Академический Документы
Профессиональный Документы
Культура Документы
Intended Audience
This course was developed for the entry-level computer technician,
as well as the experienced technician who is seeking certification.
For the entry-level student, it starts by explaining the basics and
moves on to more complex topics. It introduces the simple
concepts that underlie today's computers. Once this foundation is
established, it brings you up to date with the latest technology
covered by the LCI’s A+ exam. For the more experienced user, it
provides a fresh review and focus on what is required to meet the
objectives of the A+ exam.
1 Of 242
Chapter 1
1.1 Introduction to Computers
We begin our introduction to computers with a brief history of how
they evolved. Although this course and the LCI’s A+ exam focuses
on the modern electronic computer, many principles used in the
early computational machines still apply to their modern
successors. With a summary of stages in computer development
and discussion of the role of today's computer professional, this
chapter lays the foundation for the subsequent chapters that follow.
2 Of 242
The Abacus
3 Of 242
The First Electrically Driven Computer
The first computer designed expressly for data processing was
patented on January 8, 1889, by Dr. Herman Hollerith of New
York. The prototype model of this electrically operated tabulator
was built for the U. S. Census Bureau and computed results in the
1890 census.
4 Of 242
The Digital Electronic Computer
The first modern digital computer, the ABC (Atanasoff-Berry
Computer), was built in a basement on the Iowa State University
campus in Ames, Iowa, between 1939 and 1942. The development
team was led by John Atanasoff, professor of physics and
mathematics, and Clifford Berry, a graduate student. This machine
included many features still in use today: binary arithmetic,
parallel processing, regenerative memory, separate memory, and
computer functions. When completed, it weighed 750 pounds and
could store 3000 bits (0.4 KB) of data.
The technology developed for the ABC machine was passed from
Atanasoff to John W. Mauchly, who, together with engineer John
Presper Eckert, developed the first large-scale digital computer, the
Electronic Numerical Integrator and Computer (ENIAC). It was
built at the University of Pennsylvania's Moore School of
Electrical Engineering. Begun as a classified military project,
ENIAC was destined to prepare firing and bombing tables for the
U.S. Army and Navy. When finally assembled in 1945, ENIAC
consisted of 30 separate units, plus power supply and forced-air
cooling. It weighed 30 tons, used 19,000 vacuum tubes,
1500 relays, and hundreds of thousands of resistors, capacitors, and
inductors. It required 200 kilowatts of electrical power to operate.
5 Of 242
for a single purpose: cryptanalysis—breaking codes. Using
punched paper tape input, it scanned and analyzed 5000 characters
per second. Colossus became operational in December 1943 and
proved to be one of the most important technological aids to
victory in World War II. It enabled the British to break the
otherwise impenetrable German "Enigma" codes.
The 1960s and 1970s marked the era of the mainframe computer.
Using the technology of ABC, ENIAC, and Colossus, large
computers and emerging companies came to dominate the
industry.
Year Events
1971 The 4004—the first 4-bit microprocessor—is introduced by Intel. It boasts
2000 transistors with a clock speed of up to 1 MHz (megahertz).
1972 The first 8-bit microprocessor—the 8008—is released.
1974 The 8080 microprocessor is developed. This improved version of the 8008
becomes the standard from which future processors will be designed.
1975 Digital Research introduces CP/M—an operating system for the 8080. The
combination of software and hardware becomes the basis for the standard
computer.
6 Of 242
1976 Zilog introduces the Z80—a low-cost microprocessor (equivalent to the
8080).
The Apple I comes into existence, although it is not yet in wide use.
1977 The Apple II and the Commodore PET computers, both of which use a
6502 processor, are introduced. These two products become the basis for
the home computer. Apple’s popularity begins to grow.
1978 Intel introduces a 16-bit processor, the 8086, and a companion math
coprocessor, the 8087.
Intel also introduces the 8088. It is similar to the 8086, but it transmits 8
bits at a time.
1980 Motorola introduces the 68000—a 16-bit processor important to the
development of Apple and Atari computers. Motorola’s 68000 becomes the
processor of choice for Apple.
1981 The IBM personal computer (PC) is born; it contains a 4.7-MHz 8088
processor, 64 KB (kilobytes) of RAM (random access memory) and is
equipped with a version of MS-DOS 1.0 (three files and some utilities).
Available mass-storage devices include a 5.25-inch floppy drive and a
cassette tape drive.
1982 Intel completes development of the 80286—a 16-bit processor with
150,000 transistors.
MS-DOS 1.1 now supports double-sided floppy disks that hold 360 KB of
data.
1983 IBM introduces the XT computer with a 10-MB hard-disk drive.
MS-DOS 2.0 arrives—it features a tree-like structure and native support for
hard-disk drive operations.
1984 The first computer with an 80286 chip—the IBM AT—enters the market. It
is a 6-MHz machine with a 20-MB hard-disk drive and a high-density, 1.2-
MB 5.25-inch floppy-disk drive.
1985 MS-DOS 3.2, which supports networks, is released.
1986 The first Intel 80386-based computer is introduced by Compaq; it features a
32-bit processor with expanded multitasking capability (even though no PC
operating system yet fully supports the feature).
1987 MS-DOS 3.3 arrives, allowing use of 1.44-MB 3.5-inch floppy-disk drives
and hard-disk drives larger than 32 MB.
1988 IBM introduces the PS/2 computer series. A complete departure from
previous machines, its proprietary design does not support the hardware and
software available on IBM PCs or clones.
7 Of 242
Microsoft (with the help of IBM) develops OS/2 (Operating System 2),
which allows 32-bit operations, genuine multitasking, and full MS-DOS
compatibility.
IBM has now shipped over one million OS/2 Warp software packages.
8 Of 242
Multimedia and Internet connections have become the de facto standard for
new PCs.
Windows 98 becomes the standard operating system for most new personal
computers.
1999 Processors exceed 600 MHz.
Matching the rapid pace of change in the industry, the role of the
computer professional is constantly changing, too. Not too many
years ago, all that was needed to repair a computer was a
screwdriver, needle-nose pliers, the documentation for the
computer, a bootable disk with a few utilities, and a good MS-DOS
reference manual. Although these tools are still fundamental to the
job, to be ready for all situations, a technician has to travel with an
entire library of technical manuals (a laptop computer with a CD-
ROM drive and modem helps, too). The screwdriver is still the
standard repair tool, but the technician is confronted with a wider
array of case types, motherboard designs, processor types, and
operating systems—and a wider array of customer needs. Today's
computer professional needs to be a technician, a scholar, and a
diplomat rolled into one, as you can see by the table that follows.
9 Of 242
Title Skills
Technician You are able to troubleshoot and repair hardware and software
efficiently and quickly.
Scholar You have the wisdom and perseverance to seek answers to what you
don't know and build your base of knowledge. Learning never stops.
Diplomat You are able to instill in the user (your customer) the confidence that
you are in control and can fix things, even when you are encountering
them for the first time. You are able to resolve the problem, even if your
customer's (lack of) understanding of the computer might be part of that
problem.
Chapter Summary
The following points summarize the key concepts in this chapter:
Types Of Computers
• Computers could be classified as being Analogue, Digital or
Hybrid.
• Analogue Computers measure data in a continuous manner,
Digital measures data in binary digits “bits” and Hybrid
Computers combine the two features.
10 Of 242
The Role of a Computer Service Professional
11 Of 242
Chapter 2: How computers work
2.1 Components (Parts) Of Computer
Every Computer System is made up of two major components viz:
- The Hardware and the Software. Hardware components are the
physical or visible parts of a computer that one can see and touch,
for example the Systems Unit, the monitor, the Key-Board, mouse
etc. Software components are the invisible parts including Systems
Software like the BIOS (Basic Input Output System), Operating
System (OS) e.g. DOS, WINDOWS, UNIX, LINUX etc and
Application Software like ORACLE, DBASE, and FOXFRO etc.
12 Of 242
2.3 Three kinds of software
PC software can be divided into three categories: BIOS (Basic
Input Output System) or firmware, operating systems (OS), and
applications software. The BIOS is software that is permanently
stored on a computer chip. The BIOS is used to help boot the
computer and to communicate with I/O devices. When the
computer is first turned on, the BIOS control the computer. During
the process of booting, the BIOS load the OS and the OS takes
control. The OS acts as an interface between hardware and
software, manages storage (primary and secondary), and performs
various housekeeping tasks. Users interact with the OS by one of
three interfaces: command-driven, menu-driven, or icon-driven.
13 Of 242
2.5 Hardware Components (Parts)
What is the difference between hardware and software? Hardware
includes the physical devices that make up a computer. Software
includes programs that tell the computer how to use these devices.
Firmware is the middleman that translates the software commands
to the proper hardware voltages. Input/output devices typically
called peripheral devices, reside outside the computer case. The
monitor, keyboard, and mouse are examples of peripheral devices.
To attach a peripheral device a connection is needed. This
connection is called a port. Some examples of port include COM 1,
COM2 and LPT1 & LPT2.
14 Of 242
2.6 Hardware used for input and output
Monitors are one of the two most popular types of output devices
in use today. Hardware manufacturers rate a monitor according to
the viewable size of its screen and by the number of pixels used to
display the screen. A pixel is a dot or unit of color that is the
smallest unit of display on a monitor. Modern color monitors
typically have millions of pixels, which make up the screen.
15 Of 242
2.8 The system board
The largest and most important circuit board in the computer is the
system board. All other circuit boards in a computer attach to the
system board in some manner. The system board also houses the
CPU (Central Processing Unit), which is the brain of a PC. The
CPU is involved in almost every calculation the PC makes.
16 Of 242
2.9 Components used primarily for
processing
Three components are primarily used for processing in almost all
computers. They are:
17 Of 242
2.11 Permanent (secondary) storage
devices
RAM on the system board, is considered primary storage;
secondary storage is everything else. The four most popular
secondary storage devices are hard disks, floppy disks, Zip drives
and CD-ROMs. A hard drive consists of several metal platters
and metal read/write heads. The heads move over the platters to
read and write data. However, if the heads ever touch the platters,
it is considered a head crash. Bumping or dropping a hard drive
can cause a head crash. Laptops are particularly susceptible to head
crashes. A hard drive controller is the device responsible for
directly controlling the head movement of the hard drive. Older
hard drives did not come with onboard controllers. A floppy disk
uses the same method as a hard drive but because it is designed
to be portable, it has only one platter, made of plastic, and has no
heads. In order to read the data stored on a floppy disk, the disk
must be put into a floppy drive. The drive then uses its heads to
read the data stored on the floppy disk’s platter.
18 Of 242
2.13 Interface (expansion) cards
The three most commonly used expansion card types are:
19 Of 242
2.15 Instructions and data stored on the
system board
BIOS (Basic Input/Output System) is firmware that controls much
of a computer’s input/output functions, such as communication
with the floppy drive, RAM chips, and the monitor. BIOS is also
called RAM BIOS. ROM (Read Only Memory) is a chip that can
hold data without an electrical charge. Flash ROM can also hold
data without an electrical charge, but unlike ROM the data can be
erased and rewritten by software. The process of erasing and
rewriting data to a flash ROM chip is referred to as flashing.
20 Of 242
2.16.2 Operating Systems (OS)
The operating system creates an environment in which all
applications can be executed. Operating systems are normally
stored on the hard drive. Some of the most common operating
systems in use today include: DOS (Disk Operating System),
Windows 3.1, Windows 9x, Windows NT, OS/2 and UNIX.
21 Of 242
Survey of Operating Systems
Multitasking refers to the ability to execute more than one task at
a time. Older CPUs and operating systems did not have this ability.
Cooperative multitasking is a type of pseudo-multitasking hereby
the CPU switches back and forth between programs loaded at the
same time. One program sits in the background waiting for the
other to relinquish control. Cooperative multitasking is also called
task switching. Cooperative multitasking was designed to give the
illusion of multitasking. Preemptive multitasking is a type of
pseudo-multitasking whereby the CPU allows an application a
specified period of time and then preempts the processing to give
time to another application. A computing environment refers to
the operating system and its capabilities. Refer to the tables found
on pages 35-40 of your textbook, to evaluate the advantages and
disadvantages of each type of operating system.
22 Of 242
Real/Protected Modes
What is the difference between real mode and protected mode?
Real mode is a single tasking operating mode whereby a program
only has 1024K of memory address, has direct access to RAM, and
uses a 16-bit data path. Protected mode is an operating mode
that supports multitasking whereby the OS manages memory,
programs have more than 1024K of memory addresses, and
programs can use a 32-bit data path. In protected mode, the OS
does not allow a program direct access to RAM, but works as the
mediator between memory and programs. This allows the OS some
latitude in how it uses RAM. If the OS is low on RAM, it can store
some data on the hard drive. The method of using hard drive space
as though it were RAM is called virtual memory. Windows
implements virtual memory by storing data in a file on the hard
drive called the swap file.
23 Of 242
How Applications Software is Loaded and
Initialized
A directory is a folder where files can be stored. Think of the root
directory as the main folder. All files and folders on the PC are
ultimately stored in the main folder, or root directory. Note that the
root directory is represented by a backslash (\). To execute a file
under DOS, you would type in the name of the file. DOS will then
search for the file in the following order: .com, .exe, .bat. DOS will
only search the current directory unless a search path has been
specified. A search path is a list of default directories that the
operating system will search when looking for an executable. The
search path can be edited using the PATH command or by
modifying the AUTOEXEC.BAT. If you specify a path when
attempting to execute a file, the operating system will not have to
use the search path to locate the file.
24 Of 242
Figure 2.3 Three stages of computing.
Input
Input is the first stage of computing. Input refers to any means that
moves data (information) from the outside world into the
processor. Today's PC can support a wide variety of input devices;
keyboards, mouse devices, voice recognition devices, sound cards,
modems, scanners, tape drives, CD/DVD drives, and video
cameras are some of the most common.
Processing
Processing is the second stage of computing: the actual
manipulation of data by the computer. Computers were designed
initially as tools to carry out the tedious task of "number
crunching" and then, later, to store large amounts of often
redundant data. Today, computers not only fulfill ever-expanding
scientific and business roles, but they also fill our lives with
25 Of 242
education, entertainment, organization, information processing,
and—occasionally—frustration. As we enter this new century,
computers have become a necessity of life and are often taken for
granted. Even for people who do not own or use a personal
computer, they are an increasing part of everyday life. And
computer technology hides in many everyday appliances.
Microprocessors run most of our mechanical and electronic
devices, including cars, cameras, VCRs, microwave ovens,
telephones, and the checkout system at the supermarket.
Output
Output is the third stage of computing. All the input and processing
in the world won't do us any good unless we can get the
information back from the computer in a comprehensible and
usable form. Output devices today come in many forms: monitors,
printers, fax machines, modems, plotters, CD-recordable discs,
sound cards, and more.
I/O Devices
Some devices handle both input and output functions. These
devices are called input/output (I/O) devices, a term you will
encounter quite often. Examples of these devices are Floppy-disk
drive, Hard-disk, Modem, Network cards, CR-R, CD-WR and
Tape-drive.
26 Of 242
Chapter Summary
The following points summarize the key concepts in this chapter:
27 Of 242
Chapter 3 How Software and Hardware
work together
28 Of 242
3.2 How User Interact with the Computer
29 Of 242
do. Simple devices just have a few I/O addresses, while
complicated ones have many I/O Addresses electronically attached
to them. However, no two devices can share the same I/O Address.
30 Of 242
3.5 Easy ways to protect hardware and
software
Since problems can, and often do, occur with computers, it is
important to protect data, software, and hardware. The CMOS
(Complementary Metal-Oxide Semiconductor) is important to the
successful operation of a computer, so a backup of the CMOS
information should be made and kept in a safe place.
An OS rescue disk for OS lower than WindowsXP, which allows
the computer to be booted from the disk rather than the hard drive,
should also be made. The disk should contain enough software to
load the OS and the AUTOEXEC.BAT and CONFIG.SYS files
with the software needed to access the CD-ROM drive in order to
use the Windows 9x CD. It is also a good idea to regularly make a
backup of the computer’s hard drive. The backup is just an extra
copy of a file or files made to a different location or storage media.
Along with copies of the CMOS, boot disk, and hard drive backup,
all the hardware and software documentation should be kept
in a safe place in case it is needed later.
31 Of 242
2. The ROM BIOS Startup Program searches for and loads an
operating system. After all the hardware resources have been
verified, the CMOS chip tells the startup BIOS where to find an
operating system. If the BIOS finds an operating system, it will
load the first files of the operating system into memory, then hand
over control to the operating system.
3. The operating system configures the system and completes
its own loading.
When the operating system takes control, it verifies the hardware
again and then loads the device drivers necessary to control the
hardware.
