Location via proxy:   [ UP ]  
[Report a bug]   [Manage cookies]                

CSS ICT Reviewer NCII

Download as docx, pdf, or txt
Download as docx, pdf, or txt
You are on page 1of 117

UNIT OF COMPETENCY

Install Computer System and Networks


Diagnose and Troubleshoot Computer System
Configure Computer System and Networks
Maintain Computer System and Networks

Can I Yes or No
o Plan and Prepare work to ensure occupational health and safety (OHS)
policies and procedures are followed. Yes
o Obtain materials, tools, equipment and testing devices needed to conform
the job requirements. Yes
o Interpret work instructions according to the job requirements. Yes o Obtain
computer components/devices/systems and determines its location prior to
installation. Yes
o Install equipment/devices/systems in accordance with the job
requirements. Yes
o Check/test devices/systems and/ or installations to determine the
conformity to the job requirements. Yes
o Check computer systems and networks for configuration in accordance
with the specification and requirements. Yes
o Diagnose fault or problem in the computer systems and networks in line
with the standard operating procedure. Yes
o Configure the identified systems and networks based on the specifications
and job requirements. Yes
o Inspect and test configured computer systems and networks in conformity
with manufacturer's instructions/manual. Yes
o Correct/adjust components or parts of computer system and networks in
accordance with job requirements. Yes
o Test computer systems and networks to ensure safe operation. Yes o
Performs scheduled/periodic maintenance in accordance with
manufacturer's requirements. Yes
o Make needed repairs/replacements in accordance with established
procedures when necessary. Yes
o Document tasks undertaken in the accordance with standard operation
procedure (SOP). Yes
o Clean and clear worksite of all surplus/excess materials in accordance with
company standard operation procedure (SOP). Yes

OHS (Occupational Health Safety)

 Always ground yourself before touching any part of the computer


 Do not work alone
 Be careful with tools that may cause short circuit
 Replace only fuses with those proper ratings
 Wear safety glasses for protection against sparks and metal fragmented
 Use only grounded plugs and receptacles
 Working area should have ventilations, trash can, fire exit and capable of
being disinfect.
 Keep one hand in your pocket when working live circuit.
 Wear rubber sole shoes when standing on the ground or in a concrete
floor.
 Always power off and unplug the computer before working on it.
 Wear hard hat when someone working above you
 When making circuit changes switch off and unplug the power cord from
the equipment then discharge the capacitors.
Process of Assemble/ Disassemble

PROCEDURE:
• The instructor will demonstrate how to disassemble/assemble a
personal computer system.
• The instructor should tell some basic details about each component
while demonstrating to the students.
• The students will perform the steps to disassemble and assemble
PC after the instructor has demonstrated and explained each step
given below.
Taking Apart and Putting Together a PC
1. Verify the computer is working properly.
2. Turn off the computer and unplug it.
Next, remove the cover of the computer, following these basic steps.
a. Unplug the monitor, mouse, keyboard and other peripherals.
Move them out of the way.
b. Study the PC case and identify how to remove the cover. Note
that PC cases come in various designs. We’ll assume a typical
desktop mid-tower casing with two separate panels, one on each
side. We want to remove the component side, i.e., the left side of
the casing is facing you. Get help from your instructor, if
necessary.
c. Locate and remove screws. Be careful not to remove any other
screws on the case.
d. After you remove the screws, slide the cover a few inches back
and away to remove it from the case.
3. Remove the following major components. Note: Do not remove the
processor from its socket/slot.
a. Hard disk drive
b. Floppy disk, CD-ROM or DVD-ROM drives
c. Power supply
d. Memory
To remove the memory, pull the supporting arms outward until
the memory is released.
e. Expansion cards such as video card, sound card or modem
card.
f. Motherboard
Before you remove the motherboard make sure you have read
the manual that comes with the motherboard from beginning to
end. You need to know the information specific to the
motherboard. If in case there is no manual available, do not
remove the motherboard.
4. Install the drivers.
Install the drivers first. The reason for this is that if the motherboard is
already in the case before the drivers are installed, you run the risk of
dropping a drive on the motherboard and damaging it. If you installed
the drivers before the motherboard, however; do not connect the power
cords until the motherboard is in place.
5. Identify the settings of the jumpers/switches.
Refer to the motherboard documentation on how jumpers and switches
on the board are used.
6. Install RAM in the appropriate slots on the motherboard.
Insert the DIMM into the slot by pressing down until the support arms
lock into position.
7. Install the motherboard and attach cabling.
The assembly process has involved preparing the case by installing
the exhaust fan and spacers; installing any needed drivers; and
attaching the processor; cooling assembly, and memory modules to the
motherboard.
8. Install the video card.
Install the video card on the motherboard. The video card to be
installed includes a registration tab that allows the card to fit into the
slot on the motherboard. When installing an expansion card, first read
the documentation for the card and then determine if you need to set
any jumper switches on the card.
9. Install the modem card (or, if external, skip this step and install in
Step12)
To install the modem card in a PCI slot, remove the faceplate from the
PCI slot, insert the modem card, and then use a screw to secure it. A
modem is not considered as essential device, so you can opt to install it
after you have tested the system and installed the operating system.
10. Plug the computer into power source, and attach the monitor, keyboard
and mouse.
The installation of devices inside the case is now complete. Before you
plug in the computer, make sure that no cords are obstructing the fans.
Notice that some cables are coiled and tied with plastic ties. Coiling and
tying up the cords makes the inside of the case less cluttered and
prevents cords from obstructing airflow and fans. Do not coil and tie the
cables until after you test the system to make sure everything works.
Attach the monitor and any keyboard and then plug in the computer.
11. Turn on the power and check that the computer is working properly.
12. Boot the computer; check the CMOS settings, and make sure that
everything is configured and working properly before replacing the
computer case.
Boot the system and press the appropriate keys to enter CMOS setup.
The motherboard manual should contain a list of all CMOS settings, an
explanation of their meanings, and their recommended values. Follow
the instruction in the motherboard manual to set the CMOS settings
required for the motherboard.

System Components

1. Motherboard
2. Processor
3. Memory (SDRAM, DDR I, II, III IV)
4. Case
5. Power supply
6. Hard disk drive
7. Floppy disk drive
8. Compact disk / digital versatile disk drive
9. Monitor (LCD, CRT)
10. Video card
11. Sound card
12. Keyboard
13. Mouse
14. LAN card
15. Modem
16. Power Cord
17. Router 18. Hub
19. Switch
20. AVR (Automatic Voltage Regulator)
21. UPS (Uninterruptible Power Supply)
22. FDD Cable/Connector
23. SATA Cable/connector (For HDD,CD/DVD)
24. PATA or ATA Cable/Connector (For HDD,CD/DVD) System Components

Motherboard
- It is the core of the system which controls all the devices.

Processor
- It is also called microprocessor or central processing Unit (CPU) which serves
as the brain or engine of the PC.
Memory
- It is the primary memory which is often called Random Access Memory (RAM).
It contains data which the processor is using at a given time.

Case
- It is a frame that houses the system unit.

Power supply
- It is a source of electrical power of every part in the PC.
Hard disk drive (HDD)
- A secondary storage device that is used when large amounts of data have to be
stored, particularly if some of the data need not be accessed very frequently.

Floppy disk drive (FDD)


- A secondary storage device that can read and write to a floppy disk. Newer
floppy drives read 3.5-inch floppy disks or diskettes that hold about 1.44MB
of data.
Compact disk / digital versatile disk drive (CD/DVD)
- It is a high-capacity removable-media, optical storage device of the system.

Monitor (CRT, LCD)


- It visually displays the output of the computer

Video card
- An expansion card that provides a port for a monitor.

Sound card
- An expansion card that provides a port for speakers and microphones.
Keyboard
- It is the primary input device used to communicate with the PC.

Mouse
- It is a pointing input device used to communicate with the PC.
LAN Card
- It’s either an expansion or built-in that provides a port for internet. - is a
way of getting Internet from a hub or router and getting it to your PC or
Laptop.

Modem
- Modulation/Demodulation
- Use to convert analog signal from telephone to digital signal of a computer

Power Cord
- It is a standard interface use to connect the PC or System Unit to AVR or UPS
Router
- chooses the best path for them through the network, and then switch them
to the proper outgoing port
- is a networking tool/device with the aim of selecting the appropriate path
for to transfer data packages between different networks.

Hub
- Two reasons for using hubs; are to create a central connection point for the
wiring media, and to increase the reliability of the network.

Switch
- combines the connectivity of a hub with the traffic regulation of a bridge on each
port
AVR
- also known as the "Automatic Voltage Regulator"
- It regulates the sudden flow of electric current from AC supply to the PC.

UPS
- Provide power for some time after a blackout has occurred.
- Is a device that sits between a power supply (in a wall outlet) and a device (a
computer) to prevent undesired features of a power source (outages,
sags,surges,bad harmonics) from the power supply from adversely affecting the
performance of a device.
FDD Cable/Connector
- It is the standard interface that use to connect the floppy disk drive to
motherboard.

SATA Cable
- It is a standard interface that use to connect the HDD or CD/DVD to the
motherboard.

PATA or ATA Cable/Connector


- It is a standard interface that use to connect the HDD or CD/DVD to the
motherboard

Motherboard

What is a motherboard?
- It is the core of the system which control all the devices.
- It is considered to be the centerpiece of the system unit.
- The motherboard is capable of interfacing with other circuitry boards such as
video cards and LAN card. These peripheral cards are also known as daughter
cards.

Electronic Symbols

Wire Symbols

Electrical Wire Conductor of electrical current

Connected Wires Connected crossing

Not Connected Wires Wires are not connected


Switch Symbols and Relay Symbols

SPST Toggle Switch Disconnects current when open

SPDT Toggle Switch Selects between two connections

Pushbutton Switch (N.O) Momentary switch - normally open

Pushbutton Switch (N.C) Momentary switch - normally closed

DIP Switch DIP switch is used for onboard configuration

SPST Relay
Relay open / close connection by an electromagnet
SPDT Relay

Jumper Close connection by jumper insertion on pins.

Solder Bridge Solder to close connection


Earth Ground Used for zero potential reference and electrical
shock protection.

Chassis Ground Connected to the chassis of the circuit

Digital / Common
Ground

Resistor Symbols

Resistor (IEEE)

Ground Symbols
Resistor reduces the current flow.
Resistor (IEC)

Potentiometer (IEEE)
Adjustable resistor - has 3 terminals.
Potentiometer (IEC)

Variable Resistor /
Rheostat (IEEE)
Adjustable resistor - has 2 terminals.
Variable Resistor /
Rheostat (IEC)

Trimmer Resistor Preset resistor

Thermistor Thermal resistor - change resistance when temperature


changes

Photoresistor / Light Photo-resistor - change resistance with light


dependent resistor (LDR) intensity change
Capacitor Symbols

Capacitor Capacitor is used to store electric charge. It


acts as short circuit with AC and open circuit
Capacitor with DC.

