Free Essay

Bio Exam

In:

Submitted By liamgraham97
Words 1581
Pages 7
STRATHFIELD GIRLS HIGH SCHOOL

BIOLOGY
FINAL PRELIMINARY EXAM 2005 Name: ………………………………… Teacher: ………………………………

INSTRUCTIONS TO STUDENTS
Part A: 15 Multiple Choice Questions (15 marks). Answer on the Multiple Choice page. Part B: Written Questions (60 marks). Answer all questions in the spaces provided. • Write using black or blue pen • Draw diagrams using pencil

Total Marks: 75

EXAMINER’S INSTRUCTIONS
All students to receive examination paper (12 pages) and Multiple Choice page. Reading time: 5 minutes Exam time: 2 hours Both papers are to be collected at the end of the exam and returned to the Science staff room. Thank you

1

Part A: 15 Multiple Choice Questions (15 marks). Answer on the Multiple Choice page. Allow about 30 minutes for this part. 1. The aim of a classification system in Biology is to group together organisms with: (A) similar ancestry (B) similar structures (C) similar environmental requirements (D) similar proteins 2. The main function of the organelle shown here is: (A) protein synthesis (B) transport of substances (C) photosynthesis (D) aerobic respiration 3. In Southern Africa small birds called oxpeckers accompany giraffes and feed on ticks and other parasites which colonise the giraffe's fur. Sometimes however, if the giraffe has a small wound the oxpeckers will keep the wound open so that they can directly drink the giraffe's blood This represents a change from: (A) parasitism to commensalism (B) mutualism to parasitism (C) commensalism to parasitism (D) mutualism to commensalism 4. There are many different Australian species of grass. The diagram shows the position of the stamens and stigma of a grass flower. This arrangement is an adaptation for pollination by: (A) wind (B) birds (C) insects (D) mammals

5. The tubeworm Galeolaria caespitosa inhabits a distinct zone on rock platforms. Above this zone, the worm would spend too much time out of water between high tides. Below this zone, it is subject to heavy predation from carnivorous snails and faces strong competition for space from other organisms. Select the row below which correctly classifies the factors which limit the distribution of Galeolaria caespitosa. (A) (B) (C) (D) Limit to upward distribution biotic biotic abiotic abiotic Limit to downward distribution biotic abiotic biotic abiotic

6. Which classification grouping comprises the most closely related group of organisms? (A) Class (B) Order (C) Genus (D) Species 2

7. The following events are all believed to be steps in the evolution of life on Earth: I II III IV V evolution of membranes evolution of eukaryotes evolution of autotrophic procaryotes formation of organic molecules evolution of heterotrophic procaryotes

Which one of the following represents the sequence in which these events occurred. (A) IV, III, V, I, II. (B) IV, I, III, V, II. (C) IV, I, V, III, II. (D) IV, III, I, V, II. 8. Some students set up a device to measure the rate of transpiration from a leafy branch. The graph below represents their results. Which sequence of changes would bring about the results shown in the graph?

The students changed the conditions that the branch was subjected to during the experiment. (A) increasing humidity - decreasing humidity -increasing humidity. (B) increasing temperature - increasing humidity - increasing air movement. (C) decreasing humidity -decreasing air movement -increasing humidity. (D) increasing air movement - decreasing temperature - increasing humidity. 9. The following table shows the classification of four arthropods. 1 2 3 PHYLUM Arthropoda Arthropoda Arthropoda CLASS ORDER FAMILY GENUS SPECIES Hexapoda Lepidoptera Melanidae Antwerk rosea Hexapoda Lepidoptera Picidae Sokonidus walshellea Hexapoda Lepidoptera Melanidae Euliops hostinea

4 Arthropoda Hexapoda Lepidoptera Melanidae Antwerk walshellea

The two arthropods which are most closely related are numbers (A) 1 and 2. (B) 1 and 3. (C) 1 and 4. (D) 2 and 4. 3

