Monday, January 27, 2020

Study About Pc Troubleshooting And Maintenance Computer Science Essay

Study About Pc Troubleshooting And Maintenance Computer Science Essay Most of the time when we start up our computers, the CPU or Central Processing Unit goes through a series of steps or procedures before the computer operating systems boots from the hard disk. These initial steps are all categorized in a system called CMOS which stands for Complementary Metal Oxide Semiconductor. This is the where the systems settings such as the system clock, hard disk status, optical drives and other settings like the CPUs clock speed, FSB and so on are all on this setting. On the other hand, the chip that stores the settings is known as the BIOS chip also known as Basic Input Output System. This holds the most basic computer instructions that are required to boot the operating system like Windows XP or Linux based operating systems such as Ubuntu. Many people always get mistaken by calling is a CMOS chip, but since the BIOS and CMOS is so tightly intertwined, they can be both referred to as one (Difference between CMOS and BIOS, Dennis Faas). In other words, the CMOS chip stores the data needed for the BIOS so that the computer may boot us properly. The battery used to store the data is a lithium button battery which is located just near the CMOS chip and the CMOS jumper. This battery hold provides power to the CMOS chip even when the power of the computer is shut off. This is necessary where the chip is volatile, means that it will lose data when there is no power unlike a hard disk which work on magnetism. What is BIOS CMOS BIOS is commonly known as Basic Input/Output System. It is practically the lowest level processor that stands in between the hardware like the chipset and the processor with the operating system that is installed in a hard disk. The BIOS gives full access to the hardware components to allow a creation of high level operating systems such as Windows XP, Windows 7, Macintosh as well as Linux based operating systems. Moreover, the BIOS is also responsible over the behaviour of the hardware, such as the processors clock speed, the Front Side Bus or known as FSB, system clock, and many other vital hardware settings which is required to load or configured before the operating system loads into the Random Access Memory or RAM (System BIOS, Charles M. Kozierok, 2001). For a computer to operate, all the components must be given specific instructions on how and what they are suppose to do. Usually, that is where the BIOS come into play. The BIOS has a special software in which it runs preliminary codes or instructions which is preset into the ROM chip or Read Only Memory chip that is executed to load the operating system from the hard disk into the RAM for the computer to further execute more complicated commands and instructions so that it would be easier for the processor to communicate with the RAM in terms of instruction execution and access (The BIOS Program, Charles M. Kozierok, 2001). One of the most basic operations of the BIOS is the POST (Power On Self Test). This part is done to make sure that all of the components in the computer such as the motherboard, hard disks, optical drives, graphics adapter card and other components are working and they are detected throughout the system. Figure 1: BIOS that uses flash memory CMOS or Complementary Metal Oxide Semiconductor is low in power consumption and has low heat production rate technology that is used in contemporary microchips and it is commonly known as a small battery powered configuration chip where the BIOS stores the time, date and the system configuration settings (What is CMOS?, 2010). The main composition of this chip is made from silicon and germanium which in a way conducts electricity. These materials are then doped where impurities are added to transform it into a fully scaled transistor, either of extra negative charged (N-type) or positively charged (P-type). CMOS on the other hand uses both kinds of transistors in a complementary way to create a current gate where it makes an electrical control present. They practically use no power at all but this in another way, it makes it heat up fast where this sets a major limit to the speed where a microprocessor can operate (CMOS, 2005). The CMOS has a software which is a setup that is included in the creation of the chip. This setup is very vital for system configuration such as the frequency and voltage control of the components, the system date and time and the POST settings as well as the boot priority settings for the operating system to load. Figure 2: Examples of CMOS setup software interface Types of BIOS CMOS Now we know that BIOS is mainly the system where as the CMOS is the chip that contains a software that runs the BIOS. BIOSes were programmed initially into ROMs or PROMs (Programmable Read Only Memory) CMOS chips, where it only stored a very limited amount of data of the system configuration. Extensibility of the BIOS is limited to the capacity of the CMOS chip hence many years