Polarized Capacitor Electrolytic capacitor

Polarized Capacitor Electrolytic capacitor

Variable Capacitor
Adjustable capacitance

Inductor / Coil Symbols


Inductor Coil / solenoid that generates magnetic field

Iron Core Inductor Includes iron

Variable Inductor

Power Supply Symbols


Voltage Source Generates constant voltage

Current Source Generates constant current.

AC Voltage Source AC voltage source

Electrical voltage is generated by mechanical


Generator
rotation of the generator

Battery Cell Generates constant voltage


Battery Generates constant voltage

Controlled Voltage Generates voltage as a function of voltage or


Source current of other circuit element.
Controlled Current Generates current as a function of voltage or
Sour Lamp / light bulb
ce
Lamp / light bulb

Lamp / light bulb

Diode

Zener Diode

Schottky Diode current of other circuit element.

Meter Symbols
Measures voltage. Has very high resistance.
Volt Connected in parallel.
met Measures electric current. Has near zero resistance.
er Connected serially.

Am Measures resistance
met
er Measures electric power

Ohm
met
Lamp / Light Bulb Symbols
er

Watt
met Generates light when current flows through
er
Diode / LED Symbols
Diode allows current flow in one direction only (left to
right).
Allows current flow in one direction, but also can flow
in the reverse direction when above breakdown
voltage

Schottky diode is a diode with low voltage drop


Varactor / Varicap Diode Variable capacitance diode

Tunnel Diode

Light Emitting Diode


(LED) LED emits light
when current flows through

Photodiode Photodiode allows current flow when exposed to light

Transistor Symbols

Allows current flow when high potential at base


NPN Bipolar Transistor (middle)
Allows current flow when low potential at base
PNP Bipolar Transistor (middle)

Made from 2 bipolar transistors. Has total gain


Darlington Transistor of the product of each gain.

JFET-N Transistor N-channel field effect transistor

JFET-P Transistor P-channel field effect transistor

NMOS Transistor N-channel MOSFET transistor

PMOS Transistor P-channel MOSFET transistor


Misc. Symbols
Motor Electric motor

Change AC voltage from high to low or low to


Transformer
high.

Electric bell Rings when activated


Buzzer Produce buzzing sound

Fuse
The fuse disconnects when current above
threshold. Used to protect circuit from high
Fuse currents.

Bus

Contains several wires. Usually for data /


address.
Bus

Bus
Optocoupler / Opto-
Optocoupler isolates onnection to other board
isolator

Loudspeaker Converts electrical signal to sound waves

Microphone Converts sound waves to electrical signal

Operational Amplifier Amplify input signal

Schmitt Trigger Operates with hysteresis to reduce noise.

Analog-to-digital
converter (ADC) Converts analog signal to digital numbers

Digital-to-Analog
converter (DAC) Converts digital numbers to analog signal

Used to generate precise frequency clock


Crystal Oscillator signal
Antenna Symbols

Antenna / aerial
Transmits & receives radio waves
Antenna / aerial

Dipole Antenna Two wires simple antenna

Logic Gates Symbols

NOT Gate (Inverter) Outputs 1 when input is 0

AND Gate Outputs 1 when both inputs are 1. NAND Gate

Outputs 0 when both inputs are 1. (NOT + AND)

OR Gate Outputs 1 when any input is 1.

NOR Gate Outputs 0 when any input is 1. (NOT + OR)

XOR Gate Outputs 1 when inputs are different. (Exclusive OR)

D Flip-Flop Stores one bit of data

Multiplexer / Mux 2 to 1
Connects the output to selected input line.
Multiplexer / Mux 4 to 1

Demultiplexer / Demuto 4 x 1 Connects selected output to the input line.

Manufacturer of BIOS
Abit
Acer
ALI (Acer Laboratories)
AME Group
American Megatrends
Amptron
Amstrad
Antec
Aopen
ASUS
Award
Bare-Bone
Biostar
Commate
Compaq Computer
Computer Technology
Computex
Data Expert (Expert Media)
Dell Computer
Diamond Multimedia
Digital Equipment Corporation (DEC)
Elitegroup Computer Systems
Famous Technology
FIC
Flexus
Fujitsu
Gateway
Gemlight
IBM
Intel
Jamicon
Jetway
J-Mark
Koutech
Matsonic
Micron
Mylex
NEC
NCR
Packard Bell
PC Partner
PC Chips
Phoenix
Pine Group
AMI (American Megatrends) - AMIBIOS, AMI BIOS

• Press Del when after powering on the computer.


• Some older motherboards that use AMIBIOS may prompt for the F1 or
F2 key instead.

Award Software (now part of Phoenix Technologies) - AwardBIOS, Award


BIOS

• Press the Del key to enter the BIOS Setup Utility on nearly all AwardBIOS
powered motherboards.
• Some older systems using Award's BIOS software asked for Ctrl+Alt+Esc
to enter BIOS.

DTK (Datatech Enterprises) - DTK BIOS

• Press the Esc key to enter BIOS, right after powering on the PC.

Microid Research - MR BIOS

• Press F1 to access the BIOS setup utility.

Phoenix Technologies - Phoenix BIOS, Phoenix-Award BIOS

• Press Del during the Power On Self-Test, immediately after the computer
starts.
• Many older Phoenix BIOS systems required Ctrl+Alt+Esc, Ctrl+Alt+Ins,
or Ctrl+Alt+S to access BIOS.

Acer - Aspire, Power, Veriton, Extensa, Ferrari, TravelMate, Altos

• Press Del or F2 immediately after powering on.


• The BIOS on the Acer Altos 600 server uses the Ctrl+Alt+Esc key and the
F1 key for advanced options.
• Older Acer computers may use also use the F1 or Ctrl+Alt+Esc keys to
access BIOS.

Compaq - Presario, Prolinea, Deskpro, Systempro, Portable

• Press F10 while the cursor in the top right corner of the screen is blinking.
• Older Compaq computers may use the F1, F2, F10, or Del key to give
access to BIOS.
Dell - XPS, Dimension, Inspiron, Latitude. OptiPlex, Precision, Vostro

• Press F2 when the Dell logo appears. Press every few seconds until the
message Entering Setup appears.
• Older Dell desktops and laptops may instead use Ctrl+Alt+Enter or Del to
enter BIOS.
• Older Dell laptops may use Fn+Esc or Fn+F1.

eMachines - eMonster, eTower, eOne, S-Series, T-Series

• Press Tab or Del while the eMachine logo displays on screen.


• Other eMachine computers may use F2 to enter BIOS.

Fujitsu - LifeBook, Esprimo, Amilo, Tablet, DeskPower

• Press F2 once the Fujitsu logo appears.

Gateway - DX, FX, One, GM, GT, GX, Profile, Astro

• Press the F1 key repeatedly after restarting the computer.


• Some older Gateway computers use F2 to access the BIOS Setup utility.

Hewlett-Packard (HP) - Pavilion, TouchSmart, Vectra, OmniBook, Tablet

• Press the F1, F10, or F11 key after restarting the computer.
• HP Tablet PCs may use F10 or F12.
• Other HP computers may allow access to BIOS using the F2 or Esc keys.

IBM - PC, XT, AT

• Press F1 immediately after powering on the computer.


• Older IBM computers (including some laptops) may utilize the F2 key for
BIOS entry.

Lenovo (formerly IBM) - ThinkPad, IdeaPad, 3000 Series, ThinkCentre,


ThinkStation

• Press F1 or F2 after powering on the computer.


• Older Lenovo products allow access to BIOS using Ctrl+Alt+F3,
Ctrl+Alt+Ins, or Fn+F1.

Micron (MPC Computers) - ClientPro, TransPort

• Press F1, F2 or Del immediately after powering on the PC.


NEC - PowerMate, Versa, W-Series

• Press F2 to enter the BIOS Setup.

Packard Bell - 8900 Series, 9000 Series, Pulsar, Platinum, EasyNote,


imedia, iextreme

• Press F1, F2, or Del to enter BIOS.

Samsung - Series 'x' laptops

• Press F2 to start the BIOS setup utility.

Sharp - Notebook Laptops, Actius

UltraLite • Press F2 after

the computer starts.

• Some very old Sharp PCs require a Setup Diagnostics Disk to access
BIOS.

Shuttle - Glamor G-Series, D'vo, Prima P2-Series, Workstation, X Mini XPC,


Surveillance

• Press F2 or Del on startup.

Sony - VAIO, PCG-Series, VGN-Series

• Press F1, F2 or F3 after turning on the computer.

Toshiba - Portégé, Satellite, Tecra, Equium

• Press F1 or Esc after powering on to access BIOS.


• Press F12 on a Toshiba Equium.

The following companies are either closed for business or no longer


manufacture or support mainstream computers systems so verifying the
following BIOS access information is nearly impossible. I have included
what I could dig up for anyone who might be interested:

ARI / ALR / AST (Advantage) - Press the Ctrl+Alt+Esc or Ctrl+Alt+Del keys.

Cybermax - Press the Esc key.


Tandon - Press the Ctrl+Shift+Esc keys.

Process How to set the CD/DVD drive as first boot

By pressing the DEL key when your computer is


starting you should see something like this.

Using the arrow keys select Boot and press enter


to access the Boot Device Priority menu.

Press enter on the highlighted 1st Boot Device


and select CDROM from the menu.
In this BIOS you have to press F10 to save and
exit any changes that you have made. Press enter
and the changes will be saved and you will exit
the BIOS.

When your computer is starting it will now boot from the CD.

This is all that is required to make your computer boot from the
CD/DVD drive and as long as you save the change you should be fine. If
you do not you'll have to go back and start again. If you are uncertain of
what you are doing then choose not to save any changes. Once you have
finished booting from your CD/DVD drive make sure you change the
order back so that the hard disk drive will now be booted from first.
Process of Installation in Windows XP

Insert your Windows XP installation CD-ROM and power-on/restart your system:


It will show the PC-BIOS start up message, like: memory test, memory installed :

When you get the message to


"press any key to boot from CD...", press any key.

( this is new on Microsoft Windows 2000 and XP CD's:

if you do not press any key, it will NOT boot from CD-
ROM, but boot from hard disk, so that people which
"forgot" to take out such bootable CD-ROM's are not
getting confused by the CD-ROM installation
procedure )

Once the boot from CD-ROM has started, it will display at the top of the screen:
"Setup is inspecting your computer's hardware configuration. . ."
After a brief delay, the typical Microsoft "blue Installation screen" is
displayed, with "Windows Setup" displayed at the top and at the bottom
of the screen the information, that "Setup is loading Files" (loading all
type of device drivers) :

It will finally state : "Setup is starting Windows" and will display after a short
delay the

"Windows XP Professional Setup" or "Windows XP Home Setup" screen :

Select "to set up Windows XP now" and press the ENTER-key :


The "Windows XP Licensing Agreement" is displayed; accept it by pressing the
F8-key. (as indicated on the button of the screen).

Setup will now display the partitioning of your disk:

1
5

If your system has already an operating system installed, you will see them
listed.
You have now a simple Disk Manager, allowing you to create and delete
partitions.
You will need to select either an existing partition or "Unpartitioned space"
(if available) to define, on which partition to install Windows XP, then
press ENTER. The next screen is asking for the type of disk formatting to
be used:

(if you install XP into an already existing partition, you have additional options to
leave the current disk formatting intact).

Select the type of disk formatting: FAT or NTFS

FAT : possible to access from a DOS-boot floppy, but limited to max. 4 GByte
with very inefficient file-storage (cluster-size of 64 KByte), no Security features

NTFS : not accessible from a DOS-boot floppy, but NOT limited in size and
using an efficient

file-storage with a small cluster-size, able to use File-System Security features.

Windows XP requires a lot of disk-space for itself, you should use at least a 4
GByte partition.

I suggest using NTFS: make your choice (highlight) and select it by pressing
ENTER.
Setup will start formatting the disk :

and will then start copying files from the CD-ROM to the disk :

The system will then need to reboot :


(This is a funny screen: the system will restart anyway after 1 second, and
you have only the choice to press ENTER to shorten the delay, saving max.
15 seconds in the complete installation process of 30-45 minutes)

After the restart, Windows XP starts the first time with the Graphical User
Interface (GUI):

Setup will continue to copy files and to install devices:


You can adjust regional settings (for example if you install an English
version of Windows XP in a different country and the keyboard
layout/language is not the same language as your copy of Windows XP,
you should use the button "Customize.."

and configure the proper keyboard, to make sure that you can enter in the
following steps of the setup/installation properly the information

Personalize your system by entering your name and organization :


Enter your 25 character Product key (as it was delivered with your Windows XP
CD-ROM )

Define the name for your computer and the password for the Administrator
account :
based on the organization (define above), Setup creates a name for your
computer, with complex name (to make sure that the name will be unique
in a network configuration. Since this name will be used later inside the
"Network Neighborhood" / "My Network places", change it to an easy to
understand , but UNIQUE name (like : P633VM ).

If you enter a password for the Administrator Account, make sure that you
remember it (to be save, write if down ! ). Check the "Date and Time
Settings", allowing to check/define/correct the date, time and timezone :

If you have a network card in your system, which was detected by Setup,
you will be asked to select whether to install a typical configuration (which
you can always change later) or if you like to make now already special
settings (like: defining your IP-address )
Setup continues with "Finalizing installation " (nothing to do for you ) :

The system will reboot again:


Setup will configure then your
screen resolution.

The system will try to connect via the Internet to the Microsoft website,
you can safely select to "Skip" that step. You will be prompted to enter
the first Usernames (which will be defined as Administrators) and you will
get the new XP Welcome screen :

(note : if only one user was defined during setup and no password was
defined, the system will skip the Welcome screen and continue to display
immediately the new Windows XP desktop ).

You are now ready to use the


"colorful" Windows XP :
You can adjust the system to
look and w
Process of Installation of Windows 7

1. Turn your computer on then press Del or F2 (depend on your computer’s


mainboard) to enter the system BIOS

2. Go to Boot menu and choose Boot From CD/DVD.

3. Press F10 to save the configuration and exit BIOS then reset your
computer.
4. Insert Windows 7 DVD into your DVD drive then start up your computer,
Windows 7 will be loading files.

5. Select these parts: Language to Install,Time and currency format,


Keyboard or input method. Then click Next.

6. Choose Install Now if you want to install Windows 7. Choose the Windows
7 version that you want to install in 'Select the operating system you want
to install' . Here we choose Windows 7 Ultimate then click next (depending
on your Windows DVD, this step is an option).

7. Click 'I accept the license terms' in 'Please read the license' then click
Next.

8. Choose 'Upgrade' in 'Which type of installation do you want' if you want to


upgrade from an older Windows version to Windows 7, 'Custom (advance)'
if you want to install a new version of Windows.
9. Choose Partition for installation, if your computer has only one hard disk, it
will be easy for selection, but if it has some Partition, you will have to
consider which Partition to choose.

10. Wait for Installing Windows to progress. Your computer might be restarted
during the process.

11.Type you’re a user account and computer name. After click Next.
12. Type a password for your account, you can also Type a password hint to
help in case of forgetting the password in the future, and then click Next.

13. Type in activation code or key for your license in Product key box if you
have any. Click Next.

14. Choose how to protect your Windows. Here we choose Use


recommended settings.
15. Set up your Time zone then click Next.

16. Choose an option from 3 choices: Public Network, Work Network, Home
Network. Choose Home Network for using Internet at home.

Method 1 of 2: Hardware requirements

• This is minimum hardware that you need to have on your


computer and should be checked in advance of installing. o 1
GHz CPU with 32 bits or 64 bits.
o 1 GB Ram for 32 bits or 2 GB Ram for 64 bits. o 16 GB
empty space hard disk for 32 bits or 20 GB for 64 bits. o
DVD drive (if installing from a DVD).
Method 2 of 2: Some errors during Windows 7 installation

• After Windows 7 installation, if you cannot connect to Internet,


please check these troubleshooting: o Make sure Internet cable
and the modem are working properly, the connection points are
not getting loose. o Check the network drive (normally Windows 7
automatically detects drivers).
o Set up Windows IP if the modem doesn’t analyze it
automatically
(searching on Internet for how to set it up) o Some
devices might not work such as: USB 3.0, Webcam,
Bluetooth etc. then you should check the driver ok to see if it
has been installed properly.
PROCESS OF INSTALLATION OF WINDOWS 8

Step 1 - Place Windows 8 DVD in your dvd-rom drive and start your PC.
Windows 8 will start to boot up and you will get the following screen with a
rotating progress bar.

Step 2 - The next screen allows you to setup your language, time and
currency format, keyboard or input method. Choose your required
settings and click next to continue.

Step 3 - The next screen allows you to install or repair Windows 8. Since we
are doing a clean install we will click on "install now".

Step 4 - The setup process starts as shown.


Step 5 - At this stage you need to type your product key that came with
your copy of Windows 8. Click next once you have entered the product
key correctly.

Step 6 - Read the license terms and tick I accept license terms. Then
click next to continue.

Step 7 - Choose the type of installation you want. Since you are doing a
clean install you need to click on custom.
Step 8 - Choose where you would like to install Windows 8. If you have one
hard drive you will get an option similar to the image below. You can click
next to continue then go to step 12.

If you have more than one drive or partition then you need to select the
appropriate drive and click next. At this stage you can go to step 12.

If you want to partition a large drive then do not click next. Go to step 9.

Step 9 - If you want to partition an existing drive then click new. Choose
the size of the partition and click apply.
Step 10 - Click OK to create the partition. Windows will create additional system
partition which you don't have to worry about.

Step 11 - You will notice that you have 3 partitions. Partition 1 is system
reserved. Leave this partition alone. Partition 2 is 30GB primary partition
that was created in the last step. The third partition is unallocated which
means it is not being used. You can however format it and use it as a
second storage drive. This can be done after windows installation is
finished so I will leave it for now.

Choose partition 2 (Primary Partition). This is where I will install Windows 8.


Click next to continue.
Step 12 - At this stage Windows starts to copy files to your hard drive and
begins the installation. This process might take a few minutes depending on
your computer specification. Now is a good time to grab yourself a coffee.

Step 13 - When all the necessary files are copied Windows 8 will
automatically restart as shown.
Step 14 - You will go through various progress bar and information
messages as shown on the following images. Windows might restart
automatically second time.

Step 15 - You are now presented with "Let's go through a few basics"
screen. It will automatically select personalize option.
Step 16 - Choose your PC name and personalize the color.

Step 17 - Here you can choose express settings or choose customize. I will
choose customize to make further customization.

Step 18 - Choose Yes, turn on sharing and connect to devices.


Step 19 - Help protect and update your PC. Choose your preferred option
and click next.

Step 20 - Send Microsoft info to help make Windows and apps better.
Choose your preferred options or leave the default settings. Click next to
continue.
Step 21 - Check online for solutions to problem. Choose your preferred
options or leave the default settings. Click next to continue.

Step 22 - Sign in to your PC. Here you can login to your PC using a
Microsoft email account such as your hotmail account.

If you do not have a Microsoft account you can create one by clicking Sign
up for a new email address. Go to Step 23.

If you don't want to create an email account and prefer to create a local
user name, click Sign in without a Microsoft account. Go to step 24.

Step 23 - Sign up for a new email address. If you want to create a new email
account you need to complete the form below.
Step 24 - Click local account

Step 25 - Here you can choose a local user name and password. Choose
finish to continue.
Step 26 - At this stage Windows starts to finalize your settings. You will get the
following information screen as the installation moves forward.

Step 27 - As Windows 8 setup progresses you are given a presentation of


the new interface. Its shows you how swiping the edge of the screen
brings up the Charm bar. Using the Charm bar you can do a search or
change your settings. It also demonstrates how you can hover your
mouse on the bottom or top left corner to access the switch list. This list
shows all open applications and allows you to switch between them.
Step 28 - Soon as the demonstration finishes windows moves into the
final stages of the setup.

Step 29 - Finally the setup process is finished and you are presented with
a completely new and unfamiliar Metro user interface. You have your
most common application right in front of you. Clicking on any tiles will
launch that application. At this point you can start using your computer.
However, it may not be fully configured. You need to make sure that all
the hardware is detected correctly and the necessary device drivers are
installed. This can be done from the device manager.

Step 30 - To go to device manager click search on charm bar on the right.


Then type devmgmt.msc. Click on the devmgmt icon on the left.

Step 31 - You will see all your hardware listed as shown on the image
below. You need to check if you have any yellow exclamation marks next
to the name of the devices, similar to "Base System Device" on the image
below. This indicates that the driver has not been installed for this device.

At this stage you can install the driver for this device. To do so, Right Mouse
click on Base System Device -> Update Driver Software...
Step 32 - You can choose to "Search automatically for updated driver
software" or "Browse my computer for driver software". If you have the
driver CD or if the driver is on a USB drive then choose "browse my
computer for driver software". Window 8 will search and install the driver
from the CD or you can locate the driver manually.

Once you have removed all the yellow exclamation marks from
the device manager your Windows 8 configuration would be fully
complete.

