|
|
|
|
|
** e-mail & internet |
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
** my computer |
|
|
|
|
|
|
|
|
|
|
|
|
|
Bottom right corner of your screen is your System Tray

This example contains a Speaker, Network Notification Icon, a Printer Status Icon, Kaspersky Anti Virus and the Time.
|
|
on-line threats
Computers connected to the Internet can become the subject of an online attack. Some attacks aim at taking control of your computer, or making it unable to communicate, do its work, or even stop functioning until it is turned off and back on.
Some attacks use exploits or vulnerabilities of the computers operating system.. These type of problems are generally solved by downloading / installing patches written by operating system software companies. Keep your PC up to date with security patches and virus pattern updates.
More often, attacks use the limitations of the TCP/IP protocol. These attacks mostly aim at keeping the computer very busy. The system gets so much work to do, that it cannot answer requests from normal Internet communications. Such situations are therefore called Denial of Service (DoS) attacks. These attacks are best dealt with by software and hardware traffic control units called firewalls.
Most web servers today are protected with firewalls. There are also programs called personal firewalls , which are aimed at the protection of online users. These programs are especially useful for users who have unchanging IP addresses (such as ADSL and cable TV Internet connections).
Some ASDL Modem / Routers have a firewall built in and have a defualt setup which will offer protection against hackers. This is a hardware firewall and sits between your PC and the internet, stopping a certain amount from actually reaching your computer.
Software firewalls offer a useful defense also. Products such as Zone Alarm or Sygate are worth trying and can be downloaded free with an option of upgrading to a more comprehensive program. . Other products offer a more complete solution to internet security and privacy and are readily available for about £ 40 or so.
It is possible for your PC to be used by another PC for relaying e-mails or viruses or any material! This can be done by allowing programs to be installed or run on your PC. Good practice is to NEVER open material received on your PC unless you can garantee that material is safe from malicious programs, scripts and macros. Be aware that you can receive malicious e-mails from rouge sources that appear to have come from people you know. (spoofing)
Things you can do: -
If using Outlook Express, turn off the preview pane in the 'view - layout' menu. You can then censor received e-mails, deleting without opening any you're not expecting, delete them especially if they have attachments.
Install anti-virus software and a personal firewall (eg ZoneAlarm or Sygate) See our links page
Services left running on your system can be accessed over the internet - turn off any services you dont use.
Unfortunately installing such software makes using the PC and internet more complex. In doing so, you help prevent the spread of cyber viruses and threats and you help to make the cyber criminal life a little harder.
Here is an example list of potential threats to your PC.
|
|
|
Virus, Trojans, Worms |
Bootup disks, Infected programms, e-mails, web sites |
can load programs to do anything. |
Ad ware |
web sites |
Spy on your internet browseing habits. |
connection to your PC |
internet |
any open ports |
key loggers |
|
captures any data you type. |
dialers |
|
takes control of your connection and dials premium rate numbers. |
Browser Helper Objects |
|
code to extend your browsers capabilities. Can be used to open web sites you dont want! |
Spam |
|
unsolicited e-mails (junk mail) |
Back to faq
|
|
|
|
|
|
e-mail and internet policy
E-mail is the most common source of PC virus infection.
There are things you can do to ensure that your e-mail usage is more secure.
1. Do not include confidential information in e-mail
e-mails are rather like postcards. They can be viewed easily by anyone. It does not matter if the information pertains to you or someone else, and it does not matter if the e-mail system is externally or internally based, confidential information in e-mail is a risk that is not worth taking.
Do not give out bank, PIN or password details via e-mail. Good organisations would not ask for these details using e-mail.
2. Minimize the use of attachments
Copy and paste text as often as possible.
3. Delete unexpected executable programs received via e-mail
This is a common means for passing on viruses. Do not open them and do not pass them on. It is not uncommon to receive these from people you know, as a virus may propagate by sending itself to people in the user's address book. If you must open an executable, e-mail the sender to confirm that it is genuine.
Look out for files that may contain viruses, e.g. those with the suffixes .exe, .vbs, .shs, .pif, .lmt.
4. Notify the person from whom you received a virus infected file
This helps them correct the problem within their system before passing the virus on to other users.
Standards
There are just a few rules that must be followed in ensuring proper use of e-mail and to ensure that it does not cause problems or security breaches. These are described in the following policy:
E-mail is to be treated as a permanent written communication;
No abusive or derogatory e-mails will be sent out;
No sensitive information should be sent across the Internet.
Do not use e-mail as a substitute communications medium. It is still better to talk. If it is an important e-mail, check that it has arrived;
Do not assume all e-mail is delivered. The Internet is unreliable and users do not always pick up their mail on time;
Do not make assumptions about addresses. Always check when first exchanging messages that it has been received correctly.
Ensure any abuses of the e-mail system or any received junk mail, viruses etc. are reported to the manager.
Messages and attachments must not be abusive, defamatory or contain sexual or racist material. Users of the facility are expected to apply good sense when producing messages.
Back to faq |
|
|
|
|
|
email etiquette rules
There are many etiquette guides and many different etiquette rules. Some rules will differ depending on whether you are a home or business user. Below we list what we consider as the most important email etiquette rules that apply to nearly all users.
Be concise and to the point Do not make an e-mail longer than it needs to be. Remember that reading an e-mail is harder than reading printed communications and a long e-mail can be very discouraging to read.
Use proper spelling, grammar & punctuation This is not only important because improper spelling, grammar and punctuation give a bad impression, it is also important for conveying the message properly. E-mails with no full stops or commas are difficult to read and can sometimes even change the meaning of the text. And, if your program has a spell checking option, why not use it?
Answer swiftly When people e-mail a company, it is because they wish to receive a quick response. If they did not want a quick response they would send a letter or a fax. Therefore, each e-mail should be replied to within at least 24 hours, and preferably within the same working day. If the email is complicated, just send an email back saying that you have received it and that you will get back to them. This will put the customer's mind at rest and usually customers will then be very patient!
Do not attach unnecessary files By sending large attachments you can annoy people and even bring down their e-mail system. Wherever possible try to compress attachments and only send attachments when they are productive. Moreover, you need to have a good virus scanner in place since people will not be very happy if you send them documents full of viruses!
Use proper structure & layout Since reading from a screen is more difficult than reading from paper, the structure and lay out is very important for e-mail messages. Use short paragraphs and blank lines between each paragraph. When making points, number them or mark each point as separate to keep the overview.
Do not overuse the high priority option We all know the story of the boy who cried wolf. If you overuse the high priority option, it will lose its function when you really need it. Moreover, even if a mail has high priority, your message will come across as slightly aggressive if you flag it as 'high priority'.
Do not write in CAPITALS IF YOU WRITE IN CAPITALS IT SEEMS AS IF YOU ARE SHOUTING. This can be highly annoying and might trigger an unwanted response in the form of a flame mail. Therefore, try not to send any email text in capitals.
Don't leave out the message thread When you reply to an email, you must include the original mail in your reply, in other words click 'Reply', instead of 'New Mail'. Some people say that you must remove the previous message since this has already been sent and is therefore unnecessary. However, I could not agree less. If you receive many emails you obviously cannot remember each individual email. This means that a 'threadless email' will not provide enough information and you will have to spend a frustratingly long time to find out the context of the email in order to deal with it. Leaving the thread might take a fraction longer in download time, but it will save the recipient much more time and frustration in looking for the related emails in their inbox!
Add disclaimers to your emails Business users should add disclaimers to internal and external mails, since this can help protect your company from liability. Consider the following scenario: an employee accidentally forwards a virus to a customer by email. The customer decides to sue your company for damages. If you add a disclaimer at the bottom of every external mail, saying that the recipient must check each email for viruses and that it cannot be held liable for any transmitted viruses, this will surely be of help to you in court. Another example: an employee sues the company for allowing a racist email to circulate the office. If your company has an email policy in place and adds an email disclaimer to every mail that states that employees are expressly required not to make defamatory statements, you have a good case of proving that the company did everything it could to prevent offensive emails.
Read the email before you send it A lot of people don't bother to read an email before they send it out, as can be seen from the many spelling and grammar mistakes contained in emails. Apart from this, reading your email through the eyes of the recipient will help you send a more effective message and avoid misunderstandings and inappropriate comments.
Do not overuse Reply to All Only use Reply to All if you really need your message to be seen by each person who received the original message.
Take care with abbreviations and emoticons In business emails, try not to use abbreviations such as BTW (by the way) and LOL (laugh out loud). The recipient might not be aware of the meanings of the abbreviations and in business emails these are generally not appropriate. The same goes for emoticons, such as the smiley :-). If you are not sure whether your recipient knows what it means, it is better not to use it.
Be careful with formatting Remember that when you use formatting in your emails, the sender might not be able to view formatting, or might see different fonts than you had intended. When using colours, use a colour that is easy to read on the background.
Take care with rich text and HTML messages Be aware that when you send an email in rich text or HTML format, the sender might only be able to receive plain text emails. If this is the case, the recipient will receive your message as a .txt attachment. Most email clients however, including Microsoft Outlook, are able to receive HTML and rich text messages.
Do not request delivery and read receipts This will almost always annoy your recipient before he or she has even read your message. Besides, it usually does not work anyway since the recipient could have blocked that function, or his/her software might not support it, so what is the use of using it? If you want to know whether an email was received it is better to ask the recipient to let you know if it was received.
Do not use email to discuss confidential information Sending an email is like sending a postcard. If you don't want your email to be displayed on a bulletin board, don't send it. Moreover, never make any libelous, sexist or racially discriminating comments in emails, even if they are meant to be a joke.
Use a meaningful subject Try to use a subject that is meaningful to the recipient as well as yourself. For instance, when you send an email to a company requesting information about a product, it is better to mention the actual name of the product, e.g. 'Product A information' than to just say 'product information' or the company's name in the subject.
Avoid using URGENT and IMPORTANT Even more so than the high-priority option, you must at all times try to avoid these types of words in an email or subject line. Only use this if it is a really, really urgent or important message.
Don't forward virus hoaxes and chain letters If you receive an email message warning you of a new unstoppable virus that will immediatly delete everything from your computer, this is most probably a hoax. By forwarding hoaxes you use valuable bandwidth and sometimes virus hoaxes contain viruses themselves, by attaching a so-called file that will stop the dangerous virus. Same goes for chain letters that promise incredible riches or ask your help for a charitable cause. Even if the content seems to be bona fide, the senders are usually not. Since it is impossible to find out whether a chain letter is real or not, the best place for it is the recycle bin.
Back to faq |
|
|
|
|
|
emoticons
Sometimes referred to as a "smiley". It is a short sequence of keyboard letters and symbols, usually emulating a facial expression, expressing a feeling that supplements the message.
|
|
:-) |
Smile |
;-) |
Smile with a wink |
:<}) |
User with mustache, smiling |
:-|| |
Mad |
:-( |
Sad |
:' -( |
Crying |
:~ |
Also crying |
:-)) |
Really happy |
:-D |
Big grin |
:-* |
A kiss |
:-P~ |
A lick |
:-? |
Licking lips |
:-o |
Wow! or I'm surprised |
:-| |
Grim |
%-} |
Silly |
:/) |
Not funny |
:-" |
Pursing lips |
:-P |
Sticking out your tongue |
:-\ |
User happens to be Popeye |
:-/ |
Perplexed |
=:O |
Frightened |
=8O |
Bug-eyed with fright |
:*) |
Clowning around |
:-} |
Embarassed smile |
:-)<>>>>> |
Basic Smiley with a necktie |
;-^) |
Tongue in cheek |
%*@:-( |
Hung over |
:-~~~ |
Drooling |
>:) |
Perplexed look |
.) |
Keeping an eye out for you |
8:-) |
Glasses on forehead |
8:] |
Normal smiling face of a gorilla |
0:-) |
Angel |
[:-|] |
Robot |
(:V) |
Duck |
3:-o |
Cow |
:-[ |
Vampire |
(_8-(|) |
Homer Simpson |
C|:-= |
Charlie Chaplin |
=|:-)= |
Abe Lincoln |
*<:-) |
Santa Claus |
-:-) |
User sports a mohawk and admires Mr. T |
(:)-) |
Scuba diver |
:-'| |
User has a cold |
:-{} |
User with heavy lipstick |
:-)8 |
User is well dressed |
>:-< |
Mad |
*#:-) |
Scotsman wearing his Scottish tam |
%-^ |
User is another Picasso |
#-) |
User partied all night |
<:I |
Dunce |
:-| |
"Have an ordinary day!" Smiley |
:}{: |
Kisses |
(-_-) |
Secret smile |
#.-o |
"Oh, nooooooo Mr. Bill!!!" |
Back to faq |
|
|
|
|
|
e-mail acronyms
Common acronyms that you may see in e-mail, newsgrou or /internet chat messages.
