Wednesday, May 12, 2010

A blog is a type of website, usually maintained by an individual with regular entries of commentary, descriptions of events, or other material such as graphics or video. Entries are commonly displayed in reverse-chronological order. "Blog" can also be used as a verb, meaning to maintain or add content to a blog.
Personal blogs
The personal blog, an ongoing diary or commentary by an individual, is the traditional, most common blog. Personal bloggers usually take pride in their blog posts, even if their blog is never read. Blogs often become more than a way to just communicate; they become a way to reflect on life, or works of art. Blogging can have a sentimental quality. Few personal blogs rise to fame and the mainstream, but some personal blogs quickly garner an extensive following. One type of personal blog, referred to as a micro blog, is extremely detailed and seeks to capture a moment in time. Some sites, such as twitter, allow bloggers to share thoughts and feelings instantaneously with friends and family, and are much faster than emailing or writing.
By media type
A blog comprising videos is called a volg, one comprising links is called a link log a site containing a portfolio of sketches is called a sketch blog or one comprising photos is called a photo blog Blogs with shorter posts and mixed media types are called tumblelogs. Blogs that are written on typewriters and then scanned are called typecast or typecast blogs; see typecasting blogging.
A rare type of blog hosted on the Gopher Protocol is known as a Phlog.
By device
Blogs can also be defined by which type of device is used to compose it. A blog written by a mobile device like a mobile phone or PDA could be called a mob log. One early blog was Wearable Wireless Webcam, an online shared diary of a person's personal life combining text, video, and pictures transmitted live from a wearable computer and Eye Tap device to a web site. This practice of semi-automated blogging with live video together with text was referred to as surveillance. Such journals have been used as evidence in legal matters.

Tuesday, May 11, 2010

How an operating system handles programs directly affects your productivity


Single user and multiuserSingle,tasking and multitasking,Foreground and background,Preemptive multitasking,Multiprocessing.Memory managementoptimizes the use o f RAM,Virtual memoryis a portion of a storage medium functioning as additional RAM,Windows ReadyBoostcan allocate up to 4 GB of removable flash memory devices as additional memory cache.Operating systems typically provide a means to establish Internet connections,A performance monitoris a program that assesses and reports information about various computer resources and devices

Operating systems and utility programs


System software consists of the programs that control or maintain the operations of the computer and its devices.An operating system(OS) is a set of programs containing instructions that work together to coordinate all the activities among computer hardware resources,An operating system includes various shut down options like Sleep mode saves any open documents and programs to RAM, turns off all unneeded functions, and then places the computer in a low-power state and Hibernate saves any open documents and programs to a hard disk before removing power from the computer.A user interface controls how you enter data and instructions and how information is displayed on the screen,With a graphical user interface (GUI), you interact with menus and visual images,With a command-line interface, a user uses the keyboard to enter data and instructions.

Monday, May 3, 2010

POSTING PARTY...


This is all about getting together for those struggling with computers,whether it be typing to understanding your hardware because A computer security risk is any event or action that could
cause a loss of or damage to computer hardware,
software, data, information, or processing capabilityIdentify safeguards against
hardware theft and
vandalism,wanting to discorvering computer fundermentals.Safty and Security Discuss techniques to
prevent unauthorized
computer access and use covered...so are you in or out..you know what it is A POSTING PARTY