Ahad, 20 Mei 2012

The Function of Various Type of Software for Preventive Maintenance

There are thousand of problem in the personal computer could have, from an endless list of possible error to various hardware failure. Most of those problem might have several possible causes are:


Check files system for errors

A file system is a method of storing and organizing computer files and their data. Essentially, it organizes these files into a database for the storage, organization, manipulation, and retrieval by the computer's operating system. File systems are used on data storage devices such as hard disks or CD-ROMs to maintain the physical location of the files. Beyond this, they might provide access to data on a file server by acting as clients for a network protocol, or they may be virtual and exist only as an access method for virtual data. It is distinguished from a directory service and registry. Most file systems make use of an underlying data storage device that offers access to an array of fixed-size physical sectors, generally a power of 2 in size. 

The file system is responsible for organizing these sectors into files and directories, and keeping track of which sectors belong to which file and which are not being used. Most file systems address data in fixed-sized units called "clusters" or "blocks" which contain a certain number of disk sectors (usually 1-64). This is the smallest amount of disk space that can be allocated to hold a file. However, file systems need not make use of a storage device at all. A file system can be used to organize and represent access to any data, whether it is stored or dynamically generated.

However, the file system has to show how to use model checking to find serious error in file systems. Model checking is a formal verification technique tuned for finding corner-case errors by comprehensively exploring the states spaces defined by a system. 

File system have two dynamics that make them attractive for such an approach:

  1. First, their errors are some of the most serious, since they can destroy persistent data and lead to unrecoverable corruption. 
  2. Second, traditional testing needs an impractical, exponential number of test cases to check that the system will recover if it crashes at any point during execution. Model checking employs a variety of state reducing techniques that allow it to explore such vast spaces efficiently.
 
To resolve this error, User could download Mini-Tool Partition Wizard at Mini-Took Partition Wizard Download Center  which is totally free for home and personal user. The following is a demonstration on how Mini-Tool Partition Wizard checks partition error.


This is the initialization interface of Mini-Tool Partition Wizard.


Select desired partition and click "Check File System".


 Two options are available in this window: "Check only. (Do not fix detected errors.)" is to check errors of file system clearly; "Check & fix detected errors" is to check as well as repair errors of file system.

Or in other way to resolve the file system by:

You can help solve some computer problems and improve the performance of your computer by making sure that your hard disk has no errors.

  1.  Open Computer by clicking the Start button , and then clicking Compute 
  2. Right-click the hard disk drive that you want to check, and then click Properties
  3. Click the Tools tab, and then, under Error-checking, click Check Now.  If you are prompted for an administrator password or confirmation, type the password or provide confirmation.
  •  To automatically repair problems with files and folders that the scan detects, select Automatically fix file system errors. Otherwise, the disk check will simply report problems but not fix them.
  • To perform a thorough disk check, select Scan for and attempt recovery of bad sectors. This scan attempts to find and repair physical errors on the hard disk itself, and it can take much longer to complete. 
  • To check for both file errors and physical errors, select both Automatically fix file system errors and Scan for and attempt recovery of bad sectors.
 
      4. Click Start.

Check Disks for read error

This sort of message (disk read error) indicates a hardware problem. It means it's trying to save a file to some removable media (USB memory stick, flash card, portable hard drive or MP3 player, etc) and there's a communication problem perhaps because the cord is unplugged. It may be indicating an intermittent failure of user hard disk controller (integrated into your computer's motherboard), which is replaceable. At worst, it's indicating a partial failure of user hard disk. If the user only seeing the problem, it may be failing to read on a particular area of the disk.



Without going into too much detail, a "CRC" or cyclic redundancy check is a computer algorithm for detecting that the stream of data being read or received is corrupted in some way.


there are many types of errors:
  • Runtime Error - An error that occurs during the execution of a program.
  • ActiveX Error - An error caused by certain browser settings and misconfigured system files.
  • DLL Error - Missing or corrupt .dll files often occur when removing or installing a program.
  • .exe Error - Often occur during system or program start up due to unneeded files in the Windows registry.
  • General Protection Fault - Occurs when a program that is running violates the hardware rules in some way.
  • Blue Screen of Death - Occurs when Windows cannot recover from a system error.  Usually requires a reboot.
  • Windows Explorer Error - A dirty registry may cause Windows Explorer to get stuck in a loop.
  • iExplore or iExplorer Error - An error related to  your Internet Explorer browser often causing it to shut down.
  • Access Violation - An error that occurs when an application tries to access storage not designated for it.
  • System32 Error - An error often caused by missing or corrupt system files. 
  • Windows Installer Error - Caused by 3rd party "shell extensions" resulting in a white screen and/or crash.

There are 3 step to repair disk read error if the user got disk read error then there is a 94% chance that their computer has registry problems. To repair disk read error they need to follow the steps below:


* Step 1 - Download a disk read error repair tool,install this error repair tool.
* Step 2 - Click the Repair All Button.It will scan you PC for Free.
* Step 3 - Then click the Repair All Button again and your done! It is very easy to repair disk read error.


One of the most common errors any PC user will encounter is the dreaded disk read error. Disk read error can usually be easily fixed with popular repair tools, There are disk read error repair tools is Registry Easy, Regcure and Perfect optimizer.
Registry Easy

An Excellent disk read error repair tool, out performed all other products in our tests detecting and repair almost all of computer errors,removing all forms of Trojans and other forms of Spyware, Adware and Malware. Easy to use, safe,
powerful and amazingly effective.

RegCure

A really good disk read error repair tool and is gaining in popularity. Fixed almost all of the computer problems.

Perfect optimizer
Very easy to use, but didn't fix as many errors as Registry Easy or regcure. Still a very good option for complete beginners.

Scan Disk and files for virus


When the user want to check a disk or folder for possible infection from viruses and malware, They can launch an On-Demand Scan using the Run a Scan option. This executes an instant virus scan on the selected item. The user can also check a wide range of removable storage devices such as CD's, DVD's, external hard-drives, USB connected drives, digital cameras.

There is two options available when choose to run an On-Demand Scan:
  1. Scan a preselected ares; or
  2. Define a custom scan of the areas user choose, by creating a Scan Profile. 
  • Apart from running an On-Demand scan from Run a Scan interface, the user can also scan specific objects using  Contact Sensitive Scan. 
 Scanning Preselected Areas

Comodo Antivirus has two pre-defined scan profiles to run On-Demand Scan on preselected areas on your system. They are:
  1. My Computer - When this Profile is selected, Comodo Antivirus scans every local drive, folder and file on your system.
  2. Critical Areas - When this profile is selected, Comodo Antivirus scans the Program Files Folder and WINDOWS Folder of the Operating System of your computer.
  3. Spyware Scan - Among the many types of malware, spyware is a unique malware, which when it gets installed in users computer without user  knowledge while browsing the Internet or installed secretly, gathers small bits of data from their system without affecting its performance in any way. It is mainly used to collect vital information from user computer such as passwords by detecting keystrokes and various other personal information with a potential to seriously compromise important data.
Spyware Scan feature in Comodo Antivirus scans Windows registry and system files to check whether the computer is infected with such malware and alerts. This scanning feature improves the detection and successful cleaning rate of already infected systems.
Custom Scan

You can run the virus scan on selected disks or folders by setting the scan profiles beforehand. For more details on Scan profiles, refer to Antivirus Task > Scan Profile. It also can Create a Scan Profile from the Run a Scan option.

Comodo Antivirus also scans the archive files such as .ZIP, .RAR, and so on, on running an on-demand scanning.

To start an On-Demand scanning

  1. Click 'Run a Scan' in the main Antivirus Task Manager Screen.
The 'Run a Scan' panel appears.
 From the 'Run a Scan panel, it can:
  • Run a scan one of the item listed in the panel
  • Add a new item to scan by creating a new scan profile
  • Save the scan results as text file
  • Move any threats identify by the scan into quarantine
  • Disinfect the selected file/ application if an exclusive disinfection routine is available
  • Delete any infected files, folders or applications
  • Exclude an application consider as safe from the threat list
To scan your system for viruses and malware
  1. Click 'Run a Scan' in the Antivirus screen.
  2. Select a Scan Profile name and click 'Scan'.
Comodo Antivirus checks for AV database updates and if available, updates the virus database in your system.

Then Comodo Antivirus starts to scan the items, based on the scan profile you have selected.

 On completion of scanning, the 'scanning completed' window is displayed.

  1. Click 'Results' to view the Scan Results window. If malicious executables are discovered on your system, the scan results window displays the number of objects scanned and the number of threats (Viruses, Malware and so on).


     To save the Scan Results as a Text File
    1. Click 'Save' and enter the location in the 'Save As' dialog box.
    1. To move selected executables detected with threats to Quarantined Items Select the application from the results, click the drop-down button beside 'Clean' and select 'Quarantine'.



    1. Click 'Yes' in the confirmation dialog box.

      The selected application is moved to the Quarantined items. For more details on quarantined application, refer to Antivirus Task > Quarantined items..

      To disinfect the file / application detected with a threat
      1. Select the application from the results, click the drop-down button beside the 'Clean' button and select 'Disinfect'.

    2. Click 'Yes' in the confirmation dialog box.







    The antivirus disinfects the file if there exists a disinfection routine defined for the file and the file is recovered to its pre-viral state. If no any disinfection routine is available, the file is deleted permanently from your system.


    To delete an application detected with a threat
  2. Select the application from the results, click the 'Clean' button.

2. Click 'Yes' in the confirmation dialog box.


 


To ignore an application / file you consider as safe from the threat list
  • Click the 'Ignore' button

    Selecting Ignore provides you with four options.
  • Once - If you click 'Once', the virus is ignored only at that time only. If the same application invokes again, an Antivirus alert is displayed.
  • Add to Trusted Files - If you click 'Add to Trusted Files', the virus is moved to Trusted Files area. The alert is not generated if the same application invokes again.
  • Report this to COMODO as a False Alert - If you are sure that the file is safe, select 'Report this to COMODO as a False Alert'. The Antivirus sends the file to Comodo for analysis. If the file is trustworthy, it is added to the Comodo safelist.
  • Add to Exclusions - If you click 'Add to Exclusions', the virus is moved to Exclusions list. The alert is not generated if the same application invokes again.
Creating a Scan profile

Scan Profiles are the user-defined profiles containing specific areas on your system that you wish to scan and can be re-used for all future scans.

To create a new scan profile

  1. Click 'Create New Scan' in the 'Run a Scan' interface.

    A 'Scan Profile' configuration appears.


    1. Type a name for the scan profile to be created in the 'Name' box.
    2. Click 'Add'.
    A configuration screen appears, prompting you to select the locations to be scanned when the newly created scan profile is selected.
  1. Select the locations from the left column, drag and drop to the right column or select the locations and click right arrow to move selected folders to right column.
  2. Click 'Apply'.
  3. Repeat the process to create more Scan Profiles.

Context Sensitive Scan

Right click any item i.e. a drive, folder or a file in Windows Explorer and select 'Scan with COMODO Antivirus' from the context sensitive menu to perform a virus scan selectively on the item. This is useful when you suspect a particular item might contain virus due to newly downloaded or copied folder/file.


De-frag Hard Disk Volume

Disk Defragment consolidates fragmented files and folders on your computer's hard disk, so that each occupies a single, contiguous space on the volume As a result, your system can gain access to your files and folders and save new ones more efficiently. By consolidating your files and folders, Disk Defragment also consolidates the volume's free space, making it less likely that new files will be fragmented.

It can also defragment disks from a command line using the defrag command. For more information, click:


  1. To open Disk Defragmenter, click Start, point to All Programs, point to Accessories, point to System Tools, and then click Disk Defragmenter.
  2.  For information about using Disk Defragmenter, on the Action menu in Disk Defragmenter, click Help.

 In other way, can use:

Disk Defragmenter MMC is based on the full retail version of Executive Software Diskeeper. The version that is included with Windows XP and later provides limited functionality in maintaining disk performance by defragmenting volumes that use the FAT, FAT32, or NTFS file system.

To start Disk Defragmenter MMC, use one of the methods that is described in this article:

 1 Part: Use the Properties of Your Local Disk

  1. Open My Computer.
  2. Right-click the local disk volume that you want to defragment, and then click Properties.
  3. On the Tools tab, click Defragment Now.
  4. Click Defragment.

2 Part: Use Computer Management MMC

  1. Start Computer Management MMC (Compmgmt.msc).
  2. Click Disk Defragmenter.
  3. Click the volume that you want to defragment, and then click Defragment.

3 Part: Use Disk Defragmenter MMC.

  1. Start Disk Defragmenter MMC (Dfrg.msc).
  2. Click the volume that you want to defragment, and then click Defragment.
The version of Disk Defragmenter MMC that is included with Windows XP has the following limitations:
  • It can defragment only local volumes.
  • It can defragment only one volume at a time.
  • It cannot defragment one volume while it is scanning another.
  • It cannot be scheduled. If it need to schedule disk defragmentation, use the Defrag.exe command line tool. For additional information about using the command line Defrag.exe tool, click the following article number to view the article in the Microsoft Knowledge Base:
283080 Description of the New Command Line Defrag.exe Included with Windows XP
  • It can run only one MMC snap-in at a time.
The third-party products that are discussed in this article are manufactured by companies that are independent of Microsoft. Microsoft makes no warranty, implied or otherwise, regarding the performance or reliability of these products.

 




Jumaat, 18 Mei 2012

RJ45

This is the wire of RJ45 that we gone make it as telephone wire. Our instructor of Hardware Technology had teach us how to cut the wire and connect with the plug. This activity that we work on are individually and each of us are given wire.

RJ45 Wire

I'm start to cutting my wire.

Here's the wire that i had cut.

Both end of this wire are should looks like this. The small wire inside are arrange into proper according to the colour.





Jumaat, 27 April 2012

Groupzzz

There are 5 group in my classmate, to do the demonstrate of CPU
New GirL

iLastMinute

comming soon ...sl alom tau group name drg,,,ehee

pun sama coming soon jua,,,sory yeee,,,

Isnin, 23 April 2012

ReaL Like Working Technology

This is my video that i had create. The main video that i create is about camera. I had include the history of camera and the function of camera. Before you enjoy watching my video, i would like to say "THANK YOU SO MUCH" for my classmate that had helping me.

ENJOY WATCHING!!

Find the First Technology for I & II World War


Technology for I & II World War


World War 1 came first. Technology was relatively primitive, with most of the war being done in trenches. Early air-planes were used. Poisonous gas was deployed for the first time. 

Air-Planes

Poisonous Gas



































In World War 2, tanks were used as the main deployment in many areas. Planes had improved, and bombers and fighters were heavily used. Submarines were also more heavily used. Encryption codes for secret also became more complex.

Air-Planes with Bombers


Submarine


















What would happen to the world if there's NO Technology


As we grow more and more dependent on technology we lose the ability to survive without it. What will happen if we can no longer produce the materials and power required to run our techno-society. This could result from a devastating global war or simply over time as we exhaust our resources and expand our population.

Could any of you survive a nomadic existence? Could you fend for yourselves? Could you fight for your family's survival?

If there was no technology in the world,  there wasn't any music, T.V, internet etc.....People would be closer to their families, young kids wouldn't turn to drugs and girl's wouldn't be having intimate relationship at such a early age. A lot of how we are would be different, because our conditioning would be different. People that listen to classical music have been shown to be more intelligent then kid's whom listened to heavy music or rock n roll.


Last but not least, if our live are not depend on technology, we might become as "Flintstones life" where you can see this video.

 


So with technology, it can:
  • Improved scores on standardized
  • Increased application and production of knowledge for the real world
  • Increase ability for students to manage learning
  • Increase ability to promote achievement for special needs student
  • Improved access to information that increase knowledge, inquiry and depth of investigation. 

Potential

  • The technology available today has made a wealth of knowledge available to students, which offers great potential for the speed and style of learning. Information is presented in so many ways that any type learner, whether gifted or disabled, can find and use the necessary material. This fact relates not only to the Internet, but to all the many technological improvements in learning, from smart boards to handheld dictionaries.

Loss of Skills 

With this increased access to knowledge also comes a probable loss of communication skills and interactive abilities between students and teacher, and students to peers. These skills are not as necessary in a classroom of computers, where individuality is a component of learning and is encouraged. Aside from learning, conflict resolution and socialization used to be two prominent reasons children came to school. The emphasis now has shifted away from these areas.

Access to All 

Education is no longer the elitist privilege it once was. The information on the Internet is there for all who have access, without discrimination. People of all social strata are able to use technological advances, which is a fairly new academic development in America.

Poor Remain Poor 

While general access is not denied, some children may not be exposed to computers and other technology because of socio-economic status. A child may live in a home without a computer, and chances are he will attend a poor school district with limited numbers of computers available. A student may get to use a computer for a short time, or only as a once-a-week activity instead of a regular class period. This puts these children at a disadvantage in learning technological functions. Poor districts are also most likely not to be the recipients of other technological modes of learning

 

Classwork Season 2

Troubleshooting the Central Processing Unit


Figure 1 (Central Processing Unit)
This is how the CPU (can refer to figure 1) looks like. The first thing need to troubleshoot the CPU is we need to observe how does the inside of the CPU looks like. So that, we can know  and remember which one need to take out first.














This is the tool that we had taken out.