made it so peculiar and credit its manufacturer as the foremost Mobile phone manufacturer as at the time of its launch. This earns it European Mobile Phone of the year 2012-2013 from European Imaging and Sound Association.

The Operating System on release was Android 4.0 also known as “Ice Cream Sandwhich”. However it was upgraded to Android 4.1 also known as Jeally Bean in the month of September, 2012.

Samsung Galaxy S3 has a quad-Core processor and 1.5GHZ cortex-Krait . This informs the no-delay attribute in switching from one application to the other. Off course this is necessary because of its multi-task environment with its ability run a number of applications concurrently. You could be busy with a task why at the same time on the screen watch a movie optimised into the size that allow both application to run same time.

This is why some reviewers refer to Samsung Galaxy S3 as somewhere in between a Tablet and a Smartphone. It has 1GB RAM (International Version) and a 50GB drop box capacity. Its internal storage capacity ranges from” 16GB, 32GB and 64GB. It can accommodate 64GB micro external memory which is about the largest at the moment unlike Apple gadgets limited to internal storage.

It has 136.6mm height, 70.6mm width and 9mm thick. It weighs 133g, 4.8inch AMOLED Screen ( 720x1280p). This dimensions made it slightly wider than Samsung Galaxy S2 whose screen was 4.2inch and also a departure from Galaxy S2 square shape by its diagonal outlook. And it’s kind of high resolution multi-touch screen made room for a clearer hovering around and at an angle that made visibility as good as a Minicomputer or a Tablet.

Samsung Galaxy S3 has a rear camera of 8mega pixel and on the front 1.9mega pixel. The Video is 1080p. It has 4G LTE support and active noise cancellation with dedicated Mic. The Battery life is fantastic at 2100mah.Came with SNS integration, TV-out via MHL H/V Link.

An amazing unique feature of eyes tracking that is the light stays on when you look directly at the screen and it automatically dial the number once selected and put on the ear. This is made possible through proximity sensor and detection. This also informed the reason why it vibrates when pick up indicating that there is a notification.

Despite that it is available in more than six colours; the Pebble Blue Colour is in a very high demand more than anticipated especially in the US. Other colours include Marbel White, Garnet Red, Saphire Black, Titanium Gray and Amber Brown.
Samsung Electronics is accused to have violated two of the patent right of Apple Inc, by the design of the Samsung Galaxy S3. And as a result Apple has requested the court in charge of the existing lawsuit against Patent right violation between it and Samsung to include Galaxy S3.

Feel free to make your comments. How would you rate Samsung Galaxy S3?



Thursday, 8 November 2012

How to use Wi-Fi on BlackBerry Smartphone


November 08,2012
One of the many privileges of the BlackBerry Smartphone is Wi-Fi connectivity which can be used for surfing the internet instead of the 3G network without incurring cost for data usage. Many users have acclaimed this to be faster and able to access bigger files than the 3G network.

The Wi-Fi is a term used to describe devices that are certified and enabled to exchange Data with other Wi-Fi or internet enabled devices using radio waves or with wireless connection within Wi-Fi network coverage areas. This also includes high speed internet connection. This is why Wi-Fi is interchangeably used for wireless local area network (WLAN) as defined by the Wi-Fi alliance.

The following are the steps required to use Wi-Fi on BlackBerry Smartphone:

1. Go to menu Click on manage connections and highlight the Icon for Wi-Fi connection.
2. Click on the icon next to Wi-Fi, this will turn it on.
3. Click search for available Wi-Fi network within the range of the location.
4. When the network of choice is highlighted, a password will be requested if it is a secured network or network that need authentication.
5. Enter the network password to gain access to Wi-Fi.
6. If you wish to select a network without authentication, that is a public Hotspot, select show open networks only.

If successful, Wi-Fi icon will show on the Home screen instead of EDGE.
If this is not working, make sure your “default browser” is change to “Hotspot Browser”. This will help to automatically connect to Wi-Fi when the network is detected.




Tuesday, 6 November 2012

The BlackBerry PlayBook


November 06,2012
The BlackBerry Play Book is the first design and entrance into the Tablet Computer industry by Research In Motion (RIM). It is long awaited innovation expected by RIM Fans who naturally are addicted to the purchase and use of RIM devices despite of its short fall sometimes back.

In the eyes of many, it is a temporary setback going by the giant strides and achievements of the Company in the Smartphone industry at least the ability to maintain such dominance for about a decade with its attendant qualities.

The essence of this discourse is to review how much of these expectations were met by the release of the BlackBerry Play Book, which was officially launched on April 19th, 2011. Of course there are already big players in the industry before this release like Apple ipad. So users have enough platform and basis for comparison.

The BlackBerry Play Book Operating system is based on QNX Neutrino acquired by Research In Motion. It was first released in April 19, 2011. A revised edition of its Operating System was released in February, 2012. As a result of the “rocky start to life” witnessed by the BlackBerry PlayBook, a number of adjustment was made after it’s launched. There were a number of applications that was apparently absent in the new BlackBerry PlayBook such as standalone email, Calendar and third-party applications.

The BlackBerry PlayBook has to rely on the BlackBerry Smartphone through BlackBerry Bridge for this functionality. Perhaps the aim for this by RIM is that BlackBerry devices devotees will have no option than to possess both devices. However this was contrary to expectations from the sales report at launch and the immediate period that ensued.
The new Operating System 2.0 serves as a system software upgrade to correct inherent shortcomings of the BlackBerry PlayBook. With the release of this Operating System, the third-party applications such as the Android applications can now be downloaded from the BlackBerry application world Store.

The Operating System 2.0 encompasses an integration of an email, Calendar and contacts applications. It however does not integrate BlackBerry Messenger application. The BlackBerry Bridge application Software via the BlackBerry Smartphone still has to be employed whenever there is the need to use the Messenger. This is expected to be improved upon during subsequent updates.

The BlackBerry PlayBook has 3MP front camera and 5MP at the rear. The video recording capacity for both is 1080p and a micro HDMI video output. It has a high resolution 7inch screen display(1024 x 600 px,WSVGA),0.38inches thick,7.6 inches high and 5.1 inches wide. It has micro HDMI and USB port, three pin charging unit. Texas OMAP 4430 Duo core 1GHZ CPU, 1GB RAM. It weighs 425g which make it very handy as compared to other Tablets of the same class.

In terms of Data protection, The BlackBerry PlayBook stands out as the most secured as it operate on the same level of data encryption as the BlackBerry Smartphone. This made it the first Tablet to receive FIPS 140-2 Certification.

Research In Motion is of the hope that the market share of its Tablet will do better with the passage of time as management result to go back to the drawing board. The expectations before the lunched of the Tablet though were not achieved as commented by some users relative to its competitors such as the Apple ipad2. To some reviewers, RIM stands the chance of making any difference expected if only given the time and the readiness of management to make necessary adjustments going by history haven enjoy such dominance in the Smartphone market for that length of time.

Feel free to give your comments in this regard.

Sunday, 30 September 2012

The BlackBerry Messenger (Meaning and How it Works)


september 30,2012
The BlackBerry Messenger is software developed by Research In Motion(now BlackBerry) which make instant messaging, voice notes, images and video possible by one BlackBerry Smartphone user to another user. The software may not be present in some models of BlackBerry phones. However, the good thing about it is that it can be downloaded from the device manufacturer website (Application Store) into the BlackBerry phone or device concern.

