Nt1330 Unit 1 Assignment 1 Term Paper

Decent Essays
ASSIGNMENT 1 OF PLATFORM TECHNOLOGIES

PREPARED BY: - TEACHER: - PRAMOD GAJUREL (MIT173707) ANUJ NEPAL

B-Q1
a)
Answer: -

b)
c)

B-Q2.
1)
Answer: - The following are the component shown in the picture: -
1) DRAM Memory sot
2) Chipset
3) Serial ATA (SATA)
4) BIOS
5) Ethernet controller
6) Clock

2)
Answer: -
DRAM memory slot allows to insert the computer memory into the computer. According to motherboard design there are various slot to insert RAM. If slots are more then there will be more place to insert RAM and the RAM increase
…show more content…
For random-access memory, it is equal to 1 / (cycle time).

B-Q4
Answer: - Hexadecimal notation is just alternative base for representing numbers in, like binary. It has base 16. In hexadecimal, there are 16 digits: 0, 1, 2, 3, 4, 5, 6, 7, 8, 9, A, B, C, D, E, and F. 0 through 9 reserve their normal meaning, and A through F in hexadecimal is 10 through 15 in decimal notation. The following are the reason for using hexadecimal notation: -
1) It is more dense than binary notation.
2) In most computers, binary data inhabit some multiple of 4 bits, and hence some multiple of a single hexadecimal digit.
3) It is tremendously easy to convert between binary and hexadecimal notation.

1. Covert (45)10 to binary.
Answer: - (45)10 is in decimal system so it should be divided by 2 and put reminder as 0 or 1 on right side. Reminder 2 45 1 2 22 0 2 11 1 2 5

Related Documents

  • Decent Essays

    Nt1310 Unit 3 Components

    • 152 Words
    • 1 Pages

    The first component that needs to be bought is the Case. The case is what holds all of the components for a computer work. In order to make the case useful it has to have many components like the motherboard. The motherboard is how all the components 0f a computer communicate . The motherboard is screwed into the left side of the case.…

    • 152 Words
    • 1 Pages
    Decent Essays
  • Decent Essays

    The Aegis Secure Key 3.0 has military grade full disk AES 256-bit XTS hardware encryption and is FIPS 140-2 Level 3 validated. You unlock the drive by entering your 7-16 digit PIN before you connect it to your device that way hackers cannot use software on your device to capture your password, and it automatically locks when you unplug it. If an incorrect password is typed 20 consecutive times all the data and the encryption key are erased. It is also dust and water resistant as well as a wear resistant keypad to hide key usage and to help prevent hackers from knowing the commonly used keys. This USB is a Super Speed USB 3.0 that has data transfer rates of 195 for read and 162 for write.…

    • 351 Words
    • 2 Pages
    Decent Essays
  • Decent Essays

    Due to the age of the existing equipment, four new Cisco Catalyst 3560 V2 24 port switches will be use and configure for network redundancy by connecting each switch in a multiple links, single IP address with routing protocol Border Gateway Protocol (BGP). This multi-homing will detect when one of the links fail and not send traffic over that link anymore until the issue is resolved. This redundancy configuration will meet Western County Bank management requirement reducing unplanned outages and regular maintenance performed on the network equipment supporting 10 GB links as well as static or LACP-based (link aggregation control protocol) network interface controller (NIC) teaming. The Time Warner Cable, Business, Dedicated Internet Access, and AT&T Uverse Business Internet service will provide redundancy to the Internet…

    • 452 Words
    • 2 Pages
    Decent Essays
  • Decent Essays

    1. Name two creatures that have been discovered since you were born. Titi Monkey and Dumbo Octopus have been discovered since I was born. 2. How tall would a redwood be compared to you right now?…

    • 317 Words
    • 2 Pages
    Decent Essays
  • Improved Essays

    2. The IEEE 802.11n:- The IEEE 802.11n standard, appear in 2008, And become popular because the jump in data transfer rates from about 54 Mbps to nearly 600 Mbps. The IEEE 802.11n standard was officially completed in 2009 but most of the technical features were ratified in 2007. Most companies supported for the creation of a 60 GHz based standard for WLANs to succeed the 802.11n standard, and a lot of attention and effort was devoted to this activity.…

