Basic Computer Thermodynamics

Written by Stephen Bucaro


Continued from page 1

If we moverepparttar air away fromrepparttar 107572 heat sink, it will takerepparttar 107573 heat energy with it. A fan mounted onrepparttar 107574 heat sink is used to moverepparttar 107575 air. This method of heat transfer is called convection. Eventually allrepparttar 107576 air insiderepparttar 107577 computer case will get hot, so fans are used to blowrepparttar 107578 air out ofrepparttar 107579 case ofrepparttar 107580 computer.

The heat has moved fromrepparttar 107581 CPU, torepparttar 107582 heat sink, torepparttar 107583 air insiderepparttar 107584 case, torepparttar 107585 air inrepparttar 107586 room where you're sitting at your computer desk. The room starts to get hot, and eventuallyrepparttar 107587 air conditioner turns on.

You can view an air conditioner as a "pipe". A fan blowsrepparttar 107588 hot air from your room through fins that transferrepparttar 107589 heat to a liquid. The liquid is piped to fins outsiderepparttar 107590 house. A fan blows cooler outside air pastrepparttar 107591 fins to removerepparttar 107592 heat fromrepparttar 107593 liquid.

The air conditioner has an evaporator valve that changesrepparttar 107594 liquid to a gas afterrepparttar 107595 heat is removed. In a gas,repparttar 107596 molecules are further apart than in a liquid. This causes it to cool down quite a bit more. The gas goes throughrepparttar 107597 fins insiderepparttar 107598 house, picking up heat. It is then compressed into a liquid to concentraterepparttar 107599 heat sorepparttar 107600 outside fins can removerepparttar 107601 heat more efficiently.

Shuttle's I.C.E. (Integrated Cooling Engine) Heat Pipe uses a very similar method to cool a CPU. The CPU has a heat sink with copper heat pipes. The heat ofrepparttar 107602 CPU causes liquid coolant insiderepparttar 107603 heat pipe to change to a gas. Convection created byrepparttar 107604 pressure ofrepparttar 107605 gas movesrepparttar 107606 coolant to a second heat sink where a fan is used to blowrepparttar 107607 heat out ofrepparttar 107608 computer's case. Releasingrepparttar 107609 heat causesrepparttar 107610 coolant to change back to a liquid. Gravity then carriesrepparttar 107611 coolant back torepparttar 107612 CPU heat sink.

One last method of heat transfer we haven't discussed yet is radiation. Some ofrepparttar 107613 heat ofrepparttar 107614 CPU andrepparttar 107615 heat sink is released as infrared radiation. Similar to light (although invisible to human eyes),repparttar 107616 radiation strikesrepparttar 107617 insides ofrepparttar 107618 computer case, causing it to get warm. Ultimatelyrepparttar 107619 computer case itself acts as a heat sink conducting heat torepparttar 107620 outside air.

This article explainsrepparttar 107621 three ways - conduction, convection, and radiation - that heat is transported from a computer CPU torepparttar 107622 air outsiderepparttar 107623 computer case. You now understandrepparttar 107624 thermodynamics of a computers and why it is important to maintain its various components.

---------------------------------------------------------- Resource Box: Copyright(C) Bucaro TecHelp. To learn how to maintain your computer and use it more effectively to design a Web site and make money onrepparttar 107625 Web visit bucarotechelp.com To subscribe to Bucaro TecHelp Newsletter visit http://bucarotechelp.com/search/000800.asp ----------------------------------------------------------

To learn how to maintain your computer and use it more effectively to design a Web site and make money on the Web visit bucarotechelp.com To subscribe to Bucaro TecHelp Newsletter visit http://bucarotechelp.com/search/000800.asp


All About Computer Viruses

Written by Kara Glover


Continued from page 1

So if I were you, I’d click on View onrepparttar toolbar in your Outlook or Outlook Express and closerepparttar 107571 preview pane. (You have to click on View and then Layout in Outlook Express.)

On a network at work? You could get a virus that way. Worms are viruses that come into your computer via networks, Kuo said. They travel from machine to machine and, unlike,repparttar 107572 classic viruses, they attackrepparttar 107573 machine itself rather than individual files.

Worms sit in your working memory, or RAM, Nachenberg said.

OK, so we’ve talked about howrepparttar 107574 viruses get into a computer. How do they cause so much damage once they’re there?

Let’s say you’ve caught a classic virus, one that replicates and attacks various files on your computer. Let’s go back torepparttar 107575 example ofrepparttar 107576 virus that initially infects your Microsoft Word program.

Well, it might eventually cause that program to crash, Nachenberg said. It also might cause damage to your computer as it looks for new targets to infect. This process of infecting targets and looking for new ones could eventually use up your computer’s ability to function, he said.

Oftenrepparttar 107577 destruction a virus causes is pegged to a certain event or date and time, called a trigger. For instance, a virus could be programmed to lay dormant until January 28. When that date rolls around, though, it may be programmed to do something as innocuous but annoying as splash popups on your screen, or something as severe as reformat your computer’s hard drive, Nachenberg said.

There are other potential reasons, though, for a virus to cause your computer to be acting slow or in weird ways. And that leads us to a new segment –repparttar 107578 reason virus writers would want to waste their time creating viruses inrepparttar 107579 first place.

The majority of viruses are still written by teenagers looking for some notoriety, Nachenberg said. But a growing segment ofrepparttar 107580 virus-writing population has other intentions in mind.

For these other intentions, we first need to explainrepparttar 107581 “backdoor” concept.

The sole purpose of some viruses is to create a vulnerability in your computer. Once it creates this hole of sorts, or backdoor, it signals home to mama or dada virus writer (kind of like in E.T.). Oncerepparttar 107582 virus writer receivesrepparttar 107583 signal, they can use and abuse your computer to their own likings.

Trojans are sometimes used to open backdoors. In fact that is usually their sole purpose, Kuo said.

Trojans are pieces of code you might download onto your computer, say, from a newsgroup. As inrepparttar 107584 Trojan War they are named after, they are usually disguised as innocuous pieces of code. But Trojans aren’t considered viruses because they don’t replicate.

Now back torepparttar 107585 real viruses. Let’s say we have Joe Shmo virus writer. He sends out a virus that ends up infecting a thousand machines. But he doesn’t wantrepparttar 107586 feds on his case. So he instructsrepparttar 107587 viruses onrepparttar 107588 various machines to send their signals, not of course to his computer, but to a place that can’t be traced. Hotmail email happens to be an example of one such place, Kuo said.

OK, sorepparttar 107589 virus writers now control these computers. What will they use them for? One use is to send spam. Once that backdoor is open, they bounce spam off of those computers and send it to other machines, Nachenberg said.

That’s right. Some spam you have in your email right now may have been originally sent to other innocent computers before it came to yours so that it could remain in disguise. Ifrepparttar 107590 authorities could track downrepparttar 107591 original senders of spam, they could crack down on spam itself. Spam senders don’t want that.

Ever heard of phishing emails? Those arerepparttar 107592 ones that purport to be from your internet service provider or bank. They typically request some information from you, like your credit card number. The problem is, they’re NOT from your internet service provider or your bank. They’re from evil people after your credit card number! Well, these emails are often sentrepparttar 107593 same way spam is sent, by sending them via innocent computers.

Of course makers of anti-virus software use a variety of methods to combatrepparttar 107594 onslaught of viruses. Norton, for instance, uses signature scanning, Nachenberg said.

Signature scanning is similar torepparttar 107595 process of looking for DNA fingerprints, he said. Norton examines programming code to find what viruses are made of. It adds those bad instructions it finds to its large database of other bad code. Then it uses this vast database to seek out and matchrepparttar 107596 code in it with similar code in your computer. When it finds such virus code, it lets you know!

©2004 by Kara Glover



Kara Glover is a Computer Tutor and Troubleshooter. You can find her articles and tutorials on topics such as Microsoft Word®, Excel®, and PowerPoint® on her website: http://www.karathecomputertutor.com


    <Back to Page 1
 
ImproveHomeLife.com © 2005
Terms of Use