Premium Essay

Bio Data Form

In: People

Submitted By dwain1
Words 780
Pages 4
| |
|EMPLOYEE BIOGRAPHICAL DATA SHEET |
|1. Name (Last, First, Middle): KARIUKI DAVID KAHORA |2. Contractor’s Name: |
|3. Employee’s Address |4. Contract Number | |5. Position Under contract| |
| |6. Proposed Salary | |7. Duration of Assignment | |
|8. Telephone Number (include |9. Place of Birth |10. Citizenship |
|area code) |NAKURU |KENYA |
|254700840062 | | |
|11. Availability |
|1 week. |
|12. EDUCATION (include all college or university degrees) |13. LANGUAGE PROFICIENCY |
|NAME AND...

Similar Documents

Free Essay

Technical

...BIOS (basic input/output system) is the program a personal computer's microprocessor uses to get the computer system started after you turn it on. It also manages data flow between the computer's operating system and attached devices such as the hard disk , video adapter , keyboard , mouse , and printer . BIOS is an integral part of your computer and comes with it when you bring it home. (In contrast, the operating system can either be pre-installed by the manufacturer or vendor or installed by the user.) BIOS is a program that is made accessible to the microprocessor on an erasable programmable read-only memory (EPROM) chip. When you turn on your computer, the microprocessor passes control to the BIOS program, which is always located at the same place on EPROM. When BIOS boots up (starts up) your computer, it first determines whether all of the attachments are in place and operational and then it loads the operating system (or key parts of it) into your computer's random access memory (RAM) from your hard disk or diskette drive. With BIOS, your operating system and its applications are freed from having to understand exact details (such as hardware addresses) about the attached input/output devices. When device details change, only the BIOS program needs to be changed. Sometimes this change can be made during your system setup. In any case, neither your operating system or any applications you use need to be changed. Although BIOS is theoretically always the intermediary...

Words: 821 - Pages: 4

Free Essay

Networking Systems Administrator

...Chapter 6: Outline Memory and Storage * RAM BASICS- * RAM is used for programs and data * Is one of the most popular upgrades to add to any system * Different variables * Memory module type * Memory chip type used on the module * Memory module speed * Error checking * ALLOWABLE MODULE SIZES AND COMBONATIONS- * Number of modules needed per bank of memory * Total of modules that can be installed * RAM TYPES- * DRAM requires frequent recharges of memory to retain its contents * SRAM does not need frequent recharging * SDRAM was the first type of memory to run in sync with the processor bus * DDR SDRAM uses double data and performs two transfers per clock cycle * DDR2 SDRAM runs its external data bus at twice the speed enabling a faster performance * Rambus was used earlier in Pentium 4 based chipsets from Intel * COMPARISON OF MEMORY MODULES- * All systems built in the early 90’s have used some form of memory module * SIMM- single refers to both sides having same pin out * SIPP- substituted pins for the edge connectors used by SIMM modules * DIMM- each side has different pin out * SODIMM- various pin outs for notebook, laser and LED printers * RDRAM- uses direct Rambus memory chips and is also referred as RIMM * SORM- compact version of the standard Rambus module for used in notebooks * Installing DIMMS and Rambus RDRAM Modules * Memory modules are the memory sticks......

Words: 1004 - Pages: 5

Free Essay

Week 3 Assingnment

...When booting from my hard drive, I am prompted with an option to choose my operating system: windows 7 or Ubuntu operating systems. Upon choosing one of these, it takes me through the normal booting process. When booting from a CD – ROM or Flash, insert the CD or flash and then restart the computer. Press the "F8" function key as the computer restarts to enter into BIOS setting of the computer. You may have to press the "Ctrl" key at the same time depending on the manufacturer of the computer. If any problems arise, check the owner's manual for additional information as each computer can have different BIOS access options. After finding the boot option menu item in the BIOS, you should hard drive as the primary or first device. Use the up arrow key or space bar to select the CD-ROM as the primary or first boot device. Push the "Esc" key and then save the changes to the BIOS settings. The computer will restart then, and it should boot from the CD-ROM now. Depending on what you have on the CD rom for booting, the computer runs from that. I booted the BackTrack program from my CD-ROM in order to use the program without having it permanently saved on my hard drive. I navigated through the BackTrack program with no problems, but did not activate any sessions as it is used for hacking purposes. My computer uses USB for both the mouse and the keyboard, therefore it does not signal any beep codes as an older motherboard with PS2 mouse connectors would. The main......

