LCD (Liquid Crystal Display) and LED (Light Emitting Diode) Displays are two major display technologies being widely used today. LED Displays are technological advancement of LCD displays. LED displays are the LCD displays with an LED backlight to power up the LCD panel. It means that LEDs are placed behind or around the LCD panel…
How OS is stored on computer
Operating System is a piece of software that controls all your computer resources while the computer is in use. Often people have questions like where the operating system is stored on the computer or how it is being used by CPU? Someone says it is stored in RAM while other says it is on the…
How to create a custom recycle bin
Do you know that you can create a new Recycle Bin which will work similar to the normal recycle bin? This step by step guide will show you how to create another Recycle Bin 1. Create a new folder in C drive of the computer and name it Recycle Bin2 (or whatever you want to). Make…
What is Firewall & How it works
All those who have Windows XP/Vista/7 installed in their machine, would have seen the adjoining icon. This is the icon of FIREWALL. We all listen thisterm quite often, but actually what is Firewall? Is it hardware or software? Do we need it in personal computer/laptop or is it only needed in organizations? Is it different…
How Search Engine spiders works
Search Engines do not directly search the World Wide Web, instead of that they search a database of web pages cached by spiders. Spiders or also known as robots or crawlers are the part of search engine that automatically fetches the web pages from the entire World Wide Web and stores in the database to…
How to lock the folder without any software?
Sometimes when we are working on a shared computer or we have some confidential data that we want to protect it from accessing the other users. A lot of softwares are available for this purpose. But do you know that you can simply create a locked folder in your computer without any software and you…
How Antivirus works
An antivirus is a software that prevents, detects and removes malicious software programs like computer virus, worms, Trojan horses, spywares, etc. that are harmful for the computer systems. Plenty of antiviruses are available in the market which uses different approaches to detect and remove viruses. Broadly these approaches can be distinguished into these two categories…
How Data Compression works
We generally use .rar or .zip files to reduce the size of files and folder with the purpose of data transfer over different networks. These files are compressed files. Data compression is the process of encoding files and data like text, audio, graphics, images, etc. in order to reduce the number of bits to represent…
How Cache Memory works
Cache is term which is common heard today. With exponential advancement in field of faster processors popping up every day, the usage of this terminology has increased rapidly. This has also been the most major parameter in faster processing, but what is cache actually. Is it processing unit or memory? What is L1, L2 and…
How Device Drivers work
When we get a peripheral device such as printer, scanner, keyboard or modem, the device comes together with a driver CD which needs to be installed before the device starts working. As soon we install the driver software into the computer, it detects and identifies the peripheral device and we become able to control the…
How Data is stored on Hard Disk
Hard disk is a common data storage used in computers. Data is stored on the hard disk in the form of 0 and 1. Through this article we will find out how actually data is stored on the hard disk drive. The part of the hard disk that stores the data is known as platter.…
How to create an alarm clock in a computer without any software
We all have been witnessed of disappearing alarm clocks from our study tables. With the advent of cell phones and other modern gadgets we do not need to buy an alarm clock particularly. Almost of cell phones have an alarm clock function in it. But did you ever checked if your computer/laptop also has this…
How to create your own calculator using DOS commands
Batch files are text files that contain a sequence of commands generally used in system command prompt to perform various computer operations like starting programs or running system utilities, etc. In DOS and Windows, batch files are intended to be executed by the command interpreter. There are numerous computer operations that can be performed by…
How to create a computer virus?
You might be scared of viruses in your computer or laptop. They directly affect the working of the computer systems. You may want to create your own virus too. This guide will show you how you can create a simple virus. Open the notepad file and paste the following code: @echo off copy “virus.bat”…
How Mobile boots up
Sometimes with change in times, luxury becomes requirement. And so is the case with mobiles. Today having a mobile phone is no longer a luxury but a necessity. There has been development in the all the sphere of mobile, be it any phase like hardware-camera, processor, memory etc. or software- operating system. But the…
How Computer Virus works
All of us understand the need of having an antivirus installed on our PC, but have you ever given thought about what are viruses? Why are they called virus? Who created the first virus? Who makes virus and why do they make them? Can virus spread by opening a link or reading an email? If…
How Data is Written on CD
CD, Compact Disc, is a quite popular storage media. It is basically an optical disc generally having a capacity of data storage equivalent to 700mb. While CDs are played they rotate around and a laser beam is used to read the data. To store data on a CD, they need to be burned. Through this…
How to Block a website on your computer
Sometimes we do not want the users of a particular computer or network to open a particular website. For example we want our children or our friends to stop accessing a website then we needs to block that website on the computer or network. Although web browsers provide facilities to block a website but they…
How PC Boots Up
Have you ever given it a thought that when you press the power button on your laptop or PC, what happens behind the logo of Windows XP/Vista/Seven or Linux. From the pressing of the power button to the appearance of the login screen there are more than hundred components/peripherals that are initialized and thousand lines…
Difference between Bluetooth and Zigbee Technologies
Bluetooth protocol is not much encouraged for long duration applications due to power consumption limitations. Hence, for small gadgets which run on battery or limited power source, a new wireless data transfer protocol was needed which could manage working with low power consumption. To fulfill these requirements, a protocol named Zigbee was announced just at…