...BIO 100 REVIEW SHEET Please read before you use this study guide: The review sheet may not include all the information that is required for the exam. It is just a supplementary material. You should focus on the lecture notes and use the reader as a reference to study for the exam. 1. What are the main traits for life? 2. What are the 5 kingdoms? What are some distinguishing characteristics of each? (ie. Presence of cell wall, multicellular/unicellular, functions, etc.) 3. What is the chemical formula of photosynthesis, and what is its function? 4. What is the formula of cellular respiration? What is its function? Where is its action generally located within the cell? 5. Know the hierarchy of matter (quark(organism) 6. The atomic number of an element is directly equal to what type of subatomic particle(s) of an element? 7. What are the three types of bonds? 8. The name of a chemical reaction to build molecules by taking away a water molecule is called ________ __________. 9. The name of a chemical reaction to break molecules by inserting a water molecule is called __________. 10. What are the 4 main elements of the body? 11. What are the 4 macromolecules called? What are their “building blocks”/subunits (monomers) called? Give functions of each macromolecule and examples. 12. What is the main energy currency of the body? 13. What is the smallest unit of life with living properties? 14. What is a cell called if...
Words: 501 - Pages: 3
...OS Class – Toms Hardware Essay – 02-15-14 BIOS For Beginners “BIOS for Beginners” explains just how essential the BIOS is for any standard personal computer built today. The BIOS which stands for the Basic Input Output System is a chip installed directly on the motherboard and acts as the middle man that gives commands between the hardware and the operating system. Having incorrect settings on the BIOS can slow your computer down nearly in half which is why it is so important as a technician to understand how it works and the importance of each function it provides. As processors advance, the more complex the BIOS becomes as well often leaving even experienced computer technicians scratching their heads. Any wrong move when altering settings can lead to your computer malfunctioning. If this happens, you may need to completely reset the BIOS to the factory settings using the jumpers built in on the motherboard. “It is recommended that you reboot after each individual BIOS setting change to ensure that your system functions normally. If you make numerous changes before rebooting, and your system will no longer boot, you won't know which change is responsible for the failure,” http://www.tomshardware.com/reviews/bios-beginners,1126.html. To enter the BIOS in most computers, you will be using the F1, F2 or DEL button to enter the system. However, there are sometimes a couple other options as well given from a list of options when accessing damages and repairing the computer...
Words: 483 - Pages: 2
...Ransomware Discuss the threat When infected restricts you to access to a computer system. This will become more refined in its targets and methods. Experts predict that the variants of ransomware that hurt the security software that are installed within a computer may particularly target the endpoints which sign up with cloud-based storage solutions like Google Drive, Dropbox, OneDrive and many more. On detecting the endpoint, ransomware will exploit the stored personal credentials of the logged-in user and will even infect the cloud storage that is backed up. McAfee has warned that ransomware attackers will try out as many ways possible to shell out ransom payments from their victims. Degree of damage The most advanced and most damaging ransomware in the wild at the moment, specifically targeting U.S. businesses and individuals. It's a $70 million per year criminal enterprise. Its magnitude is now confirmed by law enforcement. Some quick math shows $18,145 in costs per victim, caused by network mitigation, network countermeasures, loss of productivity, legal fees, IT services, and/or the purchase of credit monitoring services for employees or customers. As you can see, the total costs of a ransomware infection goes well above just the ransom fee itself, which is usually around $500 but can go up to $10,000. What it attacked Ransomware is a type of malware that infects a computer and restricts a user’s access to the infected computer. This type of malware...
Words: 2057 - Pages: 9
...a laptop? 7. Operating System review &laptop uses & laptop booting process 8. Guide to purchase of second hand laptop Day2 TOOLS AND TESTING EQUIPMENTS 1. LAPTOP HARDWARE TOOLS Screw Driver Kit Laptop Casing Opener Nose Pliers Cutter Electric Screw Driver Tweezer Anti Static Wrist Band PCB Cleaning Brush & etc 2. LAPTOP CHIP LEVEL TOOLS Micro Soldering Iron Tip Soldering Iron Hot Air Blower Magnifying Lenz with Lamp Liquid Flux Dry Flux & etc 3. TESTING EQUIPMENT 1.Anolog Mutimeter Digittal Mutimeter Battery Booster Universal AC adapter Debug card SATA to USB convertor IDE to USB convertor 4. OTHER HARDWARE SPARES External Monitor External DVD Drive Usb Keyboard / Mouse&etc Day3 Day4 Day5 Day6 Day7 Day8 5. ACCESSORIES Laptop bag LCD Screen Card LCD Cleaner & etc 6. ADVANCED TOOLS BGA Rework Machine Reballing Kits Infrared IC Heater PCB Scanner Oscilloscope [CRO] SMD IC Extractor PTH Desoldering Machine RCL Meter SMT ELECTRONICS INTRODUCTION RESISTOR CAPACITOR INDUCTOR & TRANSFOEMER LAPTOP PARTS VIEW & KEYBOARD & TOUCH PAD 1. components of laptop -Bottom Case &Top Case Outside Components/ Inside Components / laptop Inner View 2. INSIDE COMPONENTS: 1.Ram, 2.Hard Disk, 3.Battery 4.Wi-fi Cards 5.PCMCIA Card 6.Floppy Disk, 7.DVD/CDR Drive, 8.Speaker, 9.Exaust Fan 10.Processor, 11.Heat Sink 12.Adapter & Adapter Connector 13.Motherboard 14.LCD screen 3. Internal Keyboard review /inner view /key board...
