Free Essay

Bio/100

In:

Submitted By jrodriguez6980
Words 1467
Pages 6
UNESCO Paper

BIO/100

The Tropical rainforest Heritage of Sumatra is made up of three national parks: Gunung Leuser National Park, Kerinci Seblat National Park and Bukit Barisan Selatan National Park. This protected area is home to estimate 10,000 plant species, including 17 endemic genera; more than 200 mammal species; and some 580 bird species of which 465 are resident and 21 are endemic. (UNESCO World Heritage Centre) One example of an endangered animal would be the Clouded Leopard. The Clouded Leopard is also found in China, Nepal, and Thailand, but in those countries they are in no danger of becoming extinct like they are in the Sumatra. The Green Turtle is another animal in the Sumatra that has been put on the Red List. Although there have been other records in Austrilia, Bangladesh, Brazil, Costa Rica, Honduras, and the Philippines of Green Turtles all doing well, except in Honduras where they are also Red Listed. There are several species that can be found in other regions that are thriving, but there are still many species that show no other records and are in trouble in the Sumatra. Examples like the Mainland Serow, Sumatrain Tigar, and the Hoogerwerf’s Rat are all species that are in danger. In recent news there have been stories of Sumatran Tigers being caught in snares that are set up by either poachers or in an attempt to eliminate predators that may prey on livestock. One animal that was caught last year died from its wounds. The animal had gone days with no food or water before found, but it was too late. Another story of a cub that was found lived, but only to live in captivity due to the fact that they had to amputate the leg. With this the animal cannot hunt or fend for him and must rely on humans for survival now.

Plants and animals rely on each other for survival in areas such as the Sumatra. Plants provide a great deal for the animals that live among them. Plants provide homes, food, and disguise from predators. With plants and trees being destroyed the safety of the wildlife goes down. Many people form groups to help protect and preserve this land so that the animals and the other wild life are saved. People do not like to see their countries animals dying due to illegal logging, and other forms of destruction to the rainforest. Poaching being another threat it is important that the animals have the protection they require, and that protection comes from the trees and plants found in the rainforest.

At the current rate of deforestation, Sumatra’s remaining lowland rain forest will be completely gone within the next ten years unless drastic actions are taken to halt the rampant logging. From 1985 to 1997, 15,000 km of the rainforest was destroyed, more than 1,000 km a year. Since then the annual rate is only increasing. In Gunung Leuser National Park there has been a large amount of illegal logging taking place. Another threat to the life of these forests is poaching. From 1990-1996 the number of Sumatran rhinoceros in the Kerinci-Seblat National Park fell from 300 to about 30. (World Wildlife Fund (Content Partner); Mark McGinley (Topic Editor). 2008. "Sumatran montane rain forests." In: Encyclopedia of Earth. Eds. Cutler J. Cleveland (Washington, D.C.: Environmental Information Coalition, National Council for Science and the Environment). [First published in the Encyclopedia of Earth August 30, 2007; Last revised September 3, 2008; Retrieved July 1, 2009].) Indonesia is a large exporter of tropical timer, and the second largest producer of palm oil. Land conversion for agriculture and logging are the two main reasons that the Sumatra is losing its forest.

The government in Indonesia is failing at enforcing the laws on deforestation and in result the forests are disappearing. Indonesia has laws to protect forests and limit agricultural burning, they are poorly enforced. Forest management has been infected by corruption and lack of political commitment. Underpaid government officials combined with the prevalence of disreputable businessmen and shifty politicians, means that logging bans go unenforced. With so many high officials looking at personal gain rather than the preservation of this land logging continues and is over looked. Forrest fires are left unattended as well causing even larger areas of this rainforest to disappear. The government refuses to enforce any punishment on the guilty parties. In 1997 there was a special budget for the reforestation fun that could aid in controlling a forest fire, but the funds were used for the presidents son’s failing car project. Without the government backing on the preservation of this land the Sumatra Rainforests will no longer exist. Today the government still refuses to properly punish those that are violating the laws. Without enforcement laws are useless. Indonesia can no longer afford to overlook criminal activities.

After several years one group finally won rights to manage a newly names Harapan Rainforest. This 250,000 acre area that is home to 267 bird species, the Sumatran tiger, the Asian elephant and the newly identified clouded leopard are protected. The group plans on planting more trees that will replace the trees that were lost to logging. In time the conservationist are certain that the land will go back to its original state. Grahan Whynne Said: “This is a ground-breaking project achieved with the full support of the Indonesian government. It is hugely significant not just for rainforest conservation in Asia but for other parts of the world as well.” With some positive support from the government other areas of the Sumatra could be saved, or the laws that are already in place may be enforced.

