Identifying Purposes and Characteristics of Processors
Identifying Purposes and Characteristics of Memory
How to Disassembling and Reassembling Laptops.
How to Installing and Configuring Expansion Cards
What are the different types of RAM and what are the differences between DDR2, DDR3, and DDR4. Describe how each type of ram is different than the other.
One of the issues that some companies face is how to dispose of computer securely so information does not leak. We all know that even if you format a harddrive, information remains on it. What methods are there to dispose of harddrive securely so there is no chance of information being leaked from the company?
PC Security should be multi-layered in order to provide the best defense. Securing the hardware is one important aspect in that multi-layered approach. Items such as security cables, security tokens, biometrics, disk encryption, and even chip-based technologies, such as secure processors, all provide layers of protection for computing devices.
Discuss the following questions:
• What benefits do various hardware security methods offer?
• What drawbacks can they impose?
• Which method, or combination of methods, would you recommend to be implemented at a medium-sized business and why?
Cite at least one trusted resource.
Discuss the differences between standard PCI and PCI Express (PCIe). How will increasing computer power change motherboard configuration?
Cite at least two trusted resources.
The components needed in the computer; such as processors, chipsets, memory system, storage, and expansion cards. What hardware security should be factored in, in relation to these components?