What does pnp mean? Plug and Play technology and device drivers

Today I will tell you what PnP is. All or almost all amateurs come across this term. board games. Some people ignore this concept, some delve into it, but leave it without much attention, and some plunge into PnP headlong. This happens for a number of reasons, which I will discuss in future publications.

So what is PnP? PnP from English "Print and Play", which means "Print and Play", aka "Samizdat". It's nothing more than making board games with your own hands. As I said, there are many reasons for making your own board games:

- reluctance to spend money for expensive games;
- inability to buy any games in your region due to non-delivery to stores or due to games going out of sale;

I myself have encountered this many times when I liked a game, but it was no longer on sale. I even had to contact the publishers and ask how things were going with the game, but received a polite refusal that the game was out of print forever, look for used copies, etc.

- just a hobby- independent production of board games.

I understand that making games with your own hands is comparable to piracy, but sometimes circumstances force it. And in general, I like to cut, glue, and laminate things. I immediately remember my childhood, when during labor lessons at school and in kindergarten we also did needlework and appliqué. This calms me down a little, distracts me from the hustle and bustle, and has a calming effect on me.

It must be noted that PnP will never be able to replace the original game. If you think that you can independently surpass the quality that various publishers offer us, then you are greatly mistaken. Yes, if the game is based on cards alone, then you can make good quality cards yourself at a meager price and play such a game, but if the game contains a lot of small cardboard parts, for example, coins, tokens, etc., then you will make friends for a long time with scissors and you'll give your fingers a great workout. The quality can be quite passable, but it will require sacrifice. But if the game contains figures and chips, then this will be an ambush: somehow you can reproduce simple men from Carcassonne, but it will be difficult and almost impossible to make figures from games such as Lords of Xidit, Raptor, Andor, etc.

I will not dwell on the fact that to make games you will need both tools and consumables. They may be different for everyone, in subsequent articles I will tell you what I use and what it all looks like. It will be interesting, don't miss it.

In general, we have understood what is PnP- this is the independent production of board games, also known as Samizdat, Print-and-Play. We looked at why people do PnP and what approximate difficulties may arise.

Each of us chooses for ourselves priorities and ways to solve certain difficulties. I do not encourage anyone to only print PnP or only buy original games. IN different situations an appropriate decision needs to be made. I know many people who fundamentally do not do PnP and actively encourage people to buy games, and I also know people who, for the most part, just print everything themselves: cards, figures, and even make boxes for games. From start to finish, as they say.

So, about PnP and the original games.

Play games, discover new worlds, dive into the unknown!

A PNP transistor is an electronic device, in a certain sense the inverse of an NPN transistor. In this type of transistor design, its PN junctions are opened by voltages of reverse polarity with respect to the NPN type. IN symbol instrument, the arrow, which also determines the emitter terminal, this time points inside the transistor symbol.

Device design

The design circuit of a PNP-type transistor consists of two regions of p-type semiconductor material on either side of a region of n-type material, as shown in the figure below.

The arrow identifies the emitter and the generally accepted direction of its current ("inward" for a PNP transistor).

The PNP transistor has very similar characteristics to its NPN bipolar counterpart, except that the directions of currents and voltage polarities in it are reversed for any of the possible three connection schemes: common base, common emitter and common collector.

The main differences between the two types of bipolar transistors

The main difference between them is that holes are the main current carriers for PNP transistors, NPN transistors have electrons in this capacity. Therefore, the polarities of the voltages supplying the transistor are reversed, and its input current flows from the base. In contrast, with an NPN transistor, the base current flows into it, as shown below in the circuit diagram for connecting both types of devices with a common base and a common emitter.

The operating principle of a PNP-type transistor is based on the use of a small (like the NPN-type) base current and a negative (unlike the NPN-type) base bias voltage to control a much larger emitter-collector current. In other words, for a PNP transistor, the emitter is more positive with respect to the base and also with respect to the collector.

Let's look at the differences between the PNP type in the connection diagram with a common base

Indeed, it can be seen that the collector current IC (in the case of an NPN transistor) flows from the positive terminal of battery B2, passes through the collector terminal, penetrates into it and must then exit through the base terminal to return to the negative terminal of the battery. In the same way, looking at the emitter circuit, you can see how its current from the positive terminal of battery B1 enters the transistor through the base terminal and then penetrates into the emitter.

