...Week 4 Lab 1 This lab involves research on the size, speed, and slot type for RAM, as well as the model, interface type, capacity, and transfer rate of hard disks and optical disks in your computer system. Required Setup and Tools In this laboratory, you need: * A desktop or notebook computer * Access to the Internet for research Recommended Procedures Task 1: Examining RAM To find out the types of RAM available to upgrade your computer, follow these steps: 1. Acquire computer information: Determine the make, model, and serial number of your computer by physically examining it. On a desktop computer, these numbers are on the back of the computer. For a laptop computer, this information is on the bottom of the computer. If the model and serial number are not clearly visible, refer to the manufacturer’s website for this information; otherwise, select a laptop you would consider buying for yourself and use its model number to obtain the information. a. Service Tag FPR5SW1 b. Computer Model Inspiron N7010 1 In Microsoft 10 go to life at a glance. 2 Go to settings 3 System 4 about That is where you will find it very simple. 1. Check the commercial RAM website: Search the Internet for the commercial website of the manufacturer of the RAM by its name. Go to the RAM memory website and type in the make, model, and serial number, if required, of your computer. Search for the information on exact...
Words: 539 - Pages: 3
...Computers, networks, and software are the heart and soul of the IT world today. Because of the availability of those systems, they are very vulnerable to malicious attacks and activity. It is of upmost importance that an organization takes security seriously and takes the proper measures to protect their systems. They can do this through a number of different ways, but one area of focus is through the authentication process and the related hardware and software to go along with it. Identification and Authentication Authentication is the process of the system or program recognizing the user and granting them access, which has been predetermined by access controls. It begins with two major parts; Identification and Authentication. Identification is the process in which the system recognizes the user and gives them access according to Abstract object that are controlled by the administrators of the files and systems. Privileges will be granted based on their user account having been verified. This process is usually a user ID. The system recognized the ID and knows the access right and privileges of that individual that have been verified. The Authentication begins once the user account ID has been identified. This is the process in which the user credentials are actually verified, meaning the specific attributes of their specific user account and authenticated and verified to make sure the access rights are correct. This process uses a password or some sort of credential such...
Words: 2199 - Pages: 9
...TEST LAB NETWORK. | |COMPLETION TIME |30 MINUTES | Required: Paste a snapshot of your virtual machine settings after the appliance is installed. |Exercise 1.2 |Working with Disks | |Overview |In this exercise, you will create a second Virtual Hard drive. You will need the new computer to have| | |two installed disk drives. You will then initialize the second disk and create data partitions on the| | |computer. | |Completion time |30 minutes | Required: Paste a snapshot of your virtual machine settings after the second hard drive is installed. |Exercise 1.3 |Exploring Windows 7 | |Overview |In order to familiarize yourself with the new Operating System being rolled out in your organization,|...
Words: 253 - Pages: 2
...Giovanna Oravec NT1110: Computer Structure and Logic Module 3 Short Answer Exploring Motherboard and Busses October 7, 2015 Exploring the Motherboard and Busses The motherboard represents the logical foundation of the computer. Everything that makes a computer must be attached to the motherboard. Answer the following questions: • What are the major components of the motherboard? Provide a brief description of each component. • Upgrading only the motherboard will give some performance improvement to a computer system. Why would the improvement be limited? • What is the need for all the different busses found on a motherboard? Why can these busses not be replaced with a single bus? • With 64-bit busses available, why should 32-bit busses be provided as well? The motherboard of a computer is also known as the System Board. The circuit board is the platform on which all the hardware of the computer is connected. It is said to be the most important part of the computer. The expansion cards, and slots, BIOS chip, CMOS battery, jumpers and DIP switches, heat sink, PCI, Power connector, on board disk drive connectors, memory slots, keyboard connectors, Peripheral ports and connectors are all the things that one may find on the motherboard. The expansion cards are a typical part of nonintegrated system board. An example of this is a graphic card. Memory slots are one of the most important part of the system board. The number of memory chips on a motherboard depends...
