Press "Enter" to skip to content

Posts published in “Computer Basic”

Computer is an electronic device that can calculate. In Computer basic we will provide the basic information of computer which help to understand the computer basic operation, We will learn about computer basics with its basic fundamentals.

INTRODUCTION TO COMPUTER

0

STARTING UP THE COMPUTER : BOOTING After switching ON the computer , you generally wait for sometime before the desktop appears on the computer screen. you just sit idle for some time while different messages…

Attaching Files

0

you can send files containing formatted text, pictures, voice, etc. as attachingments. To attach file in rediffmail, perform the following steps: step-1 : click the Attachments button present in the compose window. A new window…

step-3: Enter your login name or user name , and password.

0

step-4: press the enter key or click on the Go button . The following window appears step-5 : click the write Mail option. The following window appears. step-6: Enter the address of the receiver in…

step-1: connect to the Internet.

0

step-2: open any Web browser for example , Internet explorer. step-3 : Type www. rediffmail .com in the address bar and press enter key or click the Go button . The home page of rediffmail…

E-mail Address

0

Every computer connected to the Internet has its own unique address. This is the domain name. The e-mail address is unique address of any user of the Internet e-mail services. It has three parts. }…

E-mail programs

0

you can send and receive messages with an e-mail program. E-mail programs may be free or paid . you have to register your name or other identification with these programs . when you register, you…

MORE ON INTERNET

0

you already know about the Internet. It consists of several networks of computer connected together to make a global network with millions of computers in it . The Internet is not owned by anyone in…

LAST WORDS

0

There are numerous laws to control computer crimes and numerous measures to control security breaches. Companies are spending millions for this purpose .There are numerous occasions for violating software piracy .Laws are revised , books…

COMPUTER CRIME:HACKING/ CRACKING

0

As in the case of other systems and fields, there are also crimes related to computers. computer crimes result from the deliberate tampering with data and information. The people who are associated with computer crimes…

computer security controls

0

are established and implemented to reduce security breaches. There are many types of controls. Some of them are: >Application control >Development control >Access control >physical facility control >personnel control Application controls are procedures that ensure…