...problems as social issues’ talks about the social origins of health and illness, emergence of bio-medical and social model of health and limitations of bio-medical model which has been explained as follows: The emergence of the biomedical model In 1878, Louis Pasteur (1822–96) was the first person who came up with the idea of ‘germ theory of disease’. This theory stressed the role of germs as the causative agents for the development of disease in the human beings. Robert Koch (1843–1910) refined the idea of germ theory and came up with a term ‘Specific Aaetiology’ (meaning specific cause of disease) in which he stated that every disease is caused by a specific kind of bacteria. The central idea was that...
Words: 1269 - Pages: 6
...BASIC INPUT OUTPUT SYSTEM [BIOS] Seminar Presented by Milind Chile - 2591 Dipti Borkar - 2778 Freddy Gandhi - 2787 Raghav Shreyas Murthi - 2804 Introduction The BIOS, short for BASIC INPUT OUTPUT SYSTEM is a set of built-in software routines that give a PC its personality. Although, less than 32 kilobytes of code, the BIOS controls many of the most important functions of the PC: how it interprets keystrokes (Ctrl + Alt + Delete), how it puts characters on the screen, and how and at what speed it communicates through its ports. The BIOS also determines the compatibility of the computer and its flexibility in use. Although all BIOSs have the same function; all are not the same. The BIOS governs the inner complexities arising out of the odd mixing of hardware and software. It acts as a link between the material hardware of the PC and its circuits, and the transcendent realm of software ideas and instructions. More than a link, the BIOS is both hardware and software. Like software, the BIOS is a set of instructions to the computer’s microprocessor. Like hardware, however, these instructions are not evanescent; rather they are coded into the hard, worldly silicon of PROM, EPROM chips. Due to the twilight state of programs like the BIOS, existing in the netherworld between hardware and software, such PROM-based programs are often termed firmware. The personality comes from the firmware code. This code determines how the computer will carry out the basic functions needed to make...
Words: 6641 - Pages: 27
...User Guide EVGA nForce 780i SLI Motherboard 780i 3-Way SLI Motherboard EVGA ii nForce 780i SLI Motherboard Table of Contents Before You Begin… ..................................................................................................... ix Parts NOT in the Kit .................................................................................................ix Intentions of the Kit ...................................................................................................x EVGA nForce 780i Motherboard..................................................................................1 Motherboard Specifications...................................................................................... 1 Unpacking and Parts Descriptions...............................................................................4 Unpacking ................................................................................................................ 4 Equipment ................................................................................................................ 4 EVGA nForce 780i SLI Motherboard ....................................................................... 5 Hardware Installation ....................................................................................................9 Safety Instructions.................................................................................................... 9 Preparing the Motherboard .........
Words: 12933 - Pages: 52
...An ISO 9001:2008 Certified Company LAPTOP Level-1 SERVICE TRAINING - COURSE SYLLABUS Day1 INTRODUCTION 1. What is laptop? 2. History of laptop 3. How work laptop? 4. Advantages of laptop instead of desktop 1. CARD LEVEL SERVICE [Hard Ware] 2. CHIP LEVEL SERVICE [Motherboard] 5. Difference between laptop and desktop LAPTOP MANUFACTURING COMPANIES-Acer /Apple /Compaq /Dell -etc. 6. How to buy a laptop? 7. Operating System review &laptop uses & laptop booting process 8. Guide to purchase of second hand laptop Day2 TOOLS AND TESTING EQUIPMENTS 1. LAPTOP HARDWARE TOOLS Screw Driver Kit Laptop Casing Opener Nose Pliers Cutter Electric Screw Driver Tweezer Anti Static Wrist Band PCB Cleaning Brush & etc 2. LAPTOP CHIP LEVEL TOOLS Micro Soldering Iron Tip Soldering Iron Hot Air Blower Magnifying Lenz with Lamp Liquid Flux Dry Flux & etc 3. TESTING EQUIPMENT 1.Anolog Mutimeter Digittal Mutimeter Battery Booster Universal AC adapter Debug card SATA to USB convertor IDE to USB convertor 4. OTHER HARDWARE SPARES External Monitor External DVD Drive Usb Keyboard / Mouse&etc Day3 Day4 Day5 Day6 Day7 Day8 5. ACCESSORIES Laptop bag LCD Screen Card LCD Cleaner & etc 6. ADVANCED TOOLS BGA Rework Machine Reballing Kits Infrared IC Heater PCB Scanner Oscilloscope [CRO] SMD IC Extractor PTH Desoldering Machine RCL Meter SMT ELECTRONICS INTRODUCTION RESISTOR CAPACITOR INDUCTOR & TRANSFOEMER LAPTOP PARTS VIEW & KEYBOARD & TOUCH...
Words: 2886 - Pages: 12
...initial zero power supply. A warm boot on the other hand takes place when a software application or operating system triggers the computer to perform a reboot. A successful boot is dependent on 3 conditions - the hardware, BIOS and operating system files to function without errors. When an error occurs, you will be notified by error messages, beeping sounds or in the worst scenario, a blank screen. Explain the purpose and functionality of Boot Configuration Data Store and Editor. Include in the explanation how to implement BCDEdit. The Bcdedit.exe command-line tool modifies the boot configuration data store. The boot configuration data store contains boot configuration parameters and controls how the operating system is booted. These parameters were previously in the Boot.ini file (in BIOS-based operating systems) or in the nonvolatile RAM entries (in Extensible Firmware Interface-based operating systems). You can use Bcdedit.exe to add, delete, edit, and append entries in the boot configuration data store. Detail and list 5 types of information the BCD registry file can contain and the various ways the BCD registry file can be modified. BCD was created to provide an improved mechanism for describing boot configuration data. With the development of new firmware models (for example, the...
Words: 440 - Pages: 2
...Install Basic Components 1. Identify the DIMM module(s) for your PC. Manufacturer: Crucial Model #: CT51264BA160BJ Size (GB): 4GB Manufacturer: WD Model #: WD300GB Size (GB): 300GB 2. List the steps for installing the DIMM module(s): 1. Unpack memory module 2. Find bank memory 0 3. Pull back on both end of the memory bank to ensure they are open 4. Align the notch at the bottom of the memory module with the one on the memory bank 5. Ensure both ends of the memory module are in the edge slots of the memory bank 6. Push down gently until you hear the memory clip in and you are done. 7. 8. 9. 10. 3. Explain the sensation that you received to verify that the RAM was properly seated within the Motherboard? I heard a clipping noise as if something had locked something in. 4. Explain the functionality and significance of the DIMM module(s). DIMM has 64 bits of transfer rate and its prone to less errors. 5. Please After installing the memory module on the motherboard, you need to verify if the BIOS detects the memory. In order to do that, boot the system and enter the BIOS set up according to the instructions that came with the processor. On the ‘Main’ tab of the BIOS set up, you will see an option called ‘System Memory’ or ‘Installed Memory’. Please verify that the memory you have installed matches the memory detected on the screen and note down your observations below. If the memory is not detected...
Words: 405 - Pages: 2
...identify his or her problem and the operating system’s tools that you would use to do so. In order to determine the cause of the instability you may need to probe the client and ask questions to help pinpoint the problem. Did the user receive any error messages? Is the computer just generally running slowly? Did the client recently install additional software or hardware? If the client is unable to help answer questions then a process of troubleshooting steps may need to be taken to solve the instability issue. Start with the booting up the computer and checking for any error messages during Power-On Self-Test or POST and that maybe BIOS related. Sometimes BIOS can let you know that a piece of hardware isn’t being detected properly. You may need to enable a device or setting which can be fixed in the BIOS setup. Check your BIOS settings and see that there are no errors in the configuration. A bad configuration can cause a halt the loading process of the OS. Another type of configuration that may need to be checked if Windows fails to load correctly is the Registry. Windows ME has a built in scanreg utility which automatically makes a backup of the registry every time it is booted successfully. You can try to...
