Computer Technology (Averius): Difference between revisions
No edit summary |
m (Removed kalrania category) |
||
(8 intermediate revisions by one other user not shown) | |||
Line 6: | Line 6: | ||
===64-bit System=== | ===64-bit System=== | ||
The 64-bit system processes data in segments of 64-bits of code. In addition, there is a 32-bit operations architecture on top of the 64-bits. As a result, the computer architecture is often called x96 architecture. | |||
===Security Features=== | ===Security Features=== | ||
'''Automatic Download Protection''' | '''Automatic Download Protection''' | ||
The IOS has protections that prevent programs and files from automatically downloading. Downloads need to be manually approved. Files with an unverified certificate, such as those from unapproved software sources or pirated software or viruses would be labeled as 'Unverified and Potentially Dangerous'. | The IOS has protections that prevent programs and files from automatically downloading. Downloads need to be manually approved. Files with an unverified certificate, such as those from unapproved software sources or pirated software or viruses would be labeled as 'Unverified and Potentially Dangerous'. | ||
'''USB Protection''' | '''USB Protection''' | ||
Using the USB Ports will not automatically connect the content of the USB to the computer. Such data would need to be manually accessed. This prevents unauthorized access of the computer through the USB Ports and also prevents malware on USB-connected devices from infecting the computer automatically. | Using the USB Ports will not automatically connect the content of the USB to the computer. Such data would need to be manually accessed. This prevents unauthorized access of the computer through the USB Ports and also prevents malware on USB-connected devices from infecting the computer automatically. | ||
'''Native Anti-virus Protection''' | '''Native Anti-virus Protection''' | ||
The IOS has native anti-virus and anti-malware protections, preventing programs on the computer from accessing data on or for other programs, as well as preventing keylogging and unauthorized system or internet access. | The IOS has native anti-virus and anti-malware protections, preventing programs on the computer from accessing data on or for other programs, as well as preventing keylogging and unauthorized system or internet access. | ||
'''Protected File Locations''' | '''Protected File Locations''' | ||
Some file locations will be unable to be changed or accessed by programs outside of those file locations. This protection ensures that the files for the operating system and for system startup can not be edited or changed by malicious software. | Some file locations will be unable to be changed or accessed by programs outside of those file locations. This protection ensures that the files for the operating system and for system startup can not be edited or changed by malicious software. | ||
'''Password Automation protection''' | '''Password Automation protection''' | ||
Passwords and password-protected systems, programs, files, and accounts have a limit on the number of times a password can be input in a timespan. This prevents malicious software and remote hackers from being able to crack passwords on the computer. This limit does not prevent the manual input of a password. After 10 attempts by a program on the computer attempting to access a password-protected file, program, or account on the computer, it is quarantined and the user would need to re-enable access to that program for it to function outside of Quarantine. | Passwords and password-protected systems, programs, files, and accounts have a limit on the number of times a password can be input in a timespan. This prevents malicious software and remote hackers from being able to crack passwords on the computer. This limit does not prevent the manual input of a password. After 10 attempts by a program on the computer attempting to access a password-protected file, program, or account on the computer, it is quarantined and the user would need to re-enable access to that program for it to function outside of Quarantine. | ||
Line 45: | Line 33: | ||
'''Windows''' | '''Windows''' | ||
Each program can be opened in parallel, allowing for quick access to multiple programs. | Each program can be opened in parallel, allowing for quick access to multiple programs. | ||
'''GUI''' | '''GUI''' | ||
The GUI is a split into several parts, including the Desktop for program shortcuts to be placed for quick access. The Toolbar allows for the date, time, system stats, and other active programs to be displayed. The Start Menu is displayed allowing access to system settings and important system applications. | The GUI is a split into several parts, including the Desktop for program shortcuts to be placed for quick access. The Toolbar allows for the date, time, system stats, and other active programs to be displayed. The Start Menu is displayed allowing access to system settings and important system applications. | ||
'''Task Manager''' | '''Task Manager''' | ||
The Task Manager allows access to the system stats, a list of programs currently running, and an other set routines and tasks. | The Task Manager allows access to the system stats, a list of programs currently running, and an other set routines and tasks. | ||
