faq page

     
 
** e-mail & internet
 
 
How to setup your email (Outlook, Outlook Express, Live mail etc)
 
 
What are on-line threats?
How can I protect my PC from on-line threats?
 
 
Tell me about cookies
 
   
   
 
In Outlook Express what do the flags mean? ( eg )
 
   
   
   
 
 
 

 
 
** my computer
 
   
   
   
 
Where is the System Tray?
 

 

 

 

 

 

 

 

 

Bottom right corner of your screen is your System Tray

 

This example contains a Speaker, Network Notification Icon, a Printer Status Icon, Kaspersky Anti Virus and the Time.

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

on-line threats

Computers connected to the Internet can become the subject of an online attack. Some attacks aim at taking control of your computer, or making it unable to communicate, do its work, or even stop functioning until it is turned off and back on.

Some attacks use exploits or vulnerabilities of the computers operating system.. These type of problems are generally solved by downloading / installing patches written by operating system software companies. Keep your PC up to date with security patches and virus pattern updates.

More often, attacks use the limitations of the TCP/IP protocol. These attacks mostly aim at keeping the computer very busy. The system gets so much work to do, that it cannot answer requests from normal Internet communications. Such situations are therefore called Denial of Service (DoS) attacks. These attacks are best dealt with by software and hardware traffic control units called firewalls.

Most web servers today are protected with firewalls. There are also programs called personal firewalls , which are aimed at the protection of online users. These programs are especially useful for users who have unchanging IP addresses (such as ADSL and cable TV Internet connections). 

Some ASDL Modem / Routers have a firewall built in and have a defualt setup which will offer protection against hackers. This is a hardware firewall and sits between your PC and the internet, stopping a certain amount from actually reaching your computer.

Software firewalls offer a useful defense also. Products such as Zone Alarm or Sygate are worth trying and can be downloaded free with an option of upgrading to a more comprehensive program. . Other products offer a more complete solution to internet security and privacy and are readily available for about £ 40 or so.

It is possible for your PC to be used by another PC for relaying e-mails or viruses or any material! This can be done by allowing programs to be installed or run on your PC. Good practice is to NEVER open material received on your PC unless you can garantee that material is safe from malicious programs, scripts and macros. Be aware that you can receive malicious e-mails from rouge sources that appear to have come from people you know. (spoofing)

Things you can do: -

If using Outlook Express, turn off the preview pane in the 'view - layout' menu. You can then censor received e-mails, deleting without opening any you're not expecting, delete them especially if they have attachments.

Install anti-virus software and a personal firewall (eg ZoneAlarm or Sygate) See our links page

Services left running on your system can be accessed over the internet - turn off any services you dont use.

Unfortunately installing such software makes using the PC and internet more complex. In doing so, you help prevent the spread of cyber viruses and threats and you help to make the cyber criminal life a little harder.

 

Here is an example list of potential threats to your PC.

     
Virus, Trojans, Worms Bootup disks, Infected programms, e-mails, web sites can load programs to do anything.
Ad ware web sites Spy on your internet browseing habits.
connection to your PC internet any open ports
key loggers   captures any data you type.
dialers   takes control of your connection and dials premium rate numbers.
Browser Helper Objects   code to extend your browsers capabilities. Can be used to open web sites you dont want!
Spam   unsolicited e-mails (junk mail)

Back to faq

 
     
 

e-mail and internet policy

E-mail is the most common source of PC virus infection.

There are things you can do to ensure that your e-mail usage is more secure.

1. Do not include confidential information in e-mail

e-mails are rather like postcards. They can be viewed easily by anyone. It does not matter if the information pertains to you or someone else, and it does not matter if the e-mail system is externally or internally based, confidential information in e-mail is a risk that is not worth taking.

Do not give out bank, PIN or password details via e-mail. Good organisations would not ask for these details using e-mail.

2. Minimize the use of attachments

Copy and paste text as often as possible.

3. Delete unexpected executable programs received via e-mail

This is a common means for passing on viruses. Do not open them and do not pass them on.  It is not uncommon to receive these from people you know, as a virus may propagate by sending itself to people in the user's address book.  If you must open an executable, e-mail the sender to confirm that it is genuine.

Look out for files that may contain viruses, e.g. those with the suffixes .exe, .vbs, .shs, .pif, .lmt. 

4. Notify the person from whom you received a virus infected file

This helps them correct the problem within their system before passing the virus on to other users.

Standards

There are just a few rules that must be followed in ensuring proper use of e-mail and to ensure that it does not cause problems or security breaches. These are described in the following policy:

E-mail is to be treated as a permanent written communication;

No abusive or derogatory e-mails will be sent out;

No sensitive information should be sent across the Internet.

Do not use e-mail as a substitute communications medium. It is still better to talk. If it is an important e-mail, check that it has arrived;

Do not assume all e-mail is delivered. The Internet is unreliable and users do not always pick up their mail on time;

Do not make assumptions about addresses. Always check when first exchanging messages that it has been received correctly.

Ensure any abuses of the e-mail system or any received junk mail, viruses etc. are reported to the manager.

Messages and attachments must not be abusive, defamatory or contain sexual or racist material. Users of the facility are expected to apply good sense when producing messages.

Back to faq

 
     
 

email etiquette rules

There are many etiquette guides and many different etiquette rules. Some rules will differ depending on whether you are a home or business user. Below we list what we consider as the most important email etiquette rules that apply to nearly all users.

Be concise and to the point

Do not make an e-mail longer than it needs to be. Remember that reading an e-mail is harder than reading printed communications and a long e-mail can be very discouraging to read.

Use proper spelling, grammar & punctuation

This is not only important because improper spelling, grammar and punctuation give a bad impression, it is also important for conveying the message properly. E-mails with no full stops or commas are difficult to read and can sometimes even change the meaning of the text. And, if your program has a spell checking option, why not use it?

Answer swiftly

When people e-mail a company, it is because they wish to receive a quick response. If they did not want a quick response they would send a letter or a fax. Therefore, each e-mail should be replied to within at least 24 hours, and preferably within the same working day. If the email is complicated, just send an email back saying that you have received it and that you will get back to them. This will put the customer's mind at rest and usually customers will then be very patient!

Do not attach unnecessary files

By sending large attachments you can annoy people and even bring down their e-mail system. Wherever possible try to compress attachments and only send attachments when they are productive. Moreover, you need to have a good virus scanner in place since people will not be very happy if you send them documents full of viruses!

Use proper structure & layout

Since reading from a screen is more difficult than reading from paper, the structure and lay out is very important for e-mail messages. Use short paragraphs and blank lines between each paragraph. When making points, number them or mark each point as separate to keep the overview.

Do not overuse the high priority option

We all know the story of the boy who cried wolf. If you overuse the high priority option, it will lose its function when you really need it. Moreover, even if a mail has high priority, your message will come across as slightly aggressive if you flag it as 'high priority'.

Do not write in CAPITALS

IF YOU WRITE IN CAPITALS IT SEEMS AS IF YOU ARE SHOUTING. This can be highly annoying and might trigger an unwanted response in the form of a flame mail. Therefore, try not to send any email text in capitals.

