Free Essay

Lab 4 Identify Motherboard Components and Form Factors (Half Done)

In:

Submitted By asup
Words 589
Pages 3
Lab 4 identify motherboard components and form factors

Task 1 1 A. Code name Brand name Model (list) Frequency Cores/Threads Max Memory Speed
Lynnfield Core i5 i5-7xx 2.66-2.8 GHz 4/4 DDR3-1333 Core i7 i7-8xx 2.8-3.07 GHz 4/8 Xeon L34xx 1.86 GHz 4/4 or 4/8 X34xx 2.4-2.93 GHz
Clarkdale Celeron G1xxx 2.26 GHz 2/2 DDR3-1066 Pentium G6xxx 2.80 GHz 2/2 Core i3 i3-5xx 2.93-3.2 GHz 2/4 DDR3-1333 Core i5 i5-6xx 3.2-3.6 GHz 2/4

B. the LGA 1156 socket allows the following connections to be made from the processor to the rest of the system:
PCI-Express 2.0 ×16 for communication with a graphics card. Some processors allow this connection to be divided into two ×8 lanes to connect two graphics cards. Some motherboard manufacturers use NVidia’s NF200 chip to allow even more graphics cards to be used.
DMI for communication with the Platform Controller Hub (PCH). This consists of a PCI-Express 2.0 ×4 connection.
FDI for communication with the PCH. This consists of two Display Port connections.
Two memory channels for communication with DDR3 SDRAM. The clock speed of the memory that is supported will depend on the processor. http://en.wikipedia.org/wiki/LGA_1156 2A.
Intel® Core™ i7-800, Intel® Core™ i5, and Intel® Core™ i3 processors B. the H55 (Ibex Peak) is an Intel chipset designed to provide the interface for the PCI express lanes on a motherboard.
3A.
Unique On/Off Charge delivers the best recharging capability to iPad, iPhone and iPod Touch
3x USB power delivery for greater compatibility and extra power for USB devices
Leading quality standard of Ultra Durable™ 3 classic technology with 2oz copper PCB design
Innovative Smart 6 technology for smarter PC management
Supports Intel Core™ i7/ Core™ i5/ Core™ i3 LGA1156 processors
Dynamic Energy Saver™ 2 technology enables best energy efficiency
2 PCI-E 2.0 x16 graphics interface(x16+x4) with ATI CrossFireX support for ultimate graphics performance
AutoGreen technology Greening your PC via Bluetooth cellphone
Patented DualBIOS™ technology delivering highest level failure protection
Easy BIOS setting for GPU overclocking
Supports 6 devices without the need for drivers to be installed before being fully operational
Enhanced Intel HD Graphics integrated with the processor
Integrated HDMI/ DVI/ DisplayPort interface for smoother HD video playback
High-performance DAC with 108 dB Signal-to-Noise ratio playback quality
Compatible with Windows 7 to deliver the best operation experience
Meet European Union ErP(Energy-related Products) requirement
Task 2
1A.
The AMD 770 chipset uses the Phenom processors, which are designed by ATI for AMD. It allows the performance of dedicated graphics across a high-speed PCI Express 2.0 interface.
B.
The AMD 770 Chipset enables you to have the benefit playing your games without compromise. It actually turns your PC into an ultimate gaming machine. This chipset enables fast speeds with the latest HD technologies and is easy to use.
2A.
Socket AM3/AM2 Processors

AMD Turion™ II Neo | AMD Athlon™ II Neo Processors (ASB2)

AMD Turion™ Neo, AMD Athlon™ Neo and AMD Sempron™ Processors (ASB1)
B.
The purpose of the AMD SB 710 Southbridge chipset is to optimize power saving and video decoder. This is made possible by high performance embedded graphics in their "Design Kit" and video decode software, which turns it into a solution.
3A.
the AMD OPTERON and AMD Phenom range

Similar Documents

Premium Essay

Class

...tasks: * Read simulated component documentation and view components to make appropriate choices to meet the scenario. * Add and remove simulated computer components. * Change views to view and add simulated components. * Use the zoom feature to view additional image details. * Attach simulated cables. * Use the simulation interface to identify where simulated cables connect to the computer. You have been hired as a network technician for a small corporate network. Today is your first day on the job and you need to familiarize yourself with the network. A new employee will work in Office 2 and you need to complete the workstation in the office. Complete the following tasks in Office 2: * Add the monitor to the office (next to the computer). * Use the DVI-D cable to connect the monitor to the computer. * Connect the power cord to the monitor and plug in the monitor. * Add the mouse to the office, and connect the mouse's USB cable to a USB port on the computer. * Add the keyboard to the office, and connect the keyboard's USB cable to a USB port on the computer. * Turn on the monitor and the computer. Tip: Click the following button shown in Office 2 to go to the workstation: |   | Watch the preceding demonstration to see how to complete any of these tasks. Once you have completed all of the assigned tasks, feel free to explore the hardware and operating system interfaces within the lab. Click the Done button when you are finished...

