Premium Essay

Chapter Bio

In:

Submitted By Jaybrown56
Words 484
Pages 2
* IONIC BONDING * With a sodium atom (NA) and a chlorine atom (CL) the sodium atom has a outer most shell of 1 electron and 7 vacancies. With chlorines outer most shell having 7 electrons and 1 vacancies, the 1 electron from the sodium atom will be stolen by the chlorine to satisfy both outer most shells of both atoms. * Because sodium has one more positive proton than negative electron it has a positive charge (+ion) and chloride has a – charge because it has an extra negative electron. * * HYDROGEN BONDING * Atoms that are sharing don’t really steal the electrons they just hog them which ends up giving them a partial positive and partial negative charge. * In a water molecule oxygen shares electrons with hydrogen BUT keeps the electron more often. (unequal sharing is referred to as a polar covalent bond) * Oxygen ends up with a partial negative charge, hydrogen ends up with a partial positive charge. * The partially charged oxygen is attracted to the partially charged hydrogen of a nearby water molecule. * * * Water is less dense as a solid, most dense as cold water. * Water is transparent * Water is also cohesive (like things attract. H2O -- H2O) and adhesive (unlike things sticking together H2O --- Glass). * High heat capacity: Absorbs heat without rising in temp. * Water is a great solvent: It dissolves things very well. * Water buffers PH well: Resist changes in PH.

* Organic Marco Molecules * They are constructed of smaller building blocks (monomer) * The building blocks are linked together using a dehydration reaction. * Dehydration Reaction * An OH is pulled from one monomer * An H is pulled from the second monomer * The H and OH form water * The 2 monomers are now joined with a covalent

Similar Documents

Free Essay

Operation Manual

...Chapter 3 This chapter helps you power up your system and install drivers and utilities that came with the support CD. VERA 2 Starting up 3.1 Installing an operating system This motherboard supports Windows® 2000/XP and VISTA Premium operating system (OS). Always install the latest OS version and Because motherboard settings and hardware options vary, use the setup procedures presented in this chapter for general reference only. Refer to your OS documentation for more information. 3.2 Support CD information The support CD that came with the motherboard contains useful software and several utility drivers that enhance the motherboard features. The contents of the support CD are subject to change at any time without notice. Visit the ASUS website for updates. 3.2.1 Running the support CD To begin using the support CD, simply insert the CD into your CD-ROM drive. The CD automatically displays the Drivers menu if Autorun is enabled in your computer. Click on an item to install. If Autorun is NOT enabled in your computer, browse the contents of the click the ASSETUP.EXE to run the CD. 3.2.2 Drivers menu The drivers menu shows the available device drivers if the system detects installed devices. Install the necessary drivers to activate the devices. 3-2 Chapter 3: Starting up Intel Chipset Inf Update Program This item installs the Intel® Chipset INF Update Program. This driver enables Plug-n-Play INF support for the Intel®...

Words: 5285 - Pages: 22

Free Essay

Work

...1.why is all data stored in a computer in binary form? Computers are only able to read and store data in binary form, 1 or 0, on or off, yes or no, voltage or none. Binary is the simplest way to manage information. 2. What are the four primary functions of hardware? input, output, PROCESS, and Storage 3. What are the two main input devices and two main output devices? the mouse, keyboard, printer, and monitor. 4. What three things do electronic hardware devices need in order to function? power, ground return, and load. 5. How many bits are in a byte? There are eight bits in a byte. 6. What is the purpose of an expansion slot on a motherboard? Expansion slots on a motherboard are designed to accept peripheral cards that add functionality to a computer system, such as a video or a sound card. 7. Which component on the motherboard is used primarily for processing? The CPU 8. Name the two main CPU manufacturers. Intel and AMD 9. Order the following ports according to speed, placing the fastest port first: FireWire, eSATA, USB. eSATA is faster than FireWire and firewire is faster than USB. 10. What are two other names for the system bus? The PCI bus, and the PCI express bus 11. What type of output does an S/PDIF port provide? Digital output 12. Why is an SSD hard drive more reliable under rugged conditions than an IDE hard drive? SSD hard drives have no moving parts that can disintegrate under rugged conditions. Because SDD drives have...

Words: 1535 - Pages: 7

Premium Essay

List the Number and Name of Each Runlevel as Used by Fedora/Red Hat Linux Provide a Brief Explanation of Each Runlevel.