Words: 578 - Pages: 3

Free Essay

Assignment3

... However, even if you have 4GB of physical RAM installed you won't be able to use all of it for your applications. A portion of the upper 3GB address is being occupied by your system devices like your graphics card, BIOS, PCI, etc. That's why on some systems, you will see only 3.27GB of available RAM. This usually varies depending on the hardware. Take a look at the crude illustration below.  In normal mode, the 32-bit OS can address this much:  +---------------+ 4GB  | |  | |  | |  | |  | |  | |  | |  | |  | |  | |  | |  | |  | |  | |  +---------------+ 0  Now if you put in your stuff and your RAM, say 2GB, in this address space:  +---------------+ 4GB  | BIOS, PCI |  | GFX, ETC... |  | |  | |  |---------------+ 3 GB  | |  | |  | EMPTY |  | |  |---------------+ 2 GB  | |  | RAM |  | |  | |  +---------------+ 0  If you put another 1GB RAM in there for a total of 3GB it will still be fine because you still have 1GB of EMPTY space.  But if you put another gig (so you now have a total of 4), then you have an overlap. Part of the last GB will be hidden behind BIOS, PCI, GFX, etc. so Windows cannot give it an address, and it will be "lost".  Memory remapping can solve it by moving the last gig above PCI, GFX, BIOS, etc. but then you'll need an OS that can go beyond 4GB, which a 32-bit OS cannot do, and that's where the 64-bit OS...

Words: 1155 - Pages: 5

Premium Essay

Bio-Intensive Gardening

...Exercise 2 BIO-INTENSIVE APPROACH TO FOOD PRODUCTION I. INTRODUCTION The bio-intensive approach is a biological form of agriculture in which a small area of land is intensively cultivated, using nature's own ingredients to rebuild and then maintain the soil's productivity. At the heart of the approach is the effort to improve the soils' capability to nurture and sustain plant life. What a bio-intensive gardener tries to do on his/her small plot is to simulate/replicate a natural forest (with the constant recycling of nutrients and maintenance of soil, moisture and microbial conditions). Many countries of the world have farmed biologically for thousands of years and have been able to sustain output levels over these years. II. MATERIALS AND METHODS A. Materials 1. Farm tools 2. Animal manure 3. Crop residue 4. Vegetable seeds B. Procedure 1. Identification of crops to be planted and cared 2. Preparation of plot 3. Planting of crops according to their plan 4. Care and maintenance of the plot 5. Harvesting of crop products 6. Analysis III. DATA AND OBSERVATIONS Table 1.1 Data on planting proper Crop | Planting distance | Seeds planted per hill | Kangkong | 15 cm. between hills | 2-3 | Mungbean | 3 rows with furrow | 2-3 | Okra | 30 cm. between hills | 2-3 | Radish | 20 cm. between hills | 2-3 | Table 1.2 Data on crops’ performance Crop | Number of crop products | Weight of crop......

Words: 1063 - Pages: 5

Free Essay

Asusrive

...EXTREME Instruction manual ASUS RAMPAGE IV EXTREME Your user manual ASUS RAMPAGE IV EXTREME Manual abstract: In this way you can still attach the motherboard to the base without worrying about short circuits. Sometimes you may need to use the plastic springs to isolate the screw from the motherboard PCB surface, because the circuit wire may be near by the hole. Be careful, don't let the screw contact any printed circuit write or parts on the PCB that are near the fixing hole, otherwise it may damage the board or cause board malfunctioning. "*" For RAMPAGE IV EXTREME only . "**" For RAMPAGE IV EXTREME Ultra only. RAMPAGE IV EXTREME Ultra/RAMPAGE IV EXTREME Motherboard -4- Chapter 1 Introduction Features Summary Form Factor CPU -- 30.5cm x 24.4cm ATX size form factor, 4 layers PCB. -- Socket 478 for Intel® Micro FC-PGA2 Pentium® 4 processor -- Support Intel ® Pentium ® 4 (Northwood, 0.13 m) processor -- -- -- -- -- -- -- -- -- -- -- -- -- -- Support Intel ® Pentium ® 4 Processor with HT Technology Intel Pentium® 4 400/533MHz FSB 2nd cache depends on CPU SiS 655 Host/Memory controller SiS 963 MuTIOL Media I/O 4 184-pin DDR DIMM sockets Supports Dual channel DDR333/DDR266 DIMM Supports 128MB/256MB/512MB/1GB unbuffered DRAM Supports up to 4GB DRAM (Max) Supports only 2. 5V DDR DIMM IT8705F 1 AGP 3.0 slot supports 8X/4X mode 5 PCI slot supports 33MHz & PCI 2.2 compliant 2...

Words: 778 - Pages: 4

Free Essay

Work

...1.why is all data stored in a computer in binary form? Computers are only able to read and store data in binary form, 1 or 0, on or off, yes or no, voltage or none. Binary is the simplest way to manage information. 2. What are the four primary functions of hardware? input, output, PROCESS, and Storage 3. What are the two main input devices and two main output devices? the mouse, keyboard, printer, and monitor. 4. What three things do electronic hardware devices need in order to function? power, ground return, and load. 5. How many bits are in a byte? There are eight bits in a byte. 6. What is the purpose of an expansion slot on a motherboard? Expansion slots on a motherboard are designed to accept peripheral cards that add functionality to a computer system, such as a video or a sound card. 7. Which component on the motherboard is used primarily for processing? The CPU 8. Name the two main CPU manufacturers. Intel and AMD 9. Order the following ports according to speed, placing the fastest port first: FireWire, eSATA, USB. eSATA is faster than FireWire and firewire is faster than USB. 10. What are two other names for the system bus? The PCI bus, and the PCI express bus 11. What type of output does an S/PDIF port provide? Digital output 12. Why is an SSD hard drive more reliable under rugged conditions than an IDE hard drive? SSD hard drives have no moving parts that can disintegrate under rugged conditions. Because SDD drives......

Words: 1535 - Pages: 7

Premium Essay

Biosensers

...Executive Summary Global bio-security threats such as the spread of emerging infectious diseases (i.e.,avian influenza, SARS, Hendra, Nipah, etc.) and bioterrorism have generated significant interest in recent years. There is considerable effort directed towards understanding and negating the proliferation of infectious diseases. Biosensors are an attractive tool which has the potential to detect the outbreak of a virus and/or disease. Although there is a host of technologies available, either commercially or in the scientific literature, the development of biosensors for the detection of emerging infectious diseases (EIDs) is still in its infancy. There is no doubt that the glucose biosensor, the gene chip, the protein chip, etc. have all played and are still playing a significant role in monitoring various bio-molecules. Can biosensors play an important role for the detection of emerging infectious diseases? What does the future hold and which biosensor technology platform is suitable for the real-time detection of infectious diseases? These and many other questions will be addressed in this review. The purpose of this review is to present an overview of biosensors particularly in relation to EIDs. It provides a synopsis of the various types of biosensor technologies that have been used to detect EIDs, and describes some of the technologies behind them in terms of transduction and bio-receptor principles. Introduction There is great deal of interest in monitoring and......

