Chapter 3: Advanced Computer Hardware: Instructor Materials
Chapter 3: Advanced Computer Hardware: Instructor Materials
Chapter 3: Advanced Computer Hardware: Instructor Materials
Computer Hardware
Instructor Materials
IT Essentials v7.0
Chapter 3: Advanced
Computer Hardware
IT Essentials 7.0 Planning Guide
© 2016 Cisco and/or its affiliates. All rights reserved. Cisco Confidential 3
Chapter 3: Advanced Computer
Hardware
IT Essentials v7.0
Chapter 3 - Sections & Objectives
▪ 3.1 Boot the Computer
© 2016 Cisco and/or its affiliates. All rights reserved. Cisco Confidential 14
Chapter 3 - Sections & Objectives (Cont.)
▪ 3.3 Advanced Computer Functionality
© 2016 Cisco and/or its affiliates. All rights reserved. Cisco Confidential 17
POST, BIOS, CMOS and UEFI
POST
▪ When a computer is booted, the basic input/output system (BIOS) performs a hardware
check on the main components of the computer.
• This check is called a power-on self-test (POST).
▪ If a device is malfunctioning, an error or a beep code alerts the technician of the problem.
© 2016 Cisco and/or its affiliates. All rights reserved. Cisco Confidential 18
POST, BIOS, CMOS and UEFI
BIOS and CMOS
▪ All motherboards need a BIOS to operate.
© 2016 Cisco and/or its affiliates. All rights reserved. Cisco Confidential 19
POST, BIOS, CMOS and UEFI
BIOS and CMOS (Cont.)
▪ The motherboard manufacturer saves the
motherboard BIOS settings in a Complementary
Metal Oxide Semiconductor (CMOS) memory chip.
© 2016 Cisco and/or its affiliates. All rights reserved. Cisco Confidential 20
POST, BIOS, CMOS and UEFI
UEFI
▪ Most computers today run Unified Extensible
Firmware Interface (UEFI).
▪ All new computers come with UEFI, which
provides additional features and addresses
security issues with legacy BIOS.
© 2016 Cisco and/or its affiliates. All rights reserved. Cisco Confidential 21
POST, BIOS, CMOS and UEFI
Lab – Investigate BIOS or UEFI Settings
In this lab, you will boot the computer, explore the firmware setup utility program,
and change the boot order sequence.
© 2016 Cisco and/or its affiliates. All rights reserved. Cisco Confidential 22
BIOS/UEFI Configuration
Video Demonstration – Configure BIOS – UEFI Settings
© 2016 Cisco and/or its affiliates. All rights reserved. Cisco Confidential 23
BIOS/UEFI Configuration
BIOS and UEFI Security
▪ The legacy BIOS supports some security features to protect the BIOS setting, however UEFI adds
additional security features.
▪ Some common security features found in the BIOS/UEFI systems includes:
• Passwords - Passwords allow for different levels of access to the BIOS settings.
• Drive encryption - A hard drive can be encrypted to prevent data theft.
• LoJack – This is a security feature that allows the owner to locate, lock, and delete the device.
• Trusted Platform Module (TPM) – This is a chip designed to secure hardware by storing encryption
keys, digital certificates, passwords, and data.
• Secure boot - Secure Boot is a UEFI security standard that ensures that a computer only boots an OS
that is trusted by the motherboard manufacturer.
© 2016 Cisco and/or its affiliates. All rights reserved. Cisco Confidential 24
BIOS/UEFI Configuration
Update the Firmware
▪ Motherboard manufacturers may publish updated BIOS versions to provide enhancements to
system stability, compatibility, and performance.
▪ Early computer BIOS information was contained in ROM chips and to upgrade the BIOS
information, the ROM chip had to be physically replaced.
▪ Modern BIOS chips are Electronically Erasable Programmable Read Only Memory (EEPROM)
which can be upgraded by the user without opening the computer case.
• This is called “flashing the BIOS”.
▪ To download a new BIOS, consult the manufacturer’s website and follow the recommended
installation procedures.
© 2016 Cisco and/or its affiliates. All rights reserved. Cisco Confidential 25
BIOS/UEFI Configuration
Lab – Search for BIOS or UEFI Firmware Updates
In this lab, you will identify the current BIOS or UEFI version and then search for BIOS or UEFI
update files.
© 2016 Cisco and/or its affiliates. All rights reserved. Cisco Confidential 26
BIOS/UEFI Configuration
Lab – Install Windows
In this lab, you will install Windows 10.
© 2016 Cisco and/or its affiliates. All rights reserved. Cisco Confidential 27
BIOS/UEFI Configuration
Lab – Install Third-Party Software in Windows
In this lab, you will install and remove a third-party software application supplied by your instructor.
You will install the Packet Tracer Windows application.
© 2016 Cisco and/or its affiliates. All rights reserved. Cisco Confidential 28
3.2 Electrical Power
© 2016 Cisco and/or its affiliates. All rights reserved. Cisco Confidential 29
Wattage and Voltage
Wattage and Voltage
▪ There are four basic units of electricity that a computer technician must know:
• Voltage (V) – Measured in Volts (V) – The measure of work required to move a charge.
• Current (I) – Measured in Amperes(A) – The measure of the amount of electrons moving through a
circuit per second.
• Resistance (R) – Measured in Ohms (O) – Refers to the opposition to the flow of current in a circuit.
• Power (P) – Measured in Watts (W) –The measure of the work required to move electrons through a
circuit multiplied by the # of electrons going through the circuit per second.
▪ A basic equation, known as Ohm's Law, expresses how voltage is equal to the current multiplied
by the resistance: V = IR.
▪ In an electrical system, power is equal to the voltage multiplied by the current: P = VI.
© 2016 Cisco and/or its affiliates. All rights reserved. Cisco Confidential 30
Wattage and Voltage
Power Supply Voltage Settings
▪ On the back of some power supplies is a small switch
called the voltage selector switch.
• This switch sets the input voltage to the power supply to
either 110V / 115V or 220V / 230V.
• A power supply with this switch is called a dual voltage
power supply.
• If a power supply does not have this switch, it automatically
detects and sets the correct voltage.
▪ The correct voltage setting is determined by the country
where the power supply is used.
© 2016 Cisco and/or its affiliates. All rights reserved. Cisco Confidential 31
Wattage and Voltage
Lab – Ohm’s Law
In this lab, you will answer questions based on electricity and Ohm’s Law.
© 2016 Cisco and/or its affiliates. All rights reserved. Cisco Confidential 32
Power Fluctuation and Protection
Power Fluctuation Types
▪ When the voltage in a computer is not accurate or steady,
computer components might not operate correctly.
© 2016 Cisco and/or its affiliates. All rights reserved. Cisco Confidential 33
Power Fluctuation and Protection
Power Protection Devices
▪ To help shield against power fluctuation problems, use devices to
protect the data and computer equipment:
• Surge protector - Helps protect against damage from surges and
spikes.
• A surge suppressor diverts extra electrical voltage that is on the line to the
ground.
• Uninterruptible power supply (UPS) - Helps protect against
potential electrical power problems and provides a consistent
quality of power when brownouts and blackouts occur.
• Standby power supply (SPS) - Helps protect against potential
electrical power problems by providing a backup battery that is on
standby during normal operation.
• This device is not as reliable as a UPS because of the time it takes to switch
over to the battery.
© 2016 Cisco and/or its affiliates. All rights reserved. Cisco Confidential 34
3.3 Advanced Computer
Functionality
© 2016 Cisco and/or its affiliates. All rights reserved. Cisco Confidential 35
CPU Architectures and Operation
CPU Architectures
▪ A program is a sequence of stored instructions and a CPU executes these instructions by
following a specific instruction set.
▪ There are two distinct types of instruction sets that CPUs may use:
• Reduced Instruction Set Computer (RISC) - This architecture uses a relatively small set of
instructions. RISC chips are designed to execute these instructions very rapidly.
• Complex Instruction Set Computer (CISC) - This architecture uses a broad set of instructions,
resulting in fewer steps per operation.
▪ While the CPU is executing one step of the program, the remaining instructions and the data
are stored nearby in a special, high-speed memory, called cache.