Thus, both the collector current I C and the emitter current I E pass through the base terminal. Since they circulate along their circuits in opposite directions, the resulting base current is equal to their difference and is very small, since IC is slightly less than I E. But since the latter is still larger, the direction of flow of the difference current (base current) coincides with I E, and therefore a PNP-type bipolar transistor has a current flowing out of the base, and an NPN-type one has an inflowing current.

Differences between PNP type using the example of a connection circuit with a common emitter

In this new circuit, the base-emitter PN junction is biased by battery voltage B1 and the collector-base junction is reverse biased by battery voltage B2. The emitter terminal is thus common to the base and collector circuits.

The total emitter current is given by the sum of two currents I C and I B; passing through the emitter terminal in one direction. Thus, we have I E = I C + I B.

In this circuit, the base current I B simply “branches off” from the emitter current I E, also coinciding with it in direction. In this case, a PNP-type transistor still has a current flowing from the base I B, and an NPN-type transistor has an inflowing current.

In the third of the known transistor switching circuits, with a common collector, the situation is exactly the same. Therefore, we do not present it in order to save space and time for readers.

PNP transistor: connecting voltage sources

The base-to-emitter voltage source (V BE) is connected negative to the base and positive to the emitter because the PNP transistor operates when the base is biased negatively relative to the emitter.

The emitter supply voltage is also positive with respect to the collector (V CE). Thus, with a PNP-type transistor, the emitter terminal is always more positive in relation to both the base and collector.

The voltage sources are connected to the PNP transistor as shown in the figure below.

This time the collector is connected to the supply voltage VCC through a load resistor, R L, which limits the maximum current flowing through the device. A base voltage VB, which biases it negatively relative to the emitter, is applied to it through a resistor RB, which again is used to limit the maximum base current.

Operation of a PNP transistor stage

So, to cause base current to flow in a PNP transistor, the base must be more negative than the emitter (current must leave the base) by about 0.7 volts for a silicon device or 0.3 volts for a germanium device. The formulas used to calculate base resistor, base current or collector current are the same as those used for an equivalent NPN transistor and are presented below.

We see that the fundamental difference between an NPN and a PNP transistor is the correct biasing of the pn junctions, since the directions of the currents and the polarities of the voltages in them are always opposite. Thus, for the above circuit: I C = I E - I B, since the current must flow from the base.

Generally, a PNP transistor can be replaced with an NPN one in most electronic circuits, the only difference is the polarity of the voltage and the direction of the current. Such transistors can also be used as switching devices, and an example of a PNP transistor switch is shown below.

Transistor characteristics

The output characteristics of a PNP transistor are very similar to those of an equivalent NPN transistor, except that they are rotated 180° to allow for reverse polarity of voltages and currents (the base and collector currents of a PNP transistor are negative). Similarly, to find the operating points of a PNP transistor, its dynamic load line can be depicted in the third quarter of the Cartesian coordinate system.

Typical characteristics of the 2N3906 PNP transistor are shown in the figure below.

Transistor pairs in amplifier stages

You may wonder what is the reason to use PNP transistors when there are many NPN transistors available that can be used as amplifiers or solid state switches? However, the presence of two various types transistors - NPN and PNP - provides great advantages when designing power amplifier circuits. These amplifiers use “complementary” or “matched” pairs of transistors (representing one PNP transistor and one NPN transistor connected together, as shown in the figure below) in the output stage.

Two corresponding NPN and PNP transistors with similar characteristics, identical to each other, are called complementary. For example, TIP3055 (NPN type) and TIP2955 (PNP type) are good example complementary silicon power transistors. They both have gain direct currentβ=I C /I B matched within 10% and high collector current of around 15A, making them ideal for motor control or robotic applications.

In addition, class B amplifiers use matched pairs of transistors in their output power stages. In them, the NPN transistor conducts only the positive half-wave of the signal, and the PNP transistor only conducts its negative half.

This allows the amplifier to pass the required power through the speaker in both directions at a given power rating and impedance. As a result, the output current, which is usually on the order of several amperes, is evenly distributed between the two complementary transistors.

Transistor pairs in electric motor control circuits

They are also used in H-bridge control circuits for reversible DC motors, which make it possible to regulate the current through the motor evenly in both directions of its rotation.

