Custom Search
Showing posts with label Definition. Show all posts
Showing posts with label Definition. Show all posts

What is Virtual Memory

Virtual Memory
If your computer lacks the random access memory (RAM) needed to run a program or operation, Windows uses virtual memory to compensate. To find out how much RAM your computer has, see Find out how much RAM your computer has.

Virtual memory combines your computer’s RAM with temporary space on your hard disk. When RAM runs low, virtual memory moves data from RAM to a space called a paging file. Moving data to and from the paging file frees up RAM so your computer can complete its work.

The more RAM your computer has, the faster your programs will generally run. If a lack of RAM is slowing your computer, you might be tempted to increase virtual memory to compensate. However, your computer can read data from RAM much more quickly than from a hard disk, so adding RAM is a better solutionoad Link:

Servers Raid Controler

Servers Raid Controler
   With IOP processor onboard of the RAID controller offload the centralized CPU of a server system with needed calculation of RAID parities and I/O processes. Up to 116 hard disk drives per port can be managed with SuperTrak RAID controllers by given a huge capacity, a high performance and a high data availability. RAID level 0, 1, 5, 6, 10, 50, 60* are supported.

What is CPU

     CPU is a short name given to the words, "central processing unit". In essence, this would be the brain of the computer. Think of your GHz (the number assigned to a cpu) as an IQ of your brain. The lower that number that number is the longer it will take for things to process. Therefore, the other short name for a CPU is a processor.

The CPU is without a doubt one of the most important aspects of a computer, regardless of what you intend on doing with it. However, what you actually need is dependent on what you intend on doing with the computer itself. If you are only going to surf the internet, it is not quite as imperative to get a high-end processor as it would be if you were gaming. The latest games require a lot of resources and will work your processor to its limits a lot of time by having it process as much information as possible.

Types of Networking

   There are three main types of the computer networking such as LAN, MAN and WAN. A LAN covers a room or a building. A MAN covers a network in a city and a WAN covers wide areas such as in a city, country or a network between two or more countries. A LAN can be wired or wireless, MAN can be wired or Wireless and WAN can be through wireless communication technologies such as ISDN lines, frame relay and ATM.

Computer Virus Definition

A computer virus is an executable program. Depend on the nature of a virus, it may cause damage of your hard disk contents, and/or interfere normal operation of your computer.

By definition, a virus program is able to replicate itself. This means that the virus multiplies on a computer by making copies of itself. This replication is intentional; it is part of the virus program. In most cases, if a file that contains virus is executed or copied onto another computer, then that computer will also be "infected" by the same virus.

A virus can be introduced to a computer system along with any software program. For Internet users, this threat can come from downloading files through FTP (file transfer protocol), or referencing email attachments. (Please refer to our web page on Handling Email's File Attachments for details.)

When a virus is introduced to a computer system, it can attach itself to, or sometimes even replace, an existing program. Thus, when the user runs the program in question, the virus is also executed. This usually happens without the user being aware of it.

A virus program contains instructions to initiate some sort of "event" that affects the infected computer. Each virus has an unique event associated with it. These events and their effects can range from harmless to devastating. For examples:
  • An annoying message appearing on the computer screen
  • Reduced memory or disk space
  • Modification of data
  • Files overwritten or damaged
  • Hard drive erased

Internet Protocol (IP)

  The Internet Protocol (IP) is the principal communications protocolused for relaying datagrams (packets) across an internetwork using the Internet Protocol Suite. Responsible for routing packets across network boundaries, it is the primary protocol that establishes the internet.
  IP is the primary protocol in the  Internet  layer of  the Internet  Protocol  Suite and  has  the  task of  delivering datagrams from the source host to the destination  host solely based  on  their  addresses.  For this   purpose, IP efines addressing methods and structures for datagram

Internet Protocol

The Internet Protocol (IP) is the method or protocol by which data is sent from one computer to another on the Internet. Each computer (known as a host) on the Internet has at least one IP address that uniquely identifies it from all other computers on the Internet. When you send or receive data (for example, an e-mail note or a Web page), the message gets divided into little chunks called packets. Each of these packets contains both the sender's Internet address and the receiver's address. Any packet is sent first to a gateway computer that understands a small part of the Internet. The gateway computer reads the destination address and forwards the packet to an adjacent gateway that in turn reads the destination address and so forth across the Internet until one gateway recognizes the packet as belonging to a computer within its immediate neighborhood or domain. That gateway then forwards the packet directly to the computer whose address is specified. 
 Internet Protocol is a connectionless protocol, which means that there is no continuing connection between the end points that are communicating. Each packet that travels through the Internet is treated as an independent unit of data without any relation to any other unit of data. (The reason the packets do get put in the right order is because of TCP, the connection-oriented protocol that keeps track of the packet sequence in a message.) In the Open Systems Interconnection (OSI) communication model, IP is in layer 3, the Networking Layer.


You might also like: