Sunday, November 26, 2006

Computer Literacy new version

1. How Computers Work

What is a computer?
- A device that accepts input - process data - stores data - produce output all according to a series of stored instructions.

Data Processing Cycle
- Data Input / Processing / Information Output / Storage

Data vs. Information
- Data - in a format computer can understand and use
- Information - in a format people can understand and use

Digital vs. Analog
- Digital device works with discrete, distinct and separate data
- Analog device works with continuous data

Data representation
- is the process of transforming diverse data into a form that computers can use for processing.
- computers typically represent data digitally.

bit - binary digit.
- computers use sequences of bits to digitally represent numbers, letters, punctuation marks, music, pictures and videos.

Numeric data - numbers that might be used in arithmetic operations.
- computers represent numeric data using the binary number system

binary number system - has only two digits 0 and 1, no numerial like "2" exists. "2" is represented in binary as "10"

Character data - letters, symbols and numerals that are not used in arithmetic operations.
- computers employ several types of codes to represent character data - ASCII / EBCDIC / Unicode

digitize - means to convert raw, analog data into digital format represented by 0s and 1s.

file header
- when a computer works with a series of 1s and 0s, how does it know which code to use?
- to avoid confusion, most computer files contain a file header with information on the code used to represent the file data.
- a file header is stored along with the file and can be read by the computer, but never appears on the screen.
- by reading the header information, a computer can tell how a file's contents were coded.

Quantifying Bits and Bytes
- Bit - One binary digit
- Byte - 8 bits
- Kilobit - 1,024 or 210 bits
- Kilobyte - 1,024 or 210 bytes
- Megabit - 1,048,576 or 220 bits
- Megabyte - 1,048,576 or 220 bytes
- Gigabit - 230 bits
- Gigabyte - 230 bytes
- Terabyte - 240 bytes
- Petabyte - 250 bytes
- Exabyte - 260 bytes

Hardware vs. Software
- Hardware is tangible / Software is intangible
- Hardware makes up by electric, electronic and mechanical equipment
- Software makes up by 1's and 0's that stored on disk or memory which allow computer to perform tasks

Integrated Circuit (IC)
- is a super-thin slice of semiconducting material packed with microscopic circuit elements, such as wires, transistors, logic gates, and resistors.

Semiconductors
- such as silicon and germanium, are substances with properties between those of a conductor (like copper) and an insulator (like wood).


Microprocessor - CPU
- Control Unit - fetches instructions and data
- Arithmetic / Logic Unit (ALU) - perform the instruction

Instruction Sets


Storage Technology
- Magnetic Storage - stores data by magnetizing microscopic particles on the disk or tape surface
- Optical Stroage - store data as microscopic light (lands) and dark (pits) spots on the disk surface.
- Solid State Storage - store data in a non-volatile, erasable, low-power chip.


2. The Operating System

Software
- A set of files that contain the instruction that a programmer has written to tell the computer how to process certain data

Software Types
- Application Software - help people carry out tasks using a computer
- System Software - operating system / device drivers / utilities - help the computer carry out its basic operating functions

What does the OS do?
- Provide a common interface for hardware and software
- Manages Processor resources - multi tasking
- Manages memory allocation and protection
- Manages files and storage resources
- Manages system security - file access and desktop access
- Maintains system integrity - error handling
- Provides a user interface (GUI or CLI)

user interface - the combination of hardware and software that helps people and computers communicate with each other.

bootstrap program - is stored in ROM and supplies the instruction needed to load the OS's core into memory when the system boot.

kernel - is the core part of the OS stays in memory all the time your computer is on, provides the most essential operating system service, such as memory management and file access.

utilities - provided by OS that you can use to interact directly with the OS to control and customize your computer equipment and work environment. utilities are loaded into memory as they are neded.

Multi tasking
- processor in the computer runs one process for a short peroid of time, then switches to the next process and so on.
- the processor executes billions of instructions per second, appears that many processes are running at the same time.

