corelptu

30
Vector Graphics typically are generated using drawing or illustration programs (e.g., Adobe Illustrator ) and are composed of mathematically-defined geometric shapes— lines, objects and fills. Since vectors entail both magnitude and direction, vector elements thus are comprised of line segments whose length represents magnitude and whose orientation in space represents direction. Vector graphics usually are easily modified within the creating application and generally are not affected detrimentally by scaling (enlarging or reducing their size). Because vector elements are mathematically-defined, scaling simply requires modification of their mathematical locations. However, vector files do not support photographic 1

Upload: nidhi-sharma

Post on 08-Apr-2018

217 views

Category:

Documents


0 download

TRANSCRIPT

Page 1: corelptu

8/7/2019 corelptu

http://slidepdf.com/reader/full/corelptu 1/30

Vector Graphics typically are generated using drawing or

illustration programs (e.g., Adobe Illustrator ) and are

composed of mathematically-defined geometric shapes—

lines, objects and fills. Since vectors entail both magnitudeand direction, vector elements thus are comprised of line

segments whose length represents magnitude and whose

orientation in space represents direction.

Vector graphics usually are easily modified within the

creating application and generally are not affecteddetrimentally by scaling (enlarging or reducing their size).

Because vector elements are mathematically-defined,

scaling simply requires modification of their mathematical

locations. However, vector files do not support photographic

1

Page 2: corelptu

8/7/2019 corelptu

http://slidepdf.com/reader/full/corelptu 2/30

imagery well and often can be problematic for cross-platform

exchange. Vector graphics typically are saved as EPS

format.

This makes vector graphics ideal for logo design. Creating a

vector logo is more difficult but the effort pays for itself

when the vector logo file is sent to printers or sign makers

etc. The vector logo can be scaled up or down with out

losing quality and would enable smooth transition between

various media.

Raster Graphic Images are produced by digital image

capture devices: digital scanners or digital cameras, or by

pixel editing programs (e.g., Adobe Photoshop). Raster

images are composed of a matrix (grid) or bitmap of digital

picture elements (pixels). Pixels are squares or rectangles

2

Page 3: corelptu

8/7/2019 corelptu

http://slidepdf.com/reader/full/corelptu 3/30

described as black, white, gray or color. Raster images

typically are saved as TIFF format, but can be saved as EPS

as well.

Whereas conversion from vector to raster is easily

accomplished, raster conversion to vector is much more

difficult (and often is not possible). Raster images typically

are easily shared across various platforms, but can be more

difficult than vector graphics to modify. As well, raster

graphics are impacted by scaling.

Creating a raster logo design using Adobe Photoshop

might be ideal for web only usage but if you are serious

about branding, then the resulting raster PSD logo file will be

of limited use. When sent to a printer or sign maker and

when they try to scale the raster logo, the quality

deteriorates and pixellation occurs. Yes, agreed, creating the

raster logo design in Photoshop would enable a designer to

pile on stunning effects (such as drop shadows, beveling,

blurring etc). But the final deliverable will have limited uses.

BMP

The BMP file format (Windows bitmap) handles graphics files within theMicrosoft Windows OS. Typically, BMP files are uncompressed, hence they are

3

Page 4: corelptu

8/7/2019 corelptu

http://slidepdf.com/reader/full/corelptu 4/30

large; the advantage is their simplicity and wide acceptance in Windowsprograms.

PNG

The PNG ( Portable Network Graphics ) file format was created as the free,open-source successor to the GIF. The PNG file format supports truecolor (16million colors) while the GIF supports only 256 colors. The PNG file excels whenthe image has large, uniformly colored areas. The lossless PNG format is bestsuited for editing pictures, and the lossy formats, like JPG, are best for the finaldistribution of photographic images, because JPG files are smaller than PNGfiles. Many older browsers currently do not support the PNG file format, however,with Mozilla Firefox or Internet Explorer 7, all contemporary web browsers nowsupport all common uses of the PNG format, including full 8-bit translucency(Internet Explorer 7 may display odd colors on translucent images ONLY whencombined with IE's opacity filter). The Adam7 -interlacing allows an early preview,

even when only a small percentage of the image data has been transmitted.PNG provides a patent-free replacement for GIF and can also replace manycommon uses of TIFF. Indexed-color, grayscale, and truecolor images aresupported, plus an optional alpha channel.

PNG is designed to work well in online viewing applications, such as the WorldWide Web, so it is fully streamable with a progressive display option. PNG isrobust, providing both full file integrity checking and simple detection of commontransmission errors. Also, PNG can store gamma and chromaticity data for improved color matching on heterogeneous platforms.

Some programs do not handle PNG gamma correctly, which can cause theimages to be saved or displayed darker than they should be. [3]

Animated formats derived from PNG are MNG and APNG . The latter issupported by Firefox and Opera and is backwards compatible with PNG.

