0.00
0 читателей, 4768 топиков

Утечка тока в автомобиле. Как проверить, как найти причину, как измерить


Поиск утечки тока в авто (в бортовой сети автомобиля). Стандартная схема проверки утечки тока мультиметром. Ток утечки способен приводить не только к постепенному разряду аккумулятора на стоянке, но и в короткое время может посадить даже новую аккумуляторную батарею «в ноль» всего за одну ночь. Потери тока в автомобиле – довольно частое явление и важно уметь самостоятельно найти причину неисправности. Следуя инструкции, можно быстро узнать, почему разряжается аккумулятор, выявить причину утечки и произвести точное измерение тока утечки.

Не забудьте ПОДПИСАТЬСЯ на канал! Впереди много нового и интересного! Видео добавляется регулярно каждую неделю!

Посмотреть, какой широкий выбор различных мультиметров предлагают наши китайские друзья:
ali.pub/3trojw или got.by/3trojw

#утечкатока

Данное видео и всё, что в нём демонстрируется и озвучивается, носит исключительно информационный характер и отражает личное мнение автора, основанное на собственном опыте. Любые советы от автора не являются руководством к действию. Вы сами несете личную персональную ответственность за любые действия, связанные с применением данной информации.

КАК ЧИНИТЬ СВЕТОДИОДНЫЕ ЛАМПОЧКИ и ПОЧЕМУ ОНИ МОРГАЮТ


КАК ПЕРЕДЕЛАТЬ СВЕТОДИОДНУЮ ЛАМПОЧКУ
zen.yandex.ru/media/dima/remont-i-modernizaciia-svetodiodnyh-lampochek-5ee96fa0a3dca453cfdd3135
Всем хороши светодиодные лампы. И прочные и экономичные, но вот беда часто срок службы в этикетке заявленный никак не отрабатывают и отправляются на помойку.
Эти выброшенные лампочки за частую легко поддаются ремонту и модернизации даже без особых навыков в электронике и могут послужить вам как бесплатные источники света на долгие времена.
РЕМОНТ и ПЕРЕДЕЛКА СВЕТОДИОДНЫХ ЛАМП youtu.be/3Wqn0pAy1FA
Рабочая версия РЕМОНТ ЛАМПЫ youtu.be/Ho9rgBVHiNk
ВЕЧНАЯ СВЕТОДИОДНАЯ ЛАМПОЧКА youtu.be/8VaUnxuT6OI
#РемонтСветодиодныхЛамп #ПеределатьЛампочкуСветодиодную #ВосстановитьСветодиоднуюЛампочку

Так что все таки случается с лампочками на светодиодах и почему они то потухнут то погаснут?

Для тех кому нужны подробности (бываю там редко)

zen.yandex.ru/dima

vk.com/id26168899

ok.ru/profile/570092326202/

www.facebook.com/profile.php?id=100009896914428

Winderton об изучении Computer Science


Как и что учить, если вы хотите иметь сильный фундамент как программист/инженер.

Рекоммендуемая литература:
Программирование, железо, память, кодировка — The Art of Computer Programming, 2 том, Data Compression: The Complete Reference, Salomon D.
Комп архитектура — Essentials of Computer Architecture, Comer D., Structured Computer Organization, 5th edition, Tanenbaum.
Операционные системы — Modern Operating Systems, Tanenbaum., Modern Operating Systems, Second edition.
Алгоритмы — Corman, Algorithms. Algorithms 4th edition, Sedgevick.
Языки программирования — смотри видео по технической литературе для программистов
Разработка программного обеспечения — Software Design: From Programming to Architecture, Braude., Introduction to Software Engineering Design: Processes, Principles and Patterns with UML2, Fox., Software Engineering, 8th ed, Sommerville.
Абстракция данных, стркутуры данных — Книги по алгоритмам.
По графике, искуственному интелекту, базам данных и различным теориям я не читал ничего такого, чтобы мог порекоммендовать.
Буду пополнять этот список по мере возможности.

Patreon — www.patreon.com/winderton
Instagram — instagram.com/winderton
Группа ВК — vk.com/windert0n
Twitch — www.twitch.tv/winderton
Twitter — twitter.com/windert0n
Github — github.com/Winderton

DIY - Lab Bench Power Supply


In this episode I will show you in great detail, how to create your own bench power supply from a PC power supply.

