ITE7 Chp2-4
ITE7 Chp2-4
ITE7 Chp2-4
Cisco Confidential 1
Chapter 2: PC Assembly
IT Essentials v7.0
Chapter 2 - Sections & Objectives
§ 2.1 Assemble the Computer
• Build a computer.
• Define general and fire safety standards.
• Connect the power supply.
• Install the motherboard components.
• Install internal drives.
• Install the adapter cards.
• Identify additional storage.
• Connect computer components with appropriate cables.
© 2016 Cisco and/or its affiliates. All rights reserved. Cisco Confidential 3
2.1 Assemble the Computer
© 2016 Cisco and/or its affiliates. All rights reserved. Cisco Confidential 4
General and Fire Safety
Video Explanation – General and Fire Safety
In this video explanation, you will learn about the general and fire safety
precautions while working in a computer:
• Remove watches or jewelry
• Turn off and unplug equipment
• Remove clutter from workspace
• Cover sharp edges inside the computer
• Wear safety goggles
• Proper lifting procedures
• Fire extinguisher availability, rating, and use
© 2016 Cisco and/or its affiliates. All rights reserved. Cisco Confidential 5
Open the Case and Connect the Power Supply
Video Demonstration – Install the Power Supply
© 2016 Cisco and/or its affiliates. All rights reserved. Cisco Confidential 6
Open the Case and Connect the Power Supply
Select the Case and Fans
• Model Type – The motherboard determines the type of case you can use. The size and shape
must match.
• Size – A computer with many components will need more room for airflow to keep the system cool.
• Power Supply – Match the power supply rating and connection type to the motherboard.
• Appearance – There are many case designs to choose from.
• Status Display – LEDs mounted on outside of case tell you if the system has power, when the
hard drive is in use, and when the computer is in sleep or hibernate mode.
• Vents – All cases have a vent on the power supply, and some have a vent in the back to draw air
out of into the system. Some cases have even more vents.
© 2016 Cisco and/or its affiliates. All rights reserved. Cisco Confidential 7
Open the Case and Connect the Power Supply
Select the Case and Fans (Cont.)
© 2016 Cisco and/or its affiliates. All rights reserved. Cisco Confidential 8
Open the Case and Connect the Power Supply
Select a Power Supply
© 2016 Cisco and/or its affiliates. All rights reserved. Cisco Confidential 9
Install the Motherboard Components
Video Demonstration – Install the CPU
© 2016 Cisco and/or its affiliates. All rights reserved. Cisco Confidential 10
Install the Motherboard Components
Video Demonstration – Install the RAM
© 2016 Cisco and/or its affiliates. All rights reserved. Cisco Confidential 11
Install the Motherboard Components
Video Demonstration – Install the Motherboard
© 2016 Cisco and/or its affiliates. All rights reserved. Cisco Confidential 12
Install the Motherboard Components
Select the Motherboard
When selecting a replacement
motherboard, make sure that it supports or
accommodates:
• CPU
• RAM
• Video adapter, other adapter cards
• Socket and chipset on motherboard are
compatible with the CPU
• The existing heat sink and fan
assembly when reusing the CPU
• The number/type of expansion slots.
They must match the existing adapter
cards and allow for new cards
• The existing power supply connections
must fit the new motherboard.
• New motherboard must fit into the
current computer case.
© 2016 Cisco and/or its affiliates. All rights reserved. Cisco Confidential 13
Install the Motherboard Components
Select the CPU and CPU Cooling
© 2016 Cisco and/or its affiliates. All rights reserved. Cisco Confidential 14
Install the Motherboard Components
Select the RAM
New RAM may be needed when an application locks up or
the computer displays frequent error messages. To
determine if the problem is the RAM, execute the RAM test
in the BIOS. The speed of the new RAM must be supported
by the chipset.
© 2016 Cisco and/or its affiliates. All rights reserved. Cisco Confidential 15
Install the Motherboard Components
Install the Motherboard in a Computer
In this lab, you will install a CPU, a heat sink/fan assembly,
and RAM module(s) on the motherboard. You will then install the
motherboard into
the computer case.
© 2016 Cisco and/or its affiliates. All rights reserved. Cisco Confidential 16
Install Internal Drives
Video Demonstration - Install the Drives
This is a video demonstration about installing the Drives:
Hard Drive
Step 1: Position the HDD so that it aligns with the drive ay opening. The power and
interface connectors should be facing out towards the motherboard.
Step 2: Insert the HDD into the drive bay so that the screw holes in the drive line up
with the screw holes in the case.
Step 3: Secure the HDD to the case using the proper screws.
© 2016 Cisco and/or its affiliates. All rights reserved. Cisco Confidential 17
Install Internal Drives
Video Demonstration - Install the Drives (Cont.)
This is a video demonstration about installing the Drives:
Optical Drive
Step 1: From the front of the case, choose the drive bay that you want to hold the
drive. Remove the faceplate from that bay if necessary.
Step 2: Position the optical drive so that it aligns with the 5.25 inch (13.34 cm) drive
bay opening at the front of the case.
Step 3: Insert the optical drive into the drive bay so that the optical drive screw holes
align with the screw holes in the case.
Step 4: Secure the optical
© 2016 Cisco and/or its affiliates. All rights reserved. Cisco Confidential 18
Install Internal Drives
Select Hard Drives
© 2016 Cisco and/or its affiliates. All rights reserved. Cisco Confidential 19
Install Internal Drives
Select Optical Drives
© 2016 Cisco and/or its affiliates. All rights reserved. Cisco Confidential 20
Install Internal Drives
Install the Hard Drive
© 2016 Cisco and/or its affiliates. All rights reserved. Cisco Confidential 21
Install Internal Drives
Install the Optical Drive
Step 1. From the front of the case, choose the drive bay
that you want to hold the drive. Remove the faceplate
from that bay if necessary.
Step 2: Position the optical drive so that it aligns with the
5.25 inch (13.34 cm.) drive bay opening at the front of
the case, as shown in the figure.
Step 3. Insert the optical drive into the drive bay so that
the optical drive screw holes align with the screw holes
in the case.
