CBLM For Chs
CBLM For Chs
CBLM For Chs
LEARNING MATERIAL
Sector:
Information and Communications Technology
Qualification:
Computer Hardware Servicing NCII
Unit of Competency:
Install Computer Systems and Networks
Code No. Date Date Page #
Created Revised 1
ELC724318 Installing Computer Systems and
11/01/2008
Networks
Module Title:
Installing Computer Systems and Networks
If you have questions, don’t hesitate to ask your facilitator for assistance.
You may already have some or most of the knowledge and skills covered in
this module because you have:
If you can demonstrate to your trainer that you are competent in a particular
skill or skills, talk to him/her about having them formally recognized so you
don’t have to do the same training again. If you have a qualification or
Certificate of Competency from previous trainings, show it to your trainer. If
the skills you acquired are still current and relevant to this module, they may
become part of the evidence you can present for RPL. If you are not sure
about the currency of your skills, discuss this with your trainer.
After completing this module ask your trainer to assess your competency.
Result of your assessment will be recorded in your competency profile. All the
learning activities are designed for you to complete at your own pace.
Inside this module you will find the activities for you to complete and at the
back are the relevant information sheets for each learning outcome. Each
learning outcome may have more than one learning activities.
This module was prepared to help you achieve the required competency in
computer hardware servicing. This will be the source of information for you to
acquire knowledge and skills in this particular trade independently and at your
own pace, with minimum supervision or help from your trainer.
Work through all the information and complete the activities in each
section. Read information sheets and complete the self-check.
Suggested references are included to supplement the materials
provided in this module.
Your trainer will tell you about the important things you need to
consider when you are completing activities and it is important that you
listen and take notes.
Use the self-check questions at the end of each section to test your
own progress.
When you are ready, ask your trainer to watch you perform the
activities outlined in this module.
As you work through the activities, ask for written feedback on your
progress. Your trainer keeps feedback/ pre-assessment reports for this
reason. When you have successfully completed each element, ask
your trainer to mark on the reports that you are ready for assessment.
When you have completed this module (or several modules), and feel
confident that you have had sufficient practice, your trainer will arrange
an appointment with a registered assessor to assess you. The results
of your assessment will be recorded in your competency Achievement
Record.
Introduction :
This module covers the required skills in installing, assembling and testing
computers and common peripherals.
It consists of three (3) Learning Outcomes that contain learning activities for
both knowledge and skills supported with information sheet, job/operation
sheet and self-check. Before attempting to perform the manual exercises,
see to it that you have already read and understood the information/operating
sheet and answer correctly the self-check provided in every Learning Activity.
Learning Outcomes :
Assessment Criteria:
Pre-requisite:
None
Assessment Criteria:
Resources:
PC or workstation
a. accepts data
Input
b. processes
data Processing
c. produces
output Output
d. stores
results Storage The Information
Processing Cycle
Personal or micro
Computers for personal use come in all shapes and sizes, from tiny PDAs (personal
digital assistant) to hefty PC (personal computer) towers. More specialized models are
announced each week - trip planners, expense account pads, language translators...
When talking about PC computers, most people probably think of the desktop type,
which are designed to sit on your desk. (Bet you figured that one out!) The tower and
the smaller mini-tower style cases have become popular as people started needing
more room for extra drives inside. Repairmen certainly appreciate the roominess
inside for all the cables and circuit boards ... and their knuckles.
The market for the smallest PCs is expanding rapidly. Software is becoming available
for the small types of PC like the palmtop (PPC) and handheld (HPC). This new
software is based on new operating systems like Windows CE (for Consumer
Electronics). You may find simplified versions of the major applications you use. One
big advantage for the newer programs is the ability to link the small computers to
your home or work computer and coordinate the data. So you can carry a tiny
computer like a PalmPilot around to enter new phone numbers and appointments and
those great ideas you just had. Then later you can move this information to your main
computer.
With a Tablet PC you use an electronic stylus to write on the screen, just like with a
pen and paper, only your words are in digital ink. The Tablet PC saves your work just
like you wrote it (as a picture), or you can let the Hand Recognition (HR) software
turn your chicken-scratches into regular text.
Supercomputers
The supercomputer is the top of the heap in power
and expense. These are used for jobs that take
massive amounts of calculating, like weather
forecasting, engineering design and testing, serious
decryption, economic forecasting, etc.
Server
more power
larger memory
The minicomputer has become less important since the PC has gotten so powerful on
its own. In fact, the ordinary new PC is much more powerful than minicomputers used
to be. Originally this size was developed to handle specific tasks, like engineering and
CAD calculations, that tended to tie up the main frame.
Input Devices
What is Input?
Input
Proc
essin
g
Out
put
Stor
age
Types of Input
Commands are special codes or key words that the user inputs to perform a task, like
RUN "ACCOUNTS". These can be selected from a menu of commands like "Open"
on the File menu. They may also be chosen by clicking on a command button.
Keyboard
The first input device we will look at is the Keyboard. It is the most often used input
device. The layout of the keys was borrowed from the typewriter with a number of
new keys added. Several variations are popular and special designs are used in some
companies. The keyboards shown below put the function keys in different places. The
Enter and Backspace keys are different shapes and sizes. One has arrow keys while
the other doesn't. It's enough to confuse a person's fingers!!
The backslash key has at least 3 popular placements: at the end of the numbers row,
above the Enter key, and beside the Enter key. We also have the Windows keyboards
which have two extra keys. One pops up the Start Menu and the other displays the
right-click context sensitive menu. Ergonomic keyboards even have a different shape,
curved to fit the natural fall of the wrists.
A ball underneath rolls as the mouse moves across the mouse pad.
The cursor on the screen follows the motion of the mouse. Buttons
on the mouse can be clicked or double-clicked to perform tasks, like
Mouse to select an icon on the screen or to open the selected document.
There are new mice that don't have a ball at all. They use a laser to sense the
motion of the mouse instead. High tech!
Advantage: Moves cursor around the screen faster than using keystrokes.
Disadvantage: Requires moving hand from keyboard to mouse and back.
Repeated motion can lead to carpal tunnel syndrome
Display Terminals
Video Display Terminals or VDT
For example, McDonalds has separate touchpads for each food item available.
Credit card readers, fingerprint scanners, and the like are special purpose devices that
send data to a computer for recognition.
Multimedia is a combination of sound and images with text and graphics. This
would include movies, animations, music, people talking, sound effects like the roar
of a crowd and smashing glass.
Sound Input
Recording sounds for your computer requires special equipment. Microphones can
capture sounds from the air which is good for sound effects or voices. For music the
best results come from using a musical instrument that is connected directly to the
computer. Software can combine music recorded at different times. You could be a
music group all by yourself -singing and playing all the parts!
Voice Input
Video Input
A digital camera takes still photos but records the pictures on computer disks or
memory chips. The information contained can be uploaded to a computer for viewing.
A video camera or recorder (VCR) can record data that can be uploaded to
the computer with the right hardware. Though it is not digital data, you can
still get good results with the right software.
Both of these take huge amounts of storage. Photos make for very large files.
A web cam is a tiny video camera designed especially to sit on your computer.
It feeds pictures directly to the computer - no tape or film to develop. Of
course you are limited by the length of the cable that connects the camera to
the computer. But like any camera, it will take a picture of what you point it
at!
So what do people do with a web cam? They use it for video conferencing over the
Internet. They show the world what's going on outside their window (weather, traffic).
They take digital pictures and make movies- family, pets, snow storms, birthday
parties, whatever.
A document scanner can only scan individual sheets of paper, not books
or objects.
Credit Card Swipe the credit card through the device, which reads the
Reader magnetic numbers in the magnetic strip on the card.
Processing (Intro)
What is Processing?
Input
Proces
sing
Output
Storage
Processing is the thinking that the computer does - the calculations, comparisons,
and decisions. People also process data. What you see and hear and touch and feel is
input. Then you connect this new input with what you already know, look for how it
all fits together, and come up with a reaction, your output. "That stove is hot. I'll move
my hand now!"