Process of Device Driver Installation


• Manual and automatic installation. Before installation please visit the
device manager tab – to view the hardware components device software
installed or not.
• Automatic installation. Place the CD device software installer in to the
CDROM Drive then wait until it prompt then follow screen instructions.
• Manual installation. It is recommended for trouble shooting / isolation
purposes.

Common Anti-virus

 AVG Free Edition – AVG Resident Shield provides real-time


protection executions of files and programs. It features a smart e-
mail scanner, virus updates and virus vault for secure handling of
the files which are infected by viruses. The base version for
windows is Free for private and noncommercial use.

 Bit Defender Online Scan System – BitDefender Scan Online


scans system’s memory, boot sector, all files and folders and
also comes with automatic file cleaning option. Overall, it scans for
over 70,000+ viruses, worms, trojans and other malicious
applications. Inexpensive product received excellent scores in our
performance tests, although its scan speed was sluggish.

 McAfee Virus Scan for Windows: This antivirus package detects all
virus types, including Word and Excel macros; boot-sector
infections; and file, multipartite, stealth, polymorphic, and
encrypted viruses.

 Kaspersky Anti-Virus Personal Pro – A commonly used virus


protection solution offering full protection against macro-viruses
and unknown viruses. It offers reliable data integrity control and
protection of e-mails from viruses.

 ESET NOD32 Antivirus – ESET NOD32 Anti-virus is available as


an antivirus for small businesses, individuals and for large
networks. The trial ware enables the user to try the application for
a period of 30 days.

 Avast! Home Edition – A free antivirus solution for scanning disk,


CDs, in E-mail, HTTP, NNTP, IM and P2P.

 Panda Antivirus Platinum – A complete virus protection package


for home and business users. It comes with an easy installation
and automatic protection from latest viruses.

 Norton Antivirus – Norton Antivirus is the most popular and secure


virus scanner for checking boot sector records at start up. The live
update feature automatically installs new updates for regular
protection against viruses.

 Handy Bits – A free for personal use virus ‘scanner integrator


’ with features like auto-search which scans for already
installed virus scanner. It scans for files using installed virus
scanners there by utilizing the strengths of installed programs.

 Hijack This Software – Hijack this is a small application for


scanning and cleaning spyware, malware infections in computer. It
enables the user to save the scan log in a txt file which can be
examined later for system security analysis.
Top 50 Anti-virus 1. Kaspersky
2. avast!
3. AVG 28. My Clean PC
4. Symantec (Norton)
5. Quick Heal 29.
Webroot
6. ESET
7. Microsoft Security Essentials 30. AhnLab

8. McAfee 31. BKAV

9. Avira 32. SUPERAntiSpyware


33. Qihoo 360
10. BitDefender
11. Panda Security 34. TrustPort

12. Malwarebytes' Anti Malware 35. BullGuard

13. eScan 36. E-Guard Anti Virus


37. PJ Magic
14. F-Secure
15. Avast Software 38. ARTAV Antivirus

16. ZoneAlarm 39. 39Kingsoft Antivirus

17. K7 TotalSecurity 40. Fixico


41. PC Tools Internet
18. Trend Micro
Security
19. Guardian AntiVirus
42. IObit
20. Comodo
43. Netlux Antivirus
21. Net Protector AntiVirus
44. Dr. Web
(NPAV)
45. VirIT
22. Defender Pro
46. Emsisoft Anti-Malware
23. VIPRE Antivirus
47. Shaw Secure
24. PC Media Anti-Virus
48. Max Secure
25. Smadav
49. GData
26. PremiumAV
50. ArjunAV Internet Security
27. Sophos Anti-virus
Computer Virus Symptoms

1. The computer suddenly slows down.


2. Application programs that used to run suddenly stop responding.
3. Computer starts to behave strangely.
4. Windows OS will not load upon opening the computer.
5. The system produces a double extension on a document that recently created
or modified, such as .jpg.vbs or .gif.exe.
6. Any unexpected changes in the content of the files.
7. Out-of-memory error messages appear, even though your computer has
plenty of RAM.

Virus detections & protections

1. Always install Antivirus protection program on your PC.


2. Always consider any external disk to be potential virus carrier and may infect
your system.
3. Do not open any e-mail files coming from unknown sources.
4. Always be cautious in downloading files from the internet. Always activate the
on guard properties of your anti virus program to scan the file before saving it
to the PC.
5. Download only on sites that are legitimate and reputable to make sure that the
file does not contain any malware.
6. Always delete chain emails and junk mails coming from unknown source. This
unsolicited email may carry harmful malware to PC.
7. Always enable Microsoft Office macro virus protection.
8. Back-up files on a regular basis. There is no absolute security in virus
prevention. If a virus destroys a certain file, replace it with the back-up copy.
9. Do not open e-mail attachments unless you know the content of the file.
10.Use an internet firewall. The firewall that’s built into your operating system
provides a helpful defense against viruses.
Removing a Computer Virus

1. Preliminary steps
• Use a non infected computer to download preferred antivirus software.
• Download the complete package of the antivirus assuming that it is a
freeware.
• Burn the downloaded files into a CD and make sure that they are labelled
properly.
• If the antivirus software is not available on the internet, buy the antivirus
software kit from
• authorized dealers and distributors. Always buy the latest version of the
software.

2. Install the antivirus software
• Assuming that Symantec antivirus was chosen, make sure that the PC
does not have other anti- virus software.
• Install the antivirus and run the Live Update function.
• In case the antivirus does not install because of the detected virus in the
memory, restart the computer and boot the computer into Safe Mode.
• Run the Msconfig command and in the StartUp Tab, uncheck all the files
StartUp Items. Press OK and restart the PC using normal boot.
• Install again the Antivirus software.

3. Update the virus pattern


• It is important to update the virus definition files regularly, especially upon
installation.
• This action will replace old files with the latest update.
• This is done by clicking in the system tray the anti- virus icon, then the
update will start.

4. Scan computer
• If viruses are detected, cleaning (removing) will be done automatically.
• If virus removal fails, file quarantine will be performed.

5. Protect PC from future threats by installing personal firewall


• Software firewalls protect computers and networks from malicious malware
and unauthorized access to computer system.

6. File quarantine and deletion


• There are cases that a certain virus is not “curable“ by any antivirus
program available. In case this is encountered, the best solution is to apply
file quarantine (file isolation from the system) or if this does not work also,
consider deleting the file.

7. Identify the malware and search for the appropriate antivirus program to
remove it.
• The virus that infects the system may not be removed by the antivirus
program installed in the system. Another solution for this problem is to
identify the virus and search on the antivirus manufacturer’s site on how to
remove this virus .

8. Connect the hard disk to a clean PC to be able to scan properly.


• Another way of removing virus from an infected hard disk is to connect it to
a clean PC and let the installed antivirus program of the PC perform a
complete scan and clean function to the hard disk.
Process of Printer Installation

For old printers such as dot matrix etc.

 Connect the printer cable to the system  Unit’s printer port. Connect the
power
 Cord to the outlet then switch ON the Printer.
 Insert the CD printer installer. Allow the
 System to detect the printer. Install the
 Printer driver software automatic or manual technique.

Process of Printer Sharing

 After installing the printer’s driver software there will be an icon created
inside the printer/fax tab icon in the control panel.
 Locate the appropriate printer’s name then right click. Click the sharing
security, then click OK.

Process of File Sharing

- Right Click folder to share > Properties > Sharing Tab > Network Sharing
and Security (Click “if you understand the security Risk..”) > Just Enable
Sharing > OK > Select share this folder on the network > OK

Computer networks allow you to share files with friends, family, coworkers and
customers. Before the Internet and home networks became popular, files were
often shared using floppy disks. Nowadays, some people still use CD-ROM /
DVD-ROM disks and USB keys for transferring their photos and videos, but
networks give you more flexible options.

Network file sharing is the process of copying files from one computer to another
using a live network connection. This article describes the different methods and
networking technologies available to help you share files.
File Sharing With Microsoft Windows

Microsoft Windows (and other personal computer operating systems) contain


built-in features for file sharing. For example, Windows file folders can be shared
across a local area network (LAN) or the Internet using any of several methods.
You can also set up security access restrictions that control who can obtain the
shared files.

Complications arise when attempting to share files between some computers


running Windows and others that don't, but the below alternatives can help.

FTP File Transfers

File Transfer Protocol (FTP) is an older but still popular method to share files on
the Internet. A central computer called the FTP server holds all the files to be
shared, while remote computers running FTP client software can log in to the
server to obtain copies.

All modern computer operating systems contain built-in FTP client software, and
popular Web browsers like Internet Explorer can also be configured to run as FTP
clients. Alternative FTP client programs are also available for free download on
the Internet. As with Windows file sharing, security access options can be set on
the FTP server requiring clients to supply a valid login name and password.

P2P - Peer to Peer File Sharing

Peer to peer (P2P) file sharing is a popular method for swapping large files on the
Internet, particularly music and videos. Unlike FTP, most P2P file sharing
systems do not use any central servers but instead allow all computers on the
network to function both as a client and a server. Numerous free P2P software
programs exist each with their own technical advantages and loyal community
following. [p[Instant Messaging (IM) systems are a type of P2P application most
commonly used for chatting, but all popular IM software also supports sharing
files.

Email

For decades, files have been transferred from person to person over a network
using email software. Emails can travel across the Internet or within a company's
intranet. Like FTP systems, email systems use a client/server model. The sender
and receiver may use different email software programs, but the sender must
know the recipient's email address, and that address must be configured to allow
the incoming mail.

Email systems are designed for transferring small amounts of data and generally
limit the size of individual files that can be shared.

Online Sharing Services

Finally, numerous Web sites built for personal and/or community file sharing exist
on the Internet. Members post or upload their files to the site using a Web
browser, and others can then download copies of these files using their browser.
Some community file sharing sites charge member fees, while others are free
(advertising supported). Providers often tout the cloud storage technology
advantages of these services, although available storage space tends to be
limited, and having too much personal data in the cloud is a concern for some
consumers.
Process of Back-up and Restore files

Protect your data with backup and restore processes

Note: This article doesn’t apply to Access apps – the new kind of database you
design with Access and publish online. See Create an Access app for more
information.
You will need a backup copy of your desktop database to either restore the entire
database if there is a system failure or to restore an object when the Undo
command isn't enough to fix a mistake.

If a backup copy of your database seems a wasted use of storage space,


consider the time that you might save by avoiding data and design loss. Creating
backups on a regular basis is especially important when you have several users
updating a database. Without a backup copy, you cannot restore corrupted or
missing objects or any changes to the database design.

In this article

• Plan regular backups


• Back up a database
• Back up a split database
• Restore a database
• Restore objects in a database

Plan regular backups

Some changes or mistakes cannot be reversed, so you don't want to wait for data
loss to occur before you realize that you should have created a backup copy of
the database. For example, when you use an action query to delete records or to
change data, any values that were updated by the query cannot be restored by
using Undo.
Tip Consider making a backup before you run any action query, especially if
the query will change or delete data.

If your database has several users, before you perform a backup make sure that
all users close their databases so that all changes to the data are saved.

Here are some guidelines to help you decide how often to back up your database:
• If the database is an archive, or if it is used only for reference and rarely
changes, it is sufficient to create backups only when the design or data is
changed.
• If the database is active and the data frequently changes, create a
schedule to regularly backup the database.
• If the database has multiple users, create a backup copy of the database
after a design change.

Note For data in linked tables create backups by using any available backup
features in the program that contains the linked tables. If the database that
contains the linked tables is an Access database, use the procedure in the
section Back up a split database.

Back up a database

When you back up a database, Access saves and closes objects that are open in
Design view and saves a copy of the database file by using a name and location
that you specify.

Note Access reopens objects as specified by the value of the object Default
View property.

Open the database for which you want to create a backup copy and do the
following:

1. Click File, and then click Save As.


2. Under File Types, click Save Database As.
3. Under Advanced, click Back Up Database, and then click Save As.
4. In the Save As dialog box, in the File name box, review the name for your
database backup.
You can change the name if you want, but the default name captures both the
name of the original database file and the date that you make the backup.

Tip When you restore data or objects from a backup, you usually want to know
which database the backup came from and when the backup was created, so it’s
good practice to use the default file name.

5. Select the file type you want the backup database to be saved as from the
Save as type list, and then click Save.

Back up a split database

A split database typically consists of two database files: a back-end database,


which contains only data in tables, and a front-end database, which contains links
to the tables in the back-end database, queries, forms, reports, and other
database objects. All the data is stored in the back-end database. All the user
interface objects, such as queries, forms, and reports, are kept in the front-end
database.

Backing up the front-end and back-end databases independent of one another as


you must do with a split database can be time consuming. Because the back-end
database contains the data, it is more important to make regular backups of the
back-end database.
Make a backup of the front-end database when you change its design. Individual
users of the front-end database can make arbitrary design changes, so consider
requiring the users to make their own backup copies of the front-end database.

Back up a back-end database

Notify users before you start the backup process because running the backup
process requires exclusive access to the database file, and users might be
unable to use the back-end database while the backup process is running.

1. To open only the back-end database, start Access.


2. Click Open Other Files > Computer > Browse, and then select the
backend database file that you want to back up.
3. Click the arrow next to Open, and then click Open Exclusive.

4. Click File, and then click Save As.


5. Under File Types, click Save Database As.
6. Under Advanced, click Back Up Database, and then click Save As.
7. In the Save As dialog box, in the File name box, review the name for your
database backup.

You can change the name if you want, but the default name captures both the
name of the original database file and the date that you make the backup.

Tip When you restore data or objects from a backup, you usually want to know
which database the backup came from and when the backup was created, so it’s
good practice to use the default file name.
8. In the Save As dialog box, select a location in which to save the backup
copy of your back-end database, and then click Save.

Back up a front-end database

To back up a front-end database after a design change, leave the database open
immediately after you change its design, and then follow the steps in the section
Back up a database, starting at step 2.

Restore a database

Note You can only restore a database if you have a backup copy of the
database.

A backup is considered a "known good copy" of a database file—a copy of which


you are confident of its data integrity and design. You should use the Back Up
Database command in Access to make backups, but you can use any known
good copy to restore a database. For example, you can restore a database from
a copy that is stored on a USB external backup device.
When you restore a whole database, you replace a database file that is damaged,
has data problems, or is missing completely, with a backup copy of the database.

1. Open File Explorer and browse to the known good copy of the database.
2. Copy the known good copy to the location where the damaged or missing
database should be replaced.

If you are prompted to replace an existing file, do so.

Restore objects in a database

If you have to restore one or more objects in a database, import the objects from
the backup copy of the database into the database that contains (or is missing)
the object that you want restored.
Important If other databases or programs have links to objects in the database
that you are restoring, it is critical that you restore the database to the correct
location. If you do not, links to the database objects will not work and will have to
be updated.

1. Open the database to which you want to restore an object.


2. To restore a missing object, skip to step 3. To replace an object that
contains bad or missing data or if the object has stopped working correctly,
do the following:
a. If you want to preserve the current object, to compare it with the
restored version after you restore, rename the object before you
restore it. For example, if you want to restore a damaged form
named Checkout, you can rename the damaged form
Checkout_bad.
b. Delete the object that you want to replace.
Note Always be careful when you delete database objects as they could be
linked to other objects in the database.

3. Click External Data, and in the Import & Link group, click Access.
4. In the Get External Data-Access Database dialog box, click Browse to
locate the backup database, and then click Open.
5. Select Import tables, queries, forms, reports, macros, and modules
into the current database, and then click OK.
6. In the Import Objects dialog box, click the tab that corresponds to the type
of object that you want to restore. For example, if you want to restore a
table, click the Tables tab.
7. Click the object to select it.
8. If you want to restore more objects, repeat steps 6 and 7 until you have
selected all of the objects that you want to restore.
9. To review the import options before importing the objects, in the Import
Objects dialog box, click the Options button.
10. After you select the objects and import setting options, click OK to restore
the objects.

To automate creating backups, consider using a product that performs automated


backups of a file system, such as file server backup software or a USB external
backup device.

Types of Network

Local area network (LAN)


 is computer network in which devices (i.e computers, printers, etc)
are connected to a shared medium (wire or cable) to exchange data
or share resources within a small geographic area.
 An individual network usually spans a single geographic area, providing
services and applications to people within a common organizational
structure, such as a single business, campus, or region.
 LANs are the most popular form of computer network.
METROPOLITAN AREA NETWORK (MAN)
 is a large computer network that usually spans a city or a large campus. A
MAN usually interconnects a number of local area networks (LANs) using
a high-capacity backbone technology, such as fiber-optical links, and
provides up-link services to wide area networks (or WAN) and the
Internet.

Wide Area Network (WAN)


 It is made up of multiple LANs tied together usually via telephone
services or fiber-optic cabling.
 It covers a wider area than a LAN. WANs may span a city, state,
country or even the world. Usually, a WAN is used to link the
different sites or remote offices of a single enterprise using routers.
Color Configuration of Straight Thru Type A+B, Cross Over, Roll Over for
each application

Straight-Through Wired Cables

Straight-Through refers to cables that have the pin assignments on each end of
the cable. In other words Pin 1 connector A goes to Pin 1 on connector B, Pin 2
to Pin 2 ect. Straight-Through wired cables are most commonly used to connect a
host to client. When we talk about cat5e patch cables, the Straight-Through wired
cat5e patch cable is used to connect computers, printers and other network client
devices to the router switch or hub (the host device in this instance).

Connector A
 Pin 1  Pin 1

Connector B  Pin 2 Pin 3  Pin 3


Pin 2

 Pin 4 Pin 5  Pin 4 Pin 5


 Pin 6  Pin 6
 Pin 7  Pin 7  Pin 8  Pin 8
Crossover Wired Cables

Crossover wired cables (commonly called crossover cables) are very much like
Straight-Through cables with the exception that TX and RX lines are crossed
(they are at oposite positions on either end of the cable. Using the 568-B
standard as an example below you will see that Pin 1 on connector A goes to Pin
3 on connector B. Pin 2 on connector A goes to Pin 6 on connector B ect.
Crossover cables are most commonly used to connect two hosts directly.
Examples would be connecting a computer directly to another computer,
connecting a switch directly to another switch, or connecting a router to a
router.Note: While in the past when connecting two host devices directly a
crossover cable was required. Now days most devices have auto sensing
technology that detects the cable and device and crosses pairs when needed.

Connector A Connector B
 Pin 1  Pin 3
 Pin 2  Pin 6
 Pin 3  Pin 1
 Pin 4  Pin 7
 Pin 5  Pin 8
 Pin 6  Pin 2
 Pin 7  Pin 4
Rollover  Pin 8 Wired Cables Pin 5

Rollover wired cables most commonly called rollover cables, have opposite Pin
assignments on each end of the cable or in other words it is "rolled over". Pin 1 of
connector A would be connected to Pin 8 of connector B. Pin 2 of connector A
would be connected to Pin 7 of connector B and so on. Rollover cables,
sometimes referred to as Yost cables are most commonly used to connect to a
devices console port to make programming changes to the device. Unlike
crossover and straight-wired cables, rollover cables are not intended to carry data
but instead create an interface with the device.
Connector A Connector B

 Pin 1  Pin 8
 Pin 2  Pin 7
 Pin 3  Pin 6
 Pin 4  Pin 5
 Pin 5  Pin 4
 Pin 6  Pin 3
 Pin 7  Pin 2  Pin 8  Pin 1
How to put an IP Address
(Windows XP)

Configuring the Computers:


• With the computer running MS Windows XP, double-click on “Network
Connections” in the Control Panel (in Classic View). The window shown in
Figure 2 should be similar to what is displayed on your screen.

Figure 2: Example Screenshot of Network Connections Window


• Right-click on the “Local Area Connection” icon and then select properties.
The window shown in Figure 3 should be similar to what is displayed on
your screen.
Figure 3: Example Screenshot of LAN Properties Window

• Select “Internet Protocol (TCP/IP)” then click the “Properties” button. Select
“Use the following IP address” option and enter the appropriate IP
configuration in the IP address entry box. The window shown in Figure 3
should be similar to what is displayed on your screen.

Figure 4: Example Screenshot of IP Properties Window


• Refer to the settings listed below for the computer you are configuring:
PC1 IP Address: 192.168.0.1; Subnet Mask: 255.255.255.0 PC2 IP Address:
192.168.0.2; Subnet Mask: 255.255.255.0 PC3 IP Address: 192.168.0.3;
Subnet Mask: 255.255.255.0 PC4 IP Address: 192.168.0.4; Subnet Mask:
255.255.255.0 PC5 IP Address: 192.168.0.5; Subnet Mask: 255.255.255.0
• Once all information are entered, click “OK” and then “Close”. The
computer is now configured with basic IP settings.
• To verify the IP configuration just completed type in “IPCONFIG” in the
computer terminal’s DOS mode. The following should be displayed:

C:\>ipconfig
Windows IP Configuration
Ethernet adapter Local Area Connection:
Connection-specific DNS Suffix
IP Address . . . . . . . . . . . : <configured IP Address> Subnet
Mask . . . . . . . . . . . : <configured Subnet Mask> Default
Gateway . . . . . . . . . :

• Wait for other groups to complete and then in the computer terminal’s DOS
mode, type in thefollowing:
PING <other computer’s IP address>
• At this point other computers should “REPLY” to your PING request. If a
“TIMED-OUT” message is displayed, troubleshoot the problem. It may be a
faulty cable, hub, or computer configuration.
• If the PING command is successful, try to repeat step 2.6 for all the other
computers. When all computers are able to PING the other computers, the
basic IP configuration for each computer is done.