Processes
- is part of a program
- each process runs in an operating system is assigned specific information such as process ID, priority. state information and its location in memory

Cooperative vs. Preemptive Multitasking
- cooperative - one program can "hog" the processor time - cause system not stable
- preemptive - OS controls time slicing of the processor time - much more stable

Thread
- is a separate part of a process
- some OS support multi-threading
- each independent thread will handle a separate part of a process

Multi-Processing
- OS support computer with multiple CPUs
- individual processes and threads are run simultaneously on each processor
- OS support multi-processing, performance improved a lot.

Single-User OS vs. Multi-User OS
- Allow only one user to access the computer system at a time
- allows more than one user to access the computer system at one time, may through an network

Why Multi-User OS
- Share applications
- Access applications from other computers
- Quickly deploy and update applications

Software Copyright and Licensing
- Copyright - grants the author of an original "work" the exclusive right to copy, distribute and sell that "work".
- Software License - define how you may use the software
- single license - allows you to install the software on one computer or more computers but only use one at a time.
- Concurrent use license - allow the software to be installed on many computers but only a few may be in use at any one time
- other type of software licenses - Shareware / Freeware / Open Source

Document Production Software
- assists you with composing, editing, designing, printing, and electronically publishing documents
- word processing software - replaced type writers for producing documents such as reports, letters, memos, papers, and manuscripts.
- desktop publishing software - help you use graphic design techniques to enhance the format and appearance of a document, produce professional-quality output for newspapers, newsletters, brochures, magazines, and books.
- web authoring software - design and develop customized web pages that you can publish electronically on the internet .

Spreadsheet Software
- tools to create electronic spreadsheets, which uses rows and columns of numbers to create a model or representaion of a real situation.

Number crunching software
- works more like "paint by numbers" it provides a structured environment dedicated to a particular number crunching task, such as statistical analysis, mathematical modeling, or money management.

Database Software
- helps you enter, find, organize, update and report information stored in a database.

Graphics Software
- designed to help you create, manipulate, and print graphics.

Music Software
- tools to make , recording, modify digital voice and music.

Video Editing and DVD authoring Software
- a set of tools for transferring video footage from a camcorder to a computer, clipping out unwanted footage, assembling video segments in any sequence, adding special visual effects, and adding a sound track.
- tools for creating DVDs with Hollywood-style menus, just like commercial movies.

Educational and Reference Software
- helps you learn and practice new skills.
- provides a collection of information and a way to access that information.

Entertainment Software
- computer games are the most popular type of entertainment software.

Business Software
- is a broad umbrella for vertical and horizontal market software, which are designed to help businesses and organizations accomplish routine or specialized tasks.
- Vertical market software - is designed to automate specialized tasks in a specific market or business. Examples include patient management and biling software,etc.
- Horizontal market software - is generic software that just about any kind of business can use. payroll software is a good example of horizontal market software.
- Groupware - is a type of horizontal market software, designed to help several people collaborate on a single project using LAN or Internet connections.


3. Microsoft Windows XP

XP vs. Windows 9x - improved stability and reliability / better security

XP vs. Windows NT/2000
- new user interface
- simplified networking - entirely wizard driven
- improved hardware and software compatibility
- fast user switching
- remote assistance / desktop
- system restore
- enhanced support for digital media
- driver verification

XP SP2
- security center dashboard
- enhanced firewall
- improved internet explorer security
- improved wireless connectivity

Home vs. Professional
- ability to connect to a windows network
- enhanced file security (more granular / encryption)
- built-in webserver
- remote desktop support

XP Hardware requirement
- CPU: Min. 233MHz, Rec. 300+ MHz
- RAM: Min. 64MB, Rec. 128MB
- Disk Space: 1.5GB
- Video: SVGA or Higher
- CD-ROM or DVD drive
- NIC (optional)
- Internet access (optional)

Start menu default folder - Accessories / Games / Startup


4. Files and File Organization

Files
- The fundamental building block of computer systems
- A file is a collection of electronic data on a computer
- A file is assigned a name and an extension
- The extension represents the type of file

File Types
- application & system files
- files that are part of the programs and the operating system on a computer
- you should never need to alter or move these files

- Data files
- files that someone creates using software
- these are the types of files you may need to organize and backup

File Name - Maximum 256 characters

File Extensions - usually 3 characters.
- reserved characters: \/:*?<>|

File organization - Why? / How?
- Locate your files quickly
- assign access permission easily
- backup file easily

- name your file logically and descriptively
- group files logically and by required permission

Windows Explorer - a utility provided to help you manage your files

Shortcut - is a pointer to an object on the local computer or network.


