Basic Computer Science
Basic Computer Science
TEXTBOOK
2023-2024
Preface
This textbook is designed for the students at Government Technical High School Year
mention the learner-friendly applications. What’s more, the contents cover not only the
learning objectives and outcomes but also relate to the conceptual questions, concept maps
and links to laboratory work, enabling the learners to acquire considerable knowledge of
traditional PC problems and creative thinking skills. Better still, it may also help the
students switch from the typical rote learning to the soft skills practiced commonly in the
modern classrooms today. Accordingly, this textbook meets the requirements for a
In addition, this textbook is intended to foster the 5C’s, the key to success in
Collaboration
Communication
works
ways
Citizenship
o Students will join the school community and develop fairness and conflict
resolution skills
conceptually with the degree of intensity increased gradually. Besides, the development
progression is established with the help of the precise definitions and principles in addition
to the problems and their practical applications. Remarkably, the textbook also makes sure
that the students’ problem-solving skills in one topic are consolidated with the key concepts
before moving on to another topic. Thoroughly reviewed and revised, this edition bears
comparison with most of the contemporary textbooks aimed at the same target audience.
It goes without saying that Computer PC System is the study of the world around us.
With this textbook as the standard source of information on Computer PC System, the
students are expected to have greater awareness of what is happening around them every
day in the context of Computer PC System. Simultaneously, they are also expected to
develop superior skills when it comes to their concept formation, comprehension, analysis,
and evolution, thereby making themselves able to participate in all the lessons actively
through 5C’s, which constitute the integral part of 21st century skills for learning.
CONTENTS
SEMESTER I
PAGE
CHAPTER 1 COMPUTER SYSTEM UNITS 1
SUMMARY 8
EXERCISES 9
CONCEPT MAP 10
SUMMARY 20
EXERCISES 20
CONCEPT MAP 22
CHAPTER 3 RAM 23
SUMMARY 31
EXERCISES 31
CONCEPT MAP 33
SUMMARY 43
EXERCISES 43
CONCEPT MAP 44
SEMESTER II
CHAPTER 5 MOTHERBOARD 45
5.2 Chipsets 48
SUMMARY 52
EXERCISES 52
CONCEPT MAP 53
CHAPTER 6 POWER SUPPLY 54
6.1 Power Supply Connectors 54
SUMMARY 58
EXERCISES 58
CONCEPT MAP 59
SUMMARY 74
EXERCISES 74
CONCEPT MAP 75
10.1 IP Address 76
SUMMARY 83
EXERCISES 83
CONCEPT MAP 84
REFERENCES 86
SEMESTER I
Textbook Basic Computer Science GTHS Year I
CHAPTER 1
COMPUTER SYSTEM UNITS
The most common types use special programming languages that known as computer
Learning Outcomes
• Hardware
• Operating system
• Applications
The hardware is the physical stuff that you can touch or hold in your hand. On a
typical personal computer, you touch the keyboard or view images on the monitor. The
operating system (OS) controls the hardware and enables to tell the computer what to do.
The operating system often appears as a collection of windows and little icons that can click
or touch. Collectively these are called the user interface (UI), which means the software
parts with which you can interact. The UI that offers images or icons to select (as opposed
using serial connection. A serial port manifests as a 9-pin, D-shell male socket, called a DB-9
or an RS-232.
1
Textbook Basic Computer Science GTHS Year I
Universal serial bus (USB) connects almost every type of peripheral today. The USB
• USB 1.1 was the first widely adopted standard and defined two speeds: Low-Speed
USB, running at a maximum of 1.5 Mbps (plenty for keyboards and mice), and Full-
• The USB 2.0 standard introduced Hi-Speed USB running at 480 Mbps.
• USB 3.0 is capable of speeds of up to 5 Gbps and ten times faster than USB 2.0. USB
• USB 3.1 can handle speeds up to 10 Gbps. It’s marketed as SuperSpeed USB 10 Gbps
2
Textbook Basic Computer Science GTHS Year I
FireWire, also known as IEEE 1394, looks and acts much like USB. FireWire has all the
features of USB, but it uses different connectors. FireWire has a variety of port and cable
types to accommodate full-size devices, such as external hard drives, and smaller devices,
such as camcorders. FireWire enjoyed a brief day in the sun, primarily in Apple devices, but
Figure 1.4 FireWire 800 Port and Cable above a FireWire 400 Port
3
Textbook Basic Computer Science GTHS Year I
technologies such as USB and FireWire, tapping the PCI Express bus for up to six external
DisplayPort (mDP) connector. Thunderbolt 3 uses a USB Type-C connector. Thunderbolt can
Portable computers have a standard 3.5-mm audio-out port and some have a
similarly sized microphone-in port, though built-in microphones are increasingly common.
You can plug in headphones, regular PC speakers, or even a nice surround sound set to
enable the laptop to play music just as well as a desktop computer can.
4
Textbook Basic Computer Science GTHS Year I
include:
• Keyboards
• Mouse
• Touchpad
• Biometric devices
• Smart card readers
• Barcode scanners/QR scanners
• Webcams
• Headsets
1.3.1 Keyboards
The keyboard is both the oldest and still the primary way you input data into a PC.
5
Textbook Basic Computer Science GTHS Year I
Biometric devices scan and remember unique aspects of various body parts, such as
your iris, face, head image, or fingerprint, using some form of sensing device. This
information is used as a key to prevent unauthorized people from accessing whatever the
access company resources and display proper credentials so they have proper levels of
access too. A smart card reader comes in many forms, from small devices that can attach to
a laptop computer to a panel next to a secure door. The smart card reader scans the chip
6
Textbook Basic Computer Science GTHS Year I
Barcode scanners read standard Universal Product Code (UPC) barcodes or Quick Response
(QR) codes.
Two types of barcode scanners are commonly found with personal computers: pen
scanners and hand scanners. Pen scanners look like an ink pen and must be swiped across
the barcode. Hand scanners are held in front of the UPC code while a button is pressed to
scan. All barcode scanners emit a tone to let you know the scan was successful.
1.3.6 Webcams
commons use is for Internet video communication, enable people to interact over networks
with both voice and video. Webcams range greatly in quality and price. Webcams vary in
both image and sound capture quality. Because webcams are mostly used for video chat,
they tend to be marketed similar to other video cameras using terms like 720p, HD, and 4K.
