User talk:Jojityumul

IBM 1981 5150

Magnetic - example of hard drive Optical - DVD CD

SuperScalar Architecture

South Chipset - PCI, Real time clock, audio system, ehternet, i/o controler hub North - AT - 2 black wires must next to each other - 2 x 6 pin connectors - power button directly to the PSU

REview IRQ DMA ISA MCA VESA PCI port address

Daisy printer dot matrix image scanner inkjet printer parity & ECC real world tech RAID DVI VGA comp hardware

Flash solid state - not movable

Diver files INF to regnice the driver .SYS, .DLL. VxD. CAT catalog file sysbackup folder /backup /restore /scanreg

multiple rchitectures -x86 -power pc - for mac -MIPS -alpha

-kernel mode windows files, driver signing

user mode- application

subsystem -ntvdn.exe -win16 -win32

Session 2: Hard Disk Drive

Hard drives were introduced in 1980 by Shugart Technology. Hard drives are magnetic storage devices that have metal platters coated with magnetic material. Information is stored on flat circular disks called “Platters”; platters are mounted on a spindle that is rotated around 5400 RPM. Heads are located on the actuator arm moves back and forth to read or write data on the media. Entire unit is sealed in a vacuum to prevent dust from contaminating the drive. Hard drives are connected usually using IDE or SCSI interface; recent hard drives use USB or SATA. Hard drives use the power supply from the SMPS using a berg connector.

Session 2: SCSI

Small Computer System Interface (pronounced "Scuzzy") is a standard for high performance interface, most commonly found in high-end workstations and servers because of its performance. SCSI allows a wide range of devices including storage, scanners, printers and backup devices. Original SCSI standard allow up to 7 devices to be daisy-chained; SCSI-2 supports use of up to 15 devices. On Personal computers that do not have SCSI controllers, a SCSI controller card is required to add SCSI devices. SCSI also allows devices to be internal or external with a maximum distance of 12 meters. SCSI controllers are usually found built-in with workstation or server class motherboards; SCSI adapters can be added through expansion slots if the SCSI controllers are not built-in with the motherboard.

Session 2: Parity and ECC

Parity & ECC

RAM parity determines whether a random access memory unit stores a parity bit for error detection purposes. Non-parity RAM does not include a parity bit, and parity RAM does. Parity RAM requires one additional bit to be stored with each byte of information, decreasing the information storage capacity per chip compared to non-parity RAM manufactured with the same technology. Parity RAM may also have worse memory access performance than non-parity RAM.

The fundamental reason to have parity RAM is to detect the fact that a memory error (bit dropout) has occurred. Undetected memory errors can have varying results; from simply annoying to catastrophic. In the case of the home PC where data integrity may be of little importance, non-parity memory is an affordable option. However, if any sort of data integrity is required, parity memory would be the minimum level of protection. Further levels of protection such as detection and correction codes may also be warranted in the case of an application with a requirement for high availability.

Logic parity RAM is non-parity RAM that can be used in computers that require parity RAM. Logic parity RAM recalculates the parity bit each time a byte is read from the memory, instead of storing the parity bit when the memory is written to. Therefore logic parity RAM has no error detection capability.

RAM with ECC or Error Correction Code can detect and correct errors. As with parity RAM, additional information needs to be stored and more processing needs to be done, making ECC RAM more expensive and sometimes slower than non-parity and parity RAM. This type of memory is especially useful for any application where uptime is a concern. Failing bits in a memory word are detected and corrected on the fly with no impact to the application. The occurrence of the error is typically logged by the operating system for analysis by a technical resource. In the case where the error is persistent, server downtime can be scheduled to replace the failing memory unit. This mechanism of detection and correction is known as EEC or Extended Error Correction.

Session 2: Firewire

FireWire is a serial bus standard developed by Apple. Also known as IEEE 1394, FireWire can be used to connect up to 63 devices with speeds up to 400 Mbps. FireWire was later updated to IEEE 1394b, a standard that defines connecting up to 100 meters and up to 800 Mbps. FireWire devices are plug-n-play and hot swappable.

Session 3: ExpressCard

ExpressCard is a standard that replaces CardBus and PC cards developed by PCMCIA. Like PCIe, ExpressCard use Serial communication yet faster bus speeds. ExpressCards are available in two form factors; ExpressCard/34 (34 mm) and ExpressCard/54 (54 mm – L-Shape). ExpressCards can supports connectivity through PCIe or USB; with PCIe it has a throughput of 2.5 Gbps (Single Lane) and with USB 2.0 with a throughput of 480 Mbps. ExpressCards are not backward compatible with CardBus devices.

Session 3: KVM

A KVM switch (with KVM being an abbreviation for Keyboard, Video or Visual Display Unit, Mouse) is a hardware device that allows a user to control multiple computers from a single keyboard, video monitor and mouse. Although multiple computers are connected to the KVM, typically a smaller number of computers can be controlled at any given time. Modern devices have also added the ability to share USB devices and speakers with multiple computers. Some KVM switches can also function in reverse - that is, a single PC can be connected to multiple monitors, keyboards, and mice.

Session 4: Overview of OS (Introduction to MS-DOS)

Introduction to Microsoft DOS

MS-DOS (short for Microsoft Disk Operating System) is an operating system commercialized by Microsoft. It was the most commonly used member of the DOS family of operating systems and was the dominant operating system for computers based on the Intel 8086 family of microprocessors, particularly the IBM PC and compatibles, during the 1980s. It was gradually replaced on consumer desktop computers by operating systems offering a graphical user interface (GUI), in particular by various generations of the Microsoft Windows operating system. It was originally known as QDOS (Quick and Dirty Operating System) and 86-DOS.

Bootable / System files: IO.SYS, MSDOS.SYS, CONFIG.SYS, COMMAND.COM, AUTOEXEC.BAT

Internal (Commmand.com)

§  Dir

§  Copy

§  Ren

§  Del

§  MD

§  CD

§  RD

§  CLS

§  Ver

External

§  Fdisk

§  Format

§  Deltree

§  Xcopy

§  Mem

§  Scandisk

File Allocation Table or FAT is a computer file system originally developed by Bill Gates and Marc McDonald in 1976/1977. It is the primary file system for various operating systems including DR-DOS, OpenDOS, freeDOS, MS-DOS, OS/2(v1.1), and Microsoft Windows (up to Windows Me). FAT supports partition size up to 2 GB.

Session 5: Disk Management

Disk Management

Disk Management is a tool (MMC Snap-In) provided with Windows 2000 to manage storage devices; In Windows 2000, a new storage type has been defined and exposed in the new Logical Disk Management snap-in; previous versions of Windows NT used only basic storage:

§  Basic storage uses normal partition tables supported by all versions of Windows, MS-DOS, and Windows NT. A disk initialized for basic storage is called a basic disk. It can hold primary partitions, extended partitions, and logical drives. Basic volumes include partitions and logical drives, as well as volumes created using Windows NT 4.0 or earlier, such as volume sets, stripe sets, mirror sets, and stripe sets with parity. In Windows 2000, these volumes are called spanned volumes, striped volumes, mirrored volumes, and RAID-5 volumes, respectively.

§  Dynamic storage is supported by Windows 2000. A disk initialized for dynamic storage is called a dynamic disk. It can hold simple volumes, spanned volumes, mirrored volumes, striped volumes, and RAID-5 volumes. With dynamic storage, you can perform disk and volume management without having to restart the operating system. Upgrading a disk from basic to dynamic can be done from the Disk Management MMC Snap-in. In Programs, go to select Disk Management from Administrative Tools. You may be prompted to upgrade your disks or you can right-click the disk to upgrade it.

The file system you use with Windows 2000 determines which of the operating system's advanced features are available to you. To use a Windows 2000-based computer to startup in Microsoft® MS-DOS®, Microsoft® Windows® 3.x, or Microsoft® Windows® 95, use FAT16. For a multiple-boot configuration with Microsoft® Windows® 95 OSR2 or Microsoft® Windows® 98 using very large volumes, you might want to use FAT32. If you are concerned with disk security, performance, and efficiency, you might choose NTFS.

FAT16, FAT32 & NTFS

·         FAT16 uses a 16-bit file allocation table entry (216 clusters).

·         FAT32 uses a 32-bit file allocation table entry. However, Windows 2000 reserves the first 4 bits of a FAT32 file allocation table entry, which means FAT32 has a theoretical maximum of 228 clusters.

·         MS-DOS, Windows 95, Windows 98, Windows NT, Windows 2000, and some UNIX operating systems can use FAT16.

