Linux operating systems
Linux is not an operating system, but just its kernel. Everything that you are accustomed to see and understand as an OS (buttons, windows and panels) - in fact, it…

Continue reading →

BIOS update
Updating (flashing) the BIOS of any device is a responsible procedure. I do not write difficult, because there is nothing complicated there. However, any error made while updating the firmware…

Continue reading →

Ways to replace the motherboard without reinstalling for Windows 7
As a rule, after upgrading the computer with replacing the motherboard, the user has to install the operating system “clean”, installing the necessary programs along the way. All this can…

Continue reading →

temporary storage

RAM

Random access memory – it is the RAM (RAM), it is also an opertivka. Serves for temporary storage of data with which the central processor works. Surely some are asking the question “why?”, Because there is a hard drive, there is memory in the processor. The answer is simple, the need to store more and more operational data is constantly growing and the processor memory (cache) is very small for that, with regards to the hard disk, some data is stored on it, but only a part, the speed of RAM is much faster than the speed of working with hard disk, because RAM is used.

The main characteristics of RAM are: memory type, memory speed, timings, form factor, volume.
Type of memory – with the development of technology and computer technology, more and more types of memory appear, more precisely, newer ones remove old ones from the market. At the moment, DDR3 is common, although so Continue reading

Computer assembly
Installation is performed in this order: first, the processor, cooler, random access memory (RAM), motherboard, video card, power supply, hard drive and optical drive. Also consider the problems when you…

...

How to protect a site from hacking by a hacker
With an insecure site, many troubles can happen: hacking by hackers, attacks, virus infection. Some of the most common attacks: XSS attack. The virus code is embedded in the data…

...

Monitor
The monitor is no secret to anyone, it shows us a picture, it’s difficult to work without it. At the moment, on the market you can find LCD monitors. In…

...