...Homework Assignment 1.1 1. List the number and name of each runlevel as used by Fedora/Red Hat Linux Provide a brief explanation of each runlevel. ID | Name | Description | 0 | Halt | Shuts down the system. | 1 | Single-user Mode | Mode for administrative tasks. | 2 | Multi-user Mode | Does not configure network interfaces and does not export networks services. | 3 | Multi-user Mode with Networking | Starts the system normally. | 4 | Not used/User-definable | For special purposes. | 5 | Start the system normally with appropriate display manager. ( with GUI ) | As runlevel 3 + display manager. | 6 | Reboot | Reboots the system. | 2. Which two runlevel should never be set as the default?  0 (HALT) and 6 (reboot) should never be set as default. 3. What script contains the default runlevel? /etc/rc <tab> 4. The init scripts for each runlevel are contained in which directory tree? Check /etc/inittab 5. What would you name the link to an init script that would start the fictitious bigd daemon early in the boot process? Open /etc/rc.local and write the script to run at boot time. 6. What would you name the link to kill the same daemon? Kill -9 <pid> 7. How would you use the service command to manually kill the bigd daemon? Kill -9 <pid /// You can get through ps for service> 8. How would use chkconfig to set the bigd daemon to start at runlevel 2 and 3? chkconfig bigd --level 23 on 9. How would you use...

Words: 1402 - Pages: 6

Free Essay

Atoms

...the front side of the case. 5. The power LED on the front panel of the system case will light. The LED on the monitor may light up or switch between orange and green after the system is on. If it complies with green standards or if it is has a power standby feature. The system will then run power-on test. While the test is running, the BIOS will alarm beeps or additional message will appear on the screen. If you do not see any thing within 30 seconds from the time you turn on the power. The system may have failed on power-on test. Recheck your jumper settings and connections or call your retailer for assistance. 6. During power-on, press key to enter BIOS setup. Follow the instructions in BIOS SETUP. 7. Power off your computer: You must first exit or shut down your operating system before switch off the power switch. For ATX power supply, you can press ATX power switching after exiting or shutting down your operating system. If you use Windows 9X, click “Start” button, click “Shut down” and then click “Shut down the computer?” The power supply should turn off after windows shut down. 2 3 Chapter 3 Introducing BIOS The BIOS is a program located on a Flash...

Words: 635 - Pages: 3

Free Essay

E Manual

...User’s Manual.......................................................................................................iv Notes for This Manual..............................................................................................................iv Safety Precautions.....................................................................................................................v Transportation Precautions....................................................................................vi Charging Your Batteries..........................................................................................vii Airplane Precautions................................................................................................vii Chapter 1: Knowing the Parts Top Side.....................................................................................................................................1-2 Bottom Side..............................................................................................................................1-5 Front Side..................................................................................................................................1-6 Right Side..................................................................................................................................1-7 Left Side......................................................................................................................................

Words: 7992 - Pages: 32

Free Essay

Expected Value of a Uniform Distribution

...Objectives A CompTIA A+ Essentials Objectives Map Topic Chapter(s) Domain 1.0 Hardware 1.1 Categorize storage devices and backup media FDD 3 HDD 3, 11 Solid state vs. magnetic Optical drives CD / DVD / RW / Blu-Ray Removable storage 11 3, 13 3, 13 11, 13, 17 Tape drive 17 Solid state (e.g. thumb drive, flash, SD cards, USB) 13 External CD-RW and hard drive 13, 11 Hot swappable devices and non-hot swappable devices 13 1.2 Explain motherboard components, types and features Form Factor 9 ATX / BTX, 9 micro ATX 9 NLX 9 I/O interfaces 3, 18, 20, 22, 23, 25 Sound 3, 20 Video 3 1219 AppA.indd 1219 12/9/09 5:58:26 PM All-In-One / CompTIA Network+ All-in-One Exam Guide / Meyers & Jernigan / 170133-8 / Appendix A CompTIA A+Certification All-in-One Exam Guide 1220 Topic Chapter(s) USB 1.1 and 2.0 3, 18 Serial 3, 18 IEEE 1394 / Firewire 3, 18 Parallel 3, 22 NIC 3, 23 Modem 3, 25 PS/2 18 Memory slots 3, 6 RIMM 6 DIMM 3, 6 SODIMM 6 SIMM 6 Processor sockets 3, 5, 9 Bus architecture 5, 8 Bus slots 8, 9, 21 PCI 8, 9 AGP 8, 9 PCIe 8, 9 AMR 9 CNR 9 PCMCIA 21 PATA 11 IDE 11 EIDE 11 SATA, eSATA 3, 11 Contrast RAID (levels 0, 1, 5) 11, 12 Chipsets 5, 7, 9 BIOS / CMOS / Firmware 7 POST 7 CMOS battery 7 ...

