Users can take full screen screenshots by selecting Command + Shift + 3 or capture a selection by selecting Command + Shift + 4. Screenshots are saved to the desktop.
There are multiple methods for taking screenshots on the Microsoft Surface.
- Press the Windows Key + Volume Down Button
- Press the Function Key (FN) + Windows Key + Spacebar
- Double-click the Surface Pen
Person who affects opinions and behavior through social media
How many times a piece of social media content is seen
Message Service.” SMS is used to send text messages to mobile phones. The messages can typically be up to 160 characters in length, though some services use 5-bit mode, which supports 224 characters. SMS was originally created for phones that use GSM (Global System for Mobile) communication, but now all the major cell phone systems support it.
While SMS is most commonly used for text messaging between friends or co-workers, it has several other uses as well. For example, subscription SMS services can transmit weather, news, sports updates, and stock quotes to users’ phones. SMS can also notify employees of sales inquiries, service stops, and other information pertinent to their business. Doctors can receive SMS messages regarding patient emergencies.
Fortunately, text messages sent via SMS do not require the recipient’s phone to be on in order for the message to be successfully transmitted. The SMS service will hold the message until the recipient turns on his or her phone, at which point the message will be be sent to the recipient’s phone. Most cell phone companies allow you to send a certain number of text messages every month for no charge. Though it would be a good idea to find out what that number is before you go text message crazy.
As the name implies, a dialog box serves to initiate a dialog with the user. It is a window that pops up on the screen with options that the user can select. After the selections have been made, the user can typically click “OK” to enter the changes or “Cancel” to discard the selections. It is customary for menu options that include an ellipsis at the end, such as “Preferences…” or “Save As…”, to open a dialog box when selected.
For example, if a user selects “Internet Options…” from the Options menu in Internet Explorer, a dialog box will pop up allowing the user to choose the default home page, change the security settings, empty the browser cache, and modify several other settings. Once the selections have been made, the user can click “OK” to use the new settings, or “Cancel” to discard the changes. Some Windows programs also have an “Apply” option that activates the selections without closing the dialog box.
When a user selects “Open…” from the File menu, an “Open dialog box” appears, allowing the user to browse the hard drive and other disks for files to open. When “Save As…” is chosen from the File menu, a “Close dialog box” pops up, allowing the user to type the name of the file and choose where to save it. While dialog boxes may not seem too exciting, they provide an intuitive way to communicate with the computer and are an essential part of today’s computer interfaces.
A “remote user” is how a woman might refer to her husband while he is watching TV. In the computer world, however, a remote user is someone who works on a computer from a remote location. For example, if Bob leaves work and forgets to bring a file with him from his office computer, he might be able to connect to his work machine from his home computer and grab the file. When Bob accesses his office computer from home, he is considered a remote user.
Of course, Bob does not want anyone to be able to access his computer remotely. So, he would most likely need to enter a username and password in order to connect to his office machine. Programs like Timbuktu and PC Anywhere allow users to not only connect to their computers remotely, but actually display the interface of the remote machine on their local computer. Unix-based systems such as Mac OS X and Linux allow users to control the computers remotely using the text-based “Terminal” interface. Remote connections can be made over a local network, a direct phone connection, or over the Internet. Of course, the slower the connection, the slower the response time will be from the remote computer.
A server is a computer that provides data to other computers. It may serve data to systems on a local area network (LAN) or a wide area network (WAN) over the Internet.
Many types of servers exist, including web servers, mail servers, and file servers. Each type runs software specific to the purpose of the server. For example, a Web server may run Apache HTTP Server or Microsoft IIS, which both provide access to websites over the Internet. A mail server may run a program like Exim or iMail, which provides SMTP services for sending and receiving email. A file server might use Samba or the operating system’s built-in file sharing services to share files over a network.
While server software is specific to the type of server, the hardware is not as important. In fact, a regular desktop computers can be turned into a server by adding the appropriate software. For example, a computer connected to a home network can be designated as a file server, print server, or both.
While any computer can be configured as a server, most large businesses use rack-mountable hardware designed specifically for server functionality. These systems, often 1U in size, take up minimal space and often have useful features such as LED status lights and hot-swappable hard drive bays. Multiple rack-mountable servers can be placed in a single rack and often share the same monitor and input devices. Most servers are accessed remotely using remote access software, so input devices are often not even necessary.
While servers can run on different types of computers, it is important that the hardware is sufficient to support the demands of the server. For instance, a web server that runs lots of web scripts in real-time should have a fast processor and enough RAM to handle the “load” without slowing down. A file server should have one or more fast hard drives or SSDs that can read and write data quickly. Regardless of the type of server, a fast network connection is critical, since all data flows through that connection.
Stands for “Reduced Instruction Set Computing,”and is pronounced “risk.” It is arguably the fastest and most effiecient microprocessor technology available today. The RISC architechture is an improvement upon the CISC (Complex Instruction Set Computing) architecture used in the original Intel Pentium chips. In 1974, John Cocke of IBM Research was working on making a faster version of the CISC chip and came up with a design that significantly reduced the number of instructions need for performing computations. The new design was not only faster than the CISC architecture, but the chips were also smaller and less expensive to manufacture. Motorola’s PowerPC chips (such as the G4 in Power Macs) are the most widely used RISC-based chips. Intel has slowly been integrating RISC technology into its chips, but they still are mostly CISC-based.
Any system or device connected to a network is also called a node. For example, if a network connects a file server, five computers, and two printers, there are eight nodes on the network. Each device on the network has a network address, such as a MAC address, which uniquely identifies each device. This helps keep track of where data is being transferred to and from on the network.
A node can also refer to a leaf, which is a folder or file on your hard disk. In physics, a node, or nodal point, is a point of minimum displacement or where multiple waves converge, creating a net amplitude of zero.