How to put IP address (Windows 7)

TCP/IP defines how your computer communicates with other computers.


To make it easier to manage TCP/IP settings, we recommend using automated
Dynamic Host Configuration Protocol (DHCP). DHCP automatically assigns
Internet Protocol (IP) addresses to the computers on your network, if your
network supports it. If you use DHCP, then you don't have to change your TCP/IP
settings if you move your computer to another location, and DHCP doesn't
require you to manually configure TCP/IP settings, such as Domain Name
System (DNS) and Windows Internet Name Service (WINS). To enable DHCP or
change other TCP/IP settings, follow these steps:
1. Open Network Connections by clicking the Start button , and then
clicking Control Panel. In the search box, type adapter, and then, under
Network and Sharing Center, click View network connections.
2. Right-click the connection that you want to change, and then click
Properties. If you're prompted for an administrator password or
confirmation, type the password or provide confirmation.
3. Click the Networking tab. Under This connection uses the following items,
click either Internet Protocol Version 4 (TCP/IPv4) or Internet Protocol
Versin 6 (TCP/IPv6), and then click Properties.
The Network Connection Properties dialog box

4. To specify IPv4 IP address settings, do one of the following:


o To get IP settings automatically using DHCP, click Obtain an IP
address automatically, and then click OK.
o To specify an IP address, click Use the following IP address, and
then, in the IP address, Subnet mask, and Default gateway boxes,
type the IP address settings.
5. To specify IPv6 IP address settings, do one of the following:
o To get IP settings automatically using DHCP, click Obtain an IPv6
address automatically, and then click OK.
o To specify an IP address, click Use the following IPv6 address, and
then, in the IPv6 address, Subnet prefix length, and Default gateway
boxes, type the IP address settings.
6. To specify DNS server address settings, do one of the following:
o To get a DNS server address automatically using DHCP, click
Obtain DNS server address automatically, and then click OK. o To
specify a DNS server address, click Use the following DNS server
addresses, and then, in the Preferred DNS server and Alternate
DNS server boxes, type the addresses of the primary and
secondary DNS servers.

The Internet Protocol Version 4 (TCP/IPv4)Properties dialog box

7. To change advanced DNS, WINS, and IP settings, click Advanced.


Note

• To install IPv4, run Command Prompt as an administrator, type netsh


interface ipv4 install, and then press Enter.

Question & Answer

 You have just installed Windows 98. During testing , it fails to start after the
“starting Windows 98 “ message appear. What should you do to
troubleshoot this problem? Name at least two ways.
a. Type Win/D:M add the command prompt to start windows.
b. Press F8 when Windows restarting and select safe mode

 You have configured a dual boot system consisting Windows 98 in FAT 32


partition and Windows 2000 using NTFS partition. You check your Windows
2000 installation and it looked good. However, when you boot to Windows
98 you cannot see the files in the NTFS partition. What might be the source
of the problem?
Windows 98 is not compatible with NTFS

 You have configured a dual boot system consisting Windows 98 in FAT 32


partition and Windows 2000 using NTFS partition. You check your Windows
2000 installation and it looked good. However, when you boot to Windows
98 you can not see the files in the NTFS partition. What might be the source
of the problem?
Windows 98 is not compatible with NTFS

 You want to setup a dual boot scenario between Windows 98 and Windows
2000. How would you do this?
Partition your hard drive. Install Windows 98 first.
And install Windows 2000 to the second partition.
 A customer complains that his hard disk is making lots of noise. After
examining the computer and hearing the noise for yourself, you notice that
high pitch noise seems to be coming from the fan in the power supply.
Which component should be replaced? Power Supply

What part of HP Laser printer is malfunction if you receive a “50 service
error”?
FUSER

 A customer complains that he can’t get his computer to work. When she turn it
on, she gets no video and hears a series of beeps. The beeps are in the
sequence of one long beep, then two short beeps. You tell the customer to
bring the machine in. Upon further examination you are able to identify the
problem. What should be your next step? What is the error?
Replace the video card be sure that it is tighten

 What is indicated by a “201” error at system start up?


Bad memory. Most of the error begins with 2 indicate memory error of
some sort.

 What two command files are used by DOS to configure the computer?
Autoexec.bat and Config.sys

 You install a newly purchase sound card into your computer, but upon
rebooting you find that the new device is not recognized by the system.
Moreover, your modem, which has always worked perfectly, has stopped
functioning. What is probably the problem?
The sound card is using the same IRQ as the modem

 What is the correct way to use the protocol utility IPCONFIG in a Windows
2000 environment?
Choose start, click run and type cmd then press enter key. At the
command prompt type IPCONFIG

Transmission Control Protocol/Internet Protocol (TCP/IP) is a collection of
protocols that help manage the internet communication. Each computer
running TCP/IP must have a unique IP address assigned to it. What is an IP
address? Describe the format?
An IP address is set of four numbers, each of which must be from 0 to
255.

 What is the correct sequence to start Windows 2000 backup program?


Choose start-Programs-then Accessories- then System Tools then
Backup.

 You’ve setup a network whereby each computer act as a client and a server
and in which each user shares each other’s resources, including printers.
What is the correct term for such arrangement?
Peer to peer networking

 Sending and receiving electronic mail (e-mail) is a common benefit of the


internet. Assuming a user has access to the internet on a properly configure
PC. What is before a user can begin using e-mail?
E-mail account and e-mail client

 What is the name of the executable file for Microsoft Backup for DOS? For
Windows 3.x?
MSBACKUP.EXE

 What would you type at a DOS command line to start the Microsoft
AntiVirus?
Type MSAV at the command prompt.

 What program in the control panel can be used to create a startup disk.?

Add/Remove Programs
What is the final option in the Configure Screen menu?
Compatibility test

 The MSBACKUP Program in DOS receives its settings from what file?
SET file

 Which Windows NT 4.0 utility should you use after installing a new hard
drive to make usable?
Disk Administrator

 Which is the proper command to install Windows 2000 recovery console as


a startup option in the CD Rom in drive E?
E:\i386\winnt32.exe /cmdcons.

 During the Windows 2000 setup, you are ask to choose between NTFS file
system and the FAT filesystem. Can you site disadvantage on NTFS?
NTFS is more sophisticated file system however it is not compatible with
DOS.

 After the successful upgrading to Windows 2000, what should you do with
the temporary files generated during the setup process?
Nothing, because all generated temporary files are automatically remove
during the process.

 You are preparing the computer for dual booting between Windows 98 and
2000. Your drive is partitioned, and Windows 98 is already installed. What
should be your next step?
You must choose FAT for Windows 2000 partition

Which of the following is not the Windows 2000 key Boot file? Why?
Autoexec.bat – This is the key boot for Windows 3.1 and 9X are not
necessary for Windows 2000

 What is the most likely cause of a paper jam on a dot matrix printer?
Obstructed paper path

 HP printer laser jet III printer is not printing at all. The computer indicates that
the “device on LPT1 is not ready” You perform a service self test the printer
and it prints on the page of vertical lines with no problem. The front panel
self test does not work, however which component do you suspect is giving
you the problem
The Formatter

 A computer is experiencing random reboots and phantom problems that


disappear after reboot .What should you do?
Open the cover and reset all cards and chips

 Using either a Windows 9X or Windows 2000 workstation, what


components do you need to connect to a Microsoft network server?
Protocol, client and adapter

 You are enable file and printer sharing on your Windows 9X system. You
must now specify how security will be handled. What could be the options?
Share level Access Control and User level control

 A Windows 9x workstation includes default support for what network OS/client


types?

MS Windows Networking and Novell’s Netware within a Windows 9x
workstation, clients are provided for Microsoft and Novell Network

What is the third element required to configure a Windows 2000 system as


a network client? A client, an adapter, and ______?
Protocol

 What would you need to do to create a new dial-up networking (DUN)


connection within a Windows 9x system?
Choose: Start-Programs-Accessories: choose and click Dial up networking
then double click Make new connection. Or double click My computer
icon on the desktop then click dial up networking.

 What would you use to map a network drive in both Windows 9x and
Windows 2000?
Map network Drive

 What type of back up involves selecting the files you want to back up as
well as when you want them to backup?
Custom backup

 There are several pieces of backup hardware that are currently available. Of
the following, which is not valid backup hardware?
Stationary hard disk

 Which type of backup that backup files on a disk that has changed since the
last full backup?
Differential backup
Troubleshooting

Process of Installation Memory

A. Upgrading memory

Determining how much and what kind of memory to buy.


1. How much memory do I have and how much memory do I need?
2. What size and type of modules should I buy to be compatible with the
memory already have installed?
3. How much and what types of memory can I fit on the motherboard?
4. How much memory can I afford?

B. Installing memory

 When installing memory modules, always take important safety precautions:


• Protect the chips against static electricity.
• Always use a ground bracelet as you work.
• Be sure you have written down CMOS settings and make a
recovery disk if you do not already have one.
• Turn off the computer and unplug it before you remove the cover.
• Look for notches that orient the module in the slot on one side or
in the middle of the module.
• Check the documentation for any instructions specific to your
modules.
C. Installing SIMM

D. Installing DIMM

E. Troubleshooting Memory
 Check if you have installed memory modules that are supported by your
motherboard.
 Check if you have installed the right module size as stated in the
motherboard documentation.
 Remove and reinstall each module.
 Remove the newly installed memory, place the memory in different sockets
or slots and check whether the error message disappears.
 Try installing the new memory without the old installed.
 Clean the module edge connectors with a soft cloth or contact cleaner.
 Try flashing the BIOS.
Process of Processor

A. Upgrading Processor

Steps to Upgrade a CPU


 Ensure that the power supply to the computer is turned off and all accessories
are detached.
 Remove the computer’s chassis cover carefully.
 Locate the CPU fan and heatsink and disconnect the CPU fan from its power
supply.
 Remove the CPU’s heatsink on the motherboard, and find your computer's
processor located below it.
 Remove the old CPU by lifting up the tab holding it in place, and gently pulling
it out.
 The new CPU can be inserted by matching it correctly into position.
 Push down the tab to hold the new CPU into position.
 A thin, uniform layer of thermal compound should be applied before placing
the heatsink back into position. This thermal compound is used to ensure
improved conduction of heat from CPU to the heatsink.
 The heatsink can then be reinstalled, and the fan's wire connected back to its
power supply on the motherboard.
 The next step will be to confirm that everything is properly connected, by
gently trying to move the components.
 When you are satisfied with the new installation, screw the computer's cover
back into place. You can now remove the grounding wrist-strap.
 Plug your computer into its power source, and attach all the accessories.
 Your computer can now be turned on and should be ready for use!

