Technology
Last modified: 2025-01-22 21:01
It makes sense to open access to hard drives on a computer network of some company to speed up the production process. In order to grant any user the right to dispose of data on any computer on the network, it is necessary to set the address of his computer in the access protocol
Last modified: 2025-01-22 21:01
The latest development from Microsoft is Windows 8 - an improved and updated version of the familiar operating system. Its installation on a computer is also intuitive, but it has some differences from previous versions. Necessary Windows 8 installation disc
Last modified: 2025-01-22 21:01
Oracle is widely used to perform work related to databases in terms of their automation. To resolve problems associated with performing actions in this software shell, it is recommended to visit thematic sites more often. Necessary - Oracle software
Last modified: 2025-01-22 21:01
Operating systems from Microsoft have long established themselves as the most demanded in the software market. There is a wide variety of opinions among many users regarding the best version of Windows. Some people prefer Windows XP, while others prefer Windows 7 or 8
Last modified: 2025-01-22 21:01
It is quite easy to make different page orientations in one document in Microsoft Word. There are two ways to change the page orientation, you just need to choose the appropriate one and follow the simple instructions. There are two ways to make one page landscape in Word and another in portrait
Last modified: 2025-01-22 21:01
The size of the hard disk does not directly affect the power of the computer. But, nevertheless, how much information you can store on your computer depends on its size. After all, even a fairly capacitive hard drive can fill up in just a few months
Last modified: 2025-01-22 21:01
The functionality of a text editor is determined by the ability to fully arrange the entire text without resorting to using other applications - to insert graphic objects, tables, links, symbols. A Microsoft Office Word document can contain printable and non-printable characters and characters
Last modified: 2025-01-22 21:01
When an operating system is first installed on a blank hard disk, it is usually divided into several partitions. In this case, only the system partition is formatted. After a full OS installation, when trying to open other partitions on the hard drive, a notification appears that the drive is unformatted
Last modified: 2025-01-22 21:01
If you look closely at the Windows 8 menus, you will find that this OS is even easier to use than its predecessor Windows 7. Creating shortcuts will make working on the computer even more convenient and easier. Many of the features in the latest version of Windows have certainly improved significantly, as has its aesthetic appearance
Last modified: 2025-01-22 21:01
Linux has long ceased to be an unknown system available only for advanced users. Every year this OS is gaining more and more popularity due to the fact that it is becoming simpler and simpler. The same goes for the system installation process
Last modified: 2025-01-22 21:01
Fonts in the operating system do not always work correctly. This is primarily due to the fact that few of them support the Russian language. Therefore, in order to avoid incomprehensible hieroglyphs in the menu, you need to make the appropriate settings
Last modified: 2025-01-22 21:01
The keyboard layout is responsible for the input language. As a rule, in computers for Russian-speaking users, two languages †‹вЂ‹ are configured and ready for alternate use - Russian and English. If desired, the user can add a third language himself and configure the way the keyboard is switched
Last modified: 2025-01-22 21:01
Launching the "Control Panel" or its necessary elements from the command line in the Microsoft Windows operating system belongs to the category of operations for developers and is intended for "internal consumption". However, this procedure can also be performed by a regular user
Last modified: 2025-01-22 21:01
The Windows desktop contains the most necessary programs and tools for the user. One such tool is the Taskbar, a long horizontal bar at the bottom of the screen. The taskbar is almost always visible, in contrast to the desktop, which can be covered by the windows lying on it
Last modified: 2025-01-22 21:01
Recording what is happening on the screen is convenient for many reasons, it can be used to record video fragments that cannot be downloaded, to save game fragments, to shoot videos with instructions, and so on. Necessary - UVScreenCamera program
Last modified: 2025-01-22 21:01
Internet browsers support the ability to disable images. This function is used to save traffic or speed up the process of displaying loaded pages. With this setting, you can enable or disable the display of images from specific sites. Instructions Step 1 In Internet Explorer, to include images, use the "
Last modified: 2025-01-22 21:01
A hard drive is one of the most fragile parts of a computer. It can suffer for various reasons: voltage drops, mechanical damage, built-in defect and others. If one of the hard drive partitions is damaged, use Acronis True Image Home. Necessary - computer
Last modified: 2025-01-22 21:01
The Guest account allows you to restrict access to files and applications on your computer if it is used by a large number of people. A user logged in as a Guest will be able to view shared and personal documents, browse the Internet, but will not be able to install programs and see personal files of other users
