Powered by Blogger.

My Technology Video

Click the URL to see my video

http://www.facebook.com/photo.php?v=10150866504514792

Enjoy watching

RJ45 Cable

On 28th April 2012 we were giving a cable ,called the RJ45 Cable , we're asked to make Straight-Through/Cross-Over  

straight through cablesStraight-through cables get their name from how they are made. Out of the 8 pins that exist on both ends of an Ethernet cable, each pin connects to the same pin on the opposite side. Review the diagram below for a visual example:

Notice how each wire corresponds to the same pin. This kind of wiring diagram is part of the 568A standard. The 568B standard achieves the same thing, but through different wiring. It is generally accepted to use the 568A standard as pictured, since it allows compatibility with certain telephone hardware- while 568B doesn’t.
Straight-through cables are primarily used for connecting unlike devices. A straight-through cable is typically used in the following situations:
Use a straight-through cable when:
1. Connecting a router to a hub
2. Connecting a computer to a swtich
3. Connecting a LAN port to a switch, hub, or computer

Crossover cables are very similar to straight-through cables, except that they have pairs of wires that crisscross. This allows for two devices to communicate at the same time. Unlike straight-through cables, we use crossover cables to connect like devices. A visual example can be seen below:
Notice how all we did was switch the orange-white and green-white wires, and then the orange and green wires.

 This will enable like devices to communicate. Crossover cables are typically used in the following situations:
crossover cableUse a crossover cable when:
1. Connecting a computer to a router
2. Connecting a computer to a computer
3. Connecting a router to a router
4. Connecting a switch to a switch
5. Connecting a hub to a hub

While the rule of thumb is to use crossover cables with like devices, some devices do not follow standards. Others provide support for both types of cables. However, there is still something that both crossover and straight-through cables can’t do

What would happen when there are no technology in the world




Computers are so securely implemented into our society that it is difficult to imagine a world without them. We are inundated by technology everywhere we go. What would happen if all the technology we count on so much was gone? Chaos.

At least initially, we would experience an episode of pandemonium. Most of the general population uses computers in one form or another dozens of times each day - digital alarm clocks, cars, and ATM machines. Businesses count on computers to run their daily operations - cash registers, book keeping logs, and communications. Hospitals use advanced computers to perform surgery and tests, not to mention the less complex systems used to keep patient's information organized. All of these functions would be in a suspended state of operation.


Computers are so securely implemented into our society that it is difficult to imagine a world without them. We are inundated by technology everywhere we go. What would happen if all the technology we count on so much was gone? Chaos.

At least initially, we would experience an episode of pandemonium. Most of the general population uses computers in one form or another dozens of times each day - digital alarm clocks, cars, and ATM machines. Businesses count on computers to run their daily operations - cash registers, book keeping logs, and communications. Hospitals use advanced computers to perform surgery and tests, not to mention the less complex systems used to keep patient's information organized. All of these functions would be in a suspended state of operation.

Records are deleted. The stock market crashes. Industries fail - banks, retail stores, grocery stores, entertainment, transportation, etc. Modern vehicles stop dead and will not start again. Riots erupt around the world. Hospitals are overwhelmed by patients. An age of darkness ensues.

The most primitive of instincts, survival, takes over. Food, water, and shelter become first priority. Only after these are supplied can we move on to the next step. People feel the need to protect what assets they have retained. It doesn't matter what achievements we had in the past. The past no longer exists: only the present and future are important.

Crime rates increase to colossal proportions. Past records have been deleted from the computers, and the hard life of law enforcement rises to another level of difficulty. They have to rely on knowledge and experience to discern the innocent from the criminal until each department updates their records by hand. Officers roam the cities and countryside looking for trouble-makers. They ride on horseback and use any older vehicles they can find, cars from a time before computers were implemented into the infrastructure.

Manufacture of the old, gas guzzlers is re-initiated at automotive factories. The automotive transportation industry, cars and large trucks alike, is encouraged to come up with fuel efficient and economically safe vehicles, while the industry's research is pushed back decades. They try and eventually come up with a number of ideas that will work decently. Air travelsuffers greatly, causing railroad terminals and ship yards to amass an unanticipated amount of traffic.


is an increase in the number of unorthodox medical centers across the countries. These replace hospitals for illnesses, minor injuries and emergency services. We experience a shortage of qualified medical professionals, but that doesn't stop these centers from giving out advice. The close proximity to towns and cheaper services offer the alternative many need.



