Free Essay

Hardware/Software Support Chapter 1

In: Computers and Technology

Submitted By jordeebee
Words 493
Pages 2
Chapter 1 Reviewing the Basics Questions

1. SuperSpeed USB 3.0 is faster than Hi-Speed 2.0 2. A S/PDIF sound port connects to an external home theater audio system, providing digital audio output and the best signal quality. 3. Video Graphics Array, S-Video, Digital Video Interface, High-Definition Multimedia Interface and Display Port. 4. A motherboard has expansion slots to be used by expansion cards. An expansion card, also called an adapter card, is a circuit board that provides more ports that those provided by the mother board. 5. Most power supplies have a dual-voltage selector switch on the back of the computer case where you can switch the input voltage to the power supply to 115 V used in the United States. 6. The unit of measurement is joules. 7. Hot wires in home wiring are normally colored black, and ground wires in computers are normally colored black. 8. A rectifier is a device that converts AC to CD, and an inverter is a device that converts DC to AC. A transformer is a device that changes the ratio of voltage to current. The power supply used in a computer is both a rectifier and a transformer. 9. A surge suppressor protects electrical equipment from power surges and is rated in joules. 10. A power supply receives 120 volts of Alternating current power from a wall outlet and converts it to 3.3, 5, and 12 volts of Direct Current power. 11. Power supplies and CRT monitors contain capacitors. A capacitor holds its charge even after the power is turned off and the device is unplugged. 12. The best way to guard against ESD is to use a ground bracelet together with a ground mat or wear antistatic gloves. 13. The power-on self-test is a series of tests performed by the startup BIOS when you first turn on a computer. These tests determine if startup BIOS can communicate correctly with essential hardware components required for a successful boot. 14. a. System BIOS manages essential devices (such as keyboard, mouse, hard drive, and monitor) before the OS is launched. b. Startup BIOS is used to start the computer. c. BIOS setup or CMOS setup is used to change the motherboard configuration or settings. 15. The best way to know for sure what type of cable you're dealing with, trace the cable from its source to its destination. 16. A serial ATA or parallel ATA. 17. When faster PCI express (PCIe) slots were added to motherboards, more powReer was required and a new ATX specification (ATX Version 2.2) allowed for a 24-pin P1 connector. 18. A 6-pin PCIe connector provides an extra +12 V for high-end video cards using PCI Express, Version 1 standard. 19. A 4-pin auxiliary motherboard connector used for extra 12 V power to the processor. 20. A 4-pin Molex connector is used for IDE (PATA) drives.

Similar Documents

Premium Essay

Legacy System

...Legacy Systems  Older software systems that remain vital to an organisation ©Ian Sommerville Software Engineering, 6th edition. Chapter 26 Slide 1 Objectives     To explain what is meant by a legacy system and why these systems are important To introduce common legacy system structures To briefly describe function-oriented design To explain how the value of legacy systems can be assessed ©Ian Sommerville Software Engineering, 6th edition. Chapter 26 Slide 2 Topics covered    Legacy system structures Legacy system design Legacy system assessment ©Ian Sommerville Software Engineering, 6th edition. Chapter 26 Slide 3 Legacy systems Software systems that are developed specially for an organisation have a long lifetime  Many software systems that are still in use were developed many years ago using technologies that are now obsolete  These systems are still business critical that is, they are essential for the normal functioning of the business  They have been given the name legacy systems ©Ian Sommerville Software Engineering, 6th edition. Chapter 26 Slide 4  Legacy system replacement  There is a significant business risk in simply scrapping a legacy system and replacing it with a system that has been developed using modern technology     Legacy systems rarely have a complete specification. During their lifetime they have undergone major changes which may not have...

Words: 2577 - Pages: 11

Premium Essay

Crime

........................................................................ Signature................................................................... Date..................... Supervisor: ............................................................... Signature.................................................................... Date..................... Table of Contents Declaration 2 CHAPTER 1 4 Introduction 4 1.0 Purpose 4 1.1 Roles and Responsibilities 5 1.2 Implementation Readiness Review 6 1.3 Operational Readiness Review 6 1.4 Demonstration of the software 6 CHAPTER 2 7 Plan for hardware procurement 7 2.0 Training 7 2.1 Hardware installation 8 2.2 Software installations 8 2.3 System installation 8 2.3 User /Operator Training 8 CHAPTER 3 9 Implementation 9 3.0 Live Running Trial 9 3.1 Phased Implementation (Modular) 9 3.2 Parallel Run 10 3.3 Direct 10 CHAPTER 4 11 Monitoring the Implementation process 11 4.0 Evaluation & Support 11 4.1 Cost of Software 11 List of Abbreviation 12 References 13 CHAPTER 1 Introduction 1.0 Purpose The Implementation Plan describes how the automated system/application will be installed, deployed and transitioned into an operational system or situation. The plan contains an overview of the system,...

Words: 2216 - Pages: 9

Premium Essay

Infrastructure Hardware

...Infrastructure: Hardware and Software 5 Foundations of Business Intelligence: Databases and Information Management 6 Telecommunications, the Internet, and Wireless Technology 7 Securing Information Systems Part II provides the technical foundation for understanding information systems by examining hardware, software, databases, networking technologies, and tools and techniques for security and control. This part answers questions such as these: What technologies and tools do businesses today need to accomplish their work? What do I need to know about these technologies to make sure they enhance the performance of my firm? How are ISBN 1-269-41688-X these technologies likely to change in the future? 107 Essentials of Management Information Systems, Tenth Edition, by Kenneth C. Laudon and Jane P. Laudon. Published by Prentice Hall. Copyright © 2013 by Pearson Education, Inc. IT Infrastructure: Hardware and Software LEARNING OBJECTIVES C H A P T E R 4 STUDENT LEARNING OBJECTIVES After completing this chapter, you will be able to answer the following questions: 1. 2. What are the components of IT infrastructure? What are the major computer hardware, data storage, input, and output technologies used in business? What are the major types of computer software used in business? What are the most important contemporary hardware and software trends? What are the principal issues in managing hardware and software technology? 3. 4. 5. ISBN 1-269-41688-X ...

Words: 21212 - Pages: 85

Premium Essay

Using Linux

...Guide to Linux+ (2nd Edition) ISBN 0-619-21621-2 End of Chapter Solutions Chapter 1 Solutions Review Questions 1. Every computer consists of physical components and logical components. The logical components of a computer that understand how to work with the physical components are referred to as: a. hardware b. records c. software d. processors Answer: c 2. The operating system software is necessary for a computer to function. True or False? Answer: True 3. Linux is a ___________ and ___________ operating system. a. production, stable b. multiuser, multitasking c. processing, operating d. large, useful Answer: b 4. The core component of the Linux operating system is the Linux kernel. If you were a Linux systems administrator for a company, when would you need to upgrade your Linux kernel? (Choose all that apply.) a. when you need to have support in Linux for new hardware b. when you need another user interface c. when you need to increase the stability of Linux d. when you need to use kernel modules Answer: a, c 5. Which of the following kernels are developmental kernels? (Choose all that apply.) a. 2.3.4 b. 2.5.5 c. 2.2.7 d. 2.4.4 Answer: a, b 6. A production kernel refers to a kernel whose: a. revision number is even b. minor number is odd ...

Words: 1315 - Pages: 6

Premium Essay

Dfsdfsd.Pdf

...Guide to Linux+ (2nd Edition) ISBN 0-619-21621-2 End of Chapter Solutions Chapter 1 Solutions Review Questions 1. Every computer consists of physical components and logical components. The logical components of a computer that understand how to work with the physical components are referred to as: a. hardware b. records c. software d. processors Answer: c 2. The operating system software is necessary for a computer to function. True or False? Answer: True 3. Linux is a ___________ and ___________ operating system. a. production, stable b. multiuser, multitasking c. processing, operating d. large, useful Answer: b 4. The core component of the Linux operating system is the Linux kernel. If you were a Linux systems administrator for a company, when would you need to upgrade your Linux kernel? (Choose all that apply.) a. when you need to have support in Linux for new hardware b. when you need another user interface c. when you need to increase the stability of Linux d. when you need to use kernel modules Answer: a, c 5. Which of the following kernels are developmental kernels? (Choose all that apply.) a. 2.3.4 b. 2.5.5 c. 2.2.7 d. 2.4.4 Answer: a, b 6. A production kernel refers to a kernel whose: a. revision number is even b. minor number is odd ...

Words: 1315 - Pages: 6

Free Essay

Joke

...Before using this information and the product it supports, be sure to read and understand the ThinkCentre Safety and Warranty Guide and Appendix A “Notices” on page 69. First Edition (November 2010) © Copyright Lenovo 2010. LENOVO products, data, computer software, and services have been developed exclusively at private expense and are sold to governmental entities as commercial items as defined by 48 C.F.R. 2.101 with limited and restricted rights to use, reproduction and disclosure. LIMITED AND RESTRICTED RIGHTS NOTICE: If products, data, computer software, or services are delivered pursuant a General Services Administration “GSA” contract, use, reproduction, or disclosure is subject to restrictions set forth in Contract No. GS-35F-05925. Contents Important safety information . . . . . Features . . . . . . . . . . . . . . . . . Specifications . . . . . . . . . . . . . . . Software overview . . . . . . . . . . . . . Software provided with your Windows operating system . . . . . . . . . . . . Locations. . . . . . . . . . . . . . . . . Locating connectors, controls, and indicators on the front of your computer . . . . . . . Locating connectors and parts on the rear of your computer . . . . . . . . . . . . . Locating components . . . . . . . . . . Locating parts on the system board . . . . Locating internal drives . . . . . . . . . . . . . . . . . . vii 1 3 4 4 6 6 7 8 9 10 Chapter 1. Product overview . . . . . . 1 Creating and using recovery media . . . Creating...

Words: 19834 - Pages: 80

Premium Essay

Technology

...CHaPTer Firewall Fundamentals 2 T O SOME NETWORK ADMINISTRATORS, A FIREWALL is the key component of their infrastructure’s security. To others, a fi rewall is a hassle and a barrier to accomplishing essential tasks. In most cases, the negative view of fi rewalls stems from a basic misunderstanding of the nature of fi rewalls and how they work. This chapter will help dispel this confusion. This chapter clearly defi nes the fundamentals of fi rewalls. These include what a fi rewall is, what a fi rewall does, how it performs these tasks, why fi rewalls are necessary, the various fi rewall types, and fi ltering mechanisms. Once you understand these fundamentals of fi rewalls, you will able to look beyond the unschooled opinions, common mythology, and marketing hype surrounding them, and the crucial benefi ts of effective fi rewall architecture will become clear. Like any tool, fi rewalls are useful in solving a variety of particular problems and in supporting essential network security. Chapter 2 Topics This chapter will cover the following topics and concepts: • What a fi rewall is • Why you need a fi rewall • How fi rewalls work and what they do • What the basics of TCP/IP are • What the types of fi rewalls are • What ingress and egress fi ltering is • What the types of fi rewall fi ltering are • What the difference between software and hardware fi rewalls is • What dual-homed and triple-homed fi rewalls...

Words: 15354 - Pages: 62

Premium Essay

Information System Strategic Planning

...approach to information systems planning, submitted to the Graduate Faculty of Strayer University in candidacy for the degree of Master’s of Science in Information Systems. Submitted by: _________________________Date: _______________ Approved by: ___________________________ Date: _______________ ABSTRACT Information systems’ planning is often costly to implement and maintain; however, sound planning practices may reduce expenses associated with the development processes. A Formal methodical approach to systems analysis, requirements engineering, systems design, development, and construction may offer a reduction in development and certain aspects of life cycle support expenses. Corporate expenses may reach approximately 5% of their gross income on information systems development and support. This equates to approximately $15,000,000 to $35,000,000 annually (Whitemarsh Information Systems Corp. 2008, p.). Information systems may cost significantly less. In comparison, information systems, contingent upon other factors such as size of the company, and complexity of the information system cost may range anywhere from $2,000,000 to $10,000,000 per system. Corporate leadership clearly has a strong influence upon information system expenditures and may have unrealistic expectations associated with anticipated return on investments in information systems. This research paper explorers the need for a formalized approach to systems development and the methodologies available...