You can upgrade an older microprocessor to a newer one in easy steps. Before
going ahead, you should gather information about which new CPU you need and
whether your motherboard is compatible with it or not.
The compatibility of your new CPU with your motherboard can be ascertained by
searching for specific information on the Internet, or checking with your trusted
computer dealer.
B. Installing Processor

Before getting started


1. Difficulty of installing computer processor should be a 3 out of 5.
2. Write down important information from the of the processor such as the Model
Number, Serial Number and specifications.
3. Ensure you are familiar with ESD and its potential dangers.
4. When physically installing the processor, ensure the computer is off and that
the power is disconnected.

Remove previous processor


If a processor is already installed in the computer it must be removed before
a new processor can be added.
If the processor is a socket processor and has an attached heat sink, it must
first be removed before the processor can be removed. Generally, most
socket heat sinks will have a wire to supply power to the fan, first remove
this wire. Next, you should notice clips on either side processor holding it in
place. Generally, pressing down on the larger end of the clip and then
moving the clip away from the processor should release one end of the clip
allowing for the heat sink to be removed.
Once the socket heat sink has been removed, if your processor is a ZIF
processor, remove the socket processor by locating a small arm on one of
the sides of the processor. This arm is generally a small metal bar. Moving
this bar from a horizontal to a vertical position will release the processor.
If your processor is a LIF processor you will need a processor / chip remove
tool to remove the processor. Generally, if you are adding a new processor it
is likely that this tool is included with the processor. If not, it can be
purchased at a local computer shop or computer retail store. Place this tool
between the processor and the socket and gently work the processor out of
the socket, doing a little on each side of the processor at a time. When doing
this, be careful not to bind or break any of the pins.
If your processor is a slot processor, the heat sink does not need to be
removed and in most cases cannot be removed. To remove a slot
processor, locate two tabs on either side of the processor. Move these slots
to the outward position and the processor should be able to be removed by
vertically pulling it out.

Install processor
Once no processor is currently installed in the computer, follow the below
steps for installing your processor.

Socket Processor
If you are installing a ZIF socket processor into the computer, begin first by
moving the metal arm generally located on one of the sides of the socket to
a vertical position. Next, examine the top of the processor that should have a
small dot in one of the corners. This dot indicates where pin one is located
on the bottom of the processor. Next, examine the socket on the
motherboard; this socket should have a missing hole or should have a 1
indicating pin one. Position the processor so both pin1 and hole1 match and
then place the processor down. If properly positioned, now when moving the
metal arm to the down or horizontal position it should firmly connect the
processor. If you are installing a LIF socket processor, first examine the top
of the processor and locate pin one, generally located with a small white dot.
Once pin one has been located, look at the socket and locate pin one on the
socket on the motherboard. Pin one on the socket / motherboard will be
located by either looking for a missing hole on the socket itself or by looking
for a small one next to one of the four corners.
Once the pins have been aligned properly, gently press the processor into
the socket until it is firmly attached.

Slot Processor
Finally, if you are installing a slot processor, first move the tabs on either
side of the support brackets to the outward position. Next, install the
processor by pressing the processor into the slot. Once successfully
installed into the brackets the two tabs should snap into place.

Apply heat compound


It is recommended if your computer processor is a 200MHz or higher and
does not already contain a processor heat sink that a heat compound /
grease be applied between the processor and heat sink to help distribute the
heat away from the processor.

Attach heat sink


Once the processor has been successfully installed and the heat compound
applied, attach the computer heat sink to the processor.
Note: Users who have a socket processor, when attaching the heat sink clip,
ensure not to scratch the motherboard with the clip. Also, when attaching the
heat sink bracket to the plastic clip, be careful because if too much pressure is
applied the plastic clip, it will break.

C. Installing a Processor that cartridge type


Installing a slot type CPU is the easiest, Basically the cartridge can only go one
way, so lift the tiny clips on both sides of the socket drop in the cartridge and
press down till the clip click in. The processor is now firmly in place now just plug
in the built in fan and your done.

D. Installing a Processor that PIN type


1. Check the pins. Turn the chip over and inspect the pins. Are they bent? They
should all stick straight up. If many of them are bent, then it is best to request a
replacement processor. If only a couple are bent and the bend is not that
much, then you may be able to use a screwdriver to gently bend the pins back
into place. Do so VERY carefully.
2. Open ZIF Socket. This is done by grabbing the lever on one side of the socket
and opening it. Pull the lever from the closed, level position, to the open,
vertical position. You may need to pull the lever out a bit before it will open. Do
this slowly and don’t force it. You don’t want to break the socket. On the way
up, you may experience a little more force. This is normal. The top part of the
ZIF socket will slide over a bit.
3. Orient The Chip. This involves locating Pin 1 on both the chip and the socket.
This is easy to do. The chip is always marked at Pin 1. The mark may be a
little dot on one corner, a slightly notched corner, or a mark at one of the pins
under the chip. On the socket, there is usually a notch on one corner, or a big
“1″. These corners will be matched up for correct installation.
4. Insert Processor. Bearing in mind the orientation determined in Step 3, insert
the chip into the socket. With a ZIF socket, the chip should install very easily. It
should almost fall into the socket with all pins lining up. That’s why they call it
the Zero Insertion Force socket. If not, the socket is probably not open all the
way. If you do not have a ZIF socket (God forbid!), you need to exercise
extreme care. Lay the chip on the socket. Make sure all pins line up. Then,
slowly push the chip into the socket. Use your thumb and push on one side of
the chip until it starts to go in. Then proceed to another side and repeat. Do
this around the chip several times until it is completely installed.
5. When done, there should be basically no gap between the bottom of the
processor and the socket.
6. Close ZIF Socket. Just close the lever. You will probably feel some resistance.
This is normal and it should close anyway. If you really need to lean on it,
though, check to be sure the chip is installed correctly. When down, make sure
the lever snaps into place.

7. Some retail processors come with the heat sink and fan already attached to
the CPU, in which case you will need to attach the CPU fan to the socket at
the same time as you close the ZIF socket. After you lock the CPU into place,
take the retention clips on either side of the CPU fan (which should line up
automatically for you if you inserted the processor correctly in step 4 above)
and push them down until each side clips over the tabs on either side of the
socket. Sometimes it takes using a screwdriver as leverage to be able to get
the retention clips out and over the tabs, but if you do this be very careful not
to slip and jab your motherboard with the screwdriver.

E. Installing a Processor that PIN less type


 Remove all cables attached to the back of your computer. Put your
computer on its side and slide the cover off. Some cases are designed
with screws holding the covers on or latches that need to be opened
before you can slide the cover off.
 Find the Socket 478 on the motherboard. It should be a small square with
a black plastic bracket surrounding it. The square is the Socket 478 while
the black plastic bracket is the retaining bracket for the CPU heatsink.
 Push the handle on the side of the Socket 478 up. Lower the CPU in
place, aligning the pinless corners of the CPU with the holeless corners on
the socket. Return the handle to its original location.
 Remove the plastic film covering the thermal compound from the bottom
of the heatsink.
 Line up the corners of the heatsink with the corners of the retaining
bracket on the motherboard. Keep the heatsink level as you lower it into
place. Apply gentle pressure to each corner to ensure it clips into the
bracket. Hold the heatsink down by its fan and lower the top clips one at a
time.
 Attach the heatsink's fan to the small 3-pin power connector on the
motherboard. The power connector should be fairly close to the CPU
socket.

F. Troubleshooting a Processor
 Unplug the computer. Open the computer case. Ground yourself by
holding the metal part of the case. Unplug the power source for the fan
sitting atop the processor. Remove any screws that hold the heatsink and
fan. Unlatch the clips on the side of the heatsink and fan and remove.
 Touch the processor. If it is too hot for you to keep your finger on the
processor, the processor may be overheating.

 Check to see that the processor is properly faceted to the socket. If any of
the hundreds of pins that fit into a socket on the motherboard are bent or
not seated properly, the computer will not function.

 Check the BIOS for proper processor settings. If the BIOS is set to the
wrong processor speed, the hardware can overheat and cause problems
with the computer. Check that the BIOS displays the right processor
speed and type when booting the computer.

 Swap out a good processor with the one having issues, if you have a
spare processor that is compatible with the motherboard. If the computer
runs fine with the other processor, then replace the processor.

 Check with the motherboard manufacturer to ensure that a new processor


you have bought or may buy is compatible. Most motherboard
manufacturers list compatibility specifications on the corporate website.
Computer POST and beep codes

The computer power-on self-test (POST) tests the computer to make sure it
meets the necessary system requirements and that all hardware is working
properly before starting the remainder of the boot process. If the computer
passes the POST the computer will have a single beep (with some computer
BIOS manufacturers it may beep twice) as the computer starts and the computer
will continue to start normally. However, if the computer fails the POST, the
computer will either not beep at all or will generate a beep code, which tells the
user the source of the problem.
If you're receiving an irregular POST or a beep code not mentioned below follow
the POST troubleshooting steps to determine the failing hardware component.

AMI BIOS beep codes


Award BIOS beep
codes IBM BIOS beep
codes
Macintosh startup tones
Phoenix BIOS beep codes
Motherboard help

AMI BIOS beep codes

Below are the AMI BIOS Beep codes that can occur. However, because of the wide
variety of different computer manufacturers with this BIOS, the beep codes may
vary.
Beep Code Descriptions

1 short DRAM refresh failure

2 short Parity circuit failure


3 short Base 64K RAM failure

4 short System timer failure

5 short Process failure


6 short Keyboard controller Gate A20 error

7 short Virtual mode exception error

8 short Display memory Read/Write test failure

9 short ROM BIOS checksum failure

10 short CMOS shutdown Read/Write error

11 short Cache Memory error

1 long, 3 short Conventional/Extended memory failure

1 long, 8 short Display/Retrace test failed

AWARD BIOS beep codes

Below are Award BIOS Beep codes that can occur. However, because of the
wide variety of different computer manufacturers with this BIOS, the beep codes
may vary.
Beep Code Description

1 long, 2 Indicates a video error has occurred and the BIOS cannot initialize the
short video screen to display any additional information

Any other RAM problem.


beep(s)
If any other correctable hardware issues, the BIOS will display a message.
IBM BIOS beep codes

Below are general IBM BIOS Beep codes that can occur. However, because of the
wide variety of models shipping with this BIOS, the beep codes may vary.
Beep Code Description

No Beeps No Power, Loose Card, or Short.

1 Short Beep Normal POST, computer is ok.

2 Short Beep POST error, review screen for error code.

Continuous Beep No Power, Loose Card, or Short.

Repeating Short Beep No Power, Loose Card, or Short.

One Long and one Short Beep Motherboard issue.

One Long and Two Short Beeps Video (Mono/CGA Display Circuitry)
issue.