Last modified: 2025-01-22 21:01
How do I log into my account using someone else's computer? We will tell you how you can perform such an action, focusing on the example of modern Internet services. Necessary The presence of a username and password or the email address to which the account was registered
Last modified: 2025-01-22 21:01
The "Administrator" user has maximum control over the functions of the computer. Its activation occurs in several ways, some of which involve entering a password. Instructions Step 1 If your computer has an English version of the operating system, use the command line and enter the following command in it:
Last modified: 2025-01-22 21:01
Many applications are designed in such a way that they can run in multiple windowed modes. These are full screen, full screen and resize modes. Each of them is designed to facilitate the use of a particular application. Movies, for example, are better watched in full screen mode
Last modified: 2025-01-22 21:01
It often happens that the program or game you need does not want to run on the installed OS, and you have no desire to reinstall the operating system. What to do? The best solution would be to install two operating systems on your computer, which you can choose when you boot your PC
Last modified: 2025-06-01 05:06
Root is the name of the administrator in the Ubuntu operating system, in other words "Superuser". To change system parameters, install and configure programs, you must enter the password for this user. Necessary - a computer with Linux OS
Last modified: 2025-01-22 21:01
Windows OS customization is mainly done through the user interface. Despite the convenience of using it, its functions are limited, not all parameters of the operating system can be configured with its help. The possibilities for changing OS parameters by editing the registry are incomparably wider
Last modified: 2025-01-22 21:01
The computer is used in almost all areas of activity. One way or another, but you will have to face it. Therefore, learning to work on a computer should be one of the primary tasks for those who are not familiar with it. Instructions Step 1 You can learn how to work on a computer yourself in several ways
Last modified: 2025-01-22 21:01
Spreadsheets created in different versions of Microsoft Excel have a number of properties that can make it difficult to open files. It is worth understanding why files do not open in Excel. Compatibility issues Most often, problems with opening files created in Excel are due to the fact that they were created in different versions of the program
Last modified: 2025-01-22 21:01
Knowing the bios version is necessary first of all for reasons of its timely updating, which will optimize the operation of your personal computer. There are several ways to check the bios version. Read about some of them below. Instructions Step 1 Start your personal computer
Last modified: 2025-01-22 21:01
To make a three-dimensional frame, you need a little patience and handy stationery. The photo is outlined with a pencil, and 4 more rectangles with a width of 1, 5-2 cm are "added" to the sides of the resulting rectangle. Then, the whole structure is cut out, and the narrow rectangles are folded into an accordion
Last modified: 2025-01-22 21:01
: In the process of software legalization, it is often necessary to change the serial number of the software or reinstall it, which is not always convenient and rational, since important settings can be reset or necessary data deleted. It is worth considering the simplest way to change keys without deleting and then reinstalling by means of the operating systems themselves by editing the registry data
Last modified: 2025-01-22 21:01
The product key update utility, available for free download from the official Microsoft website, is designed to edit OS installation settings and check system registry entries. The presence of changes may cause a system warning to appear. Instructions Step 1 Download the specialized utility Key Update Tool from the official Microsoft website
Last modified: 2025-01-22 21:01
Any device, disks, programs are always checked on the computer. This is especially true for disks. It can run every time the computer is turned on. Sometimes this delays the work process, and therefore some users prefer to disable disk check
Last modified: 2025-01-22 21:01
In modern operating systems of the Windows family, logical hard disk partitions can be combined to create a common file storage space. You can also format unallocated areas and create partitions outside the logical drive used by the system. Instructions Step 1 To access the program that is responsible for editing hard disk partitions, click "
Last modified: 2025-01-22 21:01
If a failure occurs on the partitions of your hard drive, the operating system "marks" it as requiring verification. And on the next boot, the system starts an automatic check of the hard disk sectors. Instructions Step 1 If such a check is started every time, then the mandatory check parameter is set, or the hard drive has a malfunction that the system cannot fix on its own
Last modified: 2025-01-22 21:01
After a failure occurs on one of the hard disk partitions, the operating system automatically puts a label on such a disk. Every time the computer starts up, the system scans the boot partition and sees a shortcut to the disk that was once broken