Words: 11760 - Pages: 48

Free Essay

Intel

...TASK 1 AbaKus Technology Interest Group at IIMK INTRODUTION Founded on July 18, 1968 by Robert Noyce and Gordon Moore, Intel manufactures the Intel computer processors, Intel Overdrive CPU upgrades, networking devices, and is considered by most to be 'the' company that has influenced the hardware market. The Company offers platforms that incorporate various components and technologies, including a microprocessor and chipset, a stand-alone system-on-chip (SoC) or a multichip package. The Company offers microprocessors with one or multiple processor cores. In addition, its Intel Core processor families integrate graphics functionality onto the processor die. The Company offers and develops SoC products that integrate the Company’s central processing units (CPU) with other system components, such as graphics, audio, imaging, communication and connectivity, and video, onto a single chip. The Company offers a multichip package that integrates the chipset on one die with the CPU and graphics on another die, connected through an on-package interface. The Company also offers fifth generation Intel Core processor, code-named Broadwell. The Company offers manufacturing technologies and design services for its customers. Its foundry offerings include full custom silicon, packaging, and manufacturing test services. It also provides semi-custom services to tailor Intel architecture-based solutions with customers' intellectual property blocks. The Company also offers design kits, intellectual...

Words: 5624 - Pages: 23

Premium Essay

Intel Inside

... | | | | | Executive Summary The internal complexity of the personal computer has grown to a staggering level. Today’s most advanced processors and chipsets incorporate millions of transistors, and must be compatible with dozens of operating systems, hundreds of platform components and thousands of hardware devices and software applications. To ensure leading performance, reliability and compatibility in this complex environment, Intel invests over $300 million annually in component and platform validation. Intel’s validation process begins during the first stages of component design – and continues throughout pre-silicon and post-silicon development. All core platform components are exhaustively tested, both independently, and with an enormous variety of third-party...

Words: 8915 - Pages: 36

Premium Essay

Monicah

...Windows Server® 2008 FOR DUMmIES ‰ by Ed Tittel and Justin Korelc Windows Server® 2008 For Dummies® Published by Wiley Publishing, Inc. 111 River Street Hoboken, NJ 07030-5774 www.wiley.com Copyright © 2008 by Wiley Publishing, Inc., Indianapolis, Indiana Published by Wiley Publishing, Inc., Indianapolis, Indiana Published simultaneously in Canada No part of this publication may be reproduced, stored in a retrieval system or transmitted in any form or by any means, electronic, mechanical, photocopying, recording, scanning or otherwise, except as permitted under Sections 107 or 108 of the 1976 United States Copyright Act, without either the prior written permission of the Publisher, or authorization through payment of the appropriate per-copy fee to the Copyright Clearance Center, 222 Rosewood Drive, Danvers, MA 01923, (978) 750-8400, fax (978) 646-8600. Requests to the Publisher for permission should be addressed to the Legal Department, Wiley Publishing, Inc., 10475 Crosspoint Blvd., Indianapolis, IN 46256, (317) 572-3447, fax (317) 572-4355, or online at http:// www.wiley.com/go/permissions. Trademarks: Wiley, the Wiley Publishing logo, For Dummies, the Dummies Man logo, A Reference for the Rest of Us!, The Dummies Way, Dummies Daily, The Fun and Easy Way, Dummies.com, and related trade dress are trademarks or registered trademarks of John Wiley & Sons, Inc. and/or its affiliates in the United States and other countries, and may not be used without written permission...