4. The user executes applications software. When the user
executes an application, the operating system must first find the
proper files then copy them into memory and execute the program.
What happens when an application request? The user points and
clicks within an application. The application then makes a request
to the operating system and the operating system forwards the
request to either a device driver or the system BIOS. Finally, the
system BIOS or device driver translates the request into a
"language” the hardware device can understand.
Step 1: Power - On Self Test (POST)
The term POST refers to the processes the startup BIOS manages
when a system is first powered on (testing vital hardware
components and comparing detected hardware to the CMOS
settings).
32 Of 242
user can modify. The CONFIG.SYS normally contains the
following statements:
TSR stand for Terminate and Stay Resident. The term TSR is
used when referring to programs, such as device drivers, that stay
resident in RAM even though they may not be in use.
33 Of 242
Booting with Windows 95 and Windows 98
The boot process for Windows 95 is very similar to the boot
process for Windows 3.x, although some files are used differently.
Windows 95 uses the MSDOS.SYS file in a different way than
Windows 3.x (more like an INI file). Although Windows 95 still
searches for and loads the CONFIG.SYS and AUTOEXEC.BAT,
it does not need these files to load device drivers or Windows.
Windows 98 has eliminated the pauses during the boot process and
improved startup code for faster processing.
34 Of 242
Hardware components most often use memory to store data
instructions. These instructions are used to send requests to and
retrieve results from a device. In contrast, software, both
applications and operating systems, use memory addresses to
temporarily store data so that it can be easily manipulated.
Memory addresses are, for the most part, assigned by the BIOS
and OS during the boot process. Recall that the boot process begins
with the startup BIOS on the ROM BIOS chip.
35 Of 242
Input/Output Addresses
Another system resource that is made available to hardware
devices is input/output addresses or I/O addresses. I/O addresses
(AKA port addresses or ports) are numbers that the CPU can use
to access hardware devices. An interrupt request is made and is
sent to the I/O address table to find out which program will service
the request. The I/O address table is stored at the bottom of
memory. Next, the interrupt goes to the program that will service
the request - the interrupt handler. The CPU then follows the
instructions to service the device and passes data to the operating
system. An I/O conflict occurs when two hardware devices claim
the same memory address.
36 Of 242
Tying It All Together
Figure 3-3 illustrates hardware interrupt, where the request handler
is BIOS:
37 Of 242
Configuration Data and How it is Stored
The setup program is a way of viewing the information stored in
CMOS from the last time the system was booted. This information
is often referred to as configuration data or setup data. DIP
switches are switches that have two positions - ON, which has a
binary value of 1, or OFF, which has a binary value of 0. These
switches are used to tell the device how to respond. DIP switches
give a device added configuration information by telling it how to
behave (IRQ, DMA, I/O address). You can access the BIOS setup
program by pressing some combination of keys during the boot
process. The exact way to enter setup varies from one system-
board manufacturer to another. Jumpers give the device added
configuration information by telling it how to behave (IRQ, DMA,
38 Of 242
I/O address). Jumpers are functionally the same as DIP switches
but have a different physical appearance. A jumper consists of two
pins sticking up side by side, with a cover over the two pins
making a connection. CMOS passwords can protect systems from
being booted. Unfortunately because the password is stored in
CMOS it will be erased if the CMOS chip loses power. Should the
user forget their CMOS password, most system boards have a
jumper or DIP switch available that will clear the CMOS password
without clearing all of the CMOS configuration information. Note
that for this reason, these types of passwords are not considered
secure.
39 Of 242
Damage from Electricity: ESD (electrostatic discharge) and
power spikes are the two most common types of electrical damage
sustained by computers.
Chapter Summary
The following points summarize the key concepts in this chapter
Computer Communication
• I/O Address
• Memory Addresses
40 Of 242
Chapter Review Questions
1. What do you understand by the word POST
2. List the number of System resources you know
3. If you want to add a hardware device to a Computer
System, What do you necessarily need to know?
4. Explain the difference between Jumpers and Dip
switches
5. The acronym CMOS stands for what?
6. Innumerate the essential steps you should take to
protect both hardware and software of a Computer System
41 Of 242
Chapter 4 Primary PC Components
4.0 Introduction
In this chapter, we focus on the computer's infrastructure. We
begin with the centerpiece of the computer, the System Board or
motherboard, also known as the main board. The motherboard is
the key member of the hardware infrastructure. It is a large circuit
board that serves as a home for the CPU and all its associated
chips, including the chip set and RAM, and connect them to the
rest of the physical elements and components of the computer.
42 Of 242
conjunction with the system clock. The system clock is dedicated
to timing the activities of the chips on the system board. The
chipset controls bus activity.
43 Of 242
4.5 Types of system board
There are two popular types of system boards - the older AT and
the newer ATX. The differences between the two types of boards
have nothing to do with their overall performance - they differ only
in size, convenience features, the type of case into which they will
fit, and the type of power connections they have.
When you purchase a system board your selection determines the
following:
• Type and speed of the CPU.
• Chip set on the board (which is built-in)
• Memory cache type and size
• Types and number of expansion slots: ISA, EISA, VESA local
bus, PCI, and AGP.
• Type of memory parity or nonparity, EDO, SDRAM, SIMMs or
DIMMs
• Maximum amount of memory you can put on the board and the
incremental amounts by which memory can be upgraded.
• Type of case you can use
• ROM BIOS, which is already installed
• Type of keyboard connector
• Presence or absence of different types of proprietary video and/or
proprietary local bus slots
• Presence or absence of IDE adapters and SCSI controller
• Presence or absence of COM ports, LPT ports, and mouse port
44 Of 242
The universal bus is expected to eventually replace serial and
parallel ports and is designed to make installation and
configuration of I/O devices easy, providing room for as many as
127 devices daisy-chained together. The Universal Serial Bus
(USB) uses only a single set of resources for all devices on the bus.
45 Of 242
4.6 The CPU and the chipset
CUPs are rated using the following guidelines:
• CPU speed measured in megahertz
• Efficiency of the programming code
• Word size, sometimes called the internal data path size
• Data path
• Maximum number of memory addresses
• The amount of memory included with the CPU
• Multiprocessing ability
• Special functionality
46 Of 242
The Pentium and Its Competitors
Bus speed, which is measurable, is the speed or frequency at
which the data on the system board is moving. To determine the
clock speed of a system, you would perform the following
equation:
Bus speed x multiplier = clock speed
A memory cache that is included on the CPU microchip itself is
called internal cache.
Internal cache is faster than external cache and is contained inside
the 80486 or Pentium CPU. External cache is static memory that
is stored on the system board or inside the CPU housing, which is
not part of the CPU.
The Pentium II uses Slot 1 architecture and ranges in speeds from
233MHz - 333MHz.The Classic Pentium uses a Socket 7 ZIF to
connect to the system board and ranges in speeds from 75MHz -
200MHZ. Table 3-4 illustrates the Intel Pentium family of CPUs:
47 Of 242
The Pentium Competitors
Intel’s two primary competitors are AMD and Cyrix. Both
companies have advertised goals to produce CPU’s that are just as
fast and powerful as Intel’s but cost less. You can get more
information about Pentiums and competitors at
http://www.intel.com.
48 Of 242
CPU Voltage Regulator: Some CPUs require one voltage amount
for external operations and another amount for internal operations.
Those that require two different voltages are called dual voltage
CPUs. Most often the CPU’s voltage is configured via jumpers or
DIP switches found on the system board near the CPU socket.
Some modern system boards require an additional circuit board,
called a voltage regulator, to control the amount of voltage on the
system board.
The Chip Set: is set of chips on the system board that collectively
controls the memory cache, external buses, and some peripherals.
49 Of 242
4.7 Rom Bios
One of the more common problems with older BIOS versions was
that you were required to upgrade the BIOS chip when adding new
hardware. This isn’t a problem on modern system boards because
Flash ROM is now used for the BIOS rather than ROM. The most
common problem seen today when attempting to upgrade a hard
drive is, older BIOS can’t recognize a large capacity drive because
the BIOS chip has not been upgraded with that capability.
50 Of 242
4.8 RAM (Random Access Memory)
Dynamic Memory
There are two types of RAM: dynamic RAM and static RAM.
Dynamic RAM chips hold data for a very short time; static RAM
chips hold data until the power is turned off. Parity is an error-
checking scheme in which a ninth, or "parity," bit is added. The
value of the parity bit is set to either 0 or 1 to provide an even
number of ones for even parity and an odd number of ones for odd
parity. A parity error occurs when the number of ones in the byte
is not in agreement with the expected number. Generally speaking,
a "Parity Error 1" is a parity error on the system board, while a
"Parity Error 2" is a parity error on a memory expansion board.
Recall that later, computers were made to hold RAM on a group of
chips stored in a single physical unit called a SIMM (single inline
memory module). SIMMs holds from 8 MB to 64 MB of RAM on
one board. All new system boards today use DIMMs (dual inline
memory modules), which can hold from 8 MB to 256 MB of RAM
on a single board. Differences between SIMMs and DIMMs
include access speed, physical size, slot type, required voltage, and
cost.
51 Of 242
4.9 Buses and Expansion Slots
Bus Evolution
In the early 1980s when PCs were first introduced, there was only
one bus on the system board, called the system bus. The system
bus manages the electrical power, control signals, memory
addresses, and data. At that time, the system bus ran at the same
speed as the CPU. Everything on the system board working with
the CPU or the bus would keep the same beat; following the pulses
of the system clock (the system clock is run by a crystal on the
system board, occupies one line of a bus and keeps the "beat" for
the CPU and other devices). Over time, different hardware
components have developed at different speeds. Now, the typical
PC will have as many as 5 or 6 different bus speeds. For example
The CPU works at one speed, the bus connecting the CPU to the
memory is working at a slower speed, and the bus communicating
with I/O devices must work at an even slower speed. For example,
legacy devices such as an 8 or 16-bit expansion card are typically
not able to keep up with the "beat" of the system bus, so they
normally are counting one "beat" for every three or four "beats"
that the system bus has counted.
52 Of 242
Bus Types
ISA Bus: The ISA (Industry Standard Architecture) bus was used
in the early 1980`s on the first IBM PCs. Initially, the ISA bus had
an 8-bit data path, but IBM later revised it to have a 16-bit data
size. The IBM AT personal computer used this bus and the 80286
chip, which is why the 16-bit bus is sometimes referred to as the
AT bus.
Universal Serial Bus: With USB you can display daisy chain
devices such as scanners, keyboards, mice and modems. USB has a
data transfer rate of almost 10mbs - faster than the current serial
standard.
53 Of 242
Local I/O Buses: The local bus is anything that runs at the same
speed or near the same speed as the CPU. The VESA (Video
Electronics Standards Association) standard was created to
accommodate memory expansion slots. Many hardware vendors
endorsed the VESA standard because it was the first opportunity to
develop a 32-bit standard for PCs.
54 Of 242
4.10 On-Board Ports
An "on-board port" is some type of communication port that is an
integrated part of the system board, such as a built-in keyboard
port or on-board serial port. If an on-board port fails, it can
normally be disabled using the CMOS setup program.
The real value of a case does not lie in the label, color, or how
pretty it looks. The case houses all the internal components, offers
access to the outside world (ports and connectors), and protects the
PC's delicate circuits from damage and electromagnetic
interference. And it protects surrounding devices, such as TVs,
from the PC's EMI.
55 Of 242
When considering the case, there are three general rules to follow:
• The bigger the box, the more components it can hold (the
greater the expansion potential) and, often, the better the
airflow (essential for cooling). Large cases are easier to work
with.
• The more compact the box, the less expansion potential it
has; working on it is often much more difficult, and usually
airflow is reduced.
• Smaller cases that come with a power supply usually have
lower wattage, once again reducing the number of internal
devices that can be installed.
Important
It is not a good idea to run a computer for extended periods of time
with the case open or removed entirely. This not only produces
EMI, but also results in improper airflow and reduced cooling of
the system components.
56 Of 242
The majority of cases still open the old-fashioned way. But if you
find yourself with one of the exceptions and can't locate screws in
the back, check to see if the plastic cover in the front can be pulled
off. If so, that should reveal three or four screws. Then see if the
main cover can be pulled forward. If not, look for screws that
secure one or more of the side panels. Some side panel designs are
great for granting easy access to our previous topic, motherboards.
This style of case allows one to inspect or remove the motherboard
without having to remove the entire outer covering.
Chapter Summary
The following points summarize the key concepts in this chapter:
Motherboards
• The motherboard defines the capabilities of a computer.
• Not all motherboards are the same. Some manufacturers have
proprietary motherboards that can be used only in their own
computers. They will also require proprietary parts for
expansion. Generally, these motherboards are of higher
quality (and price).
Rom Bios
• BIOS chips are used to provide data to the CPU; this data
tells the CPU how to operate specific devices.
• CMOS is a BIOS chip that can have its data updated. The
CMOS setup program is used to make these changes.
• CMOS chips require a battery to save the data when power to
the computer is off.
• Some of the newer BIOS chips are updatable. These are
called flash BIOS.
57 Of 242
• A device driver is a program that acts as an interface between
the operating system and the control circuits that operate the
device.
• On machines running MS-DOS, device drivers are loaded by
the CONFIG.SYS file.
• Computers running Windows 95, 98, or 2000 load their own
device drivers and do not require a CONFIG.SYS file.
• POST is used to check a computer before it boots.
• POST errors are indicated by beeps before the video is
checked and by text after the video check.
Computer Cases
• The function of the case is to house the computer's internal
components, connect the computer to the outside world with
ports and connectors, and to protect the computer from
damage.
• To prevent electromagnetic interference, avoid running a
computer without the cover on.
58 Of 242
Chapter 5 Understanding and managing
memory
5.0 Introduction
In earlier chapters, we learned that the CPU and motherboard (bus
and controllers) are critical components that help determine the
overall speed with which a computer can process data. This
chapter looks at another important system component and
performance factor: the memory. Technicians are often asked to
upgrade PCs by adding more memory, and memory conflicts or
errors commonly prompt calls for assistance by users.
Understanding how memory works, how to choose the right
memory for a given system, and how to troubleshoot memory
problems is critical to success as a computer technician.
59 Of 242
5.2 How memory is used by dos and
windows
Windows 95 was the first OS in the evolution of operating systems
to support 32-bit protected mode applications software. Most of the
Windows 9x code is written in 32-bit protected mode, but it still
allows 16-bit real-mode device drivers, and 16-bit software can be
run in a virtual DOS machine (VDM), or can run in real mode. A
VDM is an environment that is a 32-bit protected-mode OS
provides for a real-mode program to operate in. Conventional
memory consists of the first 640K of memory addresses. The
memory addresses from 640K to 1024K are called upper memory.
Memory above 1024K is called extended memory, and the first
64K of extended memory is called the high memory area.
Early versions of DOS restricted the number of memory addresses
to only 640K, and the next group of addresses, the 384K above
conventional memory was assigned to utility operations for the
system. This can be a problem because programs almost always
expect data to be written into memory directly above the addresses
for the program itself. So if a program begins storing its data above
its location in conventional memory, eventually it will hit the
beginning of upper memory assigned to video ROM. Virtual
memory is the utilization of some hard drive space such that it acts
like memory. Windows stores virtual memory in a file called a
swap file.
60 Of 242
5.3 How to manage memory using dos,
windows 3.x and windows 9x
When using DOS, access to extended memory for applications is
attained by the memory driver, HIMEM.SYS loaded from the
CONFIG.SYS file. In addition, upper memory blocks for device
drivers and other TSRs can be made available by loading
EMM386.EXE from the CONFIG.SYS file. Device drivers can
then be loaded high from the CONFIG.SYS file and TSRs can be
loaded high from AUTOEXEC.BAT. Windows 3.x can run in
protected mode, which is called 386 Enhanced Mode. When using
Windows 9x, HIMEM.SYS is automatically loaded to manage
extended memory without an entry in the CONFIG.SYS file.
Windows 9x will automatically load device drivers and
applications into extended memory if those applications run in
protected mode. Windows 9x manages the swap file without the
user setting the size and type of swap file as is needed with
Windows 3.x.
61 Of 242
5.5 Physical memory
SRAM is static RAM, which maintains the data written to it until
the data is overwritten or the power is cycled. DRAM is dynamic
RAM and it cannot maintain data written to it without being
refreshed about every 4 milliseconds. Unlike DRAM, SRAM does
not have to be constantly refreshed by the DMA controller and the
CPU; therefore, it is considered faster than DRAM. RAM stores
data temporarily, whereas ROM chips save data permanently.