    • 620 Words
    • 3 Pages
    Improved Essays
  • Decent Essays

    Hi Hemant, USHDCWPBTD03 and USHDCWPBTD04 we are not using at full extend. Both the servers only use for “Single Sign on Feature”. Both the servers use 2 processor each (2 + 2 = 4). I am thinking if we remove 1 process from each server (1 + 1 = 2) we end up with 2 processer, this will save us some BizTalk cost.…

    • 63 Words
    • 1 Pages
    Decent Essays
  • Decent Essays

    Twisted Pair cable – The cable is used for serial connection as well as networked connections. BIOS – Basic Input/Output…

    • 751 Words
    • 4 Pages
    Decent Essays
  • Improved Essays

    1. I have completed my survey for the Information Technology Infrastructure Library Course and have received my passing score 26\40. 2. Kim Rymsha’s computer is back in her office and both her personal and network printers have been connected to her Pc. 3. Docsvault has been completely installed on Lisa Cabrera.…

    • 685 Words
    • 3 Pages
    Improved Essays
  • Decent Essays

    The Notorious B When you walk past the toy aisle at a store what do you see? Usually there are aisles that you look down and see nothing but a sea of pink. Why is this? Why do certain products lean toward certain genders? Companies often do this to target a certain audience and increase sales.…

    • 386 Words
    • 2 Pages
    Decent Essays
  • Improved Essays

    Nt1330 Unit 9 Final Paper

    • 354 Words
    • 2 Pages

    HIE provides the capability to electronically move clinical information among disparate healthcare information systems, and maintain the meaning of the information being exchanged. (HIMSS Dictionary of Healthcare Information Technology Terms, Acronyms and Organizations, Third Edition) 11)) 1) 1. What sorts of HIEs are there? 2. How are protection and security of patient wellbeing data guaranteed?…

    • 354 Words
    • 2 Pages
    Improved Essays
  • Decent Essays

    The Pangu 9 jailbreak is now out for those of you running the latest iOS 9.0.2 software update. You can follow the guide for jailbreaking with Pangu 9 on every device that can run the iOS 9.0.2 firmware. You can catch that completely list available from the requirements section below. Those with anything under the iPhone 4S cannot follow this guide, just like they cannot update to any version of iOS 9. REQUIREMENTS…

    • 516 Words
    • 3 Pages
    Decent Essays
  • Improved Essays

    Task 1 In Unix/Linux operating system a user can have root access or not, the root access provides complete access to user of a system. There are some following risks to have a single root user on Unix/Linux operating system. Easy to hack: If any security error broke the security then a hacker can get the access of all data and can get the whole control of hardware. It allow to retrieve all files and data without root access.…

    • 1228 Words
    • 5 Pages
    Improved Essays
  • Improved Essays

    Application / Files sharing between computers Windows Homegroup Windows home networking has been extremely complicated to configure in the past, but Homegroup is easy to set up. Just create a Homegroup from the Homegroup option within Windows Explorer (File Explorer on Windows 8) and you’ll get a password which enables you to access fromyour nearby computers and they can join your Homegroup. The other members of the Homegroup will now have access to your shared files when they log ON to the same network — then you may select the libraries whichever you want to share while you create a Homegroup. Dropbox LAN Sync Many people exchange files between their computers by synchronising them with any one of the cloud storage solutions like Dropbox, Google Drive, or SkyDrive. This can take a while — the file first gets uploaded to your cloud storage provider’s servers and then it gets downloaded back to your other computers.…

    • 457 Words
    • 2 Pages
    Improved Essays
  • Improved Essays

    Hex~ A hex is a form of positive protective magic that can positively manipulate or change the actions of myself, another person or their actions to help and benefit that person and to protect them from doing harm to themselves or others. The term originally came from Norway and Switzerland from German immigrants who settled in Pennsylvania. The Pennsylvania Dutch settled in Pennsylvania in the late 1700s to 1800s.…

    • 1010 Words
    • 5 Pages
    Improved Essays
  • Improved Essays

    Manipulative Magick

    • 707 Words
    • 3 Pages

    A hex is manipulative magick. It can be placed on someone as a kind of protection, but a hex can also be placed on someone in a negative way to really manipulate the person and to change the person's own will. So in general a hex can be used negatively, but it does not have to. It is a manipulation to control other people to make them act in a special way, not in their own nature.…

    • 707 Words
    • 3 Pages
    Improved Essays