Tuesday, December 10, 2013

Extinction (Chapter 20)

I can remember growing up having a walk-man tape player, big bulky cd player that I use to rock with my old school head phones. Everything that I grew up with is now considered "nostalgic." When it comes to technology, newer and faster items take precedence over old systems. Take for instance the way we listen to music. CD players have basically become extinct due to MP3 players and Ipods. A survey of 1,555 consumers where asked the question if laptops would become "extinct" due to the influx of tablets. 50% of those surveyed said yes. I can believe this concept because the same applications and software that are offered through labtops, tablets are slowly offering the same applications. The advantages of tablets are they are smaller and more efficient, portable and price savy. More and more people are gravitating towards tablets, which means the future of labtops is uncertain. http://www.pcmag.com/article2/0,2817,2398731,00.asp

Top flight security (Chapter 18)

The World Wide Web is a gift and a curse. A gift because it offers us a endless window of knowledge, on the other hand that "free" knowledge comes at a high price and risk. Everytime you connect to a network, you run the risk of exposing your computer to cyber attacks, phising, spam and other methods of infiltration. You have to protect your computer like you would protect your own body from outside elements such as rain or snow. Being properly prepared could save you hundreds or even thousands in repair. There are many methods that are available to help protect you from the dangers of the internet. Firewalls are in place to block unwarrented material from corrupting your computer. Companies such as McAfee make software that help protect your computer from viruses and evasive files. A viru is a program that replicates by attaching itself to other programs and execute once they are ran. Keyloggers track all your keystrokes and can steal personal information, such as credit card information or social security numbers. With technology becoming more and more advanced, computer hackers are becoming more and more sophisticated. Computer techinicans have to adapat and evolve as technology grows. http://science.howstuffworks.com/life/cellular-microscopic/virus-human.htm

Friday, December 6, 2013

Browser Wars (Chp 17)

Every computer or laptop comes with a standard issued web browser, such as Internet Explorer for Microsoft and Safari for MAC.  Now with a competitive market, newer internet browsers have emerged to give these standard models a run for their money.  Google Chrome was created my internet conglomerate Google. Chrome's approach to the internet was simplicity.  Most internet browsers already introduced the tab concept for its user's, but Google Chrome took it a step further.  They were the first search engine to introduce thumbnails that showed users previous visits.  A less popular browser is the classic Internet explorer. Since Internet Explorer is open source, meaning its accessible to everyone, it ultimately made it vulnerable to cyber attacks.  Other web browsers such as FireFox which is the standard for Linux and Bing have entered the competitive market by storm.

http://blogs.computerworld.com/18552/12_reasons_not_to_use_internet_explorer_ever


What's your IP? (Chapter 15)

The internet realm is a matrix of numbers measured in bits.  When you connect to a network it automatically assigns your device a id or IP address (Internet Protocol), which is unique to your device, kind of like a finger print.  The number assigned to your device can be represented by 32-bits or 128 bits.  IPv4 uses 32-bits and IPv6 uses 128. Over the years the expansion of the internet created a "paranoid" state among computer users.  Computer users were worried that they would run out of IP addresses and eventually be blocked from connecting to a network.  IPv6 uses 128-bits of data, allowing more users to log on at any given time. When it comes to Cyber Security, IP addresses can come in handy when trying to track down fraudulent behavior.  Since every device has a unique address it makes it easier to track down who the culprit is.


http://computer.howstuffworks.com/internet/basics/question549.htm


Sunday, December 1, 2013

Advanced menu options (Chapter 14)

This menu on a computer acts as a life line for trouble shooting your device.  This menu can be accessed by hitting F8 or F12 on your computer once it initially boots.  On new computers that use Windows 8, this menu is accessed through the advanced options menu on the settings menu.  If you find that your computer has a virus or other issues, the Advanced menu options allows you to boot in "Safe Mode."  Safe Mode is a quarantined environment that allows you to run different programs such as virus scan's to detect if any files have been corrupted.  Safe Mode with Networking allows you to have network access while maintaining a safe environment. You can use process of elimination while in this state to zero in on the root cause of the problem.  If you want to restore your computer back to the last known good configuration, the Advanced menu gives you that option. 

http://windows.microsoft.com/en-us/windows-vista/advanced-startup-options-including-safe-mode

Saturday, November 30, 2013

Linux activity, File Manipulation


The foundation of the Linux works a lot like its counterparts Microsoft and Mac.  Linux falls under the category of free software meaning its accessible to everyone.  Ubuntu is a branch of the Linux system, offering users a desktop like appearance and the ability use multiple programs similar to Microsoft Office.


 Module 1

Linux simplifies functions in a operating system so you are able to use commands in its system. The commands in Linux are designed to organize,move and categorize files to a particular group.  Letters in Linux are case sensitive, so it is important to be aware of that function.  The "ls" command lists everything under the directory you want to look at.  The mv means to move the files to a certain location and rename them, cd means to change directory, mkdir means to make a new directory, .. lists everything previously and More shows the contents of a file. 

Module 2

In the second module it breaks down the commands a little further by examining pathnames and files. Linux uses the cp command to copy files, rm to remove files. When you use the list option you can place a hyphen in front of the lists and it will show all the files in that category.  In this module you learn how to actually code in the command section in more detail.  Since Linux is accessible to multiple users, security of your own files is crucial. To give permission for other users to see your files you can use commands such as Chmod (change mode) group (for example) and which function you want them to see, read, write or execute (the command would be chmod g+w apples).






http://www.linux.org/threads/what-is-linux.4076/



Friday, October 18, 2013

Big isn't always better (Chapter 12)

Anyone who has a computer knows that at times it may need special attention when something goes wrong.  Quality customer service goes a long way in the world of PC technicians.  There's a saying that goes, "A person may not remember what you said to them, but they will always remember how you made them feel."  When it comes to customer satisfaction, bigger companies may not always be keen on the "smaller" customer. When you are dealing with a larger corporation, the focus can shift from customer service to more profit focus, which abandons that interpersonal connection. As a PC technician, its important to empathize with every customer as if you were in their shoes looking for help.  Troubleshooting skills and customer focus skills go hand in hand.  The determining factor for a customer looking for PC help could be based on prior customer reviews and reports.  You can have the quality work but professionally your attitude sucks.  Avoid focusing on the profit end of the deal, but rather focus on customer satisfaction, in the long run this will reap better results.

http://www.pcworld.com/article/230198/Repair.html