Words: 2886 - Pages: 12
...Introduction The BIOS performs a power-on self-test when the system is turned on. This test is used to ensure that the system is functioning properly and to gather information about what the system contains. When a problem is identified with the system during the POST, the BIOS will normally produce an error message. However, in some cases the problem is detected so early in the test that the BIOS cannot access the video card to print the message. In this case the BIOS will produce a beeping pattern on the speaker to tell you what the problem is. The exact meaning of the beep codes depends on the type and version of BIOS that you have. The most popular types of BIOS are those made by Award American Megatrends (AMI) and Phoenix. AMI 6 Beeps: Keyboard controller / gate A20 failure The keyboard controller is a chip on the motherboard that communicates with your keyboard. It also controls the A20 gate that provides access to the high memory area (HMA). This component is indicating a failure. This is a problem with either the keyboard or the motherboard. Phoenix 1-3-4-1 Test 512 base address lines. Sometimes a memory stick can become loose causing the computer to be unable to read the memory or get errors as it's reading it. Try fixing this issue by opening the computer removing each of the memory sticks you have in the computer and then placing them back into the slots, reset the memory and restart the computer. If this doesn’t work replace the memory. Basic Security Hardware ...
Words: 962 - Pages: 4
...1.why is all data stored in a computer in binary form? Computers are only able to read and store data in binary form, 1 or 0, on or off, yes or no, voltage or none. Binary is the simplest way to manage information. 2. What are the four primary functions of hardware? input, output, PROCESS, and Storage 3. What are the two main input devices and two main output devices? the mouse, keyboard, printer, and monitor. 4. What three things do electronic hardware devices need in order to function? power, ground return, and load. 5. How many bits are in a byte? There are eight bits in a byte. 6. What is the purpose of an expansion slot on a motherboard? Expansion slots on a motherboard are designed to accept peripheral cards that add functionality to a computer system, such as a video or a sound card. 7. Which component on the motherboard is used primarily for processing? The CPU 8. Name the two main CPU manufacturers. Intel and AMD 9. Order the following ports according to speed, placing the fastest port first: FireWire, eSATA, USB. eSATA is faster than FireWire and firewire is faster than USB. 10. What are two other names for the system bus? The PCI bus, and the PCI express bus 11. What type of output does an S/PDIF port provide? Digital output 12. Why is an SSD hard drive more reliable under rugged conditions than an IDE hard drive? SSD hard drives have no moving parts that can disintegrate under rugged conditions. Because SDD drives have...
Words: 1535 - Pages: 7
...Biology Final Exam Review Sheet a) The identity of each element is defined by the number of protons in its nucleus a. The physical and chemical properties of each element are defined by: i. Number of protons and neutrons in the nucleus ii. Number of electrons orbiting the nucleus Proton = mass of one & a positive charge Neutron = mass of one and no charge Electron = negligible mass and a negative charge Isotopes of an element a) Isotopes are different forms of the same element a. Same number of protons b. Same number of electrons orbiting c. Different number of neutrons Chemical Bonds & Interactions a) Covalent bonds – sharing of electron pairs b) Ionic attraction – attraction of opposite charges c) Hydrogen bond – electrical attraction between a covalently bonded H atom and an electronegative atom d) Hydrophobic Interactions – interaction of non – polar substances in the presence of polar substances e) van der Waals Interaction – interaction of electron of non-polar substances Fatty Acids Have Long Tails Formed by Covalently Linked Carbons a) All bonds between carbon atoms are single in a saturated fatty acid (chain is straight) b) The straight chain allows a molecule to pack tightly among other similar molecules c) Double bonds between two carbons make an unsaturated fatty acid (carbon chain has kinks) d) Kinks prevent close packing Condensation and Hydrolysis of Polymers a) Covalent bond is formed between monomers b) Water is removed in condensation ...
