Featured

    Featured Posts

    Social Icons

Loading...

The following table lists server requirement

Software refers to a program or a set of instructions and applications used to manage and control various functions of a device such as a computer. There are two main categories of computer software: system software and application software. System software is a basic requirement for any computer, as it controls all main functions and integrates all parts into a unitary system. An example of a system software is an operating system. Without software computer is useless. Application software serves more specific purposes, such as creating databases and spreadsheets or processing images. Application software is available as single programs, software packages or software suites
Hardware is the collection of physical components that constitute a computer system. Computer hardware is the physical parts or components of a computer, such as monitor, keyboard, computer data storage, hard disk drive (HDD), graphic card, sound card, memory (RAM), motherboard, and so on, all of which are tangible physical objects.
The physical and virtual server requirement in this guide will vary based on the number of users at institution like NIT. The following are the requirement for software and hardware in an institution like NIT which may have a population close to four thousand people which are 
Server Requirements
The following table lists server requirement;
  • CPU; Each server must have at least two Intel Xeon 2 GHz processors. Having a dual core processor does not take the place of multi-processors. At least two Intel Xeon processor E5-2400 or E5-2400 v2 or better.
  • RAM; 64-bit servers require a minimum of 8 GB, 64-bit servers: 16 GB or more.
  • Hard Disk Storage; Two (2) RAIDs are required for ENPS server operations in any environment. Common configurations include: RAID-5: 3 x 60 GB 10k RPM+ SCSI or SAS drives or RAID-1: 2 x 120 GB 10k RPM+ SCSI or SAS drives. This must be a hardware-based RAID; software based RAIDs will not work
  • Operating System; Windows Server 2008 (32-bit), Windows Server 2008 (32-bit) or Windows Server 2008 R2 (64-bit), Windows Server 2012 (64-bit), and Windows Server 2012 R2 (64-bit). The operating system you are using must have the latest Microsoft service packs and security patches installed. Microsoft .NET Framework 4.X must be installed
  • Wire Ingestion; If your server will be ingesting AP Web Feeds or any Social Media feeds, an Internet connection is required. Multi-port serial card such as Control Rocket port for each incoming serial port-based wire feed.
  • Network Interface Card; 10/100BASE-T minimum; The card must support TCP/IP in a Windows networking environment. 
  • Backup System; A network-based or local backup system is strongly recommended.
  • Parallels

  • Fusion

  • Boot Camp

  • Windows on Apple Hardware
  • VNC


  In these cases, client as it is run within the Microsoft Windows Operating System. Specific technologies required to bring the Windows Operating System to the Apple desktop are provided by third parties. Third party technologies bring with them specific feature sets. As with Windows System Administrators, Apple System Administrators should be familiar with the Apple OS as well as specific third party applications and features.


  • The anti-virus software may have kernel-level conflicts with Microsoft's Index Server or the Windows Search Service.
  • When new material is added to the server it may take significantly longer to add it to the index and therefore will not be available through Search as quickly.
  • The index may be corrupted frequently. If it is corrupted, re-indexing will take significantly longer to complete. The Index Server may attempt to repair itself from a conflict by re-scanning the indexed drives which can significantly degrade
  • server speed.
  • Unscheduled Master Merges may occur several times a day. This can also decrease server performance.
  • Set the anti-virus software to perform scheduled scans instead of real-time scans.
  • If you must do real-time scans exclude the data drive(s), which are usually D: on a single-partition system and F:, G: and H: on a multi-partition system. 
  • CPU; Pentium IV 1 GHz or faster is recommended
  • Supported Operating Systems; Windows XP Professional, Windows Vista Professional or Windows 7 Professional. Home. Editions are not supported. The operating system must be installed with the latest Service Pack from Microsoft. The workstation must have a Server Client Access License and it must be a member of your site's
  • Windows domain.
  • Prompter; It is recommended that you use +Win Plus+ as the primary or backup prompter. The +Win Plus+
  • prompter is an ISA/PCI hardware board with NTSC/PAL outputs. It comes with a hand controller
  • and can be locked.
  • RAM
  • Video Card Memory
  • Hard Disk
  • Network Interface
  • Card
The highest value, also considered the maximum, can be expressed in decimal value as 2 (2 represents the fact
x



Hard Drives
On 64-bit operating systems, a minimum of 6 hard drives (SCSI, SAS, SSD or similar enterprise-level storage devices) are required for best performance; 8 drives allow for highest availability. 3.5” platter hard drives are preferred as they have been found to provide slightly better performance compared to 2.5” drives. SSD drives have not shown to offer significant performance increases to justify their increased cost at present, although this may change. 
Client Requirements; The following lists minimum hardware and software requirements for the client workstation:
 Client on a Mac-Based Computer; The client application will run on a Mac when combined with the following third party applications: 
Any Mac workstation that is to be used to host an client on a Mac-based computer should not only meet the minimum specifications of the software being used to host the environment in which the client is run, but the resources allocated to that environment should meet or exceed the normal client minimum specifications.
Anti-virus Recommendations
The Associated Press recommends against using anti-virus software with real-time scanning. Doing so may result in the following issues:
These risks can be severe but they do not always occur. If you accept the potential consequences of running anti-virus software on server following these steps to reduce the likelihood of encountering problems:
If you experience frequent Search or indexing problems while running anti-virus software you may need to disable or uninstall the anti-virus software while you troubleshoot.

Prompter Requirements; Refer to your prompter or captioning manual for information about the hardware requirements for your setup. You can use the following requirements as general guidelines:

The smallest piece of data in a computer is known as a bit or binary digit. We know that computer only understands binary language (the 0s and 1s), so, each and every bit can have only one binary value, either 0 or 1. A computer stores data in a collection of such bits known as a byte. 8 bits make up a byte, also called an octet. The following are the differences between 32-bit and 64-bit
64-bit processor is more capable than a 32-bit processor because it can handle more data at once. A 64-bit processor is capable of storing more computational values, including memory addresses, which means it’s able to access over four billion times as much physical memory than a 32-bit processor.
Another difference between 32-bit processors and 64-bit processors is the number of calculations per second they can perform, which affects the speed at which they can complete tasks. 64-bit processors can come in dual core, quad core, six core, and eight core versions for home computing. Multiple cores allow for an increased number of calculations per second that can be performed, which can increase the processing power and help make a computer run faster. Software programs that require many calculations to function smoothly can operate faster and more effective 
Another difference between 32-bit processors and 64-bit processors is the maximum amount of memory (RAM) that is supported. 32-bit computers support a maximum of 3-4GB of memory, whereas a 64-bit computer can support memory amounts over 4 GB. This feature is important for software programs used in graphic design, engineering, and video editing as these programs have to perform many calculations to render their images. Efficiently on the multi-core 64-bit processors, for the most part.
Many 32-bit programs can run on a 64-bit operating system (OS), 64-bit programs are not compatible with 32-bit operating systems.
32-bit processors are perfectly capable of handling a limited amount of RAM (in Windows, 4GB or less), and 64-bit processors are capable of utilizing much more. Of course, in order to achieve this, your operating system also needs to be designed to take advantage of the greater access to memory.
Improved security in 64-bit Windows over the 32-bit version. This is due to the mandatory driver signing, enabling of hardware-based DEP , WOW64 abstraction (for 32-bit processes) and kernel patch protection features that are only included in the 64-bit versions. The larger 64-bit ASLR pool can also offer better protection, but most newer exploits (can) use some clever workarounds to red
 The 64-bit operating systems are designed to support more RAM than the 32-bit ones. Heavy applications like image editing software, AutoCAD, and games could have a considerable performance boost after your machine is packed with 16 exabytes of RAM, at least theoretically. The limit of physical memory that can be used, depends on the fact whether your motherboard will accept it or notice it.
The minimum amount of RAM required for a 64-bit OS is 2 GB in comparison to 32-bit Windows which requires 1 GB RAM. It’s somewhat obvious because with large-sized registers more memory will be required. You should pack a memory chip of size 4 GB if you experience the 64-bit Windows in action. The Home edition of Windows 10 can deal with 128 GB while the Pro has some serious limits, up to 2048 GB. You can stuff your machine with as much RAM you like.
64 bit version can deal with physical memory (RAM) above 4 GB and up to 128GB (yes, it exists!) while 32-bit version can address RAM up to 4 GB only. Therefore, if you have a 32 bit version of Windows installed on your computer then installing RAM above 4 GB doesn’t make sense. 
The 64-bit version of Live can use a theoretical maximum of 16 exabytes of RAM - much more RAM than computers actually have. This means you can work with Live Sets (natively, with third-party plug-ins, and in ReWire configurations) that are much larger and more memory-intensive than in the 32-bit version.
64-bit version of Live has a better system integration and therefore performs better than a 32-bit version on my 64-bit operating system.
The another difference between 32-bit processors and 64-bit processors is the speed they operate. 64-bit processors can come in dual core, quad core, and six core versions for home computing (with eight core versions coming soon). Multiple cores allow for increase processing power and faster computer operation. Software programs that require many calculations to function operate faster on the multi-core 64-bit processors, for the most part. It is important to note that 64-bit computers can still use 32-bit based software programs, even when the Windows operating system is a 64-bit version.

