Premium Essay

Computer Use Tips

In:

Submitted By smusmed
Words 614
Pages 3
கம்ப்யூட்டரைப் பயன்படுத்தும் ஒவ்வொரு முறையும், நாம் கூகுள் தேடல் சாதனத்தைப் பயன்படுத்தாமல் இருப்பதில்லை. இணையத்தில் நமக்கு வேண்டிய தகவல்களைத் தேடிப் பெறுவதில், கூகுள் நமக்கு பெரும் உதவி செய்கிறது. இந்தத் தேடலை இன்னும் விரைவாக மேற்கொள்ள கூகுள் சில குறுக்கு வழிகளை நமக்குத் தந்துள்ளது. அவற்றில் சிலவற்றை இங்கு பார்க்கலாம்.

இணைய தளம் கட்டளை (The site: command):

இந்த ஆப்பரேட்டர் மூலம், நாம் நமக்குத் தேவையான தகவல்களை, ஒரே ஒரு தளத்தில் மட்டும் தேடும்படி செய்திடலாம். எடுத்துக் காட்டாக, tamilrockers இணைய தளத்தில் மட்டும் software என்ற சொல்லைத் தேடுவதாக இருந்தால், software site www.tamilrockers.com எனக் கொடுக்க வேண்டும். இந்த கட்டளையானது, tamilrockers இணைய தளத்தில் மட்டும், software என்ற சொல் உள்ள பக்கங்களைத் தேடித்தருமாறு கேட்கிறோம். இதனால், மற்ற இணையதளங்களில் இந்த சொல் பயன்பாடு உள்ளதா என்ற தேடல் மேற்கொள்ளப்பட மாட்டாது.

குறிப்பிட்ட வகை தளங்களில் மட்டும் தேடல் (inurl:command):

இந்த ஆப்பரேட்டர் கட்டளை மூலம், நாம் தேடிப் பெற விரும்பும் தேடலை, குறிப்பிட்ட வகை தளங்களில் மட்டும் தேடும்படி அமைக்கிறோம். எடுத்துக் காட்டாக computer resources என்ற சொற்கள் சார்ந்த தகவல்களை, கல்விக்கென உள்ள தளங்களில் மட்டும் தேடிப் பெற வேண்டும் என விரும்பினால், computer resources inurl:edu என்று கொடுக்க வேண்டும்.

விளக்கம் வேண்டும் தேடல் (define: “word”):

தேடல் கட்டத்திலேயே நாம் சிலவற்றிற்கான விளக்கம் மற்றும் விரிவான குறிப்புகளைத் தேடிப் பெறலாம். ஒரு சொல் துல்லியமாக என்ன பொருளைக் கொண்டுள்ளது என்று நீங்கள் தெரிந்து கொள்ள இந்தக் கட்டளையைப் பயன்படுத்தலாம். எடுத்துக் காட்டாக, super computer என்பதற்கான விளக்கம் தேவை எனில், define: super computer என்ற கட்டளையைக் கொடுக்கலாம்.

குறிப்பிட்ட சொல் உள்ள டெக்ஸ்ட் பக்கம் மட்டும் தேடிப் பெற (intext command):

இந்த ஆப்பரேட்டர் கட்டளை மூலம், ஒரு குறிப்பிட்ட பொருள் குறித்துத் தேடுகையில், குறிப்பிட்ட சொல் பயன்படுத்தப் பட்டுள்ள இணையப் பக்கங்களை மட்டும் தேடிக் காட்டச் செய்கிறது. எடுத்துக் காட்டாக, soup recipes என்பது குறித்த தகவல்களைத் தேடிப்

Similar Documents

Premium Essay

Thesis

...Teacher Tip #1 Students can record themselves reading a book from their home computer. Have them record a favorite story with bells or dings to signal page turning (the Next button) and allow younger siblings to listen to the read-aloud while following along. Teacher Tip #2 When students have read and listened to all books in their assignment/level, assign a running record for a Benchmark Book or Benchmark Passage to determine student accuracy and readiness to move to the next level. (If Raz-Kids is used during centers, have the student record their reading.) Teacher Tip #3 Use the Assignment report to see at a glance how much of the current assignment a student has completed and whether it may be time to assess a student's reading progress. Teacher Tip #4 Giving students access to the Book Room will help build listening comprehension, increased awareness of differing text structures, and broader vocabulary as students listen to books at higher levels. Teacher Tip #5 Play Raz-Kids songs on an interactive whiteboard during class transitions, and challenge students to be cleaned up and in their seats or in line before the song is complete. Teacher Tip #6 Use the correlation chart to help determine which level of books to assign to a student based on their grade or known guided-reading level. Teacher Tip #7 Include a date in a custom assignment title as a reminder of when a student was first given a particular assignment or when resources were updated. ...

