1. The lesson forms part of a unit which forms part of a scheme of work.
2. There is a good starter activity, one that gets the pupils settled down an in the right frame of mind to do the work you've planned for them.
3. The teacher spends time at the start letting pupils into the secret what the objectives (intended learning outcomes) of the lesson are, ie what is intended to be achieved by the end, and how this lesson fits in with the preceding and following lessons
4. Pupils are given open ended tasks (as far as possible), or at least not tasks with a glass ceiling. (Even lessons designed to impart a set of skills can still be more interesting than "drill & practice").
5. There are plenty of resources for the pupils to use, enabling the teacher to give QUALITY guidance, ie not confined to explaining how to save the document! Such resources will include "how to' guides and posters, on screen help (which the pupils will have been taught how to use), and each other.
6. Ample time is allowed for the plenary, thereby allowing it to be somewhat more useful than the POLO model: Print Out and Log Off. The plenary is an ESSENTIAL part of the lesson, used to check what learning has taken place, consolidate learning, and prepare pupils for the next stage. In fact, a lesson might have two or three plenaries rather than just one at the end.
7. Homework is set at the START of the lesson, enabling the teacher to explain what needs doing, and for the pupils to understand what they need to have achieved by the end of the lesson in order to be able to make a good job of the homework; note that homework is ALWAYS given, regardless of so called homework timetables! (It doesn't always have to be written down.
8. Pupils are given plenty of time on the computers, with the teacher helping individuals and small groups.
9. Work is set at an appropriate standard, taking into account the pupils’ prior learning and attainment, and what is expected of their age group in terms of national standards.
10. There is a lot of questioning â€" PROBING questioning â€" and assessment for learning techniques in evidence.
11. There is a good range of material to provide for differentiation (higher attainers and children with special educational needs) and personalised learning.
12. The teacher is aware of individual pupils’ needs, such as their individual education plans â€" and makes use of the assessment and other data she has â€" remember: data only becomes information if you DO something with it!
13. Not all work takes place at the computer.
14. Pupils come in on time, prepared, and ready to start work.
15. There is a good buzz in the room pupils are talking about the work, not last night's TV programs.
16. Pupils organise themselves and, if working in groups, work collaboratively rather than competitively at least with other members of their own group!
17. Pupils don't keep asking the time, unless they are worried about not being able to complete the work (see below though) and don't notice the time going by.
18. Pupils don't understand the concept of finishing the work in the sense of having time left over to check email, play Solitaire etc.
19. Pupils, even normally poorly behaved ones, ask to be allowed to stay on, come back at lunchtime or come back early in the morning.
20. Pupils respect the equipment and the room. For example, they do not leave discarded print outs on the floor.
21. Pupils are happy and confident enough to try out things you haven't shown them: they ask help from each other or look at the posters and manuals that are available for them.
22. If you interrupt their work in order to announce or explain something, someone asks you to hurry up so that they can get back to their work.
23. Pupils do a greater amount work, say for homework, than you have asked them to. For example, instead of conducting a survey with 10 people they decide to ask 20.
24. Pupils do a wider range of work than you have asked them to. For example, instead of just writing about what the hospital of the future will be like, they canvass the views of others and carry out some research about current developments.
25. Pupils want to show off to you little tricks they have discovered, such as keyboard shortcuts.
26. Pupils talk to their friends about the lesson.
27. Pupils discuss with their friends the possibility of taking a particular ICT course in 3 years time.
28. Pupils not only want to assist at open evenings/days, but are able to look after and even create an ICT presentation on your behalf.
29. Pupils are able to help other (younger or older) pupils with confidence and enthusiasm.
30. Pupils ask you questions that you are unable to answer.
This article is (c) 2005 Terry Freedman
About the author:
Terry Freedman has nearly thirty years' experience in education, and nearly 20 years' experience as a writer. A member of the UK's Society of Authors, Terry has had around a dozen books published, and over 800 specialist articles in leading newspapers and magazines.
Written by: Terry Freedman
Thursday, September 24, 2009
30 Secrets Of A Good Computer Lesson
10 PROVEN TIPS TO SURVIVE A COMPUTER CRASH
By Eve Abbott, excerpted from her new book, How to Do Space Age Work with a Stone Age Brain TM
COMPUTER CRASH
Do these words strike fear into you? If not, maybe they should! A computer crash is at best time consuming and expensive, and at worst a genuine business disaster. Here are things you can do now to prevent a crash and/or insure a smooth recovery whether you use your computer at work or for your personal life-or both, like me!
The first rule in minimizing computer disasters is backup. The second rule in easier data recovery is BackUp. The third rule in computer organizing is BACKUP. I am astounded at the number of people (in large and small businesses) who do not back up their work regularly. Without good backups, you risk losing everything if your hard drive goes belly-up.
Start by setting all of your programs to save automatically after 2 minutes. This will protect your work against temporary freeze-ups and unplanned shutdowns.
Second, plug your computer, monitor, and other electronic equipment into a UPS Battery Backup unit to protect it from power surges and outages. A unit like this one will give you 5 minutes to save your work and shut down your computer normally if the power goes out.
Then-BACK UP! (If you're not sure what the best way to back up is, keep reading.)
I bought a brand new Hewlett Packard Pavilion XP system and began to back up weekly. Seven months later, I returned from making a cup of tea to hear my computer going click-click-click loudly. My hard drive had just crashed for no reason at all. As is often the case, I lost everything on it.
I felt confident because I had my data backed up by copying my entire working C-drive onto a CD-but even with backups, and even if your computer is still under warranty, let's get realistic about how much time and money a crash can end up costing you.
It took four days for me to get the special shipping box HP sent me to return the computer. They replaced the hard drive, and it was returned within 10 business days at no charge for repair and shipping. This still adds up to three weeks without my computer.
First, I rented a laptop and spent hours installing the programs I normally use. Laptop rental cost me $250.00 for one month, with a $500 refundable deposit. I could have rented a desktop system for a little less per month, but I would have had to wait a week to get the computer. It was great to have the laptop to use until my repaired computer arrived. But, I had to go through the same restoration process again when it was returned with a new hard drive. More time lost and more frustration, too.
Second, I spent hours importing my data from backup CDs. I still lost almost a week's worth of data (Quicken entries, Word documents, calendar and contact information) because that's how long I go between backups.
Third, I spent hours recreating the custom settings on my software. Fourth, I had to install some smaller programs that I'd forgotten I would need.
THE DAMAGE:
Sometimes data can be recovered from a dead drive, depending on what has caused the crash. Professional data recovery services charge from $500 to $1500 to get your data back, and you have to pay whether or not they recover anything.
You can find more information about data recovery services at http://www.drlabs.com/pricing.html and http://www.dtidata.com/data_recovery.asp.
I paid $1,000.00 in computer consultant fees to get the laptop set up, and my computer taken apart and set up again to get it running A-OK. That's apart from data recovery costs, which my backups saved me from having to pay.
The grand total: $1,250.00 and 7 days in lost time.
Pretty expensive considering that I had all my current data backed up onto CDs.
BACKUP OPTIONS
There are many ways to back up information. Diskette, CD, Zip drive, External hard drive and Web (on-line). I will not discuss tape drive backups simply because tape media is unreliable and awkward compared to newer technologies. If you have more than one computer, you can back up from one to another via network drives-but that only protects you in the event that disaster strikes one machine at a time.
There are four questions you need to ask yourself regarding your back-ups:
1) How critical is your data? (My business and life are on my hard drive = critical)
2) Do you add or process high volumes of information?
3) In what time frame do you add enough to make it a real loss? (day, week, per project)
4) Do you work with very large files of any type?
The more information you process or add to your computer hard drive, the more often you need to back up. For high volume or crucial files you need to backup daily.
Diskette:
There is the small file backup onto diskette. For example, you just entered a lot of Quicken data and you don't want to take a chance on losing it but you don't want to do a full back up, or you have a single Word file, just pop it on a diskette. Remember to label any and all backup media with contents and date.
ZIP drives and disks:
ZIP drives and disks can work well for back ups of larger projects. I had a client who was an author and she kept one ZIP disk for each of her books, which contained every file related to the book - not just the text. If you are satisfied using a ZIP drive and disks for your data storage - don't change to another media. Note: many more people have CDs than zips, so if you need to share data you may need to switch to CDs.
CD:
In the same way you archive paper every year after taxes (along with a backup of your accounting program and data), consider backing up entire projects onto CD when you're finished. This keeps the data available and safe, without cluttering your hard drive. You can file a project closeout CD with the matching archived paper files. Or keep a variety of backups in a CD organizer (date labeled) divided up into Projects, Backups and Programs.
The backup CDs I use are 'data only' to safeguard important information in case a problem develops in between system backups. If you are going to archive (e.g., taxes) and may not access the backup for a long time - go with CDs. CDs are more stable, and you are less likely to run into trouble with irretrievable data. Always use premium brand-name CDs (or other media). Discount media is more likely to fail.
Disk 'Cloning':
For $70 or less, you can back up your entire drive (operating system, programs and data) using "disk cloning" software (Norton Ghost, Paragon Drive Backup, or PowerQuest Drive Image. You can store this "image" of your drive on removable media like CDs and ZIP disks, on tape, or on an external hard drive.
You'll still have to spend a lot of time doing the backups and most people will end up with a set of at least 10 CDs for each backup, since the copy of your drive will take up about 50% of the storage space as your drive itself. (That's not the size of your whole drive, just the part you have filled up.)
You can get more information about disk cloning software at:
http://www.powerquest.com/driveimage/
http://www.symantec.com/sabu/ghost/ghost_personal/
http://www.acronis.com/products/trueimage/
http://www.drive-backup.com/
Web:
There are on-line services (e.g., www.connected.com) which will automatically back up your computer (either totally or just the changed files). This backup and restore option is limited only by the speed of your connection to the internet. Some people leave their computer on all night to do the backups. The reverse process will be more complicated, because you cannot restore directly from the web. Many information technology and graphics professionals use web services because of the massive files they process each day.
Your backup files are stored on their server. This is good because it is off-site in case of disaster recovery. Unfortunately, your data is only as secure as the server it is on. I don't use this option, because I don't think there is any function on the internet that is as secure as doing it myself and keeping control over all the data at all times. If you don't use massive files, you don't need it.
External Hard Drive (XHD):
I chose this option after my crash disaster because I can recreate my entire system without the wasted time of restoring my operating system and settings, downloading programs and data from backups, and resetting application customizations, etc.
An external hard drive ($200) with 'disk cloning' software lets you put your entire drive onto your backups. If you don't use the ghosting software you can only put programs, and data backups onto the external hard drive, not the operating system itself. The ghosting software will enable you to make a 'boot disk' just for restoring from the external hard drive to your main computer.
This option will allow you to completely restore your computer, if necessary (with no hard drive damage). Or, install a new hard drive on your computer and then restore immediately.
Just plug the external hard drive into the computer and start the backup, which verifies the data. Then, you unplug the external hard drive. This takes about fifteen minutes total for my backups. After backing up, I store the XHD in the trunk of my car (in a laptop case for protection). Even if the house burns down I still have my entire computer capability just outside in my car.
First, put an XHD ghost of just your operating system and programs with all the custom settings. Second, do a ghost of your entire system (operating system, programs and data). Third, do regular working drive data backups. Make sure any programs you ever use are in the second XHD backup, and/or in your working hard drive for your 'regular maintenance' backups.
I can get a new computer, copy everything I need and get to work. One possible downside to this; if you have to 'recover' on a new computer with a new system (different configuration and drivers), you will have trouble using the restored system until you reload the correct drivers and eliminate the 'old' ones.
Backup, BackUp, BACKUP!
So, how can you combine these different backup choices to work in your particular situation?
Take the simplest method that will safeguard your information. If all you need is a diskette file box for backups - great!
I use the XHD once a week for a programs and data backup. In between I use diskettes or CDs, depending on the size of the files and how long I want to maintain them. There is enough room on my XHD to put 4 total system-program-data backups of my entire XP system into it. Once, you've done an operating system backup, unless you change your configurations or programs, you don't need to do it again. For regular maintenance, do your working 'data' drive.
If you do nothing, you are guaranteed to have a disaster sooner or later. Choose what works best for you and set a reminder to BACKUP as often as you need to stay sane when it does happen.
For more time saving tips go to http://www.organize.com
Copyright 2005 Eve Abbott. All rights reserved.
About the Author
Copyright, Eve Abbott All Rights Reserved. The Organizer Extraordinaire's new book "How to Do Space Age Work with a Stone Age Brain" TM is available online at http://www.organize.com Sign up for more time-saving tips. Enjoy free brain quizzes to help you work at your personal best! Eve’s guide is the first book to offer easy, online assessments that will help you make your own personal organizing solutions match your individual work style.4 Computer Money-saving Tips
Tip #1 -- Rebates: A rebate is not always a bargain. Computers with rebates are often close to being discontinued. You may pick up a good deal or purchase technology that's about to become yesterday’s news. What's more, stores will often package computers with a bunch of free items to make it look like you're getting more value. Chances are the extras are either poor quality or items you're unlikely to use. Also, they’re counting on you to not redeem your rebate, a very common occurrence.
Tip #2 -- Extended Service Warrantees: Buyer Beware! They're a gamble, but not always a bad idea. If you're purchasing a laptop and you plan to travel a lot, an extended warranty that covers replacement of the monitor/display can be a good gamble. Replacing a display can cost $400-$600, making the warranty worthwhile. On the other hand, if you plan on buying the warranty for routine maintenance; save your money. Oftentimes it can take weeks for the store to send your PC out for service. Also, remember the store where you purchased your computer does not always do warranty work during the first year, instead you may have to ship it directly to the manufacturer. In general, extended warranties cover electronics [things you can't see]. They don't usually cover physical damage. Most extended warranties have large gray areas, leaving the warranty provider a lot of room to reject claims.
Tip #3 -- Monitors: Don’t throw away your monitor if it's still working properly. Instead, keep it and save a chunk of money by just replacing your old CPU [computer tower]. Monitors last much longer than CPUs and the technology is usually compatible between your old monitor and the new CPU. However, if you’re dissatisfied, then monitors, keyboards and mouses are the three tools to spend extra money on, since you use them every day!
Tip #4 -- Networking: How are you connecting to the Internet? If you're using a high speed Internet connection, such as cable broadband or DSL, you'll want to make sure you have a network card built into your system. If you have a wireless network at home or at the office, save money and installation time by buying the wireless card built right into the computer.
About the Author
About the Author
Sharron Senter is co-founder of http://www.VisitingGeeks.com - an on site computer repair, security and networking company serving north of Boston, Southern NH and Maine. Visiting Geeks’ technicians are crackerjacks at squashing viruses, popups and securing and making computers perform faster. Learn more about Sharron at http://www.SharronSenter.com
Sunday, September 13, 2009
All About Computer Viruses
You might have a virus.
Just what exactly is a virus? What kind is in your computer? How did it get there? How is it spreading and wreaking such havoc? And why is it bothering with your computer anyway?
Viruses are pieces of programming code that make copies of themselves, or replicate, inside your computer without asking your explicit written permission to do so. Forget getting your permission down on paper. Viruses don’t bother to seek your permission at all! Very invasive.
