• Programs To Access System Resources

  • CHAPTER FOUR -- [Total Page(s) 27]

    Page 2 of 27

    Previous   1 2 3 4 5 6    Next
    • Put the motherboard back in the case, making sure that all its screw holes have risers underneath.
      STEP 5: Screw the motherboard

      With the motherboard in place, you can start to screw it in. Start with the corners, holding the motherboard firmly, so that its screw holes line up with the risers that you put in. When screwing the screws in, don’t use too much pressure as you don’t want to break the motherboard.
      STEP 6: Identify ATX connector
      With the motherboard in place, you’re ready to connect it to the power supply. There are two connectors that you’ll need to plug in. The first is the ATX connector. On modern motherboards, you need a 24-pin connector.

      STEP 7: plug in ATX connector

      You need to plug this 24-pin connector into the matching connector on the motherboard. This should be easy to find, but it’s usually located by the IDE ports on the right-hand side of the motherboard.
      STEP 8: identify secondary connector



  • CHAPTER FOUR -- [Total Page(s) 27]

    Page 2 of 27

    Previous   1 2 3 4 5 6    Next
    • ABSRACT - [ Total Page(s): 1 ]Abstract coming soon ... Continue reading---

         

      CHAPTER ONE - [ Total Page(s): 8 ]POWER SUPPLY UNIT A supply unit (PSU) converts main AC to low-voltage regulated DC power for the internal components of a computer. Modern personal computer universally use a switched-mode power supply. Some power supplies have a manual selector for input voltage, while other automatically adapt to the supply voltage. ... Continue reading---

         

      CHAPTER TWO - [ Total Page(s): 13 ]DIAGRAM OF DISK PLATTERAccessing a raw disk involves the data, the disk drive, the track location(s), and the sector location(s) within the corresponding tracks.However, at the application level, at programmer may prefer to specify a file and the location of updates, without worrying about the underlying physical complexity of the disk. 3.2    COORDINATIONA simple of coordination is protection. An operating system needs to protect different application from each other and crashing the operat ... Continue reading---

         

      CHAPTER THREE - [ Total Page(s): 5 ] CHAPTER THREE3.0    DETAILED REVIEW ON THE THEORIES AND PRINCIPLE OF OPERATING SYSTEMAn operating system is the largest and the most complicated software running on most machines. By knowing how operating system work, we learn how to organize a large piece of software (system design), how to hide complexity (abstraction), how to tune a large system (performance), and how to share software and hardware components i ... Continue reading---

         

      CHAPTER FIVE - [ Total Page(s): 1 ]CHAPTER FIVE5.0    SUMMARYThe project uses five chapter to run the cloning of and installation of Linux (OS the problem areas related to Digital Forensic techniques, Linux OS Digital Forensic issues, and Linux OS feature issues were identified. The review were narrowed down to review the gap in research in one area.The chapter one deal with the introduction, Linux OS operating system features of Linux OS, cloning, Hardware component and their function.Chapter two (2) deals with the review of ... Continue reading---

         

      REFRENCES - [ Total Page(s): 1 ]5.3    REFERENCESRose.S.L (2013). “Linux Ubuntu End of Support is Right Around The Corner” Springboard Series Blog. Linux. Retrieved 27 March 2013.Cifaldi, F. (2015). “ EA and Zynga settle The Ville copycat case out of court”.Gamastra. Retrieved 15 September, 2015. Neowin Publishers.Linux Technology Overview ... Continue reading---