The BlackBerry Messenger is propriety software of BlackBerry. Its encrypted platform for communication among BlackBerry devices makes it the world most reliable means of communication in terms of confidentiality. This is one of the driving factors for BlackBerry Smartphone market dominance for nearly a decade.

This messaging could be between two users or group of BlackBerry Smartphone users who wish to share messages, photos, music, calendars etc. Group messaging (invite to conference) is made possible with the latest 0.5 version of BlackBerry Messenger software. This newest version can be downloaded from the BlackBerry Application Store.

How BlackBerry Messenger Works

In order for the BlackBerry Messenger feature to work, there are certain factors that most be in place.
1. The BlackBerry Messenger Software most be present, if the need be the latest version at both ends. That is for those wish to use the platform.
2. Open conversation and invite contact. If the recipient name is already stored on BlackBerry messenger. Send a request via the BlackBerry PIN or an email.
3. The recipient of the Ping has to accept the request for the conversation to sail through. If you are in the receiving end, click on the trackball, then click on open and accept. If you don’t want to receive the Ping for whatever reason click on decline.
4. To send your message, click on the contact, select conversation. Then type your message, click on the enter key for the message to be sent.

There is a need for a valid BlackBerry Data plan for BlackBerry instant messaging to be free. What do you know about BlackBerry Messenger, feel free to comment or give your observations.






Saturday, 22 September 2012

What is BlackBerry Ping? (Definition and How to Ping BlackBerry)


september 22,2012
The meaning of BlackBerry Ping is most often asked by those who are not conversant with the device. BlackBerry Ping is a term use to refer to the mode of drawing the attention of another Blackberry user as to their availability. This could be for the purpose of instant Messaging, chat through the BlackBerry Messenger, voice note, exchange of video and images.

The BlackBerry Ping facility is one of the features that make the BlackBerry Smartphone unique. The multi-task characteristics of the operating system environment of a BlackBerry Smartphone are interwoven or interdependent. For example the BlackBerry PIN is required in order to Ping. The PIN will be useless if not connected to the various functions it facilitates such as the BlackBerry Messenger.

How to Ping with BlackBerry Smartphone

The following are are the simple steps required to Ping a BlackBerry device:

1. The recipient name most be stored on BlackBerry Messenger.
2. Open a conversation, locate and click on the recipient name.
3. Hit the Menu button.
4. Click on the option requesting to Ping contact. It will then show that the recipient has been pinged.

The BlackBerry user will receive the Ping as a text Message. The recipient has to accept the Ping for the conversation to sail through. Usually the Ping will be received even if the phone is in silence. The phone may vibrate or ring, it depends on how the user customises it.

Feel free to comment on your experience with BlackBerry Ping or how to Ping a BlackBerry Smartphone .






What is BlackBerry PIN?


september 22,2012
What is BlackBerry PIN is a common question by those who are not conversant with the device. The word PIN is an acronym for personal Identification Number. Relative to BlackBerry device, BlackBerry PIN is an eight digit hexagonal number by which a BlackBerry Smartphone and user is identified. Each PIN is unique to a BlackBerry Phone and usually it cannot be changed.

The BlackBerry PIN is used to draw the attention or relate with another BlackBerry user for instant messaging, chats, voice notes, videos and images. The PIN is tracked by the BlackBerry Enterprise Server and The BlackBerry Internet Service. It is with the instrumentality of the BlackBerry PIN and its identification with the Enterprise server that make it possible for email to be received in BlackBerry Smartphone.

BlackBerry Smartphone users can send and receive PIN to PIN messages different from the conventional SMS text messaging, therefore it is not charged for such. This is one of the peculiarities of the BlackBerry phone network.

Up to ten supported email addresses can be accessed by the BlackBerry email services program. These include services from Gmail, yahoo mail, AOL etc. The BlackBerry PIN through the use of BlackBerry PUSH services automatically direct the delivery of emails to BlackBerry device once they arrive at the user inbox.

The BlackBerry PIN functionality relative to other Smart phones is only peculiar to BlackBerry software and any device that is compactable with BlackBerry operating System Software.

The BlackBerry PIN can be kept secret if one so desire. Although there are cases when some individual complain about BlackBerry PIN hackers. Findings revealed that often it could be as a result one’s carelessness.

Feel free to comment on your findings on BlackBerry PIN. No one has a monopoly of knowledge and information. You can also subscribe to our RSS feeds for continuous update.
.

What is BlackBerry Smartphone ?


september 22,2012
The BlackBerry Smartphone is a Phone that both serves as a personal digital Assistant(PDA) with the characteristics of regular phone.The BlackBerry Smartphone for close to a decade maintains dominance in the Smartphone market. The first BlackBerry phone Model (850) made its appearance in the market in the year 1999, manufactured by Research in Motion (RIM) now known as BlackBerry .

The first model of BlackBerry was a single colour screen interface (Monochrome) with a scroll wheel located in the right edge axis of phone which made it possible to navigate through to the different settings of the phone.

However remarkable changes has take place from what then was a simple two pager phone to a more sophisticated BlackBerry Smartphone device in software, hardware design , operating system and market share. Four years later, after that the first BlackBerry phone debut, BlackBerry Smartphone gain popularity and huge market share dominance because of its kind of software superiority within the phone and how it operates across the network.

The BlackBerry Smartphone main tool for market penetration apart from other features was its prowess in push email, Internet, wireless information services and the Blackberry Messenger. The encrypted email messages, voice notes, images etc. sent via the BlackBerry Smartphone platform or software could not be unencrypted because it firm control over the software giving it the credence as the most secured instrument for both corporate and individual confidentiality.

Data encryption is a content protection feature of BlackBerry devices. However for this to work it has to be activated. It is a personal choice to determine the extent of protection one wish to install in the device. The phonebook, email messages, Bluetooth etc. can be encrypted. As a protective measure, the pass word and the PIN should be kept confidential as this is the access key to various data storage points in the BlackBerry Smartphone.

The email facility has been extended to other phones models such as some of the Nokia Symbian, Nokia 6820, 9500, The Palm Trio etc (known as BlackBerry email Clients). These phones can relate with BlackBerry Smartphone through the BlackBerry Enterprise servers. The remote advantage of this is more market share for the Research in Motion ‘’GSM magic’’, as it was no longer only BlackBerry devices affair thereby adding more confidence in usage and purchase.

The BlackBerry Central processing unit (CPU) is top class especially for the latest models like BlackBerry Bold 9900/9930, Torch 9810, 9850 and 9860 which all uses Qualcomm Snapdragon MSM8260 at a clock speed of 1.2 GHZ. This is a remarkable development as the speed of all applications is directly proportional to the speed of the CPU.

The BlackBerry operating system is the beauty of the BlackBerry Smartphone. The superiority of any device with a Smart feature is the Operating System. Because this serves as the framework on which every operational software is built. The BlackBerry Operating System is the propriety software developed by BlackBerry for its handheld mobile devices.

The BlackBerry Operating System software has witnessed a phenomenal growth from a simple 1.0 OS for its first two way pager to a more sophisticated BlackBerry 10 operating system. BlackBerry Bold 9790/9900/9930 operates on the 7.0 platform. Also BlackBerry Curve 9220/ 9350/9360/9370/9380 and 9320. BlackBerry 7.1 is an upgrade of the 7.0 version.