Abbreviation Meaning
|
|
ADN |
Any day now |
AFAIK |
As far as I know |
AFK |
Away from keyboard |
ARE |
Acronym-rich environment |
B4N |
Bye for now |
BAK |
Back at the keyboard |
BBIAB |
Be back in a bit |
BBL |
Be back later |
BEG |
Big evil grin |
BFD |
Big f***ing deal |
BFN |
Bye for now |
BG |
Big grin |
BIOYIOP |
Blow it out your I/O port |
BL |
Belly laughing |
BOTEC |
Back-of-the-envelope calculation |
BRB |
Be right back |
BTA |
But then again... |
BTW |
By the way |
BWTHDIK |
But what the heck do I know...? |
CU |
See you |
CUL |
See you later |
CUL8ER |
See you later |
CYA |
Cover your ass |
CYO |
See you online |
DBA |
Doing business as |
DFLA |
Disenhanced four-letter acronym |
DIKU |
Do I know you? |
DITYID |
Did I tell you I'm distressed? |
DQMOT |
Don't quote me on this |
EG |
Evil grin |
EMFBI |
Excuse me for butting in |
EOM |
End of message |
EOT |
End of thread |
ETLA |
Extended three-letter acronym |
F2F |
Face to face |
FAQ |
Frequently-ask question(s) |
FISH |
First in, still here |
FLA |
Four-letter acronym |
FMTYEWTK |
Far more than you ever wanted to know |
FOMCL |
Falling off my chair laughing |
FUBAR |
F***ed up beyond all repair or recognition |
FUD |
Fear, Uncertainty, and Doubt |
FWIW |
For what it's worth |
FYI |
For your information |
G |
Grin |
GA |
Go ahead |
GAL |
Get a life |
GBTW |
Get Back To Work |
GD&R |
Grinning, ducking, and running |
GFC |
Going For Coffee |
GFETE |
Grinning From Ear To Ear |
GIWIST |
Gee, I wish I'd said that |
GMTA |
Great minds think alike |
GOL |
Giggling out loud |
GTRM |
Going to read mail |
HTH |
Hope this helps |
IAC |
In any case |
IANAL |
I am not a lawyer (but) |
IC |
I see |
IHA |
I hate acronyms |
IIRC |
If I recall/remember/recollect correctly |
ILU or ILY |
I love you |
IM |
Immediate message |
IMHO |
In my humble opinion |
IMNSHO |
In my not so humble opinion |
IMO |
In my opinion |
IOW |
In other words |
IPN |
I'm posting naked |
IRL |
In real life |
IYSWIM |
If you see what I mean |
JBOD |
Just a bunch of disks |
JIC |
Just in case |
JK |
Just kidding |
KOTC |
Kiss on the cheek |
KWIM? |
Know what I mean? |
L8R |
Later |
LD |
Later, dude |
LDR |
Long-distance relationship |
LLTA |
Lots and lots of thunderous applause |
LOL |
Laughing out loud |
LRF |
Little Rubber Feet |
LTM |
Laugh to myself |
LTR |
Long-term relationship |
LULAB |
Love you like a brother |
LULAS |
Love you like a sister |
MorF |
Male or female |
MOSS |
Member of the same sex |
MOTOS |
Member of the opposite sex |
MUSM |
Miss you so much |
NFG |
No f*****g good |
NFW |
No feasible way or no f*****g way |
NIFOC |
Naked in front of computer |
NRN |
No response necessary |
OIC |
Oh, I see |
OLL |
Online love |
OTF |
Off the floor |
OTOH |
On the other hand |
OTTOMH |
Off the top of my head |
PANS |
Pretty awesome new stuff |
PCMCIA |
People can't master computer industry acronyms |
PDA |
Public display of affection |
PEBCAK |
Problem exists between chair and keyboard |
PIBKAC |
Problem is between keyboard and chair |
PITA |
Pain in the ass |
PMFJIB |
Pardon me for jumping in but... |
::POOF:: |
Goodbye |
POTS |
Plain old telephone service |
PU |
That stinks! |
RL |
Real life |
ROR |
Raffing out roud |
ROTFL |
Rolling on the floor laughing |
ROTFLMAO |
Rolling on the floor laughing my a** off |
ROTFLMAOWPIMP |
Rolling on the floor laughing my a** off while peeing in my pants |
ROTFLMBO |
Rolling on the floor laughing my butt off |
RPG |
Role-playing games |
RSN |
Real soon now |
RTFM |
Read the f***ing manual |
RYO |
Roll your own |
S4L |
Spam for life |
SEG |
S***-eating grin |
SNAFU |
Situation normal, all f***ed up |
SO |
Significant other |
SOL |
Smilling out loud or sh*t out of luck |
SOMY |
Sick of me yet? |
STFW |
Search the f*****g Web |
STW |
Search the Web |
SWAG |
Stupid wild-a** guess |
TAFN |
That's all for now |
TANSTAAFL |
There ain't no such thing as a free lunch |
TFH |
Thread from hell |
TGIF |
Thank God it's Friday |
THX |
Thanks |
TIA |
Thanks in advance |
TLA |
Three-letter acronym |
TLK2UL8R |
Talk to you later |
TMI |
Too much information |
TOPCA |
Til our paths cross again |
TPTB |
The powers that be |
TTFN |
Ta-Ta for now |
TTT |
Thought that, too |
TTYL |
Talk to you later |
TU |
Thank you |
UAPITA |
You're a pain in the ass |
UW |
You're welcome |
VBG |
Very big grin |
VBSEG |
Very big s***-eating grin |
WDALYIC |
Who died and left you in charge? |
WFM |
Works for me |
WIBNI |
Wouldn't it be nice if |
WT? |
What/who the ? |
WTFO |
What the F***! Over! |
WTG |
Way to go! |
WTGP? |
Want to go private? |
WU? |
What's up? |
WUF? |
Where are you from? |
WYSIWYG |
What you see is what you get |
YGBSM |
You gotta be s***tin' me! |
YMMV |
Your mileage may vary. |
Back to faq |
|
|
|
|
|
internet domain suffixes
Domain Suffixes are normally found at the end of website or e-mail addresses. They are used to describe the category the address belongs to (ie .com for commercial, .edu for education), and also which country the address originates from (ie .uk for the United Kingdom, .mex for Mexico.
