Sunday, March 27, 2011

Inkjet Cartridges and Printers - An Insight Into How They Work

By [http://ezinearticles.com/?expert=Alexia_Fountain]Alexia Fountain

Siemens produced the first inkjet printing device back in the 1950's but it wasn't until developments in mass production in the 1980's that they started to become readily available and financially viable for the home market. Since then they have become one of the most popular and affordable types of printer, finding a place in almost every home and office but have you ever wondered how they actually work?

Inkjet printers fall under the category of non impact printers, since they work by spraying ink directly onto the paper unlike dot matrix printers which use a series of small pins to strike an ink loaded ribbon, somewhat similar in principle to a typewriter but rather than having formed letters, the pin creates a series of dots in sequence on the paper to make up the required character.

Essentially inkjets have a series of nozzles arranged on the print head through which precisely timed ink droplets are fired. There are two main methods utilised by inkjet printer manufacturers to transfer the ink onto the paper, one that makes use of heat and the other vibration.

In the thermal bubble or bubblejet printer, resistors create just enough heat when an electrical current is applied to create a vapour bubble within the ink. This bubble expands pushing a small amount of ink out through the nozzle. Eventually the bubble 'pops' and the resulting vacuum draws ink back in from the cartridge or ink reservoir. This is generally a less wasteful method of printing since unused droplets of ink are automatically returned back to the ink tank.

The second method, which was patented by Epson, is Piezoelectric. This is so-called because it makes use of Piezo crystals. When a small electric current is passed into the crystal, the crystal starts to vibrate. As it vibrates inwards it pushes a small amount of ink out through the nozzle and when the current is stopped, the crystal vibrates back to a calm state it pulling ink back in from the ink tank. This method allows for a greater degree of fine tuning as variable sized droplets can be created, producing more detailed prints.

Both methods allow inkjets to simultaneously spray between 300 and 500 ink droplets that are smaller in diameter than a human hair onto the paper. The downside to all these tiny nozzles is that they can be prone to clogging with dried ink - especially if the printer is not used very often. Therefore most inkjets will have either a manual or automatic cleaning cycle, but this uses up precious ink in the process. Cleaning cartridges are an alternative, they filled with cleaning fluid and it is usual to have one to replace each colour cartridge in the way you would normally replace an empty cartridge. It is considered best practice by some to regularly use these cartridges to maintain the printing quality of their inkjet printer.

The further obvious benefits of inkjets compared with Laser or thermal wax printers is that they require no warming up period, are relatively quiet and compact and cheaper to purchase in the first place but costly replacement cartridges result in a higher cost per page. Inkjet printers for this reason are ideal for low volume printing, making them perfect for home or small office.

About the Author

Alexia Fountain works for http://www.selectafont.co.uk an online retailer specialising in the [http://www.compatible-inkjet-cartridges.co.uk/inkjet-catridges_3259.htm]best value inkjet cartridges and toners. With a 10% discount for returning customers and a comprehensive range of cartridges to suit most printers.

Article Source: [http://EzineArticles.com/?Inkjet-Cartridges-and-Printers---An-Insight-Into-How-They-Work&id=6081058] Inkjet Cartridges and Printers - An Insight Into How They Work

Review of Google Docs

Review of Google Docs
By [http://ezinearticles.com/?expert=D_K_Gupta]D K Gupta

Being a SEO content writer and Technical writer, I often need to create and share documents with my clients. And in this Google Docs has helped me a lot. It is an outstanding collaborative package to produce and share word documents, spreadsheets, and PowerPoint presentations online. Here, in this article, I am going to give a review of Google Docs in which I list the advantages and disadvantages of Google Docs.

Advantages


Absolutely free source for developing word documents, spreadsheets, and PowerPoint presentations.
I often need to write SEO articles for my clients and same need to be shared with them. Google Docs has provided me the platform where I can work online and share the same with my clients in real time i.e. while I am working on a document; my client can view the same and guide me at any point if I am not doing as per his guidelines.
I often need to work from multiple places and obviously I cannot carry my documents all the time with me wherever I am going. But, now I can anytime create or edit an existing document from anywhere and anytime I want. I just need an Internet connection for this.
It is a good source of online backup for me. When I created an account to use Google Docs, I have been provided free space of 1024 MB to store my documents, which is a great storage limit for me. My documents on the server of Google are safer than at my computer's hard disk drive.
I can access my client details, payment details, and work status from anywhere and anytime I need it.
Google Docs has provided me the security to keep my documents private to me. However, it also provides the facility to share documents with specific users or with anyone on the Internet. Using the security features of Google Docs is all up to me.


