Free Essay

107 Bio

In:

Submitted By suong
Words 2760
Pages 12
CXA107 2015

CXA107 Fundamentals of Bioscience
Practical and Independent Study: Circulatory Systems
TO PREPARE FOR THIS PRACTICAL:

Begin to familiarise yourself with the organs of the cardiovascular system by completing as many labelling exercises as possible BEFORE you attend. Your lecture notes, A&P Revealed and your Saladin textbook will be of assistance.
DURING THE PRACTICAL:

Use the time available in class to concentrate on becoming familiar with the structures in three dimensions on models or dissected specimens.

You must be able to locate and name each structure that is in bold typeface as you will be examined on a selection of these in your anatomy practical examination at the end of the semester. 
Ask questions/take notes about the questions or parts of activities in italics
INDEPENDENT STUDY AFTER THE PRACTICAL:

Complete the questions or parts of activities in italics as part of your independent study.

If you set aside 20 minutes, over a few days, for each activity you will make steady progress in developing your knowledge base.

Learning Objectives:
Completion of these learning activities should assist you in:
 Identifying the position of the heart and major vessels relative to musculoskeletal structures.
 Identifying internal and external features of the heart.
 Relating these anatomical features to the function of the heart.
 Identifying a selection of systemic blood vessels.
References you may find helpful for your learning:
Lecture notes, Circulatory Systems.
Saladin, K. 2015. Chapter 19 (Sections 19.1 & 19.2) and Chapter 20 (Sections 20.7 & 20.8)
A&P Revealed 3.0, Cardiovascular module:
Dissection
Animations – Blood flow through heart; Pulmonary & systemic circulations
Body regions from your Introductory Topics practical notes (will help with the names of blood vessels)
Resources to help you achieve the learning objectives:
You may use dissected specimens (if they are available), models, charts, A&P Revealed and texts to achieve the learning objectives.

1

CXA107 2014

Part A: Anatomy of the Heart
Do the labeling before you come to the practical session and then locate and identify all of these structures on models or dissected specimens.

Location and External Features of the Heart
1. Examine the dissected specimens/torso models to determine the position of the heart in the thorax, and its relationship to other features. (a) Note the position of the base and apex of the heart.
(b) Identify the bony/surface landmarks that correspond to the borders of the heart:


Upper border of the right 3rd costal cartilage to the middle of the right 6th costal cartilage, approximately 1 cm lateral to the sternal border



Lower border of the left 2nd costal cartilage to the left 5th intercostal space at the mid-clavicular line
Learning strategy:
Palpate these surface landmarks on yourself to determine the location of your own heart.

(c) Identify the pericardium, make sure that you can locate the following layers:
• visceral
• parietal (use A& P Revealed to identify this layer if you are using torso models)
(d) Where is the pericardial cavity? What is contained in this cavity and what function does it serve? ................................................................................................................................................................
................................................................................................................................................................
................................................................................................................................................................
2. Orientate an isolated specimen of the heart or a heart model.
(a) On the external aspect of the model/specimen, identify the following features:
Chambers of the heart:

Grooves in the surface of the heart that mark the boundaries between chambers:

right atrium left atrium right ventricle left ventricle

atrioventricular sulcus (also known as the coronary sulcus) anterior interventricular sulcus posterior interventricular sulcus

2

CXA107 2014

Anterior view

Posterior view

3

CXA107 2014

Internal Features of the Heart
3. On an isolated specimen or model, examine the internal features of the heart and the major blood vessels attached to it.
As you follow the path of blood flow through the heart (outlined on the following page), note the vessels and chambers that deoxygenated blood flows through (e.g. colour in blue) and those oxygenated blood flows through (e.g. colour in red).

right & left atria right & left ventricles interatrial septum interventricular septum epicardium (visceral pericardium) myocardium endocardium right & left atrioventricular valves pulmonary semilunar valve aortic semilunar valve chordae tendineae papillary muscles superior vena cava inferior vena cava aorta pulmonary trunk pulmonary veins opening of coronary sinus

(a) Compare and contrast the thickness of the walls of the atria and each ventricle.
How does the structure of the chamber walls suit their function as a receiving or pumping chamber? ................................................................................................................................................................
................................................................................................................................................................
................................................................................................................................................................
................................................................................................................................................................
................................................................................................................................................................