The H-bridge circuit above is so called because the basic configuration of its four transistor switches resembles the letter "H" with the motor located on the cross line. The transistor H-bridge is probably one of the most commonly used types of reversible DC motor control circuit. It uses “complementary” pairs of NPN and PNP transistors in each branch to act as switches to control the motor.

Control input A allows the motor to run in one direction, while input B is used for reverse rotation.

For example, when transistor TR1 is on and TR2 is off, input A is connected to the supply voltage (+Vcc), and if transistor TR3 is off and TR4 is on, then input B is connected to 0 volts (GND). Therefore, the motor will rotate in one direction, corresponding to the positive potential of input A and the negative potential of input B.

If the switch states are changed so that TR1 is off, TR2 is on, TR3 is on, and TR4 is off, the motor current will flow in the opposite direction, causing it to reverse.

By using opposite logic levels "1" or "0" on inputs A and B, you can control the direction of rotation of the motor.

Determining the type of transistors

Any bipolar transistors can be thought of as consisting essentially of two diodes connected together back to back.

We can use this analogy to determine whether a transistor is a PNP or NPN type by testing its resistance between its three terminals. Testing each pair of them in both directions using a multimeter, after six measurements we get the following result:

1. Emitter - Base. These leads should act like a normal diode and only conduct current in one direction.

2.Collector - Base. These leads should also act like a normal diode and only conduct current in one direction.

3. Emitter - Collector. These conclusions should not be drawn in any direction.

Transition resistance values ​​of transistors of both types

Then we can determine the PNP transistor to be healthy and closed. A small output current and negative voltage at its base (B) relative to its emitter (E) will open it and allow much more emitter-collector current to flow. PNP transistors carried out at a positive emitter potential. In other words, a PNP bipolar transistor will conduct only if the base and collector terminals are negative with respect to the emitter.

The term "PUP"

POP is the abbreviated name for the bottomhole formation zone. The bottomhole formation zone is a section of the formation that is adjacent to the wellbore and within which the filtration properties of the productive formation change during construction, operation and repair of the well. The reasons that lead to changes in the characteristics of the near-wellbore zone of the formation include the following: redistribution of stress in the near-wellbore part, various physical and chemical effects of various process fluids, as well as various processes that are caused by operating modes and conditions. The dimensions, configuration, as well as the hydrochemical properties of the bottomhole zone of the formation change during the entire period of the well's existence. They affect the hydraulic connection of the well with the EOR and very often affect its productivity.

The configuration of the formation zone with changed characteristics in the near-wellbore part does not have any geometric shape. Its morphology is very diverse and complex, especially for fractured-pore and fractured reservoirs. Thanks to hydrodynamic studies of wells, it is possible to obtain a quantitative and qualitative assessment of the properties of the bottomhole formation zone, as well as determine hydraulic resistance. In the course of such studies, data is obtained on the size of the equivalent, rather than actual, circular zone. Thus, the dimensions of the formation zone are measured from fractions to several tens of meters. Sometimes you can observe the separation of the formation and the well, both during construction, as well as during repairs and operation. As a result, when tested, such objects may not produce products. To prevent a reduction in the filtration properties of the bottomhole formation zone, a number of measures are carried out that reduce the pressure on the formation during drilling, as well as during well casing and repair. Process fluids or compositions that are compatible with the formation rock or fluids saturating it can also be used. When influencing the bottom-hole zone, various methods increase or restore its filtration properties. The maximum effect can be achieved with a complex effect on PNP.

13:15 — REGNUM The Ulyanovsk region is ready to cooperate with universities in the Volga Federal District “in breakthrough areas of innovative development.” This was stated by Governor Sergei Morozov at a meeting of the Council of Rectors of universities in the Volga region, which was held in the Ulyanovsk region, they reported IA REGNUM in the press service of the head of the region.

The event was attended by the President of the Russian Union of Rectors, the Rector of Moscow State University named after M.V. Lomonosov Victor Sadovnichy, his deputy and chairman of the Council of University Rectors of the Volga Federal District R Oman Strongin, heads of higher educational institutions in the regions of the Volga Federal District.

Addressing the meeting participants, Governor Sergei Morozov stated the pattern that “ it was the Ulyanovsk region that became a platform for discussing the tasks of our country’s innovative breakthrough", which the president put Vladimir Putin. The head of the region recalled that the Ulyanovsk region is among the top ten innovative regions of Russia: at the end of 2017, the region took eighth place in the ranking. Also, for several years, the Ulyanovsk region has remained one of the leaders in attracting investment. Sergey Morozov thanked the professional community of university rectors in our region “ for his invaluable contribution to this success».

