Nt1310 Unit 3 Expansion Ports Essay

Great Essays
Several expansion ports are incorporated into the motherboard which are used to house different adapter cards depending upon their connections or type. These expansion slots are detailed below:
• Peripheral Component Interconnect (PCI)
The PCI is used to attach various external hardware to the motherboard, these include: Network card, sound card, SATA card. It is important to note that a PCI cannot support a graphics card as the processing power required with recent graphics is too much for the PCI to support. An example of a PCI card is located at figure 5 (Annex A), this particular PCI card has 47 pins with notches which align with the PCI port. A PCI port is available in either 32 bit or 64 bit depending on the size of the port on the motherboard, as a 64 bit PCI port is longer. A 64 bit port will support a 32 bit card however a 32 bit port cannot support a 64 bit PCI card. The sizes and specifications of PCI cards are found in figure 7 (Annex A). The PCI
…show more content…
As each device requires a specific port, the keyboard and mouse ports and connectors are colour coded (purple for keyboard, green for mouse) or have symbols printed alongside the ports as to connect them correctly. This port requires a round, 6 pin connector. These ports are not always found as keyboards and mice can utilise a USB connection to function.

• Ethernet (RJ-45) – The Ethernet port is compatible with an RJ-45 connector, see FIGURE, this is used when connecting to a local area network for internet access. The RJ-45 port has 8 pins and varying speeds dependant on the network port type. The port types available are Standard, Fast and Gigabit Ethernet which transmits from a range of speeds from 10Mb/s to

Related Documents

  • Decent Essays

    Nt1310 Unit 3 Components

    • 152 Words
    • 1 Pages

    The first component that needs to be bought is the Case. The case is what holds all of the components for a computer work. In order to make the case useful it has to have many components like the motherboard. The motherboard is how all the components 0f a computer communicate . The motherboard is screwed into the left side of the case.…

    • 152 Words
    • 1 Pages
    Decent Essays
  • Decent Essays

    For the office users, the main form of connection will be via LAN wired connections connect directly to the Switches. The laptops PC's and tablets will connect via a secure wireless connection that will be provide using 2 Cisco Small Business WAP551 Wireless Access Point. The first location is the senior offices and second location the common office hosting most of the other employees. The router to used is a Cisco 2951 Integrated Services Router (ISR), this router delivers highly secure data, voice, video, and application. It has 3 integrated gigabit Ethernet ports that are enough to serve the office.…

    • 216 Words
    • 1 Pages
    Decent Essays
  • Decent Essays

    A Software Serial library allows for serial communication on any of the Mega's…

    • 165 Words
    • 1 Pages
    Decent Essays
  • Improved Essays

    Nt1330 Unit 8

    • 375 Words
    • 2 Pages

    To explain this, we should already know that in real life scenarios, stack increases to lower memory addresses, whenever program calls some function, the address of function call instruction is saved in stack as a return for the function. When the function executes, it allocates local variables, including buffers to stack and they are given a lower address than the return address. So, in this scenario the return address is a certain level above the base address for buffers and if the buffer is overflowing, then it is most likely that an attacker can change return address as well. If the return address is changed to some random value, then it will cause segmentation fault, but if the return address is changed to a certain address where some executable code is present, then that may complete attackers intended tasks with the application.…

    • 375 Words
    • 2 Pages
    Improved Essays
  • Superior Essays

    Nt1310 Unit 8.2

    • 772 Words
    • 4 Pages

    Kaplan University IT286 Unit 8.2 Jennifer Polisano Answer 8.2: As the IT Security Professional for Web Site 101, I will be recommending adjustments for recent security issues, including data loss due to employee negligence, physical break ins, identifying employee security standards, identifying network access specifics, and the recent hacking of the home page of Web Site 101. Web Site 101 currently has 300 employees working on three levels of the office building. In the previous years, this organization has grossed 2 million dollars revenue per year. For the organization to continue to thrive, these security problems will need to be addressed immediately.…

    • 772 Words
    • 4 Pages
    Superior Essays
  • Great Essays

    Nt1330 Unit 3

    • 1174 Words
    • 5 Pages

    Secure Shell (SSH) In this paper, I will discuss the network protocol Secure shell, better known as SSH. Interest in choosing this protocol came from my frequent use of SSH to run applications on the remote servers in Coover Hall. Because of this, I will be exploring the details on how the protocol works, vulnerabilities associated with it and mitigation techniques put in place to counter attacks. SSH is a Cryptographic Network Protocol created to replace Telnet.…

