Why everyone hated Apple and why they were wrong
Apple's latest technical solutions have made a lot of noise. In the iPhone 7, the jack slot disappeared, in the new MacBook the usual connectors are replaced with USB Type-C…

Continue reading →

Rules of work and behavior on the Internet
Every Internet user should be clearly aware that the Internet can not only benefit, but also cause considerable harm. To avoid trouble, strictly follow the recommendations and rules listed below.…

Continue reading →

Disabling Unnecessary Windows Services
This article provides specific recommendations about which services in Windows can be safely turned off with one caveat: if you are dealing with your personal computer that is not included…

Continue reading →

and which

Computer assembly

Installation is performed in this order: first, the processor, cooler, random access memory (RAM), motherboard, video card, power supply, hard drive and optical drive. Also consider the problems when you turn it on.

Processor Installation.

It is most convenient to start assembling the computer by installing the processor, cooler and memory modules on the motherboard, while it is not yet installed in the case. Of course, you can first put the motherboard in the case, and then put the processor. But in this case, it is unlikely to get a cooler without Continue reading

Video card

A video card is also a graphics accelerator, a computer component responsible for outputting images and generating graphics, for example, in games. The video card is necessary for the computer to work, otherwise it just won’t start, and the picture doesn’t appear. At the moment, there are various types of accelerators, for home systems (desktop), mobile (laptops, communicators and even telephones), for semi-professional and professional use. There are also differences in “acceleration goals”, there are two-dimensional graphics accelerators (2D) and three-dimensional graphics accelerators (3D). 2D accelerators do not always work with 3D graphics, but they are more likely to be semi-professional and professional accelerators; they serve mainly for working, for example, with photography (for example, in magazines that print). But do not think that 3D accelerators do not work with 2D graphics, they work! just focus on 3D. Video cards for home computers are all 3D accelerators.

The main parameters of video cards can be called: graphics processor, type and amount of memory, Continue reading

RAM

Random access memory – it is the RAM (RAM), it is also an opertivka. Serves for temporary storage of data with which the central processor works. Surely some are asking the question “why?”, Because there is a hard drive, there is memory in the processor. The answer is simple, the need to store more and more operational data is constantly growing and the processor memory (cache) is very small for that, with regards to the hard disk, some data is stored on it, but only a part, the speed of RAM is much faster than the speed of working with hard disk, because RAM is used.

The main characteristics of RAM are: memory type, memory speed, timings, form factor, volume.
Type of memory – with the development of technology and computer technology, more and more types of memory appear, more precisely, newer ones remove old ones from the market. At the moment, DDR3 is common, although so Continue reading

Child lock
I think many visitors to the site have children. Everyone certainly has a computer. And now you just have to turn away, as the child begins to play on the…

...

Monitor
The monitor is no secret to anyone, it shows us a picture, it’s difficult to work without it. At the moment, on the market you can find LCD monitors. In…

...

CSS layouts: fixed, rubber, elastic. Pros and cons
What layout layout (using Cascading Style Sheets, CSS) can be considered the best? Each of them has its own hacks (quirks) and its own unique pros and cons. Will one…

...

How to protect a site from hacking by a hacker
With an insecure site, many troubles can happen: hacking by hackers, attacks, virus infection. Some of the most common attacks: XSS attack. The virus code is embedded in the data…

...