EEPROM chips are ROM chips that can be upgraded using special
software. EEPROM are often used on the system board and
expansion cards to store the BIOS program. FLASH memory acts
like secondary storage because it does not lose its data when
powered off. FLASH memory is faster than conventional
secondary storage devices, because it stores data electronically
rather than using magnetism and mechanical arms and platters.
RAM is normally installed either on circuit boards called SIMMs,
or soldered directly onto the system board.
62 Of 242
Types of SRAM include:
SIMMs are sold in sizes ranging from 2MB to 256MB. SIMMs are
rated in nanoseconds (NS). Some common SIMM speeds include
60NS, 70NS and 80NS. Note that an access time of 60NS is faster
than 70NS. SIMMs technology includes:
• FPM (Fast Page Mode) memory. - An earlier memory mode
used before the introduction of EDO memory.
• EDO (Extended Data Output) memory. - A type of RAM that
may be 10-20% faster than conventional RAM because it
eliminates the delay before it issues the next memory address.
63 Of 242
DIMM Technology includes:
64 Of 242
You should consider the following points when purchasing RAM:
Tin or Gold leads. Always match the metals used on the system
board with the metal type on the SIMM. This will eliminate the
possibility of a chemical reaction. Note: A good rule to follow
when working with memory is to match everything - speed, lead
type, pins and parity.
• Choosing the correct size module. Most memory has to be
installed in pairs.
• Remanufactured and used modules. A simple way to identify
refurbished (remanufactured) SIMMs is to check the date on the
RAM chips on the SIMM.
Look for the data in the following format: YYWW. Where Y is the
year the chip was made and W is the week the chip was made.
• Re-marked chips. Re-marked chips have been returned to the
manufacturer, marked again and sent back out. Note: a quick way
to tell the difference is to look at the RAM chip - if it has a shiny
protective coating it is probably a new chip.
65 Of 242
5.6 How DOS and windows 9x view
memory
Physical memory and memory addresses
A memory address is a number that the CPU assigns to physical
memory to keep track of the memory it can access. Note that CPUs
have a limited number of memory addresses that they can assign to
physical memory. Some older expansion cards had built-in ROM
chips that could only be assigned a particular memory address.
This inflexibility created problems when another expansion card,
requiring the same memory address, was installed. Memory
mapping is the process of assigning memory addresses to physical
RAM and ROM during the boot process. In order for the CPU to
access RAM or ROM, it must have a memory address assigned to
it. ROM is normally assigned its own memory address, and is
addressed in the same manner as RAM. Note that ROM is only
copied into RAM when it is being shadowed - this will
be discussed later in this chapter. Shadowing ROM refers to the
process of copying ROM data to RAM for faster access. Shadow
RAM (RAM used to shadow ROM) is used to speed up system
response time. Note that one of the most commonly shadowed
devices is the video card.
Areas of the Memory Map
Below is a list of summary of memory locations:
1. Conventional memory. Conventional memory is the first 640K
of RAM.
2. Upper memory. Upper memory includes the memory starting at
641K and ranging up to 1024K.
3. Extended memory. Extended memory includes all memory
above the first 1024K.
4. High memory area. The high memory area is the first 64K of
extended memory.
5. Expanded memory. Expanded memory is the memory that is
accessed in 16K pages via the upper memory area.
66 Of 242
Conventional Memory: Conventional memory is limited to 640K
because when DOS was originally designed it was decided that no
one would ever need more than 640K of memory. This assumption
was, of course, incorrect. Part of the reason this decision was
made, was to allow video ROM and other older hardware to use
the memory addresses directly above 640K for their ROM and
RAM. Reasons why 640K is no longer adequate:
67 Of 242
In order for the operating system to access extended memory it
requires a memory management device driver.
68 Of 242
Virtual memory
Virtual memory refers to the process of using hard drive space as
a substitute for RAM. Because virtual memory is stored on the
hard drive, it is considerably slower than RAM. The swap file is a
file on the hard drive that Windows addresses as memory, thereby
making virtual memory possible.
RAM Drives
A RAM drive is a section of extended memory that acts like a
physical drive. The advantage of using a RAM drive is the data
stored there can be accessed quicker than data on a physical hard
drive. The disadvantage is it has to be recreated every time the
power is cycled, and can’t maintain any permanent data. To create
a RAM drive, use the following command in the CONFIG.SYS:
(This command will create a RAM drive that is 1024KB in size)
DEVICE=C:\DOS\RAMDRIVE.SYS 1024.
69 Of 242
request data from a device. In modern computers buffer use has
been replaced with disk caching. Figure 4-11 shows an example of
a very simple CONFIG.SYS that loads HIMEM.SYS:
70 Of 242
Loading Device Drivers High
When DOS loads a device driver into the upper memory area, it
will allocate the largest consecutive block of upper memory to the
first device driver that is loaded. Load size refers to the amount of
memory required by a device driver to initialize itself in memory
and maintain enough room to store data. It is important to
understand that data is stored directly above the driver in memory.
Therefore, the memory directly above a driver is considered to be
part of the "load size" for the driver. If a device driver is specified
in the CONFIG.SYS to load into upper memory and does not, it is
probably because there was not a large enough consecutive
memory range (UMB) available for the device driver to initialize
and store data.
All device drivers are TSRs but not all TSRs are device drivers.
TSRs are programs or drivers that reside in memory when they are
not in use. Device drivers always reside in memory when they are
not in use; therefore all device drivers are TSRs.
71 Of 242
Before the LOADHIGH command will load programs into the
upper memory area, DOS must first initialize the upper memory
area. You would use the following commands to initialize the
upper memory area (the NOEMS parameter tells DOS not to
emulate expanded memory):
DEVICE=C:\DOS\HIMEM.SYS
DEVICE=C:\DOS\EMM386.EXE NOEMS
DOS=UMB
It isn’t always a good idea to load TSRs into upper memory. Some
TSRs can’t function properly when loaded into upper memory and
sometimes there is not a large enough block to load a TSR into
upper memory.
72 Of 242
5.8 Managing memory with windows 3.x
Swapping is the method of temporarily moving data from memory
to the swap file on the hard drive to free up memory for other
purposes. The following three swapping methods are used in the
Windows 3.x environment:
1. Temporary files
2. Application swap files
3. Swap files used to create virtual memory
73 Of 242
Optimizing Windows with the Swap File
When there is no swap file specified or not enough room to create
a swap file, performance will suffer significantly. When creating a
swap file it is important to not make the swap file too large - if it
is, Windows will use the swap file more often than necessary and
slow down the system’s overall performance. On most systems,
you would want to make the swap file the same size as the physical
memory. Permanent swap files are faster than temporary swap
files because they don’t have to be resized and their clusters are
always consecutive on the disk drive. If you have the extra
resources to spare, putting your swap file on a RAM drive will
force Windows to always use RAM; even for virtual memory this
will significantly improve your overall system performance. Figure
5- demonstrates how to change your swap files size, via Control
Panel.
74 Of 242
5.9 Managing memory with windows 9x
Memory management has not changed much in Windows 9x - it is
still organized as conventional, upper, extended and expanded
memory. Windows 9x attempts to use only 32-bit drivers, rather
than 16-bit drivers. An advantage of using 32-bit drivers over 16-
bit drivers is 32-bit drivers are normally written in fast code, and
are automatically loaded into extended memory by Windows 95. A
real mode driver is a 16-bit driver. A virtual
device driver, or VXD, is a 32-bit driver.
Although Windows 9x does not require the AUTOEXEC.BAT and
the CONFIG.SYS file for normal operation, it maintains a copy of
these files in order to provide backwards compatibility for 16-bit
drivers and applications. If you are using 16-bit drivers you will
need to edit the CONFIG.SYS and add the HIMEM.SYS,
EMM386.EXE and DOS=UMB commands, because these are not
automatically added by Windows 9x.
75 Of 242
Real Mode vs. Virtual Real Mode
Virtual real mode is an application environment created by the
OS that is backwards compatible with 16-bit applications that were
written to work in real mode. Virtual real mode is sometimes
referred to as virtual DOS mode. In real mode, applications are
able to directly address conventional memory. In virtual real mode
applications are started in a mini DOS environment and allowed to
access what they think is conventional memory.
What really happens in the background is that the OS intercepts the
application’s requests, executes them for the application and then,
returns the results.
76 Of 242
5.10 The ultimate solution: Windows
NT
Windows NT uses 4K segments of memory called pages to
address all of its memory. Windows NT doesn’t allow any
applications to directly address physical memory, which
creates a more stable environment. If an application needs to
request pages of memory, Windows NT decides where those pages
will physically reside (in RAM or virtual memory) and writes and
retrieves data for the application.
5.11 Memory
With the demands that today’s software places on computers, you
will want to have as much memory as possible. When you upgrade
or add more memory to your computer, ask yourself these
questions:
77 Of 242
information provided includes memory size, density, type, speed,
number of pins, and of course, price:
78 Of 242
Figure 5- 6 demonstrates how SIMMs are installed:
79 Of 242
Figure 5-7 demonstrates how DIMMs are installed:
Chapter Summary
The following points summarize the key concepts in this chapter:
80 Of 242
Mapping Memory
Review
1. Define the following terms: conventional memory, expanded
memory, extended memory, HMA, shadow RAM.
2. Describe the difference between ROM and RAM.
3. How many 30-pin SIMM boards are required for one bank of
memory on a computer with a 486 processor?
4. What is DRAM?
5. Define access speed.
6. Describe the major difference between SIPPs and SIMMs.
7. Define cache memory.
8. One of the differences between DRAM and SRAM is that
SRAM does not have to be refreshed. What does this mean,
and how does it affect the cost of each type of chip?
81 Of 242
CHAPTER 6: Floppy drives
6.1 How data is stored on floppy drives
Data is stored on both sides of a floppy disk in tracks, which are
concentric circles on the disk. Each track is divided into segments
called sectors. Each sector holds 512 bits of data. A new disk is
formatted by the operating system to hold data by writing the track
and sector markings on the disk surface and writing a file
allocation table (FAT) and directory. The directory contains a list
of files on the disk and the FAT tracks the locations of each file.
Every disk has a boot record that tells the OS how the disk was
formatted so that the OS knows how to interpret information on the
disk.
6.2 How to use dos and windows
command to manage disks
DOS manages a floppy disk from the DOS command prompt. The
Format command initially formats a floppy disk. The Label
command puts a volume label on the disk. The Del command
deletes a file and the Recover command recovers corrupted sectors
on the disk. Diskcopy, Copy, and Xcopy can all be used to copy
files from one location to another. Windows offers the same
commands, but from a GUI interface. Windows Explorer is the
most useful Windows tool to manage a floppy disk.
82 Of 242
and the system board. Install the drive in a bay and stabilize the
drive with screws. Connect the power cord. Connect the data cable
to the system board and drive. When you power up the system,
enter CMOS setup and tell the system BIOS that the drive is
present. Select the size drive (5 1/4" or 3 1/2") and the density of
the drive. Most likely the drive will be 3 1/2" high density which
holds 1.44MB.
83 Of 242
Double-density formatting works on all disks, but can increase the
chance of data corruption if used on a high-density disk. It is
recommended that you always use the proper disks with the proper
type of formatting. When data is requested from a floppy disk, the
read/write heads pass over the disk and wait for the right section of
disk to appear. When the read/write heads detect the correct
section of the floppy disk, they begin reading the magnetic charges
on the disk, which are then amplified and forwarded to the floppy
controller.
84 Of 242
The file allocation table, also referred to as FAT, contains the
location of files on the disk. How is FAT used? When a file needs
to be read off of a disk the system will first check the file
allocation table to find out where the first cluster of the file is
located. After reading the first cluster, it checks the clusters table
entry to see where the next segment of the file is located. A cluster
chain includes all of the cluster locations for a specific file.
85 Of 242
The Root Directory
Depending on the type of disk, the root directory contains a
predetermined number of files and directories. Refer to Table 5-3
gives detailed information on the number of root
entries for a particular kind of disk:
86 Of 242
The following table describes various floppy disks and their
capacities.
Disk
Capacity Description
Size
5.25- 160 KB Single-sided single-density—the first model.
inch
5.25- 360 KB Double-sided single-density.
inch
5.25- 720 KB Double-sided double-density.
inch
5.25- 1.2 MB Double-sided high-density.
inch
3.5- 720 KB Double-sided double-density.
inch
3.5- 1.44 MB Double-sided high-density—today's standard.
inch
3.5- 2.88 MB Double-sided quad-density. This format has never really gained
inch in market share and is not common on today's PCs.
The only major differences between the 5.25-inch and the 3.5-inch
disk drives (other than physical size) are that the 5.25-inch drive
has a slot connector and the 3.5-inch drive has a pin connector for
engaging and spinning the disk, and they use different power plugs
and voltages.
87 Of 242
active target. The other wires carry data and ground signals. The
connector end of the cable with the twist always goes toward the
drives.
88 Of 242
Errors Caused by the Floppy Disk
If a floppy disk drive doesn't work, the first thing you suspect
should be the floppy disk.
1. First, make sure the disk is not write protected. The hole on
the right top corner of a 3.5-inch disk (viewed from the front)
should be closed. On a 5.25-inch disk, the notch on one side
should be visible (not covered).
2. Try another disk.
3. Try a new (formatted) disk.
4. Try someone else's disk—one that is known to work on
another computer (first make sure there is no critical data on
the disk).
5. If two or more disks are unreadable, the drive is suspect; try
going to MS-DOS and reading a directory using the DIR
command.
Caution
Never test a drive by using a disk that contains important data! If
the drive is bad, it may destroy any disks placed into it.
89 Of 242
Check the CMOS Setting
Occasionally, the CMOS settings for floppy disks cause problems
with drive operations. Any of the following errors indicates a
possible CMOS setup problem:
BIOS makers often use the 3.5-inch high-density disk drive as the
default CMOS setting for the A drive. With this BIOS, failure of
the CMOS battery, or even accidental erasure of the CMOS, will
still allow most floppy disks to work. Always double-check the
CMOS if you are experiencing a recurrent floppy disk drive
failure. It is quick, easy, and might save you time.
Tip
It is possible for the CMOS to be corrupted by a software or
hardware conflict and yet appear to be fine. If all else fails, reset
the CMOS and reinstall the CMOS setup (check the motherboard
manual for the jumper or disconnect the battery).
90 Of 242
Change the Floppy Disk Drive
Controller
Floppy disk drive controllers are durable and highly resistant to
failure and therefore should be the last components to blame. Left
alone, they generally cause no problems. However, if they have
recently been handled, such as during a move or repairs to the
computer, they can be suspect. They are extremely sensitive to
shock and static discharge. In the event of a loose data cable or
power plug, the POST (Power-On Self Test) will return "FDD
Controller Failure" or "Drive Not Ready" errors. Verify all the
connections and try again. If the connections are good, try
removing and reseating the controller (beware of electrostatic
discharge). If the same errors continue, replace the controller.
Floppy disk drives and controllers are inexpensive.
Tip
Be sure to disable all other devices on the card that are already
installed on the computer when installing I/O cards. If not disabled,
the I/O card can cause conflicts. If you have a new card with
improved devices, disable or remove the older item.
91 Of 242
Replace the Floppy Disk Drive
When replacing floppy disk drives, be sure to throw away the old
drive. Floppy disk drives are inexpensive compared to other
components in the computer. Consider purchasing them in quantity
and saving money. It is not a bad idea to have a spare floppy disk
drive and I/O card available for testing purposes.
Note
As a rule, floppy disk drives fail more than any other part of a
computer system except the floppy disk itself.
1. Azimuth skew: Does the drive head align itself well with the
tracks, or is it at a
tangent?
2. Hub centering: Does the disk wobble as it turns, or does it turn
in a perfect
circle?
3. Hysteresis: Can the drive find a track regardless of the direction
from which it
approaches the track?
4. Radial alignment: Is the drive head centered correctly on the
track, or is it too far
to the left or the right?
5. Rotational speed: Does the drive turn the floppy disk at the
proper speed?
6. Sensitivity: How far from the data must the head be before it
can read the data?
92 Of 242
Chapter Summary
The following points summarize the key concepts in this chapter:
• The first disk drives were floppy disk drives. The technology
of floppy disks has changed little in the past decade.
• Floppy disk drives are designated as A or B. The drive letter
designation is determined by the location of the drive on the
cable.
• Floppy disk drives fail more than any other part of a
computer system.
• Floppy drive parameters must be properly set in the system
CMOS.
• When a drive fails to read or write, first check each
individual medium, then the CMOS settings, the cable; the
Controller and as a last option, replace the drive itself.
93 Of 242
Chapter Review Questions
1 What is the best method of determining the number of
drives available on a computer?
2 What three things should be checked when a floppy
disk drive fails?
3 What is the best way to ensure long life from a floppy
disk drive?
4 When you purchase a new floppy disk drive controller,
what can you expect to receive with it?