Last modified: 2025-01-22 21:01
Checking the hard disk provides correction of minor system errors, as well as checking and restoring damaged clusters of the hard drive. Together with the defragmentation procedure performed once a month, your hard drive will last as long as possible, while constantly working at high speed, regardless of its level of work
Last modified: 2025-01-22 21:01
Any restart of Windows will automatically launch the Autochk.exe test program. Troubleshooting by this application triggers the chkdsk / f command to check the integrity of the file system. Unfortunately, this process can take several hours or days, which leads to the need to cancel the check
Last modified: 2025-01-22 21:01
The procedure for disabling digital signature of drivers on computers running Windows is standard and does not require the use of any additional software. Instructions Step 1 Call the main system menu by clicking the "Start"
Last modified: 2025-01-22 21:01
Browsing the Internet can pose a real threat to your computer and the data on your hard drive. For this reason, anti-virus programs have become increasingly popular over the past decade. Computer equipment is complex in its structure and every detail of it needs to be protected
Last modified: 2025-01-22 21:01
Adding the selected application to the Windows Firewall exceptions list is a standard procedure on Windows computers. Performing this operation implies the availability of administrator access to system resources. Instructions Step 1 To perform the procedure for adding the selected program to the list of exclusions of the Windows firewall in XP version, open the main system menu by clicking the "
Last modified: 2025-01-22 21:01
Avast is one of the anti-virus programs. Installing and registering it is as simple as possible. There are versions for PC and mobile devices. At the same time, a license for the first year of use can be obtained absolutely free of charge. Avast offers various additional protection options
Last modified: 2025-01-22 21:01
A driver is software that enables devices such as a printer, mouse, video card, etc. work with a computer. Each of them requires a separate driver to work, which can be enabled or disabled as needed using the following procedures. Instructions Step 1 Click the "
Last modified: 2025-01-22 21:01
Despite the fact that today most books have electronic counterparts, not everyone likes to read books from a monitor - many people prefer to buy traditional paper books or print electronic versions to read them on paper. For greater convenience, you can typeset any electronic text so that when printed, it does not differ in any way from the pages of this book
Last modified: 2025-01-22 21:01
Creating a bootable USB flash drive is one of the ways to install the OS on a computer that does not have the ability to boot from disk. This setting is relevant for laptops and netbooks that do not have a floppy drive, as well as for computers that have a faulty disc drive
Last modified: 2025-01-22 21:01
Modern HP notebook computers are not available with Windows XP preinstalled today. This means that when installing it on your computer, you may encounter some errors that can be corrected by changing certain parameters and installing the appropriate drivers
Last modified: 2025-01-22 21:01
Bootable USB drives are created to load the required programs prior to logging on to Windows. This method is often used to install the operating system on mobile computers that do not have their own DVD drives. Necessary - USB storage
Last modified: 2025-01-22 21:01
USB devices are essentially storage media, just like external and internal hard drives. RAM is used for temporary storage of data. It is built into the computer itself, which provides quick access to the information you need. Other media, including flash drives, store data permanently
Last modified: 2025-01-22 21:01
If no one else uses the computer except you, or if you trust other users more than yourself, then there is no point in wasting time on “select a user” and “enter a password” each time you start it. The following describes how to disable the appearance of the standard user selection screen at boot
Last modified: 2025-01-22 21:01
With constant use of the Windows operating system, it is recommended to create special archives. They allow you to restore the operating state of the OS even in the event of damage or loss of the hard disk. Necessary - system image
Last modified: 2025-01-22 21:01
To quickly restore the operating system or an entire disk partition, special images are used. The use of this technology saves a lot of time. Necessary - Acronis True Image; - Windows installation disc. Instructions Step 1 The main advantage of system image recovery is that there is no need to re-search and install programs
Last modified: 2025-01-22 21:01
Sometimes it happens that the address input line disappears from the browser. It's easy to return it - all you need to do is study its interface. The same is true for the address bar in the explorer. Instructions Step 1 If you have lost the line for entering the address in the Opera browser, open the browser appearance settings by clicking on the corresponding icon in the menu
Last modified: 2025-01-22 21:01
