Wednesday, December 18, 2019
How Technology Is Used Inside A Hard Drive - 1240 Words
In module 3 there were 3 chapters and the first chapter I will be recapping is chapter 6. Chapter 6 was about technologies used inside a hard drive. It also explained how a computer communicates with a hard drive. When we discussed the different technologies in a hard drive, there are 3 sizes that a hard disk drive which are 2.5â⬠for laptop computers, 3.5 for desktops and 1.8 for low-end laptops. When we talk about the several types of drives there are 3 that were discussed. The first type is solid state drive or solid state device. When we talk about this drive there are no moving parts, it is built using nonvolatile flash memory stored on electronically erasable programmable read only memory chips. Also, the memory in a solid-stateâ⬠¦show more contentâ⬠¦When we talk about these technologies the size of each sector and total number of sectors determine drive capacity. The last type of technology is S.M.A.R.T. This acronym stands for self-monitoring analysis and reporting technology. This technology is used to predict when a drive is likely to fail. Now I am going to talk about chapter 7 which is about installing and supporting input and output devices. Before I start stalking about the installing and supporting, I would like to take some time to talk about the principles for supporting devices. Input and output devices may be internal or external. Every device is measured by software. The best guide for installation and support is the guide from the manufacturer. Some devices may also need application software. Also, when talking about the principles a device is no faster than the port or slot it is designed for. You should use an administrator account in Windows. If any problems come about they are sometimes solved by updating drivers or firmware. You should install only one device at a time. The device Manager is a primary Windows tool for managing hardware and when you use the device manager you will be able to disable or enable a device, update its drivers, uninstall a device and undo a driver update which is also called a driver rollback. Now I am going to talk about installing input and output devices. When it comes to simple input devices, we have the common mouse and keyboard. These devices canShow MoreRelatedStudent: Hard Disk Drive and Word Processor Essay616 Words à |à 3 Pagesapproximately 106 bytes? 3. Which answer lists the correct number of bits associated with each term? 4. Which of the following answers are true about random-access memory (RAM) as it is normally used inside a personal computer? (Two answers) 5. This chapter describes the concepts behind how a CPU reads the contents from RAM. Which of the following is true about the process of read data, as described in the chapter? 6. A user had opened a word processor, typed the numbers 123456789, andRead MoreIs Cloud Security Isn t Enough?828 Words à |à 4 Pagesof troy. Little did the people of Troy know, a large number of soldiers were hiding inside. When the people of troy took the horse inside their castle, the soldiers obliterated the city. This same method is used with viruses. A user downloads a program or piece of software that they need, but harmful code is hidden inside the program. Letââ¬â¢s say I downloaded a game from the internet that had a Trojan horse inside of it. The game may actually run and function fully, however, it could be secretly loggingRead MoreNT1210- Unit 1 Assignment 1 Essay847 Words à |à 4 Pagesbits associated with each term? c. 64 bits per quadruple word 4. Which of the following answers are true about random-access memory (RAM) as it is normally used inside a personal computer? (Choose two answers.) a. Used for short-term memory e. Is installed onto the motherboard 5. This chapter describes the concepts behind how a CPU reads the contents from RAM. Which of the following is true about the process of read data, as described in the chapter? a. The CPU tells the RAM which addressRead MoreCloud Computing Architecture : Technology Architecture1299 Words à |à 6 PagesThe reason why itââ¬â¢s significant in the technological world is because it allows users to store data into an online platform. In doing so, this eliminates the need to continously backup and re-download data from one computer to another computer. As technology continue to rapidly evolve, the need for cloud computing becomes evident. It allows users to stay connected with their data from any computer that they use. In the future of computing, cloud computing architecture will be in demand due to the factRead MoreComputer Forensics : The Integration Of Computer Science And Law1505 Words à |à 7 Pagesopinions based on the digital information. Even if it relates most with many computer crimes computer forensics still can be used in civilian cases. The purpose of this essay is discuss how practice of Computer forensics originated, the challenges it faces, how it is used to help in the investigation of a crime and some examples of cases, and finally where the future of this technology is headed. In the 1980ââ¬â¢s it had become easy for the public to get their hands on a computer system ââ¬Å"As a result of thisRead MoreThe Daunting Task of Buying a Computer877 Words à |à 3 Pagesdepending on your needs. The process can be simplified by determining what your primary use for the computer will be and picking specific components geared towards your use. The main components that one must select from is the CPU, Video Card, Hard Drive, and Memory or RAM as its known in the Tech world. The CPU is an acronym for the Central Processing Unit. The CPU is the brains of the computer, where all the calculations take place. The faster the CPU, the faster your computer will run,Read MoreNt1210 Chapter 1 Review Essay1331 Words à |à 6 Pagesthe correct number of bits associated with each term? C. 64 bits per quadruple word 4. Which of the following are true about random-access memory (RAM) as it is normally used inside a personal computer? A.Used for short term memory E. Is installed on the motherboard 5. This chapter describes the concepts behind how a CPU reads the contents from RAM. Which of the following is true about the process of read data. As described in the chapter? A.The CPU tells the RAM which address holds dataRead MoreThanks to the Internet, Computers are Mainstream1699 Words à |à 7 Pagesnew CPU and powered the system up with no heatsink at all, it may be too late for the CPU, fortunately this was not our case. My second failed attempted was one that is an embarrassment. You see lights on the computer case, hear fans running from inside, and even hear sounds of your OS loading, but nothing at all shows up on your screen. There could be several reasons why my monitor wasnââ¬â¢t displaying information. But before I began more complicated and time consuming troubleshooting with the restRead More History of the Sony Playstation Essay examples819 Words à |à 4 Pagesrevolutionary Playstation. Right now their Playstation 3 is in circulation throughout the world, but prior to last year there was the original Playstation, and Playstation 2. This was the first video game system that used CDââ¬â¢s as disks for their games, instead of the usual cartridges used by Nintendo, Sega, Atari, and many other companies. It started off as a collaboration with Sony and Nintendo in 1988 trying to create an extension to Nintendoââ¬â¢s console Super Nintendo called the Super Disk, since mostRead MoreA Br ief Note On The Twisted Pair Cables1158 Words à |à 5 PagesShielded Twisted Pair Cables have a very thin wire mesh that shield and protect the transmission. STP cables are used for the older phone networks, as well as data and network communications which are clearer and have less interference with the outside. Whereas Unshielded Twisted Pair Cables have no wire mesh and are therefore not protecting the transmission in the wiring. UTPs are mainly used for Local Area Networks (LAN) as well as telephone connections, however these are more vulnerable than STPs (Shielded
Subscribe to:
Post Comments (Atom)
No comments:
Post a Comment
Note: Only a member of this blog may post a comment.