TIFF

The TIFF ( Tagged Image File Format ) format is a flexible format that normallysaves 8 bits or 16 bits per color (red, green, blue) for 24-bit and 48-bit totals,

respectively, usually using either the TIFF or TIF filename extension. TIFF'sflexibility can be both an advantage and disadvantage, since a reader that readsevery type of TIFF file does not exist. TIFFs can be lossy and lossless; someoffer relatively good lossless compression for bi-level (black&white) images . Some digital cameras can save in TIFF format, using the LZW compressionalgorithm for lossless storage. TIFF image format is not widely supported by webbrowsers. TIFF remains widely accepted as a photograph file standard in theprinting business. TIFF can handle device-specific color spaces, such as theCMYK defined by a particular set of printing press inks. OCR (Optical Character

4

Page 5: corelptu

8/7/2019 corelptu

http://slidepdf.com/reader/full/corelptu 5/30

Recognition) software packages commonly generate some (oftenmonochromatic ) form of TIFF image for scanned text pages.

JPEG/JFIF

JPEG (Joint Photographic Experts Group) is a compression method; JPEG-compressed images are usually stored in the JFIF (JPEG File InterchangeFormat) file format. JPEG compression is (in most cases) lossy compression . The JPEG/JFIF filename extension in DOS is JPG (other operating systems mayuse JPEG ). Nearly every digital camera can save images in the JPEG/JFIFformat, which supports 8 bits per color (red, green, blue) for a 24-bit total,producing relatively small files. When not too great, the compression does notnoticeably detract from the image's quality, but JPEG files suffer generationaldegradation when repeatedly edited and saved. The JPEG/JFIF format also isused as the image compression algorithm in many Adobe PDF files. JPEG 2000is a new lossless or lossy format.

GIF

GIF ( Graphics Interchange Format ) is limited to an 8-bit palette, or 256 colors.This makes the GIF format suitable for storing graphics with relatively few colorssuch as simple diagrams, shapes, logos and cartoon style images. The GIFformat supports animation and is still widely used to provide image animationeffects. It also uses a lossless compression that is more effective when largeareas have a single color, and ineffective for detailed images or dithered images.

Setting up a graphic page :

To Do the following

Choose a preset page size Click Layout Page setup /Document setup, and

5

Page 6: corelptu

8/7/2019 corelptu

http://slidepdf.com/reader/full/corelptu 6/30

choose a paper type fromthe Paper list box.

Specify a custom page size Click Layout Page setup /Document setup, and

choose Custom from thePaper list box, and typevalues in the Width andHeight boxes.

Set the page orientation Click Layout Page setup /Document setup, andenable the Landscape or the Portrait option.

Set the page orientation for an individual page in amulti-page document Go to the page. Click the

bottom half of the Setdefault or current pagesize and orientation buttonon the property bar, andclick the Landscape or Portrait button.

Drawing basic shapes with CorelDRAW

This tip has been written for CorelDRAW® Graphics Suite X3. While similar featuresmight be available in previous releases the tip will be fully applicable to CorelDRAWGraphics Suite X3 and newer versions only.

6

Page 7: corelptu

8/7/2019 corelptu

http://slidepdf.com/reader/full/corelptu 7/30

With CorelDRAW®, drawing basic shapes — such as rectangles, ellipses, polygons,and stars — is quick and easy. All the tools you need are easily accessible from thefollowing flyouts in the toolbox: the Rectangle flyout, the Ellipse flyout, and the Objectflyout.

Top to bottom: the Rectangle flyout, the Ellipse flyout, and the Object flyout

Drawing rectangles and squares

You can draw a rectangle or a square by dragging diagonally with theRectangle tool or by specifying the width and height with the 3 pointrectangle tool. You'll find the 3 point rectangle tool very useful for creatingrectangles at an angle. Both tools are located on the Rectangle flyout.

• To draw a rectangle, open the Rectangle flyout, click the Rectangle tool ,and drag in the drawing window until the rectangle is the size you want.

• To draw a square, click the Rectangle tool, hold down Ctrl, and drag in thedrawing window until the square is the size you want.

• To draw a rectangle at an angle, click the 3 point rectangle tool . In thedrawing window, point to where you want to start the rectangle, drag to drawthe width, and release the mouse button. Move the pointer to draw the height,and click.

7

Page 8: corelptu

8/7/2019 corelptu

http://slidepdf.com/reader/full/corelptu 8/30

Drawing a rectangle at an angle with the 3 point rectangle tool

• You can draw a rectangle from its center outward by holding down Shift asyou drag with the Rectangle tool.

• You can draw a square from its center outward by holding down Shift + Ctrlas you drag with the Rectangle tool.

• You can draw a rectangle that covers the drawing page by double-clicking theRectangle tool.