4

CXA107 2014

Path of Blood Flow through the Heart
4. Explore the right atrium and locate the three openings into the atrium by which it receives deoxygenated blood from the veins of the systemic and coronary circulatory systems.
(a) Identify and name the three vessels that empty their contents via these openings:

..............................................................................................................................................

..............................................................................................................................................

..............................................................................................................................................
5. Blood flows through the right atrioventricular valve (also called the tricuspid valve) that spans the opening (orifice) between the right atrium and the right ventricle when the heart is relaxing between heart beats.
6. Blood pumped out of the right ventricle passes through the pulmonary semilunar valve that spans the orifice at the base of the pulmonary trunk.
(a) Where does blood pumped into the pulmonary trunk flow to?
................................................................................................................................................................
7. The left atrium receives oxygenated blood from four pulmonary veins, two from each lung.
8. Blood flows through the left atrioventricular valve (also called the bicuspid or mitral valve) that spans the orifice between the left atrium and left ventricle.
9. Blood pumped out of the left ventricle passes through the aortic semilunar valve that spans the aortic orifice.
10. To consolidate your understanding, summarise the role of each of the heart valves in ensuring one way flow of blood through the heart:
Heart valve

Action/function

Right atrioventricular valve
Pulmonary semilunar valve
Left atrioventricular valve
Aortic semilunar valve
(a) Note that the cusps of each of the atrioventricular valves are attached to chordae tendineae associated with papillary muscles. How do these structures assist the normal functioning of these valves?
................................................................................................................................................................
................................................................................................................................................................
(b) What heart sounds (S1, S2) does closure of each of the heart valves correspond to?
S1 ...........................................................................................................................................................
S2............................................................................................................................................................
To assist you to remember which atrioventricular valve is on which side of the heart:
LAB RAT – Left Atrium Bicuspid – Right Atrium Tricuspid or if you like shopping, you may prefer “Tri before you bi”

5

CXA107 2014

Part B: The Anatomy of the Systemic Blood Vessels
Do the labeling before you come to the practical session and then locate and identify all of these structures on models or dissected specimens.

Using the wet specimens, models or charts, follow the systemic circulation, finding the named vessels
(in bold type).

1. Major Arteries
For our purposes, we will examine only some of the major arteries. You must be able to locate and name them. If you follow specific pathways (outlined on the following pages) it will assist you.

6

CXA107 2014

The Aorta
The aorta has three portions:
(i) The ascending aorta which has two branches:
- The right and left coronary arteries which supply the heart itself.
(ii) The aortic arch (also called the arch of the aorta) which has three branches:
- The first is the brachiocephalic trunk.
- The second is the left common carotid artery.
- The third is the left subclavian artery.
(iii) The descending aorta, which has two portions separated by the diaphragm:
- The thoracic aorta
- The abdominal aorta.
The carotid arteries
The left and right common carotid arteries branch at approximately the level of thyroid cartilage into the external and internal carotid arteries.
 The internal carotid artery supplies the brain, having no branches before entering the skull.
 The external carotid artery has a number of branches supplying structures of the head and neck. If auscultation of the common carotid artery reveals a murmur (carotid bruit), what does this indicate about blood flow through this vessel?
......................................................................................................................................................................
......................................................................................................................................................................
Blood supply to the brain
Major arteries supplying blood to regions of the brain will be considered in a nervous system practical later in the semester.
The brachial arteries and distal upper limb
Locate the brachial artery in the arm. At the cubital fossa, look for the brachial artery dividing into its two branches, the radial and ulnar arteries. Trace these down to the wrist where the radial can be easily seen. The ulnar can be found under the tendon of flexor carpi ulnaris. In the hand, these two vessels anastomose (merge) to form a palmar arch.
Of what significance is the palmar arch anastamoses in clinical examination of the peripheral circulation? ……………………………………………………………………………………………………..............
……………………………………………………………………………………………………………..
……………………………………………………………………………………………………………..