    • 1174 Words
    • 5 Pages
    Great Essays
  • Decent Essays

    Nt1330 Unit 2

    • 280 Words
    • 2 Pages

    1. What does the floor look like? Some food craps and foot prints are on the whitish-brown flooring. 2. What’s on the menu?…

    • 280 Words
    • 2 Pages
    Decent Essays
  • Decent Essays

    Requirements may be specified in a variety of ways. However there are some guidelines worth following: • Representation format and content should be relevant to the problem. • Information contained within the specification should be nested. 3.3.1.…

    • 87 Words
    • 1 Pages
    Decent Essays
  • Improved Essays

    Nt1310 Unit 3 Cpus

    • 1840 Words
    • 8 Pages

    And then the next one is called an extended capabilities port (ECP) for short. The enhanced parallel port is faster than the older parallel ports because it supports transfer speeds of about 500 KBps up to2 MBps. This port is basically used for Later versions of printers and scanners. Serial Port…

    • 1840 Words
    • 8 Pages
    Improved Essays
  • Improved Essays

    Nt1320 Unit 4

    • 1763 Words
    • 8 Pages

    Planning The unit 5 and 6 mastery negotiation 3 required my team, the Concerned Community Coalition (CCC), to take part in a planning session prior to the actual negotiation with the other team, hospital board & administrator, and the meditators. During the planning session our goals were to determine our BANTA, consider the possible response from our opponent, and try to determine what their mindset and emotional state might be when we begin negotiating. Assembling the Issues, ranking their importance and defining the bargaining mix began with a review of the case.…

    • 1763 Words
    • 8 Pages
    Improved Essays
  • Improved Essays

    Nt1320 Unit 7

    • 1110 Words
    • 5 Pages

    1. How is the Moon dependent on the Sun? The Moon is dependent on the Sun for its different lunar phases. Although these phases may not be essential to the existence of the Moon, they would not occur without the Sun.…

    • 1110 Words
    • 5 Pages
    Improved Essays
  • Improved Essays

    Nt1310 Unit 4

    • 961 Words
    • 4 Pages

    The problem is to ensure that elderly medical patients take their medication and recommended dose at the proper time to ensure that they receive the necessary treatment, and prevent the condition from worsening in the process. To solve this problem, a device will need to be implemented that allows the user to be reminded when to take the medicine, and also be sure that the patient is taking the correct amount of medication. Our first idea was to develop a portable watch device with built in audio and visual cues to remind the patient of their need to take the medication. The device could be programmed ahead of time by a technician, and instruct the user to take the recommended dosage at the correct time.…

    • 961 Words
    • 4 Pages
    Improved Essays
  • Great Essays

    Ethernet Technology The Ethernet technology was mostly used in the LAN because; 1. We used Ethernet speed of 10mbps for areas in the LAN that required higher bandwidth 2. Our campus network model supports dual links between each distribution layer routers and case switches. We are there able to load balance the aggregate traffic from multiple access switches across the links.…

    • 884 Words
    • 4 Pages
    Great Essays
  • Improved Essays

    The Internet was originally called the ARPANET, and in order to enhance the ARPANET to be enable may different types of computer networks to all communicate with each other, an open source protocol needed to be created, hence the development of TCP/IP. TCP/IP improved communications throughout the network and allowed all computers to easily communicate with one another. Another technology that helped expand the ARPANET to more users in a specific location was the development of the Ethernet. Ethernet is a coaxial cable that is still used today in many local area networks. Ethernet is highly effective in moving data from one computer to another at high speeds.…

    • 790 Words
    • 4 Pages
    Improved Essays
  • Improved Essays

    Most networks today use the TCP/IP protocol for how to communicate on the network and the most common is IP Version 4. Missing Elements In the diagram, it is showing that each department has three IP addresses assigned as well as three printers which are connected to the network via Ethernet. we can see that each department has three IP addresses assigned to it, and there are three printers, one for each department. These computers can communicate with one another as well as the printers, server, and Internet.…

    • 923 Words
    • 4 Pages
    Improved Essays