Step 4. Secure the optical drive to the case using the
proper screws.
Installation Tip: Slightly hand-tighten all the screws
before tightening any of them with a screw driver. This
will make it easier to tighten the last two screws.
© 2016 Cisco and/or its affiliates. All rights reserved. Cisco Confidential 22
Install the Adapter Cards
Video Demonstration – Install the Adapter Cards
This is a video demonstration about installing the Adapter Cards:
Step 1: Find an empty PCIe x16 slot on the case and remove the small metal cover.
Step 2: Align the video adapter card to the appropriate expansion slot on the
motherboard.
Step 3: Press down gently on the video adapter card until it is fully seated.
Step 4: Secure the video adapter card mounting bracket to the case with the
appropriate screw.
© 2016 Cisco and/or its affiliates. All rights reserved. Cisco Confidential 23
Install the Adapter Cards
Select Adapter Cards
Adapter cards are designed for a specific task
and add extra functionality to a computer. There
are a variety of adapter cards: PCI
• Graphics
• Sound
• Storage Controller
• I/O
• NIC
• Capture PCIe x1
Adapter cards are inserted into two types of
expansion slots on a motherboard:
• Peripheral Component Interconnect (PCI)
• PCI Express (PCIe) – PCIe has four types of
slots; x1, x4, x8, and x16.
PCIe x16
© 2016 Cisco and/or its affiliates. All rights reserved. Cisco Confidential 24
Install the Adapter Cards
Other Factors for Adapter Card Selection
© 2016 Cisco and/or its affiliates. All rights reserved. Cisco Confidential 25
Install the Adapter Cards
Install the Adapter Cards
Expansion cards are installed into an appropriate
slot on the motherboard.
© 2016 Cisco and/or its affiliates. All rights reserved. Cisco Confidential 26
Select Additional Storage
Select a Media Reader
Several media card formats have
been developed over the years
including:
•Secure digital (SD
•MicroSD
•MiniSD
•CompactFlash
•Memory Stick
© 2016 Cisco and/or its affiliates. All rights reserved. Cisco Confidential 27
Select Additional Storage
Select External Storage
External USB flash drives, sometimes
called thumb drives, are commonly
used as removable external storage.
External storage devices connect to
an external port using USB, eSATA,
or Thunderbolt ports.
© 2016 Cisco and/or its affiliates. All rights reserved. Cisco Confidential 28
Install the Cables
Video Demonstration – Connect the Internal Power Cables
This is a video demonstration about connecting the internal power cables:
Step 1: Align the 24-pin ATX power connector to the socket on the motherboard.
Step 2: Gently press down on the connector until the clip clicks into place.
Step 3: Align the 4-pin auxiliary power connector to the socket on the motherboard.
Step 4: Gently press down on the connector until the clip clicks into place.
Step 5: Align the CPU fan power connector to the socket on the motherboard.
Step 6: Gently press down on the connector until the clip clicks into place.
© 2016 Cisco and/or its affiliates. All rights reserved. Cisco Confidential 29
Install the Cables
Video Demonstration – Connect the Internal Data Cables
This is a video demonstration about connecting the internal data cables:
Step 1: Align the SATA cable and plug one end into the motherboard socket.
Step 2: Align the other end of the SATA cable and plug it into the smaller SATA port
on the drive.
© 2016 Cisco and/or its affiliates. All rights reserved. Cisco Confidential 30
Install the Cables
Video Demonstration – Install the Front Panel Cables
This is a video demonstration about connecting the front panel cables:
Step 1: Plug the power cable into the system panel connector in the location marked
PWR_SW.
Step 2: Plug the reset cable into the system panel connector in the location marked
RESET.
Step 3: Plug the power LED cable into the system panel connector in the location
marked PWR_LED.
Step 4: Plug the drive activity LED into the system panel connector in the location
marked HDD_LED.
Step 5: Plug the speaker cable into the system panel connector in the location
marked SPEAKER.
Step 6: Plug the USB cable into the USB connector.
Step 7: Plug the audio cable into the audio connector.
© 2016 Cisco and/or its affiliates. All rights reserved. Cisco Confidential 31
Install the Cables
Install the Front Panel Cables
A computer case
typically has a power
button and visible
activity lights on the
front of the case. The
case will include front
panel cables that must
be connected to a
common system panel
connector on a
motherboard. Writing on System Panel Connector
the motherboard near
the system panel
connector shows where
Front Panel Connectors
each cable is connected.
© 2016 Cisco and/or its affiliates. All rights reserved. Cisco Confidential 32
Install the Cables
Install the Front Panel Cables (Cont.)
System panel connectors
include:
• Power Button
• Reset Button
• Power LED
• Drive Activity LEDs
• System Speaker
• Audio
© 2016 Cisco and/or its affiliates. All rights reserved. Cisco Confidential 33
Install the Cables
Install the Front Panel Cables (Cont.)
New cases and
motherboards have USB
3.0 or USB 3.1 capabilities.
USB connector cables are
often 9 or 10 pins arranged
in two rows. These cables
connect to USB
motherboard connectors.
This arrangement allows for
two USB connections, so USB Motherboard Connectors
USB connectors are often
in pairs. Sometimes the two
connectors are together in
one piece and can be
connected to the entire
USB motherboard
Internal USB Connector
connector.
© 2016 Cisco and/or its affiliates. All rights reserved. Cisco Confidential 34
Install the Cables
Install the Front Panel Cables (Cont.)
© 2016 Cisco and/or its affiliates. All rights reserved. Cisco Confidential 35
Install the Cables
Video Demonstration – Complete the Computer Assembly
This is a video demonstration about completing the computer assembly:
Step 1: Reattach the front panel (if necessary).
Step 2: Plug the power cable into the power supply.
Step 3: Orient and connect USB cables to USB ports.
Step 4: Orient and connect the video cable to the video port on the video
adapter.
Step 5: Tighten the video cable screws to the video adapter.
Step 6: Connect the network cable to the Ethernet port.
Step 7: Connect the audio cables to the audio ports.
Step 8: Place the side panel cover onto the case and slide it closed.