10. Which of the following characteristics do the gaseous exchange surfaces of a mammal, a fish, an insect and a frog all have in common? (A) good blood supply (B) 1ow surface area (C) internal position (D) moist surface 11. Which of the following correctly associates with type of animal its respiratory system? Alveoli Tracheae Gills (A) Insect Fish Frog (B) Fish Frog Insect (C) Human Fish Frog (D) Human Insect Fish 12. Which of the following is the correct word equation for respiration? (A) carbon dioxide + water glucose + oxygen (B) carbon dioxide + water + energy . glucose + oxygen (C) glucose + oxygen carbon dioxide + water + energy (D) glucose + carbon dioxide oxygen + water + energy 13. While working in present day Indonesia in the middle of the nineteenth century, Alfred Russell Wallace made careful observations of the wildlife. He found that while the flora and fauna of Bali and all the islands to the North West were essentially Asian (monkeys, tigers, rhinoceroses), the flora and fauna of nearby Lombok and the islands to the East were essentially Australian (cockatoos, possums, Casuarina trees). One of the things that Wallace is remembered for today is the Wallace Line -the line which divides these very different Biological regions. Which of the following best explains this difference? (A) The flora and fauna of Australia evolved in isolation from that of Asia. (B) The climate in Asia is much wetter than that in Australia. (C) The soil in Asia is more nutrient rich than that in Australia. (D) Asiatic type flora and fauna were forced out of Australia by the Marsupials 14. Which one of the following is an advantage of external fertilisation over internal fertilisation? (A) more sperm can be produced per male (B) more eggs can be produced per female. (C) there is more parental care for the offspring. (D) there is a greater survival rate of offspring. 15. Amino acids have been found on meteorites that crashed to Earth. This lends support to the theory that: (A) organic compounds can form from inorganic compounds (B) life on Earth originated from outer space (C) simple procaryotes can live in space (D) some meteorites are terrestrial in origin

4

Part B – 60 marks Allow about 1 hour and 30 minutes for this part Answer the questions in the spaces provided. Marks Question 16 (6 marks) The diagrams below show two stages in the process of mitosis.

X

Y

(a) Outline TWO events which occur as the cell progresses from stage X to stage Y. (Stage names are not required) ………………………………………………………………………………………….…………. ………………………………………………………………………………………….…………. ………………………………………………………………………………………….…………. ………………………………………………………………………………………….…………. ………………………………………………………………………………………….…………. ………………………………………………………………………………………….…………. (b) Compare and contrast the processes of mitosis and meiosis. ………………………………………………………………………………………….…………. ………………………………………………………………………………………….…………. ………………………………………………………………………………………….…………. ………………………………………………………………………………………….…………. ………………………………………………………………………………………….…………. ………………………………………………………………………………………….…………. ………………………………………………………………………………………….…………. ………………………………………………………………………………………….…………. Question 17 (4 marks) Outline two theories for the evolution of the chemicals of life. ………………………………………………………………………………………….…………. ………………………………………………………………………………………….…………. ………………………………………………………………………………………….…………. ………………………………………………………………………………………….…………. ………………………………………………………………………………………….…………. ………………………………………………………………………………………….…………. ………………………………………………………………………………………….…………. ………………………………………………………………………………………….…………. ………………………………………………………………………………………….………….

2

4

4

5

Question 18 ( 4 marks ) Around two billion years ago the Earth's atmosphere changed from anoxic (without oxygen) to oxic (with oxygen) (a) Describe the geological evidence for this change. ………………………………………………………………………………………….…………. ………………………………………………………………………………………….…………. ………………………………………………………………………………………….…………. ………………………………………………………………………………………….…………. (b) Explain the significance of this change for the subsequent evolution of living things. ………………………………………………………………………………………….…………. ………………………………………………………………………………………….…………. ………………………………………………………………………………………….…………. ………………………………………………………………………………………….…………. Question 19 ( 4 marks) The diagram at the right shows a cross section of a leaf. (a) On the diagram, label the following structures: cuticle, vascular bundle, stomate. (b) Which part of the leaf is responsible for photosynthesis? …………………………………… (c) Explain the relationship between the shape of this leaf and its function. ………………………………………………………………………………………….…………. ………………………………………………………………………………………….…………. ………………………………………………………………………………………….…………. ………………………………………………………………………………………….………….

