Saturday, May 19, 2012
Tuesday, May 15, 2012
NO Technology
What would happen to the world if there's NO Technology
Just imagine a day at school without technology. How would you contact with your friend, teacher or family at another location? Can you access, build, revise or repair without computer or power supply? Can you run tests, analyze data or control variables without a single technological tool? How did you get to learn in school with not heat or light to begin with?
This scenario may seem ridiculous, but I want to make it clear that technology have already affects every aspect of our life. It makes it possible for the work that we do to be more accurate, more efficient, more effective and more supportable.
If we're staying in the house with no TV, no Internet, No phone, no fan or air- conditional, no refrigerator and etc., what will happen to us? We will become lazy, uneducated and useless.
If we go by this, we would only survive at the level of animals. We would not even be able to use rocks to cut flesh open, since that is also a technology. Spears, bows and arrows, hammers and even slingshots would not be used since it is a technology. We would not be able to survive if we went back to before the Neolithic age (New stone era), when we had a technology. We would probably just kill small animals with our bare fists and eating them raw without cook it since fire is a technology and sleeping in the ground and so on. If we cannot even use the six simple machines, then the humanity is doomed to eventual destruction since humans are prepared for survival with mental capability and not physical capability.
Today, we will collaborate using technology to share information that impacts our decisions offline. And we collaborate to consume, we collaborate to entertain ourselves, we collaborate for experiences, for learning, for exercise, for causes, for experiments, for business and for living. Some technologies have been around for a while. Others have only recently been developed.
Technology has always been focused on improving our lives but more recently the technology has made real-time, location-based collaboration possible. Specifically, mobile technology now allows us to interact with online communities from anywhere at any time. It has allowed us to experience the world around us not only through our own knowledge and resources, but through the knowledge and resources of the people around us.
Think about what the world could look like as collaborative technology continues to grow. What will the world look like when you can rely on normal human beings instead of big businesses to provide you with what you need? Not only will the economy be more efficient, but our lives will be enriched because we’re connecting with real people who are all part of one global, collaborative community.
Software that Uses for Preventive Maintenance
There are various types of software for preventative maintenance. Below is the list of software that use for preventative maintenance.
CCleaner
CCleaner is a small, effective utility for computer running Microsoft Windows that clean out the junk that accumulates over time which is temporary files, broken shortcut and other problem. CCleaner can protect your privacy and it cleans your browsing history and temporary internet files. It’s also allowing you to be more confident internet user and less disposed to identity theft. It can clean unneeded files from various programs saving you hard disk space, remove unneeded entries in the windows registry, help you uninstall software and select which programs start with windows.
Function of CCleaner
- · Privacy - Delete passwords, internet files, configuration files and remove system restore points from a shared PC.
- · Security - Clean out files from a PC you’re giving away or selling. You can also wipe free space so the remnants of any files you deleted previously will be erased forever.
- · Speed - Speed up your computer by removing unneeded files. Speed up boot times by reducing the number of programs that start with windows.
- · Stability - Enable Windows to run more smoothly with a clean registry.
- · Space - Free up hard drive space by deleting unnecessary files
Tune Up Utilities
TuneUp Utilities can make your Windows operating system faster, more comfortable and more secure. And all operations performed on the operating system are completely safe, because all changes are monitored by TuneUp Rescue Center. TuneUp Utilities automatically runs important maintenance tasks for you, makes you aware of any problems and offers simple solutions. This ensures performance is always at its best. You can also use TuneUp Utilities to customize the appearance of your Windows system to make working on your computer more enjoyable. TuneUp Utilities can increase the performance of your PC. Programs that are used rarely or never are tracked down, start up processes are shortened and unwanted garbage files are eliminated.
Function of Tune up Utilities.
- · Discover all new features for your PCs.
- · Improve performance and battery life.
- · Take care of your PC and Data Clutter
- · Restore and secure wipe files
- · Analyze and troubleshoot your PC
- · Personalize Window
Avast antivirus
An Avast antivirus software program scans, monitors, protects and secures a computer from the perils and threats of harmful and malicious viruses. The software generally running in the background searches, detects and removes/quarantines viruses and other dangerous malicious software or malware such as Trojans, worms and spyware that may infect a computer. It also can be upgrades and security feature updates ensure protection against new viruses and other malware threats.
Function of Avast antivirus.
- · Real time Protection - It protects your computer from incoming threats.
- · Threat Detection - It can scan your entire computer in search of viruses.
- · Automatic update - Automatic updating is important because an out of date, it will not be able to detect the newest viruses.
- · Alerts - It has an ability to alert you when a program is trying to access your computer.An example would be an online application. Many of the programs that attempt to access your computer are harmless or downloaded voluntarily and thus the antivirus program will give you the option of allowing or preventing the access.
- · Additional Functions.
Saturday, May 12, 2012
PC Preventive Maintenance
Preventive maintenance can be defined as activity performed on a certain schedule which is intended to prevent breakdowns or deterioration. In other word preventive maintenance saves time and money, improves productivity and secures data from exposure to hackers and viruses from internet use. These activities can include regular inspection along with solving any discovered problems and regularly schedules parts changes. In other word preventive maintenance saves time and money, protects your data, improves computer performance and prolongs computer life. Preventive maintenance can be divided into 3 maintenance.
- · Mechanical maintenance
- · Electrical maintenance
- · Software or hardware disk maintenance.
Next is how to do a PC preventive maintenance. Here I will give the PC preventative maintenance checklist.
Things that you should do every day;
- · Run the malware, anti-spyware and antivirus programs at startup.
- · Empty the recycle bin on the desktops
- · Clean out browser files or set the browsing history to zero.
- · Log off your user account
- · Shut down the computer if necessary.
Things that you should do every week;
- · Run disk clean up utility to get rid of temporary files, cookies and other file debris.
- · Check hard drives for errors and capacity with Check Disk Utility.
- · Update malware and anti-virus software to download new virus definitions.
- · Verify all connections to computer workstations printers, networks and other peripheral devices.
Things that you should do every months;
- · Rearrange fragmented files with Disk Derangement Utility.
- · Backup files
- · Restore files
- · Uninstall unnecessary programs.
- · Run windows updates to download patches and updates.
- · Wipe monitor screen with a moist paper towel or cotton cloth.
- · Clean keyboard and mouse.
10 things you should do every year.
- · Go over the inventory lists and update if necessary.
- · Clean air vents, power supply and fan with compressed air or vacuum.
- · Gently wipe the dust off of the computer case, tower, drives and ports.
- · Check condition of surge suppressors and uninterrupted power supplies.
- · Ensure that chips and expansion cards are firmly seated in the slots.
- · Check ports and cable connection and looks for signs of wear on cords and wires to avoid loose connectivity problems.
Things that you should do whenever changes are made;
- · Update backup records of CMOS setup
- · Keep a record of software and operating system installed on the PCs.
- · Keep a record of hardware and hardware settings installed on the PCs.
- · Record when and what preventive maintenance is performed.
- · Record any repairs done to the PCs.
Sunday, April 29, 2012
Straight Through & Cross Over
28th April 2012, We were given our second activity which involved with making RJ45 (Twisted Pair) cable into Straight Through and Cross Over cable.
Twisted pair is A type of cable that consists of two independently insulated wires twisted around one another. The use of two wires twisted together helps to reduce crosstalk and electromagnetic induction. While twisted-pair cable is used by older telephone networks and is the least expensive type of local-area network (LAN) cable, most networks contain some twisted-pair cabling at some point along the network.
RJ45 |
The clip for RJ45 wires |
Cut the end of the wire with long nose pliers |
CROSS-OVER COLOR CODING
STRAIGHT CROSS COLOR CODING
After we finish with rearrange the color, we need to connect the wires with the clip.
Friday, April 27, 2012
World War 1 Technology
Big Bertha |
The Big Bertha was a German initiative put into action before and during the First World War, where artillery started becoming more mobile than in previous wars. the name itself "Big Bertha" is usually associated with many World War 1 large caliber guns.
The female name "Bertha" comes from the descendant of Krupp steel which an arms manufacturer. The Big Bertha could lob 2,200lb shells over 9 miles. The Big Bertha took a crew of 200 men over six hours to assemble and disassemble the weapon.
Its most notable action was against a series of undefeatable Belgium forts. the Big Bertha's lay waste to the forts, demoralizing the allied forces and convincing the Germans to continue exploration into more mobile and more powerful howitzers which included the "Paris Gun where though highly inaccurate which the mighty howitzer that terrorized Parisians from over 70 miles away showing French countrymen that their country was not safe from the war.
This was so effective, the Big Bertha fire killed hundreds and thousands of men. It also blew the ground, which made hiding much more difficult.
Technical Data
- Caliber: 420mm (16.5 in)
- Range: 12.5Km (7.7 miles)
- Projectile Weight: 1763 lbs
- Muzzle Velocity: 400 meters/second
- Length: 6.72 meters
- Crew: 285 men
- Fire speed: 8 rounds per hour
This is the Big Bertha shell:
Tuesday, April 24, 2012
PC tools
This is the PC tools that we use in our CLASS ACTIVITIES which we borrowed it from the college.
Below is the name of each tools.
PC TOOLS |
Extra Screw Uses: Provided extra screw for PC |
Long nose pliers Uses: To pull out the wires |
adjustable spanner Uses: To Fasten/detach nuts or bolts |
Tweezer Uses: To extract any small items |
Chip Inserted Uses: Insert chip into the Motherboard with its flat surface |
Tweezer Uses: To extract any small items |
Pick Up tools |
Uses: To extract any small items
Tweezer Uses: To extract any small items |
Wire Cutter Uses: To cut wires |
Soldering iron Uses: For soldering reel or any CPU parts required |
Flat Head Screwdriver |
Socket Screwdriver |
Phillip Screwdriver |
Sunday, April 15, 2012
Our Third HT Assignment
Assignment 3 |
Class Activities- Assembling and Disassembling the CPU component
Each group can choose only one CPU
Front VIew |
Back View |
We using PC tools to assembling and disassembling all the component in the CPU. The PC tools was provided by college. I will explain the uses of each tools in next post.
PC tools |
View from inside the CPU |
Here is the component that we already take out from the CPU.
Floppy Disk Drive |
CD Drive |
Harddisk |
Heat Sink |
CPU Fan |
Next, after all the component been take out, we need to assembling back the component into the CPU.
Finally, after we assembling all the component in right order, we need to check either it work or not.
Subscribe to:
Posts (Atom)