Step 9: Tighten any screws to secure the side panel cover.
© 2016 Cisco and/or its affiliates. All rights reserved. Cisco Confidential 36
Install the Cables
Lab – Complete the Computer Assembly
© 2016 Cisco and/or its affiliates. All rights reserved. Cisco Confidential 37
2.2 Chapter Summary
© 2016 Cisco and/or its affiliates. All rights reserved. Cisco Confidential 38
Conclusion
Chapter 2: PC Assembly
• Build a computer.
• Define general and fire safety standards.
• Connect the power supply.
• Install the motherboard components.
• Install internal drives.
• Install the adapter cards.
• Identify additional storage.
• Connect computer components with appropriate cables.
© 2016 Cisco and/or its affiliates. All rights reserved. Cisco Confidential 39
Chapter 2
New Terms and Commands
• BD-R • Secure Digital (SD)
• BD-RE • Unbuffered Memory
• BD-ROM • xD
• Buffered Memory
• CD-ROM
• CD-RW
• CompactFlash
• DVD-ROM
• DVD-RW
• Front-side Bus (FSB)
• I/O Card
• Memory Stick
• MicroSD
• MiniSD
© 2016 Cisco and/or its affiliates. All rights reserved. Cisco Confidential 40
Chapter 3: Advanced Computer
Hardware
IT Essentials v7.0
Chapter 3 - Sections & Objectives
§ 3.1 Boot the Computer
© 2016 Cisco and/or its affiliates. All rights reserved. Cisco Confidential 43
Chapter 3 - Sections & Objectives (Cont.)
§ 3.3 Advanced Computer Functionality
© 2016 Cisco and/or its affiliates. All rights reserved. Cisco Confidential 46
POST, BIOS, CMOS and UEFI
POST
§ When a computer is booted, the basic input/output system (BIOS) performs a hardware
check on the main components of the computer.
• This check is called a power-on self-test (POST).
§ If a device is malfunctioning, an error or a beep code alerts the technician of the problem.
© 2016 Cisco and/or its affiliates. All rights reserved. Cisco Confidential 47
POST, BIOS, CMOS and UEFI
BIOS and CMOS
§ All motherboards need a BIOS to operate.
© 2016 Cisco and/or its affiliates. All rights reserved. Cisco Confidential 48
POST, BIOS, CMOS and UEFI
BIOS and CMOS (Cont.)
§ The motherboard manufacturer saves the
motherboard BIOS settings in a Complementary
Metal Oxide Semiconductor (CMOS) memory chip.
§ When a computer boots, the BIOS software reads
the configured settings stored in CMOS to determine
how to configure the hardware.
§ The BIOS settings are retained by CMOS using a
battery.
• If the battery fails, important settings can be lost.
§ Installation Tip: If the computer’s time and date are
incorrect, it could indicate that the CMOS battery is
bad or is getting very low.
© 2016 Cisco and/or its affiliates. All rights reserved. Cisco Confidential 49
POST, BIOS, CMOS and UEFI
UEFI
§ Most computers today run Unified Extensible
Firmware Interface (UEFI).
§ All new computers come with UEFI, which
provides additional features and addresses
security issues with legacy BIOS.
§ UEFI can run on 32-bit and 64-bit systems,
supports larger boot drives, and includes
additional features such as secure boot.
• Secure boot ensures your computer boots to
your specified operating system.
• This helps prevent rootkits from taking over
the system.
© 2016 Cisco and/or its affiliates. All rights reserved. Cisco Confidential 50
BIOS/UEFI Configuration
Video Demonstration – Configure BIOS – UEFI Settings
© 2016 Cisco and/or its affiliates. All rights reserved. Cisco Confidential 51
BIOS/UEFI Configuration
BIOS and UEFI Security
§ The legacy BIOS supports some security features to protect the BIOS setting, however UEFI adds
additional security features.
§ Some common security features found in the BIOS/UEFI systems includes:
• Passwords - Passwords allow for different levels of access to the BIOS settings.
• Drive encryption - A hard drive can be encrypted to prevent data theft.
• LoJack – This is a security feature that allows the owner to locate, lock, and delete the device.
• Trusted Platform Module (TPM) – This is a chip designed to secure hardware by storing encryption
keys, digital certificates, passwords, and data.
• Secure boot - Secure Boot is a UEFI security standard that ensures that a computer only boots an OS
that is trusted by the motherboard manufacturer.
© 2016 Cisco and/or its affiliates. All rights reserved. Cisco Confidential 52
BIOS/UEFI Configuration
Update the Firmware
§ Motherboard manufacturers may publish updated BIOS versions to provide enhancements to
system stability, compatibility, and performance.
§ Early computer BIOS information was contained in ROM chips and to upgrade the BIOS
information, the ROM chip had to be physically replaced.
§ Modern BIOS chips are Electronically Erasable Programmable Read Only Memory (EEPROM)
which can be upgraded by the user without opening the computer case.
• This is called “flashing the BIOS”.
§ To download a new BIOS, consult the manufacturer’s website and follow the recommended
installation procedures.
© 2016 Cisco and/or its affiliates. All rights reserved. Cisco Confidential 53
3.2 Electrical Power
© 2016 Cisco and/or its affiliates. All rights reserved. Cisco Confidential 54
Wattage and Voltage
Wattage and Voltage
§ There are four basic units of electricity that a computer technician must know:
• Voltage (V) – Measured in Volts (V) – The measure of work required to move a charge.
• Current (I) – Measured in Amperes(A) – The measure of the amount of electrons moving through a
circuit per second.
• Resistance (R) – Measured in Ohms (O) – Refers to the opposition to the flow of current in a circuit.
• Power (P) – Measured in Watts (W) –The measure of the work required to move electrons through a
circuit multiplied by the # of electrons going through the circuit per second.
§ A basic equation, known as Ohm's Law, expresses how voltage is equal to the current multiplied
by the resistance: V = IR.
§ In an electrical system, power is equal to the voltage multiplied by the current: P = VI.
© 2016 Cisco and/or its affiliates. All rights reserved. Cisco Confidential 55
Wattage and Voltage
Power Supply Voltage Settings
§ On the back of some power supplies is a small switch
called the voltage selector switch.
• This switch sets the input voltage to the power supply to
either 110V / 115V or 220V / 230V.
• A power supply with this switch is called a dual voltage
power supply.
• If a power supply does not have this switch, it automatically
detects and sets the correct voltage.
§ The correct voltage setting is determined by the country
where the power supply is used.
© 2016 Cisco and/or its affiliates. All rights reserved. Cisco Confidential 56
Power Fluctuation and Protection
Power Fluctuation Types
§ When the voltage in a computer is not accurate or steady,
computer components might not operate correctly.
© 2016 Cisco and/or its affiliates. All rights reserved. Cisco Confidential 57
Power Fluctuation and Protection
Power Protection Devices
§ To help shield against power fluctuation problems, use devices to
protect the data and computer equipment:
• Surge protector - Helps protect against damage from surges and
spikes.
• A surge suppressor diverts extra electrical voltage that is on the line to the
ground.
• Uninterruptible power supply (UPS) - Helps protect against
potential electrical power problems and provides a consistent
quality of power when brownouts and blackouts occur.
• Standby power supply (SPS) - Helps protect against potential
electrical power problems by providing a backup battery that is on
standby during normal operation.
• This device is not as reliable as a UPS because of the time it takes to switch
over to the battery.
© 2016 Cisco and/or its affiliates. All rights reserved. Cisco Confidential 58
3.3 Advanced Computer
Functionality
© 2016 Cisco and/or its affiliates. All rights reserved. Cisco Confidential 59
CPU Architectures and Operation
CPU Architectures
§ A program is a sequence of stored instructions and a CPU executes these instructions by
following a specific instruction set.
§ There are two distinct types of instruction sets that CPUs may use:
• Reduced Instruction Set Computer (RISC) - This architecture uses a relatively small set of
instructions. RISC chips are designed to execute these instructions very rapidly.
• Complex Instruction Set Computer (CISC) - This architecture uses a broad set of instructions,
resulting in fewer steps per operation.
§ While the CPU is executing one step of the program, the remaining instructions and the data
are stored nearby in a special, high-speed memory, called cache.
© 2016 Cisco and/or its affiliates. All rights reserved. Cisco Confidential 60
CPU Architectures and Operation
Enhancing CPU Operation
§ Intel processors use Hyper-Threading to enhance the performance of some of their CPUs.
• With Hyper-Threading, multiple pieces of code (threads) are executed simultaneously in the CPU
so a single CPU performs as though there are two CPUs.
§ AMD processors use HyperTransport to enhance CPU performance.
• HyperTransport is a high-speed connection between the CPU and the Northbridge chip.
§ The power of a CPU is measured by the speed and the amount of data that it can process.
• The speed of a CPU is rated in cycles per second, such as millions of cycles per second, called
megahertz (MHz), or billions of cycles per second, called gigahertz (GHz).
• The amount of data that a CPU can process at one time depends on the size of the front side bus
(FSB).
© 2016 Cisco and/or its affiliates. All rights reserved. Cisco Confidential 61
CPU Architectures and Operation
Enhancing CPU Operation (Cont.)
§ Overclocking is a technique used to make a processor work at a faster speed than its
original specification.
• Overclocking is not a recommended way to improve computer performance and can result in
damage to the CPU.
§ The opposite of overclocking is CPU throttling.
• CPU throttling is a technique used when the processor runs at less than the rated speed to
conserve power or produce less heat.
§ CPU virtualization is a hardware feature supported by AMD and Intel CPUs that enables a
single processor to act as multiple processors.
• With CPU virtualization multiple operating systems can run in parallel on their own virtual machines
as if they were running on completely independent computers.
© 2016 Cisco and/or its affiliates. All rights reserved. Cisco Confidential 62
CPU Architectures and Operation
Multicore Processors
§ Multicore processors have two or more processors on the same integrated circuit.
§ Integrating the processors on the same chip creates a very fast connection between them.
• Multicore processors execute instructions more quickly than single-core processors. Instructions can be
distributed to all the processors at the same time.
• RAM is shared between the processors because the cores reside on the same chip.
• Multicore processors conserve power and produce less heat than multiple single-core processors, thus
increasing performance and efficiency.
© 2016 Cisco and/or its affiliates. All rights reserved. Cisco Confidential 63
CPU Architectures and Operation
Multicore Processors (Cont.)
§ Another feature found in some CPUs is an integrated graphics processing unit or GPU.
§ The GPU is a chip that performs the rapid mathematical calculations required to render
graphics.
§ A GPU can be integrated or dedicated.
• Integrated GPUs are often directly embedded on the CPU and is dependent on system RAM
while the dedicated GPU is a separate chip with its own video memory dedicated exclusively
for graphical processing.
• The benefit of integrated GPUs is cost and less heat dissipation.
• Integrated GPUs are good at less complex tasks like watching videos and processing
graphical documents but are not best suited for intense gaming applications.
© 2016 Cisco and/or its affiliates. All rights reserved. Cisco Confidential 64
CPU Architectures and Operation
CPU Cooling Mechanisms
§ Case Fan
• A case fan is used to increase the air flow in the computer
case and allows more heat to be removed.
• Some cases have multiple fans with cool air being brought in,
while another fan is blowing out hot air.
© 2016 Cisco and/or its affiliates. All rights reserved. Cisco Confidential 67
RAID
RAID Levels
§ There are several levels of RAID available.
• These levels use mirroring, striping, and parity in different ways.
• Higher levels of RAID, such as RAID 5 or 6, use striping and parity in combination to provide
speed and to create large volumes.
• RAID levels higher than 10 combine lower RAID levels.
© 2016 Cisco and/or its affiliates. All rights reserved. Cisco Confidential 68
Ports, Connectors, and Cables
Legacy Ports
§ Serial
• Used for connecting various peripherals such as printers, scanners,
modems, and console connections to network devices.
§ Parallel
• Used for connecting to various peripheral devices, commonly printers.
§ Game
• Used for connecting a joystick input
§ PS/2
• Used for connecting a keyboard and mouse. Purple for keyboard and
green for the mouse.