The BlackBerry operating system support third party application software but has to be digitally signed by the developer for attribution. With the newest version of BlackBerry operating system, third party software applications like android application player can run on the BlackBerry Smartphone and its latest Tablet in the market unmodified. This is just few among other applications that can be used to manage large data with respect to organisations that operate large scale client data base. Well, this is optional it all depend on individual organisation choices.

For BlackBerry LTD wizardry in its software design which has been usually the distinguishing factor for market dominance in the market for devices with Smart features, the BlackBerry pride of place without prejudice was taken over by Apple iphone according to reports by 2010 relative to market share. The market share of BlackBerry Smartphone dropped. Since then other Smartphone manufacturers such as Samsung, LG and Motorola have made significant statement by gaining increased market share at the expense of the BlackBerry Smartphone.

Though the hope of regaining dominance look blink with the launch of Samsung Smartphone series, Motorola, Android, Windows Phones, and the Apple iphone 5 recent unveiling into the Smartphone market, the terrain looks farther than what will bring immediate recovery for BlackBerry pride of place.

For BlackBerry management and users of BlackBerry Smartphone Series the hope is not lost. Recent reports by BGR in the third week of August 2012, shows a comeback strategy already in place starting from the introduction of BES 10 and BlackBerry 10 devices into the market in first quarter of 2013. The BlackBerry 10 will support current BlackBerry devices including the new BlackBerry Play Book Tablet according to BlackBerry management.

The BlackBerry 10 devices was initially slated to be launched in the last quarter of 2012, but according to the CEO of BlackBerry Thorsten Heins the change in the date is to ensure that quality is not compromised on the platter of trying to keep pace with making appearance in the market and stability.

BlackBerry 10 has been launched along side with BlackBerry Z10 and BlackBerry Q10 unveiled on January 30th, 2013 . This is expected to put BlackBerry on the path of regaining its lost glory and market share. Thorstein Heins debunked speculations that the Firm will be bought over by Microsoft Corporation being optimistic that his Firm will make a successful comeback. Well, I am optimistic. The strategy that gave them such huge market dominance for close to a decade can be experimented again.

Feel free to make comment on BlackBerry Smartphone in terms of latest development. Are you optimistic or do you have any contrary view?


Friday, 14 September 2012

Meaning of Computer Hardware (Definition)

September 14,2012
Computer hardware is the framework or the platform on which the computer software is built. It is that tangible part of the computer that we can see for example the hard disk and floppy disk. Just as the human body have different parts with different functions but all combine to form a whole. The same with the computer system. The computer hardware system has input and output devices, storage unit, Memory, Central processing unit, Control Unit, Arithmetic Logic unit, Power Supply Unit, the Motherboard and the Peripherals. It is when all these different parts function properly that the computer system is optimised.

The Computer Motherboard


This could also be referred to as the circuit board or the main board. As the name implies the computer motherboard serves as the connecting points for virtually every other components of the computer. Any discourse on this subject matter without mentioning the motherboard is not complete. It houses the Memory (the brain) of the computer, the Ram, Rom, C MOS battery, BIOS etc. It has expansion slots such as the PCI, AGP, ISA, PCI-e, PCI-x etc. This provides for more attachments if the need be for additional functions. All the interconnectivity is done on the motherboard attached to the case of the computer.
The motherboard specification have to be compatible with the kind of CPU it uses. There are different manufactures of CPU such as Intel, IBM, AMD and Motorola etc. the same has to do with other parts such as the power supply pack. This is one primary factor to consider when purchasing spare parts .The issue of compatibility most always be considered.

The Computer Housing (casing)



This is a vital part of the computer hardware though it is not most of the time mentioned. The Motherboard is attached to the casing (screwed to it) and components like the Floppy drive have their slots.

The Central Processing Unit (CPU)



The central processing unit of computer hardware is analogous to the human brain. It houses the control unit, the arithmetic logic unit, and the cache memory (storage unit). The entire system is controlled from this point. All the instruction the computer receives are interpreted and given to other units for execution from this point. The control unit extracts instruction from the main memory and interpret it for execution .It maintains a control path for every unit connected to the computer. The CPU because of its size is also referred to as the Microprocessor and interchangeably called the Processor.
A very essential part of the CPU is the Arithmetic Logic Unit (ALU), it performs the computational and the logical operations of the computer system such as multiplication, addition, subtraction, division and logical comparison of data extracted from the memory (storage) unit. It has the ability to set appropriate indicators for each of the data so extracted. The ALU has it reserve area called registers where these functions are performed at a very fast speed.
The storage unit (cache memory) which can also be referred to as the registers is a temporary storage unit before data are processed. This is a high speed cache memory because of its limited space it has auxiliary units where data not yet ready to be processed are stored. Such data are usually reloaded when needed for processing. By implication, there is a continuous communication between the Storage Unit, Control Unit and Arithmetic and Logic Unit which in turn controls other components of the PC. The speed of the Processor will determine the speed of the entire computer system. It is usually measured in hertz via the clock unit in the CPU. A very high clock speed means a high CPU speed.

The RAM
The RAM (Random Access Memory) of a computer is a storage unit that work directly with the Microprocessor. Anytime a program is launched, the Random access memory extracts information or data from the Hard drive for execution. Any data extraction stored in the Hard drive met for use at anytime on the computer system is carried out in the RAM. The Random Access Memory is very fragile and temporary storage unit; at any slight power outage all information or data in it would be lost. However it usage is necessitated on its speed which the Hard drive cannot cope with relative to the speed of the processor. There are basically two types of Random Access Memory, the Dynamic RAM and the Static RAM. The SRAM is faster but DRAM is commonly used because the former is very expensive. However both of them are very fragile. The RAM is also called the main memory alongside with the ROM.

The ROM

The ROM is an acronym for Read only memory. The ROM usually contains the manufacturer information termed ‘’read only’’ which cannot be changed. The ROM boot up the computer anytime it is switched on. The content of ROM remains unlike the RAM when there is a power outage.

The Hard Drive
The computer hard drive is also known as the Hard Disk is that part of Computer Hardware that is used to store large volume of data. Modern hard disk has the capacity of storing over five hundred Gig of data. Unlike the temporary storage system of the computer memory the hard disk does not lose its data as a result of a power outage or when the system is switched off. Data can always be retrieved anytime when needed. The hard disk is attached to the motherboard of the system and it is not usually removed.
Removable Data Storage Devices:

1. The Floppy and Compact Disc Drive: These are computer hardware devices with storage facilities that can be removed from the computer. That is the floppy disk and the compact disk can be replaced or changed for ones with higher capacity. However their storage capacity is low as compared with the hard disk.
2. USB Flash Drive: This is also a removable storage device which can store millions of bites. Some can also serve as MP3 player. The system has a number of slots where it can be connected.
3. Memory Card: This is a very common removable data storage facility which can be connected via a data card reader to the computer. In recent times there are memory cards with over ten Gig storage capacities. It is however advisable to use ones with average storage capacity as most makes are subject to breakage and virus infection. This could lead to loss of valuable data if not back up.

The Power Supply Unit
This is a very important unit in the computer hardware system; it is also referred to as the power pack of the system. The power pack is detachable, it is the first point of call in terms of power flow and its type and capacitance will go a long way to determine how well a computer units function with respect to power requirement. The compatibility of the power unit with the motherboard is of utmost importance when considering replacement or spare parts. An expert advice should be sorted for when considering the kind of power back up to employ.

Monitor
The monitor is an output unit of the computer hardware responsible for display of the computer operations. The monitor has a close similarity with the TV. It has a screen which in order to function is connected to the computer motherboard with a data cable. Monitors come in different sizes and resolutions. Most commonly used in recent times are the ones with flat screen and with very high resolutions. The computer display adapter determines to a large extent the number of colours the display supports and how fast the monitor refreshes when in use.

The Keyboard


The input unit responsible for inputting data or information into the computer system with letters, numbers, symbols, signs and buttons is known as the keyboard. The keyboard enables the user to interact with the computer system. A standard keyboard has the Functional keys such as F1, F2…..F12, the alphanumeric section and the numeric cursor keypad.

The Mouse


The mouse is an input facility of the computer hardware externally connected to the computer. It makes navigation with respect to computer usage flexible and easy. The Mouse has two major buttons one on the left and the other on the right. The button on the left is called the primary mouse button. While the one on the right is called the secondary mouse button. When the mouse pointer is navigated to the desired point on the monitor and clicked, the required program, data or file will open. The mouse is usually placed on the mouse pad especially for uneven surfaces. For optimum performance the mouse buttons should always point towards the monitor.

The Speakers

The speaker is an output device in the computer hardware. It main function is to generate sound from the computer. The quality of sound related recording or activity on the PC whether audio or video is felt most when quality speakers are available and connected.

If you found this information useful bookmark this Site and share it with others. Also feel free to make your comment or contribution.



Thursday, 6 September 2012

Meaning of Computer Software (Definition)


september 06,2012
The computer software is the masterpiece of the entire PC. It is the control post that determines how the hardware will function in order to achieve the desired outcome. The command is all encompassing; it is inclusive of the total operations of the Computer.
Computer software is arrived at through a programming language derived and embedded in the source code of the PC. It is from this point that a set of system program translate the commands into an executable format (language) that the computer can understand and make available for use. It can be seen as the interface between the hardware and the computer user. It can be sub-divided into two categories. These are System Software and Application Software.

System Software

The system software is programs created to manage the entire computer resources. The control the input and output devices of the PC. The system software has a number of components such as the operating system software, utility software and the programming software. In fact this underlies the basis of the system software. The computer is completely useless without the operating system. Let highlight and discuss this in a considerable detail.

Operating System Software

The operating system software is a set of programs that enable the computer to receive executable instruction such as the storage of data, manage input and output devices and serve as a bridge between hardware and the application software. Examples of Operating systems are:
DOS
UNIX
XENIX
MICROSOFT WINDOWS
MAC OSX
LINKER SOFTWARE
BIOS SOFTWARE
COMPLILER SOFTWARE
LINUX
ANDROID

The operating system has a number of operating modes:

1. Single-User operating system: These are programs that allow only a single task to be executed at a time also by one single user on the PC. Example is the MS-DOS.
2. Real-time processing: This is a program that is designed to execute a given task within a set time. This type of program is mostly use by a manufacturing outfit or factories when output is measured and expected (programmed) relative to input within a set time. With this system, machines, engines and other components productivity are determined. Feed back in this process are therefore used to modify and optimised performances in compliance with set goals.
3. Multi-tasking and Multi-user operating systems: This system allows multiple tasks to be carried out at the same time and by more than one user. For example printing and downloading files from different sites at the same time. E.g. UNIX, XENIX etc.
4. Multi-access and Network operating systems: This allow more than one computer system connected together with different users operating under same system program software or single unit. This is achieved through local area network representing terminals and communication cables .E.g. NOVEL NetWare, ETHERNET etc.

Utility Software

These are those computer software programs that bring about optimum performances of the system. It serves as a check on unwanted intrusion into smooth running of the Computer software system by cleansing, analysing, maintaining and configuring the various processes for the desired outcome. Examples of Utility software are disk cleaners, virus scanners, disk drive partition utilities, backup utilities, sidekick etc.

Programming Software

This is the software use for designing and transforming the computer source code into an executable form (object code). The Computer depends on a set of coded instructions to carry out specific tasks intelligently and producing desired results as tailored for different expectations. This is what the programming software is met for.
This set the platform on which other computer depends on to function properly. Computer programming is a sophisticated process which requires knowledge of system algorithms, compilers, interpreters etc. Programming is done with high level language such as the COBOL, FORTRAN etc. The computer software programmer has the obligation of constant researches in this field so as to keep informed on latest development in this regard.

Application Software

The application software are programs designed to help computer users perform defined and specific task .E.g. Accounting software, graphic software, media player etc.
Different fields of human endeavour such as Medicine, Military, Engineering, Economics, Library Science, Architecture etc have specific application software which they used to analyse and simplify their activities.

Application software can broadly be categorised into two. The horizontal application and the vertical application. The horizontal application has a wider and general usage like the Microsoft word and Microsoft excel. Why the vertical application is narrowed to a specific niche like the accounting software. Examples of application software are as follows:


• Word Processing Application Software: This is the document processing software that make possible for typing memos, letters, curriculum vitae, reports, spelling check, search for terms, store and retrieve documents etc. Examples of this software are Microsoft word, Word star, Wordperfect, Multimate etc
• Data base Software: This is the software that makes data base operations possible. A data base is an organised compilation of structured data, which allow a systematic storage and retrieval system. Examples of data base software are oracle, clippers, paradox, MS access etc.
• Multimedia Software: This software makes it possible to create, play and manage video and audio files. Examples are Real player and Media player.
• Spreadsheet Software: This software is used for activities involving calculations in rows and columns. It is used for the plotting of graph and other mathematical related functions. Examples are Microsoft Excel, lotus 1-2-3 etc.
• Presentation Software: This is the software that is used for formatting, inserting and editing text involving graphics, drawings, images etc. Example of this software is the Microsoft Power point.

Application software can be grouped into a singular suit (Application suite) which consist of applications performing similar or inter related functions. Example is Microsoft Office and Openoffice.org .

Computer Software is a vast topic. Each of these groupings has their sub-divisions that need in-depth knowledge to apply as a software developer. So the knowledge of computer configuration and applications goes beyond mere switching on and off. It comprises of behind the contain elements that may appear a mystery but really has been simplified with recent development and discoveries.

If you find this information useful, feel free to make comment and contribution. You can subscribe to our feeds as more intelligent posts are on the way.

Friday, 17 August 2012

Types of Anti-Virus Software

August 17,2012
With our knowledge of the destructive effects of computer viruses, employing the services of a trusted anti-virus sofware will be worthwhile and worth searching for. There are many types of anti-virus software there in the market, but we shall be describing ten of the most prominent ones. Prominent in the sense that they have been tested and validated over the years by users and reputable experts representing various schools and spectrum in advanced Information and communication Technology.

1. AVG Anti-Virus
This one of the most reliable anti-virus and a front-liner in the market. It can be obtained for free. It has a comprehensive coverage as it is both anti-virus and anti-spyware. Unlike previously, AVG 2012 version comes with a firewall against any attempt to destroy the internal security of a system by saboteurs or hackers. It has been validated that this version is faster and Can be downloaded and ready for use in a about five minutes. Also Incorporated with it is a free internet security. Upgrading for a paid version will yield greater result.