2

2

1

1

2

………………………………………………………………………………………….…………. 4 Question 20. (4 marks) "New scientific developments are only made possible through advances in technology" Discuss this statement with reference to the development of our knowledge about cells. ………………………………………………………………………………………….…………. ………………………………………………………………………………………….…………. ………………………………………………………………………………………….…………. ………………………………………………………………………………………….…………. ………………………………………………………………………………………….…………. ………………………………………………………………………………………….…………. ………………………………………………………………………………………….…………. ………………………………………………………………………………………….…………. ………………………………………………………………………………………….…………. 6

Question 21. (7 marks) During your study of Biology this year you performed a first hand investigation to demonstrate the need for light in photosynthesis. Describe how you did this. In your description include: a hypothesis a list of equipment needed . a step by step method used one safety procedure followed the measures you took to ensure that your results were valid and reliable ………………………………………………………………………………………….…………. ………………………………………………………………………………………….…………. ………………………………………………………………………………………….…………. ………………………………………………………………………………………….…………. ………………………………………………………………………………………….…………. ………………………………………………………………………………………….…………. ………………………………………………………………………………………….…………. ………………………………………………………………………………………….…………. ………………………………………………………………………………………….…………. ………………………………………………………………………………………….…………. ………………………………………………………………………………………….…………. ………………………………………………………………………………………….…………. ………………………………………………………………………………………….…………. …………………………………………………………………………………………….……… ………………………………………………………………………………………….…………. ………………………………………………………………………………………….…………. ………………………………………………………………………………………….…………. ………………………………………………………………………………………….…………. ………………………………………………………………………………………….…………. ………………………………………………………………………………………….…………. ………………………………………………………………………………………….…………. ………………………………………………………………………………………….…………. ………………………………………………………………………………………….…………. ………………………………………………………………………………………….…………. ………………………………………………………………………………………….…………. ……………………………………………………………………………………….…………. ………………………………………………………………………………………….…………. ………………………………………………………………………………………….………….

7

7

Question 22. (8 marks ) The Tammar Wallaby is an Australian marsupial that shows a range of reproductive adaptations to its environment. The table below shows how milk production increases from the time the new born joey is born (with a mass of less than 1 gram) up until it is 250 days old. Age of joey (days) 0 30 70 130 210 250 (a) Draw a graph to show these data on the grid below. Milk production (mL/day) 0 1 3 9 43 86 3

(b) Describe the relationship between the age of the joey and milk production by the mother as shown in the graph. ………………………………………………………………………………………….…………. ………………………………………………………………………………………….…………. ……………………………………………………………………………………….………….

2

8

(c) The Tammar Wallaby is typical of Australian marsupials in producing tiny underdeveloped young. Explain how this is actually an adaptation to Australian conditions. ………………………………………………………………………………………….…………. ………………………………………………………………………………………….…………. ………………………………………………………………………………………….…………. ………………………………………………………………………………………….…………. ………………………………………………………………………………………….…………. ………………………………………………………………………………………….…………. ………………………………………………………………………………………….…………. ………………………………………………………………………………………….…………. Question 23. (6 marks) The pictures below show four animals:

3

Numbat

Beetle

Hammerhead shark

Centipede 4

(a) Construct a dichotomous key to classify these four organisms, using only features shown in the diagrams.

(b) Explain why it is difficult to accurately classify extinct organisms. ……………………………………………………………………………………….………...…. 2 ………………………………………………………………………………………….…………. ………………………………………………………………………………………….………….

9

Question 24. (6 marks) Scientists’ current theories of the history of life in Australia are based on a variety of information, including study of fossils, present-day organisms, climatic changes, matching continental margins and mid-ocean ridges. Discuss this statement, using relevant examples. ………………………………………………………………………………………….…………. ………………………………………………………………………………………….…………. ………………………………………………………………………………………….…………. ………………………………………………………………………………………….…………. ………………………………………………………………………………………….…………. ………………………………………………………………………………………….…………. ………………………………………………………………………………………….…………. ………………………………………………………………………………………….…………. ………………………………………………………………………………………….…………. ………………………………………………………………………………………….…………. ………………………………………………………………………………………….…………. ………………………………………………………………………………………….…………. ………………………………………………………………………………………….…………. ………………………………………………………………………………………….…………. ………………………………………………………………………………………….…………. ………………………………………………………………………………………….…………. ………………………………………………………………………………………….…………. ………………………………………………………………………………………….…………. ………………………………………………………………………………………….…………. ………………………………………………………………………………………….…………. ………………………………………………………………………………………….…………. ………………………………………………………………………………………….…………. ………………………………………………………………………………………….…………. ………………………………………………………………………………………….…………. ………………………………………………………………………………………….…………. ………………………………………………………………………………………….…………. ………………………………………………………………………………………….…………. ………………………………………………………………………………………….…………. ………………………………………………………………………………………….…………. ………………………………………………………………………………………….…………. ………………………………………………………………………………………….…………. ………………………………………………………………………………………….…………. ………………………………………………………………………………………….………….

6

10

Question 25. (5 marks) The diagram below represents an Antarctic food web

(a) Identify the producer(s) in this food web.

1 ………………………………………………………………………………………….…………. (b) Name two species from this food web that have both a predator/prey relationship and a competitive relationship. 1 ………………………………………………………………………………………….…………. (c) Use the information in this food web to construct a food chain containing a forth order 2 consumer.

(d) This food web doesn't show any decomposers. Outline the role of decomposers in ecosystems. ………………………………………………………………………………………….…………. ………………………………………………………………………………………….………….

1

11

Question 26. (6 marks) Assess the contribution of Urey and Miller to our understanding of the origins of life. ………………………………………………………………………………………….…………. ………………………………………………………………………………………….…………. ………………………………………………………………………………………….…………. ………………………………………………………………………………………….…………. ………………………………………………………………………………………….…………. ………………………………………………………………………………………….…………. ………………………………………………………………………………………….…………. ………………………………………………………………………………………….…………. ………………………………………………………………………………………….…………. ………………………………………………………………………………………….…………. ………………………………………………………………………………………….…………. ………………………………………………………………………………………….…………. ………………………………………………………………………………………….…………. ………………………………………………………………………………………….…………. ………………………………………………………………………………………….…………. ………………………………………………………………………………………….…………. ………………………………………………………………………………………….…………. ………………………………………………………………………………………….…………. ………………………………………………………………………………………….…………. ………………………………………………………………………………………….…………. ………………………………………………………………………………………….…………. ………………………………………………………………………………………….…………. ………………………………………………………………………………………….…………. ………………………………………………………………………………………….…………. ………………………………………………………………………………………….…………. ………………………………………………………………………………………….…………. ………………………………………………………………………………………….…………. ………………………………………………………………………………………….…………. ………………………………………………………………………………………….…………. ………………………………………………………………………………………….…………. ………………………………………………………………………………………….…………. ………………………………………………………………………………………….…………. ………………………………………………………………………………………….………….

6

12

Similar Documents

Free Essay

Expected Value of a Uniform Distribution

...All-In-One / CompTIA Network+ All-in-One Exam Guide / Meyers & Jernigan / 170133-8 / Appendix A A PPENDIX Mapping to the CompTIA A+ Objectives A CompTIA A+ Essentials Objectives Map Topic Chapter(s) Domain 1.0 Hardware 1.1 Categorize storage devices and backup media FDD 3 HDD 3, 11 Solid state vs. magnetic Optical drives CD / DVD / RW / Blu-Ray Removable storage 11 3, 13 3, 13 11, 13, 17 Tape drive 17 Solid state (e.g. thumb drive, flash, SD cards, USB) 13 External CD-RW and hard drive 13, 11 Hot swappable devices and non-hot swappable devices 13 1.2 Explain motherboard components, types and features Form Factor 9 ATX / BTX, 9 micro ATX 9 NLX 9 I/O interfaces 3, 18, 20, 22, 23, 25 Sound 3, 20 Video 3 1219 AppA.indd 1219 12/9/09 5:58:26 PM All-In-One / CompTIA Network+ All-in-One Exam Guide / Meyers & Jernigan / 170133-8 / Appendix A CompTIA A+Certification All-in-One Exam Guide 1220 Topic Chapter(s) USB 1.1 and 2.0 3, 18 Serial 3, 18 IEEE 1394 / Firewire 3, 18 Parallel 3, 22 NIC 3, 23 Modem 3, 25 PS/2 18 Memory slots 3, 6 RIMM 6 DIMM 3, 6 SODIMM 6 SIMM 6 Processor sockets 3, 5, 9 Bus architecture 5, 8 Bus slots 8, 9, 21 PCI 8, 9 AGP 8, 9 PCIe 8, 9 AMR 9 CNR 9 PCMCIA 21 PATA 11 IDE 11 EIDE 11 SATA, eSATA ...