© 2016 Cisco and/or its affiliates. All rights reserved. Cisco Confidential 36
CPU Architectures and Operation
Enhancing CPU Operation
▪ Intel processors use Hyper-Threading to enhance the performance of some of their CPUs.
• With Hyper-Threading, multiple pieces of code (threads) are executed simultaneously in the CPU
so a single CPU performs as though there are two CPUs.
▪ AMD processors use HyperTransport to enhance CPU performance.
• HyperTransport is a high-speed connection between the CPU and the Northbridge chip.
▪ The power of a CPU is measured by the speed and the amount of data that it can process.
• The speed of a CPU is rated in cycles per second, such as millions of cycles per second, called
megahertz (MHz), or billions of cycles per second, called gigahertz (GHz).
• The amount of data that a CPU can process at one time depends on the size of the front side bus
(FSB).
© 2016 Cisco and/or its affiliates. All rights reserved. Cisco Confidential 37
CPU Architectures and Operation
Enhancing CPU Operation (Cont.)
▪ Overclocking is a technique used to make a processor work at a faster speed than its
original specification.
• Overclocking is not a recommended way to improve computer performance and can result in
damage to the CPU.
▪ The opposite of overclocking is CPU throttling.
• CPU throttling is a technique used when the processor runs at less than the rated speed to
conserve power or produce less heat.
▪ CPU virtualization is a hardware feature supported by AMD and Intel CPUs that enables a
single processor to act as multiple processors.
• With CPU virtualization multiple operating systems can run in parallel on their own virtual machines
as if they were running on completely independent computers.
© 2016 Cisco and/or its affiliates. All rights reserved. Cisco Confidential 38
CPU Architectures and Operation
Multicore Processors
▪ Multicore processors have two or more processors on the same integrated circuit.
▪ Integrating the processors on the same chip creates a very fast connection between them.
• Multicore processors execute instructions more quickly than single-core processors. Instructions can be
distributed to all the processors at the same time.
• RAM is shared between the processors because the cores reside on the same chip.
• Multicore processors conserve power and produce less heat than multiple single-core processors, thus
increasing performance and efficiency.
© 2016 Cisco and/or its affiliates. All rights reserved. Cisco Confidential 39
CPU Architectures and Operation
Multicore Processors (Cont.)
▪ Another feature found in some CPUs is an integrated graphics processing unit or GPU.
▪ The GPU is a chip that performs the rapid mathematical calculations required to render
graphics.
▪ A GPU can be integrated or dedicated.
• Integrated GPUs are often directly embedded on the CPU and is dependent on system RAM
while the dedicated GPU is a separate chip with its own video memory dedicated exclusively
for graphical processing.
• The benefit of integrated GPUs is cost and less heat dissipation.
• Integrated GPUs are good at less complex tasks like watching videos and processing
graphical documents but are not best suited for intense gaming applications.
© 2016 Cisco and/or its affiliates. All rights reserved. Cisco Confidential 40
CPU Architectures and Operation
CPU Cooling Mechanisms
▪ Case Fan
• A case fan is used to increase the air flow in the computer
case and allows more heat to be removed.
• Some cases have multiple fans with cool air being brought in,
while another fan is blowing out hot air.
© 2016 Cisco and/or its affiliates. All rights reserved. Cisco Confidential 43
RAID
RAID Levels
▪ There are several levels of RAID available.
• These levels use mirroring, striping, and parity in different ways.
• Higher levels of RAID, such as RAID 5 or 6, use striping and parity in combination to provide
speed and to create large volumes.
• RAID levels higher than 10 combine lower RAID levels.
© 2016 Cisco and/or its affiliates. All rights reserved. Cisco Confidential 44
Ports, Connectors, and Cables
Legacy Ports
▪ Serial
• Used for connecting various peripherals such as printers, scanners,
modems, and console connections to network devices.
▪ Parallel
• Used for connecting to various peripheral devices, commonly printers.
▪ Game
• Used for connecting a joystick input
▪ PS/2
• Used for connecting a keyboard and mouse. Purple for keyboard and
green for the mouse.
▪ Audio ports
• Analog ports were used for connecting stereo system, microphone and
speakers/headphones.
© 2016 Cisco and/or its affiliates. All rights reserved. Cisco Confidential 45
Ports, Connectors, and Cables
Video and Graphic Ports
▪ VGA
• An analog port and commonly the oldest graphics port still used on some
PCs.
▪ DVI
• Provides support for transmitting uncompressed digital video.
• Includes DVI-A (analog), DVI-D (digital), and DVI-I (integrated).
▪ HDMI
• Carries the same video information as DVI but is also capable of
providing digital audio and control signals..
▪ DisplayPort
• Designed to replace both DVI and VGA for computer monitors while
including high bandwidth video and audio signals.
© 2016 Cisco and/or its affiliates. All rights reserved. Cisco Confidential 46
Ports, Connectors, and Cables
USB Cables and Connectors
▪ Over the years, USB has evolved with various standards. (USB 1.0,
USB 2.0, USB 3.0, and USB 3.2)
▪ USB Type-A
• The typical rectangular connector found on almost all desktop and laptop
computers, TVs, game consoles, and media players.
▪ Mini-USB
• A rectangular connector with a small indention on each side that is being
replaced with the micro-USB connector.
▪ Micro-USB
• A common connector on smartphones, tablets and other devices.
• This connector has two corners pushed in at an angle.
© 2016 Cisco and/or its affiliates. All rights reserved. Cisco Confidential 47
Ports, Connectors, and Cables
USB Cables and Connectors (Cont.)
▪ USB Type-B
• This connector has a square shape with beveled exterior corners and an
extra notch at the top.
• Used to connect printers or external hard drives.
▪ USB Type-C
• This connector is rectangular with four rounded corners and is the newest
USB interface.
• Used as a multipurpose cable to attach different kinds of peripheral devices
to a PC.
▪ Lightning
• This connector is a small proprietary 8-pin connector used by Apple mobile
devices such as iPhones, iPads, and iPods for both power and data.
© 2016 Cisco and/or its affiliates. All rights reserved. Cisco Confidential 48
Ports, Connectors, and Cables
SATA Cables and Connectors
▪ SATA Cable
• One end plugs into a SATA port on a motherboard and the other end into
the back of an internal storage device.
• The SATA data cable does not provide power so a SATA power cable is
needed in addition to power the internal storage device.
• SATA data and power cables are keyed so they can only be installed in
one way.
▪ eSATA Cable
• This cable is used to connect external SATA drives and is a keyed
connector.
▪ eSATA Adapter
• An expansion card is commonly used to provide eSATA ports.
© 2016 Cisco and/or its affiliates. All rights reserved. Cisco Confidential 49
Ports, Connectors, and Cables
Twisted Pair Cables and Connectors
▪ Twisted pair cable is used in wired Ethernet networks and older
telephone networks.
▪ Twisted Pairs
• Unshielded Twisted Pair (UTP) cabling is the most common form of
twisted pair cabling and uses color-coded insulated copper wires.
• Shielded Twisted Pair (STP) also uses color-coded insulated copper wires
but includes foil or braiding as well.
▪ RJ-45
• Each end of a UTP cable must be terminated with an RJ-45 connector so
it can be plugged into an Ethernet port.
▪ RJ-11
• Older telephone networks used a four-wire UTP cable terminated with an
RJ-11 connector.
© 2016 Cisco and/or its affiliates. All rights reserved. Cisco Confidential 50
Ports, Connectors, and Cables
Coax Cables and Connectors
▪ Coax Cable Construction
• Coaxial cable has an inner center conductor surrounded by insulating
material.
• The insulating material is surrounded by a foil shield which is used as an
outer conductor and also shields against electromagnetic interference (EMI).
▪ RG-6
• A heavy gauge cable with insulation and shielding for high-bandwidth, high-
frequency applications (Internet, Cable TV, and Satellite TV)
▪ RG-59
• A thinner cable similar to RG-6, used for low bandwidth and lower frequency
applications (analog video and CCTV)
▪ BNC
• An older connector, used with digital or analog audio or video.
© 2016 Cisco and/or its affiliates. All rights reserved. Cisco Confidential 51
Ports, Connectors, and Cables
SCSI and IDE Cables and Connectors
▪ Small Computer Systems Interface (SCSI) is a standard for connecting
peripheral and storage devices in a daisy-chained format.
© 2016 Cisco and/or its affiliates. All rights reserved. Cisco Confidential 52
Monitors
Monitor Characteristics
▪ There are many types of computer monitors available and they vary by use, size, quality, clarity,
brightness and more.
© 2016 Cisco and/or its affiliates. All rights reserved. Cisco Confidential 53
Monitors
Monitor Terms
▪ Pixel – a tiny dot capable of displaying red, green, and blue.
▪ Brightness – The luminance of a monitor, measured in candelas per square meter (cd/m2)
▪ Contrast ratio – The measurement of how white and how black a monitor can get.
▪ Aspect ratio – The horizontal to vertical measurement of the viewing area of a monitor.
▪ Refresh rate – The amount of seconds for an image to be rebuilt, measured in Hertz (Hz).
▪ Response time - The amount in time for a pixel to change properties (color or brightness)
▪ Interlaced – Creates an image by scanning the screen two times. (Odd lines and then even lines)
▪ Non-Interlaced – Creates an image by scanning the screen one line at a time, from top to bottom.
© 2016 Cisco and/or its affiliates. All rights reserved. Cisco Confidential 54
Monitors
Display Standards
▪ CGA – Color Graphics Adapter (320 x 200 resolution)
▪ FHD – Full High Definition (1920 x 1280 resolution) – Also known as 1080p
▪ QHD – Quad High Definition (2560 x 1440 resolution) – Also known as 1440p
© 2016 Cisco and/or its affiliates. All rights reserved. Cisco Confidential 55
Monitors
Using Multiple Monitors
▪ Adding monitors can increase your visual desktop
area and improve productivity.
• The added monitors enable you to expand the size
of the monitor or duplicate the desktop so you can
view additional windows.
▪ Many computers have built-in support for multiple
monitors.
▪ To connect multiple monitors to a computer, you
need to:
• enable your computer to support multiple monitors
• gather the appropriate display cables
© 2016 Cisco and/or its affiliates. All rights reserved. Cisco Confidential 56
3.4 Computer Configuration
© 2016 Cisco and/or its affiliates. All rights reserved. Cisco Confidential 57
Upgrade Computer Hardware
Motherboard Upgrade
▪ Computers need periodic upgrades for various
reasons:
• User requirements change
• Upgraded software packages require new hardware
• New hardware offers enhanced performance
▪ If you upgrade or replace a motherboard, consider that
you might have to replace other components including:
• CPU
• heat sink and fan assembly
• RAM.
▪ A new motherboard must fit in the old computer case
and the power supply must support it.
© 2016 Cisco and/or its affiliates. All rights reserved. Cisco Confidential 58
Upgrade Computer Hardware
Steps to Upgrade a Motherboard
▪ To upgrade a motherboard from a computer ▪ Step 6. Identify where all of the connectors are
case, follow these steps: such as power, SATA, fan, USB, audio, front panel
connector, and any others on the new motherboard.
• Step 1. Record how the power supply, case fans,
case LEDs, and case buttons attach to the old ▪ Step 7. Replace the old I/O shield with the new I/O
motherboard. shield.
• Step 2. Disconnect the cables from the old ▪ Step 8. Insert and secure the motherboard into the
motherboard. case.
• Step 3. Disconnect and remove the expansion
cards from the case. ▪ Step 9. Connect the power supply, case fans, case
LEDs, front panel, and any other required cables.
• Step 4. Record how the old motherboard is
secured to the case. ▪ Step 10. After the new motherboard is in place and
• Step 5. Remove the old motherboard from the the cables are connected, install and secure the
case. expansion cards.
© 2016 Cisco and/or its affiliates. All rights reserved. Cisco Confidential 59
Upgrade Computer Hardware
CPU Upgrade
▪ One way to increase the power of a computer is to
increase the processing speed by upgrading the CPU.
• The new CPU might require a different heat sink and fan
assembly.
• The assembly must physically fit the CPU and be
compatible with the CPU socket.
▪ It must also be adequate to remove the heat of the faster
CPU by installing additional case fans.