'''File Manager''' | '''File Manager''' | ||
The File Manager is a program allowing access to all programs installed on the computer. | The File Manager is a program allowing access to all programs installed on the computer. | ||
'''System Settings''' | '''System Settings''' | ||
System Settings is an application allowing system, program, and account settings to be changed. | System Settings is an application allowing system, program, and account settings to be changed. | ||
'''System Menus''' | '''System Menus''' | ||
System Menus are submenus of the Start Menu and allow access to programs and file locations on the computer. | System Menus are submenus of the Start Menu and allow access to programs and file locations on the computer. | ||
'''File Explorer''' | '''File Explorer''' | ||
The File Explorer is a window allowing access to all files and programs on the computer. | The File Explorer is a window allowing access to all files and programs on the computer. | ||
Line 68: | Line 63: | ||
'''A: Drive''' | '''A: Drive''' | ||
The ''A: Drive'' is used for normal computer programs, and is where most non-core files will be found. | The ''A: Drive'' is used for normal computer programs, and is where most non-core files will be found. | ||
'''B: Drive''' | '''B: Drive''' | ||
The ''B: Drive'' is used for computer programs that need internet access to function, such as MMO games and other games. | The ''B: Drive'' is used for computer programs that need internet access to function, such as MMO games and other games. | ||
'''C: Drive''' | '''C: Drive''' | ||
The ''C: Drive'' is used for Core System Files. This Protected Drive can not be accessed or saved on by programs or files external to itself. | The ''C: Drive'' is used for Core System Files. This Protected Drive can not be accessed or saved on by programs or files external to itself. | ||
'''D: Drive''' | '''D: Drive''' | ||
The ''D: Drive'' is the Disk Drive for optical disks. A Computer can normally have up to two of these and are listed as ''D1:'', ''D2:'', ect, when there are more than one on the system. | The ''D: Drive'' is the Disk Drive for optical disks. A Computer can normally have up to two of these and are listed as ''D1:'', ''D2:'', ect, when there are more than one on the system. | ||
'''E: Drive''' | '''E: Drive''' | ||
The ''E: Drive'' is used for computer programs located on other connected computers or systems. | The ''E: Drive'' is used for computer programs located on other connected computers or systems. | ||
'''F: Drive''' | '''F: Drive''' | ||
The ''F: Drive'' is the Disk Drive for Floppy Disks. A Computer can normally have up to two of these and are listed as ''F1:'', ''F2:'', ect, when there are more than one on the system. | The ''F: Drive'' is the Disk Drive for Floppy Disks. A Computer can normally have up to two of these and are listed as ''F1:'', ''F2:'', ect, when there are more than one on the system. | ||
Line 434: | Line 435: | ||
**'''GPU Clock: ''' 60 MHz | **'''GPU Clock: ''' 60 MHz | ||
**'''GPU Memory:''' 16 MB | **'''GPU Memory:''' 16 MB | ||
*'''Sound:''' | *'''Sound:''' 32-bit sound | ||
*'''Ports:''' | *'''Ports:''' | ||
**1x Internet Port | **1x Internet Port | ||
Line 454: | Line 455: | ||
**'''GPU Clock: ''' 60 MHz | **'''GPU Clock: ''' 60 MHz | ||
**'''GPU Memory:''' 16 MB | **'''GPU Memory:''' 16 MB | ||
*'''Sound:''' | *'''Sound:''' 32-bit sound | ||
*'''Ports:''' | *'''Ports:''' | ||
**1x Internet Port | **1x Internet Port | ||
Line 474: | Line 475: | ||
**'''GPU Clock: ''' 250 MHz | **'''GPU Clock: ''' 250 MHz | ||
**'''GPU Memory:''' 64 MB | **'''GPU Memory:''' 64 MB | ||
*'''Sound:''' | *'''Sound:''' 32-bit sound | ||
*'''Ports:''' | *'''Ports:''' | ||
**1x Internet Port | **1x Internet Port | ||
Line 494: | Line 495: | ||
**'''GPU Clock: ''' 500 MHz | **'''GPU Clock: ''' 500 MHz | ||
**'''GPU Memory:''' 256 MB | **'''GPU Memory:''' 256 MB | ||
*'''Sound:''' | *'''Sound:''' 32-bit sound | ||
*'''Ports:''' | *'''Ports:''' | ||
**1x Internet Port | **1x Internet Port | ||
**1x HDMI Port | **1x HDMI Port | ||
**4x USB 2.0 Ports | **4x USB 2.0 Ports | ||
|- | |||
|Vertex V||PC||G$0.75||820||'''Details/Specs''' | |||
*'''OS:''' IOS 3.2 | |||
*'''CPU:''' 64-bit @4 GHz | |||
**1x Primary CPU | |||
**8x Parallel Processing CPU | |||
*'''Storage:''' Solid State Drive | |||
**1 TB SSD | |||
*'''External Storage:''' | |||
**2x 16 GB DVD-ROM/CD-RW | |||
*'''Memory:''' 16 GB | |||
*'''Display:''' 2560x1440 | |||
*'''GPU:''' G-4 | |||
**'''GPU Clock: ''' 1 GHz | |||
**'''GPU Memory:''' 4 GB | |||
*'''Sound:''' 32-bit sound | |||
*'''Ports:''' | |||
**1x Camera | |||
**1x Audio Port | |||
**1x Internet Port | |||
**2x HDMI Port | |||
**2x USB 3.0 Ports | |||
|} | |} | ||
{{template:Averius}} | {{template:Averius}} | ||
[[Category:Averius]] | [[Category:Averius]] |
Latest revision as of 04:16, 31 October 2024
IOS
The IOS or Imperial Operating System is the operating System used by domestically produced electronics in the Empire. This operating system in its modern form is a 64-bit system.
64-bit System
The 64-bit system processes data in segments of 64-bits of code. In addition, there is a 32-bit operations architecture on top of the 64-bits. As a result, the computer architecture is often called x96 architecture.