Using the "Windows Task Manager", the user can get information about the performance of the computer, about the programs currently running and running processes. To get the information of interest, you need to call the "Dispatcher"
Last modified: 2025-01-22 21:01
Users can place shortcuts to frequently used applications and folders on the desktop. But sometimes there are too many icons, and not everyone likes it. In this situation, you can add some of the icons from the desktop to the Quick Launch bar
Last modified: 2025-01-22 21:01
Computer technology has come a long way in its development. The first computing device was a primitive board with pebbles. But now computers are capable of performing millions of operations per second. Abacus The very first computing device is considered to be an abacus - a board with special depressions, on which calculations were carried out using bones or pebbles
Last modified: 2025-01-22 21:01
The main feature of computer viruses is not their sabotage in itself, but the ability to reproduce itself. Such programs first appeared in the sixties, long before the advent of personal computers. First viruses The first computer viruses were completely unlike modern pests - they were ordinary harmless programs, albeit very self-willed
Last modified: 2025-01-22 21:01
The speed of the computer completely depends on the characteristics of the processor and RAM in the system unit. The bulk of users who want to overclock their PCs begin this process precisely by changing the RAM. Necessary Everest, instructions for the motherboard
Last modified: 2025-01-22 21:01
Surely, computer users often faced the problem of downgrading the software version, since it is rather difficult to replace a later release of updates with an old one. Downgrading the BIOS on Intel-based computers is one of the most confusing and time consuming processes
Last modified: 2025-01-22 21:01
The ReadOnly attribute means that the object to which it belongs cannot be changed by an unauthorized user. For example, if you apply it to a file stored on the hard disk of a personal computer, the user or application program will be able to read its contents, but will not be able to make any changes
Last modified: 2025-01-22 21:01
The need to change the read-only attribute may arise when copying and moving some Windows system files to be able to fully use them. For example, a personal PST file will prevent Outlook from starting normally if the read-only attribute is present
Last modified: 2025-01-22 21:01
Deleting a Windows Live account takes place in several stages. The most common mistake among users of this service is that they forget to delete the associated accounts first, and Windows Live, accordingly, gives an error. Necessary - access to the Internet
Last modified: 2025-01-22 21:01
All files of the Windows 7 operating system are stored on two local drives. To completely remove this OS from the hard drive, you must format both partitions. There are several algorithms to carry out this process. Necessary - installation disk for Windows 7
Last modified: 2025-01-22 21:01
There are several ways to delete unnecessary partitions. At the same time, you can combine them into one large section or make them inactive so that you can access them only in case of emergency. Necessary Paragon Partition Magic, Windows 7 disc
Last modified: 2025-01-22 21:01
Sometimes it is required to install several operating systems at the same time on one computer. They are usually installed on one local hard disk partition. Later, it may become necessary to use only one operating system, but it is not among the installed operating systems
Last modified: 2025-01-22 21:01
A logical disk or volume is a portion of a computer's memory that is used for convenience and is treated as a whole. It does not matter where the data is physically located, the concept of "logical disk" is introduced to unify the entire space of long-term memory
Last modified: 2025-01-22 21:01
Typically, hard drives are split into multiple partitions. But sometimes you need to delete one of the sections to increase the volume of the other. There are several different methods for this. Necessary Partition Manager. Instructions Step 1 It is very easy to delete one of the sections
Last modified: 2025-01-22 21:01
The Windows 7 operating system has a convenient feature that allows you to hide files and folders stored on your hard drive. This makes it possible to hide confidential information, as well as protect important system files from accidental deletion
Last modified: 2025-01-22 21:01
Almost all audio and video are encoded with special programs, which, with a slight loss of quality, can significantly reduce the overall file size. A codec is firmware that a computer uses to decode and play video or sound. Without codecs, the computer will not play at all or play incorrectly most of the multimedia files
Last modified: 2025-01-22 21:01
To play videos on mobile devices, you usually need to change the format of some files. Sometimes an mp3 player or portable DVD player comes with a special software disc. In other cases, it is customary to use universal utilities. Necessary Total Video Converter
Last modified: 2025-01-22 21:01
If you have purchased a new hard drive or you need to connect a third-party hard drive to your computer, this is not difficult to do. Depending on the type of hard drive connection, you may need power cables and a ribbon cable to connect to the motherboard
Last modified: 2025-01-22 21:01
When working with a computer, we perform a large number of simple operations that we do not pay attention to. Power on and off, watching DVD movies, launching programs, and the like. At the same time, we forget that we once performed these operations for the first time
Last modified: 2025-01-22 21:01
The .tmp extension is a temporary file that can also have a .temp extension. All temporary files have the same extension, but they can be created by different programs. In this regard, it is often difficult to understand which of the programs created such a file and where this file came from on the hard disk
Last modified: 2025-01-22 21:01
To delete unnecessary files and folders in the Windows operating system, there is a "Recycle Bin" object. This object is provided for each partition or hard disk, and for each disk you can set your own limit for the size of the recycle bin
Last modified: 2025-01-22 21:01
At the beginning of the use of computers, a blinking rectangle was called a cursor, which marked the position of the next character in the command line. With the advent of the graphical interface of the operating system, the same name was assigned to the mouse pointer
Last modified: 2025-01-22 21:01
If more than one person uses the computer, it makes sense to restrict access to each user's personal files. Thus, you can not only hide personal data, but also safely save the entered passwords on regularly visited sites. Instructions Step 1 Several accounts on one computer also allow each user to design their desktop in accordance with their taste, to make their own settings for the operation of various devices and programs
Last modified: 2025-01-22 21:01
The Windows XP operating system includes a built-in function designed to quickly restore files and folders from an archive. It allows you to automatically save important information and access it in case of problems. Instructions Step 1 Turn on your Windows XP computer and wait until it boots
Last modified: 2025-01-22 21:01
In order for your brand new domain to start indexing by Yandex, it must be added to the general domain database. To do this, Yandex services have a specialized section in which each user can notify a search robot about the appearance of a new website on the Internet
Last modified: 2025-01-22 21:01
The non-breaking space is intended to prevent the situation of hyphenation or breaking into the next line of data, which is not subject to such actions according to the rules of the language. This primarily applies to units of measurement and initials
Last modified: 2025-01-22 21:01
Various tools are provided in the Microsoft Office Word text editor to format the text in accordance with the needs of the user. You can use them to do a lot of things, including inserting a page break where you want it. Instructions Step 1 Launch MS Word, create a document or open an existing one
Last modified: 2025-01-22 21:01
Modern laptops are equipped with quick-detachable drives. Changing a drive on such a machine is even faster than on a desktop computer. You don't even need to open the body of the device for this. Instructions Step 1 Make sure that the reason for the inoperative drive is hardware, not software
Last modified: 2025-01-22 21:01
Outwardly, a laptop is a single device that contains all the components of a modern computer. It seems to be very difficult to parse it, but it is not. The manufacturers have taken care of the user experience, and the main replaceable components of the laptop, such as hard drive, drive and memory, are located in accessible places
Last modified: 2025-01-22 21:01
A macro is a small program in applications ranging from games to office tools. With the help of macros, you can significantly speed up, facilitate and make working with your computer more convenient. For example, in Excel spreadsheets, you have to do a hundred of the same things
Last modified: 2025-01-22 21:01
Often, uninstalling programs leaves behind custom files and application configuration settings that can only be removed manually. To completely remove Kaspersky Anti-Virus, you will need a little more time than uninstalling other programs. Instructions Step 1 Find the bar of applications running in the background at the bottom of the screen
Last modified: 2025-01-22 21:01
During a test suite, creating an interface for programs or website pages, it is sometimes necessary to make all the text or a certain portion of it transparent. The transparency of text on a computer is very conditional and is implemented according to the same principle in different programs
Last modified: 2025-01-22 21:01
What self-respecting amateur video editor can do without captions? Moreover, the option to overlay adding titles, in contrast to more complex actions, is in any editor for video processing. This option is also available for Movie Maker users
Last modified: 2025-01-22 21:01
The bit depth of the operating system primarily affects the amount of memory with which the system can work. A 32-bit operating system cannot address more than three gigabytes of RAM. As for modern programs, you won't really notice the difference, no matter what system you are running on - 32-bit or 64-bit
Last modified: 2025-01-22 21:01
The Windows operating system provides the ability to automatically log on to the system, while the password information is stored in the registry in an unencrypted form. Enabling automatic logon allows other users to log on to the system. Automatic sign-in makes working on your computer more convenient, but negatively affects its security
