Lesson 5 Post and Bios Beep Codes
Lesson 5 Post and Bios Beep Codes
BIOS
stands for Basic Input/Output System.
BIOS software is stored on a non-volatile ROM chip on the motherboard.
In modern computer systems, the BIOS contents are stored on a flash memory chip so that the contents can be
rewritten without removing the chip from the motherboard.
This allows BIOS software to be easily upgraded to add new features or fix bugs, but can make the computer
vulnerable to BIOS rootkits.
The latest advancement of BIOS is UEFI(Unified Extensible Firmware Interface).
How to Create a BIOS Firmware Update Bootable USB Drive For HP Compaq DC7800 Computer
Video link 1 hr
https://www.youtube.com/watch?v=6oTRYwB5m_E
How to Update Your BIOS Without a CPU (BIOS Flashback Using a USB Flash Drive)
Reading blog reference material
https://www.build-gaming-computers.com/update-bios-without-cpu.html
Page 1 of 17
Working of BIOS
Step 2: When the system turns On, wait for the message similar to ‘entering setup’ to come.
Step 3: Wait for the message ‘Press Key to enter BIOS Setup’. Some keys are like Del, Tab, etc.
Advantages of BIOS
The computer system will gain better compatibility.
The booting time of the system decreases.
The overall performance of the system improves.
Disadvantages of BIOS
The disadvantage is that it is a time-consuming process. BIOS often boots in 16-bit real mode (not 32-bit
nor 64-bit protected mode), and because of the type of chip used, it is not always the fastest.
If something goes wrong during the process, the motherboard might get affected. Solving this will not be
an easy process.
Page 2 of 17
Post and Bios
Page 3 of 17
POST Card
When troubleshooting a computer problem when no video is available, you can use a POST card. A
POST card is installed in a port on the motherboard, such as PCI or PCIe. When the computer is
started, and errors are encountered, the computer issues a code that is displayed on the POST card.
Page 4 of 17
This code is used to diagnose the cause of the problem through the motherboard, BIOS, or POST card
manufacturer.
BIOS Setup
To enter the BIOS setup program, you press the proper key or key sequence during POST. Many
motherboards display graphics, called a splash screen, while the computer goes through the POST
process. The computer might not display information about the key or key sequence required because
of the splash screen. Most computers use the DEL key or a Function key to enter the BIOS setup
program. Consult the motherboard documentation for the correct key or combination of keys for your
computer.
Page 5 of 17
Main - Basic system
configuration
Advanced -
Advanced system
settings
Security - Security
settings
Power - Advanced
power management
configurations
JUSTw00t! -
Advanced voltage
and clock settings
Page 7 of 17
also displayed.
RAM - Displays the RAM manufacturer and speed. The number of slots and which slots the
RAM modules are installed in might also be displayed.
Hard Drive - Displays the manufacturer, size, and type of the hard drives. The type and
number of hard disk controllers might also be displayed.
BIOS Configurations
Another function of the BIOS setup program is to customize specific aspects of the computer
hardware to fit individual needs. The features that can be customized are determined by the BIOS
manufacturer and version. Before
making changes to the BIOS, it is
important to have a clear understanding
of how the changes can affect the
computer. Incorrect settings can have
an adverse effect.
Disabling Devices
Page 8 of 17
network capabilities and installing a
dedicated adapter card for one or
more of these capabilities renders the
Page 9 of 17
built-in device redundant. Instead of wasting resources on the built-in device, you can disable the
feature in the BIOS.
You can also disable extra hard drive controllers, serial ports, FireWire ports, or infrared hardware. If
a device is not working, check the advanced BIOS settings to see if the device is disabled by default or
has been disabled by someone. Enable the device in the BIOS so that it can be used by the computer.
Boot Order
The order in which devices are listed in the boot order depends on user needs. For example, when
installing an operating system, an optical drive, network boot, or USB drive might need to be listed
before a bootable hard drive. It is recommended to reorder the list after installing all operating systems
to boot first from a bootable hard drive. The BIOS also allows you to disable or remove devices from
the boot order list.