Security Features
Automatic Download Protection
The IOS has protections that prevent programs and files from automatically downloading. Downloads need to be manually approved. Files with an unverified certificate, such as those from unapproved software sources or pirated software or viruses would be labeled as 'Unverified and Potentially Dangerous'.
USB Protection
Using the USB Ports will not automatically connect the content of the USB to the computer. Such data would need to be manually accessed. This prevents unauthorized access of the computer through the USB Ports and also prevents malware on USB-connected devices from infecting the computer automatically.
Native Anti-virus Protection
The IOS has native anti-virus and anti-malware protections, preventing programs on the computer from accessing data on or for other programs, as well as preventing keylogging and unauthorized system or internet access.
Protected File Locations
Some file locations will be unable to be changed or accessed by programs outside of those file locations. This protection ensures that the files for the operating system and for system startup can not be edited or changed by malicious software.
Password Automation protection
Passwords and password-protected systems, programs, files, and accounts have a limit on the number of times a password can be input in a timespan. This prevents malicious software and remote hackers from being able to crack passwords on the computer. This limit does not prevent the manual input of a password. After 10 attempts by a program on the computer attempting to access a password-protected file, program, or account on the computer, it is quarantined and the user would need to re-enable access to that program for it to function outside of Quarantine.
System Features
Windows
Each program can be opened in parallel, allowing for quick access to multiple programs.
GUI
The GUI is a split into several parts, including the Desktop for program shortcuts to be placed for quick access. The Toolbar allows for the date, time, system stats, and other active programs to be displayed. The Start Menu is displayed allowing access to system settings and important system applications.
Task Manager
The Task Manager allows access to the system stats, a list of programs currently running, and an other set routines and tasks.
File Manager
The File Manager is a program allowing access to all programs installed on the computer.
System Settings
System Settings is an application allowing system, program, and account settings to be changed.
System Menus
System Menus are submenus of the Start Menu and allow access to programs and file locations on the computer.
File Explorer
The File Explorer is a window allowing access to all files and programs on the computer.
Drives
A: Drive
The A: Drive is used for normal computer programs, and is where most non-core files will be found.
B: Drive
The B: Drive is used for computer programs that need internet access to function, such as MMO games and other games.
C: Drive
The C: Drive is used for Core System Files. This Protected Drive can not be accessed or saved on by programs or files external to itself.
D: Drive
The D: Drive is the Disk Drive for optical disks. A Computer can normally have up to two of these and are listed as D1:, D2:, ect, when there are more than one on the system.
E: Drive
The E: Drive is used for computer programs located on other connected computers or systems.
F: Drive
The F: Drive is the Disk Drive for Floppy Disks. A Computer can normally have up to two of these and are listed as F1:, F2:, ect, when there are more than one on the system.
Computers by Generation
Second and Third Generation Mainframes
Model | Use | Price | Release Year | Details |
---|---|---|---|---|
A775A | Mainframe | G$50 | 775 | Details/Specs
|
A775B | Mass Storage | G$10 | 775 | Details/Specs
|
A775C | Printer | G$10 | 775 | Details/Specs
|
A778A | Mainframe | G$60 | 778 | Details/Specs
|
A778B | Mass Storage | G$15 | 778 | Details/Specs
|
Fourth Generation Mainframes
Model | Use | Price | Release Year | Details |
---|---|---|---|---|
Axion 1 | Supercomputer | G$2,000 | 780 | Details/Specs
|
Axion Pro Printer | Printer | G$10 | 780 | Details/Specs
|
Axion 2 | Supercomputer | G$4,000 | 785 | Details/Specs
|
Axion 3 | Supercomputer | G$4,500 | 790 | Details/Specs
|
Axion Pro II Printer | Printer | G$10 | 790 | Details/Specs
|
Fourth Generation PC
Model | Use | Price | Release Year | Details |
---|---|---|---|---|
Canvas I | PC | G$0.5 | 790 | Details/Specs
|
Canvas Pro Printer | Printer | G$0.5 | 790 | Details/Specs
|
Canvas II | PC | G$0.75 | 793 | Details/Specs
|
Canvas III | PC | G$1 | 796 | Details/Specs
|
Canvas Zero | PC | G$1 | 798 | Details/Specs
|
Fifth Generation Mainframes
Model | Use | Price | Release Year | Details |
---|---|---|---|---|
Fractal I | Supercomputer | G$5,000 | 800 | Details/Specs
|
Fractal Pro Printer | Printer | G$10 | 790 | Details/Specs
|
Fractal II Cabinet | Supercomputer | G$5,000 | 805 | Details/Specs
|
Fractal III Cabinet | Supercomputer | G$5,000 | 810 | Details/Specs
|
Fifth Generation PC
Model | Use | Price | Release Year | Details |
---|---|---|---|---|
Vertex | PC | G$0.5 | 800 | Details/Specs
|
Vertex II | PC | G$0.5 | 805 | Details/Specs
|
Vertex III | PC | G$0.75 | 810 | Details/Specs
|
Vertex Quad | PC | G$0.75 | 815 | Details/Specs
|
Vertex V | PC | G$0.75 | 820 | Details/Specs
|