·         If you have a startup failure, you can start the computer by using an MS-DOS bootable floppy disk to troubleshoot the problem.

·         FAT16 is efficient, in speed and storage, on volumes smaller than 256 MB.

·         In FAT16, The boot sector is not backed up.

·         There is no built-in file system security or compression scheme with FAT16.

·         FAT32 uses smaller clusters (4 KB for volumes up to 8 GB), so it allocates disk space more efficiently than FAT16. Depending on the size of your files, FAT32 creates the potential for tens and even hundreds of megabytes of additional free disk space on larger volumes compared to FAT16.

·         FAT32 can automatically use the backup copy of the file allocation table instead of the default copy (with FAT16, only a disk repair tool such as Chkdsk can implement the backup).

·         The boot sector is automatically backed up at a specified location on the volume, so FAT32 volumes are less susceptible to single points of failure than FAT16 volumes.

·         The largest FAT32 volume that Windows 2000 can format is 32 GB.

·         FAT32 volumes are not directly accessible from operating systems other than Windows 95 OSR2 and Windows 98.

·         If you have a startup failure, you cannot start the computer by using an MS-DOS or Windows 95 (excluding version OSR2 and later) bootable floppy disk.

·         There is no built-in file system security or compression scheme with FAT32.

·         NTFS is a recoverable file system. A user seldom needs to run a disk repair program on an NTFS volume. NTFS guarantees the consistency of the volume by using standard transaction logging and recovery techniques. In the event of a system failure, NTFS uses its log file and checkpoint information to automatically restore the consistency of the file system.

·         NTFS supports compression on volumes, folders, and files.

·         NTFS supports all Windows 2000 file system features.

·         Windows 2000 can format volumes up to 2 terabytes with NTFS.

·         NTFS manages disk space more efficiently than FAT, using smaller clusters (4 KB for volumes up to 2 terabytes).

·         The boot sector is backed up to a sector at the end of the volume.

·         NTFS minimizes the number of disk accesses required to find a file.

·         NTFS supports a native encryption system, EFS, that uses symmetric key encryption in conjunction with public key technology to prevent unauthorized access to file contents.

·         Reparse points enable new features such as volume mount points.

·         Disk quotas can be set to limit the amount of space users can consume.

·         NTFS volumes are not accessible from MS-DOS, Windows 95, or Windows 98. The advanced features of the version of NTFS included with Windows 2000 are not available in Windows NT.

Default Cluster Sizes for Volumes with Windows 2000 File Systems Volume size FAT16 cluster size FAT32 cluster size NTFS cluster size 7 MB–16 MB 2 KB Not supported 512 bytes 17 MB–32 MB 512 bytes Not supported 512 bytes 33 MB–64 MB 1 KB 512 bytes 512 bytes 65 MB–128 MB 2 KB 1 KB 512 bytes 129 MB–256 MB 4 KB 2 KB 512 bytes 257 MB–512 MB 8 KB 4 KB 512 bytes 513 MB–1,024 MB 16 KB 4 KB 1 KB 1,025 MB–2 GB 32 KB 4 KB 2 KB 2 GB–4 GB 64 KB 4 KB 4 KB 4 GB–8 GB Not supported 4 KB 4 KB 8 GB–16 GB Not supported 8 KB 4 KB 16 GB–32 GB Not supported 16 KB 4 KB 32 GB–2 TB Not supported Not supported 4 KB

Session 6: Backup

The Backup utility helps you protect data from accidental loss if your system experiences hardware or storage media failure. For example, you can use Backup to create a duplicate copy of the data on your hard disk and then archive the data on another storage device. The backup storage medium can be a logical drive such as your hard drive, or a separate storage device such as a removable disk, or an entire library of disks or tapes organized into a media pool and controlled by a robotic changer. If the original data on your hard disk is accidentally erased or overwritten, or becomes inaccessible because of a hard disk malfunction, you can easily restore the data from the archived copy. Using Backup, you can:

§  Archive selected files and folders on your hard disk.

§  Restore the archived files and folders to your hard disk or any other disk you can access.

§  Use Automated System Recovery to save and restore all the system files and configuration settings needed to recover from a complete system failure.

§  Make a copy of any Remote Storage data and any data stored in mounted drives.

§  Make a copy of your computer's System State, which includes the system files, the registry, Component Services, the Active Directory database, and the Certificate Services database.

§  Make a copy of your computer's system partition, boot partition, and the files needed to start up your system in case of computer or network failure.

§  Schedule regular backups to keep your archived data up-to-date.

Session 6: System Restore

In the event of a system problem, you can restore your computer to a previous state without losing your personal data files (such as documents, Internet favorites, and your e-mail). System Restore monitors changes to your computer, and periodically makes easily identifiable restore points. These restore points allow you to revert your system back to a previous state. You can also create and name your own restore points at any time.

Session 7: Startup Options

Safe Mode is a diagnostic tool for troubleshooting problems with starting and running Windows XP. Safe Mode allows the user to specifically control how the computer starts Windows XP. If the computer fails to properly start up, restart Windows XP in Safe Mode to troubleshoot the problem. To do this, press F8 while the message "For troubleshooting and advanced startup options for Windows XP, press F8" is displayed. Once the Windows XP Advanced Options Menu is displayed, you can start the computer in Safe Mode or press ESC to return to the normal startup menu.

§  Safe Mode: Loads the minimum required basic device drivers and system services to start the system. Programs located in the Startup Program group are not started. Starts using only basic files and drivers (mouse, except serial mice; monitor; keyboard; mass storage; base video; default system services; and no network connections). If your computer does not start successfully using safe mode, you might need to use the Recovery Console feature to repair your system.

§  Safe Mode with Networking: Similar to standard Safe Mode, but also adds essential services and drivers needed to start networking. Safe Mode with Networking allows Group Policy to be implemented, including those implemented by the server during the logon process and those configured on the local computer.

§  Safe Mode with Command Prompt: Similar to standard Safe Mode but loads the command interpreter instead of Explorer.exe as the user shell.

§  Enable Boot Logging: Creates a log file, Ntbtlog.txt in the %systemroot% folder, during normal startup, which logs the name and status of all drivers loaded into memory.

§  Enable VGA Mode: Starts the computer in basic VGA mode in cases of corruption or incompatibility of currently installed video driver.

§  Last Known Good Configuration: Reverts to the last successfully started system configuration.

§  Directory Services Restore Mode: Only applies to Windows 2000 domain controllers. Displays system information such as the number of processors, amount of main memory, Service Pack status, and build number during startup.

§  Debugging Mode: Starts while sending debug information through a serial cable to another computer.

Session 7: Ways to Network Personal Computers

§  Serial Port

§  Peer-to-Peer Connection (Cross Over)

§  Hub, Switch

§  SOHO Routers

§  Easy Transfer Cable (USB, released inline with Vista)

Session 7: Introduction to Networking

Networks consist of one or more computers and/or devices connected in order to share the resources. Resources include any device like Printer, CDROM, Hard Drives to even sharing internet connections. Networks can be wired or wireless depending on the infrastructure involved and there are several ways to form a network today.

Two types of networks exist:

1.    Peer-to-Peer: Typically good for up to 10 -15 computers, each computer can act both as a  server as well as an client. P2P networks are simple to setup and use, normally Home and Small office networks fall in this category. P2P networks are also referred to as the Workgroup model. Any machine capable of running Windows 95, 98, ME, 2000 Professional, XP can be used in a Peer-to-Peer network.

2.    Client / Server: Large networks that consist of 10 to hundreds of computers that may have dedicated servers and devices. Office networks that require tight security and centralized administration fall in this category. Common types include File Servers, Print Servers, Mail Servers, Application Servers. Client/Server networks are sometimes referred to as the domain model. Specialized server operating systems such as Novell NetWare, Microsoft Windows NT Server are used in a Client/Server Network.

Term: Clients are referred to as "Service Requestors" and Servers as "Service Providers". Any machine that request a service is called as the client and machines that fulfill the requests is called the client.

Most networks have a combination of both Peer-to-Peer and Client/Server models. For example, you may be logging on to the workstation using a domain account but sharing and accessing files from other machines in the network.

§  File Servers: File servers are machines that are dedicated for storing data on a network. Dedicated file servers can help to centralize, share and secure data. Typical file servers have huge storage capacity depending on the number of users and the amount of data to be stored.

§  Print Servers: Print servers can help users to access shared printers in a network. Print Servers have the capability to manage single or multiple printers in a network and even manage specific printer access to users.

§  Mail Servers: Mail Servers operate to provide e-mail access to users. Mail Servers manage e-mail accounts, quota and restrict users to send or receive emails from specific domains. Mail Servers may also incorporate with Anti-virus and Anti-Spam software to scan and filter emails.

§  Database Servers: Database servers can provide access to specific portion of the database based on user requests, users need not download the entire database to look for information.

§  Domain Controllers: Domain Controllers can help administrators to centralize everything that is connected to the network thus keeping the network secure and isolate from unauthorized users.

§  Directory Servers: Directory Servers store and provide data in an hierarchical and logical manner. Most commonly LDAP is used for querying the directory.

Session 7: Overview of the OSI Model

Application Layer Referred to as Layer 7 Provides the interface to the applications (Networking based) Users interact with the application HTTP, FTP, Telnet, POP3, SMTP, SNMP Presentation Layer Referred to as layer 6 Provides data transformation (Encryption / Decryption, Compression / Decompression) MIME, SSL, TLS Session Layer Referred to as layer 5 Establish and Manage session connections between applications TCP, UDP, NetBIOS, Named Pipes Transport Layer Referred to as layer 4 Flow control, Assembly / Disassembly of data Connection-Oriented (WWW Requests, File Transfers...) / Connection-less (DNS Queries, Browser Service) TCP, UDP, SPX, NetBEUI Network Layer Referred to as layer 3 Logical Addressing, Routing IP, IPX, RIP, OSPF, ICMP, ATM Routers operate at this layer Data Link Layer Referred to as layer 2 Provides the functional and procedural means to transfer data (Topology...) Divided into Media Access Control (MAC) layer and Logical Link Control (LLC) layer LLC Connects the data link layer to protocols such as IP at the Network Layer, LLC acts as an mediator between network protocols and network types MAC connects the data link layer to physical connection and provide with the MAC Address PPP, SLIP, Ethernet, Token Ring, Fibre Channel, Frame Relay Bridges and Switches operate at this layer Physical Layer Referred to as layer 1 Defines Electrical and Physical specifications for devices Modulation / Conversion of Signals 10BASE-T, 100BASE-TX, DSL, IEEE 802.11, RS-232

Session 7: General Protection Fault

A General Protection Fault (GPF) in the Intel x86 and AMD x86-64 architectures, and other unrelated architectures, is a fault (a type of interrupt) which can encompass several cases where protection mechanisms within the processor architecture are violated by any of the programs that are running, whether it be the kernel or user program. GPF are reported as:

§  This program has performed an illegal operation and will be shut down. (Windows 9x)

§  [Program Name] has generated errors and will be closed by Windows. (Windows 2000)

§  [Program Name/Description] has encountered a problem and needs to close. We are sorry for the inconvenience. (Windows XP)

§  [Program Name/Description] has stopped working. (Windows Vista)

Session 8: Name Resolution

Session 8: Ports and Sockets

Session 8: IP addressing

Session 8: Twisted pair

Session 8: Dial-up Access

Session 8: Networking Contâ€™d

Session 8: Utilities

Session 8: Protocol

Session 9: Software Applications

Session 10: Overview of active directory. (Group Policy)

Lab: Navigate Task Manager in XP

Lab: Navigate MSCONFIG on Win XP

Lab: Navigate MSINFO32 on Win XP

Lab: Navigating Add/Remove Windows Components in Add or Remove Programs

Lab: Navigating Shared Folders

Demo: Installing Active Directory

Activity: Search features comparison between XP Home and XP Pro

<!DOCTYPE HTML PUBLIC "-//W3C//DTD HTML 4.01 Transitional//EN" "http://www.w3.org/TR/html4/l oose.dtd">

var defaultTextAreaValue = '[TT]: \n\n[OS]: \n\n[PH#]: \n\n[ISSUE DESCRIBED BY MEMBER]: \n\n[TREATED AS/ERROR MESSAGE]: \n\n[RECENT CHANGES]: \n\n[ARTICLE ID]: \n\n[CONNECTION HISTORY]: \n\n[STEPS]: \n\n[CALL DURATION]:\n[REF#(Y/N)]:\n[SUMMARY(Y/N)]:\n[CATEGORY] \n-' ;

 MyPAD 

body { background-color: #ffffff; }

   

   



