Saturday, May 1, 2010

A+ Class 4/13/10

Today we talked some operating system utilities and troubleshooting issues
1) Defrag:
- What it's purpose?
- Where is it found?
- Differences between XP and Vista

2)Disk Management

3)Troubleshoot:
- Chkdsk command:try to repair any corrupt file.

4) MSconfig:
- Startup tab
- Disable

FYI:
- Do not add toolbars to your internet because they also require loading that slows your internet down.
- The boot manager will replace any corrupted file.

A+ Class 4/8/10

Today we wrapped up our disscusion on laptops. Our topics covered:
Storage- the HD size (not capacity) of a desktop is 3.5 and for a laptop it's 2.5.
Input - Both consist of a keyboard but only the laptop comes with a touchpad now days and a desktop comes with a full size mouse.

This was just a few things that we covered. We also covered about what to connect to a laptop to give it some functions of a desktop that it lacks. This accessory is called a docking station. The last topic of our discussion was on laptop batteries. There were 4 types:
• Nickel-Cadmium (NiCad)
• Nickel-Metal Hydride (NiMH)
• Lithium Ion (Li-Ion)
• Feul cell

Network+ Class 4/7/10

Today we discussed NAT. NAT(Network Address Translation)really helps in two areas; Security and Cost. NAT changes the LAN IP address to a WAN IP address so a "man in the middle attack" (where someone tries to take over your computer) cannot be performed on the system. There are three forms: static (network administor changes each one), Dynamic and PAT(Port Address Translation).

A+ Class 4/6/10

Today we continued our discussion on the differences and similarities to desktops. The focus was on:
• portability
• cost
• performance
• expandability
• quality of construction
• Motherboard
• Processor
• Memory
One thing to keep in mind is that not too many people try to build laptops for one main reason, ALL motherboards are proprietary when it comes to the lapptops that encases them. There is no set standard(s) for laptop motherboards and they are specially made to fit only that specific laptop series.

A+ Class 3/25/10

Today we started to discuss the differences and similarities between laptops and desktops. Some of the main points that we started to discuss were; cases, motherboard, processors, memory, and storage.

Network+ Class 3/24/10

Today we talked about servers and how to load a small business server. Most people have a misunderstanding about what a server is. A server is nothing more than software. A server does not have to be a seperate piece of equipment ( unless its a large organization), it can be as small as your computer. When setting it up you must check and see if the mothrboard can handle RAID. When installing a server you are really installing an operating system, thats how easy it is to set up. Just an FYI, Microsoft recommends two partitions (1 for the O.S and 1 for the data).

A+ Class 3/23/10

Today we focused on laser printers. Laser printers consist of a 6 step process before it even puts out a sheet of paper:
1) Cleans
2) Charges
3) Writes
4) Develops
5) Transfers
6) Fuses
This process is what’s going on in the printer from the time it says “Warming up” to the time it pushes out its first page.

A+ Class 3/18/10

Today we started to talk about Printers and how to Install and Configure them. There are 4 types of printers:
- Laser
- Thermal
- Inkjet
- Impact
We then touched based on the local printers versus the network printers, then about printer drivers.

Network+ Class 3/17/10

Today we did a lab that consisted of one computer taking over another or called VNC (Virtual Network Connection). This is somewhat similar to remote login except on remote login if someone touches the computer you remotely logged into, then you are kicked out. VNC is used by many companies to help troubleshoot when someone is having problems with their system. When using this software, only one computer at a time can be a server side and the other a user side.

C# Class 3/17/10

Today we discussed the midterm.

A+ Class 3/16/10

Today we did a lab that was about remote login or Remote Desktop Connection. Before you can perform a remote login, you need to change the settings on your computer. To do this go to your system properties in the control panel and select the remote tab. Then select the box where it says “Allow users to connect remotely to this computer”. Then you choose which users you want to access your computer but keep in mind they must have a user account and password. After that, go to another computer and follow these steps:
1) Click start
2) All programs
3) Accessories
4) Communications
5) Remote desktop

A+ Class 3/11/10

Today we started talking about network architecture. One part we disscussed, was about the coaxial network. If an organization is still using a coaxial network they need to avoid signal lose. To do this the network administrator would add a repeater to the network to regenerate the signal. If an organization is running a modern networking system using twisted par, then they should just add a switch.

