How Does the Internet Works?

In 21st Century, Internet is became essential after food. Maybe, still many people will not agree with this statement but once they start using internet they will be agree. You are reading this article so i hope you are already aware of ‘what internet is’. Are you?

I know you will say ‘Yes i know what is internet’. But, whatever you know is enough ?  Don’t you ever wonder how internet works? Maybe you already know how it works if you are an IT pro or teacher but i think everyone should know this because internet is common and it is for everyone. So It’s study should not be only for IT students. So coming to the point, i wrote this article to let everyone aware about internet concepts and its working with the help of website Howstuffworks.com . I hope you have enough time to read it patiently.

The greatest thing about the Internet is that nobody really owns it. It is a global collection of networks, both big and small connected together in many different ways to form the single entity that we know as the Internet. The name ‘Internet’ comes from this idea of interconnected networks.

Since its beginning in 1969, the Internet has grown from four host computer systems to tens of millions. However, just because nobody owns the Internet, it doesn’t mean it is not monitored and maintained in different ways. The Internet Society, a non-profit group established in 1992, oversees the formation of the policies and protocols that define how we use and interact with the Internet. There are many concepts used in internet and it is very hard to understand but i divided those internet concepts in several parts so everyone can understand how internet works .

How does computers connect to internet.

Every computer that is connected to the Internet is part of a network, even the one in your home. When you connect to your ISP (Internet service provider), you become part of their network. The ISP may then connect to a larger network and become part of their network.
The Internet is simply a network of networks. Most large communications companies have their own dedicated backbones connecting various regions. In each region, the company has a Point of Presence (POP).

The POP is a place for local users to access the company’s network, often through a local phone number or dedicated line. The amazing thing here is that there is no overall controlling network. Instead, there are several high-level networks connecting to each other through Network Access Points or NAPs.

Example: Imagine that Company A is a large ISP. In each major city, Company A has a POP.The POP in each city is a rack full of modems that the ISP’s customers dial into. Company A use fiber optic (a cable) to communicate.

Imagine that Company B is a corporate ISP. Company B builds large buildings in major cities and corporations locate their Internet server machines in these buildings. Company B is such a large company that it runs its own fiber optic lines between its buildings so that they are all interconnected. In this arrangement, all of Company A’s customers can talk to each other, and all of Company B’s customers can talk to each other, but there is no way for Company A’s customers and Company B’s customers to intercommunicate.

The Function of an Internet Router (Message passing) Therefore, Company A and Company B both agree to connect to NAPs in various cities, and traffic between the two companies flows between the networks at the NAPs.

In the real Internet, dozens of large Internet providers interconnect at NAPs in various cities, and trillions of bytes of data flow between the individual networks at these points. The Internet is a collection of huge corporate networks that agree to all intercommunicate with each other at the NAPs. In this way, every computer on the Internet connects to every other.

How Message passes between computers

All of the networks rely on NAPs, backbones and routers to talk to each other. What is incredible about this process is that a message can leave one computer and travel halfway across the world through several different networks and arrive at another computer in a fraction of a second!

The routers determine where to send information from one computer to another. Routers are specialized computers that send your messages and those of every other Internet user speeding to their destinations along thousands of pathways. A router has two separate, but related, jobs:

  1. It ensures that information doesn’t go where it’s not needed.
  2. It makes sure that information does make it to the intended destination.

In performing these two jobs, a router is extremely useful in dealing with two separate computer networks.It joins the two networks, passing information from one to the other. It also protects the networks from one another, preventing the traffic on one from unnecessarily spilling over to the other.Regardless of how many networks are attached, the basic operation and function of the router remains the same.

Since the Internet is one huge network made up of tens of thousands of smaller networks, its use of routers is an absolute necessity.

Internet Backbone

Backbones are typically fiber optic trunk lines. The trunk line has multiple fiber optic cables combined together to increase the capacity.

Fiber optic cables are designated OC for optical carrier, such as OC-3, OC-12 or OC-48. An OC-3 line is capable of transmitting 155 Mbps while an OC-48 can transmit 2,488 Mbps (2.488 Gbps). Compare that to a typical 56K modem transmitting 56,000 bps and you see just how fast a modern backbone is.