Words: 1279 - Pages: 6
...IT320 Unit 5 HW 1. When a router is first powered on, it completes a four-step initialization process: 1. Preforming a power-on self test (POST) 2. Loading a bootstrap program 3. Loading an IOS 4. Loading a configuration file The last three of these steps require the router to copy the files into RAM. Normally, most routers load an IOS image that is stored in flash memory and an initial configuration stored in NVRAM. 2. Routers use the following logic, in order, to attempt to load an IOS: 1. Load a limited-function IOS if the configuration register’s last hex digit is set to 0 or 1. 2. Load an IOS based on the configuration of boot system commands in the startup-configuration file. 3. Load the first file in flash as the IOS. 4. Use TFTP broadcasts to find a TFTP server and download an IOS from that server. 5. Load a limited-function IOS from ROM. In Step 1, the configuration register is a16-bit number that Cisco routers store in a hidden area of NVRAM. It can be set in a couple of ways and can be seen using the show version command. The most commonly used way to set its value is to use the config-register global configuration command. Routers use the 4 low-order bits of the configuration register as the boot field, which tells the router what to do in the first of the preceding five decision steps. If the value of the field is set to 0, the router loads the ROMMON (ROM Monitor), which is used for password recovery. If the value is set to1, the router loads...
Words: 448 - Pages: 2
...Knowledge Assessment Matching 1. Remote Desktop E. Based on the former Terminal Services 2. System image backup J. Saves data to a VHD file 3. BranchCache A. Conserves WAN bandwidth 4. Distributed cache mode B. Files cached on each client 5. Volume shadow copies H. Previous versions 6. Incremental backup D. Files changed since the last backup job 7. Windows RE I. Accessible from a Window 7 installation disk 8. Hosted cache mode C. Files cached on a central server 9. Windows Remote Management G. Executes PowerShell commands on remote computers 10. System restore point F. Configuration settings and registry information Multiple Choice 1. Which of the following service priority guidelines are not accurate? D. Departmental issues should be rated according to the function of the department. A problem with a computer belonging to a department that is critical to the organization, such as order entry or a customer service call center, should take precedence over a problem with a computer belonging to a department that can better tolerate a period of down time, such as research and development. 2. Place these troubleshooting steps in the correct order, using the procedure described in this lesson as your guide. B, D, C, A. B: Establishing the symptoms is the first step in troubleshooting any problem to determine exactly what is going wrong. D: Select the most probable cause. Once...
Words: 746 - Pages: 3
...BitLocker Drive Encryption Overview 73 out of 98 rated this helpful - Rate this topic Applies To: Windows Server 2008, Windows Server 2008 R2, Windows Vista BitLocker Drive Encryption is a data protection feature available Windows Server 2008 R2 and in some editions of Windows 7. Having BitLocker integrated with the operating system addresses the threats of data theft or exposure from lost, stolen, or inappropriately decommissioned computers. Data on a lost or stolen computer is vulnerable to unauthorized access, either by running a software-attack tool against it or by transferring the computer's hard disk to a different computer. BitLocker helps mitigate unauthorized data access by enhancing file and system protections. BitLocker also helps render data inaccessible when BitLocker-protected computers are decommissioned or recycled. BitLocker provides the most protection when used with a Trusted Platform Module (TPM) version 1.2. The TPM is a hardware component installed in many newer computers by the computer manufacturers. It works with BitLocker to help protect user data and to ensure that a computer has not been tampered with while the system was offline. On computers that do not have a TPM version 1.2, you can still use BitLocker to encrypt the Windows operating system drive. However, this implementation will require the user to insert a USB startup key to start the computer or resume from hibernation, and it does not provide the pre-startup system integrity verification...
Words: 1463 - Pages: 6
...Introduction To sum of the differences between ROM RAM BIOS and Post I will simply define the basis of each component while defining what they do. ROM is short for (Read-only Memory) Memory which data is prerecorded on a computer. ROM is simply data that cannot be eliminated even when the computer is off. When working in ROM it is difficult or nearly impossible to change. BIOS is short for the acronym (Basic Input Output System) it is a program which stores detailed information and enable the computer to boot. In addition a ROM chip located on the motherboard, it lets you access the basic setup and ensures that the BIOS will readily be available and will not de damaged by disk failures. RAM is (Random Access Memory) Memory that can be access randomly memory that can be access without touching preceding bytes. RAM is the typical memory found in most computers or printers. In addition, RAM is a volatile memory that requires power to keep information accessible. If power is lost, then memory can be lost. Lastly Post is the self-test which is activated by Bios. The post is designed to run checks on the motherboard. It necessary to use ROM for the BIOS because the ROM retains information on the computer even while shut down whereas RAM does not. Whenever a computer is being use the information is being stored on the RAM if the is ever a power shortage or the computer lose power the information is lost. RAM does not store memory when there is no power. POST beep codes make...