In comparison, there are pieces of code that might replicate inside your computer, say something your IT guy thinks you need. But the code spreads, perhaps throughout your office network, with your consent (or at least your IT guy’s consent). These types of replicating code are called agents, said Jimmy Kuo, a research fellow with McAfee AVERT, a research arm of anti-virus software-maker McAfee Inc.
In this article, though, we’re not talking about the good guys, or the agents. We’ll be talking about the bad guys, the viruses.
A long, long time ago in computer years, like five, most viruses were comprised of a similar breed. They entered your computer perhaps through an email attachment or a floppy disk (remember those?). Then they attached themselves to one of your files, say your Microsoft Word program.
When you opened your Microsoft Word program, the virus replicated and attached itself to other files. These could be other random files on your hard drive, the files furthest away from your Microsoft Word program, or other files, depending on how the virus writer wanted the virus to behave.
This virus code could contain hundreds or thousands of instructions. When it replicates it inserts those instructions, into the files it infects, said Carey Nachenberg, Chief Architect at Symantec Research Labs, an arm of anti-virus software-maker Symantec. Corp.
Because so many other types of viruses exist now, the kind just described is called a classic virus. Classic viruses still exist but they’re not quite as prevalent as they used to be. (Perhaps we could put classic viruses on the shelf with Hemingway and Dickens.)
These days, in the modern era, viruses are known to spread through vulnerabilities in web browsers, files shared over the internet, emails themselves, and computer networks.
As far as web browsers are concerned, Microsoft’s Internet Explorer takes most of the heat for spreading viruses because it’s used by more people for web surfing than any other browser.
Nevertheless, “Any web browser potentially has vulnerabilities,” Nachenberg said.
For instance, let’s say you go to a website in IE you have every reason to think is safe, Nachenberg said.
But unfortunately it isn’t. It has virus code hidden in its background that IE isn’t protecting you from. While you’re looking at the site, the virus is downloaded onto your computer, he said. That’s one way of catching a nasty virus.
During the past two years, another prevalent way to catch a virus has been through downloads computer users share with one another, mostly on music sharing sites, Kuo said. On Limewire or Kazaa, for instance, teenagers or other music enthusiasts might think they’re downloading that latest Justin Timberlake song, when in reality they’re downloading a virus straight into their computer. It’s easy for a virus writer to put a download with a virus on one of these sites because everyone’s sharing with everyone else anyway.
Here’s one you might not have thought of. If you use Outlook or Outlook Express to send and receive email, do you have a preview pane below your list of emails that shows the contents of the email you have highlighted? If so, you may be putting yourself at risk.
Some viruses, though a small percentage according to Nachenberg, are inserted straight into emails themselves.
Forget opening the attachment. All you have to do is view the email to potentially get a virus, Kuo added. For instance, have you ever opened or viewed an email that states it’s “loading”? Well, once everything is “loaded,” a virus in the email might just load onto your computer.
So if I were you, I’d click on View on the toolbar in your Outlook or Outlook Express and close the preview pane. (You have to click on View and then Layout in Outlook Express.)
On a network at work? You could get a virus that way. Worms are viruses that come into your computer via networks, Kuo said. They travel from machine to machine and, unlike, the classic viruses, they attack the machine itself rather than individual files.
Worms sit in your working memory, or RAM, Nachenberg said.
OK, so we’ve talked about how the viruses get into a computer. How do they cause so much damage once they’re there?
Let’s say you’ve caught a classic virus, one that replicates and attacks various files on your computer. Let’s go back to the example of the virus that initially infects your Microsoft Word program.
Well, it might eventually cause that program to crash, Nachenberg said. It also might cause damage to your computer as it looks for new targets to infect.
This process of infecting targets and looking for new ones could eventually use up your computer’s ability to function, he said.
Often the destruction a virus causes is pegged to a certain event or date and time, called a trigger. For instance, a virus could be programmed to lay dormant until January 28. When that date rolls around, though, it may be programmed to do something as innocuous but annoying as splash popups on your screen, or something as severe as reformat your computer’s hard drive, Nachenberg said.
There are other potential reasons, though, for a virus to cause your computer to be acting slow or in weird ways. And that leads us to a new segment – the reason virus writers would want to waste their time creating viruses in the first place.
The majority of viruses are still written by teenagers looking for some notoriety, Nachenberg said. But a growing segment of the virus-writing population has other intentions in mind.
For these other intentions, we first need to explain the “backdoor” concept.
The sole purpose of some viruses is to create a vulnerability in your computer. Once it creates this hole of sorts, or backdoor, it signals home to mama or dada virus writer (kind of like in E.T.). Once the virus writer receives the signal, they can use and abuse your computer to their own likings.
Trojans are sometimes used to open backdoors. In fact that is usually their sole purpose, Kuo said.
Trojans are pieces of code you might download onto your computer, say, from a newsgroup. As in the Trojan War they are named after, they are usually disguised as innocuous pieces of code. But Trojans aren’t considered viruses because they don’t replicate.
