Computer Maintenance and Support Notes
Computer Maintenance and Support Notes
Contents
Basic Computer Concepts .................................................................................................. 3
Computer Components and Electrical communication ...................................... 4
Basic Computer Components ..................................................................................... 5
PC Maintenance Tools ................................................................................................. 5
Power supply ...................................................................................................................... 7
Functions/importance .................................................................................................. 7
Power Supplies Types/Form Factors and Use ........................................................... 7
Power supply problems Diagnosis: .......................................................................... 10
Common Power Problems and solutions ................................................................. 12
Motherboards and related components ........................................................................ 14
Computer Cases ........................................................................................................... 14
Motherboard components...................................................................................... 14
Types of motherboards (Form Factors) ................................................................... 17
Expansion slots: ........................................................................................................ 28
How to install a computer motherboard ................................................................... 29
Motherboard Installation .......................................................................................... 30
Computer Processing Unit (CPU) .................................................................................... 32
Components of the CPU ........................................................................................... 32
Introduction/Overview ............................................................................................ 33
CPU Packaging (Microprocessor Types) ............................................................. 34
Microprocessor Addressing Modes ...................................................................... 35
Processor selection and upgrades .............................................................................. 37
What Types Of Sockets Exist? ................................................................................ 38
How to Install a New Computer Processor on a Motherboard ............................. 39
Memory ........................................................................................................................... 41
Characteristics of Computer Memory ..................................................................... 41
Types of Memories ................................................................................................... 41
TYPES OF MEMORY MODULES PACKAGING ................................................... 41
Memory-Mapping ...................................................................................................... 44
What Is Memory-Mapping? ..................................................................................... 44
Benefits of Memory-Mapping ............................................................................... 44
Selection and upgrading memory ............................................................................. 45
Hardware Tips: Choose the Right Kind of Memory for Your System ................. 45
Storage Disks and Drives............................................................................................... 47
Types of computer storage and Disks ...................................................................... 47
Storage/Disk organization ......................................................................................... 47
Disk management ....................................................................................................... 52
Computer display ........................................................................................................... 58
Types of computer monitors ..................................................................................... 58
Factors That Affect The Quality Of A Display Device ........................................... 59
CHAPTER 1
1. Data sharing - All types of buses found in a computer transfer data between the
computer peripherals connected to it.
The buses transfer or send data in either serial or parallel method of data transfer. This
allows for the exchange of 1, 2, 4 or even 8 bytes of data at a time. (A byte is a group of
8 bits). Buses are classified depending on how many bits they can move at the same
time, which means that we have 8-bit, 16-bit, 32-bit or even 64-bit buses.
2. Addressing - A bus has address lines, which match those of the processor. This allows
data to be sent to or from specific memory locations.
3. Power - A bus supplies power to various peripherals connected to it.
4. Timing - The bus provides a system clock signal to synchronize the peripherals
attached to it with the rest of the system.
The expansion bus facilitates easy connection of more or additional components and
devices on a computer such as a TV card or sound card.
Computers have two major types of buses:
1. System bus:- This is the bus that connects the CPU to main memory on the
motherboard. The system bus is also called the front-side bus, memory bus, local bus,
or host bus.
2. A number of I/O Buses, (I/O is an acronym for input / output), connecting various
peripheral devices to the CPU. These devices connect to the system bus via a ‘bridge’
implemented in the processors chipset. Other names for the I/O bus include “expansion
bus", "external bus” or “host bus”.
Basic Computer Components
The basic components of a microcomputer are: 1) CPU 2) Program memory 3) Data
memory 4) Output ports 5) Input ports 6) Clock generator. These components are
shown in figure below: Central Processing Unit: The CPU consists of ALU (Arithmetic and
Logic Unit), Register unit and control unit.
PC Maintenance Tools
Computer maintenance is the practice of keeping computers in a good state of repair.
Computer valeting is the in-depth cleaning of the physical components of a personal
computer. Computer maintenance describes various steps to keep your computer
functioning at an optimal performance level from a software and hardware point of
view.
A toolkit should contain all the tools necessary to complete hardware repairs. As you gain
experience, you learn which tools to have available for different types of jobs. Hardware
tools are grouped into four categories:
• ESD tools
• Hand tools
• Cleaning tools
• Diagnostic tools
Maintenance Tools
To troubleshoot and repair laptop systems properly, you need a few basic tools. If you
intend to troubleshoot and repair systems professionally, you may want to purchase
many more specialized tools as well. These advanced tools enable you to more
accurately diagnose problems and make jobs easier and faster. Here are the basic tools
that should be in every troubleshooter’s toolbox:
• Simple hand tools for basic disassembly and reassembly procedures, including a
selection of flat-blade and Phillips screwdrivers (both medium and small sizes),
tweezers, an IC extraction tool, and a parts grabber or hemostat. Most of these
items are included in $10–$20 starter toolkits found at most computer stores.
Although most of the same toolkits sold for conventional desktop systems will
have these tools, for portable systems you may also need sets of smaller-sized
flat-blade and Phillips screwdrivers and a set of small Torx drivers or Torx bits as
well. For laptops, you may encounter Torx screws as small as T5, so consider
purchasing a set including bits down to that size.
• Diagnostics software and hardware for testing components in a system.
• A multimeter that provides accurate measurements of voltage and resistance, as
well as a continuity checker for testing cables and switches.
• Chemicals (such as contact cleaners), component freeze sprays, and compressed
air for cleaning the system.
• Foam swabs, or lint-free cotton swabs if foam isn’t available.
• Small nylon wire ties for "dressing" or organizing wires or small cables (such as
internal Wi-Fi/Bluetooth antennas).
You may want to consider the following items, although they’re not required for most
work:
• Memory-testing machines (used to evaluate the operation of memory modules).
Note these can be very expensive, on the order of $1,000 or more, but can be
useful for professional shops or larger companies with a lot of systems to
support.
• Serial and parallel loopback (or wrap) plugs to test serial and parallel ports.
• A network cable tester or scanner (many types with varying functionality are
available, from simple loopback jacks to full-blown Time Domain
Reflectometers).
CHAPTER 2
Power supply
Also called a power supply unit or PSU, the component that supplies power to a
computer. Most personal computers can be plugged into standard electrical outlets.
The power supply then pulls the required amount of electricity and converts the AC
current to DC current. It also regulates the voltage to eliminate spikes and surges
common in most electrical systems. Not all power supplies, however, do an adequate
voltage-regulation job, so a computer is always susceptible to large voltage fluctuations.
Power supplies are rated in terms of the number of watts they generate. The more
powerful the computer, the more watts it can provide to components.
Functions/importance
1. It provides the driving (electric) power for all essential computer components,
such as the processor, motherboard, memory modules, video card and add-in
cards, as well as hard drives and optical drives.
2. The computer power supply converts an alternative current (AC, which is obtained
from the wall socket) into a specified voltage direct current (DC, which can be used
by computer components).
3. Regulates (for some PSU), the voltage to eliminate spikes and surges common in
most electrical systems
ATX
Although there are still AT form factor power supplies available for purchase, AT form
factor power supplies are undoubtedly phased out products. Even the later ATX form factor
power supply (ATX 2.03 and earlier versions) are falling out of favor. The major
differences between the ATX and AT power supply form factors are:
1. ATX power supplies provide an extra +3.3V voltage rail.
2. ATX power supplies use a single 20-pin connector as the main power connector.
3. ATX power supplies support the soft-off feature, allowing software to turn off the power
supply.
Note
There are two major types of power connectors on motherboards:
• 12-pin, modeled after the original IBM PC power connector and used on
Baby-
AT and LPX motherboards (see Figure 5.5)
Figure 5.5. Twin 6-pin power connectors are used on AT/LPX and other power
supply types that attach to motherboards with a 12-pin connector.
• 20-pin, used by all motherboards in the ATX family (see Figure 5.6) and by
the NLX riser card (which provides power to the NLX motherboard)
Figure 5.6. The ATX power supply has a single 20-pin power connector. The
extra connectors (compared to the LPX design in Figure 5.5) provide support
for 3.3V and for software- or keyboard-controlled power down. Many of these
power supplies don't have an external power switch for that reason.
ATX12V
The ATX12V form factor is the mainstream choice now. There are several different
versions of the ATX12V form factor, and they can be very different from one another. The
ATX12V v1.0 specification added over the original ATX form factor a 4-pin +12V
connector to deliver power exclusively to the processor; and a 6-pin auxiliary power
connector providing the +3.3V and +5V voltages. The ensuing ATX12V v1.3 specification
added on top of that the 15-pin SATA power connector.
A substantial change occurred in the ATX12V v2.0 specification, which changed the
main power connector from a 20-pin to a 24-pin format, removing the 6-pin auxiliary
power connector. In addition, the ATX12V v2.0 specification also isolated the current
limit on the 4-pin processor power connector for the 12V2 rail (+12V current is split into
the 12V1 and 12V2 rails). Later, the ATX12V v2.1 and v2.2 specifications also increased
efficiency requirements and mandated various other improvements.
All ATX12V form factor power supply units maintain the same physical shape and size as
the ATX form factor.
EPS12V, SFX12V and Others
The EPS12V power supply form factor utilizes an 8-pin processor power connector in
addition to the 4-pin connector of the ATX12V form factor. (Note: this isn't the only
difference between these two form factors, but for most desktop computer users,
knowing this should be sufficient). The EPS12V form factor was originally designed for
entry-level servers, but more and more high-end desktop motherboards are featuring the
8-pin EPS12V processor power connector now, which enables users to opt for an
EPS12V power supply.
The Small Form Factor (SFF) designation is used to describe a number of smaller
power supplies, such as the SFX12V (SFX stands for Small Form Factor), CFX12V
(CFX stands for Compact Form Factor), LFX12V (LFX stands for Low Profile Form
Factor) and TFX12V (TFX stands for Thin Form Factor). They are all smaller than the
standard ATX12V form factor power supply in terms of physical size. SFF power
supplies need to be installed in corresponding SFF computer cases. Table 3.2 Power
Supply Connector Types and Form Factors
Modern PS Form Factors Originated Connector Associated MB
From Type Form Factors
LPX style* IBM PS/2 AT Baby-AT, Mini-
[ Low Profile eXtension ] Model 30 AT, LPX
(1987)
ATX style ATX ATX, NLX,
Intel ATX,
[ Advanced Technology Micro-ATX
ATX12V
Extended ]
(1985/2000)
If any of the above happen to you try changing the power supply unit. This can be
down by removing the computer case and removing the PSU. The PSU is only held
by a few screws.
The following types of power-protection devices are explained in the sections that
follow:
• Surge suppressors
• Phone-line surge protectors
• Line conditioners
• Standby power supplies (SPS/UPS)
• Uninterruptible power supplies (UPS)
Line Conditioners
In addition to high-voltage and current conditions, other problems can occur with
incoming power. The voltage might dip below the level needed to run the system,
resulting in a brownout. Forms of electrical noise other than simple voltage surges or
spikes might travel through the power line, such as radio-frequency interference or
electrical noise caused by motors or other inductive loads.
Remember two things when you wire together digital devices (such as computers and
their peripherals):
• Any wire can act as an antenna and have voltage induced in it by nearby
electromagnetic fields, which can come from other wires, telephones, CRTs,
motors, fluorescent fixtures, static discharge, and, of course, radio transmitters.
• Digital circuitry responds with surprising efficiency to noise of even a volt or two,
making those induced voltages particularly troublesome. The electrical wiring in
your building can act as an antenna, picking up all kinds of noise and
disturbances.
A line conditioner can handle many of these types of problems. It filters the power,
bridges brownouts, suppresses high-voltage and current conditions, and generally acts
as a buffer between the power line and the system. A line conditioner does the job of a
surge suppressor, and much more. It is more of an active device, functioning
continuously, rather than a passive device that activates only when a surge is present. A
line conditioner provides true power conditioning and can handle myriad problems. It
contains transformers, capacitors, and other circuitry that can temporarily bridge a
brownout or low-voltage situation.
UPS
Lighting, telephones, mobiles, laptops, chargers, PCs, tablets, peripherals and servers all
depend absolutely upon a reliable electricity supply, as do industrial processes. The
answer is to use a UPS – a mature technology that is still being improved to cope with
ever more difficult power demands. UPS avoid un-planned power outages, save
valuable data and provide time (autonomy) to allow safe shutdown of affected
equipment.
UPS represent big and growing business because of the increasing reliance on ever
greater numbers of digital devices, as well as the demand for cleaner power that they
require, and from the changing nature of mains power supplies themselves. For
example, as older coal-fired power stations are phased-out, and as more renewable
sources are installed, grids will change in ways that are not fully understood – but there
will almost certainly be shortfalls. Coming smart grids will also have an effect.
CHAPTER 3
Motherboards
Computer Cases
There are two basic styles of cases the computer may come assembled in. They are
basically tower and desktop style cases. Desktop style is in the shape of a rectangular
box, that sets flat on a desk. Usually the computer monitor is placed on top of it. A tower
case, looks similar to a tower as the name says. These computers will be placed off to the
side of the keyboard and monitor. The tower case is the most popular style of desktop
computer today. It is also recommended by some microprocessor manufacturers since it
can be designed for better heat dissipation. Tower cases come in several sizes which are:
• Mini-tower - The smallest.
• Mid-tower - The standard size, recommended for most applications including
standard desktop systems and some servers.
• Full-tower - The largest. Usually this is a very tall case and you may have a difficult
time fitting it where overhead is limited. This case is usually used for high powered
servers.