Words: 139691 - Pages: 559

Premium Essay

Server 2008 for Dummies

...Windows Server® 2008 FOR DUMmIES ‰ by Ed Tittel and Justin Korelc Windows Server® 2008 For Dummies® Published by Wiley Publishing, Inc. 111 River Street Hoboken, NJ 07030-5774 www.wiley.com Copyright © 2008 by Wiley Publishing, Inc., Indianapolis, Indiana Published by Wiley Publishing, Inc., Indianapolis, Indiana Published simultaneously in Canada No part of this publication may be reproduced, stored in a retrieval system or transmitted in any form or by any means, electronic, mechanical, photocopying, recording, scanning or otherwise, except as permitted under Sections 107 or 108 of the 1976 United States Copyright Act, without either the prior written permission of the Publisher, or authorization through payment of the appropriate per-copy fee to the Copyright Clearance Center, 222 Rosewood Drive, Danvers, MA 01923, (978) 750-8400, fax (978) 646-8600. Requests to the Publisher for permission should be addressed to the Legal Department, Wiley Publishing, Inc., 10475 Crosspoint Blvd., Indianapolis, IN 46256, (317) 572-3447, fax (317) 572-4355, or online at http:// www.wiley.com/go/permissions. Trademarks: Wiley, the Wiley Publishing logo, For Dummies, the Dummies Man logo, A Reference for the Rest of Us!, The Dummies Way, Dummies Daily, The Fun and Easy Way, Dummies.com, and related trade dress are trademarks or registered trademarks of John Wiley & Sons, Inc. and/or its affiliates in the United States and other countries, and may not be used without written permission...

Words: 139691 - Pages: 559

Premium Essay

Technology and Computers

...INFORMATION TECHNOLOGY FOUNDATION 1 Compiled By: RONKY F. DOH (aka: ronky biggy diggy daddy igp) FU DAME TALS OF COMPUTERS We are living in an information age dependent upon digital information. Digital information is electronic information, the result of computer processing. Every type of job relies upon getting information, using it, managing it, and relaying information to others. Computers enable the efficient processing and storage of information. Do not think of a computer merely as the machine with the keyboard and the mouse, although that might be true for some types of computers. Embedded computers may be inside your household appliances, the video cassette recorder, the automobile, planes, trains, power plants, water purification plants, calculators, and even inside a few toys. These embedded computers are very small. They affect our lives each day. Why, even modern traffic lights operate with computers. They are all around us. Think of additional ways in which computers affect our lives each day. Every organization somehow use(s) a computer to run the organization. Some of the places are hospitals, schools, fire department, banks, stores or supermarkets, stock exchange, police department, insurance companies, transport companies, and government agencies etc. What is a computer? A computer is many things to many people, depending on what it is being used for. At one time the computer can be a machine which processes the payroll, then it can be a machine which tabulates...

Words: 67033 - Pages: 269

Free Essay

Hackers

...University tromer@cs.tau.ac.il December 18, 2013 Abstract Many computers emit a high-pitched noise during operation, due to vibration in some of their electronic components. These acoustic emanations are more than a nuisance: they can convey information about the software running on the computer, and in particular leak sensitive information about security-related computations. In a preliminary presentation (Eurocrypt’04 rump session), we have shown that different RSA keys induce different sound patterns, but it was not clear how to extract individual key bits. The main problem was that the acoustic side channel has a very low bandwidth (under 20 kHz using common microphones, and a few hundred kHz using ultrasound microphones), many orders of magnitude below the GHz-scale clock rates of the attacked computers. In this paper we describe a new acoustic cryptanalysis key extraction attack, applicable to GnuPG’s current implementation of RSA. The attack can extract full 4096-bit RSA decryption keys from laptop computers (of various models), within an hour, using the sound generated by the computer during the decryption of some chosen ciphertexts. We experimentally demonstrate that such attacks can be carried out, using either a plain mobile phone placed next to the computer, or a more sensitive microphone placed 4 meters away. Beyond acoustics, we demonstrate that a similar low-bandwidth attack can be performed by measuring the electric potential of a computer chassis. A suitably-equipped...

Words: 23246 - Pages: 93

Premium Essay

Computer

...Chapter 1 Structure and Functions of a Computer "Hardware: the parts of a computer that can be kicked." ~ Jeff Pesis After completing this chapter, you will be able to: 1. Explain the importance of computer literacy. 2. Define the term computer. 3. Identify the components of a computer. 4. Compare the uses of various types of: input devices, output devices, and storage devices. 5. Describe categories of computers and their uses. Structure and Functions of a Computer 1 1.0 Introduction A computer is an electronic machine designed for the storage and processing of data. The machinery is called hardware, and this highly sophisticated equipment needs equally sophisticated programs (called software) to become a working computer system. Modern society has come to depend very heavily on the use of computer systems. Banks, businesses, government departments, industries, shops, people at home and school all rely on computer to play a vital role in their daily activities. These activities are centered on information. In business, the computer system has been used a lot and replaced filing cabinets as means of storing information, and clerical workers as a means of processing it. By storing and processing information on a computer system, these businesses can function more quickly and efficiently, because information can be found and collated much faster. Discovery Learning: A computer was also called a data processor. Why? 1.1 Major Parts and Functions A Computer is...

Words: 47755 - Pages: 192

Premium Essay

Student

...devices/hardware…………………………………….. Computer Software …………………………………………….……………...69 - Utility program …………………………………………………………70 - Operating system ……………………………………………….………72 - Programming languages ………………………………………………78 - Terminologies Used in Software ………………..……………….…....80 Powering A Computer ……………………………………………….………..83 Uninterrupted Power Supply……………………………………………….....85 Computer Configuration…………...…………………………….……………87 Computer Viruses ……………………………………………….……………89 Communication ………………………………………………………………95 Internet ………………………………………………………………………113 Web Design …………………………………………………………………121 Computer Ethics …………………………………………………….………125 Computer Crimes …………………………………………………….……..129 Authored by Musisi Boney; +256788489095 3 Authored by Musisi Boney; +256788489095 4 A COMPUTER A computer is a general purpose electronic machine that receives/accepts, processes stores, and output data into meaningful information. OR A computer is an electronic machine capable of storing vast amount of data and carry out data processing extremely fast. The operational speed of a computer is measured in millions of instructions per second (MIPS) measured in megahertz (MHZ) or...

Words: 30445 - Pages: 122

Premium Essay

Vaibhav

...1(d).Value Chain Analysis: A Way to profit improvement & cost Reduction Learning Objective 1. how to identify the value added activity 2. how to rectify the non –value added activity 3. application in profit planning & cost reduction INTRODUCTION Competitive advantage for a company means not just matching or surpassing their competitors, discovering what the customers want and then profitably satisfying, and even exceeding their expectations. As barriers to inter-regional and international trade are diminishing and as access to goods and services are growing, customers can locate after identification and «the best of what they want, at an acceptable price, wherever it is in the world. Under growing competition and, hence, rising customer expectations, a company's penalty for complacency becomes even greater. A strategic tool to measure the importance of the customer's perceived value is value chain analysis. By enabling companies to determine the strategic advantages and disadvantages of activities and value-creating processes in the market place, value chain analysis becomes essential for assessing competitive advantage. Value analysis or value engineering is one of the most widely used cost reduction techniques. It can be defined as a technique that yields value improvement. It investigates into the economic attributes of value. It attempts to reduce cost through ...

Words: 12975 - Pages: 52

Premium Essay

Fffg

...supervision and to the members of the focus group (including MAC members Dennis Daly and Thomas Huff) for contributing to the improvement of the final document. Copyright © 1996 Institute of Management Accountants All rights reserved Statements on Management Accounting PRACTICE OF MANAGEMENT ACCOUNTING Value Chain Analysis for Assessing Competitive Advantage TABLE OF CONTENTS I. II. III. IV. Rationale . . . . . . . . . . . . . . . . . . . . . . . 1 Scope . . . . . . . . . . . . . . . . . . . . . . . . . 1 The Value Chain Defined . . . . . . . . . . . . .1 Competitive Advantage and Customer Value . . . . . . . . . . . . . . . . . . .2 V. The Role of the Management Accountant . . . . . . . . . . . . . . . . . . . . . . .4 VI. The Value Chain Approach for Assessing Competitive Advantage . . . . . .5 Internal Cost Analysis . . . . . . . . . . . . . . .5 Internal Differentiation Analysis . . . . . . .10 Vertical Linkage Analysis . . . . . . . . . . . .13 VII. Strategic Frameworks for Value Chain Analysis . . . . . . . . . . . . . . .17 Exhibits...

Words: 12884 - Pages: 52

Premium Essay

Infrastructure Hardware

...Information Technology Infrastructure P A R T II 4 IT Infrastructure: Hardware and Software 5 Foundations of Business Intelligence: Databases and Information Management 6 Telecommunications, the Internet, and Wireless Technology 7 Securing Information Systems Part II provides the technical foundation for understanding information systems by examining hardware, software, databases, networking technologies, and tools and techniques for security and control. This part answers questions such as these: What technologies and tools do businesses today need to accomplish their work? What do I need to know about these technologies to make sure they enhance the performance of my firm? How are ISBN 1-269-41688-X these technologies likely to change in the future? 107 Essentials of Management Information Systems, Tenth Edition, by Kenneth C. Laudon and Jane P. Laudon. Published by Prentice Hall. Copyright © 2013 by Pearson Education, Inc. IT Infrastructure: Hardware and Software LEARNING OBJECTIVES C H A P T E R 4 STUDENT LEARNING OBJECTIVES After completing this chapter, you will be able to answer the following questions: 1. 2. What are the components of IT infrastructure? What are the major computer hardware, data storage, input, and output technologies used in business? What are the major types of computer software used in business? What are the most important contemporary hardware and software trends? What are the principal issues in...

Words: 21212 - Pages: 85

Free Essay

Xanthal Gum

...Xantham gum Xanthan gum is a polysaccharide, derived from the bacterial coat of Xanthomonas campestris, used as a food additive and rheologymodifier,[2] commonly used as a food thickening agent (in salad dressings, for example) and a stabilizer (in cosmetic products, for example, to prevent ingredients from separating). It is produced by the fermentation of glucose, sucrose, or lactose by the Xanthomonas campestrisbacterium. After a fermentation period, the polysaccharide is precipitated from a growth medium with isopropyl alcohol, dried, and ground into a fine powder. Later, it is added to a liquid medium to form the gum.[3] It was discovered by an extensive research effort by Allene Rosalind Jeanes and her research team at the United States Department of Agriculture anthan gum derives its name from the strain of bacteria used during the fermentation process, Xanthomonas campestris One of the most remarkable properties of xanthan gum is its ability to produce a large increase in the viscosity of a liquid by adding a very small quantity of gum, on the order of one percent. In most foods, it is used at 0.5%, and can be used in lower concentrations. The viscosity of xanthan gum solutions decreases with higher shear rates; this is called shear thinning or pseudoplasticity. This means that a product subjected to shear, whether from mixing, shaking or even chewing, will thin out, but once the shear forces are removed, the food will thicken back up. A practical use would be in salad...

Words: 11945 - Pages: 48

Premium Essay

Test Paper

...CompTIA Security+: Get Certified Get Ahead SY0-401 Study Guide Darril Gibson Dedication To my wife, who even after 22 years of marriage continues to remind me how wonderful life can be if you’re in a loving relationship. Thanks for sharing your life with me. Acknowledgments Books of this size and depth can’t be done by a single person, and I’m grateful for the many people who helped me put this book together. First, thanks to my wife. She has provided me immeasurable support throughout this project. The technical editor, Steve Johnson, provided some good feedback throughout the project. If you have the paperback copy of the book in your hand, you’re enjoying some excellent composite editing work done by Susan Veach. I’m extremely grateful for all the effort Karen Annett put into this project. She’s an awesome copy editor and proofer and the book is tremendously better due to all the work she’s put into it. While I certainly appreciate all the feedback everyone gave me, I want to stress that any technical errors that may have snuck into this book are entirely my fault and no reflection on anyone who helped. I always strive to identify and remove every error, but they still seem to sneak in. About the Author Darril Gibson is the CEO of YCDA, LLC (short for You Can Do Anything). He has contributed to more than 35 books as the sole author, a coauthor, or a technical editor. Darril regularly writes, consults, and teaches on a wide variety of technical and...

Words: 125224 - Pages: 501

Premium Essay

Kotler

...Ingredient Branding Philip Kotler· Waldemar Pfoertsch Ingredient Branding Making the Invisible Visible Professor Philip Kotler Kellogg Graduate School of Management Northwestern University Evanston, IL 60208, USA p-kotler@kellogg.northwestern.edu Professor Waldemar Pfoertsch China Europe International Business School 699 Hongfeng Rd. Shanghai 201206, China wap@ceibs.edu e-ISBN 978-3-642-04214-0 ISBN 978-3-642-04213-3 DOI 10.1007/978-3-642-04214-0 Springer Heidelberg Dordrecht London New York Library of Congress Control Number: 2010926489 © Springer-Verlag Berlin Heidelberg 2010 This work is subject to copyright. All rights are reserved, whether the whole or part of the material is concerned, specifically the rights of translation, reprinting, reuse of illustrations, recitation, broadcasting, reproduction on microfilm or in any other way, and storage in data banks. Duplication of this publication or parts thereof is permitted only under the provisions of the German Copyright Law of September 9, 1965, in its current version, and permission for use must always be obtained from Springer. Violations are liable to prosecution under the German Copyright Law. The use of general descriptive names, registered names, trademarks, etc. in this publication does not imply, even in the absence of a specific statement, that such names are exempt from the relevant protective laws and regulations and therefore free for general use. Cover design: WMXDesign GmbH, Germany Printed...

Words: 106805 - Pages: 428