2. Norton Anti-Virus
This has proven to be the World most trusted anti-virus. Its virus and malware detection and removal is not common place. It has the facility to automatically scan a system every week using symantic security technologies. In the process it deletes any virus detected. This replaces the traditional method of scanning manually. It has a free and paid version. Norton 2012 version is fortified further with a higher internet security features and a less than two minutes download and ready to use time.

3. Mc Afee Anti-Virus
Mc Afee is known as one of the most popular anti-virus. Its peculiarity is such that it offers all encompassing ant-virus coverage for viruses and spyware with a very strong internet security feature. Although it has a free version, it is advisable to subscribe to the paid version in order to gain access to the periodic updates. It has a proven highly optimised virtual environment security.

4. Bitdefender Anti-Virus
The 2013 version of this anti-virus software could be said to be the most comprehensive one ever because of its peculiar features such as firewall, parental control, protection against internet security threats, anti-spam, antispyware, and device anti-theft protection suites .It uphold the system internal security and block unwanted traffic. It is rated as one of the top five anti-virus software in the market and the 2011 winner of the ‘Editor’s of choice’ award from PC MAG.

5. Kasperskey Anti-Virus
This anti-virus software provides a very comprehensive anti-virus protection against viruses, Trojan horses and spyware. It maximises PC security and enhances optimum performance. It has a proactive detection of unknown malware with high internet security features. It has a schedule automated data backup thereby protecting very sensitive files that would have been deleted. The 2012 version also has remote parental control feature to checkmate kids’ online experience.

6 Avira Anti-Virus
Avira anti-virus is a tested and proven anti-virus with high anti-phishing and privacy protection. It is very good for those who browse the internet often as its online security is unbreakable by internet hackers. In addition it renders automatic scan on schedule with all the features of prompt assessment of all files downloaded or uploaded for viruses, worms and Trojan horses detection and destruction. It’s able to achieve this through its highly acclaimed webguard suit. Avira Antivir 2012 edition (personal Edition) can be downloaded for free-user friendly. For greater features you may need to opt for a paid version.

7. ESET NOD32 Anti-Virus 5
This is also a highly recognised anti-virus with a comprehensive coverage against viruses, worms, Trojans, Rootkits and other malicious software. It offers both online and offline security against any possible threat on a computer system. It has high proactive protection with speedy identification of even virus that is yet to be formally identified. It has a good recommendation for those who use their PC for games downloading and playing as it has high propensity to suspend pop-up notifications and scheduled task scanning while the game is being played. It does this without stepping your way. ESET NOD32 Anti-virus has a free trial and a paid version.

8. Trend Micro Anti-Virus
Trend Micro anti-virus is known for its high tactics in detecting and removal of highly sophisticated viruses, malware and spyware with its online and offline advanced internet security technologies. It renders protection against identity theft and other malicious invasion of individual or corporate privacy. It offers full system and custom scan options which help focusing on critical threat areas thereby reducing average time spent. Trend Micro Anti-virus is amenable to any latest development with respect to PC malicious software threats and security with its referencing threat intelligence in the cloud in alliance with global intelligence network which is able to deliver the latest protection. It renders free trial and a paid version.

9. Panda Anti-virus Pro
This is a name that is beginning to gain prominence in the sphere of PC anti-virus online security among rivals. Its coverage is holistic as per its fight against viruses, worms and malware. Despite of its advanced collective intelligence technology in the fight against malicious software, it is highly user friendly. Panda Anti-virus 2012 occupies lesser space as the data base of its software is in the cloud. This is what enhances its prompt response when a new threat is discovered, in a matter of seconds their clients worldwide are protected.

10. Avast Anti-Virus
Avast anti-virus is a household name with reference to various archival report indicating high success story in the fight against computer and internet security threats. Avast anti-virus 2012 edition has improved and unique features among free software solutions. It has improved automatic sandbox updates for latest definitions instead of going the traditional way. Suspicious programs and files are quarantined and kept inside the sandbox until thorough investigation is carried out with recommendations on how to treat such programs in the future. Offers a safe zone for browsing the internet as this is the most potent avenue for virus invasion. It has a trial and a paid version.

11. Defend PRO Anti-Virus
Defend PRO is one of the top ten award winning anti-virus Vendors. It offers one of the most advanced technology in protection against viruses and malware. It has the facility of keeping ones identity online secret from predators and malicious malware designers. The prompt response of its support team 7 days a week on any query relative to quality services rendered, makes them more outstanding than equals.

It is advisable to visit the websites of these anti-virus vendors for detailed information on the packages they offer and perhaps their online information desk.The type of anti-virus software one uses matters, I think these above mentioned vendors have proven themselves worthwhile over the years.

If you find this information useful, feel free to drop a comment, findings and even a question. You can share this information online and otherwise. For easy reference bookmark this page and subscribe for more posts.


Thursday, 16 August 2012

How to Remove Virus from Infected Computer

August 16,2012
A study on how to remove virus from infected computer is worthwhile. Computer Viruses can be deceptively evasive. If for whatever reason a system became infected with a virus, there are number of measures that can be taken to remove it. First and foremost a proper diagnosis as to be carried out so as to know the type of virus and component of the computer it has affected. Without the knowledge of the severity of the damage done, one can end up proffering the wrong solution or deleting the wrong files.

Virus removal from a PC can be done manually or online. But one has to be very familiar with windows registry and how to view and delete system program and files in windows. The following steps will be useful:
The first step is to boot your system into a save mode, press the f8 function key (this disable most of the start up routine) and run a scan through anti-virus software to identify the type of virus. Is the virus in the operating system or in the applications’ files? The ensuing message will display a couple of suggestions or findings which has to be written down. Viruses that infect applications are easier to remove that than those in the operating system, like the boot sector virus, which may completely deter the system from booting.

In a situation of this nature one has to remove the hard disk from the computer and with the aid of a USB connector, it can be scan and cleaned from another computer machine with trusted anti-virus software. There will be no need to remove the Hard disk if networking tools are available. When the instruction given is followed the virus will be deleted .Help centre from an anti-virus vendor can be visited for clarity of procedure, most of top place anti-virus vendors have almost the same procedure.

Once a virus is detected one have to ensure a back up of the data in the system so they are not completely lost. It is advisable to do a back up for each data as soon as they are uploaded to forestall any eventuality.
But for a situation when there is no anti-virus installed, check through a suspected email attachment or any other means to access the subject of the message or the information received. It should be copied out and mailed to an anti-virus vendor to help identify the type and name of the virus responsible. It will pay more if anti-virus software is installed on the PC earlier to checkmate virus invasion.

The second method is the online approach. There are number of paid or free tools which teaches how to remove viruses from infected computer online.Just do a quick Google search it will bring out a number of options in terms of vendors. After making the choice, a number of steps to follow will be given. Switch on the computer in a save mode. The next step is to download an installer and a cloud-based anti-virus and carry out all the necessary updates. Carry out a full can and delete any references indicative of the presence of a virus and other malicious software. However this has to be done with some degree of caution so that some important files are not destroyed. But just a situation of extreme cases when the files are deleted such as the Microsoft outlook files; it is advisable to consult a professional for a possible repair because the question of the type of window configuration in the affected system will come to play. This will determine the next line of action.

In a situation when it becomes very difficult to eliminate a computer virus, the only final remedy will be to format the system. This entails the removal of everything in the hard disk which includes the virus. This is a technical process which a professional may be employed to do. Because this entails re-installation of drivers, programs, files etc. In most cases if the procedure is not well executed it will impair optimum functioning of the PC.How to remove virus from infected computer should not be an uphill task or cause unnecessary panic if these above steps are judiciously executed.

If you find this article useful, you can bookmark it, share it or even leave a contribution or comment.


Common types of Computer Virus

August 16,2012
Computer Viruses are of various types. Since the mission of the creator of these viruses is malicious and injurious to computer systems a clear knowledge of the Common types of Computer virus is necessary to avert falling a victim. Viruses are coded program or software with the intent of gaining access to a computer machine and performing certain predetermine activities which ranges from collecting confidential information, erasing computer files and programs and for other ulterior motive. The classification of types of computer viruses should not be audacious as there are many literatures with various schools of thought as per their classification. For the sake of simplicity, we shall be looking at two broad categories:
Those that can be executed by the operating system and those that rely on applications before they can get executed.

1. Boot sector Virus: As the name implies, this virus main target are the programs stored in the floppy and hard disk. This can corrupt the programs that make the computer machine to boot or come on; hence the system is completely grounded or crashed. Their task is to run or get executed as the system boot thereby taking control of the entire system. Example of these types of viruses are Polyboot.B, AntiEXE
2. Resident Virus: This type of Virus resides in the Ram of the computer. From this point it can corrupt, interrupt and control other operations in the system. Examples are Mr Klunky, CMJ, Relex-D , Meve etc.
3. Macro Virus: This is one of the most recent types of computer virus that utilises application software macro programming script for the malicious purpose for which it was created. Unlike other virus it does not affect programs, it affects documents. This is usually done by the virus code modifying original instructions on these documents in order to take control of the entire PC. Microsoft word document files are the most infected by this virus. Examples are Relax, Bablas etc
4. File Infectors: Exe or .com files are the target of this virus. The virus can corrupt, change or delete these files each time the program is run. Examples are Cascade and Cleevix.
5. Network Virus: This type of computer virus spread via the internet and through the local network of computers. As long as the computer is in the network it will be infected if not protected. Example is Nimda virus.
6. Logic Bomb: This is the type of coded software that will not operate until certain conditions are met. They are codes that are embedded in the operating system software on the computer. It can be there for a very long time without doing any harm until that particular instruction coded is carried out by the system operator or a specific period of time in the year. At that time the script is activated alongside the normal operation of the computer to execute the purpose for which it was written.
7. Companion Virus: This virus is written in close affinity with existing files in such a way that each time that file is executed it gets activated alongside. They are like the direct action or resident virus. They can wait until that coded action is carried out by the existing files. As they are activated and replicate themselves, they can corrupt and even replace existing file. Example : Asimov virus.
8. Overwrite Viruses: This type of virus deletes or corrupts the files that it infects in such a way that they are rendered partially or totally useless. They can completely lose their original content.The only remedy in removing the virus is to delete files affected completely. Example: Trivial.88.D
9. Fat Virus: The target of this virus is one of the most important part of the computer machine, the section responsible for information dessemination such as the files location directory, amount of space available on the hard disk, unused space etc. The virus can modify the direction or the instruction on this directory in such a way that computer operator will run the virus programme unknowingly while the original files and programs would have been moved or deleted
10. Worms: These are software program that has the ability to replicate themselves like virus with great damaging effects on the computer. It uses computer network to spread when there is security lapses e.g. ExploreZip worm.
11. Trojan Horses: Unlike computer viruses, Trojan horses do not replicate themselves but they are very dangerous and injurious. They have the ability of disguising as useful important software from the surface but can destroy the security and defence system of the computer machine thereby creating loopholes for the malicious intent of the designer to be carried out. Trojans are known for creating access for the invasion of Rootkit virus which disguise as operating system files.
12. Polymorphic Virus: This is a very deceptive type of virus. Apart from the fact that it possesses the ability to replicate itself very fast, in that same process it changes its digital signature. It guards itself with an encryption algorithm that changes its codes under prescribed conditions. So it becomes very difficult to detect it by a less sophisticated anti-virus software. Example is 1260 virus.
13. Multipartite Virus: This type of virus exploits every possible means to spread or replicate itself. In other words it can operate and spread in multiple ways using the operating system and files. The strength the virus exacts also depends on the type of programs and files install on a computer machine.
14. Browser Hijacker: This type of virus can infect a browser by modifying and redirecting an operator completely to sites not intended for malicious gains. Such viruses can later infect other parts of the operating system and files through attachments and other materials downloaded. Example: Coolwebsearch etc.
15. Web Scripting Virus: Websites uses various codes to enable it display certain features such as the ability to play an online video, music, applications etc. A virus can exploit this means to infect and gain control over the entire system.

The list of the Common types of Computer viruse goes on as it is a continuous discovery. Once an existing virus is detected and dealt with, malicious virus designers will always go back to the drawing board to device means of modifying existing ones and creating new ones. The best means to forestal becoming a victim is to be on the guard by installing appropriate anti-virus software.

Feel free to ask for more information, question and comment through the various means provided abelow. Subcribe to our Rss feeds to receive instant updates from this blog.

Friday, 10 August 2012

Symptoms of Computer Viruses

August 10,2012
As a computer user there is the need to be familiar with the operations and functionality of computer machines generally. This will help early detection of anything strange as the computer is used. Computers are of different makes and configuration hence the speed and the programming varies. However, when there is abnormal behaviour of a PC it calls for examining the cause and the possible remedies. Below are symptoms of computer viruses and their effects on PC:

1. Abnormal Short Down: When a computer system often shut down abnormally apart from a power outage, there is the tendency that there is a virus infection.
2. Abnormal Booting: The system may not boot normally either it takes a longer time, or the user may have to reboot it over and over again.
3. A complete blackout: A virus infection may be responsible for this especially when it happens frequently.
4. Files slow to Open or Deleted Automatically: When files get deleted automatically and very difficult to open. When an application become corrupt when uploaded.
5. Hardware Malfunctions: When some of the hardware operates without a command, like the CD Rom opening and closing by itself.
6. Program Launches automatically: Programs or files opening by itself without the user operation or command.This could be a symptom of Computer Virus infection
7. Computer Freezes: When the PC completely freezes. This sometimes may take a very long time to boot or even to switch off.
8. Abnormal noises: When a system makes abnormal noises often, the presence of a computer virus should be probed.
9. Error messages: When error messages show often in the cause of using a computer machine.
10. Difficult to open or close a browser window: A browser window may become very difficult to open or close. In some cases an unauthorised browser switches on and behaves erratically by opening pages that are not originally installed or commanded.
11. Email sent automatically: An infected system can through a browser send unauthorized emails to addresses stored in an email account and even to strange addresses. Such email attachments could be infected with virus. Spam messages could also be received from strange addresses.
12. Task Manager Indicate Exhausted Memory: This message comes up even when there is nothing of such. It is an indication of computer virus.

Please be informed that some of these symptoms of computer viruses indicated above can also be as result of hardware fault. So a proper diagnosis should be carried out. It is pertinent to mention that the surest means of avoiding these symptoms is to install trusted anti-virus software and do a backup for your files and programs.

If you find this post useful, share it with others through the means provided below. Bookmark it and express your observation or contribution.

Computer Viruses: Causes and Solution

August 10,2012
Computer virus can be described as a software programme coded with the ability of replicating or reproducing itself with an ulterior aim which can be harmful to files, programs and the entire computer machine. It is a program that can alter the normal operation of a computer machine.The ability to replicate itself is intentional by the designer because the more the computer machines are infected by the virus the greater chance for them to achieve their intent. I think this is a simple answer as to what a computer virus is.

It depends on the type of virus, some may not be harmful but this is still debatable and unacceptable by computer anti-virus professioners. Computer virus when unattended to can wreck untold havoc has they have the ability of erasing very important files from your computer, access personal or confidential information, corrupt existing files and can completely crash a computer machine.

The programming of virus infected software is such that the aim of the sender is achieved without your knowledge. A virus can appear as a useful program attached to files, applications and program files usually downloaded from other computers and the internet. The virus-infected files are executable and can open just like any other program and can run side by side other useful applications.

Sources of Computer Virus

Computer virus is designed by a person with the aim of gaining unlawful access to files and program containing other people data and information. It is a means of exploiting loopholes that they may discover for their own advantage. Viruses can be contacted through the following means:

1. Attachment from email: Computer virus can be downloaded alongside an email attachment. You have to know or be sure of the source of any document, program, files and application downloaded on the internet.
2. Removable Storage Device: Virus can be contacted through infected removable devices such as CDs, floppy disk, USB Dongle and other external storage facilities.
3. Through Bluetooth: Infected files transfer through Bluetooth to another computer machine can bring about virus invasion.
4. The type of website: Some Sites are very notorious, referral to a site you don’t trust should be avoided.

Computer virusinfection can be managed and avoided. It pays to take the following precaution than to be caught unaware; the effect can be devastitating especially when the damage has been done. Recently some of these viruses have the ability to reproduce to the extent that they can occupy every available space in your PC internal storage system. This is to prevent you from having space to upload anti-virus and they can be very difficult to delete manually.

They can also affect core operating files and program of your system such as Microsoft windows. The essence is to deter you from access to websites for any possible assistance from your PC as they carry out their ulterior motive. The following measures will be found useful to avert the ugly effects of malicious software invasion:

1. Install Anti-Virus software to your Computer machine: This is one of the most reliable means of avoiding computer virus. There are various types of computer anti-virus; you can find details in my article on Types of Computer Anti-Virus. Antivirus can be strong or weak. Ensure that your system has a very strong and trusted antivirus that is equal to the task because some computer viruses can be very evasive. This has to be updated as required by the vendor of the software. You can also do well by scanning your PC manually regularly to discover any possible infiltration of unwanted files and programs.
2. Installation of Firewall: This prevent your machine from unauthorised access to sensitive files both when you are online and offline. Hackers are all over the place, it deter them from sending malicious software that can be injurious to your computer system. You can set up both software and hardware Firewall on your machine, it is a strong backup for your anti-virus software as it is the first target of most computer viruses.
3. Attached Documents: As much as possible, read online documents that are in the form of attachment you are not sure of the reliability of the source. Don’t auto-launch your email as this can be dangerous, it can send virus directly into your PC since it is an attached document. If you have such program in your system get it disabled. But if you most necessarily download the document make sure that you scan it before doing so.
4. Scan External Storage Devices: All external storage devices should be scanned for virus before usage irrespective of the reliability of the source.
5. Protect Your Privacy: Once you are through online, make sure you log out either from your email account or your website. Failure to do so can be exploited by hackers.
6. Install Anti-Spyware and Ant-Malware Software: This help continuously to scan for unwanted software or program on your computer machine. No matter how strong any anti-virus is, there is the need for a back up, and that is the function of these software.
7. Automatic Scanning: Ensure automatic scanning of your computer machine when in use. This will help detect any malicious program or file that may find their way into your system. Most of the anti-virus programs have this setting, ensure that you activate it.
6. Computer Expert Services: If you are not very versatile in the operation of computer systems, you should employ the services of an expert with respect to this subject especially for corporate organisations. Don’t be naïve and be a victim of hackers, computer viruses are real. Once your computer system is infected, you will need to employ a computer virus remover. The type of computer virus remover recommended will depend on the kind of virus in question as discussed in my article, Removing Viruses from a Computer Machine.

If you find this post Computer Virus useful, feel free to make comment, observations, questions and contribution. You can bookmark this site for easy access and share it with others.

The Impact of Computer Technology On Education

August 10,2012
There is hardly any facet of Science and Technology advancement without the use of Computer. In fact Computer or ‘’artificial intelligence’’ as it is otherwise called occupies a centre stage when reseaching advancement in Technology. Because it cannot just by-passed if there is a focus of any meaningful impact .

Computer configuration and make are being upgraded constantly to meet emerging trends.The impact of Computer technology on education in recent times is amazing. We can now bring the most advanced machines right inside the convenience of our home; offices and the class room and perform infinite tasks with them unlike what was obtainable with the first generation of computers.

The Computer World is an industry that will never grow old. It permeates every facet of human endeavour, so talking about its impact of Computer on Education we look beyond pupil- teacher relationship in the class room since knowledge is dynamic. Engineers, Economics, Accountants, Architects, Artisans etc, are finding better ways of doing things through advancement in Computer Technology and its applications. The field of Medicine has made tremendous discoveries in diseases diagnoses and treatment through the use of advanced software in Computer Technology.

Clinical consultations and advanced medical procedures are better done in connections with the use of computer automation. This is extended to the classroom and laboratories. So leanings and improvement in this regard is continuous, if not one can grow obsolete. Noticeably, there is a paradigm shift, except we would want to reverse back to the dark ages.

The impact of Computer Technology on education is noticable on how it has revolutionised the learning process. It is easier for the Teacher to impact knowledge with the use of Computer through the aid of audio-visual medium. Power point animation software can be used to present information in an interactive manner, a situation when the Teacher just watch on and do a stress less moderation. This medium makes teaching and learning process more interesting and less tedious. This method has been proven to be very effective at increasing students’ retentiveness and attention span.

Students can now make presentation in a digitalised manner with Computer software that takes learning and presentations far deeper and more comprehensible. It is also easier to carry a PDF or e-book reader than a bulky note or Text books. In the same vein, it is easier to carry and retrieve bulky information through the computer for the Teacher than the stress of lesson notes and text books.

Unlike in the time past, students from different parts of the World can interact simultaneously through the use of computer connected to the Internet. It is possible to discuss and share latest developments in the different fields of human endeavour without necessarily having to travel or through the orthodox means of exchange of information with delays that are unavoidable.

In the course of doing so, such information and knowledge acquired can be stored same time without the hassle of writing which ordinarily would have taken several hours and perhaps a number of information not captured.

We can say that the so called digital-gap between the advanced economies and the developing ones is bridged as a result of impact of Computer Technology on education.

With the wide range of application of computer Technology it has become a compulsory part of our school curriculum. It is not enough to appreciate what a computer can do by been able to switch it on and off it. It is equally imperative to constantly keep abreast with the latest discoveries and developments as it impact on current realities of our daily living.