32 bit processors are processing 32 bits of data based on Ghz of Processor in per second and 64 bit processors are processing 64bit of data per second on what speed your PC has. as well the 34 bit processors works with 4GB of RAM.
In the end, 64-bit processors are becoming more and more commonplace in home computers. Most manufacturers build computers with 64-bit processors due to cheaper prices and because more users are now using 64-bit operating systems and programs. Computer parts retailers are offering fewer and fewer 32-bit processors and soon may not offer any at all.
  • To better organize the information that it contains, one or more units can be created on a drive. Each unit is called a folder. When (the disc of) a drive is created, it doesn't contain folders. When the operating system is installed, it creates a few folders. You also can create a folder and you have many alternatives.
    When it comes to folders, a drive is called the root folder or simply, the root. To create a folder in the root, in Windows Explorer or My Computer:
    •   In the left frame, click the drive. On the main menu, click File  New  Folder and give it a name
    •   In the left frame, click the drive. In the right frame, right-click a white empty area  position the mouse on
New  click Folder. Then give it a name
You can also create a folder inside of another. The folder that will contain the new one is referred to as the parent folder. The other will be referred to as a child folder. To create a folder in another folder, in Windows Explorer or My Computer:
 In the left frame, expand the drive by clicking its + button. Under the drive, click the folder name. If the new folder will be created inside of another folder that itself has a parent, expand it also and click the parent folder. On the main menu, click File  New  Folder and give it a name
52/59, Nov - 2010 Learn to Know Why and How! adebisijeleel@yahoo.com or adebisijeleel@gmail.com
Computer Training Expert Solution Consults Computer Basics  In the left frame, click the drive and click the parent folder. In the right frame, right-click the parent folder,
position the mouse on New and click Folder, then give it a name
You can also create a folder when saving a file. To do this, in the dialog box that comes up, click the Create New Folder button and give it a name.
Naming a Folder
There are some suggestions you should follow and various rules you must observe when naming a folder:
  •   The name of a folder can be a single letter or a digit
  •   The name of a folder can also be a single special character except the following: | > / : \ < ? * and "
  •   The name of a folder can be a combination of letters, digits, and some special characters
    As a suggestion, you should use a name that indicates what is stored in the folder. This makes it easy to find information.
    Archive
    Archives are files that contain other files. Typically the files in an archive are compressed. Archives usually have file names ending with ZIP, LZH, ARJ, or ARC, depending on how they were created. Archives make it easy to group files and make transporting and copying these files faster.
    Typical Uses of Archives
  •   Most files available on the Internet and on electronic services like America Online are distributed as archives. Two benefits of using archives for electronic file distribution are that only one file transfer operation ("download") is required to obtain all related files, and file transfer time is minimized because the files in an archive are compressed.
  •   It is often useful to send a group of related files to an associate. Rather than distributing individual files it is often easier to distribute the files as an archive to benefit from the file grouping and compression.
  •   Some files are important but not used often. To save disk space simply compress these files into an archive when they are not used, and decompress them only when needed.
    Self-Extracting Zip File
    A self-extracting Zip file is an executable program file (.EXE file) that includes both a Zip file and software to extract or "unzip" the contents of the Zip file. Users can extract the contents of a self-extracting Zip file by simply running it. This is convenient, because the end user does not need an unzip program (like WinZipÆ) to extract files from these self-extracting archives.
    WinZip Self-Extractor Personal Edition, included with WinZip, creates Windows self-extracting Zip files.
    Archive formats:
 Zip files are the most common archive format. Zip files can span multiple disks, and provide both compression and file grouping. WinZip does not use external programs to work with Zip files.
53/59, Nov - 2010 Learn to Know Why and How! adebisijeleel@yahoo.com or adebisijeleel@gmail.com
Computer Training Expert Solution Consults Computer Basics