5. Control Panel & Accessories


6. Compression and Encryption
reduces file size
- transfer file over Internet more effeciently
- Reduce file storage needs on disk, etd
- generally reversible

Compression ratio
- measurement of the amount of shrinkage
- e.g. 20:1 - compressed file 20 times smaller

File compression types
- Lossless compression
- file can be restored without lost data.
- .zip, .sit, .gz, .TIFF, .PCX, .GIF
- Lossy compression
- unnecessary information discarded
- "lost" cannot be recovered
- result in degradation of file quality
- .jpg, .mp3, .avi, .mpg

Lossless Compression algorithm

Dictionary-based compression
- identify common character patterns / sequences
- replace with single codeword, or symbol
- symbol points to dictionary of original characters, words.

Statistical compression
- e.g. well-known Huffman algorithm
- characters that appear frequently are recoded as short bit patterns
- that appear infrequently are assigned longer bit pattern.

Lossy Compression algorithm

Spatial compression
- e.g. Run-length encoding (RLE)- an example of a lossless spatial compression
- replace patterns of pixels with code indicating number of pixels and their colours.
- JPEG is lossy version of RLE encoding applied to images.
- jpeg tweaks colours in adjoing pixels to same color where possible, RLE then can be appliced. but data will be lost.

Temporal compression
- reduce data between vido frames, audio samples
- key frames contain all data generated at major intervals
- only store change in data of new frames from key frame
- if even slight changes between frames eliminated - lossy
- MPEG use temporal and spatial algorithms (both lossy)


7. Multiple users and accounts

Types of User Accounts - Computer Administrator / Limited / Guest

Passwords - up to 14 characters

Best password practices
- rename the administrator and guest account to prevent hacking
- create a second administrator account. only use when installing hardware and software, and creating user accounts.
- creating limnited user account for all people using the computer including yourself

username - max 20 characters, not case sensitive


8. Computer Network

network computers advantageous
- sharing networked hardware and software can reduce cost
- sharing networked hardware can provide acces to a wide range of services and specialized peripheral devices
- sharing data on a network is easy
- networks enable people to work together regardless of time and place.

Bandwidth - is the transmission capacity of a communication channel, usually meausred in bits per second (bps)

Sharing vs. Security
- Sharing rights are the restrictions based on access through a network
- Security rights are restrictions hased on local or network access and apply in additon to the sharing rights.
- e.g. someone sitting at a computer may be able to access and change myFile.doc, however coming over the network they may only be able to read it.

Network Classifications
- Geographical Scope - PAN / LAN / MAN / WAN
- Organizational Structure - Peer to Peer / Client-Server
- Physical Topology - Star / Tree / Ring / Bus / Mesh
- Communication protocols - TCP/IP; NetBios/NetBEUI; AppleTalk; IPX/SPX
- Network links - cables
- Bandwidth

Hostname
- the unique "English" name by which a network resource (commonly a computer) is known on a network.

9. Backup, Virus, Firewall, Troubleshooting

Backup
- data backup - a copy of a file or the content of a disk drive
- provides the best all-round security for your data
- is usually on a different storage medium from the original files
- the exact steps you follow depend on your backup equipment, the software you use to make backups, and your personal backup plan

Backup Best Practices
- don't get caught without a backup of your important data!
- use offsite storage - protect your data from fire, thief and building damage by storing an additional copy elsewhere.
- set regimented schedule, maintain it

Virus and malware
- by definition a virus is a program that ** replicates ** itself and often cause damage to your computer
- there are many threats other than just viruses, these are often grouped as malware.
- can be destructive in numerous way
- deleting / corruping data and / or program files
- compromising privacy and secure transactions
- overloading network and servers
- modern viruses often need no interaction by you - they will install and run by themselves

Types of viruses and malware
- File Virus - attaches to a program file and replicates every time the program is launched
- Email Virus - replicates using your email address book
- Worm - replicates by exploiting known OS and server bugs
- Trojan Horse - (doesn't replicate) Virus disguised to look like a regular program / game
- spyware (doesn't replicate) - software that is installed deceptively and compromises your privacy
- phishing (doesn't replicate) - misleads you into thinking that you are at a website you trust

Virus Symptoms
- Strange messages on computer screen
- sluggish system performance
- inability to access your drivers
- missing or corrupt data
- slow network performance
- programs that won't launch
- denial of service
- browser reconfiguration
- access confidential information
- disable antivirus and firewall software

Virus and system protection
- regularly backup files so damage is minimized if virus attack occurs
- install commercial virus-detection SW
- update virus-detection SW regularly
- install malware / spyware detection software
- keep up to date with operating system and other software patches
- run a software firewall
- don't open attachment from unknown sources
- never give out password
- do as much as possible to confirm the site you are at before entering confidential information

Firewall
- Security system that acts as protective boundary between network and outside or between your computer and the network
- restricts what is transmitted, between your computer and the internet / lan

Hardware vs. Software Firewall
- hardware device sits at the connection point between your network and the internet - protects you from harmful content on the internet
- software is installed on your computer and protect you from harmful content that may be on your local network
- doesn't hurt to use both

Safe Mode
- allows you to boot the computer without loading any drivers
- will help you solve any driver related problems
- help clean up some viruses - run antivirus SW in safe mode
- to start in safe mode hit F8 while the cmputer is booting

Performance Issues
- insufficient RAM
- insufficient remaining hard drive space
- virus infection
- spyware infestation
- faulty program
- Too many things loaded at startup
- Fragmented hard drive
- etc.

Performance Issues possible solutions
- use the processes list to determine if any program have a memory leak ( use lots of RAM) Check for updates
- increase the RAM
- Check the free space on your hard drive
- use the disk cleanup wizard to help free up space on your hard drive
- De-frag hard drive
- scan for viruses and spyware
- etc.

Hardware Problem
- check for loose cables (power/data cables) inside and outside
- blow out accumulated dust (don't vacuum)
- ensure no diskette is in the floppy drive
- keep your drivers up to date
- view hardware status in Device Manager
- if a driver seems to be causing problems, use the driver rollback feature in winxp
- for previous version of windows, keep at least one earlier version of the driver install file

Hardware Failure
- may be caused by power surge / bumping computer / short circuit / faulty hardware
- determine which component is damaged
- may be obvious burns
- use a process of elimination
- hard drive failure means reformat or replace

Software problems
- try uninstalling and then re-installing - rebooting in between
- determine when SW last worked, and what has changed since then
- use Windows XP System Restore feature
- use the Program Compatibility Wizard


Network problems
- determine the area affected
- one computer indicates problem may be:
- software
- hardware driver
- network card
- network adapter (patch) cable to wall drop
- cable from wall to switch or hub

- many computers affected in an area - problem probably in a switch
- all computer affected - problem probably in a major router
- utilities - ping : determine if host is responding / tracert: trace route to host

Remote Assistant
- Tool found in all versions of windows xp that allows a remote user to assist you
- host send invitation by IM or email
- remote user connects and can view and text chat
- host can give full control to remote user

Friday, October 27, 2006

Encryption Technology General Information

[ Concepts ]

Plaintext
this is the original message which has not yet been encrypted(or an algorithm will applied to).

Ciphertext
This is the encrypted or scrambled message produced by applying the algorithm to the plaintext message using the secret key.

Encryption
The process of scrambling data according to a mathematical formula or algorithm so that the data is unintelligible to all but the intended recipients. In the context of security requirements, encryption enables both privacy (confidentiality of data) and access control (ensuring that the data is accessed only by those who are authorized to do so).

Decryption
The process of descrambling the encoded data to render a secret message intelligible to the intended recipients.

Cryptography
The science of encoding (encrypting) and decoding (decrypting) messages and information in secret code.

Cryptographic algorithm


Key
Formally called cryptographic key, is a sequence of symbols, represented in binary form as a string of bits, which controls the encryption algorithm (the mathematical transformation of plain text into encoded text). The relationship between encrypted messages and their keys is very much like that between locks and keys. Just as a lock can be opened only with the right key, an encrypted message can be decrypted only with the right key. The widely used U.S. Data Encryption Standard (DES) employs a 56-bit key. Generally, the longer the key, the stronger the algorithm.

Strength
One of the main points to make about electronic encryption is there are many qualities, or strengths of it. The systems range from one that's never been broken into and never will be, to encryption that looks scrambled and impenetrable to a novice, but can be broken into by an expert in seconds -- without the use of computers. The strength of encryption technology is determined by the number of bits used in the encryption process. The higher the number of bits used to encrypt, the stronger the encryption technology. For example, IDEA (128-bit key) is stronger than DES (56-bit key). This means that the DES technology would be easier to "crack."


[ How Encryption Works ]
There are two dominant forms of encryption technology that are used all over the world: Symmetric Key Encryption, and Public Key Encryption. Although they work in different ways, they both have the same functional uses.

Symmetric Key Encryption


Public Key Encryption


Practical Uses of the Two Types of Encryption
In practice, Public-Key Encryption (like RSA) is not used to encrypt messages. Public-Key Encryption is secure and convenient, but heavy on computation. Most messages would take a long time to encrypt and decrypt, even with today's computers. Instead, Public-Key Encryption is used as a secure way to send a key for a Symmetric Key Encryption (like DES and IDEA).

Example:
1. you create a file (like an e-mail message).
2. the file is encrypted using symmetric key encryption.
3. The Symmetric Key is encrypted using the receiving computer's Public Key.
4. both encrypted items (file and the Symmetric Key) are sent to the receiving computer.
5. the receiving computer use its private key to decode (decryption) the Symmetric Key.
6. the receiving computer then uses the included symmetric key to decode the original file.




Wednesday, October 04, 2006

computer literacy knowledgebase

data: refers to the symbols that represent facts, objects, and ideas.
information: data becomes information when it is presented in a format that people can understand and use.


stored program: a series of instructions for a computing task can be loaded into a computer's memory.

computer file: usually referred to simply as a file, is a named collection of data that exists on a storage medium, such as a hard disk, floppy disk, or CD.

data file: contains data that can be processed.

executable file: contains the programs or instructions that tell a computer how to perform a specific task.

Application software: is a set of computer program that helps a person carry out a task.

Operating System: is essentially the master controller for all the activities that take place within a computer. Operating system are classified as system software.

What does the OS do?
1. provides a common interface for hardware and software
2. manages processor resources - multi tasking
3. manages memory allocation and protection
4. manages files and storage resources
5. manages system security - file access and desktop access
6. maintains system integrity - error handling
7. provides a user interface.

A process is part of a program
A thread is a separate part of a process

Why multi-user OS?
1. share applications
2. access applications from other computers
3. quickly deply and update applications

binary digits: "bit"

digitize: to convert raw, analog data into digital format represented by 0s and 1s.

Bit: One binary digit./ Byte: 8 bits./ Kilobit: 1,024 or 2(10) bits./ Kilobyte: 1,024 or 2(10) bytes./ Megabit: 1,048,576 or 2(20) bits./ Megabyte: 1,048,576 or 2(20) bytes./ Gigabit: 2(30) bits./ Gigabyte: 2(30) bytes./ Terabyte: 2(40) bytes./ Petabyte: 2(50) bytes./ Exabyte: 2(60) bytes.

integrated circuit: "IC", is a super-thin slice of semiconducting material packed with microscopic circuit elements, such as wires, transistors, capacitors, logic gates, and resistors.

Semiconductor: semiconducting materials such as silicon and germanium, are substances with properties between those of a conductor and an insulator.
binary number system: "base 2", has only two digits 0 and 1 represent numeric data in computer.

microprocessor: is an integrated circuit designed to process instructions.

