Thursday, April 16, 2015

What Is The Difference Between Used Computers And Refurbished Computers



It is a well known fact that not everyone out there will be able to buy high end fresh computers. While the very basic computers and laptops cost very less, it is of no use in buying them in this technologically advanced world of today. To enjoy the latest technologies like the true life like games with great graphics and the most advanced computer programs you will have to buy the computers and laptops packed with modern accessories. If buying new computers is not your option, you will certainly look for used computers. Upon looking for used computers online, you’d have stumbled on the phrase “Refurbished computer”. And now with the eager of finding the difference between the used computers and the refurbished computers, you have landed on this article. Just keep on reading to find the answer.

Simply explained, the refurbished computers are the used computers that near the quality of the new computers. Now you may wonder whether the used computers in good working condition are called as refurbished computers. The answer is “No”. Refurbished computers are developed form the good working parts from different computers. The main difference between the refurbished computers and the used computers is that the refurbished ones are passed through various tests to ensure the working condition. In fact the test parameters will be set to factory settings and the used computer should pass this test to be called as a refurbished computer. As the test conditions are set to factory defaults, these refurbished computers and laptops will near the quality of the new ones.

The warranty coverage is another difference of the refurbished computers. The suppliers of the refurbished computers will offer a minimum of one year warranty as in the new computers. In the case of used computers, there will be no warranty. They may even fail as soon as you plug the computer in your home. The warranty coverage option of the refurbished computers makes them the first choice if you are a computer novice. There are a few refurbished computer suppliers who can assemble as computer for you based on your budget.

The used computer sales are often not bound by the law and so you cannot get your money back from the suppliers in any case. On the other hand the refurbished computers are sold with proper billing and registration. In case of any manufacturer defects you can always return the refurbished computer back to the supplier and get your money back.

Obviously if you are looking for a used computer that nears the quality of the new ones and comes up with attractive warrantiesFree Articles, the refurbished computers are made for you.

by Ritchie Smythe
Source: Free Articles from ArticlesFactory.com



ABOUT THE AUTHOR


ITC is the UK's largest direct supplier of IT clearance and new factory seconds. ITC also stock components such as Laptop memory and ATI Video Cards.

Sunday, March 8, 2015

Applications of SMS That Ease Life

By   |  


Short messaging service or SMS as most of us know it, is a revolutionary invention that has changed the way in which we can stay connected or communicate with people. However, the usage of SMS is not restricted to enhancing connectivity. In fact, SMS has been useful across a diverse category of communications and believe it or not, the SMS facility has simplified life in many ways. From getting updates to forwarding urgent information, you can do all of it in a matter of few minutes thanks to the  
SMS feature available on our mobile phones. 

Here is a brief preview of how SMS has helped us simplify life to a great extent.

All bill notifications are instant!

There was a time when people ended up missing the last dates and paying hefty fines. However, with the coming of SMS or short messaging services, this situation has improved in a major way. From the telephone bill to the electricity bill as well as the amount due on your credit card, every notification arrives on your mobile phone as an SMS ensuring that you don't miss out on the deadlines. Amazing, isn't it?

Get urgent reminders

These days we receive reminders on our mobile telling us about health check-ups, path lab tests and a lot more through the SMS. For people who find it difficult to remember such details, SMS's are a boon. The reminders are auto scheduled and allow the service providers to update their customers on regular basis.

SMS alerts from banks

Even banking institutions alert their customers about transactions and account status through SMS. Here again, the SMS is auto scheduled and allows the banks to send regular updates to the customers also making it easier for account holders to keep track of their transactions.

Emergency alerts

Yet another interesting use of the SMS, this facility allows the organization to inform its customers about any type of change in the existing schedule so that they are not inconvenienced. A good example of this usage is seen in colleges and universities where administration notifies its students about changes in the lecture, exams, availability of notes, etc. through SMS.

Keeps you updated about the on-going marketing offers

With an increasing number of brands relying on SMS marketing, it becomes easier for you to keep track about the on-going offers, promotions, etc. in your neighborhood. The information helps you in planning your monthly shopping in a more effective manner, doesn't it?


To get a free list of Good Night SMS, please check our website.

Article Source: http://EzineArticles.com/?expert=Urvi_Tandon

Article Source: http://EzineArticles.com/8583291

Tuesday, March 3, 2015

Teaching Seniors Computers - 10 Tips For Teaching Seniors How To Use A Computer

By   |  


I've been teaching library computer classes since 1997. Here are my top 10 tips for teaching seniors how to use a computer.