The kind of "thinking" that computers do is very different from what people do.
Machines have to think the hard way. They do one thing at a time, one step at a time.
Complex procedures must be broken down into VERY simple steps. Then these steps
can be repeated hundreds or thousands or millions of times. All possible choices can
be tried and a list kept of what worked and what didn't.
People, on the other hand, are better at recognizing patterns than they are at single
facts and step-by-step procedures. For example, faces are very complex structures.
But you can identify hundreds and even thousands of different faces.
A human can easily tell one face from another, even when the faces belong to
strangers. You don't recognize Mom's face because you remember that Mom's nose is
4 cm long, 2.5 cm wide, and has a freckle on the left side! You recognize the whole
Code No. Date Date Page #
Created Revised 24
ELC724318 Installing Computer Systems and
11/01/2008
Networks
pattern of Mom's face. There are probably a lot of folks with noses the size and shape
of Mom's. But no one has her whole face.
But a computer must have a lot of specific facts about a face to recognize it. Teaching
computers to pick Mom's face out of a crowd is one of the hardest things scientists
have tried to do yet with computers. But babies do it naturally!
So computers can't think in the same way that people do. But what they do, they do
excellently well and very, very fast.
Modern computers are digital, that is, all info is stored as a string of zeros or ones -
off or on. All the thinking in the computer is done by manipulating these digits. The
concept is simple, but working it all out gets complicated.
Each 1 is a power of 2 so that the digits in the figure represent the number:
= 2 7 + 0 + 2 5 + 0 + 2 3 + 2 2 + 0 +0
= 128 +0 +32 + 0 + 8 + 4 + 0 + 0
= 172
Every command and every input is converted into digital data, a string of 0's and 1's.
Processing (CPU)
The CPU, or Central Processing Unit, is the part of the computer where work gets
done. In most computers, there is one processing chip.
Main Memory stores the commands that the CPU executes and the results.
Code No. Date Date Page #
Created Revised 25
ELC724318 Installing Computer Systems and
11/01/2008
Networks
Code No. Date Date Page #
Created Revised 26
ELC724318 Installing Computer Systems and
11/01/2008
Networks
ALU
The ALU can only do one thing at a time but can work very, very fast.
Applications
These are the various programs that are currently running on the computer.
By taking turns with the Machine Cycle, modern computers can have several different
programs running at once. This is called multi-tasking.
Each open application has to have some data stored in Main Memory, even if the
application is on rest break and is just sitting there. Some programs (graphics
programs are notorious for this) require a lot of the Main Memory space, and may not
give it up even if they are shut down! Rather rude, actually!!
Control Unit
This is the part of the computer that controls the Machine Cycle. It takes numerous
cycles to do even a simple addition of two numbers.
CPU
When you enter new data, the keystrokes must be stored until the computer can do
something with the new data.
When you want data printed out or displayed, it must be stored somewhere handy
first.
Main Memory
This is where the computer stores the data and commands that are currently being
used.
When the computer is turned off, all data in Main Memory vanishes. A data storage
method of this type is called volatile since the data "evaporates."
Note on the left the various kinds of data that are stored.
The CPU can fetch one piece of data in one machine cycle.
Operating System
This is the instructions that the computer uses to tell itself how it "operates". It's the
answer to "Who am I and what can I do?"
Some common operating systems are DOS, various versions of Windows, OS/2,
UNIX, LINUX, System 7. These all behave in very different ways and have different
hardware requirements. So they won't all run on all machines.
Unused Storage
One hopes that there is always some storage space that is not in use.
If space runs out in Main Memory, the computer will crash, that is, stop working.
There are programs that sense when space is getting short and warn the user. The user
could then close some of the open applications to free up more space in Main
Memory. Sometimes the warning is too late to prevent the crash. Remember that all
the data in Main Memory vanishes when the power goes off. Thus a crash can mean a
lot of lost work.
Working Storage
The numbers and characters that are the intermediate results of computer operations
must be stored until the final values are calculated. These values "in progress" are
kept in temporary locations.
For example, if the computer is adding up the numbers 3, 5, and 6, it would first add 3
to 5 which yields a value of 8. The 8 is stored in working storage. Then the 8 and 6
We all are impatient and want our computer to work as fast as possible, and certainly
faster than the guy's at the next desk!
Many different factors determine how fast your computer gets things done. Processor
speed is one factor. But what determines the processor's speed?
This is what they are talking about if they say a computer is a 2.4
GHz machine. It's clock rate is 2.4 billion cycles per second.
Word size = a word is the amount of data the CPU can process
at one time.
There are several physical components of a computer that are directly involved in
processing. The processor chip itself, the memory devices, and the motherboard are
the main ones.
Microprocessor- a single silicon chip containing CPU, ALU, and some memory.
Memory Devices:
Vacuum tube - oldest type. Didn't hold up long and generated a lot
of heat.
Core - small metal rings. Magnets tip a ring to left or right,
which represents on and off. Relatively slow.
Code No. Date Date Page #
Created Revised 30
ELC724318 Installing Computer Systems and
11/01/2008
Networks
Semiconductor - integrated circuit on a chip. This is what modern
computers use for memory. Pictured below is a 72-
pin SIMM.
Memory Speed
RAM (Random Access Memory) is what the computer uses as Main Memory.
Memory speed measures the time it takes to move data in or out of memory. It is
measured differently for different kinds of memory chips:
Here we see a diagram and a photo of a motherboard (or main circuit board).
This one is suitable for a Pentium CPU. Nothing has been plugged in or attached yet.
Connectors
Here is where cables connect to the motherboard for things like hard drives, floppy
drives, and CD-ROM drives.
ISA slots
This board has 3 slots for the older ISA/VESA boards for things like video cards,
sound cards, internal modems, etc.
Keyboard plug
This is where the keyboard attaches, thru the back of the computer.
Memory slots
PCI slots
Code No. Date Date Page #
Created Revised 32
ELC724318 Installing Computer Systems and
11/01/2008
Networks
This board has 4 slots for the newer PCI boards for peripherals like video cards, sound
cards, internal modems, etc.
Power Connections
Processor socket
What is visible here is the place where the processor plugs into the motherboard.
When the processor is installed, you still can't see it because on top of it is a heat sink
and fan to keep the processor cool. Hot processors make mistakes or even melt
important parts on the chip.
Different processors are different sizes. So the socket on the motherboard has to
match the processor. Also, the circuits in the motherboard itself must be different for
different processors.
The picture below shows part of a motherboard highlighting the different bus ports.
Can you identify the ISA, PCI, AGP port? Can you show where the RAM should be
seated?
Output (Intro)
What is Output?
Input
Proces
sing
Out
put
Storag
e
Output is data that has been processed into useful form, now called Information.
Types of Output
Hard copy:
Soft copy:
Categories of Output
The most used means of Output are the printer and the computer screen. Let's look at
the features of each.
The job of a printer is to put on paper what you see on your monitor. How easy this is
to do and how successfully it is done determines whether or not you are happy with
your printer choice.
Monitor screens and printers do not use the same formatting rules. In the olden days
of computers, the way something looked on the screen could be VERY different from
how it would look when printed.
Early word processors didn't have a way to show what the printed version would look
like. Now a word processor that doesn't have print preview, would be laughed off the
shelf. Nowadays we expect to see a WYSIWYG view (What You See Is What You
Get), where you see almost exactly what the document will look like in print, while
you are still working on it.
How fast?
The speed of a printer is measured in:
cps= characters per second
lpm= lines per minute
ppm= pages per minute
Single Sheet
Professionals in graphics use 1200 to 2400 dpi printers. Draft quality on such a printer
would be 600 dpi.
Typeface Set of letters, numbers, and special characters with similar design
Will it fit?
The footprint, or the physical size of a printer, determines
where it can be placed. You must consider several things:
Best choice:
The new USB (Universal Serial Bus) connection is likely your best
choice, if your printer can use it. It is faster and a USB connector can
be unplugged and re-plugged without turning off the system. USB
ports are rapidly replacing parallel ports. The printer cannot handle the
data as fast as the USB port can send it. The real limit on how fast a
printer works is in how fast printer can get the characters onto the
paper.
Any of the current types of printers satisfies the work and cost requirements for
someone. Each has strengths and weaknesses. Choose your type of printer based on
which of the features previously discussed are important to your work, then choose
the specific printer that best suits both your tasks and pocketbook.
Impact Printers
With this type of printer something strikes paper & ribbon
together to form a character, like a typewriter.
Advantages: Less expensive
Fast (some types)
Can make multiple copies with multipart paper
Disadvantages: Noisy!
Print quality lower in some types.
Poor graphics or none at all.
A dot-matrix y &
an enlargement
Animation
showing how
columns of pins
print the letter y
(courtesy of Bill
Lewis)
Chain and Uses characters on a band or chain that is moved into place
Band Printers before striking the characters onto the paper.
Advantages: Very fast
up to 3000 lpm (lines per minute)
Disadvantages: Very expensive
Very loud
Non-Impact Printers
This type of printer does not involve actually striking the
paper. Instead, it uses ink spray or toner powder.
Advantages: Quiet!
Can handle graphics and often a wider variety of fonts than impact
printers.
Disadvantages: More expensive
Slower
A standard monitor screen is a CRT (cathode ray tube). The screen is coated on the
inside surface with dots of chemicals called phosphors. When a beam of electrons
hits a dot, the dot will glow.
On a color monitor these phosphor dots are in groups of three: Red, Green, and Blue.
This RGB system can create all the other colors by combining what dots are aglow.
There are 3 signals that control the 3 electron beams in the monitor, one for each
RGB color. Each beam only touches the dots that the signal tells it to light. All the
glowing dots together make the picture that you see. The human eye blends the dots to
"see" all the different colors.
A shadow mask blocks the path of the beams in a way that lets each beam only light
its assigned color dots. (Very cool trick!)
LCD screen
LCD (Liquid Crystal Display) screens use an entirely different technique. The screen
is still made of dots but is quite flat. LCD displays are made of two layers of a
polarizing material with a liquid crystal solution in between. An electrical signal
makes the crystals line up in a way that keeps light from going through entirely or just
partly. A black screen has all the crystals lined up so that no light gets through.
A color LCD screen uses groups of 3 color cells instead of 3 phosphor dots. The
signal for a picture cleverly lets just the right spots show their colors. Your eye does
the rest.
Scan Pattern
There are two patterns used by CRT monitors to cover the whole screen. Both scan
across the screen, in a row 1 pixel high, from left to right, drop down and scan back
left. (LCD screens do not use these methods but display the whole screen at once.)
Code No. Date Date Page #
Created Revised 46
ELC724318 Installing Computer Systems and
11/01/2008
Networks
The non-interlaced pattern scans each row of pixels in turn, from top to bottom. This
type is more prone to flicker if the scan has not started over by the time the phosphor
dots have quit glowing from the last scan. This can make your eyes hurt or even make
you nauseous.
The interlaced pattern scans every other row of pixels. So the odd rows are done,
then the even rows, in the same left to right to left way. But since the rows of pixels
are very close together, the human eye doesn't notice as easily if a row has gone dim
before it is rescanned. Much friendlier to your eyes and stomach.
Colors created by glowing dots are not quite the same as those created by ink on the
printer. Screens use the RGB system described above. Inks use the CMYK system
using the colors Cyan (a kind of blue), Magenta (a kind of red), Yellow, and
blacK. This is why what you see on your screen is not quite the same color when you
print.
Physics Lesson:
Color from mixing pigments: Ink and paint make colors by the colors that they
reflect. The other colors are absorbed, or subtracted, from the light hitting the
object. The primary colors for inks and paints are traditionally said to be red, yellow,
and blue. It is more accurate to say magenta, yellow, and cyan. These cannot be
created by mixing other colors, but mixing them does produce all other colors.
Color from mixing lights: Lights show the colors that the light source sends out
(emits). The colors from different light sources are added together to make the color
that you see. A computer screen uses this process. The primary colors for lights are
red, green, and blue-violet. Mixed together, they can produce all the other colors.
Color from optical mixing: The illusion of color can be created by tricking the eye.
Artists of the Impressionist period created paintings using only dots of color.
Newspaper photos are made of dots, also. The human eye blends the colors to "see"
shapes and colors that were not actually drawn with lines, just suggested by the dots.
Screen Features
Size Desktop screens are usually 14 - 19 in. by diagonal measurement.
(This is how TV screens are measured, too.) Larger sizes are
available, at a significantly higher cost. Prices are dropping, however.
Refresh Rate How often the picture is redrawn on the monitor. If the rate is low, the
picture will appear to flicker. Flicker is not only annoying but also
causes eye strain and nausea. So, a high refresh rate is desirable. 60
times per second is tolerable at low resolutions for most people. 75
times per second or more is better and is necessary for high
resolutions.
New systems now come with super VGA with a picture size of 800 x
600 pixels (as a minimum) and 16 million colors
Cursor/ The symbol showing where you are working on the screen, like:
Pointer
and
In the olden days of just DOS, there were few choices for the cursor.
The invention of the blinking cursor was a tremendous event. Under
Windows there are a huge number of basic to fantasy cursors to
choose from.
Scrolling Moving the lines displayed on the screen up or down one line at a
time
Examples:
Data projectors Microfilm (COM)
Used especially for building plans and Computers can output voice
engineering drawing and really large pictures. messages, music, data as sound. Of
course you have to have speakers
Plotters use a pen to draw continuous lines and and a sound card.
are favored for engineering drawings, which
require both large sheets of paper and precise
lines.
Storage (Intro)
What is Storage?
Input
Process
ing
Output
Stor
age
Storage refers to the media and methods used to keep information available for later
use. Some things will be needed right away while other won't be needed for extended
periods of time. So different methods are appropriate for different uses.
Earlier when learning about processing, we saw all the kinds of things that are stored
in Main Memory.
Main memory keeps track of what is currently being processed. It's volatile, meaning
that turning the power off erases all of the data.
Poof!!
Auxiliary storage holds what is not currently being processed. This is the stuff that is
"filed away", but is ready to be pulled out when needed.
It is nonvolatile, meaning that turning the power off does not erase it.
So, Auxiliary Storage is where you put last year's tax info, addresses for old
customers, programs you may or may not ever use, data you entered yesterday -
everything that is not being used right now.
Of the various types of Auxiliary Storage, the types used most often involve some
type of magnetic disk. These come in various sizes and materials, as we shall see.
This method uses magnetism to store the data on a magnetic surface.
Advantages: high storage capacity
reliable
gives direct access to data
A drive spins the disk very quickly underneath a read/write head, which does what
its name says. It reads data from a disk and writes data to a disk. (A name that
actually makes sense!)
Sizes:
5¼" 3½"
(not used much now!) (starting to die out, too)
Several other kinds of removable magnetic media are in use, such as the popular Zip
disk. All of these have a much higher capacity than floppy disks. Some kinds of new
computers come without a floppy disk drive at all.
Each type of media requires its own drive. The drives and disks are
much more expensive than floppy drives and disks, but then, you
are getting much larger capacities.
Hard Disks
There are other kinds of storage devices that are not magnetic, such as flash drives, or
are not disks, such as magnetic tape. These will be discussed later.
All magnetic disks are similarly formatted, or divided into areas, called
tracks
sectors
cylinders
The formatting process sets up a method of assigning addresses to the different areas.