If you are a nice lad and want to donate to me on PayPal, here you go: melcumlk@gmail.com

My Patreon campaign: www.patreon.com/sorindiy
My Facebook page: www.facebook.com/sorindiy/
My Instagram: www.instagram.com/sorin.diy/

PSU circuit board schematic: i.imgur.com/e5JSKZf.jpg
Volt/ammeter schematic: i.imgur.com/tesGVjy.jpg

Components list:
Voltmeter/ammeter display: s.click.aliexpress.com/e/_AZpmMG
Binding posts (similar): s.click.aliexpress.com/e/_AlmbUQ
Double rocker switch: s.click.aliexpress.com/e/_AnmbEa
Rotary switch 6 position: s.click.aliexpress.com/e/_AE9iXg
Knob: s.click.aliexpress.com/e/_AkdTDo
USB port: s.click.aliexpress.com/e/_AprPG6
47ohm 10W resistor: s.click.aliexpress.com/e/_AknVDg

----------------Music-----------------
The music was provided by NCS: Cartoon — On

Почему от разгона памяти растёт производительность


Разбираемся в чём суть прироста производительности при разгоне памяти. Каков сам механизм увеличения производительности.
vk.com/pc_0_1 — группа «Этот компьютер» — свежие и актуальные новости IT мира

The Evolution Of CPU Processing Power Part 4: The 32 Bit Processor - Pipelines and Caches


SERIES LINK — www.youtube.com/playlist?list=PLC7a8fNahjQ8IkiD5f7blIYrro9oeIfJU

The rapid expansion of software from simple text-based tools to massively complex, feature-rich, highly visual products would dominate the mass-market computing world during the 1980s and 90s. And with this push, came a higher demand on processors to both efficiently utilize more memory and grow in computing power, all while keeping costs at consumer accessible levels.

RISE OF 32-BIT

During the mid-1980s, in response to the growing demands of software, the opening moves towards the mainstream adoption of 32-bit processor architecture would begin. While 32-bit architectures have existed in various forms as far back as 1948, particularly in mainframe use, at the desktop level only a few processors had full 32-bit capabilities. Produced in speeds ranging from 12Mhz to 33Mhz, the 68020 had 32 bit internal and external data buses as well as 32-bit address buses. It’s arithmetic logic unit was also now natively 32-bit, allowing for single clock cycle 32-bit operations.

One year later, Intel would introduce its own true 32-bit processor family, the 80386. Not only did it offer a new set of 32-bit registers and a 32-bit internal architecture, but also built-in debugging capabilities as well as a far more powerful memory management unit, that addressed many of the criticisms of the 80286.

This allowed most of the instruction set to target either the newer 32-bit architecture or perform older 16-bit operations. With 32-bit architecture, the potential to directly address and manage roughly 4.2 GB of memory proved to be promising. This new scale of memory addressing capacity would develop into the predominant architecture of software for the next 15 years.

On top of this, protected mode can also be used in conjunction with a paging unit, combining segmentation and paging memory management. The ability of the 386 to disable segmentation by using one large segment effectively allowed it to have a flat memory model in protected mode. This flat memory model, combined with the power of virtual addressing and paging is arguably the most important feature change for the x86 processor family.

PIPLINING

CPUs designed around pipelining can also generally run at higher clock speeds due to the fewer delays from the simpler logic of a pipeline’s stage. The instruction data is usually passed in pipeline registers from one stage to the next, via control logic for each stage.

Data inconsistency that disrupts the flow of a pipeline is referred to as a data hazard. Control hazards are when a conditional branch instruction is still in the process of executing within the pipeline as the incorrect branch path of new instructions are being loaded into the pipeline.

One common technique to handle data hazards is known as pipeline bubbling. Operand forwarding is another employed technique in which data is passed through the pipeline directly before it’s even stored within the general CPU logic. In some processor pipelines, out-of-order execution is use to helps reduce underutilization of the pipeline during data hazard events.

Control hazards are generally managed by attempting to choose the most likely path a conditional branch will take in order to avoid the need to reset the pipeline.

CACHING

In caching a small amount of high-speed static memory, is used to buffer access to a larger amount of lower-speed but less expensive, dynamic memory.

A derived identifier, called a tag, that points to the memory region the block represents, amongst all possible mapped regions it can represent, is also stored within the cache block. While simple to implement, direct mapping creates an issue when two needed memory regions compete for the same mapped cache block.

When an instruction invokes memory access, the cache controller calculates the block set the address will reside in and the tag to look for within that set. If the block is found, and it is marked as valid, then the data requested is read from the cache. This is known as a cache hit and it is the ideal path of memory access due to its speed. If the address cannot be found within the cache then it must be fetched from slower system memory. This is known as a cache miss and it comes with a huge performance penalty as it can potentially stall an instruction cycle while a cache update is performed.

Writing data to a memory location introduces its own complication as the cache must now synchronize any changes made to it with system memory. The simplest policy is known as a write-through cache, where data written to the cache is immediately written to system memory. Another approach known as write-back or copy-back cache, tracks written blocks and only updates system memory when the block is evicted from the cache by replacement.

SUPPORT NEW MIND ON PATREON
www.patreon.com/newmind

SOCIAL MEDIA LINKS
Instagram — www.instagram.com/newmindchannel