Words: 6140 - Pages: 25

Premium Essay

Revision

...Guide[pic] Table of Contents Chapter One: Future Developments 5 Emerging Technologies 5 Benefits to Leisure from Technology Advances 6 Potential future uses of ICT 6 Implications of future developments of ICT 7 Issues surrounding the rapid development of ICT 7 Chapter 2: Information and Systems 8 What is an organisation 8 Structure of an organisation 8 Pyramid Structures 9 Horizontal Structures 9 How has the development of ICT affected the organisational structure 10 Activities within an organisation 10 Strategic Level of task 10 Tactical level of task 10 Operational Level of Task 10 Exchanging Information with External Bodies 10 Chapter 3: Types of ICT system 12 Common Ict Systems 12 Legacy Systems 12 Back office systems 12 Day-to-day working systems 13 Management Information Systems 13 Enterprise resource planning systems 13 Customer Relationship Management Systems 13 Decision Support Systems 14 Ecommerce systems 14 Chapter 4: Managing ICT 15 Organisation Size 15 Information Flow 15 ICT management and business strategy 15 Chapter 5 ICT Strategy 16 Factors Influencing a Strategy 16 Managing Information Assets over time 16 The Need for a Corporate Strategy 17 Upgrading Hardware & software 17 Standards 17 Chapter 6: ICT Policies 18 Ict Training Policy 18 ICT security Policy 18 ICT procurement Policy 19 Chapter 7: Legislation 20 Impact of Legislation on ICT policies 20 Developed Legislation 20 Copyright Designs and Patent Act 1988 21 Software theft 21 Health and Safety Legislation...

Words: 9952 - Pages: 40

Free Essay

Study Guide Computer Chapter 1,2 3 & 4

...Spring 2016 Study Guide – Chapters 1, 2, 3 & 4 &Videos Chapter 1: Introduction to Information Technology: The Future Now 1. Robots – automatics devices that perform functions ordinarily performed by human beings 2. Online learning (Distance learning) - is designed to provide students with additional learning opportunities & instructors with additional teaching tools (e-learning) 3. Telemedicine, Campus Cruiser (portals) – medical care via telecommunications - 4. Computer / IT uses 5. Cyberspace – encompasses not only the online world & the Internet in particular but also the whole wired & wireless world of communications in general 6. Internet – is a worldwide computer network that connects hundreds of thousands of smaller networks/ World wide web – often called the web – an interconnected system of internet computers (servers) that support specially formatted documents in multimedia form 7. Multimedia files – technology that presents information in more than one medium, such as texts, still images, moving images & sound. 8. Networks A. Client – are linked by a wired or wireless network. The entire network is called client server network / Server Networks – is a central computer that holds collections of data (databases) & programs for connecting or supplying services to PC’s workstations & other devices which are called clients B. Peer to Peer Network 9. Hardware - consists of all the machinery & equipment in a computer system (Keyboard, screen)/ Software – (programs) consists...

Words: 1784 - Pages: 8

Premium Essay

Biolox

...click. www.apple.com/ilife/iphoto iPhoto Help photo GarageBand Create music by adding musicians to a virtual stage. Enhance your song to sound like a pro. www.apple.com/ilife/garageband GarageBand Help record iWeb Create beautiful websites with photos, movies, blogs, podcasts, and dynamic web widgets. www.apple.com/ilife/iweb iWeb Help website Contents Chapter 1: Ready, Set Up, Go 9 What’s in the Box 10 Setting Up Your iMac 15 Putting Your iMac to Sleep or Shutting It Down Chapter 2: Life with Your iMac 20 22 24 26 28 Basic Features of Your iMac Other Features of Your iMac Ports on Your iMac Other Components of Your iMac Getting Answers Chapter 3: Boost Your Memory 33 Installing Additional Memory 38 Making Sure Your iMac Recognizes the New Memory Chapter 4: Problem, Meet Solution 41 Problems That Prevent You from Using Your iMac 43 Using Apple Hardware Test 44 Problems with Your Internet Connection Contents 5 46 47 48 48 50 51 53 Problems with AirPort Extreme Wireless Communication Keeping Your Software Up to Date When an Application Doesn’t Respond Reinstalling the Software That Came with Your iMac Other Problems...

Words: 10289 - Pages: 42

Free Essay

Nios-Multicore Accelerator

...services at any time without notice. Altera assumes no responsibility or liability arising out of the application or use of any information, product, or service described herein except as expressly agreed to in writing by Altera. Altera customers are advised to obtain the latest version of device specifications before relying on any published information and before placing orders for products or services. Creating Multiprocessor Nios II Systems Tutorial June 2011 Altera Corporation Contents Chapter 1. Creating Multiprocessor Nios II Systems Introduction to Nios II Multiprocessor Systems . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 1–1 Benefits of Hierarchical Multiprocessor Systems . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 1–2 Nios II Multiprocessor Systems . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 1–2 Multiprocessor Tutorial Prerequisites . . . . . ....

Words: 12538 - Pages: 51

Premium Essay

It Security

...CHaPTer Firewall Fundamentals 2 T O SOME NETWORK ADMINISTRATORS, A FIREWALL is the key component of their infrastructure’s security. To others, a fi rewall is a hassle and a barrier to accomplishing essential tasks. In most cases, the negative view of fi rewalls stems from a basic misunderstanding of the nature of fi rewalls and how they work. This chapter will help dispel this confusion. This chapter clearly defi nes the fundamentals of fi rewalls. These include what a fi rewall is, what a fi rewall does, how it performs these tasks, why fi rewalls are necessary, the various fi rewall types, and fi ltering mechanisms. Once you understand these fundamentals of fi rewalls, you will able to look beyond the unschooled opinions, common mythology, and marketing hype surrounding them, and the crucial benefi ts of effective fi rewall architecture will become clear. Like any tool, fi rewalls are useful in solving a variety of particular problems and in supporting essential network security. Chapter 2 Topics This chapter will cover the following topics and concepts: • What a fi rewall is • Why you need a fi rewall • How fi rewalls work and what they do • What the basics of TCP/IP are • What the types of fi rewalls are • What ingress and egress fi ltering is • What the types of fi rewall fi ltering are • What the difference between software and hardware fi rewalls is • What dual-homed and triple-homed fi rewalls...

Words: 15354 - Pages: 62

Free Essay

Macair

...click. www.apple.com/ilife/iphoto iPhoto Help photo GarageBand Create music by adding musicians to a virtual stage. Enhance your song to sound like a pro. www.apple.com/ilife/garageband GarageBand Help record iWeb Create beautiful websites with photos, movies, blogs, podcasts, and dynamic web widgets. www.apple.com/ilife/iweb iWeb Help website Contents Chapter 1: Ready, Set Up, Go 8 9 10 15 16 19 22 Welcome What’s in the Box Setting Up Your MacBook Air Setting Up DVD or CD Sharing Migrating Information to Your MacBook Air Getting Additional Information onto Your MacBook Air Putting Your MacBook Air to Sleep or Shutting It Down Chapter 2: Life with Your MacBook Air 26 28 30 32 34 35 Basic Features of Your MacBook Air Keyboard Features of Your MacBook Air Ports on Your MacBook Air Using the Trackpad and Keyboard Running Your MacBook Air on Battery Power Getting Answers Chapter 3: Problem, Meet Solution 40 Problems That Prevent You from Using Your MacBook Air 44 Using Apple Hardware Test Contents 5 45 49 51 51 53 53 56 Reinstalling Software Using Remote Install Mac OS X Reinstalling Software Using the MacBook Air SuperDrive Problems with AirPort Extreme Wireless Communication Problems with Your Internet...

Words: 11706 - Pages: 47

Premium Essay

Help Friends by Sending a Gift!

...CHAPTER 2 In this chapter, you will learn: • About the various operating systems and the differences between them • About the components of Windows operating systems • How operating systems interface with users, files and folders, applications, and hardware Introducing Operating Systems I n Chapter 1, you were introduced to the different hardware devices. In this chapter, you’ll learn about the different operating systems, how they are designed and work, and what they do. You’ll learn about the different components of an OS and see how an OS provides the interface that users and applications need to command and use hardware devices. You’ll learn to use several Windows tools and utilities that are useful to examine a system, change desktop settings, and view and manage some hardware devices. As you work through this chapter, you’ll learn that computer systems contain both hardware and software and that it’s important for you as a computer technician to understand how they work together. Although the physical hardware is the visible part of a computer system, the software is the intelligence of the system that makes it possible for hardware components to work. 35 9781133726890, A+ Guide to Managing and Maintaining Your PC, Jean Andrews - © Cengage Learning. All rights reserved. No distribution allowed without express authorization 36 CHAPTER 2 Introducing Operating Systems OPERATING SYSTEMS PAST AND PRESENT An operating system (OS) is software that...

Words: 16220 - Pages: 65