Don't leave out the message thread

When you reply to an email, you must include the original mail in your reply, in other words click 'Reply', instead of 'New Mail'. Some people say that you must remove the previous message since this has already been sent and is therefore unnecessary. However, I could not agree less. If you receive many emails you obviously cannot remember each individual email. This means that a 'threadless email' will not provide enough information and you will have to spend a frustratingly long time to find out the context of the email in order to deal with it. Leaving the thread might take a fraction longer in download time, but it will save the recipient much more time and frustration in looking for the related emails in their inbox!

Add disclaimers to your emails

Business users should add disclaimers to internal and external mails, since this can help protect your company from liability. Consider the following scenario: an employee accidentally forwards a virus to a customer by email. The customer decides to sue your company for damages. If you add a disclaimer at the bottom of every external mail, saying that the recipient must check each email for viruses and that it cannot be held liable for any transmitted viruses, this will surely be of help to you in court. Another example: an employee sues the company for allowing a racist email to circulate the office. If your company has an email policy in place and adds an email disclaimer to every mail that states that employees are expressly required not to make defamatory statements, you have a good case of proving that the company did everything it could to prevent offensive emails.

Read the email before you send it

A lot of people don't bother to read an email before they send it out, as can be seen from the many spelling and grammar mistakes contained in emails. Apart from this, reading your email through the eyes of the recipient will help you send a more effective message and avoid misunderstandings and inappropriate comments.

Do not overuse Reply to All

Only use Reply to All if you really need your message to be seen by each person who received the original message.

Take care with abbreviations and emoticons

In business emails, try not to use abbreviations such as BTW (by the way) and LOL (laugh out loud). The recipient might not be aware of the meanings of the abbreviations and in business emails these are generally not appropriate. The same goes for emoticons, such as the smiley :-). If you are not sure whether your recipient knows what it means, it is better not to use it.

Be careful with formatting

Remember that when you use formatting in your emails, the sender might not be able to view formatting, or might see different fonts than you had intended. When using colours, use a colour that is easy to read on the background.

Take care with rich text and HTML messages

Be aware that when you send an email in rich text or HTML format, the sender might only be able to receive plain text emails. If this is the case, the recipient will receive your message as a .txt attachment. Most email clients however, including Microsoft Outlook, are able to receive HTML and rich text messages.

Do not request delivery and read receipts

This will almost always annoy your recipient before he or she has even read your message. Besides, it usually does not work anyway since the recipient could have blocked that function, or his/her software might not support it, so what is the use of using it? If you want to know whether an email was received it is better to ask the recipient to let you know if it was received.

Do not use email to discuss confidential information

Sending an email is like sending a postcard. If you don't want your email to be displayed on a bulletin board, don't send it. Moreover, never make any libelous, sexist or racially discriminating comments in emails, even if they are meant to be a joke.

Use a meaningful subject

Try to use a subject that is meaningful to the recipient as well as yourself. For instance, when you send an email to a company requesting information about a product, it is better to mention the actual name of the product, e.g. 'Product A information' than to just say 'product information' or the company's name in the subject.

Avoid using URGENT and IMPORTANT

Even more so than the high-priority option, you must at all times try to avoid these types of words in an email or subject line. Only use this if it is a really, really urgent or important message.

Don't forward virus hoaxes and chain letters

If you receive an email message warning you of a new unstoppable virus that will immediatly delete everything from your computer, this is most probably a hoax. By forwarding hoaxes you use valuable bandwidth and sometimes virus hoaxes contain viruses themselves, by attaching a so-called file that will stop the dangerous virus. Same goes for chain letters that promise incredible riches or ask your help for a charitable cause. Even if the content seems to be bona fide, the senders are usually not. Since it is impossible to find out whether a chain letter is real or not, the best place for it is the recycle bin.

Back to faq

 
     
 

emoticons

Sometimes referred to as a "smiley". It is a short sequence of keyboard letters and symbols, usually emulating a facial expression, expressing a feeling that supplements the message.

:-) Smile
;-) Smile with a wink
:<}) User with mustache, smiling
:-|| Mad
:-( Sad
:' -( Crying
:~ Also crying
:-)) Really happy
:-D Big grin
:-* A kiss
:-P~ A lick
:-? Licking lips
:-o Wow! or I'm surprised
:-| Grim
%-} Silly
:/) Not funny
:-" Pursing lips
:-P Sticking out your tongue
:-\ User happens to be Popeye
:-/ Perplexed
=:O Frightened
=8O Bug-eyed with fright
:*) Clowning around
:-} Embarassed smile
:-)<>>>>> Basic Smiley with a necktie
;-^) Tongue in cheek
%*@:-( Hung over
:-~~~ Drooling
>:) Perplexed look
.) Keeping an eye out for you
8:-) Glasses on forehead
8:] Normal smiling face of a gorilla
0:-) Angel
[:-|] Robot
(:V) Duck
3:-o Cow
:-[ Vampire
(_8-(|) Homer Simpson
C|:-= Charlie Chaplin
=|:-)= Abe Lincoln
*<:-) Santa Claus
-:-) User sports a mohawk and admires Mr. T
(:)-) Scuba diver
:-'| User has a cold
:-{} User with heavy lipstick
:-)8 User is well dressed
>:-< Mad
*#:-) Scotsman wearing his Scottish tam
%-^ User is another Picasso
#-) User partied all night
<:I Dunce
:-| "Have an ordinary day!" Smiley
:}{: Kisses
(-_-) Secret smile
#.-o "Oh, nooooooo Mr. Bill!!!"

Back to faq

 
     
 

e-mail acronyms

Common acronyms that you may see in e-mail, newsgrou or /internet chat messages.