Disadvantages


Features are quite less in comparison to the Microsoft Office Package. Whether I use Google Word, Google Excel, or Google PowerPoint, I need to compromise with the features in Google Docs.
Speed of your work completely depends on the Internet connection. If you are running on the slow Internet connection then Google Docs may not be a good application for you.


Disadvantages of this package from Google are quite less in comparison to its advantages. And in fact, we should not look after its disadvantages because it is a freeware for which we are not been charged, not even a single penny. For me, Google Docs is an absolute collaborative cloud computing environment where I can create and share document with anyone I want.

About Author

Hello, Deepak Gupta is a Technical Writer and SEO content writer since, Jul 9, 2007. Being a technical writer, my work profile is to prepare software user guides, installation guides, writing SEO friendly articles, writing blog posts, writing concise and effective software overview to put on software Website, etc.

Apart from the work, I also have fond of writing article on topics I have knowledge about. I also deal in FREE LANCING so if you like me to write for you, email me at  [mailto:guptadeepak2353@gmail.com]guptadeepak2353@gmail.com

Topics of my interest are SEO, website content, health & fitness, diseases, software, internet, social networking, and so on.

Pls, Visit my Blog http://myhealthsol.blogspot.com/

Article Source: [http://EzineArticles.com/?Review-of-Google-Docs&id=6104742] Review of Google Docs

Security Benefits of Penetration Testing

By [http://ezinearticles.com/?expert=Ernest_K._Jones]Ernest K. Jones

Regular assessments by security experts of your company's network, applications, and infrastructure will ensure your businesses data security is always at the top of its game. This regular assessment, including penetration testing, is recommended by IT security specialists because it can help ensure that the insecurities that allow internal or external hackers access are not available for them to do their dirty work.

A reliable and knowledgeable IT security company can perform efficient penetration testing and allow you to be back up and running in no time, therefore minimizing the disruption to your business. Penetration testing involves simulating an actual malicious attack on your computer network or infrastructure, but is a completely harmless approach that preserves the integrity of your important data and information. Penetration testing looks for any and all vulnerabilities that have arose or might rise because of poor system configuration, any errors in your software or hardware, and weaknesses in the processes and operations.

The occurrence of a dangerous attack is dramatically reduced when you've allowed penetration testing to determine your risks. This security measure is highly recommended by all IT specialists, as they understand no business wants to jeopardise their precious and highly sensitive data.

Complete and thorough documentation will accompanying all penetration testing results. In this report, clients will receive clear and concise instructions on how to handle the deficiencies that were identified by the security specialists. The security specialists will also offer to implement these changes, as the are already familiar with the system and the inadequacies.

Smart business owners know, because they heard it from other successful people, that the easiest way to prevent malicious attacks to your network, your applications, and your infrastructure is with a regular security assessment done by a professional IT security firm. This assessment, including internet security, determines the security of your invaluable data and company information.

Penetration testing is the service done by professionals who carefully simulate a malicious attack on your system in order to determine any weaknesses vulnerabilities that would be used by hackers to debilitate or destroy your system. These people could be former employees with a grudge, the common criminal who has nothing better to do that destroy other people's company's, or even a former client who was dissatisfied with your company in some way.

Once the weaknesses are detected, the security experts will offer you recommendations on what you can do to improve your network, applications, and infrastructure to achieve the most secure system possible. These quality and knowledgeable specialists always ensure the reports are written in a clear and concise manner that allows a person without an IT background to comprehend.

Internet security specialists do assessments by implementing both manual and automated approaches that help them to determine the safety of your company's data. By knowing how important and valuable your time is, penetration testing specialists work as efficiently to guarantee the shortest period of disruption to your regular business dealings. When the treats are identified, they also implement changes as quickly as possible to ensure no potential or further harm is done.

For [http://www.purehacking.com/]penetration testing then this is a safe method of testing how secure a firewall and network security is. So testing your [http://www.purehacking.com/products-service/web-application-security-architecture]web application security is vital in any situation.