The people of Indonesia need to stand up and voice their thoughts on the illegal actions that are taking place. If there were more groups like the RSPB maybe then more could be done to protect the rainforests and stop deforestation. The communities need to band together to help make sure that the laws against logging are enforced. People need to come up with other alternatives then destroying the rainforest. It is clear that the government is not on the side to protect, so the first thing that the people in Indonesia need to do is to elect a better candidate to run the country. It is hard today to find an honest politician but they are out there. It is in the hands of the people to make the country and the life on that land what it is.

If the government continues to ignore those that are breaking the laws and ignore the fires taking place, it will be the end of the forest. If something isn’t done about the logging, and poaching, all life in the rainforests will be at risk. If the entire forest is destroyed, then what? What will the government and its people do then? There will be no more trees to log, no more animals to poach. The people of Indonesia need to look at the future and what this will mean for everyone. The government needs to back the people and start preserving the land, as well as enforcing the law for those that are going to go against it. If trees are lost to fires, or logging, they should be working to replant and maintain the land so it can continue to thrive. The people need to create more groups that will work to start restoring the land that has been damaged. The safety of the animals, the wellbeing of the plant life and bird life in the Sumatran rainforests fall in the hands of the people, they are the ones that can make it rise, or make it fall. In time if nothing is done to preserve this land, it will no longer exsit.

References

World Wildlife Fund (Content Partner); Mark McGinley (Topic Editor). 2008. "Sumatran montane rain forests." In: Encyclopedia of Earth. Eds. Cutler J. Cleveland (Washington, D.C.: Environmental Information Coalition, National Council for Science and the Environment). [First published in the Encyclopedia of Earth August 30, 2007; Last revised September 3, 2008;

Retrieved July 1, 2009]. http://www.eoearth.org/article/Sumatran_montane_rain_forests

Wildlife Extra 2008 Landmark law saves Sumatran rainforest.

Retrieved at: http://www.wildlifeextra.com/go/news/harapan-rainforest.html#cr

Rhett A. Butler, mongabay.com (February 25, 2011). Indonesian Borneo and Sumatra lose 9% of forest cover in 8 years.

Retrieved at: http://news.mongabay.com/2011/0225-indonesia_sumatra_borneo.html

mongabay.com editorial (October 16, 2006). Forest fires result from government failure in Indonesia.

Retreived at: http://news.mongabay.com/2006/1015-indonesia.html/

Jeremy Hance, mongabay.com (June 05, 2012). New campaign targets snares in effort to save world's big cats.

Retrieved at: http://news.mongabay.com/2012/0605-hance-cats-snares.html

Similar Documents

Premium Essay

Bio 100 Review

...BIO 100 REVIEW SHEET Please read before you use this study guide: The review sheet may not include all the information that is required for the exam. It is just a supplementary material. You should focus on the lecture notes and use the reader as a reference to study for the exam. 1. What are the main traits for life? 2. What are the 5 kingdoms? What are some distinguishing characteristics of each? (ie. Presence of cell wall, multicellular/unicellular, functions, etc.) 3. What is the chemical formula of photosynthesis, and what is its function? 4. What is the formula of cellular respiration? What is its function? Where is its action generally located within the cell? 5. Know the hierarchy of matter (quark(organism) 6. The atomic number of an element is directly equal to what type of subatomic particle(s) of an element? 7. What are the three types of bonds? 8. The name of a chemical reaction to build molecules by taking away a water molecule is called ________ __________. 9. The name of a chemical reaction to break molecules by inserting a water molecule is called __________. 10. What are the 4 main elements of the body? 11. What are the 4 macromolecules called? What are their “building blocks”/subunits (monomers) called? Give functions of each macromolecule and examples. 12. What is the main energy currency of the body? 13. What is the smallest unit of life with living properties? 14. What is a cell called if...