7

CXA107 2014

The descending aorta
At the level of T12, the aorta passes behind the diaphragm to enter the abdominal cavity. It gives rise to both paired and unpaired branches:
 The right and left renal arteries which supply the kidneys.
 The coeliac artery which branches into arteries that supply the stomach, liver etc.
 The superior mesenteric artery supplies the small intestine and the proximal half of the large intestine.
 The inferior mesenteric artery supplies the distal part of the large intestine.
At its most distal point, the descending abdominal aorta divides into the right and left common iliac arteries. The femoral arteries and distal lower limb
Follow the common iliac artery until it becomes the femoral artery. It is quite superficial and its pulse can be easily palpated. Follow it along into the popliteal fossa where it becomes the popliteal artery – another pulse point. The popliteal artery divides into two branches:
 The anterior tibial artery. It enters the dorsum of the foot as the dorsalis pedis artery.
The pulse of this vessel can be felt between the first and second toes.
 The posterior tibial artery.

CHECKLIST OF MAJOR ARTERIES:
By following the pathways previously described you should now have identified…
1.

ascending aorta

2.

brachiocephalic trunk external carotid artery (L & R)

subclavian artery (L & R)

brachial artery (L & R)

ulnar artery (L & R)

palmar arch (L & R)

thoracic aorta

abdominal aorta

renal artery (L & R)

coeliac artery

superior mesenteric artery

inferior mesenteric artery

common iliac artery (L & R)

internal iliac artery (L & R)

external iliac artery (L & R)

femoral artery (L & R)

popliteal artery (L & R)

posterior tibial artery (L & R)

5.

internal carotid artery (L & R)

radial artery (L & R)
4.

coronary artery (L & R)

common carotid artery (L & R)
3.

aortic arch

anterior tibial artery (L & R)

dorsalis pedis artery (L & R)

Mark the arteries that correspond with pulse points that are commonly used in clinical practice.
Once you have participated in the nervous system practical, add the arteries that supply blood to the brain to this checklist.

8

CXA107 2014

2. Venous Drainage
Recall that blood returns from the systemic and coronary circulations to the right atrium of the heart via three sources:
• superior vena cava
• inferior vena cava
• coronary sinus.
It is appropriate to consider drainage in terms of tributaries of the venae cavae. The limbs, both upper and lower, have a ‘dual drainage’ system. There are deep veins which run with the arteries and are named accordingly, e.g. brachial, posterior, tibial etc. In addition there are superficial veins which do not run with the arteries but are quite close to the surface. In some people, these superficial veins are clearly visible on the surface of the skin. Superficial veins do not bear the same names as the arteries, but are named separately.
Begin your search for the veins at the distal aspect of the limbs using either a dissected specimen or the limb models and the torso model.
Upper limb (superficial)
Most of the venous blood from the limbs drains from the dorsal aspect of the hand. The superficial veins of the forearm and hand are rather variable, so we will not identify them by name.
However, they are more consistent at the cubital fossa, where we find the median cubital vein. Look for this on your own limb. This vein is commonly used as a venipuncture site – why do you think that would be?
…………………………………………………………………...
…………………………………………………………………...
Upper limb (deep)
The radial and ulnar veins converge to form the brachial vein.
Venous drainage from the upper limb ultimately enters into the subclavian vein.
Fluid (lymph) from the lymphatic system is returned to the cardiovascular system at the subclavian veins. Where has this fluid originated from?
…………………………………………………………………...
…………………………………………………………………...
…………………………………………………………………...
The subclavian vein joins with the internal jugular vein to form the brachiocephalic vein.
Right and left brachiocephalic veins drain into the superior vena cava.
9

CXA107 2014

Head and neck
The external jugular vein receives blood from parts of face and scalp. Its diameter varies but it is usually smaller than the internal jugular vein, which is deep to the sternocleidomastoid muscle and drains most of the blood from the brain.
Assessing jugular venous pressure (JVP) is part of cardiovascular system assessment in nursing and paramedicine practice. If a person has heart failure (i.e. decreased ability of a ventricle to pump blood efficiently), the JVP may be increased and the jugular veins may be distended (bulge) because of a backup of blood. Would this clinical assessment finding be more likely if the right ventricle or left ventricle was failing? (Hint: think about which side of the heart receives blood that has drained from the jugular veins)
……………………………………………………………………………………………………………..
……………………………………………………………………………………………………………..

