Flaming Arrow Glitter Purple Nowshins ICT learning for life Blog: 2011

Sunday, 18 December 2011

week Ten session: 3 Reflection

In this week last session we learn about
Instant Messaging (IM) is a form of real-time direct text-based chatting communication in push mode between two or more people using personal computers or other devices, along with shared clients. The user's text is conveyed over a network, such as the Internet. More advanced instant messaging software clients also allow enhanced modes of communication, such as live voice or video calling and inclusion of links to media. Instant messaging (IM) falls under the umbrella term online chat, since it is also text-based, bi-directionally exchanged, and happens in real-time. IM is distinct from chat in that IM is based on clients that facilitate connections between specified known users (often using a contact list, buddy list, or friend list). Online 'chat' includes web-based applications that allow communication between (often directly addressed, but anonymous) users in a multi-user environment.


Skype: Skype ( /ˈskaɪp/) is a proprietary voice over Internet Protocol service and software application originally created by Niklas Zennström and Janus Friis, and owned by Microsoft since 2011.
The service allows users to communicate with peers by voice, video, and instant messaging over the Internet. Phone calls may be placed to recipients on the traditional telephone networks. Calls to other users within the Skype service are free of charge, while calls to landline telephones and mobile phones are charged via a debit-based user account system. Skype has also become popular for its additional features, including file transfer, and videoconferencing. Competitors include SIP and H.323-based services, such as Empathy, Linphone, Ekiga  as well as the Google Talk service.
Skype has 663 million registered users as of September 2011. The network is operated by Microsoft, which has its Skype division headquarters in Luxembourg. Most of the development team and 44% of the overall employees of the division are situated in the offices of Tallinn and Tartu, Estonia.
Unlike other VoIP services, Skype is a peer-to-peer system rather than a clientserver system, and makes use of background processing on computers running Skype software; the original name proposed Sky peer-to-peer reflects this.
Some network administrators have banned Skype on corporate, government, home, and education networks, citing reasons such as inappropriate usage of resources, excessive bandwidth usage,and security concerns.

VRVS: Originally developed at CERN and now maintained by Caltech , the Virtual Room Videoconferencing System (VRVS) is a free, Web-based videoconferencing system that provides high-quality video and audio plus text chat to a large number of simultaneous users. Originally developed for the high energy and nuclear physics communities, VRVS has extended its service to other academic and research areas.
The VRVS system is made up of several communities, each of is composed of a list of Virtual Rooms.
Rooms must be reserved in advance using the integrated booking system that also provides world time conversion and e-mail notification to selected participants.
Users can select any one of four ways to participate in a meeting:
via the user's H.323 external box
via the user's H.323 software client
via the VIC/RAT/VAT software provided by VRVS
via the QuickTime Player.
VRVS can as be used as Personal Access Grid Node.
VRVS works under Windows, Macintosh, Linux, Solaris and Irix operating systems.

week Ten session: 2 Reflection

IN week ten sessions 2 we learn about the internet as a medium of communication.
EMAIL:
Electronic mail, commonly known as email or e-mail, is a method of exchanging digital messages from an author to one or more recipients. Modern email operates across the Internet or other computer networks. Some early email systems required that the author and the recipient both be online at the same time, in common with instant messaging. Today's email systems are based on a store-and-forward model. Email servers accept, forward, deliver and store messages. Neither the users nor their computers are required to be online simultaneously; they need connect only briefly, typically to an email server, for as long as it takes to send or receive messages.
An email message consists of three components, the message envelope, the message header, and the message body. The message header contains control information, including, minimally, an originator's email address and one or more recipient addresses. Usually descriptive information is also added, such as a subject header field and a message submission date/time stamp.
Originally a text-only (7-bit ASCII and others) communications medium, email was extended to carry multi-media content attachments, a process standardized in RFC 2045 through 2049. Collectively, these RFCs have come to be called Multipurpose Internet Mail Extensions (MIME).
Electronic mail predates the inception of the Internet, and was in fact a crucial tool in creating it,[2] but the history of modern, global Internet email services reaches back to the early ARPANET. Standards for encoding email messages were proposed as early as 1973 (RFC 561). Conversion from ARPANET to the Internet in the early 1980s produced the core of the current services. An email sent in the early 1970s looks quite similar to a basic text message sent on the Internet today.
Network-based email was initially exchanged on the ARPANET in extensions to the File Transfer Protocol (FTP), but is now carried by the Simple Mail Transfer Protocol (SMTP), first published as Internet standard 10 (RFC 821) in 1982. In the process of transporting email messages between systems, SMTP communicates delivery parameters using a message envelope separate from the message (header and body) itself.

TELNET: Telnet is a network protocol used on the Internet or local area networks to provide a bidirectional interactive text-oriented communications facility using a virtual terminal connection. User data is interspersed in-band with Telnet control information in an 8-bit byte oriented data connection over the Transmission Control Protocol (TCP).
Telnet was developed in 1969 beginning with RFC 15, extended in RFC 854, and standardized as Internet Engineering Task Force (IETF) Internet Standard STD 8, one of the first Internet standards.
Historically, Telnet provided access to a command-line interface (usually, of an operating system) on a remote host. Most network equipment and operating systems with a TCP/IP stack support a Telnet service for remote configuration (including systems based on Windows NT). Because of security issues with Telnet, its use for this purpose has waned in favor of SSH.
The term telnet may also refer to the software that implements the client part of the protocol. Telnet client applications are available for virtually all computer platforms. Telnet is also used as a verb. To telnet means to establish a connection with the Telnet protocol, either with command line client or with a programmatic interface. For example, a common directive might be: "To change your password, telnet to the server, login and run the passwd command." Most often, a user will be telnetting to a Unix-like server system or a network device (such as a router) and obtain a login prompt to a command line text interface or a character-based full-screen manager.

FTP: File Transfer Protocol (FTP) is a standard network protocol used to transfer files from one host to another host over a TCP-based network, such as the Internet. FTP is built on a client-server architecture and utilizes separate control and data connections between the client and server. FTP users may authenticate themselves using a clear-text sign-in protocol but can connect anonymously if the server is configured to allow it.
The first FTP client applications were interactive command-line tools, implementing standard commands and syntax. Graphical user interface clients have since been developed for many of the popular desktop operating systems in use today.

week Ten session: 1 Reflection

A web browser is a software application for retrieving, presenting, and traversing information resources on the World Wide Web. An information resource is identified by a Uniform Resource Identifier (URI) and may be a web page, image, video, or other piece of content.[2] Hyperlinks present in resources enable users easily to navigate their browsers to related resources. A web browser can also be defined as an application software or program designed to enable users to access, retrieve and view documents and other resources on the Internet.
Although browsers are primarily intended to access the World Wide Web, they can also be used to access information provided by web servers in private networks or files in file systems.
The major web browsers are Internet Explorer, Firefox, Google Chrome, Safari, and Opera.


   
I mainly learn in this lesson is how internet application support us need in finding information that we are searching throw this internet in different browser.

Week nine, session:3 Reflextion

IN this week last session we only learn about the safety issues that related with internet and also how to use and access the internet safely.
 Internet safety or online safety is the security of people and their information when using the Internet. Numerous groups, Internet sites and governments have expressed concerns over the safety of children using the Internet. In the UK the Get Safe Online campaign has received sponsorship from government agency SOCA and major Internet companies such as Microsoft and eBay. Several crimes can be committed on the Internet such as stalking, identity theft and more. Most social networking and chat sites have a page about safety.
Internet Safety Basics:
1.   Be Courteous.
2. Disconnect Yourself.
3.  Back-up Data.
4.  Update Regularly.
5.  Use Firewalls.
6. Protect Your Kids.
7.  Don't Give Out Personal Information.
8. Prevent Computer Infections.

PHISHING: Phishing is a way of attempting to acquire information such as usernames, passwords, and credit card details by masquerading as a trustworthy entity in an electronic communication. Communications purporting to be from popular social web sites, auction sites, online payment processors or IT administrators are commonly used to lure the unsuspecting public. Phishing is typically carried out by e-mail spoofing or instant messaging,[1] and it often directs users to enter details at a fake website whose look and feel are almost identical to the legitimate one. Phishing is an example of social engineering techniques used to deceive users,[2] and exploits the poor usability of current web security technologies.[3] Attempts to deal with the growing number of reported phishing incidents include legislation, user training, public awareness, and technical security measures.
A phishing technique was described in detail in 1987, and the first recorded use of the term "phishing" was made in 1996. The term is a variant of fishing,[4] probably influenced by phreaking,[5] [6] and alludes to "baits" used in hopes that the potential victim will "bite" by clicking a malicious link or opening a malicious attachment, in which case their financial information and passwords may then be stolen.
SPOOFING: Spoofing is the creation of TCP/IP packets using somebody else's IP address. Routers use the "destination IP" address in order to forward packets through the Internet, but ignore the "source IP" address. That address is only used by the destination machine when it responds back to the source.
A common misconception is that "IP spoofing" can be used to hide your IP address while surfing the Internet, chatting on-line, sending e-mail, and so forth. This is generally not true. Forging the source IP address causes the responses to be misdirected, meaning you cannot create a normal network connection.

However, IP spoofing is an integral part of many network attacks that do not need to see responses (blind spoofing).

Examples of spoofing:

man-in-the-middle
packet sniffs on link between the two end points, and can therefore pretend to be one end of the connection
routing redirect
redirects routing information from the original host to the hacker's host (this is another form of man-in-the-middle attack).
source routing
redirects indvidual packets by hackers host
blind spoofing
predicts responses from a host, allowing commands to be sent, but can't get immediate feedback.
flooding
SYN flood fills up receive queue from random source addresses; smurf/fraggle spoofs victims address, causing everyong respond to the victim.

Week nine, session:2 Reflextion

An Internet service provider (ISP) is a company that provides access to the Internet. Access ISPs directly connect customers to the Internet using copper wires, wireless or fiber-optic connections.[1] Hosting ISPs lease server space for smaller businesses and host other people servers (colocation). Transit ISPs provide large amounts of bandwidth for connecting hosting ISPs to access ISPs.
Then we learn to crate a new dial up connection, Modifying an existing dail up connection.


IP ADDRESSING: An Internet Protocol address (IP address) is a numerical label assigned to each device (e.g., computer, printer) participating in a computer network that uses the Internet Protocol for communication.[1] An IP address serves two principal functions: host or network interface identification and location addressing. Its role has been characterized as follows: "A name indicates what we seek. An address indicates where it is. A route indicates how to get there."[2]
The designers of the Internet Protocol defined an IP address as a 32-bit number[1] and this system, known as Internet Protocol Version 4 (IPv4), is still in use today. However, due to the enormous growth of the Internet and the predicted depletion of available addresses, a new addressing system (IPv6), using 128 bits for the address, was developed in 1995,[3] standardized as RFC 2460 in 1998,[4] and is being deployed worldwide since the mid-2000s.
IP addresses are binary numbers, but they are usually stored in text files and displayed in human-readable notations, such as 172.16.254.1 (for IPv4), and 2001:db8:0:1234:0:567:8:1 (for IPv6).
The Internet Assigned Numbers Authority (IANA) manages the IP address space allocations globally and delegates five regional Internet registries (RIRs) to allocate IP address blocks to local Internet registries (Internet service providers) and other entities.






DOMAIN NAME ADDRESSING: A domain name is an identification string that defines a realm of administrative autonomy, authority, or control in the Internet. Domain names are formed by the rules and procedures of the Domain Name System (DNS).
Domain names are used in various networking contexts and application-specific naming and addressing purposes. In general, a domain name represents an Internet Protocol (IP) resource, such as a personal computer used to access the Internet, a server computer hosting a web site, or the web site itself or any other service communicated via the Internet.
Domain names are organized in subordinate levels (subdomains) of the DNS root domain, which is nameless. The first-level set of domain names are the top-level domains (TLDs), including the generic top-level domains (gTLDs), such as the prominent domains com, net and org, and the country code top-level domains (ccTLDs). Below these top-level domains in the DNS hierarchy are the second-level and third-level domain names that are typically open for reservation by end-users that wish to connect local area networks to the Internet, create other publicly accessible Internet resources or run web sites. The registration of these domain names is usually administered by domain name registrars who sell their services to the public.

URL:In computing, a uniform resource locator or universal resource locator (URL) is a specific character string that constitutes a reference to an Internet resource.
A URL is technically a type of uniform resource identifier (URI) but in many technical documents and verbal discussions URL is often used as a synonym.

We also learn about Internet troubleshooting connection and so on.

Week nine, session:1 Reflextion

In this week we learn about Internet history and underlying Tecnologies.
INTER The Internet is a global system of interconnected computer networks that use the standard Internet protocol suite (TCP/IP) to serve billions of users worldwide. It is a network of networks that consists of millions of private, public, academic, business, and government networks, of local to global scope, that are linked by a broad array of electronic, wireless and optical networking technologies. The Internet carries a vast range of information resources and services, such as the inter-linked hypertext documents of the World Wide Web (WWW) and the infrastructure to support email.
Most traditional communications media including telephone, music, film, and television are reshaped or redefined by the Internet, giving birth to new services such as Voice over Internet Protocol (VoIP) and IPTV. Newspaper, book and other print publishing are adapting to Web site technology, or are reshaped into blogging and web feeds. The Internet has enabled or accelerated new forms of human interactions through instant messaging, Internet forums, and social networking. Online shopping has boomed both for major retail outlets and small artisans and traders. Business-to-business and financial services on the Internet affect supply chains across entire industries.
The origins of the Internet reach back to research of the 1960s, commissioned by the United States government in collaboration with private commercial interests to build robust, fault-tolerant, and distributed computer networks. The funding of a new U.S. backbone by the National Science Foundation in the 1980s, as well as private funding for other commercial backbones, led to worldwide participation in the development of new networking technologies, and the merger of many networks. The commercialization of what was by the 1990s an international network resulted in its popularization and incorporation into virtually every aspect of modern human life. As of 2011, more than 2.1 billion people nearly a third of Earth's population use the services of the Internet.[1]
The Internet has no centralized governance in either technological implementation or policies for access and usage; each constituent network sets its own standards. Only the overreaching definitions of the two principal name spaces in the Internet, the Internet Protocol address space and the Domain Name System, are directed by a maintainer organization, the Internet Corporation for Assigned Names and Numbers (ICANN). The technical underpinning and standardization of the core protocols (IPv4 and IPv6) is an activity of the Internet Engineering Task Force (IETF), a non-profit organization of loosely affiliated international participants that anyone may associate with by contributing technical expertise.NET :
THE HISTORY OF INTERNET: Research into packet switching started in the early 1960s and packet switched networks such as ARPANET, Mark I at NPL in the UK,[6] CYCLADES, Merit Network, Tymnet, and Telenet, were developed in the late 1960s and early 1970s using a variety of protocols. The ARPANET in particular led to the development of protocols for internetworking, where multiple separate networks could be joined together into a network of networks.
The first two nodes of what would become the ARPANET were interconnected between Leonard Kleinrock's Network Measurement Center at the UCLA's School of Engineering and Applied Science and Douglas Engelbart's NLS system at SRI International (SRI) in Menlo Park, California, on 29 October 1969.[10] The third site on the ARPANET was the Culler-Fried Interactive Mathematics center at the University of California at Santa Barbara, and the fourth was the University of Utah Graphics Department. In an early sign of future growth, there were already fifteen sites connected to the young ARPANET by the end of 1971.[11][12] These early years were documented in the 1972 film Computer Networks: The Heralds of Resource Sharing.
Early international collaborations on ARPANET were sparse. For various political reasons, European developers were concerned with developing the X.25 networks.[13] Notable exceptions were the Norwegian Seismic Array (NORSAR) in 1972, followed in 1973 by Sweden with satellite links to the Tanum Earth Station and Peter Kirstein's research group in the UK, initially at the Institute of Computer Science, London University and later at University College London.[14]


T3 NSFNET Backbone, c. 1992
In 1982, the Internet Protocol Suite (TCP/IP) was standardized and the concept of a world-wide network of fully interconnected TCP/IP networks called the Internet was introduced. Access to the ARPANET was expanded in 1981 when the National Science Foundation (NSF) developed the Computer Science Network (CSNET). In December 1974, RFC 675 Specification of Internet Transmission Control Program, by Vinton Cerf, Yogen Dalal, and Carl Sunshine, used the term internet, as a shorthand for internetworking; later RFCs repeat this use, so the word started out as an adjective rather than the noun it is today.
TCP/IP network access expanded again in 1986 when NSFNET provided access to supercomputer sites in the United States from research and education organizations, first at 56 kbit/s and later at 1.5 Mbit/s and 45 Mbit/s. Commercial internet service providers (ISPs) began to emerge in the late 1980s and 1990s. The ARPANET was decommissioned in 1990. The Internet was commercialized in 1995 when NSFNET was decommissioned, removing the last restrictions on the use of the Internet to carry commercial traffic.[17] The Internet started a rapid expansion to Europe and Australia in the mid to late 1980s and to Asia in the late 1980s and early 1990s.


This NeXT Computer was used by Sir Tim Berners-Lee at CERN and became the world's first Web server.
Since the mid-1990s the Internet has had a tremendous impact on culture and commerce, including the rise of near instant communication by email, instant messaging, Voice over Internet Protocol (VoIP) "phone calls", two-way interactive video calls, and the World Wide Web with its discussion forums, blogs, social networking, and online shopping sites. Increasing amounts of data are transmitted at higher and higher speeds over fiber optic networks operating at 1-Gbit/s, 10-Gbit/s, or more. The Internet continues to grow, driven by ever greater amounts of online information and knowledge, commerce, entertainment and social networking.
During the late 1990s, it was estimated that traffic on the public Internet grew by 100 percent per year, while the mean annual growth in the number of Internet users was thought to be between 20% and 50%. This growth is often attributed to the lack of central administration, which allows organic growth of the network, as well as the non-proprietary open nature of the Internet protocols, which encourages vendor interoperability and prevents any one company from exerting too much control over the network. As of 31 March 2011, the estimated total number of Internet users was 2.095 billion (30.2% of world population). It is estimated that in 1993 the Internet carried only 1% of the information flowing through two-way telecommunication, by 2000 this figure had grown to 51%, and by 2007 more than 97% of all telecommunicated information was carried over the Internet.
 In this lesson we also learn about 
HTML:H HyperText Markup Language (HTML) is the predominant markup language for web pages. HTML elements are the basic building-blocks of web pages.

WEB:
 The World Wide Web (or the proper World-Wide Web; abbreviated as WWW or W3,[2] and commonly known as the Web) is a system of interlinked hypertext documents accessed via the Internet. With a web browser, one can view web pages that may contain text, images, videos, and other multimedia and navigate between them via hyperlinks.
Using concepts from earlier hypertext systems, British engineer and computer scientist Sir Tim Berners-Lee, now Director of the World Wide Web Consortium (W3C), wrote a proposal in March 1989 for what would eventually become the World Wide Web.[1] At CERN in Geneva, Switzerland, Berners-Lee and Belgian computer scientist Robert Cailliau proposed in 1990 to use hypertext "... to link and access information of various kinds as a web of nodes in which the user can browse at will",[3]and they publicly introduced the project in December.[4]
"The World-Wide Web was developed to be a pool of human knowledge, and human culture, which would allow collaborators in remote sites to share their ideas and all aspects of a common project.

Week eight, session: Reflextion

In week eight sessions we learn about Microsoft Power Point Basic.
M Microsoft PowerPoint, usually just called PowerPoint, is a non-free commercial presentation program developed by Microsoft. It is part of the Microsoft Office suite, and runs on Microsoft Windows and Apple's Mac OS X operating system. The current versions are Microsoft Office PowerPoint 2010 for Windows and Microsoft Office PowerPoint 2011 for Microsoft Power point.


In this two session we also learn how to apply Ms office programme namely Ms Word, ms excel and Ms power point in making my teaching-learning process more interesting and capturing and we also learn how to discover more tools, espeicially the advanced tools in MS office to enhance the quality of our work espeicially our assienments.

Week seven, session: 3 Reflextion

. 
In week seven and in last session we only do practicle that means we are able to create and develop our own documents a using appropiate application software.

Week seven, session: 2 Reflextion

Sparklines: A sparkline is a type of information graphic characterized by its small size and high data density. Sparklines present trends and variations associated with some measurement, such as average temperature or stock market activity, in a simple and condensed way. Several sparklines are often used together as elements of a small multiple.
The term sparkline was proposed by Edward Tufte for "small, high resolution graphics embedded in a context of words, numbers, images".[1] Tufte describes sparklines as "data-intense, design-simple, word-sized graphics".[2] Whereas the typical chart is designed to show as much data as possible, and is set off from the flow of text (as in the following diagram), sparklines are intended to be succinct, memorable, and located where they are discussed.
There are 3 types of sparklines .
.
For using sparkline3 1st we have to select the cells that we will need for first sparklines.then we have to click the insert tab, in the sparkline group select a line, a dialog box will appear. Click the cell where we want to sparkline to be, then click ok and at last the sparkline will be created for the remain rows.

Pivot table : In data processing, a pivot table is a data summarization tool found in data visualization programs such as spreadsheets or business intelligence software. Among other functions, pivot-table tools can automatically sort, count, total or give the average of the data stored in one table or spreadsheet. It displays the results in a second table (called a "pivot table") showing the summarized data. Pivot tables are also useful for quickly creating unweighted cross tabulations. The user sets up and changes the summary's structure by dragging and dropping fields graphically. This "rotation" or pivoting of the summary table gives the concept its name. The term pivot table is a generic phrase used by multiple vendors. However, Microsoft Corporation has trademarked the specific form PivotTable.
.

we work with chart then we reviewing and sharing work books, track changes, how to add and delete comments, finalizing and protecting our work book.

Week seven, session: 1 Reflextion

In this week we learn about Microsoft Excel basic.
Cell basics: Basic cells and cells content in excel able use to calculate analyze and organize data.
In modifying columns rows and cell: In this part we learn how to change the row height or column width, wrap text in cell.
We also learn how to Wrapping Text and Merging Cells.
Formatting: If we want to format our text we have to do first change font & font size. we can also use bold ,italic, we have to add border if we want than change the font color and add fill color. Than there is another topic we learn is how to create a formula using the point  and click method.

Saturday, 17 December 2011

Week six, session: 3 Reflextion

In week six session 3 we only do and practice about Word Processing Skills Activity.

Week six, session: 2 Reflextion

In week 6 session 2 we learn about word processing Skills.
Advanced Microsoft word:This are the thing we can found in Advanced Microsoft word,
Using Styles
Using Tables
Creating a Table of Contents
Creating and Using Bookmarks
Inserting Watermarks
Creating Hyperlinked Text
Importing Files in Other Formats
Creating Symbol Shortcuts
Using Document Templates
Saving as PDF
Using Comments and Changes,

STYLES: styles and themes are powerful tools in word that can help us easily to create proffetional documents. we also learn how to customizing Tables and creating charts, How to create mail merge Documents.

Week six, session: 7 Reflextion

Week six In first session we learn about
Microsoft office : Microsoft Office is a non-free commercial office suite of inter-related desktop applications, servers and services for the Microsoft Windows and Mac OS X operating systems, introduced by Microsoft in August 1, 1989. Initially a marketing term for a bundled set of applications, the first version of Office contained Microsoft Word, Microsoft Excel, and Microsoft PowerPoint. Over the years, Office applications have grown substantially closer with shared features such as a common spell checker, OLE data integration and Microsoft Visual Basic for Applications scripting language. Microsoft also positions Office as a development platform for line-of-business software under the Office Business Applications brand.
The current versions are Office 2010 for Windows, released on June 15, 2010;[2] and Office 2011 for Mac OS X, released October 26, 2010.
There are a wide number of programme in this Microsoft office such as:
1.   Microsoft office
2. Microsoft excels.
3.  Microsoft access.
4.  Microsoft outlook.
5.  Microsoft publisher.
6. Microsoft one note.
7.  Microsoft Info path.
8. Microsoft share point.
9.  Microsoft communicator.
10.              Microsoft web apps.
 
* Microsoft word: Microsoft Office Word is a word processor designed by Microsoft. It was first released in 1983 under the name Multi-Tool Word for Xenix systems. Subsequent versions were later written for several other platforms including IBM PCs running DOS (1983), the Apple Macintosh (1984), the AT&T Unix PC (1985), Atari ST (1986), SCO UNIX, OS/2, and Microsoft Windows (1989). It is a component of the Microsoft Office software system; it is also sold as a standalone product and included in Microsoft Works Suite. The current versions are Microsoft Office Word 2010 for Windows and Microsoft Office Word 2011 for Mac.


Ribbon:
:
 Mini Toolbar: Mini-toolbars
  • We have highlighted your search term mini toolbar for you. If you'd like to remove the search term highlighting, 
The mini-toolbars display in-canvas close to a selected object in the graphics window. They provide quick access to frequently used commands and command options, and buttons to confirm or cancel the current operation. The button flyouts display command options, where appropriate.
Two options control the behavior of the mini-toolbars:
  • Pin Mini-Toolbar Position Pins the mini-toolbar so that it remains stationary in the graphics window. Use the grip button at the upper left of the mini-toolbar to move it to a different location on the screen.
  • Auto Fade Enables or disables the mini-toolbar display. The display turns off when you move your cursor a short distance away from the mini-toolbar. However, the value input box at the top of the mini-toolbar remains visible.
When you select an edge, the mini-toolbar displays Fillet and Chamfer command buttons, and the Cancel button.
When you select a face, the mini-toolbar displays command buttons to perform Edit Feature, Edit Sketch, or Create Sketch operations, and the Cancel button
When you select a sketch, the mini-toolbar displays Extrude, Revolve, Hole, and Edit Sketch command buttons, and the Cancel button.
 Quick Access Toolbar:The Quick Access Toolbar (QAT) is a small, customizable toolbar that exposes a set of Commands that are specified by the application or selected by the user.

Shortcut menus:
 

Key Tips:  Keytips provide a way to access the application menu, the Quick Access toolbar, and the ribbon using the keyboard. To display keytips, press Alt.

We also learn about Basic task, Basic tasks, Basic task operation & Formatting.

Fifth week reflection session :3

Special folder: On Microsoft Windows, a special folder is a folder which is presented to the user through an interface as an abstract concept, instead of an absolute folder path. This makes it possible for an application to ask the operating system where an appropriate location for certain kinds of files can be found, regardless of what version or language of operating system is being used. Windows uses the concept of special folders to present the contents of the storage devices connected to the computer in a fairly consistent way that frees the user from having to deal with absolute file paths, which can (and often do) change between operating system versions, and even individual installations. The idea has evolved over time, with new special folders being added in every version of Windows since their introduction in Windows 95.
Microsoft's "Designed for Windows" logo requirements[1][not in citation given] state that an application must make use of special folders locations to locate the appropriate folders in which documents and application settings should be stored.
A special folder can either be a reference to a physical file system directory, or a reference to a "virtual" folder. In the former case, they are analogous to environment variables in fact, many of the environment variables that are set in a user's session are defined by where the special folders are set to point to.
Virtual folders, however, do not actually exist on the file system; they are instead presented through Windows Explorer as a tree of folders that the user can navigate. This is known as the Shell namespace. On Windows XP systems, the root of this namespace is the Desktop virtual folder, which contains the My Documents, My Computer, My Network Places (Network Neighborhood in Windows 95 and 98) and Recycle Bin virtual folders. Some virtual folders (like Desktop) have an accompanying special folder that is a reference to a directory on the physical file system. Windows Explorer displays the combined contents of a virtual folder and its associated file system folder to the user. This can be seen in Figure 1, which shows the Folder view in Windows XP's Explorer; in the Desktop virtual folder, the four standard virtual folders can be seen, as well as an additional folder, "a folder on the desktop", which is a real folder located in the Desktop directory in the user's profile.
Some third-party programs add their own virtual folders to Windows Explorer.
 

Windows special folder: IT has Desktop folder, Start menu folder & personal documents folder. the special folder name is used to index into the collection to retrive the special folder we want.
Virtual special folders; 1. Recycle bin.
                                     2. Control panel.
                                      3. Desktop.
                                       4. internet.
                                       5. My documents
                                       6. Network.
                                       7. Search result & printers.
* Disk cleaner ::Disk Cleanup (cleanmgr.exe) is a computer maintenance utility included in Microsoft Windowsdesigned to free up disk space on a computer's hard drive. The utility first searches and analyzes the hard drive for files that are no longer of any use, and then removes the unnecessary files. There are a number of different file categories that Disk Cleanup targets when performing the initial disk analysis:
Compression of old files
Temporary Internet files
Temporary Windows file
Downloaded Program files
Recycle Bin
Removal of unused applications or optional Windows components
Setup Log files
Offline files
The above list, however, is not exhaustive. For instance, 'Temporary Remote Desktop files' and 'Temporary Sync Files' may appear only under certain computer configurations, differences such as Windows Operating System and use of additional programs such as Remote Desktop. The option of removal hibernation data may not be ideal for some users as this may remove the hibernate option.

Aside from removing unnecessary files, users also have the option of compressing files that have not been accessed over a set period of time. This option provides a systematic compression scheme. Infrequently accessed files are compressed to free up disk space while leaving the frequently used files uncompressed for faster read/write access times. If after file compression, a user wishes to access a compressed file, the access times may be increased and vary from system to system. In addition to the categories that appear on the Disk Cleanup tab, the More Options tab offers additional options for freeing up hard drive space through removal of optional Windows components, installed programs, and all but the most recent System Restore point or Shadow Copy data in some versions of Microsoft Windows.
Disk Defragmenter:Disk Defragmenter is a utility in Microsoft Windows designed to increase access speed by rearranging filesstored on a disk to occupy contiguous storage locations, a technique called defragmentation. Defragmenting a disk minimizes head travel, which reduces the time it takes to read files from and write files to the disk.[1]Beginning with Windows XP, Disk Defragmenter also reduces system startup times.
system restore:System Restore is a component of Microsoft's Windows Me, Windows XP, Windows Vista and Windows 7, but not Windows 2000,[1] operating systems that allows for the rolling back of system files, registry keys, installed programs, etc., to a previous state in the event of system malfunction or failure.
The Windows Server operating system family does not include System Restore. The System Restore built into Windows XP can be installed on a Windows Server 2003 machine,[2] although this is not supported by Microsoft.
In Windows Vista and later versions, System Restore has an improved interface and is based on Shadow Copy technology. In prior Windows versions it was based on a file filter that watched changes for a certain set of file extensions, and then copied files before they were overwritten.[3] Shadow Copy has the advantage that block-level changes in files located in any directory on the volume can be monitored and backed up regardless of their location.

Fifth week reflection session :2

In session we learn about Efficient file management that means with this we can know about the documents library , we can use libraries for quik access ,avoid the home groups & save jump with jump lists.
Types Of Libraries: There are four defaults libraries in windows 7 :documets, pictures, music and videos.
 

Using search: Locate the search bar at the top right corner of the following windows Explorer pane. And then start typing a file name or key word and at last search will start displaying matching items even before you finish typing.

Fifth week reflection

.Microsoft windows
Microsoft Windows is a series of operating systems produced by Microsoft.
Microsoft introduced an operating environment named Windows on November 20, 1985 as an add-on to MS-DOS in response to the growing interest in graphical user interfaces (GUIs).[2] Microsoft Windows came to dominate the world's personal computer market, overtaking Mac OS, which had been introduced in 1984. As of August 2011, Windows has approximately 82.58% of the market share of the client operating systems according to Usage share of operating systems.
The most recent client version of Windows is Windows 7; the most recent server version is Windows Server 2008 R2; the most recent mobile version is Windows Phone 7.
Windows 7 Aim: 1. Startup & shut down firstly.
2. Sleep & resume faster.
3. use up less memory.
4. Pop up search result faster.
5. Wi-Fi quickly connects.
6. USB devices will be more faster than now.
Upgrade from vista: New wallpaper and theme, Quik desktop view button, Improved power management ,Improved backup, Improved networking via home group USB device faster and so on.
Improvement from XP: New start icon, jump list of easier access, a search bar in the start up menu, faster & smother gaming components larger and hidden icons in the task bar & so on.
AERO: Windows Aero is the graphical user interface and the default theme in most editions of Windows Vista and Windows 7, operating systems released by Microsoft. It is also available in Windows Server 2008, but is not enabled by default. Its name is a backronym for Authentic, Energetic, Reflective and Open.[1] Intended to be a cleaner, more powerful, more efficient and more aesthetically pleasing user interface than the previously used theme (Luna),[citation needed] it includes new translucency, live thumbnails, live icons, animations and eye candy. Aero also encompasses a set of user interface design guidelines for Microsoft Windows. In Windows Vista, transparency is disabled when windows are maximized but in Windows 7, transparency is enabled unless the user disables it in personalization or chooses the basic or classic theme.

TASKBAR: 

A bar located at the bottom of the screen that was first introduced with Microsoft Windows 95 and found in all versions of Windows after that. The Taskbar allows the user to locate and launch programs through the Start button, see any program that is currently open, display the time or date, items running in the background through the Systray, and with subsequent versions of the Windows operating system, the Quick Launch.


Windows 98 Taskbar


Windows 7 Taskbar

In the above two pictures, are examples of differences between Windows Taskbars. First, the Windows 98 Taskbar is an example of what the Taskbar looks like in many of the earlier versions of Microsoft Windows. As can be seen by this picture, this Taskbar has the Start button, the Quick launch area, the currently running programs, and the Systray and system time.

The second image, is the latest evolution of the Windows Taskbar, first introduced with Windows Vista. In this version of the Taskbar, the Start button is now an Orb with the Windows flag, displays icons like the Quick Launch with the currently running programs, running programs are only shown by icon, running programs icons in the Systray are now hidden, and the date is below the time.

 Users more familiar with Apple Macintosh computers can think of the Taskbar as the Dock.

Additional information and help with the Windows Taskbar.

SEARCH:

LIBRARIES: libraries allow you to organize your file in one place so they are easy to search and access.
 GADGETS:. A gadget is a small. technological object such as a device or an appliance that has a particular function, but is often thought of as a novelty. Gadgets are invariably [citation needed] considered to be more unusually or cleverly designed than normal technological objects at the time of their invention. Gadgets are sometimes also referred to as gizmos.