Drawing ellipses, circles, arcs, and pie shapes

You can draw an ellipse or a circle by dragging diagonally with the Ellipsetool, or you can draw an ellipse by using the 3 point ellipse tool to specifyits width and height. The 3 point ellipse tool lets you quickly create anellipse at an angle, eliminating the need to rotate the ellipse. Both tools arelocated on the Ellipse flyout.

After you draw an ellipse or a circle, you can easily change it into a pie shape or anarc.

Left to right: a circle, a pie shape, and an arc

• To draw an ellipse, open the Ellipse flyout, click the Ellipse tool ,anddrag where you want to place it. Holding down Ctrl while dragging with theEllipse tool draws a circle, while holding down Shift draws an ellipse from thecenter.

8

Page 9: corelptu

8/7/2019 corelptu

http://slidepdf.com/reader/full/corelptu 9/30

• To change the ellipse into a pie shape or an arc, click the Pie button or theArc button on the property bar.

• To draw an ellipse at an angle, click the 3 point ellipse tool , and drag in thedrawing window to draw the centerline of the ellipse at the angle you want.

Next, move the pointer to define the height of the ellipse, and click.

Note: The centerline runs through the center of the ellipse and determinesits width.

Drawing an ellipse at an angle with the 3 point ellipse tool

Left to right: a circle, a pie shape, and an arc

Drawing polygons and stars

You can draw polygons and two types of stars: perfect stars, which have atraditional star appearance and complex stars, which have intersectingsides. With perfect stars, you can apply a fill to the entire star shape. Withcomplex stars, you can produce unique results when you apply a fill.

9

Page 10: corelptu

8/7/2019 corelptu

http://slidepdf.com/reader/full/corelptu 10/30

Left to right: a polygon, a perfect star, and a complex star, each with a fountain fill applied

The tools you need to create polygons and stars are located on the Object flyout.

• To draw a polygon, open the Object flyout, click the Polygon tool , and dragin the drawing window until the polygon is the size you want. You can draw apolygon from its center by holding down Shift as you drag. Also, you can drawa symmetrical polygon by holding down Ctrl as you drag.

• To draw a perfect star, click the Star tool , and drag in the drawing windowuntil the star is the size you want.

• To draw a complex star, click the Complex star tool , and drag in thedrawing window until the star is the size you want.

1 Open the Perfect Shapes flyout, and click one of the following tools:

· Basic shapesLets you draw a wide variety of shapes, such as triangles, cans,

parallelograms, and smiley faces

· Arrows shapesLets you draw perfect shape arrows

10

Page 11: corelptu

8/7/2019 corelptu

http://slidepdf.com/reader/full/corelptu 11/30

· Flowchart shapesLets you draw flowchart shapes

· Star shapes

Lets you draw a star

· Callout shapesLets you draw predefined callouts

2 Open Perfect Shapes picker on the property bar, and click a shape.3 Drag in the drawing window until the shape is the size you want.

Note

· Perfect Shapes can be modified like any other shapes.

To modify a predefined shape1 Select a shape with a glyph.2 Drag a glyph until the shape is the form you want.

Note

· The right-angle, heart, lightning bolt, explosion, and flowchart shapes do

not have glyphs.

Let us learn to fill color in the object.

1. Open Corel DRAW.2. Draw rectangle. Keep it selected.3. Click on any color from the color palette at right hand side.

4. The object is filled with color.5. If you right click on the some color, outline will be colored with same fill color.6. Now you will see the object with no border as the border is merged with the fill since we have used

same color for both.7. Try different color for fill and outline.8. This is the image with different fill and outline.

11

Page 12: corelptu

8/7/2019 corelptu

http://slidepdf.com/reader/full/corelptu 12/30

Working with text in Corel DRAW is really interesting experience because you can edit the text in so manyways.

1. Open Corel DRAW.2. Select Text Tool. Its 10th from the top in the tool box. The icon is A (Capital A).3. Click the cursor on the page and type the text.4. It may be very small so stretch it by pulling its corner point using Pick Tool.5. Move it anywhere using Pick Tool again.6. Pull other points using pick Tool, to stretch the text horizontally and vertically.

Filling text with color is just a click away.

1. Open Corel DRAW.2. Select Text Tool.3. Click the cursor on the page and type the text. Stretch it to bigger size by pulling corner point. Keep

it selected.4. Click on any color from the color palette at right hand side.5. The text is filled with the selected color.6. If you click on the cross icon in the color palette, there will be no color in the text.

You can apply outline to the text in Corel DRAW. Different types of effects can be created using outline.

1. Open Corel DRAW.2. Select Text Tool.3. Click the cursor on the page and type the text. Stretch it to bigger size by pulling corner point. Keep

it selected.4. Click on any color from the color palette at right hand side.5. The text is filled with the selected color.

12

Page 13: corelptu

8/7/2019 corelptu

http://slidepdf.com/reader/full/corelptu 13/30

6. Now right click on any color in the color palette.7. This will apply the outline to the text of the same color you have right clicked.8. If you Right click on the cross icon in the color palette, there will be no outline to the text.