1) State the goals of the class before you begin instructing. People will come into a class with different skill levels. Advanced students will often work ahead or surf the web if the class material is too basic for them.This can distract you and other people in the class.After everyone in the class has been seated, I introduce myself and then say something like: "Just to make sure we're all on the same page here, this the Introduction to Email Class". In this class we cover the very basics of sending and receiving email messages. Is that why we're all here?"

2) Use real life parallels whenever possible. For example, if I'm describing the "To:" box on an email screen, I'll hold up the front of an envelope that has been addressed. This really seems to help to "Demystify" computers for seniors. Another analogy that seems to go over very well is comparing web pages to electronic documents. I'll hold up a People magazine page and state that web pages are really just magazine pages that you can read on a computer screen.

3) Use humor to lighten the mood. This is especially important if you are much younger than the people that you are teaching. Many seniors seem to feel ignorant (or worse!) because they can't use a computer like their 10 year old grandchildren. This being the case, they can really feel intimidated by a younger instructor. I usually begin a class by stating: "Nobody was born knowing this stuff". I then segue into the story of my father getting whiplash from teaching me how to drive a standard shift.

4) Emphasize that if they learn 3 things from an hour long class then they've done really good. Many seniors that I have taught over the years seem to be trying to make up for "lost time" by frantically trying to learn everything at once.

5) Speak slowly and take frequent pauses to make sure everyone in the class is following what you're saying.

6) In my experience, hands-on instruction seems to work best. I'll describe what the class is going to do (such as starting a web browser and visiting a particular web site). Then we all do it together.

7) Use positive reinforcement. Say things like: "That's an excellent question. Thanks very much for asking it."

8) Emphasize that "practice makes perfect --- or at least almost perfect --- when it comes to learning how to use a computer." I then return to my learning how to drive a standard shift story stating that what was once so difficult is second nature to me now.

9) The "strange neighborhood" analogy also seems to work well. I'll ask the class: "What do you do when you drive into a strange neighborhood? Do you floor the accelerator and start making random turns? Of course not. You proceed slowly and follow directions. That's the golden rule for learning how to use a computer. "I'll then add somewhat dramatically while gesturing to myself: "And if you get lost, you ask somebody for help."

10) I like to hand the class notes out at the end of the class. If I hand the class notes out at the beginning, people tend to thumb through them and not pay attention to what is being taught. Seniors also seem to relax quite a bit when I tell them that class outlines will be handed out later. They really seem to appreciate having something in writing.Once seniors are able to relax and have realistic goals about what they can learn in one class or session, they seem to both enjoy the computer instruction and get more out of it.

Michael Gorzka is a computer technologies instructor, adult services librarian and the stalwart and intrepid founder of "Help for the Computer Shy". He diligently creates computer help DVDs, online programs, and printed manuals for computer shy users of all ages. Please visit www.computershy.com.
Article Source: http://EzineArticles.com/?expert=Michael_Gorzka

Article Source: http://EzineArticles.com/882773

Android 101: Tips On How To Use Your Android Phone

By   |  

That Android operating system on your phone can carry out numerous tasks but it's important to know where to start. Unlike iPhone's cut-and-dried IU, the Android OS affords you ample space to organize and customize. Here's a guide to getting the most out of your Android phone's many included features.

The Desktop
Android's desktop differs slightly compared to other smartphone platforms. With android you command a lot of freedom to customize your Android desktop-and without any limitations to four simple rows of flawlessly aligned square icons. Hence, Android lets you customize your desktop to mirror your likes, including making it as full and dynamic as you'd want it to be.

The Android desktop runs multiple homescreen panels. Although if your handset has a particular overlay such as MotoBlur, or rather a different version of Android, you could have 5-7 home-screen panels.

The first time you power up your phone, what you see is the main homescreen panel. The panel is normally centered, plus you can access extra panels on any side of the main panel through dragging your finger either left or right. You can customize the homescreen according to your preferences. You can make use of the available space with any combination of shortcuts, folders and widgets.

Of course, short-cuts are tiny icons that allow you load apps including other functions on your android phone; they work the same as the ones you'd see on a computer desktop. These shortcut options could do anything (according to your preference settings) from opening a program to connecting to a particular Web page or even initiating a phone call.

To create a shortcut, long press your finger on any open space on your handset's home screen, and choose Shortcuts from the resulting turn-up menu. This is where you should select Applications, for example (to add an app), Direct message or Direct dial (creating a shortcut for texting or calling a friend), Bookmark (to connect to a Web page), and Directions (to activate navigation to a particular destination).

Widgets include dynamic programs that carry out activities right on your homescreen. They carry out various functions-including giving you the latest weather forecast, or letting you play music from your personal stored collection or streaming from the Internet. If you want to accommodate more, you can download extra widgets available on the Android Market.

To add a widget, press and hold your finger on an open space, similar to creating shortcut (above). Although, this time, choose the Widgets option availed from the pop-up menu. Whether you've downloaded anything or not from the Android Market, of course there must be a handful of options included in your phone. Begin by including the Power Control widget; it forms a lovely one-touch toggle management system for you android phone's Bluetooth, WI-Fi, GPS, screen brightness, and data syncing.

Notifications
Android's notification panel places real-time incoming information at your fingertips, regardless which activity you may be undertaking at the moment. Notifications come from different places: voicemail, text messaging, e-mail, social network notifications and news apps. As soon as you receive a new notification, an icon will emerge at the top-left of your phone's screen. Dragging down the panel you'll be able to see detailed information on the notification received.

Try out settings of various apps on your Android phone to see what sort of notifications they provide, and then customize them according to your needs.

Article Source: http://EzineArticles.com/?expert=Philip_Edwards_Hausner

Article Source: http://EzineArticles.com/6706543

Stay Safe Online - 7 + 1 Steps to Internet Safety and Security For Your PC

Internet safety seems like an oxymoron these days with all the threats aimed at our computers. Staying safe online doesn't have to be difficult, and this article covers the basic steps that every computer user should take.

The phrase "Internet Safety" often seems like an oxymoron. Every day we hear of new threats aimed at our internet connected personal computers which seems to just make it that much harder to actually stay safe while connected online.

Knowing how to stay safe online has become a practical requirement these days for anyone using a computer connected to the 'net. Fortunately, a few relatively simply steps and a little education can go a long way to making sure that your internet experience is both safe and secure.

1. Use a Firewall - If you do nothing else, you must use a firewall. Firewalls act as a type of barrier between your computer and the internet, preventing remote computers from connecting to yours unless you explicitly allow it. A firewall can be a simple device such as a broadband router, it could be a feature of your operating system such as Window's own built-in firewall, or it can be a full featured software package that you purchase and install on each computer. Which one you choose is less important than making sure you have one and that it is enabled and deflecting threats.

2. Back Up - Failing to back up your computer, or at least your critical data, is perhaps the most common mistake I see being made today. And sadly it can also be the most costly regret you'll have when, not if, disaster strikes. If malware hits or hardware fails often your best if not your only resort will be to recover your system from its most recent backup. Don't have one? Then you might be severely out of luck. I regularly hear from people who've lost all of their data due to a malware infestation or a hardware failure. If nothing else, invest in a large external USB drive and a good backup utility and start backing up regularly right away.

3. Keep Critical Software Updated - Every day people experience problems that could have been completely avoided had they simply kept their operating system and other PC software up to date. Both Windows XP and Vista make staying up to date very easy with "Automatic Updates" and I definitely recommend that it be turned on. Similarly, most other software and applications will now also check for updates and notify you as new ones are available. Make sure your system and applications are checking for updates regularly and installing them as automatically as possible.

4. Educate Yourself - No matter what else you do, no matter what other protections you put in place, malware authors can bypass it all if they can fool you into doing something you shouldn't. The problem, of course, is that "what you shouldn't" isn't always immediately obvious. That's why it's so important to educate yourself on how to detect and avoid their attempts. In short: be skeptical. Don't open email attachments or instant messenger downloads unless you're positive they're safe. Don't click on links in email unless you're positive that they're taking you to where you expect them to. Don't download and install software without first checking it for malware. Don't ignore security warnings unless you're sure it's OK. Use strong passwords and never share them with anyone.

5. Scan for Viruses - Even with the best of intentions, viruses happen. Even with the firewall in place, the operating system up to date, and a healthy knowledge of what is and is not safe, sometimes something slips through. That's where you'll need a good anti-virus tool. There are many to choose from but the key factors boil down to this: select a reputable tool, enable its "real time" monitoring if you're at all uncertain of yourself or others using the computer, configure it to scan your hard disk completely once a day, and make absolutely certain that it's downloading the latest anti-virus information daily.

6. Protect Yourself from Spyware - Much like viruses, spyware can also occasionally make it through your defenses. Spyware is often relatively benign from a pure safety perspective - spyware doesn't often erase your hard drive or send spam, for example. However spyware does represent an intrusion, often presenting ads or modifying other programs in ways you didn't expect or ask for. And at its worst, spyware lives up to its name, spying on you and capturing potentially sensitive information. Anti-spyware utilities operate a little differently than anti-virus, so you'll want to make sure that you have a good spyware scanner in addition to your anti-virus tools. Like those tools, you'll want to make sure that it's downloading the latest spyware information daily as well.

7. Secure your WiFi - The default configuration of most WiFi equipment, and certainly the easiest configuration to set up, is completely unsecured. That means that anyone within range of your WiFi equipment can monitor what you're sending to and from the internet - including your account IDs and passwords. The same is true in most internet cafes and free WiFi hotspots. There are two steps you must take. First, at home, make sure you enable WPA security. This will require a password to connect to your wireless network, and will encrypt all the data so it cannot be monitored. (The older WEP security is no longer sufficient, as it is easily cracked.) Second, when you're using an open unsecured WiFi hotspot, take care to only access sensitive resources through encrypted connections. That means making sure that any web page you're visiting that requires personal information is connecting via an https connection. It also means that you shouldn't be downloading or sending email via your POP3 or SMTP based email program unless you know those connections are configured to use encryption as well, since by default they do not.

Bonus Step: Understand Physical Security - An old saying that I've found myself repeating to people more and more in recent years is this: "if it's not physically secure, it's not secure." All of the preceding tips are for naught if someone else who doesn't understand these steps can use your computer and accidentally download malware. It's all for naught if someone with malicious intent can walk up to your computer, reboot it, install software or hardware and walk away without your noticing. It's all for naught if your computer can be stolen. Take care to understand just how physically at-risk you might be and take appropriate actions. Don't let others use your computer until you're comfortable with their understanding of the risks. Don't leave your computer unattended if you can't trust the people who might be able to touch it. Consider encrypting data on your laptop or other computer if it can be lost or stolen.
Everything I've outlined might at first seem overwhelming. The good news it that most of these steps are things you'll need to do only once, and then consider infrequently thereafter. And to put it perhaps into a little bigger perspective they're not nearly as overwhelming as the impact of an actual security problem if it happens to you. The practical reality of the situation is simply this: we as individual computer users need to take the responsibility of the steps required to Stay Safe Online.

More information about staying safe online, including specific recommendations for each of the aspects discussed above, can be found at the author's web site Ask Leo! There you'll also find hundreds of answers to every day technical and computer problems.

Get more free tech help and advice from Leo Notenboom by visiting http://ask-leo.com
With over 30 years of industry experience, including an 18 year career as a software engineer with Microsoft, Leo gives real answers to real questions from ordinary computer users at Ask Leo!
Article Source: http://EzineArticles.com/?expert=Leo_Notenboom

Article Source: http://EzineArticles.com/883778

Monday, March 2, 2015

Internet Security - What Does it All Mean?

KNOW YOUR INTERNET SECURITY
Your computer is at risk when it connects to a network and begins communication with other computers. The essence of Internet security is to protect your computer and data from online attacks. More often than not, the attacks are mounted by an outside user. Basic security measures usually involve protection by well selected passwords, regularly changing of file permissions and back up of computer's data storage.

Computers being a critical component in operating a business, it is more valuable now than ever to ensure the security of your networks especially where there is very sensitive data. You can hardly go a day without hearing of how some network was hacked into by internet criminals. News of network breach is becoming common place. This is where you need a service that checks for those short comings and prevents from future attacks. Better still, why not have in place a system that will deter online criminals? Do you imagine having to explain to your customers that someone has stolen their credit card information?

Concerns over security are in some ways peripheral to normal business operating, but serve to show just how important it is that business users feel confident and assured when using IT systems. Security will always be high on the IT agenda simply because cyber criminals know that a successful attack is very profitable to them.

A firewall is a software program that has the ability to blockade any unauthorized ports on the computer. Firewalls are set up for the purpose to record data of connection details. Firewalls are available in three main configurations.

One is the stateful firewall is a more secure form of firewall, and system administrators often combine both a proxy firewall with a packet-filtering firewall to setup a highly secure system. Many domestic users make use of the software firewall. These types of firewalls can create a log file where it shows and records all the connection details, including connection attempts to the computer.

