Thursday, June 8, 2017

What is Safe Mode?

Why is this Safe Mode?

While Windows admits that Windows is an excellent platform for many types of jobs, these windows are sometimes deceptive to us; It's also annoying. When installing an application software or installing the driver software to connect any hardware device to the computer suddenly the computer will stop or freeze with the blue screen. When you reboot the computer, you can find Windows Boot with the words "Safe Mode" on the four corners of the desktop with a different look. This implies Windows's Sampot status. What is this chef mode?


This Sampot is a special arrangement for Windows to take up the operating system when it comes to a problem that affects the usual motion of Windows. The use of a chamomotive can be used to detect and solve the reason why Windows has not run. Windows will start functioning normally when you recover the system after finding the problem and removing it in the SEMMODE.

When operating system on the chef mode

• autoexec.bat, do not run config.sys files.
• Many Devise Drivers do not run. For example, software does not run on hardware tools such as Brinder and Scanner.
• The WinAEA driver in Windows is replaced by a Drives Driver for the VGA card in the system A.

Many such operations have been disabled in the sammot.

Also, Windows Desktop 16 colors will be available with 640 x 480 resolution and four corners of the SFMT.

If Windows is not running, it will run automatically on Windows SEMMT once the system is running. In addition, if you want to go to Chef mode, you can go to Chef Motto on the boot menu by pressing the F8 key on the keyboards to start Windows.

What can I do to go to Sampot? We try to find out the cause of the computer's movement and try to find it in the sophomore. For example, if you have any hardware device installed on your computer, you have to get rid of the control panel and remove the driver's driver. Then you can learn that Windows does not accept the hardware and Deweys Drive if it is running on Windows.

Likewise, if you have a problem, you can handle the same way with installing any computer game or application software. This means that you can remove the software from the Add / Remove Programs in Control Panel.

Windows Registry probably may have been corrupted if Windows is not the root cause of operating system properly. In such a case, Windows can be redesigned only by installing it again.

What is File Extension?

You can see that every file in the computer is attached to the end of the file name, which contains one to five letters. This is called the Biel Extensen. For example, there are a number of extensions that have extensive extensions, such as .doc, .ppt, .jpg, .txt, .mp3, .avi. This type of file can be detected by this file extensen. The name and extent of the file are separated by a dot. This file extensener operating system, the Operating System, and the user makes it clear that any type of file should be opened with any software.

Currently, more than 1000 software are available. Each of these has its own file extension. It is not possible to know all these things. However, it is possible to remember the file extinction of the metal products in general. Knowing the file extension of the software that is used frequently will identify those files. .doc, .jpg, .txt are generally available. When you do not know a file extension, you can find the same file extrinson software through Internet search.

The file extension is always hidden in Windows XP. It is better to show its extent with a file name. The virus that can attack the computer is likely to be joined with the .exe file. This type of file contains dual extensions. We do not know how we handle the file when the file is hidden. When you open such files, viruses can attack the computer.

While the Biel Extensen is not hidden, there are some issues. This means that it will have to provide an extension for a change of the name of a file. If you do not do so, you can not use that file again. However, Bail Extenson does not have to provide its extensen when changing the filename.

Some program will open the file to know the changed file extensions. However, it is not possible that all software will open. Therefore, when changing a file expansion requires greater attention. It is also good to know the file extension for the software you are using.

You can know the image file types like .jpg, .gif, .bmp. These file modes can be converted to other modes without having to load any other content in Windows. That's a .jpg file .gif it will be. Bmp is enough to change the file extension.

Handle the following way to make the file ext3 in Windows XP. First go to Start - All Programs - Accessories and select windows Explorer. (Or open any folder) In the Window menu, select Folder Options. Click on the View tab in the dialog box that appears then the Hide Extension for the known file types and click on OK. Now you can see each file with its extensen.

What is Beta Version?


What is Beta Version?

After creating or upgrading a software it has to cross a few more steps before it can be marketed. The first of these is the Alfa stage. In alpha positions, the bug fixes will be carried out by software inspectors working for the company. The beta version (Beta Version) refers to the second stage of software testing. In the beta stage, the software will be delivered to a particular user for free or low cost and they will be detected in the same way.


A beta version of a software can be considered as a preview. Beta version of a software will have all the features of that software. However, it will not be ready for a wide range of sales. In this case, comments about software from the beta version will be collected. The company will collect details such as what they want, what to remove and what to change.

There are two categories: beta version and closed beta open beta. . The only edition of the beta version is offered to only a few users. The open beta version is open to all the public. Beta version will provide limited technical assistance to its users, despite having all the features in the final edition version. Some companies will leave their software in beta version for many years. Many people can use it just like the full version.

You know that the word beta refers to the second letter in the Greek language of the alchemy. IBM first introduced the beta version or beta test. IBM used the beta test to check whether its computer hardware devices were operating properly, although the word software is now beginning to use the software. Many software manufacturers usually have the release of the beta version first before it is released for public use.

What is Task Manager?


About 20 years ago, the operating system with MSDOS command command interface was available on computers. However, the operating system, such as Windows, can only run more than one application software at the same time. Multi tasking is called multi-tasking. This feature may be a feature of the current operating system.

Windows Task Manager is a utility that is connected to Windows to manage all the e-mails running at the same time. Stopping an application software that refuses to operate. Learning the use of Proucester and Memory. You can manage multiple tasks such as opening an eBook with a Task Manager.

In Windows XP Version, Task Manager can be opened by pressing Ctrl + Alt + Delete or Ctrl + Shift + Esc keys simultaneously. Or open taskmg as Run Command. Right click on the Task bar and can be enabled from the menu. However, a menu appears when pressing Ctrl + Alt + Del on Vista version. You need to select the Task Manager from there. Press Ctrl + Shift + Esc keys to press the Task Manager directly in Vista.

Every computer user knows that sometimes the computer moves on the machine to freeze when the computer is working on an image. Similarly, the desktop will not appear. A program can not be run. In this case the hand is the Task Manager.
Task Manager Dialog boks can find five tape, application, processes, performance, networking, and users. To stop an application software that refuses to perform, open the Task Manager and click on the Application tab. There will show the existing epilacres and their current positions. There will be no responseing against the name of Eblickan who refuses to act. Select it and click on End Task button below that dialog box.

If you can not exhaust an epsilon in the manner above, you can stop it by processes tape. The Processes tape will show you what your computer currently has .exe files are active and will show you how much processor memory is being used. Here you can select the Exxine .exe file that will bring up the issue and click on the End Process button.

The Performance Table shows the use of System Procedure and Memory through a diagram. This allows you to learn more about whether the memory is running on the computer slowly, and if the processor is running a hundred times continuously.

To open an eBook, you need to select New Task in the File menu in the Task Manager. This is equivalent to the Run Command.

Besides, you can click on the Networking tab and find out the current state of your computer if it is connected to a network. Similarly users will be able to find information about what users are doing on the network by clicking on the user's tapes and what they are doing.

What is Live CD?


What is a Live CD?

Live CD or Live DVD refers to a CD or DVD containing an operating system that can start the process of the computer. Live CD provides the ability to view the new operating system as it does not have any impact on either the operating system or the hotspot currently installed on the system.

A live CD will begin to boot the computer on a CD on the CD instead of the operating system already installed on the CD drive. The computer can run right from the live CD to run on the computer. To revert to the operating system installed on the computer again, you need to remove the live CD from the CD drive and run the system again.

Live CD is used in many ways. A new operating system is installed on a hard disk to install on the system, or it is not necessary to spend time on it without the installation of the system. Live CD.

The operating system installed on the hot disk can be used by using a live CD to perform our tasks while refusing to operate.
Many versions of the Lynx operating system, such as Ubuntu, have a variety of software applications, such as word processor, spreadsheet program, graphics editor, and web browser. Computer users can perform a Live CD on any computer and can perform their tasks without affecting the operating system already installed.