“Including thanks to technical, classical, and agricultural universities, we managed to attract about a trillion rubles of investment into the regional economy, creating 20-25 thousand jobs annually. Today we face new challenges. The Ulyanovsk region is actively developing such industries as aircraft manufacturing, new materials, renewable energy, wind industry. It would be great if today we all looked at what breakthrough areas our region can be useful for the country, and began to develop them in cooperation with universities of the Volga Federal District," - said Sergei Morozov.

The meeting participants discussed issues of increasing the innovative component of universities. Viktor Sadovnichy noted the important role of the flagship university of the Ulyanovsk region. According to him, today serious national projects are planned, the implementation of which requires the solution of certain tasks.

"Ulyanovsky State University was founded as a branch of Moscow State University, and I am glad that now the university is actively developing and is one of the leading ones, including thanks to the competent leadership of the region by Governor Sergei Morozov. This is pride for Moscow University too,” - said Viktor Sadovnichy.

He also outlined the main directions of work of Russian universities in the context of the tasks set by Vladimir Putin. In particular, he touched upon the issue of creating consortia of Russian universities under the Vernadsky program. Viktor Sadovnichy addressed Governor Sergei Morozov and the meeting participants with the initiative to form a similar unified space in the Volga Federal District.

According to Roman Strongin, the best experience of the district’s universities will be accumulated at the Ulyanovsk site.

“A breakthrough is, first of all, a qualitative leap. If we leave everything as it is, then something will improve, but there will be no leap. This means that our very actions must be different. Previously, there was industrial science, industrial institutes, and every idea was brought to metal, to a machine, to a device, to a model. Now the university must do it itself - from idea to factory. The generation of mature scientists did not do this; they worked with industrial science. But it is necessary for them to carry out such activities, and for young people to be able to do this; these are large-scale educational tasks. And it is not true to say that someone already fully knows its solution,” - said Roman Strongin.

He emphasized that today it is important to collect the best practices of universities in the Volga region and see what happens, so that others can use and develop them. And Ulyanovsk University is one of these sources of experience. It was emphasized that one university is not enough - a consortium needs to be formed. The expert noted that an important area is also career guidance work with schoolchildren and kindergarten students.

"This must be the whole system together with the university. Some experience already exists in a number of regions, including the Ulyanovsk region,” — added Roman Strongin.

Let us remind you that currently at the federal level, “Science” and “Education” are among the priority national projects. The Council of University Rectors outlined the importance of developing scientific and industrial cooperation, including the creation of world-class scientific and educational centers. In addition, issues of updating the infrastructure of universities for conducting research and development in the Russian Federation, as well as supporting young scientists, were touched upon.

“Ulyanovsk talents have repeatedly become recipients of grants from the President of the Russian Federation. In 2018, the results of the competitive selection conducted jointly with Russian Foundation basic sciences. As a result, 100 million rubles will be allocated for the implementation of 85 scientific projects,” — commented the Minister of Education and Science of the Ulyanovsk region Natalia Semyonova.

What the antivirus does not see, MBAM will see.