Lower limb (superficial)
There are two main superficial veins in the lower limb:
 the great saphenous veins, and
 the small saphenous veins.
As the name suggests, the great saphenous is the longer of the two.
It can be seen on the medial aspect of the leg and thigh.
Lower limb (deep)
Again, the deep veins follow the arteries and bear the same names.
Find the popliteal vein and follow it into the subsartorial canal, where it becomes the femoral vein, which receives blood from the greater saphenous vein.
Follow the femoral vein as it passes under the inguinal canal to become the external iliac vein. It runs along the pelvic brim to join the internal iliac vein, forming the common iliac vein. Right and left common iliac veins join to form the inferior vena cava.
Drainage of the gastrointestinal tract
The veins draining the gastrointestinal tract do not immediately join the blood returning to the heart and will be considered in the digestive system practical later in the semester.

10

CXA107 2014

CHECKLIST OF MAJOR VEINS:
By following the pathways previously described you should now have identified…

1.

superior vena cava

inferior vena cava

coronary sinus

2.

internal jugular vein (L & R)

external jugular vein (L & R)

brachiocephalic vein (L & R)

3.

radial vein (L & R)

ulnar vein (L & R)

median cubital vein (L & R)

brachial vein (L & R)

subclavian vein (L & R)

great saphenous vein (L & R)

small saphenous vein (L & R)

popliteal vein (L & R)

femoral vein (L & R)

external iliac vein (L & R)

internal iliac vein (L & R)

4.

common iliac vein ( L & R)
Once you have participated in the renal and digestive system practical, add the veins that drain blood from the kidneys and GIT to this checklist.

PART C: Feedback on your learning of cardiovascular anatomy
In your anatomical laboratory examination at the end of the semester, you will be required to name landmark and functionally important structures of the human body on dissected specimens, anatomical models and/or photographic images and answer short (single word to one sentence) questions about some of the structures.
To provide you with feedback about your grasp of this week’s material and the standard required for success in the anatomy laboratory exam, your tutor will display an image of an anatomical model that has 7 structures labelled. Name the structures labelled 1-5 and answer two questions: i) and ii).
Try to be as specific as possible e.g. indicate right and left sides (if applicable), specific rather than general - 'right superior pulmonary vein', not just 'vein'.
1.
2.
3.
4.
5.
i) ii) 11

CXA107 2014

PART D: Some review questions for you to complete as independent study
In your own study time, attempt the following questions which are typical theory exam questions for circulatory system anatomy. Diagrams are provided to give you some prompts for your answers.

1. Blood vessel types
Explain the differences in wall structure between arteries, veins & capillaries and relate the structural differences to their function.

2. Path of Blood Flow through the Heart and Pulmonary Circulation
Describe the flow of blood through the heart and lungs (the pulmonary circulation), mentioning all chambers, valves, and vessels through which blood must pass in order.

Johnson (2010), Fig 8.8

12

CXA107 2014

3. Systemic Circulation
Outline the path that blood flows through from the aorta to:
a) the hand and back to the heart again
b) the foot and back to the heart again.

Johnson (2010), Fig 8.8

13

Similar Documents

Free Essay

Nvidia780I

...User Guide EVGA nForce 780i SLI Motherboard 780i 3-Way SLI Motherboard EVGA ii nForce 780i SLI Motherboard Table of Contents Before You Begin… ..................................................................................................... ix Parts NOT in the Kit .................................................................................................ix Intentions of the Kit ...................................................................................................x EVGA nForce 780i Motherboard..................................................................................1 Motherboard Specifications...................................................................................... 1 Unpacking and Parts Descriptions...............................................................................4 Unpacking ................................................................................................................ 4 Equipment ................................................................................................................ 4 EVGA nForce 780i SLI Motherboard ....................................................................... 5 Hardware Installation ....................................................................................................9 Safety Instructions.................................................................................................... 9 Preparing the Motherboard .........

Words: 12933 - Pages: 52

Free Essay

Dell 1435c

...Dell™ PowerEdge™ SC1435 Systems Hardware Owner’s Manual w w w. d e l l . c o m | s u p p o r t . d e l l . c o m Downloaded from www.Manualslib.com manuals search engine Notes, Notices, and Cautions NOTE: A NOTE indicates important information that helps you make better use of your computer. NOTICE: A NOTICE indicates either potential damage to hardware or loss of data and tells you how to avoid the problem. CAUTION: A CAUTION indicates a potential for property damage, personal injury, or death. ____________________ Information in this document is subject to change without notice. © 2006 Dell Inc. All rights reserved. Reproduction in any manner whatsoever without the written permission of Dell Inc. is strictly forbidden. Trademarks used in this text: Dell, the DELL logo, Inspiron, Dell Precision, Dimension, OptiPlex, Latitude, PowerConnect, PowerEdge, PowerVault, PowerApp, Dell OpenManage, and Dell XPS are trademarks of Dell Inc.; Microsoft, Windows, MS-DOS, and Windows Server are registered trademarks of Microsoft Corporation; AMD and AMD PowerNow! are trademarks of Advanced Micro Devices, Inc.; EMC is a registered trademark of EMC Corporation. Other trademarks and trade names may be used in this document to refer to either the entities claiming the marks and names or their products. Dell Inc. disclaims any proprietary interest in trademarks and trade names other than its own. Model SVUA August 2006 P/N HJ362 Rev. A00 Downloaded from www.Manualslib...

Words: 32860 - Pages: 132

Premium Essay

Saved

...IT320 Unit 5 HW 1. When a router is first powered on, it completes a four-step initialization process: 1. Preforming a power-on self test (POST) 2. Loading a bootstrap program 3. Loading an IOS 4. Loading a configuration file The last three of these steps require the router to copy the files into RAM. Normally, most routers load an IOS image that is stored in flash memory and an initial configuration stored in NVRAM. 2. Routers use the following logic, in order, to attempt to load an IOS: 1. Load a limited-function IOS if the configuration register’s last hex digit is set to 0 or 1. 2. Load an IOS based on the configuration of boot system commands in the startup-configuration file. 3. Load the first file in flash as the IOS. 4. Use TFTP broadcasts to find a TFTP server and download an IOS from that server. 5. Load a limited-function IOS from ROM. In Step 1, the configuration register is a16-bit number that Cisco routers store in a hidden area of NVRAM. It can be set in a couple of ways and can be seen using the show version command. The most commonly used way to set its value is to use the config-register global configuration command. Routers use the 4 low-order bits of the configuration register as the boot field, which tells the router what to do in the first of the preceding five decision steps. If the value of the field is set to 0, the router loads the ROMMON (ROM Monitor), which is used for password recovery. If the value is set to1, the router loads...

Words: 448 - Pages: 2

Free Essay

Knowledge Assemsment Text Book

...Knowledge Assessment Matching 1. Remote Desktop E. Based on the former Terminal Services 2. System image backup J. Saves data to a VHD file 3. BranchCache A. Conserves WAN bandwidth 4. Distributed cache mode B. Files cached on each client 5. Volume shadow copies H. Previous versions 6. Incremental backup D. Files changed since the last backup job 7. Windows RE I. Accessible from a Window 7 installation disk 8. Hosted cache mode C. Files cached on a central server 9. Windows Remote Management G. Executes PowerShell commands on remote computers 10. System restore point F. Configuration settings and registry information Multiple Choice 1. Which of the following service priority guidelines are not accurate? D. Departmental issues should be rated according to the function of the department. A problem with a computer belonging to a department that is critical to the organization, such as order entry or a customer service call center, should take precedence over a problem with a computer belonging to a department that can better tolerate a period of down time, such as research and development. 2. Place these troubleshooting steps in the correct order, using the procedure described in this lesson as your guide. B, D, C, A. B: Establishing the symptoms is the first step in troubleshooting any problem to determine exactly what is going wrong. D: Select the most probable cause. Once...

Words: 746 - Pages: 3

Free Essay

Bitlocker

...BitLocker Drive Encryption Overview 73 out of 98 rated this helpful - Rate this topic Applies To: Windows Server 2008, Windows Server 2008 R2, Windows Vista BitLocker Drive Encryption is a data protection feature available Windows Server 2008 R2 and in some editions of Windows 7. Having BitLocker integrated with the operating system addresses the threats of data theft or exposure from lost, stolen, or inappropriately decommissioned computers. Data on a lost or stolen computer is vulnerable to unauthorized access, either by running a software-attack tool against it or by transferring the computer's hard disk to a different computer. BitLocker helps mitigate unauthorized data access by enhancing file and system protections. BitLocker also helps render data inaccessible when BitLocker-protected computers are decommissioned or recycled. BitLocker provides the most protection when used with a Trusted Platform Module (TPM) version 1.2. The TPM is a hardware component installed in many newer computers by the computer manufacturers. It works with BitLocker to help protect user data and to ensure that a computer has not been tampered with while the system was offline. On computers that do not have a TPM version 1.2, you can still use BitLocker to encrypt the Windows operating system drive. However, this implementation will require the user to insert a USB startup key to start the computer or resume from hibernation, and it does not provide the pre-startup system integrity verification...

Words: 1463 - Pages: 6

Free Essay

Bios

...Introduction To sum of the differences between ROM RAM BIOS and Post I will simply define the basis of each component while defining what they do. ROM is short for (Read-only Memory) Memory which data is prerecorded on a computer. ROM is simply data that cannot be eliminated even when the computer is off. When working in ROM it is difficult or nearly impossible to change. BIOS is short for the acronym (Basic Input Output System) it is a program which stores detailed information and enable the computer to boot. In addition a ROM chip located on the motherboard, it lets you access the basic setup and ensures that the BIOS will readily be available and will not de damaged by disk failures. RAM is (Random Access Memory) Memory that can be access randomly memory that can be access without touching preceding bytes. RAM is the typical memory found in most computers or printers. In addition, RAM is a volatile memory that requires power to keep information accessible. If power is lost, then memory can be lost. Lastly Post is the self-test which is activated by Bios. The post is designed to run checks on the motherboard. It necessary to use ROM for the BIOS because the ROM retains information on the computer even while shut down whereas RAM does not. Whenever a computer is being use the information is being stored on the RAM if the is ever a power shortage or the computer lose power the information is lost. RAM does not store memory when there is no power. POST beep codes make...

Words: 356 - Pages: 2

Free Essay

Motherboard

...Motherboard Answer the following questions 5 April 2015 Tanweer Haroon DeJong May The major components of the motherboard are as follows: memory and their slots which is the computer’s memory (RAM) and is one of the most important parts of the system board. The number of chips depends on the type of computer and its capacity. Expansion cards are a typical component of non-integrated system boards a graphic card is a perfect example, but this can be integrated into the motherboard. CPU and slots is the central processing unit and it’s a highly prolific part of the computer and is located on the right of a motherboard and can be identified as a result of the heat sink or cooling fan directly on it. BIOS chip directs the CPU with respect to how it relates with other parts of the computer. Its basic input and output system chip or integrated circuit is fixed on the board and is easily identifiable. CMOS battery, the complementary metal oxide semiconductor is a small battery on the system board that powers the CMOS memory. Power supply and connectors is the electrical unit of the system and if it’s bad the system will not work. Keyboard connector are located on the motherboard and there are two main types. The AT has a round connecting interface into the motherboard and the PS/2 connector is rectangular in shape and smaller. Modern motherboards come with both. Mouse connector its connecting port is located on the motherboard and its interface is usually round. Floppy...

Words: 431 - Pages: 2

Premium Essay

Future

...Fall BIOS – Instructor: Mrs. Nicholas – NT1110 – 1 May 2014 Lavon Hawkins BIOS SUMMARY Lavon Hawkins BIOS SUMMARY BIOS BIOS: The BIOS is software which is stored on the motherboard. It tells the computer how to perform a number of basic functions such as booting and keyboard control. It is also used to identify and configure the hardware in a computer such as hard drive, floppy drive, optical drive, CPU, memory and so on. CMOS: The complementary metal oxide semiconductor is the type of semiconductor chip on the motherboard which stores the system information and computer settings such as date, time, hard drive settings, boot sequence, parallel part settings, on-base audio and video etc. Firmware: Firmware is a combination of software and hardware. Computer chips that have data or programs recorded on them are firmware. POST: The POST or power on self-test is a test the computer does when it first boots up. It’s to verify all the hardware is working. If all checks out it usually gives a single beep. If not a beep code could come up. Beep Code: A beep code is an audible code which is generated during the POST (Power On Self Test) when the BIOS has an issue but has not made it all the way up the boot sequence that it can give you the error as a message on the monitor BIOS update: Updating the BIOS can fix or enhance aspects of a computers performance. Or it may provide support for newly installed hardware. 1 Flash BIOS update: A BIOS chip...

Words: 353 - Pages: 2

Free Essay

Exploring Reverse Engineering

...products that are new and cheaper than the ones that came before. This way a company is able to take a product that is already out on the market and take it apart piece by piece and see how it works so they can rebuild it cheaper and more efficiently. One famous example of reverse engineering is in the mid-1980s Phoenix Technologies Ltd wanted to produce a BIOS for PCs that would be compatible with the IBM PCs proprietary BIOS. To protect themselves from any charges of illegally copying their BIOS they used what is called a clean room. With the clean room approach there are two teams; one that studies the BIOS that they are trying to recreate and they come up with a detailed report of what it is exactly the BIOS does without using any of the code or anything that will link their description to that particular BIOS. Then this description is given to another team that has not looked at the code of the BIOS they are recreating and they build whole new BIOS off those instructions. This way even if some of the code is the same it will not be a copy right infringement since the second team who actually wrote the code and built the BIOS...

Words: 792 - Pages: 4

Premium Essay

Exploring Motherboards and Busses

...on a motherboard? Why can these busses not be replaced with a single bus? • With 64-bit busses available, why should 32-bit busses be provided as well? The motherboard of a computer is also known as the System Board. The circuit board is the platform on which all the hardware of the computer is connected. It is said to be the most important part of the computer. The expansion cards, and slots, BIOS chip, CMOS battery, jumpers and DIP switches, heat sink, PCI, Power connector, on board disk drive connectors, memory slots, keyboard connectors, Peripheral ports and connectors are all the things that one may find on the motherboard. The expansion cards are a typical part of nonintegrated system board. An example of this is a graphic card. Memory slots are one of the most important part of the system board. The number of memory chips on a motherboard depends on the type of CPU and its capacity. The slots are usually white and black and close in proximity to one another. The BIOS chip is also a very important part of the system board. It directs the CPU to other parts of the computer. BIOS and its manufacturers name are usually written on the chip. The CMOS battery or (complementary Metal Oxide Semiconductor) is a small battery on the system...

Words: 617 - Pages: 3

Free Essay

Information and Communication Technology

...that starts the “chain reaction” which ends with the entire operating system being loaded is known as the boot loader (or bootstrap loader). The term creatively came from early designiners imagining that before a computer “runs” it must have it’s “boots strapped”. The boot loader’s only job is to load other software for the operating system to start. Often, multiple-stage boot loaders are used, in which several small programs of increasing complexity sequentially summon one after the other, until the last of them loads the operating system. Boot Devices The boot device is the device from which the operating system is loaded. A modern PC BIOS (Basic Input/Output System) supports booting from various devices. These include the local hard disk drive, optical drive, floppy drive, a network interface card, and a USB device. Typically, the BIOS will allow the user to configure a boot order. If the boot order is set to: 1. CD Drive 2. Hard Disk Drive 3....

Words: 646 - Pages: 3

Free Essay

Attacks

...Ransomware Discuss the threat When infected restricts you to access to a computer system. This will become more refined in its targets and methods. Experts predict that the variants of ransomware that hurt the security software that are installed within a computer may particularly target the endpoints which sign up with cloud-based storage solutions like Google Drive, Dropbox, OneDrive and many more. On detecting the endpoint, ransomware will exploit the stored personal credentials of the logged-in user and will even infect the cloud storage that is backed up. McAfee has warned that ransomware attackers will try out as many ways possible to shell out ransom payments from their victims. Degree of damage The most advanced and most damaging ransomware in the wild at the moment, specifically targeting U.S. businesses and individuals. It's a $70 million per year criminal enterprise. Its magnitude is now confirmed by law enforcement. Some quick math shows $18,145 in costs per victim, caused by network mitigation, network countermeasures, loss of productivity, legal fees, IT services, and/or the purchase of credit monitoring services for employees or customers. As you can see, the total costs of a ransomware infection goes well above just the ransom fee itself, which is usually around $500 but can go up to $10,000. What it attacked Ransomware is a type of malware that infects a computer and restricts a user’s access to the infected computer. This type of malware...

Words: 2057 - Pages: 9

Premium Essay

Science

...Share this About.com About Tech PC Support . . . Troubleshooting Guides Symptoms How To Fix a Computer That Turns On But Displays Nothing What To Do When Your Computer Starts but The Screen is Black By Tim Fisher PC Support Expert Share this PC Support Categories Troubleshooting Guides How-To's & Tutorials Getting Support Software Tools Hardware Tools Command Line Reference Parts of a Computer Cleaning & Cooling File Extensions Things You Didn't Know About... Computer Terms Other Resources Fix a Problem With Your Computer Maintaining Your Computer Tips & Tricks Updated Articles and Resources Free Email Newsletter Let About.com send you the latest from our PC Support Expert. You can opt-out at any time. Please refer to our privacy policy for contact information. Photo of a Dell UltraSharp U2412M 24-Inch LED Monitor - © Dell, Inc. Dell UltraSharp U2412M 24-Inch LED Monitor. © Dell, Inc. The most common way that a computer "won't turn on" is when the PC actually does power on but doesn't display anything on the monitor. You see lights on the computer case, probably hear fans running from inside, and may even hear sounds, but nothing at all shows up on your screen. There are several possible reasons why your monitor isn't displaying information so it's very important that you step through an ordered process like the one I've outlined here. ...

Words: 2186 - Pages: 9

Premium Essay

A Malicious Program That Secretly Integrates Itself Into Program or Data Files.

...Summary A malicious program that secretly integrates itself into program or data files. It spreads by integrating itself into more files each time the host program is run. Disinfection & Removal Automatic Disinfection Allow F-Secure Anti-Virus to disinfect the relevant files. For more general information on disinfection, please see Removal Instructions. Technical Details The CIH virus was first located in Taiwan in early June 1998. After that, it has been confirmed to be in the wild worldwide. It has been among the ten most common viruses for several months. CIH has been spreading very quickly as it has been distributed through pirated software. History It seems that at least four underground pirate software groups got infected with the CIH virus during summer 1998. They inadvertently spread the virus globally in new pirated softwares they released through their own channels. These releases include some new games which will spread world-wide very quickly. There's also a persistent rumor about a 'PWA-cracked copy' of Windows 98 which would be infected by the CIH virus but F-Secure has been unable to confirm this. Later on, CIH was distributed by accident from several commercial sources, such as: • Origin Systems website where a download related to the popular Wing Commander game was infected • At least three European PC gaming magazines shipped magazines where the cover CD-ROM was infected - one of them even included a note inside advising users to disinfect their...

Words: 693 - Pages: 3

Free Essay

Cmos

...about a millionth of an amp of electrical current. This efficiency allows it to store configuration data for a long time (maybe years). In this paper I will explain how CMOS memory change over the years, if CMOS memory increased, decreased, or stayed the same, and if CMOS still utilizes RAM, requiring a battery on the motherboard. CMOS really hasn’t changed very much from what I could find on the internet… Mainly the speeds have increased and the noise has been reduced it also went from analog to digital. Originally, the IBM PC only used of a small portion of CMOS memory and the balance of the 64 bytes were left undefined. Once other manufacturers cloned the AT form factor it wasn’t long that other areas of the CMOS was used by various BIOS manufacturers for such user-selectable options as memory wait states, memory type, initial boot drive selection, boot-up clock speed, hard drive interface type, green options, shadow RAM options, cache options, and password protection of the CMOS contents. It still uses a small battery incase there is a power outage and still uses volatile RAM. The size of the CMOS memory has also pretty much stayed the same because there is no need to increase the size. There was never any need to store more than 512 bytes in the memory as it holds the absolute basic boot settings for the system. The typical size is still 512 bytes currently. All it comes down to is “If it ain’t broke don’t fix it.”, so it’s been that way since almost the very beginning...

Words: 421 - Pages: 2