Realistic fill using texture applies different dimensions to the text. You will use thick font and apply differenttypes of textures. Try to use different colors for outline.

1. Open Corel DRAW.2. Type the text using thick font.3. Select Texture Fill from Fill Tool.4. Try using different type of textures.5. Go for different types from Texture Library.6. Remove the outline or give different colors to outlines and check the difference in the result.

Corel DRAW comes up with the wide range of texture fills useful for backgrounds and may other purposes.

1. Open Corel DRAW.2. Draw rectangle. Keep it selected.3. Click "Texture Fill Dialog" from Fill Tool.4. Select any texture from the texture list.5. Click ok.6. The rectangle will be filled with texture.7. Please do not change any other settings.

13

Page 14: corelptu

8/7/2019 corelptu

http://slidepdf.com/reader/full/corelptu 14/30

This lesson will explain the way combine command handles fountain fill and further it will reveal thedifference between group and combine.

1. We have two identical rectangles ungrouped filled with separate fountain fills.2. Select both of them.3. Go to Arrange > Combine4. Both the rectangles are combined.5. Now please carefully observe the fountain fill.

6. When grouped, the fill are separate with two centers in each rectangle.7. After combine command is applied, both the rectangles are treated as one single object and hence

the two fills are turned into one single fountain fill.8. This fill has one center and both the rectangles are treated as big one single rectangle.9. Go to Arrange > Break Curve Apart10. The object is separated again and we have two different rectangles with two separate radial fills.

Let us start from the last lesson where we practiced group and combine on the identical rectangles. Theyare kept side by side and filled with different colors. Delete any one rectangle. Select the rectangle left onthe page.

1. Click on the fill tool and select Fountain Fill Dialogue.2. Select Radial in Type and Two Color in Color Blend.3. Choose any colors for From and To boxes.

4. Click OK to fill the radial fill in the rectangle.5. Go to Edit > Duplicate6. You get another identical rectangle with redial fill.7. Please try to observe the nature of the radial fill in those two rectangles.8. They have two centers.9. This means both the rectangles have their own identical separate radial fills.10. Keep them side by side, on the same level with a very less space in between.11. Select both of them.12. Go to Arrange > Group13. Both the rectangles are grouped and still filled with the separate radial fills.14. Go to Arrange > Ungroup15. Now the rectangles are ungrouped.16. We will begin the next part from this stage.

14

Page 15: corelptu

8/7/2019 corelptu

http://slidepdf.com/reader/full/corelptu 15/30

Scanning and TracingBelow is a step-by-step for preparing bitmaps for cutting using CorelTRACE. Although this step-

by-step is for CorelDRAW 12, the steps are similar in all versions of Corel, from 7 to 12.1. Open CorelTRACE.2. Choose Acquire Image -> Acquire from the File menu. This will open your scanner program.3. In your scanner program select Black & White and your dpi setting.

Recommended dpi settings300 dpi for excellent quality artwork suck as bromides or laser prints.

200 dpi for average quality artwork.150 dpi for below average quality artwork.100 dpi for poor quality artwork.

Parallel port scanners connect to the computer via the parallel port. They are the cheapest of thescanners. They are however slower than scanners with other types of interfaces. A scanner withparallel port interface communicates at a rate of 1.2Mbps with a PC. The procedure for installing aparallel port scanner is a very simple. But remember that when you install a parallel port scanner,you won't be able to use your printer and your scanner at the same time.

The steps to install a parallel port scanner are as follows:

Step 1Shut down your PC. Place the scanner close to the PC on a flat surface. The cable of the scannermust be able to reach your computer .

Step 2Disconnect the parallel cable of the printer from the parallel port on the back of your PC.

Step 3Attach the parallel cable of the scanner into the port where the printer's cable was attached. The25-pin female end of the parallel cable is connected to the PC and then other end of the cable plugsinto the scanner's port. For using the printer as well as the scanner, connect the printer cable to thescanner and then connect the scanner to the PC.

Step 4Insert the power cord of the scanner into an outlet. Once you plug in the power cord, the scanner

starts by itself. Some scanners will require manual intervention for turning them on. If your scannerhas an on/off switch, switch it on once you plug in the power cord.

Step 5Turn on your PC. The Operating System (OS) installed in your PC will automatically recognize thenew hardware that has been added. If your OS does not recognize the new hardware , Click onStart >> Settings >> Control Panel . Double click on the Add New Hardware option. A newwizard will appear that will guide you through the installation process.

Step 6The installation wizard at some point will ask you to install the driver disk that has all the requiredinformation files. Insert the driver disk at the appropriate time, and then choose the device's .INF(Information) file from the disk to have all the information properly installed. During this processyou may also install TWAIN driver.