  •   TAR, Z, GZ, TAZ, and TGZ files are often found on Unix-based Internet sites. TAR stands for "Tape ARchive". The TAR format does not provide compression; it is used only to group files. GZ and Z files are gzip files. GZ and Z files cannot contain multiple files. TAZ and TGZ files are TAR files compressed in the gzip format. Since almost all new archives are created in Zip format, WinZip does not provide facilities to add to or create files in these formats (however, all other WinZip functions are supported). WinZip does not use external programs when working with files in these formats.
  •   File formats such as UUencoded, XXencoded, BinHex, and MIME are used primarily to transfer binary files by Internet e-mail. If you encounter one of these files, you can open it and extract its contents with WinZip. You can UUencode an archive using the UUencode entry in the WinZip Actions pull-down menu. WinZip does not use external programs when working with files in these formats.
  •   WinZip also handles most files in the old Microsoft Compress format (also known as LZEXPAND format). However, there are several variations on this format, and Microsoft has not released documentation on these variations. WinZip issues an appropriate message if you attempt to decompress a file not supported by your version of Windows. Microsoft Compress files usually end with a trailing underscore, for example, "commdlg.dl_". Like Z and GZ files, Microsoft Compress format files contain only one file. This format is used for many files on the Windows 3.1 distribution disks and many older Microsoft products. Note that not all files ending with an underscore are Microsoft Compress format files. WinZip does not use external programs when working with files in these formats.
  •   The Microsoft CAB (short for Cabinet) format is used by most Microsoft setup programs, including those used to install Windows. CAB files provide both file compression and file grouping. You can use WinZip to open and extract the contents of CAB files. WinZip will handle most self-extracting CAB files. WinZip does not use external programs when working with CAB files.
  •   ARC, ARJ, and LZH are older formats that provide both grouping and compression, like Zip files. Unlike other supported file formats, WinZip's optional support for these formats requires external programs that are not included as part of the WinZip distribution.
    Files
    In our introductions, we defined a document as what you create in an application. In a word processor, the characters you type constitute a document. For a graphics application, the drawings you perform or the picture you manipulate is called a document. In order to keep such a document for later use, you must store it somewhere. A file is an object used to hold a document. Put it another way, in order to have a file, you must save a document. We have mentioned how to save a document. Like a folder, you must name a file when saving a document. The name of a file follows the same rules we defined for a folder.
    FILE MANAGEMENT
    Bits and Bytes
    To hold information, a medium such as a hard disk uses a system that resembles a combination of small boxes. Let's illustrate it as follows:
    This box can hold only a small piece of information. It can only be either 0 or 1. When the box is empty, it holds a value of 0. When it is full, it holds a value of 1:
    54/59, Nov - 2010 Learn to Know Why and How! adebisijeleel@yahoo.com or adebisijeleel@gmail.com
Computer Training Expert Solution Consults Computer Basics
0 1
You can represent a piece of information with one of two states. This box used to represent a value is called a binary digit; in its abbreviated form, it is called a bit (for binary digit).
0000, 0001, 0010,
0101, 0110, 0111,
1010, 1011, 1100,
1111
0011, 0100
1000, 1001
1101, 1110
This produces the following binary combinations: 0000, 0001, 0010, 0011, 0100, 0101, 0110, 0111, 1000, 1001, 1010, 1011, 1100, 1101, 1110, 1111 = 16 combinations. When using the decimal system, these combinations can be represented as 0, 1, 2, 3, 4, 5, 6, 7, 8, 9, 10, 11, 12, 13, 14, and 15.
This combination is also a system that the computer uses to count bits internally. This technique is valuable and allows you to always identify a number as a divider of 4.
When all bits of a group of 4 are 0, the combination has the lowest value, which is 0000. Any of the other combinations has at least one 0 bit, except for the last one. When all bits are 1, this provides the highest value possible for a group of 4 bits. The lowest value, also considered the minimum value, can be represented as 0.
4
that there are two possible states: 0 and 1; 4 represents the fact that there are four possible combinations), which
4 is16.Thisproduces16because2 =16.
A combination of 8 consecutive bits is called a byte. The bits are counted from right to left starting at 0:
You can represent a byte using a combination of 0s and 1s. If you have the patience to create combinations of bits using the boxes as we did for the group of 4, you would find out that there are 256 possible combinations. Another way to find it out is by using the base 2 technique:
76543210 2+2+2+2+2+2+2+2
= 128 + 64 + 32 + 16 + 8 + 4 + 2 + 1 = 255
55/59, Nov - 2010 Learn to Know Why and How! adebisijeleel@yahoo.com or adebisijeleel@gmail.com