 /***********************************************
 * Memory Scroller script- © Dynamic Drive DHTML code library (www.dynamicdrive.com)
 * This notice MUST stay intact for legal use
 * Visit Dynamic Drive at http://www.dynamicdrive.com/ for full source code

var memorywidth="125px" //scroller width var memoryheight="10px" //scroller height var memorybgcolor="#ffffff" //scroller background var memorypadding="2px" //padding applied to the scroller. 0 for non. var borderCSS="border: 1px solid black;" //Border CSS, applied to scroller to give border.

var memoryspeed=2 //Scroller speed (larger is faster 1-10) var pauseit=1 //Pause scroller onMousever (0=no. 1=yes)?

var persistlastviewedmsg=1 //should scroller's position persist after users navigate away (1=yes, 0=no)? var persistmsgbehavior="onload" //set to "onload" or "onclick".

//Specify the scroller's content (don't delete tag) //Keep all content on ONE line, and backslash any single quotations (ie: that\'s great):

var memorycontent=' TEAM MATT: Abigaile "GURL" Carreon, Eugene "Typhoon" Dizon, Lezley "Mommy Lez" Panlaqui, Mark "The Rookie" Tuazon, Jevelon "Rakista" Canlas, Joy "Snob" Almario, Andrew "Bangag" Nicolas, Gil Jay "DACANAY" Tanganco, Ryan "IRATE" Catacutan, Sheila "Ewan ko" Santos, Kristofer "I Will resign" Lingat, Evangeline "Blackie" Galvez, Karen "So Quiet" Agapito, MATT ('_')V '

////NO NEED TO EDIT BELOW THIS LINE//////////// var combinedcssTable="width:"+(parseInt(memorywidth)+6)+"px;background-color:"+memorybgcolor+";padding:"+memorypadding+";"+borderCSS+";" var combinedcss="width:"+memorywidth+";height:"+memoryheight+";"

var divonclick=(persistlastviewedmsg && persistmsgbehavior=="onclick")? 'onClick="savelastmsg" ' : '' memoryspeed=(document.all)? memoryspeed : Math.max(1, memoryspeed-1) //slow speed down by 1 for NS var copyspeed=memoryspeed var pausespeed=(pauseit==0)? copyspeed: 0 var iedom=document.all||document.getElementById if (iedom) document.write(' '+memorycontent+' ') var actualwidth='' var memoryscroller

if (window.addEventListener) window.addEventListener("load", populatescroller, false) else if (window.attachEvent) window.attachEvent("onload", populatescroller) else if (document.all || document.getElementById) window.onload=populatescroller

function populatescroller{ memoryscroller=document.getElementById? document.getElementById("memoryscroller") : document.all.memoryscroller memoryscroller.style.left=parseInt(memorywidth)+8+"px" if (persistlastviewedmsg && get_cookie("lastscrollerpos")!="") revivelastmsg memoryscroller.innerHTML=memorycontent actualwidth=document.all? temp.offsetWidth : document.getElementById("temp").offsetWidth lefttime=setInterval("scrollmarquee",20) }

function get_cookie(Name) { var search = Name + "=" var returnvalue = "" if (document.cookie.length > 0) { offset = document.cookie.indexOf(search) if (offset != -1) { offset += search.length end = document.cookie.indexOf(";", offset) if (end == -1) end = document.cookie.length; returnvalue=unescape(document.cookie.substring(offset, end)) } } return returnvalue; }

function savelastmsg{ document.cookie="lastscrollerpos="+memoryscroller.style.left }

function revivelastmsg{ lastscrollerpos=parseInt(get_cookie("lastscrollerpos")) memoryscroller.style.left=parseInt(lastscrollerpos)+"px" }

if (persistlastviewedmsg && persistmsgbehavior=="onload") window.onunload=savelastmsg

function scrollmarquee{ if (parseInt(memoryscroller.style.left)>(actualwidth*(-1)+8)) memoryscroller.style.left=parseInt(memoryscroller.style.left)-copyspeed+"px" else memoryscroller.style.left=parseInt(memorywidth)+8+"px" }

if (iedom){ with (document){ document.write(' ') } }





/****************************************** //Configure below to change URL path to the snow image var snowsrc="snow.gif" // Configure below to change number of snow to render var no = 1; // Configure whether snow should disappear after x seconds (0=never): var hidesnowtime = 0; // Configure how much snow should drop down before fading ("windowheight" or "pageheight") var snowdistance = 0;
 * Snow Effect Script- By Altan d.o.o. (http://www.altan.hr/snow/index.html)
 * Visit Dynamic Drive DHTML code library (http://www.dynamicdrive.com/) for full source code
 * Last updated Nov 9th, 05' by DD. This notice must stay intact for use

///////////Stop Config//////////////////////////////////

var ie4up = (document.all) ? 1 : 0; var ns6up = (document.getElementById&&!document.all) ? 1 : 0;

function iecompattest{ return (document.compatMode && document.compatMode!="BackCompat")? document.documentElement : document.body }

var dx, xp, yp;   // coordinate and position variables var am, stx, sty; // amplitude and step variables var i, doc_width = 800, doc_height = 600; if (ns6up) { doc_width = self.innerWidth; doc_height = self.innerHeight; } else if (ie4up) { doc_width = iecompattest.clientWidth; doc_height = iecompattest.clientHeight; }

dx = new Array; xp = new Array; yp = new Array; am = new Array; stx = new Array; sty = new Array; snowsrc=(snowsrc.indexOf("dynamicdrive.com")!=-1)? "snow.gif" : snowsrc for (i = 0; i < no; ++ i) { dx[i] = 0;                       // set coordinate variables xp[i] = Math.random*(doc_width-50); // set position variables yp[i] = Math.random*doc_height; am[i] = Math.random*20;        // set amplitude variables stx[i] = 0.02 + Math.random/10; // set step variables sty[i] = 0.7 + Math.random;    // set step variables if (ie4up||ns6up) { if (i == 0) { document.write("<img src='"+snowsrc+"' border=\"0\"><\/a><\/div>"); } else { document.write("<div id=\"dot"+ i +"\" style=\"POSITION: absolute; Z-INDEX: "+ i +"; VISIBILITY: visible; TOP: 15px; LEFT: 15px;\"><img src='"+snowsrc+"' border=\"0\"><\/div>"); }   }  }

function snowIE_NS6 { // IE and NS6 main animation function doc_width = ns6up?window.innerWidth-10 : iecompattest.clientWidth-10; doc_height=(window.innerHeight && snowdistance=="windowheight")? window.innerHeight : (ie4up && snowdistance=="windowheight")? iecompattest.clientHeight : (ie4up && !window.opera && snowdistance=="pageheight")? iecompattest.scrollHeight : iecompattest.offsetHeight; for (i = 0; i < no; ++ i) { // iterate for every dot yp[i] += sty[i]; if (yp[i] > doc_height-50) { xp[i] = Math.random*(doc_width-am[i]-30); yp[i] = 0; stx[i] = 0.02 + Math.random/10; sty[i] = 0.7 + Math.random; }     dx[i] += stx[i]; document.getElementById("dot"+i).style.top=yp[i]+"px"; document.getElementById("dot"+i).style.left=xp[i] + am[i]*Math.sin(dx[i])+"px"; }   snowtimer=setTimeout("snowIE_NS6", 10); }

function hidesnow{ if (window.snowtimer) clearTimeout(snowtimer) for (i=0; i<no; i++) document.getElementById("dot"+i).style.visibility="hidden" }

if (ie4up||ns6up){ snowIE_NS6; if (hidesnowtime>0) setTimeout("hidesnow", hidesnowtime*1000) }

<body background="background1.jpg" onLoad="document.form1.textarea1.value = defaultTextAreaValue;">

<form name="form1" method="post" action="">

<textarea name="textarea2" cols="30" rows="20"> <textarea name="textarea1" cols="30" rows="20"> <input type="button" name="SelectAll" value="SelectAll" onClick="document.form1.textarea2.select;"> <input type="button" name="Select" value="Select" onClick="document.form1.textarea1.select;"> <input type="button" name="Save" value="Save" onClick="document.form1.textarea2.value = document.form1.textarea2.value + '\n' + document.form1.textarea1.value; document.form1.textarea1.value = defaultTextAreaValue;">

<a href="\\manebpfnp01\UOL_Philippines\Tech_Support\Public\SUSC\Genesis\index.htm" target="_blank">GENESIS</a> | <a href="http://www.google.com" target="_blank">GOOGLE</a>

Copyright © 2007 <a href="http://www.eloisasergio.com" target="_blank">BratyflyDesigns</a> | <a href="http://www.bratyfly.com/folio/license1" target="_blank">Creative Common License</a>