Step 7You may also install all other additional software’s that you may have received with your scanner. Itis advisable to calibrate the scanner before you start using it. The color calibration software tries tomaintain the original colors of the image throughout its processing. This means that what you seeon the monitor and what you print out should be reasonably close to the colors of the original.

15

Page 16: corelptu

8/7/2019 corelptu

http://slidepdf.com/reader/full/corelptu 16/30

ScanningOutline:

1. Introduction to scanning2. Scan using Photoshop

3. Steps for scanning4. Saving a scanned image5. Scan using the scanning software6. See the differences in resolution7. Open class to Q & A

In Detail:1. Introduction to scanning

a. Need a scanner and the scanning softwarei. If you do not have the software

1. You can not do a scan2. On the company’s web site you can purchase it or

download it for freeb. With a scanner you can scan

i. Photographsii. Drawings and prints

iii. Illustrationsiv. Publications and documentsv. Anything that can fit in the scan bed

2. Scan using Photoshopa. Photoshop can not do scansb. Instead, you can use Photoshop to initiate an application to do a scan, and

then import the image into Photoshop.c. Steps

i. Place a color photograph on the scan bedii. Open Photoshop

1. On the menu toolbar choose File > Importa. Select the scanning software

iii. The software will open and do a preview scan of the photo3. Steps for scanning

a. Select the area you wish to scani. Click, drag, and make a box around the image

1. Resize or move if necessaryb. Choose output type

i. Go with True color 1. For color photographs

ii. Mention others1. Grayscale

a. Black and White photographs2. Black and White

a. 2 colors, Black and White3. 256 color

a. Graphics like logosc. Select resolution

16

Page 17: corelptu

8/7/2019 corelptu

http://slidepdf.com/reader/full/corelptu 17/30

i. Discuss pixelsii. Cover PPI

1. Pixels Per Inchiii. Cover DPI

1. Dots Per inch

iv. Discuss what is recommended for the web1. 72 ppiv. Discuss what is recommended for printing

1. Minimum 300 dpivi. Go with 300 resolution to show what happens in Photoshop with

an image that has a higher resolution than 72d. Dimensions

i. Cover the possibility of changes output dimensionsii. Do not change the dimensions

e. Place Imagei. For Photoshop choose File > Place Image

1. This will scan the image, put it in Photoshop, and close thescanning software4. Saving a scanned image

a. Never manipulate the image before saving it firsti. You want to keep the original

b. Choose File > Savei. Save it on the desktop as photo_300.tif

1. The .tiff or .tif filea. Very universalb. Not usually compressedc. Keep all colorsd. Keep the claritye. Lossless

c. Show the difference between actual pixels and print sizei. Discuss how this refers back to the resolution

d. Now you can make changes to the image like Unsharp mask 5. Scan using the scanning software

a. Open the softwareb. Choose Scan > Previewc. Follow the same steps for scanning as listed previously

i. Select a resolution of 72ii. Except do not choose File > Place

iii. Instead when all else is complete choose1. File > Save As

a. Save on the dektop as photo_72.tif d. Close the scanning software

6. See the differences in resolutiona. Open Photoshop

i. Open both files1. Examine the image’s

a. Qualityb. Image size

17

Page 18: corelptu

8/7/2019 corelptu

http://slidepdf.com/reader/full/corelptu 18/30

c. File sizeSaving your files:-

Step 1

Open the file you want to change by double-clicking on it.

Step 2

Click on File.

Step 3

Click on Save As.

Step 4

Type a new name for the file, if you want to rename it, in the "File name" box.

Step 5

Hit the arrow next to the "Save as type" box and choose what format you want tosave it in.

Step 6

Choose a location for the new file.

Step 7

Click the Save button.

18

Page 19: corelptu

8/7/2019 corelptu

http://slidepdf.com/reader/full/corelptu 19/30

How to Secure Files on a Computer

Protect and Secure Important data on Windows Computers

Most Windows computers use a file system called NTFS (NT File System) when storingfiles to a hard-drive. This allows information to be protected in ways that many are notfamiliar with. Without any additional software files can have specific permissionsassigned to them to limit access. Documents can also be encrypted to prevent anyone butthe owner from reading them.

Disable Simple File Sharing

The first thing to do is verify that Simple File Sharing is disabled. This can be done fromMy Computer . Using the menu bar, navigate to Tools then Folder Options . On the ViewTab, navigate to the Use simple file sharing option, uncheck it and click OK . It canalways be re-enabled after applying the NTFS settings. Detailed information on disablingthis feature can be found at the Microsoft Support web-site.

Configure Folder & File Security

Disabling Simple File Sharing will enable and give access to the Security Tab Rightclicking on the file or folder and choose properties will reveal the Security Tab and thepermissions assigned to specific users or groups. The Users group is normally givenpermissions by default. This allows anyone with access to the computer to read files. Thiscan be removed or modified if desired.