One Long and Three Short Beeps. Video (EGA) Display Circuitry.

Three Long Beeps Keyboard or Keyboard card error.

One Beep, Blank or Incorrect Display Video Display Circuitry.

Macintosh startup tones

Tones Error

Error Tone. (two sets of different tones) Problem with logic board or SCSI
bus.

Startup tone, drive spins, no video Problem with video controller.

Powers on, no tone. Logic board problem.


High Tone, four higher tones. Problem with SIMM.

Phoenix BIOS beep codes

Below are the beep codes for Phoenix BIOS Q3.07 OR 4.X

Beep Code Description and what to check

1-1-1-3 Verify Real Mode.

1-1-2-1 Get CPU Type.

1-1-2-3 Initialize system hardware.

1-1-3-1 Initialize chipset registers with initial POST values.

1-1-3-2 Set in POST flag.

1-1-3-3 Initialize CPU registers.

1-1-4-1 Initialize cache to initial POST values.

1-1-4-3 Initialize I/O.

1-2-1-1 Initialize Power Management.

1-2-1-2 Load alternate registers with initial POST values.

1-2-1-3 Jump to UserPatch0.

1-2-2-1 Initialize keyboard controller.

1-2-2-3 BIOS ROM checksum.

1-2-3-1 8254 timer initialization.


1-2-3-3 8237 DMA controller initialization.
1-2-4-1 Reset Programmable Interrupt Controller.

1-3-1-1 Test DRAM refresh.

1-3-1-3 Test 8742 Keyboard Controller.

1-3-2-1 Set ES segment to register to 4 GB.

1-3-3-1 28 Autosize DRAM.

1-3-3-3 Clear 512K base RAM.

1-3-4-1 Test 512 base address lines.

1-3-4-3 Test 512K base memory.

1-4-1-3 Test CPU bus-clock frequency.

1-4-2-4 Reinitialize the chipset.

1-4-3-1 Shadow system BIOS ROM.

1-4-3-2 Reinitialize the cache.

1-4-3-3 Autosize cache.

1-4-4-1 Configure advanced chipset registers.

1-4-4-2 Load alternate registers with CMOS values.

2-1-1-1 Set Initial CPU speed.

2-1-1-3 Initialize interrupt vectors.

2-1-2-1 Initialize BIOS interrupts.


2-1-2-3 Check ROM copyright notice.

2-1-2-4 Initialize manager for PCI Options ROMs.

2-1-3-1 Check video configuration against CMOS.

2-1-3-2 Initialize PCI bus and devices.


2-1-3-3 Initialize all video adapters in system.

2-1-4-1 Shadow video BIOS ROM.

2-1-4-3 Display copyright notice.

2-2-1-1 Display CPU Type and speed.

2-2-1-3 Test keyboard.

2-2-2-1 Set key click if enabled.

2-2-2-3 56 Enable keyboard.

2-2-3-1 Test for unexpected interrupts.

2-2-3-3 Display prompt Press F2 to enter SETUP.

2-2-4-1 Test RAM between 512 and 640k.

2-3-1-1 Test expanded memory.

2-3-1-3 Test extended memory address lines.

2-3-2-1 Jump to UserPatch1.

2-3-2-3 Configure advanced cache registers.

2-3-3-1 Enable external and CPU caches.


2-3-3-3 Display external cache size.

2-3-4-1 Display shadow message.

2-3-4-3 Display non-disposable segments.

2-4-1-1 Display error messages.

2-4-1-3 Check for configuration errors.

2-4-2-1 Test real-time clock.

2-4-2-3 Check for keyboard errors


2-4-4-1 Set up hardware interrupts vectors.

2-4-4-3 Test coprocessor if present.

3-1-1-1 Disable onboard I/O ports.

3-1-1-3 Detect and install external RS232 ports.

3-1-2-1 Detect and install external parallel ports.

3-1-2-3 Re-initialize onboard I/O ports.

3-1-3-1 Initialize BIOS Data Area.

3-1-3-3 Initialize Extended BIOS Data Area.

3-1-4-1 Initialize floppy controller.

3-2-1-1 Initialize hard disk controller.

3-2-1-2 Initialize local bus hard disk controller.

3-2-1-3 Jump to UserPatch2.


3-2-2-1 Disable A20 address line.

3-2-2-3 Clear huge ES segment register.

3-2-3-1 Search for option ROMs.

3-2-3-3 Shadow option ROMs.

3-2-4-1 Set up Power Management.

3-2-4-3 Enable hardware interrupts.

3-3-1-1 Set time of day.

3-3-1-3 Check key lock.

3-3-3-1 Erase F2 prompt.

3-3-3-3 Scan for F2 key stroke.


3-3-4-1 Enter SETUP.

3-3-4-3 Clear in POST flag.

3-4-1-1 Check for errors

3-4-1-3 POST done - prepare to boot operating system.

3-4-2-1 One beep.

3-4-2-3 Check password (optional).

3-4-3-1 Clear global descriptor table.

3-4-4-1 Clear parity checkers.

3-4-4-3 Clear screen (optional).


3-4-4-4 Check virus and backup reminders.

4-1-1-1 Try to boot with INT 19.

4-2-1-1 Interrupt handler error.

4-2-1-3 Unknown interrupt error.

4-2-2-1 Pending interrupt error.

4-2-2-3 Initialize option ROM error.

4-2-3-1 Shutdown error.

4-2-3-3 Extended Block Move.

4-2-4-1 Shutdown 10 error.


4-3-1-3 Initialize the chipset.

4-3-1-4 Initialize refresh counter.

4-3-2-1 Check for Forced Flash.

4-3-2-2 Check HW status of ROM.


4-3-2-3 BIOS ROM is OK.

4-3-2-4 Do a complete RAM test.

4-3-3-1 Do OEM initialization.

4-3-3-2 Initialize interrupt controller.

4-3-3-3 Read in bootstrap code.

4-3-3-4 Initialize all vectors.


4-3-4-1 Boot the Flash program.

4-3-4-2 Initialize the boot device.

4-3-4-3 Boot code was read OK.

Procedures in Checking the fault and Problem Steps


1
Check the POST. POST stands for Power On Self Test. This is generally the
first or second thing that appears on a computer after turning on the power. This
appears before the operating system begins to load. The POST will display any
problems found with hardware that makes the computer unable to boot, POST
may also display problems with hardware that allow the computer to boot, but
not operate at its full capacity during operation. 2
Notice the load time of the OS (operating system). A longer than usual load
time may indicate seek errors (or other errors) in the hard drive. 3
Notice any graphics problems once the OS has loaded. Reduced graphics
may indicate driver failures or hardware failures with graphic cards.
Perform an auditory test. An auditory test is an unorthodox, but still effective
way of judging how hard a computer is working. With the computer on and
running, play any decent length audio file (usually above 30 secs). If the audio is
choppy or slow, it usually means that the processor is working at an elevated
level, or there is not enough RAM to run all programs loading. Changing the
startup sound is a great way to apply this test. Another issue associated with
choppy sounds is PIO (Programmed Input/Output) Mode. This affects how the
hard drive reads and writes data from a drive. Switching to DMA allows for
faster reads and writes, and can sometimes repair choppy audio.

Check any newly installed hardware. Many operating systems, especially


Windows, can conflict with new drivers. The driver may be badly written, or it may
conflict with another process. Windows will usually notify you about devices that
are causing a problem, or have a problem. To check this use the Device
Manager, this can be accessed by entering the Control Panel, clicking the
System icon, clicking the Hardware tab, and clicking on Device Manager. Use
this to check and arrange the properties of hardware.
6
Check any newly installed software. Software may require more resources
than the system can provide. Chances are that if a problem begins after
software starts, the software is causing it. If the problem appears directly upon
startup, it may be caused by software that starts automatically on boot. 7
Check RAM and CPU consumption. A common problem is a choppy or
sluggish system. If a system is choppy it is good practice to see if a program is
consuming more resources than the computer can provide. An easy way to
check this is to use the Task Manager, right click on the taskbar select Task
Manager, and click the Processes tab. The CPU column contains a number
that indicates the percentage of CPU the process is consuming. The Mem
Usage column indicates how much memory a process is consuming. 8
Listen to the computer, if the hard drive is scratching or making loud noises,
shut off the computer and have a professional diagnose the hard drive.
Listen to the CPU fan, this comes on a high speed when the CPU is working hard,
and can tell you when the computer is working beyond its capacity.
9
Run a virus and malware scan. Performance problems can be caused by
malware on the computer. Running a virus scan can unearth any problems. Use
a commonly updated virus scanner (such as Norton Antivirus or Avast! Antivirus)
and a commonly updated malware scanner (such as Spybot Search & Destroy).
10
Check for the problem in safe mode. As a last ditch effort, check the problem in
safe mode. To enter safe mode, tap F8 repeatedly during POST (this works on
most systems). If the problem persists in safe mode, it is a fair bet that the
operating system itself is to blame.
General Error Messages

Error Message

• Invalid partition Table


• Error Loading Operating System
• Missing Operating system
• Invalid Boot Disk
• Inaccessible boot device
• Missing Operating system, error loading Operating system
• Bad sector writing or reading to drive
• Configuration/CMOS error
• Hard drive not found
• Fixed disk error
• Invalid Drive Specification
• No boot device Available
• Non-system disk or disk error
• Bad or missing Command
• No Operating system found
• Not ready reading drive A: Abort , Retry, Fail?
• Bad command or file not found
• Write protect error writing drive A:
• Track 0 bad, disk not Usable
• Device Not Found
• Device/Service has failed to start
• Error in Config.sys line Xx
• Insufficient Memory
Acronyms

• ATX – Advance Technology Attachment


• RAM – Random Access Memory
• SDRAM – Synchronous Dynamic Random Access Memory
• DRAM – Dynamic Random Access Memory
• EDO RAM – Extended Data Output Random Access Memory
• SIMM – Single Inline Memory Module
• DIMM – Double Inline Memory Module
• RIMM – Rambus Inline Memory Module
• AT – Advance Technology
• ATX – Advance Technology Extended
• USB – Universal Serial Bus
• IEEE – Institute of Electrical and Electronics Engineer
• OHS – Occupational Health and Safety
• PCIE - Peripheral Component Interconnect Express
• BIOS – Basic Input Output System
• ISA – Industry Standard Architecture
• PCI – Peripheral Component Interconnect
• EISA – Extended Industry Standard Architecture
• VESA – Video Electronics Standard Association
• IDE – Integrated Drive Electronics
• SCSI – Small Computer System Interface
• CMOS – Complementary Metal-Oxide Semiconductor
• ROM – Read Only Memory
• DDR – Double Data Rate
• CPU – Central Processing Unit
• UDMA – Ultra Direct Memory Access

You might also like