Showing posts with label PC Tips. Show all posts
Showing posts with label PC Tips. Show all posts

Term Problem To The Computer

When your computer problems, there are two possible effects:

1. There was an error in the computer software (Software).

2. There are faults in computer hardware (Hardware).

Here are some Isti; ah commonly used in connection with a computer breakdown.

HANG - When a computer can not do anything about it. It does not respond even if you press the keys on the keyboard (keyboard) or when you click the mouse (the mouse).

CRASH - When the hard disk (Hard Disk) fails. Usually it is followed by a warning elert (warning message.

BUG - Error or a bug in the software. sometimes bugs can cause the computer to hang or crash.

Glitch - When a computer is acting strange, not as expected. Computer said no glitch when you give a command, the computer do things other than what you ordered.

Use CCleaner to Clean Your PC

CCleaner works to find and remove the temporary file in the computer quickly. It can also repair the registry in Windows. If you normally use 1-Click-Maintenance of Tune Up Utilities, CCleaner this same functionality, but is faster and free.

What is a temporary file?

When any one program run in Windows, it will create a temporary file called a temporary file. However, after the program is closed, the temporary file is left unattended. Over time this is getting a lot of temporary files and would waste space on the hard disk.
CCleaner can also delete history for Internet Explorer, Firefox, Opera, and many other applications, including Media Player, eMule, Kazaa, Google Toolbar, and more.

Get CCleaner here.

Weird Sound on Computer Startup

Normally the computer will make a sound when it is turned on. Sound is produced because there is a fan in the power supply unit (power supply unit). The fan used to cool the power supply. Noise is also produced from the fan used to cool the processor. Usually both sound will be heard as long as you install the computer.

When you install a computer, hard drive will spin. It will also produce sound but the sound is not continuous. Computers will also be out a "beep" once. These markings start with a good computer. this beep sound if prolonged or repeated, it's a sign you have suffered computer hardware and does not work well.

If you want noise can be reduced tu la install the washer on the screw that fasten the fan or hard disk in the computer casing. Just cut only. want to lose sound without doubt no. Another way, open the computer casing and clean the dust that is in the computer. Make sure there is no hair stuck in a fan. Dust and hair may interfere and remove the fan spin loud noise.

If you put the computer on the table, do not forget to put the rubber base to absorb vibration and reduce noise being diverted to the computer table.

Your Computer Is Not Problem

When on your computer or laptop just nothing out on the monitor display / screen or laptop computer. I want to share with you what you can do first before going to the computer store or call a technician. Chances are your computer is damaged probably just a minor problem. this follow the steps below:

1. Open the computer casing or cover RAM for laptop (do not SCARED, no further cases of the computer eating people. Hehe)

2. Open RAM RAM and clean the feet with rubber eraser.

3. Reinstall the RAM and on the computer or laptop.

You will be surprised that the display on the screen comes back. 

If there is no exit any display on the monitor screen that, then you phone technician to come to your home or go in person to a computer service center.

Installation Your Computer (PC Assemble)

"Step By Step" Installing Your Own Computer

Here is the step by step how to install computer,

Level in computer installation consists of:



Good preparation will facilitate the installation of computers and avoid problems that may arise. Related issues in preparation include:

1. Computer Configuration Determination
2. Preparation Components and Supplies
3. Security

1. Computer Configuration Determination

Computer configuration associated with the determination of the types of components and functions and how all components can work as a suitable computer system desires. Determination of the type of processor initiated component, motherboard, and other components. Factors suitability or compatable from components on the motherboard should be noted, because each type of motherboard has a kind of processor, memory modules, ports and I / O bus are different.

2. Preparation Components and Equipment

Computer components need to be completed beforehand to facilitate installation. Complete equipment consists of:

• Computer Components
• Equipment components such as cables, screws, jumpers, bolts etc.
• manual and reference book of the component
• Tools such as flat and Philips screw driver
• Software operating system, device drivers and software applications.

The user is required as a reference to know the position of the element connection diagram (connectors, ports and slots) and element configuration (jumpers and switches) as well as the way that your computer settings are installed. Software CD is required to install the operating system, device drivers from the device, and application program on the computer finishes installing

3. Security

Security measures needed to avoid problems such as component damage by static electricity, falls, over heating and liquid spills. Prevention due to static electricity by:

• Use anti-static bracelet or touching a metal surface on the chassis before holding the components to remove static load.
• Do not directly touch the electronic components, connectors or the network but hold on a metal or plastic body found on components.


Level computer installation process consists of:

1. Preparation motherboard
2. Installing the Processor (CPU)
3. Installing the Heatsink
4. Installing the Memory Module
5. Installing the Motherboard in Casing
6. Installing the Power Supply
7. Installing the Motherboard Cables & Casing
8. Installing the Drive
9. Installing the Adapter Card
10. Final Solution

1. Preparation motherboard

Check your motherboard manual book to see where the setting equipment components.

2. Installing the Processor (CPU)

Processors more easily installed before the motherboard is installed in the casing. I install the processor socket and slot types are different

Determine the position of pin 1 on the processor and the processor socket on the motherboard, usually located at the ends marked with dots, triangles or depressions.
Raise the locking lever position socket to open.
Insert the processor into the socket by first coordinating position the feet processors with socket holes. bowed, until there is no space between the processors with socket.
Lower the locking lever back.

3. Installing the Heatsink

Function of heatsink is remove heat generated by the processor. For heat transfer mengoptimamkan the heatsink should be installed close to the top of the processor with some of the retaining clip on the heatsink surface coated conveyor gene heat (thermal grease). Heatsink comes with a fan to connect power to the fan connector to the motherboard.

4. Installing the Memory Module (RAM)

Each type of memory module SIMM, DIMM and RIMM are distinguished by the position of the recess on the side and bottom of the module.

How to install for each type of memory module as follows.


1. Adjust indentation position on the knob on the module slot.
2. Install the module by making oblique angle of 45 degrees in slot
3. Push to vertical module slot, the locking lever on the slot will automatically lock the module.

Type DIMM and RIMM

How to install DIMM and RIMM modules same and there is only one way that will not be overturned because there are two depressions as a guide. Perbedaanya DIMM and RIMM indentation position

Lay down locking hook on the end of the slot
Adjust indentation position on the knob on the module connector slot. and enter the module into the slot.
Hooks locks automatically lock when the RAM slot is already installed.

5. Installing the Motherboard in Casing

The motherboard is attached to the casing with a screw and holder (Standoff). Method of attachment is: -
  • Determine the position of the holes for each plastic and metal seat. Hole for metal seat (metal spacer) is marked by a ring on the edge of the hole.
  • Install metal or plastic holder on the tray casing according to the position of each seat hole motherboard.
  • Place the motherboard on the casing until the head holder tray out of the holes on the motherboard. Install the locking screws on each metal holder.
  • Install frame I / O ports (I / O sheild) on the motherboard if any.
  • Install the tray casing already installed the motherboard in the casing and lock with screws.

6. Installing the Power Supply

Several types of casings are equipped power supply. When the power supply not included then the installation as follows:

Enter the power supply on the shelf in the back of the casing. Install four screws fastening seed.
Connect the power connector from the power supply to the motherboard. ATX power connector types have only one installation of up to not be upside down .. Connect the power cable to the fan, if wearing a cooling fan for the CPU.

7. Installing the Motherboard Cables and Casing

Once the motherboard is installed in the casing next step is to install the cable I / O panel on the motherboard and the casing.
  • Attach the data cable to the floppy in the floppy drive controller on the motherboard (if any)
  • Attach the IDE cable on the primary and secondary IDE connector on the motherboard. (Now cable SATA)
  • On the back of the casing there is a hole to install additional port non slot type. Open the cover plate locking screw hole connector port and enter the port that is to be installed and install the screws back.
  • When the mouse is not yet available port on the back of the card casing mouse connector should be installed then connected to the mouse connector on the motherboard.
  • Ties cable connectors on the front panel of the switch casing, LED, internal speakers and ports installed in front of the casing when there is to the motherboard. Check your motherboard diagram to find the exact location of connectors.