Basic Security Procedures

In addition to the measures above, it is always a good idea to follow basic securityrecommendations when protecting important documents:

1. Backup files regularly to an external drive2. Use encrypted folders that automatically encrypt files put in them3. Use the My Documents folder which is automatically protected on most

computers4. When not needed, disable any file or folder sharing on a computer

Learning how to configure and use these steps might take a few hours or minutesdepending on computer skills. The peace of mind it gives if files or a computer are lost iswell worth it.

19

Page 20: corelptu

8/7/2019 corelptu

http://slidepdf.com/reader/full/corelptu 20/30

5 Steps to Securing your Data

5 little known steps that you can take to ensure that your data is safe. A hard-drive crashis devastating, and it is something that no one wants to go through. That's why youshould follow each of these steps to help prevent hard drive crashes, and in the case

that one does occur, insure that your data is safe.

1. The “B” Word

One of the most painful things ever is when your hard drive crashes. It puts you into astate of disbelief. What could make this situation even worse? Well, sometimes, its thethought that you never backed up your computer. This is the importance of backing upyour data Regularly. You can backup your datas on CDs, DVDs or a removable HD. Or you could even use online service such as Carbonite or Mozy which back up your datato an online. C’mon, be honest, how many times have you thought of backing up your hard drive but you said something along the lines of “Ill do it tomorrow”. You’re not

alone. Experts advise that you should backup at least once per week. I however wouldbackup twice per week, as well as immediately after I have stored some very importantdata. Backing up doesn’t always mean dumping your whole HD. Some programs allowincremental backups which backup your whole HD the first time then only modified filesafter that. Backing up is extremely important no matter what OS you have (althoughsome OSs reduce the chance of a crash), how fast your computer is or any other stat likethat, because nobody is protected from bad luck.

2. Make sure YOU are the only one using your data

Viruses, Spyware, Adware, Rootkits, Worms, Wabbits, Trojans, Backdoors, Exploits,

keyloggers, dialers, hijackers. What do those 12 terms have in common? They are alltypes of malware. Malware is a short form for “Malicious Software” which is softwaredesigned to harm your computer or steal your data. Here are some tips on how to protectyourself:

Spyware, dialers, backdoors and root kits – Before you can protect yourself you need toknow what these do. Spyware and adware are often bundled together. Spyware does justwhat it says. It spies on you. Dialers dial telephone numbers via your computer's modem.They often dial expensive long distance calls at your expense. Backdoors open up a“backdoor” to your computer allowing other computers to connect with you to distributemalware. Rootkits are designed to camouflage itself in a system's core processes so as to

go undetected. It is the hardest of all malware to detect and therefore to remove. Toprotect yourself from these types of malware, all you need is a good two way firewall .These block all attempts to access your computer unless you specifically allow it. Theyalso block attempts for programs to access the internet unless you allow it. Zone Alarmis an amazing freeware program which does just that. It can be downloaded here .

Trojans, keyloggers, viruses, worms, wabbits and hijackers – Trojans are arguably themost dangerous kind of malware. While Trojans rarely destroy computers or even files,that's only because they have bigger targets: your financial information, your computer'ssystem resources, and other extremely sensitive data. Keyloggers are pretty self evident,

20

Page 21: corelptu

8/7/2019 corelptu

http://slidepdf.com/reader/full/corelptu 21/30

they log your keystrokes. That’s it. Viruses are programs (usually embedded inside other programs or files) that duplicate its self and then spread to other machines via e-mail etc.Worms are a slight variation on a virus. They usually target networks and they are notembedded. Wabbits are very rare. They are a virus except they have no instruction tospread to other machines. Their sole purpose is to utterly devastate a single machine.

Hijackers are in essence, a form of adware. They hijack your searches and displaywebsites of their choice. These things are a little harder to fully prevent. With theprevious category, the malware can be stopped immediately. This category, however, canonly be detected once your computer is infected. A good anti-virus program will be ableto catch these things before they are able to do any significant damage. AVG antivirus isfree and good. You can download it here .

Exploits

Exploits attack specific security vulnerabilities . You know how Microsoft is alwaysannouncing new updates for its operating system? Often enough the updates are really

trying to close the security hole targeted in a newly discovered exploit. To best preventthese, try to download OS updates regularly.

BLABLA

3. Monitor your Hard-drive

This might snot seem so obvious but it is tremendously important. Hard drives spin reallyfast (thousands of RPM) and heat up to around 30-40 degrees Celsius. Because the harddrive is one of the only moving parts in a computer, it is the most delicate. If your computer is not properly ventilated, it can overheat and crash. Extreme heat could even

warp the disc that your data is stored on. That’s why it is always important to monitor your hard-drive’s temperature, as well as health. A couple of good programs are ActiveSMART and HDDLife .

4. Defrag your hard drive regularly.

This is another thing that is not very obvious. Defragging actually speeds up your computer without installing any 3rd party apps. A lot of people know that it works butnot very many people know how it works. Here I will describe the latter. Your disk isdivided into many parts with sizes already predetermined (like 512 bytes). These parts arecalled sectors. When you add files to a new HDD they all go into one sector if possible

and if not they go into sequential sectors. When you edit a file, it will store the newinformation on a different sector, because the previous sector is full. This builds up, andeventually your hard drive must access hundreds of different sectors to load a singleprogram, making read/write arm swing all over the place. This makes the loading processslow. Defragging your hard drive rearranges these files so that all program files are onsequential, if not a single sector, which makes the overall process faster.

21

Page 22: corelptu

8/7/2019 corelptu

http://slidepdf.com/reader/full/corelptu 22/30

5. Encrypt sensitive data

Even if you take all of the security precautions, the only way to fully prevent the risk of malware is to unplug your internet connection. This method is extremely impracticalbecause… well… your not connected to the internet. That is why you should always

encrypt your data. Not only does it save your data from malicious software, but it alsomakes sure that no one can access files on your computer physically, without thepassword. There are a lot of freeware data encryption programs… some of which arevery good. There are programs like AxCrypt or TrueCrypt that will do this for you. If youare really considering this, there are programs that you can buy which are extremelyeffective like Encrypt-Easy which has the capability to encrypt with tons of algorithms.And if you get two encryption programs… you could in theory encrypt the encrypted file!

22

Page 23: corelptu

8/7/2019 corelptu

http://slidepdf.com/reader/full/corelptu 23/30

A user interface is the system by which people ( users ) interact with a machine . The user interface includes hardware (physical) and software (logical) components. User interfacesexist for various systems , and provide a means of:

• Input, allowing the users to manipulate a system, and/or • Output, allowing the system to indicate the effects of the users' manipulation.

Generally, the goal of human-machine interaction engineering is to produce a user interface which makes it easy, efficient, enjoyable to operate a machine in the way whichproduces the desired result. This generally means that the operator needs to provideminimal input to achieve the desired output, and also that the machine minimizesundesired outputs to the human.

Ever since the increased use of personal computers and the relative decline in societal

awareness of heavy machinery , the term user interface has taken on overtones of the(graphical) user interface , while industrial control panel and machinery control designdiscussions more commonly refer to human-machine interfaces .

Other terms for user interface include human-computer interface (HCI) and man-machine interface (MMI).

23

Page 24: corelptu

8/7/2019 corelptu

http://slidepdf.com/reader/full/corelptu 24/30

How do I change my username and/or password?

Below are the steps on how to change your username and/or password in majoroperating systems, online services, and other locations. Keep in mind thatunless you're the administrator or root of the system you, will need to know thepassword of the account before changing it into something else. Click on one of the below links to scroll down automatically to steps on how to change theusername or password

Windows 95, 98, and MEWindows NT and 2000Windows XPLinux / Unix and most variantsBIOS passwordsInternet username and passwordsOnline forums and accounts

Windows 95, 98, and ME

Change password

To change your password or password settings in Windows 95, 98, or ME,follow the below steps.

1. Open Control Panel .2. Double-click the Passwords icon .3. In the Password Properties window, click the Change Windows Password

button .

Note: The Windows password can also be changed through the Users iconin Control Panel.

Change username

You can change the user settings in Windows 95/98 through the Users iconin Control Panel. However, this does not allow you to change the actualusername. If you need to change the username, we suggest you create acopy of your existing username and use the new user name. Below are thesteps to do this.

1. Open Control Panel .2. Double-click the Users icon .3. Highlight the user you wish to make a copy of and click the Make a copy

button.4. Follow the wizard in creating a new user account.

24

Page 25: corelptu

8/7/2019 corelptu

http://slidepdf.com/reader/full/corelptu 25/30

Windows 2000

Change password

Microsoft Windows 2000 users can simply change their username by

pressing CTRL + ALT + DEL while in Windows to open the WindowsSecurity window. From this window click the "Change Password" button .

Enter your old password and the new password you wish to use.

Change username

In order to change the username of an account on Windows XP you willneed to have an account with Administrator rights. If you're logged in asAdministrator or have an account with Administrator rights, follow thebelow steps.

1. Open Control Panel .2. Double-click the Users and Password icon .3. Make sure "Users must enter a user and password to use this computer" is

checked.4. Highlight the account you wish to change the username for and click the

Properties button.5. Within the Properties you'll be able to change the User name.

Windows XP

Change password

1. Open Control Panel .2. Double-click the Users Accounts icon .3. Select the account you wish to change.4. Select the option "Change my name" to change your username or "Create

a password" or "Change my password" to change your password.

Note: Windows XP Home users can only change the Administratorpassword through Safe Mode .

Change username

1. Open Control Panel .2. Double-click the Users Accounts icon .3. Select the account you wish to change.4. Click "Change My Name"5. Enter the new name you wish to use and click the Change Name button.