§ Audio ports
• Analog ports were used for connecting stereo system, microphone and
speakers/headphones.
© 2016 Cisco and/or its affiliates. All rights reserved. Cisco Confidential 69
Ports, Connectors, and Cables
Video and Graphic Ports
§ VGA
• An analog port and commonly the oldest graphics port still used on
some PCs.
§ DVI
• Provides support for transmitting uncompressed digital video.
• Includes DVI-A (analog), DVI-D (digital), and DVI-I (integrated).
§ HDMI
• Carries the same video information as DVI but is also capable of
providing digital audio and control signals..
§ DisplayPort
• Designed to replace both DVI and VGA for computer monitors while
including high bandwidth video and audio signals.
© 2016 Cisco and/or its affiliates. All rights reserved. Cisco Confidential 70
Ports, Connectors, and Cables
USB Cables and Connectors
§ Over the years, USB has evolved with various standards. (USB 1.0,
USB 2.0, USB 3.0, and USB 3.2)
§ USB Type-A
• The typical rectangular connector found on almost all desktop and laptop
computers, TVs, game consoles, and media players.
§ Mini-USB
• A rectangular connector with a small indention on each side that is being
replaced with the micro-USB connector.
§ Micro-USB
• A common connector on smartphones, tablets and other devices.
• This connector has two corners pushed in at an angle.
© 2016 Cisco and/or its affiliates. All rights reserved. Cisco Confidential 71
Ports, Connectors, and Cables
USB Cables and Connectors (Cont.)
§ USB Type-B
• This connector has a square shape with beveled exterior corners and an
extra notch at the top.
• Used to connect printers or external hard drives.
§ USB Type-C
• This connector is rectangular with four rounded corners and is the newest
USB interface.
• Used as a multipurpose cable to attach different kinds of peripheral devices
to a PC.
§ Lightning
• This connector is a small proprietary 8-pin connector used by Apple mobile
devices such as iPhones, iPads, and iPods for both power and data.
© 2016 Cisco and/or its affiliates. All rights reserved. Cisco Confidential 72
Ports, Connectors, and Cables
SATA Cables and Connectors
§ SATA Cable
• One end plugs into a SATA port on a motherboard and the other end into
the back of an internal storage device.
• The SATA data cable does not provide power so a SATA power cable is
needed in addition to power the internal storage device.
• SATA data and power cables are keyed so they can only be installed in
one way.
§ eSATA Cable
• This cable is used to connect external SATA drives and is a keyed
connector.
§ eSATA Adapter
• An expansion card is commonly used to provide eSATA ports.
© 2016 Cisco and/or its affiliates. All rights reserved. Cisco Confidential 73
Ports, Connectors, and Cables
Twisted Pair Cables and Connectors
§ Twisted pair cable is used in wired Ethernet networks and older
telephone networks.
§ Twisted Pairs
• Unshielded Twisted Pair (UTP) cabling is the most common form of
twisted pair cabling and uses color-coded insulated copper wires.
• Shielded Twisted Pair (STP) also uses color-coded insulated copper wires
but includes foil or braiding as well.
§ RJ-45
• Each end of a UTP cable must be terminated with an RJ-45 connector so
it can be plugged into an Ethernet port.
§ RJ-11
• Older telephone networks used a four-wire UTP cable terminated with an
RJ-11 connector.
© 2016 Cisco and/or its affiliates. All rights reserved. Cisco Confidential 74
Ports, Connectors, and Cables
Coax Cables and Connectors
§ Coax Cable Construction
• Coaxial cable has an inner center conductor surrounded by insulating
material.
• The insulating material is surrounded by a foil shield which is used as an
outer conductor and also shields against electromagnetic interference (EMI).
§ RG-6
• A heavy gauge cable with insulation and shielding for high-bandwidth, high-
frequency applications (Internet, Cable TV, and Satellite TV)
§ RG-59
• A thinner cable similar to RG-6, used for low bandwidth and lower frequency
applications (analog video and CCTV)
§ BNC
• An older connector, used with digital or analog audio or video.
© 2016 Cisco and/or its affiliates. All rights reserved. Cisco Confidential 75
Ports, Connectors, and Cables
SCSI and IDE Cables and Connectors
§ Small Computer Systems Interface (SCSI) is a standard for connecting
peripheral and storage devices in a daisy-chained format.
§ External SCSI Cable
• Used for connecting older external SCSI devices (scanners and printers).
§ Internal SCSI Cable
• Common SCSI connector for internal hard drives with 50 pins arranged in
two rows and attached to a ribbon cable.
§ IDE Cable
• Visually similar to the internal SCSI cable, but commonly with three 40-pin
connectors.
• One connector connects to the IDE port on the motherboard and two for
attaching IDE drives.
© 2016 Cisco and/or its affiliates. All rights reserved. Cisco Confidential 76
Monitors
Monitor Characteristics
§ There are many types of computer monitors available and they vary by use, size, quality, clarity,
brightness and more.
§ Computer monitors are usually described by:
• Screen size – The diagonal measurement of the screen (i.e., top left to bottom right) in inches.
• Resolution – Resolution is measured by the number of horizontal and vertical pixels. For example,
1920 x 1080 (i.e., 1080p) means it has 1920 horizontal pixels and 1080 vertical pixels.
• Monitor resolution – This relates to the amount of information that can be displayed on a screen.
• Native resolution – This identifies the best monitor resolution for the specific monitor.
• Native mode – This term describes when the image sent to the monitor by the video adapter card
matches the native resolution of the monitor.
• Connectivity – Older monitors used VGA or DVI while newer monitors support HDMI and
DisplayPort.
© 2016 Cisco and/or its affiliates. All rights reserved. Cisco Confidential 77
Monitors
Monitor Terms
§ Pixel – a tiny dot capable of displaying red, green, and blue.
§ Brightness – The luminance of a monitor, measured in candelas per square meter (cd/m2)
§ Contrast ratio – The measurement of how white and how black a monitor can get.
§ Aspect ratio – The horizontal to vertical measurement of the viewing area of a monitor.