5 Other than physical size, what are the only differences
between a 5.25-inch floppy disk drive and a 3.5-inch
floppy disk?
6 What type of cable is used to connect a floppy disk
drive to the external data bus?
7 What is the proper way to install a floppy disk drive
cable?
8 To which pin must the Number 1 wire of the floppy
disk drive cable be connected?
9 You've received the following error message: "General
failure reading Drive A:". What is the most likely
problem?
94 Of 242
CHAPTER 7: Introduction to Hard
drives
7.1 How data is stored on a hard drive
A hard drive is a stack of platters enclosed in a protective case.
Data is written on both surfaces of each platter. Data is stored on a
hard drive in concentric circles called tracks which are divided into
segments called sectors. The drive is partitioned into logical drives
assigned letters such as drive C:, D:, E: and so forth. A partition
table at the beginning of the drive lists the logical drives, their size,
and location on the physical drive. Each logical drive has a root
directory and FAT that together tracks the files on the drive. A file
is stored in one or more clusters. A cluster contains one or more
sectors.
7.2 How to use dos and windows
command to manage data on a hard drive
DOS commands to manage a hard drive include the MKDIR
command to create directories, CHDIR to change directories,
RMDIR to remove a directory, TREE to display a directory
structure, ATTRIB to display and change the attributes of a file,
MIRROR and UNFORMAT to manage the partition table on a
hard drive, and PATH to set a path to executable files. Except for
MIRROR and UNFORMAT, these same commands are available
in Windows 9x when using Windows Explorer and in File
Manager when using Windows 3.x.
95 Of 242
7.3 Various types of hard drives and their
advantages
Most hard drives today use the IDE (Integrated Drive Electronics)
technology which contains the hard drive controller directly on the
hard drive housing. (Older technologies had the controller on a
separate expansion card that controlled the drive by way of a
controller cable.) An Enhanced IDE (EIDE) drive can hold more
data than an IDE drive. All new IDE drives today are EIDE drives
and the industry loosely calls them IDE drives. A system board can
support up to 4 IDE devices including CD-ROM drives and hard
drives. There are several variations of IDE standards including
ATA-2, ATA-3 and Ultra ATA which all use a standard 40-pin
IDE cable. The latest standard Ultra ATA/66 requires an improved
40-pin cable that improves ground quality. The ATA (Advanced
Technology Attachment is the official name for IDE drives) There
are also several SCSI (Small Computer System Interface) standards
including Regular SCSI, Fast SCSI, and Ultra SCSI. Because older
System BIOS did not support hard drives larger than 504 MB,
translation modes where created so that a system could handle
larger drives. Two translation methods are ECHS mode (also
called large mode) and LBA mode.
96 Of 242
utility to improve hard drive performance. Disk caching is built
into Windows 9x as a 32-bit protected-mode utility called Vcache.
Disk caching speeds up drive access by buffering data between the
CPU and the drive.
• Disk platters. The disk platters are the physical components that
store data.
• Head. Each side or surface of one platter is called a head.
• Read/write head. The read/write head is responsible for
magnetically reading and writing data to the platters.
• Actuator. The actuator is responsible for the read/write heads
over the platters.
• Cylinder. A cylinder is made up of eight tracks, one on each
head that have the same radius.
97 Of 242
The problem with round platters is, that as the read/write heads
move closer to the center of the platter there is less physical space
available for them to read and write data. Two methods can be
used to adjust for the smaller tracks: write precompensation and
reduced write current. Write Precompensation speeds up the
writing of data to the drive as the tracks become smaller near the
center of the platters. Reduced write current reduces the amount
of current used to place spots of magnetism on the platters.
98 Of 242
7.7 IDE Technology
IDE stands for Integrated Device Electronics. The purpose of the
IDE was to integrate the drive controller with the drive itself rather
than use a separate controller card. The ATA (Advanced
Technology Attachment—the official name for IDE drives)
standard is based on the original IBM AT standard for hard disk
drives. and refers to a hard disk that uses either LBA or zone bit
recording to access its platters. MFM and RLL are the oldest hard
drive standards. IDE is currently one of the most popular hard
drive standards; SCSI is the other. IDE is also called an interface
card, which is a small circuit board inserted in an expansion slot
and used to communicate between the system bus and a peripheral
device. Another name for this is an adapter card. MFM drive
technology requires that every sector on every platter is the same
size. IDE technology utilizes the full drive capacity because it isn’t
limited to making every sector the same size. What does zone bit
recording accomplish? Unlike what the BIOS is expecting, zone
bit recording does not use the same number of sectors per track
throughout the drive, thereby forcing the BIOS to translate for the
operating system. One result of not having the same sector size is
the operating systems are not able to communicate with the hard
drive directly. Because of this problem, IDE drives come with an
integrated on-board controller to communicate directly with the
hard disk.
99 Of 242
7.8 Formatting a Hard Drive
IDE drives are sometimes referred to as disposable because
normally, only the manufacturer will have the ability to low-level
format the drive. After several years of use, the original tracks will
fade and you will be forced to replace the hard disk. Be warned:
low-leveling an IDE drive can destroy the hard disk. A high-level
format is a format performed by the OS that writes a file system to
a logical drive. For DOS and Windows 9x, the command used is
FORMAT, which writes a FAT and a directory to the drive. High-
level format is also called OS format. IDE hard drive controllers
are integrated with the hard drive. Their function is to locate and
retrieve data form the hard drive platters when it is requested.
100 Of 242
The following are the common SCSI standards in use today, and
their specifications:
101 Of 242
Following are differences between EIDE and SCSI hard drives:
102 Of 242
7.10 How a hard drive is logically
organized to hold data
Hard Drive Partitions
Partitioning is the process of dividing a single physical drive into
one or more logical drives. A logical drive is a portion of the hard
drive that an operating system views as a separate physical drive.
The partition table is a location at the beginning of a hard drive
where information is stored about logical drives. The master boot
record (MBR) is the first sector on a hard drive. The MBR
contains the partition table and other information
needed by BIOS to access the drive.
Logical Drives
103 Of 242
The FAT and Root Directory
There is only one FAT per a hard drive, although there can be
many directories. A block is a 32-byte entry in a file's parent
directory containing the file name and extension. VFAT stands for
virtual file allocation table. The purpose of VFAT is to
accommodate long filenames by recording how many blocks are
allocated for each file listed in a directory. Some older DOS based
utilities, which were not designed with VFAT in mind, could
damage the VFAT table. FAT 16 only allowed 12 bits per a FAT
entry whereas FAT 32 allows 28 bits per an entry. FAT 32 allows
better management of very large hard drives, because the number
of cluster per logical volume can increase. There are 512 entries
available in the DOS root directory but, remember that long
filenames will take more than one entry. The root directory is
physically located after the two FAT tables on a hard drive. The
larger the cluster size the more physical space will be wasted
because a small file may not need a full cluster to be saved but
unfortunately, under the FAT file system, a cluster is the smallest
unit available. (Other file systems will be discussed later)
104 Of 242
Adjusting for More Complex Hard Drive Organization
• Heads
• Cylinders
• Sectors per track
• Write precompensation
• Landing zone
• 1024 cylinders.
• 16 heads.
• 63 sectors per track.
• 512 bytes per sector.
105 Of 242
Logical geometry is the number of heads, tracks, and sectors that
the BIOS on the hard drive controller presents to the system BIOS
and the OS. The logical geometry does not consist of the same
values as the physical geometry, although calculations of drive
capacity yield the same results. CHS mode or normal mode, is
the method by which system BIOS manages a hard drive by
communicating to the controller BIOS the logical geometry of the
hard drive, based on tracks, cylinders, sectors and heads. CHS can
be used under the following conditions:
106 Of 242
Translation Methods
An enhanced BIOS is newer BIOS that has been written to
accommodate larger capacity gigabyte drives. The term
translation method refers to the conversion of sector addresses
used when the hard drive addressing system does not conform to
what the system BIOS is expecting. Two circumstances in which
hard drive translation is necessary are when a drive uses zone bit
recording and, on large-capacity drives. Large mode is a
translation method that supports hard drives up to 1 gig in size by
re-mapping the data on the physical hard drive to conform with the
normal mode standard, which is what the operating system
expects. LBA is a translation method that creates a table like
FAT and assigns an LBA number to specific locations on the hard
drive (similar to clusters). Any hard drive larger than 528MB
(more that 1024 cylinders) is considered a large capacity drive.
The three types of translation methods used with large capacity
hard drives are:
107 Of 242
System BIOS Helps Manage Data Transfer
The three ways the system BIOS is used to support a hard drive
are:
1. System BIOS provides the interrupt handler for software
interrupts.
2. System BIOS can automatically detect and configure ma hard
drive.
3. System BIOS helps manage data transfer over the I/O bus
between the hard drive and memory.
Who’s in Charge?
The three devices that could manage the data transfer for the hard
drive are:
1. Using programmed I/O (PIO) mode, the CPU is in charge and
manages data transfer. There are five different PIO modes (0 - 4)
with transfer rates from 3.3 MB/sec to 16.6 MB/sec.
2. Using DMA, the DMA controller is in charge and manages the
transfer of data to memory without the involvement of the CPU.
3. Using bus mastering, the hard drive BIOS controls data transfer.
108 Of 242
7.11 Operating system command to
manage a hard drive
DOS syntax and functionality:
MKDIR - This command is used to create subdirectories.
MKDIR [DRIVE:] PATH
CHDIR - This command is used to change directories. Syntax:
CHDIR [DIRVE] PATH
RMDIR - This command is used to remove directories. Syntax:
RMDIR [DRIVE:]PATH
TREE - This command is used to list the directory structure.
Syntax: TREE [DRIVE:][PATH]
ATTRIB - This command is used to modify or view the attributes
of a file. Syntax:ATTRIB
MIRROR - This command is used to create a copy of partition
table information in older versions of DOS.
Syntax: MIRROR /PARTN
UNFORMAT - This command is used to unformat a hard drive
and restore partition table information.
Syntax: UNFORMAT /PARTN
PATH - This command is used to set or modify the search path.
Syntax: PATH[DRIVE:] PATH
109 Of 242
7.12 Optimizing a hard drive
What is fragmentation? A hard disk is considered fragmented
when most of the files are not written in consecutive clusters. A
chain is the same as a cluster chain - a series of clusters that make
up a file. Remember that operating systems record files in pieces
called clusters. The disadvantage of using a fragmented hard disk
is that when a hard disk has become fragmented, the file access
time becomes slower because the drive must move to many
different physical areas on the disk in order to access all of the
clusters necessary for a particular file. The DEFRAG utility
locates file clusters that have been scattered throughout a hard disk
and rewrites them into consecutive order. A cross-linked file has a
cluster that is pointing to a different cluster chain other than the
one it belongs to. A lost cluster still exists on the hard disk but is
no longer part of any chain. The SCANDISK utility is used to
detect the presence of lost cluster and cross-linked files. When
using FAT volumes, it is considered good maintenance to run the
SCANDISK and DEFRAG utilities at least once a month.
Disk Compression
Disk compression is used to increase the amount of space
available on a hard disk by reducing the size of files stored on the
hard disk. Following are two ways in which disk compression is
accomplished:
1. All the files on the hard disk are written to one large file. The
compression driver manages all file read/write operations.
2. The compression driver writes and rewrites all data to the hard
drive in an algorithm that uses less space. The disk compression
driver is able to save space by examining each file stored on the
hard disk and then removing repeating characters within the same
file. The driver then verifies that every file on the hard disk uses all
of the space in each cluster. If a file does not use all of the space
within a particular cluster, the file is rewritten.
110 Of 242
Advantages to using disk compression are:
Disadvantages are:
Caching
Disk Caching: Disk caching is the process of using a temporary
storage place to maintain data being read and written to the hard
disk.
111 Of 242
files are in consecutive order, and if the file is in RAM, the CPU
doesn’t have to wait for the data to be transferred from the hard
disk. Hardware cache serves the same purpose as software cache,
but accomplishes it differently. Hardware cache stores the read-
ahead data on a RAM chip in the hard disk controller. Although
hardware cache reads ahead of the CPU and stores the data in
RAM, it doesn’t store the data in system RAM. This still forces the
CPU to wait for a response from the bus that the hard disk
controller is on, rather than taking the data straight from system
RAM, which is much faster.
DOS Buffers
A buffer is a temporary memory area where data is kept before
being written to a hard drive or sent to a printer, thus reducing the
number of writes to the devices. Buffers are typically configured
via the CONFIG.SYS file.
112 Of 242
Using DOS under Windows 9x to Manage a Hard Drive
The following commands should not be used in the Windows 9x
environment:
• Third-party disk utilities
• FDISK, FORMAT SYS or CHKDSK
• Third-party disk caching programs
• Old DOS backup programs
113 Of 242
are stored on a single CD. It is also much faster to install a CD.
The user simply starts it up, enters any required information, and
comes back later; it's no longer necessary to feed disk after disk
into the computer. When they were introduced, CDs held large
databases such as encyclopedias. Today, they are used for every
possible type of data, from national phone directories and software
libraries to collections of clip art, music, and games. The following
table lists the advantages of storing data on a CD.
Advantage Description
Large Up to 650 MB of data fit on a single 5-inch disc. (Smaller than
storage capacity the original 5.25-inch floppy disk, a CD holds almost 2000 times
as much information.)
Portability The CD is a portable medium.
Data cannot be A CD is read-only, which prevents accidental erasure of
changed programs or files.
Sturdiness More durable than the standard 5.25-inch or 3.5-inch disks, CDs
are not magnetic media and thus are not subject to the same
dangers posed by proximity to electrical sources or magnets.
Special CD-ROMs are audio-capable, allowing special compression of
capabilities audio, image, and video data. They can be used to play standard
audio CDs and have the capacity to store and record video data.
Development of the CD
The development of the computer CD roughly paralleled the audio
(music) CD:
114 Of 242
• Today, the price of CD-ROM drives continues to drop, while
their speed climbs. Approximately 85 percent of all
computers include an internal CD-ROM drive as standard
equipment. Most software packages are shipped in CD-ROM
versions (3.5-inch disk versions are available but usually only
by special order, and often they do not contain all the extras
of the CD version).
CD-ROM Technology
CD-ROMs store data as a series of 1s and 0s, just like a floppy
disk or a hard disk drive. However, instead of using magnetic
energy to read and write data, CD readers and writers use laser
energy. There are two major advantages to using lasers:
115 Of 242
A CD platter is composed of a reflective layer of aluminum
applied to a synthetic base that is composed of polymers. A layer
of transparent polycarbonate covers the aluminum. A protective
coating of lacquer is applied to the surface to protect it from dust,
dirt, and scratches.
NOTE
.CD-recordable (CD-R) discs use materials other than aluminum.
They often have a yellow or green cast on the data side. Not all
CD-ROM readers are able to read these discs—some older readers
based on IDE (Integrated Drive Electronics) are incompatible with
CD-R technology.
Adapter Boards
Some CD-ROM manufacturers provide a proprietary adapter board
made specifically for their product. These boards are supplied with
the drive and are not usually interchangeable. The early CD-ROM
drives used either SCSI or a special version of a parallel port. Most
modern CD-ROM devices are either IDE or SCSI.
116 Of 242
motherboard. Because today's motherboards have the ability to
connect four IDE devices, a sound card with a controller is
generally not required.
TIP
If you purchase a sound card with a controller and you already
have a CD-ROM drive installed, be sure to disable the controller
on the sound card. This will prevent IRQ (interrupt request) and
other potential conflicts.
117 Of 242
Controller Cards
The most difficult part of installing a CD-ROM drive is
determining which controller card is best for the system. The
controller card should be selected before buying the CD-ROM
drive because it must be compatible with both the CD-ROM drive
and the motherboard's expansion slot. There are several ways to
ensure this:
118 Of 242
Make sure you have all the tools and parts before beginning. These
include:
119 Of 242
7.14 Removable drives
Table 6-8 illustrates the advantages of removable drives:
120 Of 242
estimated life span of the product. Note that the half-life for a
magnetic disk is normally between 5 to 7 years. A ZIP drive uses a
high capacity magnetic disk to store up to 100MB of data. ZIP
drives have become popular because they are inexpensive and very
easy to connect via a parallel port. JAZZ drives are hard disk
removable drives, which can store up to 1GB of data and are faster
than ZIP drives. The downside is that JAZZ drives typically cost
more than ZIP drives. SyJet drives have a storage capacity of
1.5GB and are very similar to JAZZ drives.
Chapter Summary
• For many years, hard disk drives were limited to 528 MB.
• There are four ways to overcome the 528-MB Barrier: LBA,
Enhanced CHS translation, Fast ATA, and DMA transfer.
