Pages

Search This Blog

Video card


Alternatively stated as a electronic device, graphics card, video adapter, video board, or a video controller, a video card is an indoor card that enables a show device like a monitor to show pictures from the pc. Today's video cards area unit most typically connected to the AGP, PCI, or PCIe slot on the motherboard, however, also can be found on-board.



In the image higher than, is associate degree example of the ATI Radeon 9600 AGP video card and a basic example of what several video cards nowadays agree. As will be seen, this video card has 3 connections or video ports on the rear, the quality VGA connection, S-Video connection, and also the DVI connection. during this example, the cardboard connects into the AGP slot on the pc motherboard.

Sound card

Alternatively brought up as a sound board or associate degree audio card, a sound card is associate degree enlargement card or microcircuit that has a laptop with the flexibility to provide sounds which will be detected by the user either over speakers or headphones. the pc sound card is taken into account a peripheral, though {the laptop|the pc} doesn't would like a sound card to perform virtually each computer nowadays can embody a sound card within the slot or on the motherboard (onboard). Below is a picture of the artistic Sound workman X-Fi Xtreme Audio sound card associate degreed associate degree example of what a sound card that connects to an slot could appear as if.

Back sound card connections

In the image to the correct, is associate example of what a sound card audio ports aka audio jacks could seem like on the rear of your laptop, associated colours, and therefore the connective symbols sometimes found next to every of the connections.

 

  • Digital Out (White) (Words Digital) - Used with surround sound or loudspeakers.
       
  • Sound in or line in (Blue) (Arrow inform into waves) - association for external audio sources, e.g. tape machine, phonograph, or CD player.
     
  • mike or Mic (Pink) (Microphone) - The association for a mike.
       
  • Sound out or line out (Green) (Arrow declaring of waves) - the first sound association for your speakers or headphones. This sound card additionally incorporates a second (black) and third (orange) sound out connective.
       
  • Firewire (Not pictured) - Used with some top quality sound cards for digital video cameras and alternative devices.
       
  • MIDI or Joystick (Not pictured) - Used with earlier sound cards to attach MIDI keyboard or Joystick.


  • What is Computer Network?

    Two or a lot of computers connected along through a communication media kind a network.
    The computers area unit connected in a very network to exchange data and information. The computers connected in a very network may also use resources of different computers.

    Computer Network elements

    There area unit totally different elements of a network. Following area unit the essential elements of network.

    1. Server:

    Powerful computers that has services to the opposite computers on the network.

    2. Client:

    Computer that uses the services that a server provides. The consumer is a smaller amount powerful than server.

    3. Media:

    A physical affiliation between the devices on a network.

    4. Network Adopter:

    Network parent or network interface card (NIC) could be a circuit card with the elements necessary for causation and receiving information. it's blocked into one among the obtainable slots on the computer and transmission cable is hooked up to the instrumentation on the NIC.

    5. Resources:

    Any factor obtainable to a consumer on the network is taken into account a resource .Printers, data, fax devices and different network devices and knowledge area unit resources.

    6. User:

    Any person that uses a consumer to access resources on the network.

    8. Protocols:

    These area unit written rules used for communications. they're the languages that computers use to speak to every different on a network

    Computer Motherboard

    Computer MotherboardThe motherboard is that the main board in an exceedingly automatic data processing system. All the opposite components of a laptop plug into the motherboard. The motherboard is additionally known as a mainboard or system board.


    The motherboard contains a socket for the mainframe, RAM modules and add on cards. within the on top of image the mainframe socket is that the giant one within the center right. The RAM sockets square measure the 2 long lightweight blue ones within the bottom of the image.

    The motherboard additionally has sockets into that you enter your permanent storage devices like fixed disk drive and solid state drive. Peripheral devices additionally plug into the motherboard. you'll be able to see the sockets for the peripheral devices at the highest right of the image.

    The most necessary a part of the motherboard is its chipset. The chipset determines that CPUs and addon devices the motherboard supports.

    The motherboard is that the foundation of your automatic data processing system. that's additionally why it’s known as the motherboard. you've got several circuit boards however just one motherboard!

    Basic Computer Knowledge

    Place one space between each word, after a punctuation mark and at the end
    keyboard rules

    of a sentence. Always start a sentence with a capital letter. Use capitals for names, addresses, provinces and countries, places, organizations, businesses, associations, schools, colleges, universities, days of the week, months, holidays, nationalities, ethnic groups and languages.

    Learning the keyboard is the first step to learning computers. Learning involves practice. It really is as simple as that. There are two kinds of typing.

    The first is called Touch Typing. The Touch Typist uses the Home Keys asdf for the left hand and jkl; for the right) and all the fingers on both hands as well as the thumbs for the Space Bar while typing. There are many commercial and public domain programs that are designed to teach this method.

    The other method is some times called ‘Hunt and Peck‘ or depending on finger strength ‘Search and Destroy’. This involves using one or more fingers on one or two hands to type. It is a perfectly acceptable way of using a computer and many people get along fine with this technique.

    Hooks Hijacked? How to block stealthy malware attacks or computer viruses

    The spread of malicious software, also known as malware or computer viruses, is a growing problem that can lead to crashed computer systems, stolen personal information, and billions of dollars in lost productivity every year. One of the most insidious types of malware is a "rootkit," which can effectively hide the presence of other spyware or viruses from the user -- allowing third parties to steal information from your computer without your knowledge.
    To give some idea of the scale of the computer malware problem, a recent Internet security threat report showed a 1,000 percent increase in the number of new malware signatures extracted from the in-the-wild malware programs found from 2006 to 2008. Of these malware programs, "rootkits are one of the stealthiest," says Dr. Xuxian Jiang, assistant professor of computer science at NC State and a co-author of the research. "Hackers can use rootkits to install and hide spyware or other programs. When you start your machine, everything seems normal but, unfortunately, you've been compromised."

    Rootkits typically work by hijacking a number of "hooks," or control data, in a computer's operating system. "By taking control of these hooks, the rootkit can intercept and manipulate the computer system's data at will," Jiang says, "essentially letting the user see only what it wants the user to see." As a result, the rootkit can make itself invisible to the computer user and any antivirus software.

    In order to prevent a rootkit from insinuating itself into an operating system, Jiang and the other researchers determined that all of an operating system's hooks need to be protected. "The challenging part is that an operating system may have tens of thousands of hooks -- any of which could potentially be exploited for a rootkit's purposes," Jiang says, "Worse, those hooks might be spread throughout a system. Our research leads to a new way that can protect all the hooks in an efficient way, by moving them to a centralized place and thus making them easier to manage and harder to subvert."

    Jiang explains that by placing all of the hooks in one place, researchers were able to simply leverage hardware-based memory protection, which is now commonplace, to prevent hooks from being hijacked. Essentially, they were able to put hardware in place to ensure that a rootkit cannot modify any hooks without approval from the user.

    Computer Insecurity

    Many current computer systems have only limited security precautions in place.

    Serious financial damage has been caused by computer security breaches, but reliably estimating costs is quite difficult.

    However, other losses, such as those caused by the compromise of credit card information, can be more easily determined, and they have been substantial, as measured by millions of individual victims of identity theft each year in each of several nations, and the severe hardship imposed on each victim.

    For more information about the topic Computer insecurity, read the full article at Wikipedia.org, or see the following related articles: