Basic Hardware Information

MXN TRICKS · Post Basic Hardware Information Posting as Deepak Sharma

Primary Memory Terminology

What is primary memory?




It is one storage component in our computer system to load the operating system, applications and other data and information when jobs are performed.
It is volatile, made up of semiconductor elements and available in small quantities but it is very much fast.  It is categories as follows:
          Base memory
          Extended memory
          Read-Only memory
          Cache memory
There are some logical memories also, such as
UMB (Upper Memory Block)
HMA (High Memory Area)
Expanded Memory
Virtual Memory
What is Virtual Memory?
Virtual Memory is the disk space which has been reserved and marked as memory area in a Windows PC system. It is used to increase the available RAM size so that large size applications and programs can be loaded and executed. It is also used to improve the performance of Windows as well the system for best multimedia platform.
Memory Terminologies
1. Conventional Memory

A section of IBM compatible memory that totals 640KB. This portion of the memory is the only portion accessible by MS-DOS.

without the aid of a memory manager. To maintain compatibility computers developed after the 8088 continued to observe this barrier.
2. DDR




Short for Double Data Rate, DDR is a type of memory that utilizes both the rising and falling edge of the system clock. DDR memories are available as DDR-I, DDR-II and DDR-III that has the potential of doubling the speed of the memory.

DDR2

Short for Double Data Rate, DDR2 is the second generation of DDR memory. DDR2 is capable of operating at greater speeds of 400 MHz and higher, offers a greater bandwidth potential, and operates at a lower power consumption generating less heat. Because of the differences between DD and DDR2, DDR2 memory modules are incompatible with DDR slots.

SDRAM

Short for Synchronous DRAM (Dynamic RAM), SDRAM is a type of DIMM memory that synchronizes itself with the computer's system clock to provide a synchronization between the memory and the computer processor.

SRAM

Short for Static RAM, SRAM is a type of computer memory that requires a constant power flow in order to hold information. Although quicker than DRAM, SRAM is much more expensive and requires more power; therefore, it is commonly only used in cache and video card memory

RAM cache
1.     Another term used to describe L2 Cache.
2.     When referring to an Apple Macintosh, RAM cache is sometimes used to describe a disk cache.
3.     When referring to the Opera browser, RAM cache is an available option through the Preferences under History and cache that allows a user save the documents and images to their RAM.
DIMM
Short for Dual In-line Memory Module, a circuit board that holds memory chips.
DIMMs have a 64-bit path because of the Pentium Processor requirements. Because of the new bit path, DIMMs can be installed one at a time, unlike SIMMs on a Pentium that would require two to be added. Below is an example image of a 512MB DIMM memory stick. 
SO-DIMM is short for Small Outline DIMM and is available as a 72-pin and 144-pin configuration. SO-DIMMs are commonly utilized in laptop computers.
Some of the advantages DIMMs have over SIMMs:



1.     DIMMs have separate contacts on each side of the board, thereby providing twice as much data as a single SIMM.
2.     The command address and control signals are buffered on the DIMMs. With heavy memory requirements this will reduce the loading effort of the memory.


  • Additional help and information with computer memory can be found on our memory help page.

SIMM
Short for Single In-line Memory Module, SIMM is a circuit board that holds six to nine memory chips per board, the ninth chip usually an error checking chip (parity / non parity) and were commonly used with Intel Pentium or Pentium compatible motherboards. SIMMs are rarely used today have have been widely replaced by DIMMs. Below is a graphic illustration of a 4MB SIMM as well as a diagram pointing out the important features of a SIMM.

Disk cache

Portion of a computer's memory that acts as a buffer between the CPU and a disk. 
DOS protected mode interface
Abbreviated as DPMI, DOS Protected Mode Interface is a memory mode allowing DOS programs to operate in protected mode allowing DOS applications to support multitasking and use portions beyond the 640KB limit. 
EEMS
A competing standard to EMS is EEMS, developed by Ashton-Tate, AST Research and Quandram.
Extended Memory
Extended Memory is not configurable and unavailable to programs other than those that run in Microsoft Windows and OS/2.
Expanded Memory
The combination of BASE RAM (640KB) and UMB (384) = 1 MB in a DOS PC is known as Expanded Memory. It is logical memory.
Expanded Memory Specification (EMS)
Short for Expanded Memory Specification, EMS is a specification that allows IBM compatible computers to access more than the 1MB.  Early IBM compatible computers running MS-DOS used 640KB (conventional memory) + 384KB (Upper Memory) = 1024KB or 1MB total memory for MS-DOS programs. EMS allowed computer programs to access memory above that 1MB. However, due to of out of memory issues still being encountered by users, LIM EMS was created.
Extended Memory
The memory chip which has been installed in our PC system for the purpose of loading OS as well the application and programs. It is generally referred to as RAM. It is available in different sizes, such as 128/256/512 MB and 1-4 GB only.
Developed by AST, Intel, Lotus and Microsoft, XMS is short for eXtended Memory Specification and allows software access to more than one 1MB.
--------------------------------------
Storage device
A storage device is a hardware device designed to store information. There are two types of storage devices used in computers; a 'primary storage' device and a 'secondary storage' device
ATA
Short for AT Attachment, ATA was first approved May 12, 1994. It is an interface used to connect such devices as hard disk drives, CD-ROM drives, and other types of drives in IBM compatible computers. The original ATA interface is now often referred to as PATA (Parallel AT Attachment) after the introduction of SATA.
SATA
Short for SerialATA, SATA 1.0 was first released in August 2001 and is a replacement for the Parallel ATA interface used in IBM compatible computers. SerialATA is capable of delivering 1.5Gbps (150MBps) of performance to each drive within a disk array, offers backwards compatibility for existing ATA and ATAPI devices, and offers a thin, small cable solution as seen in the picture to the left. This cable helps make a much easier cable routing and offers better airflow in the computer when compared to the earlier ribbon cables used with ATA drives.
ATAPI
Short for AT Attachment Packet Interface, ATAPI is an extension to ATA that allows support for devices such as CD-ROM drives, Tape drives and other computer peripherals and not just hard disk drives.
Communication Ports

