Skip to main content

DETAILED ARTICLE ON MEMORY IN COMPUTER.

  MEMORY OF COMPUTER: DETAILED EXPLANATION INTRODUCTION MEMORY IN A COMPUTER IS THE MOST ESSENTIAL COMPONENT THAT STORES DATA, INSTRUCTIONS, AND INFORMATION TEMPORARILY OR PERMANENTLY. IT ACTS AS A BRIDGE BETWEEN THE CENTRAL PROCESSING UNIT (CPU) AND THE STORAGE DEVICES, ENSURING SMOOTH DATA PROCESSING AND RETRIEVAL. WITHOUT MEMORY, A COMPUTER CANNOT PERFORM ANY OPERATION. COMPUTER MEMORY IS BROADLY CATEGORIZED BASED ON ACCESS TIME, CAPACITY, COST, AND VOLATILITY . IT DETERMINES THE PERFORMANCE AND EFFICIENCY OF THE ENTIRE SYSTEM. TYPES OF COMPUTER MEMORY COMPUTER MEMORY IS MAINLY DIVIDED INTO PRIMARY MEMORY AND SECONDARY MEMORY , AND ALSO INCLUDES CACHE MEMORY AND VIRTUAL MEMORY AS SPECIAL TYPES. 1. PRIMARY MEMORY (MAIN MEMORY) PRIMARY MEMORY IS DIRECTLY ACCESSIBLE BY THE CPU. IT IS FAST BUT LIMITED IN SIZE AND VOLATILE IN NATURE, MEANING DATA IS LOST WHEN POWER IS TURNED OFF. CHARACTERISTICS: HIGH SPEED LIMITED STORAGE CAPACITY VOLATILE (T...

WINDOWS 8.1 MOBILITY AND SECURITY IMPROVEMENT

 

WINDOWS 8.1, WINDOWS 8.1 REVIEW

WINDOWS 8.1 MOBILITY AND SECURITY IMPROVEMENTS

 

FRIENDS I AM GOING TO SAY SOMETHING ABOUT IMPROVEMENTS AND SECURITY IMPROVEMENTS OF WINDOWS 8.1 OVER WINDOWS 8.  SO LET’S GET STARTED.

 

SO LET’S GET STARTED WITH MOBILITY IMPROVEMENTS

 

MOBILITY IMPROVEMENTS

 

VIRTUAL PRIVATE NETWORK:  A NUMBER OF VPN CLIENTS AND THE MICROSOFT VPN CLIENTS ARE SUPPORTED BY THE WINDOWS 8.1.  SO LET’S UNDERSTAND WHAT VPN IS.

 VPN IS A TECHNOLOGY TO OR TO SAY A TYPE OF CONNECTION METHOD TO PROVIDE SECURITY AND PRIVACY TO THE USER OF PRIVATE AS WELL AS PUBLIC NETWORKS.  MANY ORGANIZATION AS WELL AS USER WANT THEIR DATA SHOULD BE PROTECTED AND THIS IS WHEN VPN PROVIDES.

 

MOBILE BROADBAND: THE EMBEDDED WIRELESS RADIO IS SUPPORTED BY THE WINDOWS 8.1WHICH HELPS TO IMPROVE POWER EFFICIENCY AND REDUCES THE SIZE OF SOME DEVICES.

 

BROADBAND TETHERING:  WINDOWS 8.1 DEVICES CAN BE CHANGED INTO WIFI HOTSPOT.

 

AUTO TRIGGERED VIRTUAL PRIVATE NETWORK:  WHEN AN APPLICATION REQUIRES THE COMPANY INTRANET ACCESS, WINDOWS 8.1 CAN ALSO TRIGGER A VPN CONNECTION.

 

 

 

 

SECURITY IMPROVEMENTS

 

REMOTE BUSINESS DATA REMOVAL:  TO CLASSIFY AND FLAG CORPORATE FILES AND TO DIFFERENTIATE FROM THE USER FILES WE CAN USE THE REMOTE BUSINESS DATA REMOVAL WITH WINDOWS 8.1 AND WINDOWS SERVER 2012 R2.   WITH SUCH CLASSIFICATION, THE REMOTE WIPE FEATURE AVAILABLE WITH WINDOWS 8.1 DEVICE WHICH MAY NOT REMOVE THE USER DATA WHILE SECURING THE CORPORATE DATA BY SECURING OR REMOVING.

 

IMPROVED BIOMETRIC : THERE IS A VAST IMPROVEMENT HAS BEEN DONE IN WINDOWS 8 IN THE AREA OF BIOMETRICS.  THIS IS GOT WINDOWS SIGN IN, REMOTE ACCESS

 

 YOU MAY ALSO LIKE: LOGIC OF COMPUTERS

YOU MAY ALSO LIKE: INTERNET PROTOCOL

YOU MAY ALSO LIKE: INKJET PRINTER

Comments

Popular posts from this blog

JOYSTICK WORKING AND DRIFT :GAMING TO AEROSPACE

  TITLE: THE EVOLUTION AND MECHANICS OF JOYSTICKS: FROM GAMING TO AEROSPACE INTRODUCTION: JOYSTICKS HAVE TRANSCENDED THEIR ORIGINS AS MERE GAMING PERIPHERALS TO BECOME INTEGRAL COMPONENTS IN VARIOUS INDUSTRIES, FROM AVIATION AND SPACE EXPLORATION TO MEDICAL EQUIPMENT AND INDUSTRIAL MACHINERY. THESE VERSATILE INPUT DEVICES HAVE EVOLVED SIGNIFICANTLY SINCE THEIR INCEPTION, OFFERING PRECISE CONTROL AND ERGONOMIC DESIGN. THIS ARTICLE DELVES INTO THE EVOLUTION, MECHANICS, AND DIVERSE APPLICATIONS OF JOYSTICKS ACROSS DIFFERENT FIELDS. HISTORY OF JOYSTICKS: THE CONCEPT OF THE JOYSTICK DATES BACK TO THE EARLY 20TH CENTURY WHEN IT WAS INITIALLY USED IN AVIATION FOR CONTROLLING AIRCRAFT. THE EARLIEST JOYSTICKS WERE SIMPLE MECHANICAL DEVICES CONSISTING OF A LEVER MOUNTED ON A PIVOT, WHICH PILOTS USED TO MANEUVER THEIR PLANES. OVER TIME, JOYSTICKS FOUND THEIR WAY INTO ARCADE GAMES, HOME CONSOLES, AND EVENTUALLY PERSONAL COMPUTERS, REVOLUTIONIZING THE GAMING INDUSTRY. MECHANICS OF JOY...

GENERAL FEATURES OF WINDOWS 7

  GENERAL FEATURES OF WINDOWS 7   EVERY LIVING BEING HAS SOME COMMON GENERAL FEATURES THAT DISTINGUISH THEM AMONG OTHER LIVING BEINGS.  FEATURES MEAN PROPERTIES THAT UNIQUELY IDENTIFY  THEM FROM OTHERS.  THIS APPLIES TO LIVING AS WELL AS NON LIVING THINGS ON EARTH.   I AM GOING TO SHOW FEW OF THEM.   SO LET’S BEGIN. WE ARE GOING TO DISCUSS ABOUT SOME FEATURES OF  WINDOWS 7   ·                  THE NEW TASKBAR  – THE TASKBAR IS LOCATED AT THE BOTTOM OF THE WINDOWS DESKTOP.  BY DEFAULT WHEN AN APPLICATION OPENS YOU WILL SEE ITS ICON APPEAR IN THE TASKBAR.  HOWEVER,  WHEN THE APPLICATION IS CLOSED, THE ICON GOES AWAY.  FOR COMMONLY ACCESSED APPLICATION, USERS CAN PLACE A PERMANENT ICON ON EITHER THE TASKBAR OR IN THE START MENU.  THIS IS REFERRED AS “PINNING”.  TO PIN A PROGRAM TO THE TASK BAR,...

CUSTOM CONFIGURATION OF A PC

  CUSTOM CONFIGURATION OF PC APART FROM BRANDED COMPLETE PC’S LIKE IMAC, HP, HCL THE USER CAN ASSEMBLE A PC ACCORDING TO HIS NEED AND USABILITY. GRAPHIC/CAD/CAM WORKSTATIONS A SURVEY REVEALED THAT 11 PERCENT OF GRAPHIC DESIGNERS AND ENGINEERS USED MOBILE WORKSTATIONS FOR CAD AND 8 PERCENT USED STANDARD PC NOTEBOOKS.   LAPTOP CONFIGURATIONS ARE NOT MADE TO GRAPHICS INTENSIVE ACRIVITIES LIKE CAD, NOR ARE THEY GFENERALLY BUILT FOR USE IN EXTREME CONDITION LIKE CONSTRUCTION SITES, OIL RIGS AND INDUSTRIAL PLANTS.   A GRAPHIC DESIGN OR CAD USABLE PC SHOULD HAVE A BETTTER PROCESSING SPEED BETTER QUALITY OF IMAGES.   THE FOLLOWING ARE THE SPECIFICATIONS TO CUSTOMIZE GRAPHIC DESIGN WORKSTATIONS.   POWERFUL PROCESSOR WHEN WE CONSIDER GRAPHIC DESIGN WORKSTATIONS, THE PROCESSOR POWER IS THE FIRST CRITERIA TO LOOK IN.   IT IS NECESSARY TO GAUGE THE PURPOSE OF THE MACHINE WHEN CHOOSING THE CPU PROFILE OF A COMPUTER. GRAPHIC DESIGN WORKSTATIONS AND COMPUTER ...