How to Create Different Headers on Each Page in Word

|

If you are writing long documents with many chapters then a good practice is to have the chapter and title of that chapter in either the header or footer of each page within that chapter. For example, every page in chapter 2 should say chapter 2.

In this tutorial I will show you how you can put a different header on 3 different pages in Microsoft Word.

Step 1 Launch Microsoft Word and start a blank new document. Then go to a website where you can grab some text to follow along in this tutorial. I am going to use the USA today website to grab a few snippets of news. It doesn't matter what the text is as you will soon see.

Step 2 Pick a story from the website and copy some of the text and paste it into your word document and hit the enter key a couple of times to create a couple blank lines.. The first page of your word doc should look similar to mine just with different text.

Step 3 Hit the CTRL+ENTER key to create a new 2nd page.

Step 4 Copy the next paragraph from your news source and paste it on page 2 and hit enter a couple of times to create a couple of blank lines.

Step 5 Hit the CTRL+ENTER key to create a new 3rd page.

Step 6 Copy the next paragraph from your news source and paste it on page 3 and hit enter a couple of times to create a couple of blank lines.

Step 7 Go back to page one and click anywhere on the page to put the cursor there.

Step 8 Click on "view" from the main menu at the top, and then click on "header/footer" in the submenu that appears as shown in the picture associated with this step.

Step 9 In the header section, type in "NEWS SOURCE PAGE 1".

Step 10 Click the "close" button on the header/footer toolbar as shown in the picture.

Step 11 You will now notice the header is the same on every page, we are about to fix that. On the first page put the cursor on the very last blank line. Remember earlier I had you hit enter a few times to create a couple of blanks lines? Put the cursor there.

Step 12 Click on "insert" from the main menu at the top and then click on "break" as shown in the picture.

Step 13 When the "brek" window appears select "continuous" underneath the "section break types" heading.

Step 14 Go to page 2 and double click the header on that page to activate it.

Step 15 Turn off the "link to previous" option by clicking the icon on the header and footer toolbar. The icon is circled in red in the picture and is the 4th icon from to the left of the close button. Doing that gives you the ability to make the header on this page different than the previous.

Step 16 Change the "1" to a "2" in the header text so it now reads "NEWS SOURCE PAGE 2" and click the close button. You will now notice that the page 1 header is different from the page 2 header, however the page 3 header is identical to page 2.

Step 17 In order to change the page 3 header you follow the same steps as above. Put the cursor on the last blank link pn page 2, just like you did on page 1.

Step 18 Then goto "Insert", then "break" and then choose "continuous" when the break window appears.

Step 19 Go to page 3 and double click the header on that page to activate it.

Step 20 Turn off the "link to previous" option by clicking the icon on the header and footer toolbar just like you did earlier in this tutorial.

Step 21 Change the "2" to a "3" in the header text so it now reads "NEWS SOURCE PAGE 3" and click the close button. You will now notice that the page 1 header is different from the page 2 and the page 3 header is different than page 2 creating a different on 3 different pages.

How to Keep Your Laptop Cool and Prevent Your Computer Not Responding

|

If the fan on your computer always seems to be running you want to take some preventative steps to prolong the life of your investment. Overheating is one of the most common causes of computer crashing and freezing and is completely preventable. If it seems like your system has been non responsive, freezing up, or just crashes without warning, then you will want to read my suggestions.

Step 1 Buy a mesh cookie cooling rack to set your laptop on. Only costing a couple dollars, these rack are excellent to tools to help lower the operating temperatures of your notebook. They allow air to circulate around the entire computer.

Step 2 Remove your laptop's case and clean the dust from the inside. The steps are actually pretty simple and can be found in your computer's manual or by searching online. Some are secured by a couple screws but others may have a single release tab. Just be certain that your computer is unplugged.

Step 3 If you are not comfortable removing the case on your computer, you can still clean the fans. These will be located on the bottom or the sides/back. Run a vacuum attachment over top to clear out large dust particles.

Step 4 Consider purchasing a laptop cooling mat. These are nifty little pads that promote cooling with their internal fans. You can pick them up from most office supple stores or discount retailers around $30. You might even try Ebay where I've seen them go for under $20. A few popular models are the Targus Chillpad or Coolmat and the Antec Coolpad.

Step 5 Make sure that your monitor shuts off when you close the screen of your laptop. If not, the heat from the lit monitor against the keyboard can fry your hardware.

How to Recover Deleted Files in Windows

|

Every once in a while you need to recover a deleted file that was trashed in error. Even though you have removed the file from your desktop or personal files, it will still remain on your hard drive. There are several areas from which you can locate the file and, if you need to, there are software programs to help you recover the deleted file.

Step 1 Open the Recycle Bin on your computer desktop. Check the folder to locate the deleted file if you have not emptied your recycle bin since you deleted the file. If you do not have an icon for the Recycle Bin on the desktop, go to the Start menu or the Control Panel. Select the file in your Recycle Bin and copy it back to your active files.

Step 2 Download an online file recovery program (see Resources) and install the program on your computer. Some of these downloads are free while others will charge you for the program. If you are worried about getting a virus with your download, check the program reviews or install a reputable virus blocker.

Step 3 Click on the recovery program icon on your desktop and open the program. Choose what type of recovery you would like to do. You can do anything from a complete disk recovery to a fast file search. You also have the ability to customize your search and set whatever search results you want to see.

Step 4 Run the recovery program under the parameters that you have set and allow the computer to complete the search. Depending on the type of search you are running, it may take a while to complete. Searches can take anywhere from a couple minutes to several hours.

Step 5 Double-click on the found file when the recovery program finishes to open the file. Confirm that it is the file you were searching for. Copy it or move it back to your active files.

How to Undelete and Recover Deleted Files From Windows Operating System

|

This article provides tips on how to recover deleted files.

Step 1 Have you ever deleted a file only to discover later that you need it? Most of us have done this. There are ways to recover deleted files. Below a few tips and tricks for successful file recovery.

Step 2 The first step in file recover is DON'T PANIC! In most cases a deleted file can be recovered. When you delete a file it is relocated not actually removed. It is taken from the directory of files but is still in your system.

Step 3 The first place to begin your search for a deleted file is in the recycle bin. When a file is deleted it is sent to the trash folder. As long as you have not emptied the recycle bin you can retrieve your file from it.

Step 4 If you have emptied the recycle bin you can most likely still recover the deleted file. A deleted file is never actually "deleted" it is only placed in a different location. This means you may have to work a bit harder to find it but certainly does not mean you can't recover the file. Your computer recognizes a deleted file as space that is no longer needed. It prepares to reuse the space but takes a long time in doing so. So as long as you don't wait an extended period of time before trying to retrieve the file it can be done.

Step 5 You will most likely need the use of file recovery software to recover your deleted files. This type of software can perform a deep system search. It can search all areas of your PC to find the lost data. There are some wonderful options as far as recovery software. You can choose from programs such as Windows Data Recovery Software, NTFS Data Recovery Software, and FAT Data Recovery Software. There are several others on the market. These just seem to be some of the top choices.

Step 6If you search around you can also locate free versions of file recovery software. Just do your research and choose the one that you feel most comfortable with. Which ever you choose you can rest easier now, knowing that there is a way to recover your lost data.

How to Retrieve Lost Information Following an HP PC System Recovery

|

Each time you purchase a new Hewlett Packard (HP) computer, you are asked to create a user account name. If you have to perform a system recovery on your personal computer (PC), the nondestructive recovery will store all files you created in the account. After you access your account by logging into your personal computer with your user name and password, you can retrieve lost files easily.

Step 1 Use the Search feature to search your hard drive. Type the user name and password you created when you first purchased your computer into the dialogue box that pops up after you restart your HP PC.

Step 2 Click "Start." In the "Start Search" field at the bottom of the screen, type the name of the document you want to retrieve. Review the documents that pop up in the search box that have your search words in the title.

Step 3 Broaden the words you type into the search box until you locate the documents you are searching for. For example, if you are looking for a file that you created and labeled "Summer Silver Fish Hooks Used in Maryland" but you cannot recall the exact file name, you could type "Fish, Hook, Summer" in the search box.

Step 4 Check recent items. Click "Start." On the right side of the screen select "Recent Items." Search through the list of the last items that you worked on.

Step 5 Double-click on the file name you want to retrieve to restore the document. Save the file using an easy-to-remember name in a folder on your HP PC. Back up all files regularly on a removable disk, which you can purchase from a computer store or office superstore for about $24 for 4 GB of space.

Step 6 Search in Safe mode. Change folder security privileges if you have multiple accounts on your HP computer and are unable to access files located on one of the accounts. To do this click "Start," then "Restart." When the blue HP screen appears, tap the F8 key several times. The "Advanced Options Menu" will appear.

Step 7 Scroll over to "Safe Mode" and press "Enter." A new screen will appear. Click "Yes" when the computer asks if you want to start the HP PC in Safe mode.

Step 8 Click "Start," then "My Computer". Double-click on "Documents and Settings." Right-click on the name of the folder that contains the documents you want to retrieve. Click "Properties," then "Security."

Step 9 Select "Advanced," then "Owner." Check the box titled "Replace Owner on Subcontainers and Objects" to retrieve the documents in the folder.

How to Start a Wireless ISP

|

Wireless Internet service providers (ISPs) provide Internet to many households that would otherwise use dial-up connections or have none at all. Setting up a wireless ISP is extremely easy and inexpensive when you need to service only a handful of customers.

Step 1 Install the antennas onto the router and place them onto the building. You will have to replace the standard 2dB antennas with something more robust, preferably omnidirectional, weatherproof models with a decibel rating over 12. The connectors on the antenna cables attach to the standardized plugs on the router (N-type or RMS), as well as the extension cable leading to the new antennas. The antennas should be placed as high as possible and vertically oriented. Typical routers will have a stock range of about a quarter mile, but adding these new antennas will boost that range to a half mile or more.

Step 2 Set up the router. Routers are usually accessible through their firmware, which can be viewed through a website. The firmware displays settings and restrictions and must be set up to properly handle the traffic of many computers. Be sure the settings for encryption (WPA or WEP) are enabled and a password is set. Check other settings such as the "lease timeouts" (set for maximum time) and number of users allowed. By default, routers are set to DHCP, which will assign IP addresses to the users' computers automatically. The router will have a place to give it a broadcast name, or SSID. Set this SSID to a simple, recognizable name. Save all setting changes before closing the window.

Step 3 Connect the router to the wired Internet connection with an RJ-45 Ethernet cable.

Step 4 Set up customers' computers to use the wireless router as an access point. In the network settings for the machine's wireless networking hardware, select "obtain IP address automatically" or DHCP. Using the wireless card's software or Windows' built-in wireless configuration, scan for networks. If the router is within range, it will show up on the scan results. Enter in the encryption passcode, and the router will give the machine an address and connect it to the network.

Step 5 Check for Internet connectivity by opening a browser window and attempting to surf the web.

How to Setup a Remote Desktop on a LAN

|

Windows Remote Desktop (also known as Terminal Services) allows a network user to access a remote PC's Windows desktop as if he were actually sitting in front of that PC. All that is required is network connectivity and the Remote Desktop software. The server portion of Remote Desktop is already installed for Windows XP/Vista machines, and the client can be downloaded free of charge from Microsoft. Remote Desktop is a convenient and time-saving feature for users with multiple PCs. A powerful stationary desktop server is often used to provide files, printer applications, or other services to multiple client PCs, which are usually notebooks. Sometimes problems arise that require configuration or even rebooting of the server PC. With terminal services, users with access on the LAN can quickly remedy such issues without physically working with the server machine.

Step 1 Decide which PC you wish to remotely control and which PC(s) you wish to use as your controllers. The Remote Desktop server will be installed and configured on the controlled box, and the Remote Desktop client will be installed on each of the controlling PCs.

Step 2 For each PC(s) that will be controlling the remote machine, download and install the Windows Terminal Services Client software.

Step 3 On the computer to be remotely controlled, go to My Computer, then to Control Panel, then to Administrative Tools, and then to Services.

Step 4 Select the Terminal Services entry. A new configuration dialog will appear. Select the General tab. For the option that says Startup type, select Automatic. This will ensure remote desktop services will always be running even if you need to reboot your computer. In the option that says Service Status, click the Start button to immediately start the service.

Step 5 As an optional step for advanced users, select the Log On tab. If Local System Account (i.e., the default) is selected, remote users will log in as SYSTEM using whatever password (if any) you have already set for the administrator's account. The option titled This Account causes remote users to log in under another existing account that you specify. To confirm this option, supply and confirm the password for this account.

Step 6 Click OK to close the configuration dialogue.

Step 7 Remote terminal services are now set up for this PC, and other PCs running the Terminal Services Client can now connect to it and run its applications.

How to Troubleshoot a Netgear Wireless Router

|

A Netgear wireless router attaches multiple devices to your Internet connection, either by ethernet cable or wirelessly. If you can't connect to the Internet, the problem can be anywhere along the chain of devices and technologies that connect your computer to the Internet. Knowing how to troubleshoot your Netgear or other wireless router is an essential part of determining where the problem is and fixing it.

Step 1 Click your "Start" button, and choose "Run." Type "cmd" in the text box (without quotation marks), and click "OK." A command prompt will open. Type the following: ipconfig /all. Press your "Enter" key. A list of numbers and other networking configuration information will display.

Step 2 Find your network adapter in this list of headers. If you use your computer wirelessly in many different places, you may have to scroll through a lot of different options to find your adapter. If you connect to the Internet using a cable, look for a header that begins with "Ethernet adapter Local Area Connection." If you connect wirelessly, look for a header that begins with "Ethernet adapter Wireless Connection." You will usually only see an IP address displayed under one header in either category.

Step 3 Record your IP address and default gateway on a piece of paper or in a text file. If your IP address is 0.0.0.0 or begins with 169.254, unplug your Netgear router from its power source. Unplug your cable or DSL modem as well. Be sure to unplug both devices; turning them off with a power switch may not have the same effect. Wait 20 seconds before plugging the modem in again. Wait for the lights on the modem to light up. Plug in your Netgear wireless router again. Wait for two minutes. Use "ipconfig /all" again. You should have a different IP address now.

Step 4 Ping your default gateway. At the command prompt, type "ping 192.168.1.1" (substituting your default gateway address for 192.168.1.1). You should receive four responses, all of which will begin with either "Reply from" or "Request timed out." If you receive "Request timed out," unplug your Netgear wireless router from the power source for 20 seconds, and plug it in again. Wait two minutes before using "ping" again. If you receive "Reply from" responses, check to see if your Internet connection is working again.

Step 5 Open a Web browser. In the address bar, type "http://192.168.1.1" (substituting your default gateway address for 192.168.1.1). Press "Enter." If you have password-protected your Netgear router, you will be prompted for a username and password. The default username for a Netgear router is "admin." When you have successfully entered the username and password, your Web browser will show you the configuration page for your Netgear wireless router.
If your Web browser never loads a Web page or prompts for a username and password, you're not communicating with your Netgear router. Double-check the address you typed into your address bar. If you've typed it correctly and your connection is wireless, either your wireless card has a problem or your Netgear router is not correctly sending a wireless signal. Make sure your wireless card is enabled (using Windows' built-in Network Connections applet or the third-party software that came with your wireless card). Make sure your connection settings (SSID, security type, and key or passphrase) are correct for your network. Look at the lights on your Netgear wireless router. The wireless indicator light should be green. If it's orange or not on at all, your router is not sending a wireless signal.

Step 6 Make sure all the settings on your Netgear configuration page are correct. Most Internet providers use a dynamic IP address and DNS server addresses. Some Internet providers require a login, and some do not. To be sure, refer to the configuration information your Internet provider gave you when your Internet access was installed, or call your Internet provider's technical support number.

Step 7 Click on "Wireless Settings" on the navigation bar on the left-hand side of the page. If you were not able to reach the configuration page wirelessly and had to connect to your Netgear router with an ethernet cable, make sure these settings are still as you defined them when setting up your network. If not, either change the settings to suit you, or change the configuration of your wireless card to match these settings. Be sure to click the "Apply" button if you make any changes.

Step 8 Click "Router Status" on the navigation bar on the left-hand side of the page. Under "Internet Port," check your IP address. If the address begins with 169.254, you're not communicating with your cable or DSL modem. Unplug your cable or DSL modem from its power source for 20 seconds, and plug it back in. Wait two minutes, and refresh this page.
If your IP address still begins with 169.254, there is a problem either with the cable connecting your Netgear wireless router to your cable or DSL modem, or with the modem itself. If your IP address is 0.0.0.0, there is a problem with your Internet connection, and you should call your Internet provider's technical support.

Step 9 Record all your configuration information before trying to reset your Netgear wireless router to the factory defaults. Resetting may fix your problem, but it will wipe out all your configuration information, and you will have to reconfigure your Netgear router from scratch afterward. To reset most Netgear routers, use the tip of a pen or an unbent paperclip to press and hold the reset button on the back of the router until the test light blinks. Release the button, and wait two or three minutes. Connect to the router's configuration page in a Web browser. Log in with the default username and password, and configure your router. You may have to connect to the router with an ethernet cable to perform this initial configuration.

How to Find the IP address of a Website or Game Server

|

Sometimes you may need to find out some information of a Website, or maybe you just want to find an IP address, or ping a game server..etc.

Step 1 First you will need to open up the "Command Promp". this can be done by going to the start menu in the bottom left hand corner. Then you click on the "Run" option. If you do not see the "Run" option you can summon it by holding down the "Windows" key on your keyboard, and tapping the "R" key once.

Step 2 Once you have the "Run" menu open, enter "CMD" into the run box without the quotation marks, an click "OK". Now that you have the "Command Prompt" box open you can use the built-in "Ping" tool.

Step 3 Find the website or game server which you would like to find the IP address for and type this into the command prompt box without the quotation marks - "ping webaddress.com". For example, if I wanted to get the IP address of a server at Google, I would do "ping google.com". And the ping tool will show you the IP address once it's done sending a packet to Googles server.

How to get around the IE's Content Advisor

|

If a pesky person uses the content advisor to block your web browsing use this to get where you want to go! It does involve editing the Windows registry which can do irreversible damage to your Operating System so if you have never do something like this BE CAREFUL! It is a fairly easy modification to the registry and the part of the registry being modified does not contain any real important keys I just want to make sure everyone is aware that serious damage can be done here. Now that you undestand what the gravity of the situation is lets remove that Dean of no Internet Fun aka the Internet Explorer Content Advisor!

Step 1 First, go to RUN, then type regedit and the registry editor will open.

Step 2 Registry EditorNavigate the registry edit to H_KEY_LOCAL_MACHINE, SOFTWARE, MICROSOFT, WINDOWS, CURRENTVERISON, POLICIES, RATINGS

Step 3 Right click on the object named KEY, and delete it.

Step 4 If Internet Explorer is open restart it and you are passed the Content Advisor!

Win 7 shipping at “holiday season,” Win Server 2008 R2 beta available

|

Los Angeles –- Microsoft Monday said Windows 7 will ship "in time for the holiday shopping season."

The company also said the release candidate for Windows Server 2008 R2 is available now for download. http://www.microsoft.com/WindowsServer2008R2.

The company had officially been saying the ship date for Windows 7 would be early in 2010, but rumors were pegging the release for fall. The company did not clarify its definition of the "holiday shopping season."

In addition, Bill Veghte, senior vice president for the Windows business, also said an invitation-only technical preview for Office 10 will be available in July. He said attendees at TechEd would have first crack at grabbing one of those invitations.

Veghte also said a community technology preview of SQL Server 2008 R2, formerly code-named Kilimanjaro, will be available in the second half of 2009. The CTP will include enhancements in self-service BI, multi-server management, and Master Data Services.

Google adds Apps link to BlackBerry

|

Looking to increase corporate use of its hosted Google Apps offerings, Google last week unveiled a tool that's designed to make it easier for users of BlackBerry mobile devices to use its Gmail, Contacts and Calendar software.

Google Apps Connector for BlackBerry Enterprise Server is slated to be generally available in July, the company said.

The new software is installed on Research In Motion Ltd.'s BlackBerry Enterprise Server, "connecting it to the Google Apps cloud," said Raju Gulabani, a product management director at Google, in a blog post.

Dan Olds, an analyst at Gabriel Consulting Group Inc., said the move should help Google in its quest to build up its business presence.

"We know [Google] wants to get into the corporate market more and become sort of an enterprise replacement for Microsoft and Exchange," Olds said. "This gives them a more compelling story toward this end."

How Does a USB Broadband Card Work?

|

Interfacing With the Computer

A USB broadband card interfaces with the connected computer using a Universal Serial Bus (USB) connector. When the device is connected, the computer interprets the device as a network adapter and the machine's operating system begins sending network traffic to the device using standard networking protocols. Depending on the version of USB connector used, the networking speed may be moderate or exceptionally fast.

Conversion of Data to Radio Waves

When the broadband card receives networking data from the computer, it must convert the data into radio waves in order to interface with the wireless broadband carrier's point of presence or hub. Because the process used to modulate data into radio waves varies from vendor to vendor and is highly proprietary, a wireless broadband card must be approved by the carrier and provisioned for use on the wireless network. When the card is provisioned, certain information--including the card's electronic serial number (ESN), modulation formula and frequency--is programmed into the carrier's network to make the card active.

High Frequencies

Depending on the card's vendor and the wireless broadband carrier, the frequency of radio waves may vary considerably. At the low end of the wireless broadband spectrum, some carriers use the 800 megahertz (800MHz) frequency for wireless data communication; at the opposite end of the spectrum, specialized carriers use frequencies reaching up to 38 gigahertz (38GHz). In the United States, the 900 MHz, 2.4 GHz and 5 GHz frequencies may be used without special wireless licenses, though many carriers choose to buy their own frequency range to avoid outside interference.

Wireless Broadband Uses TDM

In addition to the much researched and developed modulation and frequency usage of the wireless broadband card, wireless broadband employs an advanced data encapsulation method known as Time Division Multiplexing, or TDM. This technology, an advanced formula that is widely considered a stable and secure data transfer method, helps the broadband card balance upstream (upload) and downstream (download) data packet transfer for optimum network and frequency utilization. The TDM technology has been adopted by the Universal Wireless Communication Consortium as the standard for wireless broadband communication.

How to Set up a Secured Wireless Network on Netgear

|

A wireless network is comprised of a wireless router, a computer (or other wireless-enabled devices), a high-speed modem, and a subscription to an Internet Service Provider (ISP). Netgear is a popular manufacturer of wireless networking hardware that allows users to set up a secured wireless network. In order to prevent unauthorized users from logging onto your wireless network to gain access the Internet, and in order to protect the data you transmit and receive online, you should change your wireless router's security settings to create a secured wireless network.

Step 1 Install the router. To install a Netgear wireless router, use an Ethernet cable to connect the router to the cable/DSL modem and use another Ethernet cable to connect the router to your computer. Make sure all of these devices are powered off as you connect them. Once connected, turn on the cable/DSL modem, the router, then the computer, in that order. Allow at least two minutes to pass after turning on each device to give the devices time to recognize one another.

Step 2 Log in to the router. Open a web browser and type in the router's address to load the router's settings page. The router's address can be found in the user guide or setup CD that came with your router, or you can download a user guide from Netgear's technical support page (see Resources). Most Netgear routers use one of the following addresses: http://192.168.1.1; http://www.routerlogin.net; or http://www.routerlogin.com. Press "Enter" or click "Go" in your web browser after you have entered the address.

Step 3 Enter the router's username and password. A prompt will appear on the screen when you enter your router's address, requiring you to enter a username and password before you can access the router's settings page. The default username for Netgear routers is "username" and the password is "password." Because the textboxes are case-sensitive, you must enter both of these using all lowercase letters. Press "Enter" to log in to the router and begin changing its security settings.

Step 4 Open the security settings menu. The router's home page has multiple links for changing settings. Find and click the "Security Settings" link to change the router's security settings.

Step 5 Change the SSID, choose an encryption setting and create a password. The default name (or "SSID") of your wireless network will be "NETGEAR." Enter a new, memorable name for your wireless network to help detract would-be hackers from trying to access your router, as most novice computer users with unsecure networks do not know how to change the default network name or institute any other security features. Newer Netgear routers offer WPA or WPA-PSK encryption to secure your network, both of which provide high levels of security. Select either of these. encryption types and create a unique password. This will require all users to enter the password before they can log in to your wireless network. It is important that you create a complex password that has several characters, including numbers. Once you have created a password, click "Confirm Password" to save it. To exit the security settings menu and log off of the router, click "Save" or "Apply" to save the changes you made, then click "Logout" to exit the router.

How Does a Wireless Printer Server Work?

|

Wireless Print Servers Connect to Wireless Routers

To provide wireless printing capabilities, wireless print servers interface directly with wireless routers. When the print server is installed, the server is configured to connect to the router either through a built-in display and keyboard, or---more commonly---using special software bundled with the wireless print server. If the router supports advanced features like network address translation (NAT) or wireless security, the server's configuration software allows these options to be defined during setup. The wireless server connects to the router using the Institute of Electrical and Electronic Engineers (IEEE) standard 802.11 wireless networking protocol; while some print servers may use advanced versions of the protocol like G or N, the limited amount of bandwidth required for sending jobs to print servers means that versions of the protocol later than B are rarely necessary.

Wireless Print Servers Serve Printers

Although wireless print servers connect to the local area network over a wireless connection, the server is physically connected to the printers it supports. Since most modern printers accept input through a Universal Serial Bus (USB) connector, many wireless print servers feature one or two USB ports for printer connections. Some printers, like the Brother MFC, support direct network connections; these printers are generally connected directly to the wireless router and do not require a print server interface. Older printers that do not support the USB interface may connect to wireless print servers using a parallel to USB adapter, though a printer upgrade to newer technology may render more desirable print job results.

Connected Users Map the Printers

When users connected to the network---either over standard Ethernet cables or an 802.11 wireless connection---they can quickly and easily map the networked printers and begin processing print jobs. Since the printers are not attached to a computer, users should map the devices as standalone network printers, much as if they were connected directly to the router. Depending on the model of wireless print server used, users can map the shared printers either directly using an Internet protocol (IP) address or using a printer name provided by the server. When a user sends a job to the printer, the router wirelessly sends the job to the server, where it is converted from radio waves to electronic data, and then sent to the printer using normal printer output routines.

How Does a Wireless Notebook Card Work?

|

Basics

A wireless notebook card is an electronic device that plugs into your computer, either internally connected directly to your motherboard, or externally, using a USB port, that allows your notebook to connect to the Internet without having to be tied down to Ethernet cables or phone lines. Once connected to your computer, a wireless notebook card will pick up signals from any wireless network transmitting within range.

Operations

A wireless notebook card actually operates in a very simple manner. A modem connects to the Internet via a series of coaxial cables going into a house or business, and sends and receives data information. This information is then passed on through another Ethernet cable to a wireless router. The router then converts the information received from the modem into a signal that can be transmitted over-the-air. Anything within the range of the router (in this case, your notebook computer) can pick up that signal via its wireless card. The card then converts that signal back into data information, which can then be utilized by your notebook.

Range

For a wireless notebook card to work, it has to be within range of a wireless network signal. This is completely dependent on the strength of the router. A standard router that can be purchased for consumer use has a range of about 100 feet. This means that as long as you are within 100 feet of the router, you will still be able to connect to the Internet. Due to the nature of the signal, the signal is stronger the closer you are to the router, so obviously if you could be 10 feet away from the router, you'd have a stronger connection than if you always stayed 100 feet away.

What Is a Wireless Adapter For?

|

Wireless adapters come in various shapes and sizes. Some are internal to a computer, some have antennas that stick out the back, and some are nothing more than antennas that plug into the USB port on a computer. Wireless adapters can often be added to computers that need connections to local networks.

Purpose

Wireless adapters are most commonly used to send a wireless signal to a wireless access point (WAP) to gain access to a network.

Appearance

Most laptop computers have wireless adapters already installed inside the computer, so they are not visible. Many desktop computers have a wireless card that is inserted inside that has a short antenna sticking out the back side of the computer.

Speed

Wireless adapters can communicate only with the network at the speed of radio signals. This will provide convenience, but using a wire will allow for a higher network throughput speed.

Security

One of the primary arguments against using wireless adapters is that the radio signal is sent in all directions, allowing any radio receiver to pick up and receive the signals. With computer communications, this allows another device to receive all the information broadcast without the sender knowing it has been intercepted.

Other Uses

In addition to network connections, other types of wireless adapters have been tested and used for other types of computer communications, such as the wireless mouse and the infrared wireless keyboard.

How to Connect a PS3 to a Laptop

|

There are a couple of reasons one might connect a Playstation 3 game console to a laptop computer. The PS3 can link up to your computer through a wireless connection. You can then access your computer's hard drive and its videos, music and photos from the PS3's menu. You could also connect to the computer to use it as a TV monitor for playing the console. These two connections are entirely different.

File Sharing

Step 1 Go to "Settings" in the PS3 menu and scroll down to "Network Settings." Go to "Internet Connection Settings" and select your wireless router from the list of available connections. If the router has security, you must input your password. "Internet Connection" in the Network Settings list will say "Enabled" once you are connected.

Step 2 Link the laptop and PS3 together through a router if you have one. Connect both the console and computer to the router with Ethernet cables. This is needed for a PS3 with 40 gigabytes of memory and that does not have WiFi.

Step 3 Connect the devices directly with a USB cable. Use one of the USB style ports the PS3 uses for its game controllers. This requires a USB cable with two thin connector plugs.

Connecting to Monitor

Step 1 Purchase an external video capture card for your laptop. This device will connect to the computer through the USB port and will have both composite and S-video connections.

Step 2 Connect the capture card to your laptop. Insert its included CD-ROM into your disc drive and install the software on it that allows the computer to recognize the card's drivers and includes a video viewing/editing application.

Step 3 Attach the PS3 to the capture card using the console's RCA composite cable. Open the video application and turn the console on to view it in the program's screen.

Step 4 Locate and click the application's "full screen" button to enlarge the game screen to your full monitor.

How to Hook Computers Together With Cables

|

The most common way to connect two computers is by using a Null Modem Cable. Once computers are linked, information and data can be readily transferred.

Step 1 Purchase a Null Modem Cable (see Resources below). Beforehand, measure the distance between the computers you are linking so that you buy the proper length of cable.

Step 2 Connect the cable to the serial ports on the back of each computer.

Step 3 Choose which computer will be the "host" computer and which computer will be the "guest."

Step 4 Open the Control Panel on the host computer. Select the "Network Connections" tab and choose to create a new connection. Choose to set up an advanced connection and then choose the option for connecting your computer directly to another computer.

Step 5 Select the connection device for your computers from the list of options and allow access for the guest computer. Select "Finish" when you are done.

Step 6 Open the Control Panel on the guest computer. Select the "Network Connections" tab and choose a name to identify this computer connection. Select the connection device for your computers from the list of options. Decide whether all users of the computer will be able to use the connection or whether you will limit it to certain users. Select "Finish" when you are done.

How to Connect Two Computers Via USB Cable

|

Connecting two computers via a bridged USB cable is a relatively simple and easy way to network them together. Connecting computers together is a great way to share files, split Internet access, or even allow the computers to share processing power.

Step 1 Get an A/A (bridged) USB cable. An A/A (bridged) cable has two flat, rectangular ends, with a bulb or a brick in the middle of the cord. This "bridge" allows the two computers to communicate effectively. Another factor to keep in mind is choosing between USB 1.0, which communicates at around 12 MBpS, and USB 2.0, which communicates at 480 MBpS. Choose USB 2.0, as the speed of communication is much faster.

Step 2 Install the software, connect the computers with "link" switched on, and follow the instructions that the software provides to share files between the two computers. A/A (bridged) USB cables generally operate in one of two modes, controlled by a switch usually found on the bridge in the middle of the cable. The first mode is "link," which comes with its own software. Link allows computers to share files, nothing more.

Step 3 Install the Network software that came with the USB cable, and connect the two computers. The second mode found on these cables is "network." Network allows two computers to share files, internet connections, and create a network.

That's it! Your computers are connected. Follow the instructions that come with the USB cable to learn how to perform certain tasks, such as sharing internet or creating a network.

What Is the Difference Between SATA & PATA Hard Drives?

|

With the multitude of computing devices, it can often be difficult to know your exact hardware needs. Hard drives are no different in this aspect because there are a great many differences between each type.

History

Originally designed by Western Digital in the mid 1980s, PATA (Parallel ATA) drive technology was the first common drive protocol used in mainstream computing until it was surpassed by SATA (Serial Advanced Technology Attachment).

Identification

PATA drives use a flat gray cable for connectivity to the motherboard and Molex power connectors.

SATA drives use round serial cable as a data cable and flat SATA specific power connector.
Features

Due to its newer data transfer technology SATA hard drives are capable of transfers up to 300 MB/s where a PATA drive can only reach 133 MB/s transfer speed.

Size

Both SATA and PATA hard drives come in 2.5-and 3.5-inch form factors for various uses, such as desktop or laptop computers.

Potential

PATA technology is largely being phased out by current manufacturers as obsolete.

SATA drive technology is the current standard for hard drive connectivity with an even faster 600 MB/s revision due in the near future.

What is Network+ Certification?

|

If you want to work in the networking industry, you need to obtain a certification. Although there are many specialized networking certifications available, the most common and easiest to obtain is the Network+ certification. Obtaining the Network+ certification grants you access to an entry-level career as a network technician.

What Is A Network?

In its purest form, a network is a group of computers joined together to communicate and share data. Networking has evolved into complex webs of computers linked together across buildings, cities and the world.

Who Maintains the Network?

Networks are designed, serviced and repaired by network administrators and technicians. Network technicians are generally required to obtain Network+ certification to gain entry into the field.

What Is Network+ Certification?

Network+ is an industry-recognized certification that assures employers that employees have basic competencies in setting up, troubleshooting, maintaining and servicing networks.
Achieving Certification

Network+ certification is awarded after successful completion of the Network+ exam developed by CompTIA, a highly respected certifying authority in the computer industry. The exam is multiple choice.

Benefits Of Network Certification

In addition to allowing you to find employment, having network certification credentials leads to greater respect from coworkers in the industry. It allows more opportunities for advancement in the networking field.

Preparation to Get Certified

If you want to obtain network certification, there are numerous books and study guides to help individuals prepare for the exam. Additionally, you can take a course in networking at a community college or vocational school.

How Does a Proxy Server Work?

|

Purpose

The basic idea of a proxy server is to act as an intermediary between the client computer and the Web server. The proxy server does all the work of connecting to the Web server. The main reasons for using a proxy are anonymity, security, speed and filtering. The client computer is invisible to the Web server; this protects it from malicious attacks and also keeps the client computer anonymous. A proxy server may speed up connections through caching. This means that the proxy servers keep a copy of files requested so that they can quickly send them if requested, avoiding the potentially slower download speeds of the host server. Finally, the proxy server may be used to filter or censor the information from before sending it to the client. For example, a school may blacklist sites considered inappropriate for students.

Connecting

The client computer is connected to the proxy server through the Web browser. The Web browser options include connection options that allow a proxy to be manually set. To do this the network address of the proxy server is put into the appropriate boxes. From that point forward any time the user enters a Web address in the browser it will talk to the proxy rather than directly to the Web server. This process is invisible to the average Web user.

Filtering

Once the proxy server receives a request from the client computer, such as a request for a Web page, it first checks that it passes filtering requirements such as a blacklist set up by the network administrator. Provided that it does, it will connect the to the server in question. Any malicious attacks from the Web server will automatically be directed to the proxy server, which has strong firewall protections. After the proxy server receives the Web page it will keep a copy in the cache so that if a client computer requests it again within a short period the proxy can send the cached version rather than having to download it again. Connections between a proxy server and client in the same physical LAN are usually faster than download speeds from distant Web servers, so caching saves time. Finally, the proxy server will pass the Web page to the client computer.