1. Serial Ports:

2. Parallel Ports:
RS-232
RS or Recommended Standard-232, also known as EIA232 standard, is a standard for computer data communications introduced in 1960 by EIA. Today, the majority of all personal computers have the capability of utilizing this form of data communications. The RS-232 standard supports two types of connectors, the 25 pin DB-25 connector and the 9 pin DB-9 connector.
RS-232 has had three revisions, including RS-232C, RS-232D (EIA232D) and EIA232E
Audio CD
Also commonly known as a music CD, an audio CD is any compact disc that contains audio tracks that enable the user to listen to music, speeches, books on tape, or any type of audio.
There are numerous software programs available today that enable users to create their own CD's.
Some popular programs used to copy, burn, and create audio and data CD's are:
1.                 CDBurnerXP Pro (Microsoft)
2.                 Nero -  widely recommended programs to create CD's.
3.                 Alcohol 120% - program to create CD's.
4.                 Easy Media Creator / Toast - Products from Roxio Easy Media Creator is a widely used program.
5.                 Microsoft Windows Media Player 10 - If you're running Microsoft Windows on your computer it's likely you already have Windows Media Player installed on your computer. If you're running version 10 or higher and have a CD/DVD burner drive installed in your computer you can create audio CDs using it.
ISO Image
An ISO image or .ISO file is a computer file that contains the complete contents of a CD, DVD, or other disc or disk. ISO images are often created an exact backup a CD or distribute CDs over the Internet or other network.
LiveCD
The name of compact discs that contain an operating system and often other programs that are capable of running on the computer without having to be installed or the need of a hard disk drive. Typically these CDs are used as a way for a user to experience an operating system without having to go through the hassle of erasing their hard disk drive and installing it. For example, many Linux distributions are available in LiveCD format allowing Microsoft Windows users to experiment with Linux without having to erase Windows.
Many LiveCDs are saved as an ISO image, which allows a user to easily create a CD directly from the ISO without having to manually setup the CD. An example of a LiveCD is the Anonym.OS LiveCD, an OpenBSD OS that has been designed to help keep a user anonymous while on a network and the Internet. Click here to open a search for listings of LiveCDs.
CD Track
A CD track is a section of a CD that contains a single full song. Tracks are used on a CD to help enable a user to skip songs or locate a song on a CD easily.
HDD/FDD Track
A track is a data storage ring on a floppy diskette or hard disk drive that is capable of containing information. A track goes all around the platter and is used to help locate and retrieve information from a disk or diskette.
Tape
A magnetically thin coated piece plastic wrapped around wheels that is capable of storing data. Tape is much less expensive than other storage mediums but commonly a much slower solution that is commonly used for backup. 
Spindle
A post that holds a reel of magnetic tape or CDs. In the case of a hard disk drive as seen in the below picture, the spindle is what holds a hard disk drives platters.
CD-R
Also known as CD-WO (Write once) or WORM (Write Once Read Many) drive. CD-R is short for CD-Recordable and is a type of writable disc and drive that is capable of having information written to the disc once and then having that disc read many times after that. If the data is not written to the disc properly, has errors, or has the incorrect information that disc or portions of that disc cannot be erased.
VCD/SVCD
Also known as VideoCD, VCD is a concept that allows for the storage of MPEG-1 video on a CD-ROM. Each VCD is capable of holding up to 74 minutes of video on a 680MB CD.
Regional codes
Also known as country codes and zone locks, regional codes are a method of allowing motion picture studios to control the home viewing of movies in different countries to help prevent other countries from watching moves that may have been released in the U.S. earlier but were not available in other countries and to prevent issues with distribution rights. Therefore, there are six regional codes that apply to DVD that are illustrated in the below picture. When purchasing DVD discs it is important that you only purchase discs which can be used within your regional code. Generally, the regional code will be located on the back bottom of the DVD case.
DVD
Short for either Digital Versatile Disc or Digital Video Disc, DVD or DVD-ROM is a type of disc drive that allows for large amounts of data on one disc the size of a standard Compact Disc. DVD drives were first sold in 1997 and today are widely used for storing and viewing movies and other data. To play a DVD on a computer a user must have a DVD drive as well as a DVD player, which is a software program designed to play and control a DVD disc.
CD
Abbreviated as CD, a compact disc is a flat round storage medium that is read by a laser in a CD-ROM drive. The standard CD is capable of holding 72 minutes of music or 650 MB of data. 80 minute CDs are also commonly used to store data and are capable of containing 700 MB of data.
CD player
Program or hardware device used to play and listen to standard audio CDs. 
Cable select
Often abbreviated as CS, cable select is a disk drive jumper setting that will allow a cable select compatible cable to determine what drive is the master and slave based off where the drives are connected to the cable. For cable select to work the both IDE / EIDE drives must have their jumpers set to CS and be connected to a cable that supports cable select.
Users can easily identify if the flat ribbon cable supports cable select by examining the cable for any of the below characteristics.
Cable is an 80-connector UltraATA cable.
Cable has master and slave printed on the cable or on the cable connectors.
R/W
Short for Read/Write, R/W is a drive and/or media that is capable of being written to or read from, as well as being written to or read from many times. This term is commonly used and found on CD-RW drives, drives capable of of recording and reading CD-RW discs.
Read/Write is also an attribute that can be given to files and directories that allows the files to be read from and written to. 
640KB barrier
Also known as conventional memory, the 640KB barrier is the PC compatible memory limit created by the DOS mode that only allows DOS programs to address only 1MB total memory. Because the system required 384KB to be reserved, this left the lower 640KB for DOS and other programs. 
Buffer
When referring to memory, a buffer is temporary storage in memory used to temporarily store information while other information is being processed.
Online you may see buffering with online streaming videos and music before they play. This buffering is done to help keep the media file from stopping when it does start to play by downloading a portion of the file first. 
---------------------
Cache Memory
Pronounced as Cash (like the money). Cache is a high-speed access area that can be either a reserved section of main memory or disk.
Memory cache is a portion on memory of high-speed static RAM (SRAM) and is effective because most programs access the same data or instructions over and over. By keeping as much of this information as possible in SRAM, the computer avoids accessing the slower DRAM.
Cache Memory is available as L1, L2 and L3.
Like memory caching, disk caching is used to access commonly accessed data. However, instead of using high-speed SRAM, a disk cache uses conventional main memory. The most recently accessed data from the disk is stored in a memory buffer. When a program needs to access data from the disk, it first checks the disk cache to see if the data is there.
Most computers today come with L3 cache and/or L2 cache, while older computers included only L1 cache. Disk caching can dramatically improve the performance of applications because accessing a byte of data in RAM can be thousands of times faster than accessing a byte on a hard disk.
Another type of cache is known as "Internet browser cache" also known as "Temporary Internet Files" in Internet Explorer. Internet cache is used to help improve how fast data is opened while browsing the Internet. In most cases, each time a web page is opened, it is sent to your browser's temporary cache on your hard disk drive. If that page is accessed again and has not been modified, the browser will open the page from your cache instead of downloading the page again. This saves users a lot of time, especially if that user is using a modem, and can also help save the web page owner on bandwidth.
Additional information about how to clear your Internet history can be found on document CH000510.
A cache server is a computer or network device that has been setup to store web pages that have been accessed by users on a large network. Any user that accesses a page that is currently stored on the cache server will be sent the stored version instead of downloading the page again. By doing this, a company can help reduce network and Internet traffic congestion as well as save on bandwidth. 


---------------


-----------
Hardware
Hardware is best described as a device that is physically connected to your computer or something that can be physically touched. A CD-ROM, Monitor, Printer, and video card are all examples of computer hardware. Without any hardware your computer would not exist and software would have nothing to run on. The image to the right is of a webcam, an example of an external hardware peripheral that allows users to make basic videos, transmit videos of themselves over the Internet, and take pictures.


-------------
Webcam
A camera connected to a computer or server that allows anyone connected to the Internet to view still pictures or motion video of a user. The majority of webcam web sites are still pictures that are frequently refreshed every few seconds, minutes, hours, or days. However, there are some sites and personal pages that can supply streaming video for users with broadband.
The image to the right is a picture of the Logitech QuickCam Express and an example of what a webcam may look like. Today, most webcams are connected to the USB or Firewire port on a computer.

There are millions of webcams around the world that allow you to view other people, places, and even events. If you're interested in looking at webcams, click here to open a search for webcams.
If you're looking to chat with other webcam users live a great site with millions of other webcam users is Stickam.
Parents with children should be aware of the potential dangers of children and webcams. Additional information about protecting children from harmful material on the Internet can be found on document CH000526.
See document CH000890 for additional information about users without webcams viewing users with webcams. 


------
FireWire
Also known as IEEE-1394, FireWire was developed by Apple in 1995 and is a bus that has a bandwidth of 400-800 Mbps, can handle up to 63 units on the same bus, and is hot swappable. Users more familiar with USB can relate FireWire to USB as it has a lot of the same similarities. Like USB, FireWire has dozens of different devices such as removable drives, cameras, etc. that can be connected to it.

MPP-1150
An interface used with the Atari computer serial interface that connects to a printer 36-pin Centronics connector.

----------------

SCSI

Short for Small Computer System Interface, SCSI, pronounced as "Scuzzy", is the second most commonly used interface for disk drives. SCSI is capable of supporting eight devices, or sixteen devices with Wide SCSI.