ALU: arithmetic logic unit, performs arithmetic operations, such as addition and subtraction.
the ALU is responsible for performing arithmetic and logical operations. It use registers to hold data ready to be processed. When it gets the go-ahead signal from the control unit, the ALU processes the data and places the result in an accumulator. From the accumulator, the data can be sent to RAM or used for furhter processing.

registers: ALU uses it to hold data that is being processed.

control unit: fetches each instruction, give the ALU the green light to begin processing.

instruction set: the list of instructions that a microprocessor can perform, are hard-wired into the processor's circuitry and include basic arithmetic and logical operations, fetching data, and clearing registers. a computer can perform very complex tasks, by performing a combination of simple tasks from its instruction set.

Storage device: is the mechanical apparatus that records and retrieves data from a storage medium.

magnetic storage: stores data by magnetizing microscopic particles on the disk or tape surface.

optical storage: store data as microscopic light and dark spots on the disk surface. the dark spots are called pits. the lighter, non-pitted surface areas are called lands.

solid state storage: stores data in a non-volatile, erasable, low-power chip. The chip's circuitry is arranged as a grid and each cell in the grid contain two transistors that act as gates.

Access time: is the average time it takes a computer to locate data on the storage medium and read it. "random access" "sequential access"

Data transfer rate: is the amount of data a stroage device can move per second from the storage medium to the computer.

head crash: if a hard disk read-write head runs into a dust particle or some other contaminant on the disk, it might cause head crash, which damages some of the data on the disk.

Dot pitch: is a measure of image clarity. A smaller dot pitch means a crisper image. Technically, dot pitch is the distance in millimeters between like-colored pixels - the small dots of light that form a an image. a dot pitch between .26 and .23 is typical for today's monitors.

refresh rate: also referred to as vertical scan rate, is the speed at which the screen is repainted.

VGA:640x480 /SVGA:800x600/ XGA:1024x768/ SXGA:1280x1024/ UXGA:1600x1200.

Word size: refers to the number of bits that a microprocessor can manipulate at one time.

programming language: sometimes refered to as computer language provide the tools a programmer uses to create software and produce a lengthy list of instructions, called source code.

machine language: the instruction set that is "hard wired" within the microprocessor's circuits. Therefore, instructions written in a high-level language must be translated into machine language before a computer can use.

compiler: translates all the instructions in a program as a single batch, and the resulting machine language instructions, called object code, are placed in a new file.

interpreter: converts one instruction at a time while the program is running.
application software: provides the computer with instructions for each use to help people carry out tasks using a computer.

system software: operating system, device drivers and utilities - is to help the computer carry out its basic operating functions.

kernel: the core part of the operating system, which provides the most essential operating system services, such as memory management and file access.

Vertical market software: is designed to automate specialized tasks in a specific market or business. examples include patient management and billing software that is specially designed for hospitals, job estimating software for construction business, and student record management software for schools.

Horizontal market software: is generic software that just about any kind of business can use. Payroll software is a good example of horizontal market software.

Groupware: is a type of horizontal market software, designed to help several people collaborate on a single project.

copyright: is a form of legal protection that grants the author of an original "work" an exclusive right to copy, distribute, sell and modify that work, except under special circumstances described by copyright laws.

software license: "license agreement", is a legal contract that defines the ways in which you may use a computer program.

shrink-wrap license: it goes into effect as soon as you open the packaging.

installation agreement: is displayed on-screen when you first install software. After reading the software license on the screen, you can indicate that you accept the terms of the license by clicking a designated button - usually labeled "ok, I agree" or "I accept". if you do not accept the terms, the software does not load and you will not be able to use it.

computer file: or simply file is defined as a named collection of data that exists on a storage medium, such as a disk, CD, DVD, or tape.


application and system files - files that are part of software programs and the operating system.
data files - files that you create yourself using application software.

winxp pro vs home?
1. ability to connect to a windows network
2. enhanced file security (more granular / encryption)
3. built-in webserver
4. remote desktop support

hardware requirement for winxp:
cpu: min. 233mhz, rec. 300+mhz
ram: min. 64mb, rec. 128mb
disk space: 1.5gb
video: svga or higher
cd-rom or dvd drive
network adapter, optional
internet access, optional

why file organizaton?
1. locate your file quickly
2. assign access permissions easily.
3. backup files easily
how?
1. name your file logically and descriptively
2. group files logically and by required permissions

control panel - it provides a central location for modifying how windows xp behaves and looks.