• EIDE controllers and I/O cards support up to four EIDE
drives including hard disk drives, tape drives, CD-ROM
drives, and removable disk drives.
SCSI Drives
121 Of 242
CD-ROM Drives
• CD-ROM data transfer rates are based on a factor of 150 KB
per second.
• Before a CD-ROM drive can be accessed by the processor,
the proper drivers must be loaded.
• To run a CD-ROM drive from MS-DOS, the real-mode
drivers must be loaded.
• A CD-ROM drive is now a standard component of a
computer system.
• Installing a CD-ROM drive is as easy as installing a floppy
disk drive.
• A CD-ROM drive is an essential part of the multimedia
standard.
122 Of 242
CHAPTER 8: Hard drive installation and
support
123 Of 242
8.3 How to recover lost data on hard
drives
Much can be done to recover lost data on a hard drive, but beware
of one important thing. If you are trying to recover data, do not
write anything to the drive so that you don't overwrite the
corrupted or lost data. Some things to try to recover lost data
include using the CHKDSK command with the /F option, using
COPY and ignoring bad sectors as you copy good portions of the
file to a new media, using UNDELETE to recover an erased
file, and using third-party recovery software such as Lost & Found
and Norton Utilities.
124 Of 242
8.5 Installing a hard drive
Before beginning work on a system, verify all hardware
components, check IRQ, DMA and I/O addresses and most
importantly, read the documentation of the hardware. The
following are typical IDE hard drive configurations:
125 Of 242
Setup for Hard Drives Less Than 528 MB: To configure legacy
hard drives, you may need to use the "user defined" option found
in the CMOS setup program. The user defined method requires
cylinder and head information, which can normally be found
written on top of the hard drive.
126 Of 242
OS or High-Level Format
1. Set SCSI IDs: The SCSI ID needs to first be set on the hard
drive. Check the
documentation for the jumper settings. Verify that the hard drive
SCSI ID is not in use by any other SCSI device.
2. Disable or enable disk drive and hard drive controllers: If
the SCSI host adapter has a built-in drive controller that you are
not using, it should be disabled.
127 Of 242
Check the SCSI host adapter documentation for the correct jumper
settings. Note also that if your system board has built-in IDE or
SCSI controllers that are not in use, these should also be disabled.
Again, check documentation for details.
3. Terminating resistors: The type of termination varies
depending on the SCSI host adapter, but you should always have at
least one terminator at the end of the SCSI cable. Check the host
adapter documentation for specifics.
4. CMOS setup for a SCSI system: Most CMOS have a setting
that will tell the BIOS to look for a host adapter. Some require that
you specify SCSI; in others you must specify that there is no hard
drive available. Check system board documentation for details.
5. SCSI device drivers: In the DOS or Windows 3.1 environment
you are required to load a SCSI device driver before SCSI devices
become available for use. Note, these drivers normally will be
included with the host adapter at the time of purchase and should
be loaded through the CONFIG.SYS.
128 Of 242
Problems with Hard Drives
Common hard drive hardware problems include problems with the
hard drive controller, power supply, data cable, BIOS and
unsupported firmware or hardware. Some of the common software
issues that are caused by hard drive problems include: corrupt
operating system, corrupt files system, corrupt data and viruses.
When working with hard drive problems, the first step is to
determine what data is priority and start with trying to recover that
data first. When working on a PC, sometimes it is more important
that the issue be resolved than it is you resolve the issue by
yourself: be willing to ask for help.
129 Of 242
Norton Utilities, Nuts & Bolts and other third party software
programs will allow you to make a backup copy of important
information including the partition table. This is recommended
when planning disaster recovery. To restore a partition table: Boot
to DOS and use the UNFORMAT /PARTN command. This will
prompt you for the PARTNSAV.FIL, which stores all of the
necessary information to restore the partition table. If the tracks
containing the partition table become physically damaged, it will
be impossible to restore the partition table (even if you have a
backup of the partition table). A floppy disk has only one boot
record, whereas a hard drive has one master boot record in its
partition table and a boot record at the beginning of each partition.
130 Of 242
What to Do When Corruption Occurs
131 Of 242
Using OS Tools and Commands to Recover Data: The two most
important things to do when working with data recovery are:
1. Never write anything new to the disk you are trying to recover
data from.
2. Use the DISKCOPY or copy command to backup the data that
you are trying to recover (before doing anything else!)
Corrupted File Headers: If an application’s data file cannot be
open or read it may have a corrupt file header. To repair a corrupt
file header you can normally import the file into an application in
ASCII text format and then convert it back into application format.
Lost Allocation Units: A file can lose its clusters if the system is
rebooted while the file is in use or if the application that accesses
the file is shutdown improperly. SCANDISK and CHKDSK both
are designed to recover lost clusters.
Bad Sectors: When a disk has bad sectors the first thing to do is
attempt to copy the file or disk to a different drive. Note that when
copying a file with bad sectors you will probably receive an error
message something like: Unable to read from drive A: Abort,
Retry, Ignore? Selecting ignore will tell DOS to skip the bad
sector and move on. The only time you want to use the RECOVER
command is when there is no other way, or if you have a backup
copy of the data. The RECOVER command can accidentally
destroy a file it is trying to recover.
132 Of 242
Using Utility Software to Recover Files: There are two
approaches to using a disk editor for file recovery:
1. Use the disk editor to create a new file on another disk, then
copy the sectors on the original disk to the new disk and attach the
copied sectors to the new file.
2. Edit the FAT so the damaged clusters will be avoided when
trying to read the file (this could result in data loss).
Chapter Summary
When Installing Hard Disc/Drive
• Verify all hardware components like power supply and Data
cable
• Check resources including IRQ, DMA and I/O Addresses
• Read documentations for IDE configurations like Single
drive, Master/Slave & Cable select configurations
133 Of 242
To recover lost Data on Hard Drives
• Never write anything to the Drive, so as not to overwrite the
corrupt or lost data on the drive you are trying to recover
• Use SCANDISK or CHKDSK with /F option to recover lost
clusters.
• Use COPY or DISKCOPY to ignore bad sectors and backup
the data you are trying to recover
• Use UNDELETE to recover erased files
• Use RECOVER command only when absolutely necessary. It
can destroy the file you are trying to recover.
134 Of 242
CHAPTER 9: Troubleshooting
fundamentals
135 Of 242
Recommended Toolkit
The following table lists and describes the hand tools that will
meet most needs.
Tool Description
Screwdrivers Two of each (one large and one small) flathead
(regular) and Phillips (sometimes called a
cross) screwdrivers are usually sufficient.
Avoid magnetic screwdrivers: although they
are convenient for picking up lost screws, their
magnetism can cause problems.
Torx driver Used to remove the odd star-shaped screws
found on some proprietary computers. Sizes T-
10 and T-15 should meet the needs of most
computers.
Tweezers Very convenient for picking up small parts (for
instance, screws). You might consider the long
plastic variety; these don't conduct electricity
and hence won't create any short circuits.
Needlenose Can be used to pick up dropped items and to
pliers hold or loosen screws, nuts, and bolts.
Chip removers Although optional, these are very useful when
changing video RAM or other (older) RAM
chips that are pushed into a socket.
Tube for small A short plastic tube (with caps on both ends)
parts will keep loose screws and small parts from
wandering.
Compressed A can of compressed air is helpful to remove
air (Blower) dust.
ESD tools An antistatic wristband is a must. Antistatic
mats and antistatic bags are also helpful.
136 Of 242
Multimeter A small, digital meter that is capable of
measuring volts (AC and DC) and ohms
(resistance or continuity) is all that is needed.
Flashlight A small (bright) light for illuminating those
hard-to-get-at places.
Nut driver set Sizes 3/16-inch, 7/32-inch, and 1/4-inch.
Hemostats Good for picking up and holding small parts.
Straight hemostats will work most of the time.
However, curved ones will get into those small
places that the straight ones can't reach.
POST Card A POST card can be used to see what the error
messages during system start are being sent
when no data is being sent to the display.
137 Of 242
9.4 Importance of good record keeping
Accurate records of the configuration data on a PC, the hardware,
the software, and the data are essential to effective troubleshooting.
Make these records, or teach the user to make them, when all is
well. Keep documentation on hardware and software in an easy to
find location. Prepare a bootable disk that contains copies of the
necessary startup files on the hard drive specific to this PC.
Organize the hard drive to keep the number of files in the root
directory to a minimum.
138 Of 242
9.6 Troubleshooting perspectives
The four troubleshooting perspectives are:
139 Of 242
• SCANDISK
Rescue Disk for Windows 9x: It is a good idea to have a
Windows 9x recovery disk available when you are required to
support the Windows 9x environment.
Diagnostic Cards and Software: Diagnostic cards are adapter
cards designed to discover and report computer hardware failures
and conflicts at POST time, often by displaying a number on the
card.
POST Diagnostic Cards: POST diagnostic cards are used to
diagnose hardware problems. They are temporarily installed
through an expansion slot to test the system. There are several
manufacturers that compete in the market of POST diagnostic
cards.
Diagnostic Software: Diagnostic software is designed to identify
hardware problems. Most diagnostic software has its own small
operating system built into the software. This is to prevent other
operating systems from masking or interfering with the diagnostic
tests. The software will boot to its operating system and then
diagnose the hardware.
Virus Detection Software: Viruses are most commonly
transmitted through the exchanging of diskettes or downloads from
the Internet. When a disk is accessed that has a virus, the virus will
copy itself onto your hard drive. Some of the most common places
viruses hide include inside executables, inside partition tables and
even, inside the master boot record. F-PROT, McAfee, and Norton
anti-virus are all examples of anti-virus software that are designed
to examine each file on a selected drive and look for virus code.
Identifying and Preventing a Virus: Indicators that your system
has a virus are: files are disappearing, programs take longer to
load, less memory is available and executables have changed size.
A few of the easiest ways to help prevent the spread of viruses
include: write-protect you diskettes, boot only from your hard
drive, and scan you hard drive regularly.
140 Of 242
9.8 How to isolate a computer problem
and device a course of action
When first approaching a computer that is having problems you
should take the attitude of the investigator. Start by asking the user
what happened, or, if possible, ask the user to demonstrate the
problem. The following are fundamental rules to remember when
troubleshooting a computer problem:
• Approach the problem systematically. Computers are logical.
When trouble arises, work through the problem in logical steps and
understand what the computer is doing each step of the way.
• Divide and conquer. When troubleshooting a system it is a good
idea to eliminate possibilities one at a time. For example, first
decide if the problem is hardware or software.
• Don’t overlook the obvious. If a user is having problems with
connectivity, start with the obvious and check the LAN drop first.
• Check the simple things first. It is faster and easier to check all
the simple solutions first. If you start with the simplest solutions
first it will save you time.
Example: If a user is having problems with their monitor check the
monitor and the cables first, not the video card.
• Make no assumptions. Never assume anything and always start
with the obvious because although you believe something to be
obvious, it may not be to the user.
• Become a researcher. If you don’t understand or know the
answer to a problem, ask another technician, check the Internet,
read books, and check the online help.
• Write things down. Keep notes. All good technicians have some
sort of note taking system.
• Reboot and start over. It is always a good idea to restart a
system and walk through a problem from the very beginning.
• Establish your priorities. Decide what is priority for your
customer before beginning to troubleshoot the problem.
141 Of 242
• Keep your cool. Even though your customer may be very excited
and upset you must not let that affect your technical judgment.
• Don’t assume the worst. This speaks for itself but the
importance of this rule should never be ignored.
• Know your starting point. Verify a problem before
troubleshooting it. Ask the customer to recreate it or attempt to
recreate the problem your self.
Other Tips
Eliminating the Unnecessary: When troubleshooting hardware or
software problems always work the problem backwards. Start with
a bare system and re-add the pieces until the problem reoccurs.
Trade Good for Suspected Bad: For testing purposes it is always
a good idea to have parts on hand that you know function properly.
Having a known good collection enables the technician to test
different components while troubleshooting.
An Alternate Approach to Trading Good for Suspected Bad:
This approach is really the reverse of trading good for bad. If you
have another computer with similar hardware to the one with the
problem, simply remove the part that you suspect to be bad and
test it in the "known good" system.
142 Of 242
9.9 Troubleshooting guidelines
It is highly recommended that you review this section, which
contains troubleshooting tips for many different hardware
configurations.
143 Of 242
• Be sure that you have current copies of all INI files and other
configuration files
• If possible backup the entire WINDOWS\SYSTEM directory
• If possible don’t compress your hard drive.
• Don’t store data files in the same directory as software. This is to
avoid having your data overwritten
144 Of 242
Figure 9-1 Sample configuration sheet
145 Of 242
Memory Upgrade
Does this computer have enough memory? This is the question that
most frequently causes users to seek a computer upgrade. As
programs and hardware get faster and are required to process more
graphics and animation, the need for memory is as important as the
need for speed.
146 Of 242
On-board Bank 0 Bank 1 Total
8 MB 8 MB
8 MB 4 MB 4 MB 16 MB
8 MB 8 MB 8 MB 24 MB
8 MB 16 MB 16 MB 40 MB
8 MB 32 MB 32 MB 72 MB
Disabled 64 MB 64 MB 128 MB
NOTE
SIMM Formats
147 Of 242
72-pin format is larger and supplies memory in 32-bit chunks.
Only one SIMM is required for a 32-bit machine. A Pentium
processor has a 64-bit data path and requires a 72-pin SIMM.
(See Figure 9-3.)
DIMM Formats
148 Of 242
Memory Speed
Typical chip speeds are 50, 60, 70, and 80 nanoseconds. Be sure to
check the motherboard documentation or the existing chips to
determine the correct speed to use.
EDO RAM
The EDO RAM (Extended Data Out Read Access Memory) chip is
used extensively with Pentium processors. This chip can improve
read times and overall performance by up to 30 percent. This
performance gain is possible because the chip continues to output
data from one address while setting up a new address.
Parity
149 Of 242
Cache
IMPORTANT
You need to take special care when installing DIPP chips. They are
sensitive to ESD, can easily be installed backwards (look for pin 1
alignment), and the pins can be broken or bent during insertion.
Installing RAM
150 Of 242
Figure 9 - 4 Installing a SIMM
10. Reconnect the power, monitor, and any other needed external
devices, and start the computer.
The computer should recognize the new memory and either make
the correction or automatically go to the setup program. In many
cases, you need only exit setup to save the changes.
151 Of 242
CPU Upgrades
A small upgrade, going from one level of the same CPU family to
another, is usually no problem. But if you want to upgrade a 386 to
a Pentium, or a Pentium to a Pentium III, a new motherboard is the
only answer. The same is true if the CPUs are coming from
different chip makers.
152 Of 242
1. Turn off the computer and unplug the power cord.
2. Disconnect external devices (AC power and monitor power).
3. Follow the appropriate ESD safety procedures.
4. Remove the cover of the computer.
5. Locate the socket for the CPU. It might be on the
motherboard or on a removable processor card.
6. Remove the old processor. This may require special tools for
older processors. Pentium II and III packages are Slot 1
designs, which slide into a slot much like those used for an
expansion card. The original Pentiums (60-166 MHz) and
Pentium Pro models usually have a ZIF (Zero-Insertion-
Force) socket. The ZIF socket is opened by moving the
handle to the upright position. (This should not require
force.) The CPU can then be easily removed.
7. Install the new processor. Be certain to align the chip
properly (this is critical!). Pin 1 on the CPU must fit pin 1 in
the socket. There are several ways to identify this pin.
Various chip manufacturers, and different versions of a
manufacturer's chips, use different methods to mark
installation orientation. Slot 1 CPU packages, for example,
have a key in the slot, and it fits only one way. Other CPUs
have similar schemes appropriate to their socket design. Look
for a key pinhole in one corner, a blunt edge on one corner of
the socket, a dot, a corner with a pin arrangement that differs
from the others, or some other identifying mark. Align this
mark with the corner of the socket that contains a blunt edge.
If you encounter any resistance or you have to apply any
pressure when inserting the CPU, recheck the chip's
orientation and alignment, and reinsert the chip. After the
chip is in place, secure the ZIF handle. You might need to
check the documentation to make sure the chip is installed
correctly.
8. Set any jumpers or switches on the motherboard. Check the
documentation.
153 Of 242
9. Replace the cover and power up the computer.
10. Reconnect any peripherals (keyboard, mouse, monitor).
11. Make changes to the CMOS setup, if required.
NOTE
If you are working with a motherboard that has the ability to hold
more than one CPU, both CPUs must be of the same type and from
the same manufacturer if more than one is actually installed. In
addition, on Pentium II and later systems, most such motherboards
have a special card that must be inserted in any empty CPU slot,
and the appropriate slot must be used for a single CPU
configuration.