Article Source: [http://EzineArticles.com/?Security-Benefits-of-Penetration-Testing&id=6084002] Security Benefits of Penetration Testing

Pros and Cons of Computer Technology in the Classroom


The world is constantly changing and ways in which we function at home, work and school are also changing. The speed at which technology has developed plays a major role in these changes. From e-mail to on-line classes, computers are definitely influential in our lives, and can enhance the learning process in schools in various ways. With the increasing popularity of computer technology, it is essential for administrators to support and encourage computer technology in our education systems.
Computers are important in education because they force us to reconsider how people learn, how they are empowered, and what the nature of learning and useful information is. We cannot avoid the presence of computers in our schools because they are forcing educators to re-evaluate the very nature of what and how we teach. In 1998, the Office of Technology Assessment reported there were approximately 5.8 million computers in schools across United State’s or approximately one machine for every nine students (Provenzo, Brett, & McCloskey, 1999).
An advantage of having computer-assisted instruction in the classroom is that the computer can serve as a tutor. Teachers can only aid students in the learning process so far. Computers can assist teachers and act as a tutor for the students who are falling behind. A report entitled Computer Advantages: Tutoring Individuals, states “with computers as tutors, no student will be overwhelmed because he or she is missing fundamentals the computer will repeat material until each lesson has been sufficiently mastered” (Bennett, 1999, p. 3). Teachers do not have the time to repeat lessons over and over again. The writer believes it is important to give all students in the classroom the opportunity to adequately learn the lessons, and with computers acting as tutors they can.
 
Оne of the biggest problems in the world today is illiteracy. Each year thousands of students graduate from high school reading at the elementary school level, or not reading at all. Every student should have the opportunity to receive additional assistance when they need it. Teachers are doing the best they can with literacy issues in the classroom, and computers can reach the students that the teachers cannot. The article entitled “Computers as Tutors” discusses Annaben Thomas (Bennett, 1999) who was unable to read despite her years in the New York City school system. After leaving school, she was taught by tutors and had enrolled in library literacy programs and adult education classes trying to overcome her handicap. After doing everything she still had not learned to read, until she enrolled in a computer course program that taught her to read and write. Because of success stories like this it is crucial to support the use of computer technology in the classroom.

Use of Computer Technology to Help Students with Special Needs

Millions of students across the United States cannot benefit fully from a traditional
educational program because they have a disability that impairs their ability to partic-
ipate in a typical classroom environment. For these students, computer-based tech-
nologies can play an especially important role. Not only can computer technology
facilitate a broader range of educational activities to meet a variety of needs for stu-
dents with mild learning disorders, but adaptive technology now exists than can
enable even those students with severe disabilities to become active learners in the
classroom alongside their peers who do not have disabilities.
This article provides an overview of the role computer technology can play in pro-
moting the education of children with special needs within the regular classroom. For
example, use of computer technology for word processing, communication, research,
and multimedia projects can help the three million students with specific learning and
emotional disorders keep up with their nondisabled peers. Computer technology has
also enhanced the development of sophisticated devices that can assist the two million
students with more severe disabilities in overcoming a wide range of limitations that
hinder classroom participation––from speech and hearing impairments to blindness
and severe physical disabilities. However, many teachers are not adequately trained on
how to use technology effectively in their classrooms, and the cost of the technology is
a serious consideration for all schools. Thus, although computer technology has the
potential to act as an equalizer by freeing many students from their disabilities, the
barriers of inadequate training and cost must first be overcome before more wide-
spread use can become a reality.
T
oday’s children are the first generation of the “digital age.” They are
being raised in a society that is changing rapidly as a result of the
influx of new computer-based technologies that provide more per-
vasive and faster worldwide links to commerce, communication, and cul-
ture. The dramatic changes over the past decade have prompted the
The Future of Children CHILDREN AND COMPUTER TECHNOLOGY Vol. 10 • No. 2 – Fall/Winter 2000
103
http://www.futureofchildren.org
Presidential Committee of Advisors on Science and Technology,1 the U.S.
Office of Technology Assessment,2 and high-level government officials3 to
state that it is incumbent upon the public school system to prepare all stu-
dents to use technology in ways that will allow them to compete in the increas-
ingly complex technological workplace. Many people applaud the
integration of computer-based technologies into the classroom for typically
functioning students. Fewer individuals recognize the great number of ben-
efits that computer-based technologies may afford children with disabilities.
This article focuses on the role that computer technology can play in
promoting the education of children with special needs within the class-
room. It begins with an overview of children’s different types of disabilities
and special needs, and an introductory discussion of how technology can
help meet those needs. Several more detailed sections follow, describing
how particular computer applications and devices make it possible for stu-
dents with disabilities to be educated in a regular classroom alongside their
nondisabled peers. The final section provides a discussion of the barriers to
more widespread use of the promising technologies––barriers that must be
overcome if schools are to provide greater opportunities for students with
disabilities to learn more effectively in regular classroom settings.
Children with Special
Needs—Who Are They?
Over the past 20 years, the number of stu-
dents with disabilities has been steadily
increasing at a faster rate than both the gen-
eral population and school enrollment.4
Today, approximately one of six students in
schools across the United States cannot ben-
efit fully from a traditional educational pro-
gram because they have a disability that
impairs their ability to participate in class-
room activities.5 Federal law defines students
with special needs as those who, because of a
disability, require special education and
related services to achieve their fullest poten-
tial.6 According to the most recent govern-
ment statistics, more than 5 million students
ages 6 to 17 were receiving special education
services during the 1997–98 school year.7 As
shown in Figure 1, students’ disabilities
ranged from speech and language impair-
ments to mental retardation, and more than
half were described as having a specific
learning disability due to a psychological
disorder.8
Children with disabilities vary with
respect to the type and number of dis-
abilities they have, and their disabilities
vary in cause, degree, and the effect
they have on the child’s educational
progress. Although children with dis-
abilities are a very diverse group, data
describing the demographic characteris-
tics of students with disabilities suggest
the following:
More than half of all students receiving
special services are males.
Most are in elementary or middle school.
Most have no obvious disability; they have
problems that are primarily academic, emo-
tional, social, or behavioral.