Monday, May 29, 2006

老友记-英语吵架必备100句(转帖)

1. You make me sick! 你真让我恶心!
2. What’s wrong with you? 你怎么回事?
3. I’m very disappointed. 真让我失望。
5. You’re a jerk! 你是个废物/混球!
6. Don’t talk to me like that! 别那样和我说话!
7. Who do you think you are? 你以为你是谁?
8. What’s your problem? 你怎么回事啊?
9. I hate you! 我讨厌你!
10. I don’t want to see your face! 我不愿再见到你!
11. You’re crazy! 你疯了!
12. Are you insane/crazy/out of your mind? 你疯了吗?
13. Don’t bother me. 别烦我。
14. Knock it off. 少来这一套。
15. Get out of my face. 从我面前消失!
16. Leave me alone. 走开。
17. Get lost.滚开!
18. Take a hike! 哪儿凉快哪儿歇着去吧。
19. You piss me off. 你气死我了。
20. It’s none of your business. 关你屁事!
21. What’s the meaning of this? 这是什么意思?
22. How dare you! 你敢!
23. Cut it out. 省省吧。
24. You stupid jerk! 你这蠢*!
25. You have a lot of nerve. 脸皮真厚。
26. I’m fed up. 我厌倦了。
27. I can’t take it anymore. 我受不了了!(李阳老师常用)
28. I’ve had enough of your garbage. 我听腻了你的废话。
29. Shut up! 闭嘴!
30. What do you want? 你想怎么样?
31. Do you know what time it is? 你知道现在都几点吗?
32. What were you thinking? 你脑子进水啊?
33. How can you say that? 你怎么可以这样说?
34. Who says? 谁说的?
35. That’s what you think! 那才是你脑子里想的!
36. Don’t look at me like that. 别那样看着我。
37. What did you say? 你说什么?
38. You are out of your mind. 你脑子有毛病!
39. You make me so mad.你气死我了啦。
40. Drop dead. 去死吧!
41. Don’t give me your shoot. 别跟我胡扯。
42. Don’t give me your excuses/ No more excuses. 别找借口。
43. Nonsense! 鬼话!
44. You’re a pain in the ass. 你这讨厌鬼。
45. You’re an asshole. 你这缺德鬼。
46. You asked for it. 你自找的。
47. Get over yourself. 别自以为是。
48. You’re nothing to me. 你对我什么都不是。
49. It’s not my fault. 不是我的错。
50. You look guilty. 你看上去心虚。
51. I can’t help it. 我没办法。
52. That’s your problem. 那是你的问题。
53. I don’t want to hear it. 我不想听!
54. Get off my back. 少跟我罗嗦。
55. Give me a break. 饶了我吧。
56. Who do you think you’re talking to? 你以为你在跟谁说话?
57. Look at this mess! 看看这烂摊子!
58. You’re so careless. 你真粗心。
59. Why on earth didn’t you tell me the truth? 你到底为什么不跟我说实话?
60. I’m about to explode! 我肺都快要气炸了!
61. What a stupid idiot! 真是白痴一个!
62. I’m not going to put up with this! 我再也受不了啦!
63. I never want to see your face again! 我再也不要见到你!
64. That’s terrible. 真糟糕!
65. Just look at what you’ve done! 看看你都做了些什么!
66. I wish I had never met you. 我真后悔这辈子遇到你!
67. You’re a disgrace. 你真丢人!
68. I’ll never forgive you! 我永远都不会饶恕你!
69. Don’t nag me! 别在我面前唠叨!
70. I’m sick of it. 我都腻了。
71. Don’t you dare come back again! 你敢再回来!
72. Stop screwing/ fooling/ messing around! 别鬼混了!
73. Mind your own business! 管好你自己的事!
74. You’re just a good for nothing bum! 你真是一个废物!/ 你一无是处!
75. You’ve gone too far! 你太过分了!
76. I loathe you! 我讨厌你!
77. I detest you! 我恨你!
78. Get the hell out of here! 滚开!
79. Don’t be that way! 别那样!
80. Can’t you do anything right? 成事不足,败事有余。
81. You’re impossible. 你真不可救药。
82. Don’t touch me! 别碰我!
83. Get away from me! 离我远一点儿!
84. Get out of my life. 我不愿再见到你。/ 从我的生活中消失吧。
85. You’re a joke! 你真是一个小丑!
86. Don’t give me your attitude. 别跟我摆架子。
87. You’ll be sorry. 你会后悔的。
88. We’re through. 我们完了!
89. Look at the mess you’ve made! 你搞得一团糟!
90. You’ve ruined everything. 全都让你搞砸了。
91. I can’t believe your never. 你好大的胆子!
92. You’re away too far. 你太过分了。
93. I can’t take you any more! 我再也受不了你啦!
94. I’m telling you for the last time! 我最后再告诉你一次!
95. I could kill you! 我宰了你!
96. That’s the stupidest thing I’ve ever heard! 那是我听到的最愚蠢的事!  (比尔•盖茨常用)
97. I can’t believe a word you say. 我才不信你呢!
98. You never tell the truth! 你从来就不说实话!
99. Don’t push me ! 别逼我!
100. Enough is enough! 够了够了!