later BIOSes became more better when they introduce a new kind technology known as EPROM (Erasable Programmable Read Only Memory) and EEPROM (Electronically Erasable Programmable Read Only Memory). Though EPROMs are eraser in a very different manner where the chip has to be exposed to UV light which passes through a small glass window on the chip, in order to clear all the memory cells. The chip has a small window that allows the intake of UV light upon erasing the data instructions in the CMOS chip (How to erase and program an EPROM, 2003). Figure 3: DIP type ROM CMOS chip Figure 4: PLCC type PROM CMOS chip The CMOS chip on the other hand has 2 commonly used types, categorized by their packages, PLCC and DIP. PLCC stands for Plastic Leaded Chip Carrier which is a four sided chip carrier with a J lead and pin spacings of 1.27mm. The lead count or legs usually range from 20 to 84 (Minges, Merrill L. (1989). Electronic Materials Handbook). DIP stands for Dual Inline Package which consists of two parallel sided electrical connecting pins connected to a rectangular housing. Both types of packages for the CMOS chip is fixed at 32 pins, since the CMOS settings only need to transfer about 32 bits across the board. Like mentioned in the introduction, the BIOS or the CMOS chip is powered by a battery that is used to store the settings and instructions intact even after the power is turned off. Below are the several types of batteries the CMOS chip uses (CMOS Battery, 2010): Figure 5: 3V Lithium Button Cell Battery Figure 6: 4.5V Alkaline Battery Figure 7: 3.6V Nickel-Cadmium Battery (Solder Connectors) Current Technologies and Models for BIOS CMOS In todays market, the current technology used in BIOS and CMOS is the PLCC type, EEPROM CMOS chip and powered by a 3V Lithium Battery Cell. The CMOS setup for the BIOS include two major companies which are American Megatrends and Phoenix BIOS. There are also other types setups which are configured by the computer manufacturer such as Dell, Acer, HP Compaq and many more. The BIOS on the other hand provides extra facilities in terms of the configurability of the onboard devices like the embedded audio, the processors voltage, FSB, Multiplier, RAM voltage, hard disk boot sequence and many more. Below are some examples of the CMOS setup screens in configuration mode for different types of setup: Figure 8: CMOS setup main page for AWARD Software. Figure 9: CPU Configuration settings Figure 10: Boot Sequence settings BIOS CMOS Failures and Solutions Like the RAMs and hard disks, the BIOS and CMOS chip can also have error and failures. There are three types of virus invasion that can affect the BIOS system: CIH Black Hat 2006 Persistent BIOS Infection CIH was the first virus that was able to erase the content on a Flash ROM BIOS. It was also given the nickname as Chernobyl Virus The extent of the virus lead to the ejection of the CMOS chip from the motherboard and sent for reprogramming for it has also distorted its basic functionality. Black Hat 2006 is a virus that is capable to elevate privileges and read physical memory, using malicious procedures that replaced normal ACPI functions stored in flash memory. Persistent BIOS Infection work as an insertion of malicious code into the decompression routines in the BIOS, allowing for nearly full control of the PC at every start-up, even before the operating system is booted. The proof of the concept does not exploit a flaw in the BIOS implementation, but only involves the normal BIOS flashing procedures. Thus, it requires physical access to the machine or for the user on the operating system to be root (Researchers unveil persistent BIOS attack methods, 2009). Solutions to overcome these kinds of virus usually required either reprogramming of the CMOS chip or just an upgrade of the CMOS firmware. To reset all the data in the BIOS via the CMOS chip are usually done as follows: Turn off all power and disconnect all wires from the PC Open the CPU casing to reveal the motherboard Find the jumper pins that is used to clear the CMOS settings or a small button near the CMOS chip Short the jumper pins by moving the connector from 1-2 to 2-3 position to clear the settings and remove the system battery. Else, press the button for 8 seconds. After this is done, move the jumper connector back to its original position 1-2 and then place the system battery back in its place. Place the cover back and connect all the wires and turn on the power Once the computer loads and pass the POST test, the BIOS will prompt to enter CMOS settings to set it back again. After the settings are set, save the settings and exit the menu so the computer can restart and load the operating system. Conclusion In conclusion, the BIOS is the most system for a computer to boot and load settings for the all the hardware components. The CMOS chip is a requirement for it is the component that stores the instructions of the BIOS into the setup. Without this, the computer would not know how to load the operating system or identify the existence of any hardware components.

Sunday, January 19, 2020

Weather and Famous Landmarks

15. Choose the word that means the same or similar to the word  «nature ». ?) environment; ?) scenery; ?) landscape; ?) view. 5  « -2011 » 8 16. Match the quotation with one of the sources listed below: Interested in photography? Fujiko have produced an amazing new mini-camera – the advanced 1001x. 3 1. What kind of film would you see if you wanted to get a detailed information about a definite subject? ?) animated cartoon; ?) thriller; 2. ?) documentary; ?) trailer. ?) recipe; ?) instruction; 17. ?) announcement; ?) ad.Do you know that the English Queen, Elizabeth II, is the only person in Britain with two birthdays. Her official birthday is on the second Saturday in June. When is her real birthday? ?) on April 21; ?) on May 21; ?) on July 21; ?) on August 21. Choose one of the following as the appropriate reaction to the statement: My friend has seen this film already. ?) So I have; ?) So have I; ?) I so have; ?) I have so. 18. Do you know who gave Britain it s modern name? ?) the Romans; ?) the Anglo-Saxons; ?) the Celts; ?) the Dutch. 3. Who said:  «The world is a stage and people are merely actors »? ) R. Stevenson; ?) B. Show; ?) O. Wild; ?) W. Shakespeare. 19. Read the weather forecast and decide in what season this weather is expected to be: The South East will see the best of today’s weather. It will be warm, no winds, and sunshine nearly all day, with temperatures around ten or fifteen, so quite warm for the time of the year. 4. There are eight public holidays in Great Britain. Do you know that they are called: ?) Bank Holidays; ?) Festival Days; ?) Feast Days; ?) Carnival Days. ?) winter; ?) spring; 20. ?) summer; ?) autumn. You can find the name of these animals in the Red Book. ) rabbits; ?) foxes; ?) Indian tigers; ?) sharks. 5. Stonehenge is: ?) one of the most famous landmarks of ancient Canadian history; ?) one of the most famous landmarks of ancient British history; ?) one of the most famous landmarks of ancien t Australian history; ?) one of the most famous landmarks of ancient American history. —————————————————-  «Ã‚ » Web-site: www. uclever. com, e-mail: [email  protected] com 4 6. John likes to spend much time in the open air.When he does his hobby for more than one day he takes a rucksack, a tent and a compass with him. Can you guess John’s hobby? ?) running; ?) fishing; ?) hiking; ?) swimming. 7. Which of the library rooms provides video and film circulation, and audiovisual equipment circulation? 10. Complete the following tongue-twister with an appropriate word: Swan swam over the sea, Swim, swan, swim! Swan swam back again. Well †¦ , swan! ?) swum; ?) swim; ?) swam; ?) swims. 11. Link the following paragraph with one of the cities listed below: This city is on the river Mersey.It’s famous for its football teams and for the Beatle s. ?) Cardiff; ?) Birmingham; ?) Manchester; ?) Liverpool. ?) the reading room; ?) the multimedia hall; ?) the book borrowing department; ?) catalogue. 12. The American traveller and scientist Lowell Thomas thinks that Grand Canyon, Glacier Bay, the Mammoth Cave, Victoria Falls, Baikal, Mountain Everest and Yellowstone National Park are: ?) seven Nature’s enigmas; ?) seven Nature’s wonders; ?) seven Nature’s gifts; ?) seven Nature’s mysteries. 8. Look at the following list of adjectives.Which would apply to a sportsman? ?) weak; ?) awkward; ?) enduring; ?) stout. 13. In which part of Britain do the men wear a kilt? ?) Wales; ?) England; ?) Scotland; ?) Ireland. 9. The following sentence contains an idiom. The key word is missing in the idiom. Choose the correct word: If you have any trouble with your homework, I'll be glad to give you a †¦ . 14. Match the first half of a proverb with an appropriate second half: Custom is †¦ ?) hand; ?) head; ?) hair; ?) hip. ?) the second habit; ?) the second nature; ?) the second manner; ?) the second tradition.

Saturday, January 11, 2020

Corporate Espionage

Because products tend to become obsolete much faster today than they did thirty or forty years ago, research and development are among the most important activities in modern business. However, it is an expensive activity. Some companies try to save money by paying people to conduct corporate espionage, that is, to spy on competitors' research and development operations. Is such espionage ever morally justifiable?The temptation to spy on competitors' is completely Justifiable, but the fact that its alled espionage, a word that connotes amorality any way you read it, shows that acts of corporate espionage are not Justifiable or moral. It's also illegal. There's a fine line between competitive intelligence and corporate espionage. Competitive intelligence is an ethical and legal business practice, it's the action of defining, gathering, analyzing, and distributing intelligence about products, customers, competitors and any aspect of the environment needed to support executives and mana gers in making strategic decisions for an organization.This equires that risks and opportunities be identified in a market before they become obvious and also requires extensive competitor analysis. These analyses are taken from market statistics, financial reports, newspaper clippings, and other information released from the company. Corporate espionage on the other hand, includes that acquisition of intellectual property such as information on industrial manufacturing ideas, techniques and processes, recipes, or formulas.It often includes activities such as theft of trade secrets, bribery, blackmail, and unwarranted technological urveillance. The morality of this issue can be broken down into a simple example using the children's show Spongebob. Spongebob Squarepants works at the Krusty Krab, home of the Krabby Patty, the most popular burger in all of Bikini Bottom. The Krabby Patty recipe is secret and its secret is what makes it so popular.The Krusty Krab's rival, The Chum Bucke t is a significantly less successful undersea fast food restaurant (mainly because they serve chum). The owner of The Chum Bucket, Plankton wants his restaurant to be as successful as The Krusty Krab and there are multiple episodes hroughout the Spongebob series that involve Plankton trying to steal, finagle, coerce, or even brainwash Krusty Krab employees into revealing the secret ingredient in Krabby Patties.Plankton is recognized as one of the main antagonists in the show for this reason, for his attempted acts of corporate espionage. Even children understand what's he's doing is wrong. As silly as this example is, it's the simplest way to think about the morality of corporate espionage, and any way you try to spin it, what Plankton is doing is wrong. Corporate espionage is amoral. Corporate Espionage By rflzese