The National Science Foundation(NSF) created the first high-speed backbone in 1987. Called NSFNET, it was a T1 line that connected 170 smaller networks together and operated at 1.544 Mbps (million bits per second). IBM, MCI and Merit worked with NSF to create the backbone and developed a T3 (45 Mbps) backbone the following year.
Today there are many companies that operate their own high-capacity backbones, and all of them interconnect at various NAPs around the world.
In this way, everyone on the Internet, no matter where they are and what company they use, is able to talk to everyone else on the planet. The entire Internet is a gigantic, sprawling agreement between companies to intercommunicate freely.

Internet Protocol: IP Addresses and Domain

Every machine on the Internet has a unique identifying number, called an IP Address. It is very important to understand concept of IP to understand internet concepts.  The IP stands for Internet Protocol, which is the language that computers use to communicate over the Internet. A protocol is the pre-defined way that someone who wants to use a service talks with that service. The “someone” could be a person, but more often it is a computer program like a Web browser.

To make it easier for us humans to remember, IP addresses are normally expressed in decimal format.E.g. 216.27.20.164.But computers communicate in binary form. the four numbers in an IP address are called octets, because they each have eight positions when viewed in binary form. If you add all the positions together, you get 32, which is why IP addresses are considered 32-bit numbers.

How does The Internet Work1

 

Since each of the eight positions can have two different states (1 or zero), the total number of possible combinations per octet is 28 or 256. So each octet can contain any value between zero and 255.Combine the four octets and you get 232 or a possible 4,294,967,296 unique values!

Out of the almost 4.3 billion possible combinations, certain values are restricted from use as typical IP addresses.For example, the IP address 0.0.0.0 is reserved for the default network and the address 255.255.255.255 is used for broadcasts. The octets serve a purpose other than simply separating the numbers.

They are used to create classes of IP addresses that can be assigned to a particular business, government or other entity based on size and need. The octets are split into two sections: Netand Host.

The Net section always contains the first octet. It is used to identify the network that a computer belongs to.
Host (sometimes referred to as Node) identifies the actual computer on the network.
The Host section always contains the last octet. There are five IP classes plus certain special addresses.

DOMAIN NAME SYSTEM:

Its very complex to use and remember IP addresses of the computer you wanted to establish a link with. For example, a typical IP address might be 216.27.20.164. This was fine when there were only a few hosts out there, but it became unwieldy as more and more systems came online.

The first solution to the problem was a simple text file maintained by the Network Information Center that mapped names to IP addresses. Soon this text file became so large it was too cumbersome to manage.In 1983, the University of Wisconsin created the Domain Name System (DNS), which maps text names to IP addresses automatically. This way you only need to remember www.simmyideas.com, Instead of How simmyideas.com’s IP addresss. In internet concepts URL stands for Uniform Resource Locator.

How does The Internet Work 4

When you use the Web or send an e-mail message, you use a domain name to do it. For example, the Uniform Resource Locator (URL) ” http://www.simmyideas.com” contains the domain name simmyideas.com.

Every time you use a domain name, you use the Internet’s DNS servers to translate the human-readable domain name into the machine-readable IP address.

Top-level domain names, also called first-level domain names, include .COM, .ORG, .NET,  .EDU and .GOV. Within every top-level domain there is a huge list of second-level domains. For example, in the .COM first-level domain there is:

  1. Google.com
  2. Yahoo.com
  3. Microsoft.com

Every name in the .COM top-level domain must be unique. The left-most word, like www, is the host name. It specifies the name of a specific machine (with a specific IP address) in a domain. In the internet concepts every website must have their own unique domain name.
A given domain can, potentially, contain millions of host names as long as they are all unique within that domain. DNS servers accept requests from programs and other name servers to convert domain names into IP addresses.

When a request comes in, the DNS server can do one of four things with it:

  1. It can answer the request with an IP address because it already knows the IP address for the requested domain.
  2. It can contact another DNS server and try to find the IP address for the name requested. It may have to do this multiple times.
  3. It can say, “I don’t know the IP address for the domain you requested, but here’s the IP address for a DNS server that knows more than I do.”
  4. It can return an error message because the requested domain name is invalid or does not exist.

How DNS, and URL works? (EXMPLE)

We must understand understand the working of URL and DNS to understand the internet concepts. Let’s say that you type the URL www.simmyideas.com into your browser and than The browser contacts a DNS server to get the IP address.

A DNS server would start its search for an IP address by contacting one of theroot DNS servers. The root servers know the IP addresses for all of the DNS servers that handle the top-level domains (. COM, . NET, . ORG, etc.). Your DNS server would ask the root for www.simmyideas.com, and the root would say, “I don’t know the IP address for www.simmyideas.com, but here’s the IP address for the .COM DNS server.”

Your name server then sends a query to the . COM DNS server asking it if it knows the IP address for www.simmyideas.com. The DNS server for the .COM domain knows the IP addresses for the name servers handling the www.simmyideas.com domain, so it returns those.

Your name server then contacts the DNS server for www.simmyideas.com and asks if it knows the IP address for www.simmyideas.com. It actually does, so it returns the IP address to your DNS server, which returns it to the browser, which can then contact the server for www.simmyideas.com to get a Web page.One of the keys to making this work is redundancy. There are multiple DNS servers at every level, so that if one fails, there are others to handle the requests. The other key is caching. Once a DNS server resolves a request, it caches the IP address it receives.Once it has made a request to a root DNS server for any .COM domain, it knows the IP address for a DNS server handling the .COM domain, so it doesn’t have to bug the root DNS servers again for that information. DNS servers can do this for every request, and this caching helps to keep things from bogging down.

Even though it is totally invisible, DNS servers handle billions of requests every day and they are essential to the Internet’s smooth functioning. The fact that this distributed database works so well and so invisibly day in and day out is a testimony to the design.

Internet Servers, Clients and Ports, http

Internet servers make the Internet possible. All of the machines on the Internet are either servers or clients. The machines that provide services to other machines are servers. And the machines that are used to connect to those services are clients. There are Web servers, e-mail servers, FTP servers and so on serving the needs of Internet users all over the world.

When you connect to www.simmyideas.com to read a page, you are a user sitting at a client’s machine. You are accessing the Simmyideas’s Private Web server. The server machine finds the page you requested and sends it to you. Clients that come to a server machine do so with a specific intent, so clients direct their requests to a specific software server running on the server machine.

For example, if you are running a Web browser on your machine, it will want to talk to the Web server on the server machine, not the e-mail server. A server has a static IP address that does not change very often. A home machine that is dialing up through a modem, on the other hand, typically has an IP address assigned by the ISP every time you dial in.

That IP address is unique for your session — it may be different the next time you dial in. This way, an ISP only needs one IP address for each modem it supports, rather than one for each customer.

Ports and HTTP

Any server machine makes its services available using numbered ports. One for each service that is available on the server. For example, If a server machine is running a Web server and a file transfer protocol (FTP) server, the Web server would typically be available on port 80, and the FTP server would be available on port 21. Clients connect to a service at a specific IP address and on a specific port number.

Once a client has connected to a service on a particular port, it accesses the service using a specific protocol. Protocols are often text and simply describe how the client and server will have their conversation. Every Web server on the Internet conforms to the hypertext transfer protocol (HTTP).

These were the basic internet concepts that everyone should know . I hope you found it useful and you are going to share these internet concepts with your friends.

JOIN SiMMYIDEAS TECH HUB BBM CHANNEL: C00215CC3 

Shortcut Key: How to Open ‘My Computer’ With a Keystroke

Mostly, when I work on  my clients computer and i began to use shortcut key to open any program, they began to wonder how i get to know all this. In this article, I will tutor you all how to open My Computer with just a keystroke.

The desktop of every version of Microsoft Windows since Windows 95 has included a “My Computer” icon which opens up a nifty file explorer window when you click on it.