8. Installing the Drive

Install procedure hardisk drive, floppy, CD-ROM, CD-RW/DVD is the same as the following:
  • Open / remove the drive bay cover (space to drive on the casing)
  • Enter from the front of the drive bay with the prior set the jumpers (master / slave) on the drive.
  • Adjust the position of the screw holes on the drive and then install casing retaining screw drive.
  • Connect the IDE cable connector to the motherboard padai drive (primary connector used earlier)
  • When the IDE cable connected to the drive jumper settings make sure differences ie both the first drive is set as the master and the other as the slave.
  • Secondary IDE connector on the motherboard can be used to connect two additional drives.
  • Floppy drives connected to the motherboard floppy connector specific
  • Connect the power cable from the power supply to the drive.

9. Installing the Adapter Card

Common adapter card installed is graphic cards, sound, network, modem and SCSI adapters. Graphic card must be installed before any other adapter card. I install the adapter:

Hold the adapter card at the edges, avoid touching components or electronic networks. Press card to get on the right connector on the motherboard expantion slot
Install the retaining screws to the chassis card
10. Final Solution

Install the chassis cover
  • Cord Power cable connect to a wall socket.
  • Attach the monitor to the port connector graphic card.
  • Connect the keyboard cable connector and mouse connector into the mouse port or serial port (depending on type of mouse).
  • Connect other external Devices such as a speaker, joystick, and microphone when there is a suitable port. Check the manual of the card to ensure that the location of the port adapter.

Tips How To Check Your Computer Specifications

Many ways to look at your computer or laptop specification which we use some software, properties of My Computer and others. However, what I want to show this is one of his ways. Important for us to know the strength of the ability of a PC that we use. With step and these measures, we can see the actual ability of our computers. We can ability and speed in terms of graphics, memory, processor and type of Operating System (OS).

Among the steps are:

1) Click on Start -> Click on the Search programs and files.

2) Then type the word run and click RUN program

3) Type dxdiag Click on the OK button.

4) Next All of you will see the overall look in the system specifications of your computer

5) Next you click on Display to see the speed and information about your computer graphics.

How? Have you know the exact specifications of your computer?

PC Temperature Fan

Lately my CPU always sound, as a warning that it was too hot. This situation is quite dangerous because any one component in a computer can be damaged if the temperature is too high. So I'm trying to find a software that can display the CPU temperature, so that I can make observations easily.

SpeedFan is a software that can do the job. It can access the thermal sensor on the motherboard you to display the temperature of the CPU, hard disk, and your computer system. If the temperature of any one component is too high, the flame symbol will be displayed on the component.

Note: SpeedFan is a complex software capable of changing the FSB, the speed of a computer fan, and settings for hours. If you are not experienced shun these functions.

The Advantages of Buying Used Computers

Nothing new, so no time. Although long, as long as they can be used not to waste. Likewise the computer. For those who want to buy a computer, the computer model used may be made optional.

So, why choose a computer used?

Cheap price.
Every purchase price definitely be a priority. Just as the computer used. Cheaper than new because the old components and programs. Although old but still usable.
Save. Usually used computers are sold with the package. A package includes a CPU, monitor, keyboard and mouse.

No need to purchase one by one.
No significant difference with the new computer. The simplest example, if the purchase of computers used by the school or university labs. Technology depending only 2 to 3 years. If buying for a home, it still can be a rewarding because the computer can still be used as long as possible as long as able.

Save the earth from dumping a computer on the market.
Put simply, why buy a new computer if you still can save up to 80%. Money can be used for other more important things. Be a smart shopper. Personally, if you want to buy another computer, I would definitely look for used computers.

Important For Backup Files

Threat of spyware and adware is one of the reasons why you should make a backup copy of the data and files on your computer (mp3, photos, documents, etc.). Some malware programs can imbed itself into the operating system. Although there are programs to deliver malware such as Spybot and HijackThis, but at times, in some cases, you still need to reinstall the entire operating system.

Reinstalling the operating system may cause a risk of your computer can not boot normally. If this happens, usually the last option is to how to format your computer and create a new system. Without a copy (backup), all your data will be lost.

It is therefore very important for you to make backups of important files. In the event of unwanted things, you just need to restore data that has been dibackup above the bed.

Hibernate your PC

Fact: I never Shut Down my PC. Ops, does that mean my PC is on 24 hours non-stop? Not at all! If I let it Onn all day, I would be contributing to the waste of electricity.

I do not Shut Down, but I put my PC in Hibernate mode.

What is the advantage of Hibernate?

Let's say you open multiple applications in Windows, for example Microsoft Word, Firefox, Adobe Photoshop and others. And you do not save more documents in all applications. When you Hibernate your computer, it will be deleted, and you can remove the electrical plug. Right back ON your PC, all the applications are still open, and all you do not save the document again just now! Easy huh. Right ON the PC process is also faster if you Hibernate, compared to Shut Down.

How Hibernate works?

In the event Hibernate, Windows will first store all your data in the Hard Disk. This data remains even if the computer power plug is unplugged. That's why when you right ON the PC, the data is still there. Different from Standby mode, the computer simply put the data in RAM, and this data will be lost if you cut off the supply of electricity.

How To Hibernate PC?
Click Start Menu> Turn Off Computer. At the exit window display, press Shift and Stand By button will change to Hibernate.

You also can set the Sleep button on your keyboard (I personally use this method). Follow the steps in Windows XP:
  1. Right-click on the Desktop and select Properties.
  2. In Display Properties, select the Screen Saver tab.
  3. On the Power Monitor, click the Power button.
  4. In the Power Options Properties, see the Power buttons. In the option "When I press the sleep button on my computer quot;, select Hibernate from the drop-down menu.
  5. Click on the OK button.

10 Causes of Damaged Computer

Here I list 10 ways consumers ruin their computer so that you are more aware of when using a computer

1. Not use automatic voltage regulators.

This is one action that can damage your computer physically. Many think that the computer is in danger as the storm and lightning, but the reality is what - what's bothering electrical circuit can cause an increase in voltage. Something as simple as opening an electrical equipment connected to the same socket with your computer can cause an increase in voltage.

You can protect your system from voltage increase. This can be done by installing an automatic voltage adjustment or automatic voltage regulators (AVR). To provide better protection, you can get Uninterruble Power Supply or UPS capable of providing continuous power supply for a few minutes if the external power supply cut off to arrive - arrived. This extra time can help you keep all the work you are doing and shut down the computer safely. UPS is definitely more expensive than the AVR's no continuous supply functions.

2. Surf the Internet without firewall protection

Many home computer users to connect a computer to a cable or DSL modem and the phone continued to surf the Internet, without realizing that they are putting their computers at risk of being attacked by viruses, spyware or hackers (hackers). Every computer connected to the Internet must be protected by a software firewall.

Example firewall available in the market are as Kerio or ZONE ALARM, Windows also has an existing firewall that ICF / Windows Firewall. Firewalls are also very useful because if you use the laptop firewall will remain with you if you bring your laptop to places that offer wireless Internet service (wireless). However, only a firewall is not enough, it should be installed and set correctly.

3. Not update the antivirus and anti-spyware

There is no doubt most users do not like antivirus software. It's not a productivity software that we can use to produce various types of working documents. Antivirus programs can also block intended to be carried from functioning properly. You may need to turn to install some software and it should be updated regularly to provide appropriate protection. Antivirus installation also causes the computer to be heavy and slow. Subscription date is very short and you are often asked to pay to continue using it. When a user fails to make payment, antivirus failure and become a detriment to consumers.

However, in the circumstances, you can not leave your computer without antivirus protection. The program - which is detected by antivirus programs - namely, viruses, trojans, worms and the like can lead to more damage and loss of time and money compared to time manage antivirus itself.
Spyware is another growing threat, the program will install itself into your computer (usually without your knowledge) and collect all the data and information about your computer and send it back to the spyware owner. Spyware is the number one computer become slow and sluggish. Most anti-virus software does not detect spyware and therefore it is important to install anti-spyware program that specifically.

4. Installing and Removing Arbitrary Program 

Many consumers are very fond of installing various types of freeware and shareware software downloaded from the Internet. Not least is the purchase of software - software piracy from the shopping center. Some people think more software loaded onto the computer, the more sophisticated and their computer prevailed.

The fact is that more and more software you install, the greater the risk of your computer is infected with viruses or spyware that will damage your system. The risk is greater if the software is downloaded from the website - a website that suspected

More and more software is installed and removed repeatedly will slow down or damage your computer system. Removal does not necessarily remove the software program as a whole and does not remove any viruses and spyware planted by. As a result the performance of your computer is still growing slowly.

You should only install the right software you need. You should also reduce the installation and removal of programs.

5. Keep the hard drive is full.

Among the effects of software installation that is not monitored is that it will fill your hard disk. Every computer comes with a hard drive that has a payload capacity or free space or free space is limited. Each time the software is installed, the file is put in the hard disk. Files meet free disk space. A consequence of this reduced capacity of free disk space. If this is not controlled, sooner - or later your computer will be slow. You should make sure your hard disk free space has not decreased less than 10% of its original capacity. This means that if your hard drive is 200GB, free space should not be allowed to drop below 20GB.

You can use the software "disk defragmenter" that is built into Windows (Programs / Accessories / System Tools) or other software. You can also use the "Disk Cleanup" which are available in Windows to find and clean up files - files that are not needed in your computer and get back the free disk space.

6. Open all attachments.

Most users prefer open attachments sent via e-mail without attachments meghiraukan that the possibility of which contained the virus that can erase all the data contained on the hard disk.
Among the most dangerous attachment is an attachment that has a connection like - exe, cmd and much - much more. Previously, we feel that Microsoft Word files and graphics that are available via e-mail is safe, but unfortunately not anymore. A file like greatfile. Jpg. Exe may supposedly only the graphic image or photo by most users. The fact is that it is a program that may contain viruses, trojans or worms.

7. Click on everything.

If you are the type of person who likes to click all the things that can be clicked, you should stop the habit. This is because the attachments or links are clicked may contain Active X code is a software that can damage your system.

If you pressed the wrong link it may take you to sites containing pornographic usur, piracy and many more can invite trouble for you.

8. Share files

We are taught from childhood that sharing is a good practice. But in the world now, not all types of partnership are good. In cyberspace, share personal information such as name, e-mail address, home address, phone numbers and even worse bank pin numbers and credit card declaration may cause you to be bankrupt! All forms of personal information - including personal documents and files you work - just have to share with you is true - you really believe and there is no need to do so.

Although most types of information "stolen" from the computer actually provided "voluntarily" by the uninformed consumers regarding the security of on-line, but there is also information stolen by hackers or "hackers" without being noticed by the user. The best way to delay of this problem is to install a software firewall. Firewall software can prevent hackers from connecting to your computer and gain access to the information in it.

9. Choosing the wrong password.

This is a frequent mistake. When set password or password for any purpose, do not choose simple passwords such as birthdays, your IC or the name of the beloved. The password should be up to 14 characters long and contain a mixture of letters and numbers. There is no blame you use only one or two password for all purposes - as long as you can remember and it is not easy to guess. Finally, do not so complicated password or "advanced" your own so he could not remember!

10. Not make backup copies files. (Backup file)

Unfortunate odorless. Computer, as well as machine - other machines will one day also damaged. If the loss involves a hard drive, it can cause you to suffer from loss of data or information on a permanent basis. While most users do not generate a lot of data or personal information, but for the few who actively use the computer for work and education, a permanent loss of personal data can be likened to a huge disaster. Computer can be repaired and if necessary replaced with new ones. All software can be refilled from the CD-ROM or downloaded from the Internet. But there is no way for you to retrieve your personal data if it is lost or damaged permanently. In this case only one thing that can save you - personal data is backed up or backup.

Make a backup copy or backup copy files - personal files are aspects of computer use most often ignored - and often consumers have to bear the high cost of this negligence. Previously the process of making backup copies or backups can be costly and take a long time, but now it is so simple. For most users enough equipment thumb drive to load a copy of all personal data. Some users like to use two thumb drives - one as primary storage media and a second as a backup storage media or backup copy.

Message : Like My FB Page
Copyright © 2011. Laptop | Computer | Monitor | Software | Hardware | Maintenance Care - All Rights Reserved
Get Tips and Trick Here Happy Reading
Proudly powered by Blogger