Abbreviation  Meaning
ADN Any day now
AFAIK As far as I know
AFK Away from keyboard
ARE Acronym-rich environment
B4N Bye for now
BAK Back at the keyboard
BBIAB Be back in a bit
BBL Be back later
BEG Big evil grin
BFD Big f***ing deal
BFN Bye for now
BG Big grin
BIOYIOP Blow it out your I/O port
BL Belly laughing
BOTEC Back-of-the-envelope calculation
BRB Be right back
BTA But then again...
BTW By the way
BWTHDIK But what the heck do I know...?
CU See you
CUL See you later
CUL8ER See you later
CYA Cover your ass
CYO See you online
DBA Doing business as
DFLA Disenhanced four-letter acronym
DIKU Do I know you?
DITYID Did I tell you I'm distressed?
DQMOT Don't quote me on this
EG Evil grin
EMFBI Excuse me for butting in
EOM End of message
EOT End of thread
ETLA Extended three-letter acronym
F2F Face to face
FAQ Frequently-ask question(s)
FISH First in, still here
FLA Four-letter acronym
FMTYEWTK Far more than you ever wanted to know
FOMCL Falling off my chair laughing
FUBAR F***ed up beyond all repair or recognition
FUD Fear, Uncertainty, and Doubt
FWIW For what it's worth
FYI For your information
G Grin
GA Go ahead
GAL Get a life
GBTW Get Back To Work
GD&R Grinning, ducking, and running
GFC Going For Coffee
GFETE Grinning From Ear To Ear
GIWIST Gee, I wish I'd said that
GMTA Great minds think alike
GOL Giggling out loud
GTRM Going to read mail
HTH Hope this helps
IAC In any case
IANAL I am not a lawyer (but)
IC I see
IHA I hate acronyms
IIRC If I recall/remember/recollect correctly
ILU or ILY I love you
IM Immediate message
IMHO In my humble opinion
IMNSHO In my not so humble opinion
IMO In my opinion
IOW In other words
IPN I'm posting naked
IRL In real life
IYSWIM If you see what I mean
JBOD Just a bunch of disks
JIC Just in case
JK Just kidding
KOTC Kiss on the cheek
KWIM? Know what I mean?
L8R Later
LD Later, dude
LDR Long-distance relationship
LLTA Lots and lots of thunderous applause
LOL Laughing out loud
LRF Little Rubber Feet
LTM Laugh to myself
LTR Long-term relationship
LULAB Love you like a brother
LULAS Love you like a sister
MorF Male or female
MOSS Member of the same sex
MOTOS Member of the opposite sex
MUSM Miss you so much
NFG No f*****g good
NFW No feasible way or no f*****g way
NIFOC Naked in front of computer
NRN No response necessary
OIC Oh, I see
OLL Online love
OTF Off the floor
OTOH On the other hand
OTTOMH Off the top of my head
PANS Pretty awesome new stuff
PCMCIA People can't master computer industry acronyms
PDA Public display of affection
PEBCAK Problem exists between chair and keyboard
PIBKAC Problem is between keyboard and chair
PITA Pain in the ass
PMFJIB Pardon me for jumping in but...
::POOF:: Goodbye
POTS Plain old telephone service
PU That stinks!
RL Real life
ROR Raffing out roud
ROTFL Rolling on the floor laughing
ROTFLMAO Rolling on the floor laughing my a** off
ROTFLMAOWPIMP Rolling on the floor laughing my a** off while peeing in my pants
ROTFLMBO Rolling on the floor laughing my butt off
RPG Role-playing games
RSN Real soon now
RTFM Read the f***ing manual
RYO Roll your own
S4L Spam for life
SEG S***-eating grin
SNAFU Situation normal, all f***ed up
SO Significant other
SOL Smilling out loud or sh*t out of luck
SOMY Sick of me yet?
STFW Search the f*****g Web
STW Search the Web
SWAG Stupid wild-a** guess
TAFN That's all for now
TANSTAAFL There ain't no such thing as a free lunch
TFH Thread from hell
TGIF Thank God it's Friday
THX Thanks
TIA Thanks in advance
TLA Three-letter acronym
TLK2UL8R Talk to you later
TMI Too much information
TOPCA Til our paths cross again
TPTB The powers that be
TTFN Ta-Ta for now
TTT Thought that, too
TTYL Talk to you later
TU Thank you
UAPITA You're a pain in the ass
UW You're welcome
VBG Very big grin
VBSEG Very big s***-eating grin
WDALYIC Who died and left you in charge?
WFM Works for me
WIBNI Wouldn't it be nice if
WT? What/who the ?
WTFO What the F***! Over!
WTG Way to go!
WTGP? Want to go private?
WU? What's up?
WUF? Where are you from?
WYSIWYG What you see is what you get
YGBSM You gotta be s***tin' me!
YMMV Your mileage may vary.

Back to faq

 
     
 

internet domain suffixes

Domain Suffixes are normally found at the end of website or e-mail addresses. They are used to describe the category the address belongs to (ie .com for commercial, .edu for education), and also which country the address originates from (ie .uk for the United Kingdom, .mex for Mexico.

Category Suffixes

  • AC - Academic (same as.edu)
  • CO - Commercial (same as .com)
  • COM - Commercial
  • EDU - Educational
  • GOV - Government
  • INT - International
  • MIL - Military
  • NET - Network
  • ORG - Non-Profit Organisation
  • ARPA - Old style Arpanet
  • NATO - Nato field

Country Suffixes

Note - Most American addresses don't use their country code.