Words: 2433 - Pages: 10
...A+ Test (801 & 802) %SystemRoot% The path where the operating system is installed. 10BaseT Ethernet LAN designed to run on twisted pair cabling at 10 megabits per second. Max cable length is 100 meters. Uses baseband signaling. 100BaseT Generic term for Ethernet cabling system designed to run at 100 megabits per second on twisted pair cabling. Uses baseband signaling. 1000BaseT Gigabit Ethernet on UTP. 110 block The most common connection used with structured cabling, connecting horizontal cable runs with patch panels. 16 bit (PC Card) Type of PC Card that can have up to 2 distinct functions or devices, such as a modem/network card combo. 3.5 inch floppy drive Size of all modern floppy disk drives; format was introduced in 1986. 2.1 speaker system Speaker setup consisting of 2 stereo speakers combined with a subwoofer. 34 pin ribbon cable Type of cable used by floppy disk drives. 3-D graphics Video technology that attempts to create images with the same depth and texture as objects seen int he real world. 40 pin ribbon cable PATA cable used to attach EIDE devices (such as hard drives) ATAPI devices (such as optical drives) to a system 5.1 speaker system Speaker setup sonsisting of 4 satellite speakers plus a center speaker and subwoofer. 64 bit processing Atype of processing that can run a compatable 64 bit operating system, such as Windows 7, and 64 bit applicatins. 64 bit PCs have a 64 bit wide address bus enabling them to use more than 4GB of...
Words: 3658 - Pages: 15
...E5755 Eee PC User Manual Windows® 7 Edition Eee PC 1001P/1005P/R101/ R105 Series 15G06Q256000 Table of Contents Table of Contents....................................................................................................................... ii About This User’s Manual.......................................................................................................iv Notes for This Manual..............................................................................................................iv Safety Precautions.....................................................................................................................v Transportation Precautions....................................................................................vi Charging Your Batteries..........................................................................................vii Airplane Precautions................................................................................................vii Chapter 1: Knowing the Parts Top Side.....................................................................................................................................1-2 Bottom Side..............................................................................................................................1-5 Front Side..................................................................................................................................1-6 Right...
Words: 7992 - Pages: 32
...whatsoever without the written permission of Dell Inc. is strictly forbidden. Trademarks used in this text: Dell, the DELL logo, Inspiron, Dell Precision, Dimension, OptiPlex, Latitude, PowerConnect, PowerEdge, PowerVault, PowerApp, Dell OpenManage, and Dell XPS are trademarks of Dell Inc.; Microsoft, Windows, MS-DOS, and Windows Server are registered trademarks of Microsoft Corporation; AMD and AMD PowerNow! are trademarks of Advanced Micro Devices, Inc.; EMC is a registered trademark of EMC Corporation. Other trademarks and trade names may be used in this document to refer to either the entities claiming the marks and names or their products. Dell Inc. disclaims any proprietary interest in trademarks and trade names other than its own. Model SVUA August 2006 P/N HJ362 Rev. A00 Downloaded from www.Manualslib.com manuals search engine Contents 1 About Your System . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 9 9 10 11 13 13 13 14 14 16 22 22 22 Other Information You May Need Accessing System Features During Startup . Front-Panel Features and Indicators Back-Panel Features and...
Words: 32860 - Pages: 132
...IT320 Unit 5 HW 1. When a router is first powered on, it completes a four-step initialization process: 1. Preforming a power-on self test (POST) 2. Loading a bootstrap program 3. Loading an IOS 4. Loading a configuration file The last three of these steps require the router to copy the files into RAM. Normally, most routers load an IOS image that is stored in flash memory and an initial configuration stored in NVRAM. 2. Routers use the following logic, in order, to attempt to load an IOS: 1. Load a limited-function IOS if the configuration register’s last hex digit is set to 0 or 1. 2. Load an IOS based on the configuration of boot system commands in the startup-configuration file. 3. Load the first file in flash as the IOS. 4. Use TFTP broadcasts to find a TFTP server and download an IOS from that server. 5. Load a limited-function IOS from ROM. In Step 1, the configuration register is a16-bit number that Cisco routers store in a hidden area of NVRAM. It can be set in a couple of ways and can be seen using the show version command. The most commonly used way to set its value is to use the config-register global configuration command. Routers use the 4 low-order bits of the configuration register as the boot field, which tells the router what to do in the first of the preceding five decision steps. If the value of the field is set to 0, the router loads the ROMMON (ROM Monitor), which is used for password recovery. If the value is set to1, the router loads...