Note: The exact locations of many of the component items vary somewhat from
computer to computer, but the overall layout is generally the same. Types of cases
come to fit AT and ATX sizes. If you want a modern computer, you will want, or should
have an ATX case. The AT or ATX version refers to the type of motherboard the case is
designed to fit. The AT case is for the old type of motherboards such as for the 80486
microprocessor based computers.
Motherboard components
This is the main circuit board of the PC. It contains all the basic, core components of the
computer. It usually contains:
• the CPU, which plugs into a socket designed for a particular CPU's pin arrangement.
Because a motherboard has sockets that can only accept certain types of CPU, it is
important to make sure when upgrading your CPU that your motherboard can
accept it.
• memory chips - these hold data and programs that the CPU is currently using.
• Input/output ports ("I/O") such as connectors that hard disk drives, floppy disk
drives and CD-ROM drives plug in to, serial port sockets, parallel port sockets and
USB port sockets.
• BIOS chips (Basic Input Output System) - the BIOS chips are PROM (Programmable
Read Only Memory) chips that contain the most basic information that a computer
needs to start up and operate. The BIOS contains bootup information, details of
what sort of CPU is installed, what hard disks are available, how the motherboard
should behave etc. More details below.
• Real time Clock (RTC) so the computer knows the time and date. The RTC needs a
battery to keep the clock running when the computer's power is turned off.
• Chips to control basic devices such as hard disks, floppy disks, serial/parallel ports
etc. These basic chips are sometimes called the "chip set".
• Some motherboards, especially laptop motherboards, have built-in graphics chips,
sound chips and modem chips so expansion cards are not needed. Unfortunately,
this also means laptops can be very hard to upgrade because these chips are usually
impossible to remove and replace. An example of "integrated peripherals" is AC '97
Audio. It combines a low-cost audio codec (compressor/decompressor) integrated
circuit (IC) with a small portion of the core chipset's processing power to form a
complete PC audio subsystem. Soft audio processing consumes minimal CPU
overhead and does away with the need for a separate PCI audio controller (e.g.
Soundblaster card). The result is reduced motherboard space and overall system
cost. Building in AC '97 costs a manufacturer about $2, compared to almost $100 for
a PCI sound card.
While motherboards have been getting smaller and smaller, computer cases seem to be
getting bigger because the new computers generate more and more heat and need lots
of empty space to ventilate themselves.
Motherboards diagram 2
Types of motherboards (Form
Factors)
(Old school)
AT (Full vs. Baby)
XT (rip)
LPX (rip)
(Newer)
ATX vs. BTX motherboard
Definitions
AT - Advanced Technology, A motherboard that follows the same design and 12x13"
form factor that was in the original IBM PC/AT. It was superseded by the Baby AT. the
Baby AT reduced width from 12" to 8.5"
ATX motherboard (Advanced Technology EXtended motherboard) The PC
motherboard that superseded the Baby AT design. The ATX layout rotated the CPU and
memory 90 degrees, allowing full-length expansions to be plugged into all sockets. LPX
(Low Profile eXtension), originally developed by Western Digital, was a loosely defined
motherboard format (form factor) widely used in the 1990s.
BTX (for Balanced Technology eXtended) is a form factor for motherboards, originally
intended to be the replacement for the aging ATX motherboard form factor in late 2004 and
early 2005.
Note : Although all motherboards have some features in common, their layout and size
vary a great deal. The most common motherboard designs in current use include ATX,
Micro ATX, BTX, and NLX. Some of these designs feature riser cards and daughterboards.
Riser cards and daughterboards provide two different methods for providing access to
motherboard–based resources. In current slimline or rackmounted systems based on
ATX or BTX technologies, riser cards are used to make expansion slots usable that would
otherwise not be available because of clearances inside the case. Riser card designs can
include one or more expansion slots, and are available in PCI, PCI-X (used primarily in
workstation and server designs), and PCI-Express designs
The term daughterboard is sometimes used to refer to riser cards, but daughterboard
can also refer to a circuit board that plugs into another board to provide extra
functionality. For example, some small form factor motherboards support
daughterboards that add additional serial or Ethernet ports, and some standard-size
motherboards use daughterboards for their voltage regulators.
NLX Motherboard
Computer bus
A bus, in computing, is a set of physical connections (cables, printed circuits, etc.) which
can be shared by multiple hard ware components in order to communicate with one
another.
The purpose of buses is to reduce the number of "pathways" needed for communication
between the components, by carrying out all communications over a single data channel.
This is why the metaphor of a "data highway" is sometimes used.
Characteristics
A bus is characterised by the amount of information that can be transmitted at once.
This amount, expressed in bits, corresponds to the number of physical lines over which
data is sent simultaneously. A 32-wire ribbon cable can transmit 32 bits in parallel. The
term "width" is used to refer to the number of bits that a bus can transmit at once.
Additionally, the bus speed is also defined by its frequency (expressed in Hertz), the
number of data packets sent or received per second. Each time that data is sent or
received is called a cycle.
This way, it is possible to find the maximum transfer speed of the bus, the amount of
data which it can transport per unit of time, by multiplying its width by its frequency. A
bus with a width of 16 bits and a frequency of 133 MHz, therefore, has a transfer speed
equal to:
16 * 133.106 = 2128*106
bit/s, or 2128*106/8 =
266*106 bytes/s or
266*106 /1000 = 266*103 KB/s
or 259.7*103 /1000 = 266 MB/s
Architecture
In reality, each bus is generally constituted of 50 to 100 distinct physical lines, divided
into three subassemblies:
• The address bus (sometimes called the memory bus) transports memory
addresses which the processor wants to access in order to read or write data. It
is a unidirectional bus.
• The data bus transfers instructions coming from or going to the processor. It is a
bidirectional bus.
• The control bus (or command bus) transports orders and synchonisation signals
coming from the control unit and travelling to all other hardware components. It
is a bidirectional bus, as it also transmits response signals from the hardware.
Chipset
A chipset is the component which routes data between the computer's buses, so that all
the components which make up the computer can communicate with each other. The
chipset originally was made up of a large number of electronic chips, hence the name. It
generally has two components:
• The NorthBridge (also called the memory controller) is in charge of controlling
transfers between the processor and the RAM, which is way it is located
physically near the processor. It is sometimes called the GMCH, forr Graphic and
Memory Controller Hub.
• The SouthBridge (also called the input/output controller or expansion controller)
handles communications between peripheral devices. It is also called the ICH
(I/O Controller Hub). The tem bridge is generally used to designate a component
which connects two buses.
Bus Terminologies
Computers can be viewed to be having just two types of buses:
1. System bus:- The bus that connects the CPU to main memory on the motherboard. The
system bus is also called the front-side bus, memory bus, local bus, or host bus.
2. A number of I/O Buses, (Acronym for input/output), connecting various peripheral
devices to the CPU -these are connected to the system bus via a ‘bridge’ implemented
in the processors chipset. Other names for the I/O bus include “expansion bus",
"external bus” or “host bus”.
ISA Bus
This is the most common type of early expansion bus, which was designed for use in the
original IBM PC.The IBM PC-XT used an 8-bit bus design. This means that the data
transfers take place in 8 bit chunks (i.e. one byte at a time) across the bus. The ISA bus
ran at a clock speed of 4.77 MHz.
For the 80286-based IBM PC-AT, an improved bus design, which could transfer 16-bits of
data at a time, was announced. The 16-bit version of the ISA bus is sometimes known as
the AT bus. (AT-Advanced Technology)
The improved AT bus also provided a total of 24 address lines, which allowed 16MB of
memory to be addressed. The AT bus was backward compatible with its 8-bit
predecessor and allowed 8-bit cards to be used in 16-bit expansion slots.
When it first appeared the 8-bit ISA bus ran at a speed of 4.77MHZ – the same speed as
the processor. It was improved over the years and eventually the AT bus ran at a clock
speed of 8MHz.
EISA Bus
It was difficult to implement the VL-Bus on newer chips such as the 486s and the new
Pentiums and so eventually the VL-Bus was superseded by PCI.
VESA slots have extra set of connectors and therefore the cards are larger. The VESA
design was backward compatible with the older ISA cards.
The AGP uses the main PC memory to hold 3D images. In effect, this gives the AGP video
card an unlimited amount of video memory. To speed up the data transfer, Intel
designed the port as a direct path to the PC’s main memory.
Data transfer rate ranges from 264 Mbps to 528mbps, 800 Mbps upto 1.5 Gbps. AGP
connector is identified by its brown colour.
Personal Computer Memory Card Industry Association (PC Card)
The Personal Computer Memory Card Industry Association was founded to provide a
standard bus for laptop computers. So it is basically used in the small computers.
Small Computer System Interface
Short for Small Computer System Interface, a parallel interface standard used by Apple
Macintosh computers,PC's and Unix systems for attaching peripheral devices to a
computer.
Expansion slots:
These are sockets that expansion cards like network cards, sound cards, graphics cards
can be plugged into. There have been various types of slots over the years to cater for
increasingly complex expansion cards. The earliest cards were ISA, then came EISA, then
PCI and AGP (which have special high-priority access to the CPU - AGP is used by fast
graphic cards). All expansions slots connect to a bus so data can travel between
subsystems and the CPU.
Cache
Cache is a storage place (buffer or bucket) that exists between two subsystems in order
for data to be accessed more quickly to increase performance. Performance is increased
because the cache subsystem usually has faster access technology and does not have to
cross an additional bus. Cache is typically used for reads, but it is increasingly being
used for writes as well. For example, getting information to the processor from the disk
involves up to five cache locations:
1. L1 cache in the processor (memory cache)
2. L2 cache (memory cache)
3. Software disk cache (in main memory)
4. Hardware disk cache (common on SCSI controllers; EIDE usually uses only a FIFO
buffer) 5. Disk buffer
For reads, one subsystem will usually request more data than what is immediately
needed, and that excess data is stored in the cache(s). During the next read, the
cache(s) are searched for the requested data, and if it is found, a read to the subsystem
beyond the cache is not necessary.
Before installing the computer motherboard, make sure all the jumpers or dip switches
are correct. The jumpers and dip switches can be changed when the motherboard is
installed, but it is easier to verify them while the motherboard is outside of the case.
Today, motherboards have the jumpers set as auto, allowing either the BIOS or the
software to setup the proper settings for the CPU and memory and other settings. If the
motherboard supports this feature, make sure the jumpers are set to auto. If you want to
adjust the settings manually for your peripherals, make sure you are using acceptable
settings. Although you may be able to overclock a system, it is recommended you use
auto or the real values of the system first to make sure the system works before
tampering with its settings.
to prevent the motherboard from shorting out and must be inserted before installing the
motherboard.
When installing the pegs or standoffs make sure to insert them into the proper holes.
Many cases support different motherboard form factors, and if not placed in the proper
holes, it may cause damage to the motherboard. The holes on the case have a small
indication of what the holes are for; for example, a hole may have the words ATX
listed next to it to indicate the hole is for an ATX motherboard.
As the standoff is being installed, make sure they are installed firmly into the case to help
prevent issues such as the pegs coming loose when unscrewing the screw from the peg.
Motherboard Installation
After the standoffs are attached and the I/O plate is in place, install the motherboard into
the case and make sure you align the back of the motherboard with the back of the case.
As the motherboard is being installed align the holes in the motherboards with the pegs
or standoffs.
Once aligned, begin placing screws into the motherboard that should go into the peg or standoff
inserted earlier.
Caution: when screwing in the screw you do not want the screw to be too tight. If
tightened too much it can cause the motherboard to crack. However, the screw should be
in enough to hold the motherboard in place.
Install essential components
If not already installed, install the below necessary
components into the computer.
Front Panel Setup
Once the motherboard has been successfully physically
installed into the computer, the Fpanel (short for front panel
connectors) must be connected. This panel controls such
things as the power button, reset button, hard drive light, and
power light.
Unfortunately, the setup of this panel can be confusing at first,
even with the instructions provided from the motherboard
manufacturer. Below are steps and additional information and
help with successfully connecting the cables to this connector.
1. This connector consists of a series of two pin
connectors.
2. The cables that connect to the connector are 2, 3 or
4pin connectors.
3. The cables consist of red, green, blue, white or another
color cable with a black cable. This may vary, the
important thing to remember is that the black cable or
the dark color of the cable is ground or '-'.
4. Most cases have a separate cable for each setting, but some computers now have all of
these cables as one large connector. If the computer has one large connector, it only
connects in one direction. If you are installing a new computer motherboard into an
OEM case that uses a large connector, it may not work with your motherboard since it
could be proprietary.
5. Finally, the computer cannot boot if one or more of the cables is not properly
connected. If you are unable to turn on the computer or receive no post, check these
cables first.
Connect Cables
Once the front panel cables are connected, connect the other cables in the below order.
1. Connect the main motherboard ATX style power cable coming from the power supply
to the motherboard.
Note: Connect the cables in the right direction and never force the cable. If
improperly connected, it can damage the motherboard. Today, ATX and other
motherboard form factors have a keyed power supply connector that allows the
cable to be connected in only one direction.
2. Next, connect the IDE/EIDE, SATA, or SCSI cables to the motherboard from the hard
drive, CD Drive, floppy drive.
3. Connect the Molex power cables from the power supply to each of the drives in the
computer.
CMOS setup
Once the motherboard has been successfully installed and connected into the computer,
connect the keyboard, monitor, and power to the computer. Do not connect all of the cables
yet in case you encounter problems and need to disconnect all the cables again. Once the
computer boots enter CMOS setup and set all of the values not automatically detected. We
recommend you check or set the below values.
1. CPU Settings - make sure the proper CPU speed and voltage is shown or that it is set to
auto.
2. Memory - make sure the memory settings are right, and all memory is detected.
3. Drives - verify the floppy, hard drive, and CD-ROM drive are all shown.
4. If onboard video, modem, network, or sound is on your motherboard and you want to
them disabled for an expansion card you are installing, disable these devices now.
5. Check other settings such as the time, date, and COM ports.
Once everything has been properly detected and setup, save the settings, then exit CMOS
setup and reboot the computer.
Microprocessors
A microprocessor is a computer processor that incorporates the functions of a
computer's central processing unit (CPU) on a single integrated circuit
(IC),http://en.wikipedia.org/wiki/Microprocessor or at most a few integrated circuits
Introduction/Overview
A processor, or "microprocessor," is a small chip that resides in computers and other
electronic devices. Its basic job is to receive input and provide the appropriate output. While
this may seem like a simple task, modern processors can handle trillions of calculations per
second.
The central processor of a computer is also known as the CPU, or "central processing unit."
This processor handles all the basic system instructions, such as processing mouse and
keyboard input and running applications.
Three basic characteristics differentiate microprocessors:
• Instruction set: The set of instructions that the microprocessor can execute.
Bandwidth : The number of bits-processed in a single instruction. The amount of data
that can be transmitted in a fixed amount of time
• Clock speed : Given in megahertz (MHz), the clock speed determines how many
instructions per second the processor can execute.
In both cases, the higher the value, the more powerful the CPU. For example, a 32-bit
microprocessor that runs at 50MHz is more powerful than a 16-bit microprocessor that
runs at 25MHz.
Specifications
Important specifications to consider when selecting microprocessor chips (MPU)
include:
• Data bus - Most microprocessor chips are available with an 8-bit, 16-bit, 24-bit,
32-bit, 64-bit, 128-bit, or 256-bit data bus.
• Microprocessor family - Products from many proprietary microprocessor
families are commonly available.
• Supply voltage - Supply voltages range from - 5 V to 5 V and include
intermediate voltages such as - 4.5 V, - 3.3 V, - 3 V, 1.2 V, 1.5 V, 1.8 V, 2.5 V, 3 V,
3.3 V, and 3.6 V.
• Clock speed - Clock speed, the frequency that determines how fast devices
connected to the system bus operate, is generally expressed in megahertz
(MHz).
• Random access memory (RAM) - RAM is usually expressed in kilobytes (kB) or
megabytes (MB).
• Power dissipation - Power dissipation, the device's total power consumption, is
generally expressed in watts (W) or milliwatts (mW).
• Operating temperature - Operating temperature is a full-required range.
The outer covering of the processor protects its core (also called the die) that contains the
microchip and the wiring that connects the chip to the processor's mounting pins. A
variety of packaging types have been used on processors. Here are the basic types.
1) Pin Grid Array (PGA): Common among early processors, the mounting pins are
located on the bottom of the chip in concentric squares. The earliest chips were
packaged in the Ceramic PGA (CGPA). Later chips , including some current
ones, use the Plastic PGA (PPGA). The early Pentium chips used a variation that
staggered the pin pattern (in order to cram more pins onto the package) called the
Staggered PGA (SPGA). The Pentium III features a variation of the PGA package
with its Slot 370-like Flip Chip-Pin Graphics Assembly (FC-PGA)
2) Plastic Ball Grid Array (PBGA): The Primary difference between this packaging
technology and the PGA is that the PBGA doesn't have mounting pins projecting
from the bottom of the chip, which eliminates the threat of bent pins on the
bottom of the processor. Otherwise, these package styles look similar.
3) Single Edge Connector (SEC): You may find a few variations on the packageing
technology, including the Single Edge Contact Cartridge (SECC) and others.
They all boil down to a packaging style that is mounted perpendicular to the
motherboard into a single slot, much like expansion cards and memory modules.
The Pentium II was the first processor to sport this new packaging style. This
style made cooling the processor easier.
questions to answer are these: When is the right time for me to upgrade a CPU? What
processor will give me the best bang for the buck?
Complicating the matter for Intel CPU users is the plethora of socket formats that may be
involved. At last count, Intel had four active socket formats for desktop PCs:
Choosing a replacement processor
Socket type, motherboard compatibility, and other factors limit the range of suitable
upgrade processors. Even with those limitations, though, you'll likely have at least
several and possibly dozens of processors to choose among. Microprocessor
manufacturers
There are a bunch of microprocessor manufacturers but Intel and AMD are the major
producers and distributers in the microprocessor market.
Intel - Intel is the leading microprocessor manufacturer. Its microprocessors include
the Pentium, Celeron and Core lines. Intel Corporation is an American multinational
technology company headquartered in Santa Clara, California. Intel is one of the world's
largest and highest valued semiconductor chip makers, based on revenue. It is the
inventor of the x86 series of microprocessors, the processors found in most personal
computers.
AMD - AMD is Intel's main microprocessor rival. Its microprocessors include the
Athlon, Turion and Phenom lines. Advanced Micro Devices, Inc. (AMD) is an
American worldwide semiconductor company based in Sunnyvale, California, United
States, that develops computer processors and related technologies for business and
consumer markets.
LGA and PGA can be understood as opposites. LGA stands for land grid array and
consists of a socket with pins on which the processor is placed. PGA, on the other hand,
places the pins on the processor, which are then inserted in a socket with appropriately
placed holes. Intel uses the former while AMD uses the latter.
Then there’s BGA, which stands for ball grid array. This technique is used to permanently
attach a processor to its motherboard during production, making future upgrades
impossible. BGA is typically less expensive and requires less physical space than a
socket-able processor.
BGA technically is not technically a socket because it’s permanent. It’s worth mentioning
however, because it serves the same function and may become the socket’s
replacement. Intel will start to ship more processors with BGA packaging by 2014 and
ARM processor manufacturers, like Qualcomm and Nvidia, already rely heavily on BGA.
CHAPTER 5
Memory
Memory is the electronic holding place for instructions and data that your computer's
microprocessor can reach quickly. When your computer is in normal operation, its memory
usually contains the main parts of the operating system and some or all of the application
programs and related data that are being used.
Memory is sometimes distinguished from storage, or the physical medium that holds
the much larger amounts of data that won't fit into RAM and may not be immediately
needed there.
Types of Memories
1. Random access memory, generally called RAM is the system's main memory, i.e. it is a
space that allows you to temporarily store data when a program is running.
Unlike data storage on an auxiliary memory such as a hard drive, RAM is volatile,
meaning that it only stores data as long as it supplied with electricity. Thus, each time
the computer is turned off, all the data in the memory are irremediably erased.
2. Read-only memory, called ROM, is a type of memory that allows you to keep the
information contained on it even when the memory is no longer receiving electricity.
Basically, this type of memory only has read-only access. However, it is possible to save
information in some types of ROM memory.
DIMMS
Dual In-line Memory Modules, or DIMMs, closely resemble SIMMs. Like
SIMMs, most DIMMs install vertically into expansion sockets. The principal difference
between the two is that on a SIMM, pins on opposite sides of the board are "tied
together" to form one electrical contact; on a DIMM, opposing pins rem a in electrically
isolated to form two separate contacts.
168-pin DIMMs transfer 64 bits of data at a time and are typically used in computer
configurations that support a 64-bit or wider memory bus. Some of the physical
differences between 168-pin DIMMs and 72-pin SIMMs include: the length of module,
the number of notches on the module, and the way the module installs in the socket.
Another difference is that many 72-pin SIMMs install at a slight angle, whereas 168-pin
DIMMs install straight into the memory socket and remain completely vertical in
relation to the system motherboard. The illustration below compares a 168-pin DIMM to
a 72-pin SIMM.
SO DIMMS
A type of memory commonly used in notebook computers is called SO DIMM or Small
Outline DIMM. The principal difference between a SO
DIMM and a DIMM is that the SO DIMM, because it is intended for use in notebook
computers, is significantly smaller than the standard DIMM. The 72-pin SO DIMM is 32
bits wide and the 144-pin SO DIMM is 64 bits wide.
Memory-Mapping
What Is Memory-Mapping?
Benefits of Memory-Mapping
The principal benefits of memory-mapping are efficiency, faster file access, the ability to share
memory between applications, and more efficient coding.
Accessing files via memory map is faster than using I/O functions such as fread and
fwrite. Data are read and written using the virtual memory capabilities that are built in
to the operating system rather than having to allocate, copy into, and then deallocate data
buffers owned by the process.
Efficiency
Mapping a file into memory allows access to data in the file as if that data had been read
into an array in the application's address space. Initially, As a result, memory-mapped files
provide a mechanism by which applications can access data segments in an extremely
large file without having to read the entire file into memory first.
There are a few different kinds of mappings that can be specified in the map attribute. All
use the format described in the previous section.
Device Mapping: The most common kind of mapping. It is used for devices, RAM and ROM
objects. The target field is not set.
Translator Mapping: Sometimes the address has to be modified between memory-spaces,
or the destination memory-space depends on the address or some other aspect of the
access such as the initiating processor. In these cases a translator can be used. A
translator mapping is specified with the translator in the object field, and the default
target as target. The translator has to implement the TRANSLATE interface. When an access
reaches a translator mapping, the translate function in the TRANSLATE interface is called.
The translator can then modify the address if necessary, and specify what destination
memory-space to use. If it doesn't specify any new memory-space, the default one from
the configuration is used. The following fields can be changed by the translator:
physical_address, ignore, block_STC, inverse_endian and user_ptr.
Translate to RAM/ROM Mapping: Used to map RAM and ROM objects with a
translator first. The object field is set to the translator, and target is set to the RAM/ROM object.
Space-to-space Mapping: Map one memory-space in another. Both object and target should
be set to the destination memory-space object.
Bridge Mapping: A bridge mapping is typically used for mappings that are setup by some
kind of bridge device. The purpose of a bridge mapping is to handle accesses where
nothing is mapped, in a way that corresponds to the bus architecture. For a bridge
mapping, the object field is set to the bridge device, implementing the BRIDGE interface.
The target field is set to the destination memory-space.
If you are experiencing any of these symptoms, a memory upgrade may be in order.
It's easy to tell how much memory is installed on your system and how much is being used.
Hardware Tips: Choose the Right Kind of Memory for Your System
Adding RAM to your PC usually delivers the most bang for your upgrade buck, but only
if you buy the right kind of memory module for your PC. There are more types of PC
RAM than there are lattes at Starbucks: Do you want SDRAM, PC100, non-parity, or un-
buffered DIMM? Why not enjoy a refreshing DDR SDRAM, PC2700, CL2.5, or
registered DIMM? Here are the ins and outs of PC memory.
Begin by checking your system's user manual to identify the types of RAM your PC's
motherboard supports. If you don't have the manual, visit the manufacturer's Web site and
search for downloadable manuals or other tools that might help you find the information
you need.
RAM and connector types: Determine which of the four types of RAM your system
uses: DRAM (EDO or FPM), SDRAM, DDR SDRAM, or RDRAM. All four types are
mounted on one of three module types: SIMM, DIMM, or RIMM.
Most machines support only one type of RAM and have one type of module or connector,
so mixing types isn't an option. The few motherboards that do accept two types of RAM
allow only a single type to be used at any one time.
Memory speed: SDRAM, DDR SDRAM, and RDRAM are rated to match or exceed the
PC's front side bus speed, which is the speed at which data moves between the CPU and
RAM. If your system comes with PC66 SDRAM, you can use PC100 SDRAM to
replace it and get the faster speed, as long as your PC's front side bus supports the higher
rate. But if you mix RAM of different speeds, all RAM will operate at the speed of the
slowest chip.
Memory banks: On some PCs, the memory slot closest to the CPU--usually called bank 0--
must be filled before the motherboard's other memory slots. On other systems, bank 0 must
have the largest RAM module (if you are using modules of different sizes). There's no
fixed rule, so check your PC's documentation.
Non-parity or ECC: If your system supports error-correcting code (ECC) and has more
than 512MB of RAM, buying ECC memory may be worth the added cost. Large
amounts of RAM are more likely to experience occasional, random errors (which may be
caused by cosmic rays, among other sources). However, unless your current RAM is
ECC, forget it; you can use non-parity and ECC modules together, but error correction
will be disabled.
To determine your type of memory, count the number of chips on the memory module. If the
number is divisible by three, you have ECC or parity memory.
Column address strobe: The lower the CAS rating--or the CL rating--is, the better.
SDRAM comes in CL2 or CL3 types, and DDR SDRAM comes in CL2 or CL2.5.
Unless your motherboard requires a specific CAS or CL rating, get the lower (faster)
rated module. Cost differences should be negligible. Again, if you mix modules of
different speeds, they'll all operate at the slowest module's speed.
CHAPTER 6
Primary Storage Devices: Generally smaller in size, are designed to hold data temporarily
and are internal to the computer. They have the fastest data access speed, and include
RAM and cache memory. Secondary Storage Devices: These usually have large storage
capacity, and they store data permanently. They can be both internal and external to the
computer, and they include the hard disk, compact disk drive and USB storage device.
Note: A disk is a device on which data is stored while a drive is a device used to record/read
from a disk. Some devices incorporate the disk and drive together (i.e. Hard drive/hard disk
drive) but others are in separate (i.e. CD/Floppy disks and drives)
The following are some examples of types of storage devices used with computers.
Magnetic storage/disks devices - Today, magnetic storage is one of the most common
types of storage used with computers and is the technology that many computer hard
drives use. It uses magnetism as its method of reading and writing data.
• Floppy diskette
• Hard drive
• Super Disk
• Tape cassette
• Zip diskette
Optical storage/disks devices - Another common storage is optical storage, which uses
lasers and lights as its method of reading and writing data.
• Blu-Ray disc
• CD-ROM disc
• CD-R and CD-RW disc
• DVD-R, DVD+R, DVD-RW, and DVD+RW disc
Storage/Disk organization
If data needs to be kept whilst a computer is turned off then it must be stored on
backing store. Any programs or data that are not currently being used by a
computer will be kept on backing store. When programs or data are used they
are copied (loaded) into main memory
(RAM) for faster access.
The purpose of storage in a computer is to hold data and get that data to the
CPU as quickly as possible when it is needed. Computers use disks for storage:
most commonly, hard disks that are located inside the computer (non-
removable), and floppy or compact disks that are used externally (removable).
Three types of Backing Storage media we will overview in this topic are;
Magnetic, Optical and Electronic media.
It takes much longer to access data which is on backing store than data
which is in main memory, typically 100 to 1000 times as long.
This is because most backing storage devices operate mechanically. Computer
systems have much more backing store than main memory for two reasons:
1. Main Memory only needs to store programs and data that are currently
being used whereas the backing store needs to hold all of the programs
and data that can be
used on the computer.
2. Backing store is much cheaper per Mb than Main Memory.
Writing is the process of transferring these items from memory to a storage medium.
Data is usually accessed using read/write heads. These transfer the data
while the medium rotates in the drive
Access to backing store is slower that to main memory
They are non-volatile. The data is stored on the medium until it is deleted.
Magnetic Media
Magnetic tape
Usually (as in the picture above) several physical disks are contained in
one hard disk unit. Each disk is known as a platter. Typical hard disk
capacities for a home PC now start at up to 180 Gb.
Floppy Disks
Access to data is much slower than for hard disk. The data on the
disk can be protected by sliding a small write-protect tab which
prevents the contents of the disk from being changed.
The process of reading and writing to a hard or floppy disk is done with electricity and
magnetism. The surfaces of both types of disks can be easily magnetized. The
electromagnetic head of the disk drive records information to the disk by creating a
pattern of magnetized and non-magnetized areas on the disk's surface. Do you
remember how the binary code uses on and off commands to represent information?
On the disk, magnetized areas are on and non-magnetized areas are off, so that all
information is stored in binary code. This is how the electronic head can both write to or
read from the disk surface.
It is very important to always keep magnets away from floppy disks and away from your
computer! The magnets can erase information from the disks!
All magnetic disks are similarly formatted, or divided into areas, called
Tracks and Sectors. The formatting process sets up a method of assigning
addresses to the different areas. It also sets up an area for keeping the list
of addresses. Without formatting there would be no way to know what
data went with what.
Sectors - A
disk sector
is a
wedgeshap
e piece of
the disk.
Each sector
is
numbered.
Optical Media
An optical disk is a storage medium in which laser technology is used to record and
read large volumes of digital data.
Compact Disks
CD-ROM (Compact Disk - Read Only Memory) - The data is written onto the CD-
ROM disk before it is sold and can not be changed by the user. CD-ROMs are used for
applications such as distributing software, digital videos or multimedia products.
CD-R (Compact Disk - Recordable) - A CD-R disk is blank when it is supplied. The
user can write data to it just once. After data has been written to the disk it can not be
changed. CD-Rs are often used for making permanent backups of data and distributing
software when only a small number of copies are required.
CD-RW (Compact Disk - Rewriteable) - CD-RW disks can be read from and
written to.
DVDs
DVD-ROM (Digital Versatile Disk - Read Only Memory) - DVD disks are able to store
much more data than CD disks. The DVD standard includes disk capacities up to 30Gb.
DVD-ROM disks can be read from but can not be written to.
DVD-RAM (Digital Versatile Disk - Random Access Memory) - DVD-RAM disks have
all of the benefits of DVD-ROM disks and can be written to as well. These very high
capacity disks are ideal for producing backups.
Because of their high capacity, DVD disks are used to store high quality video such as
complete movies.
Disk management
Disk Management is an extension of the Microsoft Management Console that allows full
management of the disk-based hardware recognized by Windows.
You can use Disk Management in this version of Windows to perform disk-related tasks such as
creating and formatting partitions and volumes, and assigning drive letters.
The types of system utilities we’ll look at in this reading will allow you to perform these basic
tasks:
• disk scan
• disk defragment
• file back up
• file recovery
• get system information.
Figure 1: A diagram of a disk before and after a defragment. The picture on the left
displays a disk with lines (representing data) that have been randomly placed on the
disk. The picture on the right displays a disk after defragmentation — the lines (data)
now appear in a consecutive order.
Figure 2: A screenshot of the Disk Defragmenter utility provided with the Microsoft Windows
XP operating system
Backing up
Backing up means making a copy of your files, in case your computer hard disk fails and your
original files become ‘corrupted’. Although for the majority of time the computer’s hard disk
will not have any problems, occasionally a disk may fail unexpectedly. Some reasons why a hard
disk may fail include: a sudden power failure
• computer virus damaging the hard disk
• damaged caused by knocking or moving the hard disk.
Backups need to be done on a regular basis, so if there is a problem you will still have a recent
copy of your files. It is also a good idea to keep backups in another location away from your
computer. Make sure where you store your backup information is away from sunlight, dust and
magnetic fields.
Choosing a backup media
It is important to choose the most appropriate kind of media to backup data to. When choosing
media, be realistic; it is better to store backups using media that has a large capacity. Some
suggestions include:
• Second hard disk: Some computers may have a second hard disk available that will allow a
fast and easy method of backing up data.
• CD or DVD: Many computers have CD and DVD burners that will allow you to ‘burn’ data
onto a writeable CD or DVD.
• Zip disk: Zip disks are removable disks that hold between 100MB and 250MB of
information.
• Tape drive: A medium that may be used by a business to backup business information.
What should you backup?
Backup anything that you have created yourself — including documents, digital photographs and
video. All of these items will have no other way of being replaced if there are problems later on.
If there is a problem, you can always reinstall the operating system and the application software
using the original software CDs.
How often should you backup?
How often you backup will really depend on how often you use the computer and what is being
stored on the computer. If, for example, your computer contains important business information
that you are using everyday, it is a good idea to try to back up everyday. If, however, you only
use your computer occasionally to play games or write the odd letter, a backup will probably
only need to be done once a month.
How to perform a backup
Some operating systems include special backup utilities that make it easy for you to back up
important files. If you don’t have a backup utility already installed you could install a third party
program that is designed to do backups or manually copy and paste your files from the hard disk
to your backup device.
Backup programs allow you to easily select files that you want to back up, then they copy the
files to the chosen backup device. A backup program may also compress the files before they are
copied so you can fit more files onto the backup device.
Recovery
A recovery utility is used to undelete a file that has been accidentally deleted. Many operating
systems now include special recovery utilities to help you restore files that have accidentally
been removed. Microsoft Windows includes a Recycle Bin and Macintosh operating systems
include Trash. Both of these utilities allow you a second chance to undelete any files on the hard
disk.
There is also a recovery utility in recent version of Microsoft Windows called System Restore.
The System Restore utility keeps a regular log of all current settings so if, for example, a new
installation of a program is causing problems System Restore will be able to reset all settings
back to how they were before the installation.
SCSI - SCSI stands for Small Computer System Interface and used a parallel cable to attach both
internal and external devices. One of the benefits of SCSI interfaces is that multiple devices
could be chained together to a single port. Another benefit is that the interface includes features
like error checking and hand shake signals between devices.
IDE - IDE stands for Integrated Drive Electronics and refers more to the standard than the cable
type itself. The technology is also often referred to as ATA or PATA. ATA cables can only be up
to 18 inches in length and are fairly large and flat, which makes them a poor choice for external
devices, so the interface is mainly used for internal devices. The cable uses a combination of 40
or 80 wires in parallel.
SATA - SATA stands for Serial ATA and is an evolution of the original ATA (or IDE) interface.
The SATA interface is faster in speed, at up to 3GB/s. Another major benefit of the interface is
that the cables and connectors are much smaller, taking up less space inside a computer case and
not restricting air flow. There is an external version of SATA known as eSATA for connecting
external hard drives and other devices.
Interface cables have improved quite a bit over the years, but the basic concept of input and
output has remained mainly the same. New interfaces such as Thunderbolt have added even
faster transfer speeds and taken some of the benefits from multiple technologies to make an
improved connection.
Partition can be thought of as a division or "part" of a real hard disk drive. When you partition a
hard drive, you make it available to an operating system. Multiple partitions on a singe hard
drive appear as separate drives to the operating system.
A partition also is used to mean the division of certain kinds of secondary storage (such as hard
disk drives (HDDs)), via the creation of multiple sub-divitions. Partitions are logical containers
which are usually used to house file systems, where operating systems, applications, and data are
installed on. A single partition may span the entirety of a physical storage device.
Disk formatting is the process of preparing a data storage device such as a hard disk drive,
solid-state drive, floppy disk or USB flash drive for initial use.
The first part of the formatting process that performs basic medium preparation is often referred
to as "low-level formatting".
The second part, Partitioning is the common term for the part in the process in disc preparation,
making the data storage device visible to an operating system.
The third part of the process, usually termed "high-level formatting" most often refers to the
process of generating a new file system. In some operating systems all or parts of these three
processes can be combined or repeated at different levels and the term "format" is understood to
mean an operation in which a new disk medium is fully prepared to store files.
CHAPTER 7
Computer display
A computer monitor or a computer display is an electronic visual display for computers A
display device is an output device for presentation of information in visual or tactile form (the
latter used for example in tactile electronic displays for blind people). When the input
information is supplied has an electrical signal, the display is called an electronic display.
display adapter
A plug-in card in a desktop computer that performs graphics processing. Also commonly called a
"graphics card" or "video card," modern display adapters use the PCI Express interface, while
earlier cards used PCI and AGP. The display adapter determines the maximum resolution, refresh
rate and number of colors that can be displayed, which the monitor must also be able to support.
On many PC motherboards, the graphics circuits are built into the chipset, and a separate plug-in
card is not required.
Most people use computer monitors daily at work and at home. And while these come in a
variety of shapes, designs, and colors, they can also be broadly categorized into three types. If
you are not sure what these are and would like an introduction to the different types of computer
monitors then here we explain the three main types, as well as the pros and cons of each.
These monitors employ CRT technology, which was used most commonly in the manufacturing
of television screens. With these monitors, a stream of intense high energy electrons is used to
form images on a fluorescent screen. A cathode ray tube is basically a vacuum tube containing an
electron gun at one end and a fluorescent screen at another end.
While CRT monitors can still be found in some organizations, many offices have stopped using
them largely because they are heavy, bulky, and costly to replace should they break. While they
are still in use, it would be a good idea to phase these monitors out for cheaper, lighter, and more
reliable monitors.
The LCD monitor incorporates one of the most advanced technologies available today.
Typically, it consists of a layer of color or monochrome pixels arranged schematically between a
couple of transparent electrodes and two polarizing filters. Optical effect is made possible by
polarizing the light in varied amounts and making it pass through the liquid crystal layer. The
two types of LCD technology available are the active matrix of TFT and a passive matrix
technology. TFT generates better picture quality and is more secure and reliable. Passive matrix,
on the other hand, has a slow response time and is slowly becoming outdated.
The advantages of LCD monitors include their compact size which makes them lightweight.
They also don’t consume much electricity as CRT monitors, and can be run off of batteries which
makes them ideal for laptops.
Images transmitted by these monitors don’t get geometrically distorted and have little flicker.
However, this type of monitor does have disadvantages, such as its relatively high price, an
image quality which is not constant when viewed from different angles, and a monitor resolution
that is not always constant, meaning any alterations can result in reduced performance.
LED monitors are the latest types of monitors on the market today. These are flat panel, or
slightly curved displays which make use of light-emitting diodes for back-lighting, instead of
cold cathode fluorescent (CCFL) back-lighting used in LCDs. LED monitors are said to use
much lesser power than CRT and LCD and are considered far more environmentally friendly.
The advantages of LED monitors are that they produce images with higher contrast, have less
negative environmental impact when disposed, are more durable than CRT or LCD monitors, and
features a very thin design. They also don’t produce much heat while running. The only
downside is that they can be more expensive, especially for the high-end monitors like the new
curved displays that are being released.
Being aware of the different types of computer monitors available should help you choose one
that’s most suited to your needs. Looking to learn more about hardware in today’s world?
Contact us and see how we can help.
The quality of a CRT monitor depends largely on its resolution, dot pitch, and refresh rate. The
quality of an LCD monitor or display depends primarily on its resolution.
A CRT monitor’s screen is coated with tiny dots of phosphor material, called pixels, that glow
when electrically charged to produce an image.
Resolution, which describes the sharpness and clearness of that image, is related directly to the
number of pixels a monitor can display. The greater the number of pixels the display uses, the
better the quality of the image.
Dot pitch, a measure of image clarity, is the distance between each pixel on a display. The
smaller the distance between pixels (dot pitch), the sharper the image.
Refresh rate is the speed that a monitor redraws images on the screen. Refresh rate should be fast
enough to maintain a constant, flicker-free image.
The resolution of an LCD monitor or display generally is proportional to the size of the monitor
or display. That is, the resolution increases for larger monitors and devices.
1. Check to make sure your monitor is on! Some monitors have more than one power button
or switch - check to make sure they're all switched on.
2. Check for disconnected monitor power cable connections. Your monitor might be
working fine and your only problem may be a loose or unplugged monitor power cable.
Note: A disconnected monitor power cable could be the cause of your problem if your
monitor's power light is completely off.
3. Check for disconnected monitor data cable connections. Again, your monitor might be
turning on without a problem but no information can get to it because the cable that
connects your monitor to your computer is disconnected or loose.
Note: A disconnected monitor data cable could be the cause of your problem if your
monitor's power light is on but is amber or yellow instead of green.
4. Turn the monitor's brightness and contrast settings completely up. Your monitor might be
showing information but you just can't see it because these display settings are too dark.
Note: Most monitors today have a single onscreen interface for all settings, including
brightness and contrast. If it turns out that your monitor isn't working at all then you'll
likely not have access to this interface. An older monitor might have manual knobs for
adjusting these settings.
1. Test that your computer is working correctly by connecting a different monitor that you
are certain is working properly to your PC. Your monitor may be working fine but your
computer might not be sending information to it.
o If the new monitor you connected does not show anything either, proceed to Step
6.
o If the new monitor you connected does show information from your computer, proceed
to Step 7.
Important: When testing with the new monitor, make sure you use the data cable that
came with it and not the one from your original monitor.
1. Determine why your computer isn't sending information to your monitor. Since neither
monitor works, you now know that the computer is not sending information to the
monitor. In other words, you've proven that your computer is the reason that nothing
shows up on your monitor.
Chances are your original monitor is working fine.
2. Test your original monitor with a monitor data cable that you know is working. It's
possible that the monitor itself is working properly but it can't receive information from
the computer because the cable that connects the monitor to the PC is no longer working.
Note: If possible, test using the data cable from the monitor that you successfully tested
with in Step 5. If not, purchase a replacement monitor data cable to test with.
Note: The data cable on some older monitors are permanently connected to the monitor
and are not replaceable. In these cases, you'll have to skip this step and proceed to Step 8.
3. Replace the monitor.
WARNING: A computer monitor is not a user serviceable device. In other words - do not
open the monitor and attempt to repair it yourself. If you would rather have your dead
monitor serviced instead of replaced then please let a professional do it.
Fixing a computer with this problem could take anywhere from minutes to hours depending on
why exactly the computer isn't displaying anything on the monitor, which we'll figure out as we
troubleshoot the issue.
1. Test your monitor. Before you begin more complicated and time-consuming
troubleshooting with the rest of your computer, make sure your monitor is working
properly.
It's possible that your computer is working fine and your monitor is your only problem.
2. Verify that your PC has fully power cycled. In other words, make sure your computer has
completely reset - make sure that it's coming on from a completely powered-off state.
Often times a computer will appear to "not be on" when actually it's just having problems
resuming from either the Standby/Sleep or Hibernate power saving mode in Windows.
Note: You can power off your computer completely while in a power saving mode by
holding the power button down for 3 to 5 seconds. After the power is completely off, turn
on your PC and test to see if it will boot normally.
1. Troubleshoot the cause of the beep code if you're lucky enough to get one. A beep code
will give you a very good idea of exactly where to look for the cause of your computer
turning off.
If you don't resolve the problem by troubleshooting to the specific beep code, you can
always return here and continue with the steps below.
1. Clear the CMOS. Clearing the BIOS memory on your motherboard will return the BIOS
settings to their factory default levels. A BIOS misconfiguration could be why your PC
won't startup all the way.
Important: If clearing the CMOS does fix your problem, make sure any changes you
make in BIOS are completed one at a time so if the problem returns, you'll know which
change caused your issue.
2. Verify that the power supply voltage switch is set correctly. If the input voltage for the
power supply is not correct (based on your country) then your computer may not turn on
completely.
There's a good possibility that your PC wouldn't power on at all if this switch is wrong
but an incorrect power supply voltage might also prevent your computer from starting
properly in this way too.
3. Reseat everything possible inside your PC. Reseating will reestablish the various
connections inside your computer and is very often a "magic" fix to problems like this
one.
Try reseating the following and then see if your computer begins to display something on
screen: o Reseat all internal data and power cables
o Reseat the memory modules
o Reseat any expansion cards
Note: Unplug and reattach your keyboard and mouse as well. There isn't a great
possibility that the keyboard or mouse is causing your computer to not turn on fully but
we might as well reconnect them while we're reseating everything else.
1. Reseat the CPU only if you suspect that it might have come loose or might not have been
installed properly.
Note: I call this out separately only because the chance of a CPU coming loose is very
slim and because installing one is a sensitive task. This isn't a big concern if you're
careful, so don't worry!
2. Check for causes of electrical shorts inside your computer. This is often the cause of the
problem when the computer powers off by itself but certain shorts can also prevent your
computer from booting fully or showing anything on the monitor.
3. Test your power supply. Just because your computer's fans and lights are working does
not mean that the power supply is functioning properly. The PSU tends to cause more
problems than any other hardware and is often the cause of a computer not coming on all
the way.
Replace your power supply immediately if it fails any test you perform.
Important: I want to make this point very clear - do not skip a test of your power supply
thinking that your problem can't be the PSU because "things are getting power." Power
supplies can work in varying degrees - one that isn't fully functional needs to be replaced.
Tip: After replacing the power supply, assuming you do, keep your PC plugged in for 5
to 10 minutes prior to turning it on. This gives time for some recharging of the CMOS
battery, which may have been drained.
1. Start your computer with essential hardware only. The purpose here is to remove as much
hardware as possible while still maintaining your PC's ability to power on.
o If your computer starts normally with only essential hardware installed, proceed
to Step 11. o If your computer still isn't displaying anything on your monitor,
proceed to Step
12.
Important: This step is easy enough for a novice to complete, takes no special tools, and
could provide you with a lot of valuable information. This isn't a step to skip if, after all
the steps above, your computer is still not turning on completely.
2. Reinstall each piece of hardware that you removed in Step 10, one piece at a time, testing
after each installation.
Since your computer powered on with only the essential hardware installed, those
components must work properly. This means that one of the hardware components you
removed is causing your PC to not turn on properly. By installing each device back into
your PC and testing each time, you'll eventually find the hardware that caused your
problem.
Replace the nonworking hardware once you've identified it. These Hardware Installation
Videos should come in handy as you're reinstalling your hardware.
3. Test your computer's hardware using a Power On Self Test card. If your PC still isn't
displaying information on your monitor with anything but essential computer hardware
installed, a POST card will help identify which piece of remaining hardware is causing
your computer to not come on completely.
If you don't have and are unwilling to purchase a POST card, skip to Step 13.
4. Replace each piece of essential hardware in your computer with an identical or equivalent
spare piece of hardware (that you know is working), one component at a time, to
determine which piece of hardware is causing your computer to not come on all the way.
Test after each hardware replacement to determine which component is faulty.
Note: The average computer user doesn't have a collection of working spare computer
parts at home or work. If you don't either, my advice is to revisit Step 12. A POST card is
inexpensive and is a more reasonable approach than stocking spare computer parts.
5. Finally, if all else fails, you'll probably need to seek professional help from a computer
repair service or from your computer manufacturer's technical support.
Unfortunately, if you don't have a POST card or spare parts to swap in and out, you're left
not knowing which piece of your essential PC hardware is faulty. In these cases, you
have little option than to rely on the help of individuals or companies that do have these
resources.
Note: See the last tip below for information on getting more help.
CHAPTER 8
Assemble is the reversal of disassemble (correct togetherall separate parts to a complete unit)
Selection of computer upgrade (software and hardware) has to align with compatibility option
Software compatibility
Software compatibility can refer to the compatibility that particular software has running on a
particular CPU architecture such as Intel or PowerPC. Software compatibility can also refer to
ability for the software to run on a particular operating system. Very rarely is a compiled
software compatible with multiple different CPU architectures. Normally, an application is
compiled for different CPU architectures and operating systems to allow it to be compatible with
the different system. Interpreted software, on the other hand, can normally run on many different
CPU architectures and operating systems if the interpreter is available for the architecture or
operating system. Software incompatibility occurs many times for new software released for a
newer version of an operating system which is incompatible with the older version of the
operating system because it may miss some of the features and functionality that the software
depends on.
Hardware compatibility
Hardware compatibility can refer to the compatibility of computer hardware components with a
particular CPU architecture, bus, motherboard or operating system. Hardware that is compatible
may not always run at its highest stated performance, but it can nevertheless work with legacy
components. An example is RAM chips, some of which can run at a lower (or sometimes higher)
clock rate than rated. Hardware that was designed for one operating system may not work for
another, if device or kernel drivers are unavailable. For example, much of the hardware for Mac
OS X is proprietary hardware with drivers unavailable for use in operating systems such as
Linux.
2. Before opening the system case, be sure to turn off the system unit. Turn off and unplug the
AVR from the wall socket as well. After that, unplug all the cables connecting to the back of
the system unit. After clearing all the connected cables, put the system unit on an empty
working table.
3. Touch the unpainted part of your system unit with your bare hands to remove the ESD of your
body. This is an important part before opening your system case. You might destroy your
RAM, Chipsets and other components of your motherboard.
4. Remove the screws of the side cover opposite to the side where the ports are. By most system
cases, if you are facing the back of the system unit the right side cover is to be removed.
Return the screws back to the screw holes to avoid losing them.
5. Once the side cover is removed, turn your system side down where the opened side of the
system unit should be facing upward where you can comfortably look down on the inside of
your system case.
6. We are now ready to remove the components inside of the computer. The first thing we need
to do is remove the power supply. To be able to remove the power supply, remove first the
molex connectors (the white plastic connector at the tip of the wires of the power supply) or
the motherboard power connector, drive power connectors, the floppy drive power connector,
the sata power connectors and the four pin 12-volt motherboard connector. With all power
connectosr are removed from the motherboard and drives, the power supply is now ok to be
removed as well. Always have the removed components placed in a remote and safe place
away from where you are performing computer disassembly.
7. With the power supply removed, the data cable should be removed next. This includes IDE,
SATA, and floppy drive cables. Secure the removed data cables.
8. Next to remove are the RAM, Video Card and other card peripheral components. Again have
them secured in a safe place and put the screws back. Clean the connector edges of the card
peripherals by rubbing the gold colored edge moderately with a rubber eraser then brushing
off the shredding. Do not attempt to clean the edge by blowing or brushing it off with your
fingers. Our body is acidic and you might only cause the edges to tarnish faster.
9. Remove all drives. This will include your hard drive, cd/dvd drives, and the floppy drive.
10. Since all peripherals where removed, the next thing to do is to remove the front panel
connectors. This will include the USB, Front Panel (FP) and Audio header. If you are not sure
of which connector is being match to, write down or document the connections and orientation
of the connectors before removing them from the headers. Remember that not all
motherboards have the same header configuration so be careful and watchful while
documenting.
11. After removing the header connectors, we are now ready to remove the motherboard. To
remove the motherboard, locate first all the screws and lightly unscrew all screws alternately.
With this technique, we are reducing the risk of warping or bending our motherboard. It may
not have a large impact on the bending of the motherboard but still it does have even a little.
Upon lightly loosening all screws, remove all screws then. Remove the motherboard by
carefully and lightly pulling it away from the I/O shield. Why? because we need to free the
ports that are fitted from the holes in the I/O shield. After freeing the motherboard ports from
the I/O shield holes, lift up the motherboard and put it on the safe place.
12. Clean the system unit chassis with your brush, also clean your motherboard and the rest
of the peripherals being removed.
To Assemble
1. Provided that all peripherals are clean and ready. We are now going to assemble your
computer. In assembling back your computer, what we have done during disassembling is just
doing the reverse order to assemble it. Since the motherboard was last to be removed, it should
then be the first to put back. Remove the retaining screws from the standoff screws of the
motherboard and let the motherboard seat on it with the ports facing out towards the I/O
shield. Lightly push the motherboard to set its ports to the holes of the I/O shield. Put the
retaining screws on the motherboard screw holes but do not tighten it yet. Now be careful in
doing this one and if this is your first time doing it, it is best if you lend a hand for assistance.
Lightly push the motherboard towards to I/O shield and lightly tighten the motherboard
retaining screws alternately until all screws are tight enough but not too tight. This is to ensure
that your ports are protruding correctly out of the I/O shield.
2. Once the motherboard is secured, put back the FP, Audio, and USB header connectors as you
will be using your documentation for reference.
4. Connect back the RAM, Video Card and other card peripherals to its proper slot inserting it
properly and some cards will require screws to be secured.
5. The data cables (IDE, SATA, floppy cable) should be connected to its proper headers and
drives. Remember the proper configuration of the placement of the cables specially if you are
dealing with the IDE cables.
6. After the data cables are properly connected, put back the power supply and secure it with the
screws you removed earlier. After securing the PSU to the chassis, connect the power
connectors to the drives and the motherboard.
7. Once all peripherals are connected properly, have a final inspection by visually checking for
loose connection or improper connection. Once the system unit connections are thoroughly
checked and verified, connect the keyboard; the monitor, and the power connector then power
up the computer. This initial powering up of the computer while the side cover is open ensures
us that everything is ok before putting back the side cover. In case something goes wrong, we
can accessibly correct the problem right away. If everything is fine shutdown the computer,
unplugged the AVR and remove the cables connected to the back of your computer. Put the
side cover back.
8. Put the assembled computer back to its place and connect the rest of the cables and
connectors. Power it up and see if there are unusual effects of your disassembling/assembling
procedure done earlier.
Remember SAFETY. Do not neglect it. Neglect can cause catastrophic effects. I will be posting
some videos soon if I can buy a video cam early before December. :-) Enjoy disassembling and
assembling your computer safely and successfully.
Hardware, in the computer world, refers to the physical components that make up a computer
system.
