Tài liệu miễn phí Phần cứng

Download Tài liệu học tập miễn phí Phần cứng

Chương 5 - Bộ nhớ RAM

Bộ nhớ là thành phần quan trọng thứ hai trong hệ thống máy tính, không có bộ nhớ thì máy tính không thể hoạt động được, trong máy tính có hai loại bộ nhớ hay dùng nhất là RAM và ROM

8/29/2018 4:49:23 PM +00:00

Chương 13 - Tiện ích Ghost

Để cài đặt hệ điều hành Windows và các chương trình ứng dụng bạn phải mất khoảng 60 phút , nhưng bạn có thể dùng chương trình Ghost để sao chép toàn bộ ổ đĩa và chỉ mất khoảng 10 phút

8/29/2018 4:49:23 PM +00:00

Dụng cụ sửa chữa máy tính

Sử dụng một bộ nguồn tốt để thử, nếu máy hoạt động được thì do hỏng bộ nguồn trên máy = Phương pháp sửa nguồn được đề cập ở chương CASE và NGUỒN .

8/29/2018 4:49:23 PM +00:00

BÁO CÁO BẢO TRÌ PHẦN CỨNG MÁY TÍNH TÌM HIỂU VỀ CPU

Cpu (control processing unit – bộ vi xử lý trung tâm) được coi là bộ não của máy tính. Nhiệm vụ của CPU là xử lý những hoạt động, chẳng hạn như tính toán, lưu trữ thông tin và truy tìm. Vì thế CPU biểu thị cho “trí thông minh” của máy tính. Sự tiến bộ của công nghệ máy tính luôn gắn liền với sự phát triển của CPU. Cho đến nay, người ta thường chỉ căn cứ vào CPU để phân loại PC.

8/29/2018 4:49:22 PM +00:00

Tìm hiểu Bộ mạch chủ

Thuật ngữ Bo mạch chủ thường dùng nhiều nhất trong ngành công nghiệp máy tính nói chung như một từ dành riêng, mặc dù có rất nhiều thiết bị khác cũng có thể có bản mạch chính được gọi là bo mạch chủ. Bài viết này nói đến Bo mạch chủ trong các máy tính nói chung mà chú trọng nhiều hơn là của máy tính cá nhân. Bo mạch chủ của máy tính trong tiếng Anh là motherboard hay mainboard và thường được nhiều người gọi tắt là: mobo, main....

8/29/2018 4:49:08 PM +00:00

Chi tiết cách dùng Acronis 11

Tài liệu tham khảo Chi tiết cách dùng Acronis

8/29/2018 4:49:08 PM +00:00

Manage the Explosion of Information with IBM Information Infrastructure

Today, information has become the lifeline for business sustainability and competitive advantage. Firms of all size are searching for practical ways to create business value – to get their arms around information, correlate insights and to confidently predict outcomes and take action.

8/29/2018 4:48:59 PM +00:00

Cyber Forensics—A Field Manual for Collecting, Examining, and Preserving Evidence of Computer Crimes

As senior editor for this text, the responsibility to acknowledge and thank all the individuals who have contributed their expertise, time, energies, and efforts to the successful development of this text falls to me. This is no easy task. It is difficult to put into words the appreciation and gratitude I have for each of their efforts and to express appropriately to each of them my sincere thanks for giving their time and themselves to make this text a better product. Simply mentioning each by name here seems a bit inadequate in comparison to their individual and collective contributions...

8/29/2018 4:48:56 PM +00:00

The Visible PC

Mastering the craft of the PC Technician requires you to learn a lot of details about a zillion things. Even the most basic PC contains hundreds of discrete hardware components, each with its own set of characteristics, shapes, sizes, colors, connections, etc. By the end of this book, you will be able to discuss all of these components in detail. In order to understand the details, you often need to understand the big picture first. The Visible PC should enable you to recognize the main components of the CPU and to understand their function. You will also see all the major connectors, plugs, and sockets, and...

8/29/2018 4:48:54 PM +00:00

ATM Lane

When using “lane config auto-config-atm-address” in the LECS definition, this assumes that the 1010 switch is providing the LECS’ address through the “well known NSAP address”. On the 1010, use “atm lecs-address-default 47.000…” and point to the nsap address of the LECS router. Use “show lane default” on the router and cut and paste!!

8/29/2018 4:48:48 PM +00:00

Windows NT®, Windows® 2000

Hewlett-Packard makes no warranty of any kind with regard to this manual, including, but not limited to, the implied warranties of merchantability and fitness for a particular purpose. Hewlett-Packard shall not be held liable for errors contained herein or direct, indirect, special, incidental or consequential damages in connection with the furnishing, performance, or use of this material.

8/29/2018 4:48:48 PM +00:00

Managing Your Network with HP

This chapter presents an overview of IT service management and what it means to the future of network management. It also describes the basic functions of network management, and how Network Node Manager and other HP OpenView products address those functions.

8/29/2018 4:48:48 PM +00:00

ACCESS-LISTS - NON ROUTABLE PROTOCOLS

Remember that Ethernet and Tokenring MACs are bit swapped! The cannonical rule! This impacts the access-lists. An access-list designed for ethernet wouldn't work for token ring.