3/10/10 Network+ Class

Today we talked about routers. A routers purpose is to connect a LAN to a WAN like the Internet which is one really big WAN. A router has 2 ports, a LAN port and a WAN port. In addition a router can have multiple WAN ports but only needs one LAN port. If you have a small organization, most likely you have a router there. Here it is not difficult to choose a routing protocol; the organization could use the static protocol because it doesn’t require much to keep it up. But if an organization is large, then it is highly suggested that the dynamic protocol is used. Here very little work has to be done by the network administrator because the addresses and routes are established dynamically (automatically). All routers have routing tables. A routing table is something like the specifications of the router. A routing table consists of a: Destination LAN IP, Subnet Mask, Gateway, and Interface. Another topic that we discussed was NAT (Network Address Translation). This is what most if not all of the companies use. NAT is a form of security because it takes the actual IP address and changes it to another one. The best way to look at this is to imagine leaving you home and put a mask on and do what you were going to do. Your task still gets done but nobody saw your face and knows where you can from. That is similar to NAT. When you access a website instead of it sending over the actual IP address (where you can actually see their network) NAT gives it a different one to mask it.

Tuesday, April 27, 2010

A+ class 3/9/10

Today we talked about networking. We discussed the differences of the LAN (Local Area Network) and the WAN (Wide Area Network). A LAN is what computers have connected within your home or organization. A WAN is two or more LANs connected by routers to communicate and share resources. We then started to discuss topologies. The topologies that were mentioned were the star, bus, ring, mesh and point-multipoint. Three of these we talked about. We talked about the Star topology, which are computers that are all connected to a switch. That is part of the LAN technology and the star is the most popular today. The next was the bus topology. This is a topology that is no longer used but is good to know about. On a bus, multiple computers are connected on the same coaxial cable, the components that help make this up were the T-connectors, BNC connectors, repeaters and vampire taps. The last was the ring topology. This topology was introduced by IBM. Here the computers are connected using STP (shielded Twisted Pair) and the computer communicates by the use of a token. When the computer has a token then it is the one that can “speak” in a sense. Afterwards we talked about the OSI model. This model is the foundation for networking. It consists of seven layers and they are as followed:
Layer
7- Application- Service
6 -Presentation - Decryption
5 -Session - Point to point
4 -Transport -Segmentation
3 -Network - Router
2 -Data-Link -NIC
1 -Physical -Switch

Wednesday, March 10, 2010

C# class 3/8/10

Today we talked about the midterm and worked on a program that my brother and I were having problems with. Our biggest problem was not the code but our logic. Tip: Remember when you are programming, you compiler will only read the syntax to make sure it is OK. It is still up to you to make sure the logic is in place. When I say logic, check the sequence of your program and see if it logically follows right.

Sunday, March 7, 2010

OSI model audio version

RSS Feed

Network Security

Storage Devices And Backup Media

How to subnet a class A,B,C address

Week 3 A+ homework: How to check memory on your computer

One way to check memory on your computer is by going to the "Control Panel" as seen below:


Then click on "Systems and Maintenance":


Then click on "Systems":


Another way you can do this is by going to your "Utilities Setup". To get here you have to reboot your computer. When the screen first comes on then hit the F2 button and a blue screen should pop up showing you some information about your computer and your memory will be one of them.

The sure way to know what your system has and can upgrade to is to keep your paperwork when you purchased it. If you do not have that then you can get on the Internet and type in the brand and model of your computer and you should get the results.

My computer can expand up to a 4 GB RAM, the reason that this information is important is because if you want to up grade you need to know what you already have to do that. But remember DO NOT exceed the recommended max memory of your operating system.

A+ class 3/4/10

Today we took our Midterm.

Network+ class 3/3/10

Today we took our Midterm, and gave a presentation on network security. Please look for the power point on my blog for network security.

A+ class 3/2/10

Today we did a lab where we found out how to optimize Windows Operating System. There are 3 ways that you can do this.
1) Increase you virtual memory by selecting the custom size on the virtual memory window and put in the recommended MB (megabytes) in both textboxes and click “set” then “Okay”. Restart your system for the affects to take place.
2) Go to your command prompt and type in “msconfig”, select the startup tab and disable all.
3) Increase the swap files. To do this you go to your command prompt then;
a. Type “regedit”
b. System folder
c. Current Control Set
d. Control
e. Session Manager
f. Memory Management
g. On the right side, slick Large System Cache
h. Change zero to 1 (0 to 1)

A+ class 2/25/10

Today we did our presentation. Please look at my blog under “Storage Devices” for the PowerPoint.

Network + class 2/24/10

Today we continued our discussion on security and did some preparation for the midterm. The parts that we talked about in security dealt with some of the hardware and software that are used to secure a network:
1) Firewall
2) IDS/IPS
3) DMZ
4) Honey pots
5) Proxy servers
6) Practical analyzers

A+ class 2/23/10

Today we were assigned parts in our current chapter and worked on them during class for a presentation on 2/25/10.

C# class 2/22/10

Today we started to talk about control statements. We focused on the counter controlled repetition rules.
1) Control variable(or loop counter)
2) The value of the control variable
3) The increment or decrement which increases or decreases the value
4) Loop-continuation condition, this determines whether to continue looping

A+ class 2/18/10

Today we took a pop quiz.

Network+ class 2/17/10

Today we talked about network security. Our discussion started off with information assurance. Within information assurance there are 4 main parts:
1) Confidentiality- Keeping those who are suppose to be out, out.
2) Integrity- Making sure the data hasn’t changed from point A to point B.
3) Authentication- Something you know (your password), something you are (finger print scan), something have in your possession (bank card).
4) Availability- Similar to confidentiality except it makes the appropriate data available.

We then talked about the 8 types of threats:
1) Viruses- These attack that particular computer.
2) Trojan horse- A program that hides on your computer and waits to be executed.
3) Logic bomb- Distributed primarily by worms and viruses.
4) Worms- is like a virus except it doesn’t need a person there to execute in and can spread from one system to another.
5) Adware & Spyware- Adware is a program that monitors the types of websites that you visit frequently and uses that information to generate targeted advertisements. Spyware is any program that sends information about your systems or your actions across the Internet.
6) Root Kit- A type of back door program that is inserted into application software.
7) Botnets- Short for robot network, this is a group of computers under the control of one operator, used for malicious purposes.
8) Privileged escalation- Software applications that contain bugs. An unauthorized user exploits these bugs to gain privileged access to a computer system.

A+ Class 2/16/10

Today we started to talk about storage devices. Our discussion started off with the HDD which is the Hard Disk Drive or hard drive for short. The HDD is used for your permanent storage. This storage is convenient in the matter that you don’t have to put in a USB memory stick or CD RW to save your work, all you have to do is click save and you are good to go. There are three critical components to a hard drive:
1) the controller, this controls the hard drive
2) the hard disk, this is the physical storage medium
3) the host adapter, this is the translator

Monday, March 1, 2010

2/11/10 A+ Class

Today we recapped on the last class and then we went on to add a dual boot to the operating system.

2/10/10 Network + class

Today we had a quiz over the OSI model and cabling. After the quiz we continued to practice more on subnetting.

2/9/10 A+ Class

Today we focused on Operating Systems. We first discussed the steps for loading an operating system.

1) Partitioning: this is the process of assigning part or all of the hard drive.

2) File System: Fat 32 or NTFS
a. Fat32 does not offer encryption or password protection
b. NTFS offers encryption and password protection

3) Formatting

4) Load System Files

5) Check device drivers: if there is a yellow exclamation point that is a driver that is missing and needs to be installed.

2/8/10 C# class

2/4/10

Today we had a quiz that consisted of us designing a computer together from scratch.

2/3/10 Network+ Class


2/2/10 A+ class

Today we talked more on the different functions and components that are found on a motherboard. For instance, the keyboard connectors are the most important input device. The evolution of the keyboard connectors went from the AT connectors (which was a 5 pin DIN) to a PS/2 connector (6 pin DIN). Some computers still have the PS/2 connector (you can identify these connectors easily because the end tips are purple), but the newer computers use USB. So what does that mean? It means that the keyboard connectors are now using USB to connect to the computers. The one bad thing about USBs is that if one goes bad, then they all go bad! Then next was the MIDI, which is Musical Instrument Digital Interface. This was used for a game port. This was used to connect your joystick, but now a USB is used. If you have a MIDI you can replace it with another MIDI by adding a sound card.
Then we talked about the BIOS. BIOS = Basic Input/Output System, this is the most important chip on the motherboard aside from the processor. The BIOS is a ROM (Read Only Memory) chip and contains the information for the system.

2/1/10 C# class

Today we started to talk about LINQ( Language INtegrated Query). LINQ is a prepackaged data structure that is a part of the .Net Framework. It is similar to SQL and it allows you to retrieve data from different sources such as arrays, databases lists and variables. The syntax for LINQ is built in to C#. The libraries are called providers.

Sunday, February 28, 2010

What are the differences between CSMA/CD and CSMA/CA?

CSMA/CD (Carrier Sense, Multiple Access/ Collision Detection) is used to determine which computer should use the shared media at any given moment. Carrier Sense means that each machine (also called a node) that is on the network, checks the cable before sending a data packet. If one node is using the network and another node wants to send something, then is will listen to for any traffic on the cable. If it hears any traffic on the cable then it will wait until the cable is free, when there is no more traffic then the node sends the packet on through.
CSMA/CA (Carrier Sense, Multiple Access/ Collision Avoidance) is used for wireless networks has a feature that CSMA/CD doesn’t have. If the node has checked the media (which is the radio frequency it will use since it is wireless and is not using cables) to see if it were available it will send out a packet as a warning to the other nodes to tell them that it is about to send some data out. If the receiving nod receives that first packet, then it will send a confirmation packet saying it received the first packet. After this the first node will forward the actual data packet.
So CSMA/CD is used for a network that is hard wired using an Ethernet cable and the CSMA/CA is used for a network that is operating wirelessly.

Monday, February 15, 2010

LAN, WAN, and MAN

LAN


WAN


MAN

Degaussing a CRT monitor

1) Attach the CRT to a working computer system and power on the monitor.
2) Press the Menu button on the front of the CRT cabinet (this is the button on the far right of the picture).





3) Use the up and down buttons on the CRT monitor to select the Extra Controls.
4) Press the Menu button on the front panel to select the Extra Controls submenu.


5) Press the Menu button on the front of the monitor because the Degauss menu item is already selected. If degaussing was required you should have heard a distinctive sound that is the sound for degaussing and the image on the screen would be distorted.

The parts of a Bubble-Jet printer

1)Unplug the bubble-jet printer from the power source and the computer.
2)Open the top cover to expose the inner print mechanism.
3)Locate and identify the paper tray.


4) Locate and identify the paper-feed sensor.












5)Locate and identify the pickup roller(s).












6)Locate and identify the separator pad(s).






7)Locate and identify the printhead.











8)Locate and identify the carriage assembly.

Sunday, February 7, 2010

Hubs, Routers, Switches, and Bridges





A hub is a networking device used to connect the drops in a physical star topology network into a logical bus topology, most hubs today are replaced with switches.


The router is also a networking device that connects multiple networks that use the same protocol.


The switch is another networking device used to sort through and forward traffic based on specific criteria. Unlike a hub, switches forward packets to only the correct port based on MAC addresses.


A bridge (yes, another one) divides a logical bus network into subnets. Bridges examine the MAC address of each packet and forward packets only as necessary.

Tuesday, February 2, 2010

Network + class 1/27/10

Today we recapped on our previous class and talked a little more in depth about the OSI model. To see some information about this please scroll down through my blog to see what I said about the OSI model. After we finished with this we started to talk about Topology. Topology is basically a diagram about how computers are connected. We talked about 4 types:

First one is a bus topology,

Second is a ring topology,


The third was a star topology.

The last that we discussed was a hybrid. A hybrid is a mix of the three. There is a box and on the inside there will be a bus or ring connection with cables coming out of it like the star (think about a game console).

After we talked about this started to move onto cabling, were we were to that there are three types of cables and they are coaxial, twisted pair, and fiber-optic. Shortly after this we stated our lab.

Network + Lab 1


Today for our first lab we created a Peer -to-Peer (P2P) connection. We took two computers and connected them to a switch. Once we connected everything we had to set which computer was going to be the primary. From there we needed to test to see if we could share a file. The connection looked like the diagram above.

Network + class 1/20/10

Today we discussed the OSI model. This model consists of 7 layers and it depicts how information is processed and sent out by the user through a network. When the information is first being sent out it is going from layer 7 to layer 1, this is called decapsulation. When the data is being received then it goes from layer 1 to layer 7, this process is called incapsulation. The layers of the OSI model are Layer 7: Application, Layer 6: Presentation, Layer 5: Session, Layer 4: Transport, Layer 3: Network, Layer 2: Data Link, and Layer 1: Physical. Layers 1-3 are the layers that consist of the Hub and cables, NIC card, and router (in this order).

Sunday, January 31, 2010

A+ Lab 2

Today we added an addition optical drive to our computers. In order to add this you have to know just how to hook it up. When connecting an optical drive you have to know if you are connecting the master, slave, or cable select.

A+ Class 1/28/10

Today we discussed the CPU. The CPUJ which is called the Central Processing Unit comes in two forms, the PGA (Pin Grid Array) and the LGA (Land Grid Array). When you see a PGA CPU the when you turn it upside down you will look right ate the pins underneath it, but when you look at a LGA CPU, when you turn it upside down you will see holes. The pins would be located on the motherboard right where the CPU is suppose to go. The CPU can be easily identified by seeing a heat sink near it which would look like 4 small rows of metal and a fan will be sitting on top of the CPU. The CPU is located on the motherboard co every computer has one.

A+ Class 1/26/10

Today we had a guest speaker at the school, so we only had about 20 minutes of class time left. But with the time that we did have left we talked about memory slots. The memory today are called dual in line memory modules (DIMMs). DIMMs are different in the number of conductors that the physical specs use. Remember, that if you add more memory to your computer it doesn't mean it is going to run faster. You will need more cache or better processor to increase you speed or efficiency of your computer.

A+ Lab 1

Today was a very interesting lab. Our professor had us to take a computer and completely disassemble it with just the power supply still inside of the Case. Once we took apart the computer, we needed to put it back together again and that included making sure that all components were connected to the motherboard properly. The only way to do this that once it is connected, plug it up and see it is comes on and boots up properly. If it does then you did good. As a good tip, do not seal up your case until you check to see if it is running correctly because if it isn't then that's one less step that you would have to go through to correct your mistake.

A+ Class 1/21/10

Today in class we discussed expansion slots. There are five types of expansion slots:
1) PCI
2) AGP
3) PCIe
4) AMR
5) CNR

The PCI slots and adapters are made in 3.3V and 5V versions.

The AGP slots were known for video card use

The PCIe are 7 widths x1, x2, x4, x8, x12, x16, and x32, but the most common are the x1, x4, and x16 and the least common is x8. but that is still more common than the x2, x12, x32.

The AMR was once common in a lot of the Intel motherboards, but this is starting to get pushed off the motherboard by newer technologies.

The CNR slots, these slots are one of the technologies that are replacing the AMRs.

A+ Class 1/19/10

Today in class we discussed the motherboard in a little more detail. the motherboard consists of two types: integrated and non-integrated.
Integrated- components are apart of the motherboard.
Non-Integrated- components need to be added to the motherboard by using expansion slots.

Motherboards come in four different form factors (designs):
ATX (Advanced Technology Extended)
Micro ATX or Mu ATX
NLX (New Low Profile Extended)
BTX (Balanced Technology Extended)

ATX is the most common motherboard that is used.

What is a computer and its components?

A computer is an electronic machine that has the ability to perform logical operations and process information. A computer consist of nine basic components. These components are as followed:




1) Motherboard (integrated or non-integrated): A motherboard that is integrated means that the components are apart of the circuitry(instead of a sound card you would already have that on the board) a non-integrated motherboard mean that you need to add a video card if you want to have video capabilities or a sound card if you want to have sound. Although now it is rare that you will find a non-integrated MB.


2) CPU/ Central Processing Unit: Is the main intergrated(part of the motherboard) circuit that interacts with a just about every component attached to the motherboard, it helps run your applications and handles system processing.




3) Power Supply: This piece is something like a heart to a human. Our heart pumps and allows the blood to circulate in our body. Well the power supply allows electricity to flow through to power the computer.