There are many different kinds of hardware that can be installed inside, and connected to the
outside, of a computer.
Below is a list of external hardware and internal hardware that may be found with a
computer.
• Sound card - Alternatively referred to as a sound board or audio card, a sound card is
an expansion card or integrated circuit that provides a computer with the ability to
produce sound that can be perceived by the user through a peripheral device like speakers
or headphones.
• Video card - Alternatively referred to as a display adapter, graphics card, video
adapter, video board, or a video controller, a video card is an internal circuit board
that allows a display device such as a monitor to display images from the computer.
A hardware upgrade is any new hardware better than that which it replaced or additional
hardware that improves performance. A good example of a common hardware upgrade is a RAM
upgrade, where the user increases the computer's total memory. Another good example is a video
card upgrade, which is the act of removing an old video card and replacing it with a newer, better
one.
Benefits of a hardware upgrade
1. Performance increase, which make the overall computer run faster and more smoothly.
2. Capacity increase. For example, adding a new hard drive allows the computer to store
more information, and more memory increases the computers ability to run more.
3. It may be necessary to upgrade the computer to meet a program or games system
requirements.
It's important to understand at least the basics about what's going on inside your computer, and
what a hardware upgrade can and cannot do. You can't turn a slow computer into a fast one
simply by increasing the size of a hard drive. Likewise, upgrading the computer's processor
probably won't make a computer that's prone to crashing more reliable.
Be sure that your motherboard can support the new card you are
installing.
If you're running out of storage space, you can upgrade to a bigger
hard drive with more storage capacity.
A faster processor can help your computer run faster, but this is not
an easy upgrade and should be approached with caution. Keep in
mind that performance improvements with a faster processor may be
Processor negligible without sufficient RAM.
Advanced
(CPU)
When installing a new processor, the key consideration (besides
number of cores and speed) is finding one that will work with your
motherboard.
CRTs have relatively high concentration of lead and phosphors (not to be confused with
phosphorus), both of which are necessary for the display. The United States Environmental
Protection Agency (EPA) includes discarded CRT monitors in its category of "hazardous
household waste" but considers CRTs that have been set aside for testing to be commodities if
they are not discarded, speculatively accumulated, or left unprotected from weather and other
damage.
Debate continues over the distinction between "commodity" and "waste" electronics definitions.
Some exporters are accused of deliberately leaving difficult-to-recycle, obsolete, or
nonrepairable equipment mixed in loads of working equipment (though this may also come
through ignorance, or to avoid more costly treatment processes). Protectionists may broaden the
definition of "waste" electronics in order to protect domestic markets from working secondary
equipment.
The high value of the computer recycling subset of electronic waste (working and reusable
laptops, desktops, and components like RAM) can help pay the cost of transportation for a larger
number of worthless pieces than can be achieved with display devices, which have less (or
negative) scrap value. In A 2011 report, "Ghana E-Waste Country Assessment", found that of
215,000 tons of electronics imported to Ghana, 30% were brand new and 70% were used. Of the
used product, the study concluded that 15% was not reused and was scrapped or discarded. This
contrasts with published but uncredited claims that 80% of the imports into Ghana were being
burned in primitive conditions.
CHAPTER 9
Hardware and Software installation
Install means to put a program on your computer. Setup can mean to configure the program,
including various options
Before starting the installation we should make sure that the computer meets all the Hardware
requirements for installing Windows 7.
1. Windows 7 starter
2. Home basic
3. Home premium
4. Professional
5. Enterprise
6. Ultimate
The steps to install Windows 7 operating system are as follows:
1. Start your computer. Press f2 or delete at start up to enter the bios menu. Select First boot
device as ‘CD ROM’ if you installing from DVD ROM. Second boot device as ‘Hard
Disk’ so that the computer boots from Hard disk if OS is not in DVD ROM. Press f10 to
save your settings and select yes to restart your computer.
2. Insert the installation disc for Windows 7 and start your computer. The computer will ask
you to ‘Press any key to boot from CD/DVD’. Press any key on your keyboard and it will
start loading the operating system from the CD.
3. After loading windows 7 successfully, it opens an install window. Enter the Language
time & currency format and keyboard or input method. Click ‘Next’. The ‘Install
windows 7’ screen will appear.
4. Click ‘Install now’. Setup will start and you will see a message on the screen ‘Set up is
starting…’
5. Now it will show the License agreement screen. Check the ‘I accept the License terms’
and click ‘Next’. The ‘Install windows’ wizard will appear.
6. Select Custom (Advanced) option. The screen will prompt you to select the location to
install windows. Click drive option (Advanced menu). Click on ‘New’, you are then
asked to allot a size on the disk for installation. Enter the appropriate volume size and
then click ‘Apply’ to create partitions for the installation, click ‘Next’. Windows will start
the installation. Now the installation status screen appears. You will have to wait for the
following tasks to get complete.
1. Copying Windows
2. Expanding Windows files
3. Installing features
4. Installing updates
5. Completing Installation
6. The computer will restart several times during this process so do not worry.
7. After successful installation of Windows 7 it will ask you to specify the ‘computer
name’. It will also ask you enter a ‘User account’ and ‘Password’.
Enter the password in the respective field and also the password hint, click ‘Next’.
8. The setup key will open the ‘Product Key’ option. Enter the correct product key,
make sure that ‘Automatically activate windows when I am online’ check box is
selected and click ‘next’.
9. Now a window to set time on your computer will be displayed. Set the correct
‘Time Zone’, date and click ‘Next’ option.
10. The ‘Computer network location’ option will be displayed if your computer is
already connected to a network. Select ‘Network type’ and click ‘next’.
11. Windows will now finalize the setup and start to prepare your Windows 7
Desktop.
Upgrading to Windows 7
All the applications, data, settings and documents existed on the computer running windows vista
will be available in windows 7 after the upgrade. We should run windows upgrade advisor before
we start up gradation. Most of the applications which run in windows vista will run in windows
7. But some significant applications and hardware may not. This is called as compatibility issues.
Windows upgrade advisor will is an application which helps you in determining any applications
which may not run properly on windows 7. If any problem is occurred during the up gradation of
windows 7 it will automatically restore the previous operating system. If you are experiencing
any problem at the time of login then you can roll back you vista operating system manually. You
cannot upgrade a 64 bit version of windows 7 operating system to 32 bit version of windows 7
operating system. Also you cannot upgrade from Windows 7 ultimate edition to Windows 7
home premium.
Note: To install the operating system on the computer, if the operating system software came on a
CD or DVD disc, you need to configure your computer to boot to the CD/DVD disc drive. You
can change the boot sequence by accessing the computer BIOS and setting the CD/DVD drive to
be the first boot device. Some computers may also allow you to access the boot sequence directly
at computer start up, without entering the BIOS, by pressing a specific key on the keyboard. The
key to press differs for each computer, but is often either the Delete key or one of the Function
keys at the top.
If the operating system software came on a USB flash drive, you need to configure the computer
to boot to a USB device as the first boot device.
Once the computer is configured to boot to the proper device, the computer should load the
operating system installation program. The installation program will guide you through the install
process, asking you questions along the way to determine how to configure basic settings, like
date and time, the username for your user account on the computer, and if you want to enable
automatic operating system updates or not. Go through the installation steps, answering questions
and selecting the preferred options along the way.
Materials Needed:
- Computer
- CD or DVD drive
- Installation disc
- Internet connection
- Web browser
PROCEDURE
Step 1: The first most important step in software installation is to verify that the target system
meets the general hardware requirements of the application. Beginning the installation in a
computer machine which does not possess the minimum requirements can lead to either an
unsuccessful installation or failure of the program to run after installing it.
Step 2: Since programs in general are written to be Operating System dependent, make sure that
the version of the application you are installing corresponds to the Operating System platform
running on your machine.
Step 3: Aside from the general hardware requirements, some computer programs also have
software requirements prior to installation. Double check if you need to update or upgrade your
Operating System or if there is a need to download other tools or utilities.
Step 4: Once all the initial requirements have been met, make sure that there are no unnecessary
programs running before beginning the installation procedure. In some instances, applications
may require that the antivirus programs be disabled. Make sure that you are installing a
legitimate application before disabling your protection software.
Step 5: Software installation can be done either from the Internet (skip to step 8) or from an
installation disc provided by the software manufacturer. To install from the disc, simply open the
CD or DVD drive and insert the installer.
Step 6: A setup wizard window should be launched. In case there is none, open the Explorer and
navigate to the optical drive. Double click on either the Autorun or Setup file.
Step 7: Once the wizard is running, simply follow the prompts until the installation process is
completed. For novice users, accept the default values to minimize potential problems during the
procedure. Jump to step 10.
Step 8: For installation from the Web, launch your browser application and download the setup
file to your hard drive.
Step 9: After completion of the downloading process, run the setup program to execute the setup
wizard that will handle the automatic installation of the software. Do step 7.
Step 10: After the installation procedure has been completed and the setup wizard has
terminated, reboot your machine before launching the newly installed software.
Utility software is system software designed to help analyze, configure, optimize or maintain a
computer. It is a type of system software, used to support the computer infrastructure; [2] by
contrast with application software, which is aimed at directly performing tasks that benefit
ordinary users.
Types of utilities
• Disk partition editors divide an individual drive into multiple logical drives, each with
its own file system which can be mounted by the operating system and treated as an
individual drive.
• Disk space analyzers provide a visualization of disk space usage by getting the size for
each folder (including sub folders) & files in folder or drive. showing the distribution of
the used space.
• File manager provide a convenient method of performing routine data management,
email recovery and management tasks, such as deleting, renaming, cataloging,
uncataloging, moving, copying, merging, generating and modifying folders and data sets.
• Hex editors directly modify the text or data of a file. These files could be data or an
actual program.
• Memory testers check for memory failures.
• Network utilities analyze the computer's network connectivity, configure network
settings, check data transfer or log events.
• Package managers are used to configure, install or keep up to date other software on a
computer.
• Registry cleaners clean and optimize the Windows Registry by removing old registry
keys that are no longer in use.
• Screensavers were desired to prevent phosphor burn-in on CRT and plasma computer
monitors by blanking the screen or filling it with moving images or patterns when the
computer is not in use. Contemporary screensavers are used primarily for entertainment
or security.
• System monitors monitor resources and performance in a computer system.
• System profilers provide detailed information about the software installed and hardware
attached to the computer.
Note: Most of the utility programs come with operating system, in other cases the utilities may
be added as Driver programs or installed as ordinally Application programs
Materials Needed:
- Windows XP
- Hardware Components
- Tools
- Appropriate cables - Drivers
Step 1: The installation and troubleshooting of hardware into a computer system using the
Windows XP Operating System involves having to turn off the computer and unplugging it in
order to avoid being electrocuted in the process.
Step 2: Upon doing so, open the tower of the desktop computer using the proper tools such as a
screwdriver. Separate the case of the CPU or central processing unit from that of the
motherboard housing. It is also recommended that you have knowledge on properly putting back
the disassembled computer parts after the hardware installation.
Step 3: Having done this, insert the hardware into the appropriate slot located in the
motherboard. For instance, the new graphics card should be placed into the PCI slot and the
RAM would have to be put in one of the assigned RAM slots. Make sure that you press firmly so
that connection is good.
Step 4: Close the computer case upon the finishing the installation. Reconnect all the computer
cables, plug and then restart the computer.
Step 5: Once the computer has finished booting up and Windows XP loads, insert the disc in the
disk drive. Follow the installation disc’s provided instructions.
Step 6: Understand that there are a number of hardware solutions that are equipped with
capabilities for plug and play. They no longer require you to turn off the computer so that they
could be installed. You could just plug them into the computer and the Windows Operating
System automatically detects the hardware and enables it.
Step 7: For the purpose of ensuring that you are making the proper procedures at installing the
hardware, always read the instruction and guidelines of the manufacturer.
Step 8: The setup CD that comes with the hardware has the drivers needed in making your
installed hardware function. Oftentimes, Windows XP is capable of finding drivers in its
database. If you have the setup CD, use it by all means.
Step 9: Lastly, when troubleshooting certain problems that might arise, contact the customer
service department of your hardware manufacturer. When you are not technically proficient, do
not attempt to fix issues by yourself.
CHAPTER 10
Fault finding is the investigation of the cause of malfunction in machinery, especially electronic
equipment.
Troubleshooting is a form of problem solving, often applied to repair failed products or
processes on a machine or a system.
fault-finding involves taking a series of steps, varying from 5 to 8 steps, and then repeating these
steps until the problem is solved.
It is important to note that cyclic method rely on technicians formulating a hypothesis (probable
cause – step 3), and then testing the hypothesis (steps 4 and 5). If the desired outcome if not
achieved, the process is repeated (new hypothesis). Take a look at the following steps introduced
below:
Define Fault
Gather Details
Probable Cause
Implement Action
Plan
Observe Result
Solved?
No
Yes
Document
Strictly speaking, the above process only requires 7 steps for troubleshooting, but best-practice is
to update/create appropriate documentation – good quality documentation will only aid
faultfinding in the future!
Fault-finding decision trees
Quite often, IT support companies will develop fault analysis trees or fault finding decision trees.
Fault finding decision trees are aides for support people to use as guidelines when
troubleshooting.
With time, you will be able to create your own decision trees to help the fault-finding process.
The following is an example of a decision tree aimed at helping someone troubleshoot a network
access fault (i.e. user cannot log in or access her email).
Common Faults
Hardware faults
Apart from faults being classified as critical and non-critical, you will need to use other
classifications in order to aid the troubleshooting process. One of the typical classifications of
faults is whether the source of the fault is a hardware device or component, or whether the source
of the fault is found on software – system or application.
