Free Essay


In: Computers and Technology

Submitted By coronaking
Words 447
Pages 2
Video Summary 2 When you’re choosing to buy a computer, choose either the Motherboard or the CPU first. You must make a decision about one before you buy both. ATX replaces older AT form factors. They are also smaller but they are organized better so they are easier to work on. They also provide support for a wider variety of I/O devices. P1 is the power connectors that the ATX uses; they are compatible with 20 or 24 pin connectors. ATX motherboards also provide a PS/2 connector and 4 USB connectors. Memory slots are DIMMS and expansion slots include AGP and PCI slots. You’ll also have 2 IDE connectors and possibly 4 SATA connectors. Another feature of an ATX Motherboard is the Soft Power Button which is in front of the computer. The power button in front of the computer doesn’t immediately cut off power, it’ll actually allow normal OS shutdown. But the power switch in the back of the computer is different. That will immediately shut off power. There is another feature that this video brings up, it’s the Wake on LAN feature. If you configure the Wake on LAN feature in CMOS, any keyboard activity or network activity, that’ll repower the system. The BTX form factor is compatible to the 20 or 24 pin ATX power connectors. The BTX though provides better airflow for better cooling. They have an intake vent at front and an exhaust vent at the back. The CPU heat sink fins and memory modules are also installed parallel to the air flow so that they don’t block any air. The NLX form factor are used in lower ends PC’s. They also support riser cards, which they fit into expansion slots. They also provide connectors for additional expansion cards which they can also be known as daughter boards. Communication Busses appear as copper tracing which connects to various components. They also allow delivery of power and data. System Bus is the largest bus and also the fastest. The system bus also connects the motherboard to the CPU. Identifying Connectors, as IT techs we will have to identify numerous connectors. Such as the P1 power connectors, 20 pin and 24 pin power connectors. The 40 pin IDE connector and the 34 pin floppy drive connector. SATA connector and the 50 or 68 pin SCSI connector. Expansion slots, 8 bit ISA was in early computers, these were slow. Then there were the 16 bit ISA slot that was the ‘next generation’. After that we have the MCA, the EISA, and the Vesa Local Bus.
Now we use PCI, PCIx and PCIe (express) and last is the AGP (high alternative to PCI).

Similar Documents

Premium Essay

Nt 1230

...1) Research the following organizations and explain their involvement with the Internet public IP addresses. ARIN ARIN is one of five Regional Internet Registries (RIRs) in the world. RIRs are Charged with managing the distribution of Internet number resources (IPv4 And IPv6 address space and Autonomous System Numbers) in their respective regions. ARIN, a nonprofit member-based organization, supports the operation of the Internet though the management of Internet number resources throughout its service region; coordinates the development of policies by the community for the management of Internet Protocol number resources; and advances the Internet through informational outreach. SOURCE: IANA The Internet Assigned Numbers Authority (IANA) is a department of ICANN responsible for coordinating some of the key elements that keep the Internet running smoothly. Whilst the Internet is renowned for being a worldwide network free from central coordination, there is a technical need for some key parts of the Internet to be globally coordinated, and this coordination role is undertaken by IANA. Specifically, IANA allocates and maintains unique codes and numbering systems that are used in the technical standards (“protocols”) that drive the Internet. IANA’s various activities can be broadly grouped in to three categories: * Domain Names IANA manages the DNS Root, the .int and .arpa domains, and an IDN practices resource. * Number......

Words: 773 - Pages: 4

Free Essay

Nt 1230

...Regional Bell Operating Companies also known as RBOC’s . On January 8, 1982, AT&T Corp. settled the suit and agreed to divest its local exchange service operating companies. Local operations were split into seven independent Regional Bell Operating Companies known as "Baby Bells". RBOCs were originally known as Regional Holding Companies. Three companies have the RBOCs as predecessors ,they consist of of AT&T,Verizon and Century link. (, 2014) Incumbent local exchange carrier also commonly referred to as ILEC is a local telephone company during the break up of AT&T into RBOC’s. The ILEC is the former Bell System or Independent Telephone Company responsible for providing local telephone exchange services in a specified geographic area. GTE was the second largest ILEC after the Bells, but it has since been absorbed into Verizon, a RBOC. ILECs compete with competitive local exchange carriers (CLEC). When referring to the technical communities ILEC is often used just to mean a telephone provider. (, 2014) CLECs evolved from the competitive access providers (CAPs) that began to offer private line and special access services in competition with the ILECs beginning in 1985. The CAPs (such as Teleport Communications Group (TCG) and Metropolitan Fiber Systems (MFS)) deployed fiber optic systems in the central business districts of the largest U.S. cities (New York, Chicago, Boston, etc.) A number of state public utilities commissions,......