§ Refresh rate – The amount of seconds for an image to be rebuilt, measured in Hertz (Hz).
§ Response time - The amount in time for a pixel to change properties (color or brightness)
§ Interlaced – Creates an image by scanning the screen two times. (Odd lines and then even lines)
§ Non-Interlaced – Creates an image by scanning the screen one line at a time, from top to bottom.
© 2016 Cisco and/or its affiliates. All rights reserved. Cisco Confidential 78
Monitors
Display Standards
§ CGA – Color Graphics Adapter (320 x 200 resolution)
§ FHD – Full High Definition (1920 x 1280 resolution) – Also known as 1080p
§ QHD – Quad High Definition (2560 x 1440 resolution) – Also known as 1440p
© 2016 Cisco and/or its affiliates. All rights reserved. Cisco Confidential 79
Monitors
Using Multiple Monitors
§ Adding monitors can increase your visual desktop
area and improve productivity.
• The added monitors enable you to expand the size
of the monitor or duplicate the desktop so you can
view additional windows.
§ Many computers have built-in support for multiple
monitors.
§ To connect multiple monitors to a computer, you
need to:
• enable your computer to support multiple monitors
• gather the appropriate display cables
© 2016 Cisco and/or its affiliates. All rights reserved. Cisco Confidential 80
3.4 Computer Configuration
© 2016 Cisco and/or its affiliates. All rights reserved. Cisco Confidential 81
Upgrade Computer Hardware
Motherboard Upgrade
§ Computers need periodic upgrades for various
reasons:
• User requirements change
• Upgraded software packages require new hardware
• New hardware offers enhanced performance
§ If you upgrade or replace a motherboard, consider that
you might have to replace other components
including:
• CPU
• heat sink and fan assembly
• RAM.
§ A new motherboard must fit in the old computer case
and the power supply must support it.
© 2016 Cisco and/or its affiliates. All rights reserved. Cisco Confidential 82
Upgrade Computer Hardware
Steps to Upgrade a Motherboard
§ To upgrade a motherboard from a computer case, follow these steps:
• Step 1. Record how the power supply, case fans, case LEDs, and case buttons attach to the old
motherboard.
• Step 2. Disconnect the cables from the old motherboard.
• Step 3. Disconnect and remove the expansion cards from the case.
• Step 4. Record how the old motherboard is secured to the case.
• Step 5. Remove the old motherboard from the case.
§ Step 6. Identify where all of the connectors are such as power, SATA, fan, USB, audio, front panel
connector, and any others on the new motherboard.
§ Step 7. Replace the old I/O shield with the new I/O shield.
§ Step 9. Connect the power supply, case fans, case LEDs, front panel, and any other required cables.
© 2016 Cisco and/or its affiliates. All rights reserved. Cisco Confidential 83
§ Step 10. After the new motherboard is in place and the cables are connected, install and secure the
Upgrade Computer Hardware
CPU Upgrade
§ One way to increase the power of a computer is to
increase the processing speed by upgrading the CPU.
• The new CPU might require a different heat sink and fan
assembly.
• The assembly must physically fit the CPU and be
compatible with the CPU socket.
§ It must also be adequate to remove the heat of the faster
CPU by installing additional case fans.
© 2016 Cisco and/or its affiliates. All rights reserved. Cisco Confidential 84
Upgrade Computer Hardware
Storage Device Upgrade
§ Instead of purchasing a new computer to get faster § After selecting the appropriate hard drive,
speed and more storage space, you might consider follow these general guidelines during
adding another hard drive. installation:
§ There are several reasons for installing an additional • Step 1. Place the hard drive in an empty drive
drive: bay, and tighten the screws to secure the hard
drive.
• Increase storage space
• Step 2. Connect the drive to the motherboard
• Increase hard drive speed using the correct cable.
• Install a second operating system • Step 3. Attach the power cable to the drive.
• Store the system swap file
• Provide fault tolerance
• Back up the original hard drive
© 2016 Cisco and/or its affiliates. All rights reserved. Cisco Confidential 85
Upgrade Computer Hardware
Peripheral Upgrades
§ Peripheral devices periodically need to be upgraded.
§ For example, if the device stops operating or if you wish to improve performance and productivity,
an upgrade might be necessary.
§ These are a few reasons for upgrading a keyboard and/or a mouse:
• Change the keyboard and mouse to an ergonomic design
• Ergonomic devices are made to be more comfortable to use and to help prevent repetitive motion injuries.
• Reconfigure the keyboard to accommodate a special task, such as typing in a second language with
additional characters.
• To accommodate users with disabilities.
© 2016 Cisco and/or its affiliates. All rights reserved. Cisco Confidential 86
Upgrade Computer Hardware
Power Supply Upgrade
§ Upgrading your computer hardware will most likely
also change its power needs.
§ If so, you may need to upgrade your power supply.
© 2016 Cisco and/or its affiliates. All rights reserved. Cisco Confidential 87
Configurations for Specialized Computers
Thick and Thin Clients
§ Computers are sometimes referred to as:
• Thick clients
• Sometimes called fat clients
• Standard computers with their own operating system, a
multitude of applications, and local storage.
• They are stand-alone systems and do not require a
network connection to operate, as all of the processing is
performed locally on the computer.
• Thin clients
• Typically low-end network computers that rely on remote
servers to perform all data processing.
• Thin clients require a network connection to a server and
usually access resources using a web browser
• Typically the clients do not have any internal storage and
have very little local resources.
© 2016 Cisco and/or its affiliates. All rights reserved. Cisco Confidential 88
Configurations for Specialized Computers
NAS
§ Network attached storage (NAS) devices are
servers that are connected to a network to
provide file-level data storage to clients.
§ This specialized computer is sometimes single-
purposed, running a stripped-down operating
system to perform only the function of file serving.
• Sometimes the device can offer additional
functionality such as:
• media streaming
• network services
• automated backup functions
• website hosting and more...
© 2016 Cisco and/or its affiliates. All rights reserved. Cisco Confidential 89
3.5 Protecting the
Environment
© 2016 Cisco and/or its affiliates. All rights reserved. Cisco Confidential 90
Safe Disposal of Equipment and Supplies
Safe Disposal Methods
§ The proper disposal or recycling of hazardous
computer components is a global issue.