If the Live CD is running on a hard disk instead of a kinini boot, it is necessary to change the BIOS. For this you need to press the Dell key to boot into the BIOS Set when you start a computer boot. (However, it may differ from computer to computer). The boot drive is the first boot device available on the system where the boot devices are available. This change in bios can save as much as possible on the computer. When a live CD is not in the drive, the computer will start to boot from the hot disk.

Most versions of the Linux operating system are available in Live CD format. These can be downloaded free of charge from the Internet. Or you can call these CDs in the mail. Mac OS, Microsoft Windows, SunJava Desktop except Linux. Different operating systems are available in Live CD format, such as OpenBSD. Having a live CD of these will help us to get a computer boot from a hot disk.

What is Registry?


Registry (Registry) is a data base on the Windows operating system. This registry is a data base that is continuously updated with the information about a new hardware or software installed on or off the system. Details of all hardware and software installed on the system are recorded in the registry.

What settings are available in Windows, the system needs to start with which objects are enabled, each user has what sets, and how many types of files are generated by different e-mails.

The registry fixes how you see on the desktop, the Star Menu and the Task Bar, and how the operating system starts.
In earlier versions of Windows 95, the .ini (initialization) file was implemented. This registry is an alternative to this.

In the Windows Control Panel, one can change the registry without hesitation when making changes. We can also make changes in the registry.

Registries need to be very careful in making changes. It is better that the average computer users do not make changes in the registry. Because you'll have to make a backup (backup) or a Restore Point before you change the registry that will impact on a small error system. (Bacch, I have already mentioned in this section about the restart)

The information about the registry is scattered when it is not properly removed. This will cause recession in the operating system. Or it is often annoying to display error messages. Certainly the coin may be crippled.

We can fix the bugs in the registry. There are also many software tools available to identify and repair Registry Cleaners Registry Cleaners.

Make this registry cleaner once in a month and get rid of errors in the registry. Frequently installing, deleting, error messages, and frequent execution of the Registry Cleaner in cases such as recession in computer speed. Some registry cleaners have the option to automatically run at regular intervals. If this is not the case, you can use the Skived Task in Windows.

Registry structure

The registry consists of five separate configurations. These are fully replicating the registry data base. These five divisions are known as Keys. Each key will have multiple subdesigns, subdivisions and many more categories. Each key also has different values. Here, HKEY refers to Handle to a Key.


1) HKEY_CURRENT_USER
This registry key currently contains information on the user who has logged in to the system.
2) HKEY_USERS This key contains information about all users who have created a user account in Windows.
3) HKEY_LOCAL_MACHINE It contains all the details about the system
4) HKEY_CLASSES_ROOT
The information contained here shows details of opening a file and starting with an e-mail.
5) HKEY_CURRENT_CONFIG
Dewis Driver. Dyslex has details about resuscitation and epilation.

Registry editor for access to the registry must be accessed. Select Run in the Start menu and type regedit so that the Registry Editor window appears.

What is Word Verification?


What is Word Verification?

We are also listening to us when we create an email address through the websites of companies like Yahoo and Google, offering free webmail service. Where there is a non-lethal English word in the image pomp. You will notice the letters found in the word and type in the text boks below. This is called Word Verification (word verification). What is this procedure for? Are you checking your eyesight? That's not the case. It is a security operation for free e-mail service providers.

If you do not have this security arrangement, then computer servers (how-tos) will be lost by the mail server. Automatically generate tons of thousands of electric addresses in the same hour automatically designed for the software. They will also be able to send spam junk mails. This safety arrangement is to prevent the use of free service providers. Only a man can find the characters in the image on the map and then type the characters in the image pomegranate.

Why this Character Map?

Character Map is a popular small software tool that comes with Windows operating system. It is a useful utilitarian in all versions ranging from the earliest version of Windows to the current Windows 7.

The character map gives you the ability to input special symbols and other language characters that are not on the keyboard. The character map is the same as the symbol Symbol in MSW in the index menu.


Many bonds have different algorithms with regular fonts. These can be viewed by the character map and can be selected in our document by selecting the required code.

You can access the character map in Windows XP with all Programs-Accessories-System Tools. Some other versions of Windows are accessible directly from Accessories, not in System Tools. To run the character map through the run command, type the charmap into the Run box.

To enter the desired code in the subdomain, double click on the appropriate code in the character map window or click on the Select button. Then click on Copy button to save it on the Windows clipboard (Clipboard).

To add it later in the subdomain, you need to start the media specification to minimize the character map window and copy it. For example, In order to add a code to a wrap document, move the cursor to the place where it wants to go and select the Paste option in the Edit menu or press Control + V on the keyboard.

If you have a specific code you do not need in a particular bolt, change the foam. You can select more than one code at the same time.

Some codes can be triggered by the Numeric Keypad (Numeric Keypad) to type the numbers on the keyboards without opening the character map. If you frequently use some special codes, you can get it faster than the character map. But you have to know the symbolic number. The Keystroke selects the indent of each symbol, which is displayed in the right side corner of the character map.

When noding codes through Numeric keyboot, you can put the Num Lock key on the keyboard and press the 'Digit' key as you press.

For example, the code that appears to type 0169 in the numeric keypad with 'Alt' key will appear.

By selecting Advanced View in the character map, a special type of coins can be classified into coins and mathematical coding. Another small window on the topic titled "Group by" is selected by Edward View and the Group by an Unicode Subrange option. The codes are sorted out.

Windows gives you the ability to create special codes that are not found in any pond. Let's look at another ID in this software that is more popular than the Private Character Editor with the character map.

What is Encryption?


Encryption refers to the process of transferring data to another form that can not be detected by others. It is generally used to protect sensitive information. Only people who are authorized by encrypting the data can see it. This data may be files that are stored on our computer's stack devices or via the network and the Internet.


You can encrypt a file, boulder or complete hot disk and use the tools like GnuPG and AxCrypt. You can also use the 7-Zip tool that can be used to shrink the files.
The encrypted file is not visible in the usual appearance. To open the file you have to first decrypt it. You can duplicate a password. Only Bosworth knows that only those who are authorized to access that file,

The e-mail is transmitted to the Internet via e-mail. Data WEP is also used in encryption method as well as wireless communication.


Many web sites and online service providers also use ENTP technology. For example, websites starting with "https: //" follow the SSL encryption method. This means that the data transfer between the server computer and your computer web browser that provides the service is safe. Even e-mail service providers also serve to encrypt data.

Wednesday, June 7, 2017

How to zoom in Desktop icon?


Push the control key on the Vista post on the Windows operating system and scroll down the scroll button in the middle of your mouse. When moving up, you can see all the iKens in the TapeTop and zoom when moving down.

Find & Replace in MS Word

MS. You can set other words or word sequences instead of a word or word. . We do not have to change it for every word. MS. Find and Replace in Vadil

MS. You can find the command in Word 2003 and menu in 2007. Find or Replace Dialog bokes by pressing or pressing the arrow keys. Type the word you want to find in Find What you find in Dialog Bocks. Then type the word to replace the word Replace With Bax search instead.

Finally Find Next click.

By clicking Follow Find Next, you can only replace a specific word in a document.

Print to file - Print without a printer


You can save a file that you created on the computer (for example, MS Word) if you do not have a printer and can save it as a printer file without printing it. If the file is printed we will maintain the page structure in the same format as it looks.


Thus they are stored with a file extension .prn when creating a fringer file. The .prn file is created by the Printer driver software installed on the computer. This .prn file can then be converted to a PDF file or a different format. You can also print it without a user application on a computer connected to a printer when saving it as a .prn file


It is noteworthy that in the current Windows versions the introduction of the XPS, Brinder File is noteworthy. To create this printer file, you have to select print to file in the Diamond bogs.

Open programs using Address Bar

You know about Run Command on the Windows operating system. That way, any one can open an e-mail or a file with the appropriate command. Lam. You can open any folder with a typewriter (Windows Explorer) that opens the same command in Run Bax. For example, the paint proposal will open to type mspaint on the adress bar. The window will open the command prompt to type cmd.