  • AD - Andorra
  • AE - United Arab Emirates
  • AF - Afghanistan
  • AG - Antigua and Barbuda
  • AI - Anguilla
  • AL - Albania
  • AM - Armenia
  • AN - Netherlands Antilles
  • AO - Angola
  • AQ - Antarctica
  • AR - Argentina
  • AS - American Samoa
  • AT - Austria
  • AU - Australia
  • AW - Aruba
  • AZ - Azerbaijan
  • BA - Bosnia Herzegovina
  • BB - Barbados
  • BD - Bangladesh
  • BE - Belgium
  • BF - Burkina Faso
  • BG - Bulgaria
  • BH - Bahrain
  • BI - Burundi
  • BJ - Benin
  • BM - Bermuda
  • BN - Brunei Darussalam
  • BO - Bolivia
  • BR - Brazil
  • BS - Bahamas
  • BT - Bhutan
  • BV - Bouvet Island
  • BW - Botswana
  • BY - Belarus
  • BZ - Belize
  • CA - Canada
  • CC - Cocos (Keeling) Islands
  • CF - Central African Republic
  • CG - Congo
  • CH - Switzerland
  • CI - Cote D'Ivoire (Ivory Coast)
  • CK - Cook Islands
  • CL - Chile
  • CM - Cameroon
  • CN - China
  • CO - Colombia
  • CR - Costa Rica
  • CS - Czechoslovakia (former)
  • CU - Cuba
  • CV - Cape Verde
  • CX - Christmas Island
  • CY - Cyprus
  • CZ - Czech Republic
  • DE - Germany
  • DJ - Djibouti
  • DK - Denmark
  • DM - Dominica
  • DO - Dominican Republic
  • DZ - Algeria
  • EC - Ecuador
  • EE - Estonia
  • EG - Egypt
  • EH - Western Sahara
  • ER - Eritrea
  • ES - Spain
  • ET - Ethiopia
  • FI - Finland
  • FJ - Fiji
  • FK - Falkland Islands
  • FM - Micronesia
  • FO - Faroe Islands
  • FR - France
  • FX - France, Metropolitan
  • GA - Gabon
  • GB - Great Britain (UK)
  • GD - Grenada
  • GE - Georgia
  • GF - French Guiana
  • GH - Ghana
  • GI - Gibraltar
  • GL - Greenland
  • GM - Gambia
  • GN - Guinea
  • GP - Guadeloupe
  • GQ - Equatorial Guinea
  • GR - Greece
  • GS - South Georgia and South Sandwich Islands.
  • GT - Guatemala
  • GU - Guam
  • GW - Guinea-Bissau
  • GY - Guyana
  • HK - Hong Kong
  • HM - Heard and McDonald Islands
  • HN - Honduras
  • HR - Croatia (Hrvatska)
  • HT - Haiti
  • HU - Hungary
  • ID - Indonesia
  • IE - Ireland
  • IL - Israel
  • IN - India
  • IO - British Indian Ocean Territory
  • IQ - Iraq
  • IR - Iran
  • IS - Iceland
  • IT - Italy
  • JM - Jamaica
  • JO - Jordan
  • JP - Japan
  • KE - Kenya
  • KG - Kyrgyzstan
  • KH - Cambodia
  • KI - Kiribati
  • KM - Comoros
  • KN - Saint Kitts and Nevis
  • KP - North Korea
  • KR - South Korea
  • KW - Kuwait
  • KY - Cayman Islands
  • KZ - Kazakhstan
  • LA - Laos
  • LB - Lebanon
  • LC - Saint Lucia
  • LI - Liechtenstein
  • LK - Sri Lanka
  • LR - Liberia
  • LS - Lesotho
  • LT - Lithuania
  • LU - Luxembourg
  • LV - Latvia
  • LY - Libya
  • MA - Morocco
  • MC - Monaco
  • MD - Moldova
  • MG - Madagascar
  • MH - Marshall Islands
  • MK - Macedonia
  • ML - Mali
  • MM - Myanmar
  • MN - Mongolia
  • MO - Macau
  • MP - Northern Mariana Islands
  • MQ - Martinique
  • MR - Mauritania
  • MS - Montserrat
  • MT - Malta
  • MU - Mauritius
  • MV - Maldives
  • MW - Malawi
  • MX - Mexico
  • MY - Malaysia
  • MZ - Mozambique
  • NA - Namibia
  • NC - New Caledonia
  • NE - Niger
  • NF - Norfolk Island
  • NG - Nigeria
  • NI - Nicaragua
  • NL - Netherlands
  • NO - Norway
  • NP - Nepal
  • NR - Nauru
  • NT - Neutral Zone
  • NU - Niue
  • NZ - New Zealand (Aotearoa)
  • OM - Oman
  • PA - Panama
  • PE - Peru
  • PF - French Polynesia
  • PG - Papua New Guinea
  • PH - Philippines
  • PK - Pakistan
  • PL - Poland
  • PM - St. Pierre and Miquelon
  • PN - Pitcairn
  • PR - Puerto Rico
  • PT - Portugal
  • PW - Palau
  • PY - Paraguay
  • QA - Qatar
  • RE - Reunion
  • RO - Romania
  • RU - Russian Federation
  • RW - Rwanda
  • SA - Saudi Arabia
  • SB - Solomon Islands
  • SC - Seychelles
  • SD - Sudan
  • SE - Sweden
  • SG - Singapore
  • SH - St. Helena
  • SI - Slovenia
  • SJ - Svalbard and Jan Mayen Islands
  • SK - Slovak Republic
  • SL - Sierra Leone
  • SM - San Marino
  • SN - Senegal
  • SO - Somalia
  • SR - Suriname
  • ST - Sao Tome and Principe
  • SU - USSR (former)
  • SV - El Salvador
  • SY - Syria
  • SZ - Swaziland
  • TC - Turks and Caicos Islands
  • TD - Chad
  • TF - French Southern Territories
  • TG - Togo
  • TH - Thailand
  • TJ - Tajikistan
  • TK - Tokelau
  • TM - Turkmenistan
  • TN - Tunisia
  • TO - Tonga
  • TP - East Timor
  • TR - Turkey
  • TT - Trinidad and Tobago
  • TV - Tuvalu
  • TW - Taiwan
  • TZ - Tanzania
  • UA - Ukraine
  • UG - Uganda
  • UK - United Kingdom
  • UM - US Minor Outlying Islands
  • US - United States
  • UY - Uruguay
  • UZ - Uzbekistan
  • VA - Vatican City State
  • VC - Saint Vincent and the Grenadines
  • VE - Venezuela
  • VG - British Virgin Islands
  • VI - U.S. Virgin Island
  • VN - Vietnam
  • VU - Vanuatu
  • WF - Wallis and Futuna Islands
  • WS - Samoa
  • YE - Yemen
  • YT - Mayotte
  • YU - Yugoslavia
  • ZA - South Africa
  • ZM - Zambia
  • ZR - Zaire
  • ZW - Zimbabwe
 
     
 

how much memory do you need?

Perhaps you already know what it's like to work on a computer that doesn't have quite enough memory. You can hear the hard drive operating more frequently and the "hour glass" or "wrist watch" cursor symbol appears on the screen for longer periods of time. Things can run more slowly at times, memory errors can occur more frequently, and sometimes you can't launch an application or a file without first closing or quitting another.

So, how do you determine if you have enough memory, or if you would benefit from more? And if you do need more, how much more? The fact is, the right amount of memory depends on the type of system you have, the type of work you're doing, and the software applications you're using. Because the right amount of memory is likely to be different for a desktop computer than for a server, we've divided this section into two parts - one for each type of system.

Memory Requirements For A Desktop Computer

If you're using a desktop computer, memory requirements depend on the computer's operating system and the application software you're using. Today's word processing and spreadsheet applications require as little as 32MB of memory to run. However, software and operating system developers continue to extend the capabilities of their products, which usually means greater memory requirements. Today, developers typically assume a minimum memory configuration of 64MB. Systems used for graphic arts, publishing, and multimedia call for at least 128MB of memory and it's common for such systems to require 256MB or more for best performance.

The chart on the next page provides basic guidelines to help you decide how much memory is optimal for your desktop computer. The chart is divided by operating system and by different kinds of work. Find the operating system you're using on your computer, then look for the descriptions of work that most closely match the kind of work you do.

DESKTOP MEMORY MAP

WINDOWS ® 2000 PROFESSIONAL
Windows 2000 Professional runs software applications faster. Notebook-ready and designed with the future in mind, Windows 2000 Professional allows users to take advantage of a full range of features today. Windows 2000 Professional is future-ready and promises to run today's and tomorrow's applications better.

Baseline: 64MB - 128MB
Optimal: 128MB - 512MB
Administrative & Service Light- Word processing, email, data-entry 64MB - 96MB
Medium- Fax/communications, database administration, spreadsheets; >2 applications open at a time 64MB - 128MB
Heavy- Complex documents, accounting, business graphics, presentation software, network connectivity 96MB - 256MB
Executives & Analysts Light- Proposals, reports, spreadsheets, business graphics, databases, scheduling, presentations 64MB - 96MB
Medium- Complex presentations, sales/market analysis, project management, Internet access 96MB - 128MB
Heavy- Statistical applications, large databases, research/technical analysis, complex presentations, video conferencing 128MB - 512MB
Engineers & Designers Light- Page layout, 2 - 4 color line drawings, simple image manipulation, simple graphics 96MB - 128MB
Medium- 2D CAD, rendering, multimedia presentations, simple photo-editing, Web development 128MB - 512MB
Heavy- Animation, complex photo-editing, real-time video, 3D CAD, solid modeling, finite element analysis 256MB - 1GB

WINDOWS ® 98
Windows 98 requires 16 - 32MB to run basic applications. Tests show 45 - 65% performance improvements at 64MB and beyond.

Baseline: 32MB - 64MB
Optimal: 128MB - 256MB

Students Light- Word processing, basic financial management, email and other light Internet use 32MB - 64MB
Medium- Home office applications, games, Internet surfing, downloading images, spreadsheets, presentations 64MB - 128MB
Heavy- Multimedia use such as video, graphics, music, voice recognition, design, complex images 128MB - 384MB
Home Users Light- Word processing, basic financial management, email and other light Internet use 32MB - 48MB
Medium- Home office applications, games, Internet surfing, downloading images, spreadsheets, presentations 48MB - 64MB
Heavy- Multimedia use such as video, graphics, music, voice recognition, design, complex images 64MB - 128MB

LINUX ®
The Linux operating system is quickly gaining popularity as an alternative to Microsoft Windows. It includes true multitasking, virtual memory, shared libraries, demand loading, proper memory management, TCP/IP networking, and other features consistent with Unix-type systems.

Baseline: 48MB - 112MB
Optimal: 112MB - 512MB

Administrative & Service Light- Word processing, email, data-entry 48MB - 80MB
Medium- Fax /communications, database administration, spreadsheets; >2 applications open at a time 48MB - 112MB
Heavy- Complex documents, accounting, business graphics, presentation software, network connectivity 80MB - 240MB
Executives & Analysts Light- Proposals, reports, spreadsheets, business graphics, databases, scheduling, presentations 48MB - 80MB
Medium- Complex presentations, sales/market analysis, project management, Internet access 80MB - 112MB
Heavy- Statistical applications, large databases, research/technical analysis, complex presentations, video conferencing 112MB - 512MB
Engineers & Designers Light- Page layout, 2 - 4 color line drawings, simple image manipulation, simple graphics 80MB - 112MB
Medium- 2D CAD, rendering, multimedia presentations, simple photo-editing, Web development 112MB - 512MB
Heavy- Animation, complex photo-editing, real-time video, 3D CAD, solid modeling, finite element analysis 240MB - 1GB

MACINTOSH ™ OS
The Macintosh operating system manages memory in substantially different ways than other systems. Still, System 9.0 users will find that 48MB is a bare minimum. When using PowerMac ® applications with Internet connectivity, plan on a range between 64 and 128MB as a minimum.

Baseline: 48MB - 64MB
Optimal: 128MB - 512MB

Administrative & Service Light- Word processing, email, data- entry 48MB - 64MB
Medium- Fax /communications, database administration, spreadsheets; >2 applications open at a time 64MB - 96MB
Heavy- Complex documents, accounting, business graphics, presentation software, network connectivity 96MB - 128MB
Executives & Analysts Light- Proposals, reports, spreadsheets, business graphics, databases, scheduling, presentations 64MB - 256MB
Medium- Complex presentations, sales/ market analysis, project management, Internet access 128MB - 1GB
Heavy- Statistical applications, large databases, research/ technical analysis, complex presentations, video conferencing 96MB - 128MB
Engineers & ;Designers Light- Page layout, 2 - 4 color line drawings, simple image manipulation, simple graphics 128MB - 512MB
Medium- 2D CAD, rendering, multimedia presentations, simple photo-editing, Web development 256MB - 1GB
Heavy- Animation, complex photo-editing, real- ime video, 3D CAD, solid modeling, finite element analysis 512MB - 2GB
* Please Note: These figures reflect work done in a typical desktop environment. Higher-end workstation tasks may require up to 4GB. Naturally, a chart such as this evolves as memory needs and trends change. Over time, developers of software and operating systems will continue to add features and functionality to their products. This will continue to drive the demand for more memory. More complex character sets, like Kanji, may require more memory than the standard Roman based (English) character sets.

SERVER MEMORY REQUIREMENTS

How can you tell when a server requires more memory? Quite often, the users of the network are good indicators. If network-related activity such as email, shared applications, or printing slows down, they'll probably let their Network Administrator know. Here are a few proactive strategies that can be used to gauge whether or not a server has sufficient memory:

  • Monitor server disk activity. If disk swapping is detected, it is usually a result of inadequate memory.

  • Most servers have a utility that monitors CPU, memory, and disk utilization. Review this at peak usage times to measure the highest spikes in demand.
Once it's determined that a server does need more memory, there are many factors to consider when deciding on how much is enough:

What functions does the server perform (application, communication, remote access, email, Web, file, multimedia, print, database)?

    Some servers hold a large amount of information in memory at once, while others process information sequentially. For example, a typical large database server does a lot of data processing; with more memory, such a server would likely run much faster because more of the records it needs for searches and queries could be held in memory - that is, "at the ready." On the other hand, compared to a database server, a typical file server can perform efficiently with less memory because its primary job is simply to transfer information rather than to process it.
What operating system does the server use?

    Each server operating system manages memory differently. For example, a network operating system (NOS) such as the Novell operating system handles information much differently than an application-oriented system such as Windows NT. Windows NT's richer interface requires more memory, while the traditional Novell functions of file and print serving require less memory.
How many users access the server at one time?

    Most servers are designed and configured to support a certain number of users at one time. Recent tests show that this number is directly proportional to the amount of memory in the server. As soon as the number of users exceeds maximum capacity, the server resorts to using hard disk space as virtual memory, and performance drops sharply. In recent studies with Windows NT, additional memory allowed an application server to increase by several times the number of users supported while maintaining the same level of performance.
What kind and how many processors are installed on the server?

    Memory and processors affect server performance differently, but they work hand in hand. Adding memory allows more information to be handled at one time, while adding processors allows the information to be processed faster. So, if you add processing power to a system, additional memory will enable the processors to perform at their full potential.
How critical is the server's response time?
    In some servers, such as Web or e-commerce servers, response time directly affects the customer experience and hence revenue. In these cases, some IT Managers choose to install more memory than they think they would ever need in order to accommodate surprise surges in use. Because server configurations involve so many variables, it's difficult to make precise recommendations with regard to memory. The following chart shows two server upgrade scenarios.
SERVER MEMORY MAP

WINDOWS ® 2000 SERVER
Designed to help businesses of all sizes run better, Windows 2000 Server offers a manageable, reliable and internet-ready solution for today's growing enterprises. For optimal performance, consider adding more memory to take advantage of Windows 2000 Server's robust feature set. Windows 2000 Server is internet-ready and promises to run today's and tomorrow's applications better.

Baseline: 128MB
Optimal: 256MB - 1GB

Application Server Houses one or more applications to be accessed over a wide user base 256MB - 4GB
Directory Server Central Management of network resources 128MB - 1GB
Print Server Distributes print jobs to appropriate printers 128MB - 512MB
Communication Server Manages a variety of communications such as PBX, Voicemail, Email, and VPN 512MB - 2GB
Web Server Internet and intranet solutions 512MB - 2GB
Database Server Manages simple to complex databases of varying sizes 256MB - 4GB

LINUX ®
Linux is a reliable, cost-effective alternative to traditional UNIX servers. Depending on the distribution, the Linux server platform features a variety of utilities, applications, and services.

Baseline: 64MB - 128MB
Optimal: 256MB - 1GB

Application Server Houses one or more applications to be accessed over a wide user base 64MB - 4GB
Directory Server Central Management of network resources 128MB - 1GB
Print Server Distributes print jobs to appropriate printers 128MB - 512MB
Communication Server Manages a variety of communications such as PBX, Voicemail, Email, and VPN 512MB - 2GB
Web Server Internet and intranet solutions 512MB - 2GB
Database Server Manages simple to complex databases of varying sizes 256MB - 4GB



* Please Note: These figures reflect work done in a typical server environment. Higher-end workstation tasks may require up to 4GB. Naturally, a chart such as this evolves as memory needs and trends change. Over time, developers of software and operating systems will continue to add features and functionality to their products. This will continue to drive the demand for more memory. More complex character sets, like Kanji, may require more memory than the standard Roman based (English) character sets.

Back to faq

 
 
 
 
glossary of computer terms

Accelerated Graphics Port (AGP) - An Intel-developed interface that enables high-speed graphics. Graphics data move between the PC's graphics controller and computer memory directly, instead of being cached in video memory.

Access Time The average time (in nanoseconds) for RAM to complete one access. Access Time is composed of address setup time and latency (the time it takes to initiate a Request for data and prepare access).

ANSI (American National Standards Institute) - The U.S. organization responsible for setting information technology standards.

ASCII (American Standard Code for Information Interchange) - A method of encoding text as binary values. The ASCII coding system contains 256 combinations of 7-bit or 8-bit binary numbers to represent every possible keystroke.



Backside Bus (BSB) - The data path that runs between the CPU and L2 cache.

Bandwidth The amount of data moved on electronic lines, such as a bus, per second. bandwidth is usually measured in bits per second, bytes per second, or cycles per Second (Hertz).

Bank See memory bank.

Bank Schema A method of diagramming memory configurations. The bank schema consists of rows and/or columns that represent memory sockets on a computer board. Rows indicate independent sockets; columns represent banks.

Base Rambus The first generation of Rambus technology, first shipped in 1995.

BGA (Ball Grid Array) - A chip package having solder balls on the underside for mounting. BGA allows for a reduction in die package size, better heat dissipation, and greater module densities.

Binary A numbering system that uses combinations of 0 and 1 to represent data. Also known as Base 2.

BIOS (Basic Input-Output System) - Startup routines that prepare the computer for operation.

Bit The smallest unit of information a computer processes. A bit is 1 or 0.

Buffer A holding area for data shared by devices that operate at different speeds or have different priorities. A buffer allows a device to operate without the delays that other devices impose.

Buffered Memory A memory module that contains buffers. Buffers re-drive the signals through the memory chips and allow the module to include more memory chips. Buffered and unbuffered memory cannot be mixed. The design of the computer memory controller dictates whether memory must be buffered or unbuffered.

Burst EDO RAM (BEDO) - EDO memory that can process four memory addresses in one burst. Bus speeds range from 50MHz to 66MHz (compared to 33MHz for EDO and 25MHz for Fast Page Mode).

Burst Mode High-speed transmission of a block of data (a series of consecutive addresses) when the processor requests a single address.

Bus A data path in a computer, consisting of various parallel wires to which the CPU, memory, and all input/output devices are connected.

Bus Cycle A single transaction between main memory and the CPU.

Byte Eight bits of information. The byte is the fundamental unit of computer processing; almost all specifications and measures of computer performance are in bytes or multiples thereof. See kilobytes and megabytes.



Cache Memory A small amount (normally less than 1MB) of high-speed memory residing on or close to the CPU. Cache memory supplies the processor with the most frequently requested data and instructions. Level 1 cache (primary cache) is the cache closest to the processor. Level 2 cache (secondary cache) is the cache second closest to the processor and is usually on the motherboard.

CAS (Column Address Strobe) - A memory chip signal that latches the column address of a particular location in a row-column matrix.

CAS Latency The ratio between column access time and clock cycle time. CAS Latency 2 (CL2) offers a slight performance increase over CAS Latency 3 (CL3).

ccNUMA (Cache-Coherent, Non-uniform Memory Access) - A flexible architecture that uses modular, low-cost components and offers multidimensional scaling potential to high-end servers.

Chipset Microchips that support the CPU. The chipset usually contains several controllers that govern how information travels between the processor and other components.

Chip-Scale Package (CSP) - Thin chip packaging whereby electrical connections are typically through a ball grid array. Chip-scale packaging is used in RDRAM and flash memory.

CompactFlash A small, lightweight form factor for removable storage cards. CompactFlash cards are durable, operate at low voltages, and retain data when power is off. Uses include digital cameras, cell phones, printers, handheld computers, pagers, and audio recorders.

Composite An Apple Computer, Inc. term for a memory module that used an older technology and contained more but lower-density chips.

Concurrent Rambus The second generation of Rambus technology. Concurrent Rambus has been used in graphics-based computers, digital TVs, and video game applications (such as Nintendo 64 since 1997).

Continuity RIMM (C-RIMM) - A Direct Rambus memory module that does not contain memory chips. C-RIMM provides a continuous channel for the signal. In a Direct Rambus system, open connectors must be populated with C-RIMMs.

CPU (Central Processing Unit) - The computer chip that has primary responsibility for interpreting commands and running programs. The CPU is also known as the processor or microprocessor.

Credit Card Memory A type of memory typically in laptop and notebook computers. Credit card memory is the size of a credit card.



DDR SDRAM (Double Data Rate Synchronous Dynamic Random-Access Memory) - The latest generation of SDRAM technology. Data is read on both the rising and the falling edge of the computer clock, thereby delivering twice the bandwidth of standard SDRAM. With DDR SDRAM, memory speed doubles without increasing the clock frequency.

DIMM (Dual In-line Memory Module) - A printed circuit board with gold contacts and memory devices. A DIMM is similar to a SIMM, but with this primary difference: unlike the metal leads on either side of a SIMM, which are "tied together" electrically, the leads on either side of a DIMM are electrically independent.

Direct Rambus Rambus technology's third generation, which offers a completely new DRAM architecture for high-performance PCs. Data transfers at speeds up to 800MHz over a narrow 16-bit channel, compared to current SDRAM, which operates at 100MHz on a wide 64-bit bus.

DIP (Dual In-line Package) - A DRAM component packaging. DIPs can be installed in sockets or permanently soldered into holes on the printed circuit board. The DIP package was extremely popular when memory was installed directly on the motherboard.

DRAM (Dynamic Random-Access Memory) - The most common form of RAM. DRAM can hold data for only a short time. To retain data, DRAM must be refreshed periodically. If the cell is not refreshed, the data disappear.

Dual-Banked A memory module having two banks.

Dual Channel Based on the dual channel system board designs, memory modules are installed on two separate channels, each with it's own access route to the memory controller. The dual memory channel design doubles the peak bandwidth of single memory channels. Best results occur when a matched-pair memory kit is used ensuring that the modules are identical.