Words: 501 - Pages: 3

Premium Essay

Bio 100 Scientific Method

...The Scientific Method Brittany Tompkins BIO/100 February 5, 2012 David Edward The Scientific Method Scientific method is something I don’t think about every day and when I use it. After doing the experiment of the growing plants, I realized that I do use scientific method in my life. The one time that I can say I remember using scientific method was the last time we went on our scuba diving trip to get our wreck certification. I have a wet suit that I wear while underwater to help keep me warm. However this day the weather was a little chillier then the last time we went diving (observation). So this is where it comes into play, having not gone into the water yet, I asked to barrow a long wet suit that was a little thicker than mine as well (question). My guess was that the water was going to be cold because the weather was chilly (hypothesis). I put my wet suit on (prediction) before we got into the water to get on the boat and the water was cold (test). I then got on the boat and stuck on the wet suit that I barrowed over my suit because I thought, the top water was cold and it is hit more by the sun then what we go down to ( second hypothesis). After getting started I was feeling good with both suits on and I was able to stay warm and do the swim without getting cold (conclusion). It is very important to keep your body temperature warm because, if you get cold under the water, you start to shiver and your heart rate starts to go faster because you are breathing...

Words: 732 - Pages: 3

Free Essay

Nvidia780I

...User Guide EVGA nForce 780i SLI Motherboard 780i 3-Way SLI Motherboard EVGA ii nForce 780i SLI Motherboard Table of Contents Before You Begin… ..................................................................................................... ix Parts NOT in the Kit .................................................................................................ix Intentions of the Kit ...................................................................................................x EVGA nForce 780i Motherboard..................................................................................1 Motherboard Specifications...................................................................................... 1 Unpacking and Parts Descriptions...............................................................................4 Unpacking ................................................................................................................ 4 Equipment ................................................................................................................ 4 EVGA nForce 780i SLI Motherboard ....................................................................... 5 Hardware Installation ....................................................................................................9 Safety Instructions.................................................................................................... 9 Preparing the Motherboard .........

Words: 12933 - Pages: 52

Free Essay

Attacks

...productivity, legal fees, IT services, and/or the purchase of credit monitoring services for employees or customers. As you can see, the total costs of a ransomware infection goes well above just the ransom fee itself, which is usually around $500 but can go up to $10,000. What it attacked Ransomware is a type of malware that infects a computer and restricts a user’s access to the infected computer. This type of malware, which has now been observed for several years, attempts to extort money from victims by displaying an on-screen alert. These alerts often state that their computer has been locked or that all of their files have been encrypted, and demand that a ransom is paid to restore access. This ransom is typically in the range of $100–$300 dollars, and is sometimes demanded in virtual currency, such...

Words: 2057 - Pages: 9

Free Essay

Comp-Tia a+ Testing 801 and 802

...A+ Test (801 & 802) %SystemRoot% The path where the operating system is installed. 10BaseT Ethernet LAN designed to run on twisted pair cabling at 10 megabits per second. Max cable length is 100 meters. Uses baseband signaling. 100BaseT Generic term for Ethernet cabling system designed to run at 100 megabits per second on twisted pair cabling. Uses baseband signaling. 1000BaseT Gigabit Ethernet on UTP. 110 block The most common connection used with structured cabling, connecting horizontal cable runs with patch panels. 16 bit (PC Card) Type of PC Card that can have up to 2 distinct functions or devices, such as a modem/network card combo. 3.5 inch floppy drive Size of all modern floppy disk drives; format was introduced in 1986. 2.1 speaker system Speaker setup consisting of 2 stereo speakers combined with a subwoofer. 34 pin ribbon cable Type of cable used by floppy disk drives. 3-D graphics Video technology that attempts to create images with the same depth and texture as objects seen int he real world. 40 pin ribbon cable PATA cable used to attach EIDE devices (such as hard drives) ATAPI devices (such as optical drives) to a system 5.1 speaker system Speaker setup sonsisting of 4 satellite speakers plus a center speaker and subwoofer. 64 bit processing Atype of processing that can run a compatable 64 bit operating system, such as Windows 7, and 64 bit applicatins. 64 bit PCs have a 64 bit wide address bus enabling them to use more than 4GB of...

Words: 3658 - Pages: 15

Free Essay

Operating System Not Foud

...When you get the message "The operating system cannot be found" it is generally caused by an outdated BIOS card. The best thing to do is contact your computer manufacturer for help. If you don't want to buy a new BIOS card or computer then follow the steps below. The following steps I will tell you is not guaranteed that it will 100% work for all operating systems nor will it guarantee it will work at all. These steps might damage your computer. By reinstalling your operating system you will be wiping out all of your saved memory so do not follow these steps if you are not willing to take the risk otherwise contact your manufacturer for help! Lastly, read all of the step and follow them carefully before you actually do them! Step 1: Have your copy of windows ready to go and any hardware, software, etc... because all of your saved data will be gone. This is important if you don't want to spend hours finding the CDs you want to install. Step 2: Turn on your computer and immediately press F12. Step 3: Once you are in the boot menu go down to Boot Sequence. Step 4: In Boot Sequence disable Hard-disk drive C. By doing this your computer will boot from the copy of windows so have your copy of windows ready. Step 5: Exit Boot Sequence and go down to OS install mode and enable it. Step 6: After you enable OS install mode open your CD-ROM drive and put your copy of windows in. Step 7: Once your copy of windows is in exit the boot menu and save what you have...

Words: 515 - Pages: 3

Free Essay

Gggg

...Motherboard 使用手冊 M2A-VM T3088 1.00 版 2007 年 4 月發行 版權所有•不得翻印 © 2007 華碩電腦 本產品的所有部分,包括配件與軟體等,其所有權都歸華碩電腦公司(以 下簡稱華碩)所有,未經華碩公司許可,不得任意地仿製、拷貝、謄抄或轉 譯。本使用手冊沒有任何型式的擔保、立場表達或其它暗示。若有任何因本 使用手冊或其所提到之產品的所有資訊,所引起直接或間接的資料流失、利 益損失或事業終止,華碩及其所屬員工恕不為其擔負任何責任。除此之外, 本使用手冊所提到的產品規格及資訊僅供參考,內容亦會隨時更新,恕不另 行通知。本使用手冊的所有部分,包括硬體及軟體,若有任何錯誤,華碩沒 有義務為其擔負任何責任。 使用手冊中所談論到的產品名稱僅做識別之用,而這些名稱可能是屬於其 他公司的註冊商標或是版權。 本產品的名稱與版本都會印在主機板/顯示卡上,版本數字的編碼方式是 用三個數字組成,並有一個小數點做間隔,如 1.22、1.24 等...數字愈大表示 版本愈新,而愈左邊位數的數字更動表示更動幅度也愈大。主機板/顯示卡、 BIOS 或驅動程式改變,使用手冊都會隨之更新。更新的詳細說明請您到華碩 的全球資訊網瀏覽或是直接與華碩公司聯絡。  目錄內容 安全性須知 .......................................................................................................................6 電氣方面的安全性 ..............................................................................................6 操作方面的安全性 ..............................................................................................6 關於這本使用手冊 .........................................................................................................7 使用手冊的編排方式 .........................................................................................7 提示符號 ..............................................................................................................7 跳線帽及圖示說明 ..............................................................................................8 哪裡可以找到更多的產品資訊 ......................................................................8 代理商查詢.......................................................................

Words: 7511 - Pages: 31

Free Essay

How to Clear Bios

...BEFORE YOU USE ANY METHOD LISTED BELOW Basic BIOS password crack - works 9.9 times out of ten This is a password hack but it clears the BIOS such that the next time you start the PC, the CMOS does not ask for any password. Now if you are able to bring the DOS prompt up, then you will be able to change the BIOS setting to the default. To clear the CMOS do the following: Get DOS prompt and type: DEBUG hit enter -o 70 2e hit enter -o 71 ff hit enter -q hit enter exit hit enter Restart the computer. It works on most versions of the AWARD BIOS. Accessing information on the hard disk When you turn on the host machine, enter the CMOS setup menu (usually you have to press F2, or DEL, or CTRL+ALT+S during the boot sequence) and go to STANDARD CMOS SETUP, and set the channel to which you have put the hard disk as TYPE=Auto, MODE=AUTO, then SAVE & EXIT SETUP. Now you have access to the hard disk. Standard BIOS backdoor passwords The first, less invasive, attempt to bypass a BIOS password is to try on of these standard manufacturer's backdoor passwords: AWARD BIOS AWARD SW, AWARD_SW, Award SW, AWARD PW, _award, awkward, J64, j256, j262, j332, j322, 01322222, 589589, 589721, 595595, 598598, HLT, SER, SKY_FOX, aLLy, aLLY, Condo, CONCAT, TTPTHA, aPAf, HLT, KDD, ZBAAACA, ZAAADA, ZJAAADC, djonet, %¯ÂÒÚ¸ ÔpÓ·ÂÎÓ‚%, %‰Â‚ˇÚ¸ ÔpÓ·ÂÎÓ‚% AMI BIOS AMI, A.M.I., AMI SW, AMI_SW, BIOS, PASSWORD, HEWITT RAND, Oder Other passwords you...

Words: 2138 - Pages: 9

Premium Essay

Bio 100 L Labs Concepts

...BIO 100L Concepts- Labs and concepts week 7 Conservation Readings * Read chapter 34 (focus on 34.1, 34.4), 36 (focus on 36.4, 36.5) in the textbook. * Review recent information on climate change at this website http://www.epa.gov/climatechange/science/stateofknowledge.html Introduction The current state of the biosphere shows unsettling trends. There is a need to meet these challenges, pursue more knowledge, and work as individuals and as a society toward long-term sustainability. Recent research has sent a message that global warming may not be a hypothetical threat, but a current issue warranting immediate action (Krogh, 2009). Global Warming There is a steady rise in carbon dioxide in the atmosphere. It is estimated that the average carbon dioxide concentration in the atmosphere has increased approximately 17% in the past 45 years (Campbell, Reece, & Simon, 2007). It is estimated that 20% of the excess carbon dioxide released into the atmosphere can be attributed to the burning of trees after deforestation. The burning of fossil fuel accounts for another 70-80% of carbon dioxide released into the atmosphere. Global temperatures are concurrently on the rise. Carbon dioxide lets radiation through the atmosphere, but retains some of the heat it generates (greenhouse effect). When carbon dioxide increases in the atmosphere, this greenhouse effect is enhanced, and too much heat from the sun is retained in the atmosphere. Some scientists, therefore, believe...

Words: 2951 - Pages: 12

Free Essay

Dell 1435c

...Dell™ PowerEdge™ SC1435 Systems Hardware Owner’s Manual w w w. d e l l . c o m | s u p p o r t . d e l l . c o m Downloaded from www.Manualslib.com manuals search engine Notes, Notices, and Cautions NOTE: A NOTE indicates important information that helps you make better use of your computer. NOTICE: A NOTICE indicates either potential damage to hardware or loss of data and tells you how to avoid the problem. CAUTION: A CAUTION indicates a potential for property damage, personal injury, or death. ____________________ Information in this document is subject to change without notice. © 2006 Dell Inc. All rights reserved. Reproduction in any manner whatsoever without the written permission of Dell Inc. is strictly forbidden. Trademarks used in this text: Dell, the DELL logo, Inspiron, Dell Precision, Dimension, OptiPlex, Latitude, PowerConnect, PowerEdge, PowerVault, PowerApp, Dell OpenManage, and Dell XPS are trademarks of Dell Inc.; Microsoft, Windows, MS-DOS, and Windows Server are registered trademarks of Microsoft Corporation; AMD and AMD PowerNow! are trademarks of Advanced Micro Devices, Inc.; EMC is a registered trademark of EMC Corporation. Other trademarks and trade names may be used in this document to refer to either the entities claiming the marks and names or their products. Dell Inc. disclaims any proprietary interest in trademarks and trade names other than its own. Model SVUA August 2006 P/N HJ362 Rev. A00 Downloaded from www.Manualslib...

Words: 32860 - Pages: 132

Free Essay

E Manual

...E5755 Eee PC User Manual Windows® 7 Edition Eee PC 1001P/1005P/R101/ R105 Series 15G06Q256000 Table of Contents Table of Contents....................................................................................................................... ii About This User’s Manual.......................................................................................................iv Notes for This Manual..............................................................................................................iv Safety Precautions.....................................................................................................................v Transportation Precautions....................................................................................vi Charging Your Batteries..........................................................................................vii Airplane Precautions................................................................................................vii Chapter 1: Knowing the Parts Top Side.....................................................................................................................................1-2 Bottom Side..............................................................................................................................1-5 Front Side..................................................................................................................................1-6 Right...

Words: 7992 - Pages: 32

Premium Essay

Saved

...IT320 Unit 5 HW 1. When a router is first powered on, it completes a four-step initialization process: 1. Preforming a power-on self test (POST) 2. Loading a bootstrap program 3. Loading an IOS 4. Loading a configuration file The last three of these steps require the router to copy the files into RAM. Normally, most routers load an IOS image that is stored in flash memory and an initial configuration stored in NVRAM. 2. Routers use the following logic, in order, to attempt to load an IOS: 1. Load a limited-function IOS if the configuration register’s last hex digit is set to 0 or 1. 2. Load an IOS based on the configuration of boot system commands in the startup-configuration file. 3. Load the first file in flash as the IOS. 4. Use TFTP broadcasts to find a TFTP server and download an IOS from that server. 5. Load a limited-function IOS from ROM. In Step 1, the configuration register is a16-bit number that Cisco routers store in a hidden area of NVRAM. It can be set in a couple of ways and can be seen using the show version command. The most commonly used way to set its value is to use the config-register global configuration command. Routers use the 4 low-order bits of the configuration register as the boot field, which tells the router what to do in the first of the preceding five decision steps. If the value of the field is set to 0, the router loads the ROMMON (ROM Monitor), which is used for password recovery. If the value is set to1, the router loads...

Words: 448 - Pages: 2

Free Essay

Knowledge Assemsment Text Book

...Knowledge Assessment Matching 1. Remote Desktop E. Based on the former Terminal Services 2. System image backup J. Saves data to a VHD file 3. BranchCache A. Conserves WAN bandwidth 4. Distributed cache mode B. Files cached on each client 5. Volume shadow copies H. Previous versions 6. Incremental backup D. Files changed since the last backup job 7. Windows RE I. Accessible from a Window 7 installation disk 8. Hosted cache mode C. Files cached on a central server 9. Windows Remote Management G. Executes PowerShell commands on remote computers 10. System restore point F. Configuration settings and registry information Multiple Choice 1. Which of the following service priority guidelines are not accurate? D. Departmental issues should be rated according to the function of the department. A problem with a computer belonging to a department that is critical to the organization, such as order entry or a customer service call center, should take precedence over a problem with a computer belonging to a department that can better tolerate a period of down time, such as research and development. 2. Place these troubleshooting steps in the correct order, using the procedure described in this lesson as your guide. B, D, C, A. B: Establishing the symptoms is the first step in troubleshooting any problem to determine exactly what is going wrong. D: Select the most probable cause. Once...

Words: 746 - Pages: 3

Free Essay

Bitlocker

...BitLocker Drive Encryption Overview 73 out of 98 rated this helpful - Rate this topic Applies To: Windows Server 2008, Windows Server 2008 R2, Windows Vista BitLocker Drive Encryption is a data protection feature available Windows Server 2008 R2 and in some editions of Windows 7. Having BitLocker integrated with the operating system addresses the threats of data theft or exposure from lost, stolen, or inappropriately decommissioned computers. Data on a lost or stolen computer is vulnerable to unauthorized access, either by running a software-attack tool against it or by transferring the computer's hard disk to a different computer. BitLocker helps mitigate unauthorized data access by enhancing file and system protections. BitLocker also helps render data inaccessible when BitLocker-protected computers are decommissioned or recycled. BitLocker provides the most protection when used with a Trusted Platform Module (TPM) version 1.2. The TPM is a hardware component installed in many newer computers by the computer manufacturers. It works with BitLocker to help protect user data and to ensure that a computer has not been tampered with while the system was offline. On computers that do not have a TPM version 1.2, you can still use BitLocker to encrypt the Windows operating system drive. However, this implementation will require the user to insert a USB startup key to start the computer or resume from hibernation, and it does not provide the pre-startup system integrity verification...

Words: 1463 - Pages: 6

Free Essay

Bios

...Introduction To sum of the differences between ROM RAM BIOS and Post I will simply define the basis of each component while defining what they do. ROM is short for (Read-only Memory) Memory which data is prerecorded on a computer. ROM is simply data that cannot be eliminated even when the computer is off. When working in ROM it is difficult or nearly impossible to change. BIOS is short for the acronym (Basic Input Output System) it is a program which stores detailed information and enable the computer to boot. In addition a ROM chip located on the motherboard, it lets you access the basic setup and ensures that the BIOS will readily be available and will not de damaged by disk failures. RAM is (Random Access Memory) Memory that can be access randomly memory that can be access without touching preceding bytes. RAM is the typical memory found in most computers or printers. In addition, RAM is a volatile memory that requires power to keep information accessible. If power is lost, then memory can be lost. Lastly Post is the self-test which is activated by Bios. The post is designed to run checks on the motherboard. It necessary to use ROM for the BIOS because the ROM retains information on the computer even while shut down whereas RAM does not. Whenever a computer is being use the information is being stored on the RAM if the is ever a power shortage or the computer lose power the information is lost. RAM does not store memory when there is no power. POST beep codes make...

Words: 356 - Pages: 2