Words: 386 - Pages: 2

Premium Essay

Nt 1230

...STEP-BY-STEP BYOD ENROLLMENT PROCESS STEP 1: SELECTING YOUR DEVICE OPTION Select the Device Option you desire and click the Get Started button. Bring Your Own Device (BYOD) allows you to bring a Sprint inactive device without the need to purchase a new phone. Customers can bring their own inactive Sprint device or buy one on the Stream Store. (Note: Customers buying a phone on the Stream Store will need to treat the activation as a BYOD). Very soon, you will be able to purchase a phone on an installment plan. STEP 2: CHECKING YOUR COVERAGE Once you’ve clicked Get Started, you’ll be asked to enter your zip code. Enter it, then press Go. *STREAM’S GSM NETWORK IS POWERED BY ZTAR MOBILE. STREAM’S CDMA NETWORK IS POWERED BY SPRINT. STEP-BY-STEP ENROLLMENT PROCESS 1 STEP 3: SELECTING YOUR NETWORK Pick the network you wish to enroll on and choose the type of plan you desire, individual or shared, by clicking the Get Started button within the appropriate network. STEP 4: ENTERING YOUR DEVICE MODEL FOR BYOD (GSM ONLY) NOTE: If you’re enrolling in CDMA, please skip to step 5. You will be directed to the Bring Your Own Device (GSM) Screen. To ensure your GSM device is compatible, follow these three steps: 1. If your device is not an AT&T device, you will need to ensure it is unlocked. Check with the device carrier to unlock it. 2. AT&T devices do not need to be unlocked. NOTE: If you are keeping your existing number (porting), we have prepared a guide to ensure a...

Words: 1436 - Pages: 6

Premium Essay

Raven Williams-1230

...Raven Williams January 14, 2016 NT: 1210 Intro to Networking 1. What are open standards, and what, if any, are the advantages of such standards? Open Standards" are standards made available to the general public and are developed (or approved) and maintained via a collaborative and consensus driven process. "Open Standards" facilitate interoperability and data exchange among different products or services and are intended for widespread adoption. 2. In general, why would a layered architecture be viewed as beneficial? The Benefits of Layered Application Other applications will be able to reuse the functionality exposed by your layers. You will be able to distribute your layers over multiple physical tiers. This can make a very good impact on your application by Improving performance (sometimes), scalability and fault tolerance. The maintenance of your application is easier because of the low coupling between layers. Adding more functionality to your application is made easier. Layers make your application more testable. Building a well formed layers makes the orientation in your application easier. Having your application not layered means that you have to deal with all security threats in one place which is very difficult. Having your application distributed to layers makes it much easier for design and implement Without a good deployment plan it is not trivial to distribute your layers over multiple physical tiers in distributed computing. You need...

Words: 1095 - Pages: 5

Premium Essay

Midterm Exam Nt 1230

...NT1230 MIDTERM EXAM Name:___________________Date:______________________ 1. How do you install Window7 . Turn on the computer and computer and insert the windows 7 installation disk into the DVD drive. Press any key to boot from the dvd. The computer switches to the windows graphical interface and the Install windows page appears.using the drop down lists provided,select the appropriate language to install, time and currency format, and keyboard or input method and then click next.Click the install now button . select the I accept the license terms check box and click next .click the custom (advanced) option.From the list provided , select the partition on which you want to install windows 7 or select an area of unallocated disk space where the setup program can create a new partition. Then click next . the installing windows page appears.after several minutes, during which the setup program installs windows 7, the computer reboots twice and the setup windows page appears. In the type a user name text box, enter a name for the first user account on the system. In the type a computer name text box, enter a name, no more than fifteen characters next to continue. In the type a password and retype your password text boxes, enter a password for the user name you specified earlier.In the type a password hint text box, type a phrase to remind you of the password . click next to continue . in the product key text box , type the key code supplied with your copy of......