Dual Independent Bus (DIB) - An Intel-developed bus architecture that offers greater bandwidth by having two separate buses (frontside and backside) access the processor. Pentium II computers have DIBs.



ECC (Error Correction Code) - A method of checking the integrity of data in DRAM. ECC provides more elaborate error detection than parity; ECC can detect multiple-bit errors and can locate and correct single-bit errors.

EDO (Extended Data-Out) - A DRAM technology that shortens the read cycle between memory and CPU. On computers that support it, EDO memory allows a CPU to access memory 10 to 20 percent faster than comparable fast-page mode memory.

EDRAM (Enhanced DRAM) - Enhanced Memory Systems, Inc. DRAM that contains a small amount of SRAM.

EEPROM (Electrically Erasable Programmable Read-Only Memory) - A memory chip that retains data content after power has been removed. EEPROM can be erased and reprogrammed within the computer or externally.

EISA (Extended ISA) - A bus architecture that extended the 16-bit ISA bus to 32 bits. EISA operates at 8MHz and has a peak data transfer rate of 33MB per second. EISA was introduced in 1988 as an open alternative to IBM's proprietary Micro Channel bus.

EOS (ECC on SIMM) - An IBM data-integrity-checking technology that features ECC data-integrity-checking on a SIMM.

EPROM (Erasable Programmable Read-Only Memory) - A programmable and reusable chip that retains content until erasure under ultraviolet light. Special equipment erases and reprograms EPROMs.

ESDRAM (Enhanced Synchronous DRAM) - A type of SDRAM developed by Enhanced Memory Systems, Inc. ESDRAM replaces expensive SRAM in embedded systems and offers comparable speed with less power consumption and lower cost.

Even Parity A type of data integrity checking whereby the parity bit checks for an even number of 1s.



Fast-Cycle RAM (FCRAM) - FCRAM is a memory technology currently being developed by Toshiba and Fujitsu. FCRAM is not intended for PC main memory but will be used in specialty applications such as high-end servers, printers, and telecommunications switching systems.

Fast-Page Mode An early form of DRAM, fast-page mode's advantage over previous page mode memory technologies was faster access to data in the same row.

Flash Memory A solid-state, nonvolatile, rewritable memory that functions like a combination of RAM and hard disk. Flash memory is durable, operates at low voltages, and retains data when power is off. Flash memory cards are used in digital cameras, cell phones, printers, handheld computers, pagers, and audio recorders.

Form Factor The size, configuration, and other specifications used to describe hardware. Examples of memory form factors are: SIMM, DIMM, RIMM, 30-pin, 72-pin, and 168-pin.

Frontside Bus (FSB) - The data path that runs between the CPU and main memory (RAM).



Gigabit Approximately 1 billion bits, or exactly 1 bit x 1,024 3 (1,073,741,824) bits.

Gigabyte Approximately 1 billion bytes, or exactly 1 byte x 1,024 3 (1,073,741,824) bytes.



Heat Spreader A sheath, usually aluminum, that covers an electronic device and dissipates heat.

Heat Sink A component, typically zinc alloy, that dissipates heat. CPUs require heat sinks.



IC (Integrated Circuit) - An electronic circuit on a semiconductor chip. The circuit includes components and connectors. A semiconductor chip is usually molded in a plastic or ceramic case and has external connector pins.

Interleaving Techniques for increasing memory speed. For example, with separate memory banks for odd and even addresses, the next byte of memory can be accessed while the current byte refreshes.



JEDEC (Joint Electron Device Engineering Council) - An Electronic Industries Alliance (EIA) body that sets semiconductor engineering standards.



Kilobit Approximately one thousand bits, or exactly 1 bit x 2 10 (1,024) bits.

Kilobyte Approximately one thousand bytes, or exactly 1 byte x 2 10 (1,024) bytes.



Level 1 Cache (L1) - Also known as primary cache, L1 Cache is a small amount of high-speed memory that resides on or very close to the processor. L1 Cache supplies the processor with the most frequently requested data and instructions.

Level 2 Cache (L2) - Also known as secondary cache, L2 Cache is a small amount of high-speed memory close to the CPU and usually on the motherboard. L2 Cache supplies the processor with the most frequently requested data and instructions. Depending on the motherboard, Level 2 cache may be upgraded.

Logic Board See Motherboard.



Megabit Approximately one million bits, or exactly 1 bit x 1,024 2 (1,048,576) bits.

Megabyte The most common term used to denote the capacity of a memory module. One megabyte equals approximately one million bytes, or exactly 1 byte x 1,024 2 (1,048,576) bytes.

Memory A computer's random-access memory. Memory temporarily holds data and instructions for the CPU. See RAM.

Memory Bank A logical unit of memory in a computer, the size of which the CPU determines. For example, a 32-bit CPU requires memory banks that provide 32 bits of information at a time. A bank can consist of one or more memory modules.

Memory Bus The bus that runs from the CPU to the memory expansion slots.

Memory Controller Hub (MCH) - The interface between the processor, Accelerated Graphics Port, and RDRAM on motherboards that use Intel's 820 or 840 chipsets.

Memory Translator Hub (MTH) - The interface that allows SDRAM memory to be supported on a Direct Rambus Channel for motherboards using Intel's 820 chipset.

Micro BGA (µBGA) - Tessera, Inc. BGA chip packaging technique allows for a reduction in diepackage size, improved heat dissipation, and greater module densities.

MicroDIMM (Micro Dual In-Line Memory Module) - Smaller than an SODIMM, MicroDIMMs are primarily used in sub-notebook computers. MicroDIMMs are available in 144-pim SDRAM and 172-pin DDR.

Motherboard Also known as the logic board, main board, or computer board, the motherboard is the computer's main board and in most cases holds all CPU, memory, and I/O functions or has expansion slots for them.



Nanosecond (ns) - One billionth of a second. Memory data access times are in nanoseconds. For example, memory access times for typical 30- and 72-pin SIMM modules range from 60 to 100 nanoseconds.

Nibble Half of an 8-bit byte, or 4 bits.

Non-Composite An Apple Computer, Inc. term for a memory module that used a new technology and contained fewer but higher-density chips. Non-composite modules were more reliable and more expensive than composite modules.



Odd Parity Data integrity checking in which the parity bit checks for an odd number of 1s.



Parity Data integrity checking that adds a single bit to each byte of data. The parity bit is used to detect errors in the other 8 bits.

PCB (Printed Circuit Board) - Generally flat, multi-layer boards made of fiberglass with electrical traces. The surface and sublayers use copper traces to provide electrical connections for chips and other components. Examples of PCBs include: mother-boards, SIMMs, and credit card memory.

PC Card (PCMCIA: Personal Computer Memory Card International Association) - A standard that allows interchangeability of various computing components on the same connector. The PCMCIA standard supports input-output devices, including memory, fax/modem, SCSI, and networking products.