Category Suffixes
- AC - Academic (same as.edu)
- CO - Commercial (same as .com)
- COM - Commercial
- EDU - Educational
- GOV - Government
- INT - International
- MIL - Military
- NET - Network
- ORG - Non-Profit Organisation
- ARPA - Old style Arpanet
- NATO - Nato field
Country Suffixes
Note - Most American addresses don't use their country code.
|
|
|
|
|
|
how much memory do you need?
Perhaps you already know what it's like to work on a computer that doesn't have quite enough memory. You can hear the hard drive operating more frequently and the "hour glass" or "wrist watch" cursor symbol appears on the screen for longer periods of time. Things can run more slowly at times, memory errors can occur more frequently, and sometimes you can't launch an application or a file without first closing or quitting another.
So, how do you determine if you have enough memory, or if you would benefit from more? And if you do need more, how much more? The fact is, the right amount of memory depends on the type of system you have, the type of work you're doing, and the software applications you're using. Because the right amount of memory is likely to be different for a desktop computer than for a server, we've divided this section into two parts - one for each type of system.
Memory Requirements For A Desktop Computer
If you're using a desktop computer, memory requirements depend on the computer's operating system and the application software you're using. Today's word processing and spreadsheet applications require as little as 32MB of memory to run. However, software and operating system developers continue to extend the capabilities of their products, which usually means greater memory requirements. Today, developers typically assume a minimum memory configuration of 64MB. Systems used for graphic arts, publishing, and multimedia call for at least 128MB of memory and it's common for such systems to require 256MB or more for best performance.
The chart on the next page provides basic guidelines to help you decide how much memory is optimal for your desktop computer. The chart is divided by operating system and by different kinds of work. Find the operating system you're using on your computer, then look for the descriptions of work that most closely match the kind of work you do.
DESKTOP MEMORY MAP
WINDOWS ® 2000 PROFESSIONAL |
Windows 2000 Professional runs software applications faster. Notebook-ready and designed with the future in mind, Windows 2000 Professional allows users to take advantage of a full range of features today. Windows 2000 Professional is future-ready and promises to run today's and tomorrow's applications better.
Baseline: 64MB - 128MB
Optimal: 128MB - 512MB
|
|
Administrative & Service |
Light- Word processing, email, data-entry |
64MB - 96MB |
Medium- Fax/communications, database administration, spreadsheets; >2 applications open at a time |
64MB - 128MB |
Heavy- Complex documents, accounting, business graphics, presentation software, network connectivity |
96MB - 256MB |
|
Executives & Analysts |
Light- Proposals, reports, spreadsheets, business graphics, databases, scheduling, presentations |
64MB - 96MB |
Medium- Complex presentations, sales/market analysis, project management, Internet access |
96MB - 128MB |
Heavy- Statistical applications, large databases, research/technical analysis, complex presentations, video conferencing |
128MB - 512MB |
|
Engineers & Designers |
Light- Page layout, 2 - 4 color line drawings, simple image manipulation, simple graphics |
96MB - 128MB |
Medium- 2D CAD, rendering, multimedia presentations, simple photo-editing, Web development |
128MB - 512MB |
Heavy- Animation, complex photo-editing, real-time video, 3D CAD, solid modeling, finite element analysis |
256MB - 1GB |
WINDOWS ® 98 |
Windows 98 requires 16 - 32MB to run basic applications. Tests show 45 - 65% performance improvements at 64MB and beyond.
Baseline: 32MB - 64MB
Optimal: 128MB - 256MB
|
|
Students |
Light- Word processing, basic financial management, email and other light Internet use |
32MB - 64MB |
Medium- Home office applications, games, Internet surfing, downloading images, spreadsheets, presentations |
64MB - 128MB |
Heavy- Multimedia use such as video, graphics, music, voice recognition, design, complex images |
128MB - 384MB |
|
Home Users |
Light- Word processing, basic financial management, email and other light Internet use |
32MB - 48MB |
Medium- Home office applications, games, Internet surfing, downloading images, spreadsheets, presentations |
48MB - 64MB |
Heavy- Multimedia use such as video, graphics, music, voice recognition, design, complex images |
64MB - 128MB |
LINUX ® |
The Linux operating system is quickly gaining popularity as an alternative to Microsoft Windows. It includes true multitasking, virtual memory, shared libraries, demand loading, proper memory management, TCP/IP networking, and other features consistent with Unix-type systems.
Baseline: 48MB - 112MB
Optimal: 112MB - 512MB
|
|
Administrative & Service |
Light- Word processing, email, data-entry |
48MB - 80MB |
Medium- Fax /communications, database administration, spreadsheets; >2 applications open at a time |
48MB - 112MB |
Heavy- Complex documents, accounting, business graphics, presentation software, network connectivity |
80MB - 240MB |
|
Executives & Analysts |
Light- Proposals, reports, spreadsheets, business graphics, databases, scheduling, presentations |
48MB - 80MB |
Medium- Complex presentations, sales/market analysis, project management, Internet access |
80MB - 112MB |
Heavy- Statistical applications, large databases, research/technical analysis, complex presentations, video conferencing |
112MB - 512MB |
|
Engineers & Designers |
Light- Page layout, 2 - 4 color line drawings, simple image manipulation, simple graphics |
80MB - 112MB |
Medium- 2D CAD, rendering, multimedia presentations, simple photo-editing, Web development |
112MB - 512MB |
Heavy- Animation, complex photo-editing, real-time video, 3D CAD, solid modeling, finite element analysis |
240MB - 1GB |
MACINTOSH ™ OS |
The Macintosh operating system manages memory in substantially different ways than other systems. Still, System 9.0 users will find that 48MB is a bare minimum. When using PowerMac ® applications with Internet connectivity, plan on a range between 64 and 128MB as a minimum.