HandSpring Visor Neo (My first Handheld/PDA)



The Handspring Visor Neo combines amazing versatility and value in one infinitely expandable handheld computer. Running the popular Palm OS, it will help you keep track of your life – just like an organiser – while staying well within your budget. Butthe Visor Neo is more than just an organiser. With the unique Springboard™ expansion slot, you can turn your Visor Neo into whatever you want it to be in no time. With no drivers to load, you can just plug-and-play – simply snap in a module and it’s a digital camera, a modem, a phone and more besides!
Based on the popular Palm OS®, the Visor Neo has everything you need to organise your busy life: address book, enhanced date book, to do list, memo pad, advanced calculator and world clock. And there are thousands of other Palm-compatible applications available to download, so you can also enjoy games, guides and books on your Visor Neo. What’s more, you can even beam information and programs to other Palm users.
As if all that weren’t enough, the USB connection makes synchronising with your desktop computer really fast – and really easy. Using the USB cradle and HotSync® technology, you can back up, update or exchange information between your Visor Neo and desktop computer in seconds. You can even transfer existing Palm organiser data to your Visor Neo with just one touch (pasted from www.palm.com).
Product Information
Colour: Blue; Size: 4.8 in x 3.0 in x 0.7 in (12.2 cm x 7.6 cm x 1.8 cm); Weight: 5.4 oz. (153 g); Memory: 8 MB; Processor: 33 MHz; Display: Backlit monochrome; Battery: Alkaline (uses 2 x AAA); Features: Palm OS® /Springboard™ expansion slot /Infrared (IR) communication /Built-in microphone.
Included Software
Palm OS 3.5.2H3 /Date Book Plus /Address Book /To Do List /Memo Pad /Fast Lookup /Advanced Calculator /CityTime world clock /Graffiti® handwriting software /Mail /Expense.

IBM ThinkPad 240Z (My first private-usage laptop)


CPU: Intel PIII 600MHz (128KB L2 Cache); Memory: 128MB (64MB x 2) PC- 100 SDRAM; HDD: 20.00GB (Upgrade to 40.00GB); Video: 10.4 TFT 1024 x 768 LCD; Other: Modem, Ethernet, FDD; OS: Windows 98 (Upgrade to Windows XP Pro). More than 7 years old, served me for more than three years. Proven quality, excellent condition. IBM ThinkPad, a good choice. I's a pitty that IBM sold his PC department which include ThinkPad branch to Lenovo, so no IBM ThinkPad anymore. I'll keep my ThinkPad 240z as a remembrance after it was completely retired.