Some programmers can also create programs with intentions of destroying the computers data by using tricks. Such of this are known as viruses, Trojan horses, worms and spy ware.

o Worms are software programs which are able to replicate themselves over a computer network and in turn perform malicious actions.
o Viruses are software programs which are able to log into the personal files on a computer it has infected resulting in removing all of them, leading to serious side effects to the computer.
o Trojan horses are software programs which disguise to be carrying out one thing, but in reality snoops out your personal data, or damaging it. These types hide their identity or true intentions and are usually not easy to detect.
o Malware are classified as Trojans with a limited payload and are usually not detected by most antivirus software. For this reason, it is best to install additional software which will detect Malware.

The upside is that there are many effective Anti-Virus software available in the market to fight the threats mentioned above. These can be purchased from vendors or bought online. Caution should be taken in the selection of anti-virus software, as some programs are not very affective in detecting and destroying viruses or Malware. Also ensure that your Anti-Virus data base is current and up to date.
There are two major kinds of threats related to spy ware:

Adware is simply those annoying pop-ups which keep constantly advertise things on your page. These programs without your knowledge secretly install themselves on your computer files and are stuck there until the day the computer system is cleaned up completely.

Spyware as the name suggests spies on your computer while it collects and sends information to the computer to the manufactures and even when the program is never used it continues to do so.

Scott Cantroll is computer security specialist dedicated to educating parents and computer users about computer and internet safety and security. My goal is to share everything I have learned over the last 15 years about computer safety and security with you. I have created a website
http://www.internetsafetycenter.com where parents can learn more about cyberbullying, viruses, antivirus software, spyware, social networking dangers, and identity theft. The site also shows you how to stop viruses, spyware, cyberbullying, and identity theft. Learn how to protect you kids and yourself online today visit us at http://www.internetsafetycenter.com
Article Source: http://EzineArticles.com/?expert=Scott_Cantrell

Article Source: http://EzineArticles.com/2446825

Tuesday, February 17, 2015

Android 101: Tips On How To Use Your Android Phone






Recommend ArticleThat Android operating system on your phone can carry out numerous tasks but it's important to know where to start. Unlike iPhone's cut-and-dried IU, the Android OS affords you ample space to organize and customize. Here's a guide to getting the most out of your Android phone's many included features.

The Desktop

Android's desktop differs slightly compared to other smartphone platforms. With android you command a lot of freedom to customize your Android desktop-and without any limitations to four simple rows of flawlessly aligned square icons. Hence, Android lets you customize your desktop to mirror your likes, including making it as full and dynamic as you'd want it to be.

The Android desktop runs multiple homescreen panels. Although if your handset has a particular overlay such as MotoBlur, or rather a different version of Android, you could have 5-7 home-screen panels.

The first time you power up your phone, what you see is the main homescreen panel. The panel is normally centered, plus you can access extra panels on any side of the main panel through dragging your finger either left or right. You can customize the homescreen according to your preferences. You can make use of the available space with any combination of shortcuts, folders and widgets.

Of course, short-cuts are tiny icons that allow you load apps including other functions on your android phone; they work the same as the ones you'd see on a computer desktop. These shortcut options could do anything (according to your preference settings) from opening a program to connecting to a particular Web page or even initiating a phone call.

To create a shortcut, long press your finger on any open space on your handset's home screen, and choose Shortcuts from the resulting turn-up menu. This is where you should select Applications, for example (to add an app), Direct message or Direct dial (creating a shortcut for texting or calling a friend), Bookmark (to connect to a Web page), and Directions (to activate navigation to a particular destination).

Widgets include dynamic programs that carry out activities right on your homescreen. They carry out various functions-including giving you the latest weather forecast, or letting you play music from your personal stored collection or streaming from the Internet. If you want to accommodate more, you can download extra widgets available on the Android Market.

To add a widget, press and hold your finger on an open space, similar to creating shortcut (above). Although, this time, choose the Widgets option availed from the pop-up menu. Whether you've downloaded anything or not from the Android Market, of course there must be a handful of options included in your phone. Begin by including the Power Control widget; it forms a lovely one-touch toggle management system for you android phone's Bluetooth, WI-Fi, GPS, screen brightness, and data syncing.

Notifications

Android's notification panel places real-time incoming information at your fingertips, regardless which activity you may be undertaking at the moment. Notifications come from different places: voicemail, text messaging, e-mail, social network notifications and news apps. As soon as you receive a new notification, an icon will emerge at the top-left of your phone's screen. Dragging down the panel you'll be able to see detailed information on the notification received.

Try out settings of various apps on your Android phone to see what sort of notifications they provide, and then customize them according to your needs.


© 2015 SparkNET
All Rights Reserved Worldwide