Friday, July 16, 2010

TYPES OF MOTHERBOARD AND ALL COMPONENTS

ASUS M4A88TD-V EVO/USB3 Motherboard

The AMD 880G Northbridge and SB850 Southbridge are two of the latest bits of chipset silicon designed to bolster AMD's position in the mainstream PC market. They were released about a month apart this Spring, as part of a full line of 800-series chips, and ASUS wasted no time putting them into production. Key items that help make the M4A88TD-V EVO/USB3 motherboard stand out are native support for SATA 6Gb/s, USB 3.0, and AMD's latest game changer, the Phenom II X6 CPU.  With both Core Unlocker and Turbo Unlocker functionality built right into the board, this combination could be the magic ticket to dynamic-clocked, quad core processing on the cheap.  Benchmark Reviews is pleased to review one of the latest ASUS motherboards, using the latest entries from AMD's new 800-series chipset.

ASUS_M4A88TD-V_EVO_USB3_Motherboard_.jpg 


PEN DRIVE

What is a Pen Drive?

Pen  drives are classified as NAND style data storage  devices. Equipped with a large amount of memory capacity, the pen drive is considered to be an improvement on both the older floppy drive  disks and the more modern compact disks that are often used to copy data and reload the files on a different hard drive. Even a pen drive with a relatively low storage capacity tends to provide plenty of space for a number of files. The types of files that can be loaded onto a pen drive are all the common types that can be housed on any hard drive. This makes it possible for persons to copy photos, spreadsheets, word processing documents, movie clips, music tracks, and just about any other type of file.

Utilizing a pen drive is a simple task. One end of the drive is equipped with a USB connector at one end. The connector is inserted into the USB port on a desktop or laptop and activated. Once the pen drive is in place, it is possible to drop and drag files into the memory of the drive, or forward the files to the drive. The process is no more difficult than attaching files to an email or copying files onto a disk.

 Because there are several different operating systems in common use today, there are various types of levels of the pen drive that are configured to work with each system. Even persons who are using an older operating system can usually find a pen drive that is compatible. As long as the desktop or laptop is constructed with a USB port, and the pen drive is compatible with the operating system, the pen drive will provide practical and easy transmission of data from one hard drive to another one in a matter of minutes. 

Computer virus

A computer virus is a computer program that can copy itself[1]  and infect a computer. The term "virus" is also commonly but erroneously used to refer to other types of malware, including but not limited to adware and spyware  programs that do not have the reproductive ability. A true virus can spread from one computer to another (in some form of executable code) when its host is taken to the target computer; for instance because a user sent it over a network or the Internet, or carried it on a removable medium such as a floppy disk, CD, DVD, or USB drive. Viruses can increase their chances of spreading to other computers by infecting files on a network file system or a file system that is accessed by another computer.
As stated above, the term "computer virus" is sometimes used as a catch-all phrase to include all types of malware, even those that do not have the reproductive ability. Malware includes computer viruses, computer worms, Trojan horses, most rootkits, spyware, dishonest adware and other malicious and unwanted software, including true viruses. Viruses are sometimes confused with worms and Trojan horses, which are technically different. A worm can exploit security vulnerabilities to spread itself automatically to other computers through networks, while a Trojan horse is a program that appears harmless but hides malicious functions. Worms and Trojan horses, like viruses, may harm a computer system's data or performance. Some viruses and other malware have symptoms noticeable to the computer user, but many are surreptitious or simply do nothing to call attention to themselves. Some viruses do nothing beyond reproducing themselves.