Morality, Technology, and Values


 
Abdul Mateen Khan Mohammed


The advent of computer technology has opened a new chapter in technological advances, all to make our lives easier so that we all can live good lives. Technology is not value. Its value depends on how we use it. Technological processes have three components: inputs, an engine, and outputs. What we call good and bad technologies are scaled on our value system (moral values).If the outputs of the processes have relevancy and contribute to the knowledge base that we routinely use to create other utilities that ease our lives, the new technology has value. Otherwise, it is not a good technology. However we have also seen a myriad of technologies that come nowhere near our value systems. These we call bad technologies. So all judgments of technology are based on a set of value standards, our moral values.

The process of decision making is complex: It resembles a mathematical mapping of input parameters into output decisions. The mapping uses these values along with the input parameters to create an output a “logical” decision. Dilemmas in decision making are caused by one questioning the values attached to one’s premises (input parameters) as inputs to the decision being made. One’s scaling of values to the inputs may be influenced by a number of factors such as advances in technology and incomplete or misleading information. Dilemmas are usually caused by advances in technology. Computer technology in particular has created more muddles in the decision-making process than in any other technology because of Incomplete or Misleading Information
There are situations in professional life when a decision has to be made quickly and not enough information is available. In such a situation, the professional must take extra care to weigh all possibilities in the input set of premises with their corresponding values.

Technology has placed at our disposal a multitude of possibilities, many of which we never had before, that are shrouding our daily value-based decision making in confusion and doubts. An appropriate response to this confusion of reasoning is multifaceted and may include the following solutions. Formulate new laws to strengthen our basic set of values, which are being rendered irrelevant by technology.
Construct a new moral and ethical conceptual framework in which the new laws can be applied successfully. Launch a massive education campaign to make society aware of the changing environment and the impact such an environment is having on our basic values. Nations and communities must have a regulated technology policy. Technology without a policy is dangerous technology.

Making good use of technology depends on the following parameters.
(a)Strengthening the Legal System
(b)A New Conceptual Moral Framework
(c) Moral and Ethics Education


Strengthening the Legal System
Many laws on the books are in serious need of review and revision. Lawyers and judges seriously need retraining to cope with the new realities of information technology and its rapidly changing landscape. A thorough review of current law is needed to update the relevant laws and to draw up new ones to meet current needs.

A New Conceptual Moral Framework
New technologies in communication have resulted in demographical tidal waves for the global societies. The movement of people and goods between nations and societies and the internet are slowly creating a new global society with serious social and moral characteristics. With this new society, however, no corresponding moral and ethical framework has been created. This has resulted in a rise of crime in the new non monolithic societies. However, they also realize that morality is note easily definable. As societies become diverse, the need for a common moral framework as a standard for preserving decency and effectively reversing the trend of skyrocketing moral decadence and combating crimes becomes most urgent.

Moral and Ethics Education
It is not easy to teach morality. Character education in public schools has raised many controversies between Civil libertarians and the religious right.