© 2016 Cisco and/or its affiliates. All rights reserved. Cisco Confidential 60
Upgrade Computer Hardware
Storage Device Upgrade
▪ Instead of purchasing a new computer to get faster ▪ After selecting the appropriate hard drive,
speed and more storage space, you might consider follow these general guidelines during
adding another hard drive. installation:
▪ There are several reasons for installing an additional • Step 1. Place the hard drive in an empty drive
drive: bay, and tighten the screws to secure the hard
drive.
• Increase storage space
• Step 2. Connect the drive to the motherboard
• Increase hard drive speed using the correct cable.
• Install a second operating system • Step 3. Attach the power cable to the drive.
• Store the system swap file
• Provide fault tolerance
• Back up the original hard drive
© 2016 Cisco and/or its affiliates. All rights reserved. Cisco Confidential 61
Upgrade Computer Hardware
Peripheral Upgrades
▪ Peripheral devices periodically need to be upgraded.
▪ For example, if the device stops operating or if you wish to improve performance and productivity,
an upgrade might be necessary.
▪ These are a few reasons for upgrading a keyboard and/or a mouse:
• Change the keyboard and mouse to an ergonomic design
• Ergonomic devices are made to be more comfortable to use and to help prevent repetitive motion injuries.
• Reconfigure the keyboard to accommodate a special task, such as typing in a second language with
additional characters.
• To accommodate users with disabilities.
© 2016 Cisco and/or its affiliates. All rights reserved. Cisco Confidential 62
Upgrade Computer Hardware
Power Supply Upgrade
▪ Upgrading your computer hardware will most likely
also change its power needs.
© 2016 Cisco and/or its affiliates. All rights reserved. Cisco Confidential 63
Upgrade Computer Hardware
Lab – Research a Hardware Upgrade
© 2016 Cisco and/or its affiliates. All rights reserved. Cisco Confidential 64
Configurations for Specialized Computers
Thick and Thin Clients
▪ Computers are sometimes referred to as:
• Thick clients
• Sometimes called fat clients
• Standard computers with their own operating system, a
multitude of applications, and local storage.
• They are stand-alone systems and do not require a
network connection to operate, as all of the processing is
performed locally on the computer.
• Thin clients
• Typically low-end network computers that rely on remote
servers to perform all data processing.
• Thin clients require a network connection to a server and
usually access resources using a web browser
• Typically the clients do not have any internal storage and
have very little local resources.
© 2016 Cisco and/or its affiliates. All rights reserved. Cisco Confidential 65
Configurations for Specialized Computers
NAS
▪ Network attached storage (NAS) devices are
servers that are connected to a network to
provide file-level data storage to clients.
▪ This specialized computer is sometimes single-
purposed, running a stripped-down operating
system to perform only the function of file
serving.
• Sometimes the device can offer additional
functionality such as:
• media streaming
• network services
• automated backup functions
• website hosting and more...
© 2016 Cisco and/or its affiliates. All rights reserved. Cisco Confidential 66
3.5 Protecting the
Environment
© 2016 Cisco and/or its affiliates. All rights reserved. Cisco Confidential 67
Safe Disposal of Equipment and Supplies
Safe Disposal Methods
▪ The proper disposal or recycling of hazardous
computer components is a global issue.
© 2016 Cisco and/or its affiliates. All rights reserved. Cisco Confidential 68
Safe Disposal of Equipment and Supplies
Safety Data Sheets
▪ A Safety Data Sheet (SDS), formerly known as a Material Safety and Data Sheet (MSDS), is
a fact sheet that summarizes information about material identification, including hazardous
ingredients that can affect personal health, fire hazards, and first-aid requirements.
▪ The SDS contains chemical reactivity and incompatibility information.
▪ It also includes protective measures for the safe handling and storage of materials and spill,
leak, and disposal procedures.
▪ The SDS explains how to dispose of potentially hazardous materials in the safest manner.
© 2016 Cisco and/or its affiliates. All rights reserved. Cisco Confidential 69
3.6 Chapter Summary
© 2016 Cisco and/or its affiliates. All rights reserved. Cisco Confidential 70
Conclusion
Chapter 3: Advanced Computer Hardware
▪ Configure BIOS and UEFI settings
© 2016 Cisco and/or its affiliates. All rights reserved. Cisco Confidential 71