Each family is allotted a set amount of cash per person to be able to take out of the banks, attempting to place everyone on even ground. The sudden outpour of cash forces the banks to close their doors. Many businesses fail overnight. Those that do continue are forced to track transactions in log books. The increase in paper usage destroys forests. Yet, store employees gain essential math skills, counting out change to customers and such. A minimum standard unseen for generations is required now. Priorities revert to a time when intelligence rivaled ambition in the business world, making it more difficult to find work for many of the world's youth.

Communication is an important aspect of life. Humans are social creatures; we need the ability to spend time or, at the very least, talk with other people. Landline telephones are the easiest way at the beginning, but it's not long before inventors come up with something similar to cellular phones or long range walkie-talkies. Old forms of entertainment re-emerge. Card and board game tournaments compete for popularity against "Create Your Own" contests, which supply resourceful ideas on how to deal with a problem. Meanwhile, the youth develops their collective imagination to overcome the hardships and exploit what the world has to offer.

This viewpoint may be a bit drastic, but it is worth mentioning. Overall, society as we know it would have a difficult time adjusting to not having the convenience that computers provide; yet, it could and would be done if the situation presented itself. Human beings as a species are adaptive and will evolve as necessary to survive and thrive. Once society has time to acclimate to a situation, the human race would adjust as it has done in the past. At that point, a new era would be set in motion. It would be the intuitive imaginers, the daring developers, the inventors that would push ahead in the world.

How to preventing PC Maintenance


Most people do one of the following when their computer begins to slow down (besides get angry):

1. Speed up their computer by buying more memory.
2. Try to tweak their computer's settings.
3. Give up. They figure that their computer is old, there's nothing

else they can do, and it's probably time to buy a new computer.
All these solutions can help increase PC speed. However, what's to keep your newly blazing PC from slowing down again after a couple months or years? A badly fragmented hard drive will bring even a top-of-the-line new computer to a grinding halt.
One option is to create a preventive PC maintenance plan—a computer maintenance schedule that's easy to set up and put in motion so you never have to think about it again. The plan outlined in this paper uses tools that are built in to your Windows operating system, including Disk Defragmenter, so they can be run free of charge as often as you like.


The following sections provide information on how to automate a maintenance schedule to help keep your PC running smoothly. These procedures differ from version to version, but overall you'll find these tasks work for Windows 7, Windows Vista, and Windows XP.
Create a preventive maintenance plan for your computer
When people notice their computer's performance slowing, the most common reason is the hard disk. Your computer's hard disk is a non-removable area that holds all the information available from your computer. Over time, hard disks begin to lose their ability to store data efficiently.
The Windows operating system provides three great tools to help keep your hard drive humming smoothly. These tools are Disk Cleanup, Disk Defragmenter, and Check Disk. Find more information about using these tools to optimize your PC.Ideally you should clean the hard disk of temporary files, optimize (defragment) the hard disk, and check the hard disk for errors on a weekly basis.
Who has the time (or the desire) to keep up with this schedule? The best solution is to let Windows do all of the work.
Windows allows you to set up and automate these tasks. Please note that the tools may require user input or administrator privileges to run correctly. See specific sections for additional details, and make sure you know your administrator password.
Tip: In Windows 7 and Windows Vista, you can go directly to any of the tools mentioned in this article. Just click the Start button, and, in the Search box, type the name of the tool. When you see the name of the tool populate in the Search list, just click it. This works for the Task Scheduler tool referenced on some of the pages linked to in this article, as well.
________________________________________
Clean up your hard disk
Your computer amasses temporary files over time. These files can come from any number of sources, with the web being one of the largest offenders. After a while, these temporary files will slow down your computer.
About once every week, you should run the Windows Disk Cleanup utility to clear your PC of these temporary files. The Windows Disk Cleanup tool requires user input to complete its designated task. For this reason, it is recommended that, when setting up the utility to run automatically (as described in the next paragraph), you choose a time when you are typically on the computer so you can provide this input. When using the Create Basic Task Wizard, select the Open the Properties dialog for this task when I click Finish check box. This allows you to access additional properties related to the task. On the Settings tab, select the Run task as soon as possible after a scheduled start is missed check box to ensure that the task starts the next time you are logged on to your computer.
Schedule Disk Cleanup to run automatically:


Windows 7


Windows Vista


Windows XP


________________________________________
Optimize your fragmented files
Whenever a file becomes too large to store in a single location on your hard disk, your computer breaks that file into parts (or fragments). Don't worry, though. Your computer keeps track of all these fragments, piecing them together whenever the file is accessed.
However, as fragmented files accumulate on your hard disk, your computer becomes gradually slower. This is because your computer has to go through all these fragmented files to piece the correct parts together again.
Although there's nothing you can do to prevent the fragmentation of files, Windows does have a utility (Disk Defragmenter) to help deal with this situation. Disk Defragmenter rearranges fragmented files, resulting in increased free space on your hard disk and quicker performance from your PC.
About once every week, you should run the Windows Disk Defragmenter utility.
Note: Windows 7 and most versions of Windows Vista are preconfigured to automatically run Disk Defragmenter on a weekly basis. Follow the directions for your operating system to confirm that Disk Defragmenter is already set up or to make changes to the existing schedule.
Set up Disk Defragmenter to run automatically:


Windows 7


Windows Vista


Windows XP


________________________________________
Check your hard disk for errors
Whenever a program you're using crashes, your computer may create errors on your hard disk. These errors will eventually slow your computer to a crawl.
The good news is that Windows includes a Check Disk program. Check Disk corrects these types of errors on your hard disk, resulting in better PC performance.
About once every week, you should run the Check Disk utility. While Check Disk runs, a black window will open. If you happen to be working at your computer when the window opens, you can ignore it. The window will automatically disappear when Check Disk is complete.
Note: You must be logged on as an administrator to perform these steps. If you aren't logged on as an administrator, you can only change settings that apply to your user account.
Set up Check Disk to run automatically:


Windows 7


Windows Vista


Windows XP


Follow the prompts in Task Scheduler to schedule a program to run at a set time (for Windows 7 and Windows Vista only—the directions in Step 1 for Windows XP are all inclusive).
Note: Check Disk isn't available within the scroll-down list of programs that you select from in the Task Scheduler, so you'll need to select it manually. To select it, click Browse. Then, navigate to windows\system32\chkdsk.exe. Select chkdsk.exe, and then click Open.
________________________________________
Schedule tasks
The best way to schedule tasks as described in the previous sections varies depending on how you use your computer. For example, if you shut down your computer every day, schedule the tasks to perform during a time when your computer is typically on. You can do this by editing the Task properties as described in the steps for each utility and operating system. On the Settings tab, select the Run task as soon as possible after a scheduled start is missed check box when creating the new tasks described in this article. This ensures that the task starts the next time you are logged on to your computer, should it happen to be turned off during the scheduled time. If you set your computer to Hibernate or Sleep and want to schedule the tasks to run during that mode (for example, overnight), on the Conditions tab, select the Wake the computer to run this task check box. If you don't set these parameters during the initial setup, you can always go back and access them via the Task Scheduler. Simply locate your task in the Task Scheduler Library, and then double-click it. This opens the Properties dialog box for a given task.


Let Windows do all the work
These automated tasks—while they seem simple enough—are the foundation on which your computer's performance rests. Lucky for us, Windows can completely handle these tasks. You never have to worry about them. You just set up your maintenance tasks once, automate them, and let Windows take care of the rest.

World War Technology


 Cluster bomb

A Butterfly Bomb (or Sprengbombe Dickwandig 2 kg or SD2) was a German 2 kilogram anti-personnel submunition used by the Luftwaffe during the Second World War. It was so named because the thin cylindrical metal outer shell which hinged open when the bomb let deployed gave it the superficial appearance of a large butterfly. The design was very distinctive and easy to recognize.  This bomb type was one of the first cluster bombs ever used in combat and it proved to be a highly effective weapon.