This feature is one of the most used components of Windows which means that many of us click on it several times a day.

But there is a super-fast way to open “My Computer” without even touching the mouse. Simply press the “Windows“ key and the “E” key at the same time.

My Computer to show

If you prefer the old-style way of opening “My Computer” by clicking on the icon, you certainly can. But what if the “My Computer” icon is missing from the desktop? Well, you can easily get it back. Here’s how: 

  •  Right-click on an empty area of the Desktop.
  •  Click Personalize.
  • Click Change Desktop Icons.
  • Check the box beside Computer in the window that pops up. You can choose to either display or hide any of the icons listed inside this window simply by checking or unchecking them.
  •  Click Ok.

Was it Helpful? Then don’t forget to share this with others too, you may never know that your share may be proven helpful for many of the users out there. So, keep sharing and keep helping.

JOIN SiMMYIDEAS TECH HUB BBM CHANNEL: C00215cc3

Download Latest Version For GOM Media Player

Download GOM Player for free latest version for Windows XP, Windows Vista, Windows 7, Windows 8.1 32-bit & 64-bit NTFS systems.

GOM Media Player is a classic audio and video player with built-in codecs that able to play broken videos. Now you any one can get complete new version of multimedia player from GOMLAB.

gom player

GOM Media Player 2.2.69.5227-2015 free download update can play most popular video formats by default: AVI, MP4, MKV, FLV, WMV, MOV and more. Installation GOM Player, the software is bundled with many media file codecs (XviD, DivX, FLV1, AC3, OGG, MP4, H263 and more) so you need not to install separate codecs for most video files.

You can now go for GOM Media Player Latest Version: Free Download

 

How does Computer Connect to Internet

Every computer that is connected to the Internet is part of a network, even the one in your home. When you connect to your ISP (Internet service provider), you become part of their network. The ISP may then connect to a larger network and become part of their network.
The Internet is simply a network of networks. Most large communications companies have their own dedicated backbones connecting various regions. In each region, the company has a Point of Presence (POP).

The POP is a place for local users to access the company’s network, often through a local phone number or dedicated line. The amazing thing here is that there is no overall controlling network. Instead, there are several high-level networks connecting to each other through Network Access Points or NAPs.

Example: Imagine that Company A is a large ISP. In each major city, Company A has a POP.The POP in each city is a rack full of modems that the ISP’s customers dial into. Company A use fiber optic (a cable) to communicate.

Imagine that Company B is a corporate ISP. Company B builds large buildings in major cities and corporations locate their Internet server machines in these buildings. Company B is such a large company that it runs its own fiber optic lines between its buildings so that they are all interconnected. In this arrangement, all of Company A’s customers can talk to each other, and all of Company B’s customers can talk to each other, but there is no way for Company A’s customers and Company B’s customers to intercommunicate.

The Function of an Internet Router (Message passing) Therefore, Company A and Company B both agree to connect to NAPs in various cities, and traffic between the two companies flows between the networks at the NAPs.

In the real Internet, dozens of large Internet providers interconnect at NAPs in various cities, and trillions of bytes of data flow between the individual networks at these points. The Internet is a collection of huge corporate networks that agree to all intercommunicate with each other at the NAPs. In this way, every computer on the Internet connects to every other.

Tech Q&A: What is switch?

In a telecommunications network, a switch is a device that channels incoming data from any of multiple input ports to the specific output port that will take the data toward its intended destination.

Check Out more Definitions and Functions of a Switch

  • With a computer keyboard, a switch is what is beneath each key that gives the key a response when pressed. For example, a scissor-switch is a type of switch used with laptop computers. In the picture, is an example of a scissor-switch and how the key is compressed when pressed
  • On a network, a switch is a hardware device that filters and forwards network packets, but often not capable of much more. The first network device that was added to the Internet was a switch called the IMP, which helped send the first message on October 29, 1969. A network switch is more advanced than a hub but not as advanced as a router. The picture shows an example of a NETGEAR5 port switch.
  •  A switch is a piece of a physical circuitry component that governs the signal flow. Having a switch or toggle switch allows a connection to be opened or closed. When opened the switch allows a signal or power to flow through the connection. When closed the switch stops the flow and breaks the circuit connection.
  •  A switch is also a button or lever that can be switched to turn a device on or off.
  • When referring to another command, a command switch is an available option that can be used with the command. For example, the command: “fdisk” can be used with the /MBR switch, using “FDISK /MBR” would allow the user to recreate the master boot record and not just run the fdisk program.
  • When referring to the switches command, this command is loaded through config.sys and allows you to add and remove various functions of MS-DOS.
  •  Switches is also a config.sys command that allows the user to add and remove features of early versions of MS-DOS and Windows.

Source: ComputerHope

Infographic -5 Things To Know About E-Commerce In Nigeria

E-Commerce websites engage web customers and they are ready to struggle for each and every one of them. These days, you can’t really say that online shopping is a niche market, aimed at a small audience anymore. I’m not going to talk about the advantages of online stores, we all already know that the system works.

E-commerce in Africa is no doubt experiencing a boom with Nigeria occupying the top position as the largest internet market in the continent.

Leading online shopping community Kaymu.com.ng presents to an infographic on 5 things to know about Nigeria’s E-commerce sector:

Simmyideas infographics

How to Choose the Right (SD) Memory Card

SD cards are the most common form of removable data storage for portable devices that we have to date. However, many people have had situations where they put the card in their device, and it does not read. Other times, it fails to record. Often, it always ends with the person saying, “Well, I thought I had enough storage!”

But that’s just it – SD cards aren’t all about storage! In fact, there are several other factors to consider, and when purchasing your cards, you should make yourself aware of them. That said, SD cards aren’t all created equal, and it’s important to be educated as to what separates each one from the rest.

Most digital devices we have today have a special slot for memory cards, which can be useful when you want to add storage capacity to the device. Your smartphones, music players, digital cameras, laptops, and tablets are mostly equipped with memory card slots so you can buy whatever memory cards for your needs. However, you need to remember that memory cards come in different sizes, speed, and also storage capacities. After all, different devices will require different types of memory cards, so before you march to the nearest store to buy the memory cards that you want – and waste money for the stuffs you don’t actually need – know your facts straight about different kinds of memory cards.

As a given, all types of data are different, and although I can’t tell you exactly what to buy since I don’t know your device, I can supply you with the proper information to make that decision on your own.

The Capacity

Just like other devices, memory cards have different storage capacity. The standard SDSC has 1 to 2 GB of capacity, with the biggest one is 4 GB, but 4 GB isn’t the standard capacity. the later SDHC has 2 to 32 GB of capacity while the recent SDXC has 32 GB to 2 TB in capacity. you also need to choose the right devices that support SDXC or SDHC cards. Most general devices support SDHC while devices that support SDXC is less common because it is basically pretty new. At this point, the vast majority of devices should support SDHC. In fact, the SD cards you have are probably SDHC cards. SDXC is newer and less common.

The Size

Memory cards also come in different sizes, with microSD card as the smallest, miniSD as the medium one, and the standard one which is pretty big and the biggest from the three. Yes, the standard memory card is quite small actually, but it is still the biggest when compared to the other two. With cut-corner design, these standard cards are often used for most digital cameras.

MiniSD cards have the dimension of 20 x 21.5 x 1.4 mm with total weight 0.8 grams so it is pretty small. Originally, this kind of card was designed for mobile phones, but today mobile phones are using even smaller memory cards, which is the microSD card. As the smallest cards among the three, it weighs 0.25 grams with a total dimension of 11 x 15 x 1 mm. aside being used in modern smartphones, these cards are also used in other gadgets, such as tablets.

Each SD cards has their own matching slots. Naturally, you can’t plug in a microSD into a medium or a standard one into a microSD. However, it is possible now to use the smaller card for bigger slots. For instance, you can use microSD for the medium or standard slot, as long as you have the adapter.

The Speed

On the contrary to what people think, different memory cards have a different speed. The reason why this is designed is because there are different work and task that require a quick response, while some are quite standard. If you are a professional photographer often dealing with snapping pictures in fast successions or you have to make fast high-resolution video recording, you will need a memory card with high speed. Using DLSR camera with high-res RAW format require a memory card that can match the high speed, so your camera can save all the results safely immediately. However, if you are casual camera user – with standard smartphone camera and you don’t need snapping fast images with high-quality result, then you only need the standard memory card – no need to bother buying the high speed one.

The speed classes are basically a recent standard defined by SD Association. There is a certain guideline provided so users like you can make use of it. Speed classes are divided into four classifications: 2, 4, 8, and 10 with class 2 being the slowest and class 10 being the fastest (and also perfect for HD quality photo images and video recording). Class 4 and 6 are the standards, and they are pretty good to deal with standard high-quality results.

Aside from the general four classes, there are also two additional UHS (Ultra High Speed) classes. They are costlier and definitely designed for advanced and professional usage. Naturally, these UHS cards can only be accessed by devices that are compatible. General smartphones, digital cameras, or tablets generally use class 4 or 6, while the cheapest smartphones or digital cameras may use the class 2. High-end digital cameras are generally able to support the class10. Finding the logo on the card isn’t difficult at all, as the class speed is generally embedded in it. if you buy the cards from online stores, there is also information about the speed class. If you can’t find any symbol for the speed class, you probably have the so called 0 card, which was produced before the rating system for the speed class was introduced. As you can guess, 0 class is even slower than the class2.

Was it helpful? If it was, then do share it with your other friends and circle too. You may never know that your share may be proven helpful for many 0f the users out there. So, keep sharing and liking our content over social media

JOIN SiMMYIDEAS TECH HUB BBM CHANNEL: C00215cc3

 

How to Remove Computer Virus Completely From Your Computer

Every day you hear numbers of cases of virus attack that cause to loss of precious data. In this modern age where technology is advancing with a very fast pace, you need computer daily. Thereby, it is essential for you to understand the process of computer virus removal so as to avoid such terrible unexpected intruders. Let’s have some basic knowledge of virus removal. This process can be conducted without human intervention or manually.

Before going to carry out step of virus removal, you should confirm that whether your PC is infected or not.

Common signs of virus attack are:

  • Computer running too slow
  • Unknown errors
  • Pop-ups and strange ads
  • Random PC boots
  • Blue screen error

If you find these signs then it is certain that your computer is infected with virus and you need to do computer virus removal without making much delay. Experts are available round the clock to help your regarding these issues. Going to professionals for virus removal is one way but you can also adopt some steps by yourself to get rid of such situations.

paid-antivirus-softwares

Remove computer virus manually

Sometimes computer virus removal can be done manually. Try the following steps:

  1. Most of the viruses attack your PC through spyware programs and thus, you need to remove those suspicious programs. For this, start your PC in Safe Mode by pressing F8 while your PC restarts. Then click “Start” and go to “Control Panel.” Choose “Add or Remove programs.” Now, you can see all the programs installed on your computer. Find those that are linked with virus or spyware and delete them. Also, you can search online for the list of programs matching to a particular virus.
  2. By seeing the list of files related with any virus through Internet, you can check that whether any of those files are available on your computer. If you find any such file then delete them permanently.
  3. When viruses attack your PC, they add some registry entries into your system registry. You can search online for those entries and flush out those viruses that have added those entries.

Remove virus automatically

The most common way to remove virus is the use of antivirus software. For this, you need good virus removal tool.

  1. Begin the process by closing all the applications that is running. Most of the antivirus software requires a reboot thus, it is necessary to close all the running programs.
  2. Run a scan on your computer.
  3. Detect the threats and remove them.
  4. Update your antivirus software for catching up latest threats.
  5. After updating, run the antivirus software to detect the viruses and then remove the detected items.

It is significant to note that while removing virus manually, you should be careful regarding your needed files and entries. Make sure you are not deleting them along with doubtful files. Computer virus removal is the method that should be taken place with massive care without damaging important contents of computer. If you are not tech savvy or do not want to do it your own then you can take help by calling any Company that provides Tech Supports

Was it helpful? If it was, then do share it with your other friends and circle too. You may never know that your share may be proven helpful for many 0f the users out there. So, keep sharing and liking our content over social media

JOIN SiMMYIDEAS TECH HUB BBM CHANNEL: C00215cc3

 

Is Your Computer Compatible with Windows 10 & Can You Upgrade?

It’s looking more and more likely that Microsoft will achieve its announced aim of shipping Windows 10 sometime around the end of July or thereabouts. The May 20 announcement of build 10122 seems to indicate that most of the important feature changes are in. So we may have reached the point where it is time to start considering if you are going to take advantage of the free upgrade to Windows 10 that will be available to many people. A lot of the people who are eligible for an upgrade probably have older machines so it is worth looking at the system requirements for running Windows 10.

If you have a system already running Windows 8.1, you are probably good to go. However, because of the space needed for certain hidden partitions and for backup installation files, make sure that you have ample spare free disk space. Before Windows 10 is installed, the installer will run a check of system requirements.

Those with older systems can take a look at the graphic below, which shows the general requirements for desktop systems. It is taken from a Microsoft presentation at the recent WinHEC show. These requirements are for new PCs and intended for OEMs but they are indicative.

win10-system-requirements

Personally, I find the memory and storage requirements given in the graphic to be unrealistically low. I think you’d be a lot better off doubling the amount of RAM listed. I also think a minimum system volume of ~60 GB is a good idea. Most PC users will want even more space for storing files but that can be on a separate disk volume. Note that the UEFI requirement is only for new PCs. Old BIOS systems are still supposed to be able to run Windows 10. Not stated in the slide but you also need a CPU that supports PAE, NX, and SSE2. Almost any PC processor of the last few years will have this support but, if need be, you can check with the Sysinternals command-line utility Coreinfo.

Was it helpful? If it was, then do share it with your other friends and circle too. You may never know that your share may be proven helpful for many 0f the users out there. So, keep sharing and liking our content over social media

JOIN SiMMYIDEAS TECH HUB BBM CHANNEL: C00215cc3

 

How To Recover Data from a Damaged Seagate External Hard Drive

I just found that data has been lost after transferring data from Seagate external hard drive to computer. And now Seagate external hard drive seems to be damaged. It has become inaccessible.

If you are in such situation and in search to find how to recover data from damaged Seagate external hard drive, it is important to clarify why data lost after transaction.

Technical Errors: Sometimes, lots of data always lose after we accidently delete or copy, but not paste them at right location.

Hard Disk Errors: Seagate external hard drive has been used for a long time. And now it becomes broken, so data lost.

Software Errors: When transferring data from external hard drive to computer, Seagate external hard drive is attacked by virus software on computer.

No matter which reason, Seagate external hard drive damaged is inevitable now. But don’t panic. There is still chance to recover Seagate external hard drive data, as long as the external hard drive has not been written with new data.

How to recover Seagate external hard drive lost data?

Data Genius is a powerful and free Seagate hard drive data recovery tool, no matter hard drive is formatted, virus-attacked, partition or any other reasons.

Steps for data recovery from Seagate damaged external hard drive:

  1. Connect damaged Seagate external hard drive to accessible computer.
  2. Download and install Simmyideas Data Genius on this computer.
  3. Run data recovery tool and choose data recovery option. If you are not sure, choose Deleted Recovery. Click Next.
  4. Choose external hard drive and click Scan button.
  5. When hard drive scan process completes, lost data or files can be seen in the left pane of Data Genius new window.
    You can select the files and preview them in the right pane to see whether they are the lost data you want to recover from damaged Seagate external hard drive.
  6. Check files you are sure to recover and click Recover button.
  7. At the following pop-up window, choose a location on computer to save recovered data.
  8. Until “Recovery is finished” message appears, lost data is recovered successfully from Seagate external hard drive. Click OK and you will turn to the recovered data.