Words: 4550 - Pages: 19

Free Essay

Assignment Timeline

...ASSIGNMENT TIMELINE—COSC 2425   Dates | Text Chapters | Pages and sections covered | Assignments | Week 1June 6th – June 11th |  Chapter 1: Basic Concepts Chapter 2: x86 Processor Architecture | Page 1-28 Pages 29-57 | Read all material in the Getting Started Folder, read the syllabus (located on the Course Home tab), read the assignment timeline and grading sheet.Assignment 1: Introduce yourself to the class (Located in the Getting Started Folder) Quiz Chapter 1 Quiz Chapter 2 | Week 2June 12th –June 18th | Chapter 3: Assembly Language Fundamentals Chapter 4: Data Transfers, Addressing, and Arithmetic | Pages 58-93 Pages 94-131 | Quiz Chapter 3 Quiz Chapter 4 | Week 3June 19th –June 25th | Chapter 5: ProceduresChapter 6: Conditional Processing | Pages 132-179 Pages 180-228 | Quiz Chapter 5 Quiz Chapter 6 Programming Project 1 (Covers Chapters 1-6) | Week 4June 26th – July 2rd | Chapter 7: Integer Arithmetic Chapter 8: Advanced Procedures | Pages 229-269 Pages270-331 | Quiz Chapter 7 Quiz Chapter 8 | Week 5July 3rd – July 9th | Chapter 9: Strings and Arrays Chapter 10: Structures and Macros | Page 332-365 Pages 366-418 | Quiz Chapter 9 Quiz Chapter 10 Programming Project 2 (Covers Chapters 1-10 concentrating on the concepts learned in chapters 7-10) | July 4th Holiday | | | No Class | Week 6July 10th – July 12th | Comprehensive and covers all chapters (1-10) | | FINAL EXAM on Tuesday July 12th, 2011...

Words: 324 - Pages: 2

Free Essay

Eco 305 Wk 1 Homework Ch 2 - 12(a-B), 13(a-C), 14

...ECO 305 All Quiz and Homework, ECO 305 WK 3 Homework Ch 5 - 16(a-c), 17(a-d), 18(a-b); Ch 6 - 13(a-b), ECO 305 WeeK 3 Quiz 2 - Chapters 3 and 4 , ECO 305 WK 1 Homework Ch 2 - 12(a-b),13(a-c),14, ECO 305 WK 2 Homework Ch 3 - 13(a-d); Ch. 4 - 15(a-b),16(a-b), ECO 305 WK 2 Quiz 1 - Chapters 1 and 2, ECO 305 WK 5 Homework Ch 8 - 6(a-d) , ECO 305 WK 5 Quiz 4 - Chapter 7 , ECO 305 WK 6 Homework Ch 9 - 11(a-c), 12(a-c), ECO 305 WK 6 Quiz 5 - Chapter 8 - All Possible Questions, ECO 305 WK 9 Quiz 8 - Chapters 12 and 13 , ECO 305 WK 11 Quiz 10 - Chapters 16 & 17 , ECO 305 Complete Class Assignments | strayer help, ECO 305 Strayer ECO 305 Week 1, ECO 305 Week 2, ECO 305 Week 3, ECO 305 Week 4, ECO 305 Week 5, ECO 305 week 2 Assignment, ECO 305 week 3Assignment, ECO 305 week 4 Assignment, ECO 305 week 1 Assignment, ECO 305 tutorial, ECO 305 Complete Course, ECO 305 Entire Class, ECO 305 Whole Tutorial, ECO 305 tutorial, ECO 305 Summary, ECO 305 Study Guide, ECO 305 Questions , ECO 305 Answered , ECO 305 Solution, ECO 305 Final , ECO 305 Presentation, ECO 305 Universty, ECO 305 University of, ECO 305 Homework, ECO 305 Version, ECO 305 Strayer assignment, ECO 305 Strayer course, ECO...

Words: 252 - Pages: 2

Premium Essay

Saved

...IT320 Unit 5 HW 1. When a router is first powered on, it completes a four-step initialization process: 1. Preforming a power-on self test (POST) 2. Loading a bootstrap program 3. Loading an IOS 4. Loading a configuration file The last three of these steps require the router to copy the files into RAM. Normally, most routers load an IOS image that is stored in flash memory and an initial configuration stored in NVRAM. 2. Routers use the following logic, in order, to attempt to load an IOS: 1. Load a limited-function IOS if the configuration register’s last hex digit is set to 0 or 1. 2. Load an IOS based on the configuration of boot system commands in the startup-configuration file. 3. Load the first file in flash as the IOS. 4. Use TFTP broadcasts to find a TFTP server and download an IOS from that server. 5. Load a limited-function IOS from ROM. In Step 1, the configuration register is a16-bit number that Cisco routers store in a hidden area of NVRAM. It can be set in a couple of ways and can be seen using the show version command. The most commonly used way to set its value is to use the config-register global configuration command. Routers use the 4 low-order bits of the configuration register as the boot field, which tells the router what to do in the first of the preceding five decision steps. If the value of the field is set to 0, the router loads the ROMMON (ROM Monitor), which is used for password recovery. If the value is set to1, the router loads...

Words: 448 - Pages: 2

Free Essay

Knowledge Assemsment Text Book

...Knowledge Assessment Matching 1. Remote Desktop E. Based on the former Terminal Services 2. System image backup J. Saves data to a VHD file 3. BranchCache A. Conserves WAN bandwidth 4. Distributed cache mode B. Files cached on each client 5. Volume shadow copies H. Previous versions 6. Incremental backup D. Files changed since the last backup job 7. Windows RE I. Accessible from a Window 7 installation disk 8. Hosted cache mode C. Files cached on a central server 9. Windows Remote Management G. Executes PowerShell commands on remote computers 10. System restore point F. Configuration settings and registry information Multiple Choice 1. Which of the following service priority guidelines are not accurate? D. Departmental issues should be rated according to the function of the department. A problem with a computer belonging to a department that is critical to the organization, such as order entry or a customer service call center, should take precedence over a problem with a computer belonging to a department that can better tolerate a period of down time, such as research and development. 2. Place these troubleshooting steps in the correct order, using the procedure described in this lesson as your guide. B, D, C, A. B: Establishing the symptoms is the first step in troubleshooting any problem to determine exactly what is going wrong. D: Select the most probable cause. Once...

Words: 746 - Pages: 3

Free Essay

Bitlocker

...BitLocker Drive Encryption Overview 73 out of 98 rated this helpful - Rate this topic Applies To: Windows Server 2008, Windows Server 2008 R2, Windows Vista BitLocker Drive Encryption is a data protection feature available Windows Server 2008 R2 and in some editions of Windows 7. Having BitLocker integrated with the operating system addresses the threats of data theft or exposure from lost, stolen, or inappropriately decommissioned computers. Data on a lost or stolen computer is vulnerable to unauthorized access, either by running a software-attack tool against it or by transferring the computer's hard disk to a different computer. BitLocker helps mitigate unauthorized data access by enhancing file and system protections. BitLocker also helps render data inaccessible when BitLocker-protected computers are decommissioned or recycled. BitLocker provides the most protection when used with a Trusted Platform Module (TPM) version 1.2. The TPM is a hardware component installed in many newer computers by the computer manufacturers. It works with BitLocker to help protect user data and to ensure that a computer has not been tampered with while the system was offline. On computers that do not have a TPM version 1.2, you can still use BitLocker to encrypt the Windows operating system drive. However, this implementation will require the user to insert a USB startup key to start the computer or resume from hibernation, and it does not provide the pre-startup system integrity verification...

Words: 1463 - Pages: 6

Free Essay

Bios

...Introduction To sum of the differences between ROM RAM BIOS and Post I will simply define the basis of each component while defining what they do. ROM is short for (Read-only Memory) Memory which data is prerecorded on a computer. ROM is simply data that cannot be eliminated even when the computer is off. When working in ROM it is difficult or nearly impossible to change. BIOS is short for the acronym (Basic Input Output System) it is a program which stores detailed information and enable the computer to boot. In addition a ROM chip located on the motherboard, it lets you access the basic setup and ensures that the BIOS will readily be available and will not de damaged by disk failures. RAM is (Random Access Memory) Memory that can be access randomly memory that can be access without touching preceding bytes. RAM is the typical memory found in most computers or printers. In addition, RAM is a volatile memory that requires power to keep information accessible. If power is lost, then memory can be lost. Lastly Post is the self-test which is activated by Bios. The post is designed to run checks on the motherboard. It necessary to use ROM for the BIOS because the ROM retains information on the computer even while shut down whereas RAM does not. Whenever a computer is being use the information is being stored on the RAM if the is ever a power shortage or the computer lose power the information is lost. RAM does not store memory when there is no power. POST beep codes make...

Words: 356 - Pages: 2

Free Essay

Motherboard

...Motherboard Answer the following questions 5 April 2015 Tanweer Haroon DeJong May The major components of the motherboard are as follows: memory and their slots which is the computer’s memory (RAM) and is one of the most important parts of the system board. The number of chips depends on the type of computer and its capacity. Expansion cards are a typical component of non-integrated system boards a graphic card is a perfect example, but this can be integrated into the motherboard. CPU and slots is the central processing unit and it’s a highly prolific part of the computer and is located on the right of a motherboard and can be identified as a result of the heat sink or cooling fan directly on it. BIOS chip directs the CPU with respect to how it relates with other parts of the computer. Its basic input and output system chip or integrated circuit is fixed on the board and is easily identifiable. CMOS battery, the complementary metal oxide semiconductor is a small battery on the system board that powers the CMOS memory. Power supply and connectors is the electrical unit of the system and if it’s bad the system will not work. Keyboard connector are located on the motherboard and there are two main types. The AT has a round connecting interface into the motherboard and the PS/2 connector is rectangular in shape and smaller. Modern motherboards come with both. Mouse connector its connecting port is located on the motherboard and its interface is usually round. Floppy...

Words: 431 - Pages: 2

Premium Essay

Future

...Fall BIOS – Instructor: Mrs. Nicholas – NT1110 – 1 May 2014 Lavon Hawkins BIOS SUMMARY Lavon Hawkins BIOS SUMMARY BIOS BIOS: The BIOS is software which is stored on the motherboard. It tells the computer how to perform a number of basic functions such as booting and keyboard control. It is also used to identify and configure the hardware in a computer such as hard drive, floppy drive, optical drive, CPU, memory and so on. CMOS: The complementary metal oxide semiconductor is the type of semiconductor chip on the motherboard which stores the system information and computer settings such as date, time, hard drive settings, boot sequence, parallel part settings, on-base audio and video etc. Firmware: Firmware is a combination of software and hardware. Computer chips that have data or programs recorded on them are firmware. POST: The POST or power on self-test is a test the computer does when it first boots up. It’s to verify all the hardware is working. If all checks out it usually gives a single beep. If not a beep code could come up. Beep Code: A beep code is an audible code which is generated during the POST (Power On Self Test) when the BIOS has an issue but has not made it all the way up the boot sequence that it can give you the error as a message on the monitor BIOS update: Updating the BIOS can fix or enhance aspects of a computers performance. Or it may provide support for newly installed hardware. 1 Flash BIOS update: A BIOS chip...

Words: 353 - Pages: 2

Free Essay

Exploring Reverse Engineering

...products that are new and cheaper than the ones that came before. This way a company is able to take a product that is already out on the market and take it apart piece by piece and see how it works so they can rebuild it cheaper and more efficiently. One famous example of reverse engineering is in the mid-1980s Phoenix Technologies Ltd wanted to produce a BIOS for PCs that would be compatible with the IBM PCs proprietary BIOS. To protect themselves from any charges of illegally copying their BIOS they used what is called a clean room. With the clean room approach there are two teams; one that studies the BIOS that they are trying to recreate and they come up with a detailed report of what it is exactly the BIOS does without using any of the code or anything that will link their description to that particular BIOS. Then this description is given to another team that has not looked at the code of the BIOS they are recreating and they build whole new BIOS off those instructions. This way even if some of the code is the same it will not be a copy right infringement since the second team who actually wrote the code and built the BIOS...

Words: 792 - Pages: 4