Basic Computer Thermodynamics

Written by Stephen Bucaro


---------------------------------------------------------- Permission is granted forrepparttar below article to forward, reprint, distribute, use for ezine, newsletter, website, offer as free bonus or part of a product for sale as long as no changes are made andrepparttar 107572 byline, copyright, andrepparttar 107573 resource box below is included. ----------------------------------------------------------

Basic Computer Thermodynamics

By Stephen Bucaro

That desk in front of you and everything else around you is made up of atoms. An atom consists of electrons orbiting around a nucleus. An atom is increadibly tiny. You could line up 10 million of them inside a millimeter. What if we could scale up an atom so thatrepparttar 107574 nucleus wasrepparttar 107575 size of a basketball? The orbits of its electrons would then be 15 miles away.

From this you can understand that atoms are almost all empty space. The nucleus ofrepparttar 107576 atom is composed of quarks. If you could see a quark or an electron up close, it might appear as a tiny vibrating glow of energy. It turns out this world, which is causing us so many problems and so much stress, is mostly an illusion!

The electrons orbitrepparttar 107577 nucleus at aboutrepparttar 107578 speed of light. If you could see them, they might appear as a blur. They do not orbit in a plane likerepparttar 107579 pictures in books. They create a shell. Sometimes two or more atoms will share electrons, causing them to link together forming a molecule.

Looking at that desk in front of you again, it looks pretty solid. Actually, unless your desk is floating in deep space whererepparttar 107580 temperature is close to absolute zero,repparttar 107581 molecules of your desk are vibrating like crazy. Picturerepparttar 107582 molecules bouncing around and smacking into each other like balls on a pool table.

If you have ever played pool, you're very familiar with how when a pool ball hits another pool ball, it transfers it's energy torepparttar 107583 second pool ball. When heat causes molecules to vibrate, they transfer energy between each other in a similar fashion. This action is called "conduction".

Now picturerepparttar 107584 CPU of a computer cooking away becauserepparttar 107585 designer wants to push too much power through a small piece of silicon. If we don't take away that heat as fast as it's created, that CPU will fry!

The problem is usually solved by mounting a heat sink onrepparttar 107586 CPU. Conduction causesrepparttar 107587 heat to move fromrepparttar 107588 hot CPU torepparttar 107589 cooler heat sink. Because air doesn't conduct heat as well as metal, We apply a thin layer of heat sink compound betweenrepparttar 107590 CPU andrepparttar 107591 heat sink to fill in any gaps.

You'll notice that a heat sink has fins on it. The fins allowrepparttar 107592 heat sink to conductrepparttar 107593 heat torepparttar 107594 air adjacent torepparttar 107595 fins. The fins provide more surface area to aid in conduction. Eventuallyrepparttar 107596 adjacent air will get as hot asrepparttar 107597 heat sink and conduction will cease.

All About Computer Viruses

Written by Kara Glover


All About Computer Viruses

Feel Free to reprint this article in newsletters and on websites, with resource box included. If you use this article, please send a brief message to let me know where it appeared: kara333@earthlink.net

Word Count = 1,500 Word Wrapped to 60 characters per line URL: http://www.karathecomputertutor.com Author photo: http://www.karathecomputertutor.com Date of copyright: November 2004

All About Computer Viruses by Kara Glover kara333@earthlink.net

Your computer is as slow as molasses. Your mouse freezes every 15 minutes, and that Microsoft Word program just won’t seem to open.

You might have a virus.

Just what exactly is a virus? What kind is in your computer? How did it get there? How is it spreading and wreaking such havoc? And why is it bothering with your computer anyway?

Viruses are pieces of programming code that make copies of themselves, or replicate, inside your computer without asking your explicit written permission to do so. Forget getting your permission down on paper. Viruses don’t bother to seek your permission at all! Very invasive.

In comparison, there are pieces of code that might replicate inside your computer, say something your IT guy thinks you need. Butrepparttar code spreads, perhaps throughout your office network, with your consent (or at least your IT guy’s consent). These types of replicating code are called agents, said Jimmy Kuo, a research fellow with McAfee AVERT, a research arm of anti-virus software-maker McAfee Inc.

In this article, though, we’re not talking aboutrepparttar 107571 good guys, orrepparttar 107572 agents. We’ll be talking aboutrepparttar 107573 bad guys,repparttar 107574 viruses.

A long, long time ago in computer years, like five, most viruses were comprised of a similar breed. They entered your computer perhaps through an email attachment or a floppy disk (remember those?). Then they attached themselves to one of your files, say your Microsoft Word program.

When you opened your Microsoft Word program,repparttar 107575 virus replicated and attached itself to other files. These could be other random files on your hard drive,repparttar 107576 files furthest away from your Microsoft Word program, or other files, depending on howrepparttar 107577 virus writer wantedrepparttar 107578 virus to behave.

This virus code could contain hundreds or thousands of instructions. When it replicates it inserts those instructions, intorepparttar 107579 files it infects, said Carey Nachenberg, Chief Architect at Symantec Research Labs, an arm of anti-virus software-maker Symantec. Corp.

Because so many other types of viruses exist now,repparttar 107580 kind just described is called a classic virus. Classic viruses still exist but they’re not quite as prevalent as they used to be. (Perhaps we could put classic viruses onrepparttar 107581 shelf with Hemingway and Dickens.)

These days, inrepparttar 107582 modern era, viruses are known to spread through vulnerabilities in web browsers, files shared overrepparttar 107583 internet, emails themselves, and computer networks.

As far as web browsers are concerned, Microsoft’s Internet Explorer takes most ofrepparttar 107584 heat for spreading viruses because it’s used by more people for web surfing than any other browser.

Nevertheless, “Any web browser potentially has vulnerabilities,” Nachenberg said.

For instance, let’s say you go to a website in IE you have every reason to think is safe, Nachenberg said.

But unfortunately it isn’t. It has virus code hidden in its background that IE isn’t protecting you from. While you’re looking atrepparttar 107585 site,repparttar 107586 virus is downloaded onto your computer, he said. That’s one way of catching a nasty virus.

Duringrepparttar 107587 past two years, another prevalent way to catch a virus has been through downloads computer users share with one another, mostly on music sharing sites, Kuo said. On Limewire or Kazaa, for instance, teenagers or other music enthusiasts might think they’re downloading that latest Justin Timberlake song, when in reality they’re downloading a virus straight into their computer. It’s easy for a virus writer to put a download with a virus on one of these sites because everyone’s sharing with everyone else anyway.

Here’s one you might not have thought of. If you use Outlook or Outlook Express to send and receive email, do you have a preview pane below your list of emails that showsrepparttar 107588 contents ofrepparttar 107589 email you have highlighted? If so, you may be putting yourself at risk.

Some viruses, though a small percentage according to Nachenberg, are inserted straight into emails themselves.

Forget openingrepparttar 107590 attachment. All you have to do is viewrepparttar 107591 email to potentially get a virus, Kuo added. For instance, have you ever opened or viewed an email that states it’s “loading”? Well, once everything is “loaded,” a virus inrepparttar 107592 email might just load onto your computer.

Cont'd on page 2 ==>
 
ImproveHomeLife.com © 2005
Terms of Use