8/29/2018 4:48:48 PM +00:00

Access Lists for Routed Traffic

Dynamic access-list authenticate the user then drops the telnet! Also, could put autocommand access-enable under the vty line, but this means that no one could telnet to the router anymore.

8/29/2018 4:48:48 PM +00:00

Exam 70-310 Certification Objective Mapping to the Study Guide

The following tables are designed to help focus your exam preparation. Each exam objective is listed in the left column, with the corresponding chapter where that objective is addressed in the right column. These objectives were current on the Microsoft site at the time of the creation of this table. Because Microsoft reserves the right to change objectives without notice, you should check the exam site prior to finalizing your exam preparation.

8/29/2018 4:48:48 PM +00:00

D The technologies

This appendix contains explanations of all the acronym-ridden Internet technologies that are used to make the .NET Framework such an exciting environment—and that have made XML Web Services possible.

8/29/2018 4:48:48 PM +00:00

E Creating Using Account

This appendix contains explanations of how to create user accounts for use in the Windows environment. If you want a brief overview of Active Directory, just keep reading. If you are looking for specifics about how to create domain, local, or SQL Server user accounts, you can just jump to those sections.

8/29/2018 4:48:48 PM +00:00

Appletalk

In show apple zone if a zone shows up with a :20 this represents a entered at the end of the zone name. Zone names must match between routers! So, Marketing and Marketing:20 wouldn't agree.

8/29/2018 4:48:48 PM +00:00

CCIE Practice Scenario Labs

This document is designed to be a companion to Volume 1,2,3 and 4. The CCIE certification is a written test and a lab test. This document will help the student further build upon their technical skills and configuration skills. The document contains practice CCIE scenario labs.

8/29/2018 4:48:48 PM +00:00

Comm Server Setup

Configure R6 with RIP on E0 (Refer to diagram). Redistribute to allow full network connectivity. Make sure that the only route that R6 accepts from RIP is the network 210.0.5.0 . Also make sure that no routes are being advertised into Backbone 1 from R6 (refer to the diagram).

8/29/2018 4:48:48 PM +00:00

ATM (CLASICAL IP)

Tham khảo tài liệu 'atm (clasical ip)', công nghệ thông tin, phần cứng phục vụ nhu cầu học tập, nghiên cứu và làm việc hiệu quả

8/29/2018 4:48:48 PM +00:00

FIBER DISTRIBUTION UNIT

Tham khảo tài liệu 'fiber distribution unit', công nghệ thông tin, phần cứng phục vụ nhu cầu học tập, nghiên cứu và làm việc hiệu quả

8/29/2018 4:48:44 PM +00:00

Fiber-Optic Module

Bufferedfibrepigtails with color coding are connected to the rear of the through-adapters. The bufferedfibresare passed through the cassette for excessfibrelengths into the splice cassette where they can be marked, prepared and stored for splicing. The connectors comply with EN 186000.

8/29/2018 4:48:44 PM +00:00

ISIS Lab Scenario I

1. Physically cable the routers as depicted in the corresponding diagram. 2. The frame relay cloud between R1, R2, and R3 should be partially meshed with no PVC between R1 and R2. 3. The link from R4 to R5 should be 2 Mbps with R4 providing clocking. 4. Each router should have only the necessary physical interfaces turned up along with one loopback each. 5. R3's S0 must use sub interfaces.

8/29/2018 4:48:44 PM +00:00

DDR Lab Scenario 1 - Legacy DDR Walk Through

This lab is designed to walk you through a basic ISDN DDR configuration. This lab will show you what commands to type in and how to check that you have configured things correctly step-by-step.

8/29/2018 4:48:44 PM +00:00

DDR Lab Scenario 2 - Dialer Profiles with Authentication

This lab is designed to walk you through a basic dialer profile configuration and the special requirements this places on PPP CHAP authentication. This lab will show you what commands to type in and how to check that you have configured things correctly step by step. Some of the steps that were covered in great detail in the first lab scenario will not be covered as thoroughly in this scenario, so refer to the first lab as needed.

8/29/2018 4:48:44 PM +00:00

EIGRP Lab Scenarios

1. Enable EIGRP on all routers. Place all routers in autonomous system 75. Using classful network statements, include all interfaces on each router. 2. Verify IP connectivity by pinging Loopback0 on Router A (70.70.0.1) from Router C.

8/29/2018 4:48:44 PM +00:00

Equipment List for CSVPN 2.00

The Cisco 2611 routers can be ordered with any zero added cost image, but must be later loaded with the 12.1.3T IP/FW/IDS PLUS IPSEC 56 image, which can be downloaded free of charge by Cisco Learning Partners through CCO.

8/29/2018 4:48:44 PM +00:00

Ethernet 1 LAN Switching Part I Lab Scenarios

Three Catalyst(r) 4xxx, 5xxx, or 6xxx switches, two PCs with NICs, three crossover category 5 cables, two straightthrough category 5 cables, and a stopwatch or a watch with a second hand.

8/29/2018 4:48:44 PM +00:00

Ethernet 2 Lab Exercise 1 VLAN, Trunk, and EtherChannel Configuration

Tham khảo tài liệu 'ethernet 2 lab exercise 1 vlan, trunk, and etherchannel configuration', công nghệ thông tin, phần cứng phục vụ nhu cầu học tập, nghiên cứu và làm việc hiệu quả

8/29/2018 4:48:44 PM +00:00