Words: 4550 - Pages: 19

Premium Essay

Bios 231 Final Exam Answers

...BIOS 231 Final Exam Answers Follow Link Below To Get Tutorial https://homeworklance.com/downloads/bios-231-final-exam-answers/ BIOS 231 Final Exam Answers Q.1) ATP is converted into cAMP by which enzyme? Q.2) According to Ohms law, if the voltage increases, the current decreases. Q.3) Afferent fibers are fibers that transmit impulses from the receptors to the CNS. Q.4) These cells cushion the brain Q.5) Exocytosis is the process in which Q.6) Threshold of a neuron is reached at how many millivolts? Q.7) Glands are innervated by the somatic motor system. Q.8) Saltatory conduction also occurs in post-synaptic fibers. Q.9) Typically, what is the charge of a neuron at rest? Q.10) The autonomic nervous system is responsible for maintaining the constancy of the body’s internal environment (homeostasis). Q.11) These cells form the myelin sheath in the CNS. Q.12) “J” REPRESENTS THE _____________ Q.13) The sympathetic division conserves energy and promotes nonemergency functions. Q.14) ______ and ______ causes depolarization of the post synaptic membrane. (neurotransmitter...

Words: 513 - Pages: 3

Premium Essay

Saved

...IT320 Unit 5 HW 1. When a router is first powered on, it completes a four-step initialization process: 1. Preforming a power-on self test (POST) 2. Loading a bootstrap program 3. Loading an IOS 4. Loading a configuration file The last three of these steps require the router to copy the files into RAM. Normally, most routers load an IOS image that is stored in flash memory and an initial configuration stored in NVRAM. 2. Routers use the following logic, in order, to attempt to load an IOS: 1. Load a limited-function IOS if the configuration register’s last hex digit is set to 0 or 1. 2. Load an IOS based on the configuration of boot system commands in the startup-configuration file. 3. Load the first file in flash as the IOS. 4. Use TFTP broadcasts to find a TFTP server and download an IOS from that server. 5. Load a limited-function IOS from ROM. In Step 1, the configuration register is a16-bit number that Cisco routers store in a hidden area of NVRAM. It can be set in a couple of ways and can be seen using the show version command. The most commonly used way to set its value is to use the config-register global configuration command. Routers use the 4 low-order bits of the configuration register as the boot field, which tells the router what to do in the first of the preceding five decision steps. If the value of the field is set to 0, the router loads the ROMMON (ROM Monitor), which is used for password recovery. If the value is set to1, the router loads...

Words: 448 - Pages: 2

Free Essay

Knowledge Assemsment Text Book

...Knowledge Assessment Matching 1. Remote Desktop E. Based on the former Terminal Services 2. System image backup J. Saves data to a VHD file 3. BranchCache A. Conserves WAN bandwidth 4. Distributed cache mode B. Files cached on each client 5. Volume shadow copies H. Previous versions 6. Incremental backup D. Files changed since the last backup job 7. Windows RE I. Accessible from a Window 7 installation disk 8. Hosted cache mode C. Files cached on a central server 9. Windows Remote Management G. Executes PowerShell commands on remote computers 10. System restore point F. Configuration settings and registry information Multiple Choice 1. Which of the following service priority guidelines are not accurate? D. Departmental issues should be rated according to the function of the department. A problem with a computer belonging to a department that is critical to the organization, such as order entry or a customer service call center, should take precedence over a problem with a computer belonging to a department that can better tolerate a period of down time, such as research and development. 2. Place these troubleshooting steps in the correct order, using the procedure described in this lesson as your guide. B, D, C, A. B: Establishing the symptoms is the first step in troubleshooting any problem to determine exactly what is going wrong. D: Select the most probable cause. Once...

Words: 746 - Pages: 3

Free Essay

Bitlocker

...BitLocker Drive Encryption Overview 73 out of 98 rated this helpful - Rate this topic Applies To: Windows Server 2008, Windows Server 2008 R2, Windows Vista BitLocker Drive Encryption is a data protection feature available Windows Server 2008 R2 and in some editions of Windows 7. Having BitLocker integrated with the operating system addresses the threats of data theft or exposure from lost, stolen, or inappropriately decommissioned computers. Data on a lost or stolen computer is vulnerable to unauthorized access, either by running a software-attack tool against it or by transferring the computer's hard disk to a different computer. BitLocker helps mitigate unauthorized data access by enhancing file and system protections. BitLocker also helps render data inaccessible when BitLocker-protected computers are decommissioned or recycled. BitLocker provides the most protection when used with a Trusted Platform Module (TPM) version 1.2. The TPM is a hardware component installed in many newer computers by the computer manufacturers. It works with BitLocker to help protect user data and to ensure that a computer has not been tampered with while the system was offline. On computers that do not have a TPM version 1.2, you can still use BitLocker to encrypt the Windows operating system drive. However, this implementation will require the user to insert a USB startup key to start the computer or resume from hibernation, and it does not provide the pre-startup system integrity verification...

Words: 1463 - Pages: 6

Free Essay

Bios

...Introduction To sum of the differences between ROM RAM BIOS and Post I will simply define the basis of each component while defining what they do. ROM is short for (Read-only Memory) Memory which data is prerecorded on a computer. ROM is simply data that cannot be eliminated even when the computer is off. When working in ROM it is difficult or nearly impossible to change. BIOS is short for the acronym (Basic Input Output System) it is a program which stores detailed information and enable the computer to boot. In addition a ROM chip located on the motherboard, it lets you access the basic setup and ensures that the BIOS will readily be available and will not de damaged by disk failures. RAM is (Random Access Memory) Memory that can be access randomly memory that can be access without touching preceding bytes. RAM is the typical memory found in most computers or printers. In addition, RAM is a volatile memory that requires power to keep information accessible. If power is lost, then memory can be lost. Lastly Post is the self-test which is activated by Bios. The post is designed to run checks on the motherboard. It necessary to use ROM for the BIOS because the ROM retains information on the computer even while shut down whereas RAM does not. Whenever a computer is being use the information is being stored on the RAM if the is ever a power shortage or the computer lose power the information is lost. RAM does not store memory when there is no power. POST beep codes make...

Words: 356 - Pages: 2

Free Essay

Motherboard

...Motherboard Answer the following questions 5 April 2015 Tanweer Haroon DeJong May The major components of the motherboard are as follows: memory and their slots which is the computer’s memory (RAM) and is one of the most important parts of the system board. The number of chips depends on the type of computer and its capacity. Expansion cards are a typical component of non-integrated system boards a graphic card is a perfect example, but this can be integrated into the motherboard. CPU and slots is the central processing unit and it’s a highly prolific part of the computer and is located on the right of a motherboard and can be identified as a result of the heat sink or cooling fan directly on it. BIOS chip directs the CPU with respect to how it relates with other parts of the computer. Its basic input and output system chip or integrated circuit is fixed on the board and is easily identifiable. CMOS battery, the complementary metal oxide semiconductor is a small battery on the system board that powers the CMOS memory. Power supply and connectors is the electrical unit of the system and if it’s bad the system will not work. Keyboard connector are located on the motherboard and there are two main types. The AT has a round connecting interface into the motherboard and the PS/2 connector is rectangular in shape and smaller. Modern motherboards come with both. Mouse connector its connecting port is located on the motherboard and its interface is usually round. Floppy...

Words: 431 - Pages: 2

Premium Essay

Future

...Fall BIOS – Instructor: Mrs. Nicholas – NT1110 – 1 May 2014 Lavon Hawkins BIOS SUMMARY Lavon Hawkins BIOS SUMMARY BIOS BIOS: The BIOS is software which is stored on the motherboard. It tells the computer how to perform a number of basic functions such as booting and keyboard control. It is also used to identify and configure the hardware in a computer such as hard drive, floppy drive, optical drive, CPU, memory and so on. CMOS: The complementary metal oxide semiconductor is the type of semiconductor chip on the motherboard which stores the system information and computer settings such as date, time, hard drive settings, boot sequence, parallel part settings, on-base audio and video etc. Firmware: Firmware is a combination of software and hardware. Computer chips that have data or programs recorded on them are firmware. POST: The POST or power on self-test is a test the computer does when it first boots up. It’s to verify all the hardware is working. If all checks out it usually gives a single beep. If not a beep code could come up. Beep Code: A beep code is an audible code which is generated during the POST (Power On Self Test) when the BIOS has an issue but has not made it all the way up the boot sequence that it can give you the error as a message on the monitor BIOS update: Updating the BIOS can fix or enhance aspects of a computers performance. Or it may provide support for newly installed hardware. 1 Flash BIOS update: A BIOS chip...

Words: 353 - Pages: 2

Free Essay

Exploring Reverse Engineering

...products that are new and cheaper than the ones that came before. This way a company is able to take a product that is already out on the market and take it apart piece by piece and see how it works so they can rebuild it cheaper and more efficiently. One famous example of reverse engineering is in the mid-1980s Phoenix Technologies Ltd wanted to produce a BIOS for PCs that would be compatible with the IBM PCs proprietary BIOS. To protect themselves from any charges of illegally copying their BIOS they used what is called a clean room. With the clean room approach there are two teams; one that studies the BIOS that they are trying to recreate and they come up with a detailed report of what it is exactly the BIOS does without using any of the code or anything that will link their description to that particular BIOS. Then this description is given to another team that has not looked at the code of the BIOS they are recreating and they build whole new BIOS off those instructions. This way even if some of the code is the same it will not be a copy right infringement since the second team who actually wrote the code and built the BIOS...

Words: 792 - Pages: 4

Premium Essay

Exploring Motherboards and Busses

...on a motherboard? Why can these busses not be replaced with a single bus? • With 64-bit busses available, why should 32-bit busses be provided as well? The motherboard of a computer is also known as the System Board. The circuit board is the platform on which all the hardware of the computer is connected. It is said to be the most important part of the computer. The expansion cards, and slots, BIOS chip, CMOS battery, jumpers and DIP switches, heat sink, PCI, Power connector, on board disk drive connectors, memory slots, keyboard connectors, Peripheral ports and connectors are all the things that one may find on the motherboard. The expansion cards are a typical part of nonintegrated system board. An example of this is a graphic card. Memory slots are one of the most important part of the system board. The number of memory chips on a motherboard depends on the type of CPU and its capacity. The slots are usually white and black and close in proximity to one another. The BIOS chip is also a very important part of the system board. It directs the CPU to other parts of the computer. BIOS and its manufacturers name are usually written on the chip. The CMOS battery or (complementary Metal Oxide Semiconductor) is a small battery on the system...

Words: 617 - Pages: 3

Free Essay

Information and Communication Technology

...that starts the “chain reaction” which ends with the entire operating system being loaded is known as the boot loader (or bootstrap loader). The term creatively came from early designiners imagining that before a computer “runs” it must have it’s “boots strapped”. The boot loader’s only job is to load other software for the operating system to start. Often, multiple-stage boot loaders are used, in which several small programs of increasing complexity sequentially summon one after the other, until the last of them loads the operating system. Boot Devices The boot device is the device from which the operating system is loaded. A modern PC BIOS (Basic Input/Output System) supports booting from various devices. These include the local hard disk drive, optical drive, floppy drive, a network interface card, and a USB device. Typically, the BIOS will allow the user to configure a boot order. If the boot order is set to: 1. CD Drive 2. Hard Disk Drive 3....

Words: 646 - Pages: 3

Free Essay

Attacks

...Ransomware Discuss the threat When infected restricts you to access to a computer system. This will become more refined in its targets and methods. Experts predict that the variants of ransomware that hurt the security software that are installed within a computer may particularly target the endpoints which sign up with cloud-based storage solutions like Google Drive, Dropbox, OneDrive and many more. On detecting the endpoint, ransomware will exploit the stored personal credentials of the logged-in user and will even infect the cloud storage that is backed up. McAfee has warned that ransomware attackers will try out as many ways possible to shell out ransom payments from their victims. Degree of damage The most advanced and most damaging ransomware in the wild at the moment, specifically targeting U.S. businesses and individuals. It's a $70 million per year criminal enterprise. Its magnitude is now confirmed by law enforcement. Some quick math shows $18,145 in costs per victim, caused by network mitigation, network countermeasures, loss of productivity, legal fees, IT services, and/or the purchase of credit monitoring services for employees or customers. As you can see, the total costs of a ransomware infection goes well above just the ransom fee itself, which is usually around $500 but can go up to $10,000. What it attacked Ransomware is a type of malware that infects a computer and restricts a user’s access to the infected computer. This type of malware...

Words: 2057 - Pages: 9

Premium Essay

Science

...Share this About.com About Tech PC Support . . . Troubleshooting Guides Symptoms How To Fix a Computer That Turns On But Displays Nothing What To Do When Your Computer Starts but The Screen is Black By Tim Fisher PC Support Expert Share this PC Support Categories Troubleshooting Guides How-To's & Tutorials Getting Support Software Tools Hardware Tools Command Line Reference Parts of a Computer Cleaning & Cooling File Extensions Things You Didn't Know About... Computer Terms Other Resources Fix a Problem With Your Computer Maintaining Your Computer Tips & Tricks Updated Articles and Resources Free Email Newsletter Let About.com send you the latest from our PC Support Expert. You can opt-out at any time. Please refer to our privacy policy for contact information. Photo of a Dell UltraSharp U2412M 24-Inch LED Monitor - © Dell, Inc. Dell UltraSharp U2412M 24-Inch LED Monitor. © Dell, Inc. The most common way that a computer "won't turn on" is when the PC actually does power on but doesn't display anything on the monitor. You see lights on the computer case, probably hear fans running from inside, and may even hear sounds, but nothing at all shows up on your screen. There are several possible reasons why your monitor isn't displaying information so it's very important that you step through an ordered process like the one I've outlined here. ...

Words: 2186 - Pages: 9

Premium Essay

A Malicious Program That Secretly Integrates Itself Into Program or Data Files.

...Summary A malicious program that secretly integrates itself into program or data files. It spreads by integrating itself into more files each time the host program is run. Disinfection & Removal Automatic Disinfection Allow F-Secure Anti-Virus to disinfect the relevant files. For more general information on disinfection, please see Removal Instructions. Technical Details The CIH virus was first located in Taiwan in early June 1998. After that, it has been confirmed to be in the wild worldwide. It has been among the ten most common viruses for several months. CIH has been spreading very quickly as it has been distributed through pirated software. History It seems that at least four underground pirate software groups got infected with the CIH virus during summer 1998. They inadvertently spread the virus globally in new pirated softwares they released through their own channels. These releases include some new games which will spread world-wide very quickly. There's also a persistent rumor about a 'PWA-cracked copy' of Windows 98 which would be infected by the CIH virus but F-Secure has been unable to confirm this. Later on, CIH was distributed by accident from several commercial sources, such as: • Origin Systems website where a download related to the popular Wing Commander game was infected • At least three European PC gaming magazines shipped magazines where the cover CD-ROM was infected - one of them even included a note inside advising users to disinfect their...

Words: 693 - Pages: 3

Free Essay

Cmos

...about a millionth of an amp of electrical current. This efficiency allows it to store configuration data for a long time (maybe years). In this paper I will explain how CMOS memory change over the years, if CMOS memory increased, decreased, or stayed the same, and if CMOS still utilizes RAM, requiring a battery on the motherboard. CMOS really hasn’t changed very much from what I could find on the internet… Mainly the speeds have increased and the noise has been reduced it also went from analog to digital. Originally, the IBM PC only used of a small portion of CMOS memory and the balance of the 64 bytes were left undefined. Once other manufacturers cloned the AT form factor it wasn’t long that other areas of the CMOS was used by various BIOS manufacturers for such user-selectable options as memory wait states, memory type, initial boot drive selection, boot-up clock speed, hard drive interface type, green options, shadow RAM options, cache options, and password protection of the CMOS contents. It still uses a small battery incase there is a power outage and still uses volatile RAM. The size of the CMOS memory has also pretty much stayed the same because there is no need to increase the size. There was never any need to store more than 512 bytes in the memory as it holds the absolute basic boot settings for the system. The typical size is still 512 bytes currently. All it comes down to is “If it ain’t broke don’t fix it.”, so it’s been that way since almost the very beginning...

Words: 421 - Pages: 2