Expansion Cards
154 Of 242
Chapter Summary
When Installing Hard Disc/Drive
• Verify all hardware components like power supply and Data
cable
• Check resources including IRQ, DMA and I/O Addresses
• Read documentations for IDE configurations like Single
drive, Master/Slave & Cable select configurations
Computer Disassembly and Reassembly
Upgrading a Computer
155 Of 242
Use Diagnostic Soft wares for trouble shooting for instance
• FDISK to examine & report problem with Hard disk
partition
• 3Rd party Utilities like Lost & found, Nuts & Bolts, Norton
Utilities and Partition Magic for more complex Hard Disk
repairs.
156 Of 242
6. You have an extra 16 MB of RAM on a single 30-pin SIMM,
and a friend has a computer and needs more memory. What do
you need to check in order to determine if this memory module
can be used on your friend's computer?
10. A friend just got a bargain on a new Plug and Play sound
card and wants to install it on her 486SX computer. Will it
work?
157 Of 242
CHAPTER 10: Supporting I/O devices
158 Of 242
to use an available resource. If both devices that are in conflict
cannot be forced to use a different resource, then the two
devices cannot exist together in the same system. Sometimes there
will not be enough IRQs to go around. In this case, it might be
possible for two or more PCI devices to share the same IRQ, a
feature called PCI bus IRQ steering.
159 Of 242
10.4 About keyboard, pointing devices
and video subsystems
Keyboards typically use either a 5-pin DIN connector or a 6-pin
smaller PS/2 connector although keyboards using a USB port have
recently become available. Because all systems require a keyboard,
the IRQ 1 used by the keyboard is never used by other devices, so
you seldom need to be concerned about conflicts with the
keyboard. A keyboard requires no I/O addresses because the CPU
does not send output to the keyboard. Keyboards are so
inexpensive that, when one gives a problem, most often the
solution is to simply replace it. There are many pointing devices on
the market; the most common is the mouse which can be either a
serial mouse, system-board mouse or bus mouse. A mouse can use
PS/2 or DIN connector, a serial port or a USB port. A system
board mouse will most likely use IRQ 12 and a serial port mouse
will use the IRQ assigned to the serial port. A video subsystem
requires a video card, video cable and monitor. Newer system
boards have an AGP slot for the video card, but, for older system
boards, use a PCI slot for the video card. Use video RAM on the
video card to speed up video display.
160 Of 242
In addition to the list above, some peripherals also require
proprietary software that works in conjunction with the device
driver. The CPU uses INT (interrupts) to locate an entry in the
interrupt vector table. This table, located in the lowest part of
memory, has stored the address of an interrupt handler, a program
that will handle the request. The program is either a device driver
or BIOS and will use I/O addresses to communicate with the
device. The three basic steps to installing an add-on device are:
Hardware Devices
Internal peripheral devices are normally less expensive than
external devices but can be difficult to install. External devices,
though more expensive are typically easier to install because the
device will use an external port that is already configured with the
proper resources (IRQ, DMA, I/O address). Whenever considering
a hardware purchase, you should know as much as possible about
your hardware and software configuration (operating system
version, type of system board, amount of RAM and hard drive
space, etc).
161 Of 242
Embedded BIOS on Devices
Peripheral manufacturers use ROM chips called firmware to load
some of the software that is required for the peripheral to function
properly. Some peripheral devices have RAM on the device, which
is used as temporary storage for data that is moving through the
device. Most peripheral devices have jumpers or DIP switches,
used to control the resources requested by the device. It is
important to read the peripheral documentation to understand how
to properly configure the device to function with your system.
Device Drivers
Windows 9x has the capability to automatically detect and install
new hardware; this is referred to as plug-and-play. The DEVICE
command is used to load device drivers in the DOS environment.
Similar to other DOS commands, some device drivers use switches
and parameters to modify the driver behavior. It is important to
remember that all device drivers are TSR`s.
Applications Software
After the hardware resources are set correctly and the device driver
is installed properly you can then use your application to control
the device. Some application examples include the following:
162 Of 242
10.6 Using ports and expansion slots for
ad-on devices
Using Serial Ports: Most PCs have two COM ports and one
parallel port (COM1, COM2 and LPT1). The difference between a
DB-9 and a DB-25 serial port are the number of physical pins.
Figure 10 -1 shows serial ports together with a game port and a
parallel port, for comparison.
163 Of 242
The UART Chip: UART stands for Universal Asynchronous
Receiver/Transmitter chip. The UART chip establishes and
controls all serial communications. The UART chip is also
responsible for converting parallel data bits from the system bus
into serial data bits. The first UART chip was the 8250; next came
the 16450, and the modern UART version is 16550 or its revision,
16550A. Note that FIFO was introduced soon after the 16450
chip. When using any UART chip other than the 16550A, you
should expect a stable connection no faster than 9600 baud.
FIFO buffer stands for First In First Out buffer. The purpose of
the FIFO buffer is to reduce data loss. Windows 9x has a built-in
FIFO driver, but in Windows 3.x you must load a driver that will
tell the UART chip to use FIFO. The standard UART buffer size is
16 bytes, but there are newer UART chips available that have a
buffer size of up to 64 bytes. Most systems today include Plug-
and-Play UART chips. These chips provide an interface with Plug-
and-Play BIOS that automatically configures them when the
system is booted.
Ports
Resources Used by Serial Ports: Normally, if the IRQ is not
conflicting with any other devices, then the I/O won`t be either.
Using Parallel Ports: Parallel ports transmit 8 data bits at a time,
parallel to each other. Serial ports transmit one bit at a time, single
file. Parallel communications are limited to a distance of 15 feet.
Note that if a cable longer than 12 feet is used, there could be data
loss. Parallel ports were designed to be used with printers.
However, today`s parallel ports are used for high-speed access to
external devices.
164 Of 242
Types of Parallel Ports: Enhanced parallel port (EPP) is a parallel
port that allows data to flow in both directions (bi-directional port)
and is faster than original parallel ports on PCs that only allowed
communication in one direction. Extended capabilities port (ECP)
is a bi-directional parallel port mode that uses a DMA channel to
speed up data flow.
Configuring Parallel Ports: If the parallel port is on an expansion
card, then refer to the documentation that came with it to properly
set the jumpers. However, if the parallel port is on-board then use
the CMOS setup program to configure the card.
Examining a General Purpose I/O Card: Unlike with serial
ports, parallel ports don’t allow you the option of selecting the LPT
assignment. The BIOS will automatically assign the parallel port
with the highest I/O address, LPT1.
Using USB Ports: The requirements for installing a USB port are:
• A system board or expansion card that provides a USB port and
USB firmware
• An OS that Supports USB
• A USB device
• A USB device driver
The following Microsoft operating systems support USB:
• Windows OSR 2.1
• Windows 98
PCI Expansion Slots / PCI Bus IRQ Steering
PCI expansion cards utilize resources assigned to its PCI slot, the
PCI slot is assigned resources by the PCI bus. The PCI bus master
is normally last to be assigned resources by the system BIOS
because some ISA device require specific IRQs.
PCI bus IRQ steering is a feature that makes it possible for PCI
devices to share an IRQ. System BIOS and the OS must both
support this feature.
165 Of 242
Using ISA Expansion Slots
ISA devices must request their resources from the system BIOS at
startup and are normally configured using DIP switches or
jumpers.
Resolving Resource Conflicts
A resource conflict is the most common problem that occurs when
new hardware is introduced to system. A resource conflict occurs
when two devices attempt to use the same resource. If a resource
conflict occurs, use MSD, Device Manager, CMOS setup,
and documentation for the system board and devices to first
identify, and then resolve the conflict.
166 Of 242
• Bus Mastering. If possible, use a host adapter that supports bus
mastering. The advantage is the host adapter will not require a
DMA channel.
• A host adapter that supports several SCSI standards. This
will allow you to choose from a larger variety of SCSI devices.
• Device driver standard. Choose a host adapter that supports
either ASPI or CAMS device drivers. This will help eliminate
compatibility issues with the operating system and other software
packages.
• Single-ended and differential SCSI. Select a SCSI host adapter
that is compatible with the signaling method you wish to use.
• SCAM Compliant. Choosing a SCAM compliant host adapter
and SCAM compliant devices will make the installation of new
SCSI hardware easier.
167 Of 242
Pointing Devices
Inside a mouse, there are two or more rollers that move when the
mouse ball is rolled. Each roller turns a wheel. When the wheels
are turned they "chop" a small light-beam that is used to sense the
turning of the wheel. Some mice have more than the two standard
buttons. Note that special software is usually necessary to control
the additional buttons. The three different methods for connecting
a mouse to a computer are:
1. Using a serial port.
2. Using a dedicated round mouse port coming directly from the
system board (system board mouse or PS/2-compatible mouse).
3. Using a mouse bus card that provides the same round mouse
port as discussed earlier.
The disadvantage of using a serial mouse is it requires one
available COM port. This can pose a problem when the user
requires the use of that COM port for other external devices. Some
alternatives to using a mouse are a Track ball and Touch pad:
168 Of 242
10.9 Computer video
Monitors: Monitors today are rated by the refresh rate, resolution
and interlace features. A CRT monitor works in the following way:
to create images on a monitor screen, filaments at the back of the
cathode tube shoot electrons to the front of the tube. The
refresh rate is the time it takes the electrons to redraw the screen,
starting at the top and working down the screen from left to right.
An interlaced monitor redraws the screen by making two passes,
as opposed to a non-interlaced monitor, which redraws the screen
in one pass. The dot pitch is the distance between each spot or dot
on the screen that the electronic beam hits. Resolution is a
measure of how many spots on the screen are addressable by
software.
169 Of 242
A pixel is the smallest addressable unit within the picture
element. When purchasing a monitor and video card, there are
things to keep in mind to ensure your choice is an equitable one.
For example, under most circumstances you wouldn’t want to
purchase a high-end video card if only has a low-end 14" monitor
to use with it. The only exception to this rule would be if you were
planning on upgrading your monitor in the future. Multiscan
monitors have a greater variety of refresh rates, but they are
normally more expensive. A monitor is sometimes referred to as a
Green monitor if it meets the EPA requirements. Although LCD
monitors require less space and produce a better quality picture,
they are normally more expensive than a CRT monitor. The
screen size of a monitor is the one feature that drastically affects its
price. ELF refers to extremely low frequency emissions of
magnetic fields.
170 Of 242
Video Cards
The video controller card is the interface between the monitor and
the computer. These cards are sometimes called graphic adapters,
video boards, graphics cards, or display cards. Because video
controllers are separated from the core system functions of a
computer, manufacturers can apply a variety of techniques to
improve performance without being concerned with compatibility
with functions on the system board. Video controller cards are
rated according to the amount of video memory they contain, and
by the type of bus they are designed to use. The most commonly
used bus types for video include:
VESA, PCI ISA and AGP. Note that some system boards include
embedded video controller cards. To display a large number of
colors at higher resolutions, the system board requires several
megabytes of temporary storage.
1. The digital data arrives from the system bus to the video chip set
on the video card.
2. The video chip set writes the digital data to video memory.
3. The data stored in video memory is passed to the digital analog
converter (RAM DAC).
4. RAM DAC passes the analog data to the monitor.
171 Of 242
RAM DAC is a chip, or sometimes part of a chip set, that consists
of three digital-to analog converters. Note that each converter is
dedicated to one of the monitors color guns (red, blue and green).
The term dual porting refers to a video that allows both RAM
DAC and the chip set to access memory at the same time. The term
graphics accelerator refers to a video card with a built-in
processor to increase performance. Graphic accelerators have
become a common necessity in today’s market. Some of the
following common features are included with a graphics
accelerator:
• MPEG decoding
• 3D graphics
• Dual porting
• Color space conversion
• Interpolated scaling
• EPA Green PC support
172 Of 242
Video Memory
An advantage to having video memory is that the video card will
be able to handle larger amounts of data, thereby producing higher
quality images. The first video cards with memory used DRAM.
Color depth is the number of colors displayed (16 colors, 256
colors and 65,000 colors). Video RAM is used to store the data
required to generate a single screen of data.
173 Of 242
• 3D-RAM was designed to improve the performance of video
processing that involved 3D graphics. Note that this was
accomplished by embedding most of the 3D logic processing into
the video card.
Chapter Summary
Modems
Video Cards
174 Of 242
Video Memory
175 Of 242
18. What is the "standard" type of video card used with today's
computers?
19. What is the formula for calculating the required memory for
a monitor/video card combination?
20. What does CRT stand for?
21. What are HRR and VRR?
22. Define resolution.
23. What is bandwidth?
24. Why is it dangerous to open the monitor's cover?
25. Name four common sources of video problems.
26. Explain one similarity and one difference between VRAM
and WRAM.
27. What is a raster?
28. What type of connector is used for an SVGA monitor?
176 Of 242
CHAPTER 11: Multimedia technology
177 Of 242
11.3 How to support many multimedia
devices including CD-ROM drives, sound
cards and DVD drives
A CD-ROM drive can connect to the system board by an IDE
connection, a SCSI bus, a proprietary expansion card, a proprietary
connection on a sound card, or be an external device connected to
the PC by the parallel port. Most often the CD-ROM drive uses the
IDE connection following the ATAPI standards that allows devices
other than hard drives to use IDE. If a CD-ROM is sharing the
same data cable with an IDE hard drive, set the CD-ROM drive to
slave and the hard drive to master. A sound card has a connection
for an audio cord to make a direct connection to a CD-ROM drive
to play music CDs. Sound cards sometimes require a DMA
channel to speed up data transfers. DVD drives can make for a
complex installation as the drive requires a converter card to
convert video data before it is output to the monitor.
178 Of 242
11.5 Bits are Still Bits
Just as with every other component of a microcomputer,
multimedia devices represent data as a series of 0s and 1s. For
example, a black and white scanner sends a light beam across the
object to be scanned and reads the object in a series of black and
white dots. These black and white dots are communicated in a
series of one’s and zero’s to the graphics application which
assembles the bits to form an image file called a bit map file.
Remember that when working with a peripheral device, no matter
how complex it may seem, the device still communicates with the
CPU in a series of bits, it still requires memory, and most devices
still require an IRQ or DMA. Don’t be intimidated by the seeming
complexity of a device.
11.6 Multimedia on a PC
A multimedia PC presents information in more than one medium
such as motion video, stereo sound, digital photographs and
animation. In the evolution of PCs, the hardware must evolve
before the software; MMX is an excellent example of multimedia
hardware evolution. The goal of multimedia technology is to
reproduce sound and images as lifelike as possible.
179 Of 242
Sample size is the amount of storage allocated to storing a single
measurement of a single sample. The number of samples and the
accuracy of each sample determine the amount of storage needed.
PCs have the ability to take many samples with a high degree
of accuracy. However, the high accuracy samples that are taken
often require more storage space. Repetitive looping is repeating
the same action or calculation over and over again, such as the
process of recording samples.
Multimedia PC Requirements
The standardization of multimedia PCs helps to ensure that
hardware and software are compatible with each other. MPC
stands for Multimedia Marketing Council – this council establishes
guidelines for the multimedia market. Three multimedia standards
defined by the MPC are:
180 Of 242
1. MPC1 - This was the first multimedia standard that was created
by the MPC and contains a substantial amount of Legacy ardware.
2. MPC2. - This is the second multimedia standard created by the
MPC, and also contains a substantial amount of Legacy hardware.
3 MPC3 - This is the most current standard released by the MPC.
Note: MPC3 is sometimes referred to as Multimedia PC Level 3.
MPC3 Specifications
MPEG is an international standard for the data compression of
motion pictures. Note: this standard was developed by the Moving
Pictures Experts Group. Interpolative scaling is a method used to
fill in the gaps in an image to produce a more realistic looking
display when a small video window is enlarged to full-screen size.
Color space conversion is a method of converting the way a color
is stored on a file into a format that a video card can understand.
CODEC stands for COder/DECoder, a method of compressing
and later decompressing sound, animation, and video files. MPEG
is a common example of CODEC. PCM stands for Pulse Code
Modulation, a method of sampling sound in a reduced, digitized
format, by recording differences between successive digital
samples instead of their full values. A Wavetable is a table of
stored sample sounds used to synthesize sound by reconstructing
the sound from digital data using actual samples of sounds from
real instruments. TAPI is a standard developed by Intel and
Microsoft that can be used by 32-bit Windows 9x communications
programs for communicating over phone lines.
181 Of 242
1. New Instructions - Intel added 57 new instructions to the CPU
designed to handle the parallel, repetitive processing found in
multimedia software.
2. SIMD Process - SIMD was added to the CPU, this is a process
that allows the CPU to execute a single instruction on multiple
pieces of data.
3. Increased Cache - Intel added internal cache to their MMX
processors. The total amount of internal cache for a MMX
processor is 32K.
182 Of 242
Lands are raised areas embedded on the surface of a CD-ROM
disc that represent the binary value of 1. Pits are recessed areas
embedded on the surface of a CD-ROM disc that represent the
binary value of 0. Data is read from a CD-ROM disc using a laser
beam that can distinguish between pits and lands by recognizing
the amount of reflection that occurs when the laser beam hits the
surface of the disc. CLV stands for constant linear velocity. CLV
refers to the ability of a CD-ROM drive to adjust the speed of the
spinning disc so that the laser beam is over a sector near the center
of the disc for the same amount of time it is over a sector on the
outer edges of a disc. CD-ROM drives are rated by their transfer
rate. The first CD-ROM drives had a transfer rate of 150k. Since
then, transfer rates have increased substantially but are still
referred to by the original speed of 150k. Therefore, a 2X CD-
ROM is 2 times 150k. A multi-session CD-ROM drive has the
ability of reading a CD-ROM that has been written to more than
once.
183 Of 242
Installing and Configuring a CD-ROM Drive
There are several ways to connect an IDE CD-ROM to a system.
One of the most commonly used is to set the CD-ROM as SL
(Slave) and connect it to the same cable as the hard drive (the hard
drive should be set to MA (Master).
184 Of 242
CD-ROM drives use rails to connect to the case in the same
manner as a hard drive. When connecting the data cable for a CD-
ROM drive, they need to follow the same Pin 1 procedures used
for hard drive installation. When a CD-ROM is properly wired to
the sound card, the CD-ROM will be able to play sound through
the sound card. After installing a CD-ROM drive you can quickly
verify that the drive has power by ejecting the CD-ROM tray.
Device Drivers
In the DOS environment a CD-ROM driver is loaded through
commands in the CONFIG.SYS and AUTOEXEC.BAT. The name
of the DOS device driver is MSCDEX.EXE (Microsoft CD-ROM
extension). To install a device driver within Windows 9x, open
control panel, select add new hardware, and then allow
Windows to detect the CD-ROM. As with any new hardware, you
should always test to the CD-ROM drive to make sure it is
working properly.
185 Of 242
CD-R and CD-RW Drives
Sound Cards
Sound Blaster Compatible means that the sound card can accept
the same set of commands as a Sound Blaster sound card. Sound
Blaster has become industry standard for sound cards. ADC stands
for Analog-to-Digital Converter. This type of converter is
used by most sound cards to convert analog sound to digital sound.
The sampling rate is the rate of samples taken of an analog signal
over a period of time, usually expressed as samples per second or
Hertz. For example, 44,100 Hz is the sampling rate used for 16-bit
stereo. Note that the sample rate is usually expressed in hertz. A
human can detect up to about 22,000 hertz. Music CDs are
normally recorded at 44,100 hertz or 44.1 kHz. A sound card
interprets sound in ranges from positive to negative. An 8-bit
sound card uses 8-bits to store one sample, whereas a 16-bit sound
card uses 16-bits to store one sample.
Note: An 8-bit card has a sample size range of 256. A 16-bit sound
card has a sample size range of 65,536. Sound cards are typically
referred to by their sample size (for example, 8-bit sound card, 16-
bit sound card).
186 Of 242
Storing Sound Files: There are two methods typically used to
store sound in files: MIDI and WAV. Most game music is stored in
MIDI files, but most multimedia sound is stored in WAV files, so
look for a sound card that can handle both as well as music CDs.
Digital Cameras
187 Of 242
TWAIN stands for Technology without an Interesting Name.
TWAIN is the format used to transfer images between digital
cameras and PCs. How is the signal chain used by a digital
camera? First the image sensor captures the light reflected off of
the subject. Second, the light is converted into a serial stream of
small DC voltages. Next the voltages move through the DC
clamping and gain stages, which is where the signals are amplified
and buffered. Then the signals enter the ADC where digitizing
takes place. Finally, the digital signals are processed by the image
processor and sent to the storage device via the I/O process. Figure
11-2 illustrates the signal chain used by a digital camera:
Video-Capturing Card
188 Of 242
Digital Video Disc (DVD)
189 Of 242
Chapter Summary
Multimedia PC Requirements are:
• MPC3
• MPEG
• CODEC
• TAPI
Devices supporting multimedia are:
• CD-ROMs
• Recordable CD (CD-R )
• Rewritable CD (CD-RW)
• Digital Video Disc (DVD)
• Sound Cards
• Video-Capturing Card
• Digital Cameras
190 Of 242
Chapter Review Questions
1. What do you understand by the word Multimedia?
Explain.
2. Explain the meaning of the word Sampling. What is
Sample Size?
3. What differentiate a Pentium MMX CPU from an SSE
Pentium III CPU?
4. List the number of hardware devices and PC peripherals
that support Multimedia.
5. A CD-ROM can be connected to the system board in 5
different ways mention them.
6. What do you understand by a “bit map file” explain.
191 Of 242
CHAPTER 12: Electricity and power
supplies
For our discussion, we mostly talk about the flow of energy used to
run computers electrical energy and not worry about the fine points
of scientific philosophy.
192 Of 242
12.3 How electricity is measured
Electricity is energy that has different properties that can be
measured in various ways. Voltage (V) is a measure of the
potential difference between the electrical charges on either side of
an electrical device in an electrical system. Amps (A) are a
measure of electrical current. An ohm is a measure of electrical
resistance, and a watt is a measure of electrical power. Some
electrical measurements as they apply to computers include: A 17-
inch monitor requires less than 2 A to operate. A computer power
supply is rated at 200 to 600 watts. An AT power supply supplies
four separate voltages: +12 V, -12 V, +5 V, and -5 V.
193 Of 242
12.4 How to measure the voltage output
of the power supply
To eliminate the power supply as a source of a problem with a
computer, measure the voltage output using a multimeter. A
multimeter has two probes, one for ground (black) and one for hot
(red), and a digital or analog display. With the power turned on,
put the black probe on ground and the red probe on the circuit
being measured. For an AT power supply, measure the voltages of
7 leads coming from the P8 and P9 connections. For an
ATX power supply, measure the voltages of 5 leads coming from
the P1 connection. Acceptable ranges are plus or minus 5% of the
voltages expected.
194 Of 242
12.6 How a computer system can be
protected from damaging changes in
electrical power
There is a wide range of devices that filter the AC input to
computers and their peripherals to eliminate highs and lows in
current and provide backup when the power fails. These devices
fall into three general categories: surge suppressors, power
conditioners, and uninterruptible power supplies (UPSs). A surge
suppressor protects equipment against over voltage or spikes. A
power conditioner protects against spikes and also conditions or
regulates the power providing continuous voltage during
brownouts. A UPS provides a backup power supply in the event
the AC current fails completely. When buying a UPS, the amount
of current you need the device to provide as well as the length of
time you want it to work affect both size and price.
195 Of 242
• Power: The rate at which an amount of energy is used to
accomplish work. Electrical power is measured in watts,
which is determined by multiplying voltage by current.
• Conductors: Materials that can carry an electrical current.
Most conductors are metals.
• Resistance: A quality of some materials that allows them to
slow the speed of an electrical current, producing heat, and
sometimes light, in the process.
• Insulators: Materials that prevent or retard the electrical
current of electrons.
• Ampere: A measurement of current strength, equal to 1
Coulomb per second. Coulomb's Law: two charges will exert
equal and opposite forces on each other. Opposite charges
attract and like charges repel.
• Ohm: A unit of electrical resistance. Ohm's Law states that
voltage is equal to the product of the current times the
resistance, or Voltage = Current x Resistance.
• Volt: The unit of electromotive force, or potential energy,
that when steadily applied against a resistance of 1 ohm,
produces a current of 1 ampere.
• Voltage: The potential energy of a circuit.
196 Of 242
Ohm's LAW
In addition to defining terms, we need to understand some basic
principles that are applied in testing electrical devices. One
formula that all computer professionals should know is Ohm's
Law. From this formula, or a derivation of this formula, all basic
power calculations can be performed.
Resistance: R=V/I
Current: I=V/R
Volts: V=IR
197 Of 242
Hot, Neutral and Ground: How are hot lines and neutral lines
used in residential homes? When AC current comes from the
power station to your house, it travels from the power source at the
power station to your house on a hot line, and completes the circuit
from your house back to the power source on a neutral line. A
short occurs when the electricity is allowed to flow uncontrolled
from the hot line to the neutral line or from the hot line to ground.
A fuse is a component included in a circuit that is designed to
prevent too much current from flowing through at any one time. In
most home wiring, green or bare wire is used for ground, white for
neutral and black for hot. However, in most PC wiring the black is
used for ground, red for hot and green for neutral.
198 Of 242
ESD (Electrostatic Discharge) occurs when an imbalance in the
amounts of positive and negative electrical charges on the surface
of an object is released. The most dramatic example of ESD is
lightning, which splits trees as easily as it lights up the sky. The
amount of energy released when you touch a metal object can be
quite large. The buildup of energy with nylon clothes can easily
reach 21,000 volts. About 750 volts are required to produce a
visible spark with ESD; while a mere 10 volts or so can ruin a
computer chip.
199 Of 242
Some multimeters can sense the amount of electricity and adjust
accordingly. These types of meters are called auto ranging meters.
To measure voltage, you simply place the positive probe (the red
probe) to a positive point within the circuit and then attach the
negative probe (the black probe) to a ground portion of the circuit.
In order to measure AMPS, the multimeter must become part of
the circuit. To test for continuity, turn the power off and place one
probe at either end of the circuit you wish to test.
200 Of 242
If you are troubleshooting a system and notice that the power
supply fan is not working, this could be a sign of other problems.
This is a good time to use the divide and conquer troubleshooting
method. To divide and conquer, complete the following steps:
• Unplug everything from the power supply. With only the power
supply plugged into the wall, turn on the PC. If the fan on the
power supply begins to turn, then you know that the power supply
is not broken, but there is a problem with one of the components
that was plugged into it.
• If one of the other hardware components is the culprit, begin
adding pieces back to the power supply one at a time. Test each
piece as you go to verify that the power supply fan still works.
• After discovering the faulty hardware, replace the part.
Note: A system board should never be replaced without first
verifying hat the power supply is functioning properly.
201 Of 242
12.10 Energy star computers
(The green star)
EPA stands for the U.S. Environmental Protection Agency. The
green standards are a set of specifications designed by the EPA to
reduce overall power consumption in the U.S. Sleep mode could
more accurately, be labeled as "reduced power consumption
mode". Sleep mode is the state in which an EPA compliant PC will
go when it is not in use. The EPA requirement for sleep mode is
that the device can use no more that 30 watts of power while
asleep.
202 Of 242
• Standby time. The standby time is the amount of time specified
before the system will reduce its power consumption by 92%.
• Suspend time. The suspend time is the amount of time specified
before the system will reduce its power consumption by 99%. Note
that when a system has gone into suspend mode it will require a
short warm-up period when activated again.
• Hard drive standby time. The hard drive standby time is the
amount of time specified before the • System will temporarily shut
down the hard drive.
Figure 12-1 shows some of the options available in standard
CMOS power management screen:
203 Of 242
Energy Star Monitors
An energy star monitor has the added capability of sleep mode.
Note that for an energy star-compliant monitor to function
properly, it must be connected either to a video card or
to a system that is also energy star compliant. Most computers and
monitors sold today are energy star compliant. If your system has a
setting in both CMOS and the operating system to put the monitor
to sleep after a set amount of time, they could conflict with
each other and hang the system. To avoid this problem, simply
disable the sleep mode setting in the operating system. Some of the
newer and more expensive monitors have the added ability to turn
off after a set amount of time.
204 Of 242
The difference between a shunt surge protector and a series surge
protector is that a shunt surge protector is designed to absorb a
power spike, whereas a series surge protector uses a series of
blocks to control a power spike. Note that some surge protectors
use both methods to control power spikes. Clamping voltage is
the measurement used for a shunt surge suppressor’s let-through
voltage. A data line protector is a feature included in some surge
protectors that provides power spike protection for a phone line
(analog line).
205 Of 242
A standby UPS has an AC circuit and a DC circuit. Under normal
conditions the UPS uses only the AC circuit. However, when
power to the AC circuit is lost, the UPS switches to the DC circuit
to continue to supply power for the devices it is protecting.
In older PCs the time it took for this type of UPS to switch circuits
created a problem, sometimes causing the PC to reboot. This
problem has been resolved by changing the design of modern
power supplies so that they can supply power for the one or two
seconds it will take a UPS to switch circuits.
206 Of 242
A buck-boost is a voltage regulator used to lower, or buck, the
voltage in the event of a power spike, and boost the voltage in the
event of a brownout.
You should buy an in-line UPS that doesn’t run at full capacity -
this is because if the UPS charger runs at full capacity, it will
create so much heat that it could potentially, decrease the life of
the battery.
Fire Extinguishers
207 Of 242
Chapter Summary
The following points summarize the key concepts in this chapter:
Power
208 Of 242
Chapter Review Questions
209 Of 242
CHAPTER 13: Supporting MS-DOS,
Windows 3.x, Windows 9X and Windows
NT.
13.1 Introduction
This chapter focuses on the earlier operating-system soft wares
MS-DOS, Windows 3.x. and Windows 9X. Although MS-DOS
and Windows 3.x (Both 16-bit OS) are somewhat outdated, they
remain the foundation from which the newer 32-bit operating
systems like Windows 95, Windows 98, and Windows 2000
evolved. Many fundamental concepts and conventions used with
today's operating systems stem from these beginnings. As an A+
technician aspirant, you will find some questions regarding
MS-DOS, Windows 3.x and Windows 9X on the exam.
13.2 MS-DOS
DOS stands for disk operating system. The full proper name is
preceded by the name of the manufacturer—for example, MS-DOS
for Microsoft DOS or PC-DOS (for versions specific to the IBM
Personal Computer). This version was also sometimes referred to
as IBM-DOS. All versions of DOS are actually the product of
Microsoft development. The modern computer professional must
be familiar with MS-DOS because MS-DOS remains at the heart
of Windows. Although increasingly more configuration can be
done through the Windows interface, there comes a time when
every computer professional is faced with a screen of MS-DOS
commands. Windows 98 and above, the most current operating
systems are more independent of MS-DOS than prior versions of
Windows. However, every PC still requires AUTOEXEC.BAT,
CONFIG.SYS, and various initialization files. So there remains a
need for the computer professional to be familiar with MS-DOS.
210 Of 242
DOS has been produced by three suppliers, and the versions are so
similar that they are considered as one operating system. The three
brands of DOS are:
211 Of 242
1988 than 32 MB, the MEM command, and
MS-DOS Shell.
5.0 May 1991 Added memory management tools,
help, undelete, unformat, task swapping.
This was the last version to come with a
printed manual.
6.0 March 1993 Included new features such as
MEMMAKER, multiple boot
configurations, Windows UNFORMAT
and UNDELETE, virus protection, and
backup. MEMMAKER is a utility that
is used to modify the system's
CONFIG.SYS and AUTOEXEC.BAT
files, so that device drivers and
memory-resident programs take up less
conventional memory space.
6.2 October Included ScanDisk, MSD utilities and
1993 enhanced diagnostics.
7.0 December Not really a stand-alone product;
1995 provided the command-level
environment included with Windows
95.
212 Of 242
NOTE
IO.SYS and MSDOS.SYS are hidden files that are not usually
visible when you examine a disk directory.
In addition to the three core files, MS-DOS uses two other startup
files. These files are not required to start the machine, but they add
any additional startup configuration required by the user or
applications. These files are:
NOTE
If a user complains that a machine is not loading MS-DOS,
especially after installing new hardware or software, disable these
two files as a first diagnostic step. In many cases, drivers or
procedure calls are conflicting or corrupting system memory.
213 Of 242
13.4 How to install and resolve problems
with applications software
Before installing applications software under Windows 3.x backup
these four files: Config.sys, Autoexec.bat, System.ini and Win.ini
because these files are most likely to be the ones an application
will alter during its installation. You can recover from a bad
installation by using these backup files. Most applications
softwares are installed under Windows 3.x by typing A: Setup or
A: Install from the File, Run dialog box of File Manager. For
Windows 9x, backup the Registry files, System.dat and User.dat,
which might be altered during the installation. Begin the
installation by typing A: Setup form the Start, Run dialog box or
use the Add/Remove Program icon in Control Panel. Applications
sometimes overwrite DLL files in the \Windows\System folder
with versions that are incompatible with other applications that use
them. You might need to reinstall other applications if an
installation causes a problem with DLL files.
214 Of 242
Windows 32-bit applications are also placed in extended memory.