How to Disable a Computer Network

|

A network connections computers to other computers or devices which may contain useful resources. However, there are times when a network is a liability. In these cases, disabling a network is one method of preventing any ill affects. If the need for a network arises again in the future, the network can always be re-enabled.

Step 1 Determine if you want to disable the network via the local system (software), via the network or server the system is connected to (administrative) or by disabling the physical connection (hardware).

Step 2 To disable the network on a single machine via the system, go into the system configuration and set the network connection to disabled or off. For example, in Windows systems go into Control Panel -> Networking and then right click on the icon representing the network you with to disable. Choose "Disable." This will stop the system from using the network.

Step 3 To disable the network administratively, log into to either the networking equipment the system is connected to, or the server which authenticates the computer giving it permission to access the network. Revoke the right to access the network either by deleting the system from the list of permitted systems, or by setting the rights for the computer to not allow network access.

Step 4 To disable the network on a single machine via hardware, disconnect the network cable connected to the system. If this is not feasible, you can also disconnect the other end of the network cable at the hub or router.

Step 5 Disabling a network so that no system can use it is best done physically. Locate the networking hardware for the network. Generally, this equipment is in a central location like a server room, or on each floor in a networking closet. Disconnect the power to the networking devices such as routers, hubs, and switches. If this is not feasible, then unplug the incoming and out going network cables.

How to Convert a PDF File to an Editable Text Document

|

The Portable Document Format (PDF) is a widely used file type that essentially creates digital productions of original documents that are readable by anyone with PDF-reading software. To edit a PDF document, users typically need to purchase the appropriate editing software, but by following a few simple steps, you can create an editable text document.

How to Convert a PDF File to an Editable Text Document :

Step 1 Open the PDF document you want to edit.

Step 2 Click once on the "Edit" drop-down menu, once on "OCR Text Recognition" and select the "Recognize Text Using OCR" option.

Step 3 Click once on the "All pages" option on the "Recognize Text" pop-up window to begin the text-recognition process for the entire PDF document. Choose the "Current Page" option if you want only to recognize the text on the currently viewed page. Choose the "From page" option to run the text recognition process on a group of pages within the PDF file. In this example, "Current page" is selected, as the document is only 1 page in length.

Step 4 Click once on the "OK" button on the "Recognize Text" pop-up window. Depending on the size of the document, the text recognition process could take a few minutes.

Step 5 Click once on the "Edit" drop down menu and select the "Select All" option.

Step 6 Click once on the "Edit" drop down menu and select the "Copy" option.

Step 7 Open a word processing program. In this example, Microsoft Word is used.

Step 8 Click once on the "Edit" drop down menu and select the "Paste" option. This action will paste the PDF text into the word processing document.

Step 9 Format the text to match the look of the source PDF file. Because the text is copied line by line from the PDF without the paragraph formatting, some adjustment is usually necessary.

How to Fill out PDF Forms

|

Have you downloaded PDF forms and are confused about how to fill it out? Here's a guide to help you through the process.

Step 1 Download Adobe Acrobat Reader 9 installer from Adobe's website. You can find the link to the download at the end of this How-To.

Step 2 Run the Adobe Acrobat Reader 9 installation file you've downloaded to install Adobe Acrobat Reader 9 on your computer.

Step 3 Double click on the PDF form you want to fill out. This will start Acrobat Reader 9 and open the form. Alternately you can run Adobe Acrobat Reader 9 from the desktop shortcut or Start Menu->Programs, and then open the file from the File->Open menu.

Step 4 Fill out the form by selecting fields with the mouse, or using tab to navigated between fields. If a field is too small for the font you are using, you can change fonts or fill out the field neatly by hand after printing.

Step 5 Use the File menu to save or print the form once you have finished!

How to Block Pop-ups With McAfee

|

Configuring McAfee to block pop-ups is easy. However, you must be the system administrator or logged on to your own personal computer as the primary user to complete this task.

Step 1 Log into your computer as the system administrator or as the primary user. In most computers, the primary user account is also the administrator.

Step 2 If you did not configure McAfee to start when the computer first starts up, you need to start McAfee before continuing.

Step 3 Click "Internet and Network" and "Configure" in the "Internet and Network" information section.

Step 4 Click the "Advanced" button under the Web browsing protection in the pane.

Step 5 Click on the check box next to "Block pop-up windows from appearing when you browse the Internet." A check mark should appear in the box.

How to Remove the Axi Virus

|

The Axi series of computer viruses is all but impossible to manually remove. It can harm your computer by disabling your SafeBoot registry entries, which in turn can disable Safe Mode. It will attempt to compromise network security, hide itself in your .exe files and masquerade as other viruses to avoid detection.This guide will show you how to use antivirus software to banish it.

How to Remove the Axi Virus

Step 1 Download an antivirus program if you don't have one already. Komodo Antivirus is an effective, free antivirus program that works against the Axi virus series. Visit komodo-antivirus-software.qarchive.org/ to download it.

Step 2 Back up your files, with the exception of .exe files. Make sure you run the files through a virus scan before reloading them into another computer, as viruses can be exceptionally contagious.

Step 3 If Komodo Antivirus doesn't work, try downloading other antivirus programs, such as Ad-Aware from Lavasoft.

Step 4 If all else fails, you may need to do a destructive system restore. This can be performed by entering System Restore when you are booting up your computer. Most computers allow you do this by hitting the F11 key when the BIOS is loading.

How Does Cisco Work?

|

Cisco Systems Inc.

Cisco is a reference to Cisco Systems Inc. Cisco Systems is a leader in manufacturing network hardware used in computer networks. The company's specialty is making network connectors--routers, bridges and switches. They also design technologies and services for Internet communication. Cisco is known for network products that support more than one protocol. Protocols are standards or sets of instructions that regulate or enable a communication--data transfer or connection--between two points (sender and receiver). While Cisco does not write protocols, its products use them to communicate.

Hardware And Software

Cisco produces not only hardware products including broadband cable modems, switches and routers but it provides numerous software applications and services to enable further levels of communication beyond connection. Unified computing, data center management and video conferencing solutions are also part of Cisco's portfolio. Cisco designs for small, medium and large enterprises. Service providers have a separate category of products designed to manage larger flows of Internet and intranet communications including content delivery systems and network monitoring and management tools.

Cisco Product Documentation

Cisco provides revised and new documentation for its products right from its website. Users and customers are asked for their opinions about the documentation. This happens directly from the document update page. Ratings on quality and whether the document solved the customer's issue are requested. In addition, customers can add suggestions for improving documentation. Cisco's main support page offers further assistance with troubleshooting, installations and upgrades. Information can be viewed by task or product type. An area for collaborating with other Cisco customers and product users is provided in the form of a wiki application, also available from the main support page.

Cisco Training

Cisco Systems Inc. has numerous possibilities for customers to learn about its products and how they work. One of its better-known tools is its certification platform. Broken down by categories--Expert, Professional, Associate and Specialist--Cisco certification programs are taught all over the world. Certifications allow employers to have a better understanding of the actual level of knowledge employees have regarding Cisco. Specialist certifications include those for data center support, sales, design and networking positions.

Cisco Residential VOIP Service

Voice Over Internet Protocol (VOIP) communications is not a new technology for Cisco but creating products for the residential VOIP user is. Cisco is typically used in business networking platforms and not in homes. Through acquisition, Cisco has begun to establish a foothold in residential cable equipment with the purchase of Scientific Atlanta. Scientific Atlanta has provided equipment to Time Warner, Rogers Communication and other cable providers.

How to Convert MPEG4 to WMV

|

MPEG4, also called MP4, is the video format primarily used for iTunes and the iPod. WMV is mainly used by the Windows Media Player. Because of this, they are rarely compatible with the other media player, so most if not all of your MPEG4 files won't play on Windows Media. It is possible to convert those files into WMV format so you can play them on Media Player. This requires one of several possible software programs used foe video file conversion.

Step 1 Install an application program on your computer that converts video files from one to another. There are several programs that can be purchased or downloaded for free, though the free downloads are often only trial versions. Make sure the program works with MP4 and WMV files.

Step 2 Open the application and import your MP4 videos with the "add" or "import" command. This will take you to a search window where you can locate the folder(s) on your computer with the MP4 files.

Step 3 Select the MP4 files in the program's main screen and select the "output," "profile" or "add task" command. This brings up a drop-down menu for the format you want to convert to; select "WMV."

Step 4 Use the profile settings option if you want to make any changes to the video. This mainly involves altering the video's size and the video or audio quality.

Step 5 Select a destination to save the converted file to with the "output," "browse" or "destination" command. In the drop-down list that appears, choose a folder or other location on your computer to save the file to.

Step 6 Click on the "convert," "finish" or "OK" button to begin the conversion process. Once you receive a dialog box stating the conversion is complete, locate the WMV file in the selected folder.

How to Clear PC Main Memory

|

When your computer is in use it takes advantage of whatever memory is currently available from the Random Access Memory (RAM) or hard drive and then releases it once it's done. Depending on how a program is coded or even how it was closed down it may not always release all of the memory it was originally using. While your computer's operating system generally does a good job of taking care of lost memory fragments that haven't been released properly, you may want to manually clean your PC's main memory every now and again if you notice your computer running more slowly than normal.

Step 1 Open your web browser by double-clicking on its desktop icon. Navigate to a website that offers a PC memory cleaning software utility such as "Clean MemXP" or "Clean RAM" (see Resources below). Click on the download button at the top of the screen.

Step 2 Click on the button labeled as "Save File" if your web browser opens a second window asking you to verify that you actually want to download the file. Wait for the download to finish and then minimize your web browser and return to the desktop. Click on the "My Computer" icon to see the folders on your hard drive.

Step 3 Navigate to the folder where you saved the installation file for the PC memory cleaning utility. Double-click on the file and then click on "Next" when a new window pops up on your screen. Click on the box labeled as "I agree to the terms of this license agreement" and then click on the "Next" button. Click on "Next" again to start the installation. Click on "Finish" once the installation has completed to close the window.

Step 4 Return to the desktop and then double-click the icon that corresponds to the program you installed. Click on the "Extra" button on the toolbar at the top of the program's window. Choose the "Free Memory" option and wait for the program free the memory not currently being used by your computer's RAM.

Step 5 Click on the "Extra" button again and then choose the "Defrag" option. Click on the hard drive that you want to defrag and then click on "Start." Wait for the defragmenting process to complete to finish clearing your computer's main memory.

How to Reinstall Quark's Invisible Font

|

QuarkXPress is a desktop publishing and layout program developed and released by the Quark company and used on the Mac operating system. Occasionally, Quark users may encounter a relatively common software error while using the program, which tells the user to reinstall Quarks invisible font. This font is used to display page markers for items such as tabs and paragraphs. Learn how to reinstall this invisible font to restore functionality to the layout software and get back to work.

Step 1 Close the QuarkXPress software and restart your computer.

Step 2 Double-click the hard drive icon on your desktop. Alternatively, double-click the "Applications" folder in the dock.

Step 3 Navigate to your user folder. Double-click "Library."

Step 4 Open the "Preferences" folder.

Step 5 Double-click on the "Quark" folder, then open the folder for the version of QuarkXPress that you currently use (if you are running more than one version of Quark). Open "Jaws" and click "FontStubs."

Step 6 Delete everything in the "Western Subs" folder by dragging it to the Trash bin in your dock.

Step 7 Return to the "Library" folder in Step 3 and open the "Fonts" folder. Drag the "QuarkInvisibles.ttf" font file to the Trash bin.

Step 8 Restart your computer a second time, then re-launch the Quark software. It will automatically reload and reinstall the invisible font from its system files.

How to Use Limewire on a Mac

|

The Internet is home to an array of files being shared to millions of computer users every day. Movies, music, and software can be downloaded with a click of a button, but finding them can be difficult, especially if what you are looking for is rare. Limewire is a file sharing service that can help you find these files, and the software is available to Macintosh users.

Step 1 Download the Limewire software. The basic service of Limewire is free to use, but if you wish to use the Limewire Pro program, then you will have to pay a small fee to download and pay for a one-year subscription. Make sure that you agree to their Terms of Service.

Step 2 Install Limewire and open it. Follow the registration instructions by providing a user name, files you wish to share, and so forth. Although Limewire Basic is a free service, you are required to create at least a user name, or you cannot use the program.

Step 3 Type in the item you wish to search for in the "Search" pane. Choose the file type you want to search for to narrow your search results such as Audio, Movies, and so on. Otherwise, if you want to do a general blanket search, then leave it on the "All" setting. When you are finished, press the magnifying glass or press "Enter" to search.

Step 4 Wait for Limewire to list its searches. Depending on the rarity of your file will determine how quickly it will find matches for it. Hold the Apple button and mouse click, or right-click if you are using a two-button third party mouse, and view the file info to check if it's the right file you want.

Step 5 Download the file you want. This can be done either by pressing the Apple button and mouse click on the file to select "Download" from the drop down menu, or simply double-click on the file to begin the downloading process. A download prompt will appear on the lower area of Limewire, indicating the percentage amount it has downloaded so far. When it reaches 100%, you have successfully downloaded your file and used Limewire.

How to Type a Euro Symbol Using Works

|

A Euro symbol--€--is the symbol dedicated to the currency of the European Union. Typing a Euro symbol could be a frustrating task, especially if it is not present on your keyboard. If you're in the U.S., for example, you won't easily find the Euro symbol anywhere on your keyboard. Fortunately, there are many workarounds and shortcuts to get this symbol in Microsoft Works and any other word processor in virtually any country.

Ways to get a Euro Symbol in Works

Step 1 In Windows, go to Start > Run. If you're using Vista, simply click within the "Start Search" box.

Step 2 Type "charmap" and press "Enter." This opens the Windows Character Map.

Step 3 Select the font you wish to use, and search for the Euro symbol. Click the symbol and click the "Copy" button. This copies the symbol to your clipboard.

Step 4 Open up your Microsoft Works document and simply right-click "Paste" or use the hot key "Ctrl+v." This pastes the symbol in your document.

Step 5 Alternatively, you can type "Alt+0128" to get this symbol in your Microsoft Works document using U.S. keyboards.

How to Make Graphs in Microsoft Office

|

A graph is a diagram used to visually represent data. Microsoft Office refers to graphs as "charts," and is capable of making many different types of charts, including line charts, bar charts, and pie charts. Microsoft Word, PowerPoint and Excel all have the ability to insert a chart in a document they create, however, it is Excel that actually takes the data and turns it into a chart for all three programs. Word and PowerPoint merely link to Excel during the process and then display the results in their own documents.

With Excel

Step 1 Open Excel. In the blank workbook that appears on the screen, enter the data for your graph in individual cells, placing the horizontal axis labels down the first column, starting with row two, and the data in the cells to the right of the labels. If your graph has more than one data series, add series labels across the tops of the columns in the first row. See the illustration for an example of the format.

Step 2 Click and drag to select all the cells that contain labels and data for the chart.

Step 3 Click the "Insert" menu, then "Chart."

Step 4 Click a chart type from the top of the screen. The illustration here shows a Line chart selected.

Step 5 Click "Sort By Columns" or "Sort by Rows" in the Excel Formatting Palette, if you want to swap the horizontal labels with the series labels.

With Word

Step 1 Open Word to a new blank document.

Step 2 Click "Insert," then "Chart" from the menu at the top of the screen.

Step 3 Click the type of chart to insert. A line graph is chosen in the illustration here. Choosing a chart type will automatically launch Excel and display a template where you enter the graph data.

Step 4 Enter your graph data into the template. The template fields correspond to the type of chart you picked.

Step 5 Quit Excel (no need to save), and the data is automatically entered into a chart in Word.

Step 6 Double-click the graph to change colors or labels.

With PowerPoint

Step 1 Open PowerPoint and type a title for your slide presentation by clicking and typing in the text placeholders on the title slide.

Step 2 Click the "New Slide" button at the top of the screen.

Step 3 Click the "Insert Chart" button in the center of the slide template body.

Step 4 Click to select a chart type from the layouts that appear at the top of the screen. Excel will automatically open.

Step 5 Click in the cells in Excel to enter your data into the chart template. The template is based on the type of chart you picked.

Step 6 Quit Excel (no need to save) and a chart based on the data you entered will be added to the slide.

Step 7 Double-click the chart if you want to change colors or other appearance attributes.

How to Sharpen and Brighten Colors in Photoshop 7.0

|

I dare say not all pictures are perfect. There are times we see a photo and find something in it that we wish it can be fixed. The image I am using for this Photoshop 7.0 tutorial is one of those, and such a good example to use for this project. Granted with some elbow grease, time and patience, we begin our photoshop journey...

Step 1 Prepare the image you want to fix and open the file in your Photoshop. For this tutorial, I am using a superbike wallpaper I downloaded the other day from a free website. The image is fine for display on a computer screen, but not to the standards if it were to be used for a high-quality poster.

Step 2 Try to enlarge your image if it is too small, so you can see the details. To do this, go to the top menu bar and click Image > Image Size..., enter the values in all required fields then click OK.

The original size of the image here was 1,280 x 1,020 pixels. I scaled it down to 900 x 640 pixels which I think is about the right size for this project.

Step 3 For bright colors on the image, such as the neon green paint, metal and chrome parts, I use the Polygonal Lasso tool that you will find in the tool box to trace around them. This will take some time, and you can only edit one area at a time, so be patient.

Step 4 Once finish tracing a specific area (or object), go to Image on the top menu bar and select Brightness/Contrast..., the ratio I used are - -

(1)Brightness: +84 / Contrast: +21 for the green paint on the motorbike body.

(2)Brightness: +27 / Contrast: +6 for the chrome and metal parts of the bike.

Do not overdo contrast on the positive (+) numbers; the edited area will look harsh and unnatural.

Step 5 Now go to Image again and select Adjust > Color Balance. Adjust the sliders in the Color Balance selection area to adjust the editing object/area.

Below in the Color Balance pop-up window, under the Tone Balance section, there are 3 choices for tone adjustment settings. Try these out as well and see the overall affect on your image.

Click OK to finish process.