It is a standard for parallel interfaces that transfers information at a rate of eight bits per second and faster, which is faster than the average parallel interface. SCSI-2 and above supports up to seven peripheral devices, such as a hard drive, CD-ROM, and scanner, that can attach to a single SCSI port on a system's bus. SCSI ports were designed for Apple Macintosh and Unix computers, but also can be used with PCs. 


-------------

Cordless

Also known as wireless, cordless is the ability to operate a device without any wires that may cause constricted movement.

Cordless computer hardware devices commonly utilize such Infrared or Bluetooth. Cordless networks, more commonly known as Wi-Fi, utilize one of the IEEE 802.11 wireless standards to achieve wireless.

Although a cordless hardware device requires no wires, it will commonly require some type of device to broadcast a signal; for example, a Bluetooth mouse may require a USB Bluetooth transceiver to send and receive signals from the mouse. In addition to this, all wireless hardware devices will require batteries to power the device or utilize power from the computer.


Wi-Fi

Short for Wireless Fidelity, Wi-Fi utilizes one of the IEEE 802.11 wireless standards to achieve a wireless network. A home wireless network commonly broadcasts a signal using a WAP (Wireless Access Protocol) to send and receive signals from wireless devices on the network.

-----------
WEP
Short for Wireless Equivalent Privacy, WEP is a type of encryption defined in the 802.11 standard that helps protect a wireless network using encryption. WPA is an improved encryption standard introduced with 802.11i and a likely replacement for WEP.

----------------
WAN
Short for Wide Area Network, WAN is a collection of computers and network resources connected via a network over a geographic area. Wide-Area Networks are commonly connected either through the Internet or special arrangements made with phone companies or other service providers. A WAN is different from a MAN because of the distance between each of the networks. In a WAN, one network may be anywhere from several hundred miles away, to across the globe in a different country.
For home routers the port the router connects to your Internet connection is often labeled as a WAN, Network or Internet port, since it is what allows your home network to communicate with the Internet network.

--------------
WAP

Short for Wireless Application Protocol, WAP is specifications for a set of communication protocols used to allow wireless devices to access the Internet and other network utilities such as e-mail, chat, etc...

--------------
IrDA
Founded in 1993, IrDA is short for Infrared Data Association. IrDA is a group of hardware manufacturers working together to create standards for infrared data transmission. Hardware devices that conform to IrDA standards are capable of working with one another.

10BASE-T

Similar to the standard telephone cabling, 10BASE-T is a 10MBps CSMA/CD Ethernet LAN that works on Category 3 or better twisted-pair cables capable of being100 meters long.


-------------------
10BASE-2

Also known as Thin Ethernet or Thinnet, 10BASE-2 is an IEEE standard for baseband Ethernet at 10MBps over thick coaxial cable. 10Base2 has a maximum distance of 185 meters.
Thin Ethernet is five millimeters in diameter and used to connect machines up to 1,000 feet apart

-------------
IEEE

Short for Institute of Electrical and Electronic Engineers and also pronounced as eye-tripple-E, IEEE is an association of various individuals founded in 1963. IEEE helps advance global prosperity by promoting engineering, the process of creating, developing, integrating, sharing, and applying knowledge. 


------------------
Active directory
Originally known as NTDS, active directory (AD) is a directory service first provided in Microsoft Windows 2000 that is often managed and controlled through the Microsoft Management Console (MMC) and provides a simplified query for administrators and users to manage resources, services, and users on a network

---------------------
MAC
Short for Medium Access Control, a MAC address also known as a physical address is a unique address number formatted in hexadecimal format and given to each computer and/or network device on a computer network. Below is an example of a MAC address:

A1:B2:C3:D4:E5:F6

Because a MAC address is a unique address, a computer network will not have the same MAC address assigned to more than one computer or network device.

Users who are running Microsoft Windows who are interested in learning their MAC address or another computer's MAC address can use the nbstat or ipconfig command. Additional information about these command can be found on our nbtstat command page and ipconfig command page.

If you're running Linux / Unix or a variant, you can determine the MAC Address or hardware address using the ifconfig command. Additional information about this command can be found on our ifconfig command page.

--------------
Physical address
When referring to computers in general or computer memory, the physical address is the computer memory address of a physical hardware device.
When referring to a network address, physical address is sometimes used to describe the MAC address.

--------------
Virtual address
Also known as the logical address, a virtual address, sometimes abbreviated as VA, is an address used by computer software programs as a reference point in virtual memory

------
Protocol
Sometimes referred to as an access method, a protocol is a standard used to define a method of exchanging data over a computer network such as local area network, Internet, Intranet, etc. Each protocol has its own method of how data is formatted when sent and what to do with it once received, how that data is compressed and/or how to check for errors in data.

------
BOOTP
Short for BOOTstrap Protocol, BOOTP is a protocol that allows a client to discover certain network information; for example, its own IP address.

-----
DHCP
Short for Dynamic Host Configuration Protocol, DHCP is a protocol used to assign an IP address to a computer or device connected to a network automatically. Routers, switches, or servers that assign addresses to other computers using DHCP on a network make the setup and management of the network easier by not requiring the user or network admin to have to manually define each address for each computer and network device on the network.
For home network users you can setup a DHCP network by purchasing a home router, wireless router, or switch with NAT/DHCP and connect each computer to it. In order for each computer or network device to properly work on a DHCP network with any type of firewall setup ports 67 and 68 need to be open

-----
Frame relay
Sometimes abbreviated as FR, Frame relay is a network protocol designed to replace X.25. When compared to X.25, frame relay is much more simple because of the lack of many features that are no longer needed. 

----
Bandwidth
When referring to your own connection, bandwidth is the total maximum capacity of your network or modem connection. A MODEMs bandwidth is measured in BPS. The more bandwidth you have, the faster you will be able to receive and/or send information.

If bandwidth is being shared, you will likely not be able to reach the maximum capacity of the bandwidth when other computers, users or other devices are utilizing the same line.

-----
Multicast
Packet or message sent across a network by a single host to multiple clients or devices.

------
Unicast
A packet or message sent across a network by a single host to a single client or device

---------------
IPX/SPX
Short for Internet Packet eXchange/Sequential Packet eXchange, IPX/SPX is a local-area network communications protocol developed by Novell that exchanges information between network clients, applications, and network peripherals. This Protocol cannot be used over the Internet.

--------------
Kerberos
Developed by MIT, Kerberos is network authentication protocol designed to encrypt and secure data on an insecure network. 

-------------------
LDAP
Short for Lightweight Directory Access Protocol, LDAP is an Internet protocol that runs over TCP designed at the University of Michigan and based on X.500 that e-mail programs use to look up contact information.
LDAP is a much easier version of X.500, and because of this, most e-mail clients today and in the future contain this protocol or OpenLDAP.

Complete LDAP information and help can be found at the University of Michigan LDAP page.

Complete information about OpenLDAP can be found here

--------------

Clickjacking
Term used to describe a technique used in deceiving users into clicking something they may not want to do. This is done by creating a transparent frame above the window they're viewing and taking any click the user does to perform another action such as agreeing to something they may not have wanted. For example, a developer could create a clickjack site that causes the user to agree to give him or her rights to that persons webcam without them knowing

-------------
Uuencode
Short for Unix-to-Unix encode, uuencode is a protocol for transmitting any non-plaintext files such as images and other file attachments in e-mail. This works by converting the binary into text that can be converted from text back into the binary image or other file once the e-mail has been received.

--------------
MIME
Short for Multipurpose Internet Mail Extensions, MIME is a standard format, defined in 1992, that allows the attachment and sending of non-text files, such as compressed files, sound files, graphic files, document files, video files, and various other files, within an e-mail. 

--------------
Base64
Base64 is a type of encoding that allows files or data to be embedded in media that otherwise does not allow certain data. For example, binary files, such as images, often contain bytes that can interrupt an e-mail transmission, so attachments are often base64-encoded (using MIME) so that this binary data is converted into a friendlier format. This format only contains the ASCII characters 'A' through 'Z' (upper and lower case), digits '0' through '9', symbols '+', '/', and '=' for padding. This adds up to 64 different values, hence the name base 64. Base64 encoded data must be decoded in order to get back the original data.

-----------
NetBEUI
Short for NETBios Enhanced User Interface, NetBEUI was originally developed by IBM in 1985 and is an enhanced version of the NetBIOS protocol used by network operating systems, allowing the computer to communicate with other computers utilizing the same protocol.

------------------
NetBIOS
Short for Network Basic Input/Output System, NetBIOS was developed by IBM, Microsoft, and Sytek.  This is what allows software applications, commonly used on IBM compatible computers to communicate with network hardware, and allow data to be transmitted properly over a network. 
NetBIOS commonly communicates on ports 137, 138 and 139. If your network or computer has a firewall setup that blocks any of these ports it is likely warning messages will be received when your computer communicates with another computer that utilizes NetBIOS (for example: Microsoft Windows). To prevent these errors or warnings you must provide access on these ports

--------------
PPP
Short for Point-to-Point Protocol, PPP is a communication protocol that enables a user to utilize their dialup connection (commonly a modem) to connect to other network protocols like TCP/IP, IPX, etc... Unlike SLIP, which is another popular dialup connection, protocol PPP offers such new features as password protection and error-correction.

----------
Short for Routing Information Protocol, RIP is a routing protocol first mentioned in RFC 1058 and used by computers and other network devices such as routers to broadcast known addresses, allowing networking devices to learn available routes. The algorithm used in RIP was first developed in 1969 and used to route information in ARPANET. If compatible many networks have upgraded from RIP to OSPF or another more current routing protocol.

---------------
SLIP
Short for Serial Line Internet Protocol, SLIP is an Internet protocol that allows users to gain Internet access using a computer modem. Today, SLIP is not used as frequently as its successor, Point-to-Point Protocol (PPP), which provides enhanced error detection and automatic configuration. 

----------
VoIP
Also known as IP telephone, VoIP is short for Voice over Internet Protocol and is an Internet protocol that enables users to make calls over the Internet. The first experiment VoIP call was made in 1973 even though the first software known as "Vocaltec" that enabled end users to make calls did not appear until 1995.
This enables long distant phone calls to be cheaper, although at a lower quality of audio.

Examples of VoIP include: Skype, Teamspeak, and Ventrilo.

-------------
Skype
From some of the same developers that wrote KaZaA, Skype is a popular small software program available for Microsoft Windows, Apple Mac OS X, Linux and other operating systems that enables users to make voice calls to anyone in the world for free who also has Skype, or make toll calls to any other mobile or regular phones. On September 12, 2005 eBay acquired Skype for approximately $2.6billion and on Friday April 28, 2006 Skype announced that it had over 100 million registered users.

------------
WMLScript
Short for Wireless Markup Language Script, WMLScript is similar to JavaScript and allows a developer to create scripts to be used on wireless devices.
System Information



Your IP address is:
122.162.214.51
Your hostname is:
ABTS-North-Dynamic-051.214.162.122.airtelbroadband.in
Your ISP is:
Airtel broadband - Connection type: Broadband
Country: INDIA(IN)
City: New Delhi
Latitude: 28.6
Longitude: 77.2
Your operating system is:
Windows XP - SP1
Your browser is:
Internet Explorer 6.0 - CPU Type: x86
Your JavaScript is:
Disabled
Referring site:
computerhope.com (direct link)
Sites visited:
32 pages in this sessions history
Cookies are:
Enabled
Your screen resolution is:
1024 x 768 / 32-bit color
.NET versions:
2.0.50727 - 3.0.04506.648 - 3.5.21022

Plugins


Plugin
Your version
Latest XP versions
Update?
Download
Adobe Acrobat
Unknown
9.2
Manual check
Link
Flash
9.0.124.0
10.0.32.0
Later version
Link
Java
1.6.0.4 - (Enabled: true)
1.6.0.17
Needs updating
Link
JavaScript
1.3
Browser dependent
N/A
-
QuickTime
Missing
7.6.5.0
Not installed
Link
RealPlayer
Unknown
11.0.3
Manual check
Link
Shockwave
Missing
11.5.0.0
Not installed
Link
Silverlight
Missing
3.0.40818.0
Not installed
Link
Windows Media Player
9.0.0.3250
11.0.5721.5268
Needs updating
Link
VBScript
5.6.8820
Browser dependent
N/A
-
DevalVR
Missing
0.6.9.9
Not installed
Link
VRML plugins detected:
Missing
Plugin dependent
N/A

X3D plugins detected:
Missing
Plugin dependent
N/A


* Each of the above plugin links give additional information and links to updates. If installed it's highly recommended that you have the latest version for each installed plugin, since many of the updates done are security related. Finally, because Adobe Acrobat Reader and RealPlayer cannot be properly detected through a browser we suggest manually verifying you have the latest versions of these programs installed.


All of the above information is all extracted from your user agent and JavaScript and may be incorrect. This script is capable of detecting major browsers, operating systems, spyware, some software programs, and browser add-ons. However, will only display information capable of being found through your browser. If you're looking for software programs that can detect all system specifications please see document CH000017. See our privacy Q&A's for questions regarding privacy on the Internet.

This system information report was generated using the Computer Hope System Information script v1.1e on Saturday, January 9, 2010

SDRAM
Short for Synchronous DRAM, SDRAM is a type of DIMM memory that synchronizes itself with the computer's system clock to provide a synchronization between the memory and the computer processor.
SRAM
Short for Static RAM, SRAM is a type of computer memory that requires a constant power flow in order to hold information. Although quicker than DRAM, SRAM is much more expensive and requires more power; therefore, it is commonly only used in cache and video card memory.

RAM cache
Another term used to describe L2 Cache.
When referring to an Apple Macintosh, RAM cache is sometimes used to describe a disk cache.
When referring to the Opera browser, RAM cache is an available option through the Preferences under History and cache that allows a user save the documents and images to their RAM.

DIMM
Short for Dual In-line Memory Module, DIMM is a type of circuit board that holds memory chips. DIMMs have a 64-bit path because of the Pentium Processor requirements. Because of the new bit path, DIMMs can be installed one at a time, unlike SIMMs on a Pentium that would require two to be added. Below is an example image of a 512MB DIMM memory stick. 




SO-DIMM is short for Small Outline DIMM and is available as a 72-pin and 144-pin configuration. SO-DIMMs are commonly utilized in laptop computers.
Some of the advantages DIMMs have over SIMMs:
DIMMs have separate contacts on each side of the board, thereby providing twice as much data as a single SIMM.
The command address and control signals are buffered on the DIMMs. With heavy memory requirements this will reduce the loading effort of the memory.
Additional help and information with computer memory can be found on our memory help page.
SIMM
Short for Single In-line Memory Module, SIMM is a circuit board that holds six to nine memory chips per board, the ninth chip usually an error checking chip (parity / non parity) and were commonly used with Intel Pentium or Pentium compatible motherboards. SIMMs are rarely used today have have been widely replaced by DIMMs. Below is a graphic illustration of a 4MB SIMM as well as a diagram pointing out the important features of a SIMM.












Printer

An external hardware device responsible for taking computer data and generating a hard copy of that data. Printers are one of the most used peripherals on computers and are commonly used to print text, images, and/or photos. The image to the right is a visual example of the Lexmark Z605 Inkjet printer and is an example of what a printer may look like.

DOT matrix
The term DOT matrix refers to the process of placing dots to form an image; the quality of the image being determined by the dots per inch.
Dot matrix printers were first introduced by Centronics in 1970 and is a type of printer that uses print heads to shoot ink or strike an ink ribbon to place hundreds to thousands of little dots to form text and/or images. Today, dot matrix printers are not commonly used or found because of the low quality print outs when compared to ink jet printers or other later printer technologies

Inkjet printer
A popular type of printer for home computer users that prints by spraying streams of quick-drying ink on paper. The ink is stored in disposable ink cartridges, often a separate cartridge is used for each of the major colors. These colors are usually Black, Red/Magenta, Green/Cyan, and Yellow (CYMK).  To the right is an example of an inkjet printer.
Although inkjet printers themselves are often relatively inexpensive, the ink cartridges used in the printers can quickly increase the overall cost of the printer

Laser printer

First developed at Xerox PARC by Gary Starkweather and released in 1971, a laser printer is a type of printer that utilizes laser technology to print images on the paper. Laser printers are often used in corporate, school, and other environments that require print jobs to be completed quickly and in large quantities. To the right is an example of what a laser printer may look like. This picture is of the Lexmark C782n laser printer. Finally, below is a chart of the steps a laser printer takes to print.




STEP
WHAT IT DOES
Cleaning
Removes prior image information and toner from the drum.
Conditioning
Applies a uniform negative charge to the drum.
Writing
Light source such as lasers, LED, or LCS (Liquid Crystal Shutter) write to areas on the drum discharging the negative potential where it hits.
Developing
The toner is ionized with a negative charge and is attracted to the areas previously written (discharged) on the drum.
Transfer
The toner of the drum is transferred to the paper by either a positively ionized field (created by a transfer corona wire) or by a transfer roller in newer printers. The toner is not yet permanently set on the paper and requires the last stage.
Fusing
Heat and pressure are applied to the paper and toner. The toner melts and then is pressed to the paper like doing an iron-on transfer to a T-shirt.

Thermal printer


A thermal impact printer or electrothermal printer is a type of printer that uses heated pins to "burn" images onto heat-sensitive paper. These types of printers are commonly used in calculators and fax machines; and although they are inexpensive and print relatively fast, they produce low resolution print jobs.
A thermal printer, thermal transfer printer, or thermal wax-transfer printer is a high quality printer that commonly utilizes a thermal wax ribbon that melts a colored wax onto the paper creating near photo-realistic images

LED Printer


Short for light emitting diode printer, LED printers were developed by Casio and are printers capable of printing at the same or close to the same quality as most laser printers. LED printers work much like laser printers but utilize a LED panel that recreates the image on a negatively charged drum. The areas where the light hits the drum become less charged, which attracts toner. The printer then transfers the toner from the drum to the paper and applies intense heat to fuse the toner to the paper. 


Parallel port


Less commonly referred to as the Centronics interface or Centronics connector after the company that originally designed it, the port was later developed by Epson. The parallel port is found on the back of IBM compatible computers and is a 25-pin (type DB-25) computer interface commonly used to connect printers to the computer. Below is an example of the DB25 interface found on the back of the computer. 
















Identifying
In the above graphic of a parallel port you can notice the DB25 parallel port connection is easy to identify and is often the biggest connection on the back of the computer. The connection is in the shape of the letter D, is a female connector, and has 25 pins.

Type of parallel port modes

The computer is capable of having the parallel port run at different modes depending on your needs and available resources. Some of these modes include: IEEE-1284 (Auto), Centronics mode, Nibble mode, Unidirectional (SPP), Bi-directional, EPP, and ECP.

Additional technical information

The DB25 connector has an 8-bit data bus, supported a maximum cable length of 15 feet; although there are 50 foot cables, it is not recommended that these cables be used as it can create poor connection and data signals. Below is additional information about each of the pins on this connector. Pin 1 through 25 identified in the image above.



PIN
PURPOSE
PIN
PURPOSE
Pin 1
-Strobe
Pin 13
+Select
Pin 2
+Data Bit 0
Pin 14
-Auto Feed
Pin 3
+Data Bit 1
Pin 15
-Error
Pin 4
+Data Bit 2
Pin 16
-Initialize Printer
Pin 5
+Data Bit 3
Pin 17
-Select Input
Pin 6
+Data Bit 4
Pin 18
-Data Bit 0 Return (GND)
Pin 7
+Data Bit 5
Pin 19
-Data Bit 1 Return (GND)
Pin 8
+Data Bit 6
Pin 20
-Data Bit 2 Return (GND)
Pin 9
+Data Bit 7
Pin 21
-Data Bit 3 Return (GND)
Pin 10
-Acknowledge
Pin 22
-Data Bit 4 Return (GND)
Pin 11
+Busy
Pin 23
-Data Bit 5 Return (GND)
Pin 12
+Paper End
Pin 24
-Data Bit 6 Return (GND)


Pin 25
-Data Bit 7 Return (GND)

Below is an explanation of each of the above purposes.

Pin1 = Data acknowledgement when the signal is low.
Pin 2 - 9 = Data transfer pins.
Pin 10 = Acknowledge that the data has finished processing and when the signal is high indicates ready for more.
Pin 11 = When the signal goes high indicate that the printer has accepted the data and is processing it. Once this signal goes low and Pin 10 goes high will accept additional data.
Pin 12 = Printer paper jam when signal is high or no signal if printer jam.
Pin 13 = When high signal printer is indicating that it is on-line and ready to print.
Pin 14 = When low signal PC has indicated that the printer inset a line feed after each line.
Pin 15 = Printer sends data to the computer telling it that an error has occurred.
Pin 16 = When low signal PC has requested that the printer initiate an internal reset.
Pin 17 = When low signal the PC has selected the printer and should in return prepare for data being sent.
Pin 18 - 25 = Ground.

What is the parallel port used for?

Printer - The most common use for the Parallel port.

Scanner - Another commonly used parallel device is the Parallel scanner. Parallel scanners are a popular alternative to SCSI scanners because of how easy they are to install.

External Drives - Another popular use of the Parallel ports are external drives such as the Iomega Zip Drive, which can be easily removed from one computer and placed onto another.


Serial port








 An Asynchronous port on the computer used to connect a serial device to the computer and capable of transmitting one bit at a time. Serial ports are typically identified on IBM compatible computers as COM (communications) ports. For example, a mouse might be connected to COM1 and a modem to COM2. With the introduction of USB, FireWire, and other faster solutions serial ports are rarely used when compared to how often they've been used in the past. To the right is a close up of a DB9 serial port on the back of a computer.

A serial port you can notice the DB9 serial port connection is easy to identify. The connection is in the shape of the letter D, is a male connector, and has 9 pins.


Pin information
Below is a listing of each of the pins located on the DB9 connector and what each of these pins are for. As can be seen in the above picture pin one is in the top left and pin 9 is in the bottom right.



PIN
PURPOSE
SIGNAL NAME
Pin 1
Data Carrier Detect
DCD
Pin 2
Received Data
RxData
Pin 3
Transmitted Data
TxData
Pin 4
Data Terminal Ready
DTR
Pin 5
Signal Ground
Gnd
Pin 6
Data Set Ready
DSR
Pin 7
Request To Send
RTS
Pin 8
Clear To Send
CTS
Pin 9
Ring Indicator
RI
What is the serial port used for?
Below is a listing of various hardware components that can be purchased and used with your serial port.
Mouse - One of the most commonly used devices for serial ports, usually used with computers with no PS/2 or USB ports and specialty mice.
Modem - Another commonly used device for serial ports. Used commonly with older computers, however, is also commonly used for its ease of use.
Network - One of the original uses of the serial port, which allowed two computers to connect together and allow large files to be transferred between the two.
Printer - Today, this is not a commonly used device for serial ports. However, was frequently used with older printers and plotters.
Additional technical support and help with computer serial ports can be found on our serial port help page.

USB



Short for Universal Serial Bus, USB is a standard that was introduced in 1995 by Intel, Compaq, Microsoft and several other computer companies. USB 1.x is an external bus standard that supports data transfer rates of 12 Mbps and is capable of supporting up to 127 peripheral devices. The image to the right is an example of a USB device, the SMC EZ Connect Wireless Bluetooth adapter adds Bluetooth connectivity for your computer.
USB 2.0, also known as "hi-speed USB", was developed by Compaq, Hewlett Packard, Intel, Lucent, Microsoft, NEC and Philips and was introduced in 2001. Hi-speed USB is capable of supporting a transfer rate of up to 480 Mbps and is backwards compatible, meaning it is capable of supporting USB 1.0 and 1.1 devices and cables.

 What is Bluetooth

A computing and telecommunications industry specification that describes how different types of components such as mobile phones, computers or PDAs (personal digital assistants) can communicate with each other. Bluetooth is a RF technology that operates at 2.4 GHz, has an effective range of 32-feet (10 meters) and has a transfer rate of 1 Mbps.
Bluetooth could be used is to connect to a computer with a cell phone without needing any wires or special connectors.


SSL

Short for Secure Socket Layer, SSL is a protocol developed by Netscape for transmitting private documents and transferring data encrypted, allowing information such as passwords or credit card information to be hidden. 


 SSH


Short for Secure Shell, SSH was developed by SSH Communications Security Ltd. and is a secure protocol for remote logins. Using a SSH client a user can connect to a SSH server to transfer information in a more secure method than telnet. The image to the right is an example of what a SSH session may look like. As can be seen from the example to the right a SSH session is a command line interface.
A great free SSH client is PuTTY.

What is Windows Registry?
A database repository for information about a computer's configuration. The registry contains information that Windows continually references during operation, such as:

  • Profiles for each user.

  • The programs installed on the computer and the types of documents each can create.

  • Property settings for folders and program icons.

  • What hardware exists on the system.

  • Which ports are being used.

The registry is organized hierarchically as a tree and is made up of keys and their subkeys, hives, and value entries.

Post settings Labels Published on 7/23/18, 11:44 AM Pacific Daylight Time Links Location Options

Post a Comment

0 Comments

';