4) Hard Drive: Here a lot of people confuse this with RAM. Your hard drive is where you store your data. when you go to save something it is stored here.





5) RAM/ Memory: Like I said above this is always confused. Your RAM is your memory. This is used by software like your Operating System.



6) Video port or card (depending on the Motherboard you have)
7) Sound port or card (depending on the Motherboard you have)

Both of the Video and Sound are what allows you to have sound and video.



8) Optical drive/ DVD, CD: This component can come in many different forms, it will just depend on your preference. Today you are more likely to run into a DVD drive than a CD.



9) Case: Your case is nothing more than the piece that holds all of these components together.

Some people might say "Well that's not right because when I got my computer it had a monitor, mouse and keyboard." Well I'm not arguing that fact because it is true, but from the technochal view a computer is only what I listed. Those addtional items are external devices that add to your computer to be used by the user. You can always look at it like the. When you buy a Xbox 360 or a PS3 you don't by a TV with it and depending on where you bought the game console, you may not get a controller. You are paying for the console itself not the external devices.

A+ Class 1/12/10

Today we discussed the main components that make up a computer. Most people have a common misconception that a computer is the monitor, tower, keyboard, mouse. That is incorrect. The computer is just that tower where you cut the power on. that consist of 9 components that makes it into a computer.
1) Motherboard (integrated or non-integrated)
2) CPU/ Central Processing Unit
3) Power Supply
4) Hard Drive
5) RAM/ Memory
6) Video port or card (depending on the Motherboard you have)
7) Sound port or card (depending on the Motherboard you have)
8) Optical drive/ DVD, CD
9) Case

C# Class 1/27/10

Today we went over our program that each student had to design using arrays (please look at one of my previous post to see this code). We talked about these programs and did a little brainstorming. The purpose of the program was to see if we had a fairly good understanding of what an array does and the function of an array. Next week we start working with LINQ.

C# Class 1/25/10

Today we continued to talk more about Arrays so that we could have a more concrete understanding of how they are used. Today was more of a re-cap of last class and not much more that can be posted.

C# Class 1/20/10

Today we talked about Arrays. Arrays are a group of variables called elements that consist of the same data type. For example, if you were using something that consist of numbers like your zipcode (U.S.) and then used something that just consisted of your alphabets like your name, then you would have two seperate arrays because they are different data types.

OSI Model with devices representing the levels!

Here is a diagram displaying the OSI model and at the certain layers of this model it shows the corresponding devices or its physical representation.

Tuesday, January 26, 2010

C# Class(Arrays)

Yesterday we went over arrays again and I was able to get a little bit more of an understanding of the concept and how to apply it. Here I am posting a code to a program we had to develop using array's. I hope that I have the concept down.

using System;
using System.Collections.Generic;
using System.ComponentModel;
using System.Data;
using System.Drawing;
using System.Linq;
using System.Text;
using System.Windows.Forms;

namespace WindowsFormsApplication1
{
public partial class Form1 : Form
{
public Form1()
{
InitializeComponent();
}

private void button1_Click(object sender, EventArgs e)
{
//here the arrays are and elements are established
string[] values2 = new string[7];
int[] values = new int[2];
int zipcode;

//here the elements are assigned a textbox
values2[0] = textBox1.Text;
values2[1] = textBox2.Text;
values2[2] = textBox3.Text;
values2[3] = textBox4.Text;
values2[4] = textBox5.Text;
values2[5] = textBox7.Text;
zipcode = Convert.ToInt32(textBox6.Text);


values[0] = zipcode;


MessageBox.Show("If all of your information is correct click OK", "Confirmation",
MessageBoxButtons.OK, MessageBoxIcon.Asterisk);
//here the textboxes will be deleted on the message box disappears
textBox1.Text = "";
textBox2.Text = "";
textBox3.Text = "";
textBox4.Text = "";
textBox5.Text = "";
textBox6.Text = "";
textBox7.Text = "";

//here the values from the textboxes will be placed into the labels
label1.Text = values2[0];
label2.Text = values2[1];
label3.Text = values2[2];
label4.Text = values2[3];
label5.Text = values2[4];
label6.Text = Convert.ToString(values[0]);
label7.Text = values2[5];