Now back to the real viruses. Let’s say we have Joe Shmo virus writer. He sends out a virus that ends up infecting a thousand machines. But he doesn’t want the feds on his case. So he instructs the viruses on the various machines to send their signals, not of course to his computer, but to a place that can’t be traced. Hotmail email happens to be an example of one such place, Kuo said.
OK, so the virus writers now control these computers. What will they use them for?
One use is to send spam. Once that backdoor is open, they bounce spam off of those computers and send it to other machines, Nachenberg said.
That’s right. Some spam you have in your email right now may have been originally sent to other innocent computers before it came to yours so that it could remain in disguise. If the authorities could track down the original senders of spam, they could crack down on spam itself. Spam senders don’t want that.
Ever heard of phishing emails? Those are the ones that purport to be from your internet service provider or bank. They typically request some information from you, like your credit card number. The problem is, they’re NOT from your internet service provider or your bank. They’re from evil people after your credit card number! Well, these emails are often sent the same way spam is sent, by sending them via innocent computers.
Of course makers of anti-virus software use a variety of methods to combat the onslaught of viruses. Norton, for instance, uses signature scanning, Nachenberg said.
Signature scanning is similar to the process of looking for DNA fingerprints, he said. Norton examines programming code to find what viruses are made of. It adds those bad instructions it finds to its large database of other bad code. Then it uses this vast database to seek out and match the code in it with similar code in your computer. When it finds such virus code, it lets you know!
©2004 by Kara Glover
Feel Free to reprint this article in newsletters and on websites, with resource box included. If you use this article, please send a brief message to let me know where it appeared: kara333@earthlink.net
5 Tips For Buying The Right Laptop Computer
It's easy to be intimidated by all the laptop models on the market today. There are literally dozens and dozens in every price range.
The key to finding the right one for you is to step back and consider exactly how you plan to use your laptop. When you define what you need before you go shopping, buying the right machine becomes much easier.
Here are 5 basic factors to consider:
1. SIZE
In the world of mobile computing, size definitely matters. The size of a laptop affects two key areas: portability and display size.
If you're always on the go and will be using your computer only in short bursts, a so-called ultralight will save you some shoulder strain.
On the other hand, if you're going to spend hours in front of your laptop, a larger display may be in order.
Today, some laptop displays exceed 17 inches, rivaling the display size of many desktop systems. The down side is that these monsters can easily weigh three times as much as an ultralight.
2. HARD DRIVE
Speaking of size, what about the size of the hard drive? One way to approach this issue is to ask yourself the following question:
Will this be my primary computer, or will it supplement my desktop system?
If the former, you should look for a bigger hard drive - 60 GB or more.
If the latter, you may be able to make it with a 20-30 GB hard drive.
But even this isn't absolute.
If, for example, you plan to copy a huge MP3 library from your desktop system to your laptop to make your music library portable, you'd be well advised to err on the side of too big.
3. MEMORY
In determining the right amount of system memory, or RAM, take a look at the ways in which you intend to use your laptop:
If your needs are somewhat mundane - email, spreadsheets, word processing, etc. - 256 MB of RAM should be plenty. This is a common configuration for many laptops, so it means you probably won't need to spend extra for more RAM.
On the flip side, if you're an aspiring mobile digital photographer or videographer, you should stuff your laptop with as much RAM as it can hold.
In fact, exactly how much RAM your laptop can hold may in part drive your purchase decision. Applications for editing and manipulating multimedia content are notorious resource hogs.
4. NETWORK CONNECTIONS
Thanks in no small part to the Internet, computing in the 21st century relies heavily on being connected:
Connected to the Internet, connected to a corporate network, connected to a wireless network, connected to a home network, connected to an online service.
Your life will be easier if you buy a laptop that includes built-in means to connect to them all.
5. PRICE
If you're considering a laptop, you're probably wondering how much money you'll need to spend.
A few years ago, you'd be hard-pressed to find one for under $2,000. Today, there are plenty of laptops to be had for under $1,000.
What's more, most of the major manufacturers offer a variety of financing options.
Laptop prices have come down, to be sure. However, a laptop still represents a fairly major purchase for most people.
If you take the time to search for a laptop that meets your specific needs, you should get many years of use and enjoyment from this important investment.
--
You may republish this article, but must keep the resource box and copyright at the end.
The author, computer journalist John San Filippo, has created the definitive guide for buying a laptop computer. It's an easy read and explains everything you need to know. Check out ==> http://howtobuyalaptop.com/
10 Easy Steps to Speed Up Your Computer - Without Upgrading
1. Empty the Temp directory regularly. After a short while, the temp directory fills up with hundreds of temp files that always get scanned over when Windows starts up and when programs launch. This slows everything down immensely.
Rule of thumb for Temp Files: If you don’t have any programs open (and nothing minimized in the bar below), then you shouldn’t have ANY temp files in your temp directory. If you do, delete them.
To delete Temp files, make sure NO programs are open, and…
a. In Windows 95, 98 or Me, go to C:WindowsTemp and delete everything inside the Temp folder.
b. In Windows 2000 or XP, it is a little trickier. First, make sure that you can see hidden folders. Double-click My Computer. Click on the Tools pull-down menu, and then on Folder Options. Click on the View tab. Scroll down and click on Show Hidden Files and Folders. Click Ok. Now you can go to the C:Documents and SettingsAdministratorLocal SettingsTemp folder. Delete everything here.
2. Empty the Temporary Internet Files regularly. To empty Temporary Internet Files, go to your Control Panel and double-click the Internet Options icon. Choose to Delete Cookies, and to Delete Files. This will clear all of your Temporary Internet Files.
3. Check your hard disks for problems.
a. For Windows 95, 98, or Me, double-click My Computer. Right-click the C-drive and click on Properties. Click on the Tools tab and choose to check the computer for problems. If you choose to do a Thorough Scan, this will do the hardware check for physical disk damage or sector damage. Choose to fix any errors it finds.
b. For Windows 2000 and XP, double-click My Computer. Right-click the C-drive and click Properties. Click on the Tools tab and choose to check the computer for problems. Click on Check Now. You will then have two check boxes. The top option is for the file check, and the second option is for the hardware (physical disk) check. Check either one, or both. At least check the top one. Hit ok, and reboot. This may take some time, but let it run.
4. An even more thorough disk check, would be to use a 3rd party utility. One of my favorites is TuneUp Utilities 2004. It does cost $39.99, but they do offer a FREE download trial of 15 days. This program does a really good job of fixing software and physical hard drive problems. It also tunes up your system for increased speed, and streamlines your operating system for peak performance. Download it HERE... http://www.lapeertechgroup.com/downloads.asp
5. Or, you can do a few of the performance tweaks yourself, if you have Windows XP. By default, EVERYTHING is turned on in Windows XP. It isn’t very streamlined for performance, but rather for appearance. You can turn off a few of the unnecessary features, and Windows will still work just fine, and maybe a little faster.
To do this, right-click on My Computer and click on Properties. Click on the Advanced tab. Under the Performance section, click on the Settings button. On the Visual Effects tab, you will see a list of check boxes. By default, these are all on. You really don’t need any of them for Windows to run. Go through the check boxes one by one, and determine which ones you can and can’t live without.
6. Turn off Active Desktop. Active Desktop turns your desktop into a web page, and allows you to have things like a real-time calendar, and up-to-the-minute weather or stocks. These are nice, but really slow down your computer. And even if you don’t use Active Desktop for anything, just having it active can cause a performance decrease. Turn it off.
a. In Windows 95, 98 and Me, right-click on the desktop and in the pop-up menu, choose Active Desktop. Inside that option, uncheck Active Desktop. If there is no check next to it, then it isn’t on. Don’t choose it. Instead, just click the desktop again to get out of the menu.
b. In Windows 2000, right-click on the desktop and in the pop-up menu, choose Active Desktop. Inside that option, uncheck Show Web Content. Again, if there is no check next to it, then it is not on. Do not check it.
c. In Windows XP, right-click on the desktop and in the pop-up menu, choose Properties. On the Desktop tab, choose Customize Desktop. Now, on the Web tab, make sure that there are no websites chosen here. If there aren’t any, then Active Desktop is not on. Cancel and go back to the desktop.
7. Install and run a good AntiVirus program to keep out viruses that can take over your system. One of my favorites is AVG. It is not only a really good AntiVirus program, but it is also FREE! If you don’t have any AntiVirus software on your computer, get AVG AntiVirus NOW by downloading HERE... http://www.lapeertechgroup.com/downloads.asp
8. Get rid of Spyware. A lot of computer users have Spyware and don’t even know they have it, much less how to get rid of it. If your computer has been taking you to websites that you don’t want to go to, or if you get pop-ups when you aren’t even on the Internet, or if your computer has been running extremely slowly lately, for no reason, you probably have Spyware.
On all of the computers that I setup, I install two different AntiSpyware programs: AdAware SE and SpyBot. These two programs are highly recommended by TechTV (G4) and other computer authorities (including my own research on Spyware) and work very well together. They compliment each other and catch Spyware that the other misses, but together, do a very good job.
Get SpyBot HERE... http://www.lapeertechgroup.com/downloads.asp. Download all updates and run the Immunize option a couple of times.
AdAware SE does a good job when you keep up on the updates and manually scan your system with AdAware. Get it HERE... http://www.lapeertechgroup.com/downloads.asp
In some cases, when the Spyware has become too entwined into your system, even a computer repair technician can’t get rid of the Spyware. At this point, it is better to just backup only what you need and have the operating system reinstalled. Believe me, when your computer gets to this point, you don’t want to just put a “band-aid” on it. Just start from scratch with a clean system. It’s the best way to go.
9. Streamline MSCONFIG. One thing that really causes a HUGE performance decrease is to have unnecessary programs running in the background. Some of these programs can be seen in your System Tray (located next to the clock). These are tiny programs that are robbing you of memory and processing power. Some of them you need, while most you don’t. Some of the programs you DON’T need are printer icons, CD burning icons, shortcuts to programs (such as video settings), AOL, any Instant Messaging Programs, etc. Just because these programs aren’t always running, doesn’t mean that you still can’t print, burn CDs or Instant Message. They can all be run from a shortcut.
You can use a utility, called MSCONFIG, to turn OFF unnecessary Start Up items.
a. In Windows 98, Me, and XP, click on StartRun and type msconfig. Click on the Startup tab. This is a list of everything that is running in the background, some of which show up in the System Tray. Now, be careful, some of these you do need. Some items to keep are Ctfmon.exe (XP), Scan Registry (Win98, Me), Task Monitor (Win98, Me), System Tray (Win98, Me), LoadPowerProfile (Win98, Me), Rundll.32, any AntiVirus programs (such as McAfee, Norton, or AVG). Others, you can uncheck, such as NeroCheck, ypager, qttask, AOL, and any other Instant Messaging programs, or printing programs. Remember, if something doesn’t work, because you turned it off, it can always be turned back on. You just have to reboot every time you make a change here. But, as you uncheck the unnecessary programs that run in the background, you will see that Windows loads much faster, that there are less icons in the System Tray, and that your system is much more “snappy” and quick to respond.
b. In Windows 2000, MSCONFIG wasn’t supplied. You actually have to download and run an MSCONFIG utility. Download the MSCONFIG utility HERE... http://www.perfectdrivers.com/howto/msconfig.html.
After you reboot, you will have a window that says that the configuration utility was edited. Just check not to show that in the future, a check box at the bottom. This just means that there was a change made to the MSCONFIG.
10. Defragment your hard drives. NOTE: to efficiently defragment a hard drive, it likes to have 25% free space. It can still do the defragmentation with only 15% free space, but it takes quite a bit longer. If you can, delete any unnecessary files before deframenting your drives.
a. To defragment your hard drives (in any Windows operating system), double-click on My Computer. Right-click on the c-drive and click on Properties. Click on the Tools tab and choose the bottom button, to Defragment Now…
5 Critical Steps to Protecting Your Computer on the Internet
Spyware, viruses and worms... oh my!
If you are connected to the internet, you need to make sure you get your computer set up properly if you want to avoid problems down the road.
With all the viruses, spyware and other threats on the internet today, no computer should be set up without the proper protection.
And that protection needs to be in place as soon after you hook up your new machine as possible.
The following five steps will make your computer a much harder target for threats. You still won't be completely immune to problems, but 99% of the time the threat will pass you by, looking for the easy mark.
1. Running a Personal Firewall
A personal firewall is software that basically makes your computer invisible to hackers, worms and other threats that can infect your computer over the internet.
Setting up a firewall is the absolute first thing you should do if you're going to connect to the internet. Without a firewall, your computer could get infected in as little as one minute after connecting.
If you have a brand new computer running Windows XP Service Pack 2, there is a firewall built into Windows. It will already have been turned on when you first set up your computer.
If you're running an older version of Windows, even an earlier version of Windows XP, there is no firewall automatically set up for you. In this case there are two possibilities:
- Your computer came pre-loaded with a firewall such as Norton Internet Security or McAfee Internet Security
- You have no firewall installed and should download one ASAP.
If you don't have any personal firewall software installed, you should do so right away. Zone Alarm is a very good firewall program that has a version that you can download and install for free.
You can download the free version of Zone Alarm from http://www.computer-help-squad.com/zonealarm
2. Turn on Windows Updates
Again, if you're running Windows XP Service Pack 2 this is already set up, but otherwise you should turn on Windows Updates. Microsoft releases updates for security problems and other bugs in Windows on a regular basis.
These updates will keep your computer running better, and they often fix security issues that could compromise your information or privacy.
If you are running Windows XP Service Pack 2, you can double-check that automatic updates are turned on by clicking Start, then click Control Panel, then double-click Security Center. The window that opens will tell you if automatic updates are turned on, and lets you turn them on if they're not.
To turn on automatic updates in earlier versions of Windows XP, click on the Start menu, click Control Panel and then double-click on System. On the "Automatic Updates" tab, click the option to "Automatically download the updates and install them on the schedule I specify."
To turn them on in Windows 2000, click on Start, click Control Panel and then double-click on Automatic Updates. Again, click the option to "automatically download the updates and install them on the schedule I specify."
Now when Microsoft releases updates, they will be downloaded for you automatically and Windows will tell you when they are ready to be installed.
3. Install & Update Antivirus Software
Most new computers come with antivirus software these days. You might have Norton, McAfee, PC-Cillin or another brand. No matter what program you have, you will need to update it when you get connected to the internet.
It doesn't matter how new your computer is - there will be new viruses, and new updates for the antivirus software, since it was loaded.
The exact process is different for each brand of antivirus program, but most of them will have an icon in the bottom right corner of your desktop, beside the time. The icon might be a picture of a shield (McAfee), a stethoscope (Norton) or something else.
In most cases, if you point to the icon for your antivirus and click the right mouse button, a menu will pop up with an update option. It could be simply called update or could be something like Live Update or Download Latest Updates. If you click on the update option (with the left button this time) it will install the newest updates for you.
If you're not sure which icon is for your antivirus software, just point to each one for a few seconds and a little title should pop up telling you what it is.
4. Install Anti-Spyware Software
Spyware - and other things known as adware and malware - is becoming as big a problem as viruses. Spyware programs can cause a lot of problems with your computer, not to mention they can track your personal information and you never know where it's being sent.
Some new computers might includes antispyware software, but most of them don't yet. There are quite a few anti-spyware programs available, some free and some not. The one I recommend is from Microsoft and is one of the free ones.
One of the reasons I like it is because it always runs in the background and will automatically catch a lot of spyware before it gets on your computer.
Many of the other programs don't catch it until you run a scan. Not only does this allow things to get on your computer, it also means you have to actually remember to run a scan.
You can download the free Microsoft Antispyware from http://www.computer-help-squad.com/antispyware
5. Set up a Free Email Account
This last item is not as critical as the first four, but I would highly recommend you set up an email account with one of the free services like Hotmail or Gmail.
Once you're on the internet, you'll find a lot of useful information that you want that requires you to provide an email address. In some cases, these people will end up sending you a bunch of spam.
If you use a free email account to sign up for anything that you don't know for sure you can trust, it's not going to fill your main email with a bunch of junk.
This goes for anything really, not just online information. If you're entering a contest or signing up for anything offline and you don't know where your information could end up being used, I would suggest using your free email address.
If worse comes to worse, and your free email address gets inundated with spam, you can always just set up a new one and let the old one expire.
Some of the better free email services are www.hotmail.com, www.gmail.com and www.yahoomail.com.
If you've had your computer for a while and never done any of these things, you should still take these steps to get it set up properly. It will definitely save you a lot of time - and possibly money - as you use your system.
Thursday, September 10, 2009
ipod system di vespa
step 1What I got to Start
I took the IH13 totally apart to extract
speakers
speaker gaskets
speaker grills
5way controller board
5way controller rubber cover
2 controller boards
and the iPod connector
Then I took the Kensington car mount and removed the MP3 player clamp off of the bendable arm by removing one small screw.
step 2Design the power regulator
I had originally wanted to have a lighter adapter for a GPS unit also but decided against it in the end (I am hoping the new iPhone will have GPS ).
Most parts were obtained at Radioshack. The LM350 variable regulator was purchased from www.digikey.com because I needed a regulator that would supply 2A or more.
step 3Design the custom parts
STL files are available here: VespaSpeakerSLT.zip
image not found out:{ top: 0.2028985507246377, left: 0.35, width: 0.236, height: 0.47101449275362317, text:"Kensington iPod clamp" } Kensington iPod clamp iPod connector Dock forthe iPod connector when no iPod is present Left mirror arm |
step 4Mod the left knee pad
Using a dremel tool I cut and sanded a hole only slightly bigger than the cylindrical part of the speaker mount assembly. With a two-part epoxy I then attached the speaker mount. After that firmed up I sanded the cylindrical part flush with the front of the knee pad a filled any cracks with bondo. After sanding the bondo, some primer, black spray paint and a lacquer spray finish I had this to show for myself...
step 5Mod the right knee pad
step 6Extended cables (and another view of both knee pads)
Speaker - I used USB cable - two wires and shield ground
5way controller - I used ribbon cable (you need 6 conductors)
iPod connector - I used a VGA video cable which is shielded and has enough conductors (9) to trasmit the audio, power and control signals.
Below is another view of both knee pads.
step 7Remove the Vespa glovebox
First you need access to the area behind the glove compartment. Other projects have show this before so I will go quickly through it.
1. Carefully pop off the Piaggio emblem off the front of the horn cover (I actually broke mine so I suggest you do it very carefully).
2. Remove the screw holding on the Horn cover and then remove the horn cover.
3. Remove the two screws behind the horn cover. Then open the glove box and remove three screws inside.
4. Now carefully remove the glove box panel. You will have to hold the latch down to get it past the ignition mechanism.
5. Now there is a fuse box that lives in the space behind the left knee pad. I popped that off it's mount and fed it through the opening to free the glove box panel from the rest of the scooter.
step 8Ground and Power
First I screwed the ground wire to the frame of the scooter. It is a bit hard to see but the black wire is screwed in behind that white box.
Then I spliced the power line together with one of the orange wire going to the fusebox mentioned earlier. The 12V lighter kit I got but didn't use had a 10A fuse inline. I would suggest you place a fuse on this line.
step 9Install modified knee pads
step 10Mount the electronics
step 11iPod mount
step 12iPod connector/wire
step 13Wire it all up and test
I realized that I wasn't going to be able to put everything back together because the top corner of the electronics box was going to hit the front panel. So I cut of the corner with my dremel cutter. I also covered over all openings in the box with electrical tape to keep out the dirt and grime that will probably get inside. (Sorry no pictures of the corner cut or the tape).
I also moved the fuse box and inline fuse for my speaker system near the horn so that I could have (relatively) easy access to the fuses if I needed.
image not found 375x500 : F8NR6JDFGTI7AH3 (1) I had to cut this corner off to make it fit back together. |
step 14Reassamble the Vespa... and viola!!!
The funny thing is that to hear it above the engine sound you need to crank it up pretty good. Then when you stop at a red light it sounds extra loud. I thought about adding a circuit to attenuate the volume as the speed decreases... maybe the next project.
Hope you enjoyed this project. Please post replies, I would love to hear your opinions!!!
Avram K