Windows 3.x and Windows 9x both make use of virtual
memory called swap files, but Windows 9x manages swap files
better than does Windows 3.x. Windows 9x also uses a better
approach to hard drive management. Windows 95, release 2, and
Windows 98 use the FAT32 file system which uses smaller cluster
sizes, thus conserving hard drive space. Both Windows 3.x and
Windows 9x can use 32-bit hard drive access.
215 Of 242
corrupted for Windows 98 to load properly, Windows will load in
Safe Mode and attempt to recover the Registry from backups.
216 Of 242
13.10 Supporting windows 3.x
Because companies and individuals use software for many years,
PC support technicians need to know how to support old as well as
new software. There are still computers in use running DOS and
Windows 3.x in many companies because it works well with the
older hardware and applications still in use, and people are familiar
and comfortable with it.
217 Of 242
Shortcut Keys in Windows
Some of the more commonly used shortcut keys in the Windows
environment are outlined in table 13-1, below:
218 Of 242
Windows 3.x Initialization and Application Information
Windows 3.x stores configuration information in the registry
database (REG.DAT) and in initialization files (files with .INI
extensions). INI files are only read when Windows or
an application is started. This means that you must restart
Windows (to reinitialize the INI files) for any changes to take
effect. The best way to change the contents of an INI file is to use
Program Manager, Control Panel or Windows Setup. Use notepad
or sysedit only as a last resort to edit system configuration files. A
comment line is a notation that tells Windows to ignore a
statement. Some examples of syntax include REM and " ; "
(semicolon). When troubleshooting an operating system it is
sometimes helpful to use a comment line to temporarily remove
statements from an INI file. The maximum size for an INI file is
64K, but any INI files larger than 32K may create problems.
219 Of 242
Windows 3.X Installation
Before the Installation: To prepare for an installation of Windows
3.x be sure to:
• Run CHKDSK /F or SCANDISK to recover lost clusters, and
then DEFRAG to prepare the hard drive.
• Identify which TSRs, if any, are loading from the CONFIG.SYS
and AUTOEXEC.BAT. If any problems should occur, this will be
helpful information.
• If installing Windows on a compressed drive, be sure to place the
swap file and temporary files on a different physical or logical
drive.
Setup Options:
1. Express option - The normal installation choice. This option
answers most installation questions for the user.
2. Custom setup - This option allows the user full control over the
Windows installation.
3. Reinstalling Windows - This option will give you the
opportunity to reinstall Windows over a previous installation.
220 Of 242
• Windows will not boot after the installation. Boot to the DOS
C prompt. Change directories to the Windows directory and enter
Setup at the DOS prompt. (C:\windows\setup )
• After the installation, the mouse does not work in Windows.
Verify that the mouse works properly in DOS and then check the
CONFIG.SYS or AUTOEXEC.BAT file for the mouse driver
statement.
221 Of 242
Below are some possible software installation problems and
solutions:
• Windows does not allow software to be installed. Check the
PROGMAN.INI file under the [Restrictions] section and verify
that the software you are trying to install is not listed.
• There is not enough hard drive space. You will need to remove
old programs or files from the destination drive.
• Error: Environmental variable not found. Try moving the
SET command to the beginning of the AUTOEXEC.BAT.
• Software just doesn’t work. Try to uninstall the program and
reinstall it, looking for errors during the installation.
DLL stands for Dynamic Link Library. DLLs are library files
that store various programming routines that are used and shared
by applications. An application conflict occurs when an old
application uses a DLL that was recently updated by a newer
application and the update is not compatible with the old software.
Back up the \windows\system Directory: Backing-up the System
directory will save the current DLLs, this should be done prior to
any software upgrade.
Monitor the Files being updated During the Installation
Process: Third party applications like In Control and Norton
Utilities can run the application installation and monitor which
files are modified. This can be helpful if troubleshooting becomes
necessary.
222 Of 242
DLL Unloader can be used for application troubleshooting by
launching DLL Unloader then executing the troublesome
application. This will allow you to view supporting DLL files as
they are loaded into memory for a particular application.
Memory
Memory Errors: Protected-mode memory addressing is controlled
by the operating system whereas real-mode memory addressing
allows applications to address memory directly. A General
Protection Fault (GPF) no longer refers to just memory errors.
GPFs can now include a host of other problems relating to the
application.
223 Of 242
Insufficient Memory: An insufficient memory error tells the user
that there is not enough free memory in one of the heaps to execute
a particular command. Windows 3.x and Windows 9x are limited
to a specific amount of memory that can be allocated to each heap.
Windows NT does not have this limitation. Third party software,
like the Nuts & Bolts software, can be used to view system
resources.
Memory Leaks: A memory leak occurs when a program fails to
release its assigned memory addresses after it is unloaded. Note
that memory leaks will cause "Out of Memory" error messages. If
you are troubleshooting an Out of Memory error message, third-
party software can be used to decipher which application has the
memory leak.
224 Of 242
The Windows 9x Architecture
Windows 9x utilizes the following components:
• VMM - Virtual Memory Manager
• IFS - Installable File System
• WDM - Win32 driver model
Figure 13-3, below, illustrates the Windows 9x architecture as it
relates to the user, applications software, and hardware. The only
component that is found in Windows 98, but not Windows 95, is
the component responsible for managing device drivers that work
under a driver model new to Windows 98, called Win32 Driver
Model (WDM) driver manager.
225 Of 242
16-bit and 32-bit programming
DOS is a 16-bit OS. All portions of the OS are written using 16-bit
code, and DOS will only support 16-bit drivers and 16-bit
application programs. Windows 3x also will only support 16-bit
applications (but does contain a small amount of 32-bit code.
Windows 9x accommodates both 16-bit and 32-bit programming
because Windows 9x is a hybrid between 16-bit and 32-bit code.
Although it prefers 32-bit code, Windows 9x still supports 16-bit.
32-bit code is faster than 16-bit code but requires more memory.
Virtual Machines
Another important difference between Windows 9x and DOS with
Windows 3x is that Windows 9x enhances the application of
virtual machines. A virtual machine should be thought of as an
emulation of an entire computer. This emulation includes both
virtual hardware and virtual memory addresses. Windows 9x
always maintains at least one virtual machine, called the system
virtual machine. The system virtual machine contains the operating
system and the virtual machines for both 16 and 32-bit
applications. DOS programs expect to be in complete and direct
226 Of 242
control of all the system hardware, Window 95 accommodates
them by executing all DOS programs in their own virtual
machine. 16-bit Windows applications do not require full control
of their hardware - they do however require the ability to
communicate with each other. To accomplish this task
Windows 9x puts these programs together in their own memory
space so they can share memory addresses, in effect, putting them
in their own virtual machine.
Memory Paging
Memory paging is the process by which the virtual memory
manager provides virtual memory to DOS and 16-bit Windows
applications. The virtual memory manager is the portion of
Windows 9x that controls the page table. The page table contains
the physical memory addresses for all virtual memory addresses
assigned to applications and processes. The virtual memory
manager controls the page table by swapping 4K pages
(segments of memory) between RAM and the hard drive. A page
fault is generated when the virtual memory manager knows that a
requested page is not stored in RAM. The terms page-in and page-
out refer to the process the memory manager uses to move the
4K pages in and out of physical memory. Disk thrashing refers to
excessive paging, which can cause premature hard drive failure.
Note that to correct disk thrashing, you would add more RAM to
the system.
227 Of 242
Loading and Running Windows 9x
228 Of 242
Installing and Configuring Windows 9x
What does Windows 9x Setup do behind the scenes? Initially
Setup begins in real mode. It runs diagnostics, looks for previous
versions of Windows and loads the extended memory device
driver. Second, Setup switches to protected mode. It then creates
the registry and searches for hardware. Last, Setup modifies the
boot record and restarts the computer. The boot record
modification is done last to ensure that you will be able to
boot into your previous environment, should Setup stop
responding. Setup uses the following log files:
• DETLOG.TXT - This detection log keeps a record of all
hardware detected during setup.
• DETCRASH.LOG - This detection log tracks which device was
being detected when Setup crashed. Note that when Setup is
restarted after a crash, Setup will look for this log file and skip
detection of the device that caused the crash.
Configuring the Windows 9x Startup with MSDOS.SYS: What
steps should you take for a dual boot installation of Windows 9x?
First, backup the DOS directory. Second, install Windows 9x in a
new directory. Edit the MSDOS.SYS file, modifying the
following lines to read: BootMulti=1, BootMenu=1. Last, restore
your old DOS directory and reboot.
229 Of 242
One advantage to installing Windows 9x in a separate directory is
you will be able to create a dual-boot system. However, if
Windows 9x is installed in a separate directory, you will need to
reinstall your applications. See chapter 8 for more details about
dual booting between operating systems.
Plug-and-Play
Plug-and-Play (PnP) is a set of design specifications for both
hardware and software that work toward effortless hardware
installation. For a system to be truly Plug-and-Play, it must meet
the following criteria:
1. The system BIOS must be PnP
2. All hardware devices and expansion cards must be PnP-
compliant
3. The OS must be Windows 9x or another OS that supports PnP
A Plug and Play OS, like Windows 9x, provides two main
services:
1. Resource management. This occurs at startup and refers to
system resources being allocated to devices.
2. Runtime configuration. This is an ongoing process that
monitors changes to system devices, like removing a PC card from
a notebook or the docking and undocking of a notebook.
The four components Windows 9x uses to implement PnP are:
1. The configuration manager controls the configuration process
of all devices.
2. The hardware tree is a database of installed components and
their resources, which is built each time Windows 9x starts.
3. The bus enumerator locates all devices on a bus and
inventories the resource requirements for these devices.
4. The resource arbitrator decides which resources get assigned
to which devices.
230 Of 242
When a PnP system is started, the BIOS begins the boot process by
sending a list of devices to Windows 9x. Then, the configuration
manager communicates with the resource arbitrator to assign
resources. Finally, the bus enumerator collectively builds the
hardware tree. Note that a new hardware tree is built each time
Windows 9x is started.
Plug-and-Play BIOS
A PnP BIOS interacts with Windows 9x in the following way: a
PnP BIOS gathers resource configuration information prior to
loading Windows 9x, and then communicates these details to
Windows 9x. ESCD stands for Extended System Configuration
Data. An ESCD BIOS creates a list of configuration changes,
which you have that you have manually made and stores that list
on the BIOS chip. If your BIOS is not PnP you can still use
Windows 9x and PnP devices, however, you may need to manually
configure the resources.
231 Of 242
The Windows 9x Registry
232 Of 242
Modifying and Editing the Registry
The best way to modify the registry is to use the Control Panel or
Device Manger. Using the registry editor should be a last resort,
and if you are going to use it you should first backup the registry.
You can use the registry editor to do the following:
• Search for a value
• Create a key
• Edit a value
• Delete a value
• Delete a key
There are several third party utilities you can use to track changes
made to the Registry and INI files. Some examples include In
Control 3 and Norton Utilities Registry Tracker.
233 Of 242
Table 13-4 Tools used for troubleshooting and to monitor and
improve system performance
234 Of 242
13.13 About the Windows NT
environment and it’s architecture
Examining the objectives of Windows NT helps to understand the
Windows NT environment and architecture. Windows NT was
designed for expandability so that it can accommodate new
hardware and software. It does this by using a modular approach to
performing tasks. Because of the modular approach, Windows NT
easily ports to different platforms or hardware configurations,
including different CPU technologies. It is also designed to work
with legacy software including OS/2 and DOS, as long as the
DOS applications don’t attempt to access resources directly. In
addition, Windows NT provides security similar to that found on
UNIX systems, and it provides a much more stable environment
than many OS, including Windows 9x.
235 Of 242
How to evaluate when windows NT is the best choice for a PC
When considering Windows NT as an OS, it is important to
remember that many hardware device models are not supported by
Windows NT, so you consult the hardware compatibility list
(HCL) first. You must also check the minimum hardware
requirements to make sure your machine can handle Windows NT.
The minimum requirements include a Pentium or better CPU, 16
MB RAM (32 is recommended), and 110 MB of hard disk
space. Although Windows NT will run on the minimum
requirements, a powerful high-end PC is needed in order to
experience the full benefits of Windows NT. Another
consideration is the software that will be run on the PC. Some
software works better in Windows 9x than in Windows NT, and
some Windows 9x programs will not run under Windows NT
because of differences in the API (application program interface).
236 Of 242
How to set up a Windows NT environment for a DOS or
Windows 3.x application
Windows NT makes provisions for running DOS applications by
creating a separate NTVDM for each application, so that each
program can run in its native environment. Windows 16-bit
applications can run in individual NTVDMs, or several 16-bit
Windows applications can run in the same NTVDM so they can
share resources. To customize an NTVDM for a DOS application,
a shortcut is created, and then the properties of that shortcut are
modified for Windows NT. Each DOS application can have
individual initialization files, but by default, they will all use
AUTOEXEC.NT and CONFIG.NT. Customizing NTVDM for 16-
bit window applications requires that the properties be changed to
allow the program to be run in separate memory space.
237 Of 242
Windows NT vs Windows 9x
Windows NT and Windows 9x share the same user interface and
utilities. Windows NT offers higher performance, built-in security
and is more reliable than Windows 9x.
Features of Windows NT
Some of the following features are built-in to the Windows NT
operating system include:
• Desktop performance. Window NT is a 32-bit operating system
that supports a powerful multitasking environment.
• Hardware profile. Windows NT has the ability to maintain
separate hardware configurations within the same operating
system.
• Internet Explorer. Internet Explorer is the built-in web browser
that comes with the Windows NT operating system.
• Peer web services. This feature provides a personal Web server.
• Security. Windows NT provides file and folder level security as
well as user level security.
• OS stability. Protective processing prevents applications from
causing errors that are damaging to the operating system's stability.
The minimum hardware requirements for Windows NT are:
• 486DX, 33MHz or better
• 12 MB of RAM
• 120 MB of hard drive space
Windows NT is not limited to PC hardware - Windows NT also
supports MIPS, DEC and RISC hardware. HAL stands for
hardware abstraction layer. The HAL is responsible for all
communications between the hardware and the operating system.
HCL stands for hardware compatibility list. The HCL is a
comprehensive list of all supported hardware for Windows NT.
The difference between the Windows 9x and the Windows NT
command prompt is the Windows 9x prompt is actually accessing
a version of DOS, whereas the Windows NT prompt only emulates
a command prompt. There are no DOS programs underlying
Windows NT.
238 Of 242
Choosing Between Windows 9x and Windows NT
Consider the following before choosing an operating system:
• Does NT support all of the devices on your system? (Check the
HCL)
• Is the PC powerful enough? (Check the hardware requirements)
• Will your software work better under Windows NT or Windows
9x?
• Is price a factor? (NT costs more)
Chapter Summary
The following points summarize the key concepts in this chapter:
239 Of 242
Installing and Configuring Windows 95
240 Of 242
Chapter Review Questions
1. What does DOS stand for?
2. What was DOS created to do?
3. Which version of MS-DOS is bundled with Windows 95?
4. Describe the core operating systems within MS-DOS.
5. What are the two MS-DOS startup files?
6. Which MS-DOS command is used to determine the amount
of free space left on a disk?
7. Describe the difference between real mode and protected
mode.
8. Windows provides a GUI for the user. What does "GUI"
stand for? What is its advantage over the older MS-DOS
system?
9. Describe the three kinds of fonts used in a Windows
environment.
10. Name five settings that can be changed from the
Windows Control Panel.
11. Which wildcard character can be used to replace a
single character in a search string?
12. Name three ways that Windows 95 differs from
Windows 3.x.
13. What is Plug_and_play? What is required for a
component to be Plug and Play-compliant?
14. Does Windows 95 still require MS-DOS?
15. Which version of MS-DOS comes with Windows 95?
16. Is CONFIG.SYS required to install GUI drivers?
17. Why would you want to set the swap-file size in
Windows 95?
18. What is the main difference between Windows 3.x and
Windows 95?
19. Why can't older versions of disk utilities be used with
Windows 95?
20. After turning on the power to the computer, what is the
first step in the boot-up process?
241 Of 242
21. In which directory do you find the external MS-DOS
commands?
22. What is FDISK used for?
23. Define virtual memory.
24. The Registry is composed of two binary files. Name
them.
25. What is the difference between an MS-DOS session and
MS-DOS mode?
26. If you are running in MS-DOS mode and the CD-ROM
does not run, what must you do to get it running?
27. Do you need a .PIF file to run an MS-DOS program in
Windows 95?
28. What are the five steps of a Windows 95 installation?
29. Which version of Windows 95 uses FAT32?
30. What is safe mode and what is it used for?
31. What are the three Registry backup tools provided with
Windows 95?
242 Of 242