25

Page 26: corelptu

8/7/2019 corelptu

http://slidepdf.com/reader/full/corelptu 26/30

Linux / Unix and most variants

Change password

Almost all Linux / Unix and variants have access to the passwd command.

Enter this command at the prompt to change your password. You'll needto know the current password before being able to change the passwordto a new password.

See our passwd command page for additional information about thiscommand.

Change username

In order to change the username you will need to have root or super-user access.

To change the username of an account, use the vipw command. See ourvipw command page for additional information about this command.

To change the user settings, use the chfn command. See our chfncommand page for additional information about this command.

BIOS passwords

Change password

The system password (password you see when first turning on thecomputer) as well as the BIOS password (password you see when enteringthe BIOS) are both changed through the BIOS.

Additional information about how to enter the BIOS can be found ondocument CH000192 .

Change username

A computer BIOS does not have a username.

26

Page 27: corelptu

8/7/2019 corelptu

http://slidepdf.com/reader/full/corelptu 27/30

Internet username and passwords

Changing your Internet username or password is really dependent on howyour Internet Service Provider is setup and what their policy is forchanging the username and password. Often, most ISPs will allow you to

change your password whenever you need to; however, they will notallow you to change your account name.

Because every Internet Service Provider (ISP) and webhost is different, wesuggest you contact the company for additional help with changing yourusername or password.

Online forums and accounts

If you have questions about changing your user settings or password onthe Computer Hope forum, please see document CH000636 .

Like the Computer Hope forums, most forums allow a user to change theirpassword only through the profile or account settings. However, mostcompanies will not allow you to change your username; usually, you mustcreate new account to do this. If you need additional service withchanging your username or password on another website, we suggest youcontact the company or webmaster in control of that website.

27

Page 28: corelptu

8/7/2019 corelptu

http://slidepdf.com/reader/full/corelptu 28/30

Username and Password InformationYou need a personal user account to log in to the NIH eRA Commons. This requires a uniqueusername (from 6 to 20 characters) and a password (minimum length of 6 characters). Theusername and password can be any combination of letters and numbers.

If you forget your password, the NIH eRA Commons provides a capability for you to request that

your password be reset. In this case, a new password is generated and sent to you at the emailaddress contained in your user profile.

Note : The password is case-sensitive.

1. Access the NIH eRA Commons Home page as described in Logging In . 2. Click the Forgot Password? hyperlink to open the Reset Password page (FRW0002).3. In the User ID field, type your username and press Tab to move to the Email Address

field.4. Type your email address and press Enter or click Submit . The system returns you to the

Home page and displays a confirmation message indicating that your password has beenreset.

28

Page 29: corelptu

8/7/2019 corelptu

http://slidepdf.com/reader/full/corelptu 29/30

All files and folders in Windows have attribute s. Some of those are being set automatically(either by the operating system or by the program that accesses the specified resource) whileothers are being set by the user.

So what these attributes do? File/folder attributes set the folder accessibility options – for example,specific attributes can determine whether a folder is read-only, hidden or is a system element. Manyof these attributes are already set for the vast majority of folders on your PC, however, you can alsoset those manually, whenever you need to apply those.

In Windows, there are 5 types of file/folder attributes that can be set up. Those are:

• R – Shows whether the file/folder is read-only.• A – Shows whether the file/folder is archive.• S – Shows whether the file/folder is a system element that cannot be modified by other

users.• I – Shows whether the file/folder is not content indexed.• H – Shows whether the file/folder is hidden.

How to share a folder or directory in Windows.

Issue:

How to share a folder or directory in Windows.

Reasoning:

Users may wish to create shares on their computer for any of the belowreasons.

1.Share computer files with other computers.2.Allow for a project to be easily viewed, modified, or otherwisechanged by multiple users.

Answers:

Creating a network share within Windows

Users can easily share any of their directories or drives by following thebelow steps. Note: Microsoft Windows does not allow for a single file tobe shared, it must be the directory or drive that the file is within that isshared.

1. Right-click the directory or drive you wish to share and clickProperties .2. Within the Properties window , click the Sharing tab .3.Select the option to share the folder and specify the name youwish the share to be. This will be the name the user will need totype in conjunction with the computer name to access the share. If

29

Page 30: corelptu

8/7/2019 corelptu

http://slidepdf.com/reader/full/corelptu 30/30

you wish for this share to be accessible to as many users as possible,make sure not to have spaces in the share name.

A program that compresses (ie: shrinks) files down in size so that canbe uploaded, downloaded and E-mail with greater ease.

WinZip is a proprietary file archiver and compressor for MicrosoftWindows, developed by WinZip Computing (formerly Nico MakComputing). It natively uses the PKZIP format but also has variouslevels of support for other archive formats.

WinZip 14.5 (2010) added Microsoft Office 2010-style ribbon interface,support for Windows 7 Libraries, Jump Lists, Multi-Touch Gestures, other interface and functionality improvements