Words: 1044 - Pages: 5

Free Essay

Nt 1230 Lab 7

...John Buchanon Module 2 Analysis Ms. Shaw 01/12/2016 Graphic Drivers Scenario Solution to resolve the problem the computer must be restarted in safe mode, hold F8 when computer restarts, the graphic adapter must be rolled back to a previous state then troubleshoot. An older driver update maybe be able to fix software problems Safe Mode Safe Mode is a troubleshooting tool used to allow the user to start computer in a limit state with only the basics running this allows user to remove or roll back drivers Windows 7 Configuration (Custom lab Manual Exam 70-680). A user asks you to troubleshoot his Windows 7 workstation, which is behaving erratically. He has recently purchased and installed a new graphics adapter, and ever since then, he sees occasional wavy lines in the display. You run Device Manager on the system and note the manufacturer, model, and version number of the device driver for the graphics adapter. Then, you check the adapter manufacturer’s web site and discover that there is a new driver available for the adapter. After downloading and installing the driver update, you restart the system. The system appears to start normally, except that the graphical interface has been replaced by incomprehensible noise. Because you can’t see the display, you can’t work with the system. What should you do return the computer to an operational state? The new graphic adapter is most likely interfering with current devices. Boot Windows 7 into safe mode, then use generic......

Words: 335 - Pages: 2

Free Essay

Nt 1230 Assignment and Exercise

...Unit 8 Homework Unit 8 Assignment 1 DNS is a server based distributed database management system that translates domains host’s names to IP Addresses. It also allows a computer host or a client to use words instead of numbers to request information from a server or a client. You can get words or numbers to get the information from servers. Unit 8 Assignment 2 In Windows NT, when you make a change to the Security Accounts Manager, the change is applied directly to the Primary Domain Controller and is later replicated to each Backup Domain Controller. In an Active Directory multi-master replication environment, each domain controller contains a copy of Active Directory, not just the information for a single domain. When a change is made to Active Directory, the change is applied to whatever domain controller is the closest, and is then replicated to the remaining domain controllers. This prevents a designated Primary Domain Controller from being overburdened. Centralization sums up a primary reason for implementing Active Directory. The Active Directory structure makes it possible for you to achieve truly centralized management of users, regardless of how big the client’s network has become. In Windows NT a domain is a completely independent entity, and while it's possible to create a trust relationship between domains that exist on a common network, the domains are never truly integrated with each other because there is no higher authority that manages the domains. The......

Words: 422 - Pages: 2

Free Essay

Nt 1230 Unit 10 Assignment 1

...My hypothetical company is a small online gaming company called Game Zone. Seeing as how this is an online company, backing up of data and applications is crucial. The follow is the backup plan I would suggest. * The company should back up all online users profiles and gaming applications. I would also suggest redundant servers. * The rotation should be done every day due to the constant change of user profiles and the fact that new material is always being added to keep games up to date. Full backups should be done weekly with differential backups done daily. The full backup should be done at the start of every week at the lowest peak of online use and the next 6 days done with differential. * Seeing how this data is the life blood of the company it should be taken offsite daily. * If data on the current server is lost only that day’s activities is lost. * If they have redundant servers then down time will be minimal depending on configuration, minutes. If all servers lose their data then recover time may exceed hours. There is no paper trail to recover non-backed up data as all information is online. * Since the company exists only online restore time would be long due to the need to reload all gaming apps and user profiles. Contingency plan must be drawn up for all possibilities. Compile a list of all eventualities then create procedures to recover the data. All procedures are to be tested to make sure they work. * Data should......

Words: 341 - Pages: 2

Free Essay

Care Plan

...J. A. Care Plan Tamara Parker South College Medical Dx: Depression Allergies: Demerol, Oxycodone Hx: 91 y/o female brought to Shannondale from Blount Memorial with multiple fractures which she sustained from falling out of her bed. Patient suffers from chronic back pain and has hx of osteoporosis, muscle weakness, glaucoma, hyperlipidemia, kyphoplasty with bone fusion, back fusion, stemi, OA, and depression. |Neuro: |GU: | |Alert and oriented x3. Little confusion |No bowel movement since 3/2/16. Urine x1. | | | | |EENT: |MS: | |PERRLA, normocephalic, presbyopia. |Generalized weakness, uses wheelchair, needs little assistance with ADL’s. | | ...