Words: 617 - Pages: 3
...Farhana Haque NT1110 4/21/15 Exploring the Motherboard and Busses The motherboard represents the logical foundation of the computer. Everything that makes a computer must be attached to the motherboard. The major components of a motherboard include I/O port cluster, memory slots and expansion slots, and mass storage interfaces. All of these components work together to make the computer run as efficiently as possible. The integrated I/O port cluster can be located in as many as three different places. All motherboards feature a rear port cluster, and many motherboards also have additional ports on the top of the motherboard that are routed to header cables accessible from the front and rear of the system. The most recent motherboard include serial (COM), parallel (LPT), PS/2 mouse, PS/2 keyboard, USB 2.0, Ethernet, audio, FireWire, VGA, and HDMI ports. Integrated ports provide efficiency when it comes to performance and installment, but may provide problems when it comes to repair. Modern motherboards include two or more memory slots. Memory slots vary in design according to the type of memory the system supports. Each memory slot includes locking levers that secure memory in place. Motherboards use expansion slots to provide support for additional I/O devices and high-speed video/graphics cards. The most common expansion slots on recent systems include PCI, AGP, and PCIe. Some systems also feature AMR or CNR slots for specific purposes. Mass storage interfaces include...
Words: 628 - Pages: 3
...Exploring the Motherboard and Busses Short Answer Assignment Instructor Haroon Margaret Harm 2/18/2016 1. What are the major components of the motherboard? CPU-Central Processing Unit- also known as the microprocessor or processor. It is the “brain” of the computer. It is responsible for fetching, decoding, and executing program instructions and mathematical and logical calculations. RAM-Random Access Memory- is volatile memory, meaning that it loses its contents once the power is turned off. Basically, it is the work place of the computer where active programs and data are loaded so that any time the processor requests them, it doesn’t have to fetch them from the hard disk which will take longer access time. BIOS-Basic Input Output System- consists of low-level software that controls the system hardware and acts as an interface between the operating system and the hardware. BIOS is all the drivers- it is the link between hardware and software in a system. CMOS-Complementary Metal Oxide Semiconductor- a small separate block of memory made from CMOS RAM chips, supported by a CMOS battery even when the power is off. It is used to store basic information about the PC’s configuration, for example, floppy disk and hard disk drive types, CPU, RAM size, date and time, serial port information, plug and play information, and power saving settings. Cache memory- a small block of high speed memory that enhances PC performance by pre-loading information from the main memory...
Words: 532 - Pages: 3
... Properly Maintain Your Computer 2 With technology on the rise, computers have taken over and become a necessity in our daily lives. With high speed Internet we have many uses for our computers such as looking for the best shopping deals, gathering news from around the world, watching videos or exploring the web. For some people their careers depend on a computer. Graphic design artists use illustrator and Photoshop to come up with designs for a company logo or website. All these uses put wear and tear on a computer. Like a car, your computer needs to be properly cared for and looked after. There are a few simple steps one can follow to maintain a well functioning computer. Before going above and beyond and taking your computer fully apart you might want to first make sure you have a good anti-virus software installed onto your computer. It is very important that you have this because malware can be very harmful. Also you don’t want to let your hard drive work to hard; your computer is an expensive tool. Clearing out unused files and programs will help take some load off. This is called disk clean up and should be done monthly. These files, like all the rest take up space, which overworks your computer. With constant usage it produces a lot wear and tear. Take a look at your Windows registry. Is it clogged with a lot of junk? Unclogging it can really help the performance of your computer. Next you should...
Words: 526 - Pages: 3
...Summary In this article, the author introduced the different types of innovations, namely incremental innovation, modular innovation, architectural innovation and radical innovation. Categorization of each product is determined by its degree of change in either component knowledge or architecture knowledge, or both. Each innovation cannot be entirely classified into a particular category; it depends on the more domineering change. In this report, it is assumed that firms aim to maximize profit from innovation and it aims to evaluate the survival of incumbents in architectural innovations. Incumbents in architectural innovation The article went into the details of architectural innovation, where incumbents face position threats from new entrants. These are the reasons that can contribute to the stability of incumbents in the market. Firstly, incumbents tend to be complacent and less receptive towards changes after producing the dominant design in the market. For productive architectural innovation to take place, the team has to overcome outdated beliefs as well as existing management systems. This might pose as a difficulty to them as they can be over reliant and be unreceptive towards new knowledge even after architectural innovation. However, new entrants, as a fresh and motivated team, they tend to be more driven to innovate and outshine all competitors in order to break into the market remarkably. As such, having a higher possibility to construct new architectural knowledge...
Words: 935 - Pages: 4
...INSTITUTION OF CONTINUING EDUCATION (I.C.E) RIVERS STATE COLLEGE OF ARTS AND SCIENCE RUMUOLA, PORT HARCOURT. NAME: JOSHUA JAKES DEPARTMENT: SAFETY AND SECURITY MANAGEMENT COURSE TITLE: HEALTH RELATED PROBLEMS IN WORK PLACES COURSES CODE: KSS 207 Assignment on. Explain 5 ways were by management can promote and Maintain the health of workers JUNE, 2014 Hard disk drive "Hard drive" redirects here. For other uses,. | A 2.5" SATA hard drive | | | Invented by | | A disassembled and labeled 1997 HDD laying atop a mirror. Overview of how an HDD functions A hard disk drive (HDD)[b] is a data storage device used for storing and retrieving digital information using rapidly rotating disks (platters) coated with magnetic material.[2] An HDD retains its data even when powered off. Data is read in a random-access manner, meaning individual blocks of data can be stored or retrieved in any order rather than sequentially. An HDD consists of one or more rigid ("hard") rapidly rotating disks (platters) with magnetic heads arranged on a moving actuator arm to read and write data to the surfaces. Introduced by IBM in 1956,[3] HDDs became the dominant secondary storage device for general purpose computers by the early 1960s. Continuously improved, HDDs have maintained this position into the modern era of servers and personal computers. More than 200 companies have produced HDD units, though most current units are manufactured by Seagate, Toshiba and Western Digital...
Words: 4503 - Pages: 19
...Configure Storage Devices | | * CD / DVD / RW / Blu-Ray | Personal Computer Components, Storage Devices Installing and Configuring System Components, Install and Configure Storage Devices | | * Removable storage | Personal Computer Components, Storage Devices Installing and Configuring System Components, Install and Configure Storage Devices | | * Tape drive | Personal Computer Components, Storage Devices Installing and Configuring System Components, Install and Configure Storage Devices | | * Solid state (e.g. thumb drive, flash, SD cards, USB) | Personal Computer Components, Storage Devices Installing and Configuring System Components, Install and Configure Storage Devices | | * External CD-RW and hard drive | Personal Computer Components, Storage Devices Installing and Configuring System Components, Install and Configure Storage Devices | | * Hot swappable devices and non-hot swappable devices | Personal Computer Components, Storage Devices Installing and Configuring System Components, Install and Configure Storage Devices | | |...
Words: 6966 - Pages: 28
...Exploring Innovation in Action: The Changing Nature of the Music Industry Can you map the different kinds of innovation in the case study? Which were incremental and which radical/discontinuous? Why? Give examples to support your answer. One of the innovations in this case study is e-tailing. E-tailing or Electronic retailing is a channel where business-to-business and business-to-consumer sale goods and services through the internet in which revenue can come from the sale of products and services, through subscriptions to website content, or through advertising (Investopedia). In this case study, the ‘e-tailing’ channel obtained the latest hard copy CD’s you can imagine. CD’s were one of the greatest technologies where one can listen to music and enjoy tunes. Although when CD’s were a big hit, most of the albums were purchased through online. As technology became more advances the music innovations increase and tailoring of the music purchasing service and demonstrate some of the ‘richness/reach’ economic shifts of the new Internet game (Tidd 46). It also changed the distribution of CD’s by converting music to an MP3 format in which files can easily be moved through the internet quickly and be shared amongst other users. Another great thing about MP3’s, Motion Picture Experts Group (MPEG), used a powerful algorithm for managing one of the big problems in transmitting audio music files compression. Normal audio files cover a wide range of frequencies and are thus very large...
Words: 633 - Pages: 3
...team in making decisions and providing financial backing to the project’s research. A portion of the Kitty Hawk team’s downfall was their aggressive goals for revenue growth rate, and break-even timelines. In their quest to prove themselves to upper management, they pushed themselves extremely hard to reach a growth rate of 35%. They wanted HP to “become a significant industry leader.” The Kitty Hawk team also wanted to achieve a breakeven time of less than 36 months, which may be the main reason why HP missed perhaps its largest opportunity. At the time, Nintendo was shipping around 1.5 million game cartridges a day during the holiday season. Kitty Hawk team leader Rick Seymour and marketing manager Jeff White had the idea that Nintendo could use their 1.3” disk drive for storage of all their video games. The volume of 1.5 million was appealing, but due to Nintendo’s cost prohibitive $50 per disk drive, Kitty Hawk leaders soon turned their efforts towards other ideas mostly because they believed that they would not achieve their break even goal. Initially, the way Kitty Hawk set out to find a market, in my opinion, was creative and intuitive all at once. By exploring electronics trade shows, they stumbled upon Nintendo and in...
Words: 1069 - Pages: 5
...Exploring The Motherboard and Busses Gregory Henry 1136-E2-NT1110 Henderson, David 1. What are the major components of the motherboard? Provide a brief description of each component. The motherboard has a variety of components that make it up. The brains, and most important part is the CPU, or central processing unit. It is where all the calculations of the computer take place. The CPU is generally just one chip, called a microprocessor, which connects via small metallic pins directly to the motherboard. Each CPU contains two components, an ALU, which carries out all the arithmetic and logical operations of the computer, and the CU, which actually gives the computer instructions on how to do tasks and executes them. In terms of computer memory RAM is where data is kept from the operating system and applications so that they can quickly be used by the processor. However, once you turn your computer off all the data is lost. Think of it as short term memory. Long-term memory would be your Hard Drive. The hard drive can come in two forms. An HDD, which uses a rapidly spinning disk coated in magnetic material to store information. It has non-volatile memory, meaning it retains information when powered off. The other kind of hard drive is a Solid State Drive, or SSD. Solid State has significantly higher rates of transfer, better reliability, and lower latency access times. But that premium comes at a price, as SSDs are generally more expensive per bit of storage...
Words: 628 - Pages: 3
...Table of Contents Introduction 2 System Description 2 System Strengths and Weaknesses 4 System Protection Options 5 Antivirus Protection 5 Firewall 6 Comprehensive system configuration management 6 Application Whitelisting 6 Disk and filesystem-level Encryption 7 Tiered level authentication and Biometric level access 7 Risk Mitigation Strategies 7 Conclusion 10 Bibliography 11 Introduction The purpose of this white paper is to demonstrate the strength and potential weaknesses of the firms’ computer systems, and also to address the upper managements concerns over a possible threat of an internal or external attack to our systems. In this paper we will also be discussing the steps that have been taken to secure our systems against both forms of attacks; we will also be exploring risk mitigation strategies that serve as a means to help prevent such attacks from ever occurring. As with ever system, there is always the possibility of a sophisticated attack being invented that is capable of breaching our systems, so we will be addressing the strategies and steps that will be taken in the event that our systems are ever breached by an internal or external attack. System Description The system in question that is being used by the organization is the Dell Precision R5500 Rack Workstation. We currently have a total of 20 such workstations and our systems are equipped with the latest technological components and...
Words: 1763 - Pages: 8
...Exploring the Motherboard and Busses | | Short Answer 8/3/2014 James Kelly Andrew Spruell The motherboard is the printed circuit board containing the principal components of a computer or other device, with connectors into which other circuit boards can be slotted. It has a couple of major components that I will discuss with a couple of major components that I will discuss. Motherboard Basics A computer has many components, each with their own roles and functions. The role of the motherboard is to allow all these components to communicate with each other. Processor Socket The processor socket is the central piece of a motherboard, usually being located near the center of the motherboard. Power Connectors No computer component can operate without power, and a motherboard is no exception. The power connector, commonly a 20 or 24-pin connector, can be situated either near the right edge of the motherboard, or somewhere close to the processor socket on older motherboards. Memory Slots Located in the upper-right part of the motherboard, the memory slots are used to house the computer’s memory modules. The number of slots can vary, depending on motherboard, from 2, in low-end motherboards, all the way up to 8 memory slots, o our mother board Upgrading only the motherboard will give some performance improvement to a computer system. But the improvement performance will be limited as the motherboard doesn't really improve the overall power of your system...
Words: 524 - Pages: 3