7
Textbook Basic Computer Science GTHS Year I
Thunderbolt - relatively new technology that supports high-resolution displays and high-
performance data through one single port, but the connectivity allows you to add several
FireWire - also called IEEE 1394, is a connecting device used primarily for adding peripherals
to a computer. FireWire is often used for connecting external hard drives and digital
camcorders that benefit from a high transfer rate. These transfer rates are often up to 800
Mbps.
computer software package that performs a specific function directly for an end user or, in
8
Textbook Basic Computer Science GTHS Year I
A. IEEE 1394a
B. SuperSpeed USB
C. Full-Speed USB
D. Hi-Speed USB
2. What is the fastest speed that Hi-Speed USB 2.0 can go?
A. 12 Mbps
B. 120 Mbps
C. 400 Mbps
D. 480 Mbps
A. USB 1.0
B. USB 2.0
C. USB 3.0
D. USB 3.1
A. Mouse
B. Keyboard
C. Printer
D. Card Reader
A. QR Code
B. Documents
C. Photos
D. Face
9
Textbook Basic Computer Science GTHS Year I
CONCEPT MAP
Personal Computer
Monitor
10
Textbook Basic Computer Science GTHS Year I
CHAPTER 2
The central processing unit (CPU), also called the microprocessor, is a single silicon-
based electronic chip. Although the computer might seem to act quite intelligently,
comparing the CPU to a human brain hugely overstates its capabilities. A CPU functions
more like a very powerful calculator than like a brain. Today’s CPUs add, subtract, multiply,
divide, and move billions of numbers per second. Processing that much information so
quickly make any CPU look intelligent. It’s simply the speed of the CPU, rather than actual
intelligence that enables computers to perform feats such as accessing the Internet, playing
Learning Outcomes
computing devices, so start with an analysis of how the CPU works. CPU with the
granddaddy of all PC CPUs: the Intel 8088, invented in the late 1970s defined the idea of the
modern microprocessor and contains the same basic parts used in the most advanced CPUs
today.
By visualizing the CPU as a man in a box is one clever guy. He can perform virtually
any mathematical function, manipulate data, and give answers very quickly.
11
Textbook Basic Computer Science GTHS Year I
This guy is potentially very useful, but there’s a catch—he lives in a tiny, closed box.
Before he can work with us, we must come up with a way to exchange information with
him.
Imagine that we install a set of 16 light bulbs, 8 inside his box and 8 outside his box.
Each of the 8 light bulbs inside the box connects to one of the 8 bulbs outside the box to
form a pair. Each pair of light bulbs is always either on or off. You can control the 8 pairs of
bulbs by using a set of 8 switches outside the box, and the Man in the Box can also control
them by using an identical set of 8 switches inside the box. This light-bulb communication
Now that the EDB enables to communicate with the Man in the Box, need to see how
it works by placing voltages on the wires. This brings up a naming problem. It’s a hassle to
say something like “on-off-on-off-on-on-off-off” when talking about which wires have
voltage. Rather than saying that one of the EDB wires is on or off, use the number 1 to
12
Textbook Basic Computer Science GTHS Year I
represent on and the number 0 to represent off. That way, instead of describing the state of
2.1.2 Registers
The Man in the Box provides good insight into the workspace inside a CPU. The EDB
gives a way to communicate with the Man in the Box so you can give him work to do. But to
do this work, he needs a worktable; in fact, he needs at least four worktables. Each of these
four worktables has 16 light bulbs. These light bulbs are not in pairs; they’re just 16 light
bulbs lined up straight across the table. Each light bulb is controlled by a single switch,
operated only by the Man in the Box. By creating on/off patterns like the ones on the EDB,
the Man in the Box can use these four sets of light bulbs to work math problems. In a real
computer, these worktables are called registers and store internal commands and data.
13
Textbook Basic Computer Science GTHS Year I
2.1.3 Clock
Okay, so you are ready to put the Man in the Box to work. You can send the first
command by lighting up wires on the EDB. How does he know when you have finished
setting up the wires and it is time to act? Imagine there is a bell inside the box activated by
a button on the outside of the box. Each time you press the button to sound the bell, the
Man in the Box reads the next set of lights on the EDB. Of course, a real computer does not
use a bell. The bell on a real CPU is a special wire called the clock wire (most diagrams
label the clock wire CLK). A charge on the CLK wire tells the CPU that another piece of
information is waiting to be processed. For the CPU to process a command placed on the
EDB, a certain minimum voltage must be applied to the CLK wire. A single charge to the CLK
wire is called a clock cycle. Actually, the CPU requires at least two clock cycles to act on a
command, and usually more. In fact, a CPU may require hundreds of clock cycles to process
some commands.
The maximum number of clock cycles that a CPU can handle in a given period of
time is referred to as its clock speed. The clock speed is the fastest speed at which a CPU
can operate, determined by the CPU manufacturer. The Intel 8088 processor had a clock
14
Textbook Basic Computer Science GTHS Year I
speed of 4.77 MHz (4.77 million cycles per second), extremely slow by modern standards,
but still a pretty big number compared to using a pencil and paper. High-end CPUs today
Some type of chip between the RAM and the CPU is needed to make the connection.
The CPU needs to be able to say which row of RAM it wants, and the chip should handle the
mechanics of retrieving that row of data from the RAM and putting it on the EDB. This chip
comes with many names, but for right now just call it the memory controller chip (MCC).
The MCC contains special circuitry so it can grab the contents of any line of RAM and place
that data or command on the EDB. This in turn enables the CPU to act on that code.
Once the MCC is in place to grab any discrete byte of RAM, the CPU needs to be able
to tell the MCC which line of code it needs. The CPU therefore gains a second set of wires,
called the address bus, with which it can communicate with the MCC. Different CPUs have
different numbers of wires (which, you will soon see, is very significant). The 8088 had 20
Mathematics can answer the first question. Each wire in the address bus exists in
only one of two states: on or off. If the address bus consisted of only one wire, that wire
would at any given moment be either on or off. Mathematically, that gives you (pull out
your old pre-algebra books) 21 = 2 different combinations. If you have two address bus
wires, the address bus wires create 22 = 4 different combinations. If you have 20 wires, you
would have 220 (or 1,048,576) combinations. Because each pattern points to one line of
15
Textbook Basic Computer Science GTHS Year I
code and each line of RAM is one byte, if you know the number of wires in the CPU’s
address bus, you know the maximum amount of RAM that a particular CPU can handle.
Intel and AMD differentiate product lines by using different product names, and these
names have changed over the years. For a long time, Intel used Pentium for its flagship
model, just adding model numbers to show successive generations—Pentium, Pentium II,
Pentium III, and so on. AMD used the Athlon brand in a similar fashion. Most discussions on
PC CPUs focus on four end-product lines: desktop PC, budget PC, portable PC, and server
computers.
Table 2.1 Current Intel and AMD Product Lines and Names
Intel processor numbers follow a very clear pattern. An Intel Core i7 7500 U
i7 = brand modifier
16
Textbook Basic Computer Science GTHS Year I
7 = generation
U = alpha suffix (U indicates that it’s a desktop processor using ultralow power)
AMD processor nomenclature is similar. Here’s the breakdown for an AMD Ryzen 7
2700X:
7 = market segment
2 = generation
7 = performance level
00 = model number
When selecting a CPU, you need to make certain you get one that the motherboard
can accommodate. First, does the motherboard support Intel CPUs or AMD CPUs? Second,
When installing a CPU, you need to exercise caution not to bend any of the tiny pins.
The location of the pins differs between Intel and AMD. With Intel based motherboards, the
sockets have hundreds of tiny pins that line up with contacts on the bottom of the CPU.
Intel CPUs use a land grid array (LGA) package for socketed CPUs, where the underside of
the CPU has hundreds of contact points that line up with the socket pins.
17
Textbook Basic Computer Science GTHS Year I
AMD CPUs have the pins; the sockets have holes. The pins on the AMD pin grid array
(PGA) CPUs align with the holes in the sockets.
All CPUs and sockets are keyed so can’t (easily) insert them incorrectly. Note that the
pins do not make a perfect square, because a few are missing.
In both socket styles, you release the retaining mechanism by pushing the little lever
down slightly and then away from the socket. You next raise the arm fully, and then move
the retaining bracket.
18
Textbook Basic Computer Science GTHS Year I
Align the processor with the socket and gently drop the processor into place. If it
doesn’t go in easily, check the orientation and try again. These sockets are generically
called zero insertion force (ZIF) sockets, which mean you never have to use any force at all.
Almost every CPU uses a combination of a heat sink and fan assembly to wick heat
away from the CPU. A heat sink is a copper or other metal device designed to dissipate heat
Stock Intel heat sinks have four plungers that you simply push until they click into
place in corresponding holes in the motherboard. AMD stock heat sinks generally have a
bracket that you secure to two points on the outside of the CPU socket and a latch that you
swivel to lock it down.
19
Textbook Basic Computer Science GTHS Year I
External Data Bus - a type of data bus that enables external devices and components to
Register - one of a small set of data holding places that are part of the computer processor
Address Bus - The address bus allows the CPU to send the address to RAM, and the data bus
Clock - measures the number of cycles your CPU executes per second, measured in GHz
(gigahertz)
B. The CPU uses registers for temporary storage of internal commands and data.
2. What function does the external data bus have in the PC?
A. The external data bus determines the clock speed for the CPU.
C. The external data bus provides a channel for the flow of data and commands between
A. The address bus enables the CPU to communicate with the memory controller chip.
B. The address bus enables the memory controller chip to communicate with the RAM.
20
Textbook Basic Computer Science GTHS Year I
C. The address bus provides a channel for the flow of data and commands between the CPU
and RAM.
A. Hyper-Threading
B. SpeedStep
C. Virtualization
D. x64
21
Textbook Basic Computer Science GTHS Year I
CONCEPT MAP
CPU
22
Textbook Basic Computer Science GTHS Year I
CHAPTER 3
RAM
When not in use, programs and data are held in a mass storage device such as a
solid-state drive (SSD), USB thumb drive, optical drive, or some other device that can hold
data while the computer is off. When you load a program in Windows, your PC copies the
program from the mass storage device to RAM and then runs it.
Learning Outcomes
CPU uses dynamic random access memory (DRAM) as RAM for all PCs. Just like
CPUs, DRAM has gone through evolutionary changes over the years, resulting in improved
3.1.1 DRAM
DRAM functions like an electronic spread sheet, with numbered rows containing cells
and each cell holding a one or a zero. Because of its low cost, high speed, and capability to
contain a lot of data in a relatively small package, DRAM has been the standard RAM used in
all computers not just PCs since the mid-1970s. DRAM can be found in just about everything,
3.1.2 SDRAM
Most modern systems use some form of synchronous DRAM (SDRAM). SDRAM is still
DRAM, but it is synchronous tied to the system clock, just like the CPU and MCC, so the MCC
knows when data is ready to be grabbed from SDRAM. This results in little wasted time.
SDRAM made its debut in 1996 on a stick called a dual inline memory module (DIMM). The
early SDRAM DIMMs came in a wide variety of pin sizes. The most common pin sizes found
23
Textbook Basic Computer Science GTHS Year I
on desktops were the 168-pin variety. Laptop DIMMs came in 68-pin, 144-pin, or 172-pin
micro-DIMM packages; and the 72-pin, 144-pin, or 200-pin small-outline DIMM (SO-DIMM)
form factors.
3.1.3 RDRAM
When Intel was developing the Pentium 4, they knew that regular SDRAM just wasn’t
going to be fast enough to handle the quad-pumped 400-MHz front side bus. Intel
announced plans to replace SDRAM with a very fast, new type of RAM developed by
Rambus, Inc., called Rambus DRAM, or simply RDRAM. RDRAM could handle speeds up to
800 MHz, which gave Intel plenty of room to improve the Pentium 4.
AMD and many major system and memory makers threw their support behind an
alternative to RDRAM, double data rate SDRAM (DDR SDRAM). DDR SDRAM basically copied
Rambus, doubling the throughput of SDRAM by making two processes for every clock cycle.
24
Textbook Basic Computer Science GTHS Year I
DDR2 is DDR RAM with some improvements in its electrical characteristics, enabling
it to run even faster than DDR while using less power. The big speed increase from DDR2
comes by clock doubling the input/output circuits on the chips. This does not speed up the
core RAM the part that holds the data but speeding up the input/output and adding special
buffers makes DDR2 run much faster than regular DDR. DDR2 uses a 240-pin DIMM that’s not
25
Textbook Basic Computer Science GTHS Year I
DDR3 boasts higher speeds, more efficient architecture, and around 30 percent lower
power consumption than DDR2 RAM. Just like its predecessor, DDR3 uses a 240-pin DIMM.
DDR3 I/O speeds are quadruple the clock speeds, whereas DDR2 I/O speeds are only double
the clock.
26
Textbook Basic Computer Science GTHS Year I
DDR4 arrived on the scene in late 2014 with much fanfare and slow adoption,
although it’s the mainstream memory now. DDR4 offers higher density and lower voltages
than DDR3, and can handle faster data transfer rates. DDR4 uses a 288-pin DIMM, so they
are not backwardly compatible with DDR3 slots. DDR4 SO-DIMMs have 260 pins that are not
27
Textbook Basic Computer Science GTHS Year I
Windows displays this amount in the System Control Panel applet. You can also
keyboards.
Windows also includes the handy Performance tab in the Task Manager. The
Performance tab includes a lot of information about the amount of RAM being used by your
PC. Access the Task Manager by pressing CTRL-SHIFT-ESC and selecting the Performance
tab.
28
Textbook Basic Computer Science GTHS Year I
Installing DRAM is so easy that it is one of the very few jobs. First, attach an anti-
static wrist strap or touch some bare metal on the power supply to ground yourself and
avoid ESD. Then swing the side tabs on the RAM slots down from the upright position. Pick
up a stick of RAM don’t touch those contacts and line up the notch or notches with the
raised portion(s) of the DIMM socket. A good hard push down is usually all you need to
ensure a solid connection. Make sure that the DIMM snaps into position to show it is
completely seated. Also, notice that the one or two side tabs move in to reflect a tight
connection. Motherboard can detect and automatically set up any DIMM you install.
It wasn’t that long ago that adding RAM to a laptop was either impossible or
required you to send the system back to the manufacturer. Long ago, laptop makers used
expensive, proprietary, custom-made RAM packages that were hard to handle. Wide
acceptance of SO-DIMMs solved these problems for a time—until ultra-thin laptops started
turning up with soldered-on RAM. Most larger laptops still provide relatively convenient
procedure varies among laptop manufacturers. Figure 3-10 shows a typical laptop RAM
access panel. You can slide the panel off to reveal the SO-DIMMs. Slide the pins into position
29
Textbook Basic Computer Science GTHS Year I
30
Textbook Basic Computer Science GTHS Year I
Bandwidth - the amount of data that can be moved to or from a given destination
ESD - Electrostatic discharge (ESD) is a sudden and momentary flow of electric current
between two electrically charged objects caused by contact, an electrical short or dielectric
breakdown.
SDRAM - Static random access memory (SRAM) is a form of memory in a computer system.
SRAM provides low-latency, high speed data access. It is a volatile memory technology,
S0-DIMM - (Small Outline Dual In-line Memory Module) is a memory module with a smaller
outline and thickness than standard DIMM modules and designed primarily for notebook
computers.
HDD/SSD - An HDD (hard disk drive) is a traditional storage device that uses mechanical
spinning platters and a moving read/write head to access data. SSDs (solid state drive) are
newer, faster drives that store data on instantly accessible memory chips
1. What is the primary reason that DDR4 RAM is faster than DDR3 RAM?
D. DDR3 RAM uses 240-pin DIMMs and DDR4 uses 288-pin DIMMs.
2. What is the best way to determine the total capacity and specific type of RAM your
31
Textbook Basic Computer Science GTHS Year I
A. 120
B. 168
C. 240
D. 288
A. 300 MHz
B. 400 MHz
C. 500 MHz
D. 800 MHz
A. 120
B. 168
C. 240
D. 288
32
Textbook Basic Computer Science GTHS Year I
CONCEPT MAP
33
Textbook Basic Computer Science GTHS Year I
CHAPTER 4
The CPU doesn’t magically or otherwise automatically know how to talk with any
device; it needs some sort of support programming loaded into memory that teaches it
about a particular device. This programming is called basic input/output services (BIOS).
Learning Outcomes
Every system BIOS has two types of hardware to support. First, the system BIOS
supports all of the hardware that never changes, such as the keyboard. The system ROM
chip stores the BIOS for these and other devices that never change. Second, the system
BIOS supports all of the hardware that might change from time to time. This includes RAM
and hard drives with a larger drive or a solid state drive (SSD). The system ROM chip stores
programs, on a special type of device called a read-only memory (ROM) chip. A ROM chip
stores programs, services, exactly like RAM. ROM differs from RAM in two important ways.
First, ROM chips are non-volatile, meaning that the information stored on ROM isn’t erased
when the computer is turned off. Second, traditional ROM chips are read-only, meaning that
34
Textbook Basic Computer Science GTHS Year I
Modern systems use firmware programming called the Unified Extensible Firmware
Interface (UEFI). Here are a few advantages of UEFI over the original BIOS in PCs:
UEFI firmware is native 32- or 64-bit; this lets the manufacturers include lots of
UEFI handles all boot-loading duties; no more jumping from boot sector to boot
sector.
This system setup utility has two modes: EZ and Advanced. You can’t do much in this
first EZ Mode screen except view information about installed components, select one of
three pre-set System Performance optimization options, and change the boot priority.
35
Textbook Basic Computer Science GTHS Year I
Click the option to go into Advanced Mode for changing the interface configurations.
The Main tab offers some BIOS component information, such as surface details on amount
of RAM and speed of CPU, plus a couple of options to modify the language and date and
time. The Main tab also enables you to configure modest BIOS security by setting an
The Advanced tab gives component information about CPUs, hard drives and optical
drives, and all the built-in components, such as USB ports. In this tab, as you drill down to
each subcategory, you can configure drive settings, enable and disable devices, and more.
36
Textbook Basic Computer Science GTHS Year I
The Monitor tab shows monitoring information for CPU and motherboard
temperatures, fan speeds, and voltages. You can modify the behaviour of the chassis fans
here too. All of this monitoring information is considered some of the built-in diagnostics for
both the motherboard and the full system.
37
Textbook Basic Computer Science GTHS Year I
The Boot tab enables you to adjust boot settings. You can select devices to boot by
priority, setting the boot sequence used by the motherboard.
