Complete the anatomy of my computer table

Assignment Help Basic Computer Science
Reference no: EM13938605

Complete the Anatomy of My Computer table below. In order to gather the information you can look at your computer's documentation or go to the manufacturer's website and search for your computer. Include your findings in the cell to the right of the item. Anatomy of My Computer I have a Macbook Air

1. Make and model of computer

2. Type (desktop, laptop, netbook)

3. Hard drive size

4. RAM How much do you have? How much can your computer hold?

5. Central Processing Unit (CPU): Type, number of processors, and Speed

6. Does it have a built-in webcam and microphone?

7. Type of video card

8. Type of sound card

9. Type of speakers

10. Monitor size? Maximum resolution? Ports and Power Controls (30 points)

1. Take a photo of your computer's ports. Depending upon your computer, you may have to take more than one photo to capture all of your ports.

2. Paste the photo(s) into the cell below. Here is a tutorial on how to add and compress a picture/image using MS Word. Be sure to compress your added pictures to minimize your file size. (2 points)

3. Label your ports with the port name. Here is a tutorial on how to add text to an image using MS Word. (8 points) Paste photo here. Based upon the ports you have labeled on your computer image(s), identify which port the following external devices would utilize. If your computer does not have an available port for the device, determine what type of adapter you will need. (2 points/each peripheral) Type of Port/Connection Does your computer have this port? If no, what sort of adapter do you need?

Based upon the ports you have labeled on your computer image(s), identify which port the following external devices would utilize. If your computer does not have an available port for the device, determine what type of adapter you will need. (2 points/each peripheral)

 

Type of Port/Connection

Does your computer have this port?

If no, what sort of adapter do you need?

External hard drive

Digital camera

   

Flash drive

   
Headphones/Speaker    
Mouse    
Keyboard    
Modem/Router    
Printer    
HDTV

Reference no: EM13938605

Questions Cloud

Please correct the errors with replacement lines : Please correct the errors with replacement lines beside it. And then give short notes on why it is wrong.
Which symbol would be used in a flowchart : Which symbol would be used in a flowchart for the following statement?Read customerName
What is the meaning of negative residual income or eva : What is residual income? What is EVA? How does EVA differ from the general definition of residual income? Can residual income or EVA ever be negative? What is the meaning of negative residual income or EVA?
Describe the nature of decalcified bone : Two common blisters of the integument are watery blisters, filled with a clean fluid, and blood blisters, filled with blood. Based on your knowledge of the blood supply to the integument, describe what layer might be damaged in the these two blist..
Complete the anatomy of my computer table : Complete the Anatomy of My Computer table below. In order to gather the information you can look at your computer's documentation or go to the manufacturer's website and search for your computer. Include your findings in the cell to the right of the ..
Summarize the main purpose of the immigration act : Summarize the main purpose of The Immigration Act of 1924. State the primary focus of the U.S. antiterrorist policy today. Define "right-wing terrorists" and give an example. Distinguish between international terrorism and home-grown or home-land ter..
Based on the balance in retained earnings : Based on the balance in retained earnings, which of the two dividend plans is more restrictive on future cash dividends?
A program that accepts insurance policy data : A program that accepts insurance policy data, including a policy number, customer last name, customer first name, age, premium due date (month, day, and year), and number of driver accidents in the last three years. If an entered policy number is not..
Explain why even after large-scale blood loss : Ms. Palmer is brought to the emergency room after being stabbed during a mugging. She is hemorrhaging and has a rapid, thread pulse, but her blood pressure is within normal limits. What effect does a drop in blood volume have on blood pressure?

Reviews

Write a Review

Basic Computer Science Questions & Answers

  Wi-fi used to support mobile computing and m-commerce

Explain ways in which Wi-Fi is being used to support mobile computing and m-commerce. Also explain ways in which Wi-Fi is affecting the use of cellular phones for m-commerce.

  Evaluate for risk management purposes

Choose three information assets that a typical organization has and evaluate for risk management purposes which vulnerability should be evaluated for additional controls first?

  Fsm packet sending and receiving protocols

Consider a scenario in which a Host, A, wants to simultaneously send messages to Hosts B, C, and D. A is connected to B, C, and D via a broadcast channel, and a packet sent by A is carried by this channel to each of B, C, and D.

  An information systems project to increase data security

What issues need to be considered when planning an information systems project to increase data security

  Explaining multicategory case a set of samples

In multicategory case a set of samples is said to be linearly separable if there exists linear machine which can classify them all correctly.

  Explain effects of compaction on normal processing

What about if you upgrade to memory that can be read or written to in 1nsec? Comment briefly on the effects of compaction on normal processing.

  Write method determines pair integers whether multiple first

Write method multiple that determines, for a pair of integers, whether the second integer is a multiple of the first. The method should take two integer arguments and return true if the second is a multiple of the first and false otherwise.

  What types of threats does the tool mitigate

Research various security tools that an employee can use to keep his or her data safe or to thwart denial of service attacks.

  Develop an i/o port decoder

Using a PLD, develop an I/O port decoder that generates the following high-bank I/O strobes: 300DH, 300BH, 00B6H, and 00EEH.

  Calculations and reporting

Project managers do a lot more than calculations and reporting; they must keep the team on track, ensure ethical decisions are made, deal with conflict, and, depending on the type of organization, they may perform employee evaluations, issue bonuses,..

  Show that curve lies lies on intersection of the cylinders

show that the curve lies lies on the intersection of the cylinders y=[2(z+1)^2]/9 and x=[(z+1)^4]/81

  Write a method switchpairs that switches the order

Write a method switchPairs that switches the order of elements in a linked list of integers in a pairwise fashion. Your method should switch the order of the first two values, then switch the order of the next two, switch the order of the next two..

Free Assignment Quote

Assured A++ Grade

Get guaranteed satisfaction & time on delivery in every assignment order you paid with us! We ensure premium quality solution document along with free turntin report!

All rights reserved! Copyrights ©2019-2020 ExpertsMind IT Educational Pvt Ltd