Words: 356 - Pages: 2
...Motherboard Answer the following questions 5 April 2015 Tanweer Haroon DeJong May The major components of the motherboard are as follows: memory and their slots which is the computer’s memory (RAM) and is one of the most important parts of the system board. The number of chips depends on the type of computer and its capacity. Expansion cards are a typical component of non-integrated system boards a graphic card is a perfect example, but this can be integrated into the motherboard. CPU and slots is the central processing unit and it’s a highly prolific part of the computer and is located on the right of a motherboard and can be identified as a result of the heat sink or cooling fan directly on it. BIOS chip directs the CPU with respect to how it relates with other parts of the computer. Its basic input and output system chip or integrated circuit is fixed on the board and is easily identifiable. CMOS battery, the complementary metal oxide semiconductor is a small battery on the system board that powers the CMOS memory. Power supply and connectors is the electrical unit of the system and if it’s bad the system will not work. Keyboard connector are located on the motherboard and there are two main types. The AT has a round connecting interface into the motherboard and the PS/2 connector is rectangular in shape and smaller. Modern motherboards come with both. Mouse connector its connecting port is located on the motherboard and its interface is usually round. Floppy...
Words: 431 - Pages: 2
...Fall BIOS – Instructor: Mrs. Nicholas – NT1110 – 1 May 2014 Lavon Hawkins BIOS SUMMARY Lavon Hawkins BIOS SUMMARY BIOS BIOS: The BIOS is software which is stored on the motherboard. It tells the computer how to perform a number of basic functions such as booting and keyboard control. It is also used to identify and configure the hardware in a computer such as hard drive, floppy drive, optical drive, CPU, memory and so on. CMOS: The complementary metal oxide semiconductor is the type of semiconductor chip on the motherboard which stores the system information and computer settings such as date, time, hard drive settings, boot sequence, parallel part settings, on-base audio and video etc. Firmware: Firmware is a combination of software and hardware. Computer chips that have data or programs recorded on them are firmware. POST: The POST or power on self-test is a test the computer does when it first boots up. It’s to verify all the hardware is working. If all checks out it usually gives a single beep. If not a beep code could come up. Beep Code: A beep code is an audible code which is generated during the POST (Power On Self Test) when the BIOS has an issue but has not made it all the way up the boot sequence that it can give you the error as a message on the monitor BIOS update: Updating the BIOS can fix or enhance aspects of a computers performance. Or it may provide support for newly installed hardware. 1 Flash BIOS update: A BIOS chip...
Words: 353 - Pages: 2
...products that are new and cheaper than the ones that came before. This way a company is able to take a product that is already out on the market and take it apart piece by piece and see how it works so they can rebuild it cheaper and more efficiently. One famous example of reverse engineering is in the mid-1980s Phoenix Technologies Ltd wanted to produce a BIOS for PCs that would be compatible with the IBM PCs proprietary BIOS. To protect themselves from any charges of illegally copying their BIOS they used what is called a clean room. With the clean room approach there are two teams; one that studies the BIOS that they are trying to recreate and they come up with a detailed report of what it is exactly the BIOS does without using any of the code or anything that will link their description to that particular BIOS. Then this description is given to another team that has not looked at the code of the BIOS they are recreating and they build whole new BIOS off those instructions. This way even if some of the code is the same it will not be a copy right infringement since the second team who actually wrote the code and built the BIOS...
Words: 792 - Pages: 4
...on a motherboard? Why can these busses not be replaced with a single bus? • With 64-bit busses available, why should 32-bit busses be provided as well? The motherboard of a computer is also known as the System Board. The circuit board is the platform on which all the hardware of the computer is connected. It is said to be the most important part of the computer. The expansion cards, and slots, BIOS chip, CMOS battery, jumpers and DIP switches, heat sink, PCI, Power connector, on board disk drive connectors, memory slots, keyboard connectors, Peripheral ports and connectors are all the things that one may find on the motherboard. The expansion cards are a typical part of nonintegrated system board. An example of this is a graphic card. Memory slots are one of the most important part of the system board. The number of memory chips on a motherboard depends on the type of CPU and its capacity. The slots are usually white and black and close in proximity to one another. The BIOS chip is also a very important part of the system board. It directs the CPU to other parts of the computer. BIOS and its manufacturers name are usually written on the chip. The CMOS battery or (complementary Metal Oxide Semiconductor) is a small battery on the system...
Words: 617 - Pages: 3