Press "Enter" to skip to content

WORKING OF VARIOUS PARTS OF A COMPUTER

0

you are already familiar with the various parts of a computer , but do you know how these parts perform their tasks? Let us learn about them. The Monitor There are two types of computer…

INTRODUCTION TO COMPUTER

0

STARTING UP THE COMPUTER : BOOTING After switching ON the computer , you generally wait for sometime before the desktop appears on the computer screen. you just sit idle for some time while different messages…

Attaching Files

0

you can send files containing formatted text, pictures, voice, etc. as attachingments. To attach file in rediffmail, perform the following steps: step-1 : click the Attachments button present in the compose window. A new window…

step-3: Enter your login name or user name , and password.

0

step-4: press the enter key or click on the Go button . The following window appears step-5 : click the write Mail option. The following window appears. step-6: Enter the address of the receiver in…

step-1: connect to the Internet.

0

step-2: open any Web browser for example , Internet explorer. step-3 : Type www. rediffmail .com in the address bar and press enter key or click the Go button . The home page of rediffmail…

E-mail Address

0

Every computer connected to the Internet has its own unique address. This is the domain name. The e-mail address is unique address of any user of the Internet e-mail services. It has three parts. }…

Delete

0

you can delete your message with the help of this option. Attachment you can send a file as an attachment with your message with the help of this option. Address Book you can store e-mail…

E-mail programs

0

you can send and receive messages with an e-mail program. E-mail programs may be free or paid . you have to register your name or other identification with these programs . when you register, you…

MORE ON INTERNET

0

you already know about the Internet. It consists of several networks of computer connected together to make a global network with millions of computers in it . The Internet is not owned by anyone in…

LAST WORDS

0

There are numerous laws to control computer crimes and numerous measures to control security breaches. Companies are spending millions for this purpose .There are numerous occasions for violating software piracy .Laws are revised , books…