Computer Training Expert Solution Consults Computer Basics
Therefore, the maximum decimal value you can store in a byte is 255. Remember that the byte with all bits having a value of 0 has its value set to 0. Since this byte also holds a valid value, the number of combinations = 255 + 1 = 256.
The only type of information you can store in a byte is a character or symbol, such as a readable letter from the alphabet: a, b, c, d, e, f, g, h, i, j, k, l, m, n, o, p, q, r, s, t, u, v, w, x, y, z, A, B, C, D, E, F, G, H, I, J, K, L, M, N, O, P, Q, R, S, T, U, V, W, X, Y, and Z. Besides these readable characters, a byte can also hold one digit: 0, 1, 2, 3, 4, 5, 6, 7, 8, 9. A byte can also hold a readable or non-readable symbols such as ` ~ ! @ # $ % ^ & * ( ) - _ = +[{]}\|;:'<?./,>"
This means that a combination of 8 bits, called a byte, is enough to represent one symbol recognized in the English language. In this globalization word, a computer also needs to be able to store characters from other Latin-based languages such as letters from FranÁais or EspaÒol. To make this possible, instead of 8 bits, the operating system must use 16 bits. A combination of 16 consecutive bits is also called a word.
A group of 1000 bytes is supposed to be called a kilobyte but, based on the way the computer calculates the bits, a group of 1024 bytes is called a kilobyte or KB. A group of 1,000,000 bytes is called a megabyte but actually it is a group of 1,024,000 bytes that is called a megabyte or MB. A group of 1,000,000,000 bytes or actually a group of 1,073,741,824 bytes is called a gigabyte or GB.
The Size of a Drive
Because a drive cannot have unlimited space, it is recognized for its size. The size of a drive can be measured by, or specified in, MB or GB. For example, a typical CD can hold 700MB of data. A regular DVD can hold information up to 4.7GB in size. The sizes of hard drives are very varied. To find the size of a hard drive in your computer, from either Windows Explorer or My Computer, you can right-click the drive letter and click Properties.
The Size of a File
In order to keep track of the various files in a computer, each file has a size. The size of a file can be measured in bytes, kilobytes, or megabytes. To know the size of a file, in either Windows Explorer or My Computer, you can right-click it and click Properties.

author

This post was written by: Author Name

Your description comes here!

Get Free Email Updates to your Inbox!

Post a Comment

CodeNirvana
Powered by Blogger.
© Copyright News 24
Back To Top