The SD2 submunition was an 8-centimetre (3.1 in) long cylinder of cast iron, which was slightly smaller in diameter before its wings deployed. A steel cable 15 cm long was attached via a spindle to an aluminium fuze screwed into the fuze pocket in the side of the bomblet. The outer shell was hinged and would flip open as two half-cylinders when it was dropped. Additionally, spring-loaded wings at the ends would flip out. The wings at the end were canted at an angle to the airflow, which turned the spindle (connected to the fuze) anti-clockwise as the bomblet fell. After the spindle had revolved approximately 10 times (partially unscrewing itself from the bomb) it released a spring-loaded pin inside the fuze, which fully armed the SD2 bomb. The wings and arming spindle remained attached to the bomb after the fuze had armed itself, as the bomb descended towards the ground. Butterfly bombs contained 225 grams of TNT. They were generally lethal to anyone within a radius of 10 metres (33 ft) and could inflict serious shrapnel injuries (e.g. deep penetrating eye wounds) as far away as 100 metres (330 ft). Butterfly bombs were usually painted dark green. A dull yellow colour scheme was sometimes used, either for use in the Middle East, or when dropped on grain crops at harvest time to kill farm-workers.


Butterfly bombs were first used against Ipswich in 1940, but were also dropped on Grimsby and Cleethorpes in June 1943, amongst various other targets in the UK. They were subsequently used against Allied forces in the Middle East. The British Government deliberately suppressed news of the damage and disruption caused by butterfly bombs in order not to encourage the Germans to keep using them.

On October 28, 1940 some butterfly bombs that had incompletely armed themselves were discovered in Ipswich by British ordnance technicians Sergeant Cann and 2nd Lieutenant Taylor. By screwing the arming rods back into the fuzes (i.e. the unarmed position) the two men were able to recover safe examples to reverse engineer.

The last recorded death from a German butterfly bomb in England took place on November 27, 1956, over 11 years after the Second World War ended: Flight Lieutenant Herbert Denning of the RAF was examining an SD2 at the Upminster bomb cemetery, East of RAF Hornchurch, when it detonated. He died of shrapnel and blast injuries at Oldchurch Hospital the same day.

Deaths have also been recorded on the Island of Malta as late as 1981 when Paul Gauci, a 41-year-old Maltese man, died after welding a butterfly bomb to a metal pipe and using it as a mallet, thinking it was a harmless can. The latest find of such a bomb was on 29 October 2009, by an 11-year-old boy in a secluded valley close to a heavily bombarded airfield. This bomb was safely detonated on-site by the Armed Forces of Malta.

Opening the System unit (Part2)

Now continue in part 2 where we carefully open the system unit

Firstly we open the main cover for the CPU which is from the right side, we used the socket screw driver to open it

 

 This is how it's look like inside the CPU


Then we unscrew the cover at the Driver so it make easy for us to open the front cover of the CPU, by doing this it easy for us to take the Driver ( Hard disk drives , Floopy Disk Drives and also the CD-ROM Driver)









 But we must unplug the green cable first then the drives can be removed





  

Here are the Driver that we Remove from the CPU

<---- CD-ROM Drives
FloopyDisk Drives -->

 
Front view of the Hardisk 
 
Back View of the Hardisk






Next the Heat Sink 


 
 

And this is the RAM (Random Access Memory)







After all the thing is remove the CPU, then we start assembling it back from the start, since all the member in this group lack of troubleshooting experience we got help from other group as well , credit to Akim , Gareth and also A.Pesh for helping us assemble the CPU


Finally the troubleshooting is done


THE
END

Opening the System unit (Part1)



This is the group member (From left to right) Haz , Zatil , Lydia , Tina and myself , Hafiz


On the left is the CPU and the tools bag that is provided by our instructor , and on the right are the tools inside it.
But first we must identify each of the tools  
Here are the tools in the tools bag:-

 There are 2 different type of tweezers 
<------The yellow tweezers (picture on the left)
 the normal tweezer (picture on the right) ---->
  

 The Sets of screwdriver
          

 A Case for screws



Clipper



Long nose pliers


Wrench


Socket driver








After we finish identify all the tools inside the tools bag, we can now open the system unit, that will be continue
.
.
In
.
.
Part
.
.
2

Pages

Blogroll

About Me

My photo
Hye it's me,Hafiz..first of all, my name is Mohammad Hafiz bin Ahmad @ Ya'akub . but you can call me Apiss... or simple as pis. I'm 20 year old and was born on 29th october 1991.
Facebook Twitter RSS