We repair your computer hardware

We programe your software and troubleshoot your PC

Our engineer at work

Troubleshooting section

Our mission is to build an Intelligent machine which can contribute to the development of technology

Friday, January 31, 2020

WHAT ARE THE MAIN CHARACTERISTICS THAT PEOPLE WITH A VERY HIGH IQ HAVE ?


The intellectually gifted (IQ 126+) tend to differ from most in that:

  1. They tend to achieve higher levels of formal education;
  2. They are are more likely to achieve socioeconomic success;
  3. They are more prone to underestimating their own intelligence;
  4. They have better memory but are also more forgetful;
  5. They are likely to experience less age-related cognitive decline;
  6. They tend to be less social and to prefer being alone;
  7. They do tend to being "geeks" and eccentric;
  8. They are not as prone to disliking watching sports people think;
  9. They are more to Atheism/Agnosticism, but most have a religion;
  10. The majority are male, with the ratio of men increasing with IQ;
  11. They are not any more or less insecure than most;
  12. They are not particularly happy or sad;
  13. They tend to live longer;
  14. They are less prone to committing suicide;
  15. They are less likely to get divorced;
  16. They are probably less prone to prejudice and bigotry;
  17. They are more likely have a Facebook account, but use it less;
  18. They are not universally prone to a given political orientation;
  19. Their intelligence is not based on merit;
  20. They are found in quiet environment
  21. They tend to work more hours in their occupations;
  22. They tend to sleep less;
  23. They tend to have a broader range of interests.
Share:

HOW TO TEST NETWORK SPEED BETWEEN TWO COMPUTER


Step 1

Turn on both computers and make sure they are connected to the network. The computers will need to be connected to the network via Ethernet cables or a wireless connection.

Step 2

Use one computer to locate the other computer on the network. This can be done by clicking "Start Menu," then "Network." The second computer will appear in the Network window.

Step 3

Double click the second computer to gain access to its hard drive.

Step 4

Select a large file from the first computer's hard drive. A file over 100 MB should be sufficient. Copy that file by right clicking on it and selecting "Copy."

Step 5

Navigate back to the second computer's networked hard drive. Locate a directory to copy the file to. Right click in that directory and click "Paste." The file will begin transferring between computers.

Monitor the "Copy" status window. It will indicate how fast the file is being transferred, after a couple seconds the file's speed should stabilize. This will indicate the speed between the two computers.


Share:

Thursday, January 30, 2020

HOW DO I KNOW IF I NEED MORE RAM ?

The Performance tab in Windows Task Manager will show you how much of your RAM is actually being used.

Here is an example from my computer, with Outlook open, and several open tabs in Google Chrome:

As you can see, I am currently using less than half of my 16 GB of RAM, so I am in good shape.

On the other hand, here is what I see on a computer with only 4 GB of RAM, with Outlook and Chrome open:

You can immediately see that a very high percentage of the RAM is in use on this computer. That’s a sign that this computer could use more RAM. However, you might now be wondering why one computer is using 6.6 GB of RAM to do pretty much the same thing the other computer is doing, while using only 3.5 GB of RAM. Here’s where things get a bit more complicated.

Windows uses something called Virtual Memory. This is a method where Windows divides up the available RAM among the many processes running in the system. It keeps things in RAM when they are actively being used, and moves things out of RAM and onto the disk when they are not actively being used, in order to free up RAM for other things that are actively being used. The less RAM you have available, the more time Windows spends moving things back and forth from RAM to disk and from disk back to RAM. This is what really slows things down when you don’t have enough RAM. You can see how much of a problem this is by using Resource Monitor:

The column “Hard Faults/sec” under the Memory section of Resource Monitor shows how frequently processes are looking for some data to be in RAM, only to find that the needed data has been moved out of RAM and onto the disk. Every time there is a hard fault, the running process has to stop and wait for Windows to make room in RAM, by moving some other data out of RAM, and then move the needed data back into RAM from the disk, before the process can continue. If you constantly see a high rate of Hard Faults/sec, you can tell for sure that your computer is being slowed down by insufficient RAM.

Share:

Wednesday, January 29, 2020

HOW TO PROTECT YOUR FACEBOOK FROM HACKERS



5 Awesome Tips To Protect Your Facebook Account From Hackers
5 Awesome Tips To Protect Your Facebook Account From Hackers: Everyone uses Facebook in their daily life. Keeping your Facebook account safe is crucial. By keeping up proper security solutions, you can evade malicious people from accessing your Facebook account.

Well, the article might bore you, however, have you ever thought how much information you share on Facebook and how much of it can cause problems if it falls into a wrong hands?
Now, people access Facebook from smartphones, office computers, friend’s tablet etc. and leaving the social networking site open is one of the biggest mistakes that we make. Therefore, in this article, we have decided to list you 5 best tips on how to protect your Facebook account from hackers.

1) Turn on the Alerts

Facebook provides an awesome feature which sends the instant notification whenever your Facebook account is accessed from different devices. The alert will be sent to the registered email address or on your registered contact number. By activating the Facebook notification alerts, you can take necessary steps.
If you want to know how to activate this awesome feature. 

2) Two-Factor Authentication

Two-Factor Authentication is now implemented by many giants on the internet. With Two-Factor Authentication, whenever you or hacker tries to access your account, a code will be sent to the registered smartphone. To unlock the account, you need to have the code.

3) Creating Strong Passwords

First of all, let me tell you Strong Password is different from a lengthy password. Strong passwords put an extra layer of security. Make sure to use different number+alaphabetical combination while setting up a password. For example an easy to hack password looks like helloedexofficial, however, a good strong password looks like hello e-dexofficial! On. Make sure to note the password, if you feel hard to remember

4) Manage What Other See On Your Profile

Previously, we have shared a news which throws lights on how anyone can clone your phone number to hack your Facebook account. Therefore, make sure to think of what you share on social networking site. This will prevent malicious people from accessing important data in your account.

5) Limit App Access

Don’t fall for those free post likes scams. This collects your email address and controls your Facebook account. If you suspect that your account is accessed by others, make sure to visit the activity logs. Make sure to review the list of apps that have access to your account. If you suspect any suspicious app, remove it right now.
These are the five best crucial things that you need to follow if you want to evade hackers. Hope this article helped you, share the article with others also.
Share:

Search This Blog

Powered by Blogger.

Blog Archive

Recent Posts

Unordered List

Pages

Contact Form

Name

Email *

Message *

 

Theme Support