What is PNP?
  1. PUPs are potentially unwanted programs that are not malicious but can be intrusive; they can actively manifest themselves in advertising, opening other sites, spying on users of computer devices for the purpose of displaying advertising sites. These programs can do a lot of things, and most importantly, the antivirus may not see them; any antivirus company, be it the most advanced, may not notice it. I’ll tell you why this happens now. Antiviruses detect viruses using several rules for searching and identifying virus programs. The most basic rule for antivirus search is based on the existing database, which is periodically downloaded from the server. Using it, the antivirus scans files, scanning the code in the file itself and running it in a sandbox, isolating the file itself. It looks at how and what tasks the file performs and if it doesn’t notice any suspicions about the file’s actions or doesn’t find it in the database by name or parts of the code, then it skips it because it considers it not dangerous. A virus is considered to be files that can harm your device, block some functions from fulfilling their purposes as specified in the program. Send the data to the specified server or email that is specified in the code of the virus file. It happens that an antivirus triggers falsely, because a program that is written to perform some tasks may seem strange, say, because it asked for administrator rights to go to what system partition for entry into system file your records. The antivirus will consider such a program a virus, but it is written, say, to change or add to the operating system menu as additional options that you need and are not provided by the system itself. Why do I consider such antivirus programs to be viruses, but in fact they do no harm, such programs should be reported to the authors by antivirus laboratories so that they can be reviewed and included in the database as exclusion programs. Then the antivirus will not work, or another option is for you to disable them yourself in the antivirus by setting them to an exception. So, we haven't deviated much from the topic. Let's say a program that in your browser, after some time, shows you a picture, a simple picture with an advertisement. How can an antivirus consider it a virus, all they showed was a picture that had no effect on the operation of the system or individual programs. Moreover, most likely you yourself allowed it to be shown, but no need to say right now, you didn’t allow it. In 80% of cases, users themselves, without knowing it, allow PNP to be placed on their computer device. Perhaps you didn’t finish reading what they wrote to you when you downloaded or went to the site and clicked on the ok button. I am a computer technician and have seen this many times, I come to the user and when he shows me his problem on the computer. He closes the window that talks about his problem several times by clicking confirmation. And the user says that this is nonsense and at the same time presses ok. Then he says when he came to the problem, you see what a window has come out! Yes, I see, I say, have you seen it before? They asked you whether to show it to you or not? No, there was something else there, it was probably the browser asking something! Yes, I say I asked whether to show you notifications or not! So this is the difference between viruses and pnp, why antiviruses don’t see it!
  2. Who will protect you from PNP and intrusive advertising?
  3. Currently, and this is the beginning of 2017, in order for your computer device to be completely protected from all threats and unwanted applications, you need to install three protections and configure your operating system depending on how you work on it, say, to perform some actions or checking actions. You can configure it using group policies or the registry by entering it into the keys or creating keys with the necessary settings. Let's say in these articles there are some methods to prevent certain actions that viruses need to execute their code on your system: 1.) 2.) Accordingly, you need to have an antivirus installed, or better yet IS (Internet Security), which has protection not only for file system as in an antivirus, but Internet protection, a firewall that blocks and monitors the ports through which connections are made to other servers on the Internet. Let's say port 80 is used by the HTTP protocol to view sites when you are browsing the Internet and typing in a search engine, visiting a site, viewing maps, visiting social networks, all this goes through the HTTP protocol and port 80. IS, unlike an antivirus, will scan this port for the presence of malicious traffic (packets). But this again does not give full protection your computing device. You need to protect against ransomware if you use email and your computer is used at work or in the office, you have very valuable files on it. Then I, as a doctor, tell you that you need protection from ransomware, unless of course you want to lose all your files or a more humane method in this story is to pay the attacker about 60,000 thousand. You can learn more about what ransomware is and with the help of what science they were created from these two articles: 1.) 2.) Well, having actually learned almost everything that you need to have on a computer device in terms of protection, now let’s move on to PUPs. From PNP and intrusive advertising, in order for your sites to be displayed correctly, let’s say that if you install an ad blocker, as many people like, it will block and useful features Online. You need to configure it correctly or simply install a real leader out of all this, not a purchased one that is inflated in statistics, but a truly full-fledged anti-spy MBAM. MBAM only blocks truly PUPs and intrusive ads, and blocks spyware modules on your system. Works in tandem with any antivirus or IS, does not block useful functions on the site, allowing you to see the full picture of the site. It works the same as any antivirus, there is a scanning engine for the system as a whole, there is a click-to-click option right click mouse over the downloaded file from the Internet and scan it for the presence of PNP. It uses its databases as a full-fledged antivirus, which are updated every day, I will not go into details and words that cannot be understood to a simple user, it is necessary to give a complete explicit description.
  4. More information about MBAM:
  5. MBAM - Malwarebytes I personally bought a key a long time ago and have been using it for almost 7 years; I have never had pop-ups on my computer, redirects to other sites, unwanted advertising and other PNPs that the antivirus could not see. I am not saying this for advertising purposes, because due to my status I would not be able to advertise such a large company on my website. I wrote this article based on my extensive experience in which I outlined everything that I had accumulated in practice. I use it enough good antivirus I won’t say paid because it didn’t work out for me, but Kaspersky doesn’t slow down the system too much and the quality is not inferior to others. About my experience with MBAM over the years, which should be permanently installed on your computer device and not excluded from installation rules computer programs. I repeat, I am not advertising this product, but I am writing an article sharing my experience. Below I have posted a video from the MBAM website, it is in English but there are Russian subtitles, they can be included in the video menu where the viewing scale and video control buttons are:
  6. As I said above (wrote), MBAM showed itself to be quite good and the most important thing is that if you buy a key to use the full version, you will use it for a long time, you won’t have to renew it every year, I haven’t done that for 7 years! MBAM comes in two versions, not to mention other products, separate modules, so to speak, this will be interesting for advanced users. The version for free use disables the automatic option for detecting PNP in some options, about them below, leaving similar options to compare the paid version, a scanner for manually scanning the system, if you suspect something is wrong on your computer device, you run a scan manually. Also in free version You can, as in the paid pro, scan a downloaded file from the Internet or on a flash drive before starting it by right-clicking on the file and selecting scan MBAM from the menu. The product is released for all versions operating systems: , . Anti-virus databases are loaded once every two days and this is enough to search for the latest PNP threats. MBAM also catches some viruses, which in principle it should not do since it is not intended for such purposes.
  7. What is the difference between the free and paid versions of MBAM?

    Free version:
  8. I will give a description for the free version of the product; most functions are called in manual mode on demand:
  9. The function of quickly scanning critical areas of the system: RAM, startup objects, as well as areas of the OS itself where active malware is most often located.
  10. Full system check function: scanned hard disks, system areas, in fact, everything is scanned with a few words. On demand.
  11. Intelligent heuristic analysis: allows you to detect the most persistent threats hiding or camouflaging. On demand.
  12. Daily updates antivirus databases: Contains information about the latest threats, name and other information to detect PUPs and other threats.
  13. Blacklist: you can add a program or package to exclude scanning or if you are sure that the file is not a virus and MBAM is swearing.
  14. Quarantine: where found threats are placed if a rule is configured or the rule is set to default. You can also add the file yourself there.
  15. Integration into context menu: Allows you to check the selected file or folder by right-clicking on it. As I mentioned above, if you downloaded a file from the Internet or you need to run the file from a flash drive, check it by right-clicking on it, and start scanning the selected file. After which, if the threat is not provided, it will be possible to run it for execution.
  16. Multilingual: Russian and other languages.
  17. Malwarebytes Chameleon Dynamic Technology: Allows MBAM to run even if it is blocked by malware.
  18. Additional utilities: Anti-Rootkit, FileAssassin, StartupLite, Chameleon. You can install them separately if you don't want to. full version MBAM.
  19. Paid version:
  20. The paid version of the product is distinguished by add-ons that are disabled in the free version and full automatic scanning, configured in the program in advance or by default. And also fully automatic protection that works 100% according to the stated parameters. Below I will give additional options which work in the PRO version to those described above in the free version:
  21. Real-time protection: detects and blocks threats when accessing infected files, if you decide to run malicious file the system will notify you and remove you to quarantine.
  22. Instant scan function: unlike full and quick scan, instant scan scans: startup and RAM? those areas in which files are launched and are already executed in real time.
  23. Blocking malicious sites: a good feature that will replace all the ad blockers that are out there. As I wrote above, along with advertising, functions for the correct operation of the site in your browser are blocked, because of this the site does not display correctly and does not show you full information, I wrote about this above, mbam displays sites correctly without losing information, you can view the site correctly. It is possible that MBAM will block a site that you consider not malicious, in this case, temporarily disable site blocking in the tray next to the clock, or to avoid this, add this site to the exception every time. Honestly, I haven’t seen sites blocked that really don’t cause harm for a long time. computer device. The databases are updated and if the site is checked by mbam and is not evil, it is not blocked. As mbam develops every year, it becomes better and there are fewer glitches, or rather there are none at all!
  24. Task scheduler: helps you schedule MBAM actions such as scanning at a certain time or loading databases.
  25. Password protection: Protects application settings from unauthorized changes by others or from some changes to settings by malicious users running on your computer device.
  26. How to properly set up an MBAM program?
  27. The correct setting will be different for everyone. But in general, I will show you my setup; if you do it like I did, your MBAM will have fewer resources and will be properly occupied with the task that was entrusted to it by writing it in the program code. Watch the video on how to get into the settings and the setup itself: