Premium Essay

Bio Data Form

In:

Submitted By dwain1
Words 780
Pages 4
| |
|EMPLOYEE BIOGRAPHICAL DATA SHEET |
|1. Name (Last, First, Middle): KARIUKI DAVID KAHORA |2. Contractor’s Name: |
|3. Employee’s Address |4. Contract Number | |5. Position Under contract| |
| |6. Proposed Salary | |7. Duration of Assignment | |
|8. Telephone Number (include |9. Place of Birth |10. Citizenship |
|area code) |NAKURU |KENYA |
|254700840062 | | |
|11. Availability |
|1 week. |
|12. EDUCATION (include all college or university degrees) |13. LANGUAGE PROFICIENCY |
|NAME AND

Similar Documents

Free Essay

Poverty in the Philippines

...connector of motherboard. * CPU Socket * North Bridge * South Bridge * RAM Slots * AGP Slot * PCI Slots * CNR Slot * Floppy Connector * Primary and Secondary IDE Connectors * SATA connectors * Power Connector * BIOS * CMOS battery * Ports CPU Socket: CPU Socket or Processor Socket. Which is used to install or insert the processor. we have two types of sockets. LIF sockets and ZIF socket. LIF stands for Low Insertion Force, this is the old model sockets and ZIF stands for Zero Insertion Force, this is the present model sockets.    | | LIF socket or slot type processor socket | | | ZIF socket or PGA sockets | North Bridge: North Bridge is always near the processor socket. which is one of the important component of a motherboard. It is a focal Point of Motherboard and It is also called as Memory Controller Hub. North Bridge interconnects Processor socket, RAM slots and AGP slot. here Gigabyte chip is north bridge it is near Processor socket. South Bridge: North bridge and south bridge are the two main poles of a motherboard. South Bridge interconnects Primary and Secondary IDE interfaces, SATA connectors, Floppy Drive Connector, PCI slots and BIOS.  RAM Slots:  RAM slots are used to insert RAMs. there are so many types of ram slots. they are SD ram slots, DDR ram slots, DDR2 and DDR3 ram slots. SD stands for synchronize Dynamic and DDR...

Words: 3656 - Pages: 15

Free Essay

Technical

...BIOS (basic input/output system) is the program a personal computer's microprocessor uses to get the computer system started after you turn it on. It also manages data flow between the computer's operating system and attached devices such as the hard disk , video adapter , keyboard , mouse , and printer . BIOS is an integral part of your computer and comes with it when you bring it home. (In contrast, the operating system can either be pre-installed by the manufacturer or vendor or installed by the user.) BIOS is a program that is made accessible to the microprocessor on an erasable programmable read-only memory (EPROM) chip. When you turn on your computer, the microprocessor passes control to the BIOS program, which is always located at the same place on EPROM. When BIOS boots up (starts up) your computer, it first determines whether all of the attachments are in place and operational and then it loads the operating system (or key parts of it) into your computer's random access memory (RAM) from your hard disk or diskette drive. With BIOS, your operating system and its applications are freed from having to understand exact details (such as hardware addresses) about the attached input/output devices. When device details change, only the BIOS program needs to be changed. Sometimes this change can be made during your system setup. In any case, neither your operating system or any applications you use need to be changed. Although BIOS is theoretically always the intermediary...

Words: 821 - Pages: 4

Free Essay

Networking Systems Administrator

...Chapter 6: Outline Memory and Storage * RAM BASICS- * RAM is used for programs and data * Is one of the most popular upgrades to add to any system * Different variables * Memory module type * Memory chip type used on the module * Memory module speed * Error checking * ALLOWABLE MODULE SIZES AND COMBONATIONS- * Number of modules needed per bank of memory * Total of modules that can be installed * RAM TYPES- * DRAM requires frequent recharges of memory to retain its contents * SRAM does not need frequent recharging * SDRAM was the first type of memory to run in sync with the processor bus * DDR SDRAM uses double data and performs two transfers per clock cycle * DDR2 SDRAM runs its external data bus at twice the speed enabling a faster performance * Rambus was used earlier in Pentium 4 based chipsets from Intel * COMPARISON OF MEMORY MODULES- * All systems built in the early 90’s have used some form of memory module * SIMM- single refers to both sides having same pin out * SIPP- substituted pins for the edge connectors used by SIMM modules * DIMM- each side has different pin out * SODIMM- various pin outs for notebook, laser and LED printers * RDRAM- uses direct Rambus memory chips and is also referred as RIMM * SORM- compact version of the standard Rambus module for used in notebooks * Installing DIMMS and Rambus RDRAM Modules * Memory modules are the memory sticks that...

Words: 1004 - Pages: 5

Free Essay

Week 3 Assingnment

...When booting from my hard drive, I am prompted with an option to choose my operating system: windows 7 or Ubuntu operating systems. Upon choosing one of these, it takes me through the normal booting process. When booting from a CD – ROM or Flash, insert the CD or flash and then restart the computer. Press the "F8" function key as the computer restarts to enter into BIOS setting of the computer. You may have to press the "Ctrl" key at the same time depending on the manufacturer of the computer. If any problems arise, check the owner's manual for additional information as each computer can have different BIOS access options. After finding the boot option menu item in the BIOS, you should hard drive as the primary or first device. Use the up arrow key or space bar to select the CD-ROM as the primary or first boot device. Push the "Esc" key and then save the changes to the BIOS settings. The computer will restart then, and it should boot from the CD-ROM now. Depending on what you have on the CD rom for booting, the computer runs from that. I booted the BackTrack program from my CD-ROM in order to use the program without having it permanently saved on my hard drive. I navigated through the BackTrack program with no problems, but did not activate any sessions as it is used for hacking purposes. My computer uses USB for both the mouse and the keyboard, therefore it does not signal any beep codes as an older motherboard with PS2 mouse connectors would. The main difference...

Words: 578 - Pages: 3

Free Essay

Information Technology

...BASIC INPUT OUTPUT SYSTEM [BIOS] Seminar Presented by Milind Chile - 2591 Dipti Borkar - 2778 Freddy Gandhi - 2787 Raghav Shreyas Murthi - 2804 Introduction The BIOS, short for BASIC INPUT OUTPUT SYSTEM is a set of built-in software routines that give a PC its personality. Although, less than 32 kilobytes of code, the BIOS controls many of the most important functions of the PC: how it interprets keystrokes (Ctrl + Alt + Delete), how it puts characters on the screen, and how and at what speed it communicates through its ports. The BIOS also determines the compatibility of the computer and its flexibility in use. Although all BIOSs have the same function; all are not the same. The BIOS governs the inner complexities arising out of the odd mixing of hardware and software. It acts as a link between the material hardware of the PC and its circuits, and the transcendent realm of software ideas and instructions. More than a link, the BIOS is both hardware and software. Like software, the BIOS is a set of instructions to the computer’s microprocessor. Like hardware, however, these instructions are not evanescent; rather they are coded into the hard, worldly silicon of PROM, EPROM chips. Due to the twilight state of programs like the BIOS, existing in the netherworld between hardware and software, such PROM-based programs are often termed firmware. The personality comes from the firmware code. This code determines how the computer will carry out the basic functions needed to make...

Words: 6641 - Pages: 27

Free Essay

Assignment3

... However, even if you have 4GB of physical RAM installed you won't be able to use all of it for your applications. A portion of the upper 3GB address is being occupied by your system devices like your graphics card, BIOS, PCI, etc. That's why on some systems, you will see only 3.27GB of available RAM. This usually varies depending on the hardware. Take a look at the crude illustration below.  In normal mode, the 32-bit OS can address this much:  +---------------+ 4GB  | |  | |  | |  | |  | |  | |  | |  | |  | |  | |  | |  | |  | |  | |  +---------------+ 0  Now if you put in your stuff and your RAM, say 2GB, in this address space:  +---------------+ 4GB  | BIOS, PCI |  | GFX, ETC... |  | |  | |  |---------------+ 3 GB  | |  | |  | EMPTY |  | |  |---------------+ 2 GB  | |  | RAM |  | |  | |  +---------------+ 0  If you put another 1GB RAM in there for a total of 3GB it will still be fine because you still have 1GB of EMPTY space.  But if you put another gig (so you now have a total of 4), then you have an overlap. Part of the last GB will be hidden behind BIOS, PCI, GFX, etc. so Windows cannot give it an address, and it will be "lost".  Memory remapping can solve it by moving the last gig above PCI, GFX, BIOS, etc. but then you'll need an OS that can go beyond 4GB, which a 32-bit OS cannot do, and that's where the 64-bit OS...

Words: 1155 - Pages: 5

Premium Essay

Nt1330 Unit 3 Assignment

...Expansion boards. As it is very much clear form its name that it is used for expansion of boards in PC. The expansion boards are used to expand address, data and control buses which are used throughout the motherboard. These are of two major types’ 8 bit expansion slots and 16 bit expansion slots. The cards which are...

Words: 1063 - Pages: 5

Free Essay

Boot and Startup Process of Windows 7

...machine to an operable and functional system. There are essentially two forms of booting - the soft boot and the hard boot. The cold boot or hard boot involves powering the computer up from an initial zero power supply. A warm boot on the other hand takes place when a software application or operating system triggers the computer to perform a reboot. A successful boot is dependent on 3 conditions - the hardware, BIOS and operating system files to function without errors. When an error occurs, you will be notified by error messages, beeping sounds or in the worst scenario, a blank screen. Explain the purpose and functionality of Boot Configuration Data Store and Editor. Include in the explanation how to implement BCDEdit. The Bcdedit.exe command-line tool modifies the boot configuration data store. The boot configuration data store contains boot configuration parameters and controls how the operating system is booted. These parameters were previously in the Boot.ini file (in BIOS-based operating systems) or in the nonvolatile RAM entries (in Extensible Firmware Interface-based operating systems). You can use Bcdedit.exe to add, delete, edit, and append entries in the boot configuration data store. Detail and list 5 types of information the BCD registry file can contain and the various ways the BCD registry file can be modified. BCD was created to provide an improved mechanism for describing boot configuration data. With the development of new firmware models (for example, the...

Words: 440 - Pages: 2

Free Essay

Cmos

...battery and contains your system settings and is modified and changed by entering the CMOS setup. Once other manufacturers cloned the AT form factor it wasn’t long that other areas of the CMOS was used by various BIOS manufacturers for such user selectable options as memory wait states, memory type, initial boot drive selection, boot up clock speed, hard drive interface type, green options, shadow RAM options, cache options, and password protection of the CMOS contents. It still uses a small battery in case there is a power outage and still uses volatile RAM. This is used to store basic information about the PC’s configuration: number and type of hard and floppy drives, how much memory, what kind and so on. All this used to be entered manually, but modern auto configuring BIOS do much of this work, in which case the more important settings are advanced settings such as DRAM timings. The other important data kept in CMOS memory is the time and date. The CMOS still utilizes RAM but it is being rapidly replaced with EEPROM in today’s time. EEPROM is a small chip that data can be written and re-written to with codes. As we all know RAM losses data every time you loss power to your system, well EEPROM does not require a power source to maintain its data. Although EEPROM is relatively slower than RAM it is fine for applications, such as storing saved BIOS settings. The size of the CMOS memory has also pretty much stayed the same because there is no need to increase the size. There was...

Words: 364 - Pages: 2

Premium Essay

Bio-Intensive Gardening

...Exercise 2 BIO-INTENSIVE APPROACH TO FOOD PRODUCTION I. INTRODUCTION The bio-intensive approach is a biological form of agriculture in which a small area of land is intensively cultivated, using nature's own ingredients to rebuild and then maintain the soil's productivity. At the heart of the approach is the effort to improve the soils' capability to nurture and sustain plant life. What a bio-intensive gardener tries to do on his/her small plot is to simulate/replicate a natural forest (with the constant recycling of nutrients and maintenance of soil, moisture and microbial conditions). Many countries of the world have farmed biologically for thousands of years and have been able to sustain output levels over these years. II. MATERIALS AND METHODS A. Materials 1. Farm tools 2. Animal manure 3. Crop residue 4. Vegetable seeds B. Procedure 1. Identification of crops to be planted and cared 2. Preparation of plot 3. Planting of crops according to their plan 4. Care and maintenance of the plot 5. Harvesting of crop products 6. Analysis III. DATA AND OBSERVATIONS Table 1.1 Data on planting proper Crop | Planting distance | Seeds planted per hill | Kangkong | 15 cm. between hills | 2-3 | Mungbean | 3 rows with furrow | 2-3 | Okra | 30 cm. between hills | 2-3 | Radish | 20 cm. between hills | 2-3 | Table 1.2 Data on crops’ performance Crop | Number of crop products | Weight of crop products | ...

Words: 1063 - Pages: 5

Free Essay

Asusrive

...EXTREME Instruction manual ASUS RAMPAGE IV EXTREME Your user manual ASUS RAMPAGE IV EXTREME Manual abstract: In this way you can still attach the motherboard to the base without worrying about short circuits. Sometimes you may need to use the plastic springs to isolate the screw from the motherboard PCB surface, because the circuit wire may be near by the hole. Be careful, don't let the screw contact any printed circuit write or parts on the PCB that are near the fixing hole, otherwise it may damage the board or cause board malfunctioning. "*" For RAMPAGE IV EXTREME only . "**" For RAMPAGE IV EXTREME Ultra only. RAMPAGE IV EXTREME Ultra/RAMPAGE IV EXTREME Motherboard -4- Chapter 1 Introduction Features Summary Form Factor CPU -- 30.5cm x 24.4cm ATX size form factor, 4 layers PCB. -- Socket 478 for Intel® Micro FC-PGA2 Pentium® 4 processor -- Support Intel ® Pentium ® 4 (Northwood, 0.13 m) processor -- -- -- -- -- -- -- -- -- -- -- -- -- -- Support Intel ® Pentium ® 4 Processor with HT Technology Intel Pentium® 4 400/533MHz FSB 2nd cache depends on CPU SiS 655 Host/Memory controller SiS 963 MuTIOL Media I/O 4 184-pin DDR DIMM sockets Supports Dual channel DDR333/DDR266 DIMM Supports 128MB/256MB/512MB/1GB unbuffered DRAM Supports up to 4GB DRAM (Max) Supports only 2. 5V DDR DIMM IT8705F 1 AGP 3.0 slot supports 8X/4X mode 5 PCI slot supports 33MHz & PCI 2.2 compliant 2...

Words: 778 - Pages: 4

Free Essay

Work

...1.why is all data stored in a computer in binary form? Computers are only able to read and store data in binary form, 1 or 0, on or off, yes or no, voltage or none. Binary is the simplest way to manage information. 2. What are the four primary functions of hardware? input, output, PROCESS, and Storage 3. What are the two main input devices and two main output devices? the mouse, keyboard, printer, and monitor. 4. What three things do electronic hardware devices need in order to function? power, ground return, and load. 5. How many bits are in a byte? There are eight bits in a byte. 6. What is the purpose of an expansion slot on a motherboard? Expansion slots on a motherboard are designed to accept peripheral cards that add functionality to a computer system, such as a video or a sound card. 7. Which component on the motherboard is used primarily for processing? The CPU 8. Name the two main CPU manufacturers. Intel and AMD 9. Order the following ports according to speed, placing the fastest port first: FireWire, eSATA, USB. eSATA is faster than FireWire and firewire is faster than USB. 10. What are two other names for the system bus? The PCI bus, and the PCI express bus 11. What type of output does an S/PDIF port provide? Digital output 12. Why is an SSD hard drive more reliable under rugged conditions than an IDE hard drive? SSD hard drives have no moving parts that can disintegrate under rugged conditions. Because SDD drives have...

Words: 1535 - Pages: 7

Premium Essay

Biosensers

...Executive Summary Global bio-security threats such as the spread of emerging infectious diseases (i.e.,avian influenza, SARS, Hendra, Nipah, etc.) and bioterrorism have generated significant interest in recent years. There is considerable effort directed towards understanding and negating the proliferation of infectious diseases. Biosensors are an attractive tool which has the potential to detect the outbreak of a virus and/or disease. Although there is a host of technologies available, either commercially or in the scientific literature, the development of biosensors for the detection of emerging infectious diseases (EIDs) is still in its infancy. There is no doubt that the glucose biosensor, the gene chip, the protein chip, etc. have all played and are still playing a significant role in monitoring various bio-molecules. Can biosensors play an important role for the detection of emerging infectious diseases? What does the future hold and which biosensor technology platform is suitable for the real-time detection of infectious diseases? These and many other questions will be addressed in this review. The purpose of this review is to present an overview of biosensors particularly in relation to EIDs. It provides a synopsis of the various types of biosensor technologies that have been used to detect EIDs, and describes some of the technologies behind them in terms of transduction and bio-receptor principles. Introduction There is great deal of interest in monitoring and controlling...

Words: 1265 - Pages: 6

Premium Essay

Computer and Network Security

...domain user or admin have a guessable password in Windows NT (CVE, 2013). In the first article it discusses the use of USB devices in the workplace. USB’s are used for transporting data from one computer to another. These allow for business requirements to be reached at a faster pace but they also pose a number of security challenges. Those challenges may be “disgruntled workers, careless users and malicious individuals” (Couture, 2009, p. 6). Ways to migrate this issue is by gluing shut the ports, disable USB ports in BIOS, prevent users from installing a USB device by denying permission on files called usbstor.pnf and usbstor.inf, making USB ports read only, disable USB ports in Group Policy, or disable Autorun (Couture, 2009, p. 11). In the second article it discusses the vulnerabilities of the BIOS. The BIOS performs power up test amongst the hardware components and memory and without this program the computer wouldn’t know what to do after it was turned on. The BIOS can be accessed by the use of backdoor passwords, cracking the BIOS password, deleting the contents of the CMOS RAM by software and/or hardware (Allgeuer, 2001, p. 4). Ways to mitigate the risk of users accessing the BIOS is to use BIOS passwords to protect the BIOA configuration utility, for the more critical systems different BIOS password should be used than less critical systems, boot only from hard drives, computer cases should be...

Words: 1760 - Pages: 8

Premium Essay

Comp Hardware

...STATEMENTS: You can use an expresscard/34 card or and expresscard/54 card in laptop Compatible expresscards for the laptop include cards which are rectangular shaped. 8.2.6 Hibernation: needs to have enough free hard drive space 9.1 Spyware: it monitors the actions you take on your machine and sends the info back to its originating source Trojan horse: this program appeards to be a legitmate application, utility, gane or screensaver and perform malicious activities surreptitiously. Cookie: a file saved on your hard drive that tracks web sit preferences nd use. Graywayre:legitimate service 9.2.3 Social engineering: dumpster driving, shoulder surfing User awareness training: best countermeasure against social engineering Common form of social engineering attack: hoax virus information emails Phishing: tricks victims into providing confidential information 9.3 Biometrics: Face Scanner Retina Scanner Smart Card: hardware device that contains identification information. Minimum password length & account lockout...

Words: 935 - Pages: 4