Page 10 of 17
Clock Speed
Virtualization
Page 11 of 17
BIOS Security Configurations
The BIOS might support many different security features to protect BIOS settings and data on the
hard drive, and also help recover the computer if it is stolen. There are several common security
features found in the BIOS.
Supervisor Password -
This password can
access all user-access
passwords and all BIOS
screens and settings.
Full Access - All screens and settings are available, except the supervisor password setting.
Limited - Changes can be made to certain settings only, for example, the time and date.
View Only - All screens are available, but no settings can be changed.
Drive encryption - A hard drive can be encrypted to prevent data theft. Encrypting changes the data
into code that cannot be understood. Without the correct password, the computer does not boot, and
the computer cannot decrypt the data. Even if the hard drive is placed in another computer, the
encrypted data remains encrypted.
Trusted Platform Module - The TPM chip contains security items, such as encryption keys and
passwords.
Lojack - This is a two-part system for protecting computers from Absolute Software. The first part is
Page 12 of 17
a program called the Persistence Module that is installed in the BIOS by the manufacturer. The second
part is a program called the Application Agent that is installed by the user. When the Application
Agent is installed, the Persistence Module is activated. The Persistence Module installs the
Page 13 of 17
Application Agent if it is removed from the computer. The Persistence Module cannot be turned off
after it is activated. The Application Agent calls the Absolute Monitoring Center over the Internet to
report device information and location on a set schedule. If the computer is stolen, the owner can
contact Absolute Software and perform the following functions:
The BIOS built-in hardware monitoring features are useful for collecting information and monitoring
the activity of the hardware connected to the motherboard. The type and number of monitoring
features varies by motherboard model. Use the hardware monitoring page to view temperatures, fan
speeds, voltages, and other items. This area might also have information about intrusion detection
devices.
Temperatures
Motherboards have heat sensors to monitor heat sensitive hardware. A common heat sensor is under
the CPU socket. This sensor monitors the temperature of the CPU and might increase the speed of the
CPU fan to cool the CPU if it becomes too hot. Some BIOS setups also slow the speed of the CPU to
reduce the CPU temperature. In some cases, the BIOS shuts down the computer to prevent damage to
the CPU.
Other heat sensors monitor the temperature inside the case or power supply. Additionally, heat sensors
monitor the temperatures of the RAM modules, chipsets, and other specialized hardware. The BIOS
increases the speed of the fans or shuts down the computer to prevent overheating and damage.
Fan Speeds
Fan speeds are monitored by the BIOS. Some BIOS setups allow you to configure profiles to set the
fan speeds to achieve a specific result. These are some common CPU fan speed profiles:
Standard - The fan automatically adjusts depending on the temperature of the CPU, case,
power supply, or other hardware.
Intrusion Detection
Built-in Diagnostics
If you notice a problem with a device connected to the system or a basic function, such as a fan or
temperature and voltage control, you might be able to use built-in system diagnostics to determine
where the problem is. Many times, the program provides a description of the problem or an error code
Page 15 of 17
for further troubleshooting. These are some common built-in diagnostics:
Page 16 of 17
Start test - Checks the main components to make sure that they are functioning properly. Use
this test when the computer does not boot correctly.
Hard drive test - Checks the hard drive for damaged areas. If a damaged area is found, it tries
to retrieve the data and move it to a good area and mark the damaged area as bad so that the
area is not used any more. Use this test if you suspect that the hard drive is not functioning
properly, the computer does not boot, or the hard drive makes unusual noises.
Memory test - Checks the memory modules to make sure that they are working properly. Use
this test if the computer exhibits erratic behavior or fails to boot. Replace the memory
immediately if this test reports errors.
Battery test - Checks that the battery is functioning properly. Use this test if your battery is not
functioning properly, does not hold a charge, or reports an incorrect charge level. Replace the
battery if the battery fails this test.
Many built-in diagnostic programs retain a log that contains a record of the problems encountered.
You can use this information to investigate issues and error codes. When a device is under warranty,
you can use this information to convey the problem to product support.
Page 17 of 17