Computer Components

  • home Computer Components
Computer Components April 8, 2025

Windows 3x Operating System

Windows 3x Operating System

When Microsoft first released their Windows operating system, it was named Windows 3.0. Subsequent versions were named after this original version as in Windows 3.1, Windows 3.2, etc. The entire family of the Windows operating system based on that original version is referred to as Windows 3x.

Windows 3.0 was released in 1990 and was hailed as the next big version of the operating system. It would soon take the computer world by storm and be hailed as what every computer user needed to effectively and easily operate a computer system. The Windows 3x family of operating systems would be the basis for many new and exciting developments in the world of operating systems.

With the release of Windows 3.0, virtual memory and loadable virtual device drivers were present in the operating system which allowed the system to share arbitrary devices between multi-tasked DOS Windows. Because of this, Windows applications could then run in 16-bit protected mode and gave them access to several megabytes of memory. It also removed the obligation to participate in the software virtual memory scheme.

The applications still ran inside the same address space where the segmented memory provided a degree of protection and multi-tasked cooperatively. For Windows 3.0, Microsoft also rewrote critical operation from “C” into “assembly” making this release faster and less memory-hungry than its predecessors.

With the introduction of 32-bit Windows for Workgroups 3.11, the family of Windows 3x operating system could finally stop relying on DOS for file management. The most important novelty of this version of Windows was the possibility of running 32-bit multi-threaded preemptively multi-tasked graphical program. However, the necessity of keeping compatibility with 16-bit programs meant the GUI components were still 16-bit only and not fully re-entrant which resulted in reduced performance and stability.

Nevertheless, the Windows 3x family of operating systems was still one of the most innovative designs for an operating system seen to date. Even though in 1990, operating system technology was still evolving, Windows 3x operating systems were technologically advanced way over their competition.

This version of Windows would introduce the graphical user interface making it easier for anyone to operate a computer system. Point and click technology would soon become the norm, but it all started with the Windows 3x operating system. The computer world, at the time, hadn’t seen anything like Windows 3x, but they would sure see more with the advent of technology.

Operating systems have evolved over the years, but the Windows 3x family of operating systems set the groundwork for the operating systems we know today. Constant updating and improving gave us the capability to use our computers in new and exciting ways. And it all started in 1990.

Computer Components April 2, 2025

Musical Instrument Digital Interface – The MIDI Trinity

Musical Instrument Digital Interface – The MIDI Trinity

Officially, MIDI stands for Musical Instrument Digital Interface, and it was invented in 1982. These days, it refers to three components:

1. A physical connector – between electronic instruments and between electronic instruments and a MIDI controller, usually a keyboard. The connector takes the form of MIDI IN and MIDI OUT jacks form which MIDI cables can bet plugged into any electronic instruments (and you’d be surprised at how much music hardware out there today is MIDI-capable – almost every detachable keyboard is!)

2. A message format – this message format is the heart of MIDI. This format is made up not of the sounds themselves, but simply the commands that are issued by the MIDI keyboard to the electronic instruments telling them how to play a given song (“play the violin” “turn down the volume to XX”, “adjust the pitch to YY”, etc.)

With the above two components, a musician was able to control a string of musical instruments from a single keyboard, giving him a “one-man band” effect.

3. A storage format – in other words, MIDI files. This latecomer of the MIDI trinity was what really did the trick because it allowed musicians to record their creations and tweak them on many different parameters until they got it sounding just they way they wanted it. Without this, MIDI songs could not be played back, because since MIDI commands include only the instructions to the instrument on how to play the song and not the actual music itself, they cannot be recorded in audio format. Now MIDI files can be recorded, emailed, or even downloaded from the Internet.

A MIDI studio can now be produced in two ways – via hardware or software. The hardware version involves connecting a keyboard (using MIDI cables) to the MIDI jack of an electronic instrument and then stringing together up to 16 of these instruments in a “daisy chain” by way of their MIDI IN and MIDI OUT jacks. The software version keeps the MIDI keyboard (or other MIDI controller such as a MIDI guitar, etc.), while the instruments appear in virtual form on a computer screen (various software programs such as Reason, Logic, and Cubase can do this).

Computer Components March 27, 2025

eTrust Internet Security Suite: Do Not Take Protection for Granted

eTrust Internet Security Suite: Do Not Take Protection for Granted

Internet is the “network of all networks”. It is composed of millions of smaller networks (business, academic, domestic, and government) which carry different information and online-based services, such as online chatting, file transfer, electronic mail services, and interlinked web pages as well as other documents stored in the World Wide Web. With such an enormous interconnection of various networks, transfer and acquisition of information is now fast, efficient, and reliable. Who would ever think that the Internet will be as powerful as it is nowadays?

Aside from fast and efficient transfer of information and other useful data, the Internet is now the biggest job, business, and product marketplace around the world. Whether you are looking for a new job, searching for a new business opportunity to start with, or want to sell or purchase different lines of products, the Internet is the best place to start with. Through various innovations integrated in the information superhighway, Internet became one of the fastest solutions in terms of livelihood and other means of generating revenues for individuals of different interests.

However, there are things that we neglect sometimes, which are superimposed by the benefits offered by the Internet. One of which is the online threats, composed of so-called “cyber criminals”, creating chaos to the Internet public by means of developing virus programs and other elements that may harm an Internet user’s computer system. At first glance, you will think that it is just a simple yet attractive banner ad that pops-up in your computer screen, yet you will realize later on that you are already dealing with a virus program, destroying the internal memory and other components of your computer system.

The increase of online threats is very alarming. Most research shows that there are 3 out of 10 Internet users who are plagued by online threats of varying degrees. Because of lack of necessary security, they have a hard time dealing with these problems, thus losing their computer system within a few days. So sad, but it is the reality that we need to accept.

To avoid getting into such situation, it is strongly recommended that you install a security software into your computer system, especially if it is connected to the Internet. There are hundreds of software developers who created programs that will help you thwart these online threats out of your way. One of which is the CA’s eTrust Internet Security Suite.

Created by the Computer Associates, eTrust Internet Security Suite provides extensive protection against different kinds of online threats—viruses, identity thieves, spyware, malware, and hackers that can jeopardize your privacy in surfing the Internet, data storage, and the performance of your computer system. In fact, the security suite is a combination of easy to use, business-strength technology with automatic updates and pre-configured settings that will work out for the security of your computer system.

eTrust Internet Security Suite has the following main features:

• It eliminates the presence of any type of viruses, worms, and Trojan horse programs.
• It targets the spyware before it can bring adverse effects to your computer system.
• It blocks unwanted spam.
• It stops intruders from penetrating your computer system, thus eliminating the risk of your personal information and other useful data be accessed by unauthorized individuals.
• It keeps websites out, especially pornographic sites, which is believed to carry viruses and other online threats.

Do not take protection for granted. Avoid getting caught in the line of fire because of these online threats. Get the eTrust Internet Security Suite and protect your computer system as well as yourself.