The Formal Education of ethics should start in elementary schools. As students are introduced to information technology in elementary schools, they should be told not to use machine to destroy other people’s property or to hurt others. There are already reported cases of children as young as 14 years old breaking into computers systems and destroying records. As students go through high school, content should become progressively more sophisticated. The message on the responsible use of computers should be stressed more. The teaching should focus on ethics; students should be given reasons why they should not create and distribute viruses, download copyrighted materials off the Internet, or use the Internet to send bad messages to others. In college, of course, the message should be more direct. Students take formal courses in professional ethics in a number of professional programs. Once students join the workplace environment, they should be required to attend informal refresher courses, upgrading sessions, seminars, in-service courses or short workshops periodically.

Advocacy is intended to make people part of message. The purpose of advocacy is to organize, build, and train so there is a permanent and vibrant structure people can be a part of. The expansion and growth of cyberspace has made fertile ground for advocacy groups, because now they can reach virtually every society around the globe. Advocacy groups rally their troops around issues of concern like individual privacy and security, better encryption standards, and the blocking of pornographic materials.
Renowned advocacy groups for moral issues include:
The Family Research Council (FRC) works to promote and defend common morality through traditional family values in all media outlets.
Enough Is Enough (EE) is dedicated to preserving common morality in cyberspace through fighting pornography on the Internet.
The Christian Coalition (CC) represents some Christian churches in the United States. It works on legislative issues and on strengthening families and family values.





My Questions:

Q1. Making good use of technology depends:
(a)Strengthening the Legal System
(b)A New Conceptual Moral Framework
(c) Moral and Ethics Education
(d) All the above

Ans. d

Q2. Discuss briefly about Technological process mentioned by author.
Ans. Technological processes have three components:
  • Inputs
  • Engine
  • Outputs

Does Computer Technology Support and Enhance Language Arts? The Teachers’ Perspective


The purpose of our research is to determine whether or not the integration of technology in the classroom has been a success for both teachers and students. Our results were based on surveys conducted with teachers amongst grade levels K-8. The purpose of the research was to determine if technology was available and whether or not teachers access it. The result of this research shows that technology does in fact encourage students to read and improves reading comprehension and language arts skills. However this technology does not drive instruction or help with language arts direction. 

Statement of Problem


What is the relationship between the teachers’ use of computer technology and student achievement in language arts when computers are used as an instructional support in grades kindergarten through eight?

Literature Review


Computer technology programs can enhance comprehension, vocabulary acquisition, and a motivation for learning. According to J.D. Jones et. Al. (2005), Sat 9 scores in middle school students increased due to using the Merit group and Merit sessions when used for 45 minute increments. The software included tutorials that focused on reading vocabulary, reading comprehension, language expression, math problem solving, math procedures, science and social studies. From these practices, scores were raised in language mechanics, language expression and spelling.
Another study that included Kindergarten age children by Diane H. Tracey and John W. Young (2006) showed growth in print recognition, vocabulary development and oral reading for students engaged in The Waterford Early Reading Program. The Waterford program included practice with automaticity with letter recognition, phonemic awareness, vocabulary, and comprehension.
The students showed growth, however it was minimal. The authors found no single way to improve test scores. They asserted that language arts growth is achieved through high quality language arts programs that include various pieces of quality literature and professional development for teachers.
Some research studies show that computer based language arts programs help to raise scores. Conversely, there are study results that showed that computer software did nothing to improve scores. S. Cramer and A. Smith (2002) studied middle school age students. They divided language arts students into two groups. One group was allowed to use word processing programs and Power Point presentations. The other group did not have access to the programs. They found that just allowing students to use word processing programs such as Power Point did not raise scores.
Norman Higgins and Laura Hess (2000) also found little change in the third grade vocabulary scores when the students used electronic books. Electronic books consist of literature put onto a CD which includes both text and pictures.
B. Kramarski and Y. Feldman (2000) studied comprehension and motivation scores in middle school students. They studied students that had access to the internet and those who did not. They found no difference in comprehension scores, but found a difference in motivation scores. This was evidenced by the engagement levels of students with internet access.

Definition of terms
For purposes of this study, the term computer technology applies to any

computer program used to facilitate language arts instruction.


Hypothesis


After deciding to research teachers’ attitudes concerning computer technology’s effects on instruction, we constructed a few theories. Our first theory was that teachers believe computer technology (e.g. computer programs and software) would enhance their students’ language arts skills. Second, teachers are required to instruct students in technology usage, so we deduced that teachers make use of technology in their classrooms to plan and guide their instruction. Third, computers are motivating in our classrooms, so it is reasonable that we hypothesize that other teachers would have students use computers as encouragement to increase reading behaviors and language arts skills.