It also sets up an area for keeping the list of addresses. Without formatting there
would be no way to know what data went with what. It would be like a library where
the pages were not in books, but were scattered around on the shelves and tables and
floors. You'd have a hard time getting a book together. A formatting method allows
you to efficiently use the space while still being able to find things.
Code No. Date Date Page #
Created Revised 56
ELC724318 Installing Computer Systems and
11/01/2008
Networks
Tracks
A track is a circular ring on one
side of the disk. Each track has a
number.
The diagram shows 3 tracks.
Sectors
A disk sector is a wedge-shape piece of the disk, shown in yellow.
Each sector is numbered.
On a 5¼" disk there are 40 tracks with 9 sectors each.
On a 3½" disk there are 80 tracks with 9 sectors each.
Clusters
A cluster is a set of track sectors, ranging from 2
to 32 or more, depending on the formatting scheme
in use.
Cylinders
A cylinder is a set of matched tracks.
We always want the highest amount of data stored in the least possible space. (People
are so greedy this way!) So the capacities of storage media keep increasing while cost
keeps decreasing. It's a lovely situation for the user!
how close together the bits can be on a track sector of the innermost track
Capacity of Disks
5¼" floppy - 360 KB or 1.2 MB
Hard disk
early ones = 20 MB
currently = 120+ GB
(March 2003) where 1 GB =
1 gigabyte =
1024 MB
The future???
Advances in technology for the read/write head and for the densities on the disks are
bringing larger and larger disk capacities for about the same price. In fact, you cannot
find a small capacity drive to buy, even if you wanted one! 120 GB drives are
plentiful (March. 2003) and for the same price that we used to buy 1 Gig drives
Measured
Step Click to start and stop animations
as:
1. seek seek time
move the head to proper (ms)
track
2. rotate rotational
rotate disk under the head to delay
the correct sector (ms)
where ms stands for millisecond = .001 second and kbs is kilobytes per second.
Clearly, getting data from a hard disk is immensely faster than from a floppy.
To keep your storage media happy and healthy you must observe certain
precautions.
Each medium has its own particular weaknesses and hazards to avoid. Be careful or
suffer the consequences - lost data, which means, at best, lots of lost time and effort!
This section is about floppy disks and hard disks only. Other storage media are
discussed later.
Avoid
Smoke, dust,
Heat Magnetism
dirt, salt air
Don't
Improper preparation or use of a floppy disk can ruin your day, and even your floppy
drive. A few pointers are in order.
Use standard computer disk labels. Note that some labels wrap across the top as
pictured at the right. Others fit entirely on the front of the disk.
Write on the label!! If your disks are not kept strictly at home,
every label should include your name and something about what's
on the disk. (On 5¼" disks, use a felt-tip marker only. A pen or
pencil can damage the disk inside.)
Seal all edges down firmly. A loose corner might stick to the inside
of the floppy drive, creating a major mess in there.
Put the label in the right spot. Don't cover the holes in the corners
of 3½" floppies. Don't stick to the metal slide .
Most important, insert the floppy right side up! The label goes on top, the round
metal part is on the bottom. The edge with the metal slide goes in first.
When the computer is on, the hard disk is spinning extremely fast. Any
contact at all can cause pits or scratches. Every scratch or pit is lost data.
Damage in the root directory turns the whole hard disk into a lovely
doorstop! It's completely dead.
So the goal here is to keep that read/write head where it belongs, just
Don't
Jar the
computer while Turn the computer off and
the disk is quickly back on before Drop it - ever.
spinning. spinning has stopped.
Besides protecting the physical medium you are using to store data, you must also
consider what you can do to safeguard the data itself. If the disk is kept from
physical harm, but the data gets erased, you still have a major problem.
This keeps your files from being overwritten with new ones.
Write protect
Floppy disks:
For floppies and many other kinds of removable media, you can do this physically.
5¼" = cover the Write Protect notch with tape
Or assign a password to each file, which can be done with some programs and some
USB drives.
Backup
The more important the files are, the more copies in more places you need.
Antivirus
Computer viruses are sneaky computer programs that can erase your data and
even your whole system. Many viruses are merely annoying and are created as
practical jokes. But there are a number of very damaging viruses out there, plus
others that are out to steal your passwords or use your computer to damage or
annoy others.
Your computer gets a virus by downloading an infected file from the internet or your
office network, or by first using a removable disk in an infected computer and then
accessing a file on that removable disk with your own computer. This makes it
difficult to keep a virus from spreading.
Once you have disinfected your computer, it can get re-infected from a removable
disk that was used between the time you were infected with the virus and when you
disinfected it. A number of nasty viruses hide for quite a while before doing their
nasty things. So you can infect a lot of your own backups and other disks and spread
the infection, all unknowingly, to others. So run an antivirus program that actively
looks for viruses all the time. Don't wait until you have symptoms. A lot of damage
can be done before you figure out that you have a virus.
You may guess from the word "optical" that it has to do with light. You'd be exactly
right! Laser light, in fact.
Optical disks come in several varieties which are made in somewhat different ways
for different purposes.
1's and 0's are formed by how the disk absorbs or reflects light from a tiny
laser.
The different types of optical disks use different materials and methods to absorb and
reflect the light.
To read the data on a disk, laser light shines through the polycarbonate and hits the
data layer. How the laser light is reflected or absorbed is read as a 1 or a 0 by the
computer.
In a CD the data layer is near the top of the disc, the label side.
In a DVD the data layer is in the middle of the disc. A DVD can actually have data in
two layers. It can access the data from 1 side or from both sides. This is how a double-
sided, double-layered DVD can hold 4 times the data that a single-sided, single-
layered DVD can.
The most common type of optical disk is the CD-ROM, which stands for Compact
Disc - Read Only Memory. It looks just like an audio CD but the recording format is
quite different. CD-ROM discs are used for computer software.
DVD used to stand for Digital Video Device or Digital Versatile Device, but now it
doesn't really stand for anything at all! DVDs are used for recording movies.
The CDs and DVDs that are commercially produced are of the Write Once Read
Many (WORM) variety. They can't be changed once they are created.
The data layer is physically molded into the polycarbonate. Pits (depressions) and
lands (surfaces) form the digital data. A metal coating (usually aluminum) reflects the
laser light back to the sensor. Oxygen can seep into the disk, especially in high
temperatures and high humidity. This corrodes the aluminum, making it too dull to
reflect the laser correctly.
CD-ROM and DVD-ROM disks should be readable for many, many years (100?
200?), but only if you treat them with respect.
Write Once:
The optical disks that you can record on your own computer are CD-R, DVD-R, and
DVD+R discs, called writable or recordable disks.
The metal and data layers are separate. The metal layer can be gold, silver, or a silver
alloy.
Go for the Gold: Gold layers are best because gold does not corrode. Naturally,
the best is more expensive. Sulfur dioxide can seep in and corrode silver over time.
The data layer is an organic dye that the writing laser changes. Once the laser
modifies the dye, it cannot be changed again. Write Once! Ultraviolet light and heat
can degrade the organic dye.
Manufacturers say that these disks have a shelf-life of 5 - 10 years before they are
used for recording. There is no testing yet about how long the data will last after you
record it. Humph!
A writable disk is useful as a backup medium when you need long-term storage of
your data. It is less efficient for data that changes often since you must make a new
recording each time you save your data. Pricing of the disks will be important to your
decision to use writable disks.
Rewrite:
Code No. Date Date Page #
Created Revised 67
ELC724318 Installing Computer Systems and
11/01/2008
Networks
An option for backup storage of changing data is rewritable disks, CD-RW, DVD-
RW, DVD+RW, DVD+RAM.
The data layer for these disks uses a phase-changing metal alloy film. This film can be
melted by the laser's heat to level out the marks made by the laser and then lasered
again to record new data.
In theory you can erase and write on these disks as many as 1000 times, for CD-RW,
and even 100,000 times for the DVD-RW types.
Here are some do's and don'ts for keeping your CDs and DVDs healthy.
Cleaning:
o Keep it clean!
o Put it back in its case as soon as you are finished with it. No laying
around on the desktop!!
o Remove dirt and smudges with a clean cotton cloth by wiping from the
center to the outer edge, NOT by wiping around the disk. Wiping in a
circle can create a curved scratch, which can confuse the laser.
Labeling:
o Don't use an adhesive label. The adhesive can corrupt your data in just
a few months!
o Don't write on the label side with a fine-point marker or with any
solvent-based marker. Use markers for CDs. (Solvent may dissolve the
protective layer.)
Storage:
o Store in a cool, dark environment where the air is clean and dry. NO
SMOKE! Low humidity.
o Keep away from high heat and high humidity which accelerate
corrosion.
Recording
After recording, make sure the disk works as you expect: Read data; run
programs.
Invention springs eternal in the computer industry. So more and different devices are
brought out all the time, especially for special uses.
The history of computing suggests that some new technology will take over the
market in the near future. Guessing which one will win the race is what makes
fortunes in the stock market!
USB drive This new type of flash memory storage device does
not yet have a generally accepted name. Each
company calls it something different, including
flash drive, flash pen, thumb drive, key drive, and
mini-USB drive.
All are small, about the size of your thumb or a large car key, and
plug into a USB port on the computer. No drivers are needed for
Windows XP, 2000, or Me. Plug it in and the computer reports a new
hard drive!
Some flash drives include password protection and the ability to run
software right off the USB drive. So cool!
Optical cards A chip on the card holds information like health records and auto
repair records. They can hold more data than the smart cards since
they don't need to do any processing.
Depending on the context, for computer communications you might use the terms:
Communications Channel
A communications channel, also called a communications line or link, is the path that
the data follows as it is transmitted from one computer to another.
Transmission media just means the physical materials that are used to transmit data
between computers.
Cable
Transmits faster
Disadvantage: Heavy & bulky
Needs booster over distance
Fiber optic line (glass fibers)
Advantage: Smaller
Lighter
Faster (speed of light!)
No interference
Disadvantage: Expensive
Harder to install and modify
Broadcast
For longer distances or when cables are not practical, other transmission media come
into play. We're getting really high tech here!
It may seem odd to call microwaves, radio waves, or light a "physical" medium. All
are electromagnetic in nature. Sometimes they are treated by scientists like streams of
teeny, tiny particles and other times like waves on the beach. In their "particle" life,
they do behave like a bunch of physical particles. So it's not quite as odd as it first
appears. (But all those electromagnetic things are plenty odd!)
Signals
Two types of signals are used for data transmission:
Digital and Analog.
Modems
Often communications between computers use the telephone system for at least part
of the channel. A device is needed to translate between the analog phone line and the
digital computer. Such a device is the modem, which comes from
Modulate/Demodulate, which is what a modem does. It modulates a digital signal
from the computer into an analog one to send data out over the phone line. Then for
an incoming signal it demodulates the analog signal into a digital one.
Though rather small, modems are very complex devices. There are entirely too many
commands, protocols, and configuration choices available. Once you get a modem set
up and working right the first time, you probably won't have to tinker with it much
afterwards. Hurrah!!
Transmission Rate
There are two different parts of the data transfer to measure: the digital process and
the analog process.
Digital
The rate of digital transmission is measured in bits per second (bps). Common rates
for regular modems are 28.8 Kbps, 33.6 Kbps, and 56 Kbps where the K stands for
thousand. Completely digital devices (discussed below) are much faster. Faster is
better, of course. 2400 bps would send a 20-page single-spaced report in 5 min. (This
is SLOW!!)
Analog
The analog side is measured in baud where 1 baud is one change in the signal per
second. Most people use bps and baud as though they were the same. For speeds of
2400 bps and under, this is true, but is it not so for the higher speeds where more than
one bit is transmitted per signal change.
Physical types
External
which plugs into a serial port on the back of the
computer
Digital Modems
A digital modem does not have to convert between analog and digital signals.
Technically it's not a "modem" at all since it is not modulating and demodulating. A
digital modem is faster than an analog modem.
To get the increase in speed you will have to pay extra (of course!). Digital modems
are more expensive and so are digital data lines from the phone company. The phone
company has to install additional equipment for some kinds of digital modems.
Normally a digital modem can receive data at a much higher rate than it can send it
out. That works out fine for most people because they are only sending out a few
responses instead of whole web pages or data files.
Warning: Once you have used a high speed device, you will be spoiled forever!
ISDN modem
(Integrated Services Digital Network) - a digital device using a digital phone
line. It actually should be called a terminal adapter, but the name modem has
stuck. An ISDN device is capable of higher rates than an normal modem, 64
Kbps for a single line and 128 Kbps for a bonded dual line. ISDN adapters
cost more than normal modems and also require special arrangements with the
phone company (and more $$ for them, of course!). Fiber optic line is best for
the highest ISDN transmission rate, but the copper wires used in most homes
and offices will work also.
Note: To get the highest speeds out of your ISDN modem, you'll need a high
speed I/O (input/output) card in the computer to which to connect the modem.
The sending (uploading) rate is much slower, thus the "asymmetric" part of
the full name for this kind of service. That is not a problem for most people
since they do not need to upload much data at a time.
Besides great speed, ADSL does not require a separate phone line and you are
connected all of the time. No more dialing up! You can use a regular phone
on the same line and at the same time that you are surfing the Internet. No
more busy signals to your friends and relatives!
Another plus is that you can easily hook up all of the new parts yourself. This
saves a LOT of aggravation since you won't have to wait on the phone
company or the cable TV guy to show up.
Cable modem
Hooks up to your cable TV line and can receive up to 1.5 Mbps or more. You
must have cable TV service with a cable company that also provides data
service. You may need a special cable box to which you connect your TV and
your computer. You will be sharing the line with all of the cable customers
hooked up to your particular cable line. The actual transfer rate you get will
depend on how many people are using the cable at the same time. Once cable
modems become popular in your neighborhood, your speed will slow down
noticeably. Most companies now restrict the top speed level and balance the
load better than they used to do. A cable modem connection is certainly faster
than ISDN. Most cable accounts are faster than most DSL accounts.
The table below will help you see just how much faster the different transfer rates are.
To read the table, look at the speed in the top row, which is in kilobytes per second.
Below it you will see how long it takes to transfer 1 MB, 10 MB, and 1000 MB at that
speed. Check out the last row. This one really shows the difference between analog
modems and the digital kind. The times go down from days to hours or even minutes!
Remember that just because your device is able to send and receive at a certain rate
does not mean that it will ever actually work that fast. There are many other factors in
the communications channel that can reduce the transmission speed from the
maximum.
Protocols
To talk to each other, modems have to exchange a good bit of information, since
there are so many different types and speeds of modems around. That's what the high
pitched squeals and squawks are that you can hear when an analog modem is trying to
connect. It's modem talk for "So, who are you? Do you speak my language? Well,
maybe we can find a common language so these guys can get connected."
A digital modem does not make noises (an advantage!) but it must do the same kind
of negotiation with the device at the other end to come up with a common language,
called a protocol.
A protocol defines what information is exchanged and in what order. The names of
the protocols are of the form v.##. So you'll see things like v.25bis, v.34, and v.120.
Some protocols are more stable or faster than others at certain tasks.
Dialing
Dialing software tells the computer how to place a call on the phone line
connected to it. It also displays messages about the progress of the call or
lack thereof. A list of phone numbers for frequently called, or frequently
forgotten, numbers is an important feature.
Programs that manage this process include many file management features. You need
to be able to see what files are available, their sizes, and the folders you can put the
transferred file in. You may want to rename the file or create a new folder for your
new file.
Such a program will also handle the process of connecting to the other computer.
Many of the names of these programs include the letters FTP, which stands for File
Transfer Protocol. (Yes, another kind of protocol. And there are more!!)
Terminal Emulation
Programs running on a network or that connect to a computer bulletin board (BBS),
make an assumption about what kind of keyboard is being used. Keyboards for
terminals used on networks often have assigned special functions to certain keys.
They may even have keys that don't exist on standard keyboards. In order to work
with the network programs, you need a program that will disguise your keyboard and
make the network think that you are one of them! You must emulate, that is mimic,
the keyboard that is expected.
A data encryption program encodes your data, just like spies do. So to read it, a
person would need the right decoding program and the right password or file to give
that program so it would know what to do exactly.
Advantages: Enables users to share hardware like scanners and printers. This
reduces costs by reducing the number of hardware items bought.
Can even let users run programs that are not installed on their own
computers but are installed elsewhere in the network. This reduces the
effort for networks administrators to keep programs configured
correctly and saves a lot of storage space.
LAN
The pattern of connections depends in part on the distances involved since that
determines what hardware must be used. It also depends on the degree of stability
needed for the network. That is, how important is it that the whole system can't crash
at the same time. These choices carry dollar costs, too. Better costs more, sometimes a
LOT more.
Each device in the network, whether it's a computer, printer, scanner, or whatever, is
called a node.
Star
The star pattern connects everything to one host, which is
the computer that handles the network tasks and holds the
data. All communications between computers go through
the host. This configuration is good for businesses that have
large amounts of rapidly changing data, like banks and
airline reservation offices.
Ring
The ring pattern connects the computers and other devices
one to the other in a circle. There is no central host
computer that holds all the data. Communication flows in
one direction around the ring. This configuration is good
when the processing of data can be done on the local PC.
Connecting Networks
Networks can be connected to each other, too. There are difficulties in doing so,
however. A combination of software and hardware must be used to do the job.
If you are on a network, what happens next when you request data depends on the
setup of the host computer, the server. A server is faster and more powerful than the
computers connected to it on the network.
File Server
When you ask for customers with outstanding balances of over $1000, a computer
set up as a file server will send out a copy of the whole Customers file to your
computer. Your computer does the search through the file for the customers that meet
the criteria of "Balance > $1000".
This is fine unless the Customers file is large. Then it would take a long time just to
download the file to your computer. It would also take a long time to search through
such a large file.
Client Server
This is best when the file is large or changes rapidly. It takes advantage of the extra
power of the server and avoids the "dead time" of a long download.
1. The path that data travels between two computers is NOT called a _____.
a. communications channel
b. communications link
c. communications line
d. communications bridge
e. none of the above
2. Twisted wire, coaxial cable, and microwave are types of transmission
_____.
a. chains
b. media
c. data
d. information
3. Fiber optics have the advantage of _____.
a. being cheaper to install
b. being easier to install than twisted wire
c. having no interference
d. using direct line-of-sight
4. A modem is used to _____.
a. change incoming analog signals to digital signals and outgoing
digital signals to analog signals
b. connect two computers using telephone lines
c. connect two computers using a satellite uplink
d. connect a computer to a shared printer
e. both a and b
f. both b and d
5. The line that is most often used for telephones is _____.
a. twisted pair
b. coaxial cable
c. fiber optics
d. none of the above
6. To move a copy of a file from one computer to another over a
communications channel is called _____.
a. file compression
b. file encryption
c. terminal emulation
d. file transfer
7. A LAN is a _____ network.
a. Long Array
b. Local Area
c. Land Access
d. Line Area
e. none of the above
8. Sharing of hardware resources like a scanner could be done with _____.
a. LAN
b. WAN
c. Internet
Code No. Date Date Page #
Created Revised 91
ELC724318 Installing Computer Systems and
11/01/2008
Networks
d. none of the above
9. In a File-Server arrangement, the PC _____.
a. does the processing of the data into information
b. does none of the processing of data into information
c. searches the server for data
d. sends the results of a search to the server
10. An airline reservations network would most likely be in a _____
configuration.
a. star
b. bus
c. ring
d. gateway
Operating Systems
Between the hardware and the application software lies the operating
system. The operating system is a program that conducts the
communication between the various pieces of hardware like the video
card, sound card, printer, the motherboard and the applications.
Not much!! Let's look at what happens when you turn on your computer, before the
operating system is involved.
The first screen you see when you turn your computer on will be about the BIOS
(Basic Input/Output System) of your
computer. The BIOS is a set of instructions
on a ROM chip (Read-Only Memory) that
controls how the hardware and the operating
system communicate. It's a very limited set
of instructions.
After the BIOS has gone through its morning wake-up routine, you'll see on your
screen something about running the POST (Power On Self Test). This is a set of tests
of the hardware. If, for example, your keyboard is not plugged in or is broken, you
will see a message about "Keyboard failure" and the computer will stop where it is in
the POST. There are tests included for the hard drives, memory, and the buses, too.
This is only a quick check-up though and does not guarantee that everything is
perfect.
That's it for what the computer can do without an operating system. It can wake up
and twitch a little, but it can't move or talk yet. Its nervous system is not working.
Next the computer looks for some kind of operating system. It will usually be set up
to look in the floppy drive first and then on the hard drive. This way if your hard drive
fails, you have a way to get the system working enough to diagnose the problem.
Enough of the operating system to get started will fit on a 3½" floppy disk. This part
of the operating system has various names. Kernel, master program, supervisor,
control program are a few. In PCs using DOS or Windows the term kernel is used.
When the kernel is loaded, the computer looks for three files:
command language The command language interpreter is the program that turns
interpreter your keystrokes into all those 1's and 0's for the processor to
swallow. For DOS and Windows 95 the program is
command.com.
config.sys From the config.sys the computer finds what devices are
connected, such as a mouse, CD drive, or scanner. The file tells
where to look for the directions, called drivers, for using these
devices.
Here is an example of a config.sys that might be used with Windows 95, with
explanations in blue on the right. The blue parts can't be in the real file. Win95
doesn't require a config.sys unless there are devices that you want to run in DOS
mode.
autoexec.bat This file does optional tasks like loading programs that you
want to start every time your computer is turned on. You may
see a lot of messages on the screen as the various programs are
started. This file also tells the computer where to look for files,
called the path. Many programs add their own directories to
the path when they are installed. The path can get too long to
function right!
Here's an example of an autoexec.bat that might be used under Windows 95, with
explanations on the right in blue. The blue parts can't be in the real file. Win95
doesn't require an autoexec.bat but you might want to change some of the defaults or
to have some things to run in DOS mode.
The @ in the front of a line keeps that command from displaying on the screen as it is
executed. Some people want to see them ALL. Most of us would rather not think about
it!
By the way, if you look on your hard drive under Windows for these files, you might
not see them. The default installation of some versions of Windows hides system files,
Code No. Date Date Page #
Created Revised 95
ELC724318 Installing Computer Systems and
11/01/2008
Networks
which includes autoexec.bat and config.sys. To view such files you must change a
setting. From any My Computer or Explorer window, on the View menu, select
Options. Then choose the View tab. There is a choice there to show or not show
system and hidden files.
DOS - When your pretty graphical interface breaks, you may have to go to the
command line to fix it. Even within Windows, it can be faster to type a command on
the Run line than to find the right icon to start a program. So, a knowledge of DOS
commands is not yet useless. See DOS Commands
So we see that without the operating system, the computer is paralyzed. Let's look
now at the types and functions of operating systems.
The operating system directs the traffic inside the computer, deciding what resources
will be used and for how long.
Keeping track of what files are where is a major job. If you can't find a
file, it doesn't help to know that it is safe and secure somewhere. So an
operating system comes with basic file management commands. A user
needs to be able to create directories for storing files. (Dumping
everything in one pile soon becomes the needle-in-the-haystack story.) A
user needs to copy, move, delete, and rename files. This is the category
of operating system functions that the user actually sees the most.
A more technical task is that of disk management. Under some operating systems
your hard disk can be divided up, or partitioned into several virtual disks. The
operating system treats each virtual disk as though it were a physically separate disk.
Managing several physical and/or virtual disks can get pretty complex, especially if
some of the disks are set up with different operating systems. (Some folks are never
satisfied with just one of anything!)
The simplest form is multi-tasking. What this really means is that the
programs are taking turns with the processor. It allows a single user to have
the spreadsheet and the word processor open at the same time, and even more.
Now the user can see to copy data from one to the other. Much better!!
The computer must decide on how many time slices each program gets. The active
program gets the most. Next is programs that are doing things but which aren't the
foreground program. Last is programs that are open but aren't doing anything. They
need a little bit of time every now and then to see if they are supposed to do
something yet.
Windows CE is for small devices like palmtop and handheld computers. Lite
versions of a number of major applications are available to run on these
devices. You can link your small computer to a regular one to synchronize
documents and data.
The Apple Macintosh is a multitasking operating system that was the first graphical
interface to achieve commercial success. The Mac was an immediate
success in the areas of graphics production, and still commands the lion's
share of that market. Apple made a major marketing error when they
decided to keep their hardware and software under tight control rather than licensing
others to produce compatible devices and programs. While the Apple products were of
high quality, they were always more expensive than comparable products that were
compatible with Microsoft's DOS operating system. Apple's share of the computer
market has dropped to an estimated 2.4% worldwide and 3.48% of the US market.
This is an example of how a near lock on a market can be lost in a twinkling.
The current version is Mac OS X, which is version 10. Since January 2002, all new
Mac computers use Mac OS X. Subversions are named Jaguar, Panther, Tiger,
Leopard....
IBM's 32-bit operating system, OS/2, was a popular system for businesses
with complex computer systems from IBM. It was powerful and had a nice
graphical interface. Programs written for DOS and Windows could also run
on this system. This system has never really caught on for PCs and is no
longer marketed. After Dec. 31, 2006, this operating system will not be supported at
all.
Changes
Other operating systems exist and new ones may still appear and take over the market
position of the popular ones discussed above. Nothing in computers is so sure as
change!
Microsoft, for example, has adopted a schedule for phasing out online support and
updates for its operating systems.
http://www.microsoft.com/windows/lifecycleconsumer.mspx
For example, under this schedule, Dec. 31, 2002, is the EOL (End of Life) date for all
versions of MS-DOS, Windows 3.x, Windows 95, and Windows NT3.5. There will be
no more security updates and no technical support of any kind from Microsoft for
products that have passed their EOL date.
File Management programs make it easier to manage your files. In the high
days of DOS it didn't take much to improve on the text-only type-it-all-
yourself methods that DOS provided. Many programs were written to help
the user find files, create and organize directories, copy, move, and rename files.
Code No. Date Date Page #
Created Revised 102
ELC724318 Installing Computer Systems and
11/01/2008
Networks
Some even used the mouse to point and click to accomplish these tasks. You don't
appreciate the vastness of the improvement until you've tried to do these things from
the command line. The newer graphical interfaces that come with current operating
systems have reduced the need for alternate file management programs.
Data Recovery programs are for those who just said "Whoops!" They
attempt to recover deleted or damaged (corrupted) files.
Data Compression programs squeeze out the slack space generated by the
formatting schemes, as discussed under Storage: Disk Format.
Security Software
This category includes a number of different kinds of programs, all of which are
trying to protect your computer and your data from attacks and damage and being
controlled without permission. No one program can protect against all of the bad guys
out there. Using a set of overlapping programs is the best way to keep your computer
and its data safe.
Viruses copy themselves to other disks to spread to other computers. They can
be merely annoying or they can be vastly destructive to your files.
Trojans hide inside something else to sneak in unwanted programs. You don't
know that they are there, like the famous Trojan horse. These are often used to
capture your logins and passwords.
Worms are unwanted programs that are transferred over network or Internet
connections to spread themselves quickly.
Code No. Date Date Page #
Created Revised 103
ELC724318 Installing Computer Systems and
11/01/2008
Networks
Spyware programs lurk on your computer to steal important information, like
your passwords and logons and other personal identification information and
then send it off to someone else.
Zombie programs take control of your computer and use it and its Internet
connection to attack other computers or networks or to perform criminal
activities.
Phishing (pronounced like the word 'fishing') is a message that tries to trick
you into providing information like your social security number or bank
account information or logon and password for a web site. The message may
claim that if you do not click on the link in the message and log onto a
financial web site that your account will be blocked, or some such disaster.
Spam is email that you did not request and do not want. One person's spam is
another's useful newsletter or sale ad. Spam is a common way to spread
viruses, trojans, and the like.
Browser hijacking occurs when one of the nasties takes control of your
browser, sending you to sites that you did not mean to go to. This may be a
porn site or it may look like a real banking, sales, or credit card site. The
purpose is to steal your personal and financial information.
Anti-virus programs monitor the computer for the activity of viruses and
similar nasties.
Anti-spyware programs similarly monitor your computer, looking for known trouble-
makers as well as suspicious behavior.
A firewall blocks attempts to access your files over a network or internet connection.
Your network router or modem or both may have a hardware firewall built into it.
That will block incoming attacks. But you still need a software firewall on your
computer to block outgoing attacks. Your computer can become infected through
shared disks or even from another computer on the network. So you need to monitor
what your computer is putting out over the network or internet also.
7. The autoexec.bat file can tell the computer where to look first for
executable files. This set of locations is called _____.
a. the path
b. the command directory
c. home
d. the system directory
8. When a computer is "swapping", it is _____.
a. moving data from the hard drive to the floppy drive
b. moving data from memory to the swap file on the hard drive
c. moving data between registers in memory
Code No. Date Date Page #
Created Revised 105
ELC724318 Installing Computer Systems and
11/01/2008
Networks
d. none of the above
9. A computer virus can be _____.
a. annoying only
b. damaging to your data
c. copied without your knowledge onto floppies used in the infected
computer
d. all of the above
10. A foreground task has more _____ than a background task.
a. buffers
b. microseconds
c. registers
d. time slices
Buttons
Power
The Power button is most important. If you can't find this one, you won't get too far
with your computer! This is either a push button or a flip switch that turns on the
computer. Computers now put this on the front, but older models may have it on the
side or even the back of the computer. There is an LED light to show you that the
power is on.
Reset
Code No. Date Date Page #
Created Revised 107
ELC724318 Installing Computer Systems and
11/01/2008
Networks
The Reset button is used to restart the computer quickly. When the Reset button is
pressed, called a Warm Boot, the computer shuts down but does not stop the hard
drive's spinning. It then immediately starts up again. This saves time since if the hard
drive is turned off, you must wait about 30 seconds to be sure that it has completely
stopped before turning the power back on.
Recall from the lesson on Storage: Caring for Disks that restarting the hard drive
too soon can damage it.
Sometimes it is necessary to do a Cold Boot, that is let the drive stop first and let
the internals cool off for a bit before restarting, in order to clear up a computer glitch.
The Turbo button is now obsolete on nearly all computers. This button made the
computer's CPU run at a higher clock rate. On earlier models there were times this
was not desirable. Thus a button to switch the Turbo mode on and off. More recent
models don't use this feature.
Drives
The hard drive is not accessible from the outside of the computer.
Hard Drive It is completely internal. There is a LED light, however, to let you
know when the drive is being accessed. On most machines you
can clearly hear the drive starting up and when the head is moving
around. Each drive has a different sound.
Power
The power cord connects the computer to electrical power. It is a thick, round cable
with a three-prong plug on one end and a three-hole plug on the other.
If you are ever working on the inside of the case, be SURE that this cord is
disconnected, else you might find out what it feels like to stick your finger in an
electrical socket. Zap!
Fan
The fan that you can see on the back of the computer is not a connection, but it is
critical to the health of your computer. It cools the power supply.
There is at least one other fan inside the computer, which keeps air flowing inside the
case to remove the heat that all this processing generates. If things get too hot inside
the casing, the CPU will fail to calculate accurately. You will get wrong answers, the
wrong commands will be executed, there may be unpredictable crashes of your
Never block the vent holes in your computer's case. Blow the dust off the blades
from time to time.
Noise: When your computer first starts up, most of the noise you hear comes from the
fans.
If you ever fail to hear a fan running, don't operate the computer until it is fixed or
you'll be risking serious damage from heat.
Keyboard
The keyboard plugs into the computer with a round connector, which can only fit one
way. Recent keyboards use a PS/2 connector, which is smaller than the old style
keyboard connector. The standard color coding scheme uses purple for the keyboard
connector and port, to make it easy to find the right port for each connector. Not all
manufacturers use the standard scheme.
The barrel of the connector usually has a mark or channel or a flat area to show
where the "top" of the plug is. That spot should match the "top" of the computer-side
port. In tower cases the "top" is not toward the top of the case when it is in use, but
toward the "top" as it is laying open for being worked on.
Some cases make it a little hard to get the keyboard plugged in firmly. When
computer boots, it checks for the presence of a keyboard and will not continue if it
can't find one. If this happens while your keyboard is plugged in, first shut down the
computer and unplug the keyboard, then plug it up again. Try to be sure that the plug is
fully seated. Then reboot.
Keyboards can fail, especially after a session with spilled liquids or crumbs. So
keep such away from your computer working area. Your keyboard may recover from a
swimming session after it dries out if the liquid did not leave anything behind like
Heavy use will eventually wear out the electrical contacts in the keyboard, as in any
electrical device.
PS/2 Mouse
Newer mice use a PS/2 connection instead of a serial connection. The port and the
connector are light green, if the manufacturer has followed the standard color scheme.
USB
The Universal Serial Bus will soon be used for nearly all peripherals instead of the
variety you see in the diagram. The computer chip on the main board can
automatically recognize any USB device and assign the resources and power that it
needs. This avoids the hair-pulling sessions that commonly go with the installation of a
new device.
A USB device can be connected or disconnected at any time without having to shut
down or reboot the computer.
A USB device can send data at 12 Mbps for devices like scanners and printers or at 1.5
Mbps for keyboards and joysticks.
If you connect a hub to the USB port on the back of the computer, you can then
Most USB cables are 5 meters long (16.5 feet). This length allows for the signal to get
through properly. If you need a longer cable, you can hook up several 5 m. cables and
some USB hubs in a chain - up to 25 meters.
Serial Ports
Serial ports come in two sizes, 9 pin and 25 pin. The computer-side connector will be
male. (Older video types use the female 9-pin type.) Often there will be one of each
size showing in the same slot on the back of the computer. Notice that the connector
has angled sides so that the plug can fit only one way. Many devices use a serial port,
including the computer mouse and external modems. A serial port sends data one bit at
a time.
There is another kind of port that newer mice used, called a PS/2 port or
mouse port. A mouse port should be colored green. Purple is for the
keyboard.
Parallel Port
A parallel port is used primarily by printers. Scanners and external storage devices of
many types also connect to the parallel port. USB connections are replacing the
parallel port.
A serial port sends data one bit at a time while parallel ports can send 8 bits at a time.
The parallel port uses a 25 pin female connector.
The monitor cable plugs into a port on the video card with places for 15 pins, but there
are not 15 pins on the cable connector. The sides of the plug are sloped so there is only
one way to insert the plug.
Digital monitors have a different connector without pins and require a digital video
card.
The video connector seems to be easier to knock off than the other connectors.
There are screws on either side to fasten it down. Keeping it fastened down will
protect the pins in the plug from getting bent. It is easy to bend the pins by pushing too
hard when the pins and holes are not quite lined up. You may think that you have a
good connection. If the color is not right on the monitor after you've connected it back
up, you have probably bent the pin that carries the instructions for red. It seems to be
the one bent most often.
You can straighten a pin that is out of alignment by carefully using a small flat
blade of a knife or screwdriver to move the pin back in place. If it's really kinked, take
hold of the pin with needle-nosed pliers and gently straighten it. Be VERY gentle. You
don't want to get into the problem of replacing the video plug.
Sound Card
A sound card has holes (ports) for connecting a microphone, speakers or headphones,
and an outside sound source with a single prong plug. There is also a serial port for
connecting devices like musical keyboards and synthesizers.
Recent devices are color-coded to help you match the connector to the correct port.
Audio line IN is blue, microphone is pink, Audio line OUT (speakers) is lime green.
Some sound cards do not have the plug-in holes colored or even marked as to which is
which. If you can't find the documentation that came with the sound card, you'll have
to experiment to see which one your speakers go in.
Once you figure it out, mark the holes with fingernail polish or something so you
won't have the experience of working for hours to "fix" your sound when the only
Some sound cards have a volume control wheel but others rely on software volume
controls. Some kinds of speakers have volume control knobs or slides.
If you want a manual control and your speakers don't have one, you can buy a
device that you can reach easier than the back of the computer and faster than on-
screen volume controls. It doesn't seem to have a particular name. The speakers plug
into this simple device which is basically a knob to turn. Then the device plugs into the
sound card's hole for speakers. Stick the knob device onto the side of the monitor or
your desk and you're all set.
Modem
An internal modem has connectors for phone lines, both "in" and "out". The "in" line
runs from the telephone wall outlet. The "out" line runs from the computer to another
device, usually either a FAX machine or a regular telephone.
Network
A network patch cable is round but the connector is similar to a telephone connector
but wider.
While you may not often tinker with the insides of your computer, it is a good idea to
know a little about what it is like in there. The diagram shows a basic arrangement.
(This tower case is taller than normal and has wide feet for balance.)
The first task is to remove the case so we can see what's inside. Click on the parts in
the diagram and you'll be moved to a description. Use the Return to Top arrows to get
back to the diagram for another choice.
Access Slots The access slots are openings in the back of the
computer to allow devices to connect. The
peripheral cards have a metal tongue which fits
into the opening and contains the connectors.
The tongue is held in place with a screw at the
top.
If the top of the tongue doesn't lie flat on
top of the screw hole, the peripheral card is not
all the way down in the slot.
Fried Parts A power spike is a huge jump that lasts for fractions of a second.
One large spike can destroy the CPU and other chips on the
Not all devices that look alike actually are alike. Power outlet
strips look very much like the strip-style surge protectors but give
no surge protection at all. They are just a way to connect multiple
devices to a single wall outlet.
Accelerated Aging
A power surge sends more electricity through the line than normal for several
seconds. A brownout is a period of lower voltage. It causes lights to dim but it may
not be low enough for devices to shut down.
When the voltage fluctuates in your power line, over time the repeated small
peaks and dips shorten the life span for computer parts. They wear out sooner. So, in
addition to blocking high voltages, you need the ability to smooth out these variations
by pumping up the voltage when it drops and stepping it down when it's too high.
This is called conditioning.
Most protection devices also have noise filters to remove the interference caused by
the magnetic fields of nearby devices. You may have seen the speckles and lines in a
TV picture when a vacuum cleaner or refrigerator motor starts up. All electrical
devices have magnetic fields. Electric motors, sound speakers, and low-flying
airplanes are among the worst offenders at generating interference.
Dead Data
If the voltage drops too low, the computer shuts down without warning. A voltage
drop that makes your lights blink and the TV flicker can make the computer stop in its
Code No. Date Date Page #
Created Revised 122
ELC724318 Installing Computer Systems and
11/01/2008
Networks
tracks.
All unsaved changes to your documents and data are lost. You can actually
damage, or corrupt, files this way. If the computer was in the act of saving data to the
hard drive, the hard drive may be ruined.
You must plug all the computer's devices into the back of the UPS, including the
phone line going to your modem. Otherwise you are leaving a back door open for
disaster to walk through.