Words: 1015 - Pages: 5

Free Essay

Intro to Computer Security

...Name 4 Security Tips that the end user can implement. For this week`s task we have been asked to name four security tips that users can do themselves to help protect their computers. The four security tips that I have selected to discuss are; update Windows software, use strong passwords, run a virus scan on a schedule, and update virus definitions daily. Describe the goal of each security tip. Windows update should be run to make sure that your computer has the latest patches. These updates are designed to close security holes that have been found in the operating system and hopefully will help guard your computer from getting infected or hacked. Strong passwords can be very helpful in slowing down or even defeating different attack methods of compromising the user`s computer. Users should think of passwords like a lock on their door, a strong password will make a strong lock. A hacker`s software toolkit will most likely include an offline dictionary, this automated program can quickly identify simple and commonly used passwords. Running a scheduled virus scan should be done by anyone who has a computer. If the user is running AVG for their anti-virus it is pretty easy to set up a scheduled scan. The user can just right click the AVG icon in the system tray, select the tools menu > advanced settings > schedules. From here the user can set the day and time for the schedule to run. It can be set to run a scan once a week or each day. This software scans for any viruses...

Words: 803 - Pages: 4

Free Essay

Bamboo

...Contents Index 1 User’s manual for Windows & Macintosh ® ® Using a pen Customizing your pen Troubleshooting Using a tablet Customizing your tablet Digital inking Contents Index 1 Contents Index 2 Bamboo™ User’s Manual for Windows® & Macintosh® English version 1.2, March 03, 2008 Copyright © Wacom Company, Limited, 2008 All rights reserved. No part of this manual may be reproduced except for your express personal use. Wacom reserves the right to revise this publication without obligation to provide notification of such changes. Wacom does its best to provide current and accurate information in this manual. However, Wacom reserves the right to change any specifications and product configurations at its discretion, without prior notice and without obligation to include such changes in this manual. Reuse, recycling, and recovery. You are urged to recycle this product when replacing it with a newer product or when it has outlived its useful life by bringing it to an appropriate collection point for recyclable materials in your community or region. By doing this, you can help improve the environment of your community as well as minimize the potential negative effects created should any hazardous substance that may possibly be present within waste material reach the environment during the disposal process. Within the European Union, users are required not to dispose of Waste Electrical and Electronic Equipment (WEEE) as unsorted...

Words: 15849 - Pages: 64

Premium Essay

Proper Hand and Nail Care

...2 mins3 mins 30 secs2 mins | IntroductionMake this exercise fun and interactive as possible. Divide the learners into 2 teams. 1 team will be given a set of artificial fingernail tips to wear along with instructions on how to put them on and the other team of learners will not be given artificial fingernail tips. Give both groups bowls of flour and water and instruct them to make small balls of dough with these materials. Do not allow the first group to remove their fingernail tips and do not allow the learners to leave the area and/or wash their hands until they have completed the exercise. Once the balls of dough have been created, allow the learners in team 1 to remove their fingernail tips and then wash their hands. Collect unwashed nail tips and dough samples and tell learners you will explain the results of this activity at the end of the lecture. Video: INFECTION. Don’t be the one to pass it on * For germs to enter our bodies to cause disease and infection, they must pass through a portal of entry, whether it is an eye, ear, nose, mouth, cut, incision or any other bodily orifice * As we saw in the video, when germs enter through these portals they mostly come from our fingertips when we eat, scratch, or blow our nose, and not from the back of our hands or palms. * Nails trap all sorts of germs and debris, and these germs mostly reside under the nails.OpeningFingernail length self-test * Hold your hand up with your palm facing towards you * Can you see the fingernail...