Words: 1265 - Pages: 6

Premium Essay

Comp Hardware

...STATEMENTS: You can use an expresscard/34 card or and expresscard/54 card in laptop Compatible expresscards for the laptop include cards which are rectangular shaped. 8.2.6 Hibernation: needs to have enough free hard drive space 9.1 Spyware: it monitors the actions you take on your machine and sends the info back to its originating source Trojan horse: this program appeards to be a legitmate application, utility, gane or screensaver and perform malicious activities surreptitiously. Cookie: a file saved on your hard drive that tracks web sit preferences nd use. Graywayre:legitimate service 9.2.3 Social engineering: dumpster driving, shoulder surfing User awareness training: best countermeasure against social engineering Common form of social engineering attack: hoax virus information emails Phishing: tricks victims into providing confidential information 9.3 Biometrics: Face Scanner Retina Scanner Smart Card: hardware device that contains identification information. Minimum password length & account lockout...

Words: 935 - Pages: 4

Free Essay

Sales Marketing

...BIO-CLEAR Air Purifier * In 1995 Mr. T. Wan of RW & Company agreed with his foreign suppliers that there would be a market for its BIO-CLEAR air purifier in the Philippines. Since there was then as yet no such comparable commercial product in the local market, the decision was made to bring it to the market as fast as possible. This decision was made to preempt the competition, to be able to define the market by being the first product that was to be locally available, and to build up brand equity. Arrangements were therefore made for the initial shipments of the product’s range of models into the Philippines. A year later, however, Mr. Wan was struggling with unsold inventory consisting mostly of the more sophisticated and computerized higher priced models. Sales in the provincial outlets were consistently poorer than predicted versus those in the urban areas, especially Metro Manila. Metro Manila sales, however, were still marginal as well. Product sales were barely covering costs, and Mr. Wan was wondering whether it would be better to simply discontinue offering the line. He would be talking to the foreign supplier’s representatives in a week and needed a good position in order to be able to strike a negotiation with confidence, especially because this supplier was not only the source of the BIO-CLEAR line of air purifiers but also of other home appliance products that RW & Company was selling. Above all, Mr. Wan had to decide as to whether or not......

Words: 1685 - Pages: 7

Free Essay

The Administration of Bitlocker

...version 1.2 or higher, BitLocker will store its key in the TPM. Also a removable USB memory device, such as a USB flashes drive. If your computer doesn’t have TPM version 1.2 or higher, BitLocker will store its key on the flash drive. To turn on BitLocker Drive Encryption, your computer’s hard disk must have at least two partitions. One partition must include the drive Windows is installed on. This is the drive that BitLocker will encrypt. The other partition is the active partition, which must remain unencrypted so that the computer can be started. Once you've encrypted the drive Windows is installed on, you can also encrypt additional data drives on the same computer. Be formatted with the NTFS file system. Have a BIOS that is compatible with TPM and supports USB devices during computer startup. If this is not the case, you will need to update the BIOS before using BitLocker. Define the three authentication mechanisms that can be used to implement BitLocker encryption. The first authentication mode for BitLocker is; Transparent operation mode: This mode utilizes the capabilities of Trusted Platform Module (TPM) 1.2 hardware to provide for a transparent user experience—the user powers up and logs onto Windows as normal. The key used for the disk encryption is sealed (encrypted) by the TPM chip and will only be released to the OS loader code if...

Words: 808 - Pages: 4

Free Essay

Yeast Culture Lab

...Yeast Culture Lab BIO/315 April 22, 2014 Annissa Furr Yeast Lab Yeast, is a microscopic one celled organism that belongs to the group of organisms that is called fungi. They are single celled organisms that have a scientific name of Saccharomyces cerevisiae. Yeast can have many purposes but the main purpose of yeast is to help the fermentation process. Yeast is a living organism known as a fungus and it gets its energy source from sugar. Yeast can also be used in creating certain medical intentions that heal wounds and reduce inflammation because of the large amount of hormones and enzymes. In reference to yeast reproduction depends on the type of species because they can be either asexual by mitosis or sexual by budding. Consumption talked about the use and rate of use of a primary consumer that needs photosynthesis in order to create energy from CO2. Death is in reference to a population and refers to the toll of death in a population. Hypothesis This labs main objective is to test cultures referring to yeast. The hypothesis is that the yeast will grow in all the environments that it is placed in but it will thrive in the environment that has sugar that is because yeast uses sugar as an energy sources naturally which will make the yeast generate more. The yeast could be identical in all the environments but most likely the situation will be that the yeast grows rapidly in the sugar. This hypothesis needs to be tested and in order to do that their...

Words: 1280 - Pages: 6

Free Essay

Cmos

...CMOS Jose Capellan ITT-Tech CMOS or complementary metal oxide semiconductor is a type of integrated circuit technology. The term is often used to refer to a battery-powered chip found in many personal computers that holds some basic information, including the date and time and system configuration settings, needed by BIOS, or basic input/output system to start the computer. The CMOS memory is usually located with the real-time clock in the motherboard chipset or in a separate real-time clock chip. The PC reads the time from the RTC when it boots up, after which the CPU keeps time – which is why system clocks are sometimes out of sync. Rebooting the PC causes the RTC to be reread, increasing their accuracy. In modern-day PCs the nonvolatile BIOS memory is generally an EEPROM or Flash memory chip. There is still a backup battery involved, but its role is not to maintain the data stored in the RAM, only to keep the RTC chip operational. This name is somewhat misleading, however, as most modern computers no longer use CMOS chips for this function, but instead depend on other forms of non-volatile memory. CMOS chips are still found in in many other electronic devices, including digital cameras. In a computer, the CMOS controls a variety of function, including POST or the Power on Self-Test. When the computer’s power supply fires up, CMOS runs a series of checks to make sure the system is functioning properly. One of these checks includes counting up RAM or random access......

Words: 727 - Pages: 3

Free Essay

Basic Security

...Introduction The BIOS performs a power-on self-test when the system is turned on. This test is used to ensure that the system is functioning properly and to gather information about what the system contains. When a problem is identified with the system during the POST, the BIOS will normally produce an error message. However, in some cases the problem is detected so early in the test that the BIOS cannot access the video card to print the message. In this case the BIOS will produce a beeping pattern on the speaker to tell you what the problem is. The exact meaning of the beep codes depends on the type and version of BIOS that you have. The most popular types of BIOS are those made by Award American Megatrends (AMI) and Phoenix. AMI 6 Beeps: Keyboard controller / gate A20 failure The keyboard controller is a chip on the motherboard that communicates with your keyboard. It also controls the A20 gate that provides access to the high memory area (HMA). This component is indicating a failure. This is a problem with either the keyboard or the motherboard. Phoenix 1-3-4-1 Test 512 base address lines. Sometimes a memory stick can become loose causing the computer to be unable to read the memory or get errors as it's reading it. Try fixing this issue by opening the computer removing each of the memory sticks you have in the computer and then placing them back into the slots, reset the memory and restart the computer. If this doesn’t work replace the memory. Basic......

Words: 962 - Pages: 4

Free Essay

Gfgf

...JAWAHARLAL NEHRU UNIVERSITY APPLICATION FORM (FOR THE POST OF ASSISTANT PROFESSOR) Advt. No ………………………………………….Post No…………............... Post applied for……………………………………………………………….. Centre………………………………………………………………………… School of………………………………………………………………………. _____________________________________________________________________________________ I INDENTIFYING DATA: 1. Name in full (in block letters) Dr/Mr/Ms.…………………………………….......................................... 2. Date of Birth…………………3. Father’s/Husband’s Name…………………………………………… *4. Mailing Address…………………………………………………………………………………………. ……………………………………………………………….......................................... ………………………………Pin Code…...................................................................... Tel. No.……………………Mobile No…………………E-mail………………………………………… 5. Permanent Address………………………………………………………………………………………. ………………………………………………………………………………………… …………………………….Pin Code ………………………………………………. 6. Marital Status…………………………7. Nationality………………………. ………………………… 8. State of Domicile…………………….……9. Do you belong to SC/ST/OBC/PH ? ................................ II. MISCELLANEOUS DATA : 1. Are you willing to accept the minimum initial pay in the grade? If not, state reasons for claiming higher starting pay. ……………………………………………………………………………………………………………… 2. If selected for appointment, what notice period would you require for joining the......

Words: 666 - Pages: 3