Step 6 Repeat Steps 3 to 5 until you get all the areas/objects of your choice done. These steps are the most time consuming parts for this project, once you pass these it's all easy.

Step 7 Go to Image > Adjust > Brightness/Contrast..., this time without selecting a specific area to edit, we will brighten and apply contrast to the whole image in order to make the colors unified. This includes for the colors you edited in the previous steps and the ones that were left untouched.

Click OK to complete step.

Step 8 Go to Filter on the top menu, select Sharpen > Sharpen Edges. Or Filter > Sharpen > Sharpen More.

Click Sharpen or Sharpen More repeatedly until you get the desired result for your image. For my image, I clicked twice the Sharpen, and once for the Sharpen More.

If you accidentally sharpen too much, go to Filter. The last action item will be listed on the very top in the Filter drop-down menu. Click on it and adjust to your desired percentage to fix, then click OK to complete.

You can also go to Edit, and click "Undo Sharpen", then start Step 8 again from the beginning.

Step 9 This is the final result for the fixed image. Click the image to see the difference between the left and right photo. We have now completed our Photoshop tutorial for brightening and sharpening an image.

How to Snipe in Call of Duty 4

|

This article will teach you how to be a great sniper on Call of Duty 4, and get you all those frags! Many of these tips are how pros do it. Always remember, practice makes perfect.

Step 1 The sniper you use is very important to your success. The best snipers in order are
1. M40A3
2. Barrett 50.cal
Tied at 3. M21 and Draganov
4. R700
The M40A3 is the best because it has little recoil, and always kills on the first shot in non-hardcore. You can put the ACOG on it and it is still effective also. The M40 also has very good wall penetration.
The Barrett 50.cal is the second best because it has massive amounts of recoil, so if you miss you must reset completely before shooting again. Also, by some fluke, it doesn't always kill in the first shot if you hit them in some place like the leg.
Tied at third are the M21 and the Draganov. They both are semi-automatic, and only sometimes kill on the first shot in non-hardcore. They both have their pros and cons, the Draganov has slightly more power and penetration, while the M21 has very little recoil, allowing you to shoot twice to kill.
Bringing up the rear is the R700. It is clearly the worst sniper because it has large amounts of recoil, only 4 bullets per magazine, and less penetration than the M40. It usually kills on the first shot, but not as consistently as the M40. Another benefit of the M40 is you start with the gun, and can use it all of one prestige!

Step 2 Next your going to need to outfit your self with the best perks. For now lets assume you have all perks unlocked. What you want to choose are claymores to watch your back, stopping power to make sure you kill, and without the ACOG, iron lungs so you can steady yourself much longer. Substitutes for claymores are C4 and 3 special grenade, while the substitute for iron lungs is Deep Penetration so you can shoot through walls.

Step 3 Now that you have a good class, you are ready to start playing. Learning good spots will take a long time and you will just have to play for a while to learn them all, it would take me days to describe them all. When you are just starting out, try and snipe other snipers, as moving targets are much more difficult to snipe, and again will come with practice. Look around through your scope for someone standing still, and pick them off. Once you get comfortable doing is consistently move on to the next step.

Step 4 Once you have a good feel for your sniper, start to work on quickness. Often being able to snipe others quickly before they can shoot you or see you is much better than having a good spot. Many pros are able to snipe moving targets while barely scoping, showing their effectiveness with speed. Learn to see the other snipers before they see you, and you will be a great sniper.

Step 5 Finally, moving targets are the hardest part of learning to snipe. It is simple once you are able to do it, but can be difficult to learn. Many strategies exist, but one more effective one is tracking. Start out by tracking enemies in your scope, following they way they are running and allow them to move into your scope. Once you are good at this start to track enemies without a scope. See them running, and scope when you want to snipe them. Using the two together is very effective. Start tracking them without the scope, then finish by scoping them.

Step 6 Use these steps, and practice sniping a fair amount, and you will become a great sniper in no time. Now go out there and get those kills!

How to Make New Dvd Slip Covers and Disc Covers

|

Ever lost a dvd case and wanted another one?Or maybe you need a disc cover for that back up cd you made. This article will show you how to do it quickly.

Step 1 First things first you need to download your disc cover and case cover of your chosen movie. You can do this at www.CDCovers.cc .You also need to download the free software called cover xp, the site is in the resources at the bottom of the page.

Step 2 After you download coverxp install it. Open coverxp and click on the file tab. you need to locate the files you downloaded from www.cdcover.cc and open them. Preview your cover and make final adjustments than print it.

Step 3 And after you printed them simply put them in your blank media case or on your cd. Now give your self an applause you just created your own dvd cover and or case cover.

How to Use Adobe Air

|

Adobe Air is a new platform that supports the deployment Internet applications running on your desktop. Simply put, it lets you run all kinds of nifty programs with online connectivity directly from your computer, as standalone applications. The programs are acquired from the Adobe Air marketplace, which follows the model of the popular Apple App store. Available apps include, among many, an all-in-one social networking people tracker - Nomee, and a Google Earth on steroids, called Earthbrowser.

Free from the confines of a browser, these tools can run faster and have more features than regular web applications. Let's find out how we can install and give Adobe Air a test drive.

Step 1 Go to the product's page, listed in this article under Resources.

Step 2 Scroll down until you see 'Next Steps' on the left side of your browser window, and under that click on 'Get Adobe AIR now'

Step 3 This will take you to the download page. Click on the big yellow button which says 'Download Now'

Step 4 On the pop-up window, click 'Save'. This will download the file 'AdobeAirInstaller.exe'. Locate this program and run it. Adobe Air is now installed!

Step 5 Now, let's get to the fun part, the apps! Head on to the Adobe Air Marketplace, which you can find on the same page I mentioned in Step 1, by clicking on the link 'Get Air Applications' , which is also located under 'Next Steps'.

Step 6 In the marketplace, browse till you find something you like and simply click on it. A new page with a detailed description of the application will appear. Locate the orange button 'Download from Publisher' and click on it.

Step 7 Follow the instructions on the publisher's page, which vary from app to app.

Step 8 Once the app is installed, it will put an icon on your desktop (if allowed) and it will also appear in your computer's Programs menu, just like any installed programs. Enjoy!

Step 9 To uninstall Adobe Air or any of the apps that run on it, follows the same procedure as you would use to uninstall regular programs. For instance, in Windows, go to Control Panel/ Add Remove Programs,locate the app and click 'Remove'

How to Ensure Online Kids Safety

|

Parents with young ones need to be aware of the Internet activities of their children. Many parents have children just on the verge of being old enough to start using the Internet and they might not have considered how they're going to ensure online kids safety. Here are a number of guidelines to help ensure child safety online.

Step 1 If the parent isn't already familiar with the Internet, now is the best time to update their skills and learn what they can. A solid understanding of technologies such as: instant messaging, e-mail, text messaging, forums, chat rooms, and social networking sites like MySpace will all be important for helping to ensure online kids safety.

If some outside training is required you can check at your local library or community center where they often have classes teaching internet usage and safety.

Step 2 Create a list of acceptable online behavior for your children. For instance, in the beginning you may insist that the Internet may only be used while accompanied by a parent or guardian. This would be useful for guiding your child through their ‘first-time’ experiences online and making sure that they develop good habits.

Step 3 Keep the family computer in a centralized location to help ensure that your kids online behavior is being observed. You don't need to stand over them 24/7, but just knowing that you are there will make them less likely to search the web for inappropriate content.

Step 4 It will be difficult to keep track of what your children are doing online at ALL times so it's advisable to install an Internet control software program. This will help to ensure online kids safety. Your Internet security software should include stealth mode, key logger for storing passwords, website history, and some method of taking screen-shots at designated intervals or times. It would also be useful to have software capable of monitoring specific behavior on social networking sites.

How to Find the Best Internet Control Software

|

There are many components that go into making stable and useful internet control software. Some of the features that you may be interested in looking for include: the ability to monitor MySpace, password capture, recording online sessions, chat recorders, screenshot recording, e-mail monitoring and reporting, website history, website blocking, software monitoring, URL filtering, and stealth operation. Many of these features are invaluable to parents since they need to be able to monitor their children and teens behavior while spending time on the Internet.

So how does someone find the best internet parental control software to keep their children safe while browsing online?

Step 1 A good place to start is creating separate user accounts for the parents and children. Everyone should have their own unique user account. Parents in the house should receive an administrative account and the children would receive limited user accounts. A limited user account should be configured so that there are no software installation privileges. The administrative users would be able to have full online parental control to ensure their child's safety.

Step 2 Make sure that all of the computers that are accessible in the house have been brought up to the same standards of security. Don't just secure the computer in the family room and leave the laptop without administrative passwords…secure them all. This will allow you to have full monitoring control over every computer that your kids have access to.

Step 3 Determine the level of security required for monitoring the Internet behavior of your kids. This should include at bare minimum: e-mail monitoring for kid safe email, a key logger to capture keystrokes, a chat recorder, and URL filtering. Beyond that, it would also be useful to monitor behavior on specific social networking sites such as MySpace.com and take screenshots or recordings at designated intervals.