Words: 1566 - Pages: 7

Premium Essay


...Address: House# 469(New), Gawair, Ashkona, Dakshin Khan, Dhaka-1230. 01914468060 Career Objective: To have a job that would enable me to use my talent and skills as well as contribute to organization's goals and which would provide excellent opportunities for career advancement and personal growth. Educational Qualification: Masters of Business Administration (MBA) Major in Finance Ahsanullah University of Science and Technology Result: 3rd Semester Continuing Bachelor of Business Administration (BBA) Major in Finance CGPA: 3.341 (Out of 4.00) Asian University of Bangladesh, Uttara Campus, Dhaka-1230. Passing Year: 2011 Higher Secondary Certificate (HSC) Shahid Ramizuddin College, Dhaka Cantt. Group: Business Studies. Board: Dhaka. Result: GPA 3.50 (Out of 5.00) Passing Year: September 2006 Secondary School Certificate (SSC) Mollartek Udayan Bidyalay, Dhaka Group: Business Studies. Board: Dhaka. Result: GPA 3.06 (Out of 5.00) Passing Year: July 2003 Key Quality: • Ability to work under pressure. • Capacity to taking challenges. • Communicate with people in flexible way. • Confident to convince other person for legal purpose. • Proactive personality. Experience: Company Name : VRIT Group Company Business : Software Companies Company Location : House-15, Road-5, Sector-12, Uttara, Dhaka-1230. Position Held : Finance Officer Area of Experience :......

Words: 380 - Pages: 2

Premium Essay


...that civilization originated out of Greek Created a chronological civilization Hid anything that would disprove his theory Greatest archeologist of his time George Mylonas 1952 found tablets Maria Amalia Christine (1738-1768) JJ Winklemann Father of Archeology History of the Art of antiquity Unpublished relics of antiquity Paleolithic age –old stone age Neolithic age- new stone age Bronze Early- 3000-2100 BC Middle- 2100-1550 Late- 1550-1100 Pelos was attacked and destroyed 1230 Whether the economy had trashed or they neglected their defenses Mycenian greeks worshiped the same gods as the later greeks No temple has been found for them Historians consider the Mycenaeans to be the first ancient Greeks, connected to the future Greek civilization by language and religion. Mycenaean period (starts with late Bronze age) 1. 1550-1500 2. 1500-1230 3. 1230-1100 golden age Possible reasons for the destruction of the Mycenaean 1. Internal 2. 1230 Egypt was attacked by the sea people (palasets) later a group of these people settled in Israel 3. Dorian - northern Greeks, used many of these people as mercenaries, armed forces, therefore may have known the sources of weakness, wanted to attack to get the wealth of the palace and then they left Dark Age 1150-750 1. New people arrive, Dorians believe they were descendants of Hercules. Argos, Sparta, Messenia – 3 most important states in Greece 2. Alphabet- invented by the Phoenicians (region...

Words: 516 - Pages: 3

Free Essay

Best One Ever

...CLEARING LOCATIONS SHEET AS OF 23 AUGUST 2013 AGENCY ACAP ARMY COMMUNITY SERVICE ARMY EMERGENCY RELIEF ARMY SUBSTANCE ABUSE PROGRAM BEHAVIORAL HEALTH SERVICES CENTRAL BARRACKS MGT LOCATION BLDG 18010, RM B308 RIVERS BLDG 121 RIVERS BLDG 121 BLDG 36044 BLDG 36003 VARIOUS OFFICE HOURS Mon - Fri 0900, 1000, 1300, 1400 Mon - Fri 0730 - 1630 Mon - Fri 0730 - 1630 Mon - Wed & Fri 0830 - 1130 M-W & F 0800-1500 / Thur 0800-1200 Mon - Fri 0800 - 1630 closed for lunch from 1130 - 1230 Mon - Fri 0900 - 1200 (turn-in only) Mon - Fri 0730 - 1630 Mon-Fri 1245-1515 Mon - Fri 0800 - 1630 Mon-Fri 0800 - 1030 and 1300 - 1530 Mon - Fri 0730 - 1530 Mon - Fri 0900 - 1600 Mon - Wed & Fri 0730-1600 Thurs 1200 - 1600 Mon - Fri 0730 - 1600 Mon - Fri 0730 - 1600 closed for lunch from 1130 - 1230 Mon - Fri 0730 - 1530 Mon - Fri 0900 - 1600 Mon - Thur 1000 - 2000 Fri & Sat 1000 - 1800; Sun 1200 - 2000 Time Varies by Clinic Mon - Fri 0830 - 1500 Mon - Fri 0800 - 1600 Time Varies by Clinic PHONE 288-ACAP 287-4471 288-6330/287-8908 287-2892 553-2288 286-7705/287-6512 288-2267 288-7946 287-7458/7167 287-9675 288-6474 LOCATION/ ADDITIONAL INFORMATION Must have personal copy of DA FORM 2648 ACROSS FROM THE MAIN FOOD COURT ACROSS FROM THE MAIN FOOD COURT WRATTEN DRIVE BY THE SANTA FE GATE BEHIND CRDAMC CENTRAL ISSUE FACILITY BLDG 89010 CHILD AND YOUTH SERVICES RIVERS BLDG 121 COPELAND CENTER MEDICAL OUTPROCESSING BLDG 18010, RM A312 CLUB SYSTEM (MWR Credit Card & Checking) BLDG 194, RM 114 DEFENSE TRAVEL......

Words: 808 - Pages: 4

Free Essay


...AK KODIAK ISLAND, AK ANCHORAGE, AK FAIRBANKS, AK AK400 AK401 AK402 AK403 AK404 AK405 Alabama 2013 BAH Rates - WITH DEPENDENTS MHA E-1 861 E-2 861 E-3 861 E-4 861 E-5 915 E-6 1020 E-7 1053 E-8 1089 E-9 1170 W-1 1023 W-2 1068 W-3 1113 W-4 1191 W-5 1281 O-1E 1059 O-2E 1107 O-3E 1206 O-1 927 O-2 1017 O-3 1110 O-4 1317 O-5 1464 O-6 1479 O-7 1494 Alabama ANNISTON / FT MCCLELLAN FORT RUCKER HUNTSVILLE, AL MOBILE, AL MONTGOMERY, AL AUBURN, AL BIRMINGHAM, AL TUSLOOSA, AL AL001 AL002 AL003 AL004 AL005 AL006 AL007 AL008 AL001 939 1023 1002 1062 1026 1017 1068 861 939 1023 1002 1062 1026 1017 1068 861 939 1023 1002 1062 1026 1017 1068 861 939 1023 1002 1062 1026 1017 1068 861 1053 1098 1059 1119 1077 1113 1143 915 1230 1413 1143 1215 1326 1359 1299 1020 1338 1485 1188 1356 1413 1455 1368 1053 1455 1560 1233 1509 1503 1557 1443 1089 1602 1683 1365 1650 1626 1743 1587 1170 1233 1416 1146 1218 1329 1362 1302 1023 1386 1515 1206 1419 1449 1497...

Words: 12761 - Pages: 52

Free Essay


...In charge of Quality (Chemistry)with 2 years 1640-60-2600Control 75-2900 experience/ BSc (Chemistry) with 5 to 7 years experience in relevent Field do 10840 STAFF/WORKERS:TECHNICAL 750-40-950-50B.Sc. (Chemistry) with D.Pharm 1200-60-1500Industrial DA Production of Drug and minimum 3 years 70-1990-80based on cost experience in Pharmaceutical Formulations 2390-95-2865- of living Index production 110-3415 630-25-755-30Minimum 10th Standard + ITI in 905-35-1080Production of Drug Fitter/ Machinist Trade with 2 40-1360-45years experience in a Formulations 1585-55-1860Pharmaceutical Company 65-2185 Minimum 10th Standard + ITI in 605-20-705-25Production of Drug Fitter/ Machinist Trade with 1 830-30-950-35Formulations year experience in a 1230-40-1430 Pharmaceutical Company 630-25-755-30Minimum 10th Standard + ITI in 905-35-1080Maintenance of Plant &Mechanical Fitter Trade with 2-5 years 40-1360-45experience in the relevant field 1585-55-1860Equipements 65-2185 1 Supervisor (Foreman grade) 2 9126 2 Worker Grade I 10 do 9006 3 Worker Grade II 16 do 8981 4 Mechanic Grade I 2 do 9006 5 Mechanic Grade II 1 Maintenance of Plant &Mechanical Equipements...

Words: 637 - Pages: 3

Premium Essay

Ethics 2

...Extracted Material from Task 158-C-1230 This student handout contains one page of extracted material from the following publication: Task 158-C-1230, Apply the Ethical Decision Making Method at Small Unit Level Disclaimer: The training developer downloaded the extracted material from the General Dennis J. Reimer Training and Doctrine Digital Library ( The text may contain passive voice, misspellings, grammatical errors, etc., and may not be in compliance with the Army Writing Style Program. Apply the Ethical Decision Making Method at Small Unit Level 158-C-1230 Conditions: As a leader faced with a situation which requires you to make an ethical decision. Standards: Resolved the situation ethically by appropriately applying the Ethical Decision Making Method IAW FM 22-100. Training and Evaluation Guide Performance Steps: 1. Clearly define the ethical problem. The ethical problem is if I should be honest and report this security breech. 2. Employ applicable laws and regulations. I would have to check my unit's internal Standard Operation Procedures to determine what the regulations are regarding proper disposal of classified documents. 3. Reflect on the ethical values and their ramifications. There are seven core Army values. I don't believe that all seven apply to this situation, but I will reflect on the ones that I think are relevant. The first Army value is "Loyalty". Is reporting SGT Day for......

Words: 305 - Pages: 2