§ Make sure to follow regulations that govern how
to dispose of specific items.
§ Organizations that violate these regulations can
be fined or face expensive legal battles.
§ Regulations for the disposal of these items vary
from state to state and from country to country:
• Batteries
• Toner Kits, Cartridges, and Developers
• Chemical Solvents and Aerosol Cans
• Cell Phones and tablets
© 2016 Cisco and/or its affiliates. All rights reserved. Cisco Confidential 91
Safe Disposal of Equipment and Supplies
Safety Data Sheets
§ A Safety Data Sheet (SDS), formerly known as a Material Safety and Data Sheet (MSDS), is
a fact sheet that summarizes information about material identification, including hazardous
ingredients that can affect personal health, fire hazards, and first-aid requirements.
§ The SDS contains chemical reactivity and incompatibility information.
§ It also includes protective measures for the safe handling and storage of materials and spill,
leak, and disposal procedures.
§ To determine if a material is classified as hazardous, consult the manufacturer’s SDS which
in the U.S. is required by OSHA when the material is transferred to a new owner.
§ The SDS explains how to dispose of potentially hazardous materials in the safest manner.
© 2016 Cisco and/or its affiliates. All rights reserved. Cisco Confidential 92
3.6 Chapter Summary
© 2016 Cisco and/or its affiliates. All rights reserved. Cisco Confidential 93
Conclusion
Chapter 3: Advanced Computer Hardware
§ Configure BIOS and UEFI settings
© 2016 Cisco and/or its affiliates. All rights reserved. Cisco Confidential 94
Section 3.1
New Terms and Commands
• BIOS • Secure Boot
• UEFI • LoJack
• POST • TPM
• CMOS • Flashing the BIOS
© 2016 Cisco and/or its affiliates. All rights reserved. Cisco Confidential 95
Section 3.2
New Terms and Commands
• Voltage • Ohm’s Law
• Resistance • Blackout
• Current • Brownout
• Power • Noise
• Surge Protector • Spike
• UPS • Power Surge
• SPS
© 2016 Cisco and/or its affiliates. All rights reserved. Cisco Confidential 96
Section 3.3
New Terms and Commands
• RISC • Raid Levels (0,1,5,6,10)
• CISC • Serial
• HyperTransport • Parallel
• Hyper-Threading • Game
• MHz • PS/2
• GHz • VGA
• CPU Virtualization • DVI
• GPU • HDMI
• Multicore CPUs • DisplayPort
• Water Cooling • USB Type-A
• Active Cooling • Mini-USB
• Passive Cooling • Micro-USB
• Striping • USB Type-B
• Mirroring • USB Type-C
• Parity • Lightning
© 2016 Cisco and/or its affiliates. All rights reserved. Cisco Confidential 97
• Double Parity
Section 3.3
New Terms and Commands (Cont.)
• SATA • Aspect Ratio
• eSATA • Refresh Rate
• RJ-45 • Response Time
• RJ-11 • Interlaced
• UTP • Non-Interlaced
• STP • CGA
• RG-6 • VGA
• RG-59 • SVGA
• BNC • HD
• SCSI • FHD
• IDE • QHD
• Pixel • UHD
• Dot Pitch
• Brightness
• Contrast Ratio
© 2016 Cisco and/or its affiliates. All rights reserved. Cisco Confidential 98
Section 3.4
New Terms and Commands
• Ergonomic • Thin Client
• CAx • Thick Client
• CAM • Fat Client
• VDI • NAS
© 2016 Cisco and/or its affiliates. All rights reserved. Cisco Confidential 99
Section 3.5
New Terms and Commands
• SDS • MSDS
© 2016 Cisco and/or its affiliates. All rights reserved. Cisco Confidential 100
Chapter 4: Preventive
Maintenance and
Troubleshooting
IT Essentials v7.0
Chapter 4 - Sections & Objectives
§ 4.1 Preventive Maintenance
• Explain why preventive maintenance must be performed on personal computers.
• Describe PC preventive maintenance.
§ 4.2 Troubleshooting Process
• Troubleshoot problems with PC and Peripheral devices
• Describe each step of the troubleshooting process.
• Identify common problems and solutions for PCs.
• Troubleshoot computer components and peripherals using the six-step troubleshooting process.
© 2016 Cisco and/or its affiliates. All rights reserved. Cisco Confidential 103
4.1 Preventive Maintenance
© 2016 Cisco and/or its affiliates. All rights reserved. Cisco Confidential 104
PC Preventive Maintenance Overview
Benefits to Preventive Maintenance
Preventive maintenance plans are developed based on at least two factors:
© 2016 Cisco and/or its affiliates. All rights reserved. Cisco Confidential 105
PC Preventive Maintenance Overview
Preventive Maintenance - Dust
§ Use a cloth or a duster to clean the outside of
the computer case. If using a cleaning product,
put a small amount onto a cleaning cloth and
then wipe the outside of the case.
§ Dust on the outside of a computer can travel
through cooling fans to the inside.
§ Accumulated dust prevents the flow of air and
reduces the cooling of components.
§ RAM modules
§ Storage devices
§ Adapter cards
§ Cables
§ Power devices
© 2016 Cisco and/or its affiliates. All rights reserved. Cisco Confidential 107
PC Preventive Maintenance Overview
Preventive Maintenance – Environmental Concerns
© 2016 Cisco and/or its affiliates. All rights reserved. Cisco Confidential 108
PC Preventive Maintenance Overview
Preventive Maintenance – Software
Verify that installed software is current.
• Follow the policies of the organization when installing security updates,
operating system, and program updates.
Create a software maintenance schedule to:
• Review and install the appropriate security, software, and driver updates.
• Update the virus definition files and scan for viruses and spyware.
• Remove unwanted or unused programs.
• Scan hard drives for errors and defragment hard drives.
© 2016 Cisco and/or its affiliates. All rights reserved. Cisco Confidential 109
4.2 Troubleshooting Process
© 2016 Cisco and/or its affiliates. All rights reserved. Cisco Confidential 110
Troubleshooting Process Steps
Introduction to Troubleshooting
© 2016 Cisco and/or its affiliates. All rights reserved. Cisco Confidential 111
Troubleshooting Process Steps
© 2016 Cisco and/or its affiliates. All rights reserved. Cisco Confidential 112
Troubleshooting Process Steps
Identify the Problem
© 2016 Cisco and/or its affiliates. All rights reserved. Cisco Confidential 113
Troubleshooting Process Steps
Establish a Theory of Probable Cause
© 2016 Cisco and/or its affiliates. All rights reserved. Cisco Confidential 114
Troubleshooting Process Steps
Test the Theory to Determine the Cause
© 2016 Cisco and/or its affiliates. All rights reserved. Cisco Confidential 115
Troubleshooting Process Steps
Establish a Plan of Action to Resolve the Problem and Implement
the Solution
© 2016 Cisco and/or its affiliates. All rights reserved. Cisco Confidential 116
Troubleshooting Process Steps
Verify Full Functionality and, If Applicable, Implement Preventive
Measures
© 2016 Cisco and/or its affiliates. All rights reserved. Cisco Confidential 117
Troubleshooting Process Steps
Document Findings, Actions, and Outcomes
© 2016 Cisco and/or its affiliates. All rights reserved. Cisco Confidential 118
Common Problems and Solutions for PCs
PC Common Problems and Solutions
§ Computer problems can be attributed to hardware, software, networks, or some combination of the
three. These are some common hardware problems:
§ Storage Device - Storage device problems are often related to loose, or incorrect cable
connections, incorrect drive and media formats, and incorrect jumper and BIOS settings.
§ Motherboard and Internal Components - These problems are often caused by incorrect or loose
cables, failed components, incorrect drivers, and corrupted updates.
§ Power Supply - Power problems are often caused by a faulty power supply, loose connections,
and inadequate wattage.
§ CPU and Memory - Processor and memory problems are often caused by faulty installations,
incorrect BIOS settings, inadequate cooling and ventilation, and compatibility issues.
§ Displays – Display problems are often caused by incorrect settings, loose connections, and
incorrect or corrupted drivers.
© 2016 Cisco and/or its affiliates. All rights reserved. Cisco Confidential 119
Common Problems and Solutions for PCs
Common Problems and Solutions for Storage Devices
© 2016 Cisco and/or its affiliates. All rights reserved. Cisco Confidential 120
Common Problems and Solutions for PCs
Common Problems and Solutions for Motherboards and Internal
Components
© 2016 Cisco and/or its affiliates. All rights reserved. Cisco Confidential 121
Common Problems and Solutions for PCs
Common Problems and Solutions for Power Supplies
© 2016 Cisco and/or its affiliates. All rights reserved. Cisco Confidential 122
Common Problems and Solutions for PCs
Common Problems and Solutions for CPUs and Memory
© 2016 Cisco and/or its affiliates. All rights reserved. Cisco Confidential 123
Common Problems and Solutions for PCs
Common Problems and Solutions for Displays
© 2016 Cisco and/or its affiliates. All rights reserved. Cisco Confidential 124
Apply Troubleshooting Process to Computer Components and Peripherals
Personal Reference Tools
§ Personal reference tools include troubleshooting guides, manufacturer manuals, quick
reference guides, and repair journals. In addition to an invoice, a technician keeps a
journal of upgrades and repairs:
§ Notes - Make notes as you go through the troubleshooting and repair process. Refer to
these notes to avoid repeating steps and to determine what needs to be done next.
§ Journal - Include descriptions of the problem, possible solutions that have been tried
to correct the problem, and the steps taken to repair the problem. Note any
configuration changes made to the equipment and any replacement parts used in the
repair. Your journal, along with your notes, can be valuable when you encounter similar
situations in the future.
§ History of repairs - Make a detailed list of problems and repairs, including the date,
replacement parts, and customer information. The history allows a technician to
determine what work has been performed on a specific computer in the past.
© 2016 Cisco and/or its affiliates. All rights reserved. Cisco Confidential 125
Apply Troubleshooting Process to Computer Components and Peripherals
Internet Reference Tools
The Internet is an excellent source of information about specific hardware problems and
possible solutions:
• Internet search engines
• News groups
• Manufacturer FAQs
• Online computer manuals
• Online forums and chat
• Technical websites
© 2016 Cisco and/or its affiliates. All rights reserved. Cisco Confidential 126
Apply Troubleshooting Process to Computer Components and Peripherals
Advanced Problems and Solutions for Hardware
© 2016 Cisco and/or its affiliates. All rights reserved. Cisco Confidential 127
Apply Troubleshooting Process to Computer Components and Peripherals
Lab – Using a Multimeter and a Power Supply Tester
In this lab, you will learn how to use and handle a multimeter and a power supply
tester.
© 2016 Cisco and/or its affiliates. All rights reserved. Cisco Confidential 128
Apply Troubleshooting Process to Computer Components and Peripherals
Lab – Troubleshoot Hardware Problems
In this lab, you will diagnose the cause of various hardware problems and solve
them.
© 2016 Cisco and/or its affiliates. All rights reserved. Cisco Confidential 129
4.3 Chapter Summary
© 2016 Cisco and/or its affiliates. All rights reserved. Cisco Confidential 130
Conclusion
Chapter 4: Preventive Maintenance and Troubleshooting
4.1 Preventive Maintenance
• Explain why preventive maintenance must
be performed on personal computers.
• Describe PC preventive maintenance.
4.2 Troubleshooting Process
Troubleshoot problems with PC and Peripheral
devices
• Describe each step of the troubleshooting
process.
• Identify common problems and solutions for PCs.
• Troubleshoot computer components and
peripherals using the six-step troubleshooting
process.
© 2016 Cisco and/or its affiliates. All rights reserved. Cisco Confidential 131
Chapter 4
New Terms and Commands
• Closed-Ended Questions
• Open-Ended Questions
© 2016 Cisco and/or its affiliates. All rights reserved. Cisco Confidential 132