Last modified: 2025-01-22 21:01
Often, entering a password to enter the operating system becomes unnecessary. How can I turn it off? Removing this setting will not take you long. Instructions Step 1 Open the computer control panel. Find the menu for setting up user accounts, there you can change all the data for logging into the operating system, set or delete a password, change the system username, add a new one, and so on
Last modified: 2025-01-22 21:01
Removing a game is the same procedure as removing the most common application installed on a computer. There can be many reasons for erasing: incorrect operation, incompatibility with the system, or preference for a different version. Correct and competent removal of programs is a guarantee of stable system operation
Last modified: 2025-01-22 21:01
For the operation of each device connected to the computer, for example, a video card or scanner, a special program is responsible - a driver. In most cases, it is installed along with Windows. You can see which driver is installed for a specific hardware in the Device Manager
Last modified: 2025-01-22 21:01
To log in with an administrator account with a forgotten password, you will have to use a different algorithm of actions depending on the version of Windows installed. But the principle remains the same - logging in, resetting the password, creating a new password, logging in to the system
Last modified: 2025-01-22 21:01
Some users install several operating systems on one computer to carry out their assigned tasks. But not everyone can independently remove an unnecessary OS from the hard drive. Necessary - Partition Manager. Instructions Step 1 If your hard drive has a large enough amount of memory and you do not save every GB of free space, then it is wiser to simply turn off the second operating system for a while
Last modified: 2025-01-22 21:01
Of the thousands of programming languages that exist today, only a few dozen are widely used and used to develop computer programs. Despite this, their number is increasing every year. A programming language can be created by both an enthusiast who satisfies the thirst for creativity in this way, and a large corporation pursuing the goal of creating new products on its basis
Last modified: 2025-01-22 21:01
Updating all computer drivers is possible in two ways: using standard Windows tools or third-party programs that determine the hardware configuration and scan their servers for updates. Instructions Step 1 If you want to update some of the drivers installed on the system, go to "
Last modified: 2025-01-22 21:01
An executable file in exe format is a compiled program code. Regular editors will not be able to view and change its contents. Use a binary editor such as Hex Edit to edit exe files. Necessary - Hex Edit program. Instructions Step 1 Search the Internet and download the Hex Edit program to your computer
Last modified: 2025-01-22 21:01
In the Windows operating system, each folder and each file has a property page that displays different information about the folder or about a specific file. If the user needs to know the time of file creation, he can use this page. Instructions Step 1 To access the file properties page, go to the directory where the file you need is saved, right-click on its icon and select the last item "
Last modified: 2025-01-22 21:01
Absolutely any folder or file has attributes such as the time and date the file was created, the date it was modified, and the time it was last accessed. It would seem that this data can only be created and saved by the operating system software, but it can be changed using special programs
Last modified: 2025-01-22 21:01
Icons in Windows operating systems refer to graphical displays of files, folders, applications, or shortcuts. Icons in Windows 7 are found on the taskbar, on the desktop, in the Start menu, and in Windows Explorer windows. Instructions Step 1 To resize desktop icons in Windows 7, close or minimize all running applications, open folders, and dialog boxes
Last modified: 2025-01-22 21:01
The keys of most programs are registered in the registry editor of the operating system. You can use this utility to perform certain key-related tasks. Instructions Step 1 Open the Windows Registry Editor using the Regedit command in the Run utility (sometimes Run)
Last modified: 2025-01-22 21:01
In the latest versions of the Windows operating system (Vista and Seven), to increase the level of security, an additional check of user rights has been introduced when launching some programs. If such an application is launched not on behalf of the administrator, then it has certain limitations in functionality
Last modified: 2025-01-22 21:01
Sometimes, when creating images and editing digital photographs, it becomes necessary to evenly fill one or another part of the image with a uniform color tone. This is easy to do using the tools of the Adobe Photoshop program. Instructions Step 1 To carry out the fill operation, you can go in several ways
Last modified: 2025-01-22 21:01
The database that contains the settings for the hardware and software of a computer is called the Windows system registry. It is not stored in any one file on the computer disk, but is recreated by the system based on information from several sources at each boot