It’s time to try using the command line, but before you begin, a note of warning is in
order: the command-line interface is picky and unforgiving. It will do what you say, not
what you mean, so it always pays to double-check that those are one and the same before
The Windows dir command shows you the contents of the working directory. If a lot
of text scrolls quickly down the screen in Windows, try typing dir /p (pause). The dir /p
command is a lifesaver when you’re looking for something in a large directory. Just press
38
Textbook Basic Computer Science GTHS Year I
You can use the cd command to change the focus of the command prompt to a
different directory. To use the cd command, type cd followed by the name of the directory
C:\>cd Obiwan
C:\Obiwan>cd my
C:\Obiwan\my>cd hope
Or
C:\>cd Obiwan\my\hope
C:\Obiwan\my\hope>
If you want to go up a single directory level, you can type cd followed immediately
C:\Obiwan\my>cd ..
C:\Obiwan>
To get the prompt to point to another drive, just type “d:” you want.
C:>d:
D:>
39
Textbook Basic Computer Science GTHS Year I
To make a directory, use the md command in Windows. Alternatively, you can use
C:\Users\mike>md practice
C:\Users\mike>cd practice
C:\Users\mike\practice>
C:\Users\mike>rd practice
C:\Users\mike>dir
To delete files, you use the del (or erase) command in Windows. To delete a single
file in Windows, type the del command followed by the name of the file to delete.
del report.docx
Let’s try an example using Windows. The directory Jedi (in my \Users folder) contains
the file notes.txt. Copy this file to a USB thumb drive (E:).
1) Type cd Jedi to point the command prompt to the Jedi directory. C:\Users\mike>cd
Jedi
5) Press ENTER.
40
Textbook Basic Computer Science GTHS Year I
As a proficient IT technician in the field, you need to be familiar with a whole slew of
The chkdsk (checkdisk) command scans, detects, and repairs file system issues and
errors. You can run the chkdsk utility from a command prompt with the switches /f and /r.
The /f switch attempts to fix file system–related errors, while the /r switch attempts to
4.4.2 Format
The format command, you may have guessed, enables you to format volumes from
41
Textbook Basic Computer Science GTHS Year I
4.4.3 Hostname
commands. If you type hostname at the command prompt, it will display the name of your
4.4.4 Gpupdate
Group policies define various security settings for Windows systems, such as
password complexity, logon attempts, and permissions for users to install software.
4.4.5 Gpresult
If you need a quick overview of all security policies applied to a single user or
computer, the gpresult tool is for you. You can run gpresult for any user or computer on
your network (assuming you have a valid username and password) and you can ask for
4.4.6 Sfc
The Windows sfc (System File Checker) command scans, detects, and restores
important Windows system files, folders, and paths. Techs often turn to sfc when Windows
isn’t quite working correctly and use it to find and fix critical Windows system files that have
become corrupt.
42
Textbook Basic Computer Science GTHS Year I
4.4.7 Shutdown
BIOS – a set of computer instructions in firmware which control input and output
operations
CLI – A command-line interface (CLI) is a text-based user interface (UI) used to run
UEFI – Unified Extensible Firmware Interface (UEFI) is a specification for a software program
that connects a computer's firmware to its operating system (OS). UEFI is expected to
eventually replace basic input/output system (BIOS) but is compatible with it.
Hostname - A host name is a unique name or label assigned to any device that is connected
Kernel - The kernel is the essential center of a computer operating system (OS). It is the
core that provides basic services for all other parts of the OS. It is the main layer between
the OS and hardware, and it helps with process and memory management, file systems,
1. The dir command shows the contents of the working directory. (True/False)
4. BIOS provide the physical interface for various devices such as USB and FireWire ports.
(True/False)
43
Textbook Basic Computer Science GTHS Year I
CONCEPT MAP
BIOS
Kernel OS
OS
44
SEMESTER II
Textbook Basic Computer Science GTHS Year I
CHAPTRE 5
MOTHERBOARD
The motherboard provides the foundation for the personal computer. Every piece of
hardware, from the CPU to the lowliest expansion card, directly or indirectly plugs into the
motherboard. The motherboard contains the wires called traces that make up the buses of
the system. It holds the vast majority of the ports used by the peripherals, and it distributes
Learning Outcomes
Motherboard form factors are industry-standardized shapes and layouts that enable
motherboards to work with cases and power supplies. A single form factor applies to all
three components. All motherboards come in a basic rectangular or square shape but vary
The AT form factor invented by IBM in the early 1980s, was the predominant form
45
Textbook Basic Computer Science GTHS Year I
There continued to be a tremendous demand for a new form factor, one that had
more standard connectors and also was flexible enough for possible changes in technology.
This demand led to the creation of the ATX form factor in 1995. the full-sized ATX form
46
Textbook Basic Computer Science GTHS Year I
The micro ATX motherboard floats in at a svelte 9.6 by 9.6 inches (usually), or about
30 percent smaller than standard ATX, yet uses the standard ATX connections. A micro ATX
motherboard fits into a standard ATX case or in the much smaller micro ATX cases.
47
Textbook Basic Computer Science GTHS Year I
5.2 Chipset
Every motherboard has a chipset one or more discrete integrated circuit chips that
support the CPU’s interfacing to all the other devices on the motherboard. The chipset
determines the type of processor the motherboard accepts, the type and capacity of RAM,
and the sort of internal and external devices that the motherboard supports. Chipsets vary
between the CPU and other devices in the system, its component chips are relatively
The north-bridge chip handled RAM, while the south-bridge handled some expansion
devices and mass storage drives, such as hard drives. Some motherboard manufacturers
added (or still add) a third chip called the Super I/O chip to handle these chores, especially
in dealing with legacy devices. The system ROM chip provides part of the BIOS for the
chipset.
48
Textbook Basic Computer Science GTHS Year I
You have to load the proper drivers for the specific OS to support all of the features
of today’s chipsets. Without software drivers, you’ll never create a stable, fully functional
Intel introduced the Peripheral Component Interconnect (PCI) bus architecture in the
early 1990s, and the PC expansion bus was never again the same. Intel made many smart
moves with PCI, not the least of which was releasing PCI to the public domain to make PCI
very attractive to manufacturers. PCI provided a wider, faster, more flexible alternative than
49
Textbook Basic Computer Science GTHS Year I
PCI Express (PCIe) is still PCI, but it uses a point-to-point serial connection instead of
PCI’s shared parallel communication. Consider a single 32-bit chunk of data moving from a
device to the CPU. In PCI parallel communication, 32 wires each carry one bit of that chunk
Figure 5.8 PCIe× 16 slot (Center) with PCI Slots (Top and Bottom)
inexpensive and easy, although it can sometimes be a little tedious and messy because of
If you are replacing a motherboard, first remove the old motherboard. Begin by
removing all of the cards. Also remove anything else that might impede removal or
installation of the motherboard, such as a hard drive. Keep track of your screws—the best
idea is to return the screws to their mounting holes temporarily, at least until you can
reinstall the parts. Sometimes you even have to remove the power supply temporarily to
Unscrew the motherboard. It will not simply lift out. The motherboard mounts to the
case via small connectors called standoffs that screw into the bottom of the case. Screws
50
Textbook Basic Computer Science GTHS Year I
then go into the standoffs to hold the motherboard in place. Be sure to place the standoffs
The next part of motherboard installation is connecting the LEDs, buttons, and front-
mounted ports on the front of the box. These usually include the following:
Reset button
Speaker
Power light
USB
Sound
You need to follow a few rules when installing these wires. First, the lights are LEDs,
not light bulbs; they have a positive side and a negative side. If they do not work one way,
turn the connector around and try the other. Second, when in doubt, guess. Incorrect
installation only results in the device not working; it won’t damage the computer. Refer to
51
Textbook Basic Computer Science GTHS Year I
the motherboard book for the correct installation. The third and last rule is that, with the
exception of the soft power switch on an ATX system, you do not need any of these wires
AT – (Advanced Technology motherboard) A motherboard that follows the same design and
the Baby AT design. The ATX layout rotated the CPU and memory 90 degrees, allowing full-
Chipset – the traffic controller between the CPU, GPU, RAM, storage, and peripherals
PCI – Peripheral Component Interconnect, or PCI, is the most common way to attach add-
PCIe - PCIe is short for “peripheral component interconnect express” and it's primarily used
storage.
2. The expansion bus runs at the speed of the system clock. (True/False)
3. If Windows recognizes a device, where will it will appear in Device Manager. (True/False)
52
Textbook Basic Computer Science GTHS Year I
CONCEPT MAP
MOTHERBOARD
TYPES SIZES
53
Textbook Basic Computer Science GTHS Year I
CHAPTER 6
POWER SUPPLY
Computers need electricity to run. Where this electricity comes from depends on the
device. Mobile devices use batteries. Desktop computers need a special box—the power
supply unit (PSU) that takes electricity from the wall socket and transforms it into electricity
The power supply unit converts public utility voltage AC into several DC voltages
(notably, 3.3, 5.0, and 12.0 V) usable by the delicate interior components. Power supplies
come in a large number of shapes and sizes, but the most common size by far is the
54
Textbook Basic Computer Science GTHS Year I
may require special 4-, 6-, or 8-pin connectors to supply extra power.
The Molex connector supplies 5-V and 12-V current for fans and older drives. The
Molex connector has notches called chamfers that guide its installation. The tricky part is
A few power supplies still support the mini connector or Berg connector. The mini
55
Textbook Basic Computer Science GTHS Year I
Serial ATA (SATA) drives need a 15-pin SATA power connector. The larger pin coun’t
supports the SATA hot-swappable feature and 3.3-, 5-, and 12-V devices. The 3.3-V pins are
not used in any current iteration of SATA drives and are reserved for possible future use. All
three generations of SATA use the same power connectors. SATA power connectors are L
shaped, making it almost impossible to insert one incorrectly into a SATA drive.
It’s getting more and more popular to make PCs look good on both the inside and
the outside. Unused power cables dangling around inside PCs creates a not-so-pretty
picture and can impede airflow. To help stylish people, manufacturers created power
56
Textbook Basic Computer Science GTHS Year I
The typical power supply connects to the PC with four standard computer screws,
mounted in the back of the case. Unscrew the four screws and the power supply lifts out
easily. Insert a new power supply that fits the case and attach it by using the same four
screws.
57
Textbook Basic Computer Science GTHS Year I
direction as it flows.
DC – Direct Current is used to refer to an electric current that always flows in the same
direction.
Linear Power Supply - Linear power supplies are designed for low noise and are often
UPS - (Uninterruptible Power Supply) A device that provides battery backup when the
58
Textbook Basic Computer Science GTHS Year I
CONCEPT MAP
59
Textbook Basic Computer Science GTHS Year I
CHAPTER 7
After successfully installed a hard drive, it must perform two more steps to translate
a drive’s raw media into something the system can use: partitioning and formatting.
Partitioning is the process of electronically subdividing a physical drive into one or more
units called partitions. After partitioning, you must format the drive. Formatting installs a
file system onto the drive that organizes each partition in such a way that the operating
system can store files and folders on the drive. Several types of file systems are used by
Windows.
Learning Outcomes
• Install Windows
Before a magnetic disk drive leaves the factory, it is magnetically preset with millions
60
Textbook Basic Computer Science GTHS Year I
Solid-state drives come from the factory with each NAND chip storing millions
(hundreds of millions on really big drives) of 4096-byte storage areas known as pages. A
The CPU and operating system never talk to these internal structures. Instead, the
controller on the HDD or SSD uses logical block addressing (LBA) to present all these
storage chunks as nothing more than a number that starts at LBA0 and goes until every
LBA makes addressing any form of mass storage easy, and that’s how the operating
system interacts with the mass storage, via blocks. The operating system presents to the
user files and folders, not LBA addresses. We must organize mass storage in a way that
enables us to store and retrieve files, create folders, etc. The first step to doing this is
partitioning.
61
Textbook Basic Computer Science GTHS Year I
You can partition a hard drive to store more than one operating system: store one
Windows supports three different partitioning methods: the older master boot record
(MBR) partitioning scheme, Windows proprietary dynamic storage partitioning scheme, and
The first sector of an MBR hard drive contains the master boot record (MBR), code
that informs the system about installed operating systems. To clarify, hard drives that use
the MBR partitioning scheme have a tiny bit of data that is also called the master boot
record. While your computer boots up, BIOS looks at the first sector of your hard drive for
instructions. At this point, it doesn’t matter which OS you use or how many partitions you
The master boot record also contains the partition table, which describes the
number and size of partitions on the disk. MBR partition tables support up to four partitions
the partition table is large enough to store entries for only four partitions. The instructions
in the master boot record use this table to determine which partition contains the active
operating system.
62
Textbook Basic Computer Science GTHS Year I
After the MBR locates the appropriate partition, the partition boot sector loads the
OS on that partition. The partition boot sector stores information important to its partition,
MBR partition tables support two types of partitions: primary partitions and
extended partitions. Primary partitions are designed to support bootable operating systems.
Extended partitions are not bootable. A single MBR disk may have up to four primary
partitions or up to three primary partitions and one extended partition. Primary partitions
are usually assigned drive letters and appear in Windows Explorer/File Explorer. The first
lettered primary partition in Windows is always C (because early PCs had one or two floppy
drives installed and they got the A and B labels). After that, you can label the partitions D
through Z.
Every primary partition on a single drive has a special setting stored in the partition
table called active that determines the active partition. During boot up, the BIOS/POST
63
Textbook Basic Computer Science GTHS Year I
reads the MBR to find the active partition and boots the operating system on that partition.
Only one partition can be active at a time because you can run only one OS at a time.
called dynamic storage partitioning, better known as dynamic disks. Still in use today,
Microsoft calls a drive structure created with a dynamic disk a volume. There is no dynamic
disk equivalent to primary versus extended partitions. A dynamic disk volume is still
First when you turn a hard drive into a dynamic disk, you can create as many
volumes on it as you want. You’re not limited to four partitions. Second, you can create in
software new drive structures that you can’t do with MBR drives. Specifically, you can
implement RAID, span volumes over multiple drives, and extend volumes on one or more
drives.
64
Textbook Basic Computer Science GTHS Year I
The GUID partition table (GPT) partitioning scheme shares a lot with the MBR
partitioning scheme, but most of the MBR scheme’s limitations have been fixed. Here are
While MBR drives are limited to four partitions, a GPT drive can have an almost
partitions.
MBR partitions can be no larger than 2.2 TB, but GPT partitions have no such
restrictions. Well, there is a maximum size limit, but it’s so large, we measure it in
Once you’ve partitioned a hard drive, that partition is nothing more than a large
number of blocks. Your operating system needs to store files. Every version of Windows
comes with a built-in formatting utility with which to create one or more file systems on a
partition or volume. The versions of Windows in current use support three Microsoft file
systems: FAT32, NTFS, and exFAT (for removable media). All Windows file systems organize
blocks of data into groups called clusters. The size of each cluster varies according to the
65
Textbook Basic Computer Science GTHS Year I
The newer file system, called exFAT, breaks the 4-GB file-size barrier, supporting files
up to 16 exabytes (EB) and a theoretical partition limit of 64 zetta bytes (ZB). An exabyte is
260 bytes; a zetta byte is 270 bytes. For comparison, a terabyte is 240 bytes.
Every hard drive in a Windows system has special information placed onto the drive
through a process called disk initialization. All new drives must be initialized before you can
use them. When you install an extra hard drive into a Windows system and start Disk
Management, it notices the new drive and starts the Hard Drive Initialization Wizard.
To initialize a disk, right-click the disk icon and select Initialize. You will get the
66
Textbook Basic Computer Science GTHS Year I
To create partitions or volumes, right-click the unallocated part of the drive and
select New Simple Volume. Disk Management runs the New Simple Volume Wizard.
Figure 7.10 Specifying the Simple Volume Size in the New Simple Volume Wizard
67
Textbook Basic Computer Science GTHS Year I
Specify a volume size and click Next. The wizard will ask if you want to assign a drive
The last screen of the New Simple Volume Wizard asks for the type of format you
68
Textbook Basic Computer Science GTHS Year I
Windows installation has two steps. First, boot the system from the OS installation
media. Second, answer the installation wizard’s initial queries and let it do its thing. At the
most basic level, installing any operating system follows a standard set of steps. You turn on
the computer, insert an operating system disc/disk into the optical drive or USB port, or
access the media some other way, and follow the installation wizard until you have
everything completed. Along the way, you’ll accept the End User License Agreement (EULA)
the terms and conditions for using the OS and enter the product key. When you’ve booted
into the installer, the first screen you see asks you if you want 32-bit or 64-bit Windows.
Your next screen asks for language, time and currency, and keyboard settings. These
69
Textbook Basic Computer Science GTHS Year I
The next screen starts the installation process, but note the lower-left corner. This
screen also enables techs to start the installation disc’s repair tools.
The next screen prompts you to enter your product key before you do anything else.
70
Textbook Basic Computer Science GTHS Year I
Every Windows installation disc/disk contains all of the available editions within a
version. The product key not only verifies the legitimacy of your purchase; it also tells the
On the next page, you get to decide whether you’d like to do an upgrade installation
partitions.
71
Textbook Basic Computer Science GTHS Year I
The next screen shows how you can partition hard drives and choose a destination
Once you’ve partitioned drives and selected a destination partition for install
Windows, the installation process takes over, copying files, expanding files, installing
features, and just generally doing lots of computerish things. When Windows has finished
unpacking and installing itself, you have to configure a system to work in a workgroup
72
Textbook Basic Computer Science GTHS Year I
This following screen asks you to set up a user name and password for your main
user account. All operating systems require the creation of this account.
Once you’re past that screen, Windows gets to work on the installation and warns
73
Textbook Basic Computer Science GTHS Year I
MBR - Master Boot Record disks use the standard BIOS partition table.
GPT - GUID Partition Table disks use Unified Extensible Firmware Interface (UEFI).
GUID - Globally Unique IDentifier is a 128-bit value consisting of one group of 8 hexadecimal
digits, followed by three groups of 4 hexadecimal digits each followed by one group of 12
hexadecimal digits.
FAT32 - (File Allocation Table32) The 32-bit version of the FAT file system. The FAT32 format
is widely used for USB drives, flash memory cards and external hard drives for compatibility
exFAT - (Extensible File Allocation Table) is a file system introduced by Microsoft in 2006
and optimized for flash memory such as USB flash drives and SD cards.
NTFS - New Technology File System is a process that the Windows NT operating system uses
for storing, organizing, and finding files on a hard disk efficiently. NTFS was first introduced
in 1993.
1. The most complete list of file systems Windows can use is ________.
2. Disk Management console program include with Windows to ________ and ________ a
drive.
in Windows ________.
4. To make your files unreadable by others, should you should use ________.
74
Textbook Basic Computer Science GTHS Year I
CONCEPT MAP
Hard Disk
HD Partitions HD Formatting
FAT32
Primary Partitions
exFAT
Extended Partitions
NTFS
75
Textbook Basic Computer Science GTHS Year I
CHAPTER 8
WIRED NETWORK
common today, every good tech needs to know the basics of networking technology,
Learning Outcomes
The Ethernet hardware protocol does a fine job of moving data from one machine to
another. Network protocol software takes the incoming data received by the network card,
keeps it organized, send it to the application that needs it, and then takes outgoing data
from the application and hands it to the NIC to be sent out over the network. All networks
use some network protocol. Over the years there have been many network protocols, most
combining multiple simple protocols into groups, called protocol stacks or protocol suites.
This led to some crazily named network protocols, such as TCP/IP. The Transmission
8.1 IP Address
The IP address is the unique identification number for your system on the network.
Most systems today rely on the Internet Protocol version 4 (IPv4) addressing scheme. IPv4
addresses consist of four sets of eight binary numbers (octets), each set separated by a
period. This is called dotted-decimal notation. So, instead of a computer being called
76
Textbook Basic Computer Science GTHS Year I
202.34.16.11
11001010.00100010.00010000.00001011
To make the addresses more comprehensible to users, the TCP/IP folks decided to
00000000 = 0
00000001 = 1
00000010 = 2
...
11111111 = 255
Let’s look at a typical subnet mask: 255.255.255.0. When you compare the subnet
mask to the IP address, any part that’s all 255s is the network ID. Any part that’s all zeros is
IP address: 192.168.4.33
Because the first thee octets are 255, the network ID is 192.168.4 and the host ID is 33.
Every computer on a single local area network (LAN) must have the same network ID
and a unique host ID. That means every computer on the preceding network must have an
IP address that starts with 192.168.4. Every computer on the network must have a unique IP
address. If two computers have the same IP address, they won’t be able to talk to each
other, and other computers won’t know where to send data. This is called an IP conflict.
corresponding octet in the subnet mask. A Class C address, like the one just discussed, had
255.255.0.0. The latter class left two full octets (16 bits) just for host numbers. That meant a
single Class B network ID could have 216 – 2 unique host IDs = 65,534 addresses. For
77
Textbook Basic Computer Science GTHS Year I
The current system is called Classless Inter-Domain Routing (CIDR) and it works
easily in binary, but a little less prettily when you show the numbers in the octets. A quick
example should suffice to illustrate this point. A subnet mask of 255.255.255.0 translates
11111111.11111111.11111111.00000000
Count the ones. (There are 20.) The ones mask the network ID. That leaves 12 digits
for the host IDs. Do the binary math: 212 – 2 = 4094 unique addresses in a single /20 network
ID. When you change the binary number 11110000 to an octet, you get the following:
255.255.240.0
wide area networks (WANs). Switches interconnect systems on a LAN—the switch filters and
forwards by MAC address. Interconnecting LANs requires a device a router that filters and
forwards by IP address.
78
Textbook Basic Computer Science GTHS Year I
different LANs. Every LAN that connects to the Internet must have a router. One port on the
router connects to your LAN’s switch and receives an IP address that’s part of your network
ID. The other port on the router connects to the next network, usually your Internet service
provider (ISP), which in turn connects to millions of other routers and billions of other
computers. The IP address of the“LAN” side of your router (the port connected to your LAN)
is the address your computer uses to send data to anything outside your network ID. This is
79
Textbook Basic Computer Science GTHS Year I
Knowing that users could not remember lots of IP addresses, early Internet pioneers
came up with a way to correlate those numbers with more human-friendly designations.
The system they came up with is called the Domain Name Service (DNS). Special
computers, called DNS servers, keep databases of IP addresses and their corresponding
names.
must provide you an interface to enter the IP address, the subnet mask, the default
80
Textbook Basic Computer Science GTHS Year I
8.1.5 Ping
The ping command provides a really great way to see if you can talk to another
system. Here’s how it works. Get to a command prompt or terminal and type ping followed
8.1.6 Ipconfig
Windows offers the command-line tool ipconfig for a quick glance at your network
settings. From command prompt, type ipconfig/all to see all of your TCP/IP settings.
1. Connected NIC The physical hardware that connects the computer system to the
network media.
2. Properly configured IP addressing Your device needs correct IP addressing for your
If you want to share resources on your PC with other network users, you also need to
enable Microsoft’s File and Printer Sharing. When you install a NIC, by default Windows
81
Textbook Basic Computer Science GTHS Year I
installs upon setup the TCP/IP protocol, the Client for Microsoft Networks, and File and
All personal computers can share folders and printers out of the box. Sharing a folder
in Windows is easy, for example, because the Sharing Wizard is enabled by default. Just
right-click on the folder and select Share with Specific people (in Windows 7), or Give access
to Specific people (Windows 8/8.1/10) to get to the Choose people to share with dialog box.
Read You can see what’s in the folder. You may open files in the folder, but you can’t
Read/Write Same as Read but you can save files into the folder.
Owner Same as Read/Write plus you can set the permissions for other users on the
folder.
82
Textbook Basic Computer Science GTHS Year I
IP address - a unique string of characters that identifies each computer using the Internet
Subnet mask - is a 32-bit number created by setting host bits to all 0s and setting network
Default Gateway - is the path used to pass information when the device doesn't know where
DNS Server - is a server that is specifically used for matching website hostnames (like
ISP - Internet service provider (ISP) company that provides Internet connections and
1. What command would you use to view the IP address of your computer?
A. ping
B. ipconfig
C. tracert
D. nslookup
2. What command would you use to test connection with other computer?
A. ping
B. ipconfig
C. tracert
D. nslookup
A. ping
B. ipconfig
C. dns
D. nslookup
83
Textbook Basic Computer Science GTHS Year I
A. 255.0.0.0
B. 255.255.0.0
C. 255.255.255.0
D. 255.255.255.255
A. 192.0.0.0
B. 192.168.0.0
C. 192.168.10.0
D. 0.0.0.0
84
Textbook Basic Computer Science GTHS Year I
CONCEPT MAP
NETWORK
85
Textbook Basic Computer Science GTHS Year I
REFERENCES
86