Words: 1837 - Pages: 8

Premium Essay

How to Properly Maintain a Computer

...EN130.1.1 English Comp II Assignment # 4 September 27, 2013 How to properly maintain a personal computer In order for a personal computer to stay fast and be reliable, it must be properly maintained. A computer can stay in good condition if it is well taken care of. Common sense and the knowhow can keep your computer running smoothly for many years. We know dust and bacteria are things we cannot avoid, for this reason we need to constantly dust our homes. Well it goes the same for a computer. Dusting the mouse, keyboard, and the screen keeps your computer running faster. Every few months it’s also good to open the casing of the computer and remove any dust particles inside to keep the cooling fan functioning properly. The hard drive is main part of a PC. It is where all the files are stored; therefore, cleaning the hard drive and defragmenting it is necessary to keep the computer from slowing down and freezing up. To do this process, just go into your computers programs, find accessories and click to system tools. Go to defragment and start the process. This should be done every two to three months to keep your computer in top shape. Be sure you have good antivirus software installed in your computer and make sure it is always updated. Viruses are among one of the main causes of computer failure. You should do a complete virus scan on your computer regularly. Also a good way to avoid viruses is to avoid visiting websites that are suspected to be...

Words: 557 - Pages: 3

Free Essay

Sample Report

...------------------------------------------------- Sample report Click on the highlighted text to see the comments. Computer systems computer systems Assignment 1 - Topic: scanners Date:  Student name:  Student number:  Tutor name:  Tutorial time: Abstract This report investigates the current state of scanner technology and examines the predicted future advancements of scanners. A brief history of the scanner and its operation is initially outlined. The discussion then focuses on the advantages and limitations of the five main types of scanners in common use today: drum, flatbed, sheet-fed, slide, and hand held scanners. The performance of these scanners is examined in relation to four main criteria: resolution, bit-depth, dynamic range and software. It is concluded that further technological advances in these four areas as well as the deployment of new sensor technology will continue to improve the quality of scanned images. It is also suggested that specialised scanners will increasingly be incorporated into other types of technology such as digital cameras. Table of contents | Abstract | i | 1.0 | Introduction | 1 | 2.0 | How scanners work | 2 | 3.0 | Types of scanners | 2 | | 3.1 | Drum scanners | 2 | | 3.2 | Flatbed scanners | 2 | | 3.3 | Sheet-fed scanners | 2 | | 3.4 | Slide scanners | 3 | | 3.5 | Hand held scanners | 3 | 4.0 | Scanner specifications | 3 | | 4.1 | Resolution | 3 | | 4.2 | Bit-depth | 4 | | 4.3 | Dynamic range...

Words: 2638 - Pages: 11

Free Essay

Report

...Computer systems computer systems Assignment 1 - Topic: scanners Date: Student name: Student number: Tutor name: Tutorial time: Abstract This report investigates the current state of scanner technology and examines the predicted future advancements of scanners. A brief history of the scanner and its operation is initially outlined. The discussion then focuses on the advantages and limitations of the five main types of scanners in common use today: drum, flatbed, sheet-fed, slide, and hand held scanners. The performance of these scanners is examined in relation to four main criteria: resolution, bit-depth, dynamic range and software. It is concluded that further technological advances in these four areas as well as the deployment of new sensor technology will continue to improve the quality of scanned images. It is also suggested that specialised scanners will increasingly be incorporated into other types of technology such as digital cameras. Table of contents Abstract i 1.0 Introduction 1 2.0 How scanners work 2 3.0 Types of scanners 2 3.1 Drum scanners 2 3.2 Flatbed scanners 2 3.3 Sheet-fed scanners 2 3.4 Slide scanners 3 3.5 Hand held scanners 3 4.0 Scanner specifications 3 4.1 Resolution 3 4.2 Bit-depth 4 4.3 Dynamic range 4 4.4 Software 4 5.0 Future developments 5 6.0 Conclusion 5 7.0 Reference list 5 Appendicies 6 Appendix 1 Image Sensor Scanner 8 Appendix 2 Frequently Used References 9 Appendix 2.1 Scanner Tips 10 Appendix...

Words: 2631 - Pages: 11

Premium Essay

Online Shopping

...may not make it in time because of it take so long to deliver. Another problem that you may face is that you don't receive your product at all. This can occur from 2 reasons First,the seller fails to deliver the original product. Second,Items are shipped but delivered to the wrong address In this case, you should check with seller or shipping company if you have tracking no. Next, Let’s see 5 Tips for safe online shopping First, You should start at a site that you can trust rather than shopping with a search engine. However, beware of misspellings or sites using a different domain, for example, .net instead of .com — the sales on these sites might look enticing, but that's how they trick you into giving up your information. Second, you shouldn’t buy from a public computer or through an unsecured wireless connection. Because Computers may save information to speed up your Internet experience. And, if you use a public computer, information such as your browsing history and even your login information may be accessible to strangers who use the computer after you. If you forgot to logout of certain sites, others might be able to access your accounts. And Never shop using an...

Words: 543 - Pages: 3

Free Essay

Toefl Tips

...Go anywhere from here. JAPAN Princeton Economics AustrAliA TOEFL iBT Tips ® United StateS PURDUE U POLITECNICO dI MILANO HONG KONG LAW How to prepare for the TOEFL iBT. www.ets.org/toefl UCLA CANADA ENGINEERING ART FRANCE Teaching YALE Germany MEDICINE U of British ColUmBia MCGILL SINGAPORE UK U OF TOKYO KOREA TOEFL® iBT Tips TOEFL iBT Tips—from ETS . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 4 Open More Doors with TOEFL® iBT, the Key to Academic Success . . . 4 Introduction . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 4 The TOEFL® Test—The Key to Academic Success . . . . . . . . . . . . . . . . . 4 TOEFL Scores Open More Doors . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 4 The New TOEFL iBT . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 4 What’s New About the TOEFL iBT? . . . . . . . . . . . . . . . . . . . . . . . . . . . . 5 Why Were Changes Made to the TOEFL Test? . . . . . . . . . . . . . . . . . . . . 5 About the TOEFL iBT . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 6 Overview . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 6 Format . . . . . . . ...

Words: 20457 - Pages: 82

Premium Essay

Is Technology More Harmful Than Helpful

...Is Technology More Harmful Than Helpful Tammy Pugh English Composition – ENGL 112 Professor Chagala August 14, 2013 Technology has allowed society to accomplish many issues that were not able to be accomplished years ago. It has made a huge impact on the world for the better. Through technology, surgeries were able to be done. Technology also helped aid in the increase of jobs and communication purposes. Despite the positive effects of technology, there are also the negative aspects of as well. Many feel that technology cause more problems than solutions. Regardless of how many feel, technology has brought about improvements in the medical, educational, and communication field. Technology proved to be very helpful in the medical field. It has provided many surgeries to be accomplished. Through technology many are able to carry out surgical procedures. One example of technology being used in the medical field is virtual reality technology. This type of technology “provides surgeons with an environment that seems real but actually is not” (Burke & Weill, 2009). This type of technology allows surgeons to not only plan precisely but practice the operation without touching the patient. Other ways technology improves the medical field is by using tools that minimize the bleeding in during surgery. This results in shorter hospital stays and lower cost. Due to technology, robots were also created for medical purposes. Unlike...

Words: 1204 - Pages: 5

Premium Essay

Buying a Computer Today

...Buying a computer today is a very important thing. Computers are used by many people every day for a variety of reasons. Some use them for work and others for recreation such as gaming. As computers are becoming more widely used, the variety and quality of certain companies varies. Some companies are better than others and every model of computer is different. The important part is finding one to suit the buyer’s purpose. Without a doubt, buying a computer focuses on deciding what kind of computer to buy, doing research on the best, and finally actually buying the computer. To start off, decide on what the primary use of the computer is going to be. Throughout the years since the computers birth, its capabilities have grown exponentially. There is something for everything nowadays. Once that is decided and the purpose is determined the buyer needs to decide if a more portable one is more suitable. Laptops are more mobile, but they are typically more expensive. The hardware in desktops is usually better. This is the primary trade-off that one needs to decide on. Next, research is an important part to determine which computer to purchase. Something important to watch out for is biased sources of information. Typically the company’s website is good for finding the hardware specifics but not very accurate consumer reviews. A magazine can be a good source if it compares many different brands. A good tip is to look at as many sources, reviews and testimonies as possible. The last...

Words: 491 - Pages: 2

Premium Essay

Media

...width, and still find a few specialized uses, but technical pens such as the Rapidograph are more commonly used. Modern types also include ballpoint, rollerball, fountain, and felt or ceramic tip pens.[1] Contents | The main modern types of pens can be categorized by the kind of writing tip or point: A mark made on paper with a rollerball pen, and the tip of that pen * A ballpoint pen dispenses viscous oil-based ink by rolling a small hard sphere, usually 0.7–1.2 mm and made of brass, steel or tungsten carbide.[2] The ink dries almost immediately on contact with paper. The ballpoint pen is usually reliable and inexpensive.[citation needed] It has replaced the fountain pen as the most common tool for everyday writing. * A fountain pen uses water-based liquid ink delivered through a nib. The ink flows from a reservoir through a "feed" to the nib, then through the nib, due to capillary action and gravity. The nib has no moving parts and delivers ink through a thin slit to the writing surface. A fountain pen reservoir can be refillable or disposable, this disposable type being an ink cartridge. A pen with a refillable reservoir may have a mechanism, such as a piston, to draw ink from a bottle through the nib, or it may require refilling with an eyedropper. Refill reservoirs, also known as cartridge converters, are available for some pens which use disposable cartridges. A fountain pen * A marker, or felt-tip pen, has a porous tip of fibrous material. The smallest, finest-tipped...

Words: 1997 - Pages: 8

Premium Essay

Troubleshooting

...TROUBLESHOOTING Common Windows errors and how to fix them I have problems in Windows after installing new software Issue I have problems in Windows after installing new software. Cause After installing any utility, driver, or other software program you can encounter an almost endless list of issues that can be caused by any of the below reasons. 1. Confliction with other software installed on the computer. 2. Issue with program. 3. Improper installation or problems with installation. Solution Reinstall or uninstall the program If you're encountering problems with your computer or other programs after installing new software on your computer, uninstall the program and see if the issues persist. • Uninstalling Windows software. After the program has been uninstalled try installing the program again. • How to install a software program. Note: If after installing a program you're unable to boot into Windows, try booting into Safe Mode. Check for software program updates or new versions If you continue to experience issues verify that the program, game, or utility you're installing doesn't have any updates by visiting the developer of the program website. If you're installing a software program or drivers for a hardware device such as a printer. Get the latest software and drivers from the manufacturer instead of using the included software. A listing of links to drivers can be found on our drivers page. How do I fix illegal operations...

Words: 2688 - Pages: 11

Free Essay

Communication Styles Worksheet

...kinds of hands on workshops that you can sign up for. They have ones for writing, math, computer skills, exam prep and plenty more. Some other resources are the Center for writing excellence and the Center for mathematics, there are grammar tutorials and plagiarism tutorials and a plagiarism checker as well to help make sure your papers have the proper grammar and the plagiarism checker reviews your paper and tells you how much similarities there is with your paper and other papers so you don’t accidentally plagiarize your paper. Riverpoint writer is a tool to help make sure you are citing your papers properly. In the center for mathematics center they have running start which gives you a review of math concepts to help you brush up on your skills, build math confidence gives you tips to deal with math anxiety it also has study tips, test tips, worksheets and videos. They also have live online math coaching which is only available two weeks before your math class starts through the end of your class. Hope reading about all these resources makes you want to come to the University even more. gotta go talk later. Hello Everyone, I want to review some of the great resources available here at the University of Phoenix. First off I want to go over the workshops that are available to you. There are all kinds of workshops, they are 3 days long and they cover subjects like writing, math, computer skills, exam preparations, and many more. Another resource is the Center for Writing...

Words: 431 - Pages: 2

Premium Essay

Mobile Device Attacks

...Mobile Device Attacks and Their Effect on Your Personal Privacy CIS 4680- Security Issues Paper (Group 6) Over the last decade, smartphones have become more and more popular as the new handheld PC. With its processing power catching up with the PC, it brings much convenience to people’s daily life from fast access to latest information to efficient financial activities. However, with this increase in use of these functions, more security threats have aroused surrounding smartphones. As the mobile operation systems in different devices become more, it is opens more possibility for fast virus propagation and large scale damage. There have been several attacks targeting smartphones and it is a trend that hackers are moving the battlefield from PCs to smartphones because of promising profit and smartphones’ limitations for antivirus work. Hackers are migrating to the new smartphone platform for many reasons. Not only is the profit from smartphone hacking increasing, but as more consumers link their personal accounts (email, social networking, financial, etc.) to their smartphones, the private information of the users opens a window of opportunity. Hackers can infect smartphones to record phone calls, send and delete data messages, and spy on your phone’s activity. It does not only pose great security threats, but also causes an economic loss to common users. This definitely becomes a major issue when businesses are also taking advantage of the portable PC power of smartphones...

Words: 3045 - Pages: 13