}

private void button2_Click(object sender, EventArgs e)
{

//here the labels will be deleted when you click the button
label1.Text = "";
label2.Text = "";
label3.Text = "";
label4.Text = "";
label5.Text = "";
label6.Text = "";
label7.Text = "";


}

private void button3_Click(object sender, EventArgs e)
{
//here the application will close
this.Close();
}

}
}

Sunday, January 24, 2010

Class HW Assignment

1). What does writing C# applications using code rather than visual programming mean?
When writing a C# program just like any program like it, you have to write it in code. Writing in code means you use things like data types and variable. An example program is provided below in C# demonstrating the Hello World program.
EX:
using System;
using System.Collections.Generic;
using System.ComponentModel;
using System.Data;
using System.Drawing;
using System.Linq;
using System.Text;
using System.Windows.Forms;

namespace WindowsFormsApplication1
{
public partial class Form1 : Form
{
public Form1()
{
InitializeComponent();
}

private void button1_Click(object sender, EventArgs e)
{

label3.Text = "Hello World!!"; // result
}

private void Form1_Load(object sender, EventArgs e)
{

}
}
}


EX: Here instead of codes to make a button to display text on the screen, I can use a visual program and utilize the drag and drop the elements which are like the data types and some object to specify what the elements should do. Below is a visual program that shows you the program just like the code for the C# program.





2). What does writing statements that input and output data to the screen mean?
Input statement accepts data that will be placed on the screen. Output statements display that data to the screen.

This is an example of Output Statement that display data to a screen:

Console.WriteLine("Enter the first number: ");//prompt the user

This is an example of accepting the Input Statement data from the screen:

Number1 = Convert.ToInt32(Console.ReadLine());

3). What does declaring and use of data with various types mean?
When you are declaring a data type, then you are stating the name and type of varible you are using in your application.


4). What does storing and retrieving data from the memory mean?
Storing data means to place data in a variable and retrieve data is the opposite.

5). What are arithmetic operators in C#?

6). How is the order in which operators are applied determine?
Even in programming, the basic math rules apply to the order of operation when dealing with arithmetic operators. They are parentheses (leftmost, rightmost) then multiplication, division, remainder, addition and last are subtraction.
A. ((1*5)+5)- (6/2)*2=
B. (5+5)-(6/2)*2=
C. 10-(3)*2=
D. 10-6=
E. 4
7). What are decision making statements?
These are statements that are based on a condition being met. Here is an example:
if (Percent >= 90)
lblgrade.Text = "A";
else if (Percent >= 80)
lblgrade.Text = "B";
else if (Percent >= 70)
lblgrade.Text = "C";
else if (Percent >= 60)
lblgrade.Text = "D";
else if (Percent <= 59)
lblgrade.Text = "F";
8). What are relational and equality operators?
An equality operator will test the value of a condition on the left to see if it is or is not equal to the value on the right.

A relational operators test if the values of the both the left and the right expression are greater or less than or equal to that of it opposite.

9) What are message dialogs to display messages?
The following is a message box dialog to display a message.

This type will allow you to dispilay more than one button on the message box. The following are the available buttons that are defined through the MessageBoxButtons enumeration. Its members are:

What is a computer and what are its components?

A computer is a programmable, electric powered machine that has the ability to perform mathematical and logical operations. A computer which is not to be confused with a computer package consists of nine basic components.

1)Motherboard- which is either integrated or non-integrated.
2)CPU or Central Processing Unit/ Processor
3)Power Supply
4)Hard-Drive
5)RAM or Random Access Memory/ Memory
6)Video port (integrated mother board) or Video card (non-integrated motherboard)
7)Sound port (integrated mother board) or Sound card (non-integrated motherboard)
8)Optical drive
9)Case

Now a computer package is basically what you buy from the store. The computer itself, monitor, mouse, and keyboard. The additional components that I listed are called external devices or peripheral devices.

Friday, January 22, 2010

Changing the Settings for Multiple Monitors


1. Click on the picture of the monitor with the number 2 on it.

2. Check the Extend The Desktop Onto this Monitor box.

3. Click and drag the second monitor to the desired virtual position around the primary monitor.








4. While the second monitor is still selected, change its refresh rate and resolution, if necessary, as outlined in the "Changing the Refresh Rate in Windows Vista".