Damage of main board caused by mining
Publish: 2021-04-20 15:35:25
1. mining mainly depends on the graphics card, because mining is the graphics card in the calculation, not the CPU in the calculation. Of course, it has something to do with the motherboard. There are several major requirements:
1. Six PCI-E slots are provided to connect six graphics cards
2. BIOS optimization, which can be identified by inserting 6 cards, does not need manual adjustment
3. Stable operation and unstable motherboard may cause automatic restart and shutdown, affect efficiency, or cause short circuit graphics card burn out
at present, B250 / B350 mining motherboards are mainly promoted in the market. Some new ones are very interesting, such as 7 cards / 8 cards. However, these schemes have not yet passed the test. There may be unstable factors, and some of them are not in stock. In fact, the previous 8 series are more suitable for mining. The ms-b85-btc made by the furniture factory is a very good mining board. After years of mining scheme verification, 6 PCI-E, BIOS automatic identification, and PCI-E voltage stabilizing capacitor design are added. The mining is stable, and the shutdown cost is low.
1. Six PCI-E slots are provided to connect six graphics cards
2. BIOS optimization, which can be identified by inserting 6 cards, does not need manual adjustment
3. Stable operation and unstable motherboard may cause automatic restart and shutdown, affect efficiency, or cause short circuit graphics card burn out
at present, B250 / B350 mining motherboards are mainly promoted in the market. Some new ones are very interesting, such as 7 cards / 8 cards. However, these schemes have not yet passed the test. There may be unstable factors, and some of them are not in stock. In fact, the previous 8 series are more suitable for mining. The ms-b85-btc made by the furniture factory is a very good mining board. After years of mining scheme verification, 6 PCI-E, BIOS automatic identification, and PCI-E voltage stabilizing capacitor design are added. The mining is stable, and the shutdown cost is low.
2. Mining with the graphics card in the computer requires a long-time operation of the computer, and the graphics card needs a lot of calculation. Compared with the normal use of the computer, it will have greater loss, and the service life will be greatly reced. At the same time, long-time operation, the hardware also emits a lot of heat, if the heat dissipation is not good, it will affect all the hardware
3. Motherboard has little effect on performance.
ASUS board is considered for high-end.
medium and low-end gigabyte.msi.
low-end MSI has better performance price ratio
ASUS board is considered for high-end.
medium and low-end gigabyte.msi.
low-end MSI has better performance price ratio
4. First of all, whether a blockchain project is MLM or not should be judged from multiple perspectives.
in the process of development, blockchain has gone through three stages
blockchain 1.0. In this stage, it is mainly to realize digital currency, core nodes and front-end tools
the biggest feature of blockchain 2.0 at this stage is that it supports smart contracts, one of the representative procts is Ethereum. In Ethereum, the smart contract is used to develop the contract program, and finally deployed in the blockchain ledger
blockchain 3.0 blockchain goes beyond the scope of digital currency and regards blockchain as a wide range of solutions, which can be combined with other fields by using blockchain technology
however, many domestic blockchain related projects stay in the stage of blockchain 1.0, and one of their basic modes is to publish white papers, issue digital currency and go to the stock exchange, Then in accordance with the market, trading to earn profits
however, there may be some MLM money, air money and so on. What we can do is to take this kind of thing with a rational eye and not to invest blindly
in the process of development, blockchain has gone through three stages
blockchain 1.0. In this stage, it is mainly to realize digital currency, core nodes and front-end tools
the biggest feature of blockchain 2.0 at this stage is that it supports smart contracts, one of the representative procts is Ethereum. In Ethereum, the smart contract is used to develop the contract program, and finally deployed in the blockchain ledger
blockchain 3.0 blockchain goes beyond the scope of digital currency and regards blockchain as a wide range of solutions, which can be combined with other fields by using blockchain technology
however, many domestic blockchain related projects stay in the stage of blockchain 1.0, and one of their basic modes is to publish white papers, issue digital currency and go to the stock exchange, Then in accordance with the market, trading to earn profits
however, there may be some MLM money, air money and so on. What we can do is to take this kind of thing with a rational eye and not to invest blindly
5. There must be damage. If the graphics card is used, it will run with full load and generate a lot of heat. If the quality of the graphics card is poor and the heat dissipation is poor, there is a risk of burning out
6. The harm of Trojan virus can be divided into the following concentration
1. Joke virus is not destructive, but it will cause certain interference to users
2. To control the virus, you will generally control your computer, leaving a back door so that you can enter and leave your computer at will and steal your privacy
3. Number stealing: you can steal your game account< Destructive: directly destroy your computer system and files. Cause the file to be deleted, lost, infected, etc. The plot is very serious
the first and second are usually not infectious. The third and fourth are highly infectious~
1. Joke virus is not destructive, but it will cause certain interference to users
2. To control the virus, you will generally control your computer, leaving a back door so that you can enter and leave your computer at will and steal your privacy
3. Number stealing: you can steal your game account< Destructive: directly destroy your computer system and files. Cause the file to be deleted, lost, infected, etc. The plot is very serious
the first and second are usually not infectious. The third and fourth are highly infectious~
7. It doesn't work all day, you say, you don't have enough electricity
8. No
at present, the computing performance of any high configuration computer can not reach the standard of bitcoin mining. In other words, you can download the corresponding mining program to dig, but if you want to dig, even if the top computer is equipped, it will take you a year or two to dig. The cost of electricity and computer maintenance is higher than the price of t-coin itself
If mining, it is recommended to buy a special miner, the cheapest one is 1.5W
if you are not clear, you can continue to ask me.
at present, the computing performance of any high configuration computer can not reach the standard of bitcoin mining. In other words, you can download the corresponding mining program to dig, but if you want to dig, even if the top computer is equipped, it will take you a year or two to dig. The cost of electricity and computer maintenance is higher than the price of t-coin itself
If mining, it is recommended to buy a special miner, the cheapest one is 1.5W
if you are not clear, you can continue to ask me.
Hot content