Step 4 You may also want to create time windows in which the Internet can be accessed via your router. This can usually be done by logging in to the IP address listed as your DHCP server and adjusting the accessibility timetables. For this feature, you will probably have to consult your manual.

Take some time when deciding on the best Internet control software for your family. You will want one that's cost effective and includes all of the important security features discussed above.

How to Convert MPEG Movie Files for Free on a Mac

|

If you are converting from a PC to a MAC and are a movie maker you probably have a lot of MPEG1 and MPEG2 files. If you have a Sony camera you have discovered they do not support MAC, but you can still move the MPEG files over to your MAC without any problems; they just won’t play. QuickTime Pro and iMovie both support MP4 format, but not other MPEG formats. There is a free program called MPEG Streamclip that you can download that will solve this dilemma. Read on to see how easy it is to convert these files--so you can access them through iTunes and iMovie.

Step 1 Start your MAC and download MPEG Streamclip software (see link in Resources below). Review the conversion options. In addition to the MP4 format you can also convert the video to a large number of other formats including AVI and MOV files. You can use this software to convert most native formats into MP4 or other MAC formats. It will not, however, work with Windows WMV files.

Step 2 Open a finder and browse to find the movie you want to convert. You can also convert entire DVDs and movies to MP4 formats for loading on your iPod. I now have old "SNL" episodes and "Duck Soup" on my iPod, so I never have to be bored at an airport again. When you have selected your movie simply drag it to the target window and the movie will load and be playable within the preview window.

Step 3 After the movie has loaded browse to the FILE menu and select EXPORT TO MP4 to open the exporter window. Here you can select your sound and resolution options. I find the best sound rendering filter is the MPEG-4-ACC option and that the Dolby option has a compressed and scratchy sound. Higher quality will make a larger file if you are exporting to a DVD or watching on a TV. 50 percent Quality will make an excellent copy for an iPod or iPhone. Don’t change the resolution unless you know what you are doing, since it will change the effective aspect ratio of the movie. When you are done, click ADJUSTMENTS.

Step 4 Adjustments allow you to change some basic image adjustments like brightness, contrast and saturation. I prefer to make these adjustments in the image-editing program, but if you see the movie is too dark in the preview you can make some basic corrections before rendering. Automatic Volume Control will equalize the volume between movie clips. If you have already done this in GarageBand you should leave this unchecked.

Step 5 When you are finished simply click MAKE MP4 to begin the rendering process. If there are time code breaks in the movie you will be prompted to either fix these or not. You will also be prompted for a TITLE and FILE location. If you have checked PREVIEW in the option a preview window will appear and you can follow the rendering process.

How to Create a Seamless Tiling Background in Photoshop

|

Creating a background that will tile properly on a webpage can be tricky. Just selecting any old photo will create ugly repetitive seams - you'll be able to see where one copy of the photo stops and another begins. This photoshop tutorial will show you how to modify a picture so you can no longer see the borders, creating a seamless tiling background image.

Step 1 Before you even file up Photoshop, know that some images are going to be harder than others. Many images, especially photographs, are impossible to scale. The image of yellow flowers, for instance, would be difficult because of the perspective. The flowers in the from are much larger than those in the back. They're also out of focus. Try to picture what a picture would look like tiled - would it even work? For the best results, use an image that has a fairly even distribution of it's subject. Everything is in focus, at the same angle, and easy to work with. For this example we'll be using the white flower picture.

Step 2 Open the image in Photoshop and check its size. The easiest way to do this is to go to "Images" in the menu bar and click "Image Size..." Remember the width and height.

Step 3 Click Filter in the menubar. Go to "Other" and click "Offset". You want to enter half of the images height and half of the width. Because our original numbers were 1000 wide and 700 high, we're going to enter 500 horizontal and 350 vertical. Click the "OK" button and notice the four distinct sectors that appear.

Step 4 This is where the real work comes in. The previous step created two seams - one horizontal, one vertical. You have to blend those seams. Depending on the type of graphic you're working with, there may be some tools better suited than others. Here we used the cloning brush exclusively. Select it, alt+click to define a source and left click to brush. If you've never used this tool it can take some getting used to. You can also try the healing brush (band-aid icon) and copy/pasting pieces of the image from one area over the seam. Work you way from left to right until you can't tell where one half ends and the other begins. Then work on the vertical seam in the same way.

Step 5 Once you've removed any trace of the seam, your photo should look something like this. Our example is a bit of rushed work, but you get the idea. The more natural your photo looks in this state, the better you end product is going to look. If you're not buying that this is one solid photo, work on it a bit more.

Step 6 Once you're done, go back up to "Filter" in the menubar, go to "Other", and click "Offset". This restores your image to it's original form. You may need to touch up a few things here, but for the most part it should look fine.

Step 7 Go back to "Image" in the menubar and click "Image Size..." Set the image to whatever size you'd like the background to be then save the image. Keep in mind that tiling background shouldn't be very large or they can be a strain to load.

Step 8 Your image should tile together nicely! You'll notice that the seams you were working are the ones where the title background ends and begins. Our example here shows four images displayed tiled together. While it isn't perfect, it certainly looks better tiled than the original image did. If you're unhappy with your results, you can open the image back up in photoshop, flip it inside out with "Offset" again, and make it look even better.

How to Perform a Disc Cleanup

|

Have you ever had a pc that is slowing over time? One way to improve the systems performance is using a disc cleanup. This tools removes unused and temporary files. These are not needed by the computer and tend to build up. Once built up these files cause the machine to slow down as it has more to look through when accessing a particular file. This is great when used with other utilities on the web such as Ccleaner and many others. Privacy erasers can also help this process as privacy files build up just as much as temporary files and can give people information you may not want them to have about you.

Step 1 Click start and then all programs

Step 2 Click on accessories and then on system tools

Step 3 Next click on disc cleanup and then on ok

Step 4 From there follow the steps on the wizard do not clear anything you are unsure of in case you may need it.

How to Clear Data From a Hard Drive

|

Clearing data from a hard drive is one of the hardest things to do if you are not familiar with the process. When you sell or donate your equipment you may think your information is safe simply by formatting the hard drive, but this is not true. You would have to remove the hard drive or use a program that would write over your information several times to make it hard to recover. With today’s technology, information can be recovered very easily from hard drives with software available over the Internet.

Step 1 Delete your files from your computer. If you are just deleting files from your computer through windows programs they are not gone. Most programs are placed in the recycle bin. These files can be retrieved just by restoring them to your computer. Even if you empty your recycle bin, the files still exist on your computer hard drive.

Step 2 Watch out for information thieves. Many people are retrieving information from old computer hard drives. This information is found on computers left at the town dumps, second hand shop that sell computers and used hard drives sold over the internet. Be careful when selling your equipment, even to people you know.

Step 3 Reformat your hard drive. This is a good start when selling your equipment, but formatting your hard drive and putting a new operating system on it does not erase your information. The best way is to encrypt your information so that if it is recovered it will not be available to read. Windows XP has an encryption program available and so does Windows Vista. However, you should also run a secure erase program to protect you privacy.

Step 4 Use software to completely erase your hard drive. If your choice is to erase all the data on your hard drive you have to write over it. The process of deleting files or formatting your hard drive will only place your deleted files in swap files or unused locations of your hard drive. You would need to find a wipe program to clean up all files and hard drive free space. These programs are also known as shredders which over write your information with characters to make your information hard to recover. It will take time to erase your files with these types of programs.

Step 5 Use Hard Drive data retrieval software. Using programs like Disk Investigator will give you total access to your hard drive information. This does not encourage hacking someone’s computer, but only to check your hard drive after wiping files. However, this will give you a good idea on how powerful data recovery programs can be.

Step 6 Remove your hard drive. If you still feel uneasy about leaving your hard drive in the computer, sell it without a hard drive. If you are not attached to your hard drive take a hammer to it and totally destroy it or use it as a spare drive. The most important part of the hard drive is the platter inside the case. This is like a DVD or CD and it contains the information you are trying to destroy.

How to Get Free Computer Software Online

|

You can get free computer software by participating in its creation as open source, shareware or free software. Software applications, games and just about anything you need can be found online.

Step 1 OPEN SOURCE - Look for open source software applications whenever you need new software. Open source software is often developed by many developers that come together to make software that everyone can use. Even individuals that do not contribute can use the software. Individuals can volunteer to help develop, test and fix the software. After the software is completed everyone can use it, but if they do, they need to credit the source. The code and source can never be hidden. You can use the software in applications that you develop. Open source computer software applications can be games, business software or for personal use.

Step 2 SHAREWARE - Research shareware software to see if you can find one that suits your needs. Shareware is software that is normally given out free to use either for a limited amount of time or for testing purposes. The code is never given out and it cannot be used in other applications without the permission of the owner of the software. Shareware computer software is often a business application but it can be any kind of software.

Step 3 FREE SOFTWARE - Look for free software online. There are many software applications that you can find free online. There are many different reasons why the software ends up free of charge. The software may be outdated. The software may be in a trial mode. Possibly the software was never perfected and has defects. You can find free computer software online such as games and business applications. Games are commonly found free online as they become outdated.

Depending on your needs, most likely you can find free computer software online or open source or shareware software.

 

©2009 computer technology World | Template Blue by TNB