Hardware faults are reasonably easy to troubleshoot, as the symptoms of the fault are fairly
obvious. For example, if the power supply unit of a computer fails, the computer will not power
up. Sometimes though, hardware faults can be difficult if the fault and symptoms only appear
intermittently – that is, the fault is not present all the times. For example, some hardware
components only develop faults under certain conditions, such as when the temperature of the
device reaches a certain threshold.
Hardware faults sometimes can be rectified fairly quickly, by replacing the failed component.
Usually, technicians will have common Field-Replaceable-Units (FRU) available. FRUs are
simply common components that can be replaced on the field with reasonable ease. Examples of
FRU may include:
• Hard Disk Drives
• Floppy Disk Drives
• Optical Drives (CD, CDR, DVD etc)
• Memory (RAM)
• Sound Cards,
• Video Cards,
• Keyboard & Mouse
• Network Interface Cards
• Network Patch Leads
Software faults
As you might have guessed, software faults are those faults that are caused by a software
component. The software component may be part of the system’s software or may be
applications software.
Software faults sometimes can be tricky to troubleshoot. Even though the source of the problem
is found to be software, not always it is crystal clear which software component is actually
causing the fault.
System Software Faults – are those faults that are caused by system software. Generally
speaking, the operating system is regarded as system software. However, some application
software might also install some system components it needs to run, which could become [and
quite frequently are] the source of faults. The source of software faults can be caused by:
• Software components corruption
• System incorrect configuration
• Documented and undocumented bugs
• Compatibility issues (hardware and software)
System software faults can have system-wide implications, which might hinder the operations of
the whole system.
Application Software Faults – these types of faults are rooted in application software
components. Generally, these types of faults only affect the application software in question – the
rest of the system operates normally. Similar to system software faults the source of these faults
can be tracked down to one or more of the following reasons:
• Software components corruption
• Application incorrect configuration
• Documented and undocumented bugs
• Compatibility issues (hardware and software)
Security-related faults
These faults are faults that develop in systems, and might have their source in hardware,
software, configuration or design.
More often than not, security related faults are the consequence of:
• Other faults (for instance, a hardware fault with a firewall device might expose systems
that would normally be protected by the firewall device)
• improper configuration,
• un-patched software bugs
• system design flaws
• undiscovered security holes/backdoors
Generally, the occurrence of any of the above issues, will result in security being compromised,
possibly exposing confidential and private information. Generally, to rectify this type of fault
requires engaging personnel with expertise in the area.
Security faults are sometimes referred to as ‘exploits’ since, the security fault does not in itself
represent a real threat unless someone malicious discovers and chooses to exploit the fault. It is
imperative that proactive action be taken to minimise the effect of security compromises.
Computer diagnosis
Using utilities
There is a range of utilities which produce an output or feedback that are commonly used for
troubleshooting purposes. Many fault-finding tools, particularly command-line utilities, do not
generally produce exhaustive reports for analyse. Instead they produce a small message to
confirm the success [or otherwise] of an action.
For example the ping command simply sends a series of requests to a network destination and
reports whether the requests were successful or not. It may report on data such as response-time
(how long it took our request to be answered), but the tool will not produce an exhaustive report.
Please analyse the following sample of using the Ping tool from the command line.
The following is another example of a utility that performs a task and generates incidental
information, which although not comprehensive, is certainly very useful. The utility presented
here is the ‘Format’ command.
Debug/auditing features
Many computer operating systems and applications feature a ‘Debugging’ facility. If you are not
familiar with debugging, it is a concept borrowed from programmers aimed at getting the
systems to produce as much information as possible, in a stepped-through way, with the aim of
capturing lots of information which might help get rid of ‘bugs’ or design/flaws. The concept of
debugging has filtered through many areas of IT and today many systems feature debugging as a
standard troubleshooting tool which can be turned on as needed.
Additionally, many network hardware components such as high-end switches and routers, feature
debugging. They are able to debug since many managed network devices run an actual operating
system. For example, Cisco routers and switches run an operating system called the IOS which,
allows full debugging support.
Debugging usually is a fairly intense process which generates lots of information (sometimes
more than one can handle!), putting additional processing demands on the systems; therefore,
debugging is usually only enabled when troubleshooting is required. Data/Information produced
by debugging can either be output to the screen (which means you have to be in front the actual
screen), or more commonly redirected to a database system, where data can be stored for later
viewing and analysis.
Another feature that can be useful for gathering and collecting useful system information is
auditing. Auditing is usually is not turn on by default, because as in with debugging, the amount
of information being generated is great; hence, auditing is usually only enabled for specific data
gathering requirements - i.e. when a technician is trying to get to the bottom of an elusive fault.
Windows 2000/XP/2003 allow you enable auditing by turning on a policy (usually called a
Group Policy Object (GPO). A GPO gives you control of certain aspects of the system which you
may audit. The following image is a sample of a GPO in Windows XP.
The resulting event audit information can be viewed in an event log, accessible via the Windows
Event Viewer. See example below.
CHAPTER 11
Computer support
Technical support (often shortened to tech support) refers to a plethora of services by which
enterprises provide assistance to users of technology products such as mobile phones, televisions,
computers, software products or other informatic, electronic or mechanical goods. In general,
technical support services address specific problems with a product or service rather than the
provision of training, customization, or other support services.
Most companies offer technical support for the products they sell, either freely available or for a
fee. Technical support may be delivered over by e-mail, live support software on a website, or a
tool where users can log a call or incident. Larger organizations frequently have internal
technical support available to their staff for computer-related problems. The Internet can also be
a good source for freely available tech support, where experienced users help users find solutions
to their problems. In addition, some fee-based service companies charge for premium technical
support services.
There are some "good housekeeping" procedures that you should carry out regularly:
These are guidelines and advice on good working practices, some of which are practical and
some legal or standards-based; most are liable to change over time.
IT Services does not have the resources to support everything computer-related: you must use the
hardware, software and network services supported by us whenever possible.
If you install hardware or software other than that recommended by IT Services on your own
equipment you must be prepared to manage and support this yourself.
Network(ed) services
For security and efficiency, our network infrastructure and servers require central management,
provided by IT Services: you must not set up unauthorized servers or connect unauthorized
equipment.
Physical security
If you leave your computer unattended you should try to secure it from unauthorised access. If
possible lock your room when away from it. If you share a computer you should always log out
of your account before your colleague uses the computer.
Electronic security
You should keep always keep your system up to date by downloading security patches from
Microsoft or Apple. IT Services holds a site license for F-Secure anti-virus software. If you
have no anti-virus software on your PC, you should download and install a copy of FSecure.
Virus definition databases are regularly updated and must be downloaded frequently (every
one or two days).
Passwords
Your University username and password allow you to access your email, home directory disk
space, and protected University web pages and systems. You must keep your password secret;
never share it with anyone. If you need shared access to email (for example, if you are in a
research or administrative group) create a shared email account with a shared password; don't
give anyone your own personal password.
If you forget your password or have problems logging in, consult the IT Service Desk. If you
think someone else has discovered your password, change it immediately using the 'password
changing page'. You are responsible for the use and security of this account.
Make your passwords as difficult as possible to crack: do not use real names, car registration
numbers, etc.
Never use your University account password for your personal or administrator-level computer
logins and, wherever possible, do not set administrator privileges on your own computer account.
While working on a document save your changes frequently. Unless you are saving the
document in your home directory you must make a backup copy at the end of each day's editing
session. Avoid overwriting the previous day's version by giving each day's version a different
filename.
As an employer, you have certain obligations in relation to training your staff. You need to ensure
that staff are trained to do their jobs safely and, in certain industries, you may be legally obliged
to provide staff with specific training.
To implement the right training for your business, you need to identify your business and
employee training needs. You can do this yourself, or you can recruit a human resources (HR)
consultant or training organization to help you assess your training needs and advise on training
options.
Your staff training program should be described in your business plan. You need to make sure
you know what training your staff need, how much it will cost you and how frequently you will
offer it. You should also decide how often you will undertake staff performance reviews.
If you decide to exit your business or hand it over to a family member, training may be an
important part of your succession planning. In your business plan, you should:
• assess your business goals and the skills you need to meet them
• work out if you are on track to achieve your goals, and identify any gaps
• think about whether your staff are happy in their jobs, and if your customers are happy
with your products and services
• consider how you are doing compared to your competitors
• review any existing training
• Identify areas that need improvement and find out who may benefit from training (e.g.
staff may need more knowledge of your products and services or your business
processes).
Close collaboration and open communication between management and staff on training issues
improves working relationships and, in most cases, productivity.
When you are assessing your training needs, you should ask your staff what sort of training they
want or need. You can talk to them in one-on-one interviews or in a group meeting.
Engaging your staff in the process will help you make sure the training is suitable and that staff
are likely to want to participate. This will help both you and your staff get the most out of
training. You may also consider undertaking a staff skills assessment as part of performance
planning, to work out what training individual staff members need.
Once you have reviewed your business plan and discussed training with your staff, you should
update your business plan with a new training program. Make sure you consider whether any
imminent changes in your business will make training necessary for any of your staff.
Record your staff feedback, taking note of any training needs or requests. Work out how each
type of training would be delivered, such as on-the-job, internally, or with an external training
provider. Include details of all of the courses scheduled and the staff who are participating, as
well as the dates, venues and times.
Let staff know what training you have booked for them. Communicate the training program to all
staff so they are aware of what is happening in your business. Make sure you offer all staff equal
opportunities for training and that you are not breaching anti-discrimination laws by excluding
any staff. You should also take the opportunity to identify training opportunities during staff
performance reviews.
CHAPTER 12
System selection and acquisition
The systems come with hardware, software and support. Today, selecting a system is a serious
and time-consuming business.
There are several factors to consider prior to system selection :
1. Define the system capabilities that make sense for business. Computers have proven valuable to
business in the following areas:
• Cost reduction includes reduction of the inventory, savings on space and improved ability
to predict business trends
• Cost avoidance includes early detection of problems and ability to expand operations
without adding clerical help.
• Improved service emphasizes quick availability of information to customers, improved
accuracy and fast turnaround
• Improved profit reflects the bottom line of the business and its ability to keep receivables
within reason.
2. Specify the magnitude of the problem, that is, clarify whether selections consist of a few
3. Assess the competence of the in-house staff. This involves determining the expertise needed in
areas such as telecommunications and data base design. Acquiring a computer often results in
securing temporary help for conversion. Planning for this help is extremely important.
4. Consider hardware and software as a package. This approach ensures compatibility. In fact,
software should be considered first, because often the user secures the hardware and then
wonders what software is available for it.
5. Develop a schedule for the selection process. Maintaining a schedule helps keeps the project
under control.
6. Provide user indoctrination. This is crucial, especially for first-time users. Selling the system to
the user staff, providing adequate training, and preparing an environment a conductive to
implementation are pre- requisites for system acquisition.
The selection process should be viewed as a project, and a project team should be organized with
management support. In larger projects, the team includes one or more user representatives, an
analyst and EDP auditor, and a consultant. Several steps make up the selection process:
1. Requirement Analysis 2. System Specification
In selecting software, the user must decide whether to develop it in house, hire a software
company or contract programmer to create it, or simply acquire it from a software house. The
choice is logically made after the user has clearly defined the requirements expected of the
software. Therefore, requirements analysis sets the tone for software selection.
2. System Specifications: Failure to specify system requirements before the final selection almost
always results in a faulty acquisition. The specifications should delineate the user’s requirements
and allow room for bids from various vendors. They must reflect the actual applications to be
handled by the system and include system objectives, flowcharts, input-output requirements, file
structure and cost. The specifications must also describe each aspect of the system clearly,
consistently and completely.
3. Request for Proposal: After the requirements analysis and system specifications have been
determined, a request for proposal is drafted and sent to selected vendors for bidding. Bids
submitted are based on discussions with vendors. At a minimum, the RFP should include the
following :
1. Complete statement of the system specifications, programming language, price range, terms
and time frame.
4. Evaluation and validation: The evaluation phase ranks vendor proposals and determines the
best suited to the user’s needs. It looks into items such as price, availability and technical
support. System validation ensures that the vendor can match his/her claims, system
5. Vendor selection: This step determines the winner – the vendor with the best combination of
reputation, reliability, service record, training, delivery time, lease finance terms and conversion
schedule. Initially a decision is made which vendor to contact. The sources available to check on
vendor includes the following:
made to determine how closely the new system conforms to plan. System specifications and user
requirements are audited to pinpoint and correct any differences Software selection:
Software selection is a critical aspect for system development. There are 2 ways of acquiring the
software.
• Custom -made
• Packages
Reliability – It is the probability that the software will executed in a specific period of time
without any failures. It is important to the professional user. It brings up the concept of
modularity, or the ease which a package can be modified.
Functionality – It is the definition of the facilities, performance and other factors that the user
requires in the finished product.
Capacity – Capacity refers to the capability of the software package to handle the users
requirements for size of files, number of data elements, and reports. All limitations should be
checked.
Flexibility – It is a measure of effort required to modify an operational program. One feature of
flexibility is adaptability.
Usability – This criteria refers to the effort required to operate, prepare the input, and interpret
the output of a program. Additional points considered here are portability and understandability.
Portability refers to the ability of the software to be used. Understandability is the purpose of the
product.
Security – It is a measure of the likelihood that a system’s user can accidentally or intentionally
access or destroy unauthorized data.
Performance – It is a measure of the capacity of the software package to do what it is expected
to do. This criteria focuses on throughput or how effectively a package performs under peak load.