PCI (Peripheral Component Interconnect) - A peripheral bus that can send 32 or 64 bits of data simultaneously. PCI offers plug-and-play capability.

Pipeline Burst Cache Cache that reduces wait states and accelerates memory access by using pipelining and bursting functions.

Pipelining A technique in which memory loads the requested memory contents into a small cache composed of SRAM, then immediately begins fetching the next memory contents. This creates a two-stage pipeline, where data is read from or written to SRAM in one stage, and data is read from or written to memory in the other stage.

Proprietary Memory Memory custom designed for a specific computer.



RAM (Random-Access Memory) - A memory cell configuration that holds data for processing by a central processing unit (CPU). Random means the CPU can retrieve data from any address within RAM. See also Memory.

Rambus (1) Rambus, Inc. develops and licenses high-performance memory logic and circuit design technology and provides licensees with product design, layout, and testing information. (2) Direct Rambus is a high-speed memory technology that uses a narrow 16-bit bus (Rambus channel) to transmit data at speeds up to 800MHz. See Rambus Channel.

Rambus Channel The data path of Rambus systems. Because of the narrow data width (two bytes), Rambus modules transfer data at up to 800MHz.

RAS A memory chip signal that latches the row address of a particular location in a row-column matrix.

Refresh Refreshing maintains data stored in DRAM. The process of refreshing electrical cells on a DRAM component is similar to recharging batteries. Different DRAM components require different refresh methods.

Refresh Rate The number of DRAM component rows that must be refreshed. Three common refresh rates are 2K, 4K and 8K.

Registered Memory SDRAM memory that contains registers directly on the module. The registers re-drive the signals through the memory chips and allow the module to be built with more memory chips. Registered and unbuffered memory cannot be mixed. The design of the computer memory controller dictates which type of memory the computer requires.

RIMM™ The trademarked name for a Direct Rambus memory module. A RIMM™ conforms to the DIMM form factor and transfers data 16 bits at a time.

RIMM Connector A Direct Rambus memory socket.



SDRAM (Synchronous DRAM) - A DRAM technology that uses a clock to synchronize signal input and output on a memory chip. The clock is coordinated with the CPU clock so the timing of the memory chips and the timing of the CPU are in synch. Synchronous DRAM saves time in executing commands and transmitting data, thereby increasing the overall performance of the computer. SDRAM allows the CPU to access memory approximately 25 percent faster than EDO memory.

Self-Refresh A memory technology that enables DRAM to refresh on its own and independent of the CPU or external refresh circuitry. Self-Refresh technology is built into the DRAM chip itself and reduces power consumption dramatically. Notebook and laptop computers use this technology.

Serial Presence Detect An EEPROM chip that contains information about size and speed, as well as other specifications and manufacturer information of a memory module.

SGRAM (Synchronous Graphics Random-Access Memory) - Video memory that includes graphics-specific read/write features. SGRAM allows data to be retrieved and modified in blocks instead of individually. Blocking reduces the number of reads and writes the memory must perform and increases the performance of the graphics controller.

SIMM (Single In-line Memory Module) - A printed circuit board having memory devices and gold or tin/lead contacts. A SIMM plugs into a computer memory expansion socket. SIMMs offer two main advantages: ease of installation and minimal consumption of board surface. A vertically mounted SIMM requires only a fraction of the space required by a horizontally mounted DRAM. A SIMM may have as few as 30 or as many as 200 pins. On a SIMM, the metal leads on either side of the board are electrically tied together.

SIMM Socket A motherboard component that holds a single SIMM.

Single-Banked A module that has only one bank or row.

SLDRAM (Synclink) - Although obsolete today, SLDRAM was a main memory technology developed by a consortium of twelve DRAM manufacturers as an alternative to Direct Rambus technology.

SMART CARD An electronic device, similar in size to a credit card, that can store data and programs while enhancing security. Applications include identification, mass transit, and banking.

SO DIMM (Small-Outline Dual In-line Memory Module) - An enhanced version of a standard DIMM. A 72-pin small-outline DIMM is about half the length of a 72-pin SIMM. 144-pin and 200-pin modules are the most common SO DIMMs today.

SO-RIMM™ The trademarked name for a Direct Rambus memory module in notebook computers. SO-RIMM™s provide memory bandwidth comparable to desktop memory configurations.

SOJ (Small-Outline J-lead) - A common form of surface-mounted DRAM packaging. An SOJ is a rectangular package with J-shaped leads on the two long sides.

Static RAM (SRAM) - A memory chip that requires power to retain content. SRAM is faster than DRAM but more expensive and bulky. A typical use for SRAM is cache memory.

Storage A data-holding device, such as a hard disk or CD-ROM.

Swapping Using part of the hard drive as memory when RAM is full. See Virtual Memory.

System Board See Motherboard.



Transmission Line Technology A technology that supports the backside bus in Direct Rambus systems.Information is quickly pipelined in simultaneous packets. The memory controller reassembles the packets for frontside bus transfer and communication to the processor.

TSOP (Thin Small-Outline Package) - A DRAM package that uses gull-wing leads on both sides. TSOP DRAM mounts directly on the surface of the printed circuit board. The TSOP package is one-third the thickness of an SOJ. TSOP components commonly occur in small-outline DIMMs and credit card memory.



Unbuffered Memory Memory that does not contain buffers or registers located on the module. Instead, these devices are located on the motherboard.



VESA Local Bus (VL-Bus) - A 32-bit local bus that runs between the CPU and peripheral devices at speeds up to 40MHz.

Virtual Channel Memory (VCM) - VCM is a memory architecture developed by NEC. VCM allows different blocks of memory-each with its own buffer-to interface separately with the controller. This way, system tasks can be assigned their own virtual channels. Information related to one function does not share buffer space with other tasks running simultaneously, thereby making overall operations much more efficient.

Virtual Memory Simulated memory. When RAM is full, the computer swaps data to the hard disk and back as needed. See Swapping.

VRAM (Video Random-Access Memory) - Dual-ported (two separate data ports) memory typically on a video or graphics card. One port is dedicated to the CRT and refreshes and updates the image. The second port is for the CPU or graphics controller and changes the image data in memory.



Wait State An inactive period for the processor. Wait states result from the different clock speeds of the processor and memory, the latter being typically slower.

Window Random Access Memory (WRAM) - Samsung Electronics' dual-ported (two separate data ports) memory typically on a video or graphics card. WRAM has a 25% higher bandwidth than VRAM but costs less.

Back to faq

 
     
 

ASCII character set

To insert characters in the PC extended form of the standard ASCII character set, into documents.

  • Ensure that Num Lock is on.
  • If the code for the character required is less than 0126, press the corresponding key on the keyboard. For example, to insert w which is code 0119 in the Symbol font , press w which is code 0119 in normal text.
  • If the code for the required character is greater than 0126, hold down the Alt key and type the code for the symbol required on the numeric keypad (typing the code using the normal number keys does not work). For example, to insert Æ which is code 0198 in normal text, hold down the Alt key, type 0198 on the numeric keypad, then release the Alt key.

 

Back to faq