Network Security Internet Technology Development Database Servers Mobile Phone Android Software Apple Software Computer Software News IT Information

In addition to Weibo, there is also WeChat

Please pay attention

WeChat public account

Shulou

What are the basic components of a computer?

2025-04-06 Update From: SLTechnology News&Howtos shulou NAV: SLTechnology News&Howtos > Servers >

Share

Shulou(Shulou.com)06/02 Report--

computer composition

software System, Application Hardware Mouse, keyboard, monitor, chassis, cpu, motherboard, memory, graphics card, sound card, network card, power RAM random access memory (readable and writable, easy to lose), ROM read-only memory (read) motherboard: cpu, memory, chip chip: North-South bridge

VMware virtual machine

What is Virtual Machine? For what? Why not? A program running on an operating system, simulating a computer... Real machine (physical machine) testing, verification, a real machine to complete the configuration of multiple machines

Operating mode:

host architecture Native architecture installed as an application on the operating system Virtual machine software installed directly on the real machine, itself is the operating system

Host to host communication three elements:

ip address (ipv4,32 bits binary, dotted decimal) A: 1-127 10.0.0.1-10.255.255.254B: 128-191 172.16.0.1-172.31.255.254C: 192-223 192.168.0.1-192.168.255.254D: 224-239 Multicast address E: 240-254 Research local loopback: 127 whole segment, test whether tcp/ip is successfully installed Spare dedicated ip for automatic address acquisition: 169.254 whole segment Subnet mask A 255.0.0.0 Net +3 Main B 255.255.0.0C 255.255.255.0ip routing (gateway) Gateway: Gateway to the network

Common File Systems

NTFS、FAT、ext

Advantages of NTFS:

Stability, Security, Rights Control, Compression, Disk Quotas, AD Support Required

Common System Types

Windows、Linux、Mac OS、Unix

Create shared files

Step 1:

Advanced sharing settings, check enabled

Step 2:

Folder sharing, right-click-properties-sharing-advanced and security produce intersection, users are intersection permissions when using sharing.

Step 3:

Test (even sharing) in three ways 1,\\192.168.1.1 UNC path access 2. Open network access 3. Open cmd and enter net use k: \\192.168.1.1\tingting map network drive

user and group Management

built-in users: guest users, forbidden by default administrator, built-in groups: guests group administrators group system Au... d users are using valid user groups, active

Welcome to subscribe "Shulou Technology Information " to get latest news, interesting things and hot topics in the IT industry, and controls the hottest and latest Internet news, technology news and IT industry trends.

Views: 0

*The comments in the above article only represent the author's personal views and do not represent the views and positions of this website. If you have more insights, please feel free to contribute and share.

Share To

Servers

Wechat

© 2024 shulou.com SLNews company. All rights reserved.

12
Report