Serviceability –This criteria focuses on documentation and vendor support.
Ownership – Who owns the software ,and to consider whether he has the right to access the
software, or he can sell or modify the software.
Minimal costs – Cost is a major consideration in deciding between in-house and vendor
software.
Evaluation process:
There are three process for evaluating hardware and software.
1. Benchmark programs: It is a sample program for evaluating different computers and their
software. It is necessary because computers often uses the same instructions, words of memory
or machine cycle to solve a problem. Benchmarking includes the following
2. Experience of other users: Benchmarking only validates vendors’ claims. Experience of other
users with the same system software is essential.
3. Product reference manuals: These evaluate a system’s capability. These reports elaborate on
computer products, services and prices.
Evaluation of proposals:
After all proposals are evaluated, the final vendor is selected using any of the 3 methods
1. adhoc refers to the user’s inclination to favour one vendor over others.
2. Scoring. In this method the characteristics of each system are listed and score is given in
relation to the maximum point rating. Then each proposal is rated according to its
characteristics.
3. Cost value approach. In this method a dollar credit method is applied to the proposal that
meets the user’s desirable characteristics. This credit is subtracted from the vendor’s quoted
price. The proposal with the lowest price is selected.
Performance Evaluation
In addition to hardware and software evaluation, the quality of the vendor’s should be examined.
Considerations to ensure vendor quality are as follows:
1. The rental option: Rent is a form of lease directly by the manufacturer. The user agrees to a
monthly payment, usually for one year or less. Rental option is one of the most opted option for
acquisition as insurance, maintenance and other expenses are included in the rental charge, there
is financial leverage for the user and rental makes it easier to change to other system thereby
reducing the risk of technological obsolescence.
2. The Lease option: A leased system is acquired through a third party or from the vendor. A third
party purchase ranges from six months with month to month renewals to seven years. However,
lease charges are lesser than rental charges for the same period. Leases may not include
maintenance or installation costs or providing a replacement system in an emergency.
3.The purchase option: Purchasing means assuming all the risks of ownership including taxes,
insurance and technological obsolescence. However, the owner obtains all the services and
supports that are available under the lease or rental agreement.
Negotiating is an art. Timing is critical. Strategies must be planned and rehearsed. The
leverage enjoyed by both the parties can change during the course of negotiations.
Various strategies and tactics are used to control the negotiation process. Some of them are:
1. Use the "good guy" and "bad guy" approach. The consultant is often perceived as the bad guy,
the user as the good guy. The consultant is the "shrewd" negotiator and the user is the
compromiser.
3. Use trade -offs. Rank less important objectives high early in the negotiation.
Contract checklist
1. Hardware: A good hardware contract is goal oriented. It stipulates the result to be achieved
with the system. The greater importance should be given to the definition of the system's
performance in terms of expected functions.
2. Software: A software package is the license to use a proprietary process. It is not truly "sold",
since a title is not transferred, so it is more or less a "license for use". The user has the right to
use the package but does not have title of ownership.
3. Delivery and Acceptance: A major problem in contracting is the failure of the vendor to
deliver on schedule. A contract should specify the remedies provided for failure to meet the
agreed- upon delivery schedule. The section governing acceptance describes the tests that must
be met for the equipment to be accepted by the user.
4. Warranties: Article 2 of the UCC provides three implied warranties by the vendor for the
goods sold and many lease transactions as well. Because warranties are desirable for the
customers, vendors include provisions relating to them in agreements, thus suggesting that
some warranty is made.
5. Finances: Contract negotiations for finances can be summarized by "Let the buyer beware".
One of the most important contract items to negotiate is the time when payments begin. Most
standard contracts specify that payments commences upon installation
6. Guarantee and reliability: This is a statement by the vendor specify the following:
1. Minimum hours of usable time per day- that is, the amount of time of computer operation
before a shutdown.
2. Mean time between failures (MTBF): the length of the time the system will run without
breaking down.
CHAPTER 13
Computer security
Computer Security is the protection of computing systems and the data that they store or access.
Computer Security allows the University to carry out its mission by:
Once the realm of IT security professionals, computer security is now an issue and concern for
all business people. Recent high profile security breaches such as those at eBay which exposed
over 140 million users’ details, the Target retail chain in the US which resulted in 100 million
credit card details of customers being stolen by criminals, and a US bank which lost over US $45
million within 24 hours. Nearer to home we have seen the Clare based Loyaltybuild company
suffer a security breach late last year which exposed credit card details of customers and earlier
this month the news headlines highlighted how police disrupted a criminal gang’s virus network
which they used to steal over $100 million.
Cyber-crime is now big business and criminals are looking to steal information such as financial
details, credit card information, personal details, or any other information which they can sell or
trade. These criminals are becoming more and more sophisticated and employ many different
methods of attacking companies’ computer networks.
One of the primary weapons in their arsenal is the computer virus. While email has been the
main method for the spread of these recent computer viruses, it is not the only method. A
computer virus can enter a network by USB device, Internet download, visiting an infected
website, instant messaging or messaging in social media platforms, file transfer and file sharing
programs, or by remote users connecting directly to the corporate network with an infected PC.
Once a computer virus gets into a network it can spread from computer to computer in multiple
ways.
Given the numerous ways a computer virus can spread, how can a company ensure that its
network is protected?
• Install Anti-Virus Software.
Ensure that reputable anti-virus software is installed on all computers. This should include
all servers, PCs and laptops. If employees use computers at home for business use or to
remotely access the network, these PCs should also have anti-virus software installed.
vulnerability using tools such as firewalls or Intrusion Detection Systems should be put into
place.
many applications designed for the Windows platform require the end user to have such
privileges; however these users should be the exception rather than the rule.
Cyber criminals poses a very real and constant threat to every business. It is important that
businesses recognise this threat and take the appropriate steps, such as those outlined above, to
reduce the likelihood and minimise
CHAPTER 14
Emerging issues and trends
5. Productivity
Introduction
Today’s enterprise IT support organizations and help desks are experiencing a dramatic shift in
the way technologies are developed, deployed and consumed. Applications are evolving faster
than ever, with new cloud-based solutions emerging almost weekly to replace the stodgy
onpremise solutions of generations past. User expectations arent far behind; a new generation of
tech-savvy users increasingly expects the latest and greatest, including mobile compatibility. The
result is a constantly evolving portfolio of applications and technologies that IT organizations
must support, while being more responsive and empathetic than ever beforeall without increasing
costs.
This paper presents five interrelated trends impacting the way IT support organizations operate:
The intended audience for this paper includes executives, IT management, software
development/QA leadership, and anyone else interested in delivering unsurpassed support.
1. Productivity Pressures
Ideal applications combine usability and consistency with brisk implementation and low
maintenance. The former, usability and consistency, are vital to managing the IT help desk's
workload. Ensuring that users are quickly able to understand the interface and that it works
consistently will minimize the number of end-user issues. By keeping implementation times
short and maintenance low, IT technicians have more time to focus on resolving existing issues
and implementing new productivity-enhancing systems.
Many IT support organizations looking to increase efficiency are turning to best practice
frameworks, such as ITIL, that provide guidance on how IT should deploy and support software.
However, there's a significant risk of getting bogged down in endless processes, paperwork, and
heavyweight technology deployments aimed at optimizing the support experience. The IT help
desk must balance the desire to comply with rigid standards and best practices with the
reality of needing to provide excellent service to their customers (end users) right now.
Ultimately, successful organizations will use ITIL and related methodologies as a blueprint and
let procedures evolve as feedback dictates.
The last piece of the IT help desk puzzle is using a support platform that makes life easier for
agents and end users alike. For end users, this means a simple interface for submitting issues and
knowledge bases where users can quickly locate answers or discuss issues with the community.
For agents, this means a system that increases end-user visibility into ticket status, is able to
automate repetitive tasks and helps process feedback. Finding the right blend is vital, since all
customer interactions are routed through the customer support platform. (More on this in trend
five: Raising the Bar on Customer Service.)
2. Cloud Computing
The C-suite mantra for IT has always been faster, better, cheaper — doing more with less.
Software as a service (SaaS or cloud-based software) is now delivering on this promise.
Improvements in underlying infrastructure have solved the uptime and scaling issues that
plagued SaaS solutions in the early 2000s, turning them into the go-to delivery method for
customer relationship management (CRM), marketing automation and customer support.
Cloudbased solutions have several benefits over on-premise solutions:
Many large providers are now planning to migrate legacy on-premise solutions to the cloud
knowing that IT departments are increasingly willing to outsource data security, upgrades and
maintenance to software providers. As cloud becomes the industry standard, help desk staff must
be ready to support a diverse set of applications that need less technical day-to-day involvement,
but change more often and require them to support these changes.
When things go wrong, the IT help desk is the first line of support, whether these resources
and applications reside in the cloud, behind the firewall, or a mixture of both. In fact, there's a
good chance most users won't know (or care) who owns the resource: all they know is that they
need help — right now, and they're unsympathetic to gaps between data that lives in the cloud
and data that resides on-premise.
3. Consumerization of IT
Today's users are reaping the rewards of two rapidly evolving fields, mobile device
manufacturing and consumer website development, which are increasing IT expectations in
today's user base.
As mobile devices continue to expand their power, sophistication and reach, users are
acclimating to streamlined native application experiences, intuitive interfaces and constant data
availability. Further, phones are becoming the center of many peoples' online lives thanks to
robust social apps like Path® and Foursquare®, leaving them unwilling to adopt separate work
devices. These high expectations are creating a bring-your-own-device (BYOD) culture where
support for multiple platforms is expected.
A recent CIO.com article showed that 60% of respondents are seeing increased support demand
for Apple®'s Mac® OS X®10. This is partly due to the rising popularity of iOS through the
iPhone and iPad, but also a sign that Macs are gaining market share at home where employees
are skewing the traditional work/life balance. At home, consumer websites, such as Facebook®
and Twitter®, are gaining mobile-like elegance and interactivity thanks to advancements in
front-end languages, and many of these popular consumer sites also have accompanying mobile
apps that allow on-the-go access, which many now desire from their work applications. Even the
most progressive IT departments are struggling to adapt responsibly.
These expectations are helping fuel cloud popularity thanks to browser-delivered flexibility.
Many cloud apps support multiple operating systems and mobile devices, whereas on-premise
solutions have limited compatibility. Cloud applications also benefit from the same front-end
programming developments as consumer applications, meaning they have better interfaces that
are more easily updated than their on-premise counterparts. Further, some cloud solutions have
companion mobile apps that provide secure access to the native experience users crave. From a
support perspective, native apps help IT cope with today's BYOD climate by offloading
compatibility and data security to providers.
4. Corporate Social Media
For many employees, social-networking platforms (e.g. Facebook and Twitter) are at the heart of
their personal online experiences. Given their reliance on these tools, companies are turning to
analogous corporate social media tools, such as Yammer®, to help fuel collaboration across
divisions.
Unsurprisingly, employees are using these channels to seek assistance and/or vent about
ITrelated issues, making it an important channel for harnessing feedback and even deflecting
issues. The help desk should monitor these channels for relevant conversations and interject
when necessary by pointing users to relevant knowledge base articles or asking them to submit
tickets for further help. By participating in the conversation, support looks proactive and can
raise awareness about self-service resources — the latter of which may help deflect issues that
would otherwise result in issues.
Further, corporate social media enables faster feedback and collaboration through polls and
groups. What once took weeks of coordination can now be accomplished in a matter of hours by
polling users or setting up a small task force to discuss an issue. In short, corporate social media
can fuel productivity for IT departments the same way it does across the rest of the organization.
IT is and always will be a service organization that's goal is to create a safe, productive
environment for employees. For too long, IT organizations have focused on technology rather
than users, but the tide is turning. Today's IT organizations are being encouraged to adopt a
customer service view of IT support where customer satisfaction is the new measuring stick.
This is partly driven by IT's desire for continual process improvement, and partly driven by more
demanding users. In an effort to align operations with the business and provide better service to
this customer base, many IT teams are actively implementing industry standard best practices,
including IT service management (ITSM) process-improvement methodologies.
Regardless of the exact name, these IT best practices recommend visualizing the interaction
experience from the perspective of the customer (i.e. the user). This treats the delivery of all IT
benefits as services, which is very different than traditional technology-centric viewpoints of IT
and its offerings.
User requirements for the speed and quality of IT support are now much higher than ever before.
IT organizations must adjust their focus towards their primary mission: delivering speedy,
highquality services that will be consumed by people, rather than spending excessive time
tending to the underlying support technology that helps deliver these services. To ensure that
they're on the right track and delivering the best possible service, it's essential for the IT team to
continually seek feedback from their customers using surveys and other quantitative methods.
Self-service
Support organizations are learning that it's no longer possible to dictate how users will receive
service. Self-service has become an increasingly common part of daily life, and users expect
resources that help them answer their own questions. Providing online communities, FAQs and
knowledge bases are simple ways to provide the 24-hour support users crave, and many
customer support solutions include this functionality.
Conclusion
Coping with today's rapidly changing IT environment requires an agile team that's willing to
adopt new technologies and take measured risks to better serve their internal customers.
Cloudbased software is one of the best ways to cope with increased productivity pressures and
device compatibility issues, making it a must on every CIO's list for future upgrades. As the
cloud lessens maintenance concerns, support organizations must be ready to stay vigilant and
improve documentation in order to better serve users at scale, while simultaneously harnessing
feedback to adapt and improve processes and foresee issues. Lastly, progressive IT organizations
will need to balance adherence to strict procedures with the need to keep internal customers
happy.