Words: 448 - Pages: 2
...Knowledge Assessment Matching 1. Remote Desktop E. Based on the former Terminal Services 2. System image backup J. Saves data to a VHD file 3. BranchCache A. Conserves WAN bandwidth 4. Distributed cache mode B. Files cached on each client 5. Volume shadow copies H. Previous versions 6. Incremental backup D. Files changed since the last backup job 7. Windows RE I. Accessible from a Window 7 installation disk 8. Hosted cache mode C. Files cached on a central server 9. Windows Remote Management G. Executes PowerShell commands on remote computers 10. System restore point F. Configuration settings and registry information Multiple Choice 1. Which of the following service priority guidelines are not accurate? D. Departmental issues should be rated according to the function of the department. A problem with a computer belonging to a department that is critical to the organization, such as order entry or a customer service call center, should take precedence over a problem with a computer belonging to a department that can better tolerate a period of down time, such as research and development. 2. Place these troubleshooting steps in the correct order, using the procedure described in this lesson as your guide. B, D, C, A. B: Establishing the symptoms is the first step in troubleshooting any problem to determine exactly what is going wrong. D: Select the most probable cause. Once...
Words: 746 - Pages: 3
...BitLocker Drive Encryption Overview 73 out of 98 rated this helpful - Rate this topic Applies To: Windows Server 2008, Windows Server 2008 R2, Windows Vista BitLocker Drive Encryption is a data protection feature available Windows Server 2008 R2 and in some editions of Windows 7. Having BitLocker integrated with the operating system addresses the threats of data theft or exposure from lost, stolen, or inappropriately decommissioned computers. Data on a lost or stolen computer is vulnerable to unauthorized access, either by running a software-attack tool against it or by transferring the computer's hard disk to a different computer. BitLocker helps mitigate unauthorized data access by enhancing file and system protections. BitLocker also helps render data inaccessible when BitLocker-protected computers are decommissioned or recycled. BitLocker provides the most protection when used with a Trusted Platform Module (TPM) version 1.2. The TPM is a hardware component installed in many newer computers by the computer manufacturers. It works with BitLocker to help protect user data and to ensure that a computer has not been tampered with while the system was offline. On computers that do not have a TPM version 1.2, you can still use BitLocker to encrypt the Windows operating system drive. However, this implementation will require the user to insert a USB startup key to start the computer or resume from hibernation, and it does not provide the pre-startup system integrity verification...
Words: 1463 - Pages: 6
...Introduction To sum of the differences between ROM RAM BIOS and Post I will simply define the basis of each component while defining what they do. ROM is short for (Read-only Memory) Memory which data is prerecorded on a computer. ROM is simply data that cannot be eliminated even when the computer is off. When working in ROM it is difficult or nearly impossible to change. BIOS is short for the acronym (Basic Input Output System) it is a program which stores detailed information and enable the computer to boot. In addition a ROM chip located on the motherboard, it lets you access the basic setup and ensures that the BIOS will readily be available and will not de damaged by disk failures. RAM is (Random Access Memory) Memory that can be access randomly memory that can be access without touching preceding bytes. RAM is the typical memory found in most computers or printers. In addition, RAM is a volatile memory that requires power to keep information accessible. If power is lost, then memory can be lost. Lastly Post is the self-test which is activated by Bios. The post is designed to run checks on the motherboard. It necessary to use ROM for the BIOS because the ROM retains information on the computer even while shut down whereas RAM does not. Whenever a computer is being use the information is being stored on the RAM if the is ever a power shortage or the computer lose power the information is lost. RAM does not store memory when there is no power. POST beep codes make...
Words: 356 - Pages: 2
...Motherboard Answer the following questions 5 April 2015 Tanweer Haroon DeJong May The major components of the motherboard are as follows: memory and their slots which is the computer’s memory (RAM) and is one of the most important parts of the system board. The number of chips depends on the type of computer and its capacity. Expansion cards are a typical component of non-integrated system boards a graphic card is a perfect example, but this can be integrated into the motherboard. CPU and slots is the central processing unit and it’s a highly prolific part of the computer and is located on the right of a motherboard and can be identified as a result of the heat sink or cooling fan directly on it. BIOS chip directs the CPU with respect to how it relates with other parts of the computer. Its basic input and output system chip or integrated circuit is fixed on the board and is easily identifiable. CMOS battery, the complementary metal oxide semiconductor is a small battery on the system board that powers the CMOS memory. Power supply and connectors is the electrical unit of the system and if it’s bad the system will not work. Keyboard connector are located on the motherboard and there are two main types. The AT has a round connecting interface into the motherboard and the PS/2 connector is rectangular in shape and smaller. Modern motherboards come with both. Mouse connector its connecting port is located on the motherboard and its interface is usually round. Floppy...
Words: 431 - Pages: 2