In time to come, some persons may lose their relevance in their field or career just because of lack of self improvement in this regard; and it is becoming a compulsory requirement to be computer literate in order to be gainfully employed in most establishments.

It is also pertinent to note that if the impact of computer technology on education will be sustained, it has to be a compulsory subject up to the tertiary level and in all facet of learning. I think this informed the reason why in recent times some institutions have made computer literacy a compulsory requirement before gaining admission for further learning as the entire process is digitalised.

Feel free to share and comment on this post. You can also keep yourself updated by subscribing to post from this blog on matters relative to this subject and other crucial posts on Technology which permeates all area of our daily living.







Tuesday, 24 July 2012

The 3.75G Internet Network

July 24,2012
Since the advent of internet services whether on mobile phones or other devices, Internet Data services have witnessed a phenomenal growth and development over the years. 3G is a term used to describe third generation of mobile internet systems. It provides a high speed mobile broadband services such as downloading heavy attachments, video streaming, participating in video blogs, make video calls, download music while enjoying the usual voice call and text messaging. The speed of 3.75G can come up to 42mbps.

If your mobile phone is of lower configuration you will find it impossible to download bulky or heavy attachments and other services that the 3.75G provides. So your device ( phones, Tablets, Modem and Router) have to be 3G enabled to take full advantage of these benefits. The beauty of the 3G network as it progresses is that what you could only do on your computer before, you can now do on the comfort of your mobile phones. Also note that your device has to be configured to browse the internet which could be automatic or done manually. You will find details about this as you go through similar posts on this blog. You will also find other measures or software that will make your internet surfing more enjoyable. For more information on the 3G Network,feel free to contact us on onlinenaija@gmail.com or submit your comment.

Airtel WAP,MMS and Internet Configuration for Mobile Phones

July 24,2012
Airtel WAP,MMS and Internet configuration for Mobile Phones offers one of the fastest and cheapest internet services via mobile cell phones with a continuous improvement. It is necessary to keep abreast with these developments in order to take full advantage of it. As soon as a registered Sim Card is inserted into a cell phone, if the phone is compatible with over the air configuration three messages showing WAP, MMS and Internet configuration settings would be received from Airtel.Each of them should be saved. All we need to do is to choose the ''save'' or ''install'' option by pressing the MENU key , click on ‘’save’’ or ‘’install’’.
However if the phone model can not be configured automatically for Airtel WAP, MMS, and Internet Configuration for Mobile Phones there will be the need to do it manually. Navigate to internet connection settings, select network, which is Airtel Gprs this time around, and fill in the following information for the steps that is outlined:

AIRTEL WAP
Homepage URL---http://airtellive.com
Bearer----GPRS
APN-------wap.ng.airtel.com
User name---wap
Password----0000

AIRTEL MMS
Homepage URL----http://aitellive.com
Bearer-----GPRS
IP address---- 192.168.175.184
APN---------mms.ng.airtel.com
User name-----mms
Password------ 0000

AIRTEL INTERNET
Homepage URL…..http://airtellive.com
Bearer----- GPRS
APN----- Internet.ng.airtel.com
User name------internet
Password----- 0000

For any further query on Airtel WAP,MMS and Internet Configuration for Mobile Phones, contact Airtel customer care on 111 free of charge. You can also contact the Nigeria Technology Archive through onlinenaija@gmail.com. Subscribe to our periodic updates through www.onlinenaijatech.blogspot.com

If you find this information useful share it with friends and family members. Please note that this information may change without any prior notice. It is your duty to update yourself regularly by visiting Airtel website or the Nigeria Technology Archive.Bookmark this Site for easy reference.

How to Configure China Phones To Browse the Internet

July 24,2012
How to configure China Phones to browse the internet before now have always been the concern of users. China phones cannot be configured over the air or automatically to browse the internet at the moment .Though in recent time some come with Google application but in most cases they still have to be configured manually. The dominance of China Phones in the GSM market especially due to its affordability and for the fact that most makes accommodate the use of more than one Sim Cards made it gain so much prominence. This is why an alternative measure as to how to configure them to browse the internet was a welcome development. But note that you may find slight variation in the various steps given by different authors on how to achieve this aim this could be due to modification and use of internet terms by different manufacturers of China Phones. Below are steps you will find useful in configuration of China Phones:

Step 1. Click on MENU
Step 2. Click on Services or Web services
Step 3. Click on Data Account
Step 4. Click on GPRS and edit it
After this you will be given a number options (profiles) choose any , renamed it and set it as default. For example if MTN is your Network, you named it mtn gprs . Fill in the other required information as follows:
APN= web.gprs.mtnnigeria.net
Username = web
Password=web
Authentication Type= Normal
After this click on save. Go back again and click on MENU, then click on services and proceed to click on wap. Select the profile you activated earlier.
Select http as the connection type
-IP Address= 10.199.212.2
Port=9201(for wap) 8080(for html)
Save and activate profile, your China Phone is now ready to browse the internet.
How to configure china phones to browse the internet is not an uphill task. It take a simple understanding of internet terms used by different manufacturers.

Feel free to give your comment and if you find this post useful share it with your friends and family members through your referral to this blog or other means provided . You can subscribe to our periodic updates by logging on to www.onlinenaijatech.blogspot.com. You can also contact us through onlinenaija@gmail.com

Friday, 13 July 2012

GLO Data Bundles for Browsing the Internet

July 13,2012
Below are the Glo Data Bundles for browsing the internet with respect to Handsets, Tablets and Smart Phones. Streaming audio and Video, download applications and chat with Family and Friends on their Data enabled Devices. Data plan can be purchased by the USSD code or through SENDING an SMS code for any of the Data plans to 127.To check Data usage or balance text INFO to 127.

Plans(Instant surf)-Data(10MB)—Price(N100)—Validity(24hrs)—Code(*127*51#)—SMS Code(51)
Plan(Weekly)-Data(50MB)—Price(N400)—Validity(7days)—Code(*127*52#)—SMS Code(52)
Plan(Always Micro)-Data(200MB)—Price(N1000)—Validity(30days)—Code(*127*53#)—SMS Code(53)
Plan(Always Macro)-Data(1024MB)—Price(N3000)—Validity(30days)—Code(*127*54#)—SMS Code(54)

You can call customer care on 121 for any other further query toll free for glo data bundles for browsing the internet or you can text MENU to 127 to get more details about these plans. Subscribe to Nigeria Technology Archive periodic updates through www.onlinenaijatech.blogspot.com or reach us through onlinenaija@gmail.com Please note that this information can change without any prior notice from Globacom or from the Nigeria Technology Archive, it is your duty therefore to constantly visit these websites.

GLO Router Plans

Plan (Silver)- Data(10GB)—Price(N10,000)—Validity(30days)—Code(*127*11#)
Plan (Gold)-Data(15GB)—Price(N15000)—Validity(30days)—Code(*127*12#)
Plan (Platinium)-Data(20GB)—Price(N18000)—Validity(30days)—Code(*127*13#)

With Router you can share GLO Internet access with more than one Laptop or PC. Router can connect up to 100 Laptops or Computers simultaneously. It is ideal for small internet business and offices.

If you find this information on glo data bundles for browsing the internet useful share it with friends and family members. You can also bookmark this site for easy access and for subsequent posts.