Baseline: 48MB - 64MB
Optimal: 128MB - 512MB
|
|
Administrative & Service |
Light- Word processing, email, data- entry |
48MB - 64MB |
Medium- Fax /communications, database administration, spreadsheets; >2 applications open at a time |
64MB - 96MB |
Heavy- Complex documents, accounting, business graphics, presentation software, network connectivity |
96MB - 128MB |
|
Executives & Analysts |
Light- Proposals, reports, spreadsheets, business graphics, databases, scheduling, presentations |
64MB - 256MB |
Medium- Complex presentations, sales/ market analysis, project management, Internet access |
128MB - 1GB |
Heavy- Statistical applications, large databases, research/ technical analysis, complex presentations, video conferencing |
96MB - 128MB |
|
Engineers & ;Designers |
Light- Page layout, 2 - 4 color line drawings, simple image manipulation, simple graphics |
128MB - 512MB |
Medium- 2D CAD, rendering, multimedia presentations, simple photo-editing, Web development |
256MB - 1GB |
Heavy- Animation, complex photo-editing, real- ime video, 3D CAD, solid modeling, finite element analysis |
512MB - 2GB |
* Please Note: These figures reflect work done in a typical desktop environment. Higher-end workstation tasks may require up to 4GB. Naturally, a chart such as this evolves as memory needs and trends change. Over time, developers of software and operating systems will continue to add features and functionality to their products. This will continue to drive the demand for more memory. More complex character sets, like Kanji, may require more memory than the standard Roman based (English) character sets.
SERVER MEMORY REQUIREMENTS
How can you tell when a server requires more memory? Quite often, the users of the network are good indicators. If network-related activity such as email, shared applications, or printing slows down, they'll probably let their Network Administrator know. Here are a few proactive strategies that can be used to gauge whether or not a server has sufficient memory:
- Monitor server disk activity. If disk swapping is detected, it is usually a result of inadequate memory.
- Most servers have a utility that monitors CPU, memory, and disk utilization. Review this at peak usage times to measure the highest spikes in demand.
Once it's determined that a server does need more memory, there are many factors to consider when deciding on how much is enough:
What functions does the server perform (application, communication, remote access, email, Web, file, multimedia, print, database)?
Some servers hold a large amount of information in memory at once, while others process information sequentially. For example, a typical large database server does a lot of data processing; with more memory, such a server would likely run much faster because more of the records it needs for searches and queries could be held in memory - that is, "at the ready." On the other hand, compared to a database server, a typical file server can perform efficiently with less memory because its primary job is simply to transfer information rather than to process it.
What operating system does the server use?
Each server operating system manages memory differently. For example, a network operating system (NOS) such as the Novell operating system handles information much differently than an application-oriented system such as Windows NT. Windows NT's richer interface requires more memory, while the traditional Novell functions of file and print serving require less memory.
How many users access the server at one time?
Most servers are designed and configured to support a certain number of users at one time. Recent tests show that this number is directly proportional to the amount of memory in the server. As soon as the number of users exceeds maximum capacity, the server resorts to using hard disk space as virtual memory, and performance drops sharply. In recent studies with Windows NT, additional memory allowed an application server to increase by several times the number of users supported while maintaining the same level of performance.
What kind and how many processors are installed on the server?
Memory and processors affect server performance differently, but they work hand in hand. Adding memory allows more information to be handled at one time, while adding processors allows the information to be processed faster. So, if you add processing power to a system, additional memory will enable the processors to perform at their full potential.
How critical is the server's response time?
In some servers, such as Web or e-commerce servers, response time directly affects the customer experience and hence revenue. In these cases, some IT Managers choose to install more memory than they think they would ever need in order to accommodate surprise surges in use. Because server configurations involve so many variables, it's difficult to make precise recommendations with regard to memory. The following chart shows two server upgrade scenarios.
SERVER MEMORY MAP
WINDOWS ® 2000 SERVER |
Designed to help businesses of all sizes run better, Windows 2000 Server offers a manageable, reliable and internet-ready solution for today's growing enterprises. For optimal performance, consider adding more memory to take advantage of Windows 2000 Server's robust feature set. Windows 2000 Server is internet-ready and promises to run today's and tomorrow's applications better.
Baseline: 128MB
Optimal: 256MB - 1GB
|
|
Application Server |
Houses one or more applications to be accessed over a wide user base |
256MB - 4GB |
Directory Server |
Central Management of network resources |
128MB - 1GB |
Print Server |
Distributes print jobs to appropriate printers |
128MB - 512MB |
Communication Server |
Manages a variety of communications such as PBX, Voicemail, Email, and VPN |
512MB - 2GB |
Web Server |
Internet and intranet solutions |
512MB - 2GB |
Database Server |
Manages simple to complex databases of varying sizes |
256MB - 4GB |
LINUX ® |
Linux is a reliable, cost-effective alternative to traditional UNIX servers. Depending on the distribution, the Linux server platform features a variety of utilities, applications, and services.
Baseline: 64MB - 128MB
Optimal: 256MB - 1GB
|
|
Application Server |
Houses one or more applications to be accessed over a wide user base |
64MB - 4GB |
Directory Server |
Central Management of network resources |
128MB - 1GB |
Print Server |
Distributes print jobs to appropriate printers |
128MB - 512MB |
Communication Server |
Manages a variety of communications such as PBX, Voicemail, Email, and VPN |
512MB - 2GB |
Web Server |
Internet and intranet solutions |
512MB - 2GB |
Database Server |
Manages simple to complex databases of varying sizes |
256MB - 4GB |
* Please Note: These figures reflect work done in a typical server environment. Higher-end workstation tasks may require up to 4GB. Naturally, a chart such as this evolves as memory needs and trends change. Over time, developers of software and operating systems will continue to add features and functionality to their products. This will continue to drive the demand for more memory. More complex character sets, like Kanji, may require more memory than the standard Roman based (English) character sets.
Back to faq
|
|
|
|
|
|
glossary of computer terms |
Accelerated Graphics Port (AGP) - An Intel-developed interface that enables high-speed graphics. Graphics data move between the PC's graphics controller and computer memory directly, instead of being cached in video memory.
Access Time The average time (in nanoseconds) for RAM to complete one access. Access Time is composed of address setup time and latency (the time it takes to initiate a Request for data and prepare access).
ANSI (American National Standards Institute) - The U.S. organization responsible for setting information technology standards.
ASCII (American Standard Code for Information Interchange) - A method of encoding text as binary values. The ASCII coding system contains 256 combinations of 7-bit or 8-bit binary numbers to represent every possible keystroke.
Backside Bus (BSB) - The data path that runs between the CPU and L2 cache.
Bandwidth The amount of data moved on electronic lines, such as a bus, per second. bandwidth is usually measured in bits per second, bytes per second, or cycles per Second (Hertz).
Bank See memory bank.
Bank Schema A method of diagramming memory configurations. The bank schema consists of rows and/or columns that represent memory sockets on a computer board. Rows indicate independent sockets; columns represent banks.
Base Rambus The first generation of Rambus technology, first shipped in 1995.
BGA (Ball Grid Array) - A chip package having solder balls on the underside for mounting. BGA allows for a reduction in die package size, better heat dissipation, and greater module densities.
Binary A numbering system that uses combinations of 0 and 1 to represent data. Also known as Base 2.
BIOS (Basic Input-Output System) - Startup routines that prepare the computer for operation.
Bit The smallest unit of information a computer processes. A bit is 1 or 0.
Buffer A holding area for data shared by devices that operate at different speeds or have different priorities. A buffer allows a device to operate without the delays that other devices impose.
Buffered Memory A memory module that contains buffers. Buffers re-drive the signals through the memory chips and allow the module to include more memory chips. Buffered and unbuffered memory cannot be mixed. The design of the computer memory controller dictates whether memory must be buffered or unbuffered.
Burst EDO RAM (BEDO) - EDO memory that can process four memory addresses in one burst. Bus speeds range from 50MHz to 66MHz (compared to 33MHz for EDO and 25MHz for Fast Page Mode).
Burst Mode High-speed transmission of a block of data (a series of consecutive addresses) when the processor requests a single address.
Bus A data path in a computer, consisting of various parallel wires to which the CPU, memory, and all input/output devices are connected.
Bus Cycle A single transaction between main memory and the CPU.
Byte Eight bits of information. The byte is the fundamental unit of computer processing; almost all specifications and measures of computer performance are in bytes or multiples thereof. See kilobytes and megabytes.
Cache Memory A small amount (normally less than 1MB) of high-speed memory residing on or close to the CPU. Cache memory supplies the processor with the most frequently requested data and instructions. Level 1 cache (primary cache) is the cache closest to the processor. Level 2 cache (secondary cache) is the cache second closest to the processor and is usually on the motherboard.
CAS (Column Address Strobe) - A memory chip signal that latches the column address of a particular location in a row-column matrix.
CAS Latency The ratio between column access time and clock cycle time. CAS Latency 2 (CL2) offers a slight performance increase over CAS Latency 3 (CL3).
ccNUMA (Cache-Coherent, Non-uniform Memory Access) - A flexible architecture that uses modular, low-cost components and offers multidimensional scaling potential to high-end servers.
Chipset Microchips that support the CPU. The chipset usually contains several controllers that govern how information travels between the processor and other components.
Chip-Scale Package (CSP) - Thin chip packaging whereby electrical connections are typically through a ball grid array. Chip-scale packaging is used in RDRAM and flash memory.
CompactFlash A small, lightweight form factor for removable storage cards. CompactFlash cards are durable, operate at low voltages, and retain data when power is off. Uses include digital cameras, cell phones, printers, handheld computers, pagers, and audio recorders.
Composite An Apple Computer, Inc. term for a memory module that used an older technology and contained more but lower-density chips.
Concurrent Rambus The second generation of Rambus technology. Concurrent Rambus has been used in graphics-based computers, digital TVs, and video game applications (such as Nintendo 64 since 1997).
Continuity RIMM (C-RIMM) - A Direct Rambus memory module that does not contain memory chips. C-RIMM provides a continuous channel for the signal. In a Direct Rambus system, open connectors must be populated with C-RIMMs.
CPU (Central Processing Unit) - The computer chip that has primary responsibility for interpreting commands and running programs. The CPU is also known as the processor or microprocessor.
Credit Card Memory A type of memory typically in laptop and notebook computers. Credit card memory is the size of a credit card.
DDR SDRAM (Double Data Rate Synchronous Dynamic Random-Access Memory) - The latest generation of SDRAM technology. Data is read on both the rising and the falling edge of the computer clock, thereby delivering twice the bandwidth of standard SDRAM. With DDR SDRAM, memory speed doubles without increasing the clock frequency.
DIMM (Dual In-line Memory Module) - A printed circuit board with gold contacts and memory devices. A DIMM is similar to a SIMM, but with this primary difference: unlike the metal leads on either side of a SIMM, which are "tied together" electrically, the leads on either side of a DIMM are electrically independent.
Direct Rambus Rambus technology's third generation, which offers a completely new DRAM architecture for high-performance PCs. Data transfers at speeds up to 800MHz over a narrow 16-bit channel, compared to current SDRAM, which operates at 100MHz on a wide 64-bit bus.
DIP (Dual In-line Package) - A DRAM component packaging. DIPs can be installed in sockets or permanently soldered into holes on the printed circuit board. The DIP package was extremely popular when memory was installed directly on the motherboard.
DRAM (Dynamic Random-Access Memory) - The most common form of RAM. DRAM can hold data for only a short time. To retain data, DRAM must be refreshed periodically. If the cell is not refreshed, the data disappear.
Dual-Banked A memory module having two banks.
Dual Channel Based on the dual channel system board designs, memory modules are installed on two separate channels, each with it's own access route to the memory controller. The dual memory channel design doubles the peak bandwidth of single memory channels. Best results occur when a matched-pair memory kit is used ensuring that the modules are identical.
Dual Independent Bus (DIB) - An Intel-developed bus architecture that offers greater bandwidth by having two separate buses (frontside and backside) access the processor. Pentium II computers have DIBs.
ECC (Error Correction Code) - A method of checking the integrity of data in DRAM. ECC provides more elaborate error detection than parity; ECC can detect multiple-bit errors and can locate and correct single-bit errors.
EDO (Extended Data-Out) - A DRAM technology that shortens the read cycle between memory and CPU. On computers that support it, EDO memory allows a CPU to access memory 10 to 20 percent faster than comparable fast-page mode memory.
EDRAM (Enhanced DRAM) - Enhanced Memory Systems, Inc. DRAM that contains a small amount of SRAM.
EEPROM (Electrically Erasable Programmable Read-Only Memory) - A memory chip that retains data content after power has been removed. EEPROM can be erased and reprogrammed within the computer or externally.
EISA (Extended ISA) - A bus architecture that extended the 16-bit ISA bus to 32 bits. EISA operates at 8MHz and has a peak data transfer rate of 33MB per second. EISA was introduced in 1988 as an open alternative to IBM's proprietary Micro Channel bus.
EOS (ECC on SIMM) - An IBM data-integrity-checking technology that features ECC data-integrity-checking on a SIMM.
EPROM (Erasable Programmable Read-Only Memory) - A programmable and reusable chip that retains content until erasure under ultraviolet light. Special equipment erases and reprograms EPROMs.
ESDRAM (Enhanced Synchronous DRAM) - A type of SDRAM developed by Enhanced Memory Systems, Inc. ESDRAM replaces expensive SRAM in embedded systems and offers comparable speed with less power consumption and lower cost.
Even Parity A type of data integrity checking whereby the parity bit checks for an even number of 1s.
Fast-Cycle RAM (FCRAM) - FCRAM is a memory technology currently being developed by Toshiba and Fujitsu. FCRAM is not intended for PC main memory but will be used in specialty applications such as high-end servers, printers, and telecommunications switching systems.
Fast-Page Mode An early form of DRAM, fast-page mode's advantage over previous page mode memory technologies was faster access to data in the same row.
Flash Memory A solid-state, nonvolatile, rewritable memory that functions like a combination of RAM and hard disk. Flash memory is durable, operates at low voltages, and retains data when power is off. Flash memory cards are used in digital cameras, cell phones, printers, handheld computers, pagers, and audio recorders.
Form Factor The size, configuration, and other specifications used to describe hardware. Examples of memory form factors are: SIMM, DIMM, RIMM, 30-pin, 72-pin, and 168-pin.
Frontside Bus (FSB) - The data path that runs between the CPU and main memory (RAM).
Gigabit Approximately 1 billion bits, or exactly 1 bit x 1,024 3 (1,073,741,824) bits.
Gigabyte Approximately 1 billion bytes, or exactly 1 byte x 1,024 3 (1,073,741,824) bytes.
Heat Spreader A sheath, usually aluminum, that covers an electronic device and dissipates heat.
Heat Sink A component, typically zinc alloy, that dissipates heat. CPUs require heat sinks.
IC (Integrated Circuit) - An electronic circuit on a semiconductor chip. The circuit includes components and connectors. A semiconductor chip is usually molded in a plastic or ceramic case and has external connector pins.
Interleaving Techniques for increasing memory speed. For example, with separate memory banks for odd and even addresses, the next byte of memory can be accessed while the current byte refreshes.
JEDEC (Joint Electron Device Engineering Council) - An Electronic Industries Alliance (EIA) body that sets semiconductor engineering standards.
Kilobit Approximately one thousand bits, or exactly 1 bit x 2 10 (1,024) bits.
Kilobyte Approximately one thousand bytes, or exactly 1 byte x 2 10 (1,024) bytes.
Level 1 Cache (L1) - Also known as primary cache, L1 Cache is a small amount of high-speed memory that resides on or very close to the processor. L1 Cache supplies the processor with the most frequently requested data and instructions.
Level 2 Cache (L2) - Also known as secondary cache, L2 Cache is a small amount of high-speed memory close to the CPU and usually on the motherboard. L2 Cache supplies the processor with the most frequently requested data and instructions. Depending on the motherboard, Level 2 cache may be upgraded.
Logic Board See Motherboard.
Megabit Approximately one million bits, or exactly 1 bit x 1,024 2 (1,048,576) bits.
Megabyte The most common term used to denote the capacity of a memory module. One megabyte equals approximately one million bytes, or exactly 1 byte x 1,024 2 (1,048,576) bytes.
Memory A computer's random-access memory. Memory temporarily holds data and instructions for the CPU. See RAM.
Memory Bank A logical unit of memory in a computer, the size of which the CPU determines. For example, a 32-bit CPU requires memory banks that provide 32 bits of information at a time. A bank can consist of one or more memory modules.
Memory Bus The bus that runs from the CPU to the memory expansion slots.
Memory Controller Hub (MCH) - The interface between the processor, Accelerated Graphics Port, and RDRAM on motherboards that use Intel's 820 or 840 chipsets.
Memory Translator Hub (MTH) - The interface that allows SDRAM memory to be supported on a Direct Rambus Channel for motherboards using Intel's 820 chipset.
Micro BGA (µBGA) - Tessera, Inc. BGA chip packaging technique allows for a reduction in diepackage size, improved heat dissipation, and greater module densities.
MicroDIMM (Micro Dual In-Line Memory Module) - Smaller than an SODIMM, MicroDIMMs are primarily used in sub-notebook computers. MicroDIMMs are available in 144-pim SDRAM and 172-pin DDR.
Motherboard Also known as the logic board, main board, or computer board, the motherboard is the computer's main board and in most cases holds all CPU, memory, and I/O functions or has expansion slots for them.
Nanosecond (ns) - One billionth of a second. Memory data access times are in nanoseconds. For example, memory access times for typical 30- and 72-pin SIMM modules range from 60 to 100 nanoseconds.
Nibble Half of an 8-bit byte, or 4 bits.
Non-Composite An Apple Computer, Inc. term for a memory module that used a new technology and contained fewer but higher-density chips. Non-composite modules were more reliable and more expensive than composite modules.
Odd Parity Data integrity checking in which the parity bit checks for an odd number of 1s.
Parity Data integrity checking that adds a single bit to each byte of data. The parity bit is used to detect errors in the other 8 bits.
PCB (Printed Circuit Board) - Generally flat, multi-layer boards made of fiberglass with electrical traces. The surface and sublayers use copper traces to provide electrical connections for chips and other components. Examples of PCBs include: mother-boards, SIMMs, and credit card memory.
PC Card (PCMCIA: Personal Computer Memory Card International Association) - A standard that allows interchangeability of various computing components on the same connector. The PCMCIA standard supports input-output devices, including memory, fax/modem, SCSI, and networking products.
PCI (Peripheral Component Interconnect) - A peripheral bus that can send 32 or 64 bits of data simultaneously. PCI offers plug-and-play capability.
Pipeline Burst Cache Cache that reduces wait states and accelerates memory access by using pipelining and bursting functions.
Pipelining A technique in which memory loads the requested memory contents into a small cache composed of SRAM, then immediately begins fetching the next memory contents. This creates a two-stage pipeline, where data is read from or written to SRAM in one stage, and data is read from or written to memory in the other stage.
Proprietary Memory Memory custom designed for a specific computer.
RAM (Random-Access Memory) - A memory cell configuration that holds data for processing by a central processing unit (CPU). Random means the CPU can retrieve data from any address within RAM. See also Memory.
Rambus (1) Rambus, Inc. develops and licenses high-performance memory logic and circuit design technology and provides licensees with product design, layout, and testing information. (2) Direct Rambus is a high-speed memory technology that uses a narrow 16-bit bus (Rambus channel) to transmit data at speeds up to 800MHz. See Rambus Channel.
Rambus Channel The data path of Rambus systems. Because of the narrow data width (two bytes), Rambus modules transfer data at up to 800MHz.
RAS A memory chip signal that latches the row address of a particular location in a row-column matrix.
Refresh Refreshing maintains data stored in DRAM. The process of refreshing electrical cells on a DRAM component is similar to recharging batteries. Different DRAM components require different refresh methods.
Refresh Rate The number of DRAM component rows that must be refreshed. Three common refresh rates are 2K, 4K and 8K.
Registered Memory SDRAM memory that contains registers directly on the module. The registers re-drive the signals through the memory chips and allow the module to be built with more memory chips. Registered and unbuffered memory cannot be mixed. The design of the computer memory controller dictates which type of memory the computer requires.
RIMM™ The trademarked name for a Direct Rambus memory module. A RIMM™ conforms to the DIMM form factor and transfers data 16 bits at a time.
RIMM Connector A Direct Rambus memory socket.
SDRAM (Synchronous DRAM) - A DRAM technology that uses a clock to synchronize signal input and output on a memory chip. The clock is coordinated with the CPU clock so the timing of the memory chips and the timing of the CPU are in synch. Synchronous DRAM saves time in executing commands and transmitting data, thereby increasing the overall performance of the computer. SDRAM allows the CPU to access memory approximately 25 percent faster than EDO memory.
Self-Refresh A memory technology that enables DRAM to refresh on its own and independent of the CPU or external refresh circuitry. Self-Refresh technology is built into the DRAM chip itself and reduces power consumption dramatically. Notebook and laptop computers use this technology.
Serial Presence Detect An EEPROM chip that contains information about size and speed, as well as other specifications and manufacturer information of a memory module.
SGRAM (Synchronous Graphics Random-Access Memory) - Video memory that includes graphics-specific read/write features. SGRAM allows data to be retrieved and modified in blocks instead of individually. Blocking reduces the number of reads and writes the memory must perform and increases the performance of the graphics controller.
SIMM (Single In-line Memory Module) - A printed circuit board having memory devices and gold or tin/lead contacts. A SIMM plugs into a computer memory expansion socket. SIMMs offer two main advantages: ease of installation and minimal consumption of board surface. A vertically mounted SIMM requires only a fraction of the space required by a horizontally mounted DRAM. A SIMM may have as few as 30 or as many as 200 pins. On a SIMM, the metal leads on either side of the board are electrically tied together.
SIMM Socket A motherboard component that holds a single SIMM.
Single-Banked A module that has only one bank or row.
SLDRAM (Synclink) - Although obsolete today, SLDRAM was a main memory technology developed by a consortium of twelve DRAM manufacturers as an alternative to Direct Rambus technology.
SMART CARD An electronic device, similar in size to a credit card, that can store data and programs while enhancing security. Applications include identification, mass transit, and banking.
SO DIMM (Small-Outline Dual In-line Memory Module) - An enhanced version of a standard DIMM. A 72-pin small-outline DIMM is about half the length of a 72-pin SIMM. 144-pin and 200-pin modules are the most common SO DIMMs today.
SO-RIMM™ The trademarked name for a Direct Rambus memory module in notebook computers. SO-RIMM™s provide memory bandwidth comparable to desktop memory configurations.
SOJ (Small-Outline J-lead) - A common form of surface-mounted DRAM packaging. An SOJ is a rectangular package with J-shaped leads on the two long sides.
Static RAM (SRAM) - A memory chip that requires power to retain content. SRAM is faster than DRAM but more expensive and bulky. A typical use for SRAM is cache memory.
Storage A data-holding device, such as a hard disk or CD-ROM.
Swapping Using part of the hard drive as memory when RAM is full. See Virtual Memory.
System Board See Motherboard.
Transmission Line Technology A technology that supports the backside bus in Direct Rambus systems.Information is quickly pipelined in simultaneous packets. The memory controller reassembles the packets for frontside bus transfer and communication to the processor.
TSOP (Thin Small-Outline Package) - A DRAM package that uses gull-wing leads on both sides. TSOP DRAM mounts directly on the surface of the printed circuit board. The TSOP package is one-third the thickness of an SOJ. TSOP components commonly occur in small-outline DIMMs and credit card memory.
Unbuffered Memory Memory that does not contain buffers or registers located on the module. Instead, these devices are located on the motherboard.
VESA Local Bus (VL-Bus) - A 32-bit local bus that runs between the CPU and peripheral devices at speeds up to 40MHz.
Virtual Channel Memory (VCM) - VCM is a memory architecture developed by NEC. VCM allows different blocks of memory-each with its own buffer-to interface separately with the controller. This way, system tasks can be assigned their own virtual channels. Information related to one function does not share buffer space with other tasks running simultaneously, thereby making overall operations much more efficient.
Virtual Memory Simulated memory. When RAM is full, the computer swaps data to the hard disk and back as needed. See Swapping.
VRAM (Video Random-Access Memory) - Dual-ported (two separate data ports) memory typically on a video or graphics card. One port is dedicated to the CRT and refreshes and updates the image. The second port is for the CPU or graphics controller and changes the image data in memory.
Wait State An inactive period for the processor. Wait states result from the different clock speeds of the processor and memory, the latter being typically slower.
Window Random Access Memory (WRAM) - Samsung Electronics' dual-ported (two separate data ports) memory typically on a video or graphics card. WRAM has a 25% higher bandwidth than VRAM but costs less.
Back to faq
|
|
|
|
|
|
ASCII character set
To insert characters in the PC extended form of the standard ASCII character set, into documents.
- Ensure that Num Lock is on.
- If the code for the character required is less than 0126, press the corresponding key on the keyboard. For example, to insert w which is code 0119 in the Symbol font , press w which is code 0119 in normal text.
- If the code for the required character is greater than 0126, hold down the Alt key and type the code for the symbol required on the numeric keypad (typing the code using the normal number keys does not work). For example, to insert Æ which